- For Employers
Research/Areas of Interest: Cybersecurity policy, Privacy, Communications Surveillance
- Ph.D., Massachusetts Institute of Technology, United States, 1983
- M.S., Cornell University, Ithaca, United States, 1979
- B.A., Princeton University, Princeton, United States, 1976
Susan Landau works at the intersection of cybersecurity, national security, law, and policy. She has testified before Congress, written for the Washington Post, Science, and Scientific American, and frequently appears on NPR and BBC. Her previous positions include senior staff privacy analyst at Google, distinguished engineer at Sun Microsystems, and faculty member at Worcester Polytechnic Institute, the University of Massachusetts Amherst, and Wesleyan University.
Landau, S. (2016). The real security issues of the iPhone case: Law enforcement needs 21st-century investigative savvy. Science, 352(6292), 1398-1399. doi:10.1126/science.aaf7708
Landau, S. (2015). Control use of data to protect privacy. Science, 347(6221), 504-506. doi:10.1126/science.aaa4961
Landau, S. (2014). Highlights from making Sense of Snowden, Part II: What's significant in the NSA revelations. IEEE Security and Privacy, 12(1), 62-64. doi:10.1109/MSP.2013.161
Landau, S. (2013). Making sense from snowden: What's significant in the NSA surveillance revelations. IEEE Security and Privacy, 11(4), 54-63. doi:10.1109/MSP.2013.90
Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the undesired impact of cyber weapons: Technical requirements and policy implications. Journal of Cybersecurity, 3(1), 59-68. doi:10.1093/cybsec/tyx001
Bellovin, S. M., Blaze, M., Landau, S., & Pell, S. K. (2016). It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law.
Bellovin, S. M., Blaze, M., Clark, S., & Landau, S. (2013). Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet.
Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., . . . Weitzner, D. J. (2015). Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79. doi:10.1093/cybsec/tyv009
Landau, S. (2017). Listening in Cybersecurity in an Insecure Age. Yale University Press.
Landau, S., Bellvoin, S., & Lin, H. (2019). Limiting the undesired impact of cyber weapons: Technical requirements and policy implications. In A. Zegart, & H. Lin (Eds.), Bytes, Bombs, and Spies (pp. 265-288). Washington DC: Brookings Institution Press.