Light theme
Dark theme
Automatic (use operating system setting)
Shared: 233 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
12-08 Oh My!
Copy links to clipboard
Copy
Open
Google Advanced Search
2016 Ben Benavides OSINT 2ool Kit On The Go Bag (Bag O’Tradecraft) « Public Intelligence Blog
Findo Alternatives and Similar Software - AlternativeTo.net
Stephen Foskett, Pack Rat - Understanding the accumulation of data
Scientific and technical research - Themes - EU Bookshop
Documents relating to the Sixth Framework Programme - FP6 - Research - European Commission
Western Foreign Fighters in Syria / ICSR
Fake News and Data Mining: Mapping Today’s Media for Intel Analysis - In Public Safety
IntuView - Downloads
Obama, SOF, and the rules of war; Why the US struggles with influence warfare; Report: $125b in Pentagon waste; Mike Flynn, conspiracy theorist; and just a bit more... - Defense One
The Flaw in Tech Giants’ Plan to Fight Extremist Content - Defense One
Deliverables: Future of IDentity in the Information Society
The ISIS Emni: The Inner Workings and Origins of ISIS’s Intelligence Apparatus – ICSVE
IntuView - Home Page
Finding Data - NSD - Norwegian Centre for Research data | NSD - Norwegian center for research data
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
20100130.gif (504×533)
Special Edition: New data on foreign fighters | START.umd.edu
Newsletters | START.umd.edu
CONFLICT DATASETS: A PRIMER FOR ACADEMICS, POLICYMAKERS, AND PRACTITIONERS: Defence and Peace Economics: Vol 22, No 1
The Iranian Empire Is Almost Complete - The Tower
Andrew Halterman – Political science, text data, conflict forecasting, Python, and R
The Good Judgement Project and Bayes’ Calculator – Andrew Halterman
Event Data – Andrew Halterman
[1612.01284] Modeling Structure and Resilience of the Dark Network
[1612.02377] A Method for Group Extraction and Analysis in Multilayer Social Networks
Children synthesize $2 version of Martin Shkreli's $750 malaria drug / Boing Boing
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
military intervention data stream - Google Scholar
Text Expansion Tool - Auto Text Expander | TextExpander
Text Expansion Tips - Typing Shortcuts | TextExpander
Amazon
Books or articles that are must reads to understand the Islamic State annotative bibliography - Google Search
Attorney's Information Forensics Handbook" - Google Search
Visual Analysis Open Source Intelligence Toolkit - Google Search
Foreign terrorist fighters / Terrorism / Crime areas / Internet / Home - INTERPOL
Key Websites - A Linkpack by Sara Citrenbaum
LibGuides - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
Try Me - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
Post-Election College Paper Grading Rubric - McSweeney’s Internet Tendency
Google Social Search
Troy Hunt: Here's 1.4 billion records from Have I been pwned for you to analyse
Statistics
Thesis & Dissertation Repositories
Joint Forces - AL
Operations Odyssey Dawn and Unified Protector - SM
Intelligence - AL
Caucasus - AL
Homeland Security Digital Library – Securing the homeland through the power of information
Not Just the Caliphate: Exploring the Jihadist Scene in America – Homeland Security Digital Library
On the Homefront – the HSDL Blog – Homeland Security Digital Library
2017 Emerging Cyber Threats, Trends and Technologies Report
Books & Journals – Homeland Security Digital Library
Center for the Study of the Drone – at Bard College
About Research @NPS - Naval Postgraduate School
Dictionaries, Glossaries & Lexicons
Turning Point | Center for Strategic and International Studies
59 Search Results - ALL(Hybrid Multi-Agent Strategy Discovering Algorithm for Human Behavior) - ScienceDirect
competitive governance model - Google Search
center for study of terrorism and response - Google Search
schmuel barr israel - Google Search
intovision gdelt - Google Search
Hedonometer
The development of a concept inventory for engineering graphics - IEEE Xplore Document
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications - IEEE Xplore Document
IEEE Xplore Full-Text PDF:
micROS: a morphable, intelligent and collective robot operating system | Robotics and Biomimetics | Full Text
Efficiently detecting switches against non-stationary opponents | SpringerLink
The Politics of Militant Group Survival in the Middle East - Springer
Macro- and Micro-approaches to Crime Prevention and Intervention Programs - Springer
Unfolding the Core Structure of the Reciprocal Graph of a Massive Online Social Network - Springer
Influential Actors Detection Using Attractiveness Model in Social Media Networks - Springer
The Principal–Agent Model and Inter-Organizational Relations - Springer
Phoenix Data Project
Low-cost, robust and field portable smartphone platform photometric sensor for fluoride level detection in drinking water - Analytical Chemistry (ACS Publications)
Tools | REVEAL
DARPA Hierarchical Identify Verify Exploit (HIVE) BAA | Contract Research and Development
Microsystems Technology Office
Next Generation Social Science (NGS2) Proposers Day
TRAnsformation DESign (TRADES) Proposers Day
GRAPHS
Dr. Reza Ghanadan
re3data.org | Registry of Research Data Repositories
Relational affordances of information processing on Facebook
Content sharing in Internet of Vehicles: Two matching-based user-association approaches
A language-based approach to modelling and analysis of Twitter interactions
Digital Citizenship and Political Engagement: The Challenge from Online ... - Ariadne Vromen - Google Books
Experience from the DARPA Urban Challenge - Google Books
Critical Issues in Cross Cultural Management - Google Books
Chrome Web Store - Extensions
Hierarchical Identify Verify Exploit - Google Search
darpa invert graph based hardware - Google Search
darpa hive program - Google Search
Militant Imagery Project | Combating Terrorism Center at West Point
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Google Scholar
Get All The Activewear and Sneakers You Could Need with 30% Off Sitewide at Adidas
adidas Official Website | adidas
adidas X Tango 16.2 Turf Shoes - Black | adidas US
how to identify bots - Google Search
Tailored Online Interventions: The Islamic State’s Recruitment Strategy | Combating Terrorism Center at West Point
How terrorists recruit online (and how to stop it) | Brookings Institution
The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter | Brookings Institution
The Kingdom and the Caliphate: Duel of the Islamic States - Carnegie Endowment for International Peace
Government creating a mind of its own
Capturing Planned Protests from Open Source Indicators | LINQS Statistical Relational Learning Group @ UMD
This Technology to Beat Fingerprint Scanners Fits Just Like a Glove
Men's Sale | adidas US
ISIS and the Lonely Young American - The New York Times
Step-by-Step Online CVE - VOX - Pol
Computation and Language authors/titles recent submissions
Urban Black Women and the Politics of Resistance - Z. Isoke - Google Books
Eye to Eye: Women Practising Development Across Cultures - Susan Perry, Celeste Marguerite Schenck - Google Books
Still Lifting, Still Climbing: Contemporary African American Women's Activism - Google Books
Stetson Kennedy - Wikipedia
Computation and Language
quantify intuition - Google Scholar
Isoke: Urban black women and the politics of resistance - Google Scholar
Radford-Hill: Further to fly: Black women and the... - Google Scholar
Evidence-Based Programs and Practices - What Works in Criminal Justice - CrimeSolutions.gov
African American women's activism - Google Search
Capturing Planned Protests from Open Source Indicators - Google Search
DoD Science and Technology Strategic Communication_Social Media Programs - Google Search
Foreign Fighter Data - Google Search
Further to Fly: Black Women and the Politics of Empowerment - Google Search
HIVE program darpa - Google Search
OEPT-Dataset - Google Search
Open Source Indicators - Google Search
empower black women to be politically active - Google Search
identify islamic state bot - Google Search
islamic state bots - Google Search
physics today - Google Search
superman ku klux klan - Google Search
How to spot home-grown ISIS recruits online before they leave | New Scientist
‘ISIS is not Islam’ – Russian university releases anti-extremist textbook — RT Russian politics
Saved Session - Session Buddy
SocialSensor · GitHub
CEUR-WS.org - CEUR Workshop Proceedings
Phoenix Data Project
The Open Event Data Alliance Software Page
Datasets - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
EVENT DATA AND EMPIRICAL CONFLICT ANALYSIS
Home - Conflict, War and Terrorism - UCF Research Guides at University of Central Florida Libraries
Inoreader - The content reader for power users who want to save time.
dblp: Norman D. Geddes
Intelligence – International Tactical Training Association
HSRC Year End Sale
Multimedia Knowledge and Social Media Analytics Laboratory
December News: Gray Zone conflicts explained; Global Terrorism Index released; CVE principles for local government
MacStories Weekly: Issue 58
VCDB VERIS Community Database
The VERIS Framework
Office Depot®
CRCnetBASE - Chapter 5 Biometrics in Social Media Applications
Jihadism in the Arab World after 2011: Explaining Its Expansion | Middle East Policy Council
Unscheduled Campus Closures | PCC
figshare - credit for all your research
A Validation Process for Predicting Stratagemical Behavior Patterns of Powerful Leaders in Conflict - Google Search
NATO CCD COE - Google Search
VERIS Community Database - Google Search
military intervention data stream - Google Search
steve jameson darpa - Google Search
OODA Loop - Best Security, Business, and Technology Books of 2016
Real-time local Twitter trends - Trendsmap
Biometrics in Social Media Applications - Google Search
sigacts - Google Search
CENTER FOR NATION RECONSTRUCTION AND CAPACITY DEVELOPMEN - Google Search
A New, Near-Real-Time Event Dataset and the Role of Versioning - Google Search
Event Data Presentations
Event Data Presentations
Andrew Halterman - Google Search
compare event data table - Google Search
Comparing GDELT and ICEWS Event Data | mdwardlab.com
how to compare event data |Tableau Community
Guide to Con ict Data - Google Search
CTC Report - Then and Now: Comparing the Flow of Foreign Fighters to AQI and the Islamic State - scitrenbaum@gmail.com - Gmail
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Eck: A beginner’s guide to conflict data: finding... - Google Scholar
Counting conflict | News & Analysis | Data Driven Journalism
Conflict & Ethnic Politics Data - Politics Resources Guide - LibGuides at Princeton University
intuview - Google Search
Saved Session - Session Buddy
IFGM - Distributed Information and Intelligence Analysis Group
Distributed Information and Intelligence Analysis Group
Past Projects - Distributed Information and Intelligence Analysis Group
Data Sources - Social Science Data - Research Guides at University of California Irvine
No 8 (2016)
opencatalog.darpa.mil
Home | U.S. Army Research Laboratory
Behavioral Influences Analysis Center, military intelligence human factors analysis, adversary intelligence
about us
behavioral influences analysis and assessment research and theory
Boeing shares fall after Trump tweets to cancel Air Force One order - Business Insider
The US Air Force has developed a way to counter ISIS drone-bombs - Business Insider
Social Media in Strategic Communication (SMISC)
State of the Future Index
RAND Army Research Division | RAND
Home | SmartResilience
INSCRdata
CSP - Major Episodes of Political Violence, 1946-2013
US Military Influence Operations
MAEC - Malware Attribute Enumeration and Characterization | MAEC Project Documentation
How to render garbage on your iPhone – Medium
Papaly | Start Page
DARPA Social Media in Strategic Communication - Google Scholar
Woodhead Publishing Series in Energy [Updated at 2016.12.07] (download torrent) - TPB
clouderone - TPB
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "...to put it another way. Trump made $6M in airfares for his security detail to fly on his plane during campaign >> https://t.co/7kh0Eh0Wv6"
Personal - Dropbox
94/7 Alternative Portland & Widmer Brothers Brewing Present December to Remember w/ BASTILLE, Holiday Friends, All Ages at McMenamins Crystal Ballroom on Dec 12, 2016 8:00 PM
ANNEX A: HETEROGENEOUS C2: WHEN THE “C2 APPROACH” REQUIRES MANY C2 APPROACHES - Google Search
Adversary Behavioral Modeling - Google Search
Adversary Intent Inferencing - Google Search
COIN/CIMIC Model. - Google Search
Computational Intelligence for Security and Defence Applications - Google Search
Culturally Infused Social Network Analysis - Google Search
dr. michael hsieh - Google Search
David S. Alberts - Google Search
distributed information and intelligence analysis group - Google Search
inauthor:"Eric Victor Larson" - Google Search
How to manage iNode files in the “lost+found” directory | MacIssues
Revealed: Pentagon spent millions studying how to influence social media — RT America
Millennials: The Musical - YouTube
Saved Session - Session Buddy
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.