Light theme
Dark theme
Automatic (use operating system setting)
Shared: 382 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
382 tabs
Copy links to clipboard
Copy
Open
Defining Digital Social Sciences ← dh+lib
Afghan War News: Afghan Security News
Afghan War News: Commentary
alex finley | A Matter of Intelligence
Security economics: an adversarial risk analysis approach to airport protection - Portland Community College
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory - Portland Community College
arXiv.org Search
Islamic State group in competition for recruits in Pakistan
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory | International Biosecurity Intelligence System
OWC Unveils Aura SSD Flash Storage Upgrades for Mid 2013 and Later Macs | Other World Computing Blog
| Criminology and Criminal Justice Website
Deception operations. :: General Military History
Sample Projects - The Open Source Analysis of Competing Hypotheses Project
Summer School « System Dynamics Conference
Growing Nuclear Capabilities in the Middle East and Their Implications for U.S. Security |
Today's Best Deals: Networking Gear, Fire HD 6, Electric Shaver, and More
Today's Best Deals: Networking Gear, Fire HD 6, Electric Shaver, and More
You Don't Need To Be an Artist to Enjoy These Discounted Adult Coloring Books
Homepage | Dilbert by Scott Adams
How (Not) to Measure the “Public Conscience” | Duck of Minerva
U.S. military rescues plane crash crew in Iraq - CNNPolitics.com
U.S.: ISIS detainee providing info on chemical weapons - CNNPolitics.com
Edward G. Anderson
Publications — Edward G. Anderson
JP 3-54 Ch1 Appendix C
Favorite and Forget
8 Ways to Use Your Phone as a Scientific Instrument
Clean Up Your Gmail Inbox Using Drag-and-Drop Filters
G mail - Field Guide
Mac - Field Guide
Gizmodo - We come from the future.
The Jihadist List Hyped as the 'Biggest ISIS Intelligence Haul Ever' Is a Bizarre, Inaccurate Mess
There's Finally a Way to Upgrade Macbook Storage
This Weirdly Simple Glitch Will Make Your iPhone Feel Much Faster
Jean Pascal Zanders
greta's gouge: Friday's Miscellany 03-04-2016
howl at pluto
Imgur: The most awesome images on the Internet
Counterterrorism: US to Release Drone-Strike Death Count Since '09
Go Big or Go Home? Positive Emotions and Responses to Wartime Success | International Studies Quarterly
Johnny Lists
25 Ways to Save Money – Johnny Lists
Leaks site's link by time - the actual census of the branch of the investigation
Leaks site's link by time - the actual census of the branch of air security
Special interfaces by time - leaks site
Completely Remove Interface Animations in iOS with an Accessibility Glitch
Remains of the Day: Searching Wikipedia Just Got Easier
The Best Apps for Any Kind of Writing
Home - Springer
A membrane-based microfluidic device for mechano-chemical cell manipulation - Springer
Intelligence Communication in the Digital Era: Transforming Security, Defence and Business - Springer
Search Results - Springer
Papers | Risk and Uncertainty Management
How Modding Nerf Blasters Became a 3D Printing Business | Make:
Methodological Innovations
Military Deception - National Defense University Mobile
New England Complex Systems Institute
Proceedings of the Seventh International Conference on Complex Systems
Spanish police seizes 20,000 Islamic State and Nusra Front uniforms
IS Documents Identify Thousands Of Jihadis
What's On Terrorists' Minds? Research Points To Improved Prediction Models - Yahoo News
Iraq and Weapons of Mass Destruction
Nuclear Terrorism: How Big a Threat?
NSF Award Search: Award#1227324 - Combining Prescriptive and Descriptive Decision Theory for Counter-terrorism Decisions
Joseph K. Young, PhD
Coalition Modeling in Humanitarian Assistance Operations
Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs - Levine - 2011 - Risk Analysis - Wiley Online Library
Adversarial Risk Analysis for Counterterrorism Modeling - Rios - 2011 - Risk Analysis - Wiley Online Library
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory - Merrick - 2014 - Risk Analysis - Wiley Online Library
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models - Bhashyam - 2015 - Risk Analysis - Wiley Online Library
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models - Bhashyam - 2015 - Risk Analysis - Wiley Online Library
Modeling Opponents in Adversarial Risk Analysis - Rios Insua - 2015 - Risk Analysis - Wiley Online Library
Adversarial Risk Analysis for Urban Security Resource Allocation - Gil - 2016 - Risk Analysis - Wiley Online Library
OpenPrism
Your Article was not found - OpenURL - EBSCOhost
SSRN Electronic Library
Piotr (Peter) Mardziel:Paper
Why Terrorists Become More Violent | Political Violence @ a Glance
A microfluidic diffusion viscometer for rapid analysis of complex solutions - Analytical Chemistry (ACS Publications)
Decision Analysis: INFORMS
Decision Analysis: INFORMS
Dumbass American Has The Stupidest Ideas On How To "Fix" The Champions League
Jürgen Klopp Was Highly Amused By Bayern Munich's Loss
Players Resist Urge To Knock Out Referee After Getting Screwed Out Of A Goal
The North London Derby Was Great For Leicester City
PSU Library Catalog
Improving Validity Of Counterterrorism Behavioral Models | Security Debrief
Bio Gary LaFree
A Look at Urban Warfare in the Syrian City of Aleppo | Small Wars Journal
Analysts: Inaction Strengthens IS in Libya | Small Wars Journal
An Analytic Framework for Operations in Dense Urban Areas | Small Wars Journal
Confessions of a Hybrid Warfare Skeptic | Small Wars Journal
Integrated Global Health Surveillance and Response through Multi-Source Technologies | Small Wars Journal
Iran: al-Qaeda’s “Main Artery for Funds, Personnel and Communication.” The Recently Released Osama bin Laden Letters | Small Wars Journal
Mutual Defense in the Pacific Theater | Small Wars Journal
Pain Management: Maintaining the Force | Small Wars Journal
Proposal of an Unconventional Warfare Strategy to Dominate the Human Domain | Small Wars Journal
The Improvised Explosive Device Threat To The Homeland: Americans Are Not Prepared | Small Wars Journal
The Soufan Group
Levine, E. S. - Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs - Sowiport
The Terrorist Decision Making Process - TDM™ - TAL Global - International Security, Counter-Terrorism, Cyber Security, Protection and Investigation Consultancy
Survival of the Fittest: Why Terrorist Groups Endure | Young | Perspectives on Terrorism
TerrorWonk
The ISIS Paradox: Strength in Weakness | The Cipher Brief
What it's like to own an Apple product - The Oatmeal
If my dogs were a pair of middle-aged men - The Oatmeal
I made some more Facebook reactions - The Oatmeal
How to Suck at Facebook - The Oatmeal
Some thoughts and musings about making things for the web - The Oatmeal
OHMYGOSH go read this link I posted - The Oatmeal
5 Reasons Pigs Are More Awesome Than You - The Oatmeal
Dumb Jokes That Are Funny - Clean Jokes - The Oatmeal
How addicted to Twitter are you? Quiz - The Oatmeal
TimbersArmy.org
We Are Mental and We’re Twangy: The Ballad of Greenhorn | TimbersArmy.org
Disinformation Review – To Inform is to Influence
Islamabad to extend military cooperation with Riyadh - The Express Tribune
MacStories Weekly: Issue 23
VOX – Pol | Assessing the Ethics and Politics of Policing the Internet for Extremist Material
VOX – Pol | How ISIS Supporters Filter Extremism Through Instagram
War News Updates: US Special Forces Captured The Islamic State's Chemical Weapons Chief. Has Provided Details On ISIS Use Of Chemical Weapons
The Rise of the Hybrid Warriors: From Ukraine to the Middle East
Operations Security
ACH2.0 Download Page
NMHB2015 - Home
Mashup Challenge
Afghan War News
7th AHFE International Conference 2016
Airborne ISR & C2 Battle Management - 2016 - Download Center
About Me
Ridding Syria of Chemical Weapons: Next Steps | Arms Control Association
The lost and found art of deception | Article | The United States Army
An Oregon game maker on what makes Oregon special - Portland Business Journal
Statistical Methods in Counterterrorism – Bookmetrix Analysis
BWW TV Exclusive: Lena Hall & More Belt It Out at BROADWAY SESSIONS!
Experts weigh in (part 5): Is ISIS good at governing? | Brookings Institution
Questions fighters have to answer when joining ISIS - Business Insider
ISIS recruiting professionals in Karachi in competition with Taliban, al Qaeda - CBS News
Public Sector IT
Conflict Resilient Investment | Acleddata - Crisis
From Africa, an unexpected lesson in how to topple terrorists - CSMonitor.com
Digital Reasoning
Uncommon Technology | Digital Reasoning
Newly Declassified Documents From "Bin Laden's Bookshelf"
CHIPS Articles: Darren A. Sawyer Discusses the Navy Intelligence Community Enterprise Information Technology Transition
HSCB - Human Social Culture Behavior Modeling Program
Human Performance, Training & Biosystems Office, ASD(R&E) - Human Social Culture Behavior Science & Technology
′Islamic State′ using water as a weapon | Middle East | DW.COM | 03.03.2016
Quantum computing gets a bit more real: implications for encryption | EDN
Accountability for Targeted Drone Strikes Against Terrorists? - Ethics & International Affairs : Ethics & International Affairs
Security Classification of Information, volume 2 (Quist), Appendix G
UI, UX: Who Does What? A Designer's Guide To The Tech Industry | Co.Design | business + design
Shoshana Zuboff: Secrets of Surveillance Capitalism
The Foreign Desk - By Lisa Daftari
Massive ISIS intelligence leak reveals data on 22,000 foreign fighters
Allen Institute helps map brain's connections
The Geneva Declaration - Measurability: Global Burden of Armed Vi - Geneva Declaration
The Geneva Declaration - Measurability: Global Burden of Armed Vi - Geneva Declaration
Analytic Production Guide | P-APG
Globalytica Software Tools | Globalytica
Too Hot to Handle - The Hacker Factor Blog
U.S.–Canadian Summit: Issues to Watch
Homeland Security Today: Where Will They Strike Next? Improving Validity of Counterterrorism Behavioral Models
Homeland Security Today: Where Will They Strike Next? Improving Validity of Counterterrorism Behavioral Models
Judy and the Little Tubes of Terror
Home
Research on mouse's brain could lead to smarter machines
Allen Institute joins in IARPA’s massive MICrONS project to create a tiny bit of virtual brain tissue
CORE3D
Odin
Novel Training Datasets and Environments to Advance Artificial Intelligence
Search Results
http://www.ibtimes.com/isis-radioactive-dirty-bomb-islamic-state-group-sought-nuclear-material-belgium-2327333 failed to load
Terrorist Motivations, Extreme Violence, and the Pursuit of Weapons of Mass Destruction (WMD) - International Cultic Studies Association (ICSA)
How to use Workflow for iOS when you don't know where to start | iMore
RECRUITER job - Peterson Machinery - Portland, OR | Indeed.com
A threat monitoring system in enterprise networks with smart mobiles: International Journal of Security and Networks: Vol 11, No 1-2
Asset Termination — Inglorious Amateurs
(22963) Inoreader - Competition, Differentation, and the Severity of Terrorist Attacks
(18310) Inoreader - Publications
Resources — INTERCEP
Iraq War News
Denial and Deception: Iraq's Aluminum Tubes and the Case for War
Falsity of Nuclear Accusation against Iraq Was Known before Bush's Invasion
-Leading To War-
In the Opponent’s Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models
The Moral Minefield of Remote Control Killing by... - Matthew Aid
McSweeney’s Internet Tendency: List: The Women in the Sauna at the Y.
MIT Press Journals - International Security - Abstract
MIT Press Journals - International Security - Abstract
4 Evaluation of DHS Risk Analysis | Review of the Department of Homeland Security's Approach to Risk Analysis | The National Academies Press
NATO PA - 187 STC 11 E rev. 1 final - COUNTERING BIOLOGICAL AND CHEMICAL THREATS: THE WAY FORWARD
Governance: Learn from DIY biologists : Nature News & Comment
Using probabilistic terrorism risk modeling for regulatory benefit-cost analysis: application to the Western hemisphere travel initiative in the la... - PubMed - NCBI
Estimating conditional probabilities of terrorist attacks: modeling adversaries with uncertain value tradeoffs. - PubMed - NCBI
Adversarial risk analysis for counterterrorism modeling. - PubMed - NCBI
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory. - PubMed - NCBI
NSF Award Search: Award#0522174 - Iraqis' Perceptions of the Past, Present, and Future
Western Europe, Eastern Europe and Turkey 1540 Reporting | Analysis | NTI
THE NUCLEAR CARD: The Aluminum Tube Story -- A special report.; How White House Embraced Suspect Iraq Arms Intelligence - The New York Times
Delays in Effort to Refocus C.I.A. From Drone War - The New York Times
Obama Administration Set to Expand Sharing of Data That N.S.A. Intercepts - The New York Times
Osama bin Laden Feared Wife’s Tooth Held a Tracking Device - The New York Times
ISIS Detainee’s Information Led to 2 U.S. Airstrikes, Officials Say - The New York Times
Sciences Addressing Asymmetric Explosive Threats - Office of Naval Research
Human Social Cultural Behavioral Sciences - Office of Naval Research
ORF - Ideas. Forums. Leadership. Impact
A 35-Year CIA Vet Reviews 88 Days to Kandahar | Overt Action | Research, analysis, & debate on critical intelligence challenges
The First Time I Had To Terminate An Asset | Overt Action | Research, analysis, & debate on critical intelligence challenges
Interview With David Priess, Author of “The President’s Book Of Secrets” | Overt Action | Research, analysis, & debate on critical intelligence challenges
Social Mobilization and Violence in Civil War and their Social Legacies - Oxford Handbooks
pherson.org
ACH | pherson.org
Analytic Tools and Techniques | pherson.org
Case Studies | pherson.org
Occasional Papers | pherson.org
Recommended Reading | pherson.org
The Publications Library | pherson.org
Works of Richards J. Heuer, Jr. | pherson.org
Do 'Guardian Forces' Belong in the Military? | RAND
Fighting Terrorism and Radicalisation in Europe | RAND
Islamic State bomb supply chain includes firms in 20 countries including India - report | Reuters
Courtenay R. Conrad | Scholars Strategy Network
Surprise, Deception, Denial and Warning: Strategic Imperatives
Technological Forecasting and Social Change | Vol 80, Iss 9, Pgs 1647-1884, (November 2013) | ScienceDirect.com
Forensic Science International - ScienceDirect.com
Applied Soft Computing - ScienceDirect.com
The U.S. Government Launches a $100-Million "Apollo Project of the Brain" - Scientific American
Appearances — Seth Rudetsky
Deconstructions — Seth Rudetsky
Gray Zone
Special Forces and Hybrid Warfare
Political Warfare
The Society for Risk Analysis (SRA) provides an open forum for anyone interested in risk analysis : SRA
Resources : SRA
The Threat of Nuclear Terrorism
Terrorism and the Infinite Bargaining Model - JournalQuest
System Dynamics Society
Conference Proceedings
Introducing the special issue on new directions in terrorism research - International Journal of Comparative and Applied Criminal Justice - Volume 39, Issue 4
Overcoming strategic weakness: The Egyptian deception and the Yom Kippur War - Intelligence and National Security - Volume 21, Issue 5
The intelligence‐deception complex: An anatomy - Intelligence and National Security - Volume 4, Issue 4
Toward a Theory of Deception - International Journal of Intelligence and CounterIntelligence - Volume 16, Issue 2
What Makes Terrorism Salient? Terrorist Strategies, Political Competition, and Public Opinion - Terrorism and Political Violence -
Citizen activism, conservative views & mega planning in a digital era - Planning Theory & Practice - Volume 17, Issue 1
Hegemony, instabilities, and interventions: a special issue on discourses of war and peace - Journal of Multicultural Discourses -
Countering terrorism, protecting critical national infrastructure and infrastructure assets through the use of novel behavioral biometrics - Behavioral Sciences of Terrorism and Political Aggression -
Contemporary terrorism and the true believer - Behavioral Sciences of Terrorism and Political Aggression -
Important events with possible political, social and security impact on March 8, 2016
Terror (related) news March 9, 2016
Terrorist Decision-Making: Insights from Economics and Political Science | Shapiro | Perspectives on Terrorism
Journals & book chapters | The Trench
Nuclear Terrorism – Book published | The Trench
The Stupidly Simple Spy Messages No Computer Could Decode - The Daily Beast
TwitLonger — When you talk too much for Twitter
Evidence on Iraq’s Aluminum Tubes Misrepresented | Union of Concerned Scientists
Abuses of Science: Case Studies | Union of Concerned Scientists
Researcher Studies Famous Military Bluffs - US News
Vulture - Entertainment News - Celebrity News, TV Recaps, Movies, Music, Art, Books, Theater
Doubts on Weapons Were Dismissed (washingtonpost.com)
Lacking Biolabs, Trailers Carried Case for War
Western Psychological and Counseling Services - General Information
Nuclear Terrorism: Countering the Threat - Google Books
Social Networks, Terrorism and Counter-terrorism: Radical and Connected - Google Books
Multicriteria and Multiobjective Models for Risk, Reliability and ... - Adiel Teixeira de Almeida, Cristiano Alexandre Virginio Cavalcante, Marcelo Hazin Alencar, Rodrigo Jose Pires Ferreira, Adiel Teixeira de Almeida-Filho, Thalles Vitelli Garcez - Google Books
Advances in Homeland Security Research and Application: 2012 Edition - Google Books
Nuclear Terrorism: Countering the Threat - Google Books
Justin Conrad | Home
The Intelligence Community wins with DI2E plugfests -- Defense Systems
Screamer
Matthew Aid
Intelligence
Uprooting ecoterrorism: Syngenta GM crops sabotaged in Spain | Food Freedom
Pocket: My List
Howdy, This is a holding blurb until I get around to fi... - justpaste.it
Download American Audio Books and Collections 2 of 3 Torrent - Kickass Torrents
BØØK ЯANGΞRS[BЯ] : Academic, IT, Engineering, Fiction & Non-Fiction Releases - Page 342 - Community - Kickass Torrents
Download CRC Series in Computational Mechanics and Applied Analysis [Updated at 2016.01.23] Torrent - Kickass Torrents
Download IRC bookz 2016-02 Torrent - Kickass Torrents
Download Nanostructure Science and Technology [Updated at 2016.02.25] Torrent - Kickass Torrents
Download New ebook packs for February 2016 Torrent - Kickass Torrents
Download Non fiction Torrents - Kickass Torrents
Download OCD Pirate's Library - Mathematica Books Torrent - Kickass Torrents
Download Springer books Cell biology Neuroscience Torrent - Kickass Torrents
Download SpringerBriefs in Energy [Updated at 2016.02.13] Torrent - Kickass Torrents
Download TextExpander 5.1.4 - Mac OS X Torrent - Kickass Torrents
Download battle orders # Torrents - Kickass Torrents
Download mathematica Books Torrents - Kickass Torrents
Download osprey Books Torrents - Kickass Torrents
Download springer Books Torrents - Page 2 of 16 - Kickass Torrents
Download Torrents - Kickass Torrents
Download Torrents - Kickass Torrents
Download warfare Books Torrents - Kickass Torrents
Profile of LeipzigMRD - Uploads - Kickass Torrents
Profile of Marcs1102 - Uploads - Kickass Torrents
Profile of Mr.Gooner - Uploads - Kickass Torrents
Profile of sloterdijk - Uploads - Kickass Torrents
Real-time Sensing, Processing and Actuating Functions of 5D World Map System: A Collaborative Knowledge Sharing System for Environmental Analysis — Keio University
Gender-based violence GBAV2015 | Piktochart Infographic Editor
Search results - scitrenbaum@gmail.com - Gmail
Scholar Alert - [ The "internal dynamics" of terrorist cells ] - scitrenbaum@gmail.com - Gmail
"Oregon taps livability binge, adds 4,000 tech jobs - Portland Business Journal" - Nuzzel News Digest for Tue, Mar 8 - scitrenbaum@gmail.com - Gmail
Fwd: https://scholar.google.com/scholar?start=10&q=related:tGoBnnx3zbcFNM:scholar.google.com/&hl=en&as_sdt=0,48 - stczztop@gmail.com - Gmail
Proceedings of the 5th International Conference on Information Warfare and ... - Leigh Armistead - Google Books - scitrenbaum@gmail.com - Gmail
getWiFi - Find free WiFi around the world
Pinboard: popular bookmarks
Spotify Web Player - Pony Girl Introduction - Fun Home Broadway Cast
Gary LaFree - Google Scholar Citations
Terrorist Decision Model - Google Scholar
Bhashyam: In the Opponent's Shoes: Increasing the... - Google Scholar
Rios: Adversarial risk analysis for counterterrorism... - Google Scholar
Rios Insua: Modeling Opponents in Adversarial Risk Analysis - Google Scholar
Paté-Cornell: Games, risks, and analytics: Several... - Google Scholar
Sri Bhashyam: Modeling state-dependent priorities... - Google Scholar
Technologies, Methods, Models, and Tools in the Social Cultural Domain - Google Scholar
Research | Esteban F. Klor
RMIT Agents Group
Timothy McSweeney on Twitter: "LIST: The Women in the Sauna at the Y: https://t.co/F51QbpJMp7 https://t.co/HUYFU1T3KO"
The Soufan Group (@TheSoufanGroup) | Twitter
ThreatBrief (@ThreatBrief) | Twitter
Cable: 06DAMASCUS5399_a
Session: Origin of the Electron's Inertia and Relativistic Energy‐Momentum Equation in the Spin-½ Charged‐Photon Electron Model - Academia.edu
Brain Science
Neglecting Intelligence, Ignoring Warnings | Center for American Progress
Spamprobguy - Anony.ws
CEEOL - Article Detail
Books and Monographs — Central Intelligence Agency
Chapter Four: A Program for Transforming Analysis — Central Intelligence Agency
The Perils of a Small Footprint | commentary
Policy Considerations in Combating Terrorism: Decision-Making Under Conditions of Risk and Uncertainty | Combating Terrorism Center at West Point
The CORE3D Program Proposers’ Day Conference - IARPA-BAA-16-06 - Federal Business Opportunities: Opportunities
adversaries with technologies that negate u.s. advantages in key operational domains - Google Search
the relationship of an indicator to other information or activities - Google Search
Arizona Center for Integrative Modeling and Simulation - Google Search
Center of Excellence in Command, Control, Communications, Computing and Intelligence - Google Search
Commentary on Security Documents - Google Search
Dusty Foggo - Google Search
ean Pascal Zanders - Google Search
Estimating conditional probabilities of terrorist attacks: modeling adversaries with uncertain value tradeoffs - Google Search
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers' Judgment in Counterterrorism Models - Google Search
Link Analysis Tools/Software - Google Search
modeling adversaries in counterterrorism decisions using prospect theory - Google Search
Pherson Associates - Google Search
Security economics: an adversarial risk analysis approach to airport protection - Google Search
Sherman Kent School of Intelligence Analysis. - Google Search
SOCIAL MEDIA INTELLIGENCE: OPPORTUNITIES AND LIMITATIONS - Google Search
Terrorist Decision Model - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwiW9Yzm8bnLAhVYwWMKHbndCzMQFgg_MAU&url=http%3A%2F%2Fmercury.ethz.ch%2Fserviceengine%2FFiles%2FISN%2F95925%2Fichaptersection_singledocument%2F9434face-390e-4b3e-bdd0-0e3dca1e1572%2Fen%2Fch_6.pdf&usg=AFQjCNHgscAe3oSLWD97EeR1HbYrf_bJBg&sig2=OSg7iH4VPzXT59QReP_t6g&bvm=bv.116636494,d.cGc&cad=rja
Homeland Security Digital Library (HSDL): Search Results
Terror Gone Viral : Overview of the 75 ISIS-Linked Plots Against the West - Homeland Security Digital Library Blog
Osama Bin Laden the Environmentalist?: New Batch of Documents Released From "Bin Laden's Bookshelf" - Homeland Security Digital Library Blog
CB Terror Notes
Excellent summary of GTMO myths . . . and a classic case of the “false equivalence fallacy” | Just Security
War Crimes and the Use of Improvised and Indiscriminate Weapons in Syria | Just Security
Updated Readers’ Guide to Airstrikes in Syria | Just Security
Anonymy - "Own Your Online Privacy" by Signal Haystacks — Kickstarter
Workflow 1.4.4 Brings More Image Automation, HTML to Markdown Conversion – MacStories
Replication Datasets - Journal of Peace Research - PRIO
Quantifying Adversary Capabilities to Inform Defensive Resource Allocation | Read by QxMD
Massive ISIS intelligence leak reveals data on 22,000 foreign fighters : worldnews
Dominic Johnson - Publications
Mark G. Stewart - Publications
Victor Asal - Publications
Estimating Conditional Probabilities of Terrorist Attacks: Modeling Adversaries with Uncertain Value Tradeoffs
Emergency facilities location optimisation for hazardous materials transportation under the background of counterterrorism
E. S. Levine, U. S. Department of Homeland Security - ResearchGate
Core Capabilities and Potential Durability of the Islamic State of Iraq and the Levant (ISIL) | START.umd.edu
Discussion Point: No, Virginia, It Is Not an Asymmetric War | START.umd.edu
ISIL in Libya: A Bayesian Approach to Mapping At-Risk Regions | START.umd.edu
Gary LaFree | START.umd.edu
The Claws of the Bear: Russia's Targeted Killing Program | START.umd.edu
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers' Judgment in Counterterrorism Models | START.umd.edu
Social Networks, Terrorism and Counter-terrorism: Radical and Connected | START.umd.edu
Debunking Myths About Nuclear Weapons and Terrorism | Stratfor
Gauging the Jihadist Movement, Part 1: The Goals of the Jihadists | Stratfor
The Artificially Intelligent Doctor Will Hear You Now
Big Data Analysis Is Changing the Nature of Sports Science
Machine-Learning Algorithm Aims to Identify Terrorists Using the V Signs They Make
Unbound MEDLINE : Adversarial risk analysis for counterterrorism modelin
Unbound MEDLINE : Modeling intelligent adversaries for terrorism risk assessment: some necessary conditions for adversary model
Digital #Ham4Ham 3/9/16 -- Road Trip! - YouTube
"Zaman Al Wasl" penetrate the nucleus of the organization .. statement of account for more than 40 nationalities host of "state" including Syria News - Zaman Al Wasl citizens
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab.