David Meyer (15 August 2014). "New "TCP Stealth" tool aims to help sysadmins block spies from exploiting their systems". GigaOM. https://gigaom.com/2014/08/15/new-tcp-stealth-tool-aims-to-help-sysadmins-block-spies-from-exploiting-their-systems/
"TCP Stealth software prevents cyber attacks". BGR Media. 18 August 2014. http://www.bgr.in/news/tcp-stealth-software-prevents-cyber-attacks/
TCP Stealth. 17 January 2015. I-D draft-kirsch-ietf-tcp-stealth-01. https://datatracker.ietf.org/doc/html/draft-kirsch-ietf-tcp-stealth-01
"TUM researchers develop defense software "TCP Stealth"". Technische Universität München. 15 August 2014. https://www.tum.de/en/about-tum/news/press-releases/short/article/31740/
TCP Stealth. 17 January 2015. I-D draft-kirsch-ietf-tcp-stealth-01. https://datatracker.ietf.org/doc/html/draft-kirsch-ietf-tcp-stealth-01
David Meyer (15 August 2014). "New "TCP Stealth" tool aims to help sysadmins block spies from exploiting their systems". GigaOM. https://gigaom.com/2014/08/15/new-tcp-stealth-tool-aims-to-help-sysadmins-block-spies-from-exploiting-their-systems/
"NSA/GCHQ: The HACIENDA Program for Internet Colonization". 15 August 2014. http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html?hg=1&hgi=4&hgf=false