Light theme
Dark theme
Automatic (use operating system setting)
Shared: 324 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
02-02
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Barabási Albert-László - Publications
Conference papers and records - Vitrociset
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Challenges | Special Issue : Challenges in New Technologies for Security
Help Us Map TrumpWorld - BuzzFeed News
Counterterrorism Policy Guide - The Intercept
User Account
IC OFF THE RECORD - Intelligence Leaks Published in 2017
MDPI | Journals A-Z
Challenges | December 2016 - Browse Articles
Challenges | June 2016 - Browse Articles
IC OFF THE RECORD - Intelligence Leaks Published in 2016
Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking
Undercover FBI Agents Swarm the Internet Seeking Contact With Terrorists
Military, Military Technology | Popular Science
BurakKadercan (@BurakKadercan) | Twitter
Opinion
The Method behind the Islamic State’s Madness - War on the Rocks
Research
Teaching
The Master Plan: How to Stop ISIS | The National Interest
U.S. Naval War College | Case Studies
Triangulating territory: a case for pragmatic interaction between political science, political geography, and critical IR | International Theory | Cambridge Core
Making sense of survival: refining the treatment of state preferences in neorealist theory | Review of International Studies | Cambridge Core
Last Week Tonight (@LastWeekTonight) | Twitter
The Desperate Battle to Destroy ISIS - The New Yorker
Deterrence and Dissuasion in Cyberspace | International Security | MIT Press Journals
(1) Patrick Meier (@PatrickMeier) | Twitter
A Suspicious Death and Three Cyber Arrests Point to a New Twist in the US Election Hack - Defense One
Darren Gergle - Publications
"Algorithms ruin everything" : #RIPTwitter, Folk Theories, and Resistance to Algorithmic Change in Social Media
Darren Gergle - Followers
Robert E. Kraut - Publications
Yoram M Kalman - Publications
Jeremy P. Birnholtz - ResearchGate
Jeffrey T Hancock - Publications
ResearchGate
Kwame Awuah-Offei - Publications
Steve Bannon: 'We're going to war in the South China Sea ... no doubt' | US news | The Guardian
(19) #pdxtraffic hashtag on Twitter
Is ISIS Breaking Apart? | RAND
Turn Any Desk Into a Part-Time Standing Desk For Under $150
Twitter, Dropbox, Facebook, More: Tuesday Afternoon Buzz, January 31, 2017 | ResearchBuzz
Cost of living index – We compare Columbus to peer cities across the U.S. - Portland Business Journal
Best paid apps for Mac | iMore
IARPA Seeks Technologies and Methods to Detect Genome Editing
Time for a Factory Reset with Russia. Please Close all Open Programs | Small Wars Journal
The Islamic State’s Drone Documents: Management, Acquisitions, and DIY Tradecraft | Small Wars Journal
Michael Best (@NatSecGeek) | Twitter
Cost of Living Index - Google Search
Deliverables | Driver Project
Publications
Leveraging the Internet of Things for a More Efficient and Effective Military | Center for Strategic and International Studies
Armed and Dangerous? UAVs and U.S. Security | RAND
Exclusive: How technology is used to predict and prevent terror attacks
DoD’s ‘Organ-on-a-Chip’ Innovation Wins Big | Armed with Science
A Tiny Device Could Save Precious Moments During Combat Traumas | Armed with Science
MEDUSA - Vitrociset
SUNNY - Vitrociset
NATO - SPS - Country Flyer page
Artificial Intelligence and the Future of Warfare | Chatham House
(67) The Application and utility of modern technologies by Anti-terrorist agencies: A study of U.S response to Al Qaeda | Ikechukwu Omenogor - Academia.edu
Automation in Military Operations - POST Note - UK Parliament
Overview of military drones used by the UK Armed Forces - Commons Library briefing - UK Parliament
NATO - Topic: Defence Against Terrorism Programme of Work (DAT POW)
NATO - Topic: Centres of Excellence
TrumpWorld Data — Public - Google Sheets
SMART - Vitrociset
Welcome to the Arthur D. Simons Center for Interagency Cooperation
FBI, 5 other agencies investigating Kremlin aid in hacking, sources say | McClatchy DC
Intercepted Russian Communications Part of Inquiry Into Trump Associates - The New York Times
Predictive Analytics: The Use and Constitutionality of Technology in Combating Homegrown Terrorist Threats - Google Search
Risk Management – Terror Tech
How to Catch a Terrorist - The New Yorker
A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations - Google Search
dblp: Simon Andrews
Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime - Springer
Service-Oriented Design of a Command and Control Intelligence Dashboard for Crisis Management. - Google Scholar
U.S. Air Force Center for Strategy and Technology - Future Studies and Reports
Hexagon Geospatial Names IGNITE Competition Winners
#MacStoriesDeals (@MacStoriesDeals) | Twitter
LumaFusion on the App Store
Expressions on the Mac App Store
GitBar - the menu bar git repository notifier on the Mac App Store
Home page - FP7 - Research - Europa
Publication — American Council on Science and Education
Intelligence options for a small country : Centre for European and North Atlantic Affairs – Analysis
European Commission : CORDIS : Projects & Results Service : Automated Serious Game Scenario Generator for Mixed Reality Training
DVIDS Unit RSS Feed: Army Multimedia & Visual Information Directorate
Home - Eurecat
DARWIN - Project Deliverables
Exploiting Web Browsing Activities for User Needs Identification - IEEE Xplore Document
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
Downloads and Links | CENTRIC
Expertise | CENTRIC
Expertise | CENTRIC
TRANSRAD | CENTRIC
Publications | CENTRIC
Cyber Crime and Cyber Terrorism Investigator’s Handbook (1st Edition) | CENTRIC
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies | CENTRIC
AUGGMED Team to Develop Anti-Terrorist Training Software – Shipping and Marine Events
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
Consortium – TENSOR
www.auggmed-project.eu/knowledge-hub.aspx
Working Documents | COSMIC
eisic 2017: Keynote Speakers
Emergent at the 13th International Conference on Web Based Communities and Social Media | EmerGent
Publications | EmerGent
Publications | EmerGent
Publications | EmerGent
Related Projects | EmerGent
Intellect Ltd.
ATHENA | Empowering Citizens, Protecting Communities
Joint Hosted Open Source Intelligence Conference | ATHENA
About ATHENA | ATHENA
D9.4 Exploitation Plan | ATHENA
D9.8 ATHENA Published Volume | ATHENA
West Yorkshire Police use analytics from SAS to improve disaster response | SAS UK
West Yorkshire Police use analytics from SAS to improve disaster response | SAS UK
Related projects - TARGET h2020
Vitrociset
EC - VOX-Pol Lunch Briefing Series: Lone Actors, Extremism and Understanding Online Radicalisation - VOX - Pol
Application of Big Data for National Security: A Practitioner’s Guide to ... - Babak Akhgar, Gregory B. Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, Petra Saskia Bayerl - Google Books
Section 3 - ADVERSARY FOREIGN INTELLIGENCE OPERATIONS - Operations Security - INTELLIGENCE THREAT HANDBOOK</h3></td>
Akhgar: OSINT as an Integral Part of the National... - Google Scholar
bellingcat - by and for citizen investigative journalists
https://www.epoolice.eu/EPOOLICE/servlet/document.listPublic
https://www.epoolice.eu/EPOOLICE/servlet/link.listPublic
A collection of edited social media networks and smart mobile technology research papers communicating the impact for ordinary citizens and first responders during a crisis from ATHENA, iSAR+ and COSMIC research. - Google Search
D9.8 ATHENA Published Volume - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKEwjDq5OswPHRAhXrilQKHYzTCU0QFggnMAE&url=http%3A%2F%2Fresearch.shu.ac.uk%2Fcentric%2Fwp-content%2Fuploads%2Fcentric-booklet-final-website.pdf&usg=AFQjCNH_tAW_OxC_7GBI2oCb-KrhCfz1ww&sig2=D7LmTy-bvEJZILbxrN-Ygw
Helen Gibson - Publications
Konstantinos Domdouzis - Publications
Simon Andrews - Publications
Military Geoscience by Jamie Keith Pringle - Research Project on ResearchGate
V20
OSINT as an Integral Part of the National Security Apparatus
Babak Akhgar - ResearchGate
Open Source Intelligence Investigation | springerprofessional.de
Further Information | West Yorkshire Police
Latest News | West Yorkshire Police
Related Projects | West Yorkshire Police
AUGGMED | West Yorkshire Police
Home
Links - Bonas Project
Decision support systems and information fusion - Totalförsvarets forskningsinstitut
Reports and publications - Totalförsvarets forskningsinstitut
Scientific publications - Totalförsvarets forskningsinstitut
Popular science publications - Totalförsvarets forskningsinstitut
Open Sourcing Plans for “Low-Tech, High-Thinking” Water Filters
Donald J. Trump (@realDonaldTrump) | Twitter
Curio 11. The Ultimate Project Notebook - BrettTerpstra.com
The Islamic State Is Pioneering a New Type of Drone Warfare - Motherboard
ISIL, Syria & Iraq Resources | Combating Terrorism Center at West Point
CTC Perspectives – The Islamic State’s Drone Documents: Management, Acquisitions, and DIY Tradecraft | Combating Terrorism Center at West Point
Zengobi Curio - Note Taking, Mind Mapping, Brainstorming
European Commission : CORDIS : FP7 Cooperation - Security Research
European Commission : CORDIS : Projects & Results Service : Evidence based policy for post crisis stabilization: bridging the gap
European Commission : CORDIS : Projects & Results Service : Final Report Summary - CAERUS (Evidence based policy for post crisis stabilization: bridging the gap)
Memo mapping metrics, methods, and interventions Deliverable number D2.1 :: TNO Repository
TNO Repository search for: subject:"Defence, Safety and Security"
Project Updates / News / Events
The Group That Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State | Combating Terrorism Center at West Point
CTC Perspectives – Welcome to the Hotel Caliphate: You Can Check-Out Any Time You Like, But You Can Never Leave | Combating Terrorism Center at West Point
Revealed: Isis developing weaponised drones in secretive programme | The Independent
Counter-UAS Technologies
Playbook Plus: Win the morning. Own the day. Get the new Playbook. - POLITICO
Why Romania Is Witnessing The Largest Protests In Decades - BuzzFeed News
FOI - Totalförsvarets forskningsinstitut
Trump Year One: Place Your Bets | Belfer Center for Science and International Affairs
The nature of power in the networked age - The Boston Globe
Mattis Could Resolve the Israeli-Palestinian Conflict | The National Interest
Twitter Activist Security – Medium
Use Food Coloring to Create Tie-Dyed Flowers | Make:
Program with Robot Operating System for Smooth Servo Movement | Make:
The state of Jupyter - O'Reilly Media
Conference - Security Research & Innovation Event 2016
Programme 1 - 2 June 2016 - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
home-luglio-2015 — Enea
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Research and innovation
Research programmes
Latest Forensic Innovations
Innovation Room - Security Research & Innovation Event 2016
BOmb factory detection by Networks of Advanced Sensors - Google Search
European Commission : CORDIS : Projects & Results Service : BOmb factory detection by Networks of Advanced Sensors
European Commission : CORDIS : Projects & Results Service : Final Report Summary - BONAS (BOmb factory detection by Networks of Advanced Sensors)
Sewer sensors to sniff out bomb ingredients - BBC News
Our Knowledge - Totalförsvarets forskningsinstitut
Technical reports - Totalförsvarets forskningsinstitut
The Aviationist » ItAF contributes to the "Bomb factory detection by Networks of Advanced Sensors" project to counter homemade IEDs
Challenges | Free Full-Text | Expert System for Bomb Factory Detection by Networks of Advance Sensors
Alessandro Ulrici - Publications
Francesco Saverio Romolo - Publications
Laser Diagnostic Instruments | Projects
Intelligence Social Network Analysis - Google Search
Social Network Visualization - Cambridge Intelligence
Social Network Analysis Archives - Cambridge Intelligence
Link Prediction in Criminal Networks: A Tool for Criminal Intelligence Analysis
Tag: Social Network Analysis - Bright Data
Social network analysis in SAS® Visual Investigator
Data Mining for Predictive Social Network Analysis
GIJN Launches New Feeds in Arabic, Russian | Global Investigative Journalism Network
CENSIT – Fusion of CBRN sENSor Information in Tactical networks (Poster) - Google Search
Saved Session - Session Buddy
Exploring Social Media’s Influence During Conflict and Crisis | Grounded Curiosity
Self Study Program / Future War - Army Capabilities Integration Center
Agent-based modeling of availability for complex multiple units systems: Journal of Quality in Maintenance Engineering: Vol 23, No 1
DOD IG Report: CENTCOM Did Not Distort ISIS... - Matthew Aid
RAND Europe Research on Defence and Security | RAND
RMA - Scientific publications
RMA - Research centres
RMA - Research
Making your career in security - Security Talent
> U.S. DEPARTMENT OF DEFENSE > Contract View
Science Everywhere | DonorsChoose.org
STO-MP-SAS-105 - Information Operations for Influence - Google Search
Nicolas Sabouret - Publications
Security Research & Innovation Event 2016 - Security Research & Innovation Event 2016
STO Technical Panels
STO-MP-SAS-105 - All Documents
Search Results : Analytical Support to Operations"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Events - The Hague Security Delta
Safety and Security (SSA) 2015 - The Hague Security Delta
Five New Premium HSD Partners Present their Challenges on Security of Critical Infrastructures during HSD Café - The Hague Security Delta
Nationale Politie - The Hague Security Delta
Innovation Experience Room - The Hague Security Delta
Petition the White House on the Issues that Matter to You | We the People: Your Voice in Our Government
A majority of one walks away from his keyboard - POLITICO
http://trump.kimalbrecht.com/network/
PlanetRisk
New Arrivals - Women
Drone Database - Proliferated Drones
ISIS and Religion and Nation Building in the Middle East | NSI
Data journalism tool collection | Journocode
You're Going to Die, Here's How to Deal With It
Services at NSI | NSI
Dropbox Introduces Smart Sync for Business Customers and Paper Emerges from Beta – MacStories
Help Us Map TrumpWorld - BuzzFeed News
visual research : kim albrecht
Center for Complex Network Research - Google Search
Center for Complex Network Research (CCNR) - Research at Northeastern University
Barabási Albert-László - Publications
Predictive Analytics Will Level-Up Duty of Care: Business Travel News
Border Security Summit | DEFENSE STRATEGIES INSTITUTE | Advancing The Mission. Supporting The Force
Russia–Syria Internal Threat Alliance (2010–2016) - Springer
Lessons From the Terrorist Attacks in Paris, Brussels, and Boston | Violence | JAMA Surgery | The JAMA Network
Proportionality and precautions in attack: The reverberating effects of using explosive weapons in populated areas | International Review of the Red Cross | Cambridge Core
The Dangers of Pakistan’s Tactical Nuclear Weapons | The Diplomat
Forget needles and haystacks – it’s more complicated than that « Counter-terrorism matters
Big data in CT – Investigatory Powers Bill Submission « Counter-terrorism matters
Online Event Registration - Cyber Counterintelligence Tradecraft
Top Ten #ddj: The Week’s Most Popular Data Journalism Links | Global Investigative Journalism Network
Clandestine Cyber HUMINT – The Cyber Shafarat – Treadstone 71
Eichenwald: Neil Gorsuch Is Supremely Qualified, and Must Not Be Confirmed
Global terrorist activity in 2015 – mapped | World Economic Forum
No ‘G’day, mate’: On call with Australian prime minister, Trump badgers and brags - The Washington Post
Russian Infiltration of the US Federal Government - JestersCourt
Amy Pate | START.umd.edu
Chrome 57 Will Permanently Enable DRM
Russia–Syria Internal Threat Alliance (2010–2016) - Google Search
Threats to U.S. Vital Interests in Europe
Deathhacker News, Videos, Reviews and Gossip - Lifehacker
Bringing COIN to the Airport: On the Effectiveness of the “Muslim Ban” | Small Wars Journal
Pentagon Probe of Islamic State Intelligence Finds Reports Weren’t Skewed - WSJ
Dunford: Speed of Military Decision-Making Must Exceed Speed of War | Small Wars Journal
DoD News | Small Wars Journal
Dunford: Speed of Military Decision-Making Must Exceed Speed of War > U.S. DEPARTMENT OF DEFENSE > Article
Macdrifter
Edge Popularity Prediction Based on Social-Driven Propagation Dynamics - IEEE Xplore Document
Smartphone-based immunosensor for CA125 detection
MOOC Terrorism and Counterterrorism - Office Chat Jan 2017 - Trump, IS, Nigeria and Quebec - YouTube
Analytical Chemistry for Cultural Heritage - Google Books
Shortcomings of the Paris Accord: We Need to Combat Air Pollution at Multiple Scales - The Nature of Cities
Mob Control: Models of Threshold Collective Behavior - Springer
Great Powers, Weak States, and Insurgency - Springer
Combining Convolutional and Recurrent Neural Networks for Human Skin Detection - IEEE Xplore Document
Peacebuilding, Statebuilding and Liberal Peace - Springer
Traditional Media, Social Media, and Different Presidential Campaign Messages - NYU Press Scholarship
The Data That Turned the World Upside Down - Motherboard
An Online and Distributed Approach for Modulation Classification using Wireless Sensor Networks - IEEE Xplore Document
The Problem of Shared Victory: War-Winning Coalitions and Postwar Peace: The Journal of Politics: Vol 0, No 0
News of Terrorism and the Israeli-Palestinian Conflict (January 25 – 31, 2017)
Talk Intel To Me | Duck of Minerva
No One Can Replace Peter Capaldi on Doctor Who | WIRED
MIT CSAIL Made a Wearable That Knows How a Conversation's Going | WIRED
Trump Supreme Court Nominee Neil Gorsuch Needs to Get Tech—These Cases Show Why | WIRED
Are We Hardwired for War? - Modern War Institute
NSI Social Media and Political Effects | NSI
NSI Human Behavior Analytics Applications | NSI
(16952) Inoreader - [Global] JOINT IMPROVISED-THREAT DEFEAT ORGANIZATION2
Operationalizing Small Sats
TERESA project adds a vital component to human-robot interaction: social intelligence | Robohub
US Military Botching Online Fight Against Islamic State, AP Investigation Finds | Small Wars Journal
Bombshell: Ain't No Party Like an America First Party
Fantastical 2.8 Brings Rich Notifications, iMessage Stickers – MacStories
Linea: An Elegant Sketching App for the iPad from The Iconfactory – MacStories
DHS reviews U.S./Canada border security | Arthur D. Simons Center
News You Can Use: 02/01/17 | Arthur D. Simons Center
Agencies investigate Russia, Trump associates | Arthur D. Simons Center
Saved Session - Session Buddy
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.