[1] Abramson, J. M. (2005). Challenging Federal Wiretaps, Criminal Law Newsletter. The Colorado Lawyer, 34, 73.
[2] Ask, K. (2006). Criminal Investigations: Motivations, Emotions and Cognitions in the Process of Evidence. Doctoral Dissertation at Department of Psychology, Goteborg: Goteborg University.
[3] Bloss, W. (2007). Escalating US. Police Surveillance after 9/11: An Examination of Causes and Effects. Surveillance and Society, Special Issues on “Surveillance and Criminal Justice” Part 1, 4, 208-228.
[4] Byne, J., et al. (2011). Technological Innovations in Crime Prevention and Policing: A Review of Research on Implementation and Impact. Voor Belgie: Maklu-Uitgervers.
[5] Caremen, R. V. (2010). Criminal Procedure: Law and Practice (8th ed.). Boston, MA: Wadsworth, Cengage Learning.
[6] Cavoukian, A. (2008). Privacy and Video Surveillance in Mass Transit System: A Special Investigation Report. Information and Privacy Commissioner, p. 2.
[7] Cohen, S. A. (1982). Invasion of Privacy: Police and Electronic Surveillance in Canada. McGILL Law Journal, 27, 619-675.
[8] Council of Europe, Recommendation 10 of the Committee of Ministers to Member States on “Special Investigative Techniques” in Relation to Serious Crimes Including Acts of Terrorism, 2005, Para. 1.
[9] Del Carmen, R. V. (2009). Criminal Procedure: Laws and Practice (8th ed.). Belmont, CA: Wadsworth/Cengage Learning.
[10] Doyle, C. (2012). Wiretapping, Tape Recorders, and Legal Ethics: An Overview of Questions Posed by Attorney Involvement in Secretly Recording Conversation. Congressional Research Service, p. 1.
[11] Ferdico, J. N., et al. (2009). Criminal Procedure for the Criminal Justice Professional (10th ed.). Belmont, CA: Wadsworth/ Cengage Learning.
[12] Hall, D. E. (2004) Criminal Law and Procedure (4th ed.). Thomson Delmar Learning, West Legal Studies.
[13] Harfield, C. (2010). The Governance of Covert Investigation. Melbourne University Law Review, Vol.34.
[14] Herbert, L. C. (2011). Challenging the (Un)Constitutionality of Governmental GPS Surveillance. American Bar Association, Criminal Justice, 26, 11 p.
[15] Hewitt, M. (2008) Wiretapping: A Necessary for Effectively Combating Terrorism in the 21st Century. Senior Honors Thesis, Virginia: Honors Program of Liberty University.
[16] Isnard, A. (2001). Can Surveillance Cameras be Successful in Preventing and Controlling Anti-Social Behaviors? (p. 7). Australian Institute of Criminology.
[17] Kaplan, H. J. (2012). The History and Law of Wiretapping, ABA Sections of Litigation 2012 Section Annual Conference April 18-20, 2012: The Lesson of the Raj Rajarantnam Trial: Be Careful Who’s Listening.
[18] Klein, E. (2013). Freedom of Movement: International Protection. Max Planck Institute for Comparative Public Law, Oxford: Heidelberg and Oxford University Press.
[19] McCord, J. W. H., McCord, S. L., & Bailey, C. S. (2006). Criminal Law and Procedure for the Paralegal: A Systems Approach. New York: Thomson Delmar Learning.
[20] Mooneh, T. (2010). Special Investigation Techniques. Data Processing and Privacy Protection in the Jurisprudence of the European Court of Human Rights, Pace Int’l L. Rev. Online Companion, at 97, p. 106.
[21] Mullikin, A., & Rahman, S. M. (2010). The Ethical Dilemma of the U.S.A. Government Wiretapping. International Journal of Managing Information Technology (IJMIT), 2, 32.
[22] Pikowsky, R. A. (2002). An Overview of the Law of Electronic Surveillance Post September 11, 2001 (p. 605). Moscow: Law Library Journal, University of Idaho Law Library.
[23] Scheb, J. M. (2011). Criminal Law and Procedure (7th ed.). Boston, MA: Wadsworth, Cengage Learning.
[24] Scheimin, M. (2009). Report of the Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism. Human Rights Council, 13th Session, A/HRC/13/37.
[25] Sepulreda, M. et al. (2004). Universal and Regional Human Rights Protection: Cases and Commentaries. Costa Rica: University for Peace.
[26] Sepulveda, M. et al. (2004). Human Rights Reference Hand Book (3rd ed.). Costa Rica: University of Peace.
[27] Stutzer, A., et al. (2010). Camera Surveillance as a Measure of Counterterrorism? Economics of Security Working Paper 34, Berlin: Economic of Security.
[28] Taylor, N. (2011). A Conceptual Legal Framework for Privacy, Accountability and Transparency in Visual Surveillance System. Surveillance and Society, 8, 455-470.
[29] Tong, S., Bryant, R. P., & Horvath, M. A. H. (2009). Understanding Criminal Investigation (pp. 1-36). Wiley Blackwell, Hoboken, NJ: John Wiley and Sons Ltd.
[30] U.S. Congress, Office of Technology Assessment (1988). Criminal Justice, New Technologies and the Constitution (p. 1). OTA-CIT-366, Washington, DC: U.S. Government Printing Office.
[31] United Nations Conventions against Transnational Organized Crime, New York, 2004.
[32] United Nations Office on Drugs and Crime (2011). Criminal Intelligence: Manual for Analysis. New York.