admin

Julie Tanaka Siegel* In Colorado v. Connelly the Supreme Court held that police misconduct is necessary for an inadmissible confession. Since the Connelly decision, courts and scholars have framed the ...

Ari Herbert* There are two new ridesharing apps entering the market: See Jane Go[1] and SafeHer.[2] No, they are not meant for Toni and Candace, the proprietors of the fictional feminist bookstore Women and Women ...

Karima Tawfik* Introduction On June 17, 2015, under the instructions of Secretary General Ban Ki-moon, the United Nations (U.N.) reviewed its peace operations and submitted its findings to member states. The ...

Richard Primus* In Part I of this Article, Primus develops the idea of continuity tenders. In Part II, he shows that the enumeration principle is profitably understood as a continuity tender within the culture of ...

Ryan Baasch* & Saikrishna B. Prakash** Though the Constitution conspicuously bars some state involvement in foreign affairs, the states clearly retain some authority in foreign affairs. Correctly supposing that ...

Marissa Perry* This note proceeds as follows. Part I provides a summary of modern search incident to arrest doctrine. Part II compares the competing interpretations of the intersection of Rawlings and Knowles at ...

Mary Miller* After examining the source and scope of the court’s authority to review and accept or reject DPAs, this Note contends that the district courts correctly asserted review authority over the ...

Jacob Gersen* and Adrian Vermeule** Under the Administrative Procedure Act, courts review and set aside agency action that is “arbitrary [and] capricious.” In a common formulation of rationality review, ...

Peter Lee* Although tensions between universality and exceptionalism apply throughout law, they are particularly pronounced in patent law, a field that deals with highly technical subject matter. This Article ...

Thomas Martecchini* Following a data breach, consumers suffer an increased risk of identity theft because of the exposure of their personal information. Limited protection by data-breach statutes has made it ...