1. Nstissam tempest/2-95. https://cryptome.org/tempest-2-95.htm (Accessed on 02/27/2018); 2000.
2. 9 counter surveillance tools you can legally use | independent living news. https://independentlivingnews.com/2013/11/12/20397-9-counter-surv{-}eillance-tools-you-can-legally-use/ (Accessed on 02/27/2018); 2013.
3. Meet badbios, the mysterious mac and pc malware that jumps airgaps | ars technica. https://arstechnica.com/information-technology/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/ (Accessed on 02/27/2018); 2013.
4. funtenna github. https://github.com/funtenna (Accessed on 12/03/2017); 2015.
5. Why has mark zuckerberg taped over the webcam and microphone on his macbook? https://www.telegraph.co.uk/technology/2016/06/22/why-has-mark-zuckerberg-taped-over-the-webcam-and-microphone-on/ (Accessed on 02/27/2018); 2016.