Sources

Aviation security: 10 years after the 9/11 attacks. (n.d.). ALPA Issue Analysis, 1–8. Retrieved from http://public.alpa.org/portals/alpa/pressroom/inthecockpit/ALPAIssueAnalysis_10YearsAfter9-11Attacks.pdf

Callan, M. (2006). Companies use computer spyware to steal personal data. In S. A. Kallen (Ed.), At Issue: Are privacy rights being violated? (pp. 8–12). Farmington Hills, MI: Thomson Gale. (Reprinted from Spyware: How your personal data gets stolen online, Alternet, 2002, March 15)

Cannon, D. A. (2006). Companies use personal information to help customers. In S. A. Kallen (Ed.), At issue: Are privacy rights being violated? (pp. 13–17). Farmington Hills, MI: Thomson Gale. (Reprinted from The ethnics of database marketing: Personalization ad database marketing, The Information Management Journal, 36, 2002)

Cloud, J. (1999, November 28). The Columbine effect. Time.

Crowther, B. (1964, September 27). Man and the bomb. New York Times. Retrieved from ProQuest Historical Newspapers database.

Davis, D. W., & Silver, B. D. (2004). Civil Liberties vs. Security: Public Opinion in the Context of the Terrorst Attacks on America. American Journal of Political Science, 48(1), 28–46. Retrieved from EBSCOhost database.

Drew, C., & Wald, M. (2001, September 12). A day of terror: The airports; Security long a concern at United States airports. The New York Times.

Duggins, B. (2017, March 22). [Telephone interview].

History.com staff. (2009). Columbine high school shootings. Retrieved November 3, 2016, from History website: http://www.history.com/topics/columbine-high-school-shootings

Holland, G. (1999). The 1960s. San Diego, CA: Lucent Books.

Kallen, S. A. (Ed.). (2006). At Issue: Are privacy rights being violated? Farmington Hills, MI: Thomson Gale.

Kemp, R. L. (2012). Homeland Security in America: Past, Present, and Future. World Future Review, 28–33. Retrieved from EBSCOhost database.

Langer, G. (2017, March 13). Poll: Students on school violence. Retrieved May 8,
2017, from ABC News website: http://abcnews.go.com/GMA/
story?id=124889&page=1

May, E. T. (2011). Security against Democracy: The Legacy of the Cold War at Home. The Journal of American History, 939–957. Retrieved from EBSCOhost database.

Nasso, C. (2010). The dissolution of the Soviet Union. Farmington Hills, MI: Gale.

Norman-Bloodsaw v. Lawrence Berkeley Laboratory (9th Cir. Feb. 3, 1998).

Nucear war threat casts long shadow. (1970, January 4). Chicago Tribune. Retrieved from Chicago Tribune Historical Archive database. (Accession №19700104C012200007000025)

Pendergast, S., & Pendergast, T. (2002). Bowling, beatniks, and bell-bottoms (Vol. 4). Farmington Hills, MI: Gale.

Ridge, T. (Presenter). (2002, July 1). Homeland security: Building a strong foundation [Speech].

Ryan, K. V. (2003). Human events: Patriot act is right and just. Retrieved from ProQuest database.

Sykes, C. J. (2006). Employee privacy rights are under attack in the workplace. In S. A. Kallen (Ed.), At Issue: Are privacy rights being violated? (pp. 18–29). Farmington Hills, MI: Thomson Gale. (Reprinted from The end of privacy, 1999, New York, NY: St. Martin’s Press)

Taylor, A., & Steedman, S. (2003). The evolution of airline security since 9/11.

Texts of warsaw pact and unified arms accord. (1955, May 15). New York Times. Retrieved from ProQuest Historical Newspapers database.

U.S. Const. amend. IV,V,XIV.

U.S. unaware of weapon. (1964, September 16). New York Times. Retrieved from ProQuest Historical Newspapers database.

Valentine, R. (2012). American decades (Vol. 11). Detroit, MI: Gale.

--

--