Short description: American mathematician and engineer
Susan Landau |
---|
Landau in 2022 |
Born | 1954 (1954)
|
---|
Alma mater | |
---|
Scientific career |
Fields | Engineering, Cyber Security; Cryptography |
---|
|
Susan Landau (born 1954) is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University.[2][3] She previously worked as a Senior Staff Privacy Analyst at Google.[4] She was a Guggenheim Fellow[5] and a visiting scholar at the Computer Science Department, Harvard University in 2012.[6]
Career
Landau is an alumna of Bronx Science. She then graduated with an A.B. in mathematics from Princeton University in 1976 after completing a senior thesis titled "Simple algebras", under the supervision of John Coleman Moore.[7] She went on to receive a master's degree from Cornell University in 1979 before pursuing graduate studies at the Massachusetts Institute of Technology, where she received a Ph.D. in mathematics in 1983 after completing a doctoral dissertation, titled "On computing Galois groups and its application to solvability by radicals", under the supervision of Gary L. Miller.[2][8]
In 2010–2011, she was a Fellow at the Radcliffe Institute for Advanced Study at Harvard, where she investigated issues involving security of government systems, and their privacy and policy implications.[9]
From 1999 until 2010, she specialized in internet security at Sun Microsystems.[10]
In 1989, she introduced the first algorithm for deciding which nested radicals can be denested, which is known as Landau's algorithm.[11]
In 1972, her project on odd perfect numbers won a finalist position in the Westinghouse Science Talent Search.[12] Outside of her technical work, she is interested in the issues of women in science, maintaining the ResearcHers Email list, a "community dedicated to supporting women new to research in computing",[13] and an online bibliography of women's writing in computer science.[14] She was awarded the 2008 Anita Borg Institute Women of Vision Award for Social Impact.[15][16] She has been a fellow of the American Association for the Advancement of Science since 1999,[17] and in 2011 she was inducted as a Fellow of the Association for Computing Machinery.[18] In 2012, Landau won the Surveillance Studies Network Book Prize for her book Surveillance or Security? The Risks Posed by New Wiretapping Technologies, published by MIT Press. In October 2015, Landau was inducted into the National Cyber Security Hall of Fame.[19]
Involvement with FBI v. Apple case
Landau gave testimony in the FBI–Apple encryption dispute between 2015 and 2016.[20] She is the co-author of “Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications,” which received the 2015 J. D. Falk Award from the Messaging Malware Mobile Anti-Abuse Working Group. The Obama administration gave substantial credit to this report's analysis when it announced that it would not pursue exceptional access to phone data.[21]
Landau testified that making iPhones less secure would simply send terrorists and bad actors running toward options that the FBI and Congress had no control over. Compelling Apple to weaken its software would "weaken us, but not impact the bad guys."[22]
Notes
- ↑ Contemporary authors: a bio-bibliographical guide to current writers in fiction, general nonfiction, poetry, journalism, drama, motion pictures, television and other fields, Gale Research Co., 1998, p. 195.
- ↑ 2.0 2.1 "Susan Landau". https://engineering.tufts.edu/people/faculty/susan-landau. and "Security and Conflict Resolution: Susan Landau". http://fletcher.tufts.edu/Research/Faculty-Profiles/Security-and-Conflict-Resolution/Landau.
- ↑ "Cybersecurity Bill Would Shift Power Away From NSA". Yahoo! News. https://uk.news.yahoo.com/cybersecurity-bill-shift-power-away-080747797.html. Retrieved 2017-08-28.
- ↑ "Susan Landau Biography". PrivacyInk. http://privacyink.org/. Retrieved 2013-09-06.
- ↑ "List of Guggenheim Fellowships awarded in 2012". http://www.gf.org/news-events/2012-Fellows-in-the-United-States-and-Canada/.
- ↑ Susan Landau at LinkedIn
- ↑ Landau, Susan (1976) (in English). Simple algebras. Princeton, NJ: Department of Mathematics. https://catalog.princeton.edu/catalog/3708076.
- ↑ Landau, Susan. "On computing Galois groups and its application to solvability by radicals". http://library.mit.edu/F/?func=find-b&find_code=SYS&local_base=mit01pub&request=000202723.
- ↑ "Susan Landau – Radcliffe Institute for Advanced Study". Harvard University. http://www.radcliffe.edu/fellowships/fellows_2011slandau.aspx.
- ↑ "Susan Landau". Sun Microsystems. http://research.sun.com/people/slandau/.
- ↑ S. Landau, "Simplification of Nested Radicals", SIAM Journal of Computation, volume 21 (1992), pages 85–110.[1]
- ↑ "Susan Landau: Toward Perfect Internet Security". Scientific American. September 2, 2008. http://www.sciam.com/article.cfm?id=susan-landau-sun-microsystems-westinghouse. Retrieved 2008-09-14.
- ↑ "ResearcHers Email List". Anita Borg Institute for Women and Technology. 2017. http://systers.org/mailman/listinfo/researchers. Retrieved 2017-09-11.
- ↑ "The Book List: Computer Science Books by Women Computer Scientists". Committee on the Status of Women in Computing Research. http://www.cra.org/Activities/craw/booklist/index.php.
- ↑ "Women of Vision awards presented at Anita Borg Institute banquet". Diversity/Careers. August–September 2008. http://www.diversitycareers.com/articles/pro/08-augsep/soc_news_ABI.htm.
- ↑ AnitaB_org (2008-05-30), Susan Landau, Women of Vision Winner Social Impact, https://www.youtube.com/watch?v=JZDlsHdsj6E, retrieved 2018-05-22
- ↑ "AAAS Fellow / Susan Landau". American Association for the Advancement of Science. https://www.aaas.org/fellow/landau-susan. Retrieved 2017-08-27.
- ↑ "ACM: Fellows Award / Susan Landau". Association for Computing Machinery. http://fellows.acm.org/fellow_citation.cfm?id=2455723&srt=year&year=2011.
- ↑ "Keep smartphones backdoor free, urges cybersecurity expert Susan Landau". Tech Republic. 12 July 2016. http://www.techrepublic.com/article/keep-smartphones-backdoor-free-urges-cybersecurity-expert-susan-landau/. Retrieved 2017-08-27.
- ↑ "Keep smartphones backdoor free, urges cybersecurity expert Susan Landau". Tech Republic. 12 July 2016. http://www.techrepublic.com/article/keep-smartphones-backdoor-free-urges-cybersecurity-expert-susan-landau. Retrieved 2017-08-27.
- ↑ "Susan Landau, Professor of Cybersecurity Policy, to be Inducted into the Cyber Security Hall of Fame". Worcester Polytechnic Institute. 26 October 2015. https://www.wpi.edu/news/halloffame. Retrieved 2017-08-27.
- ↑ "Apple and FBI Take Their iPhone Hacking Fight to Congress". Wired. March 1, 2016. https://www.wired.com/2016/03/apple-and-fbi-iphone-hacking-fight-congressional-hearing/.
References
- Susan Landau, "How to Tangle with a Nested Radical", The Mathematical Intelligencer, volume 16, number 2 (Spring 1994), pages 49–55.
- Susan Landau, in "In Her Own Words: Six Mathematicians Comment on Their Lives and Careers" Notices of the American Mathematical Society 38:7:702–706 (Sept. 1991) full text at the Association for Women in Mathematics (written in 1988)
- Abelson, Harold; Anderson, Ross; Bellovin, Steven M.; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael; Weitzner, Daniel J., "Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications" (July 6, 2015)
External links
| Original source: https://en.wikipedia.org/wiki/Susan Landau. Read more |