KERR, ORIN S.



BOOKS


(With LaFave, Wayne, et al.) Criminal Procedure. 4th ed. St. Paul, MN: West, 2015. 

Third edition published in 2009.


(With Kamisar, Yale, et. al.) Modern Criminal Procedure: Cases, Comments, and Questions. 14th ed. St. Paul, MN: West Academic Pub., 2015. 


(With Barnett, Randy E., et al.) A Conspiracy Against Obamacare: The Volokh Conspiracy and the Health Care Case. New York: Palgrave Macmillan, 2013. 


(With Kamisar, Yale, et. al.) Advanced Criminal Procedure: Cases, Comments, and Questions. 13th ed. St. Paul, MN: West, 2012. 


(With Kamisar, Yale, et. al.) Basic Criminal Procedure: Cases, Comments, and Questions. 13th ed. St. Paul, MN: West, 2012. 


Computer Crime Law. 3rd ed. St. Paul, MN : Thomson West, 2012. 

First edition published in 2006.

Second edition published in 2009.


Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Washington, DC: U.S. Department of Justice, 2001. 

Chinese edition published in 2006.



LAW REVIEW ARTICLES & CHAPTERS IN BOOKS


"An Economic Understanding of Search and Seizure Law," 164 University of Pennsylvania Law Review 591-647 (2016).


"Katz Has Only One Step: The Irrelevance of Subjective Expectations," 82 University of Chicago Law Review 113-134 (2015).


"Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data," 48 Texas Tech Law Review 1-36 (2015).


"The Fourth Amendment and the Global Internet," 67 Stanford Law Review 285-329 (2015).


"The Influence of Immanuel Kant on Evidentiary Approaches in 18th-Century Bulgaria," 18 Green Bag 251-253 (2015).


"A Rule of Lenity for National Security Surveillance Law," 100 Virginia Law Review 1513-1543 (2014).


"The Next Generation Communications Privacy Act," 162 University of Pennsylvania Law Review 373-419 (2014).


"Foreword: Accounting for Technological Change," 36 Harvard Journal of Law & Public Policy 403-408 (2013).

Available at: http://www.harvard-jlpp.com/wp-content/uploads/2013/04/36_2_403_Kerr.pdf.


"A Theory of Law," 16 Green Bag 2d 111 (2012).


"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97.


"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97 (2012).


"The Mosaic Theory of the Fourth Amendment," 111 Michigan Law Review 311-354 (2012).


"An Equilibrium-Adjustment Theory of the Fourth Amendment," 125 Harvard Law Review 476-543 (2011).


"Good Faith, New Law, and the Scope of the Exclusionary Rule," 99 Georgetown Law Journal 1077-1118 (2011).


"The Outer Bounds of Criminal Law: Fourth Amendment Remedies and Development of the Law: A Comment on Camreta v. Greene and Davis v. United States," 2010-11 Cato Supreme Court Review 237-261.


"Ex Ante Regulation of Computer Search and Seizure," 96 Virginia Law Review 1241-1293 (2010).


"Applying the Fourth Amendment to the Internet: A General Approach," 62 Stanford Law Review 1005-1049 (2010).


"Fourth Amendment Seizures of Computer Data," 119 Yale Law Journal 700-724 (2010).


"The Modest Role of the Warrant Clause in National Security Investigations," (Symposium: Law at the Intersection of National Security, Privacy, and Technology) 88 Texas Law Review 1669-1684 (2010).


"Vagueness Challenges to the Computer Fraud and Abuse Act," (Symposium: Cyberspace & the Law: Privacy, Property and Crime in the Virtual Frontier) 94 Minnesota Law Review 1561 (2010).


"Defending the Third-Party Doctrine: A Response to Epstein and Murphy," (Symposium: Security Breach Notification Six Years Later) 24 Berkeley Technology Law Journal 1229-1237 (2009).


"The Case for the Third-Party Doctrine," 107 Michigan Law Review 561-601 (2009).


"The Limits of Fourth Amendment Injunctions," (The Digital Broadband Migration: Information Policy for the Next Administration, the 8th Anniversary Silicon Flatirons Program Symposium) 7 Journal on Telecommunications and High Technology Law 127-138 (2009).


"Criminal Law in Virtual Worlds," 2008 University of Chicago Legal Forum 415-429.


"Updating the Foreign Intelligence Surveillance Act," 75 University of Chicago Law Review 225-243 (2008).


"Four Models of Fourth Amendment Protection," 60 Stanford law Review 503-551 (2007).


"How to Read a Legal Opinion: A Guide for New Law Students," 11 Green Bag 51-63 (2007).


"Blogs and the Legal Academy." 84 Washington University Law Review 1127-1134 (2006).


"Congress, The Courts, and New Technologies: A Response to Professor Solove." (Symposium: Law and the Information Society). 74 Fordham Law Review 779-790 (2005).


"Digital Evidence and the New Criminal Procedure." 105 Columbia Law Review 279-318 (2005).


"Search Warrants in an Era of Digital Evidence." 75 Mississippi Law Journal 85-135 (2005).


"Searches and Seizures in a Digital World." 119 Harvard Law Review 531-585 (2005).


"Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability." 1 Journal of Law, Economics & Policy 197-214 (2005).


"A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It." 72 George Washington Law Review 1208-1243 (2004).


"Foreword: The Future of Internet Surveillance Law." 72 George Washington Law Review 1139-1141 (2004).


"Technology, Privacy, and the Courts: A Reply to Colb and Swire." 102 Michigan Law Review 933-943 (2004).


"The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution." 102 Michigan Law Review 801-888 (2004).


"Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes." 78 New York University Law Review 1596-1668 (2003).


"Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't," 97 Northwestern University Law Review 607-673 (2003).


"Lifting the 'Fog' of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law." 54 Hastings Law Journal 805-845 (2003).


"Seeing it Both Ways." Legal Affairs 36 (July/Aug. 2003).


"Upholding the Law." (Exchange with Cass R. Sunstein). Legal Affairs 31 (Mar./Apr. 2003).


"A Lukewarm Defense of the Digital Millennium Copyright Act," Copy Fights: The Future of Intellectual Property in the Information Age, p. 163-170. Edited by Adam Thierer and Wayne Crew. Washington, D.C. : Cato Institute, 2002.


"Computers and the Patent System: The Problem of the Second Step." 28 Rutgers Computer & Technology Law Journal 47-59 (2002).


"The Fourth Amendment in Cyberspace: Can Encryption Create a 'Reasonable Expectation of Privacy?'" 33 Connecticut Law Review 503-533 (2001).


"Are We Overprotecting Code? Thoughts on First-Generation Internet Law." 57 Washington & Lee Law Review 1287-1300 (2000).


"Rethinking Patent Law in the Administrative State." 42 William & Mary Law Review 127-194 (2000). Reprinted at 32 Intellectual Property Law Review 119 (2001).


"The Decline of the Socratic Method at Harvard." 78 Nebraska Law Review 113-134 (1999).


"Shedding Light on Chevron: An Empirical Study of the Chevron Doctrine in the U.S. Courts of Appeals." 15 Yale Journal on Regulation 1-60 (1998).


"Note. The Limits of Computer Conversion: United States v. Collins." 9 Harvard Journal of Law and Technology 205-212 (1996).


"Recent Case. Good Friday Vacation as an Establishment of Religion: Metzl v. Leininger." 19 Harvard Journal of Law & Public Policy 627-634 (1996).



BOOK REVIEWS


"Do We Need a New Fourth Amendment?" Review of Privacy at Risk: The New Government Surveillance and the Fourth Amendment, by Christopher Slobogin. 107 Michigan Law Review 951-966 (2009).


"Enforcing Law Online." Review of Who Controls the Internet, by Goldsmith, Jack L. 74 University of Chicago Law Review 745-760 (2007).



OTHER


"The Strange Case of Ashcroft v. Al-Kidd," SCOTUSblog (Feb. 21, 2011, 11:48 PM) http://www.scotusblog.com/2011/02/the-strange-case-of-ashcroft-v-al-kidd/.


"Should Faking a Name on Facebook Be a Felony?," Op-Ed., Wall Street Journal, Sept. 14, 2011.


"Police-Created Exigent Circumstances in Kentucky v. King," SCOTUSblog (Jan. 5, 2011, 1:44 AM), http://www.scotusblog.com/?p=111396.


The Volokh Conspiracy, regular contributor. Available at http://volokh.com/.


(with Etzioni, Amitai, et al.). Terrorism & Privacy Issues. Licensed off-air recording made by Northwestern University Library Media Facility from a broadcast by C-Span, 2001. (1 videocassette).