Light theme
Dark theme
Automatic (use operating system setting)
Shared: 499 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
499 tabs
Copy links to clipboard
Copy
Open
Saved Session - Session Buddy
Saved Session - Session Buddy
Relevance - Dashboard
Three hacks for adding permanent storage to your MacBook Air or Retina Pro through the SD card slot | 9to5Mac
Amnesty: Most Weapons Used by IS Were Seized From Iraqi Army - ABC News
Afghan War News
AMiner - Open Science Platform
An excerpt from the NSA's Wikipedia - The Washington Post
The Center for Arms Control and Non-Proliferation
How tech fails led to Air Force strike on MSF’s Kunduz hospital | Ars Technica
Home | Big Data & Society
Harvard - Belfer Center for Science and International Affairs
Math As Language: Understanding the Equals Sign | BetterExplained
BetterExplained - Quick Reference Guide
Amnesty: Most weapons used by IS were seized from Iraqi army
Leading threat detection company supports Blue Ribbon Panel Study on Biodefense | BioPrepWatch
In the Pipeline | Derek Lowe’s commentary on drug discovery and the pharma industry. An editorially independent blog from the publishers of Science Translational Medicine.
The SPJ Blog
Blogtor Who: The Twelfth Doctor - 2015 Holiday Special comic
Mac Backup Software | Carbon Copy Cloner | Bombich Software
A fix for slippery iPhones - BrettTerpstra.com
Search for a Dataset - Data.gov
Active ShooterActive Shooter Expert | Prevention | Recovery | #ActiveShooterExpert Chris Grollnek
http://csel.eng.ohio-state.edu/productions/intelligence/1_Patterns/Rigorous_Process/ZelikEtAl2010_MeasuringRigor.pdf is not available
Forms & Resources - Curry School of Education
SAGE Stats
The World Bank DataBank | Explore . Create . Share
HRSA Data Warehouse Home Page
dblp: Georgiy M. Levchuk
This $30 Gadget is Actually Three Devices In One
Today's Best Deals: Jabra MOVE, Arlo Security System, $39 Drone, and More
Category:Name - DocuWiki
[Chrome] Graph out tabs by URLs and windows with GraphiTabs | Reviews, news, tips, and tricks | dotTechdotTech
DGs - Migration and Home Affairs - What we do - Policies - Crisis & Terrorism
DGs - Migration and Home Affairs - What we do - ...Crisis & Terrorism - Securing dangerous material
Electrospaces.net: How NSA targeted the Venezuelan oil company PdVSA
Proceedings of the 2015 SIAM International Conference on Data Mining (Society for Industrial and Applied Mathematics)
eScholarship: Search Results
UC Berkeley [eScholarship]
Eternal Storms Software
Should the Secret Service Hand Over Its Cybersecurity Responsibilities? - Nextgov | Fed Tech Ticker
Field Guide
firstdraftnews.com » Your guide to navigating eyewitness media, from discovery to verification- Verifying Russian airstrikes in Syria with Silk, two months on
» Create a Packfirstdraftnews.com- Geolocation skills
» Resourcesfirstdraftnews.com- France24’s The Observers
Top Secret Effort By U.K. Scientists: Analyzing Potential Islamic State, al Qaeda Weaponization Of The Ebola Virus; But, The Next Global Pandemic Might Just Be Downloaded From The Internet" - Fortuna's Corner
frakintosh
Researchers find a way to identify gender from...
Fusion 2015
Fusion 2015 papers
Afghan Taliban Detail Fight Against Uzbek IS Militants
Get Hibou
ISIS State-Building Manual Leaks Online
Isis News, Videos, Reviews and Gossip - Gizmodo
Unprecedented Image Shows a Dolphin's Echolocated Impression of a Submerged Human
Rummaging in the Governments attic: Governmentattic.org
greta's gouge: Friday's Miscellany 11-27-2015
Home - Maps & Other Cartographic Information - LibGuides at Portland State University
New Tools To Sift Through Data - i-HLS
ICCT | International Centre for Counter-terrorism – The Hague
Publications / ICSR ICSR
IEEE Xplore Abstract - Efficient Techniques for Online Record Linkage
IEEE Xplore Abstract - Analyzing terrorist incidents to support counter-terrorism - Events and methods
IEEE Xplore Abstract - Application of multi-level fusion for pattern of life analysis
Home | IIP Digital | U.S. Department of State
Researchers find a way to identify gender from fingerprints - Interesting Engineering
International Society of Information Fusion
FUSION 2014 | International Society of Information Fusion
Journal of Advances in Information Fusion | International Society of Information Fusion
Fusion Related Publications | International Society of Information Fusion
How to Win a ‘Cyberwar’ with ISIS. « JESTERS COURT – OFFICIAL BLOG
Jan Prokaj, Ph.D. - Publications
Johnny Lists — 10 Subscriptions Worth the Money
JournalSeek - A Searchable Database of Online Scholarly Journals
Notefile 2.7 for Mac ~ Mac OS X ~ Junecloud
Kaiser Daily Global Health Policy Report | Ebola | Search Results | The Henry J. Kaiser Family Foundation
A hacker who broke details during the shooting in San Bernardino - Todd Herman at KIRORadio.com
Cool Tools | Cool tools really work. A cool tool can be any book, gadget, software, video, map, hardware, material, or website that is tried and true. All reviews on this site are written by readers who have actually used the tool and others like it. Items can be either old or new as long as they are wonderful. We only post things we like and ignore the rest. Suggestions for tools much better than what is recommended here are always wanted. Tell me what you love.
Page not found | Cold Spring Harbor Laboratory News Blog
Metadata Investigation : Inside Hacking Team | Share Lab
Unlisted - All this
Introductie - LIACS - Leiden Institute of Advanced Computer Science
Greta Marlatt - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Do you know what type of source it is? | Portland State University Library DIY
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Master Your Browser's Tabs with These Tricks and Extensions
An Adult's Guide to Hygiene (for Those Who Weren't Taught Growing Up)
Most Popular How-To Guides of 2015
Chrome extensions News, Videos, Reviews and Gossip - Lifehacker
Download roundup News, Videos, Reviews and Gossip - Lifehacker
Downloads News, Videos, Reviews and Gossip - Lifehacker
Highlights News, Videos, Reviews and Gossip - Lifehacker
Iphone app directory News, Videos, Reviews and Gossip - Lifehacker
Social gps News, Videos, Reviews and Gossip - Lifehacker
Tabs News, Videos, Reviews and Gossip - Lifehacker
Terminal tips News, Videos, Reviews and Gossip - Lifehacker
Weekend roundup News, Videos, Reviews and Gossip - Lifehacker
The Best Free Add-ins for Microsoft Office
The iOS Ad Blockers that Speed Up Your Browsing the Most
Top 10 Ways to Browse the Web Better on Your Phone
vTabs Puts Tabs in a Side Bar, Can Save Open Tabs for Later
Things we think about when selecting a maker project... | Creativity Lab – Making in School
Insurgency and Security - Springer
A Social Network Analysis Approach to Detecting Suspicious Online Financial Activities - Springer
Fake Injection Strategies for Private Phonetic Matching - Springer
How to Make Drag & Drop Way More Useful on Your Mac « Mac Tips
The World of DIY Genomics with K T Pickard | Mendelspod
Minerva Program Staff (Minerva Initiative)
Model-Based Testing – Ian Craggs | "We must use the light of reason to banish the darkness of superstition" – Brian Cox
Diplomacy, Geopolitics, Strategy, Analysis, New Ideas, Business - moderndiplomacy.eu
Musings about librarianship: 6 common misconceptions when doing advanced Google Searching
Filepane: File Management / MyMixApps
Keeping Hackers Away from Your Car, Fridge and Front Door | The National Interest
Neighborhood Pulse
Amnesty: Most weapons used by IS were seized from Iraqi army - Yahoo News
'Reckless' arms transfers to Iraq fuelled IS crimes: report - Yahoo News
NIJ Journal | National Institute of Justice
Publications Topical Collections
Publications
One Thing Well
Smartphone applications for melanoma detection by community, patient and generalist clinician users: a review - Kassianos - 2015 - British Journal of Dermatology - Wiley Online Library
ReportDetail
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: 56 SITES ON TERRORISM, NATIONAL SECURITY & RADICAL ISLAM
i use this mac os x software: New Releases
Jeff Gill | Professor of Statistics
OSINT Weekly
Search eLibrary :: SSRN
Patents by Inventor Georgiy Levchuk - Justia Patents Database
PDXScholar | Portland State University Research
Oregon Sustainable Community Digital Library | Portland State University Research | PDXScholar
perso.utinam.cnrs.fr/~lages/datasets/WRWU/theta_PR.php
Phys.org - News and Articles on Science and Technology
Phys.org - Proceedings of the National Academy of Sciences
Nature Commentary investigates synthetic-biology disaster
First-ever survey of Do-It-Yourself Biology community challenges myths
Garage scientists benefit society
An introduction to start-ups in synthetic biology
The rise of do-it-yourself biology: A look at the Baltimore underground science space
Diagnostic tools using synthetic biology
New massive dataset of bacterial proteins
Driving metabolic pathways on with sunlight
PopClip Extensions
PQDT Open
SPIE : Profile Summary
Reinvented Software - Together for Mac
Reuben Schug | Search
Sarah's Scribbles
@AcademicsSay: The Story Behind a Social Media Experiment | SAS Confidential
Journal of Strategic Security | USF Libraries | University of South Florida
Journal of Mathematical Physics - Volume 56 Number 11
ISIS recruited experts set to wage chemical attacksSecurity Affairs
Shit My Reviewers Say
Shit My Reviewers Say — Let me expand, using an analogy.
Shit My Reviewers Say — About/Submit
Small Farms and Small Wars: Planting The Garden in Village Stability Operations | Small Wars Journal
Conference Detail for Signal Processing, Sensor/Information Fusion, and Target Recognition XXV
Syrian Civil War Archive
SlackArchive Gives You Public Chat Archive For Free | TechCrunch
http://tejji.com/browser/chrome/extensions/ is not available
The Aviationist » Online flight tracking exposes FBI Aerial Surveillance over San Bernardino Mosque after Terrorist Attack
The Secret History of “I Have a Little Dreidel” | Jewniverse
We have military research to thank for Ebola vaccines
How to Send a Mac to Apple for Repair
A Brief Overview of ABI and Human Domain Analytics
The Transparency Grenade - Julian Oliver, 2012
Sic Semper Tyrannis : Jihadis now integral part in US designs for Syria (by CP)
Sic Semper Tyrannis : Loose ends at San Bernardino
ISIS in Afghanistan: December 3, 2015 | Institute for the Study of War
First Steps Towards the Force of the Future
Myth-Busting French Counterinsurgency
Sports Science, Physiology, and the Debate Over Women in Ground Combat Units
Inside the $2 billion ISIS war machine | WTKR.com
2Do
Twenty-Second International FLAIRS Conference
Academia Obscura - The lighter side of Academia. Silly, not stupid.
SIGNAL Magazine
Table of Contents: December 2015 | SIGNAL Magazine
Afghan War News
Village Stability Operations (VSO) in Afghanistan
Special Operations Joint Task Force - Afghanistan
The Altmetric Bookmarklet - Altmetric
How to Setup a High-Security TOR Laptop Using Kali Linux 2.0 + VirtualBox + Whonix + Bridges + Tor: Dark Net Science Book 1 Revised digital, Boyd Stone, Julia Todd Stone, eBook - Amazon.com
Todo - The ORIGINAL To-Do Task List
Apple Thunderbolt Display (27-inch) - Apple
Good luck, Charlie | Article | The United States Army
http://www.aymennjawad.org/2015/12/the-islamic-state-masterplan-of-administration is not available
BBC - Future - How dark is your personality?
Build your own recruitment video | Bio-Link
Bio-Link Equipment Depot Resource Guide | Bio-Link
BMC Medical Informatics and Decision Making | Full text | Preparation of name and address data for record linkage using hidden Markov models
Journals
Islamic State Recruiting 'City Wolves' For 'Guerrilla War In America' - Breitbart
Rethinking Political Islam | Brookings Institution
BUGSS: Baltimore's Under Ground Science Space - a place for creative biology - Home
Anonymous starts targeting suspected ISIS extremists - Business Insider
Here's how much ISIS makes in a day - Business Insider
How ISIS and Al Qaeda make their money - Business Insider
'ISIS is a state-breaker' — here's the Islamic State's strategy for the rest of 2015 - Business Insider
Leaked documents show how ISIS is building its state - Business Insider
BuzzFeed
Literally Just A Bunch Of Funny Tweets About Celine Dion
21 Grandmas Who Have Zero Fucking Filter
Effective Counterterrorism and the Limited Role of Predictive Data Mining | Cato Institute
IBC Threat Assessment November 2015 | CBRNe Portal
Better manage files on a Mac with FilePane - CNET
The Community for Technology Leaders • IEEE Computer Society
Letter from Paris | CrimethInc. Far East Blog
Gulf of Aden Security Review - December 7, 2015 | Critical Threats
2015 Yemen Crisis Situation Report: December 7 | Critical Threats
Islamic State: Why Afghanistan isn't panicking – yet - CSMonitor.com
Passcode - The Christian Science Monitor - CSMonitor.com
The secretive industry of social media monitoring - CSMonitor.com
Islamic State adds smartphone app to its communications arsenal - CSMonitor.com
Move over CISO: The Chief Data Officer may be sharing part of your job | CSO Online
Cubic Corporation | Global Defense | Transportation Systems
ISIS member Anatoly Zemlyanka dubbed the Russian Jihadi John revealed | Daily Mail Online
ISIS News - Latest Updates and Videos on the Islamic State | Daily Mail Online
Hundreds of Tunisian women join ISIS in Syria: minister | News , Middle East | THE DAILY STAR
Data Science Toolkit
SOCOM’s Votel Is Top Choice to Take Over CENTCOM - Defense One
DeltaWalker Downloads
Command and Control Research Portal
Due: The Superfast Reminder App for Mac
Eisen Lab: UC Berkeley
The Growing World of Do It Yourself Health | Eye on FDA
GAO-05-33, Homeland Security: Agency Plans, Implementation, and Challenges Regarding the National Strategy for Homeland Security
2014-05-14 FOIA DTRA - record index/bibliography - George Air Force Base, CA - George Air Force Base, CA
Home: Global Governance Futures program (GGF)
GigaScience | Volume 4
Global Health Hub: news and blogosphere aggregator - Keeping up with global health & development news, blogosphere, forums, events, jobs and more
HOW-TO GUIDES | GoHacking
Interactive online Google tutorial and references - Google Guide
Google Search Operators - Google Guide
Your guide to the Google Play app: How to get more from Google’s store | Greenbot
Harvard Kennedy School - Program in Criminal Justice :: Research & Publications :: Executive Sessions :: Executive Session on Policing and Public Safety (2008-2014)
Homeland Security News Wire |
“If You Learn from MOOC, You Are an Evil Person” – Science « Homolog.us – Bioinformatics
First-time Visitor? | HUD USER
Share files Online Instantly, No Need To Wait Till File Upload - I Love Free Software
Automatically Find New Email Contacts In Your Gmail Inbox
Anonymous vows to take down Isis: how Twitter has become a battleground for propaganda | News | Lifestyle | The Independent
(6421) Inoreader - DIY
Top Siri Tips: 21 Amazing Things You Didn't Know Siri Can Do | iPhoneLife.com
www.itecsd.org
Journalist's Toolbox Update: Dec. 6, 2015 - The Journalist's Toolbox
The Journalist's Toolbox: Public Safety Archives
Kaleidoscope — File comparison for Mac
Afghanistan's precarious security has officials pointing fingers - LA Times
Lazy Scholar | Extension
Copied for Clipboard Syncing
That Syncing Feeling
The Hidden Convenience in iOS 9
Backups for the creative pro | Macworld
For Only $39 You Can Get 1TB Of Cold Cloud Storage For Life
The Marketing Jewru
George C. Marshall Center - European Center for Security Studies - Public Web - ttest
MBW Picks | A summary of the featured books, hardware, & software apps as selected by the hosts of MacBreak Weekly.
McSweeney’s Internet Tendency: It’s Rotting Decorative Gourd Season, Motherfuckers.
Sensors | Special Issue : Sensors for Indoor Mapping and Navigation
Body Strain Sensor Made of Chewing Gum and Carbon Nanotubes | Medgadget
Rapid ID of Squishiness of Cells to Help Improve Cancer Diagnostics | Medgadget
Medical Technology News | Medgadget
Find your people - Meetup
Hacks/Hackers Portland (Portland, OR) - Meetup
Public Records: How and Why to Access Them (KBOO News Research Club) - Hacks/Hackers Portland (Portland, OR) - Meetup
Portland Santacon™ 2015 - Portland Outdoor Adventurers Club (Portland, OR) - Meetup
MLS Cup: Columbus Crew SC still stunned by missed call: "It was probably a yard out" | MLSsoccer.com
Portland Timbers' plan to pressure Columbus Crew SC from the get-go leads to fastest goal in MLS Cup history | MLSsoccer.com
Modus Operandi - Smart, Big, Easy - Intel Analytics
Events Archives - Modus Operandi
Amnesty International: 'Reckless Arms Trading' Fuels ISIS War Crimes in Iraq, Syria
NIJ Home Page NIJ Home
Papers From the Harvard Executive Session on Policing and Public Safety | National Institute of Justice
Nuclear and Non-Nuclear Weapons States on the NPT • CNS
Is This Congressman's 'Oversight' An Effort To Hobble Climate Science? : NPR
West Point - Home
Civilian Deaths Raise Questions About C.I.A.-Trained Forces in Afghanistan - The New York Times
OneTab shared tabs
OneTab shared tabs
Home - On The Media
The Breaking News Consumer's Handbook - On The Media
The Breaking News Consumer's Handbook: Active Shooter Edition - On The Media
Dabiq Magazine - On The Media
The Language of Terror - On The Media
Search OpenGrey
Search OpenGrey
Subjects OpenGrey
SciTech Connect: Your connection to science, technology, and engineering research information from the U.S. Department of Energy
An ISIS Jailbreak at Abu Ghraib: "Hell Is Coming" | FRONTLINE
Search Engines | Pearltrees
Beautiful web-based People Plots and Family Trees
San Bernardino Shooting
Synthetic biology devices for in vitro and in vivo diagnostics
Security Solutions International Staff - The Counter Terrorist
Cyber vigilantes: Citizen hackers go to war against terrorists
Home - Project Gray
The 2015 Legatum Prosperity Index - Home
Radicalization, Linkage, and Diversity: Current Trends in Terrorism in Europe | RAND
2015 Holiday Gift Guide for Social Workers
Growing Terrorist Threat Requires New U.S. Investments in Counter-IED Capabilities | RealClearDefense
Model-based Organizational Design for Future Systems
Social media terrorist activity bill returning to Senate | Reuters
Science.gov: USA.gov for Science - Government Science Portal
Weaponized Ebola: Is It Really a Bioterror Threat? - Scientific American
Individuals' Blood Glucose Levels After Meals May Be Predictable - Scientific American
The Week's Top Science Communication Stories (12.4.15) › The Leap
SuperDuper!
Overview of Potential Agents of Biological Terrorism
Lab Making and Open Hardware 4 HTGAA
‘Muslim-Free’ gun shop owner claims legal victory
SpeakDolphin
The Springer Shop Special
10 Scariest Bioweapons | Stuff to Blow Your Mind
Stupid Shit No One Needs & Terrible Ideas Hackathon
The Rise of Do-It-Yourself Biology: A Look at the Baltimore Underground Science Space (BUGSS) - Synthetic Biology Project
Seven Myths and Realities about Do-It-Yourself Biology - Synthetic Biology Project
Abductions, kidnappings and killings in the Sahel and Sahara - Review of African Political Economy - Volume 38, Issue 130
AN OVERVIEW OF DATA MINING FOR COMBATING CRIME - Applied Artificial Intelligence - Volume 26, Issue 8
Assessing the Abu Sayyaf Group's Strategic and Learning Capacities - Studies in Conflict & Terrorism - Volume 37, Issue 3
The failure of police ‘fusion’ centers and the concept of a national intelligence sharing plan - Police Practice and Research - Volume 13, Issue 2
Social network analysis and counterinsurgency: a counterproductive strategy? - Critical Studies on Terrorism - Volume 3, Issue 2
European Journal of Sport Science - Volume 15, Issue 7
Virtual Crash Tests Use Data to Simulate Effects Better Than Mannequins | MIT Technology Review
Software That Can Spot Rookie Mistakes Could Make Wikipedia More Welcoming | MIT Technology Review
Cocaine Cravings Zapped with Magnets | MIT Technology Review
Search Engine Censys Knows the Internet’s Dirty Little Security Secrets | MIT Technology Review
Recommended from Around the Web (Week ending December 5, 2015) | MIT Technology Review
Junk-Eating Rocket Engine Could Clear Space Debris | MIT Technology Review
Wikipedia-Mining Algorithm Reveals World’s Most Influential Universities | MIT Technology Review
'Drummers are natural intellectuals' - Telegraph
Two Neglected Areas of Terrorism Research: Careers after Terrorism and How Terrorists Innovate | Weinberg | Perspectives on Terrorism
Preventing Lone Wolf Terrorism: some CT Approaches Addressed | Bakker | Perspectives on Terrorism
Top 25 News Photos of 2015 - The Atlantic
The Awl
Exclusive: Secret U.S. Hostage Held by Taliban Allies - The Daily Beast
U.S. Intel to Obama: ISIS Is Not Contained - The Daily Beast
The Isis papers: behind 'death cult' image lies a methodical bureaucracy | World news | The Guardian
The Isis papers: a masterplan for consolidating power | World news | The Guardian
The Isis papers: leaked documents show how Isis is building its state | World news | The Guardian
Islamic State | World news | The Guardian
Trump Gives Muslim On Fence About Radicalizing Just The Push He Needed - The Onion - America's Finest News Source
A 12-bomb, 6,000-bullet arsenal and terrorist links: The terrifying world of US massacre pair | The Sun |News
Expert Insight: Securing Smart Cars - Security News - Trend Micro USA
Nuclear Weapons | Union of Concerned Scientists
UCS Satellite Database | Union of Concerned Scientists
Progress on Nuclear Arms Control (2015) | Union of Concerned Scientists
Institute for the Study of War
Russia's False Narrative in Syria: December 1, 2015 | Institute for the Study of War
News in Brief 07 December 2015 (PM) | United Nations Radio
An Open Letter to Tinder’s Sean Rad from Vanity Fair’s Nancy Jo Sales | Vanity Fair
Speed, Social Media Shape Counterterrorism Probes
Aptonic - Dropzone 3
Aptonic - Dropzone 3 Actions
Advances in Cross-Cultural Decision Making - Google Books
Which iOS Content Blocker is the Fastest? — The Brooks Review
BundleHunt | A one-stop daily deals site
Collections | Twitter Developers
Pocket: My List
Encryption, “Dark Spaces” Demonized on Both Sides of the Aisle | Hacked
Utilities - Mac App Store Downloads on iTunes
Joe On Tech
Joe On Tech • Archive
Maintaining Your Mac: A Joe On Tech Guide
The Joe On Tech Manifesto
Principles in the administration of the Islamic State | Peace and Freedom
Browse and Download Torrents - Kickass Torrents
Profile of Blink99 - Uploads - Kickass Torrents
Profile of Dr.Soc - Uploads - Kickass Torrents
Profile of k3746 - Uploads - Kickass Torrents
Profile of P-R-G - Uploads - Kickass Torrents
Profile of pradyutvam2 - Uploads - Kickass Torrents
Profile of wolfye - Uploads - Kickass Torrents
Inbox (27) - scitrenbaum@gmail.com - Gmail
Inbox (27) - stczztop@gmail.com - Gmail
Marketing Intelligence Tools by Robin Good | ZEEF
95 tools for investigative journalists — Medium
Increasing workflow efficiency on your Mac with — FilePane — Medium
From a robotic lab in a garage to a kinder world. — Medium
Moldovan Alumni hold Roundtable ‘Security through Cooperation: Current Issues in the Context of a New Draft National Security Strategy’ | GlobalNET
Resource Library in George C. Marshall European Center for Security Studies | GlobalNET
MyPCC Login | Portland Community College
VICE News
One Tap Less | Actions
How I Stay Productive and Get Massive Amounts of Shit Done
Pinboard: Searching scitrenb
Pinboard: public bookmarks for flobosg
Pinboard: public bookmarks for geeknik
Pinboard: public bookmarks for jranck
Pinboard: public bookmarks for petej
Pinboard: public bookmarks for tamberg
Pinboard: public bookmarks for tamberg
Mobile Sensor Apps for Learning - Community - Google+
Search portlandstate.on.worldcat.org
https://publicintelligence.net/un-report-on-isil-ansar-al-charia-al-qaeda-threat-in-libya-november-2015/ failed to load
RUSI | Royal United Services Institute
David Skillicorn - Google Scholar Citations
James Scrofani - Google Scholar Citations
James Scrofani - Google Scholar Citations
Churches: Preparation of name and address data for... - Google Scholar
Millar: Document Clustering and Visualization with... - Google Scholar
DATA MINING AND DATA ANALYSIS FOR COUNTERTERRORISM - Google Scholar
Miller: Cyberspace and Real-World Behavioral Relationship... - Google Scholar
Millar: Document Clustering and Visualization with... - Google Scholar
Cohen: Mass surveillance and state control: the total... - Google Scholar
Taylor: The failure of police ‘fusion’centers... - Google Scholar
Young: Detecting Unknown Insider Threat Scenarios - Google Scholar
US Federal Geographic Data Committee: Homeland Security... - Google Scholar
Abramowicz: System for Detection of Illegal Drugs E-Trading. - Google Scholar
Christen: Similarity-aware indexing for real-time... - Google Scholar
Mac Ginty: Social network analysis and counterinsurgency:... - Google Scholar
Thuraisingham: Security standards for the semantic web - Google Scholar
Guzik: Discrimination by Design: Data Mining in the... - Google Scholar
Miller: Acquisition program problem detection using... - Google Scholar
Christen: A probabilistic geocoding system based... - Google Scholar
Jackson: Understanding Why Terrorist Operations Succeed... - Google Scholar
Mahmood: Analyzing terrorist incidents to support... - Google Scholar
Vatsalan: An efficient two-party protocol for approximate... - Google Scholar
Jonas: Effective counterterrorism and the limited... - Google Scholar
Thuraisingham: Data mining for counter-terrorism - Google Scholar
Bruce Skarin - Google Scholar Citations
Google Scholar Citations
Searchable Ornithological Research Archive
Keyboard shortcuts - Chrome Help
MVGroup - TPB
Smart on Isis from Tim Dickinson on Twitter
(8) Twitter
Anna Filina (@afilina) | Twitter
estNATO on Twitter: "Two #B-2s join three #B-52 #Stratofortresses for exercises in #Europe #BALTOPS2015 http://t.co/HqmwUV1GAa http://t.co/C5BCmvZ9h2"
GitXiv (@GitXiv) | Twitter
Anonymous (@GroupAnon) | Twitter
Ian Craggs (@icraggs) | Twitter
James J.F. Forest (@JJFForest) | Twitter
Joe On Tech (@joeontech) | Twitter
southpaw (@nycsouthpaw) | Twitter
ONA15 (@ONAConf) | Twitter
(4) Open Source Intel US (@OSINT_US) | Twitter
Paulo (@paulo_cepeda) | Twitter
Paulo (@paulo_cepeda) | Twitter
Nathan C. Hall (@prof_nch) | Twitter
Research Wahlberg (@ResearchMark) | Twitter
Rhonda Bletner (@RhondaBletner) | Twitter
(10) @RhondaBletner/Journalists/Journalism on Twitter
Shadi Hamid (@shadihamid) | Twitter
Pamela Merritt (@SharkFu) | Twitter
David Holmes (@spikefodder) | Twitter
@spikefodder/Mobile Journalism on Twitter
(22) USOSINT (@USOSINT) | Twitter
Tomi Satryatomo (@wisat) | Twitter
@wisat/Journalist-Tools on Twitter
Worf Email (@WorfEmail) | Twitter
Yaogwai (@Yaogwai) | Twitter
ShitMyReviewersSay (@YourPaperSucks) | Twitter
Terrorism
Arming ‘Islamic State’ – facts and figures | Amnesty International
Iraq: ‘Islamic State’ atrocities fuelled by decades of reckless arms trading | Amnesty International
Everything you need to know about human rights. | Amnesty International
Center for Homeland Defense and Security | The Nation's Homeland Security Educator
Ebola: Not an Effective Biological Weapon for Terrorists | Combating Terrorism Center at West Point
George C. Marshall European Center for Security Studies | GlobalNET
Guide to Chromebook Privacy Settings for Students | Electronic Frontier Foundation
Geek Culture Caps and Propeller Beanies!
The Joy of Tech Archives!
Model-based Organizational Design for Future Systems - Google Search
Peace and Stability Journal - Google Search
fighting terror in cyberspace - Google Search
FOI responses released by MOD: week commencing 26 January 2015 - Publications - GOV.UK
Human biology merges with technology as Biohackers implant LED's under the skin
Weapons of Mass Destruction | www.hampshire.edu
Homeland Security Digital Library (HSDL): Search Results
Answering San Bernardino (Part 1): Defining Terrorism and Home Grown Extremism - Homeland Security Digital Library Blog
"Power Wars" in 100 Tweets - Lawfare
Egypt-Gaza tunnels: the lifeline under threat
The sinister truth behind Israel’s naval blockade
Sisi says Gaza tunnels flooded in coordination with PA
Egyptian army says it destroyed 20 Gaza tunnels in November
Downloads | Personal.com
Marvelous Mac Apps - Useful Mac apps you probably aren't using (but should) by Product Hunt
Project Syndicate - Opinion Articles from the World's Thought Leaders
Intelligence: news and discussion about Intelligence and espionage matters around the world
French 'Anonymous' Releases Names of Suspected ISIS Recruiters : Intelligence
Please stop repeating that the "media ruined a crime scene". They didn't, the FBI said they were done with the scene. EVERY OTHER criticism is valid, just not THIS one. It is misinformation. : KotakuInAction
Middle East Conflicts Subreddit
Syria's Civil War (2011—ongoing)
Home Feed
Georgiy M. Levchuk
Islamic State’s leaked nation-building plans show 'only Sunni forces' can beat them - general — RT UK
Lone Wolf Report | Southern Poverty Law Center
General Michael Hayden on Obama’s Speech | The Cipher Brief
Big, Open & Beautiful #7: Smart citizens - Waag Society
This armored vehicle lets you use PowerPoint on the battlefield - The Washington Post
Why was President Obama standing during his Oval Office address? - The Washington Post
The big hole in Obama’s Islamic State strategy - The Washington Post
CIA runs shadow war with Afghan militia implicated in civilian killings - The Washington Post
Army recommends no further punishment for Petraeus - The Washington Post
Director's Corner Journal Update Volume 6, Issue 1 - YouTube
Sh*t Portlanders Say - YouTube
Search ‘tag:ios’ | ZEEF
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.