1. Condliffe, J. (2016). Judge Rules Evidence From FBI’s Pedophile Tor Hack Is Invalid. Gizmodo. Retrieved from http://gizmodo.com/judge-rules-evidence-from-fbis-pedophile-tor-hack-is-in-1772218525
2. Cox, J. (2016). FBI: Hacking Tool Only Targeted Child Porn Visitors. Vice. Retrieved from https://motherboard.vice.com/read/fbi-hacking-tool-only-targeted-child-porn-visitors
3. Ford, M. (2016). The Supreme Court Expands FBI Hacking Powers. The Atlantic. Retrieved from http://www.theatlantic.com/politics/archive/2016/04/supreme-court-fbi-hacking/480498/
4. Hardesty, L. (2015). Researchers mount successful attacks against Tor network—and show how to prevent them. Phys.org. Retrieved from https://phys.org/news/2015-07-mount-successful-tor-networkand.html
5. Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet, survival: global politics and strategy. Retrieved from http://www.tandfonline.com/doi/pdf/10.1080/00396338.2016.1142085?needAccess=true