Susan Landau

Tufts University

Medford, MA 02155

United States

SCHOLARLY PAPERS

7

DOWNLOADS
Rank 13,401

SSRN RANKINGS

Top 13,401

in Total Papers Downloads

3,543

CITATIONS

6

Scholarly Papers (7)

1.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Privacy Legal Scholars Conference, June 2013
Number of pages: 70 Posted: 19 Aug 2013
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, University of Pennsylvania - School of Engineering & Applied Science and Tufts University
Downloads 1,213 (16,066)
Citation 3

Abstract:

Loading...

wiretap, CALEA, surveillance, hacking, vulnerabilities, cyber-security, law enforcement

2.

It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

Harvard Journal of Law and Technology, Forthcoming
Number of pages: 88 Posted: 08 Jun 2016 Last Revised: 10 Nov 2016
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, Tufts University and West Point--Army Cyber Institute
Downloads 731 (33,435)
Citation 2

Abstract:

Loading...

metadata, content, non-content, third-party doctrine, pen register, Internet, IP-based communications, Ex Parte Jackson, Katz v. United States, Smith v. Maryland, United States v. Warshak, Fourth Amendment, wiretap

3.

The Large Immortal Machine and the Ticking Time Bomb

Number of pages: 35 Posted: 26 Mar 2012 Last Revised: 05 Apr 2012
Susan Landau
Tufts University
Downloads 566 (47,186)

Abstract:

Loading...

communications, wiretap, interception, CALEA, security, telephone switch

4.

Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act’s Metadata Program be Extended?

Number of pages: 80 Posted: 12 Aug 2019
Susan Landau and Asaf Lubin
Tufts University and Yale University
Downloads 393 (74,503)

Abstract:

Loading...

communications metadata, Internet communications, surveillance, NSA, USA FREEDOM Act, terrorism, bulk collection

5.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Tufts University and Stanford - Center for International Security and Cooperation
Downloads 307 (97,726)
Citation 1

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control

6.

Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure

Number of pages: 28 Posted: 23 May 2011 Last Revised: 05 Apr 2015
Columbia University - Department of Computer Science, Harvard University, Stanford University - Center for International Security and Cooperation, Tufts University and Princeton University - Department of Computer Science
Downloads 222 (136,761)
Citation 1

Abstract:

Loading...

7.

National Security on the Line

Journal of Telecommunication and High Technology Law, Vol. 4, No. 2, pp. 409-447, 2006
Number of pages: 40 Posted: 08 Apr 2009
Susan Landau
Tufts University
Downloads 111 (245,233)

Abstract:

Loading...

Wiretapping, Electronic Surveillance, CALEA, Location Information, Sensor Networks