FBI. (2012). Internet Crime 2012 / IC3 Releases Annual Report. Retrieved June 28, 2013, from http://www.fbi.gov.
Latamore, Bert. (2010). Cyber Threat Growing More Focused and More Sophisticated. Seybold Report: Analyzing Publishing Technologies, 19(1), 11-14.
Nykodym, N., Kahle-Piasecki, L., and Marsillac, E.L. (2010). The Managers Guide to Understanding, Detecting, and Thwarting Computer Crime: An International Performance
Issue. Performance Improvement, 49(5), 42-47.
Bhaskar, R. (2006). State and Local Law Enforcement is not Ready for a Cyber Katrina.
Communications of the ACM, 49(2), 81-83.
Buck, C. (2014). Credit Cards to get security chip upgrade. The Sacramento Bee. Retrieved
February 10, 2014, from http://www.sacbee.com.
Chang, J., Venkatasubramarian, K.K., West, A.G., and Lee, I. (2013). Analyzing and defending against web-based malware. ACM Computer Survey, 45(4).
CNBC.com. (2014). Cyber-crime is 'greatest threat' to companies' survival: EY. Retrieved
February 9, 2014, from http://www.cnbc.com.
DIBS. (2011). Computer Forensic Equipment. Retrieved February 10, 2014, from http://www.dibsforensics.com.
Dominquez, G. (2007). Equipping A Forensic Lab. Techno Forensics 2007. Retrieved February
10, 2014, from http://www.thetrainingco.com.
Gilbreth, T. (2012). Missouri is a Front-Runner in New Crime-Fighting Frontier. Missouri Sheriffs Association. Retrieved February 10, 2014, from http://www.mosheriffs.com.
Gustin, G. (2013). Schnucks: Crooks who stole Schnucks data lie far from law enforcement's
Grasp. St. Louis Post-Dispatch. Retrieved February 10, 2014, from http://www.stltoday.com.
InfraGard. (2013). Learn more about InfraGard. Retrieved February 10, 2014, from http://www.infragard.org.
Lipton, J.D. (2011). Combating Cyber-Victimization. Berkeley Technology Law Journal,
Lukasik, S.J. (2011). Protecting Users of the Cyber Commons. Communications of the ACM.
Mueller, R.S. (2013). The Cyber Threat -- Planning for the Way Ahead. InfraGard. Retrieved February 10, 2014, from http://www.infragard.org.
Osuagwu, O.E., Ogiemien, T., and Okide, S. (2010). Deploying Forensics Science & Technology
For Resolving National Cyber-Security Challenges. Journal of Mathematics and Technology,
Vol. 3. ISSN: 2078-0257.
RT.com. (2014). Target part of a broader cyber-attack, Russian hackers allegedly involved.
Retrieved February 10, 2014, from http://rt.com.
Teller, T. (2013). The Biggest Cybersecurity Threats of 2013. Forbes. Retrieved February 10, '
2014, from http://www.forbes.com.
U.S. Attorney's Office. (2013). Cybercrime Task Force. Retrieved February 10, 2014, from http://www.justice.gov.
Hesseldahl, Arik. (2010, Oct. 14). How bad guys worm their way into factories. Bloomberg Businessweek. Retrieved 3 Dec. 2011 from http://www.businessweek.com/technology/content/oct2010/tc20101013_236876.htm
James, Randy. (2009, June 1). A brief history of cybercrime. New York Times. Retrieved 3 Dec. 2011 from http://www.time.com/time/nation/article/0,8599,1902073,00.html
Kabay, M.E. (2008). A Brief History of Computer Crime: An Introduction for Students. Retrieved 2 Dec. 2011 from www.mekabay.com/overviews/history.pdf
Kowalski, Melanie (2002). Cyber-Crime: Issues, data sources, and feasibility of collecting police-reported statistics. Cat. 85-558-XIE. Canadian Centre for Justice Statistics, Minister of Industry. Retrieved 3 Dec. 2011 from http://dsp-psd.pwgsc.gc.ca/Collection/Statcan/85-558-X/85-558-XIE2002001.pdf
Langton, Lynn. (2011). Identity theft reported by households, 2005-2010. Bureau of Justice Statistics, Office of Justice Programs, U.S. Department of Justice. Retrieved 3 Dec. 2011 from http://bjs.ojp.usdoj.gov/content/pub/pdf/itrh0510.pdf
Schjolberg, Stein. (2008). The history of global harmonization on cybercrime legislation -- The road to Geneva. International Telecommunications Union. Retrieved 3 Dec. 2011 from www.cybercrimelaw.net/documents/cybercrime_history.pdf
Bassiouni, M.C. (2014). "International Extradition: United States Law and Practice." Oxford University Press.
Curtis, G. (2011). "The Law of Cybercrimes and Their Investigations." CRC Press.
Slack, J., & Semark, M. "Spotlight falls on Starmer: Will Director of Public Prosecutions now order Gary McKinnon to face UK court on hacking charge?." Retrieved January 30, 2014, from http://www.dailymail.co.uk/news/article-2218872/Gary-McKinnon-extradition-U.S.-outrage-hacker-wont-American-authorities.html
Wall, D. (2007). "Cybercrime: The Transformation of Crime in the Information Age." Polity.