Volume 110 / Issue 1

Making Section 1983 Malicious-Prosecution Suits Work

The Supreme Court can’t seem to get over Section 1983 malicious prosecution. Thirty years and three significant cases into its project, however, the lower courts look about the same as they did in the early 1990s. The problem is not lack of effort, …

Read More
Volume 110 / Issue 1

Ordinary Meaning and Plain Meaning

With textualism’s ascendancy, courts increasingly invoke the canon to assume “ordinary meaning” unless the context indicates otherwise and the rule to enforce “plain meaning” regardless of extratextual considerations. Yet the relationship between …

Read More
Volume 110 / Issue 1

Vagueness Avoidance

It is no secret that legislatures often enact exceedingly broad and indefinite penal statutes that delegate enormous enforcement discretion to prosecutors and police officers. The constitutional void-for-vagueness doctrine promises to provide a …

Read More
Volume 110 / Issue 1

First Amendment Disequilibrium

The Supreme Court has constructed key parts of First Amendment law around two underlying assumptions. The first is that the press is a powerful actor capable of obtaining government information and checking government power. The second is that the …

Read More
Volume 110

20/20 Hindsight and Looking Ahead: The Vision of the Five Eyes and What’s Next in the “Going Dark” Debate

The so-called “encryption debate” made national headlines in 2016 after Apple Inc. (“Apple”) declined to enable the Federal Bureau of Investigation (“FBI” or “the Bureau”) to unlock an iPhone recovered from one of the shooters involved in a …

Read More

ONLINE EDITION

20/20 Hindsight and Looking Ahead: The Vision of the Five Eyes and What’s Next in the “Going Dark” Debate

The so-called “encryption debate” made national headlines in 2016 after Apple Inc. (“Apple”) declined to enable the Federal Bureau of Investigation (“FBI” or “the Bureau”) to unlock an iPhone recovered from one of the shooters involved in a …

By Hayley S. Brower & Daniel S. McCray
110 Va. L. Rev. Online 70

Cyber Vulnerabilities as Trade Secrets

Can a cybersecurity vulnerability—like a bug in code or a backdoor into a system—be a trade secret? Claiming a flaw as a trade secret may sound strange. Usually, talk of trade secrets conjures up images of scientists in laboratories or complex …

By Samantha L. Blond
110 Va. L. Rev. Online 52

One Year Post-Bruen: An Empirical Assessment

In the year after New York State Rifle & Pistol Association v. Bruen, a steady stream of highly publicized opinions struck down a wide range of previously upheld gun restrictions. Courts declared unconstitutional policies ranging from assault weapon …

By Eric Ruben, Rosanna Smart & Ali Rowhani-Rahbar
110 Va. L. Rev. Online 20
VIEW MORE ONLINE ARTICLES

ANNOUNCEMENTS