1) Applebaum, J. (2014). Jacob Appelbaum – People Think They’re Exempt From NSA (2014). YouTube. Retrieved 16 October 2015, from https://www.youtube.com/watch?v=JyT7yzap1Wc
2) Abbott, R. (2010). An Onion A Day Keeps The NSA Away. Journal Of Internet Law, 22-28.
3) Bamman, D., Connor, B., & Smith, N. (2012). Censorship and deletion practices in Chinese social media. First Monday, 17(3). Retrieved from http://journals.uic.edu/ojs/index.php/fm/article/view/3943/3169
4) Bloomberg Business,. (2015). Obama, Xi Jinping Agree to Curb Computer Hacking. Retrieved from https://www.youtube.com/watch?v=QN5YH9dKFK8
5) Brown, S., Kang,S., Kiesler,S. (n.d). Why Do People Seek Anonymity on the Internet?, Informing Policy and Design Human Computer Interaction Institute. Retrieved from Department of Psychology2 Carnegie Mellon University.
6) Christopherson, K.M (2007). Computers in Human Behavior, 23(6), 2581-3056
7) Davenport, D (2002). Anonymity on the Internet, Viewpoint, 45(4), 33-35
8) Deans, P. (2004). Chapter 6: The Internet in the People’s Republic of China, Censorship and Participation in Abbott, J P. ‘The Political Economy of the Internet in Asia and the Pacific Digital Divides, Economic Competitiveness, and Security Challenges’ (Ed), (pp. 123-138) New York, Praeger
9) Denyer, S. (2015, February 7) Why Internet users all around the world should be worried about China’s Great Firewall, The Washington Post, Retrieved from: https://www.washingtonpost.com/news/worldviews/wp/2015/02/02/why-internet-users-all-around-the-world-should-be-worried-about-chinas-great-firewall/
10) Dixon, P. (2015). China as world’s dominant superpower – Impact on America, Russia and EU. Globalchange.com. Retrieved 15 October 2015, from http://www.globalchange.com/china-as-worlds-dominant-superpower-impact-on-america-russia-and-eu.htm
11) Gellman, B., Timberg, C., & Rich, S. (2013). Secret NSA documents show campaign against Tor encrypted network. Washington Post. Retrieved 16 October 2015, from https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html
12) Haraty, R., & Zantout, B. (2014). The TOR Data Communication System. Journal Of Communications And Networks, 16(4), 415-420.
13) Johnson, G (2010). The Impact of Anonymity on Internet Safety, Security, and Content Integrity. Retrieved 14 October 2015 from http://www.resourcesforlife.com/docs/item2560.
14) Levine, Y. (2014). Almost everyone involved in developing Tor was (or is) funded by the US government. Pando. Retrieved 13 October 2015, from https://pando.com/2014/07/16/tor-spooks/
15) Masters, A (2011). Identity on the Internet: The pros and cons of anonymity. Retrieved 14 Oct 2015 from http://blogs.independent.co.uk/2011/09/19/identity-on-the-internet-the-pros-and-cons-of-anonymity/.
16) Osborne, C. (2015). Hornet Tor alternative for high-speed anonymous browsing revealed | ZDNet. ZDNet. Retrieved 16 October 2015, from http://www.zdnet.com/article/hornet-tor-alternative-for-high-speed-anonymous-browsing-revealed/
17) Osborne, C. (2015). Tor Cloud Project closes its doors | ZDNet. ZDNet. Retrieved 16 October 2015, from http://www.zdnet.com/article/tor-cloud-project-closes-its-doors/
18) Owen, M. (2007). Fun with onion routing. Network Security, 2007(4), 8-12. http://dx.doi.org/10.1016/s1353-4858(07)70044-2
19) Powell, B. (2015). Newsweek.com. Retrieved 12 October 2015, from http://www.newsweek.com/what-expect-when-chinese-president-xi-jinping-visits-obama-374556
20) Roger, D. (2006). United States.
21) Sherman, C., & Price, G. (2001). The Invisible Web. Medford, N.J.: CyberAge Books.
22) Smith, T. (2015). No Conspiracy Theory Needed: Tor Created for U.S. Gov’t Spying. Network World. Retrieved 13 October 2015, from http://www.networkworld.com/article/2228873/microsoft-subnet/no-conspiracy-theory-needed–tor-created-for-u-s–gov-t-spying.html
23)The Congressional-Executive Commission on China, Blocking, Filtering, and Monitoring, Retrieved from: http://www.cecc.gov/blocking-filtering-and-monitoring
24) The Tor Project, I. (2013). Who uses Tor?. Torproject.org. Retrieved 14 October 2015, from https://www.torproject.org/about/torusers.html.en
25) The Tor Project, (2009), Tor partially blocked in China. Retrieved from: https://blog.torproject.org/blog/tor-partially-blocked-china
26) The Tor Project, (2010), China blocking Tor: Round Two. Retrieved from: https://blog.torproject.org/blog/china-blocking-tor-round-two
27) Usg.edu,. A Brief History of the Internet. Retrieved 14 October 2015, from http://www.usg.edu/galileo/skills/unit07/internet07_02.phtml
28) Winter, P & Crandall J R (2012), The Great Firewall of China: How it Blocks Tor and Why it is Hard to Pinpoint, Retrieved from: https://www.usenix.org/system/files/login/articles/login1212_winter.pdf
29) Winter, P & Lindskog, S (2010), How the Great Firewall of China is Blocking Tor, Free and Open Communications on the Internet, Retrieved from: http://www.cs.kau.se/philwint/pdf/foci2012.pdf
30) Zetter, K. (2005). Tor | WIRED. WIRED. Retrieved 15 October 2015, from http://www.wired.com/tag/tor/