Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act’s Metadata Program be Extended?
Susan Landau & Asaf Lubin[*] [Full text of this Article in PDF is available at this link] Introduction The first of Edward Snowden’s disclosures was a Foreign Intelligence Surveillance Court (“FISC”) order requiring that Verizon provide the National Security...Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure
By Steven M. Bellovin*, Scott O. Bradner**, Whitfield Diffie***, Susan Landau****, and Jennifer Rexford***** — Click here to read the full text of the Article In an effort to protect its computer systems from malevolent actors, the U.S. government has developed...Untangling Attribution
By David D. Clark* and Susan Landau** — Click here to read the full text of the Essay As a result of increasing Internet insecurity — DDoS attacks, spam, cybercrime, and data theft — there have been calls for an Internet architecture that would link people to...Untangling Attribution
David D. Clark and Susan Landau consider how cyberexploitations and cyberattacks might be traced by linking people to packets and conclude that such a linkage would be a mistake. They discuss how other technical contributions to cyber attribution can only be contemplated in the larger regulatory context of various legal jurisdictions.