Light theme
Dark theme
Automatic (use operating system setting)
Shared: 599 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
599 tabs
Copy links to clipboard
Copy
Open
Crowdsourcing and Crisis Mapping | idisaster 2.0
Jen Ziemke
CoAX - Coalition Agents eXperiment
Crowdmapping Arab Spring - Next Social Media Breakthrough?
Center for Terrorism & Security Studies | UMass Lowell
Terrorist “Roles” - Google Search
Horgan & Shortland, 2015 - Google Search
developing a typology of terrorist involvement - Google Search
WIRED Awake: 10 must-read articles for 11 April - scitrenbaum@gmail.com - Gmail
Inbox (139) - stczztop@gmail.com - Gmail
Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space - Google Search
Crisis Mapping Spring 2015 - Google Docs
Construction of New Interdisciplinary Field - Google Drive
Conflict mapping 3.0
Crisis Mapping for Conflict Analysis, - Google Search
SHBI Workshop 2015
Crisis Mapping and Open Source Geospatial Information Systems - Google Search
Dr. Patrick Meier speaks at NDU about crisis mapping and crowdsourcing | STAR-TIDES
QCRI - Social Innovation
CrisisMappers - THE HUMANITARIAN TECHNOLOGY NETWORK
iRevolutions
STAR-TIDES | Sharing To Accelerate Research - Transformative Innovation for Development and Emergency Support
Soldiers to Help Crowdsource Spy Maps - Nextgov.com
Ushahidi - MIT Technology Review
Ushahidi - Wikipedia, the free encyclopedia
Journal of Map & Geography Libraries: Advances in Geospatial Information, Collections & Archives - Volume 8, Issue 2
Ushahidi
How Volumes of crowdsourced, realtime event data on conflict, analyzed and tasked via global volunteer networks, influence war’s ground game, and thus shape best practices, tactics and strategies for CT & COIN. - Google Search
Fusion Methodologies in Crisis Management - Springer
Jen Ziemke - Google Search
Jen Ziemke |
Jennifer Ziemke - PRIO
Introducing ACLED: An Armed Conflict Location and Event Dataset
International Network of Crisis Mappers | DHN
[School-of-data] Fwd: [CrisisMappers] ICCM 2014 Conference Registration now open!
Dr Peter J Phillips - Google Search
District Stability Framework - Google Search
MILITARY REVIEW - Google Search
Policy Options and Broader Implications - Google Search
Course of Action Optimization - Google Search
Coalition Agents eXperiment - Google Search
Culture Awareness in Human Reasoning and Behavior and in Intelligent Systems - Google Search
Scientists Are Wrong All the Time, and That’s Fantastic | WIRED
Edge Master Class 2015: A Short Course in Superforecasting, Class I | Edge.org
The GDELT Project
How Big Data Is Being Used in the Fight Against Human Trafficking - US News
Defense Intelligence Analysis in the Age of Big Data > National Defense University Press > News Article View
Red Disk - Google Search
Army spent $5B on failed technology created by vets | New York Post
‘Love’ Is The Most Sexually Explicit Movie To Ever Appear On Netflix | Decider | Where To Stream Movies & Shows on Netflix, Hulu, Amazon Instant, HBO Go
Army intelligence says it needs good cloud computing to save lives in Afghanistan - Washington Times
Obama Poised to Yank Top Military Intel Pick | Foreign Policy
How a Pentagon Boondoggle is Putting Soldiers in Danger | New Republic
DCGS-A ICITE Cloud - Google Search
All-Source Analytics for ‘Big Data - Google Search
9 Useful Open Source Big Data Tools - Enterprise Apps Today
50 Top Open Source Tools for Big Data - Datamation
Bossie Awards 2015: The best open source big data tools | InfoWorld
D-Sigs - Google Search
Panama Papers: This is the leak
Affective Computing - Science Nation | NSF - National Science Foundation
Craig Venter: Critical Tools and Technologies in Synthetic Genomics | GEN Magazine Articles | GEN
Why You <i>Need</i> to Get a Pap Smear | Portland Monthly
Have a Healthy, Happy April with These Local Wellness Events | Portland Monthly
Bending Evernote: An Interview with GTD Expert and TaskClone Developer, Troy Christmas
Portland Vocal Improv (Portland, OR) - Meetup
Seth Rudetsky - YouTube
Seth Rudetsky's "Obsessed! Live" With Ana Gastyer, Megan Hilty and Ramin Karimloo - YouTube
An Evening with Ramin Karimloo - Google Search
Jonathan P. Caulkins
Presentations and Authors
OpenSample — science for everyone
Delete Dropbox cache to recover drive space | Macworld
Peter W Glynn - Publications
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Download Non fiction Torrents - Kickass Torrents
File Syncing Showdown: Google Drive vs. Dropbox vs. OneDrive
Optimal Control of Nonlinear Processes - With Applications in | Dieter Grass | Springer
Seven Nights In Bangkok For Under $700, Including Air
Visual Analytics for cyber security and intelligence
Quantitative performance metrics for evaluation and comparison of middleware interoperability products
A principles-based model of ethical considerations in military decision making
Make a Tool Organizer for Your Garage with a Pallet and Pegboard
What is Project Gryphon-X? And Why Is It So Cool (if it's true)? - Public Relations & Strategic Communication
Nest Folders Inside of Folders in Apple Notes from the Mac App
Nesting Folders in Apple Notes — MacSparky
Top 10 Smart Ways to Organize and Upgrade Your Garage
99Deductions Simplifies All of Your Complicated Tax Deductions
Here's How Cops Get Your Snapchat History
Employee Spotlight: Carolyn Phillips | Argonne National Laboratory
U.S. Army | Infantry Magazine
U.S. Army STAND-TO! | Operational Environment Training Support Center
8_O-M15_pf_Longabaugh_Figure2.jpg (487×371)
BLM Library: Resource Notes
Aerospace Engineering and Operations Technicians : Occupational Outlook Handbook: : U.S. Bureau of Labor Statistics
Defense Threat Reduction Agency > Research > Basic and Applied Science Department > Network Sciences > TA 2-1
MIT ORC - Spotlight Item
Image5.gif (481×489)
2015 - INFORMS
Something Old, Something New: Army Leader Development in a Dynamic Environment | RAND
Modeling and Simulation | RAND
Space Tech Expo | Speaker spotlight: Erik J Eliasen, Vice President, National Security Space Programs, Universal Space Network
Alladin_X
Download The Hidden Hand: A Brief History of the CIA (2014) by Richard H. Immerman [Dr.Soc].epub Torrent - Kickass Torrents
Partner Spotlight: Fulcrum | Global SOF Foundation
The Covert Roots of the Panama Papers | New Republic
Pulse: FBI CYWATCH A-000067-DM - AlienVault - Open Threat Exchange
Social Media and Tactical Considerations For Law Enforcement | Public Intelligence
Law Enforcement Guide to the Path of an Outlaw Motorcycle Gang Member | Public Intelligence
Snapchat Law Enforcement Guide | Public Intelligence
FBI’s “Shared Responsibility Committees” to Identify “Radicalized” Muslims Raise Alarms
army operational environment variables - Google Search
army operational environment variables - Google Search
Explaining the Army Design Methodology - Google Search
spotlight ON NATIONAL OPERATIONAL ENVIRONMENT MODEL - Google Search
Optimal Control of Nonlinear Processes - Google Search
paul newell - Google Search
Recap of Recent Posts at Just Security (April 2-8) | Just Security
Intelligence: news and discussion about Intelligence and espionage matters around the world
Panama Leaked Docs- Where can I find them/DL them? : Intelligence
Mac Power Users #312: Notes Shootout - Relay FM
Saved Session - Session Buddy
Little Devices’s albums | Flickr - Photo Sharing!
Proceedings of the 59th Annual Meeting of the ISSS - 2015 Berlin, Germany
Kress: Analytic Modeling of Insurgencies - Google Scholar
AAAI Digital Library — International Conference on Web and Social Media
IPA's weekly links - Chris Blattman
Adam Klivans
Downloads News, Videos, Reviews and Gossip - Lifehacker
Little Devices @ MIT | Affordable Health | Medical Technology | DIY Innovation
Planning poker - Wikipedia, the free encyclopedia
Elise T. Axelrad - Publications
Operations Research: INFORMS
Operations Research: INFORMS
SystemsModelbook: The Role of Influence Operations in a Counterinsurgency Battle
How It's Possible To Defeat An Insurgency - Business Insider
The Hawaii International Conference on System Sciences (HICSS) | Resources
Wakeland: Comparing discrete simulation and system... - Google Scholar
Kress: Why defeating insurgencies is hard: The effect... - Google Scholar
Kress: Analytic Modeling of Insurgencies - Google Scholar
"Comparing discrete simulation and system dynamics : modeling an anti-insurgency influence operation" by Wayne W. Wakeland
The Role of Influence Operations in a Counterinsurgency Battle | Elise Axelrad - Academia.edu
Comparing Discrete Simulation and System Dynamics: Modeling an Anti-insurgency Influence Operation - Google Search
Control variates techniques for Monte Carlo simulation - Google Search
Dr. Stuart Madnick - Google Search
Models of Counterterrorism - Google Search
System Dynamics Modelling for Information Security - Google Search
The Role of Influence Operations in a Counterinsurgency Battle - Google Search
The Role of Influence Operations in a Counterinsurgency Battle - Google Search
Why Defeating Insurgencies is Hard: The Effect of Intelligence in Counterinsurgency Operations -- A Best-Case Scenari - Google Search
Why Defeating Insurgencies is Hard - Google Search
Can an insurgency be stamped out solely by military means? | openDemocracy
Wayne Wakeland - Publications
Control variates techniques for Monte Carlo simulation
Combining system dynamics and discrete event simulations - Overview of hybrid simulation models
The Role of Influence Operations in a Counterinsurgency Battle
Comparing Discrete Simulation and System Dynamics: Modeling an Anti-insurgency Influence Operation
Will the real security foresight expert please stand up?
Moshe Kress, Naval Postgraduate School, Department of Operations Research - ResearchGate
Gustav Feichtinger - ResearchGate
Roberto Szechtman, Naval Postgraduate School, Department of Operations Research - ResearchGate
Gernot Tragler - ResearchGate
Mathematical Model Shows Why Defeating Insurgent Groups Like Taliban Is So Difficult -- ScienceDaily
Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary
Stackable Pencil Trays - All
1Password for Mac Makes Switching from Other Password Managers Easier
2016 To-Do App Showdown: Wunderlist vs. Any.do
Adobe Acrobat Reader Can Now Edit PDFs Directly From Your Dropbox On Android
Grab a Free License for CloudBerry Backup Pro for Mac or Linux, Normally $30
Monospace Writer Leaves Beta, Organizes and Locks Files With Hashtags
Outlook for Android and iOS Adds Facebook, Wunderlist, and Evernote Calendars
Quotationr Saves Quotes or Other Text from Around the Web With a Few Clicks
Simplenote's Syncing Plain Text Editor Is Now Available for Windows and Linux
This Week's Top Downloads
DoD Announces National Security Science and Engineering Faculty Fellows > U.S. DEPARTMENT OF DEFENSE > Article View
4 Things To Know About Dabiq, ISIS' Slick Propaganda Magazine
(12362) Inoreader - This Week's Top Downloads
The Battlefield of the Future for U.S.... - Matthew Aid
Using Data Mining to Spot Potential Terrorists... - Matthew Aid
'Apostates,' 'Crusaders,' 'Infidels,' And Western Political Institutions – ISIS's Enemies According To Its English-Language Magazine 'Dabiq'
Political MoJo | Mother Jones
Shtetl-Optimized » Blog Archive » From Boston to Austin
Dabiq (magazine) - Wikipedia, the free encyclopedia
Weekly Links | Political Violence @ a Glance
The CIA just invested in a skincare line that is named after James Bond's technology designer and collects your DNA | SOFREP
How to move your data from LastPass to 1Password - 1Password Support
Home - Dropbox
Sacha Chua | Flickr - Photo Sharing!
SIS's Enemies According To Its English-Language Magazine 'Dabiq - Google Search
Skincential Sciences, - Google Search
Skin Resurfacing Based on Science – Skincential Sciences
The Rafidah from Ibn Saba' to the Dajjal - Google Search
Edward George Anderson Jr. - Google Scholar Citations
Google Alerts - Monitor the Web for interesting new content
Online Reputation Management | BrandYourself.com
Tutorial: Find Out Who’s Googling You | BrandYourself Blog
Rogelio Oliva - Google Scholar Citations
Rogelio Oliva -- Publications
Ignacio J. Martinez-Moyano, Ph.D. - Google Scholar Citations
Special issue of the System Dynamics Review on: modeling and simulation of terrorism and insurgency movements: methods, data, and associated challenges - Anderson - 2011 - System Dynamics Review - Wiley Online Library
An - Ang
MI - Special Operations - Table of Contents
Documentation for model transparency - Martinez-Moyano - 2012 - System Dynamics Review - Wiley Online Library
Who Is Searching For You On Google | Tech Me Out
Main profile | Computation Institute
Security Matters - MakeUseOf
4 Things You Can Use Google Alerts To Monitor The Web For
4 Easy Ways To Find Out Who Is Looking For You Online
Modeling behavioral considerations related to information security
Ignacio J. Martinez-Moyano, Ph.D. - Google Scholar Citations
Google Scholar Citations
Martinez-Moyano: Exploring feedback and endogeneity... - Google Scholar
Martinez-Moyano: Modeling behavioral considerations... - Google Scholar
Rogelio Oliva | Texas A&M University - Academia.edu
A dynamic model of counterinsurgency policy including the effects of intelligence, public security, popular support, and insurgent experience - Google Search
Avvo - Google Search
IGNACIO MARTINEZ-MOYANO - Google Search
MODELING ADVERSARIAL DYNAMICS - Google Search
Modeling Behavioral Activities Related to Deploying IEDs in Iraq. - Google Search
Is serving in the IDF good for you? - Quora
Why don't the Arab States band together, economically and militarily, as a means to negotiate with Israel for better terms for Palestine? - Quora
A dynamic model of counterinsurgency policy including the - Technische Informationsbibliothek (TIB)
Adecco Medical & Science - Google Search
The Hawaii International Conference on System Sciences (HICSS) | Digital Library
Portland Timbers
TEDx Portland
MLS: search results - stream timbers
Workshop on Improving Cooperation Among Nations in Irregular Warfare Analysis - Google Search
The Social Impact Model: A Tool for Irregular Warfare Adjudication, Analysis, and Validation.” - Google Search
Case Studies
Download Psychology EBook Collection V2 Torrent - Kickass Torrents
Investigating the Potential for Miscommunication Using Emoji | GroupLens
Integrating Tactical Deception Planning at the Brigade Level | Small Wars Journal
Event Registry
Sugru Moldable Glue - Black & White (Pack of 8) - - Amazon.com
ICWSM-15 - About - Previous Conferences
International Conference on Weblogs and Social Media - Google Scholar Metrics
www.computer.org/csdl/proceedings/hicss/index.html
HICSS-49
Sunday's Best Deals: $2 Kindle Books, Camping Hammock, 3DS XL, and More
A survey of computer game development
Contrasting emergence: In systems of systems and in social networks
Event registry
Event registry
ICWSM-14 - Home - Welcome
Top 10 DIY Miracles You Can Accomplish with Sugru
Amazon.com: Gold Box Deal of the Day
Compound Interest - This Week in Chemistry – Colour-Changing Camouflage, & DNA Data Storage
DMOZ - the Open Directory Project
ICWSM-15 - Home - Welcome
ICWSM-16 - Datasets - Datasets
Get LinkedIn, Twitter, and GitHub Infos for any Email Address
Organize, Manage, Compress Files to Save Space: Disk Sorter
US arms shipment to Syrian rebels detailed | IHS Jane's 360
Military Operations Research Society
This Robot Could Make Creating New Life Forms As Easy As Coding An App | WIRED
Predators on the Frontier - The American Interest
GitHub - gregorleban/EventRegistry: python package for accessing data in Event Registry
CIA’s Venture Capital Arm Is Funding Skin Care Products That Collect DNA
Proceedings of the Eighth International Conference on Weblogs and Social Media
A Multi-Indicator Approach for Geolocalization of Tweets - Google Search
Centre for Land Warfare Studies - Google Search
Contrasting emergence: In systems of systems and in social networks - Google Search
DARPA Foundation “Task 6” Report Systematic Evaluation Framework - Google Search
ICWSM - Google Search
Modeling National Security Changes from Military Operations - Google Search
System Dynamics Maps of the Insider Cyber-threat Problem - Google Search
US arms shipment to Syrian rebels detailed - Google Search
The Best of the Physics arXiv (week ending April 9, 2016)
Saved Session - Session Buddy
NPS Theses - Naval Postgraduate School
Home - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Defense Analysis - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - Conflict, Peacekeeping & Reconstruction - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Home - National Security Affairs - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
What is Operations Research? - INFORMS
Home - Operations Research - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
OR Department Publications - Naval Postgraduate School
Articles - Operations Research - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Data Relationship Visualization and Analysis | Live Tom Sawyer Perspectives Demonstration
Matchday | Portland Timbers duel with LA Galaxy in southern California | Portland Timbers
Analytics
Find Research & Publications - INFORMS
Amazon.com: Combat Modeling (International Series in Operations Research & Management Science) (9781441907899): Alan R. Washburn, Moshe Kress: Books
Home - Search Basics - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Defense Technical Information Center
AllGov - Departments
spectral angle mapper - Google Search
IDGA Intelligence Analysis and Processing Conference - Google Search
Quantitative Methods in Defense and National Security - Google Search
Andy Ilachinski - Google Search
Tom Sawyer Software
Networks / Pajek
Portland Timbers vs. LA Galaxy Match Preview - Stumptown Footy
TV Guide & TV Listings | DIRECTV Channel Schedule | DIRECTV
ArguingTheOE - YouTube
Multimethod Simulation Software and Solutions
Ascertaining validity in the abstract realm of PMESII simulation models an analysis of the Peace Support Operations Model (PSOM)
WSC 2010 Program
Ascertaining Validity in the Abstract Realm of PMESII Simulation Models (and other thoughts) | PAXsims
(25) Glenn Hodges | Naval Postgraduate School - Academia.edu
The Operational Environment (PMESII-PT) by Chris Rhoades on Prezi
dime military model - Google Search
Combined Arms Research Library (CARL) Digital Library
Waltz: Situation analysis and collaborative planning... - Google Scholar
Duong: The nexus cognitive agent-based model: coevolution... - Google Scholar
2012 AAAI Spring Symposium Series
Presentations and Authors
complex adaptive systems an introduction to computational models of social life - Google Search
Complex Adaptive Systems
CAS in the Natural and Social Sciences
Complex Adaptive Systems and the Threshold Effect
(25) Ted Carmichael | University of North Carolina at Charlotte - Academia.edu
Combined Arms Research Library Digital Library : Search Results
https://ntrl.ntis.gov/NTRL/login.xhtml
Gaming Political Science | Kansas State University
International Relations
Conflict, Terrorism, and War
School of Advanced Military Studies Monographs
DImE, PmESII and now MIDLIFE - Small Wars Council
The nexus cognitive agent-based model
The Peace Support Operations Model: Origins, Development, Philosophy and Use
Dudley Knox Library - Naval Postgraduate School
An integrated development environment for PMESII model authoring, integration, validation, and debugging | (2007) | Pioch | Publications | Spie
Complex Adaptive Systems and the Threshold Effect: Views from the Natural and Social Sciences
JDMS on modelling political interaction in peace operations | PAXsims
JDMS on the The Peace Support Operations Model and stabilization strategy | PAXsims
FM 3-24.2 Chapter 1
Krenson: On Strategy: Integration of DIME in the... - Google Scholar
Waltz: Situation analysis and collaborative planning... - Google Scholar
~The~Most~Hated~ on Twitter: "@rcallimachi Twitter's weekend presence is predictable they usually start to suspend between 3-5pm est then go back to sleep til about 10pm"
dime model of national power - Google Search
pmesii analysis - Google Search
An integrated development environment for PMESII model authoring, integration, validation, and debugging - Google Search
COnflict Modeling, Planning, and Outcomes EXperimentation - Google Search
PMESII model library - Google Search
Modelian: Interactive Programming
V.S. Subrahmanian
Systems Thinking World - SystemsWiki
shakarian.net - Publications
Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism ... - Google Books
ISIS Research | CySIS
KDD '15- Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
University-Led Research (Minerva Initiative)
ISIS Propaganda: Researchers Track, Neutralize Terrorists' Twitter Recruitment With Defense Department Backing
Publications | CySIS
Social Network Diffusion | CySIS
CySIS Team | CySIS
V.S. Subrahmanian - Google Scholar Citations
mcctheater - YouTube
National Defense University Press
ArguingTheOE - YouTube
Access Denied
[1601.05140] The DARPA Twitter Bot Challenge
IEEE Xplore Abstract - APE: A Data-Driven, Behavioral Model-Based Anti-Poaching Engine
Saving rhinos with predictive analytics
VEWS: A Wikipedia Vandal Early Warning System
V.S. Subrahmanian
IEEE Xplore Abstract - Holistic Approach to Passenger Terminal Risk Estimation
CySIS | Cyber-Socio Intelligent Systems Laboratory
arXiv.org Search
Artificial intelligence decodes Islamic State strategy - BBC News
Terrorism Bookshelf: Top 150 Books on Terrorism and Counter-Terrorism | Sinai | Perspectives on Terrorism
Laboratory for Computational Cultural Dynamics
dblp: V. S. Subrahmanian
Reason Broadcast - YouTube
BehindtheMusical's channel - YouTube
Tinkerin' Thinkers - YouTube
Next to Normal performance at 2009 Tony Awards - Aaron Tveit - YouTube
VIDEOS - Dropbox
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Global Outlook - PeaceTech Lab
ResearchGate
Links
The Productivity Pack
nanotechnology site:www.au.af.mil/au/awc/awcgate/cst/ - Google Search
Electrospaces.net: NSA Nicknames and Codewords
STRATEGII XXI - HOME
Data Sources - PeaceTech Lab
Data Sources - PeaceTech Lab
DME for Peace | Design, Monitoring and Evaluation for Peacebuilding
STRATEGII XXI - + THE CENTRE FOR DEFENCE AND SECURITY STRATEGIC STUDIES CONFERENCE
ACIPSS | Austrian Center for Intelligence, Propaganda & Security Studies
MacStories Weekly: Issue 24
Learning Agents Center - George Mason University
Computational Theory of Intelligence Analysis - Google Search
Phillip Hwang - Google Search
U.S. ARMY WAR COLLEGE GUIDE TO NATIONAL SECURITY POLICY AND STRATEGY - Google Search
Inbox (193) - scitrenbaum@gmail.com - Gmail
04-06 AM 1501 OneTab shared tabs - stczztop@gmail.com - Gmail
Peace and Conflict Studies | Open Access Articles | Digital Commons Network™
DARPA Project List (Defense Advanced Research Projects Agency)
Analysing Terrorism from a Systems Thinking Perspective | Schoenenberger | Perspectives on Terrorism
Noise in GDELT - John Beieler
GDELT and ICEWS, a short comparison | Predictive Heuristics
Prediction and Good Judgment: Can ICEWS Inform Forecasts? | Predictive Heuristics
Search | LinkedIn
Online Etymology Dictionary
Ric Roca - Google Search
Cognitive Architecture - Google Search
Cognitive Architecture - Google Search
Lysistrata |
peace tech - Google Search
The PeaceTech Lab | United States Institute of Peace
PeaceTech Lab (@PeaceTechLab) | Twitter
Key Findings | Peace and Security Funding Index
(3) #OSRx hashtag on Twitter
How data can help counter violent extremism -- FCW
OpenStreetMap
Data — PeaceTech Lab
PeaceTech Weekly News Roundup — PeaceTech Lab
Media Assessment Template — PeaceTech Lab
Blogs and Bullets — PeaceTech Lab
USIP Open Situation Room - GDELT Blog
PeaceTech Lab's New Open Situation Room Exchange (OSRx) - GDELT Blog
Noel Dickover | United States Institute of Peace
Open Situation Room - Mercator Program Center for International Affairs (MPC) GmbH
Meeting in the White House Situation Room – Open Identity Exchange
Data Sources - PeaceTech Lab
ICWATCH
Selected Documents - Irregular Warfare - LibGuides at Naval War College
Current Events in DSS
Irregular Warfare JTPhi
Home - LibGuides at Naval War College
MSFRIC Subject Resource Guides
OSINT .CSV Data Sources : Intelligence
Three hacks for adding permanent storage to your MacBook Air or Retina Pro through the SD card slot | 9to5Mac
UCS Satellite Database | Union of Concerned Scientists
Institute for Regional Security - Security Challenges Journal
Advanced Mapping with the GDELT API + BigQuery — CartoDB Blog
Afghan War Diaries (Wikileaks) - Enemies Detained.csv - Google Fusion Tables
UChicago CPOST
PRIO-Grid - Google Search
Strategic Partners Executive Meeting Press ReleaseActive Shooter | Domestic Terrorism Prevention
New Tools To Sift Through Data - i-HLS Israel Homeland Security
Beautiful web-based People Plots and Family Trees
Millennium Challenge
Search is Back!
Tutorial - Censys
Autocorrect hates you - The Oatmeal
Most Popular Explainers of 2015
OneTab shared tabs
Home - Federal Business Opportunities: Home
What software/web apps do you use? : Intelligence
Metadata Investigation : Inside Hacking Team | Share Lab
Advancing the Design and Modeling of Complex Systems
DTRA/ASCO - Google Search
DARPA looks to build a foundation for systems-of-systems -- Defense Systems
Marketing Intelligence Tools by Robin Good | ZEEF
2014-05-14 FOIA DTRA - record index/bibliography - George Air Force Base, CA - George Air Force Base, CA
Conference Publications - Distributed Information and Intelligence Analysis Group
Information Warfare - The RMA Debate
Connections | Connections: The Quarterly Journal
Funding-Opportunities-L Info Page
Insight Maker | Free Simulation and Modeling in your Browser
Box | Simple Online Collaboration: Online File Storage, FTP Replacement, Team Workspaces
Systems Analysis Interesting Web Sites List
ICWATCH
Apple MacBook 12 inch Laptop with Retina Display 256GB Early 2015 Model | eBay
Makerbase
Apple posts hilarious 'Behind the scenes with Cookie Monster' video
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Digital Libraries authors/titles recent submissions
For the past several years, in often ungoverned... | THE GUN.
AOC 16" USB-Powered Portable LED Monitor - Computers.Woot
Either DA-RT Works, or It Does Not | Duck of Minerva
Electrospaces.net: Abbreviations and Acronyms
Home - Deep Web - LibGuides at Montana State University-Billings
Circuit Simulator Lets You Play Around with Electronics Components in Your Browser
Five Tips That Might Save Your Life In a Knife Attack
Search Google Drive Documents by Collaborator to Find Shared Files
Tab Organizer Groups Your Open Chrome Tabs by URL
This Week's Most Popular Posts: April 1st to 8th
Top 10 Cheat Sheets to Help You Master Microsoft Office
One Thing Well
A Candy Bar With a Jewish Identity Crisis | Jewniverse
Digital Cartography [132] - Visualoop
Apple MacBook Air (Latest Model) - 13.3" Display - Intel Core i5 - 4GB Memory - 128GB Flash Storage Silver MJVE2LL/A - Best Buy
www.davidmasad.com/Research.html
Acer Display 23" Full HD Monitor 1920 x 1080 16 9 60Hz H236HL Bid 886541901255 | eBay
How to Sync iOS 9’s Notes with Your Gmail Account
(12205) Inoreader - Senior Advisor, Threat Intelligence, Analytics at BELL
(10848) Inoreader - OR News
Welcome to METIS
Welcome to n~ask
Gizmo's Freeware
Workopolis - Senior Advisor, Threat Intelligence, Analytics
Search / gdelt
ICWATCH
ICWATCH
DOWNLOAD ME - scitrenbaum@gmail.com - Gmail
Online Diagramming Application - Text to Diagram - textografo
Afghan War Diary, 2004-2010 - WikiLeaks
Senior All-Source Intelligence Analyst - Google Search
jema sigint - Google Search
Iraq: Women Suffer Under ISIS | Human Rights Watch
Counterterrorism | KEYW Corporation
Archive of Connections: The Quarterly Journal | Connections: The Quarterly Journal
The Cyber & Jihad Lab | Presented by MEMRI
Defense Statecraft: Dr. Robert Farley Course Information
America's PrepareAthon! Tabletop Exercise Materials | FEMA.gov
Leadership Survival and Hired Guns | Acleddata - Crisis
Center for Complex Operations > Publications > PRISM > PRISM Volume 5, no. 3
Welcome to MSFRIC Bibliographies Page
Small Wars Journal
Bento Lab Kickstarter Launch - Tomorrow - March 22nd
Cognitive Systems Laboratory
CAUSALITY, 2nd Edition, 2009
Alexander H Levis - Publications
CTTSO BIDS - Reference Materials
dblp: Intelligence and Security Informatics 2010
Peter Newell | LinkedIn
dblp: Alexander H. Levis
DSTO Publications Online: Social modelling for defence and national security
The next big thing in interrogations: it isn’t torture, but will it be (and should it be) accepted? – Lawfire
Sources And Methods: How To Get A Job In Intelligence (Introduction)
5 Ways Cyber Experts Think the FBI Might Have Hacked the San Bernardino iPhone - IEEE Spectrum
Oryx Blog: The Islamic State going DIY, 122mm D-30 howitzers used as anti-aircraft guns
System Architectures Lab: People: Prof. Alexander H. Levis
The U.S. Is Losing the Social Media War | TIME
Hacking Defense: Changing How DoD Innovates - War on the Rocks
Underground tunnels ISIS built to evade air strikes - Business Insider
How to Prepare a Quad Chart | CTTSO
ISSDCM - Dynamic Coalitions
Science and Technology Research News Articles | Futurity
SYSTEM OF SYSTEMS ANALYTICS, INC. - FAIRFAX, VA - $20,000 in Defense Contracts in 2014 - 3877 FAIRFAX RIDGE RD STE 201C
science tools nav bar
Project and Award Quad Chart Guidelines
From Flexible and Stretchable Meta-Atom to Metamaterial: A Wearable Microwave Meta-Skin with Tunable Frequency Selective and Cloaking Effects : Scientific Reports
Powerpoint Classes: Army Pre-made Training | Listing by Subjects
Algebraic structures for dynamic networks
Job Search Engine | Simply Hired
Does Anyone Really Know What's Going On? Likely Not.
The Logo That Took Down DARPA's Information Awareness Office - The Atlantic
Open Source Intelligence Techniques by Michael Bazzell
The Complete Privacy & Security Desk Reference by Michael Bazzell
[Funding-Opportunities-L] FY16 Defense University Research Instrumentation Program (DURIP)
DARPA dissects Twitter, Facebook, Reddit to extract propaganda how-to’s – Naked Security
Lucia Falzon - Google Scholar Citations
Silverman: Human behavior models for agents in simulators... - Google Scholar
CIA’s Venture Capital Arm Is Funding Skin Care Products That Collect DNA
Adversary Behavioral Modeling -Available Tools and Applications for the Warfighter - Google Search
Defence Science and Technology Organisation - Google Search
Human Behavior Models for Agents in Simulators and Games - Google Search
Open Situation Room Exchange - Google Search
Social Modelling in Support of Planning and Intelligence - Google Search
Social Media in Strategic Communication list - Google Search
Robert Crowson | LinkedIn
Hacking for Defense - Are we going to be friends? | Peter Newell | LinkedIn
Madjid Tavana - Publications
Arguing the OE, Episode 7: Are PMESII-PT and Systems Thinking in Tension? - YouTube
Lin-Manuel Miranda, Jeanine Tesori, Danai Gurira, Oskar Eustis | Interview | TimesTalks - YouTube
Why the US Government Is Terrified of Hobbyist Drones | WIRED
The Board Game of the Alpha Nerds «
Winning with Allies: The Strategic Value of the Afghan Model on JSTOR
How Special Ops Copied al-Qaida to Kill It | WIRED
Getting Bin Laden - The New Yorker
The Predator War - The New Yorker
Secret ‘Kill List’ Tests Obama’s Principles - The New York Times
General Stanley McChrystal: The Runaway General by Michael Hastings | Rolling Stone
Danger Room | WIRED
This Wireless Explosives Detector Is the Size of a Postage Stamp | WIRED
Threat Matrix | The Long War Journal
democracyarsenal.org
DoDTechipedia | The White House
DARPA - Open Catalog
1. Decision Making Analysis (DIME Model) - NSC Decision Making and Operation Allied Force
Deep Web Search Engines - Deep Web - LibGuides at Montana State University-Billings
Short Biography
Distributed Information and Intelligence Analysis Group
NSC Decision Making and Operation Allied Force - Google Search
Beyond Connecting the Dots
Insight Maker • Insight Maker • Kumu
Systems KeLE • Agent Based Modeling • Kumu
what is insight Maker's - Google Search
Insight Maker: A general-purpose tool for web-based modeling & simulation
Simulation Modelling Practice and Theory - ScienceDirect.com
Scott Fortmann-Roe - Google Scholar Citations
Scott Fortmann-Roe, PhD | LinkedIn
Security and Defense | SRI International
Home | SRI - Strategic Resources, Inc.
Scott Fortmann-Roe
More Diverse Voices Make For Better Models | Scott Fortmann-Roe | ScienceLives
Resources - Default
Home - MERLN - Research Guides at National Defense University
Eugene Santos Jr. | Thayer School of Engineering at Dartmouth
Coevolving Innovations| … in Business Organizations and Information Technologies
SSTR Operations 2012 - HL
Afghanistan: Current Issues 2010 KH
Asymmetric Warfare 2006
Welcome to MSFRIC Bibliographies Page
Research Bibliography | PAXsims
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.