Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,223 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
Mac Tips
Copy links to clipboard
Copy
Open
How to add and print to a WiFi or network printer - How to - Macworld UK
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
Quick Look - OS X El Capitan: The Missing Manual [Book]
Must Have MacOS Quick Look Plugins | Sayz Lim
sindresorhus/quick-look-plugins: List of useful Quick Look plugins for developers
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
for Mac OS X | Favorite Book Reader
Quick Look - Wikipedia, the free encyclopedia
Quick Look Plugins Make File Browsing On OS X Even Better
How to View Epub, Kindle eBooks in OSX Quick Look | The Digital Reader
OS X Hidden Treasures: Services
OS X Hidden Treasures: Quick Look
Daring Fireball: Markdown Syntax Documentation
BetterZip 3 - Easy Zip and Unzip for Your Mac
09-22
Copy links to clipboard
Copy
Open
High-Priority Information Technology Needs for Law Enforcement | RAND
Law Enforcement | RAND
License Plate Readers for Law Enforcement: Opportunities and Obstacles | RAND
Browse RAND Reports by Series | RAND
First Responders | Homeland Security
FRG Publications | Homeland Security
Publications Library | Homeland Security
Counterterrorism Publications | Homeland Security
Communication Systems | RAND
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage | RAND
Corrections Technology and Practice Taxonomy | RAND
Social Media Research: Behavioral Sciences | Explore Taylor & Francis Online
System Dynamics Conference
EMM News Explorer
Social Media Research | Explore Taylor & Francis Online
LandsatLook Viewer
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AutomatingOSINT.com - Learn How to Automate OSINT Collection
Monthly Newsletter
MacStories Weekly: Issue 49
Yahoo’s Data Breach: What to Do If Your Account Was Hacked - Bloomberg
INSS Military and Strategic Affairs
Broadway Musicals: A Jewish Legacy | Full Episode | Great Performances | PBS
Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake' | Reuters
Advancing machine learning algorithms that could predict terrorist threats | START.umd.edu
Developing algorithms to thwart terrorism | START.umd.edu
OSINT Forum by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Gmail - MacStories Weekly: Issue 49
Emails From A CEO Who’s Making The Presentation Himself This Time – Slackjaw – Medium
Algorithms in plain English: time complexity and Big-O notation
FlashAlert Newswire
Security Experts Agree: The NSA Was Hacked
The Spies Who Loved iPhones
AngelsBwayTunes - YouTube
On the reception and detection of pseudo-profound bullshit
How to Change Yahoo Password
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
TRIPwire
So You Think You're Smarter Than A CIA Agent : Parallels : NPR
Andrew Sullivan: My Distraction Sickness — and Yours
Apple Music Customer Service Lauren Totally Nails It
Detecting emotions with wireless signals | MIT News
BrettTerpstra.com
Security Informatics | Home page
Jigsaw - Visual Analytics for Investigative Analysis
II Projects Page
II Publications Page
Information Visualization Links Page
Software Visualization Publications
John Stasko's Publications
Information Interfaces Group
VACCINE - Discovery Park
Information Technology Laboratory | NIST
Charlotte Exposes a Critical Flaw in the Rise of Body Cams | WIRED
jeff weyers - Google Search
FAQ
greta's gouge: Friday's Miscellany 09-16-2016
Sean Gourley: The mathematics of war | TED Talk | TED.com
Hany Farid
Us and them: identifying cyber hate on Twitter across multiple protected characteristics | EPJ Data Science | Full Text
The Science of Tannerite - Explosive Likely Used in Chelsea Bombing
Sense-making for intelligence analysis on social media data | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Social media for intelligence: practical examples of analysis for understanding | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Defense Innovation Marketplace
Analysis of the current situation in the global Jihad total war jihadica
Sensors | Free Full-Text | Small Moving Vehicle Detection in a Satellite Video of an Urban Area
WARNING : Russia Issues New “Rules of Engagement” in Syria: Any Aircraft Threatening the Syrian Army WILL BE SHOT DOWN (US/Turkey/Israel in the cross-hairs!)
The New York Times - Breaking News, World News & Multimedia
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
portland science/biotech - craigslist
Jeff Weyers | re:publica
Next-Generation Social Media Intelligence Analysis - Google Scholar
Next-Generation Social Media Intelligence Analysis - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods - Google Search
SA.660.732- Insurgency and Counterinsurgency - Google Search
Small Moving Vehicle Detection in a Satellite Video of an Urban Area - Google Search
quizlet biology protists slides - Google Search
socmint - Google Search
socmint tools - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Timeline: US Policy on ISIS | Wilson Center
Tentative Schedule
Journal of Strategic Security | USF Libraries | University of South Florida
How Police Trace Cellphones in IEDs Like the Ones in NYC | WIRED
QuickLook Plugins List
CCI Blog » Blog Archive » Searching the Dark Web
Disruptive Technologies Push Bioterrorism To A Whole New Level - The Medical Futurist
TII Online Research and Intelligence Newsletter - September 2016
EPIC - EPIC Online Guide to Practical Privacy Tools
BBB Scam Tracker
Investigative Dashboard
JSON To CSV Converter
C.J. Chivers (@cjchivers) | Twitter
Resources - Toddington
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Turkey is the export-hub for detonating cords; a crucial component for IEDs used by ISIS and Jabhat al Nusra affiliates – Doğu Eroğlu
Doğu Eroğlu
C. J. Chivers on Sulfur Mustard Attack (with tweets) · crofer · Storify
Current.ly
FindGram - Search Instagram Photos
GeoSocial Footprint
Wonder How To » Fresh Hacks For a Changing World
This Tool Lets You Check If Your Personal Info Is on the Dark Web | Motherboard
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Finding a Nuclear Weapon: Hope Beyond the Screwdriver | The National Interest Blog
snitch.name :: The Social White Pages
News Article – Center for Security Studies | ETH Zurich
8 Search Tricks That Work on DuckDuckGo but Not on Google
How Spy Tech Firms Let Governments See Everything on a Smartphone - The New York Times
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations | RAND
Terrorism and Political Violence: Vol 28, No 4
Computer Crime Presentations and Training by Michael Bazzell
Watched - Post and Courier
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Hany Farid - Google Scholar Citations
(2) bellingcat (@bellingcat) | Twitter
C.J. Chivers on Twitter: "just like crazy IED twitter, expect hyperventilating. mustard & ISIS are not new. and mustard is typically much less lethal than explosives."
(7) JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
How To Protect Your Data And Remove Personal Information From The Internet | Abine
SOCMINT, OSINT - Google Search
open source spying - Google Search
How One Journalist Uses Social Media to Get Inside the Minds of ISIS | WIRED
Russian Hackers Get Bolder in Anti-Doping Agency Attack | WIRED
How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone | WIRED
The Quest to Build a Portable Anti-Neutrino Detector for Nukes | WIRED
Cifas: Data to Go - YouTube
Forecasting the Future: Can The Hive Mind Let Us Predict the Future?
Metaculus
Good Judgment® Open
CymaSpace | We make arts & cultural events more accessible & inclusive to the Deaf & Hard of Hearing through Technology, Education & Outreach.
Used Coffee Grounds Can Clean Contaminated Water | Popular Science
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
IJGI | December 2015 - Browse Articles
Black Hat USA 2016 | Arsenal
Spatial Science | Open Access Articles | Digital Commons Network™
Social Media | Open Access Articles | Digital Commons Network™
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
Who’s Afraid of the Big, Bad Bioterrorist?
PLOS ONE: Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
PLOS ONE: Measures of Human Mobility Using Mobile Phone Records Enhanced with GIS Data
Dynamic User Attribute Discovery on Social Media - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Statistics and Probability | Open Access Articles | Digital Commons Network™
Geography | Open Access Articles | Digital Commons Network™
Technical Program | 2016 IEEE Workshop on Statistical Signal Processing
EBSCOhost | 117599006 | Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism.
EBSCOhost | 117742343 | Deterring Emergent Technologies.
EBSCOhost | 117742345 | DARPA Emerging Technologies.
EBSCOhost | 117613471 | Prototyping an Automated Video Surveillance System Using FPGAs.
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism / CSJM v.24, n.2 (71), 2016 / Issues / CSJM / Publications / IMCS
IJGI | Special Issue : Big Data for Urban Informatics and Earth Observation
IJGI | Special Issue : Geoinformation for Disaster Risk Management
Evaluation of Urban Mobility Using Surveillance Cameras
Using Analytics and Social Media for Monitoring and Mitigation of Social Disasters
Advances in data-driven computational social sciences
Information Systems Architecture and Technology: Proceedings of 37th ... - Google Books
EPJ Data Science | Home page
Why WMD Terrorism Isn’t as Scary as it Seems – Politics in Theory and Practice
Fabio Pinelli - Google Scholar Citations
Dou Wenwen - Google Scholar Citations
Dobra: Spatiotemporal detection of unusual human... - Google Scholar
Dong: Inferring unusual crowd events from mobile... - Google Scholar
Leo: Call detail records to characterize usages and... - Google Scholar
Stein: Visual Soccer Analytics: Understanding the... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
A survey of data mining and social network analysis based anomaly detection techniques
Roick: Location based social networks–definition,... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
Black Hat USA 2013 | Briefings
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism. - Google Search
Copper Thermite Explodes and Smolders Successfully | Hackaday
Watch Full Episodes Online of NOVA on PBS | 15 Years of Terror
NOVA - Official Website | 15 Years of Terror
CEH.V6.-.Module - Google Search
09-24
Copy links to clipboard
Copy
Open
A look at the explosives used in the New York bombing | September 26, 2016 Issue - Vol. 94 Issue 38 | Chemical & Engineering News
Amphetamine boosts rats’ recovery from brain injuries | Chemical & Engineering News
How the NYPD Turned Itself Into a Little CIA
How Palantir Is Taking Over New York City
How To Get Slack Notifications on Gmail
Networks of New York » Melville House Books
Using Sound and Artificial Intelligence to Detect Human Rights Violations | iRevolutions
A Walking Tour of New York’s Massive Surveillance Network
How Hired Hackers Got “Complete Control” Of Palantir - BuzzFeed News
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Afghan War News
Afghan War News: Afghan Security News - Good and Bad
Afghan War News: RS Cdr's News Conference - Some Facts and Some Spin
OK, nvALT 2.2 take 2 - BrettTerpstra.com
Deals - Kinja Deals
Saturday's Best Deals: Dyson Fan Heater, Tevas, Bluetooth Headphones and More
Buying Guide: Affordable Accessories For Your Car
Airmail for iPhone Gets a Bunch of iOS 10 Integration Features
All the New Features in iOS 10 In Two Minutes
All the New Features in macOS Sierra
Build An Insanely Small, Fully Functional MAME Cabinet
Google Trips Personalizes and Automates Your Travel Plans From Start to Finish
Learn How to Win at Carnival Games With This Handy Guide
Polarr 3.0 Uses iOS 10's Facial Recognition for Robust, Automatic Photo Retouching
Speedify 4.0 Uses Wi-Fi and Mobile Data At the Same Time for Better Speed and Reliability
SwiftKey's New "Neural Network" Text Prediction Is Impressively Good
The Quickstart Guide to Decluttering Your Home
Top 10 Secret Features in iOS 10
Top 10 Ways to Improve Your Daily Commute
Resources and Links | Arthur D. Simons Center
How to Choose the Best Facial Moisturizer for Healthy Skin
The Coming of the Russian Jihad: Part I
Afghan War News
The Case for Integrated Civilian, Military ISR/C4ISR Stra | Defense News
Minnesota Mall Stabbing Could Be Realization of Terror Fears | Military.com
'Likes' Less Likely to Affect Self-Esteem of People with Purpose
Visual Hunt: 350+ Million Photos For Free Commercial Use | NOUPE
Using social network analysis to prevent money laundering
Cellphone Bombs: The New American Terror - The Daily Beast
How the New York City Bomber Was Caught - The Daily Beast
Indoor navigation tool for blind individuals now available as open-source app
Tribal Leaders Say IS Regrouping in Afghan-Pakistan Border Areas
S&T News | Homeland Security
Information & Analysis | EUROPEAN ASYLUM SUPPORT OFFICE
Analysis and Statistics | EUROPEAN ASYLUM SUPPORT OFFICE
Country reports | EUROPEAN ASYLUM SUPPORT OFFICE
EASO publishes a Country of Origin Information (COI) report on recruitment by armed groups in Afghanistan | EUROPEAN ASYLUM SUPPORT OFFICE
Types of operations | EUROPEAN ASYLUM SUPPORT OFFICE
National Preparedness Report | FEMA.gov
Losing in Afghanistan | Foreign Affairs
A Director of the Present? Nowcasting Homeland Security’s Challenges - HOMELAND SECURITY AFFAIRS
HOMELAND SECURITY AFFAIRS - The Journal of the NPS Center for Homeland Defense and Security
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
National Preparedness Directorate | FEMA.gov
Naval Postgraduate School
Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes | WIRED
FEMA & DHS
Copy links to clipboard
Copy
Open
Browse 6,645 Document files | FEMA.gov
OpenFEMA | FEMA.gov
Technology
List of Awards
Technology Research, Development, Testing, and Evaluation Process | National Institute of Justice
Preparedness, Response and Recovery Publications | Homeland Security
National Incident Management System | FEMA.gov
S&T Publications | Homeland Security
Inbox (231) - scitrenbaum@gmail.com - Gmail
Through-the-Wall Surveillance | National Institute of Justice
DHS Policy Regarding the Use of Cell-Site Simulator Technology | Homeland Security
List of Awards
arXiv.org Search
Featured Publication Archive | Homeland Security
Detection and Surveillance Technologies | National Institute of Justice
Detecting Items Hidden on a Person or Inside a Body | National Institute of Justice
Detecting Hidden Items and Substances in the Surrounding Environment | National Institute of Justice
Detecting Weapons, Contraband and Chemicals | National Institute of Justice
Enhanced Surveillance for Public and Officer Safety
Cell-site simulators - Google Search
Afghan War News: Afghan Security News - Good and Bad
If You Only Have Room For One Trashy Network Thriller In Your Autumn Viewing Schedule, Make It Secrets & Lies - Secrets & Lies - Previously.TV
Pentagon quietly studying Islamic theology to understand the Islamic State and al-Qaeda
Stephen E. Arnold: Palantir Attacks US Army, Geosparsing, DoD Buries In-Q-Tel, Digital Currencies Neither Anonymous nor Reliable « Public Intelligence Blog
Crowdsourced intelligence gathering can prevent such incidents as Chelsea bombing | Government Security News
Modeling Precursors for Event Forecasting via Nested Multi-Instance Learning
LiveSafe - Safety in everyone's hands and connecting people to help
[1609.07302] Building accurate HAV exploiting User Profiling and Sentiment Analysis
Sensors | An Open Access Journal from MDPI
Computer Vision and Pattern Recognition authors/titles recent submissions
arXiv.org Search
Physical Sensors - A section of Sensors
Sensors | Special Issue : Big Data and Cloud Computing for Sensor Networks
Data Feeds | FEMA.gov
2016 National Preparedness Report | FEMA.gov
OpenFEMA (31) | FEMA.gov
Resources & Documents Collections | FEMA.gov
Emergency Preparedness Materials (Families, Pets, Seniors, Disabled, Businesses) (35) | FEMA.gov
America's PrepareAthon! (11) | FEMA.gov
America’s PrepareAthon! Materials (36) | FEMA.gov
National Preparedness | FEMA.gov
Emergency Alerts | Ready.gov
Make A Plan | Ready.gov
National Preparedness Month | Ready.gov
Types of Technology and Tools | National Institute of Justice
Mapping and Analysis for Public Safety | National Institute of Justice
Office of Science and Technology Policy | The White House
CrimeStat: Spatial Statistics Program for the Analysis of Crime Incident Locations | National Institute of Justice
Course Materials for Intermediate Crime Mapping Using ArcGIS 10.1
List of Awards
Thesis and Dissertation Collection
Homeland Security Market Research
Copy links to clipboard
Copy
Open
Our People - Homeland Security Market Research
Global Homeland Security & Public Safety Market - 2015-2022 - Homeland Security Market Research
U.S. Airport Security Market - 2015-2020
Video Analytics & Intelligent Video Surveillance Technologies
Global Video Analytics
Global People Security Screening: Technologies, Industry & Market - 2015-2020 - Homeland Security Market Research
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
Homeland Security Market Research - Premium HLS & Public Safety Technology & Market Reports
Category - Homeland Security Market Research
Market Reports - Homeland Security Market Research
Category - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Americas Market-2015-2020 - Homeland Security Market Research
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
Middle East & Africa Airport Security Market - 2015-2020 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
Global Homeland Security & Public Safety Industry - 2016 Edition - Homeland Security Market Research
European Homeland Security & Public Safety Technologies & Markets - 2016-2022 - Homeland Security Market Research
U.S. Homeland Security & Public Safety Market - 2016-2022 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Europe, Middle East and Africa Market-2015-2020 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Asia-Pacific Market-2015-2020 - Homeland Security Market Research
Saved Session - Session Buddy
09-26
Copy links to clipboard
Copy
Open
EarlyWarning
Knowledge Foundation - Technology Commercialization Alliance
Media Partners - Homeland Security Market Research
Knowledge Foundation - Technology Commercialization Alliance
Defence and Security | Clarion Events ltd
AnkerDirect @ Amazon.com
Kinja Deals Timbuk2 CMB
MacOS Sierra Breaks Popular Keygens, Pirate Finds Fix - TorrentFreak
Amazon.com: anker powercore - Portable Power Banks / Batteries & Battery Packs: Cell Phones & Accessories
Examining ISIS Support and Opposition Networks on Twitter | RAND
Policy Analysis: Terrorism - The Washington Institute for Near East Policy
Stein Program on Counterterrorism and Intelligence - The Washington Institute for Near East Policy
Literally Trump
Sondergaard: TACTICS - Google Scholar
Real-time crowd labeling for deployable activity recognition
Useful Websites - Radical Islam - LibGuides at FBI Library
greta's gouge: Friday's Miscellany 09-23-2016
Hyper Key hack in MacOS 10.12 Sierra using Karabiner-Elements and Keyboard Maestro - Album on Imgur
inessential: Memory Graph Debugger Tips
How to Stream Tonight's First Presidential Debate Online, No Cable Required
Featured Bag News, Videos, Reviews and Gossip - Lifehacker
The Notebook-Packed Shoulder Bag
I Think Nate Silver Is Broken, Maybe?
Not Up For Debate...
The Stroz Friedberg Cyber Brief — Center on National Security
Technology To Find Concealed Weapons, Coming To Your Street Corner.
Intelligent Automation, Inc.
The Rise of ISIL: Counterterrorism Lectures 2015 - Counterterrorism Lectures 2015 - The Washington Institute for Near East Policy
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Virtual Packs of Lone Wolves – Small World, Big Ideas – Medium
/dev/lawyer The MIT License, Line by Line
Usar Marked 2 para previsualizar AsciiDoc | adictosaltrabajo
Compendium of scenario-based attack profiles and compendium of full scenarios - Google Search
Deployable, near-real time field biometrics - Google Search
Predictive policing tools showing situational awareness - Google Search
STEIN COUNTERTERRORISM LECTURES - Google Search
Standoff Electromagnetic Concealed Weapons Detection - Google Search
Title: TACTICS: Policy and strategic impacts, implications and recommendations - Google Search
exploiting social media - Google Search
OJP Publications - National Criminal Justice Reference Service
Advanced Search - ProQuest Dissertations & Theses Global - ProQuest
License Plate Recognition - National Institute of Justice Search Results
American Military University | Online Degrees & Certificates | 877-755-2787 or info@apus.edu
Countering Drones - Day 2
CRCnetBASE
CRCnetBASE
CRCnetBASE
CRCnetBASE - Risk and Crisis Management in the Public Sector
CRCnetBASE - The Counterterrorism Handbook
CRCnetBASE - Effective Surveillance for Homeland Security
CRCnetBASE - Policing Major Events
CRCnetBASE - Soft Target Hardening
CRCnetBASE - Soft Target Hardening
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
National Center for Campus Public Safety Library | NCCPS
Real-Time Crime Forecasting Challenge
Video Analytics for Criminal Justice Uses | National Institute of Justice
Browse - Oxford Reference
Databases and Data Collection, Analysis, and Processing | RAND
The Science and Technology of Counterterrorism - ScienceDirect
Directory of Open Access Journals
National Law Enforcement and Corrections Technology Center TechBeat, September 2016
JTIC Corrections - Contraband Detection and Other Facility Operations and Population Services
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Public Intelligence
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk: Carl Young: 9780124200562: Amazon.com: Books
BJA Body-Worn Camera
A Futurist's Guide to Emergency Management - CRC Press Book
Encyclopedia of U.S. Intelligence - Two Volume Set (Print Version) - CRC Press Book
Grasping the Moment: Sensemaking in Response to Routine Incidents and Major Emergencies - CRC Press Book
New Developments in Biological and Chemical Terrorism Countermeasures - CRC Press Book
Soft Target Hardening: Protecting People from Attack - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
The Complete Guide to Physical Security - CRC Press Book
Security Management from CRC Press - Page 1
Homeland Security from CRC Press - Page 1
Federal Register :: Home - Monday, September 26th
Managing Critical Incidents and Large-Scale Event Security - Google Search
The Science and Technology of Counterterrorism - Google Search
Mass Gatherings; Large-Scale Events Security Symposium – Homeland Security Digital Library
JTIC - Popular Publications
National Criminal Justice Reference Service
NCJRS Abstract - National Criminal Justice Reference Service
DMI TOOLS
Copy links to clipboard
Copy
Open
ToolDatabase < Dmi < digitalmethods.net
DMI single sign-on
Compare Lists
Geo Extraction
Harvester
Image Scraper
Itunes store
Link Ripper
Sentence Ripper
TOOLS
Copy links to clipboard
Copy
Open
Remove Numbers from the Beginning of Terms in a List
Free Online TEXT Tools
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Convertjson.com - Convert JSON to other Formats and Vice-Versa
Clarion Events ltd |
Mefancy Text and html tools
Extract URLs
Data Design Group, Inc.
Add / Remove Line Breaks
Text Alphabetical Order tool
Playlist Machinery
09-26 PM
Copy links to clipboard
Copy
Open
Chris Seibold - O'Reilly Media
How to Download Example Code - Customer Service - O'Reilly Media
Handbook of Terahertz Technologies: Devices and Applications [20 (download torrent) - TPB
Mobile Devices Tools and Technologies [2015] [PDF] (download torrent) - TPB
NoctDeath - TPB
Facebook Graph Search Generator by Henk van Ess and Torment Gerhardsen
Global Video Analytics
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
The Counterterrorism Handbook: Tactics, Procedures, and Techniques, Fourth Edition - CRC Press Book
CRCnetBASE - The Counterterrorism Handbook
Intelbriefs | The Soufan Group
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
Heavy metal music meets complexity and sustainability science | SpringerLink
Intelligent Behavior Modeling on Information Delivery of Time-Sensitive Targets - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Abnormal Event Detection Based on Crowd Density Distribution and Social Force Model - Springer
Pre-Incident Indicators
Most Wanted Terrorists — FBI
Every Acronym Project Name From DARPA's Demo Day. - Google Search
Social Media in Strategic Communication - Google Search
Hybrid Warfare Keywords - NATO LibGuides - Google Search
Science and Technology to Combat Terrorism - Google Search
How to Gather Intelligence on Targeted Attacks - Tricks and Tips - Google Search
Search – Findo
Home - Dropbox
Audacity®
Battery Health 2 for Mac - FIPLAB
About | Acqualia
krypted.com - Tiny Deathstars of Foulness
Apple Configurator 2 - krypted.com
List Of Mac OS X Error Codes - krypted.com
Mac Commands - krypted.com
Common Apple Ports - krypted.com
Glossary of Apple Terms - krypted.com
Posts Tagged “bookmarks” - BrettTerpstra.com
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Stand-Off Detection of Suicide Bombers - Google Search
The tool that can sniff out a suicide bomber from 100 metres away | Daily Mail Online
Amazon.com: John G. Voeller: Books, Biography, Blog, Audiobooks, Kindle
Counterterrorism and Cybersecurity - Springer
Mobile Devices: Tools and Technologies - CRC Press Book
Missing Manuals
Data Mining Resources
DataMiningConsultant.com
DHS Apps | Homeland Security
Data.gov
National Preparedness Month | Ready.gov
Region X: AK, ID, OR, WA | FEMA.gov
State of Oregon: Oregon Office of Emergency Management
Emergency Management Division | Washington State Military Department
Cascadia Rising - Preparedness Toolkit
Signup for FEMA Email Updates
Site map | Homeland Security
The Great Oregon ShakeOut - Get Ready!
Oregon Office of Emergency Management Tsunami Information
State of Oregon: Oregon Office of Emergency Management
Oregon Office of Emergency Management Earthquakes
Benton County (OR) Amateur Radio Emergency Service
Oregon Office of Emergency Management Prepare, Protect, and Recover
Search Capabilities | www.ara.com
Clean Your Cluttered Hard Drive with macOS Sierra's New Storage Manager
This Page Lets You Disable a Lot of Google's Activity Tracking
People followed by Portland OR Alerts (@pdxalerts) | Twitter
Profiling the Islamic State | Brookings Institution
Wiki TOC scraper
Remove Extra Spaces tool
Add / Remove Line Breaks
Find Web Tools and Apps | Homeland Security
DHS S&T Center of Excellence Technology Fact Sheets - University Programs
Defense Threat Reduction Agency
After Action Report (AAR) Templates
People Screening Technologies & Global Markets - 2012-2016 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
Standoff IED, Person-Borne & Vehicle-Borne Explosives & Weapon Detection: Technologies & Global Market - 2015-2020 - Homeland Security Market Research
HSSAI | ANSER
Homeland Security Market Intelligence | World Leading Homeland Security & Public Safety Market Research
Homeland Security and Defense Center | RAND
Emergency Management Institute | Independent Study Program (IS)
Publications Library | Bureau of Alcohol, Tobacco, Firearms and Explosives
Science and Technology | Homeland Security
National Counterterrorism Center (NCTC)
National Institute of Standards and Technology | NIST
Ready.gov
USFA NFA Courses, Schedules and Instructors Course Search Results
Mobile App | FEMA.gov
U.S. Fire Administration resources for National Preparedness Month
FEMA on the App Store
Download fire data and data analysis tools
Emergency Response to Terrorism: Strategic and Tactical Considerations for Supervisors (F0549)
10-03
Copy links to clipboard
Copy
Open
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Arthur - Safely optimize some of your Mac's hidden settings
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
Browse All Guides - LibGuides at FBI Library
Home - Community Policing - LibGuides at FBI Library
Journal Articles - Intelligence Analysis - LibGuides at FBI Library
Home - Interviewing and Interrogation - LibGuides at FBI Library
Government Information - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
Home - LibGuides at FBI Library
A new version of Gitrob is out | michenriksen.com
Moral Machine
Proceedings of the Tenth International Conference on Web and Social Media
Jewish Calendar
CISN: EEW Project
America’s New Special Operations Commander Wants to Predict the Future - Defense One
Carry On Luggage and Bags - Up To 70% Off - eBags.com
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
Homeland Security Today: NYPD Developing Strategy to Counter Terrorist Drone Use
Conflict with ISIS
Snap It - Lose It!
Implementing graph grammars for intelligence analysis in OCaml
Motorcycle routes in Portland, United States on Mopedmap - Your bike routes online
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Home
Science.gov: USA.gov for Science - Government Science Portal
ShakeAlert | Earthquake Early Warning
2016 Conference
IARPA wants intel tools that can predict the future -- Defense Systems
DuckDuckGo
Two Person Bags | The Earthquake Bag
GitHub - gingerbeardman/Emojipedia at producthunt
Push/press/click: A smart button roundup
Connect OneDrive to hundreds of apps - IFTTT
Sync new files added to Dropbox to your Google Drive by lbrfabio - IFTTT
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Blasch: Revisiting the JDL model for information... - Google Scholar
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Taylor: A comparison of approaches to detect deception - Google Scholar
(1) The West Wing Weekly (@WestWingWeekly) | Twitter
ACAPS | Tools, know-how and training for assessments in crises
IST-132 Multi-Level Fusion of Hard and Soft Information
Fast Company | Business + Innovation
Architectures for contextual information exploitation - Google Search
Fundamentals of multiple-hypothesis tracking - Google Search
Hard & soft fusion – military application - Google Search
INVESTIGATIONS INVOLVING THE INTERNET AND COMPUTER NETWORKS - Google Search
Social Media Screening for Supporting Real-Time Decision Making - Google Search
ecent advances in multiple-hypothesis tracking - Google Search
ountering Nontraditional HUMINT Collection Threats. - Google Search
CheatSheet
Save for later by Sara Citrenbaum - Product Hunt
TagSpaces - Your Hackable File Organizer
Searching for evidence of Trump’s personal giving - Washington Post
40 maps that explain the world - The Washington Post
A Military-Grade Drone That Can Be Printed Anywhere | WIRED
Hacker Lexicon: What Is Password Hashing? | WIRED
Publications and Conferences
Bandit, criminal, robber, robbery, terrorist, thief, thug icon | Icon search engine
Afghan War News: Afghan Security News Update (20161002)
greta's gouge: Friday's Miscellany 09-30-2016
Jake Viens' Forensic Blog: Dropbox Forensics
The 6 Types Of Contractors You Encounter Overseas
CBNW
Digital Issues | CBNW
US Army unveils its 'Big 8' initiatives
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Published Research | RAND
Tools | RAND
Brief Treatment for Substance Use Disorders: A Guide for Behavioral Health Providers | RAND
Costs of the Conflict Calculator | RAND
ENGAGED Toolkit: Improving the Role of Nongovernmental Organizations in Disaster Response and Recovery | RAND
Terrorism and Homeland Security | RAND
Terrorism Threat Assessment | RAND
How I lived like a badger and learned more about the world.
Statewatch: Resources for researchers on civil liberties, justice and home affairs, access to documents and democratic standards in Europe
Advanced Certificate in Terrorism Studies from the University of St Andrews - Informa plc
Department of Defense Laboratories: Innovation through Science and Engineering in Support of Military Operations | Armed Services Republicans
Home Page | DHS BAA
Funding Opportunities | DHS BAA
Funding Opportunities | DHS BAA
Enhanced Passive Surveillance System | Federal Crowdsourcing and Citizen Science Toolkit
Keyboard shortcuts and Multi-Touch gestures | DaisyDisk - Analyze disk usage and free up disk space on Mac
Locating space wasters | DaisyDisk - Analyze disk usage and free up disk space on Mac
Tips and tricks | DaisyDisk - Analyze disk usage and free up disk space on Mac
Bioresearch Labs and Inactivation of Dangerous Pathogens | Energy and Commerce Committee
Robotics & Autonomy | Global Security Initiative | ASU
CBNW 2016 Vol 1 by immags - issuu
(U//FOUO) DHS-FBI-NCTC Bulletin: Homegrown Violent Extremists Focusing More on Civilian Targets | Public Intelligence
Find and remove duplicate items in your iTunes library - Apple Support
About backups for iOS devices - Apple Support
Install Project - Office Support
Bitmoji
Bruker: Applications - Life Science and material research applications and solutions
Center for a New American Security
sigstore.dbx - Google Search
Story Wars
Providing text analysis APIs that understand human text - Twinword
Sentiment Analysis API - Twinword Inc.
Advanced Ctrl+F Search. Research Tool. Twinword Finder
Write with a Built-In Thesaurus - Twinword Writer
10-11 PM
Copy links to clipboard
Copy
Open
Multimodal-based Multimedia Analysis, Retrieval, and Services in Support of Social Media Applications
Contextual Enrichment of Remote-Sensed Events with Social Media Streams
FALSETTOSONBROADWAY.COM
Inspire Magazine | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
Repository maps
"Making It Personal: How the Islamic State Targets the Alienated" by Andi M. Shackleton
Civil and Environmental Engineering Undergraduate Honors Theses | Civil and Environmental Engineering | Portland State University
Dissertations and Theses | Dissertations and Theses | Portland State University
Casting homelessness in a different light: Can you solve it? « Silicon Florist
Office Humor, Tech Culture, Trending News
Your Procrastination Horoscope for This Month, or Whenever
Ultimate Email Cheat Sheet
trendwatching.com | AUTONOMANIA!
(1) Home - USMA Library Research Guides - Research Guides at U.S. Military Academy at West Point
Islamic State recruiters create complex network of Facebook accounts to entice Australian teens - ABC News (Australian Broadcasting Corporation)
Cult of Mac | Tech and culture through an Apple lens
New Western Digital My Passport drive puts terabytes in palm of your hand
DSpace | DSpace is a turnkey institutional repository application.
Police militarization in the United States: the state of the field: Policing: An International Journal of Police Strategies & Management: Vol 39, No 4
Automatically Find Payments, Receipts, Invoices from Emails
Resize and Optimize Online Images Before Downloading Them
Neuropsychopharmacology - Brain Stimulation in Addiction
Facebook Live: ‘A Day in the Life at Lincoln Center’ - The New York Times
ISIS Media Output Drops as Military Pressure Rises, Report Says - The New York Times
Calendar | OMSI
A Day in the Life at Lincoln Center Live-Streamed Today | Playbill
Pitfalls of Predictive Policing | RAND
Combatting the Islamic State's Digital Dominance: Revitalizing U.S. Communication Strategy: The Washington Quarterly: Vol 39, No 1
How Twitter Is Changing Modern Warfare - The Atlantic
Diseases
WeSeeHSE – Medium
Homeland Security – Medium
Research and Publications
The Pirate Bay - The galaxy's most resilient bittorrent site
The Pirate Bay - The galaxy's most resilient bittorrent site
Brad Thor Ebook Collection (epub format) (download torrent) - TPB
Skyeater - TPB
Suits : Spooks – Innovative Problem-Solving On National Security Issues
Jewish Tashlich Ritual of Rosh HaShanah
What is Tashlich? - High Holidays
Video > HD - TV shows - TPB
Command and Control Research Portal
2016 T4 — Command and Control Research Portal
2016 Presentations and Papers — Command and Control Research Portal
2016 Tracks — Command and Control Research Portal
2016 T3 — Command and Control Research Portal
2016 T5 — Command and Control Research Portal
2016 T7 — Command and Control Research Portal
EtHD - TPB
Project Socrate - Google Search
Project Socrates
kol nidre translation - Google Search
What is Kol Nidrei?
Judaism 101: Yom Kippur
(1) Sesame Street (@sesamestreet) | Twitter
KOL NIDRE - JewishEncyclopedia.com
A lost Europe is mourned in this version of Kol Nidrei – Slipped Disc
Kol Nidre live streams offer forgiveness with a click | Jewish Telegraphic Agency
Text of Kol Nidrei Prayer - High Holidays
Examining the Mystery of Kol Nidre | B'nai Jeshurun
Kol Nidrei - My Jewish Learning
kol nidre transliteration - Google Search
Tashlich - Guide - Jewish Kids
Tashlich's Subtle Message
Scholar Alert - [ Metrics of Terrorism ] - scitrenbaum@gmail.com - Gmail
Inbox (688) - stczztop@gmail.com - Gmail
Browse by Research Unit, Center, or Department | Research Showcase @ CMU
scholar.google.com/scholar_url?url=http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi%3Farticle%3D1605%26context%3Dchtlj&hl=en&sa=X&scisig=AAGBfm1gGqQMEbiNPuLDEU_3Gwwjznuauw&nossl=1&oi=scholaralrt
Sign prediction in social networks based on users reputation and optimism | SpringerLink
Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime | SpringerLink
Journal of Ambient Intelligence and Humanized Computing - Springer
Personal - Dropbox
New approach to block binge eating -- ScienceDaily
Fighting the Islamic State on Social Media | RAND
Police Body-Worn Cameras: More to It Than What You See | RAND
Big Pharma's Manufactured Epidemic: The Misdiagnosis of ADHD - Scientific American
The Trump Campaign Is Ready To Burn This Motherfucker Down
10-12 AM
Copy links to clipboard
Copy
Open
Mission-Informed Needed Information - Discoverable Available Sensing Sources - Google Search
Projects - Research portal
Institute for Military Operations - Research portal
2015 Tracks — Command and Control Research Portal
Graduate Studies | Utah State University Research | DigitalCommons@USU
Knowledge Systems For Coalition Operations
Knowledge Systems for Coalition Operations
How to Make Social Media More Effective as an Exploitation Area | ARSLAN | Journal of Military and Information Science
The Intelligence Exploitation of Social Media - Research portal
5350 - 2015 Human Systems Conference
6350 - 2016 Human Systems Conference
Arslan: A New Discipline of Intelligence: Social Media - Google Scholar
Charles River Analytics Staff Describe Human Systems Challenges at NDIA Human Systems Conference | Charles River Analytics
Intelligence Exploitation of Social Media - Google Search
The Weaponization of Social Media: How Social Technology Enables and Challenges Defence - Google Search
jp 2-01.2 counterintelligence and human intelligence support to joint operations - Google Search
Liked videos - YouTube
Green Day celebrates 30 years together + new album ‘Revolution Radio’ in Town Hall | SiriusXM Blog
Calhoun Home
The Real 'Stuff White People Like’
NATO SAS-IST-RTG-102 Intelligence Exploitation of Social Media - Research portal
Tim Harford — Messy
The Green Day Authority
Watch clips from Green Day's town-hall interview with SiriusXM
IAI announces the release of Scraawl 2.0, a social network analytics tool for brand monitoring and
Predictive Policing: Forecasting Crime for Law Enforcement | RAND
The Nailbot Prints Art on Your Fingernails Using Your Smartphone
Medium
Dave Pell – Medium
30 Quick Takes on Debate 2 – Medium
Full List of Stuff White People Like | Stuff White People Like
I’m Angry At Facebook
28 Simple Things All White People Just Love To Do
SAS-IST-102 Intelligence Exploitation of Social Media
IST-124 Heterogeneous Tactical Networks - Improving Connectivity and Network Efficiency
IST-SAS-139 Visual Analytics for Exploring, Analysing and Understanding Vast, Complex and Dynamic Data
Discourse Analysis & Conflict Prediction - Google Search
NATO SAS-RTG-102 - Google Search
SCRAAWL: Joint Army/Navy Social Media Analysis - Google Search
Scraawl - Actionable Insights from Analytics
YouTube
Official London Theatre - YouTube
Elsie - YouTube
Ramin Karimloo @ B.B. King NYC (7/24/2016) - YouTube
michele - YouTube
Jennifer Rickerson - YouTube
jsalow2 - YouTube
ren598 - YouTube
West End Live 2016 Samantha Barks - YouTube
West End Live 2016 Ramin Karimloo - YouTube
STICKERS
Copy links to clipboard
Copy
Open
Google Search
French Bulldog-PIGU II by OneGod-Ethan
【個人原創貼圖】貓狗大戰篇--可愛寵物大集合 : LINE台灣 官方BLOG
豆卡頻道2-茶包&飯丸 | Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
法鬥皮古 | LINE貼圖輕鬆購 | 原創主題購買及超商付款請賴客服line2941
法鬥皮古LINE貼圖資訊站
豆卡頻道-動動貼LINE貼圖資訊站
Hi! French Bulldog - Creators' Stickers
French Bulldog Mochi - Creators' Stickers
Google Search
Google Search
Google Search
10/15
Copy links to clipboard
Copy
Open
102.1 the Edge - YouTube
No Day But Today - The Story of Rent - YouTube
FamousInNY - YouTube
Benjamin Rauhala - YouTube
FamousInNY - YouTube
Benjamin Rauhala - YouTube
Suman Tharan - YouTube
BRDW lovers - YouTube
FULL- the Sound of Musicals ep 1: Charlie and the Chocolate Factory - YouTube
max chernin - YouTube
Dr.Soc - TPB
Singer: Max Chernin - YouTube
Alysha Deslorieux - Satisfied (Hamilton) - YouTube
CCM - YouTube
Alexander Sage Oyen -- "Introduction" - YouTube
Use Somebody - Max Chernin - YouTube
Max Chernin & Rachel Bahler // Part Of Your World - YouTube
"I'll Cover You (Reprise)" - Max Chernin and the cast of WE GREW UP LIKE THIS - YouTube
Trevor McQueen & Michael Campayno - "Someone Like You/Edge of Glory" (Adele/Lady Gaga) - YouTube
Trevor McQueen & Michael Campayno - YouTube
sMASHed UP: a late-night mash-up bash - YouTube
Steven Grant Douglas - "Somewhere Only We Know/Closing Time" (Keane/Semisonic) - YouTube
The DMV’s cyber community is steadily attracting more interest from venture capitalists - The Washington Post
Content analysis to classify and compare Live, Virtual, Constructive simulations and System of Systems
Europe’s prisons are ‘breeding grounds for terrorists’, new study claims | IRIA News
Book Holiday Flights Now to Avoid Rising Fares
Bitstrips - Home
Person of Interest - CBS.com
#sploot - DeviantArt
Merrill Rainey
misscatlo
Sheldon® Comic Strip: Daily webcomic by Dave Kellett
Saturday Morning Breakfast Cereal - The Presidency
Bitmoji - Chrome Web Store
Sticky Draw - Create your own stickers on the App Store
Amazon.com: iPhone 7 Cases, Accessories & Bluetooth Headphones
Today Will Be Different: Maria Semple: 9780316403436: AmazonSmile: Books
AmazonSmile: iPhone 7 Plus Case, Crosspace Wallet Card Holder Defender Bumper Soft Rubber Hard PC Back Hybrid [Dual Layer] Shockproof Cover Flexible Protective with Card Slots for Apple iPhone 7 Plus (2016)-Gold: Cell Phones & Accessories
Bitmoji
BuzzFeed Animals
16 Adorable Corgi Sploots To Get You Out Of Any Rut
24 Very Important Corgi Sploots
Command and Control of Proactive Defense - Google Search
bastille a cappella - Google Search
Stumpers & rump. #imgur | Aww | Pinterest | Corgis, Cartoon and Google Search
BBC Radio 1 - YouTube
3voor12 - YouTube
anrina - YouTube
More Elsie Fest 2015 - YouTube
Ramin Karimloo @ B.B. King Blues NYC (7-23-16) - YouTube
Miscast Gala 2016 [Official MCC Theater Videos] - YouTube
Sanna Kihlman - YouTube
Matt Doyle - YouTube
Ramin Karimloo Sings "Being Alive" from COMPANY and PRINCE OF BROADWAY - YouTube
Adam Pascal & Anthony Rapp - No Day But Today / Seasons of Love - Adelphi University 9-20-13 - YouTube
Lea Salonga - Lea's Medley (Live @ 54 Below) - YouTube
Ramin Karimloo @ B.B. King NYC "Lily's Eyes" with Andrew Kober - YouTube
Adam Pascal @ Feinstein's 54 Below (10/8/2016) "Memory" - YouTube
Ramin Karimloo @ B.B. King NYC "Music of the Night" - YouTube
Imagine Dragons - It's Time - Acoustic [ Live in Paris ] - YouTube
Bastille - Flaws - Acoustic [ Live in Paris ] - YouTube
Bastille - "Good Grief" Acoustic | Elvis Duran Live - YouTube
In the Recording Studio: "If You Knew My Story" from BRIGHT STAR - YouTube
Ramin Karimloo, Hadley Fraser 'Bring Him Home' Union Chapel London 19.01.16 HD - YouTube
Lea Salonga sings I Dreamed A Dream on Seth Speaks - YouTube
Bastille - Pompeii - Acoustic [ Live in Paris ] - YouTube
This Week's Top Downloads
Crash: how computers are setting us up for disaster | Tim Harford | Technology | The Guardian
English man spends 11 hours trying to make cup of tea with Wi-Fi kettle | Technology | The Guardian
Facebook, Instagram, and Twitter Provided Data Access for a Surveillance Product Marketed to Target Activists of Color | ACLU of Northern California
Doo Pigou law | skinhead sell - the largest map Shopping Network | Holy crap stores can store over one thousand members of Free formalities sending 30 straight 300
Details - Stanford H4D - Spring 2016
Weaponized Mini-Drones Entering the Fight | Defense Update:
Saturday's Best Deals: Dash Cam, Pressure Cookers, $22 Bidet, and More
How To Turn Off Read Receipts And Typing Alerts For LinkedIn Messages
News
Newsletter Archive – Club MacStories
Exploring the iMessage App Store One Month Later: Our Favorite Stickers and iMessage Apps – MacStories
Lost Keys? Save up to 30% to Help Find Your Keys with Tile’s Wireless Key Tracker | Tile
iPhone 7: Computer from the Future – MacStories
Command and Control of Proactive Defense (C2PD) - Federal Business Opportunities: Opportunities
Islamic State-inspired Muslim cell plotted jihad weapons tunnel into Israel
What is the difference between Tile Mate, Tile Slim, and Tile Original? – Tile Support
Exify - Tools for Photos on the App Store
AppsGoneFree
News
How to Quickly and Easily Convert to PDF on iOS
iPhone 7 Plus vs DSLR Camera
Palantir Technologies: Pushing Back at Labor : Stephen E. Arnold @ Beyond Search
"Development and Characterization of Reagent Pencils for Microfluidic P" by Cheyenne H. Liu
3D printing Jurassic Park: Copyright law, cultural institutions, and makerspaces | QUT ePrints
NSA to BRICS counterparts: Step up terror fight, put in place legal regime | The Indian Express
The Most Important Scenes from Fantastic Four (As I Remember Them)
http://israeliwarcriminals.zzl.org/ is not available
Lifehacker - Tips and downloads for getting things done
Get an Empty Seat Next to You On Your Flight With This Airline App Trick
Top 10 Gmail Tips for Power Users
Motherboard | Home | Motherboard
Cocaine Bust Shows How Close the Dark Web and Street Crime Really Are | Motherboard
No satellites needed for next-gen navigation system that uses "signals of opportunity"
Nuclear Weapons 232 - DARPA Considering Blockchaining To Help Protect Nuclear Arsenal Computers | Nucleotidings
Building a Smart Home With Apple’s HomeKit | The Wirecutter
MacStories Weekly: Issue 52
Why Your Farts Stink So Bad, and How to Stop Them
Skim Split Screen Workaround | Jeff Taekman's WiPPP
Writing and Reading Workflow: Batching and Automating Full-Text Retrieval | Jeff Taekman's WiPPP
Writing Workflows: Processing Annotations (All Roads Lead to Skim) | Jeff Taekman's WiPPP
Aardman
AddictiveTips - Tech tips to make you smarter
How To Customize Assistive Touch In iOS
The Stroz Friedberg Cyber Brief — Center on National Security
AFRL Command and Control of Proactive Defense (C2PD) BAA | Contract Research and Development
CSV Templates
Extract Emails
Joe's Blog » On Making Quality Sticker Screenshots
Micromachines | Free Full-Text | Review of Microfluidic Photobioreactor Technology for Metabolic Engineering and Synthetic Biology of Cyanobacteria and Microalgae
Report of the Independent Commission of Inquiry on the 2014 Gaza Conflict
The Hot Spots of the World | RAND
Three arrested in alleged scheme to export sensitive U.S. technology to Russia | Reuters
Paper-Based Magnetic Nanoparticle-peptide probe for Rapid and Quantitative Colorimetric Detection of Escherichia coli O157:H7
Addicted to Your iPhone? You’re Not Alone - The Atlantic
Keep track of your tasks hands-free with the new Alexa integration - Todoist Blog
Club MacStories
CCI Blog » Blog Archive » The Complete Privacy & Security Podcast
Today / Me
OSINT Video Training by Michael Bazzell | Open Source Intelligence Techniques
Chapik on the App Store
Coffee Snob Stickers on the App Store
Espresso Stickers on the App Store
Meow Stickers on the App Store
Monster Desserts on the App Store
Pun Pals Sticker Pack on the App Store
SketchBook Motion on the App Store
Sploot the Corgi on the App Store
Stickers: Photo Props on the App Store
Toca Life Paper Bag Cat on the App Store
Truth Truth Lie on the App Store
Pinboard: network for scitrenb
Pinboard: bookmarks for scitrenb tagged 'mostusefulsiteever'
iMessage App Store Already Tops 400 Apps and 1,250 Sticker Packs
Doing the two-step: Switching to Apple's two-factor authentication - Six Colors
Cat (@catlo) | Twitter
Cory Bohon (@coryb) | Twitter
Merrill Rainey (@LittleRainey) | Twitter
Amazon.com - Motion Activated Bed Light, Vansky Flexible LED Strip Sensor Night Light Illumination with Automatic Shut Off Timer (Warm Soft Glow) -
The Iconfactory Goes All Out for Halloween – MacStories
Walt Mossberg on Siri’s Failures and Inconsistencies – MacStories
Healthy Competition – MacStories
Canvas - Relay FM
Sploot the Corgi - Google Search
oceansjenny - YouTube
nikimak12 - YouTube
Next to Normal US Tour - Original Tour Cast - YouTube
Aaron Tveit & Leslie Odom Jr. "What You Own" @ Elsie Fest - YouTube
The Little Shop Archive - YouTube
How Does Ethnic Rebellion Start?
Get started with iPhone 7: The Ultimate Guide | iMore
“They will rot the society, rot the party, and rot the army”*: Toxification as an ideology and motivation for perpetrating violence in the Khmer Rouge genocide?: Terrorism and Political Violence: Vol 0, No 0
Reassessing the Threat of Homegrown Violent Extremism in the United States: Overstated or Underestimated? | Small Wars Journal
ISPRS International Journal of Geo-Information | An Open Access Journal from MDPI
Democratic Participation in the Air Strikes Against Islamic State: A Qualitative Comparative Analysis | Foreign Policy Analysis
Formation of raiding parties for intergroup violence is mediated by social network structure
Approval network: a novel approach for sentiment analysis in social networks | SpringerLink
Industry Day V: Intelligence Analysis Tools | The MITRE Corporation
Russia has 'playbook' for covert influence - Google Search
Today / Me
How Do We Stop Our Social Feeds from Being Spied On?
Facebook, Instagram, and Twitter Provided Data Access for a Surveillance Product Marketed to Target Activists of Color | ACLU of Northern California
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
US warship fires defenses off Yemen; ISIS debuts drone IEDs; Iraq’s Abadi vs. Turkey’s Erdogan; Army looks to cut paperwork; and just a bit more... - Defense One
Developing cyber attack prediction capability for IARPA | BAE Systems | United States
Predicting Terrorism From Big Data Challenges U.S. Intelligence - Bloomberg
Trump's refusal to accept intelligence briefing on Russia stuns experts - Chicago Tribune
Spy agencies team up with National Academies | Science | AAAS
Russia has 'playbook' for covert influence in Eastern Europe: study | Reuters
The Shadow Commander - The New Yorker
10/21 IMPORTANT
Copy links to clipboard
Copy
Open
American vigilante hacker sends Russia a warning
Electrospaces.net: NSA's TAO Division Codewords
(6) #iAWACS hashtag on Twitter
Things Take Too Long Now
Terrorism and Political Violence: Vol 28, No 5
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "Riddle me this. Why is RUSSIA TODAY releasing WIKILEAKS dumps 20 minutes BEFORE WIKILEAKS if they are not in bed together?? >> https://t.co/hetApWD9cl"
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
Twitter cuts off Snaptrends, which mines tweets for law enforcement
Meet the vigilante who hacks jihadists - Jan. 16, 2015
Electrospaces.net: NSA Nicknames and Codewords
(9416) Inoreader - Apple/IOS
Jokes Aside | Duck of Minerva
Night Sky 4 Is Apple's Free iOS App Of The Week, Download Now [$1 Value] | Redmond Pie
Best Free Torrent Search Engines | Gizmo's Freeware
Check If iPhone 7 Has Intel Or Qualcomm Modem, Here's How | Redmond Pie
Best Free Torrent Search Engines | Gizmo's Freeware
Sign-in – Homeland Security Digital Library
A Flare For Preparedness: Obama Issues Executive Order on Space Weather Events – Homeland Security Digital Library
ISIS’ Social Media Ops Are Declining, US Military Researchers Say - Defense One
Meet the Navy SEAL Leading the Fight Against ISIS Messaging - Defense One
US intelligence targets advanced security management of virtual systems | Network World
Now Anyone Can Buy Amazon's Cheapest Echo
Security Economics of the Internet of Things - Schneier on Security
tao-organization.jpg (719×540)
Pentagon Metrics on Afghan War are Useless - Matthew Aid
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
New tools and trainings for security practitioners and scholars
The Terrorism and Extremist Violence in the United States (TEVUS) Database | START.umd.edu
Data and Tools | START.umd.edu
Today's Best Deals: Lady Gaga, Eneloop Batteries, Patio Heaters, and More
DDoS Attack on DNS; Major sites including GitHub, Twitter Suffering Outage
Amazon Prime Now: WD 1TB Black My Passport Ultra Portable External Hard Drive - USB 3.0 - WDBGPU0010BBK-NESN: Computers & Accessories
Algorithms Can Tell Bosses How Employees Are Feeling - The Atlantic
MomoNote: iPhone, Memo, Sync
This Item Is Not Eligible For iCloud ... What?
Friday Freeebie: User Interface Line Icon set - BrettTerpstra.com
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
How to Quickly Research All Your Local Elections
This Week's Most Popular Posts: October 14th to 21st
How to Change Siri Keyboard Shortcut for Mac
These Non-Sappy Cards Help You Support Friends With Cancer
War News Updates: Islamic State Is Claiming To Have Shot Down An A-10 In Syria. The Pentagon Is Denying This Story
How to Spot a Concealed Handgun | The Art of Manliness
With 'Donald Trump's BS' food cart, Wieden+Kennedy serves up baloney, sass in Portland's living room (Photos) - Portland Business Journal
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
Tembo — Simple File Search for Mac
These 4 Apps Will Help You Organize Your Mac [Deals Hub]
Spy Agency To Pilot Insider-Threat Hunting Tech - Nextgov.com
DHS Assesses Tetracore’s Anthrax Lateral Flow Assay
RadioBio: DARPA Explores Physical Modes of Microbial Communication
Zika Rapid Test Named ‘Best of What's New’ by Popular Science
Dress Pant Sweatpants | Men's Sweatpants | Betabrand
LaunchBar 6
Merged Session #0032 - Session Buddy
Remove Duplicate Lines and sort
Portable Flash Drives, 128 GB at Office Depot
Office Depot & OfficeMax: Office Supplies and Furniture
This Is Probably Why Half the Internet Shut Down Today [Update: It’s Getting Worse]
This 4-In-1 Gadget is Only $30, and Essential For Frequent Travelers
Cyberattack on 3D-Printed Component Destroys Drone Mid-Air | Motherboard
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts | Motherboard
News and Transcript Resources: Fact Sheet - EveryCRSReport.com
Al Smith V: Trump ‘Crossed the Line’ at Charity Roast - The Daily Beast
New Threats Spark DoD Spending Debate: Thinktanks Ponder $2 Trillion In Options « Breaking Defense - Defense industry news, analysis and commentary
The psychological effects of cyber terrorism: Bulletin of the Atomic Scientists: Vol 72, No 5
On Patrol with America’s Top Bioterror Cop
Doing Biotech in My Bedroom
TEVUS Portal | START.umd.edu
(8446) Inoreader - Giving Intelligence Analysts Their Voices Back: The Case for Analyst Perspectives
Giving Intelligence Analysts Their Voices Back: The Case for Analyst Perspectives | RAND
Prof. Tunnard's Social Network Analysis and Social Media Classes: After ISIS: What associations and conflicts between Al-Qaeda and ISIS Affiliates can tell us about the next phase of the War on Terror
QCRI - Resources Detail
The secret network of political tweeters making debate memes go viral - The Washington Post
▶ Is Social Media Making News Generation and Consumption Better? - VideoLectures.NET
News You Can Use: 10/21/16 | Arthur D. Simons Center
Mission Possible: A Spy Agency Builds a Tech Scout Network - Nextgov.com
What an NFL Coach, the Pentagon and Election Systems Have in Common - Nextgov.com
Edward Alden: Failure to Adjust - Council on Foreign Relations
Prof. Tunnard's Social Network Analysis and Social Media Classes: Applying the Crime-Terror Nexus to the Sahel - Andrew Taylor
What does an adviser do? Mosul operation highlights the elasticity of military support operations. - The Washington Post
Outside the wire: How U.S. Special Operations troops secretly help foreign forces target terrorists - The Washington Post
Missile Threat | Analysis | Missile Threat
Ex-NSA Hacker Creates Tool To Warn You Of Webcam Spies | Motherboard
Watch a Speed Test Comparing All the iPhones Ever Made | Motherboard
The 2016 Election Has Failed the Future | Motherboard
Hack This: An Overdue Python Primer | Motherboard
While Alleged NSA Thief Sits in Detention, Shadow Brokers Post Messages | Motherboard
Mercedes Decides Who An Autonomous Car Should Save And The Answer Is Worrying
Carl Miller, Andrew Crooks, and Frank Stech uploaded papers - scitrenbaum@gmail.com - Gmail
What you need to know about the battle for Mosul, Iraq – Medium
Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica
War Goes Viral - Defense One
OSINT Framework
Mac Downloads News, Videos, Reviews and Gossip - Lifehacker
U.S. Identifies Key Player in ISIS Attacks on Europe - ProPublica
ISIS Has a Drone Strategy Too - The Atlantic
OneTab shared tabs
Islamism and Islamists: a very short introduction
TextExpander: communicate smarter (and save 50%) - BrettTerpstra.com
Afghan War News: Afghan War News Snippets
Today’s Apps Gone Free: Dark Matty, Ballpoint, dB Meter and More
Get Up To $60 in Amazon Credit For Uploading Images To Prime Photos
Here It Is: Your Last Best Chance To Rip DVDs To Your Mac | Bohemian Boomer
New Threats Spark DoD Spending Debate: Thinktanks Ponder $2 Trillion In Options « Breaking Defense - Defense industry news, analysis and commentary
DARPA Do-It-All Drone Among New VTOLs Nearing Flight « Breaking Defense - Defense industry news, analysis and commentary
Five Steps the US Army Should Take to Counter Hybrid Threats in the Gray Zone - Modern War Institute
The Next War? Trench Warfare With Smart Bombs « Breaking Defense - Defense industry news, analysis and commentary
Web Excursions for October 19, 2016 - BrettTerpstra.com
DARPA Just Launched a Podcast
How To Find, Buy, And Renovate A Titan II Missile Silo | Hackaday
The Archivist: Stories of the Mujahideen: Women of the Islamic State | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
Recently Added Documents - MiPAL: Terrorism - LibGuides at National Defense University
Cheap: A New Stats Widget That Monitors Your Mac’s System 24/7 | noodlemac
‘Islamic State’ Turning Into a Guerrilla Army, Top General Warns - The Daily Beast
Waging #Eurojihad: foreign fighters in ISIL
Reports - EUISS
Frontline . TV | OPB
Animation: What is gene editing and how does it work? | Big Picture
House Committee on Homeland Security
Megaupload User Fears Complete Data Loss, Asks Court For Help - TorrentFreak
Every CRS Report - EveryCRSReport.com
masterworksbwayVEVO - YouTube
The Broadway Prince Party @ Feinstein's 54 Below (10/17/2016) - YouTube
Gilmore Guys - 719 - It's Just Like Riding A Bike (Live In Boulder, CO) - YouTube
10-23 Linky Links
Copy links to clipboard
Copy
Open
OneTab shared tabs
Broadway Musical Home - In Transit
theatre links
Jihadi Bloopers. Online and Off. - JestersCourt
American hacker Jester warns Russia...
Guatemalan Gangs Are Now Crafting Remote-Detonated Bombs
A Bomb Explodes, a Gang Purges Its Own, Guatemala Scratches Its Head
The U.S. Is Upgrading Its Tiniest Killer Drones
Hackers Wrecked the Internet Today Using DVRs and Webcams
Is Something Nefarious Probing the Entire Internet for Weakness?
What We Know About 'The Jester,' the U.S. Hacker Who Attacked a Russian Government Site |Heat Street
DDoS attack on Dyn involved 10s of millions of hacked IP addresses
Getting the Military and Social Scientists Back Together: The Need for “Expeditionary Social Science” – Political Violence at a Glance
Library of Congress gives Afghanistan digital treasure trove of historical documents | McClatchy DC
U.S. War in Afghanistan - Council on Foreign Relations
War News Updates: Military And Intelligence News Briefs -- October 21, 2016
Department of Transportation Fiscal Year 17 SBIR Solicitation | Contract Research and Development
Air Force Rapid Acquisition Cell (RAC) Omnibus BAA | Contract Research and Development
Broad Agency Announcement (BAA)-Rapid Acquisition Cell Omnibus BAA - BAA-RAC-16-0001 - Federal Business Opportunities: Opportunities
NOAA's Small Business Innovation Research (SBIR) Phase I 2017 - Federal Business Opportunities: Opportunities
Masterposts
How Surveillance Cameras Have Become an Internet Superweapon - The Daily Beast - stczztop@gmail.com - Gmail
The French Spymaster of ISIS - The Daily Beast
Why Europe should consider a foreign fighter amnesty scheme
Cyber Attacks and Current Threats Information | FireEye
What US Social Media Is Doing and What US Social Media Should be Doing - JestersCourt
Guest Post: Surviving an Active Shooter - By Fmr SEAL TEAM 6 Operator - Rob O'Neill - JestersCourt
Inside The Strange, Paranoid World Of Julian Assange - BuzzFeed News
The Apps They Carried: Software, Big Data, and the Fight for Mosul - Defense One
Someone Weaponized the Internet of Things - Defense One
Broadway Bootlegs
Best Buy Weekly Ad - October 23-29, 2016
No AppleScript Necessary « Doug's AppleScripts for iTunes
BROADWAY MEGA MASTERPOST -
Beyond Ender: Amplified Intelligence and the Age of the School Wars | Small Wars Journal
theatre links — Video // Heathers: Ver. 1, Ver. 2 (Act 1) + Ver....
theatre links — Masterlist
theatre links — IMPORTANT
theatre links — I've been looking for a decent bootleg of tick,...
Masterposts
.~*~*~*~*~*~*~*~*~*~*~*~. — BROADWAY/MOVIE MUSICAL MASTERPOST
Flud, Nightgate, and other awesome apps of the week | Cult of Mac
Hackers Used New Weapons to Disrupt Major Websites Across U.S. - The New York Times
21 Things We Learned From Hamilton’s America | Playbill
Photos: See Lin-Manuel Miranda at Hamilton’s America Premiere | Playbill
How Surveillance Cameras Have Become an Internet Superweapon - The Daily Beast
tick, tick…BOOM! | Becca on Broadway
In Soviet Russia, We Get Out-Propagandered By A Guy in a Jingly Hat - JestersCourt
DHS US-CERT Understanding Distributed-Denial-of-Service Attacks | Public Intelligence
House Homeland Security Committee Report: Dismantling ISIS Financial Infrastructure | Public Intelligence
Amazon.com: Monitor Arms & Stands: Office Products
oddnylew - TPB
falsettos bootleg - Google Search
tick tick boom bootleg - Google Search
Sign up | Tumblr
Lexie Bloom - YouTube
Broadway Bootlegs - YouTube
Full Broadway Musicals - YouTube
SubmissionsOnlyTV - YouTube
broderickjc - YouTube
Most Popular Cheap Travel Booking Site: Google Flights
Add Sticky Notes to Any Page With Note Anywhere
Annotable Is a Powerful Image Annotation Tool for iPhone With Zooming, Text Marking, and More
Hopper Shows the Very Best Time to Fly and Buy a Ticket for Your Route
How Much You Have to Make to Buy a Home In 27 Major U.S. Cities
The Best Tips for Finding Cheap Airfare With Google Flights
This Week's Top Downloads
Apocalypse Delayed jihadica
Geek | Wireless Bluetooth V3.0 Keyboard Case Leather Cover with Stand Universal for 4.5 / 6.5 inch Cell Phones
Geek | (USA Stock ONLY SHIP TO USA) Portable 360 Adjustable Laptop Notebook Table Stand Tray Desk Black/Pink for Sofa Bed Carpet Lawn (Color: Pink)
Geek | Cart
Amazon Best Sellers: Best Monitor Arms & Monitor Stands
10/25 Final
Copy links to clipboard
Copy
Open
CRCnetBASE - Policing Terrorism
Bookmarks
urn:nbn:se:fhs:diva-6322 : Battling a three-headed beast? : A study of the Islamic State and the Global Coalition response, in light of CT, COIN and jihadi proto-state theory
Ramin Karimloo, Hadley Fraser - Google Search
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Key Websites - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
Hacking Conferences - Eric Filiol Homepage
Cramer Adventures
Want some resources on hacking, I have compiled a huge list of sites. : HowToHack
Awareness Watch Newsletter - Marcus P. Zillman
OneTab shared tabs
OneTab shared tabs
Hard Drives & Storage: Amazon.com
Search | LinkedIn
Carolyn Cramer | LinkedIn
Carolyn Cramer - SLA 2014 Annual Conference & INFO-EXPO
LeadFerret - Home
Oregon DEQ: Land Quality - Oregon E-Cycles - Welcome to Oregon E-Cycles!
Findo
The Pirate Bay - The galaxy's most resilient bittorrent site
Save for later by Sara Citrenbaum - Product Hunt
Sara Citrenbaum - Address, Phone Number, Public Records | Radaris
nlp compromise
CONV. - YouTube to MP3, YouTube to GIF, YouTube to MP4, YouTube converter
TinkerTool: Description
About | Meta Search
Vaultedge
Vaultedge
Document Cyborg · HOME
Introducing Apptivate 2.2
ExplainToMe - Automatic Web Article Summarizer
NimbleNotes
Raindrop.io — All in One Bookmarks Manager
Web Data Extraction Using Artificial Intelligence - Diffbot
Breezee: Declutter Life
SLA 2014 Annual Conference & INFO-EXPO: Finding Those Who Don't Want to Be Found...
Doug Ross @ Journal: Larwyn's Linx: FBI Agents Say Comey ‘Stood In The Way’ Of Clinton Email Investigation
TSG IntelBrief: Islamic State Shock and Awe in Mosul | The Soufan Group
I Went Undercover With a Border Militia. Here's What I Saw. | Mother Jones
New batch of US troops already in Mindanao - military
Defense | TheHill
Carolyn Cramer at Pacific Northwest National Laboratory Contact Details | LeadFerret.com
Shodan – A Boogeyman’s BFF | OSINT Heaven
Stickers for Telegram
Cycles of Invention and Discovery: Rethinking the Endless Frontier - Harvard - Belfer Center for Science and International Affairs
Inspired by nature: the thrilling new science that could transform medicine | Laura Parker | Science | The Guardian
Simple Made Easy
Map cloud storage as a network drive or local disk
10/14
Copy links to clipboard
Copy
Open
GitHub - lockfale/OSINT-Framework: OSINT Framework
Bound is a Dropbox-Connected Audiobook Player – MacStories
Bound - Audiobooks for Dropbox on the App Store
One Thing Well | YakYak
GitHub - yakyak/yakyak: Desktop chat client for Google Hangouts
Access Two Hard Drives Or SSDs At Once With This USB Dock
Find Your Way To the Bathroom With This $20 Under-Bed Motion Light
Buy An $18 Quick Charge USB Hub, Get a Car Charger and Lightning Cable FREE
Add Four Lightning Cables To Your Collection For $15
Toshiba Canvio Aerocast 1TB Wireless Portable Hard Drive HDTU110XKWC1 Black | eBay
Personal - Dropbox
convert m4b - Google Search
Audio books M4b to MP3 Converter
move to iphoe 7 - Google Search
How to transfer data from your old iPhone to your new iPhone 7 | iMore
How to transfer data from old iPhone to iPhone 7
delete iphone 7 apps - Google Search
Gold Box Deals | Today's Deals - Amazon.com
AmazonSmile: Hapurs 9-in-1 3 Port Portable USB 3.0 Hub, USB3.0 High speed SD TF MMC card reader with Power Switch: Computers & Accessories
SoSACorp
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
Ukraine Update: September 1 - October 13, 2016
ISW Blog: Ukraine Update: September 1 - October 13, 2016
audiobook take up too much space iphone - Google Search
How to free up your iPhone and iPad storage space by removing unwanted books
best aodiobook player iphone 7 - Google Search
Bookmobile Audiobook and Podcast Player on the App Store
Best Audiobook Apps
What audiobook player (on the iPhone) do you use? : audiobooks
: iPad/iPhone Apps AppGuide
Best Audiobook Apps for iPhone/iPad To Manage Your Audiobook Collection
10.1.10.18:54000/create.html
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.