1. Acquiring high tech crime tools. (2006). High Tech Crime Brief, 13. Retrieved from http://www.aic.gov.au/documents/A/B/C/%7bABCFCBC4-541A-4ED8-822E-3A0C3B082644%7dhtcb013.pdf
2. Alexis, A. (2013, April 9). Debate brewing over whether companies should strike back at their cyber attackers. Bloomberg. Retrieved from http://www.bna.com/debate-brewing-whether-n17179873246/
3. APT30 and the mechanics of a long-running cyber espionage operation. (2015, April 15). FireEye Threat Intelligence Special Report. Retrieved from https://www2.fireeye.com/rs/fireye/images/rpt-apt30.pdf
4. Baker, S. (2012, September 19). Rethinking cybersecurity, retribution, and the role of the private sectors. Steptoe. Retrieved from http://www.steptoecyberblog.com/2012/09/19/rethinking-cybersecurity-retribution-and-the-role-of-the-private-sector/?
5. Baker, S. (2013, November 26). Hackback backers’ comeback? The Volokh Conspiracy. Retrieved from http://www.volokh.com/2013/11/26/hackback-backers-comeback/