Susan Landau

Susan Landau

Research/Areas of Interest: Cybersecurity policy, Privacy, Communications Surveillance

Education

  • Ph.D., Massachusetts Institute of Technology, United States, 1983
  • M.S., Cornell University, Ithaca, United States, 1979
  • B.A., Princeton University, Princeton, United States, 1976

Biography

Susan Landau works at the intersection of cybersecurity, national security, law, and policy. She has testified before Congress, written for the Washington Post, Science, and Scientific American, and frequently appears on NPR and BBC. Her previous positions include senior staff privacy analyst at Google, distinguished engineer at Sun Microsystems, and faculty member at Worcester Polytechnic Institute, the University of Massachusetts Amherst, and Wesleyan University.

Selected Publications

Landau, S. (2016). The real security issues of the iPhone case: Law enforcement needs 21st-century investigative savvy. Science, 352(6292), 1398-1399. doi:10.1126/science.aaf7708

Landau, S. (2015). Control use of data to protect privacy. Science, 347(6221), 504-506. doi:10.1126/science.aaa4961

Landau, S. (2014). Highlights from making Sense of Snowden, Part II: What's significant in the NSA revelations. IEEE Security and Privacy, 12(1), 62-64. doi:10.1109/MSP.2013.161

Landau, S. (2013). Making sense from snowden: What's significant in the NSA surveillance revelations. IEEE Security and Privacy, 11(4), 54-63. doi:10.1109/MSP.2013.90

Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the undesired impact of cyber weapons: Technical requirements and policy implications. Journal of Cybersecurity, 3(1), 59-68. doi:10.1093/cybsec/tyx001

Bellovin, S. M., Blaze, M., Landau, S., & Pell, S. K. (2016). It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law.

Bellovin, S. M., Blaze, M., Clark, S., & Landau, S. (2013). Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet.

Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., . . . Weitzner, D. J. (2015). Keys under doormats: Mandating insecurity by requiring government access to all data and communications. Journal of Cybersecurity, 1(1), 69-79. doi:10.1093/cybsec/tyv009

Landau, S. (2017). Listening in Cybersecurity in an Insecure Age. Yale University Press.

Landau, S., Bellvoin, S., & Lin, H. (2019). Limiting the undesired impact of cyber weapons: Technical requirements and policy implications. In A. Zegart, & H. Lin (Eds.), Bytes, Bombs, and Spies (pp. 265-288). Washington DC: Brookings Institution Press.