E-mail:
Jack Balkin: jackbalkin at yahoo.com
Bruce Ackerman bruce.ackerman at yale.edu
Ian Ayres ian.ayres at yale.edu
Corey Brettschneider corey_brettschneider at brown.edu
Mary Dudziak mary.l.dudziak at emory.edu
Joey Fishkin joey.fishkin at gmail.com
Heather Gerken heather.gerken at yale.edu
Abbe Gluck abbe.gluck at yale.edu
Mark Graber mgraber at law.umaryland.edu
Stephen Griffin sgriffin at tulane.edu
Jonathan Hafetz jonathan.hafetz at shu.edu
Jeremy Kessler jkessler at law.columbia.edu
Andrew Koppelman akoppelman at law.northwestern.edu
Marty Lederman msl46 at law.georgetown.edu
Sanford Levinson slevinson at law.utexas.edu
David Luban david.luban at gmail.com
Gerard Magliocca gmaglioc at iupui.edu
Jason Mazzone mazzonej at illinois.edu
Linda McClain lmcclain at bu.edu
John Mikhail mikhail at law.georgetown.edu
Frank Pasquale pasquale.frank at gmail.com
Nate Persily npersily at gmail.com
Michael Stokes Paulsen michaelstokespaulsen at gmail.com
Deborah Pearlstein dpearlst at yu.edu
Rick Pildes rick.pildes at nyu.edu
David Pozen dpozen at law.columbia.edu
Richard Primus raprimus at umich.edu
K. Sabeel Rahmansabeel.rahman at brooklaw.edu
Alice Ristroph alice.ristroph at shu.edu
Neil Siegel siegel at law.duke.edu
David Super david.super at law.georgetown.edu
Brian Tamanaha btamanaha at wulaw.wustl.edu
Nelson Tebbe nelson.tebbe at brooklaw.edu
Mark Tushnet mtushnet at law.harvard.edu
Adam Winkler winkler at ucla.edu
I have nothing to say about the legalities of Secretary of State Clinton's e-mail practices, except perhaps to note that the reporting on the legal aspects of it (and, as far as I've seen, the general blogging about those aspects) is truly terrible. After a couple of days no one writing in those formats has tried to lay out what the relevant statutes say, and precisely what the regulations applicable to her said. (My guess is that somewhere out there there is a specialized blog that does so.)
My interest here is in a different question, posed by many. It goes something like this: "Why was the Secretary of State communicating with people on an e-mail account that could be hacked?" The assumption behind that question is that the Department of State's e-mail system is less vulnerable to hacking than something like Gmail. I for one certainly wouldn't make that assumption. The folks who run Gmail have a lot more technical expertise than the folks who run the Department of State's e-mail system, and there are a lot more of them. (And, on the other side of the equation, the folks who want to hack into the State Department's system probably have a substantially more intense desire to do so -- and so will devote more to the effort -- than the folks who want to hack into Gmail and rummage around in it for whatever state secrets happen to be there.)