Light theme
Dark theme
Automatic (use operating system setting)
Shared: 183 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
09-22
Copy links to clipboard
Copy
Open
High-Priority Information Technology Needs for Law Enforcement | RAND
Law Enforcement | RAND
License Plate Readers for Law Enforcement: Opportunities and Obstacles | RAND
Browse RAND Reports by Series | RAND
First Responders | Homeland Security
FRG Publications | Homeland Security
Publications Library | Homeland Security
Counterterrorism Publications | Homeland Security
Communication Systems | RAND
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage | RAND
Corrections Technology and Practice Taxonomy | RAND
Social Media Research: Behavioral Sciences | Explore Taylor & Francis Online
System Dynamics Conference
EMM News Explorer
Social Media Research | Explore Taylor & Francis Online
LandsatLook Viewer
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AutomatingOSINT.com - Learn How to Automate OSINT Collection
Monthly Newsletter
MacStories Weekly: Issue 49
Yahoo’s Data Breach: What to Do If Your Account Was Hacked - Bloomberg
INSS Military and Strategic Affairs
Broadway Musicals: A Jewish Legacy | Full Episode | Great Performances | PBS
Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake' | Reuters
Advancing machine learning algorithms that could predict terrorist threats | START.umd.edu
Developing algorithms to thwart terrorism | START.umd.edu
OSINT Forum by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Gmail - MacStories Weekly: Issue 49
Emails From A CEO Who’s Making The Presentation Himself This Time – Slackjaw – Medium
Algorithms in plain English: time complexity and Big-O notation
FlashAlert Newswire
Security Experts Agree: The NSA Was Hacked
The Spies Who Loved iPhones
AngelsBwayTunes - YouTube
On the reception and detection of pseudo-profound bullshit
How to Change Yahoo Password
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
TRIPwire
So You Think You're Smarter Than A CIA Agent : Parallels : NPR
Andrew Sullivan: My Distraction Sickness — and Yours
Apple Music Customer Service Lauren Totally Nails It
Detecting emotions with wireless signals | MIT News
BrettTerpstra.com
Security Informatics | Home page
Jigsaw - Visual Analytics for Investigative Analysis
II Projects Page
II Publications Page
Information Visualization Links Page
Software Visualization Publications
John Stasko's Publications
Information Interfaces Group
VACCINE - Discovery Park
Information Technology Laboratory | NIST
Charlotte Exposes a Critical Flaw in the Rise of Body Cams | WIRED
jeff weyers - Google Search
FAQ
greta's gouge: Friday's Miscellany 09-16-2016
Sean Gourley: The mathematics of war | TED Talk | TED.com
Hany Farid
Us and them: identifying cyber hate on Twitter across multiple protected characteristics | EPJ Data Science | Full Text
The Science of Tannerite - Explosive Likely Used in Chelsea Bombing
Sense-making for intelligence analysis on social media data | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Social media for intelligence: practical examples of analysis for understanding | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Defense Innovation Marketplace
Analysis of the current situation in the global Jihad total war jihadica
Sensors | Free Full-Text | Small Moving Vehicle Detection in a Satellite Video of an Urban Area
WARNING : Russia Issues New “Rules of Engagement” in Syria: Any Aircraft Threatening the Syrian Army WILL BE SHOT DOWN (US/Turkey/Israel in the cross-hairs!)
The New York Times - Breaking News, World News & Multimedia
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
portland science/biotech - craigslist
Jeff Weyers | re:publica
Next-Generation Social Media Intelligence Analysis - Google Scholar
Next-Generation Social Media Intelligence Analysis - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods - Google Search
SA.660.732- Insurgency and Counterinsurgency - Google Search
Small Moving Vehicle Detection in a Satellite Video of an Urban Area - Google Search
quizlet biology protists slides - Google Search
socmint - Google Search
socmint tools - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Timeline: US Policy on ISIS | Wilson Center
Tentative Schedule
Journal of Strategic Security | USF Libraries | University of South Florida
How Police Trace Cellphones in IEDs Like the Ones in NYC | WIRED
QuickLook Plugins List
CCI Blog » Blog Archive » Searching the Dark Web
Disruptive Technologies Push Bioterrorism To A Whole New Level - The Medical Futurist
TII Online Research and Intelligence Newsletter - September 2016
EPIC - EPIC Online Guide to Practical Privacy Tools
BBB Scam Tracker
Investigative Dashboard
JSON To CSV Converter
C.J. Chivers (@cjchivers) | Twitter
Resources - Toddington
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Turkey is the export-hub for detonating cords; a crucial component for IEDs used by ISIS and Jabhat al Nusra affiliates – Doğu Eroğlu
Doğu Eroğlu
C. J. Chivers on Sulfur Mustard Attack (with tweets) · crofer · Storify
Current.ly
FindGram - Search Instagram Photos
GeoSocial Footprint
Wonder How To » Fresh Hacks For a Changing World
This Tool Lets You Check If Your Personal Info Is on the Dark Web | Motherboard
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Finding a Nuclear Weapon: Hope Beyond the Screwdriver | The National Interest Blog
snitch.name :: The Social White Pages
News Article – Center for Security Studies | ETH Zurich
8 Search Tricks That Work on DuckDuckGo but Not on Google
How Spy Tech Firms Let Governments See Everything on a Smartphone - The New York Times
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations | RAND
Terrorism and Political Violence: Vol 28, No 4
Computer Crime Presentations and Training by Michael Bazzell
Watched - Post and Courier
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Hany Farid - Google Scholar Citations
(2) bellingcat (@bellingcat) | Twitter
C.J. Chivers on Twitter: "just like crazy IED twitter, expect hyperventilating. mustard & ISIS are not new. and mustard is typically much less lethal than explosives."
(7) JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
How To Protect Your Data And Remove Personal Information From The Internet | Abine
SOCMINT, OSINT - Google Search
open source spying - Google Search
How One Journalist Uses Social Media to Get Inside the Minds of ISIS | WIRED
Russian Hackers Get Bolder in Anti-Doping Agency Attack | WIRED
How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone | WIRED
The Quest to Build a Portable Anti-Neutrino Detector for Nukes | WIRED
Cifas: Data to Go - YouTube
Forecasting the Future: Can The Hive Mind Let Us Predict the Future?
Metaculus
Good Judgment® Open
CymaSpace | We make arts & cultural events more accessible & inclusive to the Deaf & Hard of Hearing through Technology, Education & Outreach.
Used Coffee Grounds Can Clean Contaminated Water | Popular Science
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
IJGI | December 2015 - Browse Articles
Black Hat USA 2016 | Arsenal
Spatial Science | Open Access Articles | Digital Commons Network™
Social Media | Open Access Articles | Digital Commons Network™
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
Who’s Afraid of the Big, Bad Bioterrorist?
PLOS ONE: Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
PLOS ONE: Measures of Human Mobility Using Mobile Phone Records Enhanced with GIS Data
Dynamic User Attribute Discovery on Social Media - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Statistics and Probability | Open Access Articles | Digital Commons Network™
Geography | Open Access Articles | Digital Commons Network™
Technical Program | 2016 IEEE Workshop on Statistical Signal Processing
EBSCOhost | 117599006 | Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism.
EBSCOhost | 117742343 | Deterring Emergent Technologies.
EBSCOhost | 117742345 | DARPA Emerging Technologies.
EBSCOhost | 117613471 | Prototyping an Automated Video Surveillance System Using FPGAs.
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism / CSJM v.24, n.2 (71), 2016 / Issues / CSJM / Publications / IMCS
IJGI | Special Issue : Big Data for Urban Informatics and Earth Observation
IJGI | Special Issue : Geoinformation for Disaster Risk Management
Evaluation of Urban Mobility Using Surveillance Cameras
Using Analytics and Social Media for Monitoring and Mitigation of Social Disasters
Advances in data-driven computational social sciences
Information Systems Architecture and Technology: Proceedings of 37th ... - Google Books
EPJ Data Science | Home page
Why WMD Terrorism Isn’t as Scary as it Seems – Politics in Theory and Practice
Fabio Pinelli - Google Scholar Citations
Dou Wenwen - Google Scholar Citations
Dobra: Spatiotemporal detection of unusual human... - Google Scholar
Dong: Inferring unusual crowd events from mobile... - Google Scholar
Leo: Call detail records to characterize usages and... - Google Scholar
Stein: Visual Soccer Analytics: Understanding the... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
A survey of data mining and social network analysis based anomaly detection techniques
Roick: Location based social networks–definition,... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
Black Hat USA 2013 | Briefings
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism. - Google Search
Copper Thermite Explodes and Smolders Successfully | Hackaday
Watch Full Episodes Online of NOVA on PBS | 15 Years of Terror
NOVA - Official Website | 15 Years of Terror
CEH.V6.-.Module - Google Search
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.