Light theme
Dark theme
Automatic (use operating system setting)
Shared: 187 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
12-12
Copy links to clipboard
Copy
Open
OpenBionics: Affordable Prosthetics | Wilson Center
The Drone Center’s Weekly Roundup: 12/12/16 | Robohub
The Jihadi Threat: ISIS, Al Qaeda and Beyond | United States Institute of Peace
Web Resources - *Intelligence Studies | Program Guide - LibGuides at American Public University System
All Guides Alphabetically | LibGuides
Citizen Health Innovators Project | Wilson Center
Purchase AppleCare Products
Web Resources - *Weapons of Mass Destruction Preparedness | Program Guide - LibGuides at American Public University System
Web Resources - *Terrorism Studies | Program Guide - LibGuides at American Public University System
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
About | Meta Search
Drafts (2) - scitrenbaum@gmail.com - Gmail
Aili Malm - Google Scholar Citations
Rebecca Nash - Google Scholar Citations
A review of social network centric anomaly detection techniques: International Journal of Communication Networks and Distributed Systems: Vol 17, No 4
Semantic Sentiment Analysis in Arabic Social Media
Multimodal Sensing and Intelligent Fusion for Remote Dementia Care and Support
Opinion Dynamics in Social Networks through Mean-Field Games | SIAM Journal on Control and Optimization | Vol. 54, NO. 6 | Society for Industrial and Applied Mathematics
OSINT Investigations - Cybrary
Deseat.me Finds and Helps You Delete Random Accounts You've Signed Up For
Learn a New Lingo While Doing Something Else - Scientific American
Leading Addiction Organizations Respond to Surgeon General’s Landmark Report on Alcohol, Drugs and Health - Treatment Research Institute
ComputerCrimeInfo Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 008
Here's how to remove your Facebook search history - ThatsNonsense.com
The Atlantic Daily: Public Investigations - The Atlantic
5 terrorist attacks in 5 cities; Syria war heats up; Grappling with Russian hacking; Trump on China, IC, F-35; and just a bit more... - Defense One
The US Is Losing at Influence Warfare. Here’s Why - Defense One
Social Media Surveillance Now a Booming Business : Stephen E. Arnold @ Beyond Search
research guides terrorism - Google Search
Research Websites - Terrorism & the Law Research Guide - LibGuides at University of California, Hastings College of the Law
A Research Guide to Cases and Materials on Terrorism - GlobaLex
Terrorism - Security Studies - Research Guides at Georgia Institute of Technology
Home - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
The Jihadi Threat 5: Drivers of Extremism | Wilson Center
Web Resources - *Forensics | Program Guide - LibGuides at American Public University System
Intelligence Careers | Jobs in the U.S. Intelligence Community
Web Resources - *National Security Studies | Program Guide - LibGuides at American Public University System
Web Resources - *Middle Eastern Studies | Program Guide - LibGuides at American Public University System
Teaching | Alex Braithwaite
Works in progress | Alex Braithwaite
American Intelligence | Ipsa Scientia Potestas Est
Web Resources - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
greta's gouge: Friday's December 12-09-2016
Goal-Driven Deception Tactics Design - IEEE Xplore Document
Terrorist Attack Pre-incident Indicators (TAPI) - Dustin K. MacDonald - Intelligence Analysis and Training
Predictive Crime Mapping: Arbitrary Grids or Street Networks? | SpringerLink
Locating foreign aid commitments in response to political violence | SpringerLink
Erratum to: Locating foreign aid commitments in response to political violence | SpringerLink
Computational Social Networks - Springer
Pinboard bookmarklet for instant tagging
TidBITS 2016 Gratitude and Holiday Hiatus
ExtraBITS for 12 December 2016
whs.sagepub.com/content/early/2016/12/09/2165079916667736.full
What makes intelligence agencies tick? In search of a causal ... | Self-Publishing at GRIN
500 Internal Server Error
OneTab shared tabs
OneTab shared tabs
Beyond Self-Disclosure: Disclosure of Information about Others in Social Network Sites
A Hybrid Collaborative Filtering Model for Social Influence Prediction in Event-based Social Networks
Journal of King Saud University - Computer and Information Sciences - ScienceDirect.com
Is crime analysis at the heart of policing practice? A case study: Policing and Society: Vol 0, No 0
The Psychology of Foreign Fighters: Studies in Conflict & Terrorism: Vol 0, No 0
Certificate / Advanced Certificate in Terrorism Studies - About the Course Content - Informa plc
Wiley: The Handbook of the Criminology of Terrorism - Gary LaFree, Joshua D. Freilich
The Handbook of the Criminology of Terrorism - Google Books
Managing Public Safety Technology: Deploying Systems in Police, Courts ... - Jeffrey A. Rose, Donald C. Lacher - Google Books
Research | CCJS l Criminology and Criminal Justice Department l University of Maryland
Projects related to Crime Control and Prevention | CCJS l Criminology and Criminal Justice Department l University of Maryland
Projects related to Crime and Justice Decision-Making | CCJS l Criminology and Criminal Justice Department l University of Maryland
Publications related to Crime Control and Prevention | CCJS l Criminology and Criminal Justice Department l University of Maryland
Publications related to Crime and Justice Decision-Making | CCJS l Criminology and Criminal Justice Department l University of Maryland
How to advance a DIYBio lab beyond the basics. - Google Groups
CRIM 103 TEXTBOOB TERMS Flashcards | Quizlet
Terrorism and Homeland Security Chapter 2 Flashcards | Quizlet
Shane D Johnson - Google Scholar Citations
Alex Braithwaite - Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar
Google Scholar
Dugan: Measuring Terrorism - Google Scholar
Johnson: Spatial and Temporal Analysis of Terrorism... - Google Scholar
Sawyer: What Makes Them Do It? Individual‐Level... - Google Scholar
Rose: Managing Public Safety Technology: Deploying... - Google Scholar
Boyd: Group‐level Predictors of Political and Religious... - Google Scholar
Strom: Terrorist Plots the United States: What We... - Google Scholar
The Handbook of the Criminology of Terrorism - Google Scholar
Alex Braithwaite | School of Government & Public Policy
How do crises unfold on Twitter? Learning from the tragic events of #AnkaraAttack | The Social Simulator
Alex Braithwaite - Google Search
HoudahSpot - Google Search
Information Fusion: Intelligence Centers and Intelligence Analysis - Google Search
Spatial and Temporal Analysis of Terrorism and Insurgency - Google Search
The Etiology of Radicalization - Google Search
The Handbook of the Criminology of Terrorism - Google Search
The Terrorists' Planning Cycle: Patterns of Pre‐incident Behavior - Google Search
The Terrorists' Planning Cycle: Patterns of Pre‐incident Behavior - Google Search
What makes intelligence agencies tick? In search of a causal mechanism in CIA administrative behavior - Google Search
Conflict Hot Spots: Emergence, Causes and Consequences (Hardback) - Routledge
Vaultedge
AAAI Publications
OneTab shared tabs
Data Downloads | University of Denver
Daesh Daily - An Update On Daesh Activities
Secrecy News
KWSnet Annotated Subject Directory for the Web
Google Hacking Database, GHDB, Google Dorks
All files and folders - Box
DSpace@MIT: MIT Theses
Data Collections – ICB Project
Scraawl - Actionable Insights from Analytics
Private Security Monitor | Sie | Korbel | University of Denver
Nonviolent Strategies in Violent Settings | University of Denver
The Jihadi Threat: ISIS, Al Qaeda and Beyond | United States Institute of Peace
Newsbud Exclusive Report- A Distillation DOD Spending Spree for November 2016
Military Portal, augmenting the U.S. Air Force Portal and DoD portal, Army, Navy, Marine, National Guard portals
Air War College Gateway to the Internet
CRCnetBASE
CRCnetBASE - Effective Surveillance for Homeland Security
Charting a Course: Strategic Choices for a New Administration > Institute for National Strategic Studies > News
Case Study: Two Arrested in Iranian Aircraft Parts Trafficking Scheme, | Institute for Science and International Security
Interrogating an Engaged Excellence Approach to Research - Institute of Development Studies
CACI to Support JIDO’s Joint Force Intell Integration Mission; Ken Asbury Comments | ExecutiveBiz
How to Turn a USB Stick into an Ultra Portable PC
Most Popular Windows Downloads and Posts of 2016
Save Emails to PDF With This Chrome Extension
Next Episode - Track the TV shows you watch!
Inside the Able Archer 83 Nuclear War Game
U.S. Defense Department Chief Engineer: We Want Your Help With 2030's Tech - IEEE Spectrum
Wanted: In-flight Drone Charging, Itty-Bitty Spy Cams, and More - IEEE Spectrum
News You Can Use: 12/12/16 | Arthur D. Simons Center
Conflict Trends Reports | ACLED
A new report on ISIS is warning Trump from "taking the bait" - Business Insider
Copycat terrorists could use drone to attack plane, intelligence report warns | CP24.com
U.S. Army Special Operations Command Study: Legal Implications of the Status of Persons in Resistance | Public Intelligence
The life of a social engineer: Hacking the human – To Inform is to Influence
Remote Control Project Briefing - We Need to Talk About Yemen | Oxford Research Group
Remote Control Project
Information Overload | Pew Research Center
Small Arms Survey - The Ammunition Tracing Kit
Small Arms Survey - The Weapons ID Database
Technology | Mapping Militant Organizations
2016-17 Key Strategic Issues List
SSI Publications - Most Popular
All SSI Publications by Year/Date
The Strategy Portal at SSI
Lone Wolves: The Identities of Non-Affiliated Terrorists - The Washington Institute for Near East Policy
Data catalog - NASA
GitHub
GitHub - jivoi/awesome-osint: A curated list of amazingly awesome OSINT
Web Data Extraction Using Artificial Intelligence - Diffbot
Find Articles - Military Studies - Library Guides at Penn State University
GovCon Wire | Your Direct Source for Government Contracting News
KWSnet Military: Research Program/Papers/Studies Index
KWSnet Military Resources Index
KWSnet Military: Schools/War Colleges/Training Index
THEATRE GOSSIP #240 - Bootlegs and Dancebelts Edition
Seth Rudetsky - YouTube
Global Terrorism Database | Kaggle
Kernels | Kaggle
European Soccer Database | Kaggle
Broadway Loves Britney - YouTube
ARoamingIranian - YouTube
BBC Radio 1 - YouTube
Alzheimer's MRI deep learning | Kaggle
Getting Real about Fake News | Kaggle
Effectiveness of Police Social Media Use | SpringerLink
Information Fusion: Intelligence Centers and Intelligence Analysis - Springer
The Handbook of the Criminology of Terrorism - Google Books
Human Resources Analytics | Kaggle
The Handbook of the Criminology of Terrorism - Google Books
Do Good Borders Make Good Rebels? Territorial Control and Civilian Casualties: The Journal of Politics: Vol 0, No 0
Information Sharing at United States Central Command - Springer
Information Sharing in Military Operations - Springer
Risk-Averse Stochastic Path Detection
Starbucks Theater - YouTube
Theater Talk: “Falsettos” and “This Day Forward" - YouTube
Handbook of the Criminology of Terrorism - Google Search
Gary LaFree (@glafree) | Twitter
Shooting Alone: The Pre-Attack Experiences and Behaviors of U.S. Solo Mass Murderers - Gill - 2016 - Journal of Forensic Sciences - Wiley Online Library
Information Sharing at United States Central Command - Google Search
Downloads
Sunny dog - Creator's stamp
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.