Alpert, G.P. & Smith, W.C. (1999). How reasonable is the reasonable man? Police and excessive force. Journal of Criminal Law and Criminology, 85(2), 481-501.
Black's law dictionary. (1990). St. Paul, MN: West Publishing Co.
Hall, J.C. (1999, February). Due process and deadly force: When police conduct shocks the conscience. FBI Law Enforcement Bulletin, 68(2), 27-28.
Klinger, D. (2004). Into the kill zone: A cop's eye view of deadly force. San Francisco:
Moore, M.H. & Braga, a.A. (2004). Police performance measurement: A normative framework. Criminal Justice Ethics, 23(1), 3-5.
National Law Enforcement Policy Ctr., Int'l ass'n of Chiefs of Police, a compilation of model policies [sections] 1 (1989-1991) in Alpert & Smith at 485.
Russell, H.E. & Beigel, a. (1999). Understanding human behavior for effective police work.
New York: Basic Books.
Urbonya, K.R. (2003). Rhetorically reasonable police practices: Viewing the Supreme Court's multiple discourse paths. American Criminal Law Review, 40(4), 1387-1389.
Winright, T.L. (1995). The perpetrator as person: Theological reflections on the just war tradition and the use of force by police. Criminal Justice Ethics, 14(2), 37-56.
Schmalleger F. (2008). Criminal Justice Today: An Introductory Text for the 21st
Century. Hoboken, NJ: Prentice Hall.
Amendments to Section 225 Cyber Security Enhancement Act, 2002 (2003). Washington, D.C.: Department of Homeland Security.
Antal, J. Counter-terrorism multipliers needed (2010). Military Technology, 34(4), 4.
Ashley, Col. (S) B.K, USAF (2004). The United States Is Vulnerable to Cyberterrorism. Signal Online. Retrieved from: http://www.afcea.org/signal/articles/templates/SIGNAL_Article_Template.asp?articleid=32&zoneid=10
Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics, 409 F.2d 718, (U.S.App. LEXIS 12867 2d Cir. N.Y., 1969).
Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics Decided on June 21, 1971; 403 U.S. 388. American Civil Liberties Union. (nd.) ProCon.org. Retrieved from: http://aclu.procon.org/view.resource.php?resourceID=3182
CTIC Final Report (2005). Counter Terrorism International Conference, Riyadh, 5-8 February 2005.
Cyberterrorism Defense Analysis Center (CDAC) (2010). Cyberterrorism Defense Initiative. U.S. FEMA. Retrieved from: http://www.cyberterrorismcenter.org/
Cyber Defense Technology Networking and Evaluation (2004). Association for Computing Machinery. Communications of the ACM, 47(3), 58-61.
Dakin, R., Newman, R., & Groves, D. (2010). The Case for Cyber Security in the Water Sector. American Water Works Association Journal, 101(12), 30-32.
Davis, B.J. (2005). Prepare: seeking systemic solutions for technological crisis management. Knowledge and Process Management, 12(2), 123-131.
Earth Liberation Front (ELF) (2010). Retrieved from: http://earth-liberation-front.org/
Earth Liberation Front (2010). Anti-Defamation League (ADL). Retrieved from: http://www.adl.org/Learn/Ext_US/Ecoterrorism.asp
Ecoterrorism and the Internet (2010). Anti-Defamation League (ADL). Retrieved from: http://www.adl.org/Learn/Ext_US/Ecoterrorism.asp
Gorman, S (2010). U.S. news: Electricity industry to scan grid for spies. Wall Street Journal (Eastern Edition), A3.
Harding, N. (2010). Eco anarchists: A new breed of terrorist?. The Independent Tuesday, 18 May 2010. Retrieved from: http://www.independent.co.uk/environment/eco-anarchists-a-new-breed-of-terrorist-1975559.html
Harwood, M. (2008). Eco-terrorism is a misnomer. The Guardian, 28 February 2008. Retrieved from: http://www.guardian.co.uk/commentisfree/2008/mar/28/ecoterrorismisamisnomer
Hellriegel, D. And Slocum, J.W. (2007). Organizational Behavior. Mason: Thompson South Western.
House panel advances bill giving FERC new grid protection powers (2010). Energy Daily, 4.
Jauregui, M. (2008). Eco Terrorism in the UK. Ecology Journal. Retrieved from:http://www.ecofirms.org/journal/eco-terrorism-in-the-uk/
Kingsbury, a. A national power grid that thinks (2010). U.S. News & World Report, 147(4), 37-38.
Lozowski, D. Securing chemical process facilities (2007). Chemical Engineering, 114(1), 16-19.
McCollum, T. (2003). Report targets U.S. cyber-security. The Internal Auditor, 60(1), 18-19.
Seiter, R.P. (2008). Corrections: An introduction, Second Edition. New Jersey, NJ: Pearson Education, Inc.
Sentencing Reform Act of 1984 (SRA) Pub. L. No. 98-473, 98 Stat. 1987  [codified in 18 U.S.C.A. § 3551 -- 3556 (1988 & Supp. V 1993)].
Shea, D.A. (2003). Critical Infrastructure: Control Systems and Terrorist Threat. Report for Congress. Congressional Research Service, 2003. Washington, D.C.: U.S. Congress.
Stephens, B.H. (2009). 2.0. Wall Street Journal (Eastern Edition), a.13.
Stone, a. (2010). Gatekeepers. Federal Times, 46(9), 11-13.
U.S. Department of Homeland Security (2010). Retrieved from: http://www.dhs.gov/index.shtm
U.S. PATRIOT Act, 2001 (2001). HR 3162 RDS 107th Congress 1st Session, H.R. 3162. U.S. Senate, 24 October, 2001. Washington D.C.: U.S. Senate.
Wright, D.P. et al. (2006). A survey of operations research models and applications in homeland security. Interfaces, 36(6), 514 -- 618.
Worrall, J.L. (2008). Crime control in America: What works?, Second Edition. Boston, MA: Pearson Education, Inc.