{"id":316,"date":"2021-08-13T15:11:51","date_gmt":"2021-08-13T15:11:38","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/tech-institute\/our-team\/distinguished-fellows-and-non-resident-fellows\/katherine-alteneder\/"},"modified":"2025-10-27T16:02:49","modified_gmt":"2025-10-27T16:02:49","slug":"steven-bellovin","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/tech-institute\/people\/affiliate-scholars-and-fellows\/steven-bellovin\/","title":{"rendered":"Steven Bellovin"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Steven M. Bellovin is a senior affiliate scholar at Georgetown Law&#8217;s Institute for Technology Law and Policy and the Percy K. and <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Vida_Whitmore\"><span style=\"font-weight: 400\">Vida L. W. Hudson<\/span><\/a> <a href=\"https:\/\/www.cs.columbia.edu\"><span style=\"font-weight: 400\">Professor Emeritus of Computer Science at Columbia University<\/span><\/a><span style=\"font-weight: 400\">. He is former member of the Cybersecurity and Privacy Center of the university&#8217;s <\/span><a href=\"https:\/\/datascience.columbia.edu\/\"><span style=\"font-weight: 400\">Data Science Institute<\/span><\/a><span style=\"font-weight: 400\">, and previously an affiliate faculty member at <\/span><a href=\"https:\/\/www.law.columbia.edu\/\"><span style=\"font-weight: 400\">Columbia Law School<\/span><\/a><span style=\"font-weight: 400\">. Bellovin does research on security and privacy and on related public policy issues. In his copious spare professional time, he does some work on the history of technology. He joined the Columbia faculty in 2005 after many years at <\/span><a href=\"https:\/\/www.bell-labs.com\"><span style=\"font-weight: 400\">Bell Labs<\/span><\/a><span style=\"font-weight: 400\"> and <\/span><a href=\"https:\/\/www.research.att.com\"><span style=\"font-weight: 400\">AT&amp;T Labs Research<\/span><\/a><span style=\"font-weight: 400\">, where he was an AT&amp;T Fellow. He received a BA degree from <\/span><a href=\"https:\/\/www.columbia.edu\"><span style=\"font-weight: 400\">Columbia University<\/span><\/a><span style=\"font-weight: 400\">, and an MS and PhD in <\/span><a href=\"https:\/\/www.cs.unc.edu\"><span style=\"font-weight: 400\">Computer Science from the University of North Carolina at Chapel Hill<\/span><\/a><span style=\"font-weight: 400\">. While a graduate student, he helped create Netnews; for this, he and the other perpetrators, Tom Truscott and Jim Ellis, were given the 1995 <\/span><a href=\"https:\/\/www.usenix.org\"><span style=\"font-weight: 400\">Usenix<\/span><\/a><span style=\"font-weight: 400\"> Lifetime Achievement Award (<\/span><a href=\"https:\/\/www.usenix.org\/about\/flame.html\"><span style=\"font-weight: 400\">The Flame)<\/span><\/a><span style=\"font-weight: 400\">. In 2023, he received a <\/span><a href=\"https:\/\/www.engineering.columbia.edu\/news\/computer-security-pioneer-steve-bellovin-first-win-two-usenix-flame-awards\"><span style=\"font-weight: 400\">second Flame award<\/span><\/a><span style=\"font-weight: 400\"> (still in the same lifetime!), along with <\/span><a href=\"https:\/\/www.mattblaze.org\"><span style=\"font-weight: 400\">Matt Blaze<\/span><\/a><span style=\"font-weight: 400\"> and <\/span><a href=\"https:\/\/www.privacyink.org\"><span style=\"font-weight: 400\">Susan Landau<\/span><\/a><span style=\"font-weight: 400\">, for public policy work on computer security and privacy. He has also received the <\/span><a href=\"https:\/\/www.acsac.org\/2006\/ncss-pr.html\"><span style=\"font-weight: 400\">2007 NIST\/NSA National Computer Systems Security Award<\/span><\/a><span style=\"font-weight: 400\"> and has been elected to the <\/span><a href=\"https:\/\/www.cybersecurityhalloffame.org\/#chof_2014\"><span style=\"font-weight: 400\">Cybersecurity Hall of Fame<\/span><\/a><span style=\"font-weight: 400\">. Bellovin has served as <\/span><a href=\"https:\/\/www.research.att.com\/\"><span style=\"font-weight: 400\">Chief Technologist<\/span><\/a><span style=\"font-weight: 400\"> of the <\/span><a href=\"https:\/\/www.ftc.gov\"><span style=\"font-weight: 400\">Federal Trade Commission<\/span><\/a><span style=\"font-weight: 400\"> and as the Technology Scholar at the <\/span><a href=\"https:\/\/www.pclob.gov\"><span style=\"font-weight: 400\">Privacy and Civil Liberties Oversight Board<\/span><\/a><span style=\"font-weight: 400\">. He is a member of the <\/span><a href=\"https:\/\/www.nae.edu\/\"><span style=\"font-weight: 400\">National Academy of Engineering<\/span><\/a><span style=\"font-weight: 400\"> and has served on the <\/span><a href=\"https:\/\/www.cstb.org\"><span style=\"font-weight: 400\">Computer Science and Telecommunications Board<\/span><\/a><span style=\"font-weight: 400\"> of the <\/span><a href=\"https:\/\/www.nationalacademies.org\"><span style=\"font-weight: 400\">National Academies of Sciences, Engineering, and Medicine<\/span><\/a><span style=\"font-weight: 400\">. In the past, he has been a member of the <\/span><a href=\"https:\/\/www.dhs.gov\/archive\/science-and-technology\/hsstac\"><span style=\"font-weight: 400\">Department of Homeland Security&#8217;s Science and Technology Advisory Committee<\/span><\/a><span style=\"font-weight: 400\">, and the <\/span><a href=\"https:\/\/vote.nist.gov\/TGDC.htm\"><span style=\"font-weight: 400\">Technical Guidelines Development Committee<\/span><\/a><span style=\"font-weight: 400\"> of the <\/span><a href=\"https:\/\/www.eac.gov\/\"><span style=\"font-weight: 400\">Election Assistance Commission<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-7820 size-medium\" src=\"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-300x286.jpg\" alt=\"Steven Bellovin's headshot\" width=\"300\" height=\"286\" srcset=\"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-300x286.jpg 300w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-1024x975.jpg 1024w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-768x731.jpg 768w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-1536x1463.jpg 1536w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-500x476.jpg 500w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-740x705.jpg 740w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858-980x933.jpg 980w, https:\/\/www.law.georgetown.edu\/tech-institute\/wp-content\/uploads\/sites\/42\/2025\/07\/Bellovin-scaled-e1751550481858.jpg 1783w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Bellovin is the author of <\/span><a href=\"https:\/\/www.informit.com\/store\/thinking-security-stopping-next-years-hackers-9780134277547\"><i><span style=\"font-weight: 400\">Thinking Security<\/span><\/i><\/a><span style=\"font-weight: 400\"> and the co-author of <\/span><a href=\"https:\/\/www.wilyhacker.com\"><i><span style=\"font-weight: 400\">Firewalls and Internet Security: Repelling the Wily Hacker<\/span><\/i><\/a><span style=\"font-weight: 400\">, and holds a number of patents on cryptographic and network protocols. He has served on many <\/span><a href=\"https:\/\/www.nationalacademies.org\"><span style=\"font-weight: 400\">National Academies <\/span><\/a><span style=\"font-weight: 400\">\u00a0study committees, including those on information systems trustworthiness, the privacy implications of authentication technologies, and cybersecurity research needs; he was also a member of the information technology subcommittee of an NRC study group on science versus terrorism. He was a member of the <\/span><a href=\"https:\/\/www.iab.org\"><span style=\"font-weight: 400\">Internet Architecture Board<\/span><\/a><span style=\"font-weight: 400\"> from 1996-2002; he was co-director of the <\/span><a href=\"https:\/\/wiki.ietf.org\/group\/sec\"><span style=\"font-weight: 400\">Security Area<\/span><\/a><span style=\"font-weight: 400\"> of the <\/span><a href=\"https:\/\/www.ietf.org\"><span style=\"font-weight: 400\">IETF<\/span><\/a><span style=\"font-weight: 400\"> from 2002 through 2004.<\/span><\/p>\n<p><span style=\"font-weight: 400\">More details may be found at <\/span><a href=\"https:\/\/www.cs.columbia.edu\/~smb\/informal-bio.html\"><span style=\"font-weight: 400\">https:\/\/www.cs.columbia.edu\/~smb\/informal-bio.html<\/span><\/a><span style=\"font-weight: 400\">; much of his technical history is <\/span><a href=\"https:\/\/www.usenix.org\/system\/files\/login\/articles\/07_bellovin.pdf\"><span style=\"font-weight: 400\">here<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steven M. Bellovin is a senior affiliate scholar at Georgetown Law&#8217;s Institute for Technology Law and Policy and the Percy K. and Vida L. W. Hudson Professor Emeritus of Computer [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":297,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-316","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":7,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":8579,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/316\/revisions\/8579"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/297"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/media?parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}