The mission of the Department of Defense’s cyber strategy is Web view ·...

23

Click here to load reader

Transcript of The mission of the Department of Defense’s cyber strategy is Web view ·...

Page 1: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States

Preventing Terrorism in the United States

Following the Guidelines of the American Psychological Association of Style

Page 2: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 2

Introduction

“At 8:46 on the morning of September 11, 2001, the United States became a nation

transformed,” (United States Government, 2004). Since this time everywhere in the United

States has become a need for security. Buildings that once could be entered into with ease now

require tight security measures in order to enter. Airspace has been carefully monitored ever

since to avoid from terrorist attacks in America to ever happen again. Here is what happened:

An airliner traveling at hundreds of miles per hour and carrying some 10,000 gallons of jet fuel plowed into the North Tower of the World Trade Center in Lower Manhattan. At 9:03, a second airliner hit the South Tower. Fire and smoke billowed upward. Steel, glass, ash, and bodies fell below. The Twin Towers, where up to 50,000 people worked each day, both collapsed less than 90 minutes later. At 9:37 that same morning, a third airliner slammed into the western face of the Pentagon. At 10:03, a fourth airliner crashed in a field in southern Pennsylvania. It had been aimed at the United States Capitol or the White House, and was forced down by heroic passengers armed with the knowledge that America was under attack. More than 2,600 people died at the World Trade Center; 125 died at the Pentagon; 256 died on the four planes. The death toll surpassed that at Pearl Harbor in December 1941. This immeasurable pain was inflicted by 19 young Arabs acting at the behest of Islamist extremists headquartered in distant Afghanistan. Some had been in the United States for more than a year, mixing with the rest of the population. Though four had training as pilots, most were not well-educated. Most spoke English poorly, some hardly at all. In groups of four or five, carrying with them only small knives, box cutters, and cans of Mace or pepper spray, they had hijacked the four planes and turned them into deadly guided missiles (United States Government, 2004).

Another account of what happened comes from Yale Global Online (2016):

Ten years ago, a small group of men launched unprecedented terrorist attacks on icons of American power. The dramatic attack by Al Qaeda ushered in an era of seemingly unending war between organized states and shadowy groups. This Yale Global series examines the continuing reverberations from the 9/11 attacks, which lured the US into long wars in Afghanistan and Iraq. The US has successfully foiled attacks since, but Al Qaeda remains intent on igniting global war to establish an Islamic caliphate, warns Bruce Riedel, former US intelligence officer and senior fellow at the Brookings Institution’s Saban Center for Middle East Policy, in the first of two articles. A key caliphate link would be South Asia. Despite many attempts, Al Qaeda and the Pakistani group Lashkar-e-Taiba have failed to bait India into war with Pakistan. The extremists keep plotting, hoping to ignite reckless conflicts between the US and Iran, Egypt and Israel. Fortunately, the extremism appalls most Muslims, and most state leaders detect the traps (Yale Global Online, 2016).

Page 3: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 3

New York University also states the accounts of the 9-11 attacks as well: “The terrorist attack of

9/11 is not only a significantly traumatic event,” (Yoshida, 2006).

The purpose of this paper is to answer one question which arises out of the National

Commission on Terrorist Attacks Upon the United States (United States Government, 2004).

“What can we do in the future to prevent similar acts of terrorism?” (United States Government,

2004). The latter part of the essay will discuss cyberterrorism and computer memory hacking as

well as the negative effects of policing in America.

Findings of the Commission

In general there were four main points that did not prepare the United States for 9-11

from 1998 to 2001: imagination, policy, capabilities and management. The specific findings of

the commission were that unsuccessful diplomacy, lack of military options, problems within the

intelligence community, problems in the FBI, permeable borders and immigration controls,

financing, an improvised homeland defense, emergency response and the congress all

contributed to the problems of why 9-11 was able to take place (United States Government,

2004). Here is how things have improved to make America safer:

Since 9/11, the United States and its allies have killed or captured a majority of al Qaeda's leadership; toppled the Taliban, which gave al Qaeda sanctuary in Afghanistan; and severely damaged the organization. Yet terrorist attacks continue. Even as we have thwarted attacks, nearly everyone expects they will come. How can this be? The problem is that al Qaeda represents an ideological movement, not a finite group of people. It initiates and inspires, even if it no longer directs. In this way it has transformed itself into a decentralized force. Bin Ladin may be limited in his ability to organize major attacks from his hideouts. Yet killing or capturing him, while extremely important, would not end terror. His message of inspiration to a new generation of terrorists would continue. Because of offensive actions against al Qaeda since 9/11, and defensive actions to improve homeland security, we believe we are safer today. But we are not safe. We therefore make the following recommendations that we believe can make America safer and more secure (United States Government, 2004).

Cyberterrorism

The mission of the Department of Defense’s cyber strategy is to build and maintain ready

forces and capabilities to conduct cyberspace operations. As well to defend the DOD information

network, secure DOD data, and mitigate risks to DOD missions

Page 4: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 4

Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive

cyberattacks of significant consequence. Plus, build and maintain viable cyber options and plan

to use those options to control conflict escalation and to shape the conflict environment at all

stages. Build and maintain robust international alliances to deter shared threats and increase

international security and stability.

DoD requires forces and personnel that are trained to the highest standard In 2013 DoD

initiated a major investment in its cyber personnel and technologies by initiating the CMF This

strategy sets specific objectives for DoD to meet as it mans, trains, and equip its forces and

personnel over the next five years and beyond. HE DEPARTMENT

The Department of Defense (DoD) must work with its interagency partners, the private

sector, and allied and partner nations to deter and if necessary defeat a cyberattack of significant

consequence on U.S. homeland and U.S. interests. The DoD must develop its intelligence,

warning, and operational capabilities to mitigate sophisticated, malicious cyberattacks before

they can impact U.S. interests. To defend the nation, DoD must build partnerships with other

agencies of the government to prepare to conduct combined cyber operations to deter and if

necessary defeat aggression in cyberspace.

During heightened tensions or outright hostilities, DoD must be able to provide the

President with a wide range of options for managing conflict escalation. If directed, DoD should

be able to use cyber operations to disrupt an adversary’s command and control networks,

military-related critical infrastructure, and weapons capabilities. As a part of the full range of

tools available to the United States, DoD must develop viable cyber options and integrate those

options into Departmental plans. DoD will develop cyber capabilities to achieve key security

objectives with precision, and to minimize loss of life and destruction of property. To ensure

unity of effort, DoD will enable combatant commands to plan and synchronize cyber operations

with kinetic operations across all domains of military operations.

ING INTERNATIONAL ALLIANCES

All three of DoD’s cyber missions require close collaboration with foreign allies and

partners. Given the high demand and relative scarcity of cyber resources, the DoD must make

hard choices and focus its partnership capacity initiatives on areas where vital U.S. national

interests are at stake DoD will focus its international engagement on: the Middle East, the Asia-

Pacific, and key NATO allies.

Page 5: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 5

Computer Memory Hacking

According to the North Carolina State University Study Guide, they give this definition

of hackers:

Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates (North Carolina State University, 2016).

The guide also goes onto to state that hackers break into computer user’s memory and/or RAM

and can sometimes destroy all of the data in a computer user’s computer. The United States

Department of Justice (2016) goes on to state that computer hacking is a federal crime and also

infringes on intellectual property of the computer user that is being hacked. The North Carolina

State University Study Guide (2016) says that many people who hack computers do it because it

is a “challenge” and they seek the thrill of being able to have access to other people’s

information. Computer hacking is something that can happen to anyone and anywhere. For

example, this can happen from a personal computer to the United States government. Next I will

give two examples of the common tools that hackers use to hack computers.

Computer hackers will sometimes hack computers out of revenge and they tend to target

two different sources: government departments and personal computers. Due to this there are

four types of hackers which emerge (North Carolina State University, 2016). The four different

types of hackers are pranksters, fame seekers, educational and criminals. Next I will discuss

three best practices that a computer user can use to guard against hackers.

The three best practices that a computer user can use to guard against hackers come from

the North Carolina State University (2016):

Page 6: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 6

A skilled hacker will do whatever it takes to break into your computer. Just ask Microsoft. Even a giant software company is not completely safe. The company was hacked by a Trojan-horse program hidden inside an innocent-looking email attachment. The Trojan horse replicated itself throughout Microsoft's internal network and eventually emailed proprietary secrets back to the originator of the Trojan horse. Follow these six steps to protect your computer from being hacked:

Don't let other people onto your computer unless you really trust them. A great way to do this is to password-protect your computer.

Don't ever open attachments. Avoid Trojan horses and viruses by following this rule. For more information, go here.

Turn off file sharing if you don't need it. If a port scan is done on your computer, a hacker may find a back door to your machine and access your files.

Use an antivirus program and keep it up to date. For more information, go here.

If you have a constant Internet connection, use a firewall. For more information, go here.

Routinely update Windows software. This is extremely important. Updates fix many bugs and known security holes within the Windows operating system (North Carolina State University, 2016).

With these best practices kept in mind, this will protect computer users from being hacked. Next,

I will discuss how hacking has effected organizations and modern society using two key

examples.

Two key examples of how hacking has effected organizations and modern society include

the first one I will mention from the Federal Bureau of Investigation (FBI). The FBI (2015) was

involved in dismantling a criminal ring of hackers known as Darkode that was running in 20

countries worldwide. Charges were laid. In the New York Field Office of the FBI (2015),

hackers had stolen more than 150,000 press releases to generate $30 million in illegal funds and

the FBI (2015) charged nine people with two indictments.

Page 7: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 7

Policing in America

The impressions of police in America are dependent on who you ask and what their

experiences have been with police. Stoddard (1968) states that ethics as they pertain to the police

involves knowing what is right and wrong and conducting oneself in an ethical manner. Brown

and Chipman (2000) also state that the police must strictly adhere to an ethical code of conduct

in order for their reputation among Americans to remain unblemished. Peak (2014) says that

police misconduct is more rampant in America than ever before, however the counter argument

is that D.K. in The Economist.com discusses how the job of policing is very difficult in this day

and age. Grill from USA Today.com, Holloway from CNN.com and Vick from Time.com also

echoes the words of D.K. that policing is a very difficult job in these troubling times of crime in

America.

This section will discuss the forms of police misconduct and argue effectively that police

misconduct does occur on a frequent basis, as well as conclude with suggestions towards

resolving this dilemma. How police get hired for their jobs will be the first topic of discussion is

the fact of racial profiling, followed by the levels of force that police use when apprehending a

suspect, followed by the topic of police corruption and then concluding with how police

misconduct can be resolved.

A police officer who is truly good at his or her job has a commitment to the belief that

they want to serve and want to protect the public good. Not all police officers conduct

themselves this way. As stated by Stoddard (1968) racial profiling is a condition that has been

occurring for a long, long time amongst police officers. The difference is that the people who are

racially profiled have changed throughout history. There was a time when Italian people who are

recently immigrated to the United States during the turn of the 20th century were all considered to

be mobsters and involved in illegal crime activity. There was a time when the Irish people who

tended to immigrate to the United States prior to the Italian people were racially profiled by

police as all violating the prohibition regulations that were in place as well as other illegal

activity. Brown and Chipman (2000) discuss how African American people have been

notoriously racially profiled by police. Many African American people are seen as “guilty by

being African American,” (30) and a judicial system that punishes the African American person

Page 8: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 8

to the extremities of the legal system such as with the death penalty. Recent news events in the

United States that always consistently seem to be occurring further demonstrate the clashes that

police often have minority communities in America. Peak (2014) argues that more diversity

training and contact with the communities that police serve is vitally needed in order to put an

end to racial profiling. When upstanding minorities of America who are driving in luxury

vehicles get stopped by the police simply because there are not a lot of police officers on the

force who look like that driver, diversity training as well as more employment of minorities to

become police officers could and would be a solution to these problems.

Besides racial profiling is also the issue of related issues to racial profiling such as

violence towards homosexual communities, violence towards people of different religions and

cultures, violence towards poor women who may be involved in acts such as prostitution or sex

work, violence towards poor people and impoverished communities in general, mistreatment of

young people and the automatic suspicions of police that a gang of young people potentially

innocently walking down the street are up to no good are additional forms of police misconduct

that are linked to racial profiling (Peak, 2014). The next issue that will be discussed are the levels

of police force that is used in apprehending suspects.

Stoddard (6) in his classic work regarding police misconduct states that police have been

known to use excessive force when apprehending suspects for crime. Excessive force is basically

defined as conduct that is used to apprehend a suspect that is conducted in an excessively violent

way or that which may cause undue harm to the potential suspect. Excessive force is a criminal

activity when conducted by police and is also an illegal activity. These actions by bad cops so-to-

speak result in millions of dollars lost by the government due to legal repercussions (Peak,

2014). In 1985, the United States Supreme Court in the case of Tennessee v. Garner, greatly

restricted the use of deadly force, which does happen and has also recently been in the news in

America, against police officers as they apprehend suspects (Brown and Chipman, 2000).

For an officer to use deadly force, the officer must truly believe that their lives or the

lives of anyone involved in the arrest are in danger to the point of death. In these circumstances,

then deadly force can be used. As has been stated by D.K. in The Economist.com, Grill in USA

Today.com, Holloway in CNN.com and Vick in Time.com, the job of a police officer is not easy

in a country as dangerous as the United States of America. In major cities such as New York,

Page 9: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 9

Florida, Texas, California and even Washington as a few examples, the level of crime is so high

and the potential for a police officer’s life to be taken away by the targeted bullet of a suspect

could, can and does lead to many circumstances of deadly force being used to take down a

suspect. In these instances…would you do the same thing? If you thought your life was at risk,

would you shoot first and then asks questions later as the expression goes?

The answers to these questions may lie firmly in what it takes to become a police officer

and the motivations behind why a police officer is doing their job or doing their work. If a police

officer is motivated by the top dollar salaries that they earn and they are doing the job solely to

earn a paycheck every two weeks when they would rather be doing some other job that would

even pay less if they could afford to do so – yes, without a doubt with this attitude just about

anyone would shoot first and then ask the necessary questions later.

If a police officer is motivated by protecting people, understands the foundations of the

U.S. Constitution, knows that a proper arrest must follow protocol and certain standards and that

they are an exceptional human being regarding being calm under the most pressured

circumstances – I am not saying that for sure the deadly force would not occur depending on the

circumstances, however there would be less probabilities that the deadly force would occur. Also

linking the issue of racial profiling as mentioned earlier into the equation – a police officer who

is free from biased thought, opinion or any prejudice would also exercise a more reasoned

response regardless of the assailant they are facing in any pressurized situation. The next issue

that will be discussed is police corruption.

Picture this, because it happens:

Police raid a money laundering scheme in New York City. There is $50 million dollars in real

United States currency that is littered all over the room. There are five police officers present.

Four of the police officers due their due diligence and arrest the money launderers and collect

the $40 million dollars that they have found. The other one sole police officer out of the five that

is the bad apple in the bunch pockets $10 million of the cash and not ever says a word to anyone

as he quietly leaves the police force a year later to live in Mexico.

Police corruption – it does happen. It takes place in many different forms according to

Stoddard (1968), Brown and Chipman (2000) and Peat (2014). Not only could it involve a police

Page 10: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 10

officer stealing money or drugs from a drug bust or a money laundering situation, police officers

could be violating the law in a variety of ways such as paying their way into promotions, bribing

judges to ensure that a suspect is convicted and going to brothels to sleep with sex workers.

Police do not always even abide by the very laws that they have been hired to serve and to

protect for.

As mentioned in the example above, those were five police officers that went into that

room where the money laundering was taking place and only one of the police officers took the

money. This tends to be the common circumstance of the approximate ratio of police officers

that are good, versus those police officers who have not been good. Sometimes the police

corruption that takes place could be bigoted comments towards their co-workers of women and

people of color who are on the police force and the exclusionary practices of out-casting these

other police officers who are taking the chance to try to improve things by being on the inside of

the systemically often corrupt system. Police officers who practice bigotry are racially profiling

on one of their own – this is simply a different kind of racial profiling.

Police are given so much power in any given township or county or country that often

many of them abuse it. What has not been discussed yet is the police corruption that also occurs

amongst the federal police bureau, otherwise known as the Federal Bureau of Investigation or

FBI. The FBI has been known historically to racially profile many African Americans and to

target some non-African Americans as being Communist during the McCarthy era when they

were not even Communist. Harassment and prosecution, even imprisonment was the result of

these ignorant acts by the FBI. Currently, many Muslim people are being attacked and

prosecuted in the United States due to the terrorist acts that have been occurring. Innocent

Muslim people who have nothing to do with any terrorist attacks whatsoever and some of them

even with long histories of being American citizens are being targeted, under surveillance and

even sometimes imprisoned by the FBI, as well as state and county police departments.

The Knapp Commission in 1972 identified two different types of forms of police

corruption. They are the following:

Grass Eaters

Meat Eaters

Page 11: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 11

The definitions of a grass eater are officers who practice more benign aspects of corruption. They

may accept small gifts, money and favors on behalf of someone who has committed a crime and

then they will use false discretion to choose not to arrest them. The definition of a meat eater

police officer in regards to police misconduct are officers that are focused on illegal means to

make money while they are on duty as police officers.

Stoddard (1968) points out a more complete list of police misconduct as listed below:

Bribery: accepting cash gifts in exchange for the a lack of law enforcement

Chiseling: demanding free food, demanding discounts and free admission

Extortion: threatening arrest if a bribe is not given to the police officer

Favoritism: giving family and friends breaks on law enforcement

Mooching: accepting free admission to entertainment, drinks and food

Perjury: lying on behalf of other officers that have done something illegal

Prejudice: unequal enforcement of the law in respect to racial and ethnic minorities

Premediated Theft: planned theft and burglaries (this would be shown in the example

above)

Shakedown: Taking items from a scene of a theft or a burglary (this would be shown in

the example above)

Shopping: taking small and inexpensive items from the scene of a crime

Stoddard covers many areas of police misconduct and the conclusion of this essay will discuss

how police misconduct can be resolved. The following is the conclusion.

Conclusion – Recommendations of Commission for Preventing Terrorist Attacks

The recommendations include the following coming from the United States Government

(2004):

attack terrorists and their organizations

prevent the continued growth of Islamist terrorism

protect against and prepare for terrorist attacks

How will this be done? (United States Government, 2004):

Page 12: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 12

unifying strategic intelligence and operational planning against Islamist terrorists across the foreign-domestic divide with a National Counterterrorism Center;

unifying the intelligence community with a new National Intelligence Director; unifying the many participants in the counterterrorism effort and their knowledge in a

network-based information sharing system that transcends traditional governmental boundaries;

unifying and strengthening congressional oversight to improve quality and accountability; and

Strengthening the FBI and homeland defenders.

Now there is also a National Anti-Terrorism Center in the United States that works towards

fighting terrorism (United States Government, 2004).

This essay has described what hacking of memory and/or RAM means. This essay has

examined the common tools that hackers use to hack memory of computer devices, also detailing

two real-life examples of such tools in action. This essay has identified three best practices that

one should use to protect their computers from being hacked. Finally, this essay has analyzed the

significance of hacking in organizations and modern society.

Police need to be vigilant to have high moral standards and to maintain them regardless

of the daily corruption that they witness and could be affected by through their line of work. This

takes the strength and the stamina of a mind of steel, and this essay would advise that when a

police officer is feeling weak – take a vacation, regroup, recharge and come back to your work

refreshed and ready.

There also need to be strong police policies and protocol for disciplinary action in place

that would greatly deter police misconduct. If police knew that they would be treated in the eyes

of the law equally to those of the suspects in which they apprehend, they may then be greatly

deterred from performing any form of police misconduct. As it stands currently, often police are

not properly punished for their misdeeds in the eyes of the courtroom.

There also needs to be a proactive and constructive internal investigations unit that will

properly police the police. If the police cannot police themselves, which has proven to be true

time and time again, then it is imperative that high moral standing organizations are formed in

order to police the police when there is police misconduct.

References

Page 13: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 13

Brown Dennis, Carolyn and Chipman, Tere L. (2000). The Ethical Foundations of Criminal

Justice. New York: CRC Press.

D.K. (27 April 2015). “What the Cops Say.” The Economist. Washington: The Economist.

Grill, Karl. (11 March 2016). “Policing the USA.” USA Today. New York: USA Today.

Holloway, Philip. (7 May 2015). “What we learned about policing in America.” CNN. Atlanta:

CNN.

North Carolina State University. (2016). Ethics in Computing. Online: North Carolina. Retrieved

from https://ethics.csc.ncsu.edu/abuse/hacking/study.php

Peak, Ken. (2014). Policing in America: Challenges and Best Practices. New York: Pearson.

Riedel, B. (2016). Yale Global Online. New Haven, Connecticut: The MacMillan Center.

Retrieved from http://yaleglobal.yale.edu/content/world-after-911-part-i

Stoddard, Ellwyn. (1968). “Informal Code of Police Deviancy: A Group Approach to Blue-Coat

Crime.” Journal of Criminal Law and Criminology. New York: Taylor & Francis.

The Federal Bureau of Investigation. (2015). Major Computer Hacking Forum Dismantled.

Online: Washington. Retrieved from

https://www.fbi.gov/pittsburgh/press-releases/2015/major-computer-hacking-forum-

dismantled

The Federal Bureau of Investigation. (2015). Nine People Charged in Largest Known Computer

Page 14: The mission of the Department of Defense’s cyber strategy is Web view · 2016-07-06How police get hired for their jobs will be the first topic of discussion is the fact of racial

Preventing Terrorism in the United States 14

Hacking and Securities Fraud Scheme. Online: New York. Retrieved from

https://www.fbi.gov/newyork/press-releases/2015/nine-people-charged-in-largest-known-

computer-hacking-and-securities-fraud-scheme

United States Department of Defense. (2015). Cyber Strategy. Washington: Department of

Defense. Retrieved from http://www.defense.gov/Portals/1/features/2015/0415_cyber-

strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

United States Government. (2004). National Commission on Terrorist Attacks Upon the United

States. Washington: United States of America. Retrieved from http://www.9-

11commission.gov/report/911Report_Exec.htm

The United States Department of Justice. (2016). Reporting Computer, Internet-Related, or

Intellectual Property Crime. Online: Washington. Retrieved from

http://www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-

property-crime

Vick, Karl. (13 August 2015). “What Cops Say About Policing Today.” Time. New York: Time

Magazine.

Yoshida, S. (2006). 9/11 National Memory Survey on the Terrorist Attacks. New York: New

York University. Retrieved from http://911memory.nyu.edu/