1. Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W.,...Weitzner, D. J. (2015, July 6). Keys under doormats: Mandating insecurity by requiring government access to all data communications (Technical Report, MIT-CSAIL-TR-2015-026). Retrieved from http://www.crypto.com/papers/Keys_Under_Doormats_FINAL.pdf
2. American Civil Liberties Union. (n.d.) NSA surveillance. Retrieved January 16, 2016, from https://www.aclu.org/issues/national-security/privacy-and-surveillance/nsa-surveillance
3. Assemblée Nationale, République Numérique (number 3318), amendment number CL92. (2016, January 4). Retrieved from http://www.assemblee-nationale.fr/14/amendements/3318/CION_LOIS/CL92.asp
4. BBC. (2015, December 16). China internet: Xi Jinping calls for ‘cyber sovereignty.’ Retrieved from http://www.bbc.co.uk/news/world-asia-china-35109453
5. BBC. (2016, January 7). Dutch government says no to ‘encryption backdoors.’ Retrieved from http://www.bbc.co.uk/news/technology-35251429