1. فارسی
الف) کتابها
1. بابایی، حسن (1388)، جاسوسی از دیدگاه حقوق بینالملل، چ اول، تهران: گنج دانش.
2. پیمانی، ضیاءالدین (1380)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، چ پنجم، تهران: میزان.
3. د.سینگر، کورت (1948)، از کتاب سه هزار سال جاسوسی،گزیدهای از بزرگترین داستانهای جاسوسی در جهان.
4. ساریخانی، عادل (1384)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، قم: دانشگاه قم.
5. ضیائی بیگدلی، محمدرضا (1380)، حقوق جنگ (حقوق بینالملل مخاصمات مسلحانه، چ دوم، تهران: دانشگاه علامه طباطبایی.
6. گارو، رنه (1344)، مطالعات نظری و عملی در حقوق جزا، ترجمۀ کتاب Rene Garraud, Traite theorique et pratique du droit penal Francais, 1913 توسط سید ضیاءالدین نقابت، ج 3، تهران: ابنسینا.
7. گلدوزیان، ایرج (1385)، حقوق جزای اختصاصی، تهران: انتشارات دانشگاه تهران.
8. میر محمد صادقی، حسین (1385)، حقوق کیفری اختصاصی، جرائم علیه امنیت و آسایش عمومی، تهران: میزان.
9. ولیدی، محمدصالح (1384)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، تهران: دانشگاه پیام نور.
10. میلتون، کیت (1396)، دائره المعارف مصور تاریخ جاسوسی، ترجمۀ الهام شوشتریزاده، چ سوم، نشر سایان.
ب) مقالات
11.
زارع، محسن؛ قرهباغی،
ونوس (1394)، «تعارض میان جاسوسی و آزادی اطلاعات از منظر حقوق بینالملل بشر»،
فصلنامۀ مطالعات حقوق عمومی، دورۀ 45، ش 4.
12. شفیعی، یوسف (1397)، «جاسوسی حقوق بشردوستانه با رعایت حقوق بینالملل»، روزنامۀ وطن امروز، ش 2412، سهشنبه 21 فروردین 1397.
13. ضیایی، سید یاسر؛ محمدی مطلق، علیرضا (1394)، «ورود پهپادهای جاسوسی به قلمرو هوایی ایران از منظر حقوق بینالملل»، فصلنامۀ مطالعات راهبردی، سال هجدهم، ش 1 (پیاپی 67).
ج) منابع اینترنتی
14. رضایی، حامد، http://basiji-cpr.mihanblog.com/post/168
15. زمانی، محمدصادق (1386)،http://alef.ir/content/view/9473
16. نجفپور، محسن،
http://www.pajoohe.com/fa/index.php?Page=definition&UID=30736
17. مجادلۀ ترامپ و دانمارک بر سر خرید گرینلند https://www.irna.ir/news/
2. انگلیسی
A) Books
1. Babaei, Hassan, (2009), Espionage from the Perspective of International Law, 1st Ed., Ganj-e Daanesh Publications, Tehran, Iran (In Persian).
2. Garraud, Renee.,(1913), Traite theorique et pratique du droit penal Francais, translated by Neghaabat ziaaddin, Ibne Sina Publications, Vol. 3, Tehran, Iran (In Persian).
3. Goldoozian Iraj, (2006), Particular Criminal Law, Tehran University Press, Tehran (In Persian).
4. Keit, Milton., Picture Encyclopedia of the History of Espionage, translated by Shooshtarizade Elham., 3rd Ed., Saayaan Publications, Tehran, Iran (In Persian).
5. Kindred H.M et al., (1995), International Law, Chiefly as Interpreted and Applied in Canada .
6. Kish J., (1995), International Law and Espionage, Springer; 1ed.
7. Kurt D. S., (1948), Three Thousand Years of Espionage: An Anthology of the World's Greatest Spy Stories, New York, Prentice-Hall (In Persian).
8. MirMohammadSaadeghi, Hossein., (2006), Particular Criminal Law: Crimes against Security and Public Safety, Mizan Pub., Tehran, Iran (In Persian).
9. Oppenheim L., (1948), International Law, A Treatise, (vol.2, 7thed.,) and (1992), Oppenheim's International Law, vol.1 (parts 2 to 4),9thed.,).
10. Peimani, Ziaaddin.,(2001), Particular Criminal Law: Crimes against Security and Public Safety, Mizan Pub., 5th Ed., Tehran, Iran (In Persian).
11. Saarikhani Adel., (2005), Particular Criminal Law: Crimes against Security and Public Safety, Qom University Press, Qom, Iran (In Persian).
12. Tunnell J.E., (1990), Latest Intelligence: An International Directory of Codes Used by Governemnt, Law Enforcement, Military and Surveillance Agncies, 101.
13. Validi, MohammadSaleh., (2005), Particular Criminal Law: Crimes against Security and Public Safety, Payam-e Noor University Press, Tehran, Iran (In Persian).
14. Wolter D., (2006)و Common Security in Outer Space and International Law, United Nations Institute for Disarmament Research, Geneva, Switzerland.
15. Ziaei, Bigdeli MohammdReza., (2001), Laws of War: International Law of Armed Conflicts, 2nd Ed., Allame Tabatabaei University (In Persian).
Articles)
16. “Panama Papers: The Secrets of Dirty Money”,(2016-09-21) at http://panamapapers.sueddeutsche.de/en/
17. Baker C.D., (2004), “Tolerance of International Espionage: A Functional Approach”, in American University International Law Review, Vol. 19, Issue 5, pp . 1091-1113.
18. Baxter R.R.,(1951), “So-Called Unprivileged Belligerency: Spies, Guerrillas and Saboteurs”, 28 BYIL 323.
19. Betke C. and Horrall S.W.,(1999), “Canada's Security Service: An Historical Outline 1864-1966”, ix, cited in Mellon .J., Levolution du renseignement de securite au Canada, 2.
20. Bram L.L.(ed.), (1995), “Espionage”, Funk & Wagnalls New Encyclopedia[CD-ROM].
21. Brown Craig (1999), “Espionage in International Law: A Necessary Evil”, Faculty of Law, University of Western Ontario.
22. Cohen J., ; Kovar R., (1960), "L espionnag en temps de paix", 6 Annuaire francais de droit international 239.
23. Cohen M., (1948), “Espionage and Immunity: Some Recent Problems and Developments”, BYIL 404.
24. Deeks Ashley (2015), “An International Legal Framework for Surveillance”, Virginia Journal of International Law 291, Vol.55: 2.
25. Delupis, L., (1984), “Foreign Warships and Immunity for Espionage”, 78 AJIL 53.
26. Duncan Campbell, “Interception Capabilities 2000”, at http://www.gn.apc.org/ duncan/ ic2kreport.htm
27. Edmondson, L.S., (1972), “Espionage in Transnational Law”, 5 Vanderbilt Journal of Transnational Law 434.
28. Fleck D.,(2007), “Individual and State Responsibility for Intelligence Gathering”, Vol. 28, Michigan Journal of International Law, pp.687-709.
29. Forcese Craig, (2011), “Spies without Borders: International Law and Intelligence Collection”, Journal of National Security and Policy 179, Vol. 5.
30. French R. ; A. Beliveau, (1979), La GRC et la gestion de la securite nationale 7, cited in Levolution du renseignement de securite au Canada, 2.
31. Kapp M.,(2007), “Spying for Peace: Expanding the Absence of the Formal Regulation of Peacetime Espionage”, University of Chicago.
32. Lieber F. ; Hitchcock, (1911), “Instructions for the Government of the Armies of the United States in the Field” (1863) 100 General Orders par.88, cited in Halleck H.W., Military Espionage, 5 AJIL 590.
33. Shafiei, Yusef., (2018), “Humanitarian Espionage Consistent with International Law”, Vatan-e Emrooz Daily, No. 2412, Tuesday 21 Farvardin 1397, p. 12 (In Persian).
34. Smith J. H.,(2007), “State Intelligence Gathering and International Law: Keynote Address”, Symposium.
35. Wright Q., “Espionage and the Doctrine of Non-Intervention in Internal Affairs”, (1962) in R. Stanger ed., Essays on Espionage and International Law, 3.
36. Zare, Mohsen. and Gharabaaghi, Vetus., (2015), “Conflict between Espionage and Freedom of Information from the Viewpoint of International Law”, Quarterly Journal of Public Law, Period 45, Vol. 4, Winter 2015 (In Persian).
37. Ziaei, Seyyed Yasser., and Mohammadi Motlagh Alireza., (2015), “The Entrance of Drones into the Air Space of Iran from the Perspective of International Law”, Quarterly Journal of Strategic Studies, Year 18, Spring 2015, Vol 1(67) (In Persian).
C) Documents
38. Convention (IV) Respecting the Laws and Customs of War on Land and its Annex: Regulation Concerning the Laws and Customs of War on Land, the Hague, 18 October 1907), http://Diana.law.yale.edu/diono/db/4198-21.html.
39. Convention (IV) Relative to the Protection of Civilian Persons in Time of War, http://www.ifs.univie.ac.at/intlaw/konterm/vrkon-en/html/doku/gc-iv.htm.
40. Convention Relative to the Protection of Civilian Persons in Time of War.
41. Convention Respecting the Laws and Customs of War on Land.
43. ICJ Rep., (1980), United States Diplomatic and Consular Staff in Tehran, 24 May 1980: 3.
44. ICJ Rep. (1986), Military and Paramilitary Activities, 27 June 1986: 14, 65 and 123.
45. Prosecutor v. Tadic, Case No. IT-94-1-A, Appeal on the Merits, ICTY, 15 July1999: Parags 99-145.
46. PCIJ Advisory Opinion, (1931), PCIJ, Ser. A/B, No. 41.
47. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), http://www.ifs.univie.ac.at/intlaw/crkon-en/html/doku/gc-pi.htm.
48. UN Doc. A/56/10, 53rd GA Session, Suppl. No. 10, 2001.
49. United States v. Mcdonald, 265 Fed. 754: Annual Digest, 1919-1922, Case No. 298.
50. Verification Protocol of the Comprehensive Nuclear Test-Ban Treaty(CTBT), at https://www.ctbto.org/fileadmin/content/treaty/treatytext.tt.html
51. UN General Assembly Res. 2625, Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States, 24 October 1970.
D) Internet Cites
52. http://www.nytimes.com/1995/01/27/us/how-the-fbi-finally-caught-aldrich-ames .html?pagewanted=all&src=pm.
53. http://en.wikipedia.org/wiki/Edward_Lee_Howard
54. http://en.wikipedia.org/wiki/Edwin_P._Wilson
55. http://www.dadkhahi.net/wiki/index.php/%D8%AC%D8%A7%D8%B3%D9%8 8%D8%B3%D
56. http://www.edwardjayepstein.com/archived/spy.htm