Susan Landau

Tufts University

Medford, MA 02155

United States

SCHOLARLY PAPERS

6

DOWNLOADS
Rank 22,647

SSRN RANKINGS

Top 22,647

in Total Papers Downloads

3,564

SSRN CITATIONS

6

CROSSREF CITATIONS

4

Scholarly Papers (6)

1.

Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet

Privacy Legal Scholars Conference, June 2013
Number of pages: 70 Posted: 19 Aug 2013
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, University of Pennsylvania - School of Engineering & Applied Science and Tufts University
Downloads 1,342 (23,159)
Citation 5

Abstract:

Loading...

wiretap, CALEA, surveillance, hacking, vulnerabilities, cyber-security, law enforcement

2.

It's Too Complicated: How the Internet Upends Katz, Smith, and Electronic Surveillance Law

Harvard Journal of Law and Technology, Forthcoming
Number of pages: 88 Posted: 08 Jun 2016 Last Revised: 10 Nov 2016
Columbia University - Department of Computer Science, University of Pennsylvania - School of Engineering & Applied Science, Tufts University and West Point--Army Cyber Institute
Downloads 838 (45,392)
Citation 2

Abstract:

Loading...

metadata, content, non-content, third-party doctrine, pen register, Internet, IP-based communications, Ex Parte Jackson, Katz v. United States, Smith v. Maryland, United States v. Warshak, Fourth Amendment, wiretap

3.

The Large Immortal Machine and the Ticking Time Bomb

Number of pages: 35 Posted: 26 Mar 2012 Last Revised: 05 Apr 2012
Susan Landau
Tufts University
Downloads 612 (68,723)

Abstract:

Loading...

communications, wiretap, interception, CALEA, security, telephone switch

4.

Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications

Number of pages: 24 Posted: 15 Jul 2016 Last Revised: 09 Aug 2017
Steven M. Bellovin, Susan Landau and Herbert Lin
Columbia University - Department of Computer Science, Tufts University and Stanford - Center for International Security and Cooperation
Downloads 386 (119,604)
Citation 3

Abstract:

Loading...

cyber target, cyber attack, laws of war, laws of armed conflict, proportionality, collateral damage, indiscriminate weapons Cyber Arms Control

5.

Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure

Number of pages: 28 Posted: 23 May 2011 Last Revised: 05 Apr 2015
Columbia University - Department of Computer Science, Harvard University, Stanford University - Center for International Security and Cooperation, Tufts University and Princeton University - Department of Computer Science
Downloads 255 (185,507)
Citation 3

Abstract:

Loading...

6.

National Security on the Line

Journal of Telecommunication and High Technology Law, Vol. 4, No. 2, pp. 409-447, 2006
Number of pages: 40 Posted: 08 Apr 2009
Susan Landau
Tufts University
Downloads 131 (332,624)

Abstract:

Loading...

Wiretapping, Electronic Surveillance, CALEA, Location Information, Sensor Networks