Bootstrap
Paul Ohm, Georgetown Law

Publications

The Computer Fraud and Abuse Act After Van Buren, 5 American Constitution Society Supreme Court Review 181 (2021).
Illusory Conflicts: Post-Employment Clearance Procedures and the FTC’s Technological Expertise, 35 Berkeley Technology Law Journal 793 (2020) (with Lindsey Barnett, Laura Moy, Ashkan Soltani).
The Many Revolutions of Carpenter, 32 Harvard Journal of Law and Technology 357 (2019).
Throttling Machine Learning, in Life and the Law in the Era of Data-Driven Agency (Mireille Hildebrandt and Kieran O’Hara eds.) (2019).
Desirable Inefficiency, 32 Florida Law Review 357 (2018) (with Jonathan Frankle).
Forthright Code, 56 Houston Law Review 471 (2018).
Regulating at Scale, 2 Georgetown Law Technology Review 546 (2018).
Playing With the Data: What Legal Scholars Should Learn About Machine Learning, 51 U.C. Davis Law Review 653 (2017).
The Investigative Dynamics of the Use of Malware by Law Enforcement, 26 William & Mary Bill of Rights Journal 303 (2017).
Regulating Software When Everything Has Software, 84 George Washington University Law Review 1672 (2016) (with Blake Reid).
The Surveillance Regulation Toolkit: Thinking Beyond Probable Cause, in The Cambridge Handbook of Surveillance Law (Stephen Henderson and David Gray, eds.) (2016).
We Couldn’t Kill the Internet If We Tried, 130 Harvard Law Review Forum 79 (2016).
What if Everything Reveals Everything?, in Big Data is Not a Monolith (Cassidy Sugimoto, Michael Mattioli, and Hamid Ekbia eds.) (2016) (with Scott Peppet).
Sensitive Information, 88 Southern California Law Review 1125 (2015).
The Life of Riley (v. California), 48 Texas Tech Law Review 133 (2015).
What Do the Rules Say About Data Analysis?, Big Data, Privacy, and the Public Good: Frameworks for Engagement (Julia Lane, Victoria Stodden, Stefan Bender, and Helen Nissenbaum eds.) (2014).
Branding Privacy, 97 Minnesota Law Review 907 (2013).
The Underwhelming Benefits of Big Data, 161 University of Pennsylvania Law Review 339 (2013).
Electronic Surveillance Law and the Intra-Agency Separation of Powers, 47 University of San Francisco Law Review 269 (2012).
The Fourth Amendment in a World Without Privacy, 81 Mississippi Law Journal 1309 (2012).
Massive Hard Drives, General Warrants, and the Power of Magistrate Judges, 97 Virginia Law Review in Brief 1 (2011).
Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA Law Review 1701 (2010).
Probably Probable Cause: The Diminishing Importance of Justification Standards, 93 Minnesota Law Review 1514 (2010).
The Argument Against Technology Neutral Surveillance Laws, 87 Texas Law Review 1685 (2010).
Computer Programming and the Law: A New Research Agenda, 54 Villanova Law Review 117 (2009).
The Rise and Fall of Invasive ISP Surveillance, 2009 University of Illinois Law Review 1417 (2009).
Good Enough Privacy, 2008 University of Chicago Legal Forum 1 (2008).
The Myth of the Superuser: Fear, Risk, and Harm Online, 41 U.C. Davis Law Review 1327 (2008).
The Olmsteadian Seizure Clause, 2008 Stanford Technology Law Review 2 (2008).