1. Adesco, A.: The demise of anonymity: a constitutional challenge to the convention on cybercrime. Loyola Los Angel. Entertain. Law Rev. 23, 90 (2002)
2. Bañuls Gómez, F.: Las intervenciones telefónicas a la luz de la jurisprudencia más reciente (2007). Available at http://noticias.juridicas.com
3. Castro, G., Torres-Dulce, E.: Garrigues commentary. Litigation and Arbitration, 8-2015. Available at http://www.garrigues.com/en_GB/new/organic-law-132015-amending-criminal-procedure-law-strengthen-procedural-guarantees-and-regulate
4. Conings, C.: Locating criminal investigative measures in a virtual environment. Where do searches take place in cyberspace’. B-CCENTRE Legal Research report 43-72 (2015). Available at https://lirias.kuleuven.be/handle/123456789/492870
5. Council of Europe Cybercrime Convention Committee (T-CY): (Draft) Elements of an additional protocol to the Budapest convention on cybercrime regarding transborder access to data (April 9, 2013). Available at http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY%202013/T-CY%282013%2914transb_elements_protocol_V2.pdf