Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,033 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTab Tab Group
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Mac Tips
Copy links to clipboard
Copy
Open
How to add and print to a WiFi or network printer - How to - Macworld UK
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
Quick Look - OS X El Capitan: The Missing Manual [Book]
Must Have MacOS Quick Look Plugins | Sayz Lim
sindresorhus/quick-look-plugins: List of useful Quick Look plugins for developers
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
for Mac OS X | Favorite Book Reader
Quick Look - Wikipedia, the free encyclopedia
Quick Look Plugins Make File Browsing On OS X Even Better
How to View Epub, Kindle eBooks in OSX Quick Look | The Digital Reader
OS X Hidden Treasures: Services
OS X Hidden Treasures: Quick Look
Daring Fireball: Markdown Syntax Documentation
BetterZip 3 - Easy Zip and Unzip for Your Mac
09-22
Copy links to clipboard
Copy
Open
High-Priority Information Technology Needs for Law Enforcement | RAND
Law Enforcement | RAND
License Plate Readers for Law Enforcement: Opportunities and Obstacles | RAND
Browse RAND Reports by Series | RAND
First Responders | Homeland Security
FRG Publications | Homeland Security
Publications Library | Homeland Security
Counterterrorism Publications | Homeland Security
Communication Systems | RAND
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage | RAND
Corrections Technology and Practice Taxonomy | RAND
Social Media Research: Behavioral Sciences | Explore Taylor & Francis Online
System Dynamics Conference
EMM News Explorer
Social Media Research | Explore Taylor & Francis Online
LandsatLook Viewer
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AutomatingOSINT.com - Learn How to Automate OSINT Collection
Monthly Newsletter
MacStories Weekly: Issue 49
Yahoo’s Data Breach: What to Do If Your Account Was Hacked - Bloomberg
INSS Military and Strategic Affairs
Broadway Musicals: A Jewish Legacy | Full Episode | Great Performances | PBS
Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake' | Reuters
Advancing machine learning algorithms that could predict terrorist threats | START.umd.edu
Developing algorithms to thwart terrorism | START.umd.edu
OSINT Forum by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Gmail - MacStories Weekly: Issue 49
Emails From A CEO Who’s Making The Presentation Himself This Time – Slackjaw – Medium
Algorithms in plain English: time complexity and Big-O notation
FlashAlert Newswire
Security Experts Agree: The NSA Was Hacked
The Spies Who Loved iPhones
AngelsBwayTunes - YouTube
On the reception and detection of pseudo-profound bullshit
How to Change Yahoo Password
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
TRIPwire
So You Think You're Smarter Than A CIA Agent : Parallels : NPR
Andrew Sullivan: My Distraction Sickness — and Yours
Apple Music Customer Service Lauren Totally Nails It
Detecting emotions with wireless signals | MIT News
BrettTerpstra.com
Security Informatics | Home page
Jigsaw - Visual Analytics for Investigative Analysis
II Projects Page
II Publications Page
Information Visualization Links Page
Software Visualization Publications
John Stasko's Publications
Information Interfaces Group
VACCINE - Discovery Park
Information Technology Laboratory | NIST
Charlotte Exposes a Critical Flaw in the Rise of Body Cams | WIRED
jeff weyers - Google Search
FAQ
greta's gouge: Friday's Miscellany 09-16-2016
Sean Gourley: The mathematics of war | TED Talk | TED.com
Hany Farid
Us and them: identifying cyber hate on Twitter across multiple protected characteristics | EPJ Data Science | Full Text
The Science of Tannerite - Explosive Likely Used in Chelsea Bombing
Sense-making for intelligence analysis on social media data | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Social media for intelligence: practical examples of analysis for understanding | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Defense Innovation Marketplace
Analysis of the current situation in the global Jihad total war jihadica
Sensors | Free Full-Text | Small Moving Vehicle Detection in a Satellite Video of an Urban Area
WARNING : Russia Issues New “Rules of Engagement” in Syria: Any Aircraft Threatening the Syrian Army WILL BE SHOT DOWN (US/Turkey/Israel in the cross-hairs!)
The New York Times - Breaking News, World News & Multimedia
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
portland science/biotech - craigslist
Jeff Weyers | re:publica
Next-Generation Social Media Intelligence Analysis - Google Scholar
Next-Generation Social Media Intelligence Analysis - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods - Google Search
SA.660.732- Insurgency and Counterinsurgency - Google Search
Small Moving Vehicle Detection in a Satellite Video of an Urban Area - Google Search
quizlet biology protists slides - Google Search
socmint - Google Search
socmint tools - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Timeline: US Policy on ISIS | Wilson Center
Tentative Schedule
Journal of Strategic Security | USF Libraries | University of South Florida
How Police Trace Cellphones in IEDs Like the Ones in NYC | WIRED
QuickLook Plugins List
CCI Blog » Blog Archive » Searching the Dark Web
Disruptive Technologies Push Bioterrorism To A Whole New Level - The Medical Futurist
TII Online Research and Intelligence Newsletter - September 2016
EPIC - EPIC Online Guide to Practical Privacy Tools
BBB Scam Tracker
Investigative Dashboard
JSON To CSV Converter
C.J. Chivers (@cjchivers) | Twitter
Resources - Toddington
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Turkey is the export-hub for detonating cords; a crucial component for IEDs used by ISIS and Jabhat al Nusra affiliates – Doğu Eroğlu
Doğu Eroğlu
C. J. Chivers on Sulfur Mustard Attack (with tweets) · crofer · Storify
Current.ly
FindGram - Search Instagram Photos
GeoSocial Footprint
Wonder How To » Fresh Hacks For a Changing World
This Tool Lets You Check If Your Personal Info Is on the Dark Web | Motherboard
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Finding a Nuclear Weapon: Hope Beyond the Screwdriver | The National Interest Blog
snitch.name :: The Social White Pages
News Article – Center for Security Studies | ETH Zurich
8 Search Tricks That Work on DuckDuckGo but Not on Google
How Spy Tech Firms Let Governments See Everything on a Smartphone - The New York Times
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations | RAND
Terrorism and Political Violence: Vol 28, No 4
Computer Crime Presentations and Training by Michael Bazzell
Watched - Post and Courier
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Hany Farid - Google Scholar Citations
(2) bellingcat (@bellingcat) | Twitter
C.J. Chivers on Twitter: "just like crazy IED twitter, expect hyperventilating. mustard & ISIS are not new. and mustard is typically much less lethal than explosives."
(7) JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
How To Protect Your Data And Remove Personal Information From The Internet | Abine
SOCMINT, OSINT - Google Search
open source spying - Google Search
How One Journalist Uses Social Media to Get Inside the Minds of ISIS | WIRED
Russian Hackers Get Bolder in Anti-Doping Agency Attack | WIRED
How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone | WIRED
The Quest to Build a Portable Anti-Neutrino Detector for Nukes | WIRED
Cifas: Data to Go - YouTube
Forecasting the Future: Can The Hive Mind Let Us Predict the Future?
Metaculus
Good Judgment® Open
CymaSpace | We make arts & cultural events more accessible & inclusive to the Deaf & Hard of Hearing through Technology, Education & Outreach.
Used Coffee Grounds Can Clean Contaminated Water | Popular Science
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
IJGI | December 2015 - Browse Articles
Black Hat USA 2016 | Arsenal
Spatial Science | Open Access Articles | Digital Commons Network™
Social Media | Open Access Articles | Digital Commons Network™
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
Who’s Afraid of the Big, Bad Bioterrorist?
PLOS ONE: Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
PLOS ONE: Measures of Human Mobility Using Mobile Phone Records Enhanced with GIS Data
Dynamic User Attribute Discovery on Social Media - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Statistics and Probability | Open Access Articles | Digital Commons Network™
Geography | Open Access Articles | Digital Commons Network™
Technical Program | 2016 IEEE Workshop on Statistical Signal Processing
EBSCOhost | 117599006 | Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism.
EBSCOhost | 117742343 | Deterring Emergent Technologies.
EBSCOhost | 117742345 | DARPA Emerging Technologies.
EBSCOhost | 117613471 | Prototyping an Automated Video Surveillance System Using FPGAs.
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism / CSJM v.24, n.2 (71), 2016 / Issues / CSJM / Publications / IMCS
IJGI | Special Issue : Big Data for Urban Informatics and Earth Observation
IJGI | Special Issue : Geoinformation for Disaster Risk Management
Evaluation of Urban Mobility Using Surveillance Cameras
Using Analytics and Social Media for Monitoring and Mitigation of Social Disasters
Advances in data-driven computational social sciences
Information Systems Architecture and Technology: Proceedings of 37th ... - Google Books
EPJ Data Science | Home page
Why WMD Terrorism Isn’t as Scary as it Seems – Politics in Theory and Practice
Fabio Pinelli - Google Scholar Citations
Dou Wenwen - Google Scholar Citations
Dobra: Spatiotemporal detection of unusual human... - Google Scholar
Dong: Inferring unusual crowd events from mobile... - Google Scholar
Leo: Call detail records to characterize usages and... - Google Scholar
Stein: Visual Soccer Analytics: Understanding the... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
A survey of data mining and social network analysis based anomaly detection techniques
Roick: Location based social networks–definition,... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
Black Hat USA 2013 | Briefings
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism. - Google Search
Copper Thermite Explodes and Smolders Successfully | Hackaday
Watch Full Episodes Online of NOVA on PBS | 15 Years of Terror
NOVA - Official Website | 15 Years of Terror
CEH.V6.-.Module - Google Search
09-24
Copy links to clipboard
Copy
Open
A look at the explosives used in the New York bombing | September 26, 2016 Issue - Vol. 94 Issue 38 | Chemical & Engineering News
Amphetamine boosts rats’ recovery from brain injuries | Chemical & Engineering News
How the NYPD Turned Itself Into a Little CIA
How Palantir Is Taking Over New York City
How To Get Slack Notifications on Gmail
Networks of New York » Melville House Books
Using Sound and Artificial Intelligence to Detect Human Rights Violations | iRevolutions
A Walking Tour of New York’s Massive Surveillance Network
How Hired Hackers Got “Complete Control” Of Palantir - BuzzFeed News
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Afghan War News
Afghan War News: Afghan Security News - Good and Bad
Afghan War News: RS Cdr's News Conference - Some Facts and Some Spin
OK, nvALT 2.2 take 2 - BrettTerpstra.com
Deals - Kinja Deals
Saturday's Best Deals: Dyson Fan Heater, Tevas, Bluetooth Headphones and More
Buying Guide: Affordable Accessories For Your Car
Airmail for iPhone Gets a Bunch of iOS 10 Integration Features
All the New Features in iOS 10 In Two Minutes
All the New Features in macOS Sierra
Build An Insanely Small, Fully Functional MAME Cabinet
Google Trips Personalizes and Automates Your Travel Plans From Start to Finish
Learn How to Win at Carnival Games With This Handy Guide
Polarr 3.0 Uses iOS 10's Facial Recognition for Robust, Automatic Photo Retouching
Speedify 4.0 Uses Wi-Fi and Mobile Data At the Same Time for Better Speed and Reliability
SwiftKey's New "Neural Network" Text Prediction Is Impressively Good
The Quickstart Guide to Decluttering Your Home
Top 10 Secret Features in iOS 10
Top 10 Ways to Improve Your Daily Commute
Resources and Links | Arthur D. Simons Center
How to Choose the Best Facial Moisturizer for Healthy Skin
The Coming of the Russian Jihad: Part I
Afghan War News
The Case for Integrated Civilian, Military ISR/C4ISR Stra | Defense News
Minnesota Mall Stabbing Could Be Realization of Terror Fears | Military.com
'Likes' Less Likely to Affect Self-Esteem of People with Purpose
Visual Hunt: 350+ Million Photos For Free Commercial Use | NOUPE
Using social network analysis to prevent money laundering
Cellphone Bombs: The New American Terror - The Daily Beast
How the New York City Bomber Was Caught - The Daily Beast
Indoor navigation tool for blind individuals now available as open-source app
Tribal Leaders Say IS Regrouping in Afghan-Pakistan Border Areas
S&T News | Homeland Security
Information & Analysis | EUROPEAN ASYLUM SUPPORT OFFICE
Analysis and Statistics | EUROPEAN ASYLUM SUPPORT OFFICE
Country reports | EUROPEAN ASYLUM SUPPORT OFFICE
EASO publishes a Country of Origin Information (COI) report on recruitment by armed groups in Afghanistan | EUROPEAN ASYLUM SUPPORT OFFICE
Types of operations | EUROPEAN ASYLUM SUPPORT OFFICE
National Preparedness Report | FEMA.gov
Losing in Afghanistan | Foreign Affairs
A Director of the Present? Nowcasting Homeland Security’s Challenges - HOMELAND SECURITY AFFAIRS
HOMELAND SECURITY AFFAIRS - The Journal of the NPS Center for Homeland Defense and Security
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
National Preparedness Directorate | FEMA.gov
Naval Postgraduate School
Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes | WIRED
FEMA & DHS
Copy links to clipboard
Copy
Open
Browse 6,645 Document files | FEMA.gov
OpenFEMA | FEMA.gov
Technology
List of Awards
Technology Research, Development, Testing, and Evaluation Process | National Institute of Justice
Preparedness, Response and Recovery Publications | Homeland Security
National Incident Management System | FEMA.gov
S&T Publications | Homeland Security
Inbox (231) - scitrenbaum@gmail.com - Gmail
Through-the-Wall Surveillance | National Institute of Justice
DHS Policy Regarding the Use of Cell-Site Simulator Technology | Homeland Security
List of Awards
arXiv.org Search
Featured Publication Archive | Homeland Security
Detection and Surveillance Technologies | National Institute of Justice
Detecting Items Hidden on a Person or Inside a Body | National Institute of Justice
Detecting Hidden Items and Substances in the Surrounding Environment | National Institute of Justice
Detecting Weapons, Contraband and Chemicals | National Institute of Justice
Enhanced Surveillance for Public and Officer Safety
Cell-site simulators - Google Search
Afghan War News: Afghan Security News - Good and Bad
If You Only Have Room For One Trashy Network Thriller In Your Autumn Viewing Schedule, Make It Secrets & Lies - Secrets & Lies - Previously.TV
Pentagon quietly studying Islamic theology to understand the Islamic State and al-Qaeda
Stephen E. Arnold: Palantir Attacks US Army, Geosparsing, DoD Buries In-Q-Tel, Digital Currencies Neither Anonymous nor Reliable « Public Intelligence Blog
Crowdsourced intelligence gathering can prevent such incidents as Chelsea bombing | Government Security News
Modeling Precursors for Event Forecasting via Nested Multi-Instance Learning
LiveSafe - Safety in everyone's hands and connecting people to help
[1609.07302] Building accurate HAV exploiting User Profiling and Sentiment Analysis
Sensors | An Open Access Journal from MDPI
Computer Vision and Pattern Recognition authors/titles recent submissions
arXiv.org Search
Physical Sensors - A section of Sensors
Sensors | Special Issue : Big Data and Cloud Computing for Sensor Networks
Data Feeds | FEMA.gov
2016 National Preparedness Report | FEMA.gov
OpenFEMA (31) | FEMA.gov
Resources & Documents Collections | FEMA.gov
Emergency Preparedness Materials (Families, Pets, Seniors, Disabled, Businesses) (35) | FEMA.gov
America's PrepareAthon! (11) | FEMA.gov
America’s PrepareAthon! Materials (36) | FEMA.gov
National Preparedness | FEMA.gov
Emergency Alerts | Ready.gov
Make A Plan | Ready.gov
National Preparedness Month | Ready.gov
Types of Technology and Tools | National Institute of Justice
Mapping and Analysis for Public Safety | National Institute of Justice
Office of Science and Technology Policy | The White House
CrimeStat: Spatial Statistics Program for the Analysis of Crime Incident Locations | National Institute of Justice
Course Materials for Intermediate Crime Mapping Using ArcGIS 10.1
List of Awards
Thesis and Dissertation Collection
Homeland Security Market Research
Copy links to clipboard
Copy
Open
Our People - Homeland Security Market Research
Global Homeland Security & Public Safety Market - 2015-2022 - Homeland Security Market Research
U.S. Airport Security Market - 2015-2020
Video Analytics & Intelligent Video Surveillance Technologies
Global Video Analytics
Global People Security Screening: Technologies, Industry & Market - 2015-2020 - Homeland Security Market Research
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
Homeland Security Market Research - Premium HLS & Public Safety Technology & Market Reports
Category - Homeland Security Market Research
Market Reports - Homeland Security Market Research
Category - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Americas Market-2015-2020 - Homeland Security Market Research
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
Middle East & Africa Airport Security Market - 2015-2020 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
Global Homeland Security & Public Safety Industry - 2016 Edition - Homeland Security Market Research
European Homeland Security & Public Safety Technologies & Markets - 2016-2022 - Homeland Security Market Research
U.S. Homeland Security & Public Safety Market - 2016-2022 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Europe, Middle East and Africa Market-2015-2020 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Asia-Pacific Market-2015-2020 - Homeland Security Market Research
Saved Session - Session Buddy
09-26
Copy links to clipboard
Copy
Open
EarlyWarning
Knowledge Foundation - Technology Commercialization Alliance
Media Partners - Homeland Security Market Research
Knowledge Foundation - Technology Commercialization Alliance
Defence and Security | Clarion Events ltd
AnkerDirect @ Amazon.com
Kinja Deals Timbuk2 CMB
MacOS Sierra Breaks Popular Keygens, Pirate Finds Fix - TorrentFreak
Amazon.com: anker powercore - Portable Power Banks / Batteries & Battery Packs: Cell Phones & Accessories
Examining ISIS Support and Opposition Networks on Twitter | RAND
Policy Analysis: Terrorism - The Washington Institute for Near East Policy
Stein Program on Counterterrorism and Intelligence - The Washington Institute for Near East Policy
Literally Trump
Sondergaard: TACTICS - Google Scholar
Real-time crowd labeling for deployable activity recognition
Useful Websites - Radical Islam - LibGuides at FBI Library
greta's gouge: Friday's Miscellany 09-23-2016
Hyper Key hack in MacOS 10.12 Sierra using Karabiner-Elements and Keyboard Maestro - Album on Imgur
inessential: Memory Graph Debugger Tips
How to Stream Tonight's First Presidential Debate Online, No Cable Required
Featured Bag News, Videos, Reviews and Gossip - Lifehacker
The Notebook-Packed Shoulder Bag
I Think Nate Silver Is Broken, Maybe?
Not Up For Debate...
The Stroz Friedberg Cyber Brief — Center on National Security
Technology To Find Concealed Weapons, Coming To Your Street Corner.
Intelligent Automation, Inc.
The Rise of ISIL: Counterterrorism Lectures 2015 - Counterterrorism Lectures 2015 - The Washington Institute for Near East Policy
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Virtual Packs of Lone Wolves – Small World, Big Ideas – Medium
/dev/lawyer The MIT License, Line by Line
Usar Marked 2 para previsualizar AsciiDoc | adictosaltrabajo
Compendium of scenario-based attack profiles and compendium of full scenarios - Google Search
Deployable, near-real time field biometrics - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwi6kfOvo67PAhUP7GMKHaAWA0cQFggvMAQ&url=http%3A%2F%2Fwww.rand.org%2Fcontent%2Fdam%2Frand%2Fpubs%2Fmonograph_reports%2FMR1237%2FMR1237.appa.pdf&usg=AFQjCNFbU2hS_fUp4jwJyt1FHjn2r9a4ug&sig2=WTLF4XXB8X5VhS5aT6BEHg&cad=rja
Predictive policing tools showing situational awareness - Google Search
STEIN COUNTERTERRORISM LECTURES - Google Search
Standoff Electromagnetic Concealed Weapons Detection - Google Search
Title: TACTICS: Policy and strategic impacts, implications and recommendations - Google Search
exploiting social media - Google Search
OJP Publications - National Criminal Justice Reference Service
Advanced Search - ProQuest Dissertations & Theses Global - ProQuest
License Plate Recognition - National Institute of Justice Search Results
American Military University | Online Degrees & Certificates | 877-755-2787 or info@apus.edu
Countering Drones - Day 2
CRCnetBASE
CRCnetBASE
CRCnetBASE
CRCnetBASE - Risk and Crisis Management in the Public Sector
CRCnetBASE - The Counterterrorism Handbook
CRCnetBASE - Effective Surveillance for Homeland Security
CRCnetBASE - Policing Major Events
CRCnetBASE - Soft Target Hardening
CRCnetBASE - Soft Target Hardening
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
National Center for Campus Public Safety Library | NCCPS
Real-Time Crime Forecasting Challenge
Video Analytics for Criminal Justice Uses | National Institute of Justice
Browse - Oxford Reference
Databases and Data Collection, Analysis, and Processing | RAND
The Science and Technology of Counterterrorism - ScienceDirect
Directory of Open Access Journals
National Law Enforcement and Corrections Technology Center TechBeat, September 2016
JTIC Corrections - Contraband Detection and Other Facility Operations and Population Services
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Public Intelligence
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk: Carl Young: 9780124200562: Amazon.com: Books
BJA Body-Worn Camera
A Futurist's Guide to Emergency Management - CRC Press Book
Encyclopedia of U.S. Intelligence - Two Volume Set (Print Version) - CRC Press Book
Grasping the Moment: Sensemaking in Response to Routine Incidents and Major Emergencies - CRC Press Book
New Developments in Biological and Chemical Terrorism Countermeasures - CRC Press Book
Soft Target Hardening: Protecting People from Attack - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
The Complete Guide to Physical Security - CRC Press Book
Security Management from CRC Press - Page 1
Homeland Security from CRC Press - Page 1
Federal Register :: Home - Monday, September 26th
Managing Critical Incidents and Large-Scale Event Security - Google Search
The Science and Technology of Counterterrorism - Google Search
Mass Gatherings; Large-Scale Events Security Symposium – Homeland Security Digital Library
JTIC - Popular Publications
National Criminal Justice Reference Service
NCJRS Abstract - National Criminal Justice Reference Service
DMI TOOLS
Copy links to clipboard
Copy
Open
ToolDatabase < Dmi < digitalmethods.net
DMI single sign-on
Compare Lists
Geo Extraction
Harvester
Image Scraper
Itunes store
Link Ripper
Sentence Ripper
TOOLS
Copy links to clipboard
Copy
Open
Remove Numbers from the Beginning of Terms in a List
Free Online TEXT Tools
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Convertjson.com - Convert JSON to other Formats and Vice-Versa
Clarion Events ltd |
Mefancy Text and html tools
Extract URLs
Data Design Group, Inc.
Add / Remove Line Breaks
Text Alphabetical Order tool
Playlist Machinery
09-26 PM
Copy links to clipboard
Copy
Open
Chris Seibold - O'Reilly Media
How to Download Example Code - Customer Service - O'Reilly Media
Handbook of Terahertz Technologies: Devices and Applications [20 (download torrent) - TPB
Mobile Devices Tools and Technologies [2015] [PDF] (download torrent) - TPB
NoctDeath - TPB
Facebook Graph Search Generator by Henk van Ess and Torment Gerhardsen
Global Video Analytics
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
The Counterterrorism Handbook: Tactics, Procedures, and Techniques, Fourth Edition - CRC Press Book
CRCnetBASE - The Counterterrorism Handbook
Intelbriefs | The Soufan Group
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
Heavy metal music meets complexity and sustainability science | SpringerLink
Intelligent Behavior Modeling on Information Delivery of Time-Sensitive Targets - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Abnormal Event Detection Based on Crowd Density Distribution and Social Force Model - Springer
Pre-Incident Indicators
Most Wanted Terrorists — FBI
Every Acronym Project Name From DARPA's Demo Day. - Google Search
Social Media in Strategic Communication - Google Search
Hybrid Warfare Keywords - NATO LibGuides - Google Search
Science and Technology to Combat Terrorism - Google Search
How to Gather Intelligence on Targeted Attacks - Tricks and Tips - Google Search
Search – Findo
Home - Dropbox
Audacity®
Battery Health 2 for Mac - FIPLAB
About | Acqualia
krypted.com - Tiny Deathstars of Foulness
Apple Configurator 2 - krypted.com
List Of Mac OS X Error Codes - krypted.com
Mac Commands - krypted.com
Common Apple Ports - krypted.com
Glossary of Apple Terms - krypted.com
Posts Tagged “bookmarks” - BrettTerpstra.com
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Stand-Off Detection of Suicide Bombers - Google Search
The tool that can sniff out a suicide bomber from 100 metres away | Daily Mail Online
Amazon.com: John G. Voeller: Books, Biography, Blog, Audiobooks, Kindle
Counterterrorism and Cybersecurity - Springer
Mobile Devices: Tools and Technologies - CRC Press Book
Missing Manuals
Data Mining Resources
DataMiningConsultant.com
DHS Apps | Homeland Security
Data.gov
National Preparedness Month | Ready.gov
Region X: AK, ID, OR, WA | FEMA.gov
State of Oregon: Oregon Office of Emergency Management
Emergency Management Division | Washington State Military Department
Cascadia Rising - Preparedness Toolkit
Signup for FEMA Email Updates
Site map | Homeland Security
The Great Oregon ShakeOut - Get Ready!
Oregon Office of Emergency Management Tsunami Information
State of Oregon: Oregon Office of Emergency Management
Oregon Office of Emergency Management Earthquakes
Benton County (OR) Amateur Radio Emergency Service
Oregon Office of Emergency Management Prepare, Protect, and Recover
Search Capabilities | www.ara.com
Clean Your Cluttered Hard Drive with macOS Sierra's New Storage Manager
This Page Lets You Disable a Lot of Google's Activity Tracking
People followed by Portland OR Alerts (@pdxalerts) | Twitter
Profiling the Islamic State | Brookings Institution
Wiki TOC scraper
Remove Extra Spaces tool
Add / Remove Line Breaks
Find Web Tools and Apps | Homeland Security
DHS S&T Center of Excellence Technology Fact Sheets - University Programs
Defense Threat Reduction Agency
After Action Report (AAR) Templates
People Screening Technologies & Global Markets - 2012-2016 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
Standoff IED, Person-Borne & Vehicle-Borne Explosives & Weapon Detection: Technologies & Global Market - 2015-2020 - Homeland Security Market Research
HSSAI | ANSER
Homeland Security Market Intelligence | World Leading Homeland Security & Public Safety Market Research
Homeland Security and Defense Center | RAND
Emergency Management Institute | Independent Study Program (IS)
Publications Library | Bureau of Alcohol, Tobacco, Firearms and Explosives
Science and Technology | Homeland Security
National Counterterrorism Center (NCTC)
National Institute of Standards and Technology | NIST
Ready.gov
USFA NFA Courses, Schedules and Instructors Course Search Results
Mobile App | FEMA.gov
U.S. Fire Administration resources for National Preparedness Month
FEMA on the App Store
Download fire data and data analysis tools
Emergency Response to Terrorism: Strategic and Tactical Considerations for Supervisors (F0549)
10-03
Copy links to clipboard
Copy
Open
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Arthur - Safely optimize some of your Mac's hidden settings
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
CrisisMappers - THE HUMANITARIAN TECHNOLOGY NETWORK
Multiple hypothesis tracking for data association in vehicular networks
Browse All Guides - LibGuides at FBI Library
Home - Community Policing - LibGuides at FBI Library
Journal Articles - Intelligence Analysis - LibGuides at FBI Library
Home - Interviewing and Interrogation - LibGuides at FBI Library
Government Information - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
Home - LibGuides at FBI Library
A new version of Gitrob is out | michenriksen.com
Moral Machine
Proceedings of the Tenth International Conference on Web and Social Media
Jewish Calendar
CISN: EEW Project
America’s New Special Operations Commander Wants to Predict the Future - Defense One
Carry On Luggage and Bags - Up To 70% Off - eBags.com
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
Homeland Security Today: NYPD Developing Strategy to Counter Terrorist Drone Use
Conflict with ISIS
Snap It - Lose It!
Implementing graph grammars for intelligence analysis in OCaml
Motorcycle routes in Portland, United States on Mopedmap - Your bike routes online
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Home
Science.gov: USA.gov for Science - Government Science Portal
ShakeAlert | Earthquake Early Warning
2016 Conference
IARPA wants intel tools that can predict the future -- Defense Systems
DuckDuckGo
Two Person Bags | The Earthquake Bag
GitHub - gingerbeardman/Emojipedia at producthunt
Push/press/click: A smart button roundup
Connect OneDrive to hundreds of apps - IFTTT
Sync new files added to Dropbox to your Google Drive by lbrfabio - IFTTT
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Blasch: Revisiting the JDL model for information... - Google Scholar
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Taylor: A comparison of approaches to detect deception - Google Scholar
(1) The West Wing Weekly (@WestWingWeekly) | Twitter
ACAPS | Tools, know-how and training for assessments in crises
IST-132 Multi-Level Fusion of Hard and Soft Information
Fast Company | Business + Innovation
Architectures for contextual information exploitation - Google Search
Fundamentals of multiple-hypothesis tracking - Google Search
Hard & soft fusion – military application - Google Search
INVESTIGATIONS INVOLVING THE INTERNET AND COMPUTER NETWORKS - Google Search
Social Media Screening for Supporting Real-Time Decision Making - Google Search
ecent advances in multiple-hypothesis tracking - Google Search
ountering Nontraditional HUMINT Collection Threats. - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwimpaa--7_PAhVEy2MKHe6oBq4QFgg3MAQ&url=http%3A%2F%2Fwww.dtic.mil%2Fcgi-bin%2FGetTRDoc%3FAD%3DADA619203&usg=AFQjCNExdyBjaTnjCZLUwjr0digKNDbg0Q&sig2=7iCqaR7bEPMfMn34eYkVZA&cad=rja
CheatSheet
Save for later by Sara Citrenbaum - Product Hunt
TagSpaces - Your Hackable File Organizer
Searching for evidence of Trump’s personal giving - Washington Post
40 maps that explain the world - The Washington Post
A Military-Grade Drone That Can Be Printed Anywhere | WIRED
Hacker Lexicon: What Is Password Hashing? | WIRED
Publications and Conferences
Bandit, criminal, robber, robbery, terrorist, thief, thug icon | Icon search engine
Afghan War News: Afghan Security News Update (20161002)
greta's gouge: Friday's Miscellany 09-30-2016
Jake Viens' Forensic Blog: Dropbox Forensics
The 6 Types Of Contractors You Encounter Overseas
CBNW
Digital Issues | CBNW
US Army unveils its 'Big 8' initiatives
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Published Research | RAND
Tools | RAND
Brief Treatment for Substance Use Disorders: A Guide for Behavioral Health Providers | RAND
Costs of the Conflict Calculator | RAND
ENGAGED Toolkit: Improving the Role of Nongovernmental Organizations in Disaster Response and Recovery | RAND
Terrorism and Homeland Security | RAND
Terrorism Threat Assessment | RAND
How I lived like a badger and learned more about the world.
Statewatch: Resources for researchers on civil liberties, justice and home affairs, access to documents and democratic standards in Europe
Advanced Certificate in Terrorism Studies from the University of St Andrews - Informa plc
Department of Defense Laboratories: Innovation through Science and Engineering in Support of Military Operations | Armed Services Republicans
Home Page | DHS BAA
Funding Opportunities | DHS BAA
Funding Opportunities | DHS BAA
Enhanced Passive Surveillance System | Federal Crowdsourcing and Citizen Science Toolkit
Keyboard shortcuts and Multi-Touch gestures | DaisyDisk - Analyze disk usage and free up disk space on Mac
Locating space wasters | DaisyDisk - Analyze disk usage and free up disk space on Mac
Tips and tricks | DaisyDisk - Analyze disk usage and free up disk space on Mac
Bioresearch Labs and Inactivation of Dangerous Pathogens | Energy and Commerce Committee
Robotics & Autonomy | Global Security Initiative | ASU
CBNW 2016 Vol 1 by immags - issuu
(U//FOUO) DHS-FBI-NCTC Bulletin: Homegrown Violent Extremists Focusing More on Civilian Targets | Public Intelligence
Find and remove duplicate items in your iTunes library - Apple Support
About backups for iOS devices - Apple Support
Install Project - Office Support
Bitmoji
Bruker: Applications - Life Science and material research applications and solutions
Center for a New American Security
sigstore.dbx - Google Search
Story Wars
Providing text analysis APIs that understand human text - Twinword
Sentiment Analysis API - Twinword Inc.
Advanced Ctrl+F Search. Research Tool. Twinword Finder
Write with a Built-In Thesaurus - Twinword Writer
41 tabs
Copy links to clipboard
Copy
Open
A social media and crowd-sourcing data mining system for crime prevention during and post-crisis situations: Journal of Systems and Information Technology: Vol 18, No 4
bellerphon - Google Search
Findo
Forums - Previously.TV Forums
VIS. Visual Investigative Scenarios platform: Pages
Digital Public Library of America » Select Collections Available for Re-use
Quickdata
Useful Stuff | ResearchBuzz: Firehose | Page 2
Insight Maker | Free Simulation and Modeling in your Browser
Where has this tweet come from? Fast and fine-grained geolocalization of non-geotagged tweets | SpringerLink
START launches online course on terror-crime nexus and CBRN | START.umd.edu
Terrorist planning and success rates; Case study in radicalization; Strategies to limit groups’ lethality | START.umd.edu
19 Useful Google Apps Scripts to Automate Google Drive - Hongkiat
Amazon.com: Lisa Lutz: Books, Biography, Blog, Audiobooks, Kindle
American Babe: A White Girl Problems Book: Babe Walker: 9781501124846: AmazonSmile: Books
The Wonder Trail: True Stories from Los Angeles to the End of the World: Steve Hely: 9780525955016: AmazonSmile: Books
Awesomely Luvvie | Best Humor Blog EVER. Serving Pop Culture Tea.
S03.E02: God - Black-ish - Previously.TV Forums
The West Wing - Previously.TV Forums
All Episodes Talk: Walk With Me - Page 6 - The West Wing - Previously.TV Forums
The West Wing Weekly & Other The West Wing Podcasts - Page 2 - The West Wing - Previously.TV Forums
Anonymous Internet Vigilantes Are Taking Peer Review Into Their Own Hands | Motherboard
A History of Violence: A Quantitative Analysis of the History of Terrorism in New York City - HOMELAND SECURITY AFFAIRS
Social Media Manager Becomes Facebook Legend After Grocery Store Customer Finds Worm in Her Salad | The Daily Dot
FOIA Wiki launches in beta – Poynter
How to Make YouTube Playlists with a Google Spreadsheet
Silent Site Sound Blocker Only Lets Whitelisted Tabs Play Audio
Export and Retain Formatting from Google Docs - Make Tech Easier
Ditch Popular Google Services With These Alternatives - Make Tech Easier
DuckDuckGo Search Tips You Should Know to Boost Productivity - Make Tech Easier
Generative Data Models for Validation and Evaluation of Visualization Techniques
black on black cinema - Google Search
Ada Twist, Scientist: Andrea Beaty, David Roberts: 9781419721373: AmazonSmile: Books
Atlas Obscura: An Explorer's Guide to the World's Hidden Wonders: Joshua Foer, Dylan Thuras, Ella Morton: 9780761169086: AmazonSmile: Books
AmazonSmile: I'm Judging You: The Do-Better Manual (9781627796064): Luvvie Ajayi: Books
I'm Judging You: The Do-Better Manual - Google Search
I'M JUDGING YOU: The Do-Better Manual by Luvvie Ajayi
Because the Only Thing Chip Readers are Good For is Embarrassing Us | Awesomely Luvvie
https://smile.amazon.com/gp/yourstore/recs/ref=pd_ys_nav_?ie=UTF8&nodeID=4461&parentID=4456&parentStoreNode=4456
AmazonSmile: This Book Loves You (9781101999042): PewDiePie: Books
Saved Session - Session Buddy
52 tabs
Copy links to clipboard
Copy
Open
Full List of Performances & More Details Revealed for PBS' HAMILTON'S AMERICA Documentary
Office Supplies, Furniture, Technology at Office Depot
Tektronix P6015A High Voltage Probe 1000x | eBay
IARPA Multimodal Objective Sensing to Assess Individuals with Context (MOSAIC) BAA | Contract Research and Development
Carmel-by-the-Sea Historical Fun Facts (Media Kit - Carmel-by-the-Sea, California)
IARPA Hybrid Forecasting Competition (HFC) BAA | Contract Research and Development
The Stroz Friedberg Cyber Brief — Center on National Security
Metadata Extractors | Alfresco Documentation
Metadata Extractors | Alfresco Documentation
Growing pains for global monitoring of societal events | Science
Metadata Extraction to Tags | Alfresco Developer Blog
Home
Platform extension points | Alfresco Documentation
Alfresco » Site Dashboard
Crime forecasters | Science
Other > E-books - TPB
Website is offline | 504: Gateway time-out
Drugs and the Pharmaceutical Sciences [Updated at 2016.10.05] (download torrent) - TPB
RSC Analytical Spectroscopy Monographs [Updated at 2016.10.05] (download torrent) - TPB
Intelligence Collection 101: Signatures – Vetted Intelligence
DD0S: Posters From Walls To Legitimate Weapon Of War and Its Possible Use Scenarios | Krypt3ia
Amazon.com: Scout Sling Pack (Black): Sports & Outdoors
Amazon.com : Yukon Outfitters Survival Kit (Storm Grey) : Sports & Outdoors
Amazon.com : Gonex 550 Paracord Survival Bracelet Grenade Keychain Emergency Survival Kit with Carabiner, Eye Knife, Fire Starter, Fishing Tool for Camping, Hiking, Hunting, Travel : Sports & Outdoors
Amazon.com : Trident Survival Kit (Black) : Sports & Outdoors
Your Amazon Prime membership now includes magazines, the newest batch of content in the bundle » Nieman Journalism Lab
Amazon.com: Prime Reading: Kindle Store
Defeating ISIS: Who They Are, How They Fight, What They Believe - Kindle edition by Malcolm Nance, Richard Engel. Politics & Social Sciences Kindle eBooks @ Amazon.com.
Vetted Intelligence – An Open Source Intelligence Resource
Website is offline | 504: Gateway time-out
Science
Growing pains for global monitoring of societal events | Science
A Novel Direct and Cost Effective Fabrication of Paper-Based Microfluidic Device by Commerical Eye
Modeling of urban change using remote sensing data and cellular automata technique | SpringerLink
Developing expert political judgment: The impact of training and practice on judgmental accuracy in geopolitical forecasting tournaments
Risk assessment of high schools in Lebanon for potential terrorist threat: International Journal of Disaster Resilience in the Built Environment: Vol 7, No 5
Proper Application of ADR Techniques regarding Violent Non-State Actors Notes 31 Ohio State Journal on Dispute Resolution 2016
scholar.google.com/scholar_url?url=http://derby.openrepository.com/derby/bitstream/10545/620527/1/62828%2BICDIR%2BProcedings%2B2016%2BFinal%2B-%2Bfront%2Band%2Bback%2Bcovers%2Bincl.pdf&hl=en&sa=X&scisig=AAGBfm09CMPXPQlaPHEcYL1IsUR4gLEkdQ&nossl=1&oi=scholaralrt
(8909) Inoreader - Channels
2Do Is Going Free (with In-App Purchases) – MacStories
Where Will Google Assistant Live? – MacStories
10 Products and Websites to Improve Your Morning – Johnny Lists
iPhone 7 Plus Depth Effect Is Legit – MacStories
The Omni Group Is Moving to Free Downloads with In-App Purchases – MacStories
Top Spymaster Explains How Russian Intelligence Sees the US
The UK Snooper’s Charter and the Anderson Report on Bulk Powers | Just Security
Back Up All of the Things With This $110, 5TB External
This $6 Survival Grenade Includes a Fire Starter, Fishing Gear, and More
Today's Best Deals: 30% Off Starbucks, Stainless Steel Tumblers, 3D Printer
MacStories
iOS 10: The MacStories Review – MacStories
1 tab
Copy links to clipboard
Copy
Open
Saved Session - Session Buddy
5 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
Data-Sources | Global Terrorism Research Project
Hey-Siri.io
Disk Inventory X - Screenshots
Use the Creative Cloud Cleaner Tool to solve installation problems
Terrorist Icons
Copy links to clipboard
Copy
Open
terrorism icon - Google Search
Terrorist icons | Noun Project
Bomb, bomber, explosion, explosive, leverage, suicide bomber, terrorist icon | Icon search engine
Terrorist Vector Stock Photos Images, Royalty Free Terrorist Vector Images And Pictures
Islamic Terrorist With Islamic Terrorist With Machine Gun, Islamic.. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234766.
Terrorist Set With Mask Gun And Camouflage Clothes Vector Illustration. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234371.
8 tabs
Copy links to clipboard
Copy
Open
How to use Optimized Storage in macOS Sierra | Macworld
Using Finder’s Advanced Search to Find Recently Modified Files - The Mac Observer
Make Spotlight Sing: Use Dates To Search Your Files [OS X Tips] | Cult of Mac
September 20, 2016 | iDownloadBlog.com
Recently added
Rajaraman: Jure Leskovec - Google Scholar
Data mining of extremely large ad hoc data sets to produce inverted indices
mirador
48 tabs
Copy links to clipboard
Copy
Open
FlashAlert Newswire
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
http://flashalert.net/id/portlandpolice?alert=1 is not available
Algorithms Can Tell Bosses How Employees Are Feeling - The Atlantic
PopClip for Mac
Dropshelf Preferences - Pilotmoon Software Knowledge Base
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Change PopClip's Search Engine - Pilotmoon Software Knowledge Base
Adding Dictionaries to OS X - Pilotmoon Software Knowledge Base
PopClip Known Issues - Pilotmoon Software Knowledge Base
HoudahSpot — File Search Utility. Spotlight Enhancer
Tembo — Simple File Search for Mac
LaunchBar 6
Typinator - the fastest text expander in town
TextSoap - Automate Your Text Cleanup
StartPage Search Engine
Slicereader - Easy reading for Mac
Spy Agency To Pilot Insider-Threat Hunting Tech - Nextgov.com
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
Police Are Sweeping Up Tweets and Friending You on Facebook, Whether You Know It or Not
Jack Smith IV's Profile - Mic
However We Fight Terrorism, Ubiquitous Government Surveillance Isn't the Answer
Basic Statistics Part 3: The Dangers of Large Data Sets: A Tale of P values, Error Rates, and Bonferroni Corrections | The Logic of Science
'Minority Report' Is Real — And It's Really Reporting Minorities
U.S. Police Are Getting a Crime Prediction Map Straight Out of 'Minority Report'
Hitachi Says It Can Predict Crimes Before They Happen | Fast Company | Business + Innovation
Darrin Lipscomb - Google Search
Meagan Cahill - Profile | RAND
computational criminology - Google Search
Computational Criminology
Hitachi Visualization Suite - Google Search
Hitachi's Public Safety and Visualization division - Google Search
How to Email - The Atlantic - The Atlantic
Culture - The Atlantic
Donald Trump's 'Miss Piggy' Comments Expose a Double-Standard on Weight - The Atlantic
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
PredPol - Google Search
Predict Crime | Predictive Policing Software | PredPol
https://findo.com/app/search/news/2 is not available
https://findo.com/app/search/news/3 is not available
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwi47d-W9rXPAhVhHGMKHU1TCdgQFggeMAA&url=http%3A%2F%2Fieee-hst.org%2F&usg=AFQjCNH1sdXrHrLW7vUgsFBkoZS97tex2Q&sig2=vIS1StPoNFWac1hsgmR1Jw&cad=rja failed to load
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwi47d-W9rXPAhVhHGMKHU1TCdgQFggvMAU&url=http%3A%2F%2Fwww.osa.org%2Fen-us%2Fmeetings%2Fglobal_calendar%2Fevents%2F2016_ieee_international_symposium_on_technologies%2F&usg=AFQjCNEA78Cz1O_nqq4SJT2Ir_ghTiOivA&sig2=OQxvZBUznuQWSTARZDr5_w&cad=rja failed to load
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=0ahUKEwi47d-W9rXPAhVhHGMKHU1TCdgQFghXMAs&url=http%3A%2F%2Fwww.cfr.org%2Fdefense-technology%2Fhomeland-security-technologies%2Fp14827&usg=AFQjCNFaaIatD9rkU2IzcLMrbLVc4BcRxg&sig2=A6F3KlDroKrJjgEwQALv-Q&cad=rja failed to load
12 tabs
Copy links to clipboard
Copy
Open
Bio - O'Reilly Media
AMRC | The University of Sheffield Advanced Manufacturing Research Centre with Boeing
workerbee - TPB
clouderone - TPB
Self-image threat decreases stereotyping: The role of motivation toward closure | SpringerLink
On the physics of high-rise building collapses | OffGuardian
Apple Tracks Your iMessage Contacts, May Share Them With Law Enforcement
How to Totally Disable Widgets on the iOS 10 Lock Screen
Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them
US-Backed Effort to Fight Afghan Corruption Is a Near-Total Failure, Audit Finds | Small Wars Journal
Triggers and Thresholds of Non-International Armed Conflict | Just Security
100 Greatest TV Shows of All Time | Rolling Stone
45 tabs
Copy links to clipboard
Copy
Open
VPN Forever
The Hit List for Mac: Handles life’s little tasks & big projects
Pay What You Want: The Award-Winning Mac Bundle | MacAppware Deals
MacAppware Deals
DeltaWalker: Advanced file and folder comparison and synchronization
Today's Best Deals: Your Favorite Car Charger, Discounted Food Saver, Dyson V6, and More
Amazon.com: Fresh Limited Time Offer
iStockNow Live iPhone 7 and 7 Plus Stock Map
Small Victories
50 Tools to Get the Most Out of Dropbox - Docurated
How to Host Your Website with Dropbox - The Ultimate Unofficial Dropbox Guide
Pancake
Give people view-only access to your files - Dropbox Help - Dropbox
12 Advanced Dropbox Features That You Should Start Using
Secure Online Collaboration | Box
Home | DropPages.com
The 10 Best Widgets for iOS 10 Home and Lock Screens
The Pirate Bay - The galaxy's most resilient bittorrent site
A Nearly Complete Bill Bryson (10 Audiobooks) (download torrent) - TPB
Horisarte - TPB
Travels in Europe - Bill Bryson (2013 - Unabridged) (download torrent) - TPB
[Audiobook] 5 Bill Bryson Books (download torrent) - TPB
Simple Domain Name Registrar - iwantmyname
Theses
DIYbio Project: Help Discover New Antibiotics through Citizen Science
TIP: Make a list of where all your credit cards are listed! | Budgets Are Sexy
(1116) Inoreader - Political Violence @ a Glance
10 Tricks to Make Yourself an iPhone Message Master
Is your ZIP code one of Portland's wealthiest? (Map/Slideshow) - Portland Business Journal
Apple Logs Your iMessage Contacts — and May Share Them With Police
Eddy Cloud Music Player & Streamer Pro on the App Store
8 Awesome Apps You Won't Hear People Talking About
ProPublica’s new Chrome extension wants to decipher what Facebook thinks it knows about its users » Nieman Journalism Lab
Enabling Unconventional Warfare to Address Grey Zone Conflicts | Small Wars Journal
THE MISSING CREDITS
Search Nearby | Delivery & Takeout | BeyondMenu
BeyondMenu.com Mobile App | BeyondMenu
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Aroy Thai Cuisine | Order Online | Portland | BeyondMenu
Other > E-books - TPB
The Encyclopedia of Middle East Wars: The United States in the Persian Gulf, Afghanistan, and Iraq Conflicts - ABC-CLIO
The Pirate Bay - The galaxy's most resilient bittorrent site
Bill Bryson Ebook Collection (bookeek) (download torrent) - TPB
Bill Bryson - At Home: A Short History of Private Life (download torrent) - TPB
Saved Session - Session Buddy
09-28
Copy links to clipboard
Copy
Open
Book Excerpt: “The Embassy: A Story of War and Diplomacy” | Small Wars Journal
Unconventional Warfare is Not the Answer to Your Problem
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
Bio - O'Reilly Media
Homeland Security from CRC Press - Page 1
Forensics & Criminal Justice from CRC Press - Page 1
Home - NATO LibGuides - NATO LibGuides at NATO Multimedia Library
Anniversary – Club MacStories
Sensors | Free Full-Text | Effective Waterline Detection of Unmanned Surface Vehicles Based on Optical Images
GAO-10-898, Technology Assessment: Explosives Detection Technologies to Protect Passenger Rail
Apple Music Festival
Getting Started with Alfresco in the cloud | Alfresco
Nuwber
How Washington, D.C., Is Preparing for the Next Terrorist Attack
EtreCheck: About EtreCheck
Mac Hacks - O'Reilly Media
Quicksilver — Mac OS X at your Fingertips
Copy files on Mac OS X using drag-and-drop | alvinalexander.com
Search and filter the iTunes App Store with your browser
IntelCenter Database (ICD)
Remove Duplicate Lines and sort
Potential Indicators, Common Vulnerabilities, and Protective Measures - Google Search
Potential Indicators of Terrorist Activities Related to the General Public - Google Search
Potential Indicators of Terrorist Activities Related to Sleepers - Google Search
An Expert Analysis of the Cyber Threats Facing America
Saved Session - Session Buddy
PAPERS
Copy links to clipboard
Copy
Open
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Subrahmanian: Handbook of computational approaches... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Concealed threat detection with the IRAD sub-millimeter wave 3D imaging radar | Passive and Active Millimeter-Wave Imaging XVII | DEF14 | SPIE Proceedings | SPIE
People Screening Portals - Threats and Associated Detection Technologies - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
Inbar: Detection of nuclear materials - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
OSA | Automatic image segmentation for concealed object detection using the expectation-maximization algorithm
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
OSA | Real-time concealed-object detection and recognition with passive millimeter wave imaging
2 tabs
Copy links to clipboard
Copy
Open
SortMyBox — Organize your Dropbox
Student Assistant, Historical Collections & Archives job - Oregon Health & Science University - Portland, OR | Indeed.com
12 tabs
Copy links to clipboard
Copy
Open
This X-Men: Apocalypse Blooper Reel Features Oscar Isaac Dancing, Which Justifies the Entire Movie
22 Movies Roger Ebert Really Hated | Mental Floss
A field guide to dangerous bacteria
Tabletop Whale
Fall TV Preview: Your Complete Guide to the Season's Premieres
Hamilton: Watch an ASL cover of the Broadway show's opening number | EW.com
5 Incredible Instagram Tools (Windows & Mac Desktop Clients Too)
PBS.NOVA.2015.CyberWar.Threat.720p.HDTV.x264.AAC.MVGroup (download torrent) - TPB
PBS NOVA 15 Years of Terror 720p x264 AAC HDTV MVGroup.org (download torrent) - TPB
nayhtut - TPB
Log in to your account | New Scientist
Google Allo: The Super-Smart Future of Messaging Is Kind of an Idiot Sometimes | WIRED
YouTube
Copy links to clipboard
Copy
Open
Broadwaycom - YouTube
BastilleVEVO - YouTube
FamousInNY - YouTube
BROADWAY SESSIONS - YouTube
theatermania - YouTube
Watch Highlights From Rehearsal for The Producers at Paper Mill Playhouse - YouTube
SpringerBriefs in Applied Sciences and Technology (download torrent) - TPB
Everything Wrong With Shrek In 13 Minutes Or Less - YouTube
Digital Ham4Ham 9/21 -- Talk Less, Sign More - YouTube
24 tabs
Copy links to clipboard
Copy
Open
The All New DEVONthink To Go for iOS
New ebook packs for August 2016 (download torrent) - TPB
The Pirate Bay - The galaxy's most resilient bittorrent site
Remove information from Google - Search Help
Jeff R. Weyers | LinkedIn
Sara T Citrenbaum, 527 Spokane St, Portland, OR - Nuwber
Syncios iPhone Data Recovery Tool Lets You Recover Data from iPhone, iTunes and iCloud Backups - iOS Hacker | iOS Hacker
Google Drive Search Just Got a Lot Smarter
Google Drive Blog: What you love about Google Search — now for Drive
Dropbox Isn't Playing Nice With macOS Sierra, Here's How to Fix It
ImageThink Making an Impact in Education | ImageThink
Hazel 10 Year Sale [Link]
Sharing a Contact and Voicemail with iOS
the story of an america jihadi - Google Search
national counterterrorism center - Google Search
The open source revolution is coming and it will conquer the 1% - ex CIA spy | Nafeez Ahmed | Environment | The Guardian
Here’s What It Really Means To Call Something “Terrorism” | GOOD
The Asimov Institute - The Asimov Institute
Artificial Intelligence For Air Force: Cyber & Electronic Warfare « Breaking Defense - Defense industry news, analysis and commentary
How to Undo the Changes on the iOS 10 Lock Screen
5 Ways to Make Gmail Even Better
hany farid - Google Search
I am Hany Farid, a Dartmouth Professor specializing in photo forensics technology. Ask me anything. : IAmA
NOVA - Official Website | Profile: Hany Farid
Mama's Got A Brand New Tab
Copy links to clipboard
Copy
Open
The Art Of The Future Project | The Art of the Future Project
RSOE EDIS - Emergency and Disaster Information Service
ICPEM | Institute of Civil Protection and Emergency Management | Alert - The journal of the ICPEM
floatingsheep
Powerful new metric quickly reveals network structure at multiple scales | Santa Fe Institute
Incident Dashboard
Open Wetlab - Waag Society
BioHack Academy #4 - Waag Society
CESSDA - Data Catalogue
Path Finder 7 by Cocoatech
Dataproofer
Российская экзотика - Обитель цивилизатора
Infegy: Social Media Intelligence and Text Analysis Solutions
Online vCard Converter
How to Jump Ship From Evernote and Take Your Data With You
This Script Converts Google Documents to Markdown for Easy Exporting
78 Tools for Writing and Previewing Markdown
IINSTP
YFCC
NSI SMA Publications | NSI
Organizational Analysis (Self-Paced) | Stanford Online
PopClip Extensions
Richard's Toolbox
DrawMyData
2016 CSS-US Army TRADOC Mad Scientist Conference at the Georgetown University Center for Security Studies | Small Wars Journal
How do I export notes from Evernote using AppleScript? - Stack Overflow
Terminal Lance - Home
News You Can Use | Arthur D. Simons Center
Presentations and Authors
AFIO - Association of Former Intelligence Officers
Cyberspace Security Guide - AL
DARPA Forensic Social Science Supercolliders (FS3) RFI | Contract Research and Development
Force Your Mac to Sort Folders on Top of Files (Windows Style)
Tactical Shit News -When Shit Hits the Fan, Read the Right Shit
Wapack Labs
Manage your Apple ID
Aptonic - Dropzone 3 Actions
Link Analysis, and Visualization Software| Social Network Analysis
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
Amateur Rocketeers Are Keeping the Space Age Spirit Alive
Dictation Dingus – nahumck.me
Lexical Link Analysis - Home - MMOWGLI Portal
Biometrics | Public Intelligence
Use iTunes on your Mac or PC to restore your iPhone, iPad, or iPod to factory settings - Apple Support
ThereAreNoSunglasses | American Resistance To Empire
bellingcat - Who Killed Adnani? An Open Source Survey - bellingcat
Internet Data Sources for Social Scientists
Operation Manul | Electronic Frontier Foundation
FEMA.gov | Federal Emergency Management Agency
Terrorist Group Prediction Model for Counter Terrorism - Google Search
LookingGlass Cyber Solutions
OCCRP
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.