These are the sources and citations used to research Assignment 2. This bibliography was generated on Cite This For Me on

  • Website

    Al-Alosi, H.

    Virtual child pornography could both help and hinder law enforcement

    2017

    In-text: (Al-Alosi, 2017)

    Your Bibliography: Al-Alosi, H., 2017. Virtual Child Pornography Could Both Help And Hinder Law Enforcement. [online] The Conversation. Available at: <https://theconversation.com/virtual-child-pornography-could-both-help-and-hinder-law-enforcement-82746> [Accessed 12 January 2020].

  • Website

    Cox, J.

    FBI Denies Making Dark Web Child Porn Site Run Faster

    2016

    In-text: (Cox, 2016)

    Your Bibliography: Cox, J., 2016. FBI Denies Making Dark Web Child Porn Site Run Faster. [online] Vice. Available at: <https://www.vice.com/en_us/article/3da7p9/fbi-denies-making-dark-web-child-porn-site-run-faster> [Accessed 12 January 2020].

  • Website

    Playpen (website)

    2019 - Wikipedia

    In-text: (Playpen (website), 2019)

    Your Bibliography: En.wikipedia.org. 2019. Playpen (Website). [online] Available at: <https://en.wikipedia.org/wiki/Playpen_(website)> [Accessed 12 January 2020].

  • Website

    Evans, R.

    5 Things I Learned Infiltrating Deep Web Child Molesters

    2015

    In-text: (Evans, 2015)

    Your Bibliography: Evans, R., 2015. 5 Things I Learned Infiltrating Deep Web Child Molesters. [online] Cracked.com. Available at: <https://www.cracked.com/personal-experiences-1760-5-things-i-learned-infiltrating-deep-web-child-molesters.html> [Accessed 12 January 2020].

  • Website

    Hadjimatheou, K.

    Policing the Dark Web: Ethical and Legal Issues

    2017

    In-text: (Hadjimatheou, 2017)

    Your Bibliography: Hadjimatheou, K., 2017. Policing The Dark Web: Ethical And Legal Issues. [online] Media4sec.eu. Available at: <http://media4sec.eu/downloads/d4-3.pdf.> [Accessed 12 January 2020].

  • Website

    Heller, M.

    FBI admits to using zero-day exploits, not disclosing them

    2015

    In-text: (Heller, 2015)

    Your Bibliography: Heller, M., 2015. FBI Admits To Using Zero-Day Exploits, Not Disclosing Them. [online] SearchSecurity. Available at: <https://searchsecurity.techtarget.com/news/4500260464/FBI-admits-to-using-zero-day-exploits-not-disclosing-them> [Accessed 12 January 2020].

  • Website

    Mützel, D.

    Meet the Hacker Who Busts Child Pornographers on the Dark Net

    2019

    In-text: (Mützel, 2019)

    Your Bibliography: Mützel, D., 2019. Meet The Hacker Who Busts Child Pornographers On The Dark Net. [online] Vice. Available at: <https://www.vice.com/en_uk/article/ywbmyb/meet-the-hacker-who-busts-child-pornographers-on-the-dark-net> [Accessed 12 January 2020].

  • Website

    Newman, L.

    How Leaked NSA Spy Tool 'EternalBlue' Became a Hacker Favorite

    2018

    In-text: (Newman, 2018)

    Your Bibliography: Newman, L., 2018. How Leaked NSA Spy Tool 'Eternalblue' Became A Hacker Favorite. [online] Wired. Available at: <https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/> [Accessed 12 January 2020].

  • Website

    O'Neill, S.

    Girl, 8, raped to order on the internet

    2001

    In-text: (O'Neill, 2001)

    Your Bibliography: O'Neill, S., 2001. Girl, 8, Raped To Order On The Internet. [online] Telegraph.co.uk. Available at: <https://www.telegraph.co.uk/news/uknews/1322551/Girl-8-raped-to-order-on-the-internet.html> [Accessed 12 January 2020].

  • Website

    Poulsen, K.

    If You Used This Secure Webmail Site, the FBI Has Your Inbox

    2014

    In-text: (Poulsen, 2014)

    Your Bibliography: Poulsen, K., 2014. If You Used This Secure Webmail Site, The FBI Has Your Inbox. [online] WIRED. Available at: <https://www.wired.com/2014/01/tormail/> [Accessed 12 January 2020].

  • Website

    Poulsen, K.

    Visit the Wrong Website, and the FBI Could End Up in Your Computer

    2014

    In-text: (Poulsen, 2014)

    Your Bibliography: Poulsen, K., 2014. Visit The Wrong Website, And The FBI Could End Up In Your Computer. [online] WIRED. Available at: <https://www.wired.com/2014/08/operation-torpedo/> [Accessed 12 January 2020].

  • Website

    Rumold, M.

    Playpen: The Story of the FBI’s Unprecedented and Illegal Hacking Operation

    2016

    In-text: (Rumold, 2016)

    Your Bibliography: Rumold, M., 2016. Playpen: The Story Of The FBI’S Unprecedented And Illegal Hacking Operation. [online] Electronic Frontier Foundation. Available at: <https://www.eff.org/deeplinks/2016/09/playpen-story-fbis-unprecedented-and-illegal-hacking-operation> [Accessed 12 January 2020].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join