|
Cryptography and Cryptography Policy
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- S. Landau, The
Development of a Crypto Policy Community: Diffie–Hellman’s Impact on
Public Policy, Rebecca Slayton,
ed., Democratizing
Cryptography: The Work of Whitfield Diffie and Martin Hellman,
Association for Computing Machinery, 2022, pp. 214-256.
- Nadiya Kostyuk and Susan
Landau, Dueling
over Dual_EC_DRBG: The Consequences of Corrupting a Cryptographic
Standardization
Process, Harvard National
Security Journal, Volume 13, Issue 2 (2022).
- Encryption Working Group, Carnegie Endowment for International Peace, Moving the Encryption Policy Debate Forward, September 2019.
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Science and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1. 2016.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015.
- S. Landau, ``NSA and Dual EC_DRBG: Deja Vu All
Over
Again?,'' Mathematical Intelligencer, Vol. 37, Issue 4 (December 2015), pp. 72-83.
-
S. Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- S. Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- S. Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
pp. 54-63.
- S. Bellovin, M. Blaze, S. Clark, and
S. Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
pp. 62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives, February 17,
2011.
- W. Diffie and S. Landau, The
Export of Cryptography in the 20th Century and the 21st, The
History of Information Security: A Comprehensive Handbook, Karl
De Leeuw and Jan Bergstra (eds.), Elsevier, 2007, pp. 725-736. Originally
appeared in Treichel, Jeanie and Mary Holzer (eds.), Sun Microsystems
Laboratories: the First Ten Years, 2001. Sun Labs Tech Report
2001-102. A modified version of this paper, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April 2002, pp. 450-454.
- S. Landau, entries for "Clipper and Capstone"; "cryptography"; "digital
signatures," in
William Staples, ed. Encyclopedia of Privacy, Greenwood Press,
2007.
- S. Landau,
Find Me
a Hash, Notices of the American Mathematical Society,
March 2006, pp. 330-332; Mathematical Advance in
Translation, Chinese Academy of Sciences, 3 (2010),
pp. 226-228.
- S. Landau, RSA
and Public-Key Cryptography; Introduction to Cryptography; Cryptography:
Theory and Practice; Algebraic Aspects of Cryptography; Elliptic Curves:
Number Theory and Cryptography; Elliptic Curves in Cryptography; Modern
Cryptography, Probabilistic Proofs, and Pseudorandomness; Foundations of
Cryptography: Basic Tools; The Design of Rijndael: AES—the Advanced
Encryption Standard; Handbook of Applied Cryptography, Bulletin of the American Mathematical Society, Vol. 41, No.
3 (2004), pp. 357-367.
- S. Landau, Polynomials in
the Nation's Service: Using Algebra to
Design the Advanced Encryption Standard, American
Mathematical Monthly, February 2004, pp. 89-117.
- W. Diffie and
S. Landau, September
11th Did Not Change Cryptography Policy, Notices of the American
Mathematical Society, April
2002, pp. 450-454.
- S. Landau, "Cryptography." Computer Sciences, Ed.,
Roger R. Flynn. Vol. 4: Electronic Universe. New York: Macmillan Reference
USA, pp. 49-53.
- S. Landau, Advanced
Encryption Standard Choice is
Rijndael, Notices of the American Mathematical Society, Jan.
2001, p. 38.
- S. Landau, Communications
Security for the Twenty-First Century: the Advanced Encryption Standard, Notices
of the American Mathematical Society, April 2000, pp. 450-459.
Reprinted, in translation, in
"Surveys in Applied and Industrial Mathematics," TVP Publishers
(Moscow), Vol. 7, No. 2 (2000), pp. 259-281.
- S. Landau, Standing
the Test of Time: the Data Encryption Standard, Notices of the
American Mathematical Society, March
2000, pp. 341-349. Reprinted, in translation, in "Surveys in Applied
and Industrial Mathematics," TVP Publishers (Moscow), Vol. 7, No. 2
(2000), pp. 240-258.
- S. Landau, Designing Cryptography for the New
Century, Communications of the Association for Computing
Machinery, Vol. 43, No. 5, May 2000, pp. 115-120.
- S. Landau, Cryptography
in Crisis, Commentary (In My
Opinion), Notices of the American Mathematical Society, April
1998, p. 461.
- Whitfield Diffie and Susan Landau,
Privacy on the Line:
The Politics of Wiretapping and Encryption, MIT Press, rev. and updated edition, 2007 (orig. pub. 1998).
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, Codes,
Keys, and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public Policy.
Dr. Stephen Kent, Chief Scientist - Security Technology,
Bolt, Beranek and Newman, chaired the panel, which consisted
of senior members of the cryptography and security
communities, including members of the government, industry,
and academia. A summary of the report appeared under the
title
Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Some Remarks on
Computing the Square Parts of Integers, Information and Computation, Vol.
78, No. 3 (1988), pp. 246-253.
- S. Landau, Zero Knowledge and the Department
of Defense, Notices
of the American Mathematical Society [Special Article Series],
Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National
Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Contact-Tracing Apps, Privacy, and Equity
- Susan Landau, Digital exposure tools: Design for privacy, efficacy, and equity, Science, Vol. 373, Issue 6560, September 10, 2021.
- Susan Landau, People Count: Contact-Tracing Apps and Public Health, MIT Press, 2021.
Privacy
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- D. Anthony, C.A. Gunter, W. He, M. Khanafer,
S. Landau, R. Manger, and N. Reitinger, The HandyTech's Coming Between
1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson (short paper),
Workshop
on Privacy in the Electronic Society, 2023.
- S. Landau, Testimony,
Hearing of the Joint Committee on Advanced Information Technology,
the Internet and Cybersecurity, State House, Commonwealth of
Massachusetts, October 19, 2023.
- S. Landau and P. Vargas
Leon, Reversing
Privacy Risks: Strict Limitations on the Use of Communications
Metadata and Telemetry Information, Colorado Technology Law
Journal, Vol. 21, Issue 1 (2023), pp. 225-336.
- S.Landau, Testimony, Informational Hearing of the Joint Committee on
Advanced Information Technology, the Internet and Cybersecurity, State House,
Commonwealth of Massachusetts, March 2023.
- S. Landau, Testimony, Hearing
on "Protecting Americans' Privacy Against Hostile Foreign
Powers,", Subcommittee on Privacy, Technology, and the Law,
Committee on the Judiciary, United States Senate, September 14, 2022.
- S. Landau, Categorizing
Uses of Communications Metadata: Systematizing Knowledge and Presenting
a Path for Privacy, New
Security Paradigms Workshop, 2020.
- S. Landau and
A. Lubin,
Examining the Anomalies, Explaining the Value: Should the USA FREEDOM
Act's Metadata Program be
Extended?, Harvard National
Security Journal, Vol. 11, Issue 3 (2020), pp. 308-358.
- S. Landau, If It Isn't Efficacious, Don't Do It, European Data Protection Law Review, Vol. 5, Issue 4 (2019), pp. 466-470.
- S. Landau, Comments
submitted to the NTIA request for comments on privacy, October 24,
2018.
- S. Bellovin, M. Blaze, S. Landau, and S. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017), pp. 1-101.
- S. Landau, Is
it Legal? Is it Right? The Can and Should of Use,
IEEE Security and Privacy, Vol. 14, No. 5 (September/October
2016), pp. 3-5.
- S. Landau,
Transactional
information is remarkably
revelatory, Proceedings of the
National Academy of Sciences, Vol. 113, No. 20 (May 17, 2016), pp. 5467-5469.
- S. Landau, Choices: Privacy & Surveillance in a Once & Future Internet, Daedulus, Vol. 145, No. 1 (Winter 2016), pp. 54-64.
- S. Landau, Control Use of Data
to Protect
Privacy, Science,
Vol. 347, Issue 6221, January 30, 2015.
- S. Landau, Educating
Engineers: Teaching Privacy in a World of Open Doors (pre-publication version),
IEEE
Security and Privacy, Vol. 12, No. 3, May/June 2014,
pp. 66-70.
- S. Landau, Politics, Love, and
Death in a World of No
Privacy, IEEE
Security and Privacy, Vol. 11, No. 3, May/June 2013,
pp. 11-13.
- A. Cavoukian, A. Davidson, M. Hansen, S. Landau, and
A. Slomovic, Privacy: Front and
Center, IEEE
Security and Privacy, Vol. 10, No. 5, September/October 2012,
pp. 5-10.
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). An earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and Queue, September 2009.
- S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- S. Landau,
The NRC Takes on Data
Mining, Behavioral Surveillance, and
Privacy, IEEE
Security and Privacy, Vol. 7, No. 1, January/February
2009, pp. 58-62.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and Encryption, MIT
Press, 1998 (rev. ed. 2007).
Cybersecurity
- Harold Abelson, Ross Anderson, Steven M. Bellovin,
Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan
Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller,
Bruce Schneier, Vanessa Teague, and Carmela Troncoso,
Bugs
in our Pocket: The Risks of Client-Side
Scanning, Journal
of Cybersecurity, Vol. 10, Issue 1, 2024.
- Nadiya Kostyuk and Susan
Landau, Dueling">Dueling y
over Dual_EC_DRBG: The Consequences of Corrupting a Cryptographic
Standardization Process, Harvard
National Security Journal, Volume 13, Issue 2 (2022).
- Committee on Law Enforcement and Intelligence
Access to Plaintext Information in an Era of Widespread Strong
Encryption: Options and Trade Offs, Computer Science and
Telecommunications Board, National Academies of Sciences, Engineering,
and
Medicine, Decrypting
the Encryption Debate: A Framework for Decisionmakers, 2018.
- S. Landau, Listening
In: Cybersecurity in an Insecure
Age, Yale University
Press, 2017. Some podcasts: an in-depth Hoover Book
Soiree
discussion with Ben Wittes and a short Science
blog interview
with Jen Golbeck.
- S. Landau, Russia's
Hybrid Warriors Got the White House, Now They're Coming for America's
Town Halls, Foreign Policy,
September 26, 2017.
- S. Bellovin, S. Landau, and H. Lin,
Limiting
the Undesired Impact of Cyber Weapons: Technical Requirements and
Policy
Implications, Journal
of Cybersecurity, Vol. 3, Issue 1 (2017), pp. 59-68. Reprinted in
Herbert Lin and Amy Zegart,
eds., Bytes,
Bombs, and Spies: The Strategic Dimensions of Offensive Cyber
Operations, Brookings Institution Press, 2018.
- R. Wyden, M. Blaze, and
S. Landau, The
Government Will Soon Be Able to Legally Hack
Anyone, Wired, September 14,
2016.
- S. Landau, The
Real Security Risks of the iPhone
Case, Science, Vol. 352,
Issue 6292, June 17, 2016, pp. 1398-1399.
- S. Bellovin, M. Blaze, and
S. Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016.
- S. Landau, Testimony, Hearing
on "The Encryption Tightrope: Balancing Americans' Security and
Privacy", Judiciary Committee, United States House of
Representatives, March 1, 2016.
- S. Landau, Perspective:
Cybersurveillance and the New Frontier of
Deterrence, Current
History, Vol. 115, Issue 117 (January 2016), pp. 29-31.
- H. Abelson, R. Anderson, S. Bellovin,
J. Benaloh, M. Blaze, W. Diffie, J. Gilmore, M. Green, S. Landau,
P. Neumann, R. Rivest, J. Schiller, B. Schneier, M. Specter, and
D. Weitzner,
Keys
under Doormats: Mandating insecurity by requiring government access to
all data and
communications, Journal
of Cybersecurity, Vol. 1, 2015; a short version of "Keys under
Doormats," appeared in
Communications
of the ACM, Vol. 58, No. 10, pp. 24-26.
- Committee on Responding to Section 5(d) of
Presidential Policy Directive 28: The Feasibility of Software to
Provide Alternatives to Bulk Signals Intelligence Collections,
National Research
Council, Bulk
Collection of Signals Intelligence: Technical Options, National
Academies Press, 2015.
- S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
-
S. Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
, was reprinted
in Intelligence, translation by Junichi Hiramatsu, Vol. 15, March, 2015.
- S. Landau,
Making
Sense of Snowden Part II: What's Significant in the NSA Surveillance
Revelations
, IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014; a short
version, Highlights
from Making Sense of Snowden Part II: What's Significant in the NSA
Surveillance Revelations, (behind payment wall) appeared
in IEEE
Security and Privacy, Vol. 12, No. 1, January/February 2014, pp. 62-64.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern Journal of Technology and Intellectual Property, Vol. 12, Issue 1 (2014).
- S. Landau,
Making Sense of Snowden: What's
Significant in the NSA Surveillance Revelations
, IEEE
Security and Privacy, Vol. 11, No. 4, July/August 2013,
pp. 54-63.
- B. Adida, C. Anderson, A. Anton,
R. Dingledine, E. Felten, M. Green, J. A. Halderman, D. Jefferson,
C. Jennings, N. Mitter, P. Neumann, E. Rescorla, F. Schneider,
B. Schneier, H. Shacham, M. Sherr, D. Wagner, and
P. Zimmermann, CALEA
II: Risks of Wiretap Modifications to Endpoints (whitepaper), May
2013.
- S. Bellovin, M. Blaze, S. Clark, and
S. Landau,
Going Bright: Wiretapping without
Weakening Communications
Infrastructure, IEEE
Security and Privacy, Vol. 11, No. 1, January/February 2013,
pp. 62-72. [Cited in New York
Times editorial,
May 20, 2013.]
- M. Blaze and
S. Landau, The
FBI Needs Hackers, Not
Backdoors, Wired, January
14, 2013.
-
S. Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), pp. 1-43.
- C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work?—Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possible—but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- D. D. Clark and
S. Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, pp. 25-40.
- D. D. Clark and
S. Landau, The Problem Isn't Attribution: It's Multi-Stage Attacks, Third
International Workshop on Re-Architecting the Internet, 2010.
- S. Landau,
Testimony Cybersecurity
Activities at NIST's Information Technology Laboratory, Hearing
before the Subcommittee on Technology and Innovation, Committee on
Science and Technology, United States House of Representatives,
October 22, 2009.
- W. Diffie and
S. Landau, Communications
Surveillance: Privacy and Security at Risk, Communications of the ACM,
Vol. 52, Issue 11, November 2009, pp. 42-47,
and Queue, September 2009.
- S. Landau, Privacy and
Security: A Multidimensional Problem, Viewpoints Column, Communications
of the ACM, Vol. 51, Issue 11, November 2008, pp. 25-26.
- W. Diffie and S. Landau, Brave
New World of Wiretapping, Scientific
American, September 2008, pp. 33-39.
- S. Landau, Security
and Privacy Landscape in Emerging Technologies,
IEEE
Security and Privacy, Vol. 6, No. 4, August/September 2008,
pp. 74-77.
- S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
- S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
- S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447.
- S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December
2005.
- S. Bellovin, M. Blaze, and S. Landau, The
Real National-Security Needs for VoIP, Inside Risks
180, CACM 48, Nov. 2005, p. 120.
- S. Landau and M. Stytz, "Overview of Cyber Security:
A Crisis of Prioritization," IEEE Security and Privacy,
Vol. 3, No. 3, pp. 9-11 and sidebar, S. Landau, C. Landwehr, and F.
Schneider, "The PITAC Report: A Brief Analysis,"
p. 10.
- S. Landau, What
Lessons Are We Teaching, Inside Risks 180, CACM 48,
June, 2005, p. 144.
- S. Landau, Security,
Liberty, and Electronic Communications, (invited talk),
in Matt Franklin (ed.), Advances in Cryptology: CRYPTO 2004,
Springer Verlag, pp. 355-372.
- S. Landau, "The Transformation of Global Surveillance," in Bytes,
Bombs, and Bandwidth: Information Technology and Global Security, Social
Science Research Council, 2003, pp. 117-131.
- W. Diffie and S. Landau, "Cybersecurity Should
be Kept in Civilian Hands," Boston Globe, August 19, 2002,
pp. E-4. Appeared in slightly different form as "Ensuring Cybersecurity" in NGO
Reporter, Vol. 10, No. 2, Sept. 2002.
- W. Diffie and S. Landau, "The Threat of .NET," New
Technology Week, Nov. 5, 2001.
- S. Landau, Cryptography
in Crisis, Commentary (In My Opinion), Notices of the American
Mathematical Society, April 1998, p. 461.
- S. Landau, "Dangerous Increase of FBI Surveillance,"
Op-Ed, Chicago Tribune, March 6, 1998, p. 23.
- W. Diffie and
S. Landau, Privacy
on the Line: The Politics of Wiretapping and
Encryption, MIT Press, 1998; updated and
expanded edition, 2007.
- S. Landau and W. Diffie, Cryptography Control:
FBI Wants It, but Why? Op-Ed, Christian Science Monitor, Oct.
6, 1997, p. 19.
- S. Landau, Eavesdropping and Encryption: U.S. Policy
in an International Perspective, Conference on the Impact of the
Internet on Communications Policy (1997), John F. Kennedy School
of Government, Harvard University.
- S. Landau, S. Kent, C. Brooks,
S. Charney, D. Denning, W. Diffie, A. Lauck, D. Miller,
P. Neumann and
D. Sobel, Codes,
Keys and Conflicts: Issues in U.S. Crypto Policy, ACM
Press, 1994. This report, funded by the NSF, was an
undertaking of the USACM Committee on Public
Policy. Dr. Stephen Kent, Chief Scientist - Security
Technology, Bolt, Beranek and Newman, chaired the panel,
which consisted of senior members of the cryptography and
security communities, including members of the government,
industry, and academia. A summary of the report appeared
under the
title Crypto
Policy Perspectives, in Communications of the
ACM, Vol. 37 (Aug. 1994), pp. 115-121.
- S. Landau, Zero
Knowledge and the Department of Defense, Notices of
the American Mathematical Society [Special Article
Series], Vol. 35, No. 1 (1988), pp. 5-12.
- S. Landau, Primes, Codes and the National Security Agency, Notices
of the American Mathematical Society, [Special Article Series],
Vol. 30, No. 1 (1983), pp. 7-10.
Law and Public Policy
- S. Landau, J. Dempsey, E. Kamar, and
S. Bellovin,
Recommendations for Government Development and Use of Advanced
Automated Systems to Make Decisions about Individuals, 2024.
- S. Landau and P. Vargas
Leon, Reversing
Privacy Risks: Strict Limitations on the Use of Communications
Metadata and Telemetry Information, Colorado Technology Law
Journal, Vol. 20, Issue 2 (2023), pp. 225-336.
- Steven M. Bellovin, Matt Blaze, Susan Landau, and
Brian
Owsley,
Seeking
the Source: Criminal Defendants' Constitutional Right to Source
Code, Ohio State Technology Law Journal, Volume 17, No. 1 (Winter
2021).
- S. Landau and
A. Lubin,
Examining the Anomalies, Explaining the Value: Should the USA
FREEDOM Act's Metadata Program be
Extended?, Harvard National
Security Journal, Vol. 11, Issue 3 (2020), pp. 308-358.
- S. Landau, If
It Isn't Efficacious, Don't Do
It, European
Data Protection Law Review, Vol. 5, Issue 4 (2019),
pp. 466-470.
- S. Bellovin, M. Blaze, S. Landau, and S. Pell,
It's
Too Complicated: How the Internet Upends Katz, Smith, and
Electronic Surveillance
Law, Harvard Journal of Law
and Technology, Vol. 30, No. 1 (2017), p. 1-101.
- S. Bellovin, M. Blaze, and
S. Landau, Insecure
Surveillance: Technical Issues with Remote Computer
Searches, Computer,
Vol. 49, No. 3 (March 2016), pp. 14-24; reprinted in Computing Now, June 2016.
- S. Bellovin, M. Blaze, and
S. Landau, Comments on Proposed
Search
Rules, Preliminary
Draft of Proposed Amendments to the Federal Rules of Appellate,
Bankruptcy, Civil, and Criminal Procedure, October 31, 2014.
- S. Bellovin, M. Blaze, S. Clark,
S. Landau, Lawful
Hacking: Using Existing Vulnerabilities for Wiretapping on the
Internet, Northwestern
Journal of Technology and Intellectual Property, Vol. 12,
Issue 1 (2014).
-
S. Landau, Under
the Radar: NSA's Efforts to Secure Private-Sector Telecommunications
Infrastructure, Journal of National
Security Law and Policy, Vol. 7, No.3 (2014), pp. 411-442; one section,
, was reprinted
in Intelligence,
translation by Junichi Hiramatsu, Vol. 15, March, 2015.
-
S. Landau, The
Large Immortal Machine and The Ticking Time
Bomb, Journal of Telecommunications
and High Technology Law, Volume 11, Issue 1 (2013), pp. 1-43.
- C. Landwehr, D. Boneh, J. Mitchell, S. Bellovin,
S. Landau, and
M. Lesk, Privacy
and Cybersecurity: The Next 100
Years,
Proceedings of the IEEE, Vol. 100, Issue: Special Centennial Issue (2012), 1659-1673.
- S. Bellovin, S. Bradner, W. Diffie, S. Landau, and
J. Rexford, Can
It Really Work?—Problems with Extending EINSTEIN to Critical
Infrastructure, Harvard National Security
Journal, Vol. 3 Issue 1 (2012). A short version of this paper appeared
as As simple as possible—but not more so, S. Bellovin, S. O. Bradner, W. Diffie, S. Landau, J. Rexford, Communications of the ACM, Vol. 54, No. 8 (2011).
- D. D. Clark and
S. Landau, Untangling
Attribution, Harvard National
Security Journal, Vol. 2, Issue 2 (2011); an earlier version
appeared
in Proceedings of
a Workshop on Deterring Cyberattacks: Informing Strategies and
Developing Options for U.S. Policy, National Academies Press,
2010, pp. 25-40.
- S. Landau, Testimony, Hearing
on Going Dark: Lawful Electronic Surveillance in the Face of New
Technologies, Subcommittee on Crime, Terrorism, and Homeland
Security, Judiciary Committee, United States House of Representatives,
February 17, 2011.
- S. Landau, Surveillance
or Security? The Risks Posed by New Wiretapping Technologies, MIT Press, 2011.
- S. Bellovin, M. Blaze, W. Diffie, S. Landau, P. Neumann,
and J. Rexford, Risking Communications Security:
Potential Hazards of the `Protect America Act,'
IEEE
Security and Privacy, Vol. 6, No. 1, January/February 2008,
pp. 24-33. A short version appeared as Internal
Risks, External Surveillance Inside Risks 209, CACM 50,
p. 128, Dec, 2007.
- S. Landau, A
Gateway for Hackers: The Security Threat in the New Wiretapping Law, Washington
Post, August 9, 2007, p. A17.
- S. Bellovin, M. Blaze, E. Brickell, C. Brooks, V. Cerf,
W. Diffie, S. Landau, J. Peterson, J. Treichler, Security Implications
of Applying the Communications Assistance for Law Enforcement Act to
Voice over IP, 2006.
- S. Landau, National Security
on the Line, Journal of Telecommunications and
High Technology Law, Vol. 4, Issue 2 (2006), pp. 409-447.
- S. Landau, Security, Wiretapping,
and the Internet, IEEE
Security and Privacy, Vol. 3, No. 6, pp. 26-33, November/December
2005.
Identity Management
- S. Landau and
T. Moore, Economic
Tussles in Federated Identity
Management, First Monday,
Vol. 17, No. 10 (October 2012). Earlier version appeared
at Workshop on Economics
of Information Security, 2011.
- S. Landau, H. Le Van Gong, and R.
Wilton, Achieving Privacy in a
Federated Identity Management System,
Financial Cryptography and Data Security
'09.
- S. Landau and D. Mulligan, I'm
Pc01002/SpringPeeper/ED288l.6; Who are You?,
IEEE Security
and Privacy, Vol. 6, No. 2, March/April 2008, pp. 13-15.
- S. Landau,
Liberty ID-WSF Security and Privacy Overview, October 2003.
- S.
Landau and J. Hodges, A
Brief Introduction to Liberty, February 13, 2003.
- G. Ellison,
J. Hodges, and S. Landau, Risks Presented by Single
Sign-On Architectures, October 18, 2002.
- G. Ellison, J. Hodges,
and S. Landau, Security and Privacy Concerns
of Internet Single Sign-On, September 6, 2002.
Digital Rights Management
Symbolic Computation
- S. Landau, "Computations with
Algebraic Numbers," in J. Grabmeier, E. Kaltofen, and
V. Weispfennig (eds.), Computer Algebra Handbook,
Spring Verlag, 2003, pp. 18-19.
- S. Landau and N.
Immerman, Embedding
Linkages in Integer Lattices, Algorithmica,
Vol. 43, No. 5, May 2000, pp. 115-120. A preliminary version
appeared in MSI Workshop on Computational Geometry,
October, 1994.
-
S. Landau, Compute
and Conjecture, Commentary (In My Opinion), Notices of the
American Mathematical Society, Feb. 1999, p. 189.
- S. Landau, : Four Different Views, Mathematical
Intelligencer, Vol. 20, No. 4 (Fall 1998), pp. 55-60.
- D. Kozen, S. Landau, and R. Zippel,
Decomposition of Algebraic Functions, Journal of Symbolic
Computation, Vol. 22 (1996), pp. 235-246. A preliminary version
appeared in Algorithmic Number Theory Symposium (1994).
-
S. Landau, How
to Tangle with a Nested Radical, Mathematical
Intelligencer, Vol. 16, No. 2 (Spring 1994), pp. 49-55.
- S. Landau, Finding Maximal
Subfields, SIGSAM Bulletin, Vol. 27, No. 3 (1993), pp. 4-8.
- S. Landau, Simplification of Nested
Radicals, SIAM J. of Comput., Vol. 21 (1992), pp. 85-110. A
preliminary version appeared in Thirtieth Annual IEEE Symposium
on Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, A Note on `Zippel
Denesting,' J. Symb. Comput., Vol. 13 (1992), pp. 41-47.
- J. Cremona and S. Landau, Shrinking
Lattice Polyhedra, SIAM J. of Discrete Math, Vol. 3, No. 3
(1990), pp. 338-348. A preliminary version appeared
in Proceedings of the First ACM-SIAM Symposium on Discrete
Algorithms (1990), pp. 188-193.
- D. Kozen and S. Landau, Polynomial
Decomposition Algorithms, J. Symb. Comput., Vol. 7 (1989),
pp. 445-456. Appeared in a different version as J. von zur Gathen,
D. Kozen and S. Landau, "Functional Decomposition of
Polynomials" Twenty-Eight Annual IEEE Symposium on the
Foundations of Computer Science (1989), pp. 314-319.
- S. Landau, Factoring Polynomials
Quickly, Notices of the American Mathematical Society,
[Special Article Series], vol. 34, No. 1 (1987), pp. 3-8.
- S. Landau and
G. Miller, Solvability
by Radicals is in Polynomial Time, J. Comput. Sys. Sci.,
Vol. 30, No. 2 (1985), pp. 179-208. A preliminary version appeared
in Fifteenth ACM Symposium on Theory of Computing (1983),
pp. 140-151.
- S. Landau, Factoring Polynomials over
Algebraic Number Fields, SIAM J. of Comput., Vol. 14, No. 1
(1985), pp. 184-195.
- S. Landau, Polynomial Time Algorithms
for Galois Groups, Proceedings of the Int'l. Symposium on
Symbolic and Algebraic Computation (1984), Spring Verlag Lecture
Notes in Computer Science, No. 174, pp. 225-236.
Complexity
- N. Immerman and S. Landau, The Complexity of Iterated
Multiplication, Information and Computation Vol. 116, No.
1 (1995), pp. 103-116. A preliminary version appeared in Fourth
Annual Structure in Complexity Conference (1989), pp. 104-111.
- S. Landau and N. Immerman, The Similarities (and Differences) between
Polynomials and Integers, Int'l. Conf. on Number Theoretic and
Algebraic Methods in Computer Science (1993), pp. 57-59.
Women in Science
- S. Landau, ``What AWM Has Meant to Me,'' Janet L. Beery,
Sarah J. Greenwald, and Cathy Kessel, eds., Fifty Years of
Women in Mathematics: Reminiscences, History, and Visions for the
Future of AWM, Spring Verlag, 2022, pp. 301-306.
- T. Benzel, S. Landau, and H. Orman, Expanding the
Pipeline: G/rep{sec}= underrepresented groups in security
research, Computing Research News, March 2015, pp. 8-10.
- S. Landau, Anywhere,
Anytime—Or Just Where is Your Office Anyhow? Pipeline series, Computing
Research News, September
2005, p. 2.
- S. Landau, A
Far Cry from Galois Fields, Newsletter of the
Association for Women in Mathematics, November-December
2003, pp. 10-13.
- S. Landau,
Time to Move Mountains, Commentary (In My
Opinion), Notices of the American Mathematical Society,
Sept. 2000, p. 853.
- S. Landau, What Happens to the Women? Association for
Women in Mathematics Newsletter, March-April 1995, pp. 6-7.
- S. Landau, Universities and the Two-Body Problem, Computing
Research News, March, 1994, p. 4. Also reprinted in the Association
for Women in Mathematics Newsletter, March 1994,
pp. 12-14, and SIGACT News, Dec. 1994, pp. 41-43 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 253-256.
- S. Landau, Tenure Track, Mommy Track, Association
for Women in Mathematics Newsletter, May-June 1991. Also reprinted in
shortened
form in Notices of the American Mathematical Society,
Sept. 1991, pp. 703-4 and reprinted in Complexities:
Women in Mathematics, Bettye Anne Case and Anne Leggett (eds.), Princeton
University Press, 2005, pp. 260-263.
Blog Posts, Letters to the Editor, and Other
Short Pieces on
a Variety of Topics
- S. Landau, CALEA
Was a National Security Disaster Waiting to
Happen, Lawfare,
November 13, 2024.
- S. Landau and
J. Dempsey, Challenging
the Machine: Insights from a Workshop on Contestability of Advanced
Automated
Systems, Lawfare, June
21, 2024
- J. Dempsey and S. Landau, Challenging the Machine: Contestability in Government AI Systems, Lawfare, March 11, 2024.
- S. Landau, Write the Laws for the World We Live In—Not the One We Imagine, Lawfare, December 20, 2023.
- S. Landau, The
Shapeshifting Crypto
Wars, Lawfare,
October 12,
2023; reprinted
at M3AAWG blog, April 30, 2024.
- S. Landau, A
Radical Proposal for Protecting Privacy: Halt Industry's Use of
'Non-Content', Lawfare,
September 8, 2023.
- S. Landau, The
EU's Dangerous Proposal for Stopping Online Child Sexual Abuse
Material, Progressive Post,
July 5, 2023.
- S. Landau, Finally
Some Clear Thinking on Child Sexual Abuse and Exploitation
Investigation and
Intervention, Lawfare,
January 24, 2023.
- S. Landau, Cyberwar in Ukraine:
What You See Is Not What's Really
There, Lawfare,
September 30, 2022.
- S. Landau, FTC lawsuit spotlights a major privacy risk: From call records to sensors, your phone reveals more about you than you think, The Conversation, August 30, 2022.
- S. Landau, The EU's Proposal on CSAM is a Dangerous Misfire, Lawfare, June 23, 2022.
- S. Landau, Impending
demise of Roe v. Wade puts a spotlight on a major privacy risk:
Your phone reveals more about you than you think,
The Conversation, May 23, 2022.
- S. Landau, How the U.K. and the Senate Judiciary Committee Are Being Dangerously Foolish About Cryptography, Lawfare, March 1, 2022.
- S. Landau, Decoding
When IT is Useful During Wartime—and What Causes IT to
Fail, review
of Information
Technology and Military
Power, Texas National
Security Review, February 1, 2022.
- S. Landau,
The
Conflict over Cryptography,
Horizons,
Winter 2022.
- S. Landau, Bugs
in our Pockets: The Security Risks of Client-Risk
Scanning, Lawfare,
October 15, 2021.
- S. Landau, Normalizing
Surveillance, Lawfare,
August 30, 2021.
- S. Landau, Dangers Posed by Evidentiary Software--and What to Do about It, Lawfare, June 23, 2021.
- S. Landau, Lessons
from Contact-Tracing and Exposure-Notification
Apps, Lawfare,
May 26, 2021.
- S. Landau, Contact-tracing
apps have serious physical, biological
limitations, Big Think,
May 24, 2021, reprinted from People
Count: Contact-Tracing Apps and Public Health, MIT Press, 2021.
- S. Landau, Contact-Tracing
Apps: What's Needed to Be an Effective Public Health
Tool, Lawfare,
January 19, 2021.
- S. Landau, Law
Enforcement is Accessing Locked Devices Quite Well, Thank
You, Lawfare,
December 7, 2020.
- S. Landau, It's Never Too Late to Think about NSA's CDR Collection Program, Lawfare, June 22, 2020.
-
S. Landau, C. Lopez, and L. Moy, The
Importance of Equity in Contact
Tracing, Lawfare,
May 1, 2020.
- S. Landau, Looking
Beyond Contact Tracing to Stop the
Spread, Lawfare,
April 10, 2020.
- S. Landau, Location
Surveillance to Counter COVID-19: Efficacy is What
Matters, Lawfare,
March 25, 2020.
- S. Landau, If We Build It (They
Will Break In), Lawfare,
February 28, 2020.
- D. McDonough and S. Landau, Breaking the Encryption Impasse, The Hill, January 16, 2020.
- S. Landau, A
Thoughtful Response to Going Dark and the Child Pornography
Issue, Lawfare,
November 5, 2019.
- S. Landau, A
Security Failure in the White
House, Lawfare,
November 1, 2019.
- S. Landau, The
NSA General Counsel's Proposal for a
Moonshot, Lawfare,
September 23, 2019.
- J. Baker and
S. Landau, New
Perspectives on the Future of
Encryption, Lawfare,
May 28, 2019.
- S. Landau,
Is
Section 215 No Longer Worth the
Effort?, Lawfare,
March 11, 2019.
-
S. Landau, Cryptography
Policy
Laundering, Center for
International Law and
Governance, The Fletcher School, January 15, 2019.
- S. Landau, Exceptional Access: The Devil is in the Details, Lawfare, December 26, 2018.
- S. Bellovin and
S. Landau, Encryption
by Default Equals National
Security, Lawfare,
October 26, 2018.
- S. Landau, The
Five Eyes Statement on Encryption: Things are Seldom What They
Seem, Lawfare,
September 26, 2018.
- S. Landau, Why
the Russians Might Hack the Boy
Scouts, The
Conversation, September 13, 2018.
- S. Landau, Brett Kavanaugh's Failure to Acknowledge the Changes in Communications Technology, Lawfare, August 3, 2018.
- S. Landau, What's Involved in Vetting a Security Proposal: Why Ray Ozzie's Proposal for Exceptional Access Does Not Pass Muster, Lawfare, May 14, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Analysis
of the CLEAR Proposal per the National Academies' Framework,
Columbia Univeristy Tech Report, CU-003-18, May 10, 2018.
- S. Bellovin, M. Blaze, D. Boneh, S. Landau,
R. Rivest, Ray
Ozzie's crypto proposal: a dose of technical reality
(op-ed), Ars Technica, May 6,
2018.
- S. Landau, Building on Sand isn't Stable: Correcting a Misunderstanding of the National Academies Report on Encryption, Lawfare, April 25, 2018.
- S. Landau, The Russians Are Coming, Lawfare, April 18, 2018.
- S. Landau, Revelations on the FBI's Unlocking of the San Bernardino Phone: Maybe the Future Isn't Going Dark After All, Lawfare, March 30, 2018.
- S. Landau, What Went Wrong? Facebook and "Sharing Data" with Cambridge Analytica, Blog@ACM, March 28, 2018.
- S. Landau, No Facebook, It's Not About Security; It's About Privacy, Lawfare, March 26, 2018.
- S. Landau, Encrypted Smartphones Secure Your Identity, Not Just Your Data, The
Conversation, February 28, 2018; reprinted in The Conversation—Indonesia, March 15, 2018.
- S. Landau,
Understanding Data Breaches as National Security Threats, Lawfare, February
26, 2018.
- S. Landau, What Law Enforcement Really Needs for Investigations in the Digital Age, Lawfare, February 12, 2018.
- S. Landau, Cybersecurity:
Time for a New
Definition, Lawfare,
January 12, 2018.
- S. Landau, Using
Threat Modeling to Secure
America, Lawfare,
December 20, 2017.
- S. Landau, Real
Security Requires Encryption—Even if Investigators Get
Blocked, The
Conversation, November 1, 2017.
- S. Landau, Punching
the Wrong Bag: The Deputy AG Enters the Crypto
Wars, Lawfare,
October 27, 2017.
- S. Landau, Phones
Move—and So Should the
Law, Lawfare, August
16, 2017.
-
S. Landau, An
Important Russian Hacking
Story, Lawfare, June
2, 2017.
- S. Landau, A
Step Forward for
Security, Lawfare,
May 17, 2017.
- S. Landau, The
FBI and I
Agree, Lawfare,
March 14, 2017.
- S. Landau and
C. O'Neil, Why
Ghosts in the Machine Should Remain Ghosts,
Lawfare, December 7, 2016.
- S. Landau, The
FBI Should be Enhancing US Cybersecurity, Not Undermining
It, Lawfare,
December 1, 2016.
- S. Landau,
Protecting
the Republic: Securing Communications is More Important than
Ever, Lawfare,
November 21, 2016.
-
S. Landau, Securing
Phones and Securing Us (revisited), Lawfare, September 15, 2016.
-
S. Landau, Setting
Up a Straw Man: ODNI's Letter in Response to Don't
Panic, Lawfare, May
12, 2016.
-
S. Landau, Million
Dollar Vulnerabilities and an FBI for the Twenty-first Century, Lawfare,
April 26, 2016.
- S. Landau, A
Response to Susan's
Post, Lawfare, March 25,
2016.
- S. Landau, The
National-Security Needs for Ubiquitous
Encryption, Lawfare,
February 2, 2016 (also appeared
in Don't
Panic: Making Progress on the Going Dark Debate, Berkman Center for Internet & Society
Berklett Cybersecurity Project (also translated into
Portuguese
by Instituto de Tecnologia e
Sociedade do Rio), 2019.
- S. Landau, Be Careful What You Wish For: A Response, Lawfare, January 8, 2016.
- S. Landau, The
Encryption Wars: Everything has Changed, and Nothing has
Changed, Scientific
American (blog post), November 18, 2015.
- S. Landau, Why the Support for Crypto, Lawfare, September 21, 2015.
- S. Landau, A Public Split: Listening to the Conversation at Aspen, Lawfare,
July 28, 2015.
- S. Landau, Thoughts on Encryption and Going Dark: Counterpart, Lawfare, July 15, 2015.
- S. Landau, Keys
under Doormats: Mandating
Insecurity, Lawfare,
July 7, 2015.
-
S. Landau, Director
Comey and the Real
Threats, Lawfare,
July 3, 2015.
-
S. Landau, Why
the Privacy Community Focuses Where it
Does, Lawfare, June 16,
2015.
- S. Landau, What was Samsung Thinking?, Letter from the Editor, IEEE
Security and Privacy, Vol. 13, No. 3, May/June 2015,
pp. 3-4.
-
S. Landau, Time
to Resolve the Metadata Fight,
Lawfare, May
29, 2015.
-
S. Landau, What
We Must Do about
Cyber, Lawfare,
March 10, 2015.
-
S. Landau, Finally
... Some Clear Talk on the Encryption
Issue, Lawfare,
February 16, 2015.
-
S. Landau, What
David Cameron Doesn't
Get, Lawfare,
January 20, 2015.
-
S. Landau, Summing
Up, Communications of the
ACM, Vol. 57, No. 11, November 2014, pp. 37-39.
-
S. Landau, Securing
Phones—and Securing US, Lawfare,
September 29, 2014.
- S. Landau, Facing
Ethical
Choices, Letter from the Editor, IEEE
Security and Privacy, Vol. 12, No. 4, July/August 2014,
pp. 3-6.
-
S. Landau, On
NSA's Subversion of NIST's
Algorithm, Lawfare,
July 25, 2014.
-
S. Landau, What
The Court Didn't Say in Riley May be the Most Important
Thing of
All, Lawfare,
June 30, 2014.
-
S. Landau, What
the President Said—and Didn't Say—About
Surveillance, Huffington
Post, August 11, 2013.
-
S. Landau, Susan
Landau on
Minimization, lawfaremedia.org,
June 18, 2013.
-
S. Landau, Canaries
in the Coal
Mine, Huffington
Post, June, 6, 2013.
-
S. Landau, Susan
Landau on USG Surveillance via New Technologies, lawfaremedia.org, April 30, 2013.
-
S. Landau,
Boston and the Right to
Privacy, Huffington
Post, April 22, 2013.
- S. Landau, Cybersecurity—Getting it Right This
Time, Huffington
Post, February 13, 2013.
- S. Landau, Searching
in a Haystack ... Finds
Straw, Huffington
Post, October 15, 2012.
-
S. Landau, Susan
Landau on Cybersecurity Bills, Lawfare.com, May 3, 2012.
-
S. Landau,
Nothing to Fear but Fear Itself,
Huffington Post, April 29, 2012.
- S. Landau,
Timesharing Dexter,
R.L. Constable and A. Silva (eds.), Logic and Program
Semantics - Essays Dedicated to Dexter Kozen on the Occasion of
His 60th Birthday, LNCS 7230, pp. 329-332, Springer, 2012.
- S. Landau, One
Small Step for
Privacy..., Huffington
Post, January 26, 2012.
- S. Landau, It's
All in How You View
It, Huffington Post,
January 17, 2012.
- S. Landau, Surveillance
and security: Securing whom? And at what
cost?, Privacy
International, November 30, 2011.
- S. Landau, Hollywood and the Internet: Time for the Sequel, Huffington Post, November 28, 2011.
- S. Landau, Who Knows Where I Am? What Do They Do with the Information?, Huffington Post, October 3, 2011.
- S. Landau, Data Retention? News of the World Demos the Risks, Huffington Post, July 21, 2011.
- S. Landau, Mr. Murdoch and Mr. Brown: A Real-Life Example of Why Privacy Matters, Huffington Post July 18, 2011.
-
S. Landau, Where
Have All the Wiretap Reports
Gone?, Huffington
Post, July 14, 2011.
- S. Landau, Privacy, Online Identity Solutions, and Making Money: Pick Three?, Huffington Post, July 7, 2011.
- S. Landau, Getting
Communications Security
Right, Huffington
Post, April 19, 2011.
- S. Landau, Getting
Wiretapping
Right, Huffington
Post, April 5, 2011.
- S. Landau, NIST
Leads the Charge on Online
Authentication, Huffington Post,
January 12, 2011.
- S. Landau, Who's Been Looking Over My Shoulder?—The FTC Seeks to Update Privacy Protections, Huffington Post, December 6, 2010.
- S. Landau, The FBI Wiretap Plan: Upsetting the Security Equation, Huffington Post, October 25, 2010.
- S. Landau, Moving
Rapidly Backwards on
Security, Huffington
Post, October 13, 2010.
- S. Landau, The
Pentagon's Message on
Cybersecurity, Huffington Post, , August
31, 2010.
- S. Landau, Wrong
Direction on
Privacy, Huffington
Post, August 2, 2010.
- S. Landau, Separating
Wheat from
Chaff, Huffington
Post, July 23, 2010.
- S. Landau,
Internet Time, Commentary (In My
Opinion), Notices of the American Mathematical Society, March
2000, p. 325.
- S. Landau, The
Myth of the Young Mathematician, Letter from the
Editor, Notices of the American Mathematical Society, Nov. 1997,
p. 1284.
- S. Landau, Mathematicians
and Social Responsibility, Letter from
the Editor, Notices of the American Mathematical Society,
Feb. 1997, p. 188.
- S. Landau, Rising
to the Challenge, Letter from
the Editor, Notices of the American Mathematical Society,
June, 1996, p. 652.
- S. Landau, "Joseph Rotblat: From Fission Research
to a Prize for Peace,"
Scientific American, Jan. 1996, pp. 38-39.
-
S. Landau, Joseph
Rotblat: The Road Less Traveled,
Bulletin of the Atomic Scientists, Jan.-Feb. 1996, pp. 46-54.
- S. Landau, Something
There is That Doesn't Love a Wall, Letter from
the Editor, Notices of the American Mathematical Society,
Nov. 1995, p. 1268.
- S. Landau, Letter
from the Editor, Notices of the American Mathematical Society,
May 1995, p. 524.
- S. Landau, "The Secret of Life is a Nontrivial
Computation," SIAM
News, May 1991, pp. 12-13.
- S. Landau, "The Responsible Use of `Expert' Systems," Proceedings
of the Symposium on Directions and Implications of Advanced
Computing (1987), pp. 167-181. Also appeared in Directions and
Implications of Advanced Computing, Vol. 1, Ablex Publishing
Corp. (1989), pp. 191-202.
- S. Landau, What's Doing in Ithaca, New York, New York Times, Sept. 9, 1979, Section X, p. 7.
- Judith F. Gilsinn and Susan
Landau, NBSIR 74-633, The
NBS Computerized Carpool Matching System: Users' Guide,
Applied Math Division, Institute for Basic Standards, Operations
Research Section, National Bureau of Standards, December 1974.
Podcasts
- Cybersecurity for Public Value, Episode 6, May 3, 2023.
- Zero
Trust? Encryption and Other Approaches to Protecting Private Data and
Communications, Privacy in an Age of Zero Trust, American Bar
Association (ABA) Civil Rights and Social Justice and ABA Science and
Technology Law Section, June 9, 2023.
- Securing
Our Homes, Project Sustainability, February 8, 2023.
- Home
Security and Safety, Project Sustainability, February 1, 2023.
- Europe Doubles Down on Client Side Scanning, The Lawfare Podcast, August 2, 2022.
- Doctors
are People Too, March 1, 2022.
- Susan Landau and Ross Anderson on the Going Dark
Debate and the Risks of Client-Side Scanning, The Lawfare Podcast,
November 10, 2021.
- Contact-Tracing
Apps: How They Work and Privacy Concerns, The Breakfast Grille,
BFM, Malaysia,
September 8, 2021.
- Episode
1—Susan Landau: People Count, Over the Rainbow: 21st Century
Security and Privacy, IEEE Computer Society, July 8, 2021.
- A
Digital Contact Tracing Retrospective, The Lawfare
Podcast, June 7, 2021.
- Is Contact Tracing a Privacy Threat?, The Lawfare Podcast, April 18, 2020.
- Moving
the Encryption Policy Conversation Forward, The Lawfare Podcast, October 8, 2019.
- Conversations about Software
Engineering: Security and Privacy with Susan Landau, April 19, 2018.
- Decoding
the Cyber Era with Susan Landau, The Fletcher Forum of World
Affairs, April 12, 2018.
- Tech
Talk: Cybersecurity in an Insecure Age, Tech Talks with Brian
Wesolowski, Center for Democracy and Technology, March 28, 2018.
- The Cyberlaw Podcast: Interview with Susan Landau, February 15, 2018.
- Books, et al., Q& A with Susan Landau, author of Listening In, November 24, 2017.
- Security
by the Book: Susan Landau on Listening In,The Lawfare Podcast,
November 7, 2017.
- Security Mom: The Podcast about
Our Homeland, Decrypting Encryption, October 8, 2015.
Webinars
|
|