Works Cited
​
-
Anderson, Daniel. “Splinternet Behind the Great Firewall of China.” Queue, vol. 10, no. 10, 2012, pp. 1–10. ACM Digital Library, https://doi.org/10.1145/2390756.2405036. Accessed 8 May 2025.
-
Bamford, James. “A Death in Athens The Inherent Vulnerability of ‘Lawful Intercept’ Programs.” YouTube, Sicherheitsforschung, 5 Apr. 2016, www.youtube.com/watch?v=v9tdQ_t2ip4.
-
Cimpanu, Catalin. “Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI.” BleepingComputer, 7 Oct. 2017, https://www.bleepingcomputer.com/news/security/cyberstalking-suspect-arrested-after-vpn-providers-shared-logs-with-the-fbi/.
-
Communications Assistance for Law Enforcement Act – CALEA. Telcordia Notes on the Networks, Issue 4, Oct. 2000, pp. 21-1–21-20.
-
Doty, Nick. “When It Comes to Encryption, Back Doors Are Never Simple: Why UK Apple Users Won’t Have Encrypted Backups Anymore.” Center for Democracy and Technology, 10 Apr. 2025, cdt.org/insights/when-it-comes-to-encryption-back-doors-are-never-simple-why-uk-apple-users-wont-have-encrypted-backups-anymore/.
-
“Hola VPN Users Unwittingly Part of Botnet.” BBC News, 2 June 2015, https://www.bbc.com/news/technology-32958624. Accessed 8 May 2025.
-
Internet Society, and National Network To End Domestic Violence. Understanding Encryption: The Connections to Survivor Safety, May 2021, www.internetsociety.org/wp-content/uploads/2021/05/NNEDV_Survivor_FactSheet-EN.pdf.
-
Lawful Access, FBI, 14 June 2016, www.fbi.gov/how-we-investigate/lawful-access.
-
Maréchal, Nathalie. “Networked Authoritarianism and the Geopolitics of Information: Understanding Russian Internet Policy.” Media and Communication, vol. 5, no. 1, 2017, pp. 29–41. https://doi.org/10.17645/mac.v5i1.808. Accessed 8 May 2025.
-
Peterson, Larry L., and Bruce S. Davie. Computer Networks: A Systems Approach. 6th ed., Morgan Kaufmann, 2021.
-
Selhi, Myriam. “Encryption: INCLO Members Oppose Backdoor Access.” INCLO, 24 Feb. 2025, inclo.net/pillars/surveillance-and-digital-rights/encryption-inclo-members-oppose-backdoor-access/#:~:text=Experts%20have%20warned%20that%20backdoor,harm%20or%20already%20being%20persecuted.
-
Smith, Ms. "FBI, DHS Investigating Juniper Hack, Secret Backdoor Dates Back 3 Years." Network World (Online), 2015. ProQuest, https://proxy.library.georgetown.edu/login?url=https://www.proquest.com/trade-journals/fbi-dhs-investigating-juniper-hack-secret/docview/1750328600/se-2.
-
Syed, Muhammad Z., et al. "Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work."Information, vol. 15, no. 11, 2024, pp. 734. ProQuest, https://proxy.library.georgetown.edu/login?url=https://www.proquest.com/scholarly-journals/zero-trust-vpn-zt-systematic-literature-review/docview/3133059794/se-2, doi:https://doi.org/10.3390/info15110734.
-
Wilton, Robin. “Encryption Unlocks the Benefits of a Thriving, Trustworthy Internet.” Internet Society, 16 Apr. 2021, www.internetsociety.org/resources/doc/2021/encryption-unlocks-the-benefits-of-a-thriving-trustworthy-internet/.
-
“What Is a VPN Tunnel?” Palo Alto Networks, https://www.paloaltonetworks.com/cyberpedia/what-is-a-vpn-tunnel. Accessed 8 May 2025.
-
Wu, Tony, et al. “Encryption Backdoors.” The Ethics (or Not) of Massive Government Surveillance, Stanford University, cs.stanford.edu/people/eroberts/cs181/projects/ethics-of-surveillance/tech_encryptionbackdoors.html.
-
Security.org. "Best Virtual Private Network (Vpn) Worldwide in 2025, by Test Score." Statista, Statista Inc., 3 Mar 2025, https://www-statista-com.proxy.library.georgetown.edu/statistics/1449500/best-vpns-by-test-score-worldwide/
-
SurfShark. "Main Reasons for Virtual Private Networks (VPN) Usage Worldwide in 2023." Statista, Statista Inc., 18 Oct 2023, https://www-statista-com.proxy.library.georgetown.edu/statistics/1343692/worldwide-virtual-private-network-reasons-usage/