Marc Fisher, a Washington Post columnist, has a column in the Washington Post complaining about how privacy laws are getting in the way of the investigation into the background of the Virginia Tech Shooter. He writes:
Data Mining and the Security-Liberty Debate
I’ve written a short essay (about 20 pages), entitled Data Mining and the Security-Liberty Debate, for an upcoming symposium on surveillance for the U. Chicago Law Review. The symposium website is here [link no longer available]. The symposium looks to be a terrific event. The event will be held on June 15-16, 2007 (registration information is available at the symposium website). Besides myself, participants include Julie Cohen, Ronald Lee, Ira Rubenstein, Ken Bamberger, Deirdre Mulligan, Timothy Muris, Lior Strahilevitz, Anita Allen, Thomas Brown , Richard A. Epstein , Orin Kerr, Patricia Bellia, Richard A. Posner, Paul Schwartz, and Chris Slogobin.Continue Reading
How Much Does the First Amendment Limit Juror Privacy?
The Pennsylvania Supreme Court, in a recent decision — Commonwealth v. Long, — A.2d —-, 2007 WL 1574157 (Pa. 2007) — concluded that the First Amendment requires public disclosure of jurors’ names. This is an issue that the U.S. Supreme Court has not yet addressed. According to the court:
More on Identifying the TB Patient
I blogged the other day about the inappropriate disclosure of the TB patient’s identity. Over at Chronicles of Dissent, Dissent has an interesting post worth reading about the issue. He quotes Dr. Martin Cetron, Director of Division of Global Migration and Quarantine at CDC, who said: “I don’t think, publicly naming the individual, which we never do, has any advantage in [faciliating contacting individuals at risk of contracting TB from exposure to the patient], since this is not a disease that’s spread by casual interactions with the public.” Dissent writes:
Identifying the TB Patient
The other day, I blogged about the TB patient who flew to Europe and back with the knowledge that he had a rare form of TB. The media had been reporting on the case for a while, and the man’s name was not identified until a day or two ago, when a number of stories began including his full name and photograph, as well as the name and photographs of the woman he married (including photos from his wedding).
Anuj Desai on the Post Office and the First Amendment
Professor Anuj Desai (U. Wisconsin Law School) has posted his forthcoming article, The Transformation of Statutes into Constitutional Law: How Early Post Office Policy Shaped Modern First Amendment Doctrine, on SSRN. Anuj’s paper is a fascinating history of the early Post Office and how statutory protection of letters influenced constitutional law. From the abstract:
Can the TB Patient Be Sued?
I’ve been pondering whether the TB patient with the rare hard-to-treat form of the disease who flew on so many flights can be sued by those other passengers whom he may have exposed to the illness. From the New York Times:
The Future of the Supreme Court
Over at SCOTUS Blog, Tom Goldstein wonders what would happen to the Supreme Court if a Republican were to win the presidency in 2008:
Should We Get Rid of the Law School In-Class Essay Exam?
I’ve long been unhappy with the typical law school exam format. The entire grade for the class is based on one 3-hour in-class essay exam. The problem with this format is that many students aren’t particularly adept at writing very quickly under immense time pressure. So the exam tests, in part, the ability to write quickly — a skill that is only of limited usefulness in the practice of law. In real life, lawyers don’t write briefs in 3-hour timed sessions. Law firms would be very unhappy if they did — first because the brief probably wouldn’t be that good and second because it would amount to a meager 3 billable hours!
Can the First Amendment Serve as a Source of Criminal Procedure?
Typically, when we think of the constitutional criminal procedure that regulates government information gathering, we think of the Fourth and Fifth Amendments. But many government investigations involve collecting information about speech, association, religion, and the consumption of ideas. The NSA surveillance of telephone calls, for example, involves speech. National Security Letters can be used to obtain information about association and the consumption of ideas. And so on.