Connors, Timothy and Georgia Pellegrini, Ed. Hard Won Lessons: Policing Terrorism in the United States. New York City: Manhattan Institute, 2006.
Riebling, Mark, Ed. Hard Won Lessons: The New Paradigm- Merging Law Enforcement and Counterterrorism Strategies. New York City: Manhattan Institute, 2006.
Clark, R. (1970). Crime in America. New York: Simon and Schuster.
Kessler, R. (2002). The Bureau: The secret history of the FBI. New York: St. Martin's Press.
Lawrence, J.M. (2001, August 29). FBI aided killer - Hub FBI men helped Mob hit man escape death row. The Boston Herald. Retreived October 29, 2007 at http://www.highbeam.com/doc/1G1-77665441.html.
Lawrence, J.M. (2003, June 24). Thug's lawyers say FBI coerced witness. The Boston Herald. Retrieved October 29, 2007 at http://www.highbeam.com/doc/1G1-104128330.html.
McShane, L. (2000, January 2). With No Fear of Mafia Retribution, Informants Quit Witness Protection Program. Buffalo News (January 2, 2000), A1.
Moushey, B. (1996, May 26). Protected witness. Pittsburgh Post-Gazette (May 26, 1996), A1.
O'Hara, P. (2005). Why Law Enforcement Organizations Fail: Mapping the organizational fault. Durham, North Carolina: Carolina Academic Press.
Part II ? Criminal Procedure: Chapter 224 ? Protection of Witnesses (1999).
US Code at http://www4.law.cornell.edu/uscode/18/3521.html.
United States Marshals Service (2007). Retrieved October 30, 2007 at http://www.polisci.com/exec/justice/01636.htm.
U.S. Marshals Service ? Witness Security (2007). Retrieved October 30, 2007 at http://www.financenet.gov/exsales/www.usdoj.gov/witsec1.html.
Brunker, M. (2000). Fbi agent charged with hacking. Retrieved from http://www.nbcnews.com/id/3078784/ns/news-internet_underground/t/fbi-agent-charged-hacking/
Jahnke, A. (2005, April 25). A hacker story. Retrieved from http://www.crime-
Koerner, B. (2002, June). From russia with lopht. Retrieved from http://legalaffairs.org/issues/May-June-2002/feature_koerner_mayjun2002.msp
Lemos, R. (2001, May 01). Fbi "hack" raises global security concerns. Retrieved from http://news.cnet.com/2100-1001-256811.html
Rt.com. (2013, April 26). Judge rejects fbi's request to use 'extremely intrusive' hack tactic.
Retrieved from http://rt.com/usa/judge-rejects-fbi-hack-tactic-422/
Garamone, J. (2005). CIA, FBI Chiefs Categorize Terror Threat Before Senate. February 16, 2005. American Forces Press Service. Retrieved March 24, 2007 at http://www.defenselink.mil/news/newsarticle.aspx?id=25874.
Gorman, S. (2007). FBI, CIA remain worlds apart. National Journal Group Inc. Retrieved March 24, 2007 at http://www.govexec.com/dailyfed/0803/080103nj1.htm.
Grebb, M. (2003). Spy Groups Tight-Fisted With Data. February 27, 2003. Wired News.
Retrieved March 24, 2007 at http://www.wired.com/news/conflict/0,2100,57830,00.html
Kitfield, J. (2000). CIA, FBI and Pentagon team to fight terrorism. September 19, 2000. National
Journal. Retrieved March 24, 2007 at http://www.govexec.com/dailyfed/0900/091900nj.htm.
Smith, C. (2001). FBI v. CIA: Battle in Cyberspace. Newsmax.com. November 28, 2001.
Retrieved March 24, 2007 at http://www.newsmax.com/archives/articles/2001/11/28/142513.shtml.