Susan Landau

Web Name: Susan Landau

WebSite: http://www.privacyink.org

ID:314369

Keywords:

Susan,Landau

Description:


Bio Publications Teaching Activities Honors/Awards Contact Susan Landau is BridgeProfessor in Cyber Security and Policy at The Fletcher School and the Schoolof Engineering,Department of ComputerScience, Tufts University,Visiting Professor, Department of ComputerScience, University CollegeLondon, and founding director of the Tufts MS program in Cybersecurity and Public Policy. Landau's newbook, PeopleCount: Contact-Tracing Apps and Public Health (MIT Press), focuseson efficacy, equity, and privacy. Landau has written three books onencryption and wiretappolicy: ListeningIn: Cybersecurity in an Insecure Age (Yale University Press,2017),Surveillanceor Security? The Risks Posed by New Wiretapping Technologies (MITPress, 2011) and, with Whitfield Diffie,Privacyon the Line: The Politics of Wiretapping and Encryption (MITPress, rev. ed. 2007). Landau has testified before Congress, writtenfor the Washington Post,Science, and Scientific American, and frequently appearson NPR and BBC. Landau has been a senior staff Privacy Analyst atGoogle, a Distinguished Engineer at Sun Microsystems, and a facultymember at Worcester Polytechnic Institute, the University ofMassachusetts Amherst, and Wesleyan University. She receivedthe 2008 Women of Vision Social Impact Award, was a 2010-2011 fellowof the Radcliffe Institute forAdvanced Study, was a2012 Guggenheimfellow, was inducted intothe CybersecurityHall of Fame in 2015 and into theInformation System SecurityAssociation Hall of Fame in 2018. She is also a fellow ofthe American Association for theAdvancement of Science andthe Association for ComputingMachinery.


Photo by Ben Barnhart

CV

MIT Press Amazon

Yale University Press Amazon

MIT Press Amazon

MIT Press Amazon
Biographical Information

Susan Landau works at the intersection ofcybersecurity, national security, law, and policy. During the CryptoWars of the 1990s, her insights on how government encryption policyskewed civil society and business needs for security helped win theargument for a relaxation of cryptographic export controls. Beginningin the early 2000s, Landau was an early leading voice in the argumentthat law-enforcement requirements for embedding surveillance withincommunication infrastructures created long-term national-securityrisks. Her position that securing private-sector telecommunicationswas in the national-security interest ran contrary to public thinkingat the time and had strong impact on policy makers andscholars. Landau's newbook, PeopleCount: Contact-Tracing Apps and Public Health (MIT Press, 2021)focuses on efficacy, equity, and privacy. Herbook, ListeningIn: Cybersecurity in an Insecure Age (Yale University Press,2017), was written as a result of her Congressionaltestimonyin the 2016 Apple/FBI case. Landau's bookSurveillanceor Security? The Risks Posed by New Wiretapping Technologies (MITPress) won the2012 SurveillanceStudies Book Prize,while Privacyon the Line: The Politics of Wiretapping and Encryption (MITPress), co-authored with Whitfield Diffie, won the 1998 DonaldMcGannon Communication Policy Research Award and the 1999 IEEE-USAAward for Distinguished Literary Contributions Furthering PublicUnderstanding of the Profession (revised edition, 2007). Landau hastestified before Congress and frequently briefed U.S. and Europeangovernments on encryption, surveillance, and cybersecurity issues. Shehas written for the Washington Post, the Chicago Tribune, theChristian Science Monitor, Science, and Scientific American, and hasfrequently appeared on NPR and BBC. In addition to her focus onsecurity and privacy risks of communications surveillance, Landau hasdone research on attribution, identity, critical infrastructureprotection, and digital rights management. Her earlier technical workin algebraic algorithms and symbolic computation, which broughtvarious exponential-time problems into polynomial time, has had impacton cryptography.

Landau is Bridge Professor in Cyber Security andPolicy at the The FletcherSchool and the School ofEngineering,Department of ComputerScience, Tufts University andSenior Fellow at The FletcherSchool Center forInternational Law and Governance. Prior to returning to academia,Landau was a Senior Staff Privacy Analystat Google and a DistinguishedEngineer at Sun Microsystems.At Sun, Landau worked on digital rights management, privacy andsecurity aspects of federated identity management, and cryptographicexport control. Landau has been a faculty memberat Worcester Polytechnic Institute, the University of MassachusettsAmherst, and Wesleyan University and held visiting positions atHarvard, Yale, Cornell, and the Mathematical Sciences ResearchInstitute at Berkeley. She spent many wonderful summers teachingat Hampshire College Summer Studiesin Mathematics, a program for high-ability high school students(cf. Supportinga National Treasureand Will'17 be the Year of the Pig?).

Landau is a member of the NationalAcademies Division of Engineering and Physical Science Committee, the Committee on International Security Studies,American Academy of Arts andSciences, andthe Center forDemocracy and Technology Advisory Council.. She has previouslyserved on the NationalAcademies Forumon Cyber Resilience andthe ComputerScience and Telecommunications Board and served on variousAcademies studies. Landau has also been a member ofthe advisorycommittee for the National ScienceFoundation's Directoratefor Computer and Information Science and Engineering, the NationalInstitute of Standards andTechnology's InformationSecurity and Privacy Advisory Board, and the Commission on CyberSecurity for the 44th Presidency.She is area editor forpolitical and policy perspectives forthe Journal ofCybersecurity and contributing editor for Lawfare. She was associate editor in chiefand associate editorfor IEEESecurity and Privacy from 2013-2016 and 2005-2012 respectively,section board member forthe Communications of the ACM from2008-2014 and associate editor ofthe Notices of the American Mathematical Society from 1994-2001.Landau is active inissues related to women in science. With Terry Benzel and HilarieOrman, she organized securityresearch meetingsfor women and members of underrepresented groups. Landaustarted researcHers,a mailing list for women computer science researchers in academia,industry and government labs and with Elaine Weyuker, createdthe ACM AthenaLectureship, an award celebrating outstanding women researchers.In 2008 Landau co-chairedthe MITCelebration of Women in Math meeting. She has served on theexecutive committee of ACM-W andthe Computing Research AssociationCommittee on the Status of Women in Computing Research (CRAW).

She receivedthe 2008 Women of Vision Social Impact Award, was a 2010-2011 fellowof the Radcliffe Institute forAdvanced Study, was a2012 Guggenheimfellow, was inducted intothe CybersecurityHall of Fame in 2015 and into theInformation System SecurityAssociation Hall of Fame in 2018. Landau is also a fellow ofthe American Association for theAdvancement of Science andthe Association for ComputingMachinery. She received her BA from Princeton, her MS fromCornell, and her PhD from MIT.

[top] Publications
(Publications are arranged by subject and may be listed in more than one category if appropriate.)

Cryptography and Cryptography Policy

Nadia Kostyuk and SusanLandau, Duelingover Dual_EC_DRBG: The Consequences of Corrupting a CryptographicStandardization Process, HarvardNational Security Journal, Volume 13, Issue 2, 2022.Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso, Bugs in our Pocket: The Risks of Client-Side Scanning, 2021.Encryption Working Group, Carnegie Endowment for International Peace, Moving the Encryption Policy Debate Forward, September 2019.Committee on Law Enforcement and IntelligenceAccess to Plaintext Information in an Era of Widespread StrongEncryption: Options and Trade Offs, Computer Science andTelecommunications Board, National Academies of Sciences, Engineering,andMedicine, Decryptingthe Encryption Debate: A Framework for Decisionmakers, 2018. S. Landau, ListeningIn: Cybersecurity in an InsecureAge, Yale UniversityPress, 2017. Some podcasts: an in-depth Hoover BookSoiree discussion with Ben Wittes and a short Scienceblog interviewwith Jen Golbeck.S. Landau, TheReal Security Risks of the iPhoneCase, Science, Vol. 352,Issue 6292, June 17, 2016, pp. 1398-1399.S. Landau, Testimony, Hearingon "The Encryption Tightrope: Balancing Americans' Security andPrivacy", Judiciary Committee, United States House ofRepresentatives, March 1. 2016.H. Abelson, R. Anderson, S. Bellovin,J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, andD. Weitzner,Keysunder Doormats: Mandating insecurity by requiring government access toall data andcommunications, Journalof Cybersecurity, Vol. 1, 2015. S. Landau, ``NSA and Dual EC_DRBG: Deja Vu AllOver Again?,'' Mathematical Intelligencer, Vol. 37, Issue 4 (December 2015), pp. 72-83. S. Landau, Underthe Radar: NSA's Efforts to Secure Private-Sector TelecommunicationsInfrastructure, Journal of NationalSecurity Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
,
was reprinted in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
S. Landau, MakingSense of Snowden Part II: What's Significant in the NSA SurveillanceRevelations, IEEESecurity and Privacy, Vol. 12, No. 1, January/February 2014; a shortversion, Highlightsfrom Making Sense of Snowden Part II: What's Significant in the NSASurveillance Revelations, (behind payment wall) appearedin IEEESecurity and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64. S. Bellovin, M. Blaze, S. Clark,S. Landau, LawfulHacking: Using Existing Vulnerabilities for Wiretapping on theInternet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014). S. Landau, Making Sense of Snowden: What'sSignificant in the NSA Surveillance Revelations, IEEESecurity and Privacy, Vol. 11, No. 4, July/August 2013,pp. 54-63.S. Landau, Testimony, Hearingon Going Dark: Lawful Electronic Surveillance in the Face of NewTechnologies, Subcommittee on Crime, Terrorism, and HomelandSecurity, Judiciary Committee, United States House of Representatives, February 17,2011. W. Diffie and S. Landau, The Export of Cryptography in the 20th Century and the 21st, The History of Information Security: A Comprehensive Handbook, Karl De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, pp. 725-736. Originally appeared in Treichel, Jeanie and Mary Holzer (eds.), Sun Microsystems Laboratories: the First Ten Years, 2001. Sun Labs Tech Report 2001-102. A modified version of this paper, September 11th Did Not Change Cryptography Policy, Notices of the American Mathematical Society, April 2002, pp. 450-454. S. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital signatures," in William Staples, ed. Encyclopedia of Privacy, Greenwood Press, 2007. S. Landau, Find Me a Hash, Notices of the American Mathematical Society, March 2006, pp. 330-332; Mathematical Advance in Translation, Chinese Academy of Sciences, 3 (2010), pp. 226-228. S. Landau, RSA and Public-Key Cryptography; Introduction to Cryptography; Cryptography: Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves: Number Theory and Cryptography; Elliptic Curves in Cryptography; ModernCryptography, Probabilistic Proofs, and Pseudorandomness; Foundations ofCryptography: Basic Tools; The Design of Rijndael: AES --- the AdvancedEncryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.3 (2004), pp. 357-367. S. Landau, Polynomials in the Nation's Service: Using Algebra to Design the Advanced Encryption Standard, American Mathematical Monthly, February 2004, pp. 89-117. W. Diffie and S. Landau, September 11th Did Not Change Cryptography Policy, Notices of the American Mathematical Society, April 2002, pp. 450-454. S. Landau, "Cryptography." Computer Sciences, Ed., Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference USA, pp. 49-53. S. Landau, Advanced Encryption Standard Choice is Rijndael, Notices of the American Mathematical Society, Jan. 2001, p. 38. S. Landau, Communications Security for the Twenty-First Century: the Advanced Encryption Standard, Notices of the American Mathematical Society, April 2000, pp. 450-459. Reprinted, in translation, in "Surveys in Applied and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2 (2000), pp. 259-281. S. Landau, Standing the Test of Time: the Data Encryption Standard, Notices of the American Mathematical Society, March 2000, pp. 341-349. Reprinted, in translation, in "Surveys in Applied and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2 (2000), pp. 240-258. S. Landau, Designing Cryptography for the New Century, Communications of the Association for Computing Machinery, Vol. 43, No. 5, May 2000, pp. 115-120. S. Landau, Cryptography in Crisis, Commentary (In My Opinion), Notices of the American Mathematical Society, April 1998, p. 461. Whitfield Diffie and Susan Landau, Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998). S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller, P. Neumann and D. Sobel, Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy, ACM Press, 1994. This report, funded by the NSF, was an undertaking of the USACM Committee on Public Policy. Dr. Stephen Kent, Chief Scientist - Security Technology, Bolt, Beranek and Newman, chaired the panel, which consisted of senior members of the cryptography and security communities, including members of the government, industry, and academia. A summary of the report appeared under the title Crypto Policy Perspectives, in Communications of the ACM, Vol. 37 (Aug. 1994), pp. 115-121. S. Landau, Some Remarks on Computing the Square Parts of Integers, Information and Computation, Vol. 78, No. 3 (1988), pp. 246-253. S. Landau, Zero Knowledge and the Department of Defense, Notices of the American Mathematical Society [Special Article Series], Vol. 35, No. 1 (1988), pp. 5-12. S. Landau, Primes, Codes and the National Security Agency, Notices of the American Mathematical Society, [Special Article Series], Vol. 30, No. 1 (1983), pp. 7-10.

Contact-Tracing Apps, Privacy, and Equity

Susan Landau, Digital exposure tools: Design for privacy, efficacy, and equity, Science, Vol. 373, Issue 6560, September 10, 2021. Susan Landau, People Count: Contact-Tracing Apps and Public Health, MIT Press, 2021. PrivacyHal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso, Bugs in our Pocket: The Risks of Client-Side Scanning, 2021.S. Landau, CategorizingUses of Communications Metadata: Systematizing Knowledge and Presentinga Path for Privacy, New Security Paradigms Workshop, 2020.S. Landau and A. Lubin, Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?, Harvard National Security Journal, Vol. 11, Issue 3 (2020), pp. 308-358.S. Landau, If It Isn't Efficacious, Don't Do It, European Data Protection Law Review, Vol. 5, Issue 4 (2019), pp. 466-470.S. Landau, Commentssubmitted to the NTIA request for comments on privacy, October 24,2018.S. Bellovin, M. Blaze, S. Landau, and S. Pell,It'sToo Complicated: How the Internet Upends Katz, Smith, andElectronic SurveillanceLaw, Harvard Journal of Lawand Technology, Vol. 30, No. 1 (2017).S. Landau, Is it Legal? Is it Right? The Can and Should of Use, IEEE Security and Privacy, Vol. 14, No. 5 (September/October 2016), pp. 3-5. S. Landau,Transactionalinformation is remarkablyrevelatory, Proceedings of theNational Academy of Sciences, Vol. 113, No. 20 (May 17, 2016), pp. 5467-5469.S. Landau, Choices: Privacy & Surveillance in a Once & Future Internet, Daedulus, Vol. 145, No. 1 (Winter 2016), pp. 54-64.S. Landau, Control Use of Datato ProtectPrivacy, Science,Vol. 347, Issue 6221, January 30, 2015. S. Landau, EducatingEngineers: Teaching Privacy in a World of Open Doors (pre-publication version),IEEESecurity and Privacy, Vol. 12, No. 3, May/June 2014,pp. 66-70. S. Landau, Politics, Love, andDeath in a World of NoPrivacy, IEEESecurity and Privacy, Vol. 11, No. 3, May/June 2013,pp. 11-13. A. Cavoukian, A. Davidson, M. Hansen, S. Landau, andA. Slomovic, Privacy: Front andCenter, IEEESecurity and Privacy, Vol. 10, No. 5, September/October 2012,pp. 5-10. S. Landau and T. Moore, Economic Tussles in Federated Identity Management, First Monday, Vol. 17, No. 10 (October 2012). An earlier version appeared at Workshop on Economics of Information Security, 2011. W. Diffie andS. Landau, CommunicationsSurveillance: Privacy and Security at Risk, Communications of the ACM, Vol. 52, Issue 11, November 2009, pp. 42-47,and Queue, September 2009. S. Landau, H. Le Van Gong, and R. Wilton, Achieving Privacy in a Federated Identity Management System, Financial Cryptography and Data Security '09. S. Landau, The NRC Takes on Data Mining, Behavioral Surveillance, and Privacy, IEEE Security and Privacy, Vol. 7, No. 1, January/February 2009, pp. 58-62. S. Landau, Privacy and Security: A Multidimensional Problem, Viewpoints Column, Communications of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26. W. Diffie andS. Landau, Privacyon the Line: The Politics of Wiretapping and Encryption, MITPress, 1998 (rev. ed. 2007).

Cybersecurity

Nadia Kostyuk and SusanLandau, Duelingover Dual_EC_DRBG: The Consequences of Corrupting a CryptographicStandardization Process, Harvard National Security Journal, Volume 13, Issue 2, 2022. Hal Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, and Carmela Troncoso, Bugs in our Pocket: The Risks of Client-Side Scanning, 2021.Committee on Law Enforcement and IntelligenceAccess to Plaintext Information in an Era of Widespread StrongEncryption: Options and Trade Offs, Computer Science andTelecommunications Board, National Academies of Sciences, Engineering,andMedicine, Decryptingthe Encryption Debate: A Framework for Decisionmakers, 2018.S. Landau, ListeningIn: Cybersecurity in an InsecureAge, Yale UniversityPress, 2017. Some podcasts: an in-depth Hoover BookSoiree discussion with Ben Wittes and a short Scienceblog interviewwith Jen Golbeck.S. Landau, Russia'sHybrid Warriors Got the White House, Now They're Coming for America'sTown Halls, Foreign Policy,September 26, 2017.S. Bellovin, S. Landau, and H. Lin,Limitingthe Undesired Impact of Cyber Weapons: Technical Requirements andPolicyImplications, Journalof Cybersecurity, Vol. 3, Issue 1 (2017), pp. 59-68. Reprinted inHerbert Lin and Amy Zegart,eds., Bytes,Bombs, and Spies: The Strategic Dimensions of Offensive CyberOperations, Brookings Institution Press, 2018.R. Wyden, M. Blaze, andS. Landau, TheGovernment Will Soon Be Able to Legally HackAnyone, Wired, September 14,2016.S. Landau, TheReal Security Risks of the iPhoneCase, Science, Vol. 352,Issue 6292, June 17, 2016, pp. 1398-1399.S. Bellovin, M. Blaze, andS. Landau, InsecureSurveillance: Technical Issues with Remote ComputerSearches, Computer,Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016. S. Landau, Testimony, Hearingon "The Encryption Tightrope: Balancing Americans' Security andPrivacy", Judiciary Committee, United States House ofRepresentatives, March 1, 2016.S. Landau, Perspective:Cybersurveillance and the New Frontier ofDeterrence, CurrentHistory, Vol. 115, Issue 117 (January 2016), pp. 29-31.H. Abelson, R. Anderson, S. Bellovin,J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, andD. Weitzner,Keysunder Doormats: Mandating insecurity by requiring government access toall data andcommunications, Journalof Cybersecurity, Vol. 1, 2015; a short version of "Keys underDoormats," appeared inCommunicationsof the ACM, Vol. 58, No. 10, pp. 24-26. Committee on Responding to Section 5(d) ofPresidential Policy Directive 28: The Feasibility of Software toProvide Alternatives to Bulk Signals Intelligence Collections, National ResearchCouncil, BulkCollection of Signals Intelligence: Technical Options, NationalAcademies Press, 2015. S. Bellovin, M. Blaze, andS. Landau, Comments on ProposedSearchRules, PreliminaryDraft of Proposed Amendments to the Federal Rules of Appellate,Bankruptcy, Civil, and Criminal Procedure, October 31, 2014. S. Landau, Underthe Radar: NSA's Efforts to Secure Private-Sector TelecommunicationsInfrastructure, Journal of NationalSecurity Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
,
was reprinted in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
S. Landau, MakingSense of Snowden Part II: What's Significant in the NSA SurveillanceRevelations, IEEESecurity and Privacy, Vol. 12, No. 1, January/February 2014; a shortversion, Highlightsfrom Making Sense of Snowden Part II: What's Significant in the NSASurveillance Revelations, (behind payment wall) appearedin IEEESecurity and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64. S. Bellovin, M. Blaze, S. Clark,S. Landau, LawfulHacking: Using Existing Vulnerabilities for Wiretapping on theInternet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014). S. Landau, Making Sense of Snowden: What'sSignificant in the NSA Surveillance Revelations, IEEESecurity and Privacy, Vol. 11, No. 4, July/August 2013,pp. 54-63. B. Adida, C. Anderson, A. Anton,R. Dingledine, E. Felten, M. Green, J. A. Halderman, D. Jefferson,C. Jennings, N. Mitter, P. Neumann, E. Rescorla, F. Schneider,B. Schneier, H. Shacham, M. Sherr, D. Wagner, andP. Zimmermann, CALEAII: Risks of Wiretap Modifications to Endpoints" (whitepaper), May2013. S. Bellovin, M. Blaze, S. Clark, andS. Landau, Going Bright: Wiretapping withoutWeakening CommunicationsInfrastructure, IEEESecurity and Privacy, Vol. 11, No. 1, January/February 2013,pp. 62-72. [Cited in New YorkTimes editorial,May 20, 2013.] M. Blaze and S. Landau, The FBI Needs Hackers, Not Backdoors, Wired, January 14, 2013. S. Landau, TheLarge Immortal Machine and The Ticking TimeBomb, Journal of Telecommunicationsand High Technology Law, Volume 11, Issue 1 (2013), pp. 1-43. C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin, S. Landau, and M. Lesk, Privacy and Cybersecurity: The Next 100 Years, Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673. S. Bellovin, S. Bradner, W. Diffie, S. Landau, andJ. Rexford, CanIt Really Work? --- Problems with Extending EINSTEIN to CriticalInfrastructure, Harvard National SecurityJournal, Vol. 3 Issue 1 (2012). A short version of this paper appearedas As simple as possible---but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).S. Landau, Testimony, Hearingon Going Dark: Lawful Electronic Surveillance in the Face of NewTechnologies, Subcommittee on Crime, Terrorism, and HomelandSecurity, Judiciary Committee, United States House of Representatives,February 17, 2011. S. Landau, Surveillanceor Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011. D. D. Clark and S. Landau, Untangling Attribution, Harvard National Security Journal, Vol. 2, Issue 2 (2011); an earlier version appeared in Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press, 2010, pp. 25-40. D. D. Clark andS. Landau, The Problem Isn't Attribution: It's Multi-Stage Attacks, ThirdInternational Workshop on Re-Architecting the Internet, 2010.S. Landau,Testimony CybersecurityActivities at NIST's Information Technology Laboratory, Hearingbefore the Subcommittee on Technology and Innovation, Committee onScience and Technology, United States House of Representatives,October 22, 2009. W. Diffie andS. Landau, CommunicationsSurveillance: Privacy and Security at Risk, Communications of the ACM, Vol. 52, Issue 11, November 2009, pp. 42-47,and Queue, September 2009. S. Landau, Privacy and Security: A Multidimensional Problem, Viewpoints Column, Communications of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26. W. Diffie and S. Landau, Brave New World of Wiretapping, Scientific American, September 2008, pp. 33-39. S. Landau, Security and Privacy Landscape in Emerging Technologies, IEEE Security and Privacy, Vol. 6, No. 4, August/September 2008, pp. 74-77. S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann, and J. Rexford, Risking Communications Security: Potential Hazards of the `Protect America Act,' IEEE Security and Privacy, Vol. 6, No. 1, January/February 2008, pp. 24-33. A short version appeared as Internal Risks, External Surveillance Inside Risks 209, CACM 50, p. 128, Dec, 2007. S. Landau, A Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington Post, August 9, 2007, p. A17. S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf, W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications of Applying the Communications Assistance for Law Enforcement Act to Voice over IP, 2006. S. Landau, National Security on the Line, Journal of Telecommunications and High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447. S. Landau, Security, Wiretapping, and the Internet, IEEE Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December 2005. S. Bellovin, M. Blaze, and S. Landau, The Real National-Security Needs for VoIP, Inside Risks 180, CACM 48, Nov. 2005, p. 120. S. Landau and M. Stytz, "Overview of Cyber Security: A Crisis of Prioritization," IEEE Security and Privacy, Vol. 3, No. 3, pp. 9-11 and sidebar, S. Landau, C. Landwehr, and F. Schneider, "The PITAC Report: A Brief Analysis," p. 10. S. Landau, What Lessons Are We Teaching, Inside Risks 180, CACM 48, June, 2005, p. 144. S. Landau, Security, Liberty, and Electronic Communications, (invited talk), in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004, Springer Verlag, pp. 355-372. S. Landau, "The Transformation of Global Surveillance," in Bytes, Bombs, and Bandwidth: Information Technology and Global Security, Social Science Research Council, 2003, pp. 117-131. W. Diffie and S. Landau, "Cybersecurity Should be Kept in Civilian Hands," Boston Globe, August 19, 2002, pp. E-4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO Reporter, Vol. 10, No. 2, Sept. 2002. W. Diffie and S. Landau, "The Threat of .NET," New Technology Week, Nov. 5, 2001. S. Landau, Cryptography in Crisis, Commentary (In My Opinion), Notices of the American Mathematical Society, April 1998, p. 461. S. Landau, "Dangerous Increase of FBI Surveillance," Op-Ed, Chicago Tribune, March 6, 1998, p. 23. W. Diffie and S. Landau, Privacy on the Line: The Politics of Wiretapping and Encryption, MIT Press, 1998; updated and expanded edition, 2007. S. Landau and W. Diffie, Cryptography Control: FBI Wants It, but Why? Op-Ed, Christian Science Monitor, Oct. 6, 1997, p. 19. S. Landau, Eavesdropping and Encryption: U.S. Policy in an International Perspective, Conference on the Impact of the Internet on Communications Policy (1997), John F. Kennedy School of Government, Harvard University. S. Landau, S. Kent, C. Brooks, S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller, P. Neumann and D. Sobel, Codes, Keys and Conflicts: Issues in U.S. Crypto Policy, ACM Press, 1994. This report, funded by the NSF, was an undertaking of the USACM Committee on Public Policy. Dr. Stephen Kent, Chief Scientist - Security Technology, Bolt, Beranek and Newman, chaired the panel, which consisted of senior members of the cryptography and security communities, including members of the government, industry, and academia. A summary of the report appeared under the title Crypto Policy Perspectives, in Communications of the ACM, Vol. 37 (Aug. 1994), pp. 115-121. S. Landau, Zero Knowledge and the Department of Defense, Notices of the American Mathematical Society [Special Article Series], Vol. 35, No. 1 (1988), pp. 5-12. S. Landau, Primes, Codes and the National Security Agency, Notices of the American Mathematical Society, [Special Article Series], Vol. 30, No. 1 (1983), pp. 7-10.

Law and Public Policy

Steven M. Bellovin, Matt Blaze, Susan Landau, andBrian Owsley, Seekingthe Source: Criminal Defendants' Constitutional Right to SourceCode, Ohio State Technology Law Journal, Volume 17, No. 1, Winter2021. S. Landau and A. Lubin, Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended?, Harvard National Security Journal, Vol. 11, Issue 3 (2020), pp. 308-358.S. Bellovin, M. Blaze, S. Landau, and S. Pell,It'sToo Complicated: How the Internet Upends Katz, Smith, andElectronic SurveillanceLaw, Harvard Journal of Lawand Technology, Vol. 30, No. 1 (2017).S. Bellovin, M. Blaze, andS. Landau, InsecureSurveillance: Technical Issues with Remote ComputerSearches, Computer,Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016. S. Bellovin, M. Blaze, andS. Landau, Comments on ProposedSearchRules, PreliminaryDraft of Proposed Amendments to the Federal Rules of Appellate,Bankruptcy, Civil, and Criminal Procedure, October 31, 2014. S. Bellovin, M. Blaze, S. Clark,S. Landau, LawfulHacking: Using Existing Vulnerabilities for Wiretapping on theInternet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014). C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin, S. Landau, and M. Lesk, Privacy and Cybersecurity: The Next 100 Years, Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673. S. Bellovin, S. Bradner, W. Diffie, S. Landau, andJ. Rexford, CanIt Really Work? --- Problems with Extending EINSTEIN to CriticalInfrastructure, Harvard National SecurityJournal, Vol. 3 Issue 1 (2012). A short version of this paper appearedas As simple as possible---but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).S. Landau, Testimony, Hearingon Going Dark: Lawful Electronic Surveillance in the Face of NewTechnologies, Subcommittee on Crime, Terrorism, and HomelandSecurity, Judiciary Committee, United States House of Representatives,February 17, 2011. S. Landau, Surveillanceor Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011. S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann, and J. Rexford, Risking Communications Security: Potential Hazards of the `Protect America Act,' IEEE Security and Privacy, Vol. 6, No. 1, January/February 2008, pp. 24-33. A short version appeared as Internal Risks, External Surveillance Inside Risks 209, CACM 50, p. 128, Dec, 2007. S. Landau, A Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington Post, August 9, 2007, p. A17. S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf, W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications of Applying the Communications Assistance for Law Enforcement Act to Voice over IP, 2006. S. Landau, National Security on the Line, Journal of Telecommunications and High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447. S. Landau, Security, Wiretapping, and the Internet, IEEE Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December 2005.

Identity Management

S. Landau and T. Moore, Economic Tussles in Federated Identity Management, First Monday, Vol. 17, No. 10 (October 2012). Earlier version appeared at Workshop on Economics of Information Security, 2011. S. Landau, H. Le Van Gong, and R. Wilton, Achieving Privacy in a Federated Identity Management System, Financial Cryptography and Data Security '09. S. Landau and D. Mulligan, I'm Pc01002/SpringPeeper/ED288l.6; Who are You?, IEEE Security and Privacy, Vol. 6, No. 2, March/April 2008, pp. 13-15. S. Landau, Liberty ID-WSF Security and Privacy Overview, October 2003. S. Landau and J. Hodges, A Brief Introduction to Liberty, February 13, 2003. G. Ellison, J. Hodges, and S. Landau, Risks Presented by Single Sign-On Architectures, October 18, 2002. G. Ellison, J. Hodges, and S. Landau, Security and Privacy Concerns of Internet Single Sign-On, September 6, 2002.

Digital Rights Management

S. Landau, R. Stratulate, and D. Twilleager, Consumers, Fans, and Control: What the Games Industry Has to Teach Hollywood about DRM, CCS Workshops: DRM '06. G. Papadopoulos and S. Landau, "Innovate, Create---and Compensate!," 19 July 2005.

Symbolic Computation

S. Landau, "Computations with Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and V. Weispfennig (eds.), Computer Algebra Handbook, Spring Verlag, 2003, pp. 18-19. S. Landau and N. Immerman, Embedding Linkages in Integer Lattices, Algorithmica, Vol. 43, No. 5, May 2000, pp. 115-120. A preliminary version appeared in MSI Workshop on Computational Geometry, October, 1994. S. Landau, Compute and Conjecture, Commentary (In My Opinion), Notices of the American Mathematical Society, Feb. 1999, p. 189. S. Landau, : Four Different Views, Mathematical Intelligencer, Vol. 20, No. 4 (Fall 1998), pp. 55-60. D. Kozen, S. Landau, and R. Zippel, Decomposition of Algebraic Functions, Journal of Symbolic Computation, Vol. 22 (1996), pp. 235-246. A preliminary version appeared in Algorithmic Number Theory Symposium (1994). S. Landau, How to Tangle with a Nested Radical, Mathematical Intelligencer, Vol. 16, No. 2 (Spring 1994), pp. 49-55. S. Landau, Finding Maximal Subfields, SIGSAM Bulletin, Vol. 27, No. 3 (1993), pp. 4-8. S. Landau, Simplification of Nested Radicals, SIAM J. of Comput., Vol. 21 (1992), pp. 85-110. A preliminary version appeared in Thirtieth Annual IEEE Symposium on Foundations of Computer Science (1989), pp. 314-319. S. Landau, A Note on `Zippel Denesting,' J. Symb. Comput., Vol. 13 (1992), pp. 41-47. J. Cremona and S. Landau, Shrinking Lattice Polyhedra, SIAM J. of Discrete Math, Vol. 3, No. 3 (1990), pp. 338-348. A preliminary version appeared in Proceedings of the First ACM-SIAM Symposium on Discrete Algorithms (1990), pp. 188-193. D. Kozen and S. Landau, Polynomial Decomposition Algorithms, J. Symb. Comput., Vol. 7 (1989), pp. 445-456. Appeared in a different version as J. von zur Gathen, D. Kozen and S. Landau, "Functional Decomposition of Polynomials" Twenty-Eight Annual IEEE Symposium on the Foundations of Computer Science (1989), pp. 314-319. S. Landau, Factoring Polynomials Quickly, Notices of the American Mathematical Society, [Special Article Series], vol. 34, No. 1 (1987), pp. 3-8. S. Landau and G. Miller, Solvability by Radicals is in Polynomial Time, J. Comput. Sys. Sci., Vol. 30, No. 2 (1985), pp. 179-208. A preliminary version appeared in Fifteenth ACM Symposium on Theory of Computing (1983), pp. 140-151. S. Landau, Factoring Polynomials over Algebraic Number Fields, SIAM J. of Comput., Vol. 14, No. 1 (1985), pp. 184-195. S. Landau, Polynomial Time Algorithms for Galois Groups, Proceedings of the Int'l. Symposium on Symbolic and Algebraic Computation (1984), Spring Verlag Lecture Notes in Computer Science, No. 174, pp. 225-236.

Complexity

N. Immerman and S. Landau, The Complexity of Iterated Multiplication, Information and Computation Vol. 116, No. 1 (1995), pp. 103-116. A preliminary version appeared in Fourth Annual Structure in Complexity Conference (1989), pp. 104-111. S. Landau and N. Immerman, The Similarities (and Differences) between Polynomials and Integers, Int'l. Conf. on Number Theoretic and Algebraic Methods in Computer Science (1993), pp. 57-59.

Women in Science

S. Landau, ``What AWM Has Meant to Me,'' Janet L. Beery, Sarah J. Greenwald, and Cathy Kessel, eds., Fifty Years of Women in Mathematics: Reminiscences, History, and Visions for the Future of AWM, Spring Verlag, 2022, pp. 301-306.T. Benzel, S. Landau, and H. Orman, Expanding thePipeline: G/rep{sec}= underrepresented groups in securityresearch, Computing Research News, March 2015, pp. 8-10.S. Landau, Anywhere, Anytime -- Or Just Where is Your Office Anyhow? Pipeline series, Computing Research News, September 2005, p. 2. S. Landau, A Far Cry from Galois Fields, Newsletter of the Association for Women in Mathematics, November-December 2003, pp. 10-13. S. Landau, Time to Move Mountains, Commentary (In My Opinion), Notices of the American Mathematical Society, Sept. 2000, p. 853. S. Landau, What Happens to the Women? Association forWomen in Mathematics Newsletter, March-April 1995, pp. 6-7. S. Landau, Universities and the Two-Body Problem, Computing Research News, March, 1994, p. 4. Also reprinted in the Association for Women in Mathematics Newsletter, March 1994, pp. 12-14, and SIGACT News, Dec. 1994, pp. 41-43 and reprinted in Complexities: Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton University Press, 2005, pp. 253-256. S. Landau, Tenure Track, Mommy Track, Association for Women in Mathematics Newsletter, May-June 1991. Also reprinted in shortened form in Notices of the American Mathematical Society, Sept. 1991, pp. 703-4 and reprinted in Complexities: Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton University Press, 2005, pp. 260-263.

Blog Posts, Letters to the Editor, and OtherShort Pieces ona Variety of Topics

S. Landau, FTC lawsuit spotlights a major privacy risk: From call records to sensors, your phone reveals more about you than you think, The Conversation, August 30, 2022.S. Landau, The EU's Proposal on CSAM is a Dangerous Misfire, Lawfareblog, June 23, 2022.S. Landau, Impending demise of Roe v. Wade puts a spotlight on a major privacy risk: Your phone reveals more about you than you think, The Conversation, May 23, 2022.S. Landau, How the U.K. and the Senate Judiciary Committee Are Being Dangerously Foolish About Cryptography, Lawfareblog, March 1, 2022.S. Landau, Decoding When IT is Useful During Wartime---and What Causes IT to Fail, review of Information Technology and Military Power, Texas National Security Review, February 1, 2022.S. Landau, TheConflict over Cryptography, Horizons,Winter 2022.S. Landau, Bugs in our Pockets: The Security Risks of Client-Risk Scanning, Lawfareblog, October 15, 2021.S. Landau, Normalizing Surveillance, Lawfareblog, August 30, 2021.S. Landau, Dangers Posed by Evidentiary Software--and What to Do about It, Lawfareblog, June 23, 2021.S. Landau, Lessons from Contact-Tracing and Exposure-Notification Apps, Lawfareblog, May 26, 2021.S. Landau, Contact-tracing apps have serious physical, biological limitations, Big Think, May 24, 2021, reprinted from PeopleCount: Contact-Tracing Apps and Public Health, MIT Press, 2021.S. Landau, Contact-TracingApps: What's Needed to Be an Effective Public Health Tool, Lawfareblog, January 19, 2021.S. Landau, Law Enforcement is Accessing Locked Devices Quite Well, Thank You, Lawfareblog, December 7, 2020.S. Landau, It's Never Too Late to Think about NSA's CDR Collection Program, Lawfareblog, June 22, 2020. S. Landau, C. Lopez, and L. Moy, The Importance of Equity in Contact Tracing, Lawfareblog, May 1, 2020. S. Landau, Looking Beyond Contact Tracing to Stop the Spread, Lawfareblog, April 10, 2020.S. Landau, Location Surveillance to Counter COVID-19: Efficacy is What Matters, Lawfareblog, March 25, 2020.S. Landau, If We Build It (TheyWill Break In), Lawfareblog,February 28, 2020. D. McDonough and S. Landau, Breaking the Encryption Impasse, The Hill, January 16, 2020.S. Landau, AThoughtful Response to Going Dark and the Child PornographyIssue, Lawfareblog,November 5, 2019.S. Landau, ASecurity Failure in the WhiteHouse, Lawfareblog,November 1, 2019.S. Landau, TheNSA General Counsel's Proposal for aMoonshot, Lawfareblog,September 23, 2019.J. Baker andS. Landau, NewPerspectives on the Future ofEncryption, Lawfareblog,May 28, 2019. S. Landau,Is Section 215 No Longer Worth theEffort?, Lawfareblog,March 11, 2019. S. Landau, Cryptography Policy Laundering, Center for International Law and Governance, The Fletcher School, January 15, 2019. S. Landau, Exceptional Access: The Devil is in the Details, Lawfareblog, December 26, 2018. S. Bellovin andS. Landau, Encryptionby Default Equals NationalSecurity, Lawfareblog,October 26, 2018.S. Landau, TheFive Eyes Statement on Encryption: Things are Seldom What TheySeem, Lawfareblog,September 26, 2018.S. Landau, Whythe Russians Might Hack the BoyScouts, TheConversation, September 13, 2018.S. Landau, Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology, Lawfareblog, August 3, 2018.S. Landau, What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster, Lawfareblog, May 14, 2018.S. Bellovin, M. Blaze, D. Boneh, S. Landau,R. Rivest, Analysisof the CLEAR Proposal per the National Academies' Framework,Columbia Univeristy Tech Report, CU-003-18, May 10, 2018.S. Bellovin, M. Blaze, D. Boneh, S. Landau,R. Rivest, RayOzzie's crypto proposal: a dose of technical reality(op-ed), Ars Technica, May 6,2018.S. Landau, Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption, Lawfareblog, April 25, 2018.S. Landau, The Russians Are Coming, Lawfareblog, April 18, 2018.S. Landau, Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All, Lawfareblog, March 30, 2018.S. Landau, What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica, Blog@ACM, March 28, 2018.S. Landau, No Facebook, It's Not About Security; It's About Privacy, Lawfareblog, March 26, 2018.S. Landau, Encrypted Smartphones Secure Your Identity, Not Just Your Data, TheConversation, February 28, 2018; reprinted in The Conversation---Indonesia, March 15, 2018.S. Landau, Understanding Data Breaches as National Security Threats, Lawfareblog, February26, 2018.S. Landau, What Law Enforcement Really Needs for Investigations in the Digital Age, Lawfareblog, February 12, 2018.S. Landau, Cybersecurity:Time for a NewDefinition, Lawfareblog,January 12, 2018.S. Landau, UsingThreat Modeling to SecureAmerica, Lawfareblog,December 20, 2017.S. Landau, RealSecurity Requires Encryption---Even if Investigators GetBlocked, TheConversation, November 1, 2017.S. Landau, Punchingthe Wrong Bag: The Deputy AG Enters the CryptoWars, Lawfareblog,October 27, 2017.S. Landau, PhonesMove---and So Should theLaw, Lawfareblog, August16, 2017.S. Landau, AnImportant Russian HackingStory, Lawfareblog, June2, 2017. S. Landau, AStep Forward forSecurity, Lawfareblog,May 17, 2017. S. Landau, TheFBI and IAgree, Lawfareblog,March 14, 2017. S. Landau andC. O'Neil, WhyGhosts in the Machine Should Remain Ghosts,Lawfareblog, December 7, 2016. S. Landau, TheFBI Should be Enhancing US Cybersecurity, Not UnderminingIt, Lawfareblog,December 1, 2016. S. Landau,Protectingthe Republic: Securing Communications is More Important thanEver, Lawfareblog,November 21, 2016. S. Landau, SecuringPhones and Securing Us (revisited), Lawfareblog, September 15, 2016. S. Landau, SettingUp a Straw Man: ODNI's Letter in Response to Don'tPanic, Lawfareblog, May12, 2016. S. Landau, MillionDollar Vulnerabilities and an FBI for the Twenty-first Century, Lawfareblog,April 26, 2016. S. Landau, AResponse to Susan'sPost, Lawfareblog, March 25,2016. S. Landau, TheNational-Security Needs for UbiquitousEncryption, Lawfareblog,February 2, 2016 (also appearedin Don'tPanic: Making Progress on the Going Dark Debate, Berkman Center for Internet & SocietyBerklett Cybersecurity Project (also translated intoPortugueseby Instituto de Tecnologia eSociedade do Rio), 2019. S. Landau, Be Careful What You Wish For: A Response, Lawfareblog, January 8, 2016.S. Landau, TheEncryption Wars: Everything has Changed, and Nothing hasChanged, ScientificAmerican (blog post), November 18, 2015.S. Landau, Why the Support for Crypto, Lawfareblog, September 21, 2015.S. Landau, A Public Split: Listening to the Conversation at Aspen, Lawfareblog,July 28, 2015.S. Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfareblog, July 15, 2015.S. Landau, Keysunder Doormats: MandatingInsecurity, Lawfareblog,July 7, 2015.S. Landau, DirectorComey and the RealThreats, Lawfareblog,July 3, 2015.S. Landau, Whythe Privacy Community Focuses Where itDoes, Lawfareblog, June 16,2015.S. Landau, What was Samsung Thinking?, Letter from the Editor, IEEE Security and Privacy, Vol. 13, No. 3, May/June 2015, pp. 3-4.S. Landau, Timeto Resolve the Metadata Fight, Lawfareblog, May29, 2015.S. Landau, WhatWe Must Do aboutCyber, Lawfareblog,March 10, 2015.S. Landau, Finally ... Some Clear Talk on the EncryptionIssue, Lawfareblog,February 16, 2015. S. Landau, What David Cameron Doesn't Get, Lawfareblog, January 20, 2015. S. Landau, Summing Up, Communications of the ACM, Vol. 57, No. 11, November 2014, pp. 37-39. S. Landau, Securing Phones --- and Securing, US, Lawfareblog, September 29, 2014. S. Landau, Facing Ethical Choices, Letter from the Editor, IEEE Security and Privacy, Vol. 12, No. 4, July/August 2014, pp. 3-6. S. Landau, On NSA's Subversion of NIST's Algorithm, Lawfareblog, July 25, 2014. S. Landau, What The Court Didn't Say in Riley May be the Most Important Thing of All, Lawfareblog, June 30, 2014. S. Landau, What the President Said --- and Didn't Say --- About Surveillance, Huffington Post, August 11, 2013. S. Landau, Susan Landau on Minimization, Lawfareblog.com, June 18, 2013. S. Landau, Canaries in the Coal Mine, Huffington Post, June, 6, 2013. S. Landau, Susan Landau on USG Surveillance via New Technologies, Lawfareblog.com, April 30, 2013. S. Landau, Boston and the Right to Privacy, Huffington Post, April 22, 2013. S. Landau, Cybersecurity --- Getting it Right This Time, Huffington Post, February 13, 2013. S. Landau, Searching in a Haystack ... Finds Straw, Huffington Post, October 15, 2012. S. Landau, Susan Landau on Cybersecurity Bills, Lawfareblog.com, May 3, 2012. S. Landau, Nothing to Fear but Fear Itself,Huffington Post, April 29, 2012. S. Landau, Timesharing Dexter, R.L. Constable and A. Silva (eds.), Logic and Program Semantics - Essays Dedicated to Dexter Kozen on the Occasion of His 60th Birthday, LNCS 7230, pp. 329-332, Springer, 2012. S. Landau, One Small Step for Privacy..., Huffington Post, January 26, 2012. S. Landau, It'sAll in How You ViewIt, Huffington Post,January 17, 2012.S. Landau, Surveillanceand security: Securing whom? And at whatcost?, PrivacyInternational, November 30, 2011. S. Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011. S. Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011. S. Landau, Data Retention? News of the World Demos the Risks, Huffington Post, July 21, 2011. S. Landau, Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters, Huffington Post July 18, 2011. S. Landau, Where Have All the Wiretap Reports Gone?, Huffington Post, July 14, 2011. S. Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011. S. Landau, Getting Communications Security Right, Huffington Post, April 19, 2011. S. Landau, Getting Wiretapping Right, Huffington Post, April 5, 2011. S. Landau, NIST Leads the Charge on Online Authentication, Huffington Post, January 12, 2011. S. Landau, Who's Been Looking Over My Shoulder? --- The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010. S. Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010. S. Landau, Moving Rapidly Backwards on Security, Huffington Post, October 13, 2010. S. Landau, The Pentagon's Message on Cybersecurity, Huffington Post, , August 31, 2010. S. Landau, Wrong Direction on Privacy, Huffington Post, August 2, 2010. S. Landau, Separating Wheat from Chaff, Huffington Post, July 23, 2010. S. Landau, Internet Time, Commentary (In My Opinion), Notices of the American Mathematical Society, March 2000, p. 325. S. Landau, The Myth of the Young Mathematician, Letter from the Editor, Notices of the American Mathematical Society, Nov. 1997, p. 1284. S. Landau, Mathematicians and Social Responsibility, Letter from the Editor, Notices of the American Mathematical Society, Feb. 1997, p. 188. S. Landau, Rising to the Challenge, Letter from the Editor, Notices of the American Mathematical Society, June, 1996, p. 652. S. Landau, "Joseph Rotblat: From Fission Research to a Prize for Peace," Scientific American, Jan. 1996, pp. 38-39. S. Landau, Joseph Rotblat: The Road Less Traveled, Bulletin of the Atomic Scientists, Jan.-Feb. 1996, pp. 46-54. S. Landau, Something There is That Doesn't Love a Wall, Letter from the Editor, Notices of the American Mathematical Society, Nov. 1995, p. 1268. S. Landau, Letter from the Editor, Notices of the American Mathematical Society, May 1995, p. 524. S. Landau, "The Secret of Life is a Nontrivial Computation," SIAM News, May 1991, pp. 12-13. S. Landau, "The Responsible Use of `Expert' Systems," Proceedings of the Symposium on Directions and Implications of Advanced Computing (1987), pp. 167-181. Also appeared in Directions and Implications of Advanced Computing, Vol. 1, Ablex Publishing Corp. (1989), pp. 191-202. S. Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, p. 7. Judith F. Gilsinn and Susan Landau, NBSIR 74-633, The NBS Computerized Carpool Matching System: Users' Guide, Applied Math Division, Institute for Basic Standards, Operations Research Section, National Bureau of Standards, December 1974.

Podcasts

Europe Doubles Down on Client Side Scanning, The Lawfare Podcast, August 2, 2022.Doctorsare People Too, March 1, 2022.Susan Landau and Ross Anderson on the Going DarkDebate and the Risks of Client-Side Scanning, The Lawfare Podcast, November 10, 2021. Contact-TracingApps: How They Work and Privacy Concerns, The Breakfast Grille, BFM, Malaysia, September 8, 2021. Episode 1---Susan Landau: People Count, Over the Rainbow: 21st CenturySecurity and Privacy, IEEE Computer Society, July 8, 2021. ADigital Contact Tracing Retrospective, The Lawfare Podcast, June 7, 2021.
Is Contact Tracing a Privacy Threat?, The Lawfare Podcast, April 18, 2020. Movingthe Encryption Policy Conversation Forward, The Lawfare Podcast, October 8, 2019.Conversations about SoftwareEngineering: Security and Privacy with Susan Landau, April 19, 2018.Decodingthe Cyber Era with Susan Landau, The Fletcher Forum of WorldAffairs, April 12, 2018.TechTalk: Cybersecurity in an Insecure Age, Tech Talks with BrianWesolowski, Center for Democracy and Technology, March 28, 2018.The Cyberlaw Podcast: Interview with Susan Landau, February 15, 2018. Books, et al., Q& A with Susan Landau, author of Listening In, November 24, 2017. Securityby the Book: Susan Landau on Listening In,The Lawfare Podcast,November 7, 2017. Security Mom: The Podcast aboutOur Homeland, Decrypting Encryption, October 8, 2015. [top]

Professional Activities (recent)

Advisory Boards

member, Division Committee of the Division of Engineering and Physical Sciences, National Academies of Sciences, Engineering, and Medicine, 2020-present. member, Center for Democracy and Technology Advisory Council, 2018-present.member, Forumon Cyber Resilience, National Academies of Sciences, Engineering, and Medicine, 2016-present.member, ComputerScience and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine,2010-2016.member, AdvisoryBoard, NationalCyber Security Hall of Fame, 2012-2015.advisory board member, Committee on Women in Science andTechnology, Stevens Institute of Technology, 2011-2013. member, Advisory Committee, National Science Foundation Directorate for Computer and Information Science and Engineering, 2009-2012. member, Commission on Cyber Securityfor the 44th Presidency, Center forStrategic and International Studies, 2009-2011. member, Information Security and PrivacyAdvisory Board, National Institute for Standards and Technology, 2002-2008.

Editorial Boards

area editor, Political and PolicyPerspectives, Journalof Cybersecurity, 2015-present.contributing editor, Lawfareblog, 2015-present. associate editor in chief, IEEE Securityand Privacy, 2013 - 2016. editor, special issue on online social networks, IEEE Security and Privacy, May/June 2013. associateeditor, IEEE Securityand Privacy, 2005 - 2012. co-editor, special issue on identity management, IEEE Security and Privacy, March/April 2008. section board member, Viewpoints, Communications of theACM, 2008-2014. associateeditor, Notices of theAmerican Mathematical Society, 1994 - 2001.

Program Committees and Related Work

program committee member 7th IEEE European Symposium on Security and Privacy, 2022.member, Committee on International Security Studies,American Academy of Arts andSciences, 2019-present.member, Steering Committee, Workshop on Economics in Information Security, 2019-present. member, Encryption Working Group, Carnegie Endowment for International Peace, 2018-2020. member, Law Enforcement and Intelligence Access to Plaintext Information in an Era of Widespread Strong Encryption: Options and Trade Offs, ComputerScience and Telecommunications Board, National Academies of Sciences, Engineering, and Medicine, 2016-2017.program committee member, Privacy Enhancing Technologies Symposium (PETS) 2017, 2018, 2019, and editorial board member Proceedings of Privacy Enhancing Technologies Symposium (PoPETS), 2017, 2018, 2019. steering committeemember, Workshopon Encryption and Mechanisms for Authorized Government Access toPlaintext, ComputerScience and Telecommunications Board, National Academies of Sciences, Engineering, andMedicine, 2016.participant, Berkman Center for Internet & Society BerklettCybersecurityProject, 2015-present.member, ACM Policy Award Committee, 2015-present.member, Committee on the Workshop onData Breach Aftermath and Recovery for Individuals and Institutions(report), NationalAcademies of Sciences, Engineering, and Medicine, 2015-2016.member, Intelligence Science and Technology Experts Group,National Academies of Sciences, Engineering, and Medicine,2015-present.organizing committee member, Committee on a Workshop forPrivacy for the Intelligence Commmunity: Emerging Technologies,Academic and Industry Research, and Best Practices, 2015;(see PrivacyResearch and Best Practices: Summary of a Workshop for theIntelligence Community, 2016).organizing committee member, Principles and Practices of Privacy Science Workshop, 2015.organizing committeemember, CCCPrivacy by Design Workshops, 2014-2015.program committeemember, InternationalWorkshop on Privacy Engineering, 2015.member, Respondingto Section 5(d) of Presidential Policy Directive 28: The Feasabilityof Software to Provide Alternatives to Bulk Signals IntelligenceCollection, ComputerScience and Telecommunications Board, National Academies ofScience, Engineering, and Medicine, 2014-2015.steering committeemember, SacklerForum on Cybersecurity, National Academy of Sciences and RoyalSociety, 2014.member, Electorate Nominating Committee, Section on Information, Computing, and Communication, American Association forthe Advancement of Science, 2014-present. steering commmittee member,CybersecurityIdeas Lab, NSF, 2014.steering committeemember, NSF Secure andTrustworthy Cyberspace PI Meeting, November 2012.program committeemember, New Security ParadigmsWorkshop, 2012.committee member, Usability, Security, and Privacy of Computer Systems: a Workshop, National Academies of Science, Engineering, and Medicine, 2009. program committee member, ACM Cloud Computing Security Workshop, CCS, 2009. review committee, FIND Observer Panel Report, NSF Future Internet program, April 2009. program committeemember, Computers, Freedom, andPrivacy, 2007. program committeemember, IEEESymposium on Security and Privacy, 2006. program committee member, Industry andGovernmentTrack, 12th ACMConference on Computer and Communications Privacy, 2005.program committee member, Workshop on Privacy in theElectronic Society, 2004. program committee member, Computers, Freedom, and Privacy, 2004. program committee member, CRA Grand Challenges in Information Security and Assurance, 2003. advisory board member, Computers, Freedom, and Privacy, 2003. member, ACM Advisory Committee on Security and Privacy, 2001 - 2003. member, ACM Committee on Law and Computing Technology, 1999 - 2003. program committee member, Computers, Freedom, and Privacy, 2000. distinguished lecturer, Sigma Xi, 1999 - 2001. member, Discipline Advisory Committee (Computer Science), Fulbright Scholars, 1995 - 1997; chair, 1997. member-at-large, Section Committee, Mathematics Section, American Association for the Advancement of Science, 1994 - 1998. co-chair, Security and Privacy session, MassachusettsTelecommunications Conference, 1994. program committee member, International Symposium on Symbolic and Algebraic Computation, 1993. member, NSF Graduate Fellowship in Computer Science Evaluation Panel, 1987-1989; chair, 1989.

Service in Support of Women in Science

member, Steering Committee, GREPSEC Workshops, 2020-present. co-chair, GREPSEC IV, May 2019.co-chair, GREPSEC III, May 2017.co-chair, GREPSEC II, May 2015.co-chair, GREPSEC, May 2013. member, PhD Forum Committee, Grace Hopper Celebration of Womenin Computer Science, 2011.member, Women of Vision AwardsNomination Committee, Anita Borg Institute for Women and Technology,2009. member, ACM-W Council Executive Committee, 2009-2012. co-chair, MIT Women in Math: A Celebration, April 12-13, 2008. member, Industry Advisory Committee, Grace Hopper Celebration of Women inComputer Science, 2007. member, Panels, Workshops, and Presentations Committee, Grace Hopper Celebration of Women in Computer Science, 2007. chair, selection committee, Athena Lecturer2006-2011 (founding co-chair, 2005-2006). moderator researcHers, mailing list for women computer science researchers, 2004-2016 (founder, 2004). founding moderator, TheBooklist (a list of computer science books written by women computerscientists), 2004-2009. member, CRA Committee on the Status of Women in Computing Research, 2003 - 2010. advisory board member, ACM Committee on Women, 2003 - 2009.member, MembershipCommittee, Associationfor Women in Mathematics, 1981-1983. [top]

Honors and Awards

National Associate, National Academies of Sciences, Engineering, and Medicine, 2020. Inductee, Information System SecurityAssociation Hall of Fame, 2018.Fletcher Faculty Research Award, 2018,forListeningIn: Cybersecurity in an InsecureAge. EFFPioneer Award, 2016, for Keys Under Doormats: Mandatinginsecurity by requiring government access to all data andcommunications with Harold Abelson, Ross Anderson, Steven Bellovin,Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, MatthewGreen, Peter Neumann, Ronald Rivest, Jeffrey Schiller, Bruce Schneier,Michael Specter, and Daniel Weitzner.Inductee, Cybersecurity Hall of Fame, 2015. M3AAWGJ.D. Falk Award, 2015, for "Keys Under Doormats:Mandating insecurity by requiring government access to all data andcommunications," with Harold Abelson, Ross Anderson, StevenBellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore,Matthew Green, Peter Neumann, Ronald Rivest, Jeffrey Schiller, BruceSchneier, Michael Specter, and Daniel Weitzner. Surveillance Studies Book Prize, 2012, for Surveillance or Security? The Risks Posed by New Wiretapping Technologies. The Guardian's Open 20: Fighters for Internet Freedom, 2012. Fellow, John S. Guggenheim Memorial Foundation, 2012. Fellow, Association for Computing Machinery, 2011. Women of Vision Social Impact Award, Anita Borg Institute for Women and Technology, 2008. Distinguished Engineer, Association for Computing Machinery, 2006. Fellow, American Association for the Advancement of Science, 2000. IEEE-USA Award for Distinguished Literary Contributions Furthering Public Understanding of the Profession, 1999, with Whitfield Diffie, for Privacy on the Line: The Politics of Wiretapping and Encryption. McGannon Book Award for Social and Ethical Relevance in Communication Policy Research, Donald McGannon Communication Research Center (Fordham University), 1998, with Whitfield Diffie, for Privacy on the Line: The Politics of Wiretapping and Encryption. NSF Mathematical Sciences PostdoctoralFellowship, 1988-1991. [top] Contact Information

For all Tufts-related activity:

617-627-4792

For any non-Tufts-related activities:

413-259-2018

[top] Copyright © 2022 Susan Landau | Site Design by Silvana.Net

TAGS:Susan Landau

<<< Thank you for your visit >>>

Websites to related :
SUSANNE SCHWARZER | Bildende Kun

  SUSANNE SCHWARZERBildende Kunst / Werbeagentur / Dipl. HumanenergetikHauptmenüZum Inhalt wechselnZum sekundären Inhalt wechselnStartseiteBildende Ku

Susanna Ronner Graphic Design |

   MENU portfolio brand identity print web packaging about co

Aktuell - Susanne Hinz Textildes

   Susanne Hinz Textildesignmode bewußt sein &#8211; nachhaltig in Deutschland produzierte Accessoires und Kleidung aus Naturmaterialien wie Seide, Lei

Werbeagentur - Marco Gambel - in

  08734 9392763info@dot-werbung.deXingFacebookInstagramKundenserviceNavigation überspringenKontaktWebmailerNavigation überspringenAgenturLeistungenGes

COMPASSIONATE COMBAT | Susan Gib

   :root{--color_0:255,255,255;--color_27:43,124,116;--color_1:0,0,0;--color_2:255,255,255;--color_3:237,28,36;--color_4:0,136,203;--colo

Blaues Kreuz Landau

  Blaues Kreuz Landau Freundeskreis Blaues Kreuz Landau mit Außenstellen &times;HomepageLandauÜber UnsJede WocheIm MonatJunge Suchtgruppe Stoffwechs

Susan Aurinko Photography

   Home Portfolio

Responsives Webdesign, Programmi

   HomeLeistungenWebl&ouml;sungenEntwicklungDatenbankenBeratungL&ouml;sungenUnternehmenWir &uuml;ber u

Landau Eugene Murphy Jr | Winner

  You don't want to miss Landau's performance at the Oshkosh Jazz Fest, August, 27th! LEARN MOREclose &times;+HomeNewsEventsBiographyPhotosVideosStoreCo

Landratsamt | Landratsamt Dingol

  Zur Hauptnavigation Zur Unternavigation Zum Inha

ads

Hot Websites