|
Cryptography and Cryptography Policy
-
Susan Landau, Testimony, Hearing
on Foreign Influence on Americans' Data Through the Cloud Act,
House Judiciary Subcommittee on Crime and Federal Government
Surveillance, House of Representatives, June 5, 2025.
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- Susan Landau, The
Development of a Crypto Policy Community: Diffie–Hellman’s Impact on
Public Policy, Rebecca Slayton,
ed., Democratizing
Cryptography: The Work of Whitfield Diffie and Martin Hellman,
Association for Computing Machinery, 2022, 214-256.
- Nadiya Kostyuk and Susan
Landau, Dueling
over Dual_EC_DRBG: The Consequences of Corrupting a Cryptographic
Standardization
Process, Harvard National
Security Journal, Volume 13, Issue 2 (2022).
- Encryption Working Group, Carnegie Endowment for International Peace, Moving the Encryption Policy Debate Forward, September 2019.
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Science and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- Susan Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- Susan Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, 1398-1399.
- Susan Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1. 2016.
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Whifield Diffie, John Gilmore, Matt Green, Susan Landau,
Peter Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and
Daniel J. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015.
- Susan Landau, ``NSA and Dual EC_DRBG: Deja Vu All
Over
Again?,'' Mathematical Intelligencer, Vol. 37, Issue 4 (December 2015), 72-83.
-
Susan Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- Susan Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, 62-64.
- Steven M. Bellovin, Matt Blaze, Sandy Clark,
Susan Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- Susan Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
54-63.
- Steven M. Bellovin, Matt Blaze, Sandy Clark, and
Susan Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- Susan Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives, February 17,
2011.
- Whitfield Diffie and Susan Landau, The
Export of Cryptography in the 20th Century and the 21st, The
History of Information Security: A Comprehensive Handbook, Karl
De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, 725-736. Originally
appeared in Treichel, Jeanie and Mary Holzer (eds.), Sun Microsystems
Laboratories: the First Ten Years, 2001. Sun Labs Tech Report
2001-102. A modified version of this paper, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April 2002, 450-454.
- Susan Landau, entries for "Clipper and Capstone"; "cryptography"; "digital
signatures," in
William Staples, ed. Encyclopedia of Privacy, Greenwood Press,
2007.
- Susan Landau,
Find Me
a Hash, Notices of the American Mathematical Society,
March 2006, 330-332; Mathematical Advance in
Translation, Chinese Academy of Sciences, 3 (2010),
226-228.
- Susan Landau, RSA
and Public-Key Cryptography; Introduction to Cryptography; Cryptography:
Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves:
Number Theory and Cryptography; Elliptic Curves in Cryptography; Modern
Cryptography, Probabilistic Proofs, and Pseudorandomness; Foundations of
Cryptography: Basic Tools; The Design of Rijndael: AES—the Advanced
Encryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.
3 (2004), 357-367.
- Susan Landau, Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard, American
Mathematical Monthly, February 2004, 89-117.
- Whitfield Diffie and
Susan Landau, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April
2002, 450-454.
- Susan Landau, "Cryptography." Computer Sciences, Ed.,
Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference
USA, 49-53.
- Susan Landau, Advanced
Encryption Standard Choice is
Rijndael, Notices of the American Mathematical Society, Jan.
2001, 38.
- Susan Landau, Communications
Security for the Twenty-First Century: the Advanced Encryption Standard, Notices
of the American Mathematical Society, April 2000, 450-459.
Reprinted, in translation, in
"Surveys in Applied and Industrial Mathematics," TVP Publishers
(Moscow), Vol. 7, No. 2 (2000), 259-281.
- Susan Landau, Standing
the Test of Time: the Data Encryption Standard, Notices of the
American Mathematical Society, March
2000, 341-349. Reprinted, in translation, in "Surveys in Applied
and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2
(2000), 240-258.
- Susan Landau, Designing Cryptography for the New
Century, Communications of the Association for Computing
Machinery, Vol. 43, No. 5, May 2000, 115-120.
- Susan Landau, Cryptography
in Crisis, Commentary (In My
Opinion), Notices of the American Mathematical Society, April
1998, 461.
- Whitfield Diffie and Susan Landau,
Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998).
- Susan Landau, Stephen Kent, Clint Brooks,
Scott Charney, Dorothy Denning, Whitfield Diffie, Anthony Lauck, Doug Miller,
Peter Neumann and
David Sobel, Codes,
Keys, and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public Policy.
Dr. Stephen Kent, Chief Scientist - Security Technology,
Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security
communities, including members of the government, industry,
and academia. A summary of the report appeared under the
title
Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), 115-121.
- Susan Landau, Some Remarks on
Computing the Square Parts of Integers, Information and Computation, Vol.
78, No. 3 (1988), 246-253.
- Susan Landau, Zero Knowledge and the Department
of Defense, Notices
of the American Mathematical Society [Special Article Series],
Vol. 35, No. 1 (1988), 5-12.
- Susan Landau, Primes, Codes and the National
Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), 7-10.
Privacy
- Weijia He, Nathan Reitinger, Denise Anthony,
Chelsea Bruno, Susan Landau, Carl A. Gunter, Mounib Khanafer, and
Ravindra Mangar, "Help Me Help You: Privacy Considerations for Third
Party IoT Device
Repair," Privacy
Enhancing Technologies Symposium, 2025.
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- Susan Landau, Testimony,
Hearing of the Joint Committee on Advanced Information Technology,
the Internet and Cybersecurity, State House, Commonwealth of
Massachusetts, October 19, 2023.
- Susan Landau and Patricia Vargas
Leon, Reversing
Privacy Risks: Strict Limitations on the Use of Communications
Metadata and Telemetry Information, Colorado Technology Law
Journal, Vol. 21, Issue 1 (2023), 225-336.
- Denise Anthony, Carl A. Gunter, Weijia He,
Mounib Khanafer, Susan Landau, Ravi Manger, and Nathan
Reitinger, The
HandyTech's Coming Between 1 and 4: Privacy Opportunities and
Challenges for the IoT Handyperson (short paper),
Workshop
on Privacy in the Electronic Society, 2023.
- Susan Landau, Testimony, Informational Hearing of the Joint Committee on
Advanced Information Technology, the Internet and Cybersecurity, State House,
Commonwealth of Massachusetts, March 2023.
- Susan Landau, Testimony, Hearing
on "Protecting Americans' Privacy Against Hostile Foreign
Powers", Subcommittee on Privacy, Technology, and the Law,
Committee on the Judiciary, United States Senate, September 14, 2022.
- Susan Landau, Categorizing
Uses of Communications Metadata: Systematizing Knowledge and Presenting
a Path for Privacy, New
Security Paradigms Workshop, 2020.
- Susan Landau and
Asaf Lubin,
Examining the Anomalies, Explaining the Value: Should the USA FREEDOM
Act's Metadata Program be
Extended?, Harvard National
Security Journal, Vol. 11, Issue 3 (2020), 308-358.
- Susan Landau, If It Isn't Efficacious, Don't Do It, European Data Protection Law Review, Vol. 5, Issue 4 (2019), 466-470.
- Susan Landau, Comments
submitted to the NTIA request for comments on privacy, October 24,
2018.
- Steven M. Bellovin, Matt Blaze, Susan Landau, and Stephanie K. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017), 1-101.
- Susan Landau, Is
it Legal? Is it Right? The Can and Should of Use,
IEEE Security and Privacy, Vol. 14, No. 5 (September/October
2016), 3-5.
- Susan Landau,
Transactional
information is remarkably
revelatory, Proceedings of the
National Academy of Sciences, Vol. 113, No. 20 (May 17, 2016), 5467-5469.
- Susan Landau, Choices: Privacy & Surveillance in a Once & Future Internet, Daedulus, Vol. 145, No. 1 (Winter 2016), 54-64.
- Susan Landau, Control Use of Data
to Protect
Privacy, Science,
Vol. 347, Issue 6221, January 30, 2015.
- Susan Landau, Educating
Engineers: Teaching Privacy in a World of Open Doors (pre-publication version),
IEEE
Security and Privacy, Vol. 12, No. 3, May/June 2014,
66-70.
- Susan Landau, Politics, Love, and
Death in a World of No
Privacy, IEEE
Security and Privacy, Vol. 11, No. 3, May/June 2013,
11-13.
- Ann Cavoukian, Alan Davidson, Marit Hansen, Susan Landau, and
Anna Slomovic, Privacy: Front and
Center, IEEE
Security and Privacy, Vol. 10, No. 5, September/October 2012,
5-10.
- Susan Landau and
Tyler Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). An earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- Whitfield Diffie and
Susan Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, 42-47,
and Queue, September 2009.
- Susan Landau, Hubert Le Van Gong, and Robin
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- Susan Landau,
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy, IEEE
Security and Privacy, Vol. 7, No. 1, January/February
2009, 58-62.
- Susan Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, 25-26.
- Whitfield Diffie and
Susan Landau, Privacy
on the Line: The Politics of Wiretapping and Encryption, MIT
Press, 1998 (rev. ed. 2007).
Cybersecurity
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- Nadiya Kostyuk and Susan
Landau, Dueling
over Dual_EC_DRBG: The Consequences of Corrupting a Cryptographic
Standardization Process, Harvard
National Security Journal, Volume 13, Issue 2 (2022).
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Science and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- Susan Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- Susan Landau, Russia's
Hybrid Warriors Got the White House, Now They're Coming for America's
Town Halls, Foreign Policy,
September 26, 2017.
- S. Bellovin, Susan Landau, and Herbert Lin,
Limiting
the Undesired Impact of Cyber Weapons: Technical Requirements and
Policy
Implications, Journal
of Cybersecurity, Vol. 3, Issue 1 (2017), 59-68. Reprinted in
Herbert Lin and Amy Zegart,
eds., Bytes,
Bombs, and Spies: The Strategic Dimensions of Offensive Cyber
Operations, Brookings Institution Press, 2018.
- Ron Wyden, Matt Blaze, and
Susan Landau, The
Government Will Soon Be Able to Legally Hack
Anyone, Wired, September 14,
2016.
- Susan Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, 1398-1399.
- Steven M. Bellovin, Matt Blaze, and
Susan Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), 14-24; reprinted in Computing Now, June 2016.
- Susan Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1, 2016.
- Susan Landau, Perspective:
Cybersurveillance and the New Frontier of
Deterrence, Current
History, Vol. 115, Issue 117 (January 2016), 29-31.
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matt Green, Susan Landau,
Peter Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, and
Daniel J. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015; a short version of "Keys under
Doormats," appeared in
Communications
of the ACM, Vol. 58, No. 10, 24-26.
- Committee on Responding to Section 5(d) of
Presidential Policy Directive 28: The Feasibility of Software to
Provide Alternatives to Bulk Signals Intelligence Collections,
National Research
Council, Bulk
Collection of Signals Intelligence: Technical Options, National
Academies Press, 2015.
- Steven M. Bellovin, Matt Blaze, and
Susan Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
-
Susan Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- Susan Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, 62-64.
- Steven M. Bellovin, Matt Blaze, Sandy Clark, and
Susan Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- Susan Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
54-63.
- Ben Adida, Collin Anderson, Annie I. Anton,
Roger Dingledine, Edward W. Felten, Matt Green, J. Alex Halderman, David R. Jefferson,
Cullen Jennings, Navroop Mitter, Peter G. Neumann, Eric Rescorla, Fred B. Schneider,
Bruce Schneier, Hovav Shacham, Micah Sherr, David Wagner, and
Philip Zimmermann, CALEA
II: Risks of Wiretap Modifications to Endpoints (whitepaper), May
2013.
- Steven M. Bellovin, Matt Blaze, Sandy Clark, and
Susan Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- Matt Blaze and
Susan Landau, The
FBI Needs Hackers, Not
Backdoors, Wired, January
14, 2013.
-
Susan Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), 1-43.
- Carl Landwehr, Dan Boneh, John C. Mitchell, S. Bellovin,
Susan Landau, and
Michael E. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- Steven M. Bellovin, Scott
O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer
Rexford, Can It Really
Work?—Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National
Security Journal, Vol. 3 Issue 1 (2012). A short version of this
paper appeared as As simple as
possible—but not more so, Steven M. Bellovin, Scott O. Bradner,
Whitfield Diffie, Susan Landau,
Jennifer Rexford, Communications of the
ACM, Vol. 54, No. 8 (2011).
- Susan Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- Susan Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- David D. Clark and
Susan Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, 25-40.
- David D. Clark and
Susan Landau, The Problem Isn't Attribution: It's Multi-Stage Attacks, Third
International Workshop on Re-Architecting the Internet, 2010.
- Susan Landau,
Testimony Cybersecurity
Activities at NIST's Information Technology Laboratory, Hearing
before the Subcommittee on Technology and Innovation, Committee on
Science and Technology, United States House of Representatives,
October 22, 2009.
- Whtifield Diffie and
Susan Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, 42-47,
and Queue, September 2009.
- Susan Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, 25-26.
- Whitfield Diffie and Susan Landau, Brave
New World of Wiretapping, Scientific
American, September 2008, 33-39.
- Susan Landau, Security
and Privacy Landscape in Emerging Technologies,
IEEE
Security and Privacy, Vol. 6, No. 4, August/September 2008,
74-77.
- Steven M. Bellovin, Matt Blaze, Whitfield
Diffie, Susan Landau, Peter J. Neumann, and Jennifer
Rexford,
Risking Communications Security: Potential Hazards of the
`Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
128, Dec, 2007.
- Susan Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, A17.
- Steven M. Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vinton Cerf,
Whitfield Diffie, Susan Landau, Jon Peterson, John Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- Susan Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), 409-447.
- Susan Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, 26-33, November/December
2005.
- Steven M. Bellovin, Matt Blaze, and Susan Landau, The
Real National-Security Needs for VoIP, Inside Risks
180, CACM 48, Nov. 2005, 120.
- Susan Landau and M. Stytz, "Overview of Cyber Security:
A Crisis of Prioritization," IEEE Security and Privacy,
Vol. 3, No. 3, 9-11 and sidebar, Susan Landau, Carl Landwehr, and Fred B.
Schneider, "The PITAC Report: A Brief Analysis,"
10.
- Susan Landau, What
Lessons Are We Teaching, Inside Risks 180, CACM 48,
June, 2005, 144.
- Susan Landau, Security,
Liberty, and Electronic Communications, (invited talk),
in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004,
Springer Verlag, 355-372.
- Susan Landau, "The Transformation of Global Surveillance," in Bytes,
Bombs, and Bandwidth: Information Technology and Global Security, Social
Science Research Council, 2003, 117-131.
- Whitfield Diffie and Susan Landau, "Cybersecurity Should
be Kept in Civilian Hands," Boston Globe, August 19, 2002,
E-4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO
Reporter, Vol. 10, No. 2, Sept. 2002.
- Whitfield Diffie and Susan Landau, "The Threat of .NET," New
Technology Week, Nov. 5, 2001.
- Susan Landau, Cryptography
in Crisis, Commentary (In My Opinion), Notices of the American
Mathematical Society, April 1998, 461.
- Susan Landau, "Dangerous Increase of FBI Surveillance,"
Op-Ed, Chicago Tribune, March 6, 1998, 23.
- Whitfield Diffie and
Susan Landau, Privacy
on the Line: The Politics of Wiretapping and
Encryption, MIT Press, 1998; updated and
expanded edition, 2007.
- Susan Landau and Whitfield Diffie, Cryptography Control:
FBI Wants It, but Why? Op-Ed, Christian Science Monitor, Oct.
6, 1997, 19.
- Susan Landau, Eavesdropping and Encryption: U.S. Policy
in an International Perspective, Conference on the Impact of the
Internet on Communications Policy (1997), John F. Kennedy School
of Government, Harvard University.
- Susan Landau, Stephen Kent, Clint Brooks,
Scott Charney, Dorothy Denning, Whitfield Diffie, Anthony Lauck, Doug Miller,
Peter Neumann and
David Sobel, Codes,
Keys, and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public Policy.
Dr. Stephen Kent, Chief Scientist - Security Technology,
Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security
communities, including members of the government, industry,
and academia. A summary of the report appeared under the
title
Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), 115-121.
- Susan Landau, Zero
Knowledge and the Department of Defense, Notices of
the American Mathematical Society [Special Article
Series], Vol. 35, No. 1 (1988), 5-12.
- Susan Landau, Primes, Codes and the National Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), 7-10.
Law and Public Policy
- Susan Landau, James X. Dempsey, Ece Kamar, and
Steven M. Bellovin, Challenging
the Machine: Contestability in Government AI Systems, 2024.
- Susan Landau, James X. Dempsey, Ece Kamar, and
Steven M. Bellovin,
Recommendations for Government Development and Use of Advanced
Automated Systems to Make Decisions about Individuals, 2024.
- Susan Landau and Patricia Vargas
Leon, Reversing
Privacy Risks: Strict Limitations on the Use of Communications
Metadata and Telemetry Information, Colorado Technology Law
Journal, Vol. 20, Issue 2 (2023), 225-336.
- Steven M. Bellovin, Matt Blaze, Susan Landau, and
Brian
Owsley,
Seeking
the Source: Criminal Defendants' Constitutional Right to Source
Code, Ohio State Technology Law Journal, Volume 17, No. 1 (Winter
2021).
- Susan Landau and
Asaf Lubin,
Examining the Anomalies, Explaining the Value: Should the USA
FREEDOM Act's Metadata Program be
Extended?, Harvard National
Security Journal, Vol. 11, Issue 3 (2020), 308-358.
- Susan Landau, If
It Isn't Efficacious, Don't Do
It, European
Data Protection Law Review, Vol. 5, Issue 4 (2019),
466-470.
- Steven M. Bellovin, Matt Blaze, Susan Landau, and Stephanie K. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017), 1-101.
- Steven M. Bellovin, Matt Blaze, and
Susan Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), 14-24; reprinted in Computing Now, June 2016.
- Steven M. Bellovin, Matt Blaze, and
Susan Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
- Steven M. Bellovin, Matt Blaze, Sandy Clark,
Susan Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern
Journal of Technology and Intellectual Property, Vol. 12,
Issue 1 (2014).
-
Susan Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), 411-442; one section,
, was reprinted
in Intelligence,
translation by Junichi Hiramatsu, Vol. 15, March, 2015.
-
Susan Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), 1-43.
- Carl Landwehr, Dan Boneh, John Mitchell, Steven M. Bellovin,
Susan Landau, and
Michael E. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- Steven M. Bellovin, Scott
O. Bradner, Whitfield Diffie, Susan Landau, and Jennifer
Rexford, Can It Really
Work?—Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National
Security Journal, Vol. 3 Issue 1 (2012). A short version of this
paper appeared as As simple as
possible—but not more so, Steven M. Bellovin, Scott
O. Bradner, Whitfield Diffie, Susan Landau, Jennifer
Rexford, Communications of the ACM,
Vol. 54, No. 8 (2011).
- David D. Clark and
Susan Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, 25-40.
- Susan Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- Susan Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- Steven M. Bellovin, Matt Blaze, Whitfield Diffie, Susan Landau, Peter J. Neumann,
and Jennifer Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
128, Dec, 2007.
- Susan Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, A17.
- Steven M. Bellovin, Matt Blaze, Ernest Brickell, Clinton Brooks, Vinton Cerf,
Whitfield Diffie, Susan Landau, Jon Peterson, John Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- Susan Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), 409-447.
- Susan Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, 26-33, November/December
2005.
Contact-Tracing Apps, Privacy, and Equity
- Susan Landau, Digital exposure tools: Design for privacy, efficacy, and equity, Science, Vol. 373, Issue 6560, September 10, 2021.
- Susan Landau, People Count: Contact-Tracing Apps and Public Health, MIT Press, 2021.
Identity Management
- Susan Landau and
Tyler Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). Earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- Susan Landau, Hubert Le Van Gong, and Robin
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- Susan Landau and Deirdre K. Mulligan, I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
IEEE Security
and Privacy, Vol. 6, No. 2, March/April 2008, 13-15.
- Susan Landau,
Liberty ID-WSF Security and Privacy Overview, October 2003.
- Susan
Landau and Jeff Hodges, A
Brief Introduction to Liberty, February 13, 2003.
- Gary Ellison,
Jeff Hodges, and Susan Landau, Risks Presented by Single
Sign-On Architectures, October 18, 2002.
- Gary Ellison, Jeff Hodges,
and Susan Landau, Security and Privacy Concerns
of Internet Single Sign-On, September 6, 2002.
Digital Rights Management
Symbolic Computation
- Susan Landau, "Computations with
Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and
V. Weispfennig (eds.), Computer Algebra Handbook,
Spring Verlag, 2003, 18-19.
- Susan Landau and Neil
Immerman, Embedding
Linkages in Integer Lattices, Algorithmica,
Vol. 43, No. 5, May 2000, 115-120. A preliminary version
appeared in MSI Workshop on Computational Geometry,
October, 1994.
-
Susan Landau, Compute
and Conjecture, Commentary (In My Opinion), Notices of the
American Mathematical Society, Feb. 1999, 189.
- Susan Landau,
: Four Different Views, Mathematical
Intelligencer, Vol. 20, No. 4 (Fall 1998), 55-60.
- Dexter Kozen, Susan Landau, and Richard Zippel,
Decomposition of Algebraic Functions, Journal of Symbolic
Computation, Vol. 22 (1996), 235-246. A preliminary version
appeared in Algorithmic Number Theory Symposium (1994).
-
Susan Landau, How
to Tangle with a Nested Radical, Mathematical
Intelligencer, Vol. 16, No. 2 (Spring 1994), 49-55.
- Susan Landau, Finding Maximal
Subfields, SIGSAM Bulletin, Vol. 27, No. 3 (1993), 4-8.
- Susan Landau, Simplification of Nested
Radicals, SIAM J. of Comput., Vol. 21 (1992), 85-110. A
preliminary version appeared in Thirtieth Annual IEEE Symposium
on Foundations of Computer Science (1989), 314-319.
- Susan Landau, A Note on `Zippel
Denesting,' J. Symb. Comput., Vol. 13 (1992), 41-47.
- John Cremona and Susan Landau, Shrinking
Lattice Polyhedra, SIAM J. of Discrete Math, Vol. 3, No. 3
(1990), 338-348. A preliminary version appeared
in Proceedings of the First ACM-SIAM Symposium on Discrete
Algorithms (1990), 188-193.
- Dexter Kozen and Susan Landau, Polynomial
Decomposition Algorithms, J. Symb. Comput., Vol. 7 (1989),
445-456. Appeared in a different version as Joachim von zur Gathen,
Dexter Kozen and Susan Landau, "Functional Decomposition of
Polynomials" Twenty-Eight Annual IEEE Symposium on the
Foundations of Computer Science (1989), 314-319.
- Susan Landau, Factoring Polynomials
Quickly, Notices of the American Mathematical Society,
[Special Article Series], vol. 34, No. 1 (1987), 3-8.
- Susan Landau and
Gary Lee Miller, Solvability
by Radicals is in Polynomial Time, J. Comput. Sys. Sci.,
Vol. 30, No. 2 (1985), 179-208. A preliminary version appeared
in Fifteenth ACM Symposium on Theory of Computing (1983),
140-151.
- Susan Landau, Factoring Polynomials over
Algebraic Number Fields, SIAM J. of Comput., Vol. 14, No. 1
(1985), 184-195.
- Susan Landau, Polynomial Time Algorithms
for Galois Groups, Proceedings of the Int'l. Symposium on
Symbolic and Algebraic Computation (1984), Spring Verlag Lecture
Notes in Computer Science, No. 174, 225-236.
Complexity
- Neil Immerman and Susan Landau, The Complexity of Iterated
Multiplication, Information and Computation Vol. 116, No.
1 (1995), 103-116. A preliminary version appeared in Fourth
Annual Structure in Complexity Conference (1989), 104-111.
- Susan Landau and Neil Immerman, The Similarities (and Differences) between
Polynomials and Integers, Int'l. Conf. on Number Theoretic and
Algebraic Methods in Computer Science (1993), 57-59.
Women in Science
- Susan Landau, ``What AWM Has Meant to Me,'' Janet L. Beery,
Sarah J. Greenwald, and Cathy Kessel, eds., Fifty Years of
Women in Mathematics: Reminiscences, History, and Visions for the
Future of AWM, Spring Verlag, 2022, 301-306.
- Terry Benzel, Susan Landau, and Hilarie Orman, Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research, Computing Research News, March 2015, 8-10.
- Susan Landau, Anywhere,
Anytime—Or Just Where is Your Office Anyhow? Pipeline series, Computing
Research News, September
2005, 2.
- Susan Landau, A
Far Cry from Galois Fields, Newsletter of the
Association for Women in Mathematics, November-December
2003, 10-13.
- Susan Landau,
Time to Move Mountains, Commentary (In My
Opinion), Notices of the American Mathematical Society,
Sept. 2000, 853.
- Susan Landau, What Happens to the Women? Association for
Women in Mathematics Newsletter, March-April 1995, 6-7.
- Susan Landau, Universities and the Two-Body Problem, Computing
Research News, March, 1994, 4. Also reprinted in the Association
for Women in Mathematics Newsletter, March 1994,
12-14, and SIGACT News, Dec. 1994, 41-43 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, 253-256.
- Susan Landau, Tenure Track, Mommy Track, Association
for Women in Mathematics Newsletter, May-June 1991. Also reprinted in
shortened
form in Notices of the American Mathematical Society,
Sept. 1991, 703-4 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, 260-263.
Blog Posts, Letters to the Editor, and Other
Short Pieces on
a Variety of Topics
- Susan Landau, ``The Loss of a Force of Nature: Memories of
Ross Anderson,'' in Frank Stanjano, ed., Rossfest Festschrift: in
memory of Ross Anderson, 2025, 97-101.
- Susan Landau, The Dangers Lurking in
the U.K.'s Plan for Electronic
Eavesdropping, Lawfare,
February 25, 2025.
- Susan Landau, End-to-End Encryption is a Critical National Security Tool, Lawfare,
November 21, 2024.
- Susan Landau, CALEA
Was a National Security Disaster Waiting to
Happen, Lawfare,
November 13, 2024.
- Susan Landau and
J. Dempsey, Challenging
the Machine: Insights from a Workshop on Contestability of Advanced
Automated
Systems, Lawfare, June
21, 2024
- Jim Dempsey and Susan Landau, Challenging the Machine: Contestability in Government AI Systems, Lawfare, March 11, 2024.
- Susan Landau, Write the Laws for the World We Live In—Not the One We Imagine, Lawfare, December 20, 2023.
- Susan Landau, The
Shapeshifting Crypto
Wars, Lawfare,
October 12,
2023; reprinted
at M3AAWG blog, April 30, 2024.
- Susan Landau, A
Radical Proposal for Protecting Privacy: Halt Industry's Use of
'Non-Content', Lawfare,
September 8, 2023.
- Susan Landau, The
EU's Dangerous Proposal for Stopping Online Child Sexual Abuse
Material, Progressive Post,
July 5, 2023.
- Susan Landau, Finally
Some Clear Thinking on Child Sexual Abuse and Exploitation
Investigation and
Intervention, Lawfare,
January 24, 2023.
- Susan Landau, Cyberwar in Ukraine:
What You See Is Not What's Really
There, Lawfare,
September 30, 2022.
- Susan Landau, FTC lawsuit spotlights a major privacy risk: From call records to sensors, your phone reveals more about you than you think, The Conversation, August 30, 2022.
- Susan Landau, The EU's Proposal on CSAM is a Dangerous Misfire, Lawfare, June 23, 2022.
- Susan Landau, Impending
demise of Roe v. Wade puts a spotlight on a major privacy risk:
Your phone reveals more about you than you think,
The Conversation, May 23, 2022.
- Susan Landau, How the U.K. and the Senate Judiciary Committee Are Being Dangerously Foolish About Cryptography, Lawfare, March 1, 2022.
- Susan Landau, Decoding
When IT is Useful During Wartime—and What Causes IT to
Fail, review
of Information
Technology and Military
Power, Texas National
Security Review, February 1, 2022.
- Susan Landau,
The
Conflict over Cryptography,
Horizons,
Winter 2022.
- Susan Landau, Bugs
in our Pockets: The Security Risks of Client-Risk
Scanning, Lawfare,
October 15, 2021.
- Susan Landau, Normalizing
Surveillance, Lawfare,
August 30, 2021.
- Susan Landau, Dangers Posed by Evidentiary Software--and What to Do about It, Lawfare, June 23, 2021.
- Susan Landau, Lessons
from Contact-Tracing and Exposure-Notification
Apps, Lawfare,
May 26, 2021.
- Susan Landau, Contact-tracing
apps have serious physical, biological
limitations, Big Think,
May 24, 2021, reprinted from People
Count: Contact-Tracing Apps and Public Health, MIT Press, 2021.
- Susan Landau, Contact-Tracing
Apps: What's Needed to Be an Effective Public Health
Tool, Lawfare,
January 19, 2021.
- Susan Landau, Law
Enforcement is Accessing Locked Devices Quite Well, Thank
You, Lawfare,
December 7, 2020.
- Susan Landau, It's Never Too Late to Think about NSA's CDR Collection Program, Lawfare, June 22, 2020.
-
Susan Landau, Christy Lopez, and Laura Moy, The
Importance of Equity in Contact
Tracing, Lawfare,
May 1, 2020.
- Susan Landau, Looking
Beyond Contact Tracing to Stop the
Spread, Lawfare,
April 10, 2020.
- Susan Landau, Location
Surveillance to Counter COVID-19: Efficacy is What
Matters, Lawfare,
March 25, 2020.
- Susan Landau, If We Build It (They
Will Break In), Lawfare,
February 28, 2020.
- Denis McDonough and Susan Landau, Breaking the Encryption Impasse, The Hill, January 16, 2020.
- Susan Landau, A
Thoughtful Response to Going Dark and the Child Pornography
Issue, Lawfare,
November 5, 2019.
- Susan Landau, A
Security Failure in the White
House, Lawfare,
November 1, 2019.
- Susan Landau, The
NSA General Counsel's Proposal for a
Moonshot, Lawfare,
September 23, 2019.
- Jim Baker and
Susan Landau, New
Perspectives on the Future of
Encryption, Lawfare,
May 28, 2019.
- Susan Landau,
Is
Section 215 No Longer Worth the
Effort?, Lawfare,
March 11, 2019.
-
Susan Landau, Cryptography
Policy
Laundering, Center for
International Law and
Governance, The Fletcher School, January 15, 2019.
- Susan Landau, Exceptional Access: The Devil is in the Details, Lawfare, December 26, 2018.
- Steven M. Bellovin and
Susan Landau, Encryption
by Default Equals National
Security, Lawfare,
October 26, 2018.
- Susan Landau, The
Five Eyes Statement on Encryption: Things are Seldom What They
Seem, Lawfare,
September 26, 2018.
- Susan Landau, Why
the Russians Might Hack the Boy
Scouts, The
Conversation, September 13, 2018.
- Susan Landau, Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology, Lawfare, August 3, 2018.
- Susan Landau, What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster, Lawfare, May 14, 2018.
- Steven M. Bellovin, Matt Blaze, Dan Boneh, Susan Landau,
Ronald L. Rivest, Analysis
of the CLEAR Proposal per the National Academies' Framework,
Columbia Univeristy Tech Report, CU-003-18, May 10, 2018.
- Steven M. Bellovin, Matt Blaze, Dan Boneh, Susan Landau,
Ronald L. Rivest, Ray
Ozzie's crypto proposal: a dose of technical reality
(op-ed), Ars Technica, May 6,
2018.
- Susan Landau, Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption, Lawfare, April 25, 2018.
- Susan Landau, The Russians Are Coming, Lawfare, April 18, 2018.
- Susan Landau, Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All, Lawfare, March 30, 2018.
- Susan Landau, What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica, Blog@ACM, March 28, 2018.
- Susan Landau, No Facebook, It's Not About Security; It's About Privacy, Lawfare, March 26, 2018.
- Susan Landau, Encrypted Smartphones Secure Your Identity, Not Just Your Data, The
Conversation, February 28, 2018; reprinted in The Conversation—Indonesia, March 15, 2018.
- Susan Landau,
Understanding Data Breaches as National Security Threats, Lawfare, February
26, 2018.
- Susan Landau, What Law Enforcement Really Needs for Investigations in the Digital Age, Lawfare, February 12, 2018.
- Susan Landau, Cybersecurity:
Time for a New
Definition, Lawfare,
January 12, 2018.
- Susan Landau, Using
Threat Modeling to Secure
America, Lawfare,
December 20, 2017.
- Susan Landau, Real
Security Requires Encryption—Even if Investigators Get
Blocked, The
Conversation, November 1, 2017.
- Susan Landau, Punching
the Wrong Bag: The Deputy AG Enters the Crypto
Wars, Lawfare,
October 27, 2017.
- Susan Landau, Phones
Move—and So Should the
Law, Lawfare, August
16, 2017.
-
Susan Landau, An
Important Russian Hacking
Story, Lawfare, June
2, 2017.
- Susan Landau, A
Step Forward for
Security, Lawfare,
May 17, 2017.
- Susan Landau, The
FBI and I
Agree, Lawfare,
March 14, 2017.
- Susan Landau and
Cathy O'Neil, Why
Ghosts in the Machine Should Remain Ghosts,
Lawfare, December 7, 2016.
- Susan Landau, The
FBI Should be Enhancing US Cybersecurity, Not Undermining
It, Lawfare,
December 1, 2016.
- Susan Landau,
Protecting
the Republic: Securing Communications is More Important than
Ever, Lawfare,
November 21, 2016.
-
Susan Landau, Securing
Phones and Securing Us (revisited), Lawfare, September 15, 2016.
-
Susan Landau, Setting
Up a Straw Man: ODNI's Letter in Response to Don't
Panic, Lawfare, May
12, 2016.
-
Susan Landau, Million
Dollar Vulnerabilities and an FBI for the Twenty-first Century, Lawfare,
April 26, 2016.
- Susan Landau, A
Response to Susan's
Post, Lawfare, March 25,
2016.
- Susan Landau, The
National-Security Needs for Ubiquitous
Encryption, Lawfare,
February 2, 2016 (also appeared
in Don't
Panic: Making Progress on the Going Dark Debate, Berkman Center for Internet & Society
Berklett Cybersecurity Project (also translated into
Portuguese
by Instituto de Tecnologia e
Sociedade do Rio), 2019.
- Susan Landau, Be Careful What You Wish For: A Response, Lawfare, January 8, 2016.
- Susan Landau, The
Encryption Wars: Everything has Changed, and Nothing has
Changed, Scientific
American (blog post), November 18, 2015.
- Susan Landau, Why the Support for Crypto, Lawfare, September 21, 2015.
- Susan Landau, A Public Split: Listening to the Conversation at Aspen, Lawfare,
July 28, 2015.
- Susan Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfare, July 15, 2015.
- Susan Landau, Keys
under Doormats: Mandating
Insecurity, Lawfare,
July 7, 2015.
-
Susan Landau, Director
Comey and the Real
Threats, Lawfare,
July 3, 2015.
-
Susan Landau, Why
the Privacy Community Focuses Where it
Does, Lawfare, June 16,
2015.
- Susan Landau, What was Samsung Thinking?, Letter from the Editor, IEEE
Security and Privacy, Vol. 13, No. 3, May/June 2015,
3-4.
-
Susan Landau, Time
to Resolve the Metadata Fight,
Lawfare, May
29, 2015.
-
Susan Landau, What
We Must Do about
Cyber, Lawfare,
March 10, 2015.
-
Susan Landau, Finally
... Some Clear Talk on the Encryption
Issue, Lawfare,
February 16, 2015.
-
Susan Landau, What
David Cameron Doesn't
Get, Lawfare,
January 20, 2015.
-
Susan Landau, Summing
Up, Communications of the
ACM, Vol. 57, No. 11, November 2014, 37-39.
-
Susan Landau, Securing
Phones—and Securing US, Lawfare,
September 29, 2014.
- Susan Landau, Facing
Ethical
Choices, Letter from the Editor, IEEE
Security and Privacy, Vol. 12, No. 4, July/August 2014,
3-6.
-
Susan Landau, On
NSA's Subversion of NIST's
Algorithm, Lawfare,
July 25, 2014.
-
Susan Landau, What
The Court Didn't Say in Riley May be the Most Important
Thing of
All, Lawfare,
June 30, 2014.
-
Susan Landau, What
the President Said—and Didn't Say—About
Surveillance, Huffington
Post, August 11, 2013.
-
Susan Landau, Susan
Landau on
Minimization, lawfaremedia.org,
June 18, 2013.
-
Susan Landau, Canaries
in the Coal
Mine, Huffington
Post, June, 6, 2013.
-
Susan Landau, Susan
Landau on USG Surveillance via New Technologies, lawfaremedia.org, April 30, 2013.
-
Susan Landau,
Boston and the Right to
Privacy, Huffington
Post, April 22, 2013.
- Susan Landau, Cybersecurity—Getting it Right This
Time, Huffington
Post, February 13, 2013.
- Susan Landau, Searching
in a Haystack ... Finds
Straw, Huffington
Post, October 15, 2012.
-
Susan Landau, Susan
Landau on Cybersecurity Bills, Lawfare.com, May 3, 2012.
-
Susan Landau,
Nothing to Fear but Fear Itself,
Huffington Post, April 29, 2012.
- Susan Landau,
Timesharing Dexter,
R.L. Constable and A. Silva (eds.), Logic and Program
Semantics - Essays Dedicated to Dexter Kozen on the Occasion of
His 60th Birthday, LNCS 7230, 329-332, Springer, 2012.
- Susan Landau, One
Small Step for
Privacy..., Huffington
Post, January 26, 2012.
- Susan Landau, It's
All in How You View
It, Huffington Post,
January 17, 2012.
- Susan Landau, Surveillance
and security: Securing whom? And at what
cost?, Privacy
International, November 30, 2011.
- Susan Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011.
- Susan Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011.
- Susan Landau, Data Retention? News of the World Demos the Risks, Huffington Post, July 21, 2011.
- Susan Landau, Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters, Huffington Post July 18, 2011.
-
Susan Landau, Where
Have All the Wiretap Reports
Gone?, Huffington
Post, July 14, 2011.
- Susan Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011.
- Susan Landau, Getting
Communications Security
Right, Huffington
Post, April 19, 2011.
- Susan Landau, Getting
Wiretapping
Right, Huffington
Post, April 5, 2011.
- Susan Landau, NIST
Leads the Charge on Online
Authentication, Huffington Post,
January 12, 2011.
- Susan Landau, Who's Been Looking Over My Shoulder?—The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010.
- Susan Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010.
- Susan Landau, Moving
Rapidly Backwards on
Security, Huffington
Post, October 13, 2010.
- Susan Landau, The
Pentagon's Message on
Cybersecurity, Huffington Post, , August
31, 2010.
- Susan Landau, Wrong
Direction on
Privacy, Huffington
Post, August 2, 2010.
- Susan Landau, Separating
Wheat from
Chaff, Huffington
Post, July 23, 2010.
- Susan Landau,
Internet Time, Commentary (In My
Opinion), Notices of the American Mathematical Society, March
2000, 325.
- Susan Landau, The
Myth of the Young Mathematician, Letter from the
Editor, Notices of the American Mathematical Society, Nov. 1997,
1284.
- Susan Landau, Mathematicians
and Social Responsibility, Letter from
the Editor, Notices of the American Mathematical Society,
Feb. 1997, 188.
- Susan Landau, Rising
to the Challenge, Letter from
the Editor, Notices of the American Mathematical Society,
June, 1996, 652.
- Susan Landau, "Joseph Rotblat: From Fission Research
to a Prize for Peace,"
Scientific American, Jan. 1996, 38-39.
-
Susan Landau, Joseph
Rotblat: The Road Less Traveled,
Bulletin of the Atomic Scientists, Jan.-Feb. 1996, 46-54.
- Susan Landau, Something
There is That Doesn't Love a Wall, Letter from
the Editor, Notices of the American Mathematical Society,
Nov. 1995, 1268.
- Susan Landau, Letter
from the Editor, Notices of the American Mathematical Society,
May 1995, 524.
- Susan Landau, "The Secret of Life is a Nontrivial
Computation," SIAM
News, May 1991, 12-13.
- Susan Landau, "The Responsible Use of `Expert' Systems," Proceedings
of the Symposium on Directions and Implications of Advanced
Computing (1987), 167-181. Also appeared in Directions and
Implications of Advanced Computing, Vol. 1, Ablex Publishing
Corp. (1989), 191-202.
- Susan Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, 7.
- Judith F. Gilsinn and Susan
Landau, NBSIR 74-633, The
NBS Computerized Carpool Matching System: Users' Guide,
Applied Math Division, Institute for Basic Standards, Operations
Research Section, National Bureau of Standards, December 1974.
Podcasts
- What is Ransomware and What Can be Done about It?, The Briefing Room, BBC, May 22, 2025.
- Susan Landau and Alan Rozenshtein Debate End-to-End Encryption (Again!), The Lawfare Podcast, December 18, 2024.
- Cybersecurity for Public Value, Episode 6, May 3, 2023.
- Zero
Trust? Encryption and Other Approaches to Protecting Private Data and
Communications, Privacy in an Age of Zero Trust, American Bar
Association (ABA) Civil Rights and Social Justice and ABA Science and
Technology Law Section, June 9, 2023.
- Securing
Our Homes, Project Sustainability, February 8, 2023.
- Home
Security and Safety, Project Sustainability, February 1, 2023.
- Europe Doubles Down on Client Side Scanning, The Lawfare Podcast, August 2, 2022.
- Doctors
are People Too, March 1, 2022.
- Susan Landau and Ross Anderson on the Going Dark
Debate and the Risks of Client-Side Scanning, The Lawfare Podcast,
November 10, 2021.
- Contact-Tracing
Apps: How They Work and Privacy Concerns, The Breakfast Grille,
BFM, Malaysia,
September 8, 2021.
- Episode
1—Susan Landau: People Count, Over the Rainbow: 21st Century
Security and Privacy, IEEE Computer Society, July 8, 2021.
- A
Digital Contact Tracing Retrospective, The Lawfare
Podcast, June 7, 2021.
- The
Ransomware Threat, The Briefing Room, BBC, May 27, 2021.
- Is Contact Tracing a Privacy Threat?, The Lawfare Podcast, April 18, 2020.
- Moving
the Encryption Policy Conversation Forward, The Lawfare Podcast, October 8, 2019.
- Conversations about Software
Engineering: Security and Privacy with Susan Landau, April 19, 2018.
- Decoding
the Cyber Era with Susan Landau, The Fletcher Forum of World
Affairs, April 12, 2018.
- Tech
Talk: Cybersecurity in an Insecure Age, Tech Talks with Brian
Wesolowski, Center for Democracy and Technology, March 28, 2018.
- The Cyberlaw Podcast: Interview with Susan Landau, February 15, 2018.
- Books, et al., Q& A with Susan Landau, author of Listening In, November 24, 2017.
- Security
by the Book: Susan Landau on Listening In,The Lawfare Podcast,
November 7, 2017.
- Security Mom: The Podcast about
Our Homeland, Decrypting Encryption, October 8, 2015.
Webinars
|
|