"Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. November 29, 2011. Retrieved December 5, 2011. http://insidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad/
Brandon, John (December 3, 2011). "Could the U.S. Government Start Reading Your Emails?". Fox News. Archived from the original on December 3, 2011. Retrieved December 6, 2011. https://web.archive.org/web/20111203222717/http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/
"Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets". Georgia Institute of Technology. November 10, 2011. Retrieved December 6, 2011. http://www.gatech.edu/newsroom/release.html?nid=72599
"Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets". Georgia Institute of Technology. November 10, 2011. Retrieved December 6, 2011. http://www.gatech.edu/newsroom/release.html?nid=72599
"Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. November 29, 2011. Retrieved December 5, 2011. http://insidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad/
"Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. November 29, 2011. Retrieved December 5, 2011. http://insidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad/
"Video Interview: DARPA's ADAMS Project Taps Big Data to Find the Breaking Bad". Inside HPC. November 29, 2011. Retrieved December 5, 2011. http://insidehpc.com/2011/11/29/video-interview-darpas-adams-project-taps-big-data-to-find-the-breaking-bad/
"Georgia Tech Helps to Develop System That Will Detect Insider Threats from Massive Data Sets". Georgia Institute of Technology. November 10, 2011. Retrieved December 6, 2011. http://www.gatech.edu/newsroom/release.html?nid=72599
Storm, Darlene (December 6, 2011). "Sifting through petabytes: PRODIGAL monitoring for lone wolf insider threats". Computer World. Archived from the original on January 12, 2012. Retrieved December 6, 2011. https://web.archive.org/web/20120112170109/http://blogs.computerworld.com/19382/sifting_through_petabytes_prodigal_monitoring_for_lone_wolf_insider_threats