Light theme
Dark theme
Automatic (use operating system setting)
Shared: 436 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
Day 01
Copy links to clipboard
Copy
Open
Home | CEPA
CrisisNET
dblp: ISCRAM-med 2015
The Writer Who Was Too Strong To Live
TraffTrend
Adversarial Data Mining
Acing the IOC Game
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
From Cybersecurity to Collaborative Resiliency
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
Data Resources: Conflicts, Wars, Terrorism
Everhelper - Authorization
Foreign Military Studies Office
Information Warfare in the Second (1999-Present) Chechen War: Motivator for Military Reform?
Free GIS Datasets - Categorised List
Your Pick For Best Kitchen Trash Can: Simplehuman
IEEE Xplore Document - Smartphone based car-searching system for large parking lot
IEEE Xplore Document - Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective
Internet of Things (IoT) Scanner - BullGuard
ISW Blog: The Campaign for Mosul: October 25-28, 2016
PLOS ONE: Search Results
Lifehacker - Tips and downloads for getting things done
App directory News, Videos, Reviews and Gossip - Lifehacker
The Calendar Service in macOS Server Is a Surprisingly Robust Alternative to Commercial Apps
This Week's Top Downloads
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection - Springer
Sensing Social Media: A Range of Approaches for Sentiment Analysis - Springer
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats - Springer
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Springer
Research of Conventional Data Mining Tools for Big Data Handling in Finance Institutions - Springer
AI & SOCIETY - Springer
European View - All Volumes & Issues - Springer
Social Media and the Diffusion of Information: A Computational Experiment on the Emergence of Food Scares - Desmarchelier - 2016 - Kyklos - Wiley Online Library
DARPA - Open Catalog
Open Data Barometer
A support vector machine approach to the automatic identification of fluorescence spectra emitted by biological agents | Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII | ESD16 | SPIE Proceedings | SPIE
Enhancing Capillary-Driven Flow for Paper-Based Microfluidic Channels - ACS Applied Materials & Interfaces (ACS Publications)
The Effect of Category Spanning on the Lethality and Longevity of Terrorist Organizations
ISIS: An Adaptive Hybrid Threat in Transition | Small Wars Journal
Analytics and Predictive Models for Social Media
Threat Knowledge Group
Addicaid Is an App and Social Network to Help You Find Treatment and Recover from Addiction
ISIL driven out of Bartella, fighting continues elsewhere near Mosul | CCTV America
Hallmark Envisions Real-Time Space Command and Control
Social Media in Strategic Communication (SMISC)
Data Science Toolkit
Tektronix P6015 High Voltage Oscilloscope Probe | eBay
Political Finance Database | International IDEA
Rolopanel: Tracking Game Behaviour through Mobile Analytics: Media and Communication IS&T Journal Article | IGI Global
Information Operations Matters - University of Nebraska Press
A simple analytical platform based on thin-layer chromatography coupled with paper-based analytical device for determination of total capsaicinoids in chilli samples
Smartphone-based personalized blood glucose prediction
Steve Blank presentations channel
Steve Blank presentations channel
SPIEGEL ONLINE - Aktuelle Nachrichten
StratCom | NATO Strategic Communications Centre of Excellence Riga, Latvia
Academic journal “Defence Strategic Communications” | StratCom
Social media’s role in ‘Hybrid Strategies’. Author: Thomas Elkjer Nissen | StratCom
Job Details
Social Media Listening and Monitoring for Business Applications - Google Books
Reflections: Guy Julier, From shanzhai to social innovation via makerspaces? – China's Creative Communities: Making Value and The Value(s) of Making
Peek - Chrome Web Store
Data catalog - NASA
Google Sheets
GitHub - hasherezade/ViDi: ViDi Visual Disassembler (experimental)
ViDi | hasherezade's 1001 nights
SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists - InformNapalm.org (English)
This American Life by WBEZ on iTunes
What The Hell Are We Doing? – Medium
Insulinomics – Medium
Keeping nuclear materials secure in an uncertain world – Medium
Pushing the envelope: The World Cup and Arab revolts drive change – Medium
A Field Guide for Online Reading Material – The Mission – Medium
Alfresco » Login
UBC Theses and Dissertations - UBC Library Open Collections
Corsar: Social Media Data in Research: Provenance Challenges - Google Scholar
JIHADISMSTUDIES.NET
Steve BlankSecret History
Steve BlankSlides/Videos
Exposing Russian Trolling and Information Warfare Tactics – Do NOT Take Boris Word for It
Bomb A Head Girl! - Creators' Stickers
WTF is machine learning? | TechCrunch
Other > E-books - TPB
The Pirate Bay - The galaxy's most resilient bittorrent site
NoctDeath - TPB
Judd Legum on Twitter: "I fixed Comey's letter https://t.co/caQpqXfoPM"
Your Guide to a Stress-free Bedroom - LuxPad
Personal - Dropbox
Personal - Dropbox
DARPA Social Media in Strategic Communication - Google Search
Defence Strategic Communications - Google Search
Finding Needles in a Haystack: The Eastern Bloc's Counterintelligence Capabilities, - Google Search
KANAME Co.,Ltd Bomb A Head Girl! - Google Search
Krueger and Malecková - Google Search
Laying the Groundwork for the Successful Deployment of Communication Interception Technology - Google Search
Modeling position selection by individuals during information warfare in society - Google Search
Social Media as a Tool for Information Warfare pdf - Google Search
"Killing Lists" – The Evolution of Cyber Terrorism?
Links | Infinity Journal | Strategy | Analysis
Readings | Infinity Journal | Strategy | Analysis
Instapaper
Edwin ‘Leigh’ Armistead | Journal of Information Warfare
Hackers reverse-engineer NSA's leaked bugging devices | New Scientist
[DEV] Peek, a Chrome extension to preview files before you download them : chrome
Information Warfare: Fighting Back Through the Matrix (PDF Download Available)
Innovator Under 35: Nora Ayanian
The World as Free-Fire Zone
Agricultural Drones
AI Body Scanners Could Solve the Worst Thing About Airports
IBM’s Watson Is Everywhere—But What Is it?
US military studied how to influence Twitter users in Darpa-funded research | World news | The Guardian
Why ISIS Is Winning the Social Media War | WIRED
onthestreetwhereyoulive - YouTube
Dork Geek
Copy links to clipboard
Copy
Open
The HP 8640B RF Signal Generator | eBay
HP Signal Sources
HP / AGILENT 8640B RF SIGNAL GENERATOR opt 1 - Google Search
Choosing an RF Signal Generator
Hewlett-Packard 8640B Signal Generator
FR-603 Full Carbon Cyclocross cross Bike Frameset : Frame 53cm fork Headset | eBay
General Microwave Power Meter KS-19978 | eBay
HP 8640B Signal Generator Opt 1 Hewlett Packard Agilent | eBay
HP AGILENT 8640b | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 • CAD 300.81 - PicClick CA
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 | eBay
CTRL-H - PDX Hackerspace - Google Search
www.ebay.tv/sch/i.html?_sacat=0&_nkw=microwave+power+meter&_sop=12&_frs=1
HP 8640B Signal Generator Agilent - Partially Working OPT 001,002,003 • CAD 534.77 - PicClick CA
HP Agilent 8640B Signal Generator Options 001 003 • CAD 534.77 - PicClick CA
Hp 8640B Singnal Generator • CAD 334.17 - PicClick CA
Checkaflip - Buy Low, Sell High
HP 8640B SINGNAL GENERATOR | eBay
HP 8640B /001/002/003 ( REBUILT TO ORIGINAL MANUF. SPEC.) | eBay
HP 8640B Signal Generator Agilent | eBay
HP / AGILENT 8640B RF SIGNAL GENERATOR, 449 KHz - 550 MHz, Reverse Power Prot. | eBay
HP Agilent Hewlett Packard 8640B opt. 323 AN/USM-323 Military Signal Generator | eBay
HP Agilent Hewlett Packard 8640B opt. 323 AN/USM-323 Military Signal Generator | eBay
Hewlett Packard 8656B/8657A/8657B RF Signal Generators, Refurbished HP Agilent Hewlett Packard - Used Test Equipment at Test Equipment Depot
Keysight Technologies (Agilent HP) 8640B used or new for sale at used-line
Untitled spreadsheet - Request for access - scitrenbaum@gmail.com - Gmail
Personal - Dropbox
general microwave model 476 power meter - Google Search
General Microwave Power Meter 476 115/230 VAC | eBay
Fluke Differential Voltmeter; Model 893A (CTAM# 7086) | eBay
Vintage FLUKE 893A AC/DC Differential Voltmeter | eBay
Fluke Differential Voltmeter; Model 893A | eBay
Fluke Differential Voltmeter; Model 893A | eBay
acscalibrations | eBay
Used and New Oscilloscopes For Sale | Used and New Test Equipment | BMI Surplus
Portland Resources for Dorks | DorkbotPDX
Free Geek – Computer/Technology Reuse, Education, Recycling & Sales
SCIENCE HOBBYIST: Top Page
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
ELECTRONICS HOBBYIST
Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
OPTICS, Surplus Electronics and list of science catalogs [SITE: SCIENCE HOBBYIST]
Science Experiments, Amateur Science demonstrations, projects: SCIENCE HOBBYIST
SCIENCE HOBBYIST: Ideas, additions
Surplus Shed
ELECTRONICS HOBBYIST: NEWSGROUPS
All Mail - scitrenbaum@gmail.com - Gmail
Portland Resources for Dorks - Google Search
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Social Media Lab
Copy links to clipboard
Copy
Open
Politically Polarized Online Groups and their Social Structures formed around the 2013-2014 crisis in Ukraine | Social Media Lab
Social Media Lab | "Making sense of a networked world"
Apps | Social Media Lab
Netlytic – Social Networks & Text Analyzer | Social Media Lab
PoliDashboard | Social Media Lab
Social Media Research Toolkit | Social Media Lab
“A Mathematical Approach to Identifying and Forecasting Shifts in the Mood of Social Media Users” | Social Media Lab
Social Media & Scholars | Social Media Lab
Political Polarization on Social Media | Social Media Lab
Text Mining and Social Network Visualizations | Social Media Lab
H4D
Copy links to clipboard
Copy
Open
Stanford H4D - Spring 2016 - Home
DOD/IC Problems - Stanford H4D - Spring 2016
Teaching Team - Stanford H4D - Spring 2016
Steve BlankEntrepreneurship and Innovation
Steve BlankLean LaunchPad
Steve BlankSlides/Videos
Day 0
Copy links to clipboard
Copy
Open
The Next Generation of Government CVE Strategies at Home
Building Resilience against Violent Extremism
Counter-Radicalization via the Internet
Integrating ISR Data with Open Source Indicators (AIAA)
Integrating ISR Data with Open Source Indicators (AIAA)
AIAA SPACE 2016 (AIAA)
Armed Forces Journal – Must-Reads
ESSA – accountability, indicators and analytics to drive informed decision making - SAS Voices
C2COE | Catalysing C2
Session 4: Future Key C4I Technologies | Center of Excellence in Command, Control, Communications, Computing and Intelligence | George Mason University
Moldova Update: Contested Elections Threaten to Destabilize Eastern Europe
Counting conflict | News & Analysis | Data Driven Journalism
Today's Best Deals: Tri-Ply Cookware, Discounted Watches, Nike Clearance, and More
Nano Sensors Enhancing Warfighters’ Situational Awareness | Defense Update:
Exploring the role of sequential computation in distributed systems: motivating a programming paradigm shift
Actor profiling in virtual execution environments
Alfresco One 5.1 | Alfresco Documentation
Alfresco Documentation | Alfresco Documentation
Alfresco Support Handbook | Alfresco Documentation
Electrospaces.net: NSA's TAO Division Codewords
Online social networks and offline protest | EPJ Data Science | Full Text
CIA’s CREST Leaves Cavity in Public Domain |
IEEE Xplore Document - Towards Automatic Persona Generation Using Social Media
IEEE Xplore Document - A testbed for integrated fault diagnosis and cyber security investigation
IEEE Xplore Document - A Mathematical Approach to Gauging Influence by Identifying Shifts in the Emotions of Social Media Users
Welcome | The Internet, Policy & Politics Conferences
Special Issue: Non-state Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
Do Jews and Arabs Differ in Their Fear of Terrorism and Crime?
PLOS ONE: Demographics, Management Strategies, and Problems in ST-Elevation Myocardial Infarction from the Standpoint of Emergency Medicine Specialists: A Survey-Based Study from Seven Geographical Regions of Turkey
Electromagnetic tunnel detection using a magnetic-dipole source in three-dimensional space : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Depth estimation of voids using backscattered surface waves : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Batch Resize Images in OS X With This Automator Script
Survey on using constraints in data mining | SpringerLink
SIP and SDP based content adaptation during real-time video streaming in Future Internets | SpringerLink
Mining tag-clouds to improve social media recommendation | SpringerLink
Multithreading cascade of SURF for facial expression recognition | SpringerLink
Information Systems for Crisis Response and Management in Mediterranean Countries - Springer
A Study on Security and Surveillance System Using Gait Recognition - Springer
Dynamic User Attribute Discovery on Social Media - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
An Architecture for processing of Heterogeneous Sources - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Missing and Spurious Interactions in Heterogeneous Military Networks - Springer
Overview of Text Visualization Techniques - Springer
Data Model - Springer
Visualizing Sentiments and Emotions - Springer
LIWC | Linguistic Inquiry and Word Count
Nightmare Machine
Is Evan Kohlmann Qualified to Be the Government’s Expert Witness for Terrorism Cases? -- New York Magazine
Event Prediction With Learning Algorithms—A Study of Events Surrounding the Egyptian Revolution of 2011 on the Basis of Micro Blog Data - Boecking - 2015 - Policy & Internet - Wiley Online Library
PopClip Extensions
Considerations for developing technologies for an integrated person-borne IED countermeasure architecture | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX | DSS10 | SPIE Proceedings | SPIE
STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII | DSS09 | SPIE Proceedings | SPIE
A review of sensor data fusion for explosives and weapons detection | Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XIV | DSS13 | SPIE Proceedings | SPIE
Improved colour matching technique for fused nighttime imagery with daytime colours | Electro-Optical and Infrared Systems: Technology and Applications XIII | ESD16 | SPIE Proceedings | SPIE
The Event Camera Dataset
Using publicly visible social media to build detailed forecasts of civil unrest | Security Informatics | Full Text
Military Analysts: Islamic State Would Not Survive Fall of Raqqa | Small Wars Journal
Bespredel and the Conduct of Russian “Hybrid Operations” | Small Wars Journal
Center of Excellence collaboration examines critical infrastructure | START.umd.edu
Indian Strategic Studies
Tampermonkey • Home
The Ukraine Crisis Timeline
War News Updates: Afghanistan War News Updates -- October 26, 2016
War News Updates: An Analysis On The Afghan War
Time for Washington to Amp up the Power to Coerce
WORDij Semantic Network Tools
Topics | 2016 ARL Open Campus Open House
Information Operations, Warfare, Info Ops, Infowar, Cyberwar
Mosul battle: Four ways IS is fighting back - BBC News
OHSU gets pieces of up to $90M of Defense Department trauma research - Portland Business Journal
CISE Publications Database | Center for Information & Systems Engineering
The Stroz Friedberg Cyber Brief — Center on National Security
James Clapper reflects on lessons learned over his six years as Director of National Intelligence and discusses critical intelligence concerns facing the next U.S. president. - Council on Foreign Relations
WORDij
Content analysis and text analysis resources: bibliographies, research, software, electronic texts
Control Alt Achieve: Google Save - Your new home for saved images and links
Crow vs Crow | Olivier Terrien
SET-048 Information-Centric Sensor Management
SCI-158 Systems, Concepts And Integration Methods And Technologies For Defence Against Terrorism
SET-158 Disposable Multi-Sensor Unattended Ground Sensors Systems for Detecting Personnel
SET-161 Leading Body for the C-IED LTCR
SET-174 EO-TDA Modeling
US military hopes to use artificial intelligence to create cybersoldiers and help fly its F-35 jets | Daily Mail Online
'Unprecedented' Challenge in Countering Adversarial Propaganda, Official Says > U.S. DEPARTMENT OF DEFENSE > Article
DoD Chemical-Biological Program has a Global Mission > U.S. DEPARTMENT OF DEFENSE > Article
Centcom Counters ISIL Propaganda > U.S. DEPARTMENT OF DEFENSE > Article
Defense One
Echoes of Future War: How the Fight for Mosul Will Change IED Science - Defense One
State of the Art - Demos
eCrow Newsletter
Electronic Warfare | Information Operations | Association of Old Crows Resource Guide
Apple iOS 10.1 Has A Nasty Surprise
Apple iOS 10.1 Has A Nasty Surprise
Globalytica
Al-Qaeda Still Threatens Europe: How the U.S. Can—and Should—Help
Databases, Gateways, Search Engines, Libraries, and Educational Insitutions
International Society for Photogrammetry and Remote Sensing
ISPRS Ornagebook: Working Groups
American vigilante hacker sends Russia a warning
Accurint® Virtual Crime Center - LexisNexis®
Islamic State continues to plot against the West, US military warns | The Long War Journal
Status Report on the Iraqi/Kurdish Mosul Offensive - Matthew Aid
WG 32 Special Operations and Irregular Warfare
Inside the CIA's (Sort of) Secret Document Stash | Mother Jones
White House: Small satellites bring “Moore’s Law” into space | Network World
What IARPA Knows About Your Canceled Dinner Reservation - Nextgov.com
The Nuclear Threat | NTI
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - The New York Times
The 282 People, Places and Things Donald Trump Has Insulted on Twitter: A Complete List - The New York Times
Microsoft Open Sources Cognitive Toolkit | News & Opinion | PCMag.com
Analytic Tools and Techniques | pherson.org
Network dismantling
Data Mining for Predictive Social Network Analysis
Predict Crime | Predictive Policing Software | PredPol
Predictive Policing For Crime Analysts | PredPol
Command & Control Apps
Driving to Safety: Autonomous Vehicle Questions, Answered | RAND
The Power to Coerce: Countering Adversaries Without Going to War | RAND
Inside the Artificial Intelligence Revolution: A Special Report, Pt. 2 - Rolling Stone
The Team Payam Banazadeh M.S
Steve Blank’s Presentations on SlideShare
Battle For Mosul Begins in Iraq Against Islamic State - SPIEGEL ONLINE
Computational Social Science: Understanding terrorist attacks on Twitter | START.umd.edu
Waging Cyber War the American Way: Survival: Vol 57, No 4
Journal of Policing, Intelligence and Counter Terrorism: Vol 11, No 2
Artifically intelligent ‘judge’ developed which can predict court verdicts with 79 per cent accuracy
Stephen Hawking says artificial intelligence could be humanity's greatest disaster
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
AT&T Is Spying on Americans for Profit - The Daily Beast
Institute for the Study of War
New report series--U.S. Grand Strategy: Destroying ISIS and al Qaeda | Institute for the Study of War
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online - VOX - Pol
Joint INFOCORE, MeCoDem, VOX-Pol Workshop on Social Media, Conflict and Democracy to be held in Brussels - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study - Part 1: The First 20 Minutes - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath - VOX - Pol
Grey’s Anatomy Recap: Good News, Bad News -- Vulture
Google Photos now shows albums in search results | 9to5Google
CoRR - Computing Research Repository
arXiv.org Search
Computers and Society authors/titles recent submissions
Social and Information Networks authors/titles recent submissions
Attack the System
Records Management User Guide | Alfresco Community
Virginia: Hamas-linked CAIR enraged that sheriff’s office hosting seminar on jihad threat | The Counter Jihad Report
Embed Google Photos in your Website
Alfresco Activiti
Air Force Doctrine
KETs Deployment Visualization Tool - European Commission
Pocket: My List
Pocket: Recommended
Pocket: Pocket Premium
GitHub - lockfale/OSINT-Framework: OSINT Framework
Pocket Premium FAQ - Pocket Support
Premium Subscriber FAQ - Pocket Support
Nigeria Expands Its ‘War on Terrorism’ to the Niger Delta - Jamestown
Darknet Numbers Pages Proof of Concept | Krypt3ia
The Jester Effect and #iAWACS | Lady Liberty 1885
Stress-testing iPhone 7 Plus’ Portrait Mode – Medium
Netlytic - social media text and social networks analyzer
Alfresco » Repository Browser
PDF Viewer for iOS & Android - Reading, Reviewing, Annotating - Made Easy.
The Complete Privacy & Security Podcast
AT&T Analytical Services for Government Agencies Model Statement of Work | Public Intelligence
DoD Science and Technology Strategic Communication/Social Media Programs | Public Intelligence
Browse the USGS Publications Warehouse
Iris AI drastically expedites research through the power of artificial intelligence | TechCrunch
Compare Lists
#iAWACS hashtag on Twitter
steve blank (@sgblank) | Twitter
FBI — Home
ToolDatabase < Dmi < digitalmethods.net
Amazon.com: WD 3TB Black My Passport Ultra Portable External Hard Drive - USB 3.0 - WDBBKD0030BBK-NESN: Computers & Accessories
Russia | Federal Academy for Security Policy
Association of Old Crows (AOC) | Electronic Warfare | Information Operations
IO Publications & Links | IO Academy | The IO Institute
ICWSM Tutorial: Predictive Modeling with Social Networks
Center for Strategic and International Studies |
“Putin Is Corrupt” and Other Uncertainties Related to U.S. Policy toward Russia | Center for Strategic and International Studies
The Civil Side of Counterterrorism | Center for Strategic and International Studies
The Kremlin Playbook | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe | Center for Strategic and International Studies
Anthony H. Cordesman | Center for Strategic and International Studies
Heather A. Conley | Center for Strategic and International Studies
Curated Conversations | Center for Strategic and International Studies
Counterterrorism and Homeland Security | Center for Strategic and International Studies
SAS-071 Analytical Tools for Irregular Warfare
Operation Manul | Electronic Frontier Foundation
Every CRS Report - EveryCRSReport.com
The First Day of a New Congress: A Guide to Proceedings on the Senate Floor - EveryCRSReport.com
Military Expenditure in the Baltic - Totalförsvarets forskningsinstitut
Top Articles and Videos about Mosul on Pocket
FDsys - Browse Compilation of Presidential Documents
HSDL Search Results
Check Out These Resources on Biodefense Before Seeing Tom Hanks’ “Inferno” – Homeland Security Digital Library
Whole Body Image Acquisition and Analysis | InnoCentive Challenge
Triggers and Thresholds of Non-International Armed Conflict | Just Security
LookingGlass Cyber Solutions
The Microsoft Cognitive Toolkit - Microsoft Research
Advanced Technologies Overview | The MITRE Corporation
Law Enforcement | The MITRE Corporation
Prevent Terrorism | The MITRE Corporation
Deception: The Quest for Detection | The MITRE Corporation
Human Odor: Sniffing Out Identity and Deception | The MITRE Corporation
Instant Collaboration: Using Social Networks in Emergency Response | The MITRE Corporation
Systems Engineering Strategies for Uncertainty and Complexity | The MITRE Corporation
Tools to Enable a Comprehensive Viewpoint | The MITRE Corporation
What can we 3D print? Everything! Here are 8 awesome examples | New Scientist
NUVI - Real-Time Social Intelligence
OCCRP
Bio - O'Reilly Media
Arie Croitoru - Publications
Automating social network analysis: A power tool for counter-terrorism
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology
RIMS - RIMS Annual Conference 2016 - Attendee - SESSION HANDOUTS
SD2 Proposers' Day
Schneier on Security: Blog Entries Tagged social engineering
Brain changes seen in youth football players without concussion -- ScienceDaily
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Data and trends for multilateral peace operations | SIPRI
Pages - Technical Activities of the STO
Search Results :
Search Results : Analytical Support to Tactical Development"
Search Results :
Search Results :
RTO-MP-HFM-201 - All Documents
Search Results : analytical support to operations"
Techdirt.
The Internet of Things Goes Rogue
Massive Internet Outage Could Be a Sign of Things to Come
How the Internet of Things Took Down the Internet
AT&T Is Selling Law Enforcement Access to Its Customers’ Data
Tenable Unveils Industry’s First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents - Press Release | Tenable Network Security
Revealed: US spy operation that manipulates social media | Technology | The Guardian
Middle East Leaders at UN on Extremism | Wilson Center
Zotero | People > Spencer L Willardson > Library > Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.