Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,066 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
20 tabs
Copy links to clipboard
Copy
Open
The Good Judgment Project - Wikipedia
WORDij Semantic Network Tools
AnatoRef
fără titlu ☂
fără titlu ☂: Archive
Home | CEPA
Fab After Forty
stczztop - DeviantArt
Breakups: Long-Term vs. Short-Term Relationships - CollegeHumor Post
DeviantArt: More Like 100 Poses by ChaosAngelus
#pose - DeviantArt
Drawing References and Resources
Browse Templates | Microsoft Flow
C. Cassandra | Society6
17 Diagrams That Will Help You Draw (Almost) Anything
Google Search
cassandra calin - Google Search
Character Design References on Pinterest
1000+ images about Character Anatomy | Nose on Pinterest | Character design, Character design references and Nose drawing
Pins from oliviamargrafposta.carbonmade.com on Pinterest
3 tabs
Copy links to clipboard
Copy
Open
The Next Generation of Government CVE Strategies at Home
Building Resilience against Violent Extremism
Counter-Radicalization via the Internet
12 tabs
Copy links to clipboard
Copy
Open
SCIENCE HOBBYIST: Top Page
Science Experiments, Amateur Science demonstrations, projects: SCIENCE HOBBYIST
ELECTRONICS HOBBYIST
Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST
ELECTRONICS HOBBYIST: NEWSGROUPS
SCIENCE HOBBYIST: Ideas, additions
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
OPTICS, Surplus Electronics and list of science catalogs [SITE: SCIENCE HOBBYIST]
15 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
23 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
8 tabs
Copy links to clipboard
Copy
Open
Key Websites - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
Cyber - A Linkpack by Sara Citrenbaum
Research Resources - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
***** - A Linkpack by Sara Citrenbaum
719 tabs
Copy links to clipboard
Copy
Open
Advanced Analytic Techniques: Summary of Findings: Monte Carlo Simulation (4 out of 5 Stars)
Asymmetric weapons of war – The invention of sectarianism in the Middle East - American Herald Tribune
Confrontation heats up between Iran and Saudi Arabia: Iran's leader calls Saudi rulers small and puny satans - American Herald Tribune
Home - AllSource Analysis
Asia Pacific Conference
Apple's iOS 10.2 Contains a Number of New Emoji Including Face Palm, Fingers Crossed
Integrating ISR Data with Open Source Indicators (AIAA)
AIAA SPACE 2016 (AIAA)
Armed Forces Journal – Must-Reads
Armed Forces Journal – Hybrid vs. compound war
A Decision on the Palantir US Army Dust Up Looms : Stephen E. Arnold @ Beyond Search
New leak may show if you were hacked by the NSA | Ars Technica UK
Bizarre leaked Pentagon video is a science fiction story about the future of cities | Ars Technica
f85d5f50fd6e0132ef1a005056a9545d (900×184)
10 Awesome Brackets Extensions You Really Need
UN has reports IS using 1,000s as 'human shields' in Mosul
Searching Through Everything | Internet Archive Blogs
ESSA – accountability, indicators and analytics to drive informed decision making - SAS Voices
oaDOI: A New Tool for Discovering OA Content | Scholars Cooperative - Wayne State University Blogs
Google Maps Streetview Player animates any entered trip / Boing Boing
Brackets - A modern, open source code editor that understands web design.
BREACH OR CLEAR | Jesterscourt
TextExpander: communicate smarter (and save 50%) - BrettTerpstra.com
WALTR 2 (+Giveaway!) - BrettTerpstra.com
TabLinks 3.0 - BrettTerpstra.com
BrettTerpstra.com
Archives - BrettTerpstra.com
C2COE | Catalysing C2
Session 4: Future Key C4I Technologies | Center of Excellence in Command, Control, Communications, Computing and Intelligence | George Mason University
Moldova Update: Contested Elections Threaten to Destabilize Eastern Europe
Iraq Control of Terrain Map: October 26, 2016
MetaTool | CaptureBites
Checklists.com — Concise advice for living longer & better
Disparity Between Fusion Center Web Content and Self-Reported Activity
Medical Laboratory and Biomedical Science: Blood type compatibility chart
System Dynamics Conference
CrisisNET
Prof. Tunnard's Social Network Analysis and Social Media Classes
Blue Horizons briefings, papers, reports, publications
Building the Ibrahim Index of African Governance | News & Analysis | Data Driven Journalism
Counting conflict | News & Analysis | Data Driven Journalism
dblp: ISCRAM-med 2015
The Writer Who Was Too Strong To Live
A Miniature Radar Enables Smart Phones To See Through Walls | Defense Update:
Nano Sensors Enhancing Warfighters’ Situational Awareness | Defense Update:
Online Markdown Editor - Dillinger, the Last Markdown Editor ever.
Doug Ross @ Journal: Larwyn's Linx: FBI Agents Say Comey ‘Stood In The Way’ Of Clinton Email Investigation
TraffTrend
Adversarial Data Mining
Acing the IOC Game
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Exploring the role of sequential computation in distributed systems: motivating a programming paradigm shift
Actor profiling in virtual execution environments
From Cybersecurity to Collaborative Resiliency
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
Using the Bulk Import tool | Alfresco Documentation
Alfresco One 5.1 | Alfresco Documentation
Alfresco Documentation | Alfresco Documentation
Alfresco Support Handbook | Alfresco Documentation
Portland Resources for Dorks | DorkbotPDX
SBA - Dynamic Small Business Search
Data Resources: Conflicts, Wars, Terrorism
Exploiting Time-Derived, Activity-Based Intelligence « Earth Imaging Journal: Remote Sensing, Satellite Images, Satellite Imagery
Electrospaces.net: NSA's TAO Division Codewords
Online social networks and offline protest | EPJ Data Science | Full Text
Event Registry
CIA’s CREST Leaves Cavity in Public Domain |
New START Data Shows Russian Warhead Increase Before Expected Decrease |
Pakistan’s Evolving Nuclear Missile Infrastructure |
U.S. Intelligence Budget Data
Although it's never had to deploy, DoD's CBRN task force is national 'insurance policy' - FederalNewsRadio.com
DOD adding a chief innovation officer
7 Camera Apps Better Than the One on Your Phone
How to Stay on the Strongest Wi-Fi Network at All Times
Foreign Military Studies Office
Information Warfare in the Second (1999-Present) Chechen War: Motivator for Military Reform?
FotoForensics
Body Face References favourites by FreakyComics on DeviantArt
Free GIS Datasets - Categorised List
Your Pick For Best Kitchen Trash Can: Simplehuman
2015 Brainhack Proceedings | GigaScience | Full Text
New App Turns Play-Doh Creations Into Animated Characters
Apps News, Videos, Reviews and Gossip - Gizmodo
The Deadliest Volcano in the United States Just Got Really Weird
Misc. Resources favourites by GlowingLimes on DeviantArt
greta's gouge: Friday's Miscellany 10-28-2016
GroupLab - Publications » 2010-RethinkingRFID.CHI
400 Free Tools & Resources for Entrepreneurs and Startups
New - Growth Supply
Free Productivity Tools: Resources for Entrepreneurs & Startups
Stanford H4D - Spring 2016 - Home
DOD/IC Problems - Stanford H4D - Spring 2016
Teaching Team - Stanford H4D - Spring 2016
Explosives cause concern in Hanover - News - Hanover Mariner - Hanover, MA
The Jester Hacker: 5 Fast Facts You Need to Know | Heavy.com
heckyesmarkdown.com/go/
htt
IEEE Xplore Document - Multi-level fusion of hard and soft information
IEEE Xplore Document - Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events
IEEE Xplore Document - Towards Automatic Persona Generation Using Social Media
IEEE Xplore Document - A testbed for integrated fault diagnosis and cyber security investigation
IEEE Xplore Document - Smartphone based car-searching system for large parking lot
IEEE Xplore Document - A Mathematical Approach to Gauging Influence by Identifying Shifts in the Emotions of Social Media Users
IEEE Xplore Document - Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective
Illuminat3: BREAKING: th3j35t3r "The Patriot Hacker" To Be Unmasked
Imgur: The most awesome images on the Internet
PNNL: IN-SPIRE™ - Home
InternetAWACS | Jesterscourt
Internet of Things (IoT) Scanner - BullGuard
Welcome | The Internet, Policy & Politics Conferences
IPTC Standard - IPTC
ISW Blog: The Campaign for Mosul: October 25-28, 2016
Special Issue: Non-state Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
poses favourites by jigglytut on DeviantArt
Do Jews and Arabs Differ in Their Fear of Terrorism and Crime?
PLOS ONE: Demographics, Management Strategies, and Problems in ST-Elevation Myocardial Infarction from the Standpoint of Emergency Medicine Specialists: A Survey-Based Study from Seven Geographical Regions of Turkey
PLOS ONE: Search Results
Tidy Text Mining with R – data science ish
Bases_Poses favourites by Kastagir on DeviantArt
Tonight in Santa Fe: The Power of Uncertainty and Contradiction in Mathematics | KSFR
Law Enforcement Intelligence Units | Trust, Integrity, and Communication---Your Voice at the National Level
Babel Street, Inc. | Law Enforcement Intelligence Units
Find Articles - Corrections - LibGuides at Lorain County Community College
Electromagnetic tunnel detection using a magnetic-dipole source in three-dimensional space : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Depth estimation of voids using backscattered surface waves : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Lifehacker - Tips and downloads for getting things done
Batch Resize Images in OS X With This Automator Script
Findo Searches All Your Cloud Data to Help You Find a File Anywhere
How to Quickly Research All Your Local Elections
Microsoft Flow Is Out of Beta, Ready to Challenge IFTTT's Automation
Stop Using iCloud
App directory News, Videos, Reviews and Gossip - Lifehacker
The Always Up-to-Date Guide to Building a Hackintosh (macOS Sierra)
The Calendar Service in macOS Server Is a Surprisingly Robust Alternative to Commercial Apps
This Week's Top Downloads
You Can Now Use LastPass On Multiple Devices for Free
Survey on using constraints in data mining | SpringerLink
SIP and SDP based content adaptation during real-time video streaming in Future Internets | SpringerLink
Mining tag-clouds to improve social media recommendation | SpringerLink
Multithreading cascade of SURF for facial expression recognition | SpringerLink
Information Fusion for Cyber-Security Analytics - Springer
Information Systems for Crisis Response and Management in Mediterranean Countries - Springer
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection - Springer
Sensing Social Media: A Range of Approaches for Sentiment Analysis - Springer
A Study on Security and Surveillance System Using Gait Recognition - Springer
Dynamic User Attribute Discovery on Social Media - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats - Springer
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Springer
An Architecture for processing of Heterogeneous Sources - Springer
Research of Conventional Data Mining Tools for Big Data Handling in Finance Institutions - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Missing and Spurious Interactions in Heterogeneous Military Networks - Springer
Overview of Text Visualization Techniques - Springer
Data Model - Springer
Visualizing Sentiments and Emotions - Springer
AI & SOCIETY - Springer
European View - All Volumes & Issues - Springer
How Twitter Is Changing Modern Warfare - The Atlantic - Linkis.com
LIWC | Linguistic Inquiry and Word Count
MakeAppIcon - Generate app icons of all sizes with a click!
Makerbook - The best free resources for creatives.
DEF 14A
Twitter is now worth less than its Chinese clone
Twitter cuts ties with another social media surveillance company
Medical Xpress - Violence and Gender
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
They Die to Kill: A Brief History and Analysis of Suicide Terrorism
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
Find Out If One of Your Devices Helped Break the Internet | Motherboard
How Anonymous and Other Hacktivists Fight ISIS Online | Motherboard
Countering Gray-Zone Hybrid Threats: An MWI Report - Modern War Institute
Revisiting an Afghan Battlefield in Virtual Reality - Modern War Institute
Felling ISIS and Facing Reality About Terrorism | The National Interest Blog
Wargaming the Third Offset Strategy > National Defense University Press > Joint Force Quarterly 83
Researchers watch in 3D as neurons talk to each other in a living mouse brain | Newswire
Nightmare Machine
Is Evan Kohlmann Qualified to Be the Government’s Expert Witness for Terrorism Cases? -- New York Magazine
System Dynamics Review - Volume 29, Issue 3 - July/September 2013 - Wiley Online Library
System Dynamics Review - - Wiley Online Library
Event Prediction With Learning Algorithms—A Study of Events Surrounding the Egyptian Revolution of 2011 on the Basis of Micro Blog Data - Boecking - 2015 - Policy & Internet - Wiley Online Library
Social Media and the Diffusion of Information: A Computational Experiment on the Emergence of Food Scares - Desmarchelier - 2016 - Kyklos - Wiley Online Library
DARPA - Open Catalog
Open Data Barometer
OpenRefine
OSINT Framework
Oryon Portable - OSINTINSIGHT | Advanced OSINT Tools
Special Forces Think Pieces « Public Intelligence Blog
Isis mobile wallet abandons name to militant group
46,000 Twitter accounts linked to Islamic State: study
Student studies Twitter tactics of ISIS supporters
Cybersecurity expert analyzes Anonymous' hacking attacks on ISIS
ISIS propaganda collected in real time
Microsoft to address UN on 'digital terror'
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
Israel firm wants super-efficient engine to power car revolution
New 'digital life' initiative aims to create 3-D models of all living creatures
Researchers create technology to detect bad bots in social media
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 • CAD 300.81 - PicClick CA
HP 8640B Signal Generator Agilent - Partially Working OPT 001,002,003 • CAD 534.77 - PicClick CA
Hp 8640B Singnal Generator • CAD 334.17 - PicClick CA
HP Agilent 8640B Signal Generator Options 001 003 • CAD 534.77 - PicClick CA
PopClip Extensions
Terrorism, Technology and Translation
Practical Cryptography
Considerations for developing technologies for an integrated person-borne IED countermeasure architecture | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX | DSS10 | SPIE Proceedings | SPIE
STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII | DSS09 | SPIE Proceedings | SPIE
A review of sensor data fusion for explosives and weapons detection | Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XIV | DSS13 | SPIE Proceedings | SPIE
Improved colour matching technique for fused nighttime imagery with daytime colours | Electro-Optical and Infrared Systems: Technology and Applications XIII | ESD16 | SPIE Proceedings | SPIE
A support vector machine approach to the automatic identification of fluorescence spectra emitted by biological agents | Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII | ESD16 | SPIE Proceedings | SPIE
Enhancing Capillary-Driven Flow for Paper-Based Microfluidic Channels - ACS Applied Materials & Interfaces (ACS Publications)
QCRI - Resources Detail
Carnegie Mellon made a special pair of glasses that lets you steal a digital identity — Quartz
Jeffrey Friedl's Image Metadata Viewer
Hacking Drones … Overview of the Main Threats
RootAbout
The Event Camera Dataset
Schema-Root.org Encyclopedia of Current Events
Tagebücher der Wissenschaft » SciLogs - Wissenschaftsblogs
Using publicly visible social media to build detailed forecasts of civil unrest | Security Informatics | Full Text
The Effect of Category Spanning on the Lethality and Longevity of Terrorist Organizations
Psychology « SIGs of the System Dynamics Society
Advice from SOF on the Use of SOF for the Next Administration | Small Wars Journal
Fire, Film, Tweet: The Taliban’s New Way of War | Small Wars Journal
Latest Joint Force Quarterly Now Online | Small Wars Journal
Military Analysts: Islamic State Would Not Survive Fall of Raqqa | Small Wars Journal
Bespredel and the Conduct of Russian “Hybrid Operations” | Small Wars Journal
ISIS: An Adaptive Hybrid Threat in Transition | Small Wars Journal
The Islamic State is a Hybrid Threat: Why Does That Matter? | Small Wars Journal
Analytics and Predictive Models for Social Media
Politically Polarized Online Groups and their Social Structures formed around the 2013-2014 crisis in Ukraine | Social Media Lab
Social Media Lab | "Making sense of a networked world"
Apps | Social Media Lab
Netlytic – Social Networks & Text Analyzer | Social Media Lab
PoliDashboard | Social Media Lab
Social Media Research Toolkit | Social Media Lab
“A Mathematical Approach to Identifying and Forecasting Shifts in the Mood of Social Media Users” | Social Media Lab
Social Media & Scholars | Social Media Lab
Political Polarization on Social Media | Social Media Lab
Text Mining and Social Network Visualizations | Social Media Lab
RFID + Camera + Lock = Smart Mailbox - IEEE Spectrum
Open Access SPIE Publications -- SPIE.org
Signal Processing, Sensor/Information Fusion, and Target Recognition XXV| Publications | Spie
Center of Excellence collaboration examines critical infrastructure | START.umd.edu
Startup Stash - Curated resources and tools for startups
Indian Strategic Studies: Not Cleared for Takeoff: Lessons Learned from the AWG’s Efforts to Counter the Use of Commercially Available UAS
Indian Strategic Studies: The Apps They Carried: Software, Big Data, and the Fight for Mosul
Indian Strategic Studies: ISIS: An Adaptive Hybrid Threat in Transition
Indian Strategic Studies
studies.aljazeera.n
Salmon Run: Keyword Extraction with KEA
The local projects that are making police complaint data open and accessible - Sunlight Foundation Blog
Mendeley | Sorry, there was a problem syncing your ...
2016 Annual Visitor Survey
Tampermonkey • Home
CIA to put millions of declassified documents online | TheHill
Home - The Iran Project
ISIS uses booby trapped drone to kill two Kurdish fighters, injure others | The Tech Portal
Threat Knowledge Group
The 30 Most Influential People on the Internet | TIME
Green’s, the Most Bodacious Slang Dictionary Ever, Just Went Online | TIME
Monthly Newsletter
Save and organize your most-used browser tabs into lists: Toby T5 - Top Free Tools for Communication Professionals
Social media-driven propaganda: in the crosshairs of the black flag.(Social Media-Driven Propaganda)(Essay) - Version details - Trove
The Ukraine Crisis Timeline
Yahoo launches an app to help you find its bots | VentureBeat | Bots | by Khari Johnson
Addicaid Is an App and Social Network to Help You Find Treatment and Recover from Addiction
War News Updates: Afghanistan War News Updates -- October 26, 2016
War News Updates: An Analysis On The Afghan War
War News Updates: Military And Intelligence News Briefs -- November 1, 2016
War News Updates: US Coast Guard Seizes A Narco Sub Laden With $73 Million Worth Of Cocaine
Time for Washington to Amp up the Power to Coerce
webdesignrepo - a compact list of helpful webdesign links
Preserving and Extending Knowledge Through the Digital Yiddish Theater Project | WUWM
scrapetools.com - scrapetools Resources and Information.
2017 Directory of Directories by Marcus P. Zillman, M.S., A.M.H.A.
Choosing an RF Signal Generator
What Twitter Moments Means for Small Businesses | SocialTimes
Superforecasting for the Farm | Successful Farming
Isis weaponised consumer drones | Android OMG
This Free Tool Takes 3D Models into VR with One Click | ArchDaily
Topics | 2016 ARL Open Campus Open House
Home | U.S. Army Research Laboratory
Information Operations, Warfare, Info Ops, Infowar, Cyberwar
Hewlett-Packard 8640B Signal Generator
HP Signal Sources
Russia: Hidden chips 'launch spam attacks from irons' - BBC News
Mosul battle: Four ways IS is fighting back - BBC News
OHSU gets pieces of up to $90M of Defense Department trauma research - Portland Business Journal
Congratulations, Your Genius Patent Is Now a Military Secret - Bloomberg
Used and New Oscilloscopes For Sale | Used and New Test Equipment | BMI Surplus
FIRST LISTEN - New Lin-Manuel Miranda Song 'How Far I'll Go' from Disney's MOANA!
Review Roundup: FALSETTOS Opens on Broadway
VIDEO: Kelly Ripa, Matt Bomer & More Channel HAMILTON on Special Halloween LIVE
CISE Publications Database | Center for Information & Systems Engineering
UB offers industry, researchers new tool for analyzing big data - University at Buffalo
Russia is preparing for nuclear war - Business Insider
Intelligence Services Capabilities | CACI
Crime alerts and offender registry app for your Apple Watch and iphone - Computer Business Review
ISIL driven out of Bartella, fighting continues elsewhere near Mosul | CCTV America
Home
The Stroz Friedberg Cyber Brief — Center on National Security
The Stroz Friedberg Cyber Brief — Center on National Security
James Clapper reflects on lessons learned over his six years as Director of National Intelligence and discusses critical intelligence concerns facing the next U.S. president. - Council on Foreign Relations
Checkaflip - Buy Low, Sell High
World of Sensors Highlights Pacific NW Semiconductor Industry | JB's Circuit
CIDOB - Barcelona Centre for International Affairs
CIDOB - US Presidential Election. What Scenarios for the World after Obama?
TD Intelligence Aggregation System • Circinus
TD Intelligence Aggregation System • Circinus
Contracts • Circinus
137 öğretim görevlisi hakkında gözaltı kararı - CNN TÜRK - tarafsız güvenilir haberler
WORDij
Content analysis and text analysis resources: bibliographies, research, software, electronic texts
Control Alt Achieve: Google Save - Your new home for saved images and links
convertcsv.com - Convert CSV To JSON, XML, SQL, ...
CSV Templates
Iran News Round Up - November 1, 2016 | Critical Threats
Iran News Round Up - October 31, 2016 | Critical Threats
Update and Assessment: October 26, 2016 | Critical Threats
Crow vs Crow | Olivier Terrien
SET-048 Information-Centric Sensor Management
SCI-158 Systems, Concepts And Integration Methods And Technologies For Defence Against Terrorism
SET-166 Signature Management System for Underwater Signatures of Surface Ships
SET-158 Disposable Multi-Sensor Unattended Ground Sensors Systems for Detecting Personnel
SET-161 Leading Body for the C-IED LTCR
SET-163 Aspects of Multi-Parameter Radar ATR in Complex Environments
SET-174 EO-TDA Modeling
SET-181 Metamaterials for Defense and Security Applications
IST-106 Information Filtering and Multi-source Information Fusion
IST-110 Visualization for Analysis
Russian Analytical Digest (RAD) – Center for Security Studies | ETH Zurich
Resources – Center for Security Studies | ETH Zurich
Apple Music price drop might fuel subscription surge
Daesh Daily - An Update On Daesh Activities
How to Memorize a Speech [Infographic] | Daily Infographic
US intelligence agency to 'foresee news' before it happens using Twitter | Daily Mail Online
US military hopes to use artificial intelligence to create cybersoldiers and help fly its F-35 jets | Daily Mail Online
Experts reveal the secretive war apps being used to defeat ISIS in Mosul | Daily Mail Online
Hallmark Envisions Real-Time Space Command and Control
Social Media in Strategic Communication (SMISC)
Saudi Arabia vs. Iran: Predominance in the Middle East | Foreign Policy Journal
Data Science Toolkit
Deep Web Research and Discovery Resources 2016
'Unprecedented' Challenge in Countering Adversarial Propaganda, Official Says > U.S. DEPARTMENT OF DEFENSE > Article
DoD Chemical-Biological Program has a Global Mission > U.S. DEPARTMENT OF DEFENSE > Article
Centcom Counters ISIL Propaganda > U.S. DEPARTMENT OF DEFENSE > Article
Carter to Implement 3 Recommendations from Defense Innovation Board > U.S. DEPARTMENT OF DEFENSE > Article
> U.S. DEPARTMENT OF DEFENSE > Contract View
> U.S. DEPARTMENT OF DEFENSE > Contract View
Special Report: Force of the Future
Resources
Defense One
Counter-siege in Aleppo; ISIS gathers human shields in Mosul; Marines want radio-hunting mini-missiles; Refueling F-35s from V-22; and a bit more... - Defense One
The Military’s Tech Matchmaker Is Getting Ready to Open Its Wallet - Defense One
The CIA Says It Can Predict Social Unrest as Early as 3 to 5 Days Out - Defense One
Echoes of Future War: How the Fight for Mosul Will Change IED Science - Defense One
The Marines Want Mini-Missiles That Hunt for Specific Radio Signals - Defense One
The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works - Defense One
State of the Art - Demos
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 | eBay
eCrow Newsletter
Sovereign Intelligence LLC | EMIA
Russian Expat Founds CrowdStrike to Guard Against Russian Email Hackers - Who Is Dmitri Alperovitch?
Electronic Warfare | Information Operations | Association of Old Crows Resource Guide
Apple iOS 10.1 Has A Nasty Surprise
Apple iOS 10.1 Has A Nasty Surprise
Free Geek – Computer/Technology Reuse, Education, Recycling & Sales
GifCities
Globalytica
What’s Next in Government: 2017 & Beyond - Management - GovExec.com
Introducing RootAbout - The Hacker Factor Blog
Catching Viral Photos - The Hacker Factor Blog
HACKMAGEDDON – Information Security Timelines and Statistics
th3j35t3r – HACKMAGEDDON
薄毛に悩むあなたの為のパーフェクト医薬品プロペシア!
Healthcare Consultancy Group - Our Brain Trust
Al-Qaeda Still Threatens Europe: How the U.S. Can—and Should—Help
CrimeStat Spatial Statistics Program - Version 3.0
Political Finance Database | International IDEA
Sangaris Operation: A Case Study in Military Intervention Limited | IFRI - French Institute for International Relations
Rolopanel: Tracking Game Behaviour through Mobile Analytics: Media and Communication IS&T Journal Article | IGI Global
Free JPG Image Compressor Software: JPEG Archive
Intelligence Assessments, Politicization, and Denialism ⋆ Intelligence Analyst Careers
Databases, Gateways, Search Engines, Libraries, and Educational Insitutions
How can big data and smart analytics tools ignite growth for your company? - Inter Sources
International Society for Photogrammetry and Remote Sensing
ISPRS Ornagebook: Working Groups
Recent Information Fusion Articles - Elsevier
Meteorologist concerned about radar gap along southern Oregon co - KPTV - FOX 12
American vigilante hacker sends Russia a warning
Accurint® Virtual Crime Center - LexisNexis®
Islamic State continues to plot against the West, US military warns | The Long War Journal
Islamic State recognizes oath of allegiance from jihadists in Mali | The Long War Journal
Analysis: US military assessment of Taliban control of Afghan districts is flawed | The Long War Journal
Status Report on the Iraqi/Kurdish Mosul Offensive - Matthew Aid
Federal Court Says Rules Barring NY Police... - Matthew Aid
IJGI | Free Full-Text | Context-Aware Location Recommendation Using Geotagged Photos in Social Media | HTML
Sensors | Special Issue : New Paradigms in Cyber-Physical Social Sensing
Sensors | Special Issue : UAV-Based Remote Sensing
Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary
Russia's Drills Update
Russia This Week – October 22-30, 2016
Palestinian Social Media Reacts To Shooting Attack At Beit El Carried Out By Palestinian Policeman: Praise For Attacker, Calls For Other Palestinian Security Personnel To Carry Out Further Attacks
WG 32 Special Operations and Irregular Warfare
Inside the CIA's (Sort of) Secret Document Stash | Mother Jones
Joss Whedon Explains Why Donald Trump Is America's Scariest Big Bad | Mother Jones
I Went Undercover With a Border Militia. Here's What I Saw. | Mother Jones
A Veteran Spy Has Given the FBI Information Alleging a Russian Operation to Cultivate Donald Trump | Mother Jones
Home : Human Genetic Variation
Nature Communications
NDC - News
Information Operations Matters - University of Nebraska Press
Netvibes Decision-Making Dashboards
White House: Small satellites bring “Moore’s Law” into space | Network World
The Russian Hacking Whodunnit
What IARPA Knows About Your Canceled Dinner Reservation - Nextgov.com
Try out this open source tool for editing video and audio transcripts » Nieman Journalism Lab
Predictive Policing Research
AIJ 2011 to Present - National Military Intelligence Association
NoCode - A curated directory of resources, tools & hacks for non-techs
Free Business / Domain Name Generators - NoCode
NSA Playset
DRIZZLECHAIR - NSA Playset
SLOTSCREAMER (PCI) - NSA Playset
Act Now to Deter the Next Nuclear Smuggling State | NTI
The Nuclear Threat | NTI
Cuomo Tours State to Highlight Economic Development Strategy - The New York Times
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - The New York Times
Pentagon Confronts a New Threat From ISIS: Exploding Drones - The New York Times
The Pentagon’s ‘Terminator Conundrum’: Robots That Could Kill on Their Own - The New York Times
N.S.A. Appears to Have Missed ‘Big Red Flags’ in Suspect’s Behavior - The New York Times
Page No Longer Available
The 282 People, Places and Things Donald Trump Has Insulted on Twitter: A Complete List - The New York Times
Speaker Bios | Technology Transfer & Business Development | OHSU
Intelligence, Surveillance and Reconnaissance Thrust - Office of Naval Research
Sensai Raises $900K To Help Data Scientists Query Unstructured Data | TechCrunch : Related Articles | OOYUZ
OHSU's $1 billion investment in early detection cancer research will fuel economy | OregonLive.com
Oregon Technology Development Partners
Microsoft Open Sources Cognitive Toolkit | News & Opinion | PCMag.com
US ARMY PEO STRI: Simulation, Training and Instrumentation - Product Manager for Special Operations Forces Training Systems (PM - STS)
Intelligence Electronic Warfare Tactical Proficiency Trainer (IEWTPT)
Analytic Tools and Techniques | pherson.org
ESPN Sport Science Shows Lion King Dancers Match Top Athletes | Playbill
Network dismantling
PNNL: News - State's three largest public research institutions to increase collaboration
Rise Of The Drones | Popular Science
The Latest Anti-Drone Weapon Is A Pumpkin Cannon | Popular Science
Thermobaric Bombs And Other Nightmare Weapons Of The Syrian Civil War | Popular Science
How To Detect Nuclear Warheads Without Revealing Their Secrets | Popular Science
West Point Cadets Are Shooting Down Drones With Cyber Rifles | Popular Science
FOIA Wiki launches in beta – Poynter
Predata
Predata - Products
Data Mining for Predictive Social Network Analysis
Predict Crime | Predictive Policing Software | PredPol
Predictive Policing For Crime Analysts | PredPol
Command & Control Apps
Russian Propaganda Is Pervasive, and America Is Behind the Power Curve in Countering It | RAND
Time to Bury Plans for Counterterrorism Cooperation with Russia in Syria | RAND
Al Qaeda's Ruthless Pragmatism Makes It More Dangerous Than the Islamic State | RAND
Checklist for a U.S.-Russia Cyberwar | RAND
Driving to Safety: Autonomous Vehicle Questions, Answered | RAND
Q-DART Toolset - Decision Support Analysis | RAND
The Power to Coerce: Countering Adversaries Without Going to War | RAND
Smarter Power, Stronger Partners, Volume I: Exploiting U.S. Advantages to Prevent Aggression | RAND
Investing in the Fight: Assessing the Use of the Commander's Emergency Response Program in Afghanistan | RAND
Resource-Constrained Spatial Hot Spot Identification | RAND
Estimating the Value of Overseas Security Commitments: An Interactive Visualization | RAND
YPG Imposes Compulsory Recruitment, Again · Raqqa is Being Slaughtered Silently
Sacred Violence Industry, ISIS and Hezbollah · Raqqa is Being Slaughtered Silently
The Rudeness of the Popular Mobilization Forces and ISIS Systematic Stupidity · Raqqa is Being Slaughtered Silently
Documents show Islamic State obsessions: beards and concubines | Reuters
Why be jihadist? Public intellectuals' blind spot for Islamist terrorism | Demant | Malala
Inside the Artificial Intelligence Revolution: A Special Report, Pt. 2 - Rolling Stone
Compare Your County to the 3,143 Others in the U.S. - Route Fifty
Home - Schafer Corporation
A simple analytical platform based on thin-layer chromatography coupled with paper-based analytical device for determination of total capsaicinoids in chilli samples
Combat utility prediction
Smartphone-based personalized blood glucose prediction
IFAC-PapersOnLine | Vol 49, Iss 16, Pgs 1-480, (2016) | ScienceDirect.com
The Team Payam Banazadeh M.S
Steve Blank’s Presentations on SlideShare
Steve Blank presentations channel
Steve Blank presentations channel
USASOC Talks - Read
United States Special Operations Command (USSOCOM) - Home
Lincoln Group: External Links - SourceWatch
sovereign | Advisory Board
sovereign | SI Reconnaissance
A Lesson of Military Tactics Failing To Keep Up With Technological Change
SPIEGEL ONLINE - Aktuelle Nachrichten
Battle For Mosul Begins in Iraq Against Islamic State - SPIEGEL ONLINE
Engineering eBooks | Springer
Terrorism and Extremist Violence in the United States (TEVUS) Portal Introduction and Demonstration: 12/15/16 | START.umd.edu
Computational Social Science: Understanding terrorist attacks on Twitter | START.umd.edu
New tools and trainings for security practitioners and scholars | START.umd.edu
Disparity Between Fusion Center Web Content and Self-Reported Activity | START.umd.edu
Why Be Jihadist? Public Intellectualls' Blind Spot for Islamist Terrorism | START.umd.edu
StratCom | NATO Strategic Communications Centre of Excellence Riga, Latvia
Academic journal “Defence Strategic Communications” | StratCom
Social media’s role in ‘Hybrid Strategies’. Author: Thomas Elkjer Nissen | StratCom
Surplus Shed
System Dynamics Society
System Dynamics Review Articles
Waging Cyber War the American Way: Survival: Vol 57, No 4
Why the “Sacred” Is a Better Resource Than “Religion” for Understanding Terrorism: Terrorism and Political Violence: Vol 28, No 5
Terrorism and Political Violence: Vol 28, No 5
Journal of Policing, Intelligence and Counter Terrorism: Vol 11, No 2
Artifically intelligent ‘judge’ developed which can predict court verdicts with 79 per cent accuracy
Stephen Hawking says artificial intelligence could be humanity's greatest disaster
Perspectives on Terrorism
Involvement Mechanisms of Jihadist Networks | de Bie | Perspectives on Terrorism
‘Criminalised’ Islamic State Veterans – A Future Major Threat in Organised Crime Development? | Gallagher | Perspectives on Terrorism
IS and its Predecessors: Violent Extremism in Historical Perspective | de Graaff | Perspectives on Terrorism
Watchlisting | Duncan | Perspectives on Terrorism
Bibliography: Terrorism and the Media (including the Internet) (Part 3) | Tinnes | Perspectives on Terrorism
Vol 10, No 5 (2016)
Hewlett Packard 8656B/8657A/8657B RF Signal Generators, Refurbished HP Agilent Hewlett Packard - Used Test Equipment at Test Equipment Depot
The Shia Power Brokers of the New Iraq - The Atlantic
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
From Whitewater to Benghazi: A Primer on Bill and Hillary Clinton Scandals - The Atlantic
ISIS Has a Drone Strategy Too - The Atlantic
AT&T Is Spying on Americans for Profit - The Daily Beast
The Insane D.I.Y. Weapons of the ISIS War - The Daily Beast
Shop — The Lights of Broadway Show Cards™
The Space Review: A NEMESIS in the sky: PAN, MENTOR 4, and close encounters of the SIGINT kind
Institute for the Study of War
New report series--U.S. Grand Strategy: Destroying ISIS and al Qaeda | Institute for the Study of War
Keysight Technologies (Agilent HP) 8640B used or new for sale at used-line
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online - VOX - Pol
Joint INFOCORE, MeCoDem, VOX-Pol Workshop on Social Media, Conflict and Democracy to be held in Brussels - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study - Part 1: The First 20 Minutes - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath - VOX - Pol
Grey’s Anatomy Recap: Good News, Bad News -- Vulture
The Word at War
New Tricks Make ISIS, Once Easily Tracked, a Sophisticated Opponent - WSJ
White Papers - Marcus P. Zillman
Finding Experts By Using the Internet 2017 - Marcus P. Zillman
Google Photos now shows albums in search results | 9to5Google
Adobe Max 2016: Creative Cloud app updates, Stock & Reuters partnership, Sensei, Project Felix, more | 9to5Mac
Analyst Team - 451 Research - Analyzing the Business of Enterprise IT Innovation
AI Investor
Job Details
Experts reveal the secretive war apps being used to defeat ISIS in Mosul - WorldNews
CoRR - Computing Research Repository
arXiv.org Search
Computers and Society authors/titles recent submissions
Social and Information Networks authors/titles recent submissions
Attack the System
audioBoom / IED Big Data Goes to War. Battlefield Drone Defense. @DefTechPat, Defense One.
Beyond SOF » Native Arabic Linguist, Iraqi Advisor, Atmospherics Analysis, LNA Network Manager, Secret Clearance
Which iOS Content Blocker is the Fastest? — The Brooks Review
ISIS in America | Center for Cyber & Homeland Security | The George Washington University
Reflections: Guy Julier, From shanzhai to social innovation via makerspaces? – China's Creative Communities: Making Value and The Value(s) of Making
Peek - Chrome Web Store
Conflict Intelligence Team - investigation of military conflicts
ClintonCircle / Hillary Clinton
Records Management User Guide | Alfresco Community
Mendeley Advisor Program | Mendeley
CCI Blog » Blog Archive » Keyword Searching the Wayback Machine
CCI Blog » Blog Archive » Extract GPS from OfferUp
CCI Blog » Blog Archive » Extract bulk Facebook User IDs with SEOToolStation
CCI Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
Virginia: Hamas-linked CAIR enraged that sheriff’s office hosting seminar on jihad threat | The Counter Jihad Report
Embed Google Photos in your Website
Kaspersky Cyberthreat real-time map
Data catalog - NASA
Welcome - Investigative Dashboard Search
Alfresco Activiti
New tweet by @th3j35t3r - Google Sheets
New tweet by @th3j35t3r (1) - Google Sheets
New tweet by @rcallimachi - Google Sheets
Google Sheets
Air Force Doctrine
IFTTT - Google Drive
customer/portal/articles/300304 at DuckDuckGo
KETs Deployment Visualization Tool - European Commission
Lincoln Group - Wikipedia
Minority Report (film) - Wikipedia
The Jester (hacktivist) - Wikipedia
Small Wars Journal Articles
Index
Tool for newsgathering: Archive videos and collaborate on verification with Video Vault - First Draft NewsFirst Draft News
Automate processes + tasks | Microsoft Flow
Getgee: Tools for self-governance Part 1 | GeorgieBC's Blog
GitHub - bdesham/pinboard-notes-backup: Efficiently back up the notes you’ve saved to Pinboard
GitHub - blue-yonder/tsfresh: Automatic extraction of relevant features from time series:
GitHub - edobashira/speech-language-processing: A curated list of speech and natural language processing resources
GitHub - hasherezade/ViDi: ViDi Visual Disassembler (experimental)
GitHub - lockfale/OSINT-Framework: OSINT Framework
Who is th3j35t3r? | T3h H3r0d07u5 R3p0r7
HelpSite.io: Make a Knowledge Base / Support Center - for free!
ViDi | hasherezade's 1001 nights
Sign In
Discover IFTTT and Applets - IFTTT
InformNapalm Chronicles: a year of Russia destroying Syria - InformNapalm.org (English)
SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists - InformNapalm.org (English)
OSINT Training by Michael Bazzell
IntelTechniques Blog
IntelTechniques Blog » Blog Archive » New Data Mining Concern
IntelTechniques Blog » Blog Archive » Internet Search Links for September 2016 #OSINT
IntelTechniques Blog » Blog Archive » Internet Search Links for October 2016 #OSINT
IntelTechniques Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
This American Life by WBEZ on iTunes
Nigeria Expands Its ‘War on Terrorism’ to the Niger Delta - Jamestown
Hackers that suck: TH3J35T3R | Tango Clown: The Jester Exposed
Guest Post: Surviving an Active Shooter - By Fmr SEAL TEAM 6 Operator - Rob O'Neill - JestersCourt
JestersCourt by JΞSTΞR ✪ ΔCTUAL³³º¹
Site-Wide Activity – JestersCourt
JΞSTΞR ✪ ΔCTUAL³³º¹, Author at JestersCourt
SUPPORT 'J' - JestersCourt
VIDS - JestersCourt
Stealth Cell Tower
JΞSTΞR ✪ ACTUAL³³º¹ (th3j35t3r) | Keybase
Darknet Numbers Pages Proof of Concept | Krypt3ia
LinkedIN: The APT Phisherman’s Friend | Krypt3ia
Shits Gone Plaid: GDD53 and Slate | Krypt3ia
The Jester Effect and #iAWACS | Lady Liberty 1885
Laverna - keep your notes private
All Mail - scitrenbaum@gmail.com - Gmail
Untitled spreadsheet - Request for access - scitrenbaum@gmail.com - Gmail
How I launched the #2 most upvoted product of all time on Product Hunt – Medium
What The Hell Are We Doing? – Medium
Insulinomics – Medium
A curated list of speech and natural language processing resources – Medium
A curated list of speech and natural language processing resources – Medium
Stress-testing iPhone 7 Plus’ Portrait Mode – Medium
Keeping nuclear materials secure in an uncertain world – Medium
Pushing the envelope: The World Cup and Arab revolts drive change – Medium
What my Facebook feed looks like without news – Medium
I WENT UNDERCOVER INTO THE TRUMP CAMPAIGN… AND COULDN’T BELIEVE WHAT I FOUND – Medium
Message#5 — Trick or Treat? – Medium
Message#5 — Trick or Treat? – Medium
Safer Already – Medium
Terrorism & The Upcoming Presidential Election – Medium
War on drugs
For New Social Networks, Offering an Audience is No Longer Enough – Bumpers – Medium
The OSINT Toolkit – osint – Medium
A Field Guide for Online Reading Material – The Mission – Medium
Open Sourcing 223GB of Driving Data – Udacity Inc – Medium
'Minority Report' Is Real — And It's Really Reporting Minorities
Police Are Sweeping Up Tweets and Friending You on Facebook, Whether You Know It or Not
Police can't use Twitter to predict hate crimes — but that could change soon
Netlytic - social media text and social networks analyzer
Army’s Hybrid Warfare, ISIS in Saudi Arabia, and Robotic Risks – Daily Intelligence - ClearanceJobs
IC OFF THE RECORD - Intelligence Leaks Published in 2016
OCW Courses Represented in Crosslinks | MIT OpenCourseWare | Free Online Course Materials
One Tap Less | Workflow: Automation for Everyone
UBC Theses and Dissertations - UBC Library Open Collections
The VeraCrypt Audit Results – OSTIF.org
PDF Viewer for iOS & Android - Reading, Reviewing, Annotating - Made Easy.
Pinboard: bookmarks for scitrenb
Build Custom Business Apps | Microsoft PowerApps
Power BI | Interactive Data Visualization BI Tools
The Complete Privacy & Security Podcast
Privacy-Training Blog » Blog Archive » Episode 001-The Complete Privacy & Security Podcast
Privacy-Training Blog » Blog Archive » Episode 002-The Complete Privacy & Security Podcast
AT&T Analytical Services for Government Agencies Model Statement of Work | Public Intelligence
(U//FOUO) U.S. Army Commanders Guide to Human Intelligence (HUMINT) | Public Intelligence
DoD Science and Technology Strategic Communication/Social Media Programs | Public Intelligence
Browse the USGS Publications Warehouse
Qadir: Crisis Analytics: Big Data Driven Crisis Response - Google Scholar
Information Filtering and Multi-source Information Fusion - Google Scholar
Corsar: Social Media Data in Research: Provenance Challenges - Google Scholar
Visualization for Analysis - Google Scholar
Biermann: Multi-level fusion of hard and soft information - Google Scholar
Gardener: Hybrid Warfare: Iranian and Russian Version... - Google Scholar
Toman: Analysis of discourse accent and discursive... - Google Scholar
JIHADISMSTUDIES.NET
Why We Cannot Deter Terror in America - It's Not Politically Correct
SOFREP editor-in-chief interviews President Assad in Syria | SOFREP
WALTR 2 Download | Softorino
WALTR 2 – All-in-one Direct-to iPhone Converter| Softorino
SouthFront: Crisis News, World Events, Political Survey
About SouthFront
Car Bombs and the Means to Combat Them
Military Analysis Archives -
International Military Review
Security Report Archives -
SF Announce
Footage: 'Moderate' Terrorists with MANPADs Appear in Daraa Province
Militants Launch New Offensive to Break Aleppo Siege. Detailed Overview of Military Situation on Octber 28, 2016 (Maps, Photos)
Results of Russian Military Campaign in Syria: Sep. 30, 2015 - Oct. 20, 2016
Syrian War Report – October 28, 2016: Militants Make Do-Or-Die Attempt to Break Aleppo Siege
StackEdit – In-browser markdown editor
Startup Resources - the best tools for your Startup business
Steve BlankEntrepreneurship and Innovation
Steve BlankLean LaunchPad
Steve BlankSecret History
Steve BlankSlides/Videos
Steve BlankSlides/Videos
Exposing Russian Trolling and Information Warfare Tactics – Do NOT Take Boris Word for It
Stickers by AMSTICKERS
Stickers by EdSants
Bomb A Head Girl! - Creators' Stickers
Laz Laz The Blob - Creators' Stickers
Handsome Uncle : Animated - Creators' Stickers
WTF is machine learning? | TechCrunch
Iris AI drastically expedites research through the power of artificial intelligence | TechCrunch
Here’s the Problem With the Story Connecting Russia to Donald Trump’s Email Server
The Intercept
The Pirate Bay - The galaxy's most resilient bittorrent site
Audio > Music - TPB
Other > E-books - TPB
Other > E-books - TPB
The Pirate Bay - The galaxy's most resilient bittorrent site
MAGAZINES - WEAPONS AND SHOOTING 2016-10^V (download torrent) - TPB
Junk Drawer Chemistry (2016) (Pdf) Gooner (download torrent) - TPB
Affordable Care Act For Dummies (2014) (Pdf) Gooner (download torrent) - TPB
MILITARY AND HISTORY MAGAZINES 2016-10^V (download torrent) - TPB
NoctDeath - TPB
VP52 - TPB
The Operational-Security Newsletter by Justin Carroll
Fact-Checking Senate Campaign Ads Just Got Easier | Duke Today
Hybrid Warfare: Iranian and Russian Versions of “Little Green Men” and Contemporary Conflict – To Inform is to Influence
Compare Lists
Shift
194 tabs
Copy links to clipboard
Copy
Open
FBI — Home
Ulysses
Ulysses › Features
Your Guide to a Stress-free Bedroom - LuxPad
Wvusoldier - Vine
VIS. Visual Investigative Scenarios platform: Users
Guatemalan Gangs Are Now Crafting Remote-Detonated Bombs
Tehran, USA
The Pentagon’s Urge to Splurge
Records on 2000 arms caches seized in Iraq in 2007 – Arms trafficking, arms trade, and weapons ID docs
Wayback Machine
ToolDatabase < Dmi < digitalmethods.net
Metadata Extraction to Tags | Alfresco Developer Blog
Powerful Alfresco search engine and searching Alfresco documents directly from your browser | Appnovation Technologies Inc.
Counterterrorism action: Bankstown, 12 October 2016 - Australian Strategic Policy Institute
Atlas Informatics
Atlas Informatics
Atlas Informatics
https://www.babelstreet.com/Company.aspx#Partnerships
Russia | Federal Academy for Security Policy
BBVA Research » Iran vs. Saudi Arabia: Heating up the confrontation
bellingcat - A Brief History of Open Source Intelligence - bellingcat
How Despots Use Twitter to Hunt Dissidents - Bloomberg
Lessons From the Pentagon's Shameful Bonus Clawback - Bloomberg View
The Islamic State’s coming rural revival | Brookings Institution
Airline Carry-on Bag Sizes, from Minaal
Association of Old Crows (AOC) | Electronic Warfare | Information Operations
IO Publications & Links | IO Academy | The IO Institute
ICWSM Tutorial: Predictive Modeling with Social Networks
Center for Strategic and International Studies |
“Putin Is Corrupt” and Other Uncertainties Related to U.S. Policy toward Russia | Center for Strategic and International Studies
The Civil Side of Counterterrorism | Center for Strategic and International Studies
The Kremlin Playbook | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Page Not Found | Center for Strategic and International Studies
The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe | Center for Strategic and International Studies
Anthony H. Cordesman | Center for Strategic and International Studies
Heather A. Conley | Center for Strategic and International Studies
Curated Conversations | Center for Strategic and International Studies
Counterterrorism and Homeland Security | Center for Strategic and International Studies
SAS-071 Analytical Tools for Irregular Warfare
IST-106 Information Filtering and Multi-source Information Fusion
October 2016 | Combating Terrorism Center at West Point
Find Juicy Data on Your Targets Using the OSINT Framework - Cybrary
Personal - Dropbox
Personal - Dropbox
Personal - Dropbox
Collections Online | George Eastman Museum
Operation Manul | Electronic Frontier Foundation
Google's Assistant just got even smarter thanks to IFTTT
Giphy is giving orphaned Vines a new home
EurekAlert! Science News
Every CRS Report - EveryCRSReport.com
The First Day of a New Congress: A Guide to Proceedings on the Senate Floor - EveryCRSReport.com
Why Chat May Be King Of The New Mobile Landscape | Co.Design | business + design
Flashpoint - The Shadow Brokers's "Trick or Treat" Leak Exposes International Stage Server Infrastructure
Military Expenditure in the Baltic - Totalförsvarets forskningsinstitut
The folly of Saudi Arabia’s battle with Iran
Top Articles and Videos about Mosul on Pocket
My Saves
GovTrack.us: Tracking the U.S. Congress
FDsys - Browse Compilation of Presidential Documents
Customer and graphic designer - Customer feedback on mythical posters
HSDL Search Results
CDC’s Preparedness 101: Zombie Pandemic – Homeland Security Digital Library
Check Out These Resources on Biodefense Before Seeing Tom Hanks’ “Inferno” – Homeland Security Digital Library
"Killing Lists" – The Evolution of Cyber Terrorism?
Summary of Information on Jihadist Websites The First Half of June 2016
Links | Infinity Journal | Strategy | Analysis
Readings | Infinity Journal | Strategy | Analysis
Whole Body Image Acquisition and Analysis | InnoCentive Challenge
OPEN SOURCE INTELLIGENCE | IPS intelligence
Edwin ‘Leigh’ Armistead | Journal of Information Warfare
Triggers and Thresholds of Non-International Armed Conflict | Just Security
h
LookingGlass Cyber Solutions
Annotable Adds Wide Color Support and Haptic Feedback on iPhone 7 – MacStories
iOS 10.2 Beta Brings New Emoji, Wallpapers, and More – MacStories
MacStories Guide: Design and Launch Your Own iMessage Sticker Pack on the App Store – MacStories
Export and Retain Formatting from Google Docs - Make Tech Easier
5 of the Best Free Web-Based Alternatives to Photoshop - Make Tech Easier
Mapme: Map Creator | Plot your story
Free reference manager and PDF organizer | Mendeley
Storage Plans | Mendeley
About | Meta Search
The Microsoft Cognitive Toolkit - Microsoft Research
Analysis and Analytics | The MITRE Corporation
Advanced Technologies Overview | The MITRE Corporation
MITRE Licenses Social Radar Technology to AtrocityWatch | The MITRE Corporation
Law Enforcement | The MITRE Corporation
Prevent Terrorism | The MITRE Corporation
Deception: The Quest for Detection | The MITRE Corporation
Human Odor: Sniffing Out Identity and Deception | The MITRE Corporation
Instant Collaboration: Using Social Networks in Emergency Response | The MITRE Corporation
Systems Engineering Strategies for Uncertainty and Complexity | The MITRE Corporation
Tools to Enable a Comprehensive Viewpoint | The MITRE Corporation
Concept of Operations | The MITRE Corporation
Hacker Halloween: Inside a Shadow Brokers leak – My Hacker House
What can we 3D print? Everything! Here are 8 awesome examples | New Scientist
Hackers reverse-engineer NSA's leaked bugging devices | New Scientist
markdown-to-html
NUVI - Real-Time Social Intelligence
OCCRP
odrive - Sync all cloud storage in one place
TTBD Leadership team | Technology Transfer & Business Development | OHSU
GroupIntel - OODA Loop
OODA Loop - New leak may show if you were hacked by the NSA
Bio - O'Reilly Media
Overview — Visualize your documents
Paterva Home
Knowleey - Product Hunt
Get Shit Done - Product Hunt
Tech - Product Hunt
All the Popular Stores That'll Reward You Big-Time For Recycling
Recorded Future: Real-Time Threat Intelligence
[DEV] Peek, a Chrome extension to preview files before you download them : chrome
VeraCrypt has been audited. Here are the results. Also Ask Us Anything! -OSTIF : privacy
Arie Croitoru - Publications
Kenneth L Hacker
Automating social network analysis: A power tool for counter-terrorism
Information Warfare: Fighting Back Through the Matrix (PDF Download Available)
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology
Terrorist Narratives & Communicative Devices: Findings from a Study of Online Terrorist Magazines
RIMS - RIMS Annual Conference 2016 - Attendee - SESSION HANDOUTS
Russia Matters | Russia Matters
SaneBox
SD2 Proposers' Day
Another Shadow Brokers Leak - Schneier on Security
Schneier on Security: Blog Entries Tagged social engineering
Brain changes seen in youth football players without concussion -- ScienceDaily
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Data and trends for multilateral peace operations | SIPRI
th3j35t3r | SOLDIERX.COM
Pages - Technical Activities of the STO
Search Results :
Search Results : Analytical Support to Tactical Development"
Search Results :
Search Results :
RTO-MP-HFM-201 - All Documents
Search Results : analytical support to operations"
Home - U.S. Strategic Command
Sublime Text: The text editor you'll fall in love with
Purchase | TarDisk – TarDisk.com
Techdirt.
Innovator Under 35: Nora Ayanian
The World as Free-Fire Zone
Agricultural Drones
Fighting ISIS Online
What Google and Facebook Can Do to Fight ISIS
Can a Social-Media Algorithm Predict a Terror Attack?
The Internet of Things Goes Rogue
Massive Internet Outage Could Be a Sign of Things to Come
How the Internet of Things Took Down the Internet
AT&T Is Selling Law Enforcement Access to Its Customers’ Data
AI Body Scanners Could Solve the Worst Thing About Airports
IBM’s Watson Is Everywhere—But What Is it?
Tenable Unveils Industry’s First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents - Press Release | Tenable Network Security
Ground Combat | The Cipher Brief
Revealed: US spy operation that manipulates social media | Technology | The Guardian
US military studied how to influence Twitter users in Darpa-funded research | World news | The Guardian
Resources - Toddington
MOC Warfighter - Article
Vaultedge
Vaultedge
Two Iowa police officers killed in ‘ambush-style attacks’ as authorities hunt suspect in Des Moines area - The Washington Post
How artificial intelligence could help warn us of another Dallas - The Washington Post
The Islamic State creates a new type of jihadist: Part terrorist, part gangster - The Washington Post
Middle East Leaders at UN on Extremism | Wilson Center
Timeline: Rise and Spread of the Islamic State | Wilson Center
How the Boy Next Door Accidentally Built a Syrian Spy Tool | WIRED
Why ISIS Is Winning the Social Media War | WIRED
You Can Legally Hack Your Own Car, Pacemaker, or Smartphone Now | WIRED
Darpa's Alias Program Turns Old Aircraft Autonomous | WIRED
Suicide bombers hit peacekeeping base in Somali capital, 13 dead: police
JesterGear: Products on Zazzle
Zotero | People > Spencer L Willardson > Library > Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War
Zotero | People > Spencer L Willardson > Library > Democracy Declassified: The Secrecy Dilemma in National Security
Zotero | People > Massimo Menichinelli > Library
Zotero | People > Massimo Menichinelli > Library > filter bubble
Zotero | People > Massimo Menichinelli > Library
Zotero | People > Massimo Menichinelli > Library > Polarized User and Topic Tracking in Twitter
System of Systems Analytics, Inc. (SoSACorp): Overview | LinkedIn
Denise Bottiglieri, PhD | LinkedIn
Jonathan Nichols | LinkedIn
Joseph Carroll | LinkedIn
2016: A Bot Odyssey | Jonas Lamis | Pulse | LinkedIn
Guiding Principles for Countering and Displacing Extremist Narratives | Alejandro J. Beutel | Pulse | LinkedIn
Oryon C Portable : Open Source Intelligence (OSINT) Framework | Prawez Samani (Seeking for New Opportunity) | Pulse | LinkedIn
Sensai has been acquired by D.C. based risk analytics firm Sovereign Intelligence | Jonas Lamis | Pulse | LinkedIn
Watch Live - Mad Scientist "The 2050 Cyber Army" Conference | Joel Lawton | Pulse | LinkedIn
Top 13 Propaganda Analyst profiles | LinkedIn
29 tabs
Copy links to clipboard
Copy
Open
J 👻P (@counterjihader) | Twitter
Daveed Diggs on Twitter: "New @clppng video!! Shooter. Feat. Choreography by @tisVoltaire of @HamiltonMusical https://t.co/PzX998ZHPl https://t.co/SPzurb4FQC"
Don Del Priore (@Don_DelPriore) | Twitter
Falsettos Broadway (@FalsettosBway) | Twitter
The 3:10 To Huma (@GayPatriot) | Twitter
#iAWACS hashtag on Twitter
Janus The Nameless (@JanusThe2) | Twitter
Judd Legum on Twitter: "I fixed Comey's letter https://t.co/caQpqXfoPM"
Kron (@Kronykal) | Twitter
Sebastian Anthony (@mrseb) | Twitter
Predata (@predataofficial) | Twitter
Public Intelligence (@publicintel) | Twitter
Donald J. Trump on Twitter: "I just got back from Russia-learned lots & lots. Moscow is a very interesting and amazing place! U.S. MUST BE VERY SMART AND VERY STRATEGIC."
(10) Defeat Killary (@SassyJerseyGirl) | Twitter
steve blank (@sgblank) | Twitter
Tova (@stczzop) | Twitter
(95) @stczzop/#1 on Twitter
(3) @stczzop/Apple on Twitter
@stczzop/*LIST of BESTS on Twitter
List members
Terror Events (@TerrorEvents) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "@DRGiggl3 @Liam_Orodochain @Kronykal I sure as hell do have a resource for K9's. In fact I have two. Hit up @Don_DelPriore or @l1k34g1rl"
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
the grugq on Twitter: "@thegrugq @CopperheadOS @benhawkes @revskills @uglypackets here: Twitter is all infosec and terrorism."
The Joint Staff (@thejointstaff) | Twitter
Sean Gallagher (@thepacketrat) | Twitter
Brett Terpstra on Twitter: "My best release notes ever? Possibly. Quick nvALT update is out, by the way. https://t.co/ywF2BGPpdx"
Jon Nichols ☕ (@wvualphasoldier) | Twitter
43 tabs
Copy links to clipboard
Copy
Open
Air Force Scrambles to Defeat Islamic State's Flying Bomb Drones - Google Search
alfresco extract keywords - Google Search
Analysis of Discourse for Indications and Warnings. - Google Search
Analysis of the Military Effectiveness on Future C2 Concepts and Systems - Google Search
atmospherics manager aecom - Google Search
CTRL-H - PDX Hackerspace - Google Search
DARPA Social Media in Strategic Communication - Google Search
Defence Strategic Communications - Google Search
Denise Bottiglieri - Google Search
Disparity Between Fusion Center Web Content and Self-Reported Activity - Google Search
emic - Google Search
Finding Needles in a Haystack: The Eastern Bloc's Counterintelligence Capabilities, - Google Search
general microwave model 476 power meter - Google Search
HP / AGILENT 8640B RF SIGNAL GENERATOR opt 1 - Google Search
html to wiki - Google Search
HUMINT Targeting, Open Source Intelligence And Training Support - Google Search
IED Big Data Goes to War. Battlefield Drone Defense - Google Search
Information fusion for the Gray Zone - Google Search
Iran vs. Saudi Arabia: Heating up the confrontation - Google Search
iran hybrid warfare saudi arabia - Google Search
Iranian Hybrid Warfar - Google Search
Joseph Carroll at the Knight Cancer Institute - Google Search
KANAME Co.,Ltd Bomb A Head Girl! - Google Search
Krueger and Malecková - Google Search
Laying the Groundwork for the Successful Deployment of Communication Interception Technology - Google Search
markdown to html - Google Search
mendeley plans - Google Search
Modeling position selection by individuals during information warfare in society - Google Search
OSINT-Framework - Google Search
Portland Resources for Dorks - Google Search
propaganda analyst lincoln group - Google Search
RAND-developed Action- able HotSpot - Google Search
Rigel Geographic Pro ling Tool - Google Search
Sensai forecasting - Google Search
Sensei - Google Search
simple code editor mac - Google Search
Social media-driven propaganda: in the crosshairs of the black flag - Google Search
Social Media as a Tool for Information Warfare pdf - Google Search
Sovereign Intelligence - Google Search
TDIA System - Google Search
Terrorist on Remote Control: Leader Guided Recruits via Apps - Google Search
th3j35t3r - Google Search
Why We Cannot Deter Terror in America – It’s Not Politically Correct - Google Search
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.