Susan Landau

Tufts University

Medford, MA 02155

United States

SCHOLARLY PAPERS

6

DOWNLOADS
Rank 15,462

SSRN RANKINGS

Top 15,462

in Total Papers Downloads

3,201

SSRN CITATIONS

2

CROSSREF CITATIONS

4

Scholarly Papers (6)

1.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Privacy Legal Scholars Conference, June 2013
Number of pages: 70 Posted: 19 Aug 2013
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, University of Pennsylvania - School of Engineering & Applied Science and Tufts University
Downloads 1,222 (16,585)
Citation 3

Abstract:

Loading...

wiretap, CALEA, surveillance, hacking, vulnerabilities, cyber-security, law enforcement

2.

It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

Harvard Journal of Law and Technology, Forthcoming
Number of pages: 88 Posted: 08 Jun 2016 Last Revised: 10 Nov 2016
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, Tufts University and West Point--Army Cyber Institute
Downloads 743 (34,036)
Citation 2

Abstract:

Loading...

metadata, content, non-content, third-party doctrine, pen register, Internet, IP-based communications, Ex Parte Jackson, Katz v. United States, Smith v. Maryland, United States v. Warshak, Fourth Amendment, wiretap

3.

The Large Immortal Machine and the Ticking Time Bomb

Number of pages: 35 Posted: 26 Mar 2012 Last Revised: 05 Apr 2012
Susan Landau
Tufts University
Downloads 573 (48,249)

Abstract:

Loading...

communications, wiretap, interception, CALEA, security, telephone switch

4.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Tufts University and Stanford - Center for International Security and Cooperation
Downloads 325 (95,260)
Citation 1

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control

5.

Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure

Number of pages: 28 Posted: 23 May 2011 Last Revised: 05 Apr 2015
Columbia University - Department of Computer Science, Harvard University, Stanford University - Center for International Security and Cooperation, Tufts University and Princeton University - Department of Computer Science
Downloads 224 (140,571)
Citation 2

Abstract:

Loading...

6.

National Security on the Line

Journal of Telecommunication and High Technology Law, Vol. 4, No. 2, pp. 409-447, 2006
Number of pages: 40 Posted: 08 Apr 2009
Susan Landau
Tufts University
Downloads 114 (249,278)

Abstract:

Loading...

Wiretapping, Electronic Surveillance, CALEA, Location Information, Sensor Networks