1. Ball, J. (2013). NSA’s Prism surveillance program: how it works and what it can do. The Guardian.
2. Ball, J., Schneier, B., & Greenwald, G. (2013). NSA and GCHQ target Tor network that protects anonymity of web users. The Guardian.
3. BBC. (2015, August 07). Bangladesh blogger Niloy Neel hacked to death in Dhaka. Retrieved from http://www.bbc.com/news/world-asia-33819032
4. Bekker, S. (2013, June 20). PRISM and Microsoft: What We Know So Far”. Redmond Channel Partner.
5. Off-the-record communication, or, why not to use PGP