1. Arthur C.(2013).LulzSec: what they did who they were and how they were caught.The Guardian(16 May).https://www.theguardian.com/technology/2013/may/16/lulzsec‐hacking‐fbi‐jail(accessed 13 January 2023).
2. Association of Chief Police Officers(2012).ACPO Good Practice Guide for Digital Evidence version 5.https://www.npcc.police.uk/documents/FoI%20publication/Disclosure%20Logs/Information%20Management%20FOI/2013/031%2013%20Att%2001%20of%201%20ACPO%20Good%20Practice%20Guide%20for%20Digital%20Evidence%20March%202012.pdf(accessed 13 January 2023).
3. Burgess M.(2018).The UK just blamed Russia for four major cyberattacks. That's huge.Wired(4 October).www.wired.co.uk/article/uk‐russia‐cyberattack‐hack‐blame(accessed 13 January 2023).
4. The roles of retribution and utility in determining punishment
5. Chon G.andClover C.(2015).US spooks scour China's 5‐year plan for hacking clues.Financial Times(25 November).https://www.ft.com/content/40dc895a‐92c6‐11e5‐94e6‐c5413829caa5(accessed 13 January 2023).