Research/Areas of Interest
Cybersecurity policy, Privacy, Communications Surveillance
Cybersecurity policy, Privacy, Communications Surveillance
Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Callas, J., . . . Troncoso, C. (2024). Bugs in our pockets: the risks of client-side scanning (Vol. 10). doi:10.1093/cybsec/tyad020
Landau, S. (2022). Cyberwar in Ukraine: What You See Is Not What’s Really There. Lawfare: Lawfare.
Landau, S. (2021). Digital exposure tools: Design for privacy, efficacy, and equity. Science, 373(6560), 1202-1204. doi:10.1126/science.abi9852
Landau, S. (2021). Dangers Posed by Evidentiary Software—and What to Do About It. Lawfare. Retrieved from https://www.lawfareblog.com/
Landau, S. (2021). People Count. MIT Press. doi:10.7551/mitpress/14056.001.0001
Landau, S. (2021). Categorizing Uses of Communications Metadata: Systematizing Knowledge and Presenting a Path for Privacy. In ACM International Conference Proceeding Series (pp. 1-19). doi:10.1145/3442167.3442171
Encryption Working Group. (2019). Moving the Encryption Policy Debate Forward. Carnegie Endowment for International Peace. Retrieved from https://carnegieendowment.org/
Landau, S., Bellvoin, S., & Lin, H. (2019). Limiting the undesired impact of cyber weapons: Technical requirements and policy implications. In A. Zegart, & H. Lin (Eds.), Bytes, Bombs, and Spies (pp. 265-288). Washington DC: Brookings Institution Press.
Landau, S. (2017). Listening in Cybersecurity in an Insecure Age. Yale University Press.
Bellovin, S. M., Blaze, M., Landau, S., & Pell, S. K. (2016). It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law.