Stephen Smith

Bankruptcy

Morning Docket: 05.08.14

* Footnote fight! Justice Sonia Sotomayor has been clashing with quite a few of her fellow Supreme Court jurists lately, aside from Chief Justice John Roberts. She recently inspired the wrath of Justice RBG herself. [New York Times] * After months of being poked and prodded for cash, 60 former Howrey equity partners have reached clawback deals with bankruptcy trustee Allan Diamond, and it looks like a few of them agreed to pay pretty hefty sums. [Am Law Daily] * Here’s a headline we could’ve told you was coming: “The US lawyer bubble has conclusively popped.” It’s not a terribly good decision to attend now, but if you do, people who can’t pay you need your help. [Quartz] * Cutting law school tuition may be a good idea to attract more students, but in the long run, it could hurt the schools, says Moody’s. Aww, let us shed some tears for those poor law schools. [WSJ Law Blog] * Crim Law prof not guilty of… crime. Stephen Smith of Notre Dame Law was acquitted on a misdemeanor invasion of privacy charge, and the felony battery charge he faced was dismissed. [South Bend Tribune] * The University of Arizona will be the first school in the U.S. to offer a bachelor’s degree in law. The degree is being marketed to people who eventually want to have lots of law-related debt. [National Law Journal]

Cyberlaw

If the Government Wants Your Email, It Gets Your Email

We've been talking a lot recently about the secretly authorized stuff our government does to us -- like killing us, or molesting us at airports. Here's another one for the list: digging through our emails or Twitter feeds or cell phone data, without probable cause, our permission, or our knowledge. How does the U.S. government circumvent basic probable cause and search warrant requirements when it wants electronic information? Let's see....

Cyberlaw

If the Government Wants Your Email, It Gets Your Email

We've been talking a lot recently about the secretly authorized stuff our government does to us -- like killing us, or molesting us at airports. Here's another one for the list: digging through our emails or Twitter feeds or cell phone data, without probable cause, our permission, or our knowledge. How does the U.S. government circumvent basic probable cause and search warrant requirements when it wants electronic information? Let's see....