http://itlaw.wikia.com/wiki/Computer_Fraud_and_Abuse_Act_of_1986. 2 Januarary 2014. 10 February 2014. PBS. http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html.
Retrieved from http://www.fbi.gov/albuquerque/about-us/what-we-investigate. Ottley, T. (2014). Ted Kaczynski: The Unabomber. Retrieved from http://www.crimelibrary.com/terrorists_spies/terrorists/kaczynski/1.html. Rosenberg, J.
(2010, May 21).FBI. Retrieved May 25, 2014, from http://www.fbi.gov/stats-services/publications/terrorism-2002-2005 Terrorism. (n.d.). National Institute of Justice. Retrieved May 23, 2014, from http://www.nij.gov/topics/crime/terrorism/ terrorism.
FBI. FBI, 25 Nov. 2013. Web. 22 Apr. 2014. http://www.fbi.gov/news/stories/2013/november/annual-hate-crime-statistics-show-slight-decease/annual-hate-crime-statistics-show-slight-decrease Cafferty, Jack.
Roman Empire to the NSA: A world history of government spying. BBC News Magazine. Retrieved from http://www.bbc.com/news/magazine-24749166 on 11/29/2014
Retrieved May 28, 2012, from www.fas.org/irp/congress/1994_rpt/ssci_ames.htm JOHNSTON, D. (1995, January 27). How the F.B.I. Finally Caught Aldrich Ames - New York Times. The New York Times - Breaking News, World News & Multimedia. Retrieved May 29, 2012, from http://www.nytimes.com/1995/01/27/us/how-the-fbi-finally-caught-aldrich-ames.html?pagewanted=all&src=pm Lerner, A.
February 07, 2012. Accessed January 07, 2014. http://abcnews.go.com/Politics/top-spies-suspect/story?id=15528916. "Mata Hari Biography." Bio.com. Accessed January 14, 2014. http://www.biography.com/people/mata-hari-9402348.
Lamb, R. (2009, March 11). How Suicide Bombers Work. HowStuffWorks. Retrieved April 6, 2014, from http://science.howstuffworks.com/suicide-bomber1.html Pape, Robert A. "The Strategic Logic of Suicide Terrorism."
(n.d.). Methods of Terrorism Through the Ages. Retrieved February 28, 2014, from https://canton.sln.suny.edu/AngelUploads/Content/201402-CAN-JUST-375-0W1/_assoc/C9BB8538FC3940F2AED148CF4BC6C0C0/Freedom_of_Reporting_and_Security_Issues.pdf Simon, J. (2011, September 9). How 'war on terror' unleashed a war on journalists.
Ethics, Espionage, and Covert Action. Retrieved from Journal of Conflict Studies website: http://www.scu.edu/ethics/publications/submitted/Perry/repugnant.html#nine Roberts, D., & Ackerman, S. (2013, June 6). Anger swells after NSA phone records court order revelations | World news | The Guardian. Retrieved May 15, 2014, from http://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records