Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,575 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTab Tab Group
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Mac Tips
Copy links to clipboard
Copy
Open
How to add and print to a WiFi or network printer - How to - Macworld UK
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
Quick Look - OS X El Capitan: The Missing Manual [Book]
Must Have MacOS Quick Look Plugins | Sayz Lim
sindresorhus/quick-look-plugins: List of useful Quick Look plugins for developers
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
for Mac OS X | Favorite Book Reader
Quick Look - Wikipedia, the free encyclopedia
Quick Look Plugins Make File Browsing On OS X Even Better
How to View Epub, Kindle eBooks in OSX Quick Look | The Digital Reader
OS X Hidden Treasures: Services
OS X Hidden Treasures: Quick Look
Daring Fireball: Markdown Syntax Documentation
BetterZip 3 - Easy Zip and Unzip for Your Mac
09-22
Copy links to clipboard
Copy
Open
High-Priority Information Technology Needs for Law Enforcement | RAND
Law Enforcement | RAND
License Plate Readers for Law Enforcement: Opportunities and Obstacles | RAND
Browse RAND Reports by Series | RAND
First Responders | Homeland Security
FRG Publications | Homeland Security
Publications Library | Homeland Security
Counterterrorism Publications | Homeland Security
Communication Systems | RAND
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage | RAND
Corrections Technology and Practice Taxonomy | RAND
Social Media Research: Behavioral Sciences | Explore Taylor & Francis Online
System Dynamics Conference
EMM News Explorer
Social Media Research | Explore Taylor & Francis Online
LandsatLook Viewer
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AutomatingOSINT.com - Learn How to Automate OSINT Collection
Monthly Newsletter
MacStories Weekly: Issue 49
Yahoo’s Data Breach: What to Do If Your Account Was Hacked - Bloomberg
INSS Military and Strategic Affairs
Broadway Musicals: A Jewish Legacy | Full Episode | Great Performances | PBS
Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake' | Reuters
Advancing machine learning algorithms that could predict terrorist threats | START.umd.edu
Developing algorithms to thwart terrorism | START.umd.edu
OSINT Forum by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Gmail - MacStories Weekly: Issue 49
Emails From A CEO Who’s Making The Presentation Himself This Time – Slackjaw – Medium
Algorithms in plain English: time complexity and Big-O notation
FlashAlert Newswire
Security Experts Agree: The NSA Was Hacked
The Spies Who Loved iPhones
AngelsBwayTunes - YouTube
On the reception and detection of pseudo-profound bullshit
How to Change Yahoo Password
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
TRIPwire
So You Think You're Smarter Than A CIA Agent : Parallels : NPR
Andrew Sullivan: My Distraction Sickness — and Yours
Apple Music Customer Service Lauren Totally Nails It
Detecting emotions with wireless signals | MIT News
BrettTerpstra.com
Security Informatics | Home page
Jigsaw - Visual Analytics for Investigative Analysis
II Projects Page
II Publications Page
Information Visualization Links Page
Software Visualization Publications
John Stasko's Publications
Information Interfaces Group
VACCINE - Discovery Park
Information Technology Laboratory | NIST
Charlotte Exposes a Critical Flaw in the Rise of Body Cams | WIRED
jeff weyers - Google Search
FAQ
greta's gouge: Friday's Miscellany 09-16-2016
Sean Gourley: The mathematics of war | TED Talk | TED.com
Hany Farid
Us and them: identifying cyber hate on Twitter across multiple protected characteristics | EPJ Data Science | Full Text
The Science of Tannerite - Explosive Likely Used in Chelsea Bombing
Sense-making for intelligence analysis on social media data | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Social media for intelligence: practical examples of analysis for understanding | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Defense Innovation Marketplace
Analysis of the current situation in the global Jihad total war jihadica
Sensors | Free Full-Text | Small Moving Vehicle Detection in a Satellite Video of an Urban Area
WARNING : Russia Issues New “Rules of Engagement” in Syria: Any Aircraft Threatening the Syrian Army WILL BE SHOT DOWN (US/Turkey/Israel in the cross-hairs!)
The New York Times - Breaking News, World News & Multimedia
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
portland science/biotech - craigslist
Jeff Weyers | re:publica
Next-Generation Social Media Intelligence Analysis - Google Scholar
Next-Generation Social Media Intelligence Analysis - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods - Google Search
SA.660.732- Insurgency and Counterinsurgency - Google Search
Small Moving Vehicle Detection in a Satellite Video of an Urban Area - Google Search
quizlet biology protists slides - Google Search
socmint - Google Search
socmint tools - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Timeline: US Policy on ISIS | Wilson Center
Tentative Schedule
Journal of Strategic Security | USF Libraries | University of South Florida
How Police Trace Cellphones in IEDs Like the Ones in NYC | WIRED
QuickLook Plugins List
CCI Blog » Blog Archive » Searching the Dark Web
Disruptive Technologies Push Bioterrorism To A Whole New Level - The Medical Futurist
TII Online Research and Intelligence Newsletter - September 2016
EPIC - EPIC Online Guide to Practical Privacy Tools
BBB Scam Tracker
Investigative Dashboard
JSON To CSV Converter
C.J. Chivers (@cjchivers) | Twitter
Resources - Toddington
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Turkey is the export-hub for detonating cords; a crucial component for IEDs used by ISIS and Jabhat al Nusra affiliates – Doğu Eroğlu
Doğu Eroğlu
C. J. Chivers on Sulfur Mustard Attack (with tweets) · crofer · Storify
Current.ly
FindGram - Search Instagram Photos
GeoSocial Footprint
Wonder How To » Fresh Hacks For a Changing World
This Tool Lets You Check If Your Personal Info Is on the Dark Web | Motherboard
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Finding a Nuclear Weapon: Hope Beyond the Screwdriver | The National Interest Blog
snitch.name :: The Social White Pages
News Article – Center for Security Studies | ETH Zurich
8 Search Tricks That Work on DuckDuckGo but Not on Google
How Spy Tech Firms Let Governments See Everything on a Smartphone - The New York Times
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations | RAND
Terrorism and Political Violence: Vol 28, No 4
Computer Crime Presentations and Training by Michael Bazzell
Watched - Post and Courier
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Hany Farid - Google Scholar Citations
(2) bellingcat (@bellingcat) | Twitter
C.J. Chivers on Twitter: "just like crazy IED twitter, expect hyperventilating. mustard & ISIS are not new. and mustard is typically much less lethal than explosives."
(7) JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
How To Protect Your Data And Remove Personal Information From The Internet | Abine
SOCMINT, OSINT - Google Search
open source spying - Google Search
How One Journalist Uses Social Media to Get Inside the Minds of ISIS | WIRED
Russian Hackers Get Bolder in Anti-Doping Agency Attack | WIRED
How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone | WIRED
The Quest to Build a Portable Anti-Neutrino Detector for Nukes | WIRED
Cifas: Data to Go - YouTube
Forecasting the Future: Can The Hive Mind Let Us Predict the Future?
Metaculus
Good Judgment® Open
CymaSpace | We make arts & cultural events more accessible & inclusive to the Deaf & Hard of Hearing through Technology, Education & Outreach.
Used Coffee Grounds Can Clean Contaminated Water | Popular Science
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
IJGI | December 2015 - Browse Articles
Black Hat USA 2016 | Arsenal
Spatial Science | Open Access Articles | Digital Commons Network™
Social Media | Open Access Articles | Digital Commons Network™
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
Who’s Afraid of the Big, Bad Bioterrorist?
PLOS ONE: Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
PLOS ONE: Measures of Human Mobility Using Mobile Phone Records Enhanced with GIS Data
Dynamic User Attribute Discovery on Social Media - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Statistics and Probability | Open Access Articles | Digital Commons Network™
Geography | Open Access Articles | Digital Commons Network™
Technical Program | 2016 IEEE Workshop on Statistical Signal Processing
EBSCOhost | 117599006 | Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism.
EBSCOhost | 117742343 | Deterring Emergent Technologies.
EBSCOhost | 117742345 | DARPA Emerging Technologies.
EBSCOhost | 117613471 | Prototyping an Automated Video Surveillance System Using FPGAs.
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism / CSJM v.24, n.2 (71), 2016 / Issues / CSJM / Publications / IMCS
IJGI | Special Issue : Big Data for Urban Informatics and Earth Observation
IJGI | Special Issue : Geoinformation for Disaster Risk Management
Evaluation of Urban Mobility Using Surveillance Cameras
Using Analytics and Social Media for Monitoring and Mitigation of Social Disasters
Advances in data-driven computational social sciences
Information Systems Architecture and Technology: Proceedings of 37th ... - Google Books
EPJ Data Science | Home page
Why WMD Terrorism Isn’t as Scary as it Seems – Politics in Theory and Practice
Fabio Pinelli - Google Scholar Citations
Dou Wenwen - Google Scholar Citations
Dobra: Spatiotemporal detection of unusual human... - Google Scholar
Dong: Inferring unusual crowd events from mobile... - Google Scholar
Leo: Call detail records to characterize usages and... - Google Scholar
Stein: Visual Soccer Analytics: Understanding the... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
A survey of data mining and social network analysis based anomaly detection techniques
Roick: Location based social networks–definition,... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
Black Hat USA 2013 | Briefings
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism. - Google Search
Copper Thermite Explodes and Smolders Successfully | Hackaday
Watch Full Episodes Online of NOVA on PBS | 15 Years of Terror
NOVA - Official Website | 15 Years of Terror
CEH.V6.-.Module - Google Search
09-24
Copy links to clipboard
Copy
Open
A look at the explosives used in the New York bombing | September 26, 2016 Issue - Vol. 94 Issue 38 | Chemical & Engineering News
Amphetamine boosts rats’ recovery from brain injuries | Chemical & Engineering News
How the NYPD Turned Itself Into a Little CIA
How Palantir Is Taking Over New York City
How To Get Slack Notifications on Gmail
Networks of New York » Melville House Books
Using Sound and Artificial Intelligence to Detect Human Rights Violations | iRevolutions
A Walking Tour of New York’s Massive Surveillance Network
How Hired Hackers Got “Complete Control” Of Palantir - BuzzFeed News
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Afghan War News
Afghan War News: Afghan Security News - Good and Bad
Afghan War News: RS Cdr's News Conference - Some Facts and Some Spin
OK, nvALT 2.2 take 2 - BrettTerpstra.com
Deals - Kinja Deals
Saturday's Best Deals: Dyson Fan Heater, Tevas, Bluetooth Headphones and More
Buying Guide: Affordable Accessories For Your Car
Airmail for iPhone Gets a Bunch of iOS 10 Integration Features
All the New Features in iOS 10 In Two Minutes
All the New Features in macOS Sierra
Build An Insanely Small, Fully Functional MAME Cabinet
Google Trips Personalizes and Automates Your Travel Plans From Start to Finish
Learn How to Win at Carnival Games With This Handy Guide
Polarr 3.0 Uses iOS 10's Facial Recognition for Robust, Automatic Photo Retouching
Speedify 4.0 Uses Wi-Fi and Mobile Data At the Same Time for Better Speed and Reliability
SwiftKey's New "Neural Network" Text Prediction Is Impressively Good
The Quickstart Guide to Decluttering Your Home
Top 10 Secret Features in iOS 10
Top 10 Ways to Improve Your Daily Commute
Resources and Links | Arthur D. Simons Center
How to Choose the Best Facial Moisturizer for Healthy Skin
The Coming of the Russian Jihad: Part I
Afghan War News
The Case for Integrated Civilian, Military ISR/C4ISR Stra | Defense News
Minnesota Mall Stabbing Could Be Realization of Terror Fears | Military.com
'Likes' Less Likely to Affect Self-Esteem of People with Purpose
Visual Hunt: 350+ Million Photos For Free Commercial Use | NOUPE
Using social network analysis to prevent money laundering
Cellphone Bombs: The New American Terror - The Daily Beast
How the New York City Bomber Was Caught - The Daily Beast
Indoor navigation tool for blind individuals now available as open-source app
Tribal Leaders Say IS Regrouping in Afghan-Pakistan Border Areas
S&T News | Homeland Security
Information & Analysis | EUROPEAN ASYLUM SUPPORT OFFICE
Analysis and Statistics | EUROPEAN ASYLUM SUPPORT OFFICE
Country reports | EUROPEAN ASYLUM SUPPORT OFFICE
EASO publishes a Country of Origin Information (COI) report on recruitment by armed groups in Afghanistan | EUROPEAN ASYLUM SUPPORT OFFICE
Types of operations | EUROPEAN ASYLUM SUPPORT OFFICE
National Preparedness Report | FEMA.gov
Losing in Afghanistan | Foreign Affairs
A Director of the Present? Nowcasting Homeland Security’s Challenges - HOMELAND SECURITY AFFAIRS
HOMELAND SECURITY AFFAIRS - The Journal of the NPS Center for Homeland Defense and Security
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
National Preparedness Directorate | FEMA.gov
Naval Postgraduate School
Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes | WIRED
FEMA & DHS
Copy links to clipboard
Copy
Open
Browse 6,645 Document files | FEMA.gov
OpenFEMA | FEMA.gov
Technology
List of Awards
Technology Research, Development, Testing, and Evaluation Process | National Institute of Justice
Preparedness, Response and Recovery Publications | Homeland Security
National Incident Management System | FEMA.gov
S&T Publications | Homeland Security
Inbox (231) - scitrenbaum@gmail.com - Gmail
Through-the-Wall Surveillance | National Institute of Justice
DHS Policy Regarding the Use of Cell-Site Simulator Technology | Homeland Security
List of Awards
arXiv.org Search
Featured Publication Archive | Homeland Security
Detection and Surveillance Technologies | National Institute of Justice
Detecting Items Hidden on a Person or Inside a Body | National Institute of Justice
Detecting Hidden Items and Substances in the Surrounding Environment | National Institute of Justice
Detecting Weapons, Contraband and Chemicals | National Institute of Justice
Enhanced Surveillance for Public and Officer Safety
Cell-site simulators - Google Search
Afghan War News: Afghan Security News - Good and Bad
If You Only Have Room For One Trashy Network Thriller In Your Autumn Viewing Schedule, Make It Secrets & Lies - Secrets & Lies - Previously.TV
Pentagon quietly studying Islamic theology to understand the Islamic State and al-Qaeda
Stephen E. Arnold: Palantir Attacks US Army, Geosparsing, DoD Buries In-Q-Tel, Digital Currencies Neither Anonymous nor Reliable « Public Intelligence Blog
Crowdsourced intelligence gathering can prevent such incidents as Chelsea bombing | Government Security News
Modeling Precursors for Event Forecasting via Nested Multi-Instance Learning
LiveSafe - Safety in everyone's hands and connecting people to help
[1609.07302] Building accurate HAV exploiting User Profiling and Sentiment Analysis
Sensors | An Open Access Journal from MDPI
Computer Vision and Pattern Recognition authors/titles recent submissions
arXiv.org Search
Physical Sensors - A section of Sensors
Sensors | Special Issue : Big Data and Cloud Computing for Sensor Networks
Data Feeds | FEMA.gov
2016 National Preparedness Report | FEMA.gov
OpenFEMA (31) | FEMA.gov
Resources & Documents Collections | FEMA.gov
Emergency Preparedness Materials (Families, Pets, Seniors, Disabled, Businesses) (35) | FEMA.gov
America's PrepareAthon! (11) | FEMA.gov
America’s PrepareAthon! Materials (36) | FEMA.gov
National Preparedness | FEMA.gov
Emergency Alerts | Ready.gov
Make A Plan | Ready.gov
National Preparedness Month | Ready.gov
Types of Technology and Tools | National Institute of Justice
Mapping and Analysis for Public Safety | National Institute of Justice
Office of Science and Technology Policy | The White House
CrimeStat: Spatial Statistics Program for the Analysis of Crime Incident Locations | National Institute of Justice
Course Materials for Intermediate Crime Mapping Using ArcGIS 10.1
List of Awards
Thesis and Dissertation Collection
Homeland Security Market Research
Copy links to clipboard
Copy
Open
Our People - Homeland Security Market Research
Global Homeland Security & Public Safety Market - 2015-2022 - Homeland Security Market Research
U.S. Airport Security Market - 2015-2020
Video Analytics & Intelligent Video Surveillance Technologies
Global Video Analytics
Global People Security Screening: Technologies, Industry & Market - 2015-2020 - Homeland Security Market Research
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
Homeland Security Market Research - Premium HLS & Public Safety Technology & Market Reports
Category - Homeland Security Market Research
Market Reports - Homeland Security Market Research
Category - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Americas Market-2015-2020 - Homeland Security Market Research
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
Middle East & Africa Airport Security Market - 2015-2020 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
Global Homeland Security & Public Safety Industry - 2016 Edition - Homeland Security Market Research
European Homeland Security & Public Safety Technologies & Markets - 2016-2022 - Homeland Security Market Research
U.S. Homeland Security & Public Safety Market - 2016-2022 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Europe, Middle East and Africa Market-2015-2020 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Asia-Pacific Market-2015-2020 - Homeland Security Market Research
Saved Session - Session Buddy
09-26
Copy links to clipboard
Copy
Open
EarlyWarning
Knowledge Foundation - Technology Commercialization Alliance
Media Partners - Homeland Security Market Research
Knowledge Foundation - Technology Commercialization Alliance
Defence and Security | Clarion Events ltd
AnkerDirect @ Amazon.com
Kinja Deals Timbuk2 CMB
MacOS Sierra Breaks Popular Keygens, Pirate Finds Fix - TorrentFreak
Amazon.com: anker powercore - Portable Power Banks / Batteries & Battery Packs: Cell Phones & Accessories
Examining ISIS Support and Opposition Networks on Twitter | RAND
Policy Analysis: Terrorism - The Washington Institute for Near East Policy
Stein Program on Counterterrorism and Intelligence - The Washington Institute for Near East Policy
Literally Trump
Sondergaard: TACTICS - Google Scholar
Real-time crowd labeling for deployable activity recognition
Useful Websites - Radical Islam - LibGuides at FBI Library
greta's gouge: Friday's Miscellany 09-23-2016
Hyper Key hack in MacOS 10.12 Sierra using Karabiner-Elements and Keyboard Maestro - Album on Imgur
inessential: Memory Graph Debugger Tips
How to Stream Tonight's First Presidential Debate Online, No Cable Required
Featured Bag News, Videos, Reviews and Gossip - Lifehacker
The Notebook-Packed Shoulder Bag
I Think Nate Silver Is Broken, Maybe?
Not Up For Debate...
The Stroz Friedberg Cyber Brief — Center on National Security
Technology To Find Concealed Weapons, Coming To Your Street Corner.
Intelligent Automation, Inc.
The Rise of ISIL: Counterterrorism Lectures 2015 - Counterterrorism Lectures 2015 - The Washington Institute for Near East Policy
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Virtual Packs of Lone Wolves – Small World, Big Ideas – Medium
/dev/lawyer The MIT License, Line by Line
Usar Marked 2 para previsualizar AsciiDoc | adictosaltrabajo
Compendium of scenario-based attack profiles and compendium of full scenarios - Google Search
Deployable, near-real time field biometrics - Google Search
Predictive policing tools showing situational awareness - Google Search
STEIN COUNTERTERRORISM LECTURES - Google Search
Standoff Electromagnetic Concealed Weapons Detection - Google Search
Title: TACTICS: Policy and strategic impacts, implications and recommendations - Google Search
exploiting social media - Google Search
OJP Publications - National Criminal Justice Reference Service
Advanced Search - ProQuest Dissertations & Theses Global - ProQuest
License Plate Recognition - National Institute of Justice Search Results
American Military University | Online Degrees & Certificates | 877-755-2787 or info@apus.edu
Countering Drones - Day 2
CRCnetBASE
CRCnetBASE
CRCnetBASE
CRCnetBASE - Risk and Crisis Management in the Public Sector
CRCnetBASE - The Counterterrorism Handbook
CRCnetBASE - Effective Surveillance for Homeland Security
CRCnetBASE - Policing Major Events
CRCnetBASE - Soft Target Hardening
CRCnetBASE - Soft Target Hardening
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
National Center for Campus Public Safety Library | NCCPS
Real-Time Crime Forecasting Challenge
Video Analytics for Criminal Justice Uses | National Institute of Justice
Browse - Oxford Reference
Databases and Data Collection, Analysis, and Processing | RAND
The Science and Technology of Counterterrorism - ScienceDirect
Directory of Open Access Journals
National Law Enforcement and Corrections Technology Center TechBeat, September 2016
JTIC Corrections - Contraband Detection and Other Facility Operations and Population Services
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Public Intelligence
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk: Carl Young: 9780124200562: Amazon.com: Books
BJA Body-Worn Camera
A Futurist's Guide to Emergency Management - CRC Press Book
Encyclopedia of U.S. Intelligence - Two Volume Set (Print Version) - CRC Press Book
Grasping the Moment: Sensemaking in Response to Routine Incidents and Major Emergencies - CRC Press Book
New Developments in Biological and Chemical Terrorism Countermeasures - CRC Press Book
Soft Target Hardening: Protecting People from Attack - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
The Complete Guide to Physical Security - CRC Press Book
Security Management from CRC Press - Page 1
Homeland Security from CRC Press - Page 1
Federal Register :: Home - Monday, September 26th
Managing Critical Incidents and Large-Scale Event Security - Google Search
The Science and Technology of Counterterrorism - Google Search
Mass Gatherings; Large-Scale Events Security Symposium – Homeland Security Digital Library
JTIC - Popular Publications
National Criminal Justice Reference Service
NCJRS Abstract - National Criminal Justice Reference Service
DMI TOOLS
Copy links to clipboard
Copy
Open
ToolDatabase < Dmi < digitalmethods.net
DMI single sign-on
Compare Lists
Geo Extraction
Harvester
Image Scraper
Itunes store
Link Ripper
Sentence Ripper
TOOLS
Copy links to clipboard
Copy
Open
Remove Numbers from the Beginning of Terms in a List
Free Online TEXT Tools
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Convertjson.com - Convert JSON to other Formats and Vice-Versa
Clarion Events ltd |
Mefancy Text and html tools
Extract URLs
Data Design Group, Inc.
Add / Remove Line Breaks
Text Alphabetical Order tool
Playlist Machinery
09-26 PM
Copy links to clipboard
Copy
Open
Chris Seibold - O'Reilly Media
How to Download Example Code - Customer Service - O'Reilly Media
Handbook of Terahertz Technologies: Devices and Applications [20 (download torrent) - TPB
Mobile Devices Tools and Technologies [2015] [PDF] (download torrent) - TPB
NoctDeath - TPB
Facebook Graph Search Generator by Henk van Ess and Torment Gerhardsen
Global Video Analytics
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
The Counterterrorism Handbook: Tactics, Procedures, and Techniques, Fourth Edition - CRC Press Book
CRCnetBASE - The Counterterrorism Handbook
Intelbriefs | The Soufan Group
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
Heavy metal music meets complexity and sustainability science | SpringerLink
Intelligent Behavior Modeling on Information Delivery of Time-Sensitive Targets - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Abnormal Event Detection Based on Crowd Density Distribution and Social Force Model - Springer
Pre-Incident Indicators
Most Wanted Terrorists — FBI
Every Acronym Project Name From DARPA's Demo Day. - Google Search
Social Media in Strategic Communication - Google Search
Hybrid Warfare Keywords - NATO LibGuides - Google Search
Science and Technology to Combat Terrorism - Google Search
How to Gather Intelligence on Targeted Attacks - Tricks and Tips - Google Search
Search – Findo
Home - Dropbox
Audacity®
Battery Health 2 for Mac - FIPLAB
About | Acqualia
krypted.com - Tiny Deathstars of Foulness
Apple Configurator 2 - krypted.com
List Of Mac OS X Error Codes - krypted.com
Mac Commands - krypted.com
Common Apple Ports - krypted.com
Glossary of Apple Terms - krypted.com
Posts Tagged “bookmarks” - BrettTerpstra.com
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Stand-Off Detection of Suicide Bombers - Google Search
The tool that can sniff out a suicide bomber from 100 metres away | Daily Mail Online
Amazon.com: John G. Voeller: Books, Biography, Blog, Audiobooks, Kindle
Counterterrorism and Cybersecurity - Springer
Mobile Devices: Tools and Technologies - CRC Press Book
Missing Manuals
Data Mining Resources
DataMiningConsultant.com
DHS Apps | Homeland Security
Data.gov
National Preparedness Month | Ready.gov
Region X: AK, ID, OR, WA | FEMA.gov
State of Oregon: Oregon Office of Emergency Management
Emergency Management Division | Washington State Military Department
Cascadia Rising - Preparedness Toolkit
Signup for FEMA Email Updates
Site map | Homeland Security
The Great Oregon ShakeOut - Get Ready!
Oregon Office of Emergency Management Tsunami Information
State of Oregon: Oregon Office of Emergency Management
Oregon Office of Emergency Management Earthquakes
Benton County (OR) Amateur Radio Emergency Service
Oregon Office of Emergency Management Prepare, Protect, and Recover
Search Capabilities | www.ara.com
Clean Your Cluttered Hard Drive with macOS Sierra's New Storage Manager
This Page Lets You Disable a Lot of Google's Activity Tracking
People followed by Portland OR Alerts (@pdxalerts) | Twitter
Profiling the Islamic State | Brookings Institution
Wiki TOC scraper
Remove Extra Spaces tool
Add / Remove Line Breaks
Find Web Tools and Apps | Homeland Security
DHS S&T Center of Excellence Technology Fact Sheets - University Programs
Defense Threat Reduction Agency
After Action Report (AAR) Templates
People Screening Technologies & Global Markets - 2012-2016 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
Standoff IED, Person-Borne & Vehicle-Borne Explosives & Weapon Detection: Technologies & Global Market - 2015-2020 - Homeland Security Market Research
HSSAI | ANSER
Homeland Security Market Intelligence | World Leading Homeland Security & Public Safety Market Research
Homeland Security and Defense Center | RAND
Emergency Management Institute | Independent Study Program (IS)
Publications Library | Bureau of Alcohol, Tobacco, Firearms and Explosives
Science and Technology | Homeland Security
National Counterterrorism Center (NCTC)
National Institute of Standards and Technology | NIST
Ready.gov
USFA NFA Courses, Schedules and Instructors Course Search Results
Mobile App | FEMA.gov
U.S. Fire Administration resources for National Preparedness Month
FEMA on the App Store
Download fire data and data analysis tools
Emergency Response to Terrorism: Strategic and Tactical Considerations for Supervisors (F0549)
10-03
Copy links to clipboard
Copy
Open
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Arthur - Safely optimize some of your Mac's hidden settings
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
Browse All Guides - LibGuides at FBI Library
Home - Community Policing - LibGuides at FBI Library
Journal Articles - Intelligence Analysis - LibGuides at FBI Library
Home - Interviewing and Interrogation - LibGuides at FBI Library
Government Information - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
Home - LibGuides at FBI Library
A new version of Gitrob is out | michenriksen.com
Moral Machine
Proceedings of the Tenth International Conference on Web and Social Media
Jewish Calendar
CISN: EEW Project
America’s New Special Operations Commander Wants to Predict the Future - Defense One
Carry On Luggage and Bags - Up To 70% Off - eBags.com
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
Homeland Security Today: NYPD Developing Strategy to Counter Terrorist Drone Use
Conflict with ISIS
Snap It - Lose It!
Implementing graph grammars for intelligence analysis in OCaml
Motorcycle routes in Portland, United States on Mopedmap - Your bike routes online
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Home
Science.gov: USA.gov for Science - Government Science Portal
ShakeAlert | Earthquake Early Warning
2016 Conference
IARPA wants intel tools that can predict the future -- Defense Systems
DuckDuckGo
Two Person Bags | The Earthquake Bag
GitHub - gingerbeardman/Emojipedia at producthunt
Push/press/click: A smart button roundup
Connect OneDrive to hundreds of apps - IFTTT
Sync new files added to Dropbox to your Google Drive by lbrfabio - IFTTT
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Blasch: Revisiting the JDL model for information... - Google Scholar
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Taylor: A comparison of approaches to detect deception - Google Scholar
(1) The West Wing Weekly (@WestWingWeekly) | Twitter
ACAPS | Tools, know-how and training for assessments in crises
IST-132 Multi-Level Fusion of Hard and Soft Information
Fast Company | Business + Innovation
Architectures for contextual information exploitation - Google Search
Fundamentals of multiple-hypothesis tracking - Google Search
Hard & soft fusion – military application - Google Search
INVESTIGATIONS INVOLVING THE INTERNET AND COMPUTER NETWORKS - Google Search
Social Media Screening for Supporting Real-Time Decision Making - Google Search
ecent advances in multiple-hypothesis tracking - Google Search
ountering Nontraditional HUMINT Collection Threats. - Google Search
CheatSheet
Save for later by Sara Citrenbaum - Product Hunt
TagSpaces - Your Hackable File Organizer
Searching for evidence of Trump’s personal giving - Washington Post
40 maps that explain the world - The Washington Post
A Military-Grade Drone That Can Be Printed Anywhere | WIRED
Hacker Lexicon: What Is Password Hashing? | WIRED
Publications and Conferences
Bandit, criminal, robber, robbery, terrorist, thief, thug icon | Icon search engine
Afghan War News: Afghan Security News Update (20161002)
greta's gouge: Friday's Miscellany 09-30-2016
Jake Viens' Forensic Blog: Dropbox Forensics
The 6 Types Of Contractors You Encounter Overseas
CBNW
Digital Issues | CBNW
US Army unveils its 'Big 8' initiatives
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Published Research | RAND
Tools | RAND
Brief Treatment for Substance Use Disorders: A Guide for Behavioral Health Providers | RAND
Costs of the Conflict Calculator | RAND
ENGAGED Toolkit: Improving the Role of Nongovernmental Organizations in Disaster Response and Recovery | RAND
Terrorism and Homeland Security | RAND
Terrorism Threat Assessment | RAND
How I lived like a badger and learned more about the world.
Statewatch: Resources for researchers on civil liberties, justice and home affairs, access to documents and democratic standards in Europe
Advanced Certificate in Terrorism Studies from the University of St Andrews - Informa plc
Department of Defense Laboratories: Innovation through Science and Engineering in Support of Military Operations | Armed Services Republicans
Home Page | DHS BAA
Funding Opportunities | DHS BAA
Funding Opportunities | DHS BAA
Enhanced Passive Surveillance System | Federal Crowdsourcing and Citizen Science Toolkit
Keyboard shortcuts and Multi-Touch gestures | DaisyDisk - Analyze disk usage and free up disk space on Mac
Locating space wasters | DaisyDisk - Analyze disk usage and free up disk space on Mac
Tips and tricks | DaisyDisk - Analyze disk usage and free up disk space on Mac
Bioresearch Labs and Inactivation of Dangerous Pathogens | Energy and Commerce Committee
Robotics & Autonomy | Global Security Initiative | ASU
CBNW 2016 Vol 1 by immags - issuu
(U//FOUO) DHS-FBI-NCTC Bulletin: Homegrown Violent Extremists Focusing More on Civilian Targets | Public Intelligence
Find and remove duplicate items in your iTunes library - Apple Support
About backups for iOS devices - Apple Support
Install Project - Office Support
Bitmoji
Bruker: Applications - Life Science and material research applications and solutions
Center for a New American Security
sigstore.dbx - Google Search
Story Wars
Providing text analysis APIs that understand human text - Twinword
Sentiment Analysis API - Twinword Inc.
Advanced Ctrl+F Search. Research Tool. Twinword Finder
Write with a Built-In Thesaurus - Twinword Writer
10-10
Copy links to clipboard
Copy
Open
MSFRIC Subject Resource Guides
Publications Publication List
Free GIS Datasets - Categorised List
Nuclear power stations worldwide - Google Fusion Tables
Intelligence, Surveillance, and Reconnaissance (ISR) Operations Guide - AL
Open Data
Terrorist Screening Database - Data.gov
PortlandMaps
Home | City of Portland, Oregon
Hedonometer
Data Resources: Conflicts, Wars, Terrorism
Portland/Oregon Data - Geography - Research Guides at Portland Community College
Maps, GIS & Open Data | The City of Portland, Oregon
COPS Office: Grants and Resources for Community Policing
Research Desk: Open Data Guides, Migration, Terrorism | Global Investigative Journalism Network
Open Data Network
Population Count Data for Portland Metro Area (OR-WA) - Population on the Open Data Network
Military Strategy for a Twitter War
Home - Data Portals
Computational Event Data System
face.com
Research Desk: Weather Disasters, Population, ICT | Global Investigative Journalism Network
Search for * | City of Portland, Oregon
DARPA - Open Catalog
Home | the DC GIS Open Data Site
Open Data Resources
Data Catalogs | Open Government Data
Phoenix Data Project
SNAP: Higher-order organization of complex networks
UCDP - Uppsala Conflict Data Program
Africa Data | ACLED
Home | CivicApps.org
Datasets | CivicApps.org
Garbage Collection Schedule Areas | CivicApps.org
GEOFABRIK // Downloads
Data Sources | NNIP
Open Data | NNIP
Open Data | NNIP
Open Data | NNIP
Catalog | NNIP
Ignite Showcase September 2016: Part I | NNIP
Publications Publication List
Teaching Terror Annotated Bibliography
Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations - Security News - Trend Micro USA
USGS Projects in Afghanistan
USGS Projects in Afghanistan » Hyperspectral Data
Million Song Dataset - AWS Public Data Set
Jure Leskovec: Videos of talks and tutorials
NYC Open Data
City of Portland Open Data Initiative - Datasets - the Datahub
DuckDuckGo
see what's happening | etrigg.com
NYS GIS Clearinghouse
NYC Open Data
Open Data, Open Source, and the City of Portland | Opensource.com
ArcGIS
COPS Office: Grants and Resources for Community Policing
COPS Office: Grants and Resources for Community Policing
Data
Google Public Data Explorer
Terrorist Screening Database - Google Search
portland or open data - Google Search
Data: Humanitarian Data Exchange | HumanitarianResponse
City financial data
Population Count Data for Portland, OR - Population on the Open Data Network
Population Count Data for Washington Metro Area (DC-VA-MD-WV) - Population on the Open Data Network
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 3 - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
European Commission : CORDIS : Projects & Results Service : PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts
European Commission : CORDIS : Projects & Results Service : Terrorism detectors
European Commission : CORDIS : Projects & Results Service : Final Report Summary - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
CORDIS Archive : European Commission : CORDIS : FP7 : ICT : Future and emerging technologies (FET)
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
Innovative Lie Detector | EyeDetect Lie Detection
HDIAC.org |
Biometrics | HDIAC.org
Informational Resources | HDIAC.org
Biometrics Institute
HDIAC Journal Archive | HDIAC.org
Jure Leskovec: Publications
Improvised Threats Organization Becomes Part of Defense Threat Reduction Agency > U.S. DEPARTMENT OF DEFENSE > Article
Scientific tools & databases - European Commission
Special Report: Science and Technology
ARGOS Project: Short Wave Infrared (SWIR) imaging
Lie Detection Solution | Lie Detector Services
Lie Detector Tests | EyeDetect by Converus
Law Enforcement - Converus EyeDetect
Science Team | Converus
Screen Refugees, Find Terrorists by Monitoring Eye Behavior, Says Lie Detection Tech Co. - Converus EyeDetect
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 2 - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
SUPER
Homeland Defense: Novel Radiation Surveillance Technology Could Help Thwart Nuclear Terrorism | Georgia Tech Research Institute
Table of Contents — March 2014, 51 (2)
The analytical study of terrorism
Dataset
A Startup Wants to Use Eye Tracking to Detect If Syrian Refugees Are Terrorists | Motherboard
GE develops battery-free RFID tags
Antiterrorism equipment, metall detector, IED
VSTEP EyeObserve - Camera Operator Trainer | VSTEP
The Defense Forensics & Biometrics Agency (DFBA) - Home
ARGOS Clustering with PROACTIVE Project
Dissemination Material
Public Deliverables
PUBLICATIONS
Council for Scientific and Industrial Research develops contactless fingerprinting device | BiometricUpdate
DHS considering expanding biometric data collection at US borders | BiometricUpdate
Researchers train software to recognize pixelated faces | BiometricUpdate
SIGMA
Defense Threat Reduction Agency > Missions > WMD Training and Education > VIRTUS
Weapons Complex Monitor Vol. 27 No. 26 - ExchangeMonitor
Homeland Security Today: Threat of Nuke Terrorism Drives Radiation Detection Market, Analysis Says
SIBAssoc
Predictive profiling - Wikipedia, the free encyclopedia
McCreadie: SUPER: Towards the use of Social Sensors... - Google Scholar
U.S. Army Research, Development and Engineering Command | RDECOM
An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments
The Evolving Challenges for Explosive Detection in the Aviation Sector and Beyond | Combating Terrorism Center at West Point
An approach to intelligent information fusion in sensor saturated urban environments. - Google Search
Biometric Image Sensing - Google Search
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. - Google Search
OGC sensor web enablement: Overview and High Level Architecture - Google Search
Social sensors for security assessments and proactive emergencies management - Google Search
Terrorism detectors - Google Search
fp7 proactive eu - Google Search
Highlight: Improvised Threats Organization Becomes Part of Defense Threat Reduction Agency | HDIAC.org
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. | HDIAC.org
Volume: 3 Issue: 2 | HDIAC.org
Detecting Terrorist Surveillance | Stratfor
MacScripter
Dan Rodney's List of Mac Keyboard Shortcuts & Keystrokes
StrategyPage | Military News Humor Photos
greta's gouge: Friday's Miscellany 10-07-2016
'West Wing' Cast Reunites 10 Years After Series Finale For Exclusive Interview (Full) | TODAY - YouTube
JewBelong
I SPY DOC
XKeyscore - IC OFF THE RECORD
List of government mass surveillance projects - Wikipedia, the free encyclopedia
BuzzFeed News
LOL Feed (lol) on BuzzFeed
GitHub - MISP/misp-taxonomies: Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Bradley Whitford & Allison Janney Are All Over Each Other - YouTube
Walk-and-Talk Monologue (w/ Allison Janney & Bradley Whitford) - YouTube
'The Grand Tour' Grand Racing Quiz - YouTube
Here’s A Bunch Of Things Donald Trump Got Wrong At The Debate - BuzzFeed News
Begin-Sadat Center for Strategic Studies
Maps Mania: Sky View
Next Reality » AR, VR, & MR News - Watching Technology Redefine Reality
Migrant workers bear the brunt of Saudi's archaic kafala system | Middle East Eye
Predicting Physical Features and Diseases by DNA Analysis: Current Advances and Future Challenges | Open Access Journals
DHS AWARDS $494.7M TO RAND CORP TO OPERATE STUDY & ANALYSIS CENTER | Homeland Security
News Release: DHS S&T Selects 10 Start-Ups for First Responder Innovation | Homeland Security
John Oliver Destroys Pussy Grabbing Warthog Donald Trump October 9 2016 (HBO) - YouTube
xkeyscore - Google Search
XKeyscore - Wikipedia, the free encyclopedia
Marc Ambinder (@marcambinder) | Twitter
SOG: GEOINT/CQB/H2H (@UZIEL_CQC) | Twitter
(310) #LockerRoomTalkIn5Words hashtag on Twitter
(17) @stczzop/***** on Twitter
All Stories by Marc Ambinder - The Atlantic
An Educated Guess About How the NSA Is Structured - The Atlantic
Marc Ambinder
File:XKeyscore presentation from 2008.pdf - Wikipedia, the free encyclopedia
XKEYSCORE: NSA’s Google for the World’s Private Communications
NSA XKeyscore surveillance program details revealed in new Snowden documents - Business Insider
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Confidential Document Shows How Peter Thiel Really Feels About Palantir - BuzzFeed News
Well, That Was Easily The Craziest And Most Surreal Debate In Modern History - BuzzFeed News
23 Tweets That Will Make Carb Lovers Laugh Harder Than They Should
31 Insanely Easy And Clever DIY Projects
23 Struggles Curly-Haired Girls Know Too Well
Just 27 Really, Really Good Tweets About Debate Hero Ken Bone - BuzzFeed News
This Twitter Parody Account Keeps Predicting Political Events And It's Scary - BuzzFeed News
BuzzFeed Buzz
27 Tweets About Tonight’s Debate That’ll Make You Laugh, Then Stare Blankly Into The Dark Void
What do Palantir employees think of BuzzFeed's article? - Quora
Vox.com | Explain the news
Notes on the garbage fire that is American politics - Vox
Donald Trump couldn’t stop lurking behind Hillary Clinton, and it ruined his night - Vox
The entire Donald Trump family tree, in one graphic - Vox
The Funniest Tweets on The Second Presidential Debate - Vogue
The 22 Funniest Tweets About the First Presidential Debate
The Funniest Internet Reactions To Sunday Night’s Presidential Debate
Debate giggles: 16 funniest tweets - CNN.com
This Muslim Professor's Clapback Was Perhaps The Funniest Tweet Of The Debate - BuzzFeed News
Donald Trump Is Now So Toxic Even This Parody Twitter Account Can't Deal - BuzzFeed News
Kred | The Home of Influence
Social Media Monitoring Tools - How to Pick The Right One | Convince and Convert: Social Media Consulting and Content Marketing Consulting
Guide to monitoring social media conversations | Socialbrite
A Taxonomy of OSINT Sources - Google Search
Taxonomy of OSINT Sources – i-intelligence
Study of social networking technologies Social networking analysis in a counter- insurgency context - Google Search
GraphCT – Streaming Graph Analysis
OODA loop - Wikipedia, the free encyclopedia
Page not Found | Artificial Intelligence Laboratory
Saved Session - Session Buddy
Technical assistance tools
The Role of Technology in Modern Terrorism
NATO - Science for Peace and Security
[OFFICIAL] KeepVid: Download YouTube Videos, Facebook, Vimeo, Twitch.Tv, Dailymotion, Youku, Tudou, Metacafe and more!
Types of Nuclear Weapons: CTBTO Preparatory Commission
Security Tools
Search WikiLeaks
Location, Sensors, Voice, Photos?! Spotify Just Got Real Creepy With The Data It Collects On You
Meet the GynePunks Pushing the Boundaries of DIY Gynecology | Motherboard
A Look at Terrorist Behavior: How They Prepare, Where They Strike | National Institute of Justice
Paulo Shakarian | Arizona State University - Academia.edu
Rosh Hashanah REBOOT | Oregon Jewish Life
Tetra Tech Receives $400 Million Contract From US Department of Energy (NASDAQ: TTEK) - 24/7 Wall St.
html2text: THE ASCIINATOR (aka html2txt)
OneTab shared tabs
Hack In The Box Security Conference
BioPharmaAmbition 2016 and first MIT Health Hackathon
Nearly 60 percent of US smartphone owners use phones to manage health | MobiHealthNews
Monitoring and Feedback for Long-term Weight Loss | Lifestyle Behaviors | JAMA | The JAMA Network
HackUMass lV
MDP Hackathon
Hack-A-Thon | SOAR
MIT Hacking Medicine
Reality guide: How everything fits together | New Scientist
Secure Account - Account Settings
How to transfer data from your old iPhone to your new iPhone 7 | iMore
How to Set Up Your New iPhone 7 | WIRED
iPhone 7 With Trade-in Offer - Wireless Support
New York police department deploys new counter-terrorism unit - Diaspora - Jerusalem Post
Counterterrorism Night Fighting Principles Workshop | Condition Gray
Terrorism and counterterrorism | Homeland Security News Wire
What FBI, police are doing to prevent terror attacks - The San Diego Union-Tribune
Meet NYPD’s counterterrorism K-9 unit | New York's PIX11 / WPIX-TV
Global Engagement Center
The Instruments of Counterterrorism
NATO - Official text: NATO’s policy guidelines on counter-terrorism , 21-May.-2012
The Future of Anti-Terrorism Technologies
Anti-terror measures: How tech helps fight the counter-terrorism war | IT PRO
Terrorism and Counterterrorism | edX
Counterterrorism | National Nuclear Security Administration | (NNSA)
UN Counterterrorism Framework: Key Programs and Tools | Charity & Security Network
Global Counterterrorism Forum Co-Chairs' Fact Sheet: The Deliverables
RAND Benchmark | Measure Law Enforcement Officer Performance...Fairly and Accurately
CIASavedLives
Watch A 3 Hour Movie In 2 Hours + You Get More Time - Efficiency Is Everything
The data set Terrorism in Western Europe: Events Data, or TWEED for short, was constructed and collected for the purpose of analysing patterns of terrorism in Western Europe as related to historical and structural preconditions (see Jan Oskar Engene: Eur
Mac Guides - Mac Tutorials, Product Guides and More...
IEEE Xplore Document - Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards
IEEE Xplore Document - A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts
IEEE Xplore Document - Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: GREAT OSINT RESEARCH SOURCES! - WEEK OF 12/12/14
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: 6 OSINT RESOURCES ON IRAN'S PURSUIT OF NUCLEAR WEAPONS
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: THIS NEWSLETTER IS ALL ABOUT WEBSITES ON TERRORISM, NATIONAL SECURITY & RADICAL ISLAM
Terrorism and Political Violence :
About the Correlates of War Project — Corelates of War
urn:nbn:se:kth:diva-89582 : Using Temporal Analytics for Early Discovery of Upcoming Threats
Unmasked: the far-right blogger idolised by Breivik | The Independent
The State of the American Surveillance State and... - Matthew Aid
RDWTI | RAND
Local Police Using CIA-funded Software to Track All Citizens' Social Media Posts
CCI Blog » Blog Archive » Internet Search Links for October 2016 #OSINT
CCI Blog » Blog Archive » Recovering from Identity Theft
Biodefense Headlines – October 9, 2016
Johan Dahlin - Google Scholar Citations
Renee Marlin-Bennett - Google Scholar Citations
Christian Mårtenson - Google Scholar Citations
Dahlin: Combining entity matching techniques for... - Google Scholar
Gustavi: A tool for generating, structuring, and... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Johansson: Timeprints for identifying social media... - Google Scholar
Teljstedt: A semi-automatic approach for labeling... - Google Scholar
Brynielsson: Harvesting and analysis of weak signals... - Google Scholar
hematologyoncologyoutlines - hemoncoutlines
A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts - Google Search
Analysis of Weak Signals for Detecting Lone Wolf Terrorists - Google Search
Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards, - Google Search
Everyday rules and embodied information: anti-money laundering/counter-terrorist financing practices and radio frequency identification tags as security politics - Google Search
International Terrorism: Attributes of Terrorist Events - Google Search
On the Feasibility of Internet-Scale Author Identification - Google Search
Operation Southern Cross - Google Search
The 9/11 Effect: Comparative Counter-Terrorism. - Google Search
The Role of Warning Behaviors in Threat Assessment - Google Search
The Analytical Study of Terrorism: Taking Stock - Google Search
Understanding Lone Wolf Terrorism Global Patterns, Motivations and Preventions - Google Search
Using Temporal Analytics for Early Discovery of Upcoming Threats - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj854fl8s_PAhVM52MKHevGBlQQFggjMAA&url=http%3A%2F%2Frandomwalker.info%2Fpublications%2Fauthor-identification-draft.pdf&usg=AFQjCNEJqt1oo3x3uHgxvQ1URFQ__h4A5A&sig2=y9uqqMnkXsQc0M85aYm9_Q&cad=rja
The Year in Hate and Extremism | Southern Poverty Law Center
Electronic Weapons: How FM Signals Can Kill
Center for Terrorism & Security Studies | UMass Lowell
Live Fact Checking The 2nd Clinton-Trump Debate | CPR
ExtraTorrentRG - TPB
Lion.King - TPB
DHS Emerging Risk to Infrastructure from Unmanned Aerial Vehicles (UAVs) | Public Intelligence
2nd presidential debate transcript: live updates from Hillary Clinton and Donald Trump’s face-off - Vox
e-Books (Microbiology & Immunology) - Microbiology and Immunology for Medical Students: Course Guide - Research Guides at Tulane University
Sherris Medical Microbiology : Free Download & Streaming : Internet Archive
Community Texts : Free Books : Free Texts : Download & Streaming : Internet Archive
From Dropbox to iCloud Drive: a review and some thoughts – Finer Things in Tech
Sunday's Best Deals: Tailgating Gear, Rowing Machine, $3 Kindle Books, and More
Messages Apps and Sticker Packs Roundup – MacStories
U.S. Secret Service Training Guide: Characteristics of the Armed Individual | Public Intelligence
30 Quick Takes on Debate 2 – Medium
Natural Hair Coloring (2016) (Pdf) Gooner (download torrent) - TPB
The Day's Most Fascinating News with Dave Pell
Sixteen Quick Thoughts on Pussy-gate – Medium
News
Put Magic in Your Messages With Disney iMessage Stickers
Send Some Love With Adorable Character Stickers for iMessage
Message Collections
The Best Non-Sticker iMessage Apps
Wayfair.com - Online Home Store for Furniture, Decor, Outdoors & More | Wayfair
Portable Battery Packs For Your Laptop Are Finally a Reality
D.C. City Council Owns Self
5 Top Tips and Tools For the Social Media Reporter
News You Can Use: 10/07/16 | Arthur D. Simons Center
Top CIA officers to face questions about brutal interrogations in civil suit - The Washington Post
Artificial Intelligence, real-life applications - CBS News
Meet the Man Reinventing CIA for the Big Data Era - Defense One
iMessage, metadata, and law enforcement: What you need to know! | iMore
Terror-Events.com – Tracking terror events and victims all over the world
Community Texts : Free Books : Free Texts : Download & Streaming : Internet Archive
Today / Me
Grumpy Stickers on the App Store
Snappy Browser - send links and quotes on the App Store
Inbox (338) - scitrenbaum@gmail.com - Gmail
Defense Intelligence Agency | Public Intelligence
Intelligence Advanced Research Projects Agency | Public Intelligence
Open Source Center | Public Intelligence
Amazon.com: [Apple MFI Certified] Jackery Bolt 6,000 mAh Ultra-Compact External Battery Charger, Portable Power Bank and Travel Charger with Built-in Lightning & Micro USB Cables (Black): Cell Phones & Accessories
Digital Innovation — Central Intelligence Agency
VICE News watches the debate so you don't have to
Saved Session - Session Buddy
10-09
Copy links to clipboard
Copy
Open
You Dumb Motherfuckers, By James Madison | The Yale Record
Top 10 Browser Extensions that Eliminate Web Annoyances
The CIA Says It Can Predict Social Unrest as Early as 3 to 5 Days Out - Defense One
Otaku Ninja on the App Store
Trash Doves on the App Store
A Wiki of Social Media Monitoring Solutions
EQ-Radio: Emotion Recognition using Wireless Signals
The Good Place - Previously.TV Forums
Popular Photo-Altering App Prisma Will Now Transform Your Videos Into Wild, Otherworldly Scenes - BuzzFeed News
How Can Foreign Policy Survive Trump? Look to the CIA | Overt Action | Research, analysis, & debate on critical intelligence challenges
iOS 10 Widgets Are Great: Here's How to Put Them to Good Use
4 Best Free Mac Preview Alternatives for Reading PDFs
DARPA’s Microsystems Technology Offers Companies with Limited or No Experience Working with the Government
Election 2016: The International Issues | RAND
Latest Threatening Communique from the Islamic State | Terror Trends Bulletin
Semantics — What does data science reveal about Clinton and Trump ? – Reputation Squad – Medium
7 Google Chrome Alternatives That Will Make You More Productive – Product Hunt – Medium
1000 Life Hacks
FotoForensics
Comcast Is Rolling Out 1TB Data Caps to a Lot More People On November 1st
Everything Google Announced at Its "Made By Google" Event that Actually Matters
How to Stream the Second Presidential Debate Online, No Cable Required
Instantly Reset Your Mac's Dock to Default with a Terminal Command
WiFox Puts Thousands of Airport Wi-Fi Networks and Their Passwords On Your Phone
Paper-based FRET for direct detection of collagen triple helix - Journal of Materials Chemistry B (RSC Publishing)
Silicon Florist links arrangement for October 7, 2016 « Silicon Florist
MacStories Weekly: Issue 51
Lose It! Now Tracks Your Diet by Snapping Photos of Your Food
Apple Offers INKS. as a Free Download via the Apple Store App - iClarified
7090 - Combating Terrorism Technical Support Office (CTTSO) APBI
At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit - The New York Times
Audio: Pasadena company snags contract to expand nuclear monitoring | 89.3 KPCC
Science startups make research faster, cheaper, more accurate - The Globe and Mail
DASHlink - Projects
NNSA, Bulgaria complete implementation of nuclear detection systems - Homeland Preparedness News
(26) Stefano R L Campana | University of Siena - Academia.edu
Fred Meyer
1 tab
Copy links to clipboard
Copy
Open
OneTab shared tabs
1 tab
Copy links to clipboard
Copy
Open
OneTab shared tabs
42 tabs
Copy links to clipboard
Copy
Open
Best Apps With Photo Effects & Filters
Best Remote Desktop Apps
TableFlip: the cure for Markdown table editing - BrettTerpstra.com
Assign Keyboard Shortcuts to Avoid Ambiguity « Doug's AppleScripts for iTunes
Zoomable tree of all life on Earth
We Need to Save the Internet from the Internet of Things | Motherboard
Goals Scored Picks *** Friday *** 7 October 2016
DARPA MTP Commercial Performer Program Announcement | Contract Research and Development
AFRL Advanced Cyber, SIGINT and Personal Communications Collection and Exploitation BAA | Contract Research and Development
MacBook Pro Tutorials
4 Free Large File Viewer To Open Very Large Text Files
Flower Recognition iPhone App from Microsoft Garage
Bookmarking Service with Auto Categorization, Sync Across Devices
How To Bulk Unlike Facebook Pages
Mac Kung Fu: Thoroughly testing your Mac's RAM – an up-to-date how to (2016; macOS Sierra-tested)
Watch Kristin Chenoweth Duet with James Corden on Late Night | Playbill
Flashback! Relive BroadwayCon’s Epic Finale With Lena Hall, Lesli Margherita and More | Playbill
Social Explorer
OpenWERX - SOFWERX
Best Free Digital Image Viewer | Gizmo's Freeware
Unfridgeworthy: Interstellar
[1609.09761] Detecting Cognitive Appraisals from Facial Expressions for Interest Recognition
[1610.01578] A new algorithm for identity verification based on the analysis of a handwritten dynamic signature
[1610.01670] The Gun Violence Database
gun-violence.org
Social and Information Networks authors/titles recent submissions
DHS to Host Strategic Industry Conversation
DTRA-Backed Ebola Vaccine Moves Closer to Being Licensed
On Grant Rejection Affect: A Treatment Case Study | SAS Confidential
CBRNE Articles | Global Biodefense
(11) #phdchat hashtag on Twitter
Methamphetamine or amphetamine abuse linked to higher risk of Parkinson’s disease | National Institute on Drug Abuse (NIDA)
DrugFacts: Methamphetamine | National Institute on Drug Abuse (NIDA)
3-Minute Thesis - Google Search
SUNRISE DIVE analytics - Google Search
Cybercrime Roundup: A Pivot to Asia in Espionage Prosecutions - Lawfare
TableFlip Takes the Pain Out of MultiMarkdown Tables – MacStories
Kid Theater with Ben Affleck - YouTube
AngelsBwayTunes - YouTube
BROADWAY SESSIONS - YouTube
'Bring Him Home', John Owen-Jones - BBC Proms in the Park NI 2016 - YouTube
Adobe Add-ons
2 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
Google Image Result for http://d2ydh70d4b5xgv.cloudfront.net/images/7/5/grason-stadler-gsi-16-audiometer-tested-working-9719abef390e14dc9fbf0dbcc743dc63.jpg
Gordon
Copy links to clipboard
Copy
Open
Excellent Tektronix P6015 High Voltage Probe | eBay
Amazon.com Shopping Cart
Checkaflip - Buy Low, Sell High
General Radio Equipment
General Radio Historic Manuals
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
10-06
Copy links to clipboard
Copy
Open
IEEE Xplore Document - Visual Analytics of Political Networks from Face-tracking of News Video
Patent US9454785 - Systems and user interfaces for holistic, data-driven investigation of bad ... - Google Patents
Patents by Assignee Palantir Technologies - Justia Patents Search
United States Patent: 9454785
inassignee:"Palantir Technologies Inc." - Google Search
United States Patent and Trademark Office
US2005014363 FORECASTING DATA WITH REAL-TIME UPDATES
Patent WO2005104736A3 - Forecasting data with real-time updates - Google Patents
IEEE Xplore Document - Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
European Journal of Futures Research - Springer
Virus trading cards
Tabletop Whale's guide to making GIFs
Home - Nerdcore Medical
Human Factors and the U.S. Department of Homeland Security | The Human Factor Advocate
9 Tricks to Appear Smart in Brainstorming Meetings – The Cooper Review – Medium
An important update to your XFINITY Internet service - scitrenbaum@gmail.com - Gmail
Virtual Interactive Bacteriology Laboratory
ICE: Information Credibility Evaluation on Social Media via Representation Learn
Electrochimica Acta - ScienceDirect.com
(De)constructing difference: a qualitative review of the ‘othering’ of UK Muslim communities, extremism, soft harms, and Twitter analytics: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
(11783) Inoreader - The Best Apps for Wikipedia on iOS
The Best Apps for Reading Wikipedia on iOS
Papaly | Start Page
Little Shop of Horrors - 2015 Encores! Off-Center Concert - YouTube
macOS Automation
The Nationwide Network Working to Bring Mobile Biometrics to Your Community | Public Intelligence
NYPD Operations Order 34: Use of Social Networks for Investigative Purposes | Public Intelligence
New York | Public Intelligence
Social Media | Public Intelligence
Social Networking | Public Intelligence
Department of Homeland Security | Public Intelligence
Cultural Intelligence | Public Intelligence
Agenda | DIA Innovation Day 2013
New surveillance technology can track everyone in an area for several hours at a time - The Washington Post
Wide-area surveillance technology triggers privacy concerns | PBS NewsHour
AppleScript: The Language of Automation
Methamphetamine | National Institute on Drug Abuse (NIDA)
GitHub - threatcrowd/ApiV2: Version 2 of the ThreatCrowd API
[1610.01790] Predicting encounter and colocation events in metropolitan areas
DHS Social Network Analysis, Behavioral Threat Detection, Biometrics Presentation | Public Intelligence
The Schuyler Sisters Music Video - Hamilton Broadway Musical in Real Life - YouTube
Police Accountability: Last Week Tonight with John Oliver (HBO) - YouTube
FamousInNY - YouTube
Advanced Analytic Techniques: Serotonin Modulates Behavioral Reactions to Unfairness
Best Apps To Store And Share Large Files
apple photos extensions - Google Search
apple photos duplicates - Google Search
what is the easiest way to delete duplicate photos | Official Apple Support Communities
Removing duplicate pictures from the Photos app on Mac with Photos Duplicate Cleaner
Photos Duplicate Cleaner on the Mac App Store
How-To: Safely shrink your Mac’s giant photo library, deleting duplicate images to save space | 9to5Mac
PhotoSweeper - Fast and powerful duplicate photo cleaner for the Mac - Overmacs Team
How to Supercharge Your Apple Photos Workflow With Extensions
workerbee - TPB
The All New DEVONthink To Go for iOS
New ebook packs for August 2016 (download torrent) - TPB
FAQ
Audio > Music - TPB
Billboard Mainstream Top 40 15-Oct-2016 (download torrent) - TPB
Sum 41 - 13 Voices (Deluxe) (2016) (download torrent) - TPB
tbohana - TPB
Our Solution Suite | Crime Tech Solutions
Intellectual Property - Investigative Dashboard
Watch Speechless Online - P-I-PILOT | Hulu
A field guide to dangerous bacteria
threatcrowd · GitHub
Patent US20100295717 - Weapon detection and elimination system - Google Patents
VIS. Visual Investigative Scenarios platform: Users
Is Your Big Data Project a “Weapon of Math Destruction”? - IEEE Spectrum
Critical infrastructure protection
InfoGram EMR-ISAC - Google Search
Investigative Reporters and Editors | Tipsheets
Office Supplies, Furniture, Technology at Office Depot
RAND Corp. Chosen to Operate New Research Center for U.S. Department of Homeland Security | RAND
SIGNAL Magazine |
Search Grants | GRANTS.GOV
Centers of Excellence | Homeland Security
10-05
Copy links to clipboard
Copy
Open
A social media and crowd-sourcing data mining system for crime prevention during and post-crisis situations: Journal of Systems and Information Technology: Vol 18, No 4
Where has this tweet come from? Fast and fine-grained geolocalization of non-geotagged tweets | SpringerLink
START launches online course on terror-crime nexus and CBRN | START.umd.edu
Terrorist planning and success rates; Case study in radicalization; Strategies to limit groups’ lethality | START.umd.edu
Intelligence Collection 101: Signatures – Vetted Intelligence
DD0S: Posters From Walls To Legitimate Weapon Of War and Its Possible Use Scenarios | Krypt3ia
dblp: Themis Palpanas
Private Sector Resources Catalog | Homeland Security
Proper Application of ADR Techniques regarding Violent Non-State Actors Notes 31 Ohio State Journal on Dispute Resolution 2016
Developing expert political judgment: The impact of training and practice on judgmental accuracy in geopolitical forecasting tournaments
Modeling of urban change using remote sensing data and cellular automata technique | SpringerLink
A Novel Direct and Cost Effective Fabrication of Paper-Based Microfluidic Device by Commerical Eye
Risk assessment of high schools in Lebanon for potential terrorist threat: International Journal of Disaster Resilience in the Built Environment: Vol 7, No 5
Risk assessment of high schools in Lebanon for potential terrorist threat - Google Search
A social media and crowd-sourcing data mining system for crime prevention during and post-crisis situations - Google Search
Where has this tweet come from? Fast and fine-grained geolocalization of non-geotagged tweets - Google Search
Publicly Available Social Media Monitoring and Situational Awareness Initiative - Google Search
Privacy Documents for the Office of Operations Coordination (OPS) | Homeland Security
System of Records Notices (SORNs) | Homeland Security
IS-60.A: The Homeland Security Geospatial Concept-of-Operations (GeoCONOPS) for Planners and Decision Makers | FEMA - Emergency Management Institute (EMI) Course
Homeland Security |
Journal Articles - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
National Security | www.ara.com
Defense Technical Information Center
Public Technical Reports Thesaurus Source
Home - Counterinsurgency Strategy - NATO LibGuides at NATO Multimedia Library
Home - Hybrid Warfare - NATO LibGuides at NATO Multimedia Library
Multiple hypothesis tracking for data association in vehicular networks
Fighting Iran: Intelligence Support During Operation Earnest Will, 1987–88 — Central Intelligence Agency
Why Bad Things Happen to Good Analysts — Central Intelligence Agency
Social Media Use in Emergencies
Mexican Cartel Tactical Note #21 | Small Wars Journal
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
FAA List Of Reported Drone Incidents Indicates A Problem. But It's Not What You Think.
Pseudo-Wisdom and Intelligence Failures - Google Search
Pseudo-Wisdom and Intelligence Failures: International Journal of Intelligence and CounterIntelligence: Vol 23, No 1
Semantic Scholar
Here's How To Use Google Play Music From a Desktop App
This Is A Real Tweet From The Russian Embassy In The United States
Databases and Articles | Portland State University Library
All the Things You Can Do With Google Assistant That You Couldn't Do Before
This Infographic Shows the Common Ways Scammers Try to Phish Your Account
An Incredible Thing Dogs Can Do With Their Noses: Tell Time -- Science of Us
Hack away the weekend with Portland Science Hack Day and Hack Oregon « Silicon Florist
At least you can wear your skinny jeans on Thursday
Digital World Biology News October 2016
Contract Research and Development | R&D Business Opportunity Abstracts
DARPA Strategic Technologies BAA | Contract Research and Development
CSIA
www.darpa.mil/program/hypersonic-air-breathing-weapon-concept
Mr. Mark Gustafson
The Sorry, Dangerous State of NJ Transit - by Harry Zieve Cohen
Charlie Brown to Stop Running Toward Football. Maybe. - by Walter Russell Mead
Inderscience Online
Biosensors | Free Full-Text | Biosensing with Paper-Based Miniaturized Printed Electrodes–A Modern Trend | HTML
Sensors | Special Issue : Enabling the Move from Wireless Sensor Networks to Internet of Things and Cyber-Physical Systems
U.S. Army Leaders Warn About Russia's Bold Moves in Information Warfare - Blog
OneTab shared tabs
OneTab shared tabs
Organization formalization, sector and social media: Does increased standardization of policy broaden and deepen social media use in organizations?
Analysis & Decision Systems - Systems & Technology Research
Intelligence Tools & Applications - Systems & Technology Research
Sensors & Signal Processing - Systems & Technology Research
The Daily Beast
NSA Thief Worked With Elite Hacker Squad - The Daily Beast
Rudy Giuliani Used to Know Better - The Daily Beast
Trump Takes ‘Credit’ for Pence’s Debate Performance - The Daily Beast
‘Immense Human Suffering’ Predicted as Hurricane Matthew Approaches - The Daily Beast
A DIY Venue in Toronto Has Started Carrying Overdose Kits On-Site | VICE | Canada
Inside the Covert War In Ukraine | VICE | Canada
Alfresco » Login
[1609.09546] Dynamic Models of Appraisal Networks Explaining Collective Learning
[1610.00054] Outlier Detection from Network Data with Subnetwork Interpretation
[1610.01381] The Predictive Context Tree: Predicting Contexts and Interactions
Findo
SiriusXM Streaming Radio: Listen Now | SiriusXM Radio
Alfresco » Site Dashboard
Vol. 60 No. 3 — Central Intelligence Agency
Crowd-Sourced Intelligence from Social Media - Google Search
OODA Loop - DHS Issues Alert on U.S. Election Hacking
OODA Loop - Armed Drone Export Standards Sought by U.S. and Dozens of Allies
OODA Loop - CIA Can Anticipate Social Unrest ‘Three to Five Days’ Out in Some Cases
OODA Loop - N.S.A. Contractor Arrested in Possible New Theft of Secrets
Home Feed
Early development reveals axolotl mysteries -- ScienceDaily
Dead Drop: September 30 | The Cipher Brief
34 tabs
Copy links to clipboard
Copy
Open
bellerphon - Google Search
Findo
Forums - Previously.TV Forums
VIS. Visual Investigative Scenarios platform: Pages
Digital Public Library of America » Select Collections Available for Re-use
Quickdata
Useful Stuff | ResearchBuzz: Firehose | Page 2
Insight Maker | Free Simulation and Modeling in your Browser
19 Useful Google Apps Scripts to Automate Google Drive - Hongkiat
American Babe: A White Girl Problems Book: Babe Walker: 9781501124846: AmazonSmile: Books
The Wonder Trail: True Stories from Los Angeles to the End of the World: Steve Hely: 9780525955016: AmazonSmile: Books
Awesomely Luvvie | Best Humor Blog EVER. Serving Pop Culture Tea.
S03.E02: God - Black-ish - Previously.TV Forums
The West Wing - Previously.TV Forums
All Episodes Talk: Walk With Me - Page 6 - The West Wing - Previously.TV Forums
The West Wing Weekly & Other The West Wing Podcasts - Page 2 - The West Wing - Previously.TV Forums
Anonymous Internet Vigilantes Are Taking Peer Review Into Their Own Hands | Motherboard
A History of Violence: A Quantitative Analysis of the History of Terrorism in New York City - HOMELAND SECURITY AFFAIRS
Social Media Manager Becomes Facebook Legend After Grocery Store Customer Finds Worm in Her Salad | The Daily Dot
FOIA Wiki launches in beta – Poynter
How to Make YouTube Playlists with a Google Spreadsheet
Silent Site Sound Blocker Only Lets Whitelisted Tabs Play Audio
Export and Retain Formatting from Google Docs - Make Tech Easier
Ditch Popular Google Services With These Alternatives - Make Tech Easier
DuckDuckGo Search Tips You Should Know to Boost Productivity - Make Tech Easier
Generative Data Models for Validation and Evaluation of Visualization Techniques
Ada Twist, Scientist: Andrea Beaty, David Roberts: 9781419721373: AmazonSmile: Books
Atlas Obscura: An Explorer's Guide to the World's Hidden Wonders: Joshua Foer, Dylan Thuras, Ella Morton: 9780761169086: AmazonSmile: Books
AmazonSmile: I'm Judging You: The Do-Better Manual (9781627796064): Luvvie Ajayi: Books
I'm Judging You: The Do-Better Manual - Google Search
I'M JUDGING YOU: The Do-Better Manual by Luvvie Ajayi
Because the Only Thing Chip Readers are Good For is Embarrassing Us | Awesomely Luvvie
https://smile.amazon.com/gp/yourstore/recs/ref=pd_ys_nav_?ie=UTF8&nodeID=4461&parentID=4456&parentStoreNode=4456
AmazonSmile: This Book Loves You (9781101999042): PewDiePie: Books
37 tabs
Copy links to clipboard
Copy
Open
Full List of Performances & More Details Revealed for PBS' HAMILTON'S AMERICA Documentary
Office Supplies, Furniture, Technology at Office Depot
Tektronix P6015A High Voltage Probe 1000x | eBay
IARPA Multimodal Objective Sensing to Assess Individuals with Context (MOSAIC) BAA | Contract Research and Development
Carmel-by-the-Sea Historical Fun Facts (Media Kit - Carmel-by-the-Sea, California)
The Stroz Friedberg Cyber Brief — Center on National Security
Metadata Extractors | Alfresco Documentation
Metadata Extractors | Alfresco Documentation
Growing pains for global monitoring of societal events | Science
Metadata Extraction to Tags | Alfresco Developer Blog
Home
Platform extension points | Alfresco Documentation
Alfresco » Site Dashboard
Amazon.com: Scout Sling Pack (Black): Sports & Outdoors
Amazon.com : Yukon Outfitters Survival Kit (Storm Grey) : Sports & Outdoors
Amazon.com : Gonex 550 Paracord Survival Bracelet Grenade Keychain Emergency Survival Kit with Carabiner, Eye Knife, Fire Starter, Fishing Tool for Camping, Hiking, Hunting, Travel : Sports & Outdoors
Amazon.com : Trident Survival Kit (Black) : Sports & Outdoors
Amazon.com: Prime Reading: Kindle Store
Defeating ISIS: Who They Are, How They Fight, What They Believe - Kindle edition by Malcolm Nance, Richard Engel. Politics & Social Sciences Kindle eBooks @ Amazon.com.
Vetted Intelligence – An Open Source Intelligence Resource
Website is offline | 504: Gateway time-out
Science
Growing pains for global monitoring of societal events | Science
(8909) Inoreader - Channels
2Do Is Going Free (with In-App Purchases) – MacStories
Where Will Google Assistant Live? – MacStories
10 Products and Websites to Improve Your Morning – Johnny Lists
iPhone 7 Plus Depth Effect Is Legit – MacStories
The Omni Group Is Moving to Free Downloads with In-App Purchases – MacStories
Top Spymaster Explains How Russian Intelligence Sees the US
The UK Snooper’s Charter and the Anderson Report on Bulk Powers | Just Security
Back Up All of the Things With This $110, 5TB External
This $6 Survival Grenade Includes a Fire Starter, Fishing Gear, and More
Today's Best Deals: 30% Off Starbucks, Stainless Steel Tumblers, 3D Printer
MacStories
iOS 10: The MacStories Review – MacStories
2 tabs
Copy links to clipboard
Copy
Open
Disk Inventory X - Screenshots
Use the Creative Cloud Cleaner Tool to solve installation problems
Terrorist Icons
Copy links to clipboard
Copy
Open
terrorism icon - Google Search
Terrorist icons | Noun Project
Bomb, bomber, explosion, explosive, leverage, suicide bomber, terrorist icon | Icon search engine
Terrorist Vector Stock Photos Images, Royalty Free Terrorist Vector Images And Pictures
Islamic Terrorist With Islamic Terrorist With Machine Gun, Islamic.. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234766.
Terrorist Set With Mask Gun And Camouflage Clothes Vector Illustration. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234371.
8 tabs
Copy links to clipboard
Copy
Open
How to use Optimized Storage in macOS Sierra | Macworld
Using Finder’s Advanced Search to Find Recently Modified Files - The Mac Observer
Make Spotlight Sing: Use Dates To Search Your Files [OS X Tips] | Cult of Mac
September 20, 2016 | iDownloadBlog.com
Recently added
Rajaraman: Jure Leskovec - Google Scholar
Data mining of extremely large ad hoc data sets to produce inverted indices
mirador
43 tabs
Copy links to clipboard
Copy
Open
FlashAlert Newswire
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
http://flashalert.net/id/portlandpolice?alert=1 is not available
Algorithms Can Tell Bosses How Employees Are Feeling - The Atlantic
PopClip for Mac
Dropshelf Preferences - Pilotmoon Software Knowledge Base
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Change PopClip's Search Engine - Pilotmoon Software Knowledge Base
Adding Dictionaries to OS X - Pilotmoon Software Knowledge Base
PopClip Known Issues - Pilotmoon Software Knowledge Base
HoudahSpot — File Search Utility. Spotlight Enhancer
Tembo — Simple File Search for Mac
LaunchBar 6
Typinator - the fastest text expander in town
TextSoap - Automate Your Text Cleanup
StartPage Search Engine
Slicereader - Easy reading for Mac
Spy Agency To Pilot Insider-Threat Hunting Tech - Nextgov.com
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
Police Are Sweeping Up Tweets and Friending You on Facebook, Whether You Know It or Not
Jack Smith IV's Profile - Mic
However We Fight Terrorism, Ubiquitous Government Surveillance Isn't the Answer
Basic Statistics Part 3: The Dangers of Large Data Sets: A Tale of P values, Error Rates, and Bonferroni Corrections | The Logic of Science
'Minority Report' Is Real — And It's Really Reporting Minorities
U.S. Police Are Getting a Crime Prediction Map Straight Out of 'Minority Report'
Hitachi Says It Can Predict Crimes Before They Happen | Fast Company | Business + Innovation
Darrin Lipscomb - Google Search
Meagan Cahill - Profile | RAND
computational criminology - Google Search
Computational Criminology
Hitachi Visualization Suite - Google Search
Hitachi's Public Safety and Visualization division - Google Search
How to Email - The Atlantic - The Atlantic
Culture - The Atlantic
Donald Trump's 'Miss Piggy' Comments Expose a Double-Standard on Weight - The Atlantic
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
PredPol - Google Search
Predict Crime | Predictive Policing Software | PredPol
12 tabs
Copy links to clipboard
Copy
Open
Bio - O'Reilly Media
AMRC | The University of Sheffield Advanced Manufacturing Research Centre with Boeing
workerbee - TPB
clouderone - TPB
Self-image threat decreases stereotyping: The role of motivation toward closure | SpringerLink
On the physics of high-rise building collapses | OffGuardian
Apple Tracks Your iMessage Contacts, May Share Them With Law Enforcement
How to Totally Disable Widgets on the iOS 10 Lock Screen
Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them
US-Backed Effort to Fight Afghan Corruption Is a Near-Total Failure, Audit Finds | Small Wars Journal
Triggers and Thresholds of Non-International Armed Conflict | Just Security
100 Greatest TV Shows of All Time | Rolling Stone
45 tabs
Copy links to clipboard
Copy
Open
VPN Forever
The Hit List for Mac: Handles life’s little tasks & big projects
Pay What You Want: The Award-Winning Mac Bundle | MacAppware Deals
MacAppware Deals
DeltaWalker: Advanced file and folder comparison and synchronization
Today's Best Deals: Your Favorite Car Charger, Discounted Food Saver, Dyson V6, and More
Amazon.com: Fresh Limited Time Offer
iStockNow Live iPhone 7 and 7 Plus Stock Map
Small Victories
50 Tools to Get the Most Out of Dropbox - Docurated
How to Host Your Website with Dropbox - The Ultimate Unofficial Dropbox Guide
Pancake
Give people view-only access to your files - Dropbox Help - Dropbox
12 Advanced Dropbox Features That You Should Start Using
Secure Online Collaboration | Box
Home | DropPages.com
The 10 Best Widgets for iOS 10 Home and Lock Screens
The Pirate Bay - The galaxy's most resilient bittorrent site
A Nearly Complete Bill Bryson (10 Audiobooks) (download torrent) - TPB
Horisarte - TPB
Travels in Europe - Bill Bryson (2013 - Unabridged) (download torrent) - TPB
[Audiobook] 5 Bill Bryson Books (download torrent) - TPB
Simple Domain Name Registrar - iwantmyname
Theses
DIYbio Project: Help Discover New Antibiotics through Citizen Science
TIP: Make a list of where all your credit cards are listed! | Budgets Are Sexy
(1116) Inoreader - Political Violence @ a Glance
10 Tricks to Make Yourself an iPhone Message Master
Is your ZIP code one of Portland's wealthiest? (Map/Slideshow) - Portland Business Journal
Apple Logs Your iMessage Contacts — and May Share Them With Police
Eddy Cloud Music Player & Streamer Pro on the App Store
8 Awesome Apps You Won't Hear People Talking About
ProPublica’s new Chrome extension wants to decipher what Facebook thinks it knows about its users » Nieman Journalism Lab
Enabling Unconventional Warfare to Address Grey Zone Conflicts | Small Wars Journal
THE MISSING CREDITS
Search Nearby | Delivery & Takeout | BeyondMenu
BeyondMenu.com Mobile App | BeyondMenu
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Aroy Thai Cuisine | Order Online | Portland | BeyondMenu
Other > E-books - TPB
The Encyclopedia of Middle East Wars: The United States in the Persian Gulf, Afghanistan, and Iraq Conflicts - ABC-CLIO
The Pirate Bay - The galaxy's most resilient bittorrent site
Bill Bryson Ebook Collection (bookeek) (download torrent) - TPB
Bill Bryson - At Home: A Short History of Private Life (download torrent) - TPB
Saved Session - Session Buddy
09-28
Copy links to clipboard
Copy
Open
Book Excerpt: “The Embassy: A Story of War and Diplomacy” | Small Wars Journal
Unconventional Warfare is Not the Answer to Your Problem
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
Bio - O'Reilly Media
Homeland Security from CRC Press - Page 1
Forensics & Criminal Justice from CRC Press - Page 1
Home - NATO LibGuides - NATO LibGuides at NATO Multimedia Library
Anniversary – Club MacStories
Sensors | Free Full-Text | Effective Waterline Detection of Unmanned Surface Vehicles Based on Optical Images
GAO-10-898, Technology Assessment: Explosives Detection Technologies to Protect Passenger Rail
Apple Music Festival
Getting Started with Alfresco in the cloud | Alfresco
Nuwber
How Washington, D.C., Is Preparing for the Next Terrorist Attack
EtreCheck: About EtreCheck
Mac Hacks - O'Reilly Media
Quicksilver — Mac OS X at your Fingertips
Copy files on Mac OS X using drag-and-drop | alvinalexander.com
Search and filter the iTunes App Store with your browser
IntelCenter Database (ICD)
Remove Duplicate Lines and sort
Potential Indicators, Common Vulnerabilities, and Protective Measures - Google Search
Potential Indicators of Terrorist Activities Related to the General Public - Google Search
Potential Indicators of Terrorist Activities Related to Sleepers - Google Search
An Expert Analysis of the Cyber Threats Facing America
Saved Session - Session Buddy
PAPERS
Copy links to clipboard
Copy
Open
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Subrahmanian: Handbook of computational approaches... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Concealed threat detection with the IRAD sub-millimeter wave 3D imaging radar | Passive and Active Millimeter-Wave Imaging XVII | DEF14 | SPIE Proceedings | SPIE
People Screening Portals - Threats and Associated Detection Technologies - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
Inbar: Detection of nuclear materials - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
OSA | Automatic image segmentation for concealed object detection using the expectation-maximization algorithm
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
OSA | Real-time concealed-object detection and recognition with passive millimeter wave imaging
10 tabs
Copy links to clipboard
Copy
Open
This X-Men: Apocalypse Blooper Reel Features Oscar Isaac Dancing, Which Justifies the Entire Movie
22 Movies Roger Ebert Really Hated | Mental Floss
Fall TV Preview: Your Complete Guide to the Season's Premieres
Hamilton: Watch an ASL cover of the Broadway show's opening number | EW.com
5 Incredible Instagram Tools (Windows & Mac Desktop Clients Too)
PBS.NOVA.2015.CyberWar.Threat.720p.HDTV.x264.AAC.MVGroup (download torrent) - TPB
PBS NOVA 15 Years of Terror 720p x264 AAC HDTV MVGroup.org (download torrent) - TPB
nayhtut - TPB
Log in to your account | New Scientist
Google Allo: The Super-Smart Future of Messaging Is Kind of an Idiot Sometimes | WIRED
YouTube
Copy links to clipboard
Copy
Open
Broadwaycom - YouTube
BastilleVEVO - YouTube
FamousInNY - YouTube
BROADWAY SESSIONS - YouTube
theatermania - YouTube
Watch Highlights From Rehearsal for The Producers at Paper Mill Playhouse - YouTube
SpringerBriefs in Applied Sciences and Technology (download torrent) - TPB
Everything Wrong With Shrek In 13 Minutes Or Less - YouTube
Digital Ham4Ham 9/21 -- Talk Less, Sign More - YouTube
22 tabs
Copy links to clipboard
Copy
Open
The Pirate Bay - The galaxy's most resilient bittorrent site
Remove information from Google - Search Help
Jeff R. Weyers | LinkedIn
Sara T Citrenbaum, 527 Spokane St, Portland, OR - Nuwber
Syncios iPhone Data Recovery Tool Lets You Recover Data from iPhone, iTunes and iCloud Backups - iOS Hacker | iOS Hacker
Google Drive Search Just Got a Lot Smarter
Google Drive Blog: What you love about Google Search — now for Drive
Dropbox Isn't Playing Nice With macOS Sierra, Here's How to Fix It
ImageThink Making an Impact in Education | ImageThink
Hazel 10 Year Sale [Link]
Sharing a Contact and Voicemail with iOS
the story of an america jihadi - Google Search
national counterterrorism center - Google Search
The open source revolution is coming and it will conquer the 1% - ex CIA spy | Nafeez Ahmed | Environment | The Guardian
Here’s What It Really Means To Call Something “Terrorism” | GOOD
The Asimov Institute - The Asimov Institute
Artificial Intelligence For Air Force: Cyber & Electronic Warfare « Breaking Defense - Defense industry news, analysis and commentary
How to Undo the Changes on the iOS 10 Lock Screen
5 Ways to Make Gmail Even Better
hany farid - Google Search
I am Hany Farid, a Dartmouth Professor specializing in photo forensics technology. Ask me anything. : IAmA
NOVA - Official Website | Profile: Hany Farid
Mama's Got A Brand New Tab
Copy links to clipboard
Copy
Open
The Art Of The Future Project | The Art of the Future Project
RSOE EDIS - Emergency and Disaster Information Service
ICPEM | Institute of Civil Protection and Emergency Management | Alert - The journal of the ICPEM
floatingsheep
Powerful new metric quickly reveals network structure at multiple scales | Santa Fe Institute
Incident Dashboard
Open Wetlab - Waag Society
BioHack Academy #4 - Waag Society
CESSDA - Data Catalogue
Path Finder 7 by Cocoatech
Dataproofer
Российская экзотика - Обитель цивилизатора
Infegy: Social Media Intelligence and Text Analysis Solutions
Online vCard Converter
How to Jump Ship From Evernote and Take Your Data With You
This Script Converts Google Documents to Markdown for Easy Exporting
78 Tools for Writing and Previewing Markdown
IINSTP
YFCC
NSI SMA Publications | NSI
Organizational Analysis (Self-Paced) | Stanford Online
PopClip Extensions
Richard's Toolbox
DrawMyData
2016 CSS-US Army TRADOC Mad Scientist Conference at the Georgetown University Center for Security Studies | Small Wars Journal
How do I export notes from Evernote using AppleScript? - Stack Overflow
Terminal Lance - Home
News You Can Use | Arthur D. Simons Center
Presentations and Authors
AFIO - Association of Former Intelligence Officers
Cyberspace Security Guide - AL
DARPA Forensic Social Science Supercolliders (FS3) RFI | Contract Research and Development
Force Your Mac to Sort Folders on Top of Files (Windows Style)
Tactical Shit News -When Shit Hits the Fan, Read the Right Shit
Wapack Labs
Manage your Apple ID
Aptonic - Dropzone 3 Actions
Link Analysis, and Visualization Software| Social Network Analysis
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
Amateur Rocketeers Are Keeping the Space Age Spirit Alive
Dictation Dingus – nahumck.me
Lexical Link Analysis - Home - MMOWGLI Portal
Biometrics | Public Intelligence
Use iTunes on your Mac or PC to restore your iPhone, iPad, or iPod to factory settings - Apple Support
ThereAreNoSunglasses | American Resistance To Empire
bellingcat - Who Killed Adnani? An Open Source Survey - bellingcat
Internet Data Sources for Social Scientists
Operation Manul | Electronic Frontier Foundation
FEMA.gov | Federal Emergency Management Agency
Terrorist Group Prediction Model for Counter Terrorism - Google Search
LookingGlass Cyber Solutions
OCCRP
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.