[1] United States. Cong. House. Permanent Select Committee on Intelligence. Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE a Report. By Mike Rogers and C.A. Dutch. Ruppersberger. 112 Cong. H. Rept. Washington, DC: U.S. House of Representatives, 2012. Online PDF .
[2] United States. Cong. House. IT AND SUPPLY CHAIN SECURITY. By Sue Myrick. 112 Cong. H. Rept. Washington, DC: House of Representatives, 2012. Web. 17 Feb. 2013. http://thomas.loc.gov/cgi-bin/query/z?r112:H17MY2-0059:.
[3] FTC. “HTC America Settles FTC Charges It Failed to Secure Millions of Mobile Devices Shipped to Consumers.” HTC America Settles FTC Charges It Failed to Secure Millions of Mobile Devices Shipped to Consumers. FTC, 22 Feb. 2013. Web. 30 Feb. 2013. http://www.ftc.gov/opa/2013/02/htc.shtm.
[4] Android Open Source Project. “Notes on the Implementation of Encryption in Android 3.0.” Notes on the Implementation of Encryption in Android 3.0. Android Open Source Project, n.d. Web. 20 Feb. 2013. http://source.android.com/tech/encryption/android_crypto_implementation.html.
[5] Google Play Support Team, Zachary. “RE: [0-9623000000528] Phone Call Follow-up.” Message to the author. 15 Feb. 2013. E-mail.
[6] Motorola Mobility Inc. “Android TM 4.1 Jelly Bean and the Future of Motorola Software.” The Official Motorola Blog Motorola Mobility Inc USA RSS. Motorola Mobility Inc, 9 Nov. 2012. Web. 1 Mar. 2013. http://www.motorola.com/blog/2012/11/09/android-4-1-jelly-bean-and-the-future-of-motorola-software/.
[7] Kaspersky Lab. “99% of All Mobile Threats Target Android Devices.” 99% of All Mobile Threats Target Android Devices. Kaspersky Lab, 7 Jan. 2013. Web. 4 Mar. 2013. http://www.kaspersky.com/about/news/virus/2013/99_of_all_mobile_threats_target_Android_devices.
[8] Google. “Get Started with Publishing.” Android Developers. Google, n.d. Web. 4 Mar. 2013. https://developer.android.com/distribute/googleplay/publish/register.html.
[9] Shankland, Stephen. “‘Reverse Smudge Engineering’ Foils Android Unlock Security.” CNET News. CBS Interactive, 14 Feb. 2012. Web. 01 Mar. 2013. http://news.cnet.com/8301-30685_3-57377224-264/reverse-smudge-engineering-foils-android-unlock-security/
[10] Mills, Elinor. “Digital Image Can Dupe Android Face-based Lock.” CNET News. CBS Interactive, 11 Nov. 2011. Web. 01 Mar. 2013. http://news.cnet.com/8301-27080_3-57323508-245/digital-image-can-dupe-android-face-based-lock/