1. 18 USC § 2510-definitions. LII/Legal Information Institute. [Online]. Available: http://www.law.cornell.edu/uscode/text/18/2510. [accessed 23.02.12].
2. 5 top social media security threats,2011
3. 7. How email really works. [Online]. Available: http://www.niso.org/khelp/kmlm/user_help/html/how_email_works.html. [accessed 08.09.12].
4. Advanced sign-in security for your Google account. Official Google Blog. [Online]. Available: http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html. [accessed 14.09.12].
5. Britain's phone-hacking scandal: secrets of the voicemail hackers. The Economist.” [Online]. Available: http://www.economist.com/blogs/babbage/2010/09/britains_phone-hacking_scandal. [accessed 12.09.12].