Light theme
Dark theme
Automatic (use operating system setting)
Shared: 828 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Passport
Copy links to clipboard
Copy
Open
U.S. Passports & International Travel
How to Apply for a Passport
Differences Between Passport Book and Passport Card
Passport Fees
Photo Composition Template
Photo Requirements
Renew a Passport
Renew a Passport
Passport Applications | Multnomah County
Things to Do
Copy links to clipboard
Copy
Open
Lost Lake Resort and Campground - Lost Lake Resort
www.wweek.com
Willamette Week — Portland News, Movies, Music, Restaurants, Arts - Willamette Week
Willamette Week's Oregon Coast Guide - Willamette Week
Pat's Acres
Global Event Databases
Copy links to clipboard
Copy
Open
Event Registry
Data: CAMEO
Phoenix Data Project
GDELT Blog - The Official Blog of the Global Database of Events, Language, and Tone (GDELT) Project! www.gdeltproject.org
GDELT Translingual: Translating the Planet - GDELT Blog
Modeling Science, Technology & Innovation Conference At The National Academies - GDELT Blog
NGramming 9.5 Billion Words of Arabic News - GDELT Blog
ICEWS | Dart-Throwing Chimp
Yes, Forecasting Conflict Can Help Make Better Foreign Policy Decisions | Dart-Throwing Chimp
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
When Forecasting Rare Events, the Value Comes from the Surprises | Dart-Throwing Chimp
CrisisLex: Crisis-Related Social Media Data and Tools
12 tabs
Copy links to clipboard
Copy
Open
PDFPolitics < Dmi < digitalmethods.net
PopTag < Dmi < digitalmethods.net
ProjectsByTheme < Dmi < digitalmethods.net
ProjectsByTheme < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolGoogleScraper < Dmi < digitalmethods.net
ToolHarvester < Dmi < digitalmethods.net
ToolIssueCrawler < Dmi < digitalmethods.net
ToolLinkRipper < Dmi < digitalmethods.net
16 tabs
Copy links to clipboard
Copy
Open
mdwardlab.com
Comparing GDELT and ICEWS Event Data | mdwardlab.com
Biblio | mdwardlab.com
Minerva Initiative
Home - System Dynamics
VERGE | Video Search Engine
Multimedia Knowledge and Social Media Analytics Laboratory
YFCC
REVEAL | Multimedia Knowledge and Social Media Analytics Laboratory
Successful participation of CERTH-ITI in the interactive Surveillance Event Detection task of TRECVID 2015 | Multimedia Knowledge and Social Media Analytics Laboratory
USEMP | Multimedia Knowledge and Social Media Analytics Laboratory
Event-oriented sentiment-annotated Twitter datasets | Multimedia Knowledge and Social Media Analytics Laboratory
Visual features and search index for Flickr 100M corpus | Multimedia Knowledge and Social Media Analytics Laboratory
SocialSensor (co-ordinator) | Multimedia Knowledge and Social Media Analytics Laboratory
Research | Multimedia Knowledge and Social Media Analytics Laboratory
Semantic multi-sensor fusion | Multimedia Knowledge and Social Media Analytics Laboratory
Tunnels
Copy links to clipboard
Copy
Open
WATCH: IDF Discovers First Hamas Terror Tunnel Inside Israel Since 2014 Gaza War | The Tower
Gazans Fear Being Used as Human Shields as Hamas Builds Tunnels Under Homes | The Tower
Israel Steps Up Efforts to Locate Terror Tunnels Inside Gaza | The Tower
Captured Hamas Operative: Terror Tunnel Network Extends Across Gaza | The Tower
Inside the IDF’s Super-Secret Elite Brain Trust - The Tower
Your Complete Guide to Hamas’ Network of Terror Tunnels - The Tower
Hamas tunnels crisscross entire length of the Gaza Strip, Israel says | The Times of Israel
10 tabs
Copy links to clipboard
Copy
Open
IHR Nexus Lab at Arizona State University | Growing Transdisciplinary Collaborations for Meaningful Change
How to Build a Text-Based Model (...or Corpus) | IHR Nexus Lab at Arizona State University
Stopwords and Reference Corpora | IHR Nexus Lab at Arizona State University
Nexus Lab Projects | IHR Nexus Lab at Arizona State University
Tools and Resources | IHR Nexus Lab at Arizona State University
Hathi Trust Research Center | IHR Nexus Lab at Arizona State University
Introduction to Social Network Methods | IHR Nexus Lab at Arizona State University
Introduction to Mapping Humanities Data with Google Tools | IHR Nexus Lab at Arizona State University
Introduction to Mapping Data with Google Tools Materials | IHR Nexus Lab at Arizona State University
Text-Based Modeling | IHR Nexus Lab at Arizona State University
Event Registry
Copy links to clipboard
Copy
Open
Event registry
Event registry
Event Registry: Moldova Arrests Seven Suspected Of Smuggling Radioactive Material
Pat's Acres
Event Registry: AP INVESTIGATION: Nuclear Black Market Seeks IS Extremists
Event Registry: Georgia nabs three men in effort to sell radioactive cesium-137
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia detains five suspected of illegal uranium trade
Event Registry: Armenia's possible dirty bomb threatens entire region
Event registry
Event registry
EVENT DATA
Copy links to clipboard
Copy
Open
INSCRdata
The Lightning Press | ADRP and Military Smartbooks
UAlbany-MIT SD Colloquia « System Dynamics Society
ICEWS Coded Event Data - Integrated Crisis Early Warning System (ICEWS) Dataverse
Social Sensor Project - Social Event Detection (SED) 2012 dataset
Links – i-intelligence
101+ OSINT Resources for Investigators | i-Sight
2016 Terrorism and Political Violence Risk Map | Aon
Web Resources - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
Open Source Intelligence News (OSIN)
Social Sensor Project - Events
Free software and open source tools for investigative journalism and research
How to Keep a Mac's Hard Drive Clean
Data
Computational Event Data System
The Open Event Data Alliance Software Page
Data: Political Instability Task Force Worldwide Atrocities Dataset
GeoNames
Visualizing the Crisis in Syria
Open Event Data Alliance
Center for Documentation of Violations in Syria
Papers: Automated
Papers
Papers: Forecasting
philip-schrodt (Philip Schrodt ) · GitHub
Philip A. Schrodt Dataverse
Software
TUNNELS
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Forgotten Relics of an Enterprising Age
Home - ITA-AITES
Equipment - ITA-AITES
The British Tunnelling Society
The British Tunnelling Society
Archive
Réflexif : Comment le mur produit le tunnel, Evelyne Ritaine, juillet 2014 | ENIGMUR
UCDP Download Center
Certified Social Media Intelligence Expert (CSMIE)
Home | CivicApps.org
Central IntelliGIF | Central Intelligence | In Theaters June 17, 2016
trash.mbox taking lots of disk space | Communities
Update: air strikes against Daesh - News stories - GOV.UK
How to Delete All Emails from Mail in Mac OS X
Google Open Source Blog: New open source tools to import mail to Gmail
Stanford H4D - Spring 2016 - Home
HOMELAND SECURITY AFFAIRS | The Journal of the NPS Center for Homeland Defense and Security
7 Characteristics of Technological Terrorism Scenarios and Impact Factors--Nikolai A. Makhutov, Vitaly P. Petrov, and Dmitry O. Reznikov | Countering Terrorism: Biological Agents, Transportation Networks, and Energy Systems. Summary of a U.S.-Russian Workshop | The National Academies Press
covert tunnels site:www.geoconsol.com at DuckDuckGo
Covert Tunnels Detection & Subterranean Warfare 2015-2020 Market to Reach $1.9B by 2019 Driven by New Transformational Technologies Says a Homeland Security Research Corp
differing site conditions, entitlement
Underground Infrastructure - The Missing Forty Trillion Dollars
'geotechnical, tunnel boring, differing site conditions'
Covert Tunnels Detection & Subterranean Warfare 2015-2020 Market to Reach $1.9B by 2019 Driven by New Transformational Technologies Says a - One News Page
How Tunnels Work | HowStuffWorks
The Subterrene Machine
Science.gov Results
Expert witnesses - TunnelTalk
TunnelTalk.com - Your gateway to the international tunnelling industry on the web
Books and Reports
The British Tunnelling Society
ICE Virtual Library
ITA Activities - ITA-AITES
After 1980 - ITA-AITES
The British Tunnelling Society
Disused tunnels database
Risks - ITA-AITES
Norwegian Tunnels Database Search
Saved Session - Session Buddy
Pile Responses Caused by Tunneling: Journal of Geotechnical and Geoenvironmental Engineering: (ASCE)
Search results | TU Delft Repositories
International Journal of Engineering Research and Technology
Influence of Tunneling on Adjacent Existing Pile Foundation
Tunnel - Main glossary - ITA-AITES
Architecture - ITA-AITES
Energy, Water & Telecommunication - ITA-AITES
Non Urban Utilities - ITA-AITES
Urban Utilities - ITA-AITES
Mining - ITA-AITES
Other Subsurface Facilities - ITA-AITES
Goods Storage - ITA-AITES
Industrial Facilities - ITA-AITES
Military Facilities - ITA-AITES
Public Buildings - ITA-AITES
Transport - ITA-AITES
Underground Planning - ITA-AITES
2016 World Tunnel Congress coming to San Francisco - Mining Metallurgy and Exploration - SME
Poulos: Ground movements–A hidden source of loading... - Google Scholar
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
Comparisons between measured and computed responses of piles adjacent to tunnelling operations - Google Search
Hard Rock Miner's Handbook - Google Search
Pile Responses Caused by Tunneling - Google Search
Tunnels database - Google Search
related:www.forgottenrelics.co.uk/tunnels/database/a.html Tunnels database - Google Search
world-tunnel-congress - Google Search
Books and Reports
Current Content - TunnelTalk
'geotechnical, tunnel boring, differing site conditions'
Project Camelot | Underground bases and tunnels
In Gaza's smuggling tunnels, Egypt's interests trump Brotherhood ties - CSMonitor.com
Al-Alam exclusive of Gaza-Egypt covert tunnels
tunnels and underground excavations | engineering | Britannica.com
46 tabs
Copy links to clipboard
Copy
Open
Publications Sentinel Issues | Combating Terrorism Center at West Point
The Evolving Challenges for Explosive Detection in the Aviation Sector and Beyond | Combating Terrorism Center at West Point
Heidelberg Institute for International Conflict Research
Heidelberger Institut für Internationale Konfliktforschung
related:www.au.af.mil/au/awc/awcgate/army-usawc/shifting_fire.pdf shifting fire information effects in counterinsurgency and stability operations - Google Search
Uranium Enrichment Process Module - Google Search
Nuclear Basics - World Nuclear Association
World Nuclear Power Reactors | Uranium Requirements | Future Nuclear Power - World Nuclear Association
Number of nuclear reactors - World Nuclear Association
List of nuclear reactors - Wikipedia, the free encyclopedia
Nuclear Units Under Construction Worldwide - Nuclear Energy Institute
Osint Tools Related Keywords & Suggestions - Osint Tools Long Tail Keywords
Toolkit - The Research School
Intelligence Analysis | Canadian Police College
Conference Proceedings « System Dynamics Society
FOI - Swedish Defence Research Agency
Alert4All - Publications
Brynielsson: Social Media Screening for Supporting... - Google Scholar
Conference Proceedings
HFM-201 Social Media: Risks and Opportunities in Military Applications
Calogero G. Zarba - ResearchGate
Exploring the Security Landscape: Non-Traditional Security Challenges - Google Books
WISE Uranium Project - Uranium Enrichment and Fuel Fabrication
This document has moved to https://www.sto.nato.int.
Alert4All - Home
Nuclear Energy Institute - Advancing Clean, Reliable Energy
NRC: Uranium Enrichment
NRC: Backgrounder on Uranium Enrichment
NRC: Map of Power Reactor Sites
CBRNE - Chemical Decontamination: Overview, Purpose of Chemical Decontamination, Recognizing a Chemical Contamination
Top U.S. Intelligence Official Calls Gene Editing a WMD Threat
Defense Threat Reduction Agency
Islamic Sleeper Cell Investigation Looking for Evidence - SPIEGEL ONLINE
Dispersed Computing (DC) Proposers' Day
Why Tradecraft Will Not Save Intelligence Analysis
Welcome to The Air University
2016 Robert Steele on OSINT – Why and How « Public Intelligence Blog
Osint | LinkedIn
(2940) Inoreader - Channels
RTO-MP-HFM-201 - Google Search
Defense Secretary Ash Carter Releases Hack the Pentagon Results > U.S. DEPARTMENT OF DEFENSE > News Release View
Hack the Pentagon - Google Search
Hack the Pentagon: Vulnerability Disclosure via HackerOne
Department of Defense expanding Hack the Pentagon program | TechCrunch
Teen hacks Pentagon websites, gets thanked for finding 'bugs' | Reuters
Intelligence | Foley & Lardner LLP
8 tabs
Copy links to clipboard
Copy
Open
More HUMINT Needed for Counterterrorism Fight - Matthew Aid
Syria Has Resumed Building Weapons for Hezbollah,... - Matthew Aid
50 US Ambassadors Slam Obama Policy on Syria, Urge... - Matthew Aid
Pentagon Playing Great Role in US Drone Program,... - Matthew Aid
Trying to Predict Terrorist Attacks With... - Matthew Aid
How Pro-ISIS Groups Adapt Like Online Organisms - Scientific American
U.S. Government Wants to Jump-Start Next-Generation Nuclear Reactors
Why You Should Keep a Journal (and How to Start Yours)
41 tabs
Copy links to clipboard
Copy
Open
NCE Tunnelling Conference
Innovations in Tunnel Construction Methods | NJIT Online
Tunneling Innovation: - Tunnel Business Magazine
cost of gaza tunnel - Google Search
Geotechnical Engineering, Geological Engineering, Geotechnical Data Inquiries - Geotechpedia
Tunnel Engineering Publications - Geotechpedia
Tunnel Design Publications - Geotechpedia
Tunnel Induced Settlements Publications - Geotechpedia
Tunnel Investigation Publications - Geotechpedia
Blogs Links and Sites - Geotechpedia
Publications :: Manuals For Download - Geotechnical Engineering Directory
Databases - Geotechnical Engineering Directory
Geotechdata.info - Free database of geotechnical information
Free open-access database of geotechnical testing information - Geotechdata.info
Geotechnical Resources: Publications
Home - Pile Buck International, Inc.
(1712) Inoreader - The Intercept
Washington’s War on the Islamic State Is Only Making It Stronger | Foreign Policy
Dead Drop June 17 | The Cipher Brief
[1606.04695] Strategic Attentive Writer for Learning Macro-Actions
[1606.04956] Assessing Human Error Against a Benchmark of Perfection
Sensors | Free Full-Text | A Thermal Performance Analysis and Comparison of Fiber Coils with the D-CYL Winding and QAD Winding Methods
ProjecToR - Microsoft Research
Stable Matching Algorithm for an Agile Reconfigurable Data Center Interconnect - Microsoft Research
Sensors | Free Full-Text | Detection and Classification of Finer-Grained Human Activities Based on Stepped-Frequency Continuous-Wave Through-Wall Radar
Armenia Nuclear Power Plant theft at DuckDuckGo
Nuclear Power in Armenia - World Nuclear Association
INSP: Soviet-Designed Nuclear Power Plant Profiles: Armenia
Metsamor Nuclear Power Plant - Wikipedia, the free encyclopedia
Revisiting the Metsamor Nuclear Power Plant | Armenian Weekly
Nuclear Power Plants from All Over the World Are Vulnerable to Cyberattacks
Is Armenia's Nuclear Plant the World's Most Dangerous?
Russia Offers to Subsidize Nuclear Plant | Asbarez.com
Armenia | Countries | NTI
Russia to Fund Component of Armenia’s New Nuclear Plant | Asbarez.com
Moscow, Yerevan mull boosting Armenian NPP nuclear fuel reserves - PanARMENIAN.Net
Visit: IAEA experts will test Armenian Nuclear Power Plant - News | ArmeniaNow.com
Nuclear alarm from Armenia – EurActiv.com
The EU and Armenia’s Nuclear Power Plant | Far Outliers
NRC: Event Notification Report for January 28, 2015
The Finest Hours (2016 film) - Wikipedia, the free encyclopedia
5 tabs
Copy links to clipboard
Copy
Open
Innovations-in-Tunnel_A3.png (600×6882)
Methods for tunneling construction - More about - Bulgarian Association for Geotechnical and Tunneling Construction
TUNNEL EXCAVATION METHODS | Gautrain - Construction
Tunnel Construction: Soft Ground and Hard Rock - How Tunnels Work | HowStuffWorks
Tunnelling: Mechanics, methods, and mistakes
6 tabs
Copy links to clipboard
Copy
Open
Peter J. Tarkoy, PhD, | Geotechnical Engineering & Geology | Massachusetts
Peter J. Tarkoy | LinkedIn
Tunnels, Gaza Strip, Hamas, Israel | Homeland Security News Wire
Hydraulic Cutters, Roadheaders, Rotary Cutters | Antraquip Corporation | Roadheaders & Hydraulic Cutters | Rock Grinders, Concrete Cutters
WHAT HAPPENED TO INNOVATION IN US TUNNELLING - Google Search
Tunneling, Explosive Compounds, and Rock Drills: Also, Descriptions of the ... - Henry Sturgis Drinker - Google Books
9 tabs
Copy links to clipboard
Copy
Open
Application of the Theory of Inventive Problem Solving in Tunnel Construction: Journal of Construction Engineering and Management: (ASCE)
Journal of Construction Engineering and Management - 131(10):1099 - PDF (ASCE)
Underground innovation: Tunneling technology advancements boost efficiency, cost savings | Construction Dive
Multi-mode TBM - Herrenknecht AG
Home - Herrenknecht AG
NCE Tunnelling & Underground Space Awards
The Tunnel Dismantling Machine (TDM): the Next Generation of Tunnellers | Bouygues Construction
Innovation - Herrenknecht AG
References Tunnelling - Herrenknecht AG
20 tabs
Copy links to clipboard
Copy
Open
London's Rumoured Secret Tunnels | Londonist
Nuclear Terrorism: How Serious a Threat to Russia? - Harvard - Belfer Center for Science and International Affairs
Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide - Volume 8, Issue 3
Sensor integration study for a shallow tunnel detection system. (Technical Report) | SciTech Connect
TACTICS: Policy and strategic impacts, implications and recommendations | RAND
Active Shooter Preparedness | Homeland Security
Cut-and-Cover Tunnels
Hamas ‘Terror Tunnel’ Chief Defected To Israel – PC Jewish Pulse
Hamas tunnel shows conflict has continued unabated since 2014 war | The Times of Israel
Arrest of 17-Year-Old Hamas Member Reveals Valuable Information About Terror Tunnels |
2nd Gaza terror tunnel discovered on Israel border in a month | Israel | Jewish Journal
MabatIsrael – IDF uncovers Gaza ‘terror tunnel’ dug into Israeli territory by Judah Ari Gross
A thing or two about “terror tunnels” | Sixteen Minutes to Palestine
Raytheon: Clear View Security Solutions
Tunnel Activity Monitoring Project - Google Scholar
Tunnel Detection Project - Google Search
Tunnel Vision | Homeland Security
Innovative Air-Deliverable Tunnel Detection Sensor Suite | SBIR.gov
Innovative Air-Deliverable Tunnel Detection Sensor Suite - Google Search
Award Listing | SBIR.gov
19 tabs
Copy links to clipboard
Copy
Open
Humble Book Bundle: Electronics Presented by Make: (pay what you want and help charity)
OTL: Lionel Messi, Here & Gone - Soccer - ESPN
HotKey | Code Nuts
Home - Marginnote
iOS Apps reviews, how to advice, and news
Download Encore #3: 15 non-fiction books Torrent - Kickass Torrents
Herbert Tinsley "Terrorism: A Short Course" | START.umd.edu
Sensors | Free Full-Text | Advanced Unsupervised Classification Methods to Detect Anomalies on Earthen Levees Using Polarimetric SAR Imagery
bellingcat - The Thuraya Network: A Satellite Data Network for the Syrian Rebels - bellingcat
Statement by Director Brennan as Prepared for Delivery Before the Senate Select Committee on Intelligence — Central Intelligence Agency
Peering Into Darkness Beneath the Israel-Gaza Border - The New York Times
New online ecology of adversarial aggregates: ISIS and beyond | Science
New online ecology of adversarial aggregates: ISIS and beyond | Science
A Maritime Threat Assessment of Sea Based Criminal Organizations and Terrorist Operations | HOMELAND SECURITY AFFAIRS
Richard G Brody - Publications
Tunnelling borders | openDemocracy
isayeret.com | The Israeli Special Forces Database
CIA Director John Brennan Warns Lawmakers | Video | C-SPAN.org
C-SPAN TV Schedule | C-SPAN.org
27 tabs
Copy links to clipboard
Copy
Open
Human Costs of Border Control |
Digital Libraries | Recovery Diva
Red Teams Needed to Critique Military Operations
ISIS has found a way to pierce US counter-terrorism defenses - Global Guerrillas
Home
The Red (Team) Analysis Weekly – 16 June 2016 - Red (Team) Analysis
The Chemistry of Cats (video) | Lab Manager
The World of 2020 According to DARPA - Defense One
usmc tunnels 2016 at DuckDuckGo
Desperation Rising at Home, Africans Increasingly Turn to Risky Seas - The New York Times
Michael Clemens | Open Borders: The Case
The Use of FBI’s Facial Recognition Is Growing, Despite Rampant Inaccuracy and Privacy Concerns
Why Orlando Happened and How to Prevent Future Attacks | Political Violence @ a Glance
Top Ten #ddj: The Week’s Most Popular Data Journalism Links | Global Investigative Journalism Network
Labour law: three months of alleged police violence, summarized in a table
'Threat Map' Aims to Highlight the Worst of Oil and Gas Air Pollution | InsideClimate News
National Map | The Oil & Gas Threat Map
Federation Of American Scientists -
A New Era for Nuclear Security | Arms Control Association
War News Updates: Military And Intelligence News Briefs -- June 16, 2016
Building with Biology online workshops - Google Search
operation pillar of cloud, - Google Search
openSecurity | openDemocracy
‘Iranians help Hezbollah build tunnels in Lebanon' - Middle East - Jerusalem Post
Analyzing Various Social Networking Approaches for Covert Networks - Springer
Welcome to ABCHS - American Board for Certification in Homeland Security
Gaza Strip smuggling tunnels - Wikipedia, the free encyclopedia
16 tabs
Copy links to clipboard
Copy
Open
AspireAssist Stomach Emptying System for Weight Loss FDA Approved | Medgadget
How Geophysicists Built a Scale Model of Earth’s Core Out of Sulfuric Acid
Inside Jaguar Land Rover's incubator, and a look at 3 more startups (Photos) - Portland Business Journal
This Central Intelligence GIF maker could be misused in so many ways · Great Job, Internet! · The A.V. Club
The A.V. Club
Billy provokes the wrath of Lin-Manuel Miranda in the Difficult People season 2 trailer · Coming Distractions · The A.V. Club
delete [Gmail].mbox mac - Google Search
How to clean up Mail in OS X Yosemite | OOPS TECH BLOG
mail.app - How to setup Apple Mail so it truly removes email from Google? - Ask Different
lion - Is it safe to remove ~/Library/Mail folders - Ask Different
10.4: Remove some extraneous Mail mailboxes - Mac OS X Hints
delete .mbox mac - Google Search
Gmail Exports: How to import MBOX exports back to your Gmail account. – Backupify Support
How to view Gmail Exports locally on your computer – Backupify Support
GitHub - google/import-mailbox-to-gmail: Import .mbox files into Google Apps for Work
Google Open Sources Two Tools To Import Mail Into Gmail | TechCrunch
13 tabs
Copy links to clipboard
Copy
Open
ininventor:"Howard Kaushansky" - Google Search
7 Tools and Recommendations for Social Media Investigations
IACP Center for Social Media > Topics > Parent
IACP Center for Social Media > Resources > Tools & Tutorials
Set Piece
Worldwide Governance Indicators | Data
Public Alerts | CivicApps.org
iScience Maps
Articles/Journals - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
2018 Security Outlook - Potential Risks and Threats | CSIS
Intelligence Agency Wants to Keep ‘Novel Organisms’ From Threatening Humans - Nextgov.com
This Hilarious, Imaginative Icelandic Twitter Account Is The One To Follow For The Euros
SOCOM Adds 24 Firms to $450M Mission Support Contract
6 tabs
Copy links to clipboard
Copy
Open
Terror Watch Lists and Adverse Action - Lawfare
FBI — TSC's Role in the Interagency Watchlisting and Screening Process
Journals
Open Data Inception - A Comprehensive List of 2500+ #OpenData Portals in the World
Search for a Dataset - Data.gov
10 essential Finder tips every Mac user should know
9 tabs
Copy links to clipboard
Copy
Open
Datasets | CivicApps.org
Crime Incidents - 2014 | CivicApps.org
Employment Data | CivicApps.org
New Business Licenses API | CivicApps.org
api.civicapps.org/business-licenses/
Restaurant Inspections | CivicApps.org
CivicApps API Reference : eGovernment Team, City of Portland
City Parks | CivicApps.org
CivicApps API Reference : eGovernment Team, City of Portland
41 tabs
Copy links to clipboard
Copy
Open
Data Journalism | Global Investigative Journalism Network
One Thing Well | googler
DARPA DEMO DAY
SocialSensor · GitHub
Social Sensor Project - Publications
101+ OSINT Resources for Investigators | i-Sight
Thrillist Portland | Best Restaurants, Bars and Things to Do
Defense Advanced Research Projects Agency
Data journalism training materials
iOS gestures you may not have known - Six Colors
The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos
Twitter Guide - The Best Twitter Apps and Tools
Instapaper
Downloads – DevDH.org
Investigation Cheat Sheets To Help Run A Successful Investigation | i-Sight
Infalia - Home
When ISIS Hackers Call You Out By Name | Motherboard
emergency
One Thing Well | Goose
Markdown for Beginners | Techinch
News
Predicting Contagiousness to Limit the Spread of Disease
Resources – i-intelligence
Research – i-intelligence
Readings – i-intelligence
Omar Mateen’s Imam: Blind Sheikh’s Bodyguard in the 1990s | National Review
Login in to your Social Explorer account - Social Explorer
Social Sensor Project - Project
Social Sensor Project - Work Packages
Social Sensor Project - Deliverables
DG CONNECT | Digital Single Market
IC OFF THE RECORD - Intelligence Leaks Published in 2016
How to use the Dropbox 1TB deal effectively with an external hard drive and a roving laptop - Quora
Uranium season: 2nd group of isotope smugglers busted in Georgia in 10 days — RT News
Tools | Decision Theater

Five Great Online Tools for Mining Public Records
the narcosphere
Home
List of active rebel groups - Wikipedia, the free encyclopedia
JUNE 15 AM START - Session Buddy
6 tabs
Copy links to clipboard
Copy
Open
MacStories Weekly: Issue 18
MacStories Weekly: Issue 13
MacStories Weekly: Issue 12
MacStories Weekly: Issue 11
MacStories Weekly: Issue 6
MacStories Weekly: Issue 10
06-14 9:30PM
Copy links to clipboard
Copy
Open
GeoLite2 Free Downloadable Databases « Maxmind Developer Site
DMML Projects
Publications
In Which We Get to the Bottom of Some Crazy-Ass Language | JSTOR Daily
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
AmazonSmile: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more
THOMAS THWAITES » A holiday from being human (GoatMan)
Conflict Trends Reports | ACLED
ACLED | ACLED
About ACLED | ACLED
Acleddata - Crisis | Data and Analysis of Africa's Political Crisis
Hunchly 1.1.7 Released!
Mars Explorers Wanted Posters
Appliances |
Home - Droplr
arXiv.org Search
2016 International Conference on Social Media & Society (#SMSociety: Full Schedule
Resources - Toddington
Just Delete Me | A directory of direct links to delete your account from web services.
GeoSocial Footprint
Girls Inc. of the Pacific Northwest
Oregonian Newsroom Staffers Sickened by Morale Booster - Willamette Week
Real Time Search - Social Mention
Publications | ACLED
No, Actually, NASA’s Social Media Team Wins the Internet | WIRED
How Bangladesh Became Fertile Ground for al-Qa`ida and the Islamic State | Combating Terrorism Center at West Point
My Drive - Google Drive
One Tap Less | Direct Links to Dropbox Files with Workflow
30 New Links for @WorkflowHQ I found this week (18) on Twitter @BestWorkflows] | Automation for iOS
10 great ways to put Workflow to work
Taylor: Acquiring Agent-Based Models of Conflict... - Google Scholar
How to find and remove files from the 'Other' storage category on your Mac | iMore
Twitter Informants (Part 3) [READ] - Pastebin.com
Newsletters Archive - Toddington
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Automated Workflow & Task Automation | Microsoft Flow
Gadgets to Get Organized, Daily To-Dos for a Good Life, and the Truth Behind "Credit Repair" Agencies
Bulgarian PM: Cigarette Smuggling Will Be Eradicated by 2012, Page 1 - Investigative Dashboard Search
Search documents - Investigative Dashboard Search
Stop Forgetting Things by Jordan Gonen - Product Hunt
Social Media in the Arab World: Communication and Public Opinion in the Gulf ... - Barrie Gunter, Mokhtar Elareshi - Google Books
Social Media Tools by Constantin Colac | ZEEF
The Joint Threat Anticipation Center
Archives — Command and Control Research Portal
Metadata Investigation : Inside Hacking Team | Share Lab
Share Lab | Investigative Data Reporting Lab
START News: Forecasting the flow of foreign fighters; Equipping educators to understand mass violence and extremism
53 tabs
Copy links to clipboard
Copy
Open
The Creative World’s Bullshit Industrial Complex - 99U
AI, Deep Learning, and Machine Learning: A Primer – Andreessen Horowitz
How To Order Delivery Without Feeling Like Shit, You Lazy Bum
There Should Be A "Soo" For Expressing Emphasis
Women’s connectivity in extreme networks | Science Advances
Finding Clarity in a Middle East Unbalanced - Carnegie Endowment for International Peace
Cat Tracker – Cat Tracks
Huan Liu - ACM author profile page
Measuring the Semantic Uncertainty of News Events for Evolution Potential Estimation
Low-cost Semantic Enhancement to Digital Library Metadata and Indexing
The Cultural Geography Model: Evaluating the Impact of Tactical Operational Outcomes on a Civilian Population in an Irregular Warfare Environment
ETTIS Project | European security Trends and Threats In Society( ETTIS)
SitRep: Complex Picture of Orlando Shooter; Apaches In Mosul Fight | Foreign Policy
My Data Is Dirty! Basic Spreadsheet Cleaning Functions | Global Investigative Journalism Network
Fealty and Modern Terrorism - Global Guerrillas
IEEE Xplore Abstract - Use of Reality Mining Dataset for Human Behavior Analysis -- A Survey
11 Useful Things You Can Do with Paperclips
Five Creative Ways to Use Hummus That Don't Involve Dipping
Predictive visual analytics of event evolution for user-created context - Online First - Springer
Towards the Improvement of Citizen Communication Through Computational Intelligence - Springer
GeoLife GPS Trajectories - Microsoft Research
scholar.google.com/scholar_url?url=http://arxiv.org/pdf/1606.02821&hl=en&sa=X&scisig=AAGBfm0b3lzcTEKNHIZgKTkFemhyJV2fTg&nossl=1&oi=scholaralrt
Bible Verses Where "Behold" Is Replaced With "Look, Buddy" - The Toast
Hack the Pentagon: Hackers find over 100 Bugs in U.S. Defense Systems
Sensay, a chatbot for getting help with any task, passes 1 million users | VentureBeat | Bots | by Matt Marshall
Ditching passwords will boost Android - Business Insider
David Crystal |
National Crime Agency - Careers
Nature: Nature Index Saudi Arabia
An Interview With Thomas Thwaites, Who Spent 3 Days Being A Goat With A Herd On The Alps : Goats and Soda : NPR
Paula Broadwell, David Petraeus and the Afterlife of a Scandal - The New York Times
Generating patent development maps for technology monitoring using semantic patent-topic analysis
Semantic Complex Event Processing Model for Reasoning Research Activities
Detecting Influenza States based on Hybrid Model with Personal Emotional Factors from Social Networks
Opinion mining based on fuzzy domain ontology and Support Vector Machine: A proposal to automate online review classification
No Confidence: Confidentiality, Ethics and the Law of Academic Privilege - Communication Law and Policy - Volume 21, Issue 3
Project Abacus is coming in 2016 - Tech Insider
The Toaster Project
THOMAS THWAITES » The Toaster Project
Your Wild Life
Your Wild Life - Our Projects
The EU, Strategy and Security Policy: Regional and Strategic Challenges - Google Books
Demonization in International Politics: A Barrier to Peace in the Israeli ... - Linn Normand - Google Books
The Irrational Actor and Asymmetric Propaganda Jihads | Krypt3ia
Scholar Alert - [ Semantic Analytics in ... ]; Articles excluding ... - scitrenbaum@gmail.com - Gmail
In Defense of Voodoo Doughnut — Medium
False Medium (@FalseMedium) | Twitter
Amazon.com: GoatMan: How I Took a Holiday from Being Human eBook: Thomas Thwaites: Kindle Store
U.S. Officials Concerned Over Intelligence Gaps That Failed To Prevent Orlando Attack - BuzzFeed News
Here's What Google Photos Could Do Next - BuzzFeed News
Home - Dropbox
Geolife Trajectories - Google Search
Euro 2016: The Multicultural Championship
189 tabs
Copy links to clipboard
Copy
Open
Pages - NATO Science & Technology Organization
Daily Schedule
Threads « System Dynamics Conference
Directory of Open Access Journals
The Mitchell Institute | News & Events
Down the Country-Month Rabbit Hole | Dart-Throwing Chimp
GeoDa Center | Spatial methods and tools - geodacenter.asu.edu
The Fund for Peace
Fragile States Index - Wikipedia, the free encyclopedia
CAST Conflict Assessment Framework Manual | The Fund for Peace
If my dogs were a pair of middle-aged men - PART TWO - The Oatmeal
Today's Best Deals: Gifts For Dad, Beginner Drones, Bluetooth Receiver, and More
Deals - Kinja Deals
Risk-Mitigating Policies and Adversarial Behavior: Case of Backlash - Mohtadi - 2016 - Risk Analysis - Wiley Online Library
Open Data Resources
EarlyWarning
MobileDataMap
AAAI Conferences
David Rumsey Historical Map Collection | The Collection
Use Cases | REVEAL
Tools for Peacebuilding | United States Institute of Peace
Every Device Apple's Making Obsolete with Its New Operating Systems
Earn Your Wings With These Ultra-Affordable Quadcopters, On Sale Today Only
Knight Lab | Northwestern University
ICONS Project | Maneuver and Engagement in the Narrative Space | Simulation Data
MIT Media Lab: GroupMedia
What is Root Cause Analysis (RCA)? | ASQ
ASSERT Toolkit for Societal Impact Assessment in Security Research | Assessing Security Research – Tools and Methodologies to Measure Social Impact
Home
Labs & Projects
CoDE Department, Université Libre de Bruxelles
Find News on Hamas, Hezbollah ,Netanyahu and the Palestine / Israel War- EBSCO Online Search Engine Directory
CrisisMappers - THE HUMANITARIAN TECHNOLOGY NETWORK
IARPA DIVA Proposers' Day - Overview
Professor Thomas W. Lucas
Edward H Kaplan | Yale School of Management
EEHolmes
Favorite and Forget: Archive
Favorite and Forget: 15 Useful Internet Tools
Product Reputation Trend Extraction from Twitter
http://forum.ggll.org/UCR+Codes.html is not available
greta's gouge: Friday's Miscellany 06-10-2016
11 Tools to Verify that Online Info - Julie Smith
ICIT Brief – The Anatomy of Cyber-Jihad: Cyberspace is the New Great Equalizer
iCrank Knowlege Center
Homeland Security and Counter-Terrorism Research
IEEE Xplore Abstract - Sensing Trending Topics in Twitter
Intelligence Briefings for the US Presidential Nominees | Strategic intelligence Briefs
All Publications - Bell School - ANU
Which tool should I use?
Electronic Tools for Use in the Continuum of Care for Patients With Addiction | IRETA
Related Links | Increasing Resilience in Surveillance Societies
ISF 2017
Jihad Intel
Archives
Politics and Religion - Ethno-political Organizations in the Middle East: When Do They Opt for Violence? - Cambridge Journals Online
Modsti | Modeling Science, Technology & Innovation Conference
N3TUQ - 6 Meter DX Map
Digital Commons Network | Free full-text scholarly articles
New Tool to Burst Twitter Rumours | news.sys-con.com
NodeXL Graph Gallery
NASA Technical Reports Server (NTRS) - Multi-Dimensional Damage Detection
Nuclear Weapons 204 - Armenia Is Smuggling Nuclear Materials | Nucleotidings
Lecture Notes | Readings in Optimization | Sloan School of Management | MIT OpenCourseWare
Journal of Digital Forensics, Security and Law
Archives
Collective Action to Avoid Catastrophe: When Countries Succeed, When They Fail, and Why - Barrett - 2016 - Global Policy - Wiley Online Library
OpenGazettes
OpenPrism
Exploratory Analysis
Simon Springer | People & Places Department of Geography
Peoples Under Threat - An annual ranking of countries according to the risk of mass violence faced by communities
Special Operations Command | washingtonpost.com
Public Records Directory
Operations Research: INFORMS
realitycommons.media.mit.edu
Eric Horvitz's Homepage
Reveal
REVEAL | Social Media Verification
Systems Analysis Laboratory: Frontpage
Systems Analysis Laboratory: Web resources
SBP 2015
Journal of Strategic Security | Vol 9 | No. 2
Projects | Laboratory for Social Machines
Social Physics
Social Technologies in Emergency Management | Social Media Reports
Sources And Methods: Top 5 Intelligence Analysis Methods: Multi-Criteria Decision Making Matrices/Multi-Criteria Intelligence Matrices (#2)
The SocialSensor Project - Sensing User Generated Input for Improved Media Discovery and Experience - Special Technical Community on Social Networking
osx - IMAP gmail - how to delete a mail forever on Mail.app Mac OS X - Super User
Next Generation Social Science | School of Global Environmental Sustainability
Syria Direct
30th System Dynamics Colloquium
How Social Media Can Predict Instability - TCV
Is it time for me to ditch Calibre? - TeleRead News: E-books, publishing, tech and beyond
Google launches Science Journal to turn your phone into a research lab
OpenSample — science for everyone
ISIS nuclear attack in Europe is a real threat, say experts - Times of India
Deep Twitter Analytics
TweetTracker
TweetXplorer Supplementary Page
Tweepsmap Intelligent Twitter Analytics And Visualization | Twitter Tools and Twitter Tips Blog
Publications
SMARTnews - CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
Ventity 1.0 Beta | Vensim
Influence Modeling of System Interactions
Phil Kivett's USAFSS COMINT Experiences
Archives
WhatMoji: Identify Emojis
Flora Amato Home Page
Presentations and Authors
Presentations and Authors
International AAAI Conference on Web and Social Media
Drugs and drones: The crime empire strikes back | Brookings Institution
Six ways to disable a drone | Brookings Institution
Building with Biology 2016 Kit | www.buildingwithbiology.org
Cascade Huts
www.cidob.org/en/
Superforecasting: How ordinary people can predict everything from world events to election results | City A.M.
Contract Research and Development | R&D Business Opportunity Abstracts
Local Violence Monitoring | Acleddata - Crisis
ONE YEAR SPECIAL REPORT — Burundi Local Data on Recent Unrest (26 Apr 2015 – 25 April 2016) | Acleddata - Crisis
Homepage - International Crisis Group
AQIM and ISIS in Algeria: Competing Campaigns | Critical Threats
Accelerating Discovery with New Tools and Methods for Next Generation Social Science
Security and defence | IAI Istituto Affari Internazionali
Institute for Defence Studies and Analyses
Archives
Convert TXT to PDF in Seconds: TXT2PDF
Daily Intelligence Briefing
Improve My City | Citizens Requests, Complaints & Suggestions
European Working Group Multicriteria Aid for Decisions: Books
InfoHarvest, Inc., Contact Information
MAR | MAR Data
Implementing graph grammars for intelligence analysis in OCaml
Georgian Intelligence Service Arrests Five for... - Matthew Aid
The Extremists Living Amongst Us and Why... - Matthew Aid
Multiple Criteria Decision Making | International Society on MCDM
Sensor Networks - A section of Sensors
Code | Multisensor Project EU
MULTISENSOR – in short | Multisensor Project EU
Research Arm for Intel Agencies Looking for Nontraditional Sensors
Websites - Counterinsurgency Strategy - NATO LibGuides at NATO Multimedia Library
Websites - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Nick Diakopoulos » Projects
Introducing OpenFuego, your very own heat-seeking Twitter bot » Nieman Journalism Lab
CNS Global Incidents and Trafficking Database | Analysis | NTI
Huan Liu
Project Description: BlogTrackers
SNOW Workshop | Third Workshop on Social News on the Web @ WWW '16, Montreal, Canada
Veracity and Velocity of Social Media Content during Breaking News: Analysis of November 2015 Paris Shootings | SNOW Workshop
Sessions by Thread
TargetMap - Create & share customized data maps on OpenStreetMap. Free Online Mapping tool
lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain – an Open Source Inventory | Schmid | Perspectives on Terrorism
8 Great Performances Nobody Is Talking About
What Happens When You Quit Showering? - The Atlantic
A New, Free Tool Lets You Analyze and Archive Twitter Simultaneously - The Atlantic
Create timelines, share them on the web | Timetoast timelines
The TREsPASS Project
www.uk-osint.net
Research projects | UMIACS
The Official Todd Sandler Homepage - Open Access
Vision of Humanity
Here’s How to Clean Up Your Gmail Inbox, You Hoarder | WIRED
Publications - Multimedia & Sensors Lab, Georgia Tech
Mapping the conflict in Burundi in 2015
Welcome - Humanitarian Data Exchange
Welcome - Investigative Dashboard Search
see what's happening | etrigg.com
Strategic Intelligence Service
How to find and use Twitter lists - First Draft News
Speed up your social newsgathering with these Twitter search shortcuts - First Draft News
Featured Sims - Forio Simulate
FoxType
Research | Center on the Future of War
Privacy error
A Socio-Cultural Geospatial Analysis and Modeling Framework in Support of Stability Operations and Infrastructure Applications | GeoDa Center
Insight Maker | Free Simulation and Modeling in your Browser
Investigative Dashboard
Investigative Dashboard - Google Ideas
Mohammed Hafez | Naval Postgraduate School - Academia.edu
Scholarly Open Access | Critical analysis of scholarly open-access publishing
NSC Decision Making and Operation Allied Force
OSINT Resources - The Grey Network
Compare Lists
Geo Extraction
twXplorer
VIS. Visual Investigative Scenarios platform: Pages
Systems Software Laboratory | Computer Science at Virginia Tech
Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.