Light theme
Dark theme
Automatic (use operating system setting)
Shared: 495 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
495 tabs
Copy links to clipboard
Copy
Open
Pinboard: public bookmarks for jranck
Pinboard: public bookmarks for flobosg
Pinboard: public bookmarks for petej
Nuclear Weapons | Union of Concerned Scientists
Progress on Nuclear Arms Control (2015) | Union of Concerned Scientists
Is This Congressman's 'Oversight' An Effort To Hobble Climate Science? : NPR
Paulo (@paulo_cepeda) | Twitter
Diplomacy, Geopolitics, Strategy, Analysis, New Ideas, Business - moderndiplomacy.eu
Pinboard: public bookmarks for tamberg
The Hidden Convenience in iOS 9
That Syncing Feeling
Unlisted - All this
An Open Letter to Tinder’s Sean Rad from Vanity Fair’s Nancy Jo Sales | Vanity Fair
frakintosh
In the Pipeline | Derek Lowe’s commentary on drug discovery and the pharma industry. An editorially independent blog from the publishers of Science Translational Medicine.
A fix for slippery iPhones - BrettTerpstra.com
Copied for Clipboard Syncing
“If You Learn from MOOC, You Are an Evil Person” – Science « Homolog.us – Bioinformatics
Pinboard: public bookmarks for geeknik
Pinboard: public bookmarks for tamberg
firstdraftnews.com » Your guide to navigating eyewitness media, from discovery to verification- Verifying Russian airstrikes in Syria with Silk, two months on
» Resourcesfirstdraftnews.com- France24’s The Observers
BetterExplained - Quick Reference Guide
Metadata Investigation : Inside Hacking Team | Share Lab
Lab Making and Open Hardware 4 HTGAA
Big, Open & Beautiful #7: Smart citizens - Waag Society
Which iOS Content Blocker is the Fastest? — The Brooks Review
Profile of Blink99 - Uploads - Kickass Torrents
Profile of k3746 - Uploads - Kickass Torrents
Profile of pradyutvam2 - Uploads - Kickass Torrents
NIJ Home Page NIJ Home
Build your own recruitment video | Bio-Link
Bio-Link Equipment Depot Resource Guide | Bio-Link
Hacks/Hackers Portland (Portland, OR) - Meetup
BuzzFeed
The Awl
The Journalist's Toolbox: Public Safety Archives
Journalist's Toolbox Update: Dec. 6, 2015 - The Journalist's Toolbox
Ian Craggs (@icraggs) | Twitter
southpaw (@nycsouthpaw) | Twitter
Worf Email (@WorfEmail) | Twitter
Rhonda Bletner (@RhondaBletner) | Twitter
(10) @RhondaBletner/Journalists/Journalism on Twitter
@wisat/Journalist-Tools on Twitter
@spikefodder/Mobile Journalism on Twitter
Literally Just A Bunch Of Funny Tweets About Celine Dion
21 Grandmas Who Have Zero Fucking Filter
ONA15 (@ONAConf) | Twitter
'Drummers are natural intellectuals' - Telegraph
95 tools for investigative journalists — Medium
Why was President Obama standing during his Oval Office address? - The Washington Post
McSweeney’s Internet Tendency: It’s Rotting Decorative Gourd Season, Motherfuckers.
Center for Homeland Defense and Security | The Nation's Homeland Security Educator
Minerva Program Staff (Minerva Initiative)
Mobile Sensor Apps for Learning - Community - Google+
Math As Language: Understanding the Equals Sign | BetterExplained
Guide to Chromebook Privacy Settings for Students | Electronic Frontier Foundation
Unprecedented Image Shows a Dolphin's Echolocated Impression of a Submerged Human
SpeakDolphin
Top 25 News Photos of 2015 - The Atlantic
Tomi Satryatomo (@wisat) | Twitter
David Holmes (@spikefodder) | Twitter
Paulo (@paulo_cepeda) | Twitter
The Transparency Grenade - Julian Oliver, 2012
Pamela Merritt (@SharkFu) | Twitter
Anna Filina (@afilina) | Twitter
Model-Based Testing – Ian Craggs | "We must use the light of reason to banish the darkness of superstition" – Brian Cox
BBC - Future - How dark is your personality?
The Growing World of Do It Yourself Health | Eye on FDA
The World of DIY Genomics with K T Pickard | Mendelspod
Publications
Phys.org - News and Articles on Science and Technology
New massive dataset of bacterial proteins
Diagnostic tools using synthetic biology
Synthetic biology devices for in vitro and in vivo diagnostics
Phys.org - Proceedings of the National Academy of Sciences
Driving metabolic pathways on with sunlight
The rise of do-it-yourself biology: A look at the Baltimore underground science space
BUGSS: Baltimore's Under Ground Science Space - a place for creative biology - Home
Nature Commentary investigates synthetic-biology disaster
The Rise of Do-It-Yourself Biology: A Look at the Baltimore Underground Science Space (BUGSS) - Synthetic Biology Project
Seven Myths and Realities about Do-It-Yourself Biology - Synthetic Biology Project
First-ever survey of Do-It-Yourself Biology community challenges myths
Garage scientists benefit society
An introduction to start-ups in synthetic biology
2015 Holiday Gift Guide for Social Workers
Researchers find a way to identify gender from...
Researchers find a way to identify gender from fingerprints - Interesting Engineering
Wikipedia-Mining Algorithm Reveals World’s Most Influential Universities | MIT Technology Review
Software That Can Spot Rookie Mistakes Could Make Wikipedia More Welcoming | MIT Technology Review
perso.utinam.cnrs.fr/~lages/datasets/WRWU/theta_PR.php
Search Engine Censys Knows the Internet’s Dirty Little Security Secrets | MIT Technology Review
Virtual Crash Tests Use Data to Simulate Effects Better Than Mannequins | MIT Technology Review
The Secret History of “I Have a Little Dreidel” | Jewniverse
Blogtor Who: The Twelfth Doctor - 2015 Holiday Special comic
Page not found | Cold Spring Harbor Laboratory News Blog
Electrospaces.net: How NSA targeted the Venezuelan oil company PdVSA
An excerpt from the NSA's Wikipedia - The Washington Post
Individuals' Blood Glucose Levels After Meals May Be Predictable - Scientific American
Body Strain Sensor Made of Chewing Gum and Carbon Nanotubes | Medgadget
Medical Technology News | Medgadget
Rapid ID of Squishiness of Cells to Help Improve Cancer Diagnostics | Medgadget
Most Popular How-To Guides of 2015
An Adult's Guide to Hygiene (for Those Who Weren't Taught Growing Up)
Terminal tips News, Videos, Reviews and Gossip - Lifehacker
Top 10 Ways to Browse the Web Better on Your Phone
The iOS Ad Blockers that Speed Up Your Browsing the Most
The Best Free Add-ins for Microsoft Office
Highlights News, Videos, Reviews and Gossip - Lifehacker
Social gps News, Videos, Reviews and Gossip - Lifehacker
Chrome extensions News, Videos, Reviews and Gossip - Lifehacker
Tabs News, Videos, Reviews and Gossip - Lifehacker
vTabs Puts Tabs in a Side Bar, Can Save Open Tabs for Later
Master Your Browser's Tabs with These Tricks and Extensions
Iphone app directory News, Videos, Reviews and Gossip - Lifehacker
Weekend roundup News, Videos, Reviews and Gossip - Lifehacker
Download roundup News, Videos, Reviews and Gossip - Lifehacker
Lone Wolf Report | Southern Poverty Law Center
Home | Big Data & Society
Home Feed
Smartphone applications for melanoma detection by community, patient and generalist clinician users: a review - Kassianos - 2015 - British Journal of Dermatology - Wiley Online Library
Databases and Articles | Portland State University Library
Do you know what type of source it is? | Portland State University Library DIY
Search eLibrary :: SSRN
Search OpenGrey
Subjects OpenGrey
Search OpenGrey
One Thing Well
Relevance - Dashboard
Preventing Lone Wolf Terrorism: some CT Approaches Addressed | Bakker | Perspectives on Terrorism
Georgiy M. Levchuk
fighting terror in cyberspace - Google Search
Beautiful web-based People Plots and Family Trees
San Bernardino Shooting
Three hacks for adding permanent storage to your MacBook Air or Retina Pro through the SD card slot | 9to5Mac
Johnny Lists — 10 Subscriptions Worth the Money
Get Hibou
[Chrome] Graph out tabs by URLs and windows with GraphiTabs | Reviews, news, tips, and tricks | dotTechdotTech
Eternal Storms Software
Academia Obscura - The lighter side of Academia. Silly, not stupid.
Your guide to the Google Play app: How to get more from Google’s store | Greenbot
Share files Online Instantly, No Need To Wait Till File Upload - I Love Free Software
Automatically Find New Email Contacts In Your Gmail Inbox
Egyptian army says it destroyed 20 Gaza tunnels in November
The sinister truth behind Israel’s naval blockade
Sisi says Gaza tunnels flooded in coordination with PA
Egypt-Gaza tunnels: the lifeline under threat
General Michael Hayden on Obama’s Speech | The Cipher Brief
Sic Semper Tyrannis : Jihadis now integral part in US designs for Syria (by CP)
Arming ‘Islamic State’ – facts and figures | Amnesty International
Everything you need to know about human rights. | Amnesty International
Iraq: ‘Islamic State’ atrocities fuelled by decades of reckless arms trading | Amnesty International
Amnesty: Most Weapons Used by IS Were Seized From Iraqi Army - ABC News
Amnesty International: 'Reckless Arms Trading' Fuels ISIS War Crimes in Iraq, Syria
Should the Secret Service Hand Over Its Cybersecurity Responsibilities? - Nextgov | Fed Tech Ticker
Army recommends no further punishment for Petraeus - The Washington Post
"Power Wars" in 100 Tweets - Lawfare
Human biology merges with technology as Biohackers implant LED's under the skin
Sic Semper Tyrannis : Loose ends at San Bernardino
Databases and Articles | Portland State University Library
Science.gov: USA.gov for Science - Government Science Portal
Databases and Articles | Portland State University Library
Home - Maps & Other Cartographic Information - LibGuides at Portland State University
Search for a Dataset - Data.gov
HRSA Data Warehouse Home Page
First-time Visitor? | HUD USER
Neighborhood Pulse
Oregon Sustainable Community Digital Library | Portland State University Research | PDXScholar
PDXScholar | Portland State University Research
Searchable Ornithological Research Archive
Search portlandstate.on.worldcat.org
PQDT Open
SAGE Stats
The World Bank DataBank | Explore . Create . Share
SciTech Connect: Your connection to science, technology, and engineering research information from the U.S. Department of Energy
The Isis papers: a masterplan for consolidating power | World news | The Guardian
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: 56 SITES ON TERRORISM, NATIONAL SECURITY & RADICAL ISLAM
Terrorism
Cool Tools | Cool tools really work. A cool tool can be any book, gadget, software, video, map, hardware, material, or website that is tried and true. All reviews on this site are written by readers who have actually used the tool and others like it. Items can be either old or new as long as they are wonderful. We only post things we like and ignore the rest. Suggestions for tools much better than what is recommended here are always wanted. Tell me what you love.
Downloads News, Videos, Reviews and Gossip - Lifehacker
Field Guide
The Marketing Jewru
Eisen Lab: UC Berkeley
Data Science Toolkit
greta's gouge: Friday's Miscellany 11-27-2015
Greta Marlatt - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Homeland Security Digital Library (HSDL): Search Results
For Only $39 You Can Get 1TB Of Cold Cloud Storage For Life
Sensors | Special Issue : Sensors for Indoor Mapping and Navigation
Leaked documents show how ISIS is building its state - Business Insider
Institute for the Study of War
Afghan War News
U.S. Intel to Obama: ISIS Is Not Contained - The Daily Beast
Answering San Bernardino (Part 1): Defining Terrorism and Home Grown Extremism - Homeland Security Digital Library Blog
Inbox (27) - stczztop@gmail.com - Gmail
Pocket: My List
Cubic Corporation | Global Defense | Transportation Systems
Afghan War News
(6421) Inoreader - DIY
This $30 Gadget is Actually Three Devices In One
An ISIS Jailbreak at Abu Ghraib: "Hell Is Coming" | FRONTLINE
Amnesty: Most weapons used by IS were seized from Iraqi army - Yahoo News
Trump Gives Muslim On Fence About Radicalizing Just The Push He Needed - The Onion - America's Finest News Source
'Reckless' arms transfers to Iraq fuelled IS crimes: report - Yahoo News
Encryption, “Dark Spaces” Demonized on Both Sides of the Aisle | Hacked
How to Setup a High-Security TOR Laptop Using Kali Linux 2.0 + VirtualBox + Whonix + Bridges + Tor: Dark Net Science Book 1 Revised digital, Boyd Stone, Julia Todd Stone, eBook - Amazon.com
@AcademicsSay: The Story Behind a Social Media Experiment | SAS Confidential
Research Wahlberg (@ResearchMark) | Twitter
Nathan C. Hall (@prof_nch) | Twitter
Sarah's Scribbles
James J.F. Forest (@JJFForest) | Twitter
The big hole in Obama’s Islamic State strategy - The Washington Post
Amnesty: Most weapons used by IS were seized from Iraqi army
The SPJ Blog
The Center for Arms Control and Non-Proliferation
The Aviationist » Online flight tracking exposes FBI Aerial Surveillance over San Bernardino Mosque after Terrorist Attack
Sh*t Portlanders Say - YouTube
Pinboard: Searching scitrenb
Shit My Reviewers Say
ShitMyReviewersSay (@YourPaperSucks) | Twitter
Shit My Reviewers Say — Let me expand, using an analogy.
Shit My Reviewers Say — About/Submit
How I Stay Productive and Get Massive Amounts of Shit Done
Stupid Shit No One Needs & Terrible Ideas Hackathon
Saved Session - Session Buddy
How ISIS and Al Qaeda make their money - Business Insider
Growing Terrorist Threat Requires New U.S. Investments in Counter-IED Capabilities | RealClearDefense
How tech fails led to Air Force strike on MSF’s Kunduz hospital | Ars Technica
Exclusive: Secret U.S. Hostage Held by Taliban Allies - The Daily Beast
Good luck, Charlie | Article | The United States Army
Speed, Social Media Shape Counterterrorism Probes
Afghanistan's precarious security has officials pointing fingers - LA Times
Village Stability Operations (VSO) in Afghanistan
Small Farms and Small Wars: Planting The Garden in Village Stability Operations | Small Wars Journal
Special Operations Joint Task Force - Afghanistan
Home - Project Gray
Myth-Busting French Counterinsurgency
First Steps Towards the Force of the Future
This armored vehicle lets you use PowerPoint on the battlefield - The Washington Post
Sports Science, Physiology, and the Debate Over Women in Ground Combat Units
Afghan Taliban Detail Fight Against Uzbek IS Militants
Islamic State: Why Afghanistan isn't panicking – yet - CSMonitor.com
ReportDetail
Civilian Deaths Raise Questions About C.I.A.-Trained Forces in Afghanistan - The New York Times
CIA runs shadow war with Afghan militia implicated in civilian killings - The Washington Post
Here's how much ISIS makes in a day - Business Insider
'ISIS is a state-breaker' — here's the Islamic State's strategy for the rest of 2015 - Business Insider
ISIS in Afghanistan: December 3, 2015 | Institute for the Study of War
Russia's False Narrative in Syria: December 1, 2015 | Institute for the Study of War
Islamic State | World news | The Guardian
Islamic State’s leaked nation-building plans show 'only Sunni forces' can beat them - general — RT UK
The Isis papers: leaked documents show how Isis is building its state | World news | The Guardian
http://www.aymennjawad.org/2015/12/the-islamic-state-masterplan-of-administration is not available
Principles in the administration of the Islamic State | Peace and Freedom
ISIS State-Building Manual Leaks Online
Isis News, Videos, Reviews and Gossip - Gizmodo
2015 Yemen Crisis Situation Report: December 7 | Critical Threats
Gulf of Aden Security Review - December 7, 2015 | Critical Threats
Inside the $2 billion ISIS war machine | WTKR.com
Nuclear and Non-Nuclear Weapons States on the NPT • CNS
Cocaine Cravings Zapped with Magnets | MIT Technology Review
Recommended from Around the Web (Week ending December 5, 2015) | MIT Technology Review
Junk-Eating Rocket Engine Could Clear Space Debris | MIT Technology Review
From a robotic lab in a garage to a kinder world. — Medium
Things we think about when selecting a maker project... | Creativity Lab – Making in School
Keeping Hackers Away from Your Car, Fridge and Front Door | The National Interest
Leading threat detection company supports Blue Ribbon Panel Study on Biodefense | BioPrepWatch
Social media terrorist activity bill returning to Senate | Reuters
Project Syndicate - Opinion Articles from the World's Thought Leaders
ISIS News - Latest Updates and Videos on the Islamic State | Daily Mail Online
MyPCC Login | Portland Community College
Collections | Twitter Developers
(22) USOSINT (@USOSINT) | Twitter
(4) Open Source Intel US (@OSINT_US) | Twitter
Portland Timbers' plan to pressure Columbus Crew SC from the get-go leads to fastest goal in MLS Cup history | MLSsoccer.com
MLS Cup: Columbus Crew SC still stunned by missed call: "It was probably a yard out" | MLSsoccer.com
Profile of Dr.Soc - Uploads - Kickass Torrents
Profile of P-R-G - Uploads - Kickass Torrents
The Springer Shop Special
Public Records: How and Why to Access Them (KBOO News Research Club) - Hacks/Hackers Portland (Portland, OR) - Meetup
How to Win a ‘Cyberwar’ with ISIS. « JESTERS COURT – OFFICIAL BLOG
Find your people - Meetup
Keyboard shortcuts - Chrome Help
BundleHunt | A one-stop daily deals site
https://publicintelligence.net/un-report-on-isil-ansar-al-charia-al-qaeda-threat-in-libya-november-2015/ failed to load
French 'Anonymous' Releases Names of Suspected ISIS Recruiters : Intelligence
Anonymous vows to take down Isis: how Twitter has become a battleground for propaganda | News | Lifestyle | The Independent
Anonymous starts targeting suspected ISIS extremists - Business Insider
Cyber vigilantes: Citizen hackers go to war against terrorists
Security Solutions International Staff - The Counter Terrorist
Profile of wolfye - Uploads - Kickass Torrents
OSINT Weekly
News in Brief 07 December 2015 (PM) | United Nations Radio
estNATO on Twitter: "Two #B-2s join three #B-52 #Stratofortresses for exercises in #Europe #BALTOPS2015 http://t.co/HqmwUV1GAa http://t.co/C5BCmvZ9h2"
Smart on Isis from Tim Dickinson on Twitter
Anonymous (@GroupAnon) | Twitter
The Isis papers: behind 'death cult' image lies a methodical bureaucracy | World news | The Guardian
One Tap Less | Actions
» Create a Packfirstdraftnews.com- Geolocation skills
Marketing Intelligence Tools by Robin Good | ZEEF
Resource Library in George C. Marshall European Center for Security Studies | GlobalNET
Moldovan Alumni hold Roundtable ‘Security through Cooperation: Current Issues in the Context of a New Draft National Security Strategy’ | GlobalNET
Please stop repeating that the "media ruined a crime scene". They didn't, the FBI said they were done with the scene. EVERY OTHER criticism is valid, just not THIS one. It is misinformation. : KotakuInAction
Reuben Schug | Search
Journal of Strategic Security | USF Libraries | University of South Florida
ISIS recruited experts set to wage chemical attacksSecurity Affairs
DGs - Migration and Home Affairs - What we do - ...Crisis & Terrorism - Securing dangerous material
DGs - Migration and Home Affairs - What we do - Policies - Crisis & Terrorism
Portland Santacon™ 2015 - Portland Outdoor Adventurers Club (Portland, OR) - Meetup
The Week's Top Science Communication Stories (12.4.15) › The Leap
Letter from Paris | CrimethInc. Far East Blog
Syrian Civil War Archive
Syria's Civil War (2011—ongoing)
Middle East Conflicts Subreddit
ICCT | International Centre for Counter-terrorism – The Hague
Publications / ICSR ICSR
Harvard - Belfer Center for Science and International Affairs
Command and Control Research Portal
IBC Threat Assessment November 2015 | CBRNe Portal
Weapons of Mass Destruction | www.hampshire.edu
Search ‘tag:ios’ | ZEEF
Rummaging in the Governments attic: Governmentattic.org
Harvard Kennedy School - Program in Criminal Justice :: Research & Publications :: Executive Sessions :: Executive Session on Policing and Public Safety (2008-2014)
SOCOM’s Votel Is Top Choice to Take Over CENTCOM - Defense One
Papers From the Harvard Executive Session on Policing and Public Safety | National Institute of Justice
(8) Twitter
A hacker who broke details during the shooting in San Bernardino - Todd Herman at KIRORadio.com
A 12-bomb, 6,000-bullet arsenal and terrorist links: The terrifying world of US massacre pair | The Sun |News
New Tools To Sift Through Data - i-HLS
GitXiv (@GitXiv) | Twitter
Yaogwai (@Yaogwai) | Twitter
Move over CISO: The Chief Data Officer may be sharing part of your job | CSO Online
Expert Insight: Securing Smart Cars - Security News - Trend Micro USA
Hundreds of Tunisian women join ISIS in Syria: minister | News , Middle East | THE DAILY STAR
Islamic State Recruiting 'City Wolves' For 'Guerrilla War In America' - Breitbart
ISIS member Anatoly Zemlyanka dubbed the Russian Jihadi John revealed | Daily Mail Online
SlackArchive Gives You Public Chat Archive For Free | TechCrunch
‘Muslim-Free’ gun shop owner claims legal victory
Shadi Hamid (@shadihamid) | Twitter
Inbox (27) - scitrenbaum@gmail.com - Gmail
Journal of Mathematical Physics - Volume 56 Number 11
Active ShooterActive Shooter Expert | Prevention | Recovery | #ActiveShooterExpert Chris Grollnek
Downloads | Personal.com
Top Secret Effort By U.K. Scientists: Analyzing Potential Islamic State, al Qaeda Weaponization Of The Ebola Virus; But, The Next Global Pandemic Might Just Be Downloaded From The Internet" - Fortuna's Corner
Ebola: Not an Effective Biological Weapon for Terrorists | Combating Terrorism Center at West Point
Homeland Security News Wire |
We have military research to thank for Ebola vaccines
FOI responses released by MOD: week commencing 26 January 2015 - Publications - GOV.UK
RUSI | Royal United Services Institute
Overview of Potential Agents of Biological Terrorism
Weaponized Ebola: Is It Really a Bioterror Threat? - Scientific American
Publications Topical Collections
NIJ Journal | National Institute of Justice
GAO-05-33, Homeland Security: Agency Plans, Implementation, and Challenges Regarding the National Strategy for Homeland Security
UC Berkeley [eScholarship]
eScholarship: Search Results
Modus Operandi - Smart, Big, Easy - Intel Analytics
International Society of Information Fusion
Journal of Advances in Information Fusion | International Society of Information Fusion
Fusion Related Publications | International Society of Information Fusion
Conference Detail for Signal Processing, Sensor/Information Fusion, and Target Recognition XXV
FUSION 2014 | International Society of Information Fusion
Home | IIP Digital | U.S. Department of State
Home: Global Governance Futures program (GGF)
10 Scariest Bioweapons | Stuff to Blow Your Mind
Kaiser Daily Global Health Policy Report | Ebola | Search Results | The Henry J. Kaiser Family Foundation
Global Health Hub: news and blogosphere aggregator - Keeping up with global health & development news, blogosphere, forums, events, jobs and more
James Scrofani - Google Scholar Citations
Radicalization, Linkage, and Diversity: Current Trends in Terrorism in Europe | RAND
James Scrofani - Google Scholar Citations
David Skillicorn - Google Scholar Citations
Proceedings of the 2015 SIAM International Conference on Data Mining (Society for Industrial and Applied Mathematics)
Jan Prokaj, Ph.D. - Publications
Bruce Skarin - Google Scholar Citations
Advances in Cross-Cultural Decision Making - Google Books
Insurgency and Security - Springer
Google Scholar Citations
AN OVERVIEW OF DATA MINING FOR COMBATING CRIME - Applied Artificial Intelligence - Volume 26, Issue 8
The Community for Technology Leaders • IEEE Computer Society
SPIE : Profile Summary
IEEE Xplore Abstract - Application of multi-level fusion for pattern of life analysis
Introductie - LIACS - Leiden Institute of Advanced Computer Science
Events Archives - Modus Operandi
A Brief Overview of ABI and Human Domain Analytics
Fusion 2015 papers
Fusion 2015
Patents by Inventor Georgiy Levchuk - Justia Patents Database
dblp: Georgiy M. Levchuk
Model-based Organizational Design for Future Systems - Google Search
Model-based Organizational Design for Future Systems
Saved Session - Session Buddy
GigaScience | Volume 4
http://tejji.com/browser/chrome/extensions/ is not available
Increasing workflow efficiency on your Mac with — FilePane — Medium
Top Siri Tips: 21 Amazing Things You Didn't Know Siri Can Do | iPhoneLife.com
HOW-TO GUIDES | GoHacking
VICE News
Aptonic - Dropzone 3 Actions
Journals
Apple Thunderbolt Display (27-inch) - Apple
Rethinking Political Islam | Brookings Institution
UCS Satellite Database | Union of Concerned Scientists
How to Send a Mac to Apple for Repair
2014-05-14 FOIA DTRA - record index/bibliography - George Air Force Base, CA - George Air Force Base, CA
European Journal of Sport Science - Volume 15, Issue 7
Joe On Tech • Archive
SuperDuper!
Mac Backup Software | Carbon Copy Cloner | Bombich Software
George C. Marshall Center - European Center for Security Studies - Public Web - ttest
Maintaining Your Mac: A Joe On Tech Guide
Joe On Tech (@joeontech) | Twitter
Backups for the creative pro | Macworld
Joe On Tech
www.itecsd.org
The Joy of Tech Archives!
Geek Culture Caps and Propeller Beanies!
The Joe On Tech Manifesto
The 2015 Legatum Prosperity Index - Home
Director's Corner Journal Update Volume 6, Issue 1 - YouTube
Peace and Stability Journal - Google Search
West Point - Home
DATA MINING AND DATA ANALYSIS FOR COUNTERTERRORISM - Google Scholar
Miller: Acquisition program problem detection using... - Google Scholar
Thuraisingham: Security standards for the semantic web - Google Scholar
Twenty-Second International FLAIRS Conference
Millar: Document Clustering and Visualization with... - Google Scholar
Millar: Document Clustering and Visualization with... - Google Scholar
Miller: Cyberspace and Real-World Behavioral Relationship... - Google Scholar
IEEE Xplore Abstract - Analyzing terrorist incidents to support counter-terrorism - Events and methods
Mahmood: Analyzing terrorist incidents to support... - Google Scholar
Thuraisingham: Data mining for counter-terrorism - Google Scholar
Effective Counterterrorism and the Limited Role of Predictive Data Mining | Cato Institute
http://csel.eng.ohio-state.edu/productions/intelligence/1_Patterns/Rigorous_Process/ZelikEtAl2010_MeasuringRigor.pdf is not available
Jeff Gill | Professor of Statistics
Social network analysis and counterinsurgency: a counterproductive strategy? - Critical Studies on Terrorism - Volume 3, Issue 2
Mac Ginty: Social network analysis and counterinsurgency:... - Google Scholar
Guzik: Discrimination by Design: Data Mining in the... - Google Scholar
Jackson: Understanding Why Terrorist Operations Succeed... - Google Scholar
The failure of police ‘fusion’ centers and the concept of a national intelligence sharing plan - Police Practice and Research - Volume 13, Issue 2
Taylor: The failure of police ‘fusion’centers... - Google Scholar
Cohen: Mass surveillance and state control: the total... - Google Scholar
A Social Network Analysis Approach to Detecting Suspicious Online Financial Activities - Springer
Young: Detecting Unknown Insider Threat Scenarios - Google Scholar
Abramowicz: System for Detection of Illegal Drugs E-Trading. - Google Scholar
Assessing the Abu Sayyaf Group's Strategic and Learning Capacities - Studies in Conflict & Terrorism - Volume 37, Issue 3
Abductions, kidnappings and killings in the Sahel and Sahara - Review of African Political Economy - Volume 38, Issue 130
Two Neglected Areas of Terrorism Research: Careers after Terrorism and How Terrorists Innovate | Weinberg | Perspectives on Terrorism
Jonas: Effective counterterrorism and the limited... - Google Scholar
BMC Medical Informatics and Decision Making | Full text | Preparation of name and address data for record linkage using hidden Markov models
Christen: A probabilistic geocoding system based... - Google Scholar
US Federal Geographic Data Committee: Homeland Security... - Google Scholar
Churches: Preparation of name and address data for... - Google Scholar
IEEE Xplore Abstract - Efficient Techniques for Online Record Linkage
Fake Injection Strategies for Private Phonetic Matching - Springer
Vatsalan: An efficient two-party protocol for approximate... - Google Scholar
Christen: Similarity-aware indexing for real-time... - Google Scholar
George C. Marshall European Center for Security Studies | GlobalNET
Aptonic - Dropzone 3
Reinvented Software - Together for Mac
PopClip Extensions
Notefile 2.7 for Mac ~ Mac OS X ~ Junecloud
2Do
Todo - The ORIGINAL To-Do Task List
Due: The Superfast Reminder App for Mac
Dabiq Magazine - On The Media
The Breaking News Consumer's Handbook - On The Media
The Breaking News Consumer's Handbook: Active Shooter Edition - On The Media
The Language of Terror - On The Media
Home - On The Media
AMiner - Open Science Platform
JournalSeek - A Searchable Database of Online Scholarly Journals
Lazy Scholar | Extension
MBW Picks | A summary of the featured books, hardware, & software apps as selected by the hosts of MacBreak Weekly.
i use this mac os x software: New Releases
The Altmetric Bookmarklet - Altmetric
Utilities - Mac App Store Downloads on iTunes
Kaleidoscope — File comparison for Mac
DeltaWalker Downloads
Today's Best Deals: Jabra MOVE, Arlo Security System, $39 Drone, and More
Browse and Download Torrents - Kickass Torrents
MVGroup - TPB
Category:Name - DocuWiki
OneTab shared tabs
OneTab shared tabs
Table of Contents: December 2015 | SIGNAL Magazine
SIGNAL Magazine
The secretive industry of social media monitoring - CSMonitor.com
Islamic State adds smartphone app to its communications arsenal - CSMonitor.com
Passcode - The Christian Science Monitor - CSMonitor.com
Interactive online Google tutorial and references - Google Guide
Google Search Operators - Google Guide
Search Engines | Pearltrees
Musings about librarianship: 6 common misconceptions when doing advanced Google Searching
Forms & Resources - Curry School of Education
Intelligence: news and discussion about Intelligence and espionage matters around the world
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.