1. Appelbaum, J., A. Gibson, J. Goetz, V. Kabisch, L. Kampf, and L. Ryge. 2014. "NSA Targets the Privacy -Conscious." Panorama, 3 July. Accessed 11 June 2020. https://daserste.ndr.de/panorama/aktuell/NSA -targets-the-privacy-conscious,nsa230.html.
2. Ball, James, Bruce Schneier, and Glenn Greenwald. 2013. "NSA and GCHQ Target Tor Network that Protects Anonymity of Web Users." The Guardian, 4 October. Accessed 11 June 2020. www.theguardian .com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption.
3. Bennett, Jane. 2010. Vibrant Matter: A Political Ecology of Things. Durham, NC: Duke University Press.
4. Carlo, Silkie, and Arjen Kamphuis. (2014) 2016. Information Security for Journalists. London: Centre for Investigative Journalism. Accessed 11 June 2020. files.gendo.ch/Books/InfoSec_for_Journalists_V1.1.pdf.
5. Abstraction in Computer Science