1. Chris K. Ridder: “Evidentiary implications of potential security weaknesses in forensic software.” iSEC Partners, 2 August 2007. Center for Internet and Society, Stanford Law School, 9 November 2008
2. “Federal rules of evidence. ARTICLE IX. Authentication and identification. Rule 901. Requirement of authentication or identification.” Expert Pages, 9 November 2008
3. Tim Newsham, Chris Palmer, Alex Stamos and Jesse Burns: “Breaking forensics software: Weaknesses in critical evidence collection.” iSEC Partners, 1 August 2007, Version 1.1, 9 November 2008