Light theme
Dark theme
Automatic (use operating system setting)
Shared: 3,238 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
01-02 All the LOVELY OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
DHS COE
Copy links to clipboard
Copy
Open
NSI SMA Reachback Cell paper. | NSI
CCICADA
VACCINE - Purdue University
VACCINE - Purdue University
Investigative Analysis and Anomaly Detection - VACCINE - Purdue University
Resources - VACCINE - Purdue University
VACCINE - Purdue University
Annual Reports - VACCINE - Purdue University
Home | CREATE
Stadium and Large-Venue Security | CCICADA
CVADA - CVADA
CCICADA
How to Protect Large Gatherings from Paris-Style Terrorist Attacks Is Focus of CCICADA Workshop at MetLife Stadium | CCICADA
A Conversation on Venue Security After Paris – March 16, 2016 | CCICADA
Stadium and Large-Venue Security | CCICADA
National Effort to Protect Sports Stadium Fans Led by CCICADA | CCICADA
Stadium Security Guide: Best Anti-Terrorism Practices for Large Venues | CCICADA
REU Students Test Walkthrough Metal Detectors Used at Sports Stadiums | CCICADA
Research into Social Media Use during Extreme Weather Events | CCICADA
Nuclear Detection: Are Taxis the Answer to an Effective Detection Strategy in Manhattan and Other US Cities? | CCICADA
Research | CCICADA
Research Areas | CREATE
Research | CREATE
Validating Models of Adversary Behavior | CREATE
Zhuang, Jun | CREATE
Starts Tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Kill the Newsletter!
Pagico - Manage all your projects and clients in one app. For Mac, Windows, Ubuntu, iOS and Android.
Photography - Mac App Store Downloads on iTunes
Open Source Intelligence Investigation - Springer
Search Results : Analytical Support to Tactical Development"
Uncontrollable War: Why We Can’t Accurately Predict or Adequately Prepare for Violent Conflict - Modern War Institute
Best of 2016: Mac productivity - BrettTerpstra.com
01-25 CORDIS - NATO - FORECAST - OH MY
Copy links to clipboard
Copy
Open
How Russia's Disinformation Campaign Could Extend Its Tentacles : NPR
BG Peter Jones DSB - Google Search
The United States Army | Fort Benning | Leaders
BG Peter Jones russia - Google Search
Brigadier General Peter L. Jones | Global Geopolitics
A Tale of Two Militaries | Global Geopolitics
DVIDS - Video - AUSA 2016: Homeland Defense/Homeland Security: Army-DHS Partnership
A generation ahead? Not by 2030.
Russia New Generation Warfare Study defense science board - Google Search
Russian “New Generation” Warfare: Theory, Practice, and Lessons for U.S. Strategists | Small Wars Journal
Army Magazine | Association of the United States Army
How the Pentagon is Preparing for a Tank War With Russia - Defense One
Inside the Army’s secret study to combat a rising Russia
How The Pentagon Is Preparing For A Tank War With Russia | Zero Hedge
The Secret U.S. Army Study That Targets Moscow - POLITICO Magazine
Russia’s New-Generation Warfare | Association of the United States Army
Russia's 'New Generation Warfare'
DOD Science Board Recommends “Immediate Action” to Counter Enemy AI - Defense One
David Ignatius: Next generation warfare | Columnists | billingsgazette.com
Electronic Warfare: How The U.S. Army Could Lose Its Next War
Russia New Generation Warfare Study defense science board - Google Search
ILW Cont Military Forum - Threats in the 2030 Operating Environments. - Google Search
Contemporary Military Forum VIII: Threats in the 2030 Operating Environments - YouTube
TRADOC Headquarters Library: E-Databases & Links
Russia New Generation Warfare - Google Search
The Art of New Generation Russian Warfare - Fort Russ
Papaly | Start Page
Daily Russia Brief: Moscow-Brokered Syria Peace Talks Begin
St. Petersburg Center Strategy
Advanced Search - OPAC Discovery
Behavioral Influence Assessment (BIA): A Multi-Scale System to Assess Dynamic Behaviors Within Groups and Societies Across Time
Identity Management Symposium | DEFENSE STRATEGIES INSTITUTE | Advancing The Mission. Supporting The Force
the data firm behind trumps win - Google Search
Steven King | LinkedIn
Facebook
DYMATICA - Google Search
Michael L. Bernard
The Moscow School of Hard Knocks: Key Pillars of Russian Strategy
Putin’s “Greater Novorossiya” - The Dismemberment of Ukraine - Foreign Policy Research Institute
traffic court days portland or - Google Search
Traffic Division | The City of Portland, Oregon
A Moist Anti Palantir Protest: No Bagels? No Donuts? : Stephen E. Arnold @ Beyond Search
Searchy Automates Your Search Parameters : Stephen E. Arnold @ Beyond Search
Военный энциклопедический словарь : Министерство обороны Российской Федерации
Russian Defense Minister held a lecture course of the installation "Army and Society": Russian Ministry of Defense
7 Lies You Shouldn't Tell the People Fixing Your Computer
Setapp, the Mac App Subscription Service, Is Now Live for Everyone
Using Computational Modeling to Examine Shifts Towards Extremist Behaviors in European Diaspora Communities - Springer
Better wisdom from crowds | MIT News
Taming data | MIT News
Complex IPB | Small Wars Journal
Repealing ObamaCare will threaten our mental health | TheHill
News You Can Use: 01/25/17 | Arthur D. Simons Center
January News: Profiles of Individual Radicalization in the United States; Terrorist assassinations
Traffic - Fine Payment
Traffic - Contact Information
Traffic - FAQ
People | www.css.gmu.edu
Turn Apple Mail into a powerful, easy to use task management assistant.
All of the new features Apple added in iOS 10.3 beta 1
The Top 10 Reasons People Are Denied a Security Clearance - Promising Practices - Management - GovExec.com
VOA’s Extremism Watch Project Fills a Niche in Monitoring Terrorism - Management - GovExec.com
Brig. Gen. Peter Jones takes command of infantry during emotional ceremony, homecoming | Columbus Ledger-Enquirer
Military Developing Wearable System for Detecting Blasts, Assessing Concussions | Medgadget
Smartphone Microscope for DNA Sequencing and Tissue Mutation Analysis | Medgadget
Here Are the Sanctuary Cities Ready to Resist Trump's Deportation Threats | Mother Jones
The Knowns and Unknowns of Trump’s Cyber Plan - Nextgov.com
The Secret U.S. Army Study That Targets Moscow - POLITICO Magazine
Russia arrests top cyber security expert amid allegations of treason
Best Mac Accessories for Power Users
Best Translation Apps
Don’t let a spotty connection stop you from searching
Modeling Sociocultural Influences on Decision Making: Understanding Conflict ... - Google Books
Hiring Freeze: Some Answers, Some Questions | ChiefHRO.com
The Eight Great Powers of 2017 - by Walter Russell Mead Sean Keeley
Sara: Digital Trends, Nautilus Inc., and Bigleaf Networks are looking for candidates like you. - scitrenbaum@gmail.com - Gmail
Sent Mail - scitrenbaum@gmail.com - Gmail
Pike: Complex IPB - Google Scholar
Pike: Complex IPB - Google Scholar
Pike: New Ideas to Analyze Foreign States - Google Scholar
Pike: Complex IPB - Google Scholar
American Strategy and the Six Phases of Grief
Army Study conducted by BG Peter Jones DSB - Google Search
DSB Slides on CMO - Google Search
Identification of Potential Terrorists and Adversary Planning; Emerging Technologies and New Counter-Terror Strategies - Google Search
MAJ Tom Pike @ GMU - Google Search
MAJ Tom Pike is a Strategic Intelligence officer - Google Search
Pri- vate Traits and Attributes are Predictable from Digital Records of Human Behavior - Google Search
The Shocking Affront of Donald Trump’s C.I.A. Stunt - The New York Times
tom pike css gmu - Google Search
Traffic Citations | Police Records | The City of Portland, Oregon
FAQ: Speed Safety Cameras on the High Crash Network | Fixed Speed Safety Cameras | The City of Portland, Oregon
George Backus
Homeland Security Today: DHS Testing Border Biometric Program in Hunt to Identify Terrorists
DHS outlines biometric future -- GCN
April 2016 Event | Identity Management Symposium | DEFENSE STRATEGIES INSTITUTE
Novetta to Develop System-of-Systems Architecture for DoD Insider Threat Mgmt & Analysis Center | ExecutiveBiz
Behavioral influence assessment for organizational cooperation in cyber security
Towards automated visual surveillance using gait for identity recognition and tracking across multiple non-intersecting cameras | SpringerLink
SWJ Editors | Small Wars Journal
Email Template Generator
Did Michal Kosinski’s methods facilitate Donald Trump's victory? - CeBIT
CHERISH-DE
(1609) Inoreader - [Global] Combating Terrorism Technical Support Office
Marines May Expand Psychological Operations with New Job Specialty | Military.com
NATO - Topic: NATO’s military concept for defence against terrorism
Home - NATO Centres of Excellence - NATO LibGuides at NATO Multimedia Library
Home - Counterinsurgency Strategy - NATO LibGuides at NATO Multimedia Library
Home - Hybrid Warfare - NATO LibGuides at NATO Multimedia Library
Home - NATO - Russia Relations - NATO LibGuides at NATO Multimedia Library
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Ageon ISR | Data Fusion
Novetta Mission Analytics | Operational and Tactical Insights on Demand
Solutions | Multi-Int Analytics | Novetta
Solutions | Open Source / Media Analytics | Novetta
EWTGLANT
Marine Corps Information Operations Center
DARPA Issues RFI for Counter-UAS Capabilities | Unmanned Systems Technology
Identity Intelligence and Special Operations |
Biometric Cyberintelligence and the Posse Comitatus Act by Margaret Hu :: SSRN
Advanced Influence and Information Capabilities - Google Scholar
Biometrics, Recognition, Identity Intelligence, Tracking, and Exploitation (BRITE) - Google Scholar
Bier: Behavioral influence assessment for organizational... - Google Scholar
Advanced Expeditionary Warfare Development
Advanced Influence and Information Capabilities - Google Search
Behavioral Influence Assessment - Google Search
Biometrics, Recognition, Identity Intelligence, Tracking, and Exploitation (BRITE) - Google Search
Counter-Network Concepts and Capabilities - Google Search
Expeditionary Information Operations - Google Search
Expeditionary Information Operations - Google Search
Global Multilingual Social Media Analytics - Google Search
adversaries use traditional military forces and intelligence methods to collect information - Google Search
identity intelligence analyst - Google Search
spotlight novetta - Google Search
Biometric Exploitation Analyst Jobs, Employment | Indeed.com
Effective Communication and Influence | The MITRE Corporation
Michael L. Bernard - Publications
DIA Identity Intelligence Project Office - Google Search
Christopher Munn | LinkedIn
Biometrics: A new intelligence discipline-Identity Intelligence Project Office
(U//FOUO) DoD Instruction: Biometric Enabled Intelligence (BEI) and Forensic Enabled Intelligence (FEI) | Public Intelligence
ICWATCH
Home
EU project Crisma
Work Packages | HOMER Project
OneTab shared tabs
NATO ARW Predetection
Publications - Dr Michal Kosinski
GFIS
Steinmüller.eu Futures Studies
Home Page | advise-project.eu
Sociological Map of Insecurity – Margin
Global Futures Studies & Research by The Millennium Project
Projects Mapped
GCK's Cyberforensics URLs
GKA - Resources
firs2t
Corporate Foresight for Strategy and Innovation | Z_punkt
Home - NATO LibGuides - NATO LibGuides at NATO Multimedia Library
NATO Publications - NATO Multimedia Library - NATO LibGuides at NATO Multimedia Library
NATO Advanced Research Workshop
Publications | cyberterrorism-project.org
csio: October 2016
Global Futures Studies & Research by The Millennium Project
OSINT Literature Review, Name Association, Lessons Learned « Public Intelligence Blog
New online ecology of adversarial aggregates: ISIS and beyond | Science
Steinmüller.eu News
Steinmüller.eu News
News
Force
Sociological Map of Insecurity – First Results
Fore sight
2015-16 SOF
Middle East Peace Scenarios
Real-Time Delphi
The Millennium Project
NATO - NATO-Russia : setting the record straight
NATO - Topic: Exercises
Race 2050
Publications | SPSP
TAMC | About us
Welcome to the Werbos World
Futures Studies Tackling Wicked Problems
How technology could help predict terrorist attacks
(1) Rohit Talwar - Great presentation by the excellent Karlheinz...
Core Principles of an Information System to Anticipate Extreme Events - Google Search
Identification of Potential Terrorists - Google Search
Some aspects and consequences of non-detection: ‘the cost of failure - Google Search
The potential "backyard terrorist - Google Search
The world in 2040. Framework Conditions for New Kinds of Terrorism - Google Search
What If” database - Google Search
wareness and Forecasting for Countermeasures to Weapons of Mass Destruction - Google Search
How the changing media is changing terrorism | Jason Burke | World news | The Guardian
Resources - United Nations Security Council Counter-Terrorism Committee
Advanced Research Workshop (ARW) - Google Search
NATO Advanced Research Workshop on Terrorist Use of the Internet – Assessment and Response - VOX - Pol
Afghanistan and Central Asia: NATO's Role in Regional Security Since 9/11 - Google Books
ELECTRONICAL LARVICULTURE NEWSLETTER ISSUE 164
ARWtr2016
National Center of Security and Protection (NATSP)
NATO Advance Research Workshop in Georgia | ATA - Atlantic Treaty Association
Advanced Research Workshop Findings | Belfer Center for Science and International Affairs
CORDIS
Copy links to clipboard
Copy
Open
CORDIS Archive : European Commission : CORDIS : Archives : European Commission : CORDIS : Archives : FP7
European Commission : CORDIS : Projects & Results Service : Modelling crisis management for improved action and preparedness
CRISP
EAB - EAB Research Projects Conference (EAB-RPC) 2016
Documents Archive | Evaluations - Research & Innovation - European Commission
Home | Evaluations - Research & Innovation - European Commission
Understanding - FP7 - Research - Europa
Home page - Research & Innovation - European Commission
EU Projects Overview | ILSI Europe
Futures Research Methodology
Practice
The Global Risks Report 2017, 12th Edition - World | ReliefWeb
CENTRIC | CENTRIC Sheffield Hallam University Website
Projects | CENTRIC
The VASCO Project
Next Generation Technologies In Emergency Services | www.acilteknolojileri.com
Small Summit 2016 Attendees | BDVA
EU project Crisma
EU project Crisma
EUCISE 2020 Project Home Page
Home | Evidence
Research Centers | Fondazione Bruno Kessler
EU Projects - Helmholtz Centre Potsdam GFZ German Research Centre for Geosciences
Crisis management, simulation | Homeland Security News Wire
Der Joker – Das Gaming Magazine
PRACTICE | FP7 Security Project
Practice - PRACTICE | FP7 Security Project
Downloads - PRACTICE | FP7 Security Project
PREDICT News & Activities | PREDICT
Deliverables | ATHENA
Publications | ATHENA
International Projects - RIVM
Analytics, Business Intelligence and Data Management | SAS UK
Application of Big Data for National Security - ScienceDirect
Project | SecInCoRe
Publications | SecInCoRe
Deliverables | SecInCoRe
Scientific Publications | SecInCoRe
Workshop | SecInCoRe
SecurePart
Home
Research projects - Research - Sociological Studies - The University of Sheffield
Professor Helen Kennedy - Staff profiles - Staff - Sociological Studies - The University of Sheffield
» STS Events EASST
Horizon 2020 - Wikipedia
Home
CyberRoad: Home
Application of Big Data for National Security - 1st Edition
Research | University of Catania
02-2 PM
Copy links to clipboard
Copy
Open
Middle Eastern Fighters Are Building Roving Warbots | WIRED
Europeana Space - Waag Society
SIMULTECH 2017 - Abstracts
Dr. Tuncer Oren, simulation methodology, modeling methodology, general system theories,cybernetics, M&SNet, MISS, ethics
UChicago CPOST
UChicago CPOST
Publications | The Society for Modeling & Simulation International
High resolution global gridded data for use in population studies : Scientific Data
One Line ASCII Art -
Hacking Culture: a guide - Waag Society
Open Government Data: The Book
Bear - Notes for iPhone, iPad and Mac
Bryan Bishop / kanzure, Homepage of
diyhpluswiki
kanzure/diyhpluswiki: a wiki for do-it-yourself biohacking, open source hardware and transhuman tech
SMA Reachback | NSI
Consortium - PRACTICE | FP7 Security Project
Document Library
Screenshots - FreeFileSync
proposals
Browser extensions - Bear - Faq and support
Migrate from Evernote - Bear - Faq and support
automato.farm
European Commission : CORDIS : Home
The Journal of Defense Modeling and Simulation - Volume 11, Number 3, Jul 01, 2014
Publications - The Laboratory for Complex Systems and Nonlinear Dynamics in Fluids and Granular Materials - Northwestern University
National Homeland Security Association
SBS Decadal White Papers 1
Welcome to Smart-E | Smart-E Marie Curie
Hacking Culture Bootcamp - Waag Society
Science Solidarity
FreeFileSync - FreeFileSync
Scientific Data
Conferences | Vicente Aguilera Díaz
The DIY Maker Movement is being hijacked - Waag Society
The ODIN
Launcher with Notification Center Widgets on the App Store
Examining and Learning from Complex Systems Failures
Observations on 10 Days of Trumpian Statecraft – Medium
Richard Nephew – Medium
Cellebrite Sold Phone Hacking Tech to Repressive Regimes, Data Suggests - Motherboard
Hacker Dumps iOS Cracking Tools Allegedly Stolen from Cellebrite - Motherboard
Hacker Steals 900 GB of Cellebrite Data - Motherboard
Here Are the Terms for Cellebrite's iPhone Unlocking Service - Motherboard
Wernecke: How to test for partially predictable chaos - Google Scholar
bellingcat - Open Source Survey of the US Raid in Yemen - bellingcat
INERT PRODUCTS, LLC - Inert Explosive Training Products, IED & EOD Training Aids, C-IED Support Materials, Dummy Guns, Battlefield Effects - Inert Explosives, Simulated Explosives, Replica Ordnance, EOD / IED Training Aids, X-Ray Correct Simulated Explosives, CIED, Counter-IED, Inert Devices, Military Training Aids, Bomb Unit Training Aids, Dummy Guns, Rubber Duck Weapons, Bomb Training Products, Hazardous Devices Training Aids, Blast Simulators, Machine Gun Simulators, Casualty Simulation, Advanced Ordnance Teaching Materials, OPFOR Training Kits, K9 Training Aids, IED Training Kits, Movie Props and Weapons
(8) Joseph Cox (@josephfcox) | Twitter
Removing Thailand Government’s Certificate Authority from Microsoft Windows – Medium
JDMS - Call for Papers | SAGE Publications Inc
SIM - Call for Papers | SAGE Publications Inc
iOS 10: The MacStories Review – MacStories - page 4
02-02
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Barabási Albert-László - Publications
Conference papers and records - Vitrociset
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Challenges | Special Issue : Challenges in New Technologies for Security
Help Us Map TrumpWorld - BuzzFeed News
Counterterrorism Policy Guide - The Intercept
User Account
IC OFF THE RECORD - Intelligence Leaks Published in 2017
MDPI | Journals A-Z
Challenges | December 2016 - Browse Articles
Challenges | June 2016 - Browse Articles
IC OFF THE RECORD - Intelligence Leaks Published in 2016
Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking
Undercover FBI Agents Swarm the Internet Seeking Contact With Terrorists
Military, Military Technology | Popular Science
BurakKadercan (@BurakKadercan) | Twitter
Opinion
The Method behind the Islamic State’s Madness - War on the Rocks
Research
Teaching
The Master Plan: How to Stop ISIS | The National Interest
U.S. Naval War College | Case Studies
Triangulating territory: a case for pragmatic interaction between political science, political geography, and critical IR | International Theory | Cambridge Core
Making sense of survival: refining the treatment of state preferences in neorealist theory | Review of International Studies | Cambridge Core
Last Week Tonight (@LastWeekTonight) | Twitter
The Desperate Battle to Destroy ISIS - The New Yorker
Deterrence and Dissuasion in Cyberspace | International Security | MIT Press Journals
(1) Patrick Meier (@PatrickMeier) | Twitter
A Suspicious Death and Three Cyber Arrests Point to a New Twist in the US Election Hack - Defense One
Darren Gergle - Publications
"Algorithms ruin everything" : #RIPTwitter, Folk Theories, and Resistance to Algorithmic Change in Social Media
Darren Gergle - Followers
Robert E. Kraut - Publications
Yoram M Kalman - Publications
Jeremy P. Birnholtz - ResearchGate
Jeffrey T Hancock - Publications
ResearchGate
Kwame Awuah-Offei - Publications
Steve Bannon: 'We're going to war in the South China Sea ... no doubt' | US news | The Guardian
(19) #pdxtraffic hashtag on Twitter
Is ISIS Breaking Apart? | RAND
Turn Any Desk Into a Part-Time Standing Desk For Under $150
Twitter, Dropbox, Facebook, More: Tuesday Afternoon Buzz, January 31, 2017 | ResearchBuzz
Cost of living index – We compare Columbus to peer cities across the U.S. - Portland Business Journal
Best paid apps for Mac | iMore
IARPA Seeks Technologies and Methods to Detect Genome Editing
Time for a Factory Reset with Russia. Please Close all Open Programs | Small Wars Journal
The Islamic State’s Drone Documents: Management, Acquisitions, and DIY Tradecraft | Small Wars Journal
Michael Best (@NatSecGeek) | Twitter
Cost of Living Index - Google Search
Deliverables | Driver Project
Publications
Leveraging the Internet of Things for a More Efficient and Effective Military | Center for Strategic and International Studies
Armed and Dangerous? UAVs and U.S. Security | RAND
Exclusive: How technology is used to predict and prevent terror attacks
DoD’s ‘Organ-on-a-Chip’ Innovation Wins Big | Armed with Science
A Tiny Device Could Save Precious Moments During Combat Traumas | Armed with Science
MEDUSA - Vitrociset
SUNNY - Vitrociset
NATO - SPS - Country Flyer page
Artificial Intelligence and the Future of Warfare | Chatham House
(67) The Application and utility of modern technologies by Anti-terrorist agencies: A study of U.S response to Al Qaeda | Ikechukwu Omenogor - Academia.edu
Automation in Military Operations - POST Note - UK Parliament
Overview of military drones used by the UK Armed Forces - Commons Library briefing - UK Parliament
NATO - Topic: Defence Against Terrorism Programme of Work (DAT POW)
NATO - Topic: Centres of Excellence
TrumpWorld Data — Public - Google Sheets
SMART - Vitrociset
Welcome to the Arthur D. Simons Center for Interagency Cooperation
FBI, 5 other agencies investigating Kremlin aid in hacking, sources say | McClatchy DC
Intercepted Russian Communications Part of Inquiry Into Trump Associates - The New York Times
Predictive Analytics: The Use and Constitutionality of Technology in Combating Homegrown Terrorist Threats - Google Search
Risk Management – Terror Tech
How to Catch a Terrorist - The New Yorker
A social media and crowdsourcing data mining system for crime prevention during and post-crisis situations - Google Search
dblp: Simon Andrews
Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime - Springer
Service-Oriented Design of a Command and Control Intelligence Dashboard for Crisis Management. - Google Scholar
U.S. Air Force Center for Strategy and Technology - Future Studies and Reports
Hexagon Geospatial Names IGNITE Competition Winners
#MacStoriesDeals (@MacStoriesDeals) | Twitter
LumaFusion on the App Store
Expressions on the Mac App Store
GitBar - the menu bar git repository notifier on the Mac App Store
Home page - FP7 - Research - Europa
Publication — American Council on Science and Education
Intelligence options for a small country : Centre for European and North Atlantic Affairs – Analysis
European Commission : CORDIS : Projects & Results Service : Automated Serious Game Scenario Generator for Mixed Reality Training
DVIDS Unit RSS Feed: Army Multimedia & Visual Information Directorate
Home - Eurecat
DARWIN - Project Deliverables
Exploiting Web Browsing Activities for User Needs Identification - IEEE Xplore Document
IEEE Xplore - Conference Table of Contents
IEEE Xplore - Conference Table of Contents
Downloads and Links | CENTRIC
Expertise | CENTRIC
Expertise | CENTRIC
TRANSRAD | CENTRIC
Publications | CENTRIC
Cyber Crime and Cyber Terrorism Investigator’s Handbook (1st Edition) | CENTRIC
Strategic Intelligence Management: National Security Imperatives and Information and Communications Technologies | CENTRIC
AUGGMED Team to Develop Anti-Terrorist Training Software – Shipping and Marine Events
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
Consortium – TENSOR
www.auggmed-project.eu/knowledge-hub.aspx
Working Documents | COSMIC
eisic 2017: Keynote Speakers
Emergent at the 13th International Conference on Web Based Communities and Social Media | EmerGent
Publications | EmerGent
Publications | EmerGent
Publications | EmerGent
Related Projects | EmerGent
Intellect Ltd.
ATHENA | Empowering Citizens, Protecting Communities
Joint Hosted Open Source Intelligence Conference | ATHENA
About ATHENA | ATHENA
D9.4 Exploitation Plan | ATHENA
D9.8 ATHENA Published Volume | ATHENA
West Yorkshire Police use analytics from SAS to improve disaster response | SAS UK
West Yorkshire Police use analytics from SAS to improve disaster response | SAS UK
Related projects - TARGET h2020
Vitrociset
EC - VOX-Pol Lunch Briefing Series: Lone Actors, Extremism and Understanding Online Radicalisation - VOX - Pol
Application of Big Data for National Security: A Practitioner’s Guide to ... - Babak Akhgar, Gregory B. Saathoff, Hamid R Arabnia, Richard Hill, Andrew Staniforth, Petra Saskia Bayerl - Google Books
Section 3 - ADVERSARY FOREIGN INTELLIGENCE OPERATIONS - Operations Security - INTELLIGENCE THREAT HANDBOOK</h3></td>
Akhgar: OSINT as an Integral Part of the National... - Google Scholar
bellingcat - by and for citizen investigative journalists
https://www.epoolice.eu/EPOOLICE/servlet/document.listPublic
https://www.epoolice.eu/EPOOLICE/servlet/link.listPublic
A collection of edited social media networks and smart mobile technology research papers communicating the impact for ordinary citizens and first responders during a crisis from ATHENA, iSAR+ and COSMIC research. - Google Search
D9.8 ATHENA Published Volume - Google Search
Helen Gibson - Publications
Konstantinos Domdouzis - Publications
Simon Andrews - Publications
Military Geoscience by Jamie Keith Pringle - Research Project on ResearchGate
V20
OSINT as an Integral Part of the National Security Apparatus
Babak Akhgar - ResearchGate
Open Source Intelligence Investigation | springerprofessional.de
Further Information | West Yorkshire Police
Latest News | West Yorkshire Police
Related Projects | West Yorkshire Police
AUGGMED | West Yorkshire Police
Home
Links - Bonas Project
Decision support systems and information fusion - Totalförsvarets forskningsinstitut
Reports and publications - Totalförsvarets forskningsinstitut
Scientific publications - Totalförsvarets forskningsinstitut
Popular science publications - Totalförsvarets forskningsinstitut
Open Sourcing Plans for “Low-Tech, High-Thinking” Water Filters
Donald J. Trump (@realDonaldTrump) | Twitter
Curio 11. The Ultimate Project Notebook - BrettTerpstra.com
The Islamic State Is Pioneering a New Type of Drone Warfare - Motherboard
ISIL, Syria & Iraq Resources | Combating Terrorism Center at West Point
CTC Perspectives – The Islamic State’s Drone Documents: Management, Acquisitions, and DIY Tradecraft | Combating Terrorism Center at West Point
Zengobi Curio - Note Taking, Mind Mapping, Brainstorming
European Commission : CORDIS : FP7 Cooperation - Security Research
European Commission : CORDIS : Projects & Results Service : Evidence based policy for post crisis stabilization: bridging the gap
European Commission : CORDIS : Projects & Results Service : Final Report Summary - CAERUS (Evidence based policy for post crisis stabilization: bridging the gap)
Memo mapping metrics, methods, and interventions Deliverable number D2.1 :: TNO Repository
TNO Repository search for: subject:"Defence, Safety and Security"
Project Updates / News / Events
The Group That Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State | Combating Terrorism Center at West Point
CTC Perspectives – Welcome to the Hotel Caliphate: You Can Check-Out Any Time You Like, But You Can Never Leave | Combating Terrorism Center at West Point
Revealed: Isis developing weaponised drones in secretive programme | The Independent
Counter-UAS Technologies
Playbook Plus: Win the morning. Own the day. Get the new Playbook. - POLITICO
Why Romania Is Witnessing The Largest Protests In Decades - BuzzFeed News
FOI - Totalförsvarets forskningsinstitut
Trump Year One: Place Your Bets | Belfer Center for Science and International Affairs
The nature of power in the networked age - The Boston Globe
Mattis Could Resolve the Israeli-Palestinian Conflict | The National Interest
Twitter Activist Security – Medium
Use Food Coloring to Create Tie-Dyed Flowers | Make:
Program with Robot Operating System for Smooth Servo Movement | Make:
The state of Jupyter - O'Reilly Media
Conference - Security Research & Innovation Event 2016
Programme 1 - 2 June 2016 - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
home-luglio-2015 — Enea
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Innovation Room - Security Research & Innovation Event 2016
Research and innovation
Research programmes
Latest Forensic Innovations
Innovation Room - Security Research & Innovation Event 2016
BOmb factory detection by Networks of Advanced Sensors - Google Search
European Commission : CORDIS : Projects & Results Service : BOmb factory detection by Networks of Advanced Sensors
European Commission : CORDIS : Projects & Results Service : Final Report Summary - BONAS (BOmb factory detection by Networks of Advanced Sensors)
Sewer sensors to sniff out bomb ingredients - BBC News
Our Knowledge - Totalförsvarets forskningsinstitut
Technical reports - Totalförsvarets forskningsinstitut
The Aviationist » ItAF contributes to the "Bomb factory detection by Networks of Advanced Sensors" project to counter homemade IEDs
Challenges | Free Full-Text | Expert System for Bomb Factory Detection by Networks of Advance Sensors
Alessandro Ulrici - Publications
Francesco Saverio Romolo - Publications
Laser Diagnostic Instruments | Projects
Intelligence Social Network Analysis - Google Search
Social Network Visualization - Cambridge Intelligence
Social Network Analysis Archives - Cambridge Intelligence
Link Prediction in Criminal Networks: A Tool for Criminal Intelligence Analysis
Tag: Social Network Analysis - Bright Data
Social network analysis in SAS® Visual Investigator
Data Mining for Predictive Social Network Analysis
GIJN Launches New Feeds in Arabic, Russian | Global Investigative Journalism Network
CENSIT – Fusion of CBRN sENSor Information in Tactical networks (Poster) - Google Search
Saved Session - Session Buddy
Exploring Social Media’s Influence During Conflict and Crisis | Grounded Curiosity
Self Study Program / Future War - Army Capabilities Integration Center
Agent-based modeling of availability for complex multiple units systems: Journal of Quality in Maintenance Engineering: Vol 23, No 1
DOD IG Report: CENTCOM Did Not Distort ISIS... - Matthew Aid
RAND Europe Research on Defence and Security | RAND
RMA - Scientific publications
RMA - Research centres
RMA - Research
Making your career in security - Security Talent
> U.S. DEPARTMENT OF DEFENSE > Contract View
Science Everywhere | DonorsChoose.org
STO-MP-SAS-105 - Information Operations for Influence - Google Search
Nicolas Sabouret - Publications
Security Research & Innovation Event 2016 - Security Research & Innovation Event 2016
STO Technical Panels
STO-MP-SAS-105 - All Documents
Search Results : Analytical Support to Operations"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Search Results : Analytical Support to Tactical Development"
Events - The Hague Security Delta
Safety and Security (SSA) 2015 - The Hague Security Delta
Five New Premium HSD Partners Present their Challenges on Security of Critical Infrastructures during HSD Café - The Hague Security Delta
Nationale Politie - The Hague Security Delta
Innovation Experience Room - The Hague Security Delta
Petition the White House on the Issues that Matter to You | We the People: Your Voice in Our Government
A majority of one walks away from his keyboard - POLITICO
http://trump.kimalbrecht.com/network/
PlanetRisk
New Arrivals - Women
Drone Database - Proliferated Drones
ISIS and Religion and Nation Building in the Middle East | NSI
Data journalism tool collection | Journocode
You're Going to Die, Here's How to Deal With It
Services at NSI | NSI
Dropbox Introduces Smart Sync for Business Customers and Paper Emerges from Beta – MacStories
Help Us Map TrumpWorld - BuzzFeed News
visual research : kim albrecht
Center for Complex Network Research - Google Search
Center for Complex Network Research (CCNR) - Research at Northeastern University
Barabási Albert-László - Publications
Predictive Analytics Will Level-Up Duty of Care: Business Travel News
Border Security Summit | DEFENSE STRATEGIES INSTITUTE | Advancing The Mission. Supporting The Force
Russia–Syria Internal Threat Alliance (2010–2016) - Springer
Lessons From the Terrorist Attacks in Paris, Brussels, and Boston | Violence | JAMA Surgery | The JAMA Network
Proportionality and precautions in attack: The reverberating effects of using explosive weapons in populated areas | International Review of the Red Cross | Cambridge Core
The Dangers of Pakistan’s Tactical Nuclear Weapons | The Diplomat
Forget needles and haystacks – it’s more complicated than that « Counter-terrorism matters
Big data in CT – Investigatory Powers Bill Submission « Counter-terrorism matters
Online Event Registration - Cyber Counterintelligence Tradecraft
Top Ten #ddj: The Week’s Most Popular Data Journalism Links | Global Investigative Journalism Network
Clandestine Cyber HUMINT – The Cyber Shafarat – Treadstone 71
Eichenwald: Neil Gorsuch Is Supremely Qualified, and Must Not Be Confirmed
Global terrorist activity in 2015 – mapped | World Economic Forum
No ‘G’day, mate’: On call with Australian prime minister, Trump badgers and brags - The Washington Post
Russian Infiltration of the US Federal Government - JestersCourt
Amy Pate | START.umd.edu
Chrome 57 Will Permanently Enable DRM
Russia–Syria Internal Threat Alliance (2010–2016) - Google Search
Threats to U.S. Vital Interests in Europe
Deathhacker News, Videos, Reviews and Gossip - Lifehacker
Bringing COIN to the Airport: On the Effectiveness of the “Muslim Ban” | Small Wars Journal
Pentagon Probe of Islamic State Intelligence Finds Reports Weren’t Skewed - WSJ
Dunford: Speed of Military Decision-Making Must Exceed Speed of War | Small Wars Journal
DoD News | Small Wars Journal
Dunford: Speed of Military Decision-Making Must Exceed Speed of War > U.S. DEPARTMENT OF DEFENSE > Article
Macdrifter
Edge Popularity Prediction Based on Social-Driven Propagation Dynamics - IEEE Xplore Document
Smartphone-based immunosensor for CA125 detection
MOOC Terrorism and Counterterrorism - Office Chat Jan 2017 - Trump, IS, Nigeria and Quebec - YouTube
Analytical Chemistry for Cultural Heritage - Google Books
Shortcomings of the Paris Accord: We Need to Combat Air Pollution at Multiple Scales - The Nature of Cities
Mob Control: Models of Threshold Collective Behavior - Springer
Great Powers, Weak States, and Insurgency - Springer
Combining Convolutional and Recurrent Neural Networks for Human Skin Detection - IEEE Xplore Document
Peacebuilding, Statebuilding and Liberal Peace - Springer
Traditional Media, Social Media, and Different Presidential Campaign Messages - NYU Press Scholarship
The Data That Turned the World Upside Down - Motherboard
An Online and Distributed Approach for Modulation Classification using Wireless Sensor Networks - IEEE Xplore Document
The Problem of Shared Victory: War-Winning Coalitions and Postwar Peace: The Journal of Politics: Vol 0, No 0
News of Terrorism and the Israeli-Palestinian Conflict (January 25 – 31, 2017)
Talk Intel To Me | Duck of Minerva
No One Can Replace Peter Capaldi on Doctor Who | WIRED
MIT CSAIL Made a Wearable That Knows How a Conversation's Going | WIRED
Trump Supreme Court Nominee Neil Gorsuch Needs to Get Tech—These Cases Show Why | WIRED
Are We Hardwired for War? - Modern War Institute
NSI Social Media and Political Effects | NSI
NSI Human Behavior Analytics Applications | NSI
(16952) Inoreader - [Global] JOINT IMPROVISED-THREAT DEFEAT ORGANIZATION2
Operationalizing Small Sats
TERESA project adds a vital component to human-robot interaction: social intelligence | Robohub
US Military Botching Online Fight Against Islamic State, AP Investigation Finds | Small Wars Journal
Bombshell: Ain't No Party Like an America First Party
Fantastical 2.8 Brings Rich Notifications, iMessage Stickers – MacStories
Linea: An Elegant Sketching App for the iPad from The Iconfactory – MacStories
DHS reviews U.S./Canada border security | Arthur D. Simons Center
News You Can Use: 02/01/17 | Arthur D. Simons Center
Agencies investigate Russia, Trump associates | Arthur D. Simons Center
Saved Session - Session Buddy
49 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
Jarrod Spector: Jukebox Life @ Feinstein's 54 Below (11/13/2016) "Born To Run" - YouTube
Mapping Territorial Control in Civil Wars – Political Violence at a Glance
Women's Boots in Sale! - Rocket Dog
Innovation Room - Security Research & Innovation Event 2016
Becoming a European homegrown jihadist: a multilevel analysis of involvement in the Dutch Hofstadgroup, 2002-2005
Dissertations
Program 2017 - CBRNE Conference
SUBCOP
A big one for Big Brother | MENAFN.COM
INSPEC2T – Inspiring CitizeNS Participation for Enhanced Community PoliCing AcTions
Minerva Initiative
Engineer Research and Development Center Videos | U.S. Army Engineer Research and Development Center, ERDC Overview
A Simulation Model of Katouzian's Theory of Arbitrary State and Society: Forum for Social Economics: Vol 0, No 0
AmazonSmile | Palladium Women's Flex Lace Mid PD | Fashion Sneakers
Innovation Room - Security Research & Innovation Event 2016
Student Discount | Perks of Student Life | UNiDAYS
EU Security Research Projects Awarded (15/06/2016) – Security Europe
European Security | CBRNE Central
AIS Electronic Library (AISeL) - Wirtschaftsinformatik 2017 Proceedings: Sensemaking and Communication Roles in Social Media Crisis Communication
European Commission : CORDIS : Projects & Results Service : Improved First Responder Ensembles Against CBRN Terrorism
The impact of modeling paradigms on the outcome of simulation studies
EUR-Lex - 52016JC0018 - EN - EUR-Lex
European Commission - PRESS RELEASES - Press release - Security: EU strengthens response to hybrid threats
Combining Convolutional and Recurrent Neural Networks for Human Skin Detection - IEEE Xplore Document
Internal Threat Alliances: A New Conceptual Framework - Springer
Physical Unclonable Functions and Intellectual Property Protection Techniques - Springer
How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks | Abstract
Home | BAE Systems | International
Digint
Home | Max Planck Institut für ethnologische Forschung
A solution to the single-question crowd wisdom problem : Nature : Nature Research
Home
Royal Military Academy
IMMOBILITY REACTIONS UNDER THREAT: A CONTRIBUTION TO HUMAN DEFENSIVE CASCADE AND PTSD
Web Portal Login
DataExpert - Your partner in the fight against (cyber)crime
Securing dangerous material
The Strategic Architecture of ISIS – An Emerging State Actor. - army
The Dynamics of ISIS – An Emerging State Actor. - Google Scholar
NFI: A world leading forensic laboratory
CN-244-455 - Google Search
Maldith: Research Software - Google Search
The Dynamics of ISIS – An Emerging State Actor. - Google Search
react european security eu cbrn - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=11&ved=0ahUKEwjziY7AkezRAhVG2mMKHQY-BQc4ChAWCBkwAA&url=http%3A%2F%2Fwww.anagomes.eu%2FPublicDocs%2Fbc03ca03-3da0-4b88-8ccc-038a3449bffd.pdf&usg=AFQjCNFxtgRRd3F-_9YbltoB99jT1RQ6og&sig2=ap7o91OidY_WrqdRHYK3Vg&bvm=bv.145822982,d.cGc
Innovation Room - Security Research & Innovation Event 2016
ThreadStone, protection against cybercrime
8 tabs
Copy links to clipboard
Copy
Open
CRCnetBASE - 11 Terrorism Crime Prevention Policies in Liberal Democracies: Challenges, Dilemmas, and Options
George Walker Bush and the International Outreach - Springer
Barack Hussein Obama and the New Retrenchment - Springer
Project MUSE - Sovereign Aspirations: National Security and Police Power in a Global Era
Barack Obama: A Foreign Policy of Disengagement - Springer
Cycles in US Foreign Policy since the Cold War - Thomas Henriksen - Google Books
US–Afghanistan Internal Threat Alliance (2001–2012) - Springer
Project MUSE - Worlds Neither New Nor Brave: Racial Terror in America
01-31 IMPORTANT
Copy links to clipboard
Copy
Open
EMERGE - QUANDHIP
The TREsPASS Project
Innovation Room - Security Research & Innovation Event 2016
Projects - The Hague Security Delta
TNO - The Hague Security Delta
CBRN - The Hague Security Delta
HSD - Leading Security Cluster in Europe - The Hague Security Delta
Reports - The Hague Security Delta
Real Time Intelligence (RTI) Lab Programme - The Hague Security Delta
Challenges in researching terrorism from the field | Science
PhilPapers: Online Research in Philosophy
CEEOL - Article Detail
How do you stop a potential suicide bomber?
SUBCOP
Time for innovation
New HSD Report: Lessons Learned from the Deployment of Innovation During the NSS in The Hague - The Hague Security Delta
Real Time Intelligence - The Hague Security Delta
International Opportunities for Area Protection Solutions - The Hague Security Delta
Workshops - Security Research & Innovation Event 2016
Team — Centre for Innovation
Labs — Centre for Innovation
Resources and Conflict Project
Outreach + Updates | Resources and Conflict Project
Jan P. H. van Santen CV
Big Data and Gender - Data2x
UCLA: Electronic Thesis and Dissertations [eScholarship]
the interdisciplinary Center for technology, Analysis and Forcast at Tel-aviv university
The Journal of Open Source Software
The Journal of Open Source Software
Frontiers in Bioengineering and Biotechnology
- Home - Library at Joint Special Operations University
The future point-of-care detection of disease and its data capture and handling | SpringerLink
Security and threat | Leiden University
Tweets About Global Development Issues - UN Global Pulse
Public Records Directory
Forgot Password
Institute for the Study of War
Research | Belfer Center for Science and International Affairs
Scale Model, Betaworks startup, can analyze your online personality - Business Insider
Home — Humanity X
Sensors | An Open Access Journal from MDPI
Protocols - OpenWetWare
A 3D paper-based enzymatic fuel cell for self-powered, low-cost glucose monitoring
Practical challenges related to point of care testing
A Look at the Gender Distribution of Tweets about Global Development | United Nations Global Pulse
The 2nd International Conference CBRNE - Research & Innovation
jabe-2014-f.pdf, Page 1 - Investigative Dashboard Search
title-index
minor ui and navigation fixes by cube5 · Pull Request #149 · DIYbiosphere/sphere · GitHub
We need a method to archive data that would possibly disappear in future · Issue #262 · caesar0301/awesome-public-datasets · GitHub
searx.me
Why I’m Considering Bear as a Notes App Replacement – MacStories
Northwest Scientific Association - 2017 Annual Meeting
David Lindgren
Johann F Osma - Publications
CBRN Network of Excellence
National Security: improving equipment and actions during disasters | TNO
Social media in the security sector | TNO
Research dossiers - Leiden University
Saved Session - Session Buddy
5 tabs
Copy links to clipboard
Copy
Open
Analytical and Bioanalytical Chemistry, Young Investigators in Analytical and Bioanalytical Science - Springer
FuckYeah Musicals - YouTube
YouTube
ren598 - YouTube
Natalie Weiss - YouTube
COURSERA
Copy links to clipboard
Copy
Open
Paradoxes of War - Princeton University | Coursera
Terror Courses | Coursera
Understanding Terrorism and the Terrorist Threat - University of Maryland, College Park | Coursera
Terrorism and Counterterrorism: Comparing Theory and Practice - Universiteit Leiden | Coursera
Security & Safety Challenges in a Globalized World - Universiteit Leiden | Coursera
6 tabs
Copy links to clipboard
Copy
Open
Suggested Publications
Cutting the cord
3D bioprinting of functional human skin: production and in vivo analysis - IOPscience
Agent Based Modelling as a Decision Support System for Shadow Accounting
The Polish Quarterly of International Affairs, no 3/2016
CEEOL - Article Detail
10 tabs
Copy links to clipboard
Copy
Open
The Secret Garden 25th Anniversary Concert - YouTube
Musical Artists - YouTube
Laura Osnes - "Fools Who Dream/A Dream Is A Wish Your Heart Makes" ('La La Land,' 'Cinderella') - YouTube
ren598 - YouTube
AngelsBwayTunes - YouTube
You Will Be Found - Dear Evan Hansen - YouTube
Benjamin Rauhala - YouTube
Famous In NY Video - YouTube
Hushabye Mountain - Ramin Karimloo - YouTube
Open_Science_101/README.md at master · OKScienceDE/Open_Science_101 · GitHub
01-30
Copy links to clipboard
Copy
Open
The Alt-Majority: How Social Networks Empowered Mass Protests Against Trump - The New York Times
Stop calling them "Mr. President," it's undemocratic | The War Room
Fourth generation war and the intelligence arm
Adam Bonin (@adambonin) | Twitter
Executive Orders 101: What are they and how do Presidents use them?
The Day's Most Fascinating News with Dave Pell
AP: Trump's voter fraud expert registered in 3 states
Justice head tells staff not to defend Trump refugee order
Politics, Policy, Political News - POLITICO
Trump’s Supreme Court pick gets personal - POLITICO
Trump adding CIA chief back to National Security Council - POLITICO
Senate GOP rebuffs Dem bid to repeal Trump's immigration order - POLITICO
Trump’s early moves trigger business backlash - POLITICO
The man behind Trump? Still Steve Bannon - POLITICO
Indivisible: A Practical Guide for Resisting the Trump Agenda
The Leader of the Islamic State in the 2004 Fallujah Battles: Umar Hadid | The Syrian Intifada
Kyle W. Orton (@KyleWOrton) | Twitter
How a change agent saved the FCC millions on a legacy IT upgrade | The Enterprisers Project
Home - AllSource Analysis
Lawmakers Call For Halt To DARPA Program: Robots Repairing Satellites « Breaking Defense - Defense industry news, analysis and commentary
CompassRed, Inc.
emotions.periscopic.com
Introduction | Hackage
Isenberg Institute of Strategic Satire
A List of Organizations Dedicated to Helping Immigrants and Refugees That Need Your Support
The Best Habit Tracking App for iPhone
An Empirically Informed Taxonomy for the Maker Movement - Springer
The One Year Excel Spreadsheet Experiment That Changed My Lifestyle - The Medical Futurist
Hybrid Threat Center of Gravity Analysis: Taking a Fresh Look at ISIL > National Defense University Press > Joint Force Quarterly 84
PUBLIC RECORDS DIRECTORY - Steven Poulin
University of Pennsylvania ScholarlyCommons
Trump signs '2-for-1' order to reduce regulations | TheHill
R&D European Grants from 2020 Horizon
First 100 Days | AAAS - The World's Largest General Scientific Society
Products | Altamira Technologies
Page Not Found - British Army Website
NATO Chief Confident Trump is Committed to the Alliance
BBC Radio 4 - Controlling the Unaccountable Algorithm
All That Is Left To You: Game Theory Reductions of the Israel-Palestine Conflict | Belfer Center for Science and International Affairs
Arab Human Development Report 2016: Youth and the Prospects for Human Development in a Changing Reality | Belfer Center for Science and International Affairs
The Stroz Friedberg Cyber Brief — Center on National Security
The Spectrum Collaboration Challenge: Let the Games Begin!
The 2017 Health Insurance Exchanges: Major Decrease in Competition and Choice
Emergency Update on Executive Order Suspending Entry as of January 27 for U.S. Legal Permanent Residents Who Are Nationals of Seven Countries: Immigration Focus
INSS Strategic Assessment
test everything — 100+ tools in one!
Is He Compensating for Something? Trump Is... - Matthew Aid
Deep Patient: An Unsupervised Representation to Predict the Future of Patients from the Electronic Health Records : Scientific Reports
Impact of Social Reward on the Evolution of the Cooperation Behavior in Complex Networks : Scientific Reports
The Counter-Threat Alliance: Mission Accomplished » Optima Group
Events Calendar - SOFWERX
Data USA
CBP encouraged by facial comparison pilots -- FCW
Careers - Galois, Inc.
Research & Development - Galois, Inc.
The “Duménil Affair” reveals secret DGSE’s ‘War Chest’ | Intel Today
⭐️ On the Exponential View
ICWATCH
ICWATCH
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
Five Reasons to Ban the Ban – Medium
Trial Balloon for a Coup? – Medium
Mikhail Tsypkin, Ph.D. - Faculty - Naval Postgraduate School
NIJ Publication Detail
NIJ Publication Detail
NIJ Publication Detail
Robert "Rob" Gabris - Google Search
Craft Beers Dataset | Kaggle
McSweeney’s Internet Tendency
List: Action Items On Your Radical Professor’s Liberal Agenda - McSweeney’s Internet Tendency
Initial Meeting of the National Parks Revolutionary Coordinating Committee - McSweeney’s Internet Tendency
Screaming About Trump Into a Well: A Text Adventure - McSweeney’s Internet Tendency
Research on Repeat Crime Risk Leads to Software Tool Development
Bannon Is Given Security Role Usually Held for Generals - The New York Times
The New Phone-Based Tool That Lets Brazilians Monitor State Violence
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Raytheon: Raytheon BBN Technologies
Products · Lockheed Martin
Political Science--Identity
DTRA Basic And Fundamental Research Community Portal
portlands-resistance
OneTab shared tabs
OneTab shared tabs
European Commission : CORDIS : Projects & Results Service : Total Airport Security System
STATEWATCH - monitoring the state and civil liberties in Europe
Statistical Modeling, Causal Inference, and Social Science -
Reference Materials | Human Relations Area Files
Atlas Informatics
Home - Publish Open Access - the agreements with publishers - LibGuides at University of Groningen
NDC - Research
Find & Analyze Data
Browse by Study
oaDOI
ERIC - Education Resources Information Center
Project MUSE -- MUSEOpen
Making Things Stick: Surveillance Technologies and Mexico's War on Crime on JSTOR
Afghanistan's Islam: From Conversion to the Taliban on JSTOR
Data-Related Publications
Resources for Students
Projects
Introducing Cross-Cultural Research | Human Relations Area Files
Wikimapia - Let's describe the whole world!
PMESII Tool Discussion | OpenVCE
Hottest Heads of State – A scientific and unbiased ranking of world leaders in order of hotness.
PMESII-Tools - OpenVCE
Author Page for Hassan H. Elkatawneh :: SSRN
100 Leaders
Process Map for Afghan Advisors
Publications | WORDE
Security Info Net
Richard's Toolbox
CCAPS Social Conflict Analysis Database
Research Guides & Bibliographies (Getty Research Institute)
whAt is the world Coming to: developing gloBAl Crisis AnAlysis, AntiCipAtion And response - Google Search
Alternatives: Methodology for a new politics: changing the ‘operating system’ of the left after the Greek experience of 2015: Studies in Political Economy: Vol 97, No 3
UNU-WIDER : The political economy of social protection systems
Blogroll - Statistical Modeling, Causal Inference, and Social Science
IDS Bulletin | IDS Bulletin
Libertas Shrugs - Google Docs
Dutch University goes green, requires all researchers to make publications freely available | Quick Thoughts
Test Link: About the Test Collection
Taylor & Francis eBooks - Open Access
Taylor & Francis eBooks - Introducing Human Geographies, Third Edition
Small Business Resource Center - Basic Search
Open Access eBooks on JSTOR | About JSTOR
Afghanistan's Islam: From Conversion to the Taliban on JSTOR
Law, Liberty, and the Pursuit of Terrorism on JSTOR
Early Journal Content | About JSTOR
Project MUSE
Project MUSE - Browse
Project MUSE - Browse
Strategic Europe - Carnegie Europe - Carnegie Endowment for International Peace
The Threat of a Karabakh Conflict in 2017 - Carnegie Europe - Carnegie Endowment for International Peace
European Commission : CORDIS : Projects & Results Service : Evidence based policy for post crisis stabilization: bridging the gap
European Commission : CORDIS : Projects & Results Service : Total Airport Security System
Leidos wins 10-year, $350M Air Force mission planning systems engineering contract | Government Security News
Graphics representing NATO-Russia forces balance in Eastern/Central Europe (sources and explanations in comments) - Album on Imgur
A clearinghouse for jihādī primary source material, original analysis, and translation service
SAIC | VP, Programs-National Intelligence Community Job | Marketing & Advertising
A U.S. Army Formula Shows What Sarin Gas Would Do to Your Neighborhood | The National Interest Blog
Business Driven Security: The Case of Building an Advanced Security Operations CentreSecurity Affairs
ISIS Defectors: Inside Stories of the Terrorist Caliphate :: Reviewed by Aymenn Jawad Al-Tamimi
Belfer Center Named World’s Best University Think Tank | Belfer Center for Science and International Affairs
'The Way of the Strangers: Encounters with the Islamic State' - Council on Foreign Relations
A spy's eye view of Russia: Never-seen-before pictures | Daily Mail Online
Defense Threat Reduction Agency
Defense Threat Reduction Agency > Research > DTRIAC > DTRIAC Dispatch
How to Tell Which Application is Using Your Mac’s Webcam
How to Remove an Image’s Background Using Preview on macOS
5 Free Tools to Edit PDF Files
CyberArk Now Available on U.S. Army ITES Software Contract – SAT Press Releases
A.Q. Khan Nuclear Smuggling Network | START.umd.edu
Statewatch News Online: Full contents
Petraeus's 'Favorite Intelligence Officer' Joins National Security Council Staff | The Weekly Standard
National Security Presidential Memoranda [NSPMs] in the Donald J. Trump Administration
NSPM-1 on Rebuilding the U.S. Armed Forces
This Interactive Map Shows the High Stakes Missile Stand-Off Between NATO and Russia | Foreign Policy
Underground Tradecraft : Welcome to the Competition
Review of ISIS Defectors: Inside Stories of the Terrorist Caliphate – Medium
AFTERSHOCK at Pennsylvania State University | PAXsims
Aleksandr Kogan - Google Scholar Citations
Obama Opens NSA’s Vast Trove of Warrantless Data to Entire Intelligence Community, Just in Time for Trump
Identity: The Link Between Foreign and Domestic Policy
Welcome to the Competition
When librarians stood up to the most powerful spy agency in the world
Domestic Nuclear Detection Office | Homeland Security
The Way of the Strangers: Encounters with the Islamic State - Google Search
reddit ihntelligence - Google Search
Reducing Violent Crime and ‘Carnage’ in American Cities: Evidence-Based Recommendations – Homeland Security Digital Library
Safe Zones for Syria: A List of Questions that Policymakers Need to Answer | Just Security
The Early Edition: January 30, 2017 | Just Security
Strategy, History, Procurement, International Politics, National Defense, Intelligence
What's really happening on the Russian front? : CredibleDefense
glossary - CredibleDefense
IamA former CIA Case Officer who recently revealed my career to my family and now the world. AMA! : IAmA
Treating Addiction with Psychedelics - Scientific American
Executive Orders | whitehouse.gov
Disney's Newsies | Fathom Events
Geospatial Computational Social Science
the interdisciplinary Center for technology, Analysis and Forcast at Tel-aviv university
The Best Resources For Learning About President Trump’s Executive Orders On Immigration & Refugees | Larry Ferlazzo’s Websites of the Day…
Home - Funding - LibGuides at Drexel university libraries
DoD & Military - Acquisition & Contracting - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
Pattern of life analysis for diverse data types | Airborne Intelligence, Surveillance, Reconnaissance (ISR) Systems and Applications XIII | SI16D | SPIE Proceedings | SPIE
stathis.research.yale.edu
Funding Opportunities | Strategic Areas of Focus
Board moves the Clock ahead | Bulletin of the Atomic Scientists
Future of Diplomacy Project | Belfer Center for Science and International Affairs
Case Studies - Elder Research
Human Behavior Analytics with Proxy Interrogatories
Defense & Intelligence Solutions - Elder Research
New Tools Help Neuroscientists Analyze Big Data | HHMI.org
Press Releases Archives - Modus Operandi
Movia Platform - logic, reasoning and active-analysis
Research @ MO - Modus Operandi
Documents Archives - Modus Operandi
Awards - Modus Operandi
U.S. Navy Selects Modus Operandi to Develop Pattern-of-Life Analysis Software to Help Predict Adversarial Behavior and Intent - Modus Operandi
nadabakos | ARTICLES
Donald Trump’s Refugee Executive Order: No Muslim Ban -- Separating Fact from Hysteria | National Review
Defence research: Still in the lead? : Nature News
Data Controllers - PersonalData.IO
9 terrible things President Trump has done in just a week - Salon.com
UW class on how to spot fake data goes viral within hours | The Seattle Times
Attacking Nuclear Facilities: Hype or Genuine Threat? | START.umd.edu
Big Data and Hollywood: A Love Story - IBM - The Atlantic Sponsor Content
Nuclear Terrorism: Countering the Threat - Google Books
Department of Computational and Data Sciences – Students
Department of Computational and Data Sciences – David Masad
Department of Computational and Data Sciences – Hugh McFarlane
Acquisition, Technology, and Logistics (AT&L) Functional & Special Topic Gateways [DAP]
Federal Contract Opportunity: DOD STTR 17. A (541711), updated Nov 30, 2016
Federal Contract Opportunity: FY 2016 Rapid Innovation Fund (541711), updated Apr 27, 2016
PA-17-105: Targeted basic behavioral and social science and intervention development for HIV prevention and care (R21)
The Islamic State’s First War Minister | The Syrian Intifada
What’s Missing From The Trump Election Equation? Let’s Start With Military-Grade PsyOps – Medium
The Expensive Pretzel Logic of Deterring Russia by Denial
Broad Agency Announcement (BAA) – ADL Net
Home | U.S. Army Research Laboratory
CTTSO BIDS - Reference Materials
Big Data Analytics for Army Intel - Google Search
Guide to Defense Basic Research Funding 2017 - Google Search
INTERVENTION ANALYTICS - Google Search
Movia Active Big Data Analysis Platform Overview - Google Search
Security Research Projects under the 7 th Framework Programme for Research - Google Search
alexander nix - Google Search
left-of-boom - Google Search
quad chart 2016 baa - Google Search
Redirect Notice
Computational Cognitive Models of Sensemaking
Federal budget authority for research and development continues upward trend | NSF - National Science Foundation
Slim Fino Cable - Slim Collections
Political Science--Identity
C4ISR · Lockheed Martin
Hydra Fusion Tools™ · Lockheed Martin
News and Publications · Lockheed Martin
Understanding the World’s Megacities with Cutting Edge Tools · Lockheed Martin
ICEWS 10000 Dataset Download · Lockheed Martin
World-Wide Integrated Crisis Early Warning System · Lockheed Martin
Advanced Technology Laboratories · Lockheed Martin
Predictive Analytics: Open Source Data Helps Researchers Forecast Global Unrest · Lockheed Martin
Leidos Transform | Solutions for Complex Problems | Five Markets
mdwardlab.com
Lustick Consulting
Predicting Conflict in Space and Time - Jul 22, 2010
Strategic Analysis Enterprises, Inc.
Dr Gareth Conway - Google Scholar Citations
Dakota | Algorithms for design exploration and simulation credibility
Items where Author / Artist / Editor is "Attfield, Simon" - Middlesex University Research Repository
The Conundrum of Verification and Validation of Social Science-based Models - ScienceDirect
Distributed Computing Group
greta's gouge: Friday's Miscellany 01-27-2017
OneTab shared tabs
SESDYN
Sandia National Laboratories: 100 Resilient Cities
ANB 218a 2016 | Agent-Based Models
Agent-Based Modeling -- PSC 120 | Agent-Based Models
SBP-BRiMS 2017
the grugq – Medium
Twitter Activist Security – Medium
Data and Code — David Rand
Portland Indivisible
Indivisible: A Practical Guide for Resisting the Trump Agenda
Resources - Citizens for Peace
SciDAC - DOE's Scientific Discovery through Advanced Computing
Defense Advanced Research Projects Agency
Lectures, Videos, and Interviews — David Rand
Consortium for Advanced Simulation of Light Water Reactors (CASL)
A $20,000 Match Offer On ACLU Donations Today – AVC
Lab — David Rand
Popular Press Articles — David Rand
Research — David Rand
FLAME website
IEEE Xplore - Conference Table of Contents
Indivisible
Tools of the Trade
From the Chairman: The Pace of Change > National Defense University Press > Joint Force Quarterly 84
Player Project
SBP-BRiMS 2016
New Drug Compound Halts Alzheimer’s, Appears to Reverse Some Neurological Damage
Agent-Based Modeling: Social Sciences | Agent-Based Models
SESDYN
(10726) Inoreader - Friday's Miscellany 01-27-2017
Home - Science and Technology Facilities Council
Global Food Prices Database (WFP) - Humanitarian Data Exchange
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
Sandia National Laboratories : Licensing/Technology Transfer Homeland Security Technologies
Twitter Activist Security – Medium
Sandia National Laboratories: News Releases : Designing diagnostic labs that are safe, specific and sustainable
Indivisible Guide (@IndivisibleTeam) | Twitter
Portland Indivisible (@pdxindivisible) | Twitter
Indivisible Oregon
No Ban, No Wall - Noon Rally in Downtown Portland
Portland Indivisible
Anticipatory Analytic - Google Search
RAND Workshop on Social-Behavioral Modeling and Simulation - Google Search
portland indivisible - Google Search
Indivisible Guide
Indivisible: A Practical Guide for Resisting the Trump Agenda
Indivisible: A Practical Guide for Resisting the Trump Agenda
Do Public Protests Matter in a Democracy? The “outside strategy” as a signal of support to judges and bureaucrats | Just Security
The Endless War
Combining modeling and gaming for predictive analytics | SpringerLink
12th International Naturalistic Decision Making Conference
12th International Naturalistic Decision Making Conference
Analytic Provenance for Sensemaking: A Research Agenda - IEEE Xplore Document
Human Factors and Ergonomics Society: HFES Meetings
Human Factors and Ergonomics Society: 2017 Annual Meeting
Human Factors and Ergonomics Society: Publications
POLAR - an interactive patterns of life visualisation tool for intelligence analysis - Middlesex University Research Repository
POLAR-An Interactive Patterns of Life Visualisation Tool for Intelligence Analysis - IEEE Xplore Document
About Dakota | Dakota
Sandia National Laboratories: Exceptional Service in the National Interest
Wedgwood: What lies beneath: Forecast transparency... - Google Scholar
Advances in Design for Cross-Cultural Activities - Google Books
Twenty Countries in Twenty Years: Modeling, Assessing, and Training Generalizable Cross-Cultural Skills - Springer
Intelligence Analysis in Red and Blue: International Journal of Intelligence and CounterIntelligence: Vol 21, No 1
Oslo Summer School in Comparative Social Science Studies 2017 - Faculty of Social Sciences
Interdrone - filming from the air, drones service postproduction | Service-type drones flying machines, film techniques of drones in action and training support drones.
DiBona: Proactive human-computer collaboration for... - Google Scholar
Composable Analytic Systems for next-generation intelligence analysis | Next-Generation Analyst III | STA15 | SPIE Proceedings | SPIE
LINTON: The SAnTA Recommender System and Naturalistic... - Google Scholar
Simon Attfield - Google Scholar Citations
Index of /staffpages/simonattfield
jean scholtz - Google Scholar Citations
The Mutual Support Function Model - Sep 01, 2011
Technosocial predictive analytics for security informatics | Security Informatics | Full Text
Scenario-based reasoning and probabilistic models for decision support - IEEE Xplore Document
Predicting emplacements of improvised explosive devices - Mar 13, 2012
Common IED exploitation target set ontology | Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XV | DSS10 | SPIE Proceedings | SPIE
Paul Whitney - Google Scholar Citations
Bayesian Model Development for Analysis of Open Source Information to Support the Assessment of Nuclear Programs (Conference) | SciTech Connect
Chris Baber - Google Scholar Citations
Chris Rooney - Google Scholar Citations
Informatics | Free Full-Text | Developing a Model of Distributed Sensemaking: A Case Study of Military Analysis | HTML
Twenty Countries in Twenty Years: Modeling, Assessing, and Training Generalizable Cross-Cultural Skills - Google Search
Science at PNNL - Amanda White
Roger Wattenhofer - Google Search
Roger Wattenhofer - Google Scholar Citations
Saved Session - Session Buddy
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
NSI, Inc.
That 1 Archive
How to Quickly Follow Local Protests and Actions With Twitter, IFTTT, and Pushover | ResearchBuzz
icsb_Home_Content_CDF
Board on Behavioral, Cognitive, and Sensory Sciences
SESDYN
The New York Times: Get a Digital Subscription
Alentum Software - Graphing Software and Other Tools
Open Science - Desktop Digital Biology Laboratory • Hackaday.io
Finding Clarity in Complexity: Interview with Dr. Jon Kimminau (Part 1)
FOIA Fodder
November 2016 BBCSS Newsletter
Human-centric Computing and Information Sciences | Home page
Solutions at NSI | NSI
OneTab shared tabs
Board On Behavioral Cognitive and Sensory Sciences - Reports
Materials for Educators and the Community | The Middle East Center at Penn
No Ban, No Wall - Noon Rally in Downtown Portland
AFOSR - Information and Networks > Wright-Patterson Air Force Base > Display
W-ICEWS Publications · Lockheed Martin
Crouser: Computational exploration of simulations... - Google Scholar
Establishing bounds of responsible operational use of social science models via innovations in verification and validation - Google Search
DiBona: Proactive human-computer collaboration for... - Google Scholar
Proactive human-computer collaboration for information discovery | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
From Russia to Trump – A Timeline of the Trump/Russia Graft
Graft Timeline – From Russia to Trump
Agent-based modeling
Research
Jeff Schank's Agent-Based Modeling Lab | Agent-Based Models
Agent-based modeling and simulation researchers | Agent-Based Models
Agent-Based Modeling Resources | Agent-Based Models
Simulators | Agent-Based Models
JASSS Volume 19, Issue 4. 31-Oct-2016
Campus Watch
The Dark Triad, the Big Five, and the HEXACO model
Spy agencies team up with National Academies | Science | AAAS
Recent Trends in Social Systems: Quantitative Theories and | Antonio Maturo | Springer
Big, Allied and Dangerous (BAAD) | START.umd.edu
DMOZ - Society: Politics: Alternative Political Systems
PUBLICATIONS | NSI
Solutions at NSI | NSI
NSI Predictive Modeling | NSI
NSI Behavioral Segmentation | NSI
Lustick Consulting » Papers and Reports
Social Media and Fake News in the 2016 Election
Ian S. Lustick presentations pdf - Google Search
From theory to simulation: the dynamic political hierarchy in country virtualisation models - Google Search
Improving predictions using ensemble Bayesian model averaging. - Google Search
mdwardlab.com
Ruvinsky: 16 Enabling operational users to fully... - Google Scholar
Ruvinsky: Establishing bounds of responsible operational... - Google Scholar
The Conundrum of Verification and Validation of Social Science-Based Models Redux - Springer
Advances in Design for Cross-Cultural Activities - Google Books
Partnership for the Americas: Western Hemisphere Strategy and U.S. Southern ... - James G. Stavridis - Google Books
40 tabs
Copy links to clipboard
Copy
Open
Haters: Documenting Extremist and Hate Groups
The Data That Turned the World Upside Down | Motherboard
Science and Technology Law | Open Access Articles | Digital Commons Network™
Public Affairs, Public Policy and Public Administration | Open Access Articles | Digital Commons Network™
CGU Faculty Publications and Research | CGU Faculty Scholarship | Claremont Colleges
CGU Faculty Books | CGU Faculty Scholarship | Claremont Colleges
Catholic University Journal of Law and Technology: Most Popular Papers
National_Security_and_Intelligence
Going to War?: Trends in Military Interventions on JSTOR
SPACE ROGUE | L0pht Heavy Industries, Whacked Mac Archives, Hacker News Network
ComputerCrimeInfo Blog » Blog Archive » Internet Search (OSINT) Resource: Visual Site Mapper
About
Subscriptions - YouTube
theatermania - YouTube
Official London Theatre - YouTube
masterworksbwayVEVO - YouTube
MCCTheater - YouTube
The Royal Variety Performance 2016 - YouTube
BroadwayCon 2017 - Don't Quit Your Night Job (1/27/2017) - YouTube
BroadwayCon 2017 - Annie 40-Year Reunion (1/27/2017) - YouTube
Sh-K-Boom/Ghostlight Records - YouTube
Falsettos Barnes & Noble CD Release Event - YouTube
Famous In NY Video - YouTube
Broadwaycom - YouTube
bway nyc78 - YouTube
Disney On Broadway - YouTube
Multi-Robot Coalitions Formation with Deadlines: Complexity Analysis and Solutions
Visa® Gift Card
Training | National Institute of Justice
View Opportunity | GRANTS.GOV
QCRI - Resources Detail
Dong Deng's Homepage
The hero big data needs? Data Civilizer helps scientists conquer the clutter
This Week's Top Downloads
Wine, the Software That Helps You Run Windows Apps on Mac and Linux, Hits Version 2.0
Computer Science authors/titles recent submissions
A handbook – The EU and the world: players and policies post-Lisbon
Protests Weekend of Jan 28
My Drive - Google Drive
IARIA Journals
01-29
Copy links to clipboard
Copy
Open
Kilgore Trout (@KT_So_It_Goes) | Twitter
What are some lesser known Gmail tips? - Quora
What are some of your favorite podcasts to listen to in the morning? - Quora
What are some unethical life hacks? - Quora
What are you most worried about in a Trump presidency? - Quora
What made you laugh out loud recently? - Quora
Who would win, a typical US army squad of 9 soldiers or 2000 crazed terrorists with machetes? - Quora
Programming agent-based demographic models with cross-state and message-exchange dependencies
Agent-based modeling and strategic group formation
Applications of Network Science to Criminal Networks, University Education, and Ecology [eScholarship]
Adapting to the Evolving Strategic Environment - Applying the Lessons of the Global War on Terror to Future Threats - Harvard International ReviewHarvard International Review
Counter Terrorism Approaches: With Reference to Bangladesh | Husain | ABC Journal of Advanced Research
Analysis of future UAS-based delivery - IEEE Xplore Document
Towards airspace rules for future UAS-based delivery - IEEE Xplore Document
The search for rebel interdependence - Jan 24, 2017
Women on the frontline - Jan 24, 2017
Can civilian attitudes predict insurgent violence? Ideology and insurgent tactical choice in civil war - Jan 24, 2017
Coup risk, coup-proofing and leader survival - Jan 24, 2017
Endogenous Nuclear Deterrence: The Bomb and Security in South Asia - Jan 23, 2017
Interactive POMDPs with finite-state models of other agents | SpringerLink
Automating quantum experiment control | SpringerLink
Data sanitization against adversarial label contamination based on data complexity | SpringerLink
Algorithms for Sensor Systems - Springer
Coupling Activity-based Detection, Target Amplification, Colorimetric and Fluorometric Signal Amplification, for Quantitative Chemosensing of Fluoride Generated from Nerve Agents - Sun - 2017 - Chemistry - A European Journal - Wiley Online Library
Results of a beer game experiment: Should a manager always behave according to the book? - Edali - 2015 - Complexity - Wiley Online Library
Africa Command | Belfer Center for Science and International Affairs
SESDYN
Sayfa bulunamadı | Boğaziçi University | Department of Industrial Engineering
SESDYN
Foreign Policy at the Periphery: The Shifting Margins of US International Relations since World War II on JSTOR
Agent Based Modelling as a Decision Support System for Shadow Accounting
Learning Style Identifier: Improving the Precision of Learning Style Identification Through Computational Intelligence Algorithms
Protecting trajectory privacy: A user-centric analysis
The Consequences of Poor Storage of Ammunition Stockpiles and IED usage | AOAV
Do you think fake news can be killed with the truth? Think again
A Practical Plan on the Israeli-Palestinian Front – Center for American Progress
Circles of Steel, Castles of Vanity: The Geopolitics of Military Bases on the South China Sea | The Journal of Asian Studies | Cambridge Core
CEEOL - Article Detail
The Strategic Impact of Improvised Explosive Devices in the US Military - Google Search
Matthew Childs, Psy.D. | LinkedIn
Search | LinkedIn
Current Issue | BMJ Open
European Commission : CORDIS : Projects & Results Service : Multi-Modal Situation Assessment & Analytics Platform
Islamic State: Rumiyah Magazine :: Jihad Intel
Applying Hidden Markov Models to Voting Advice Applications | SpringerLink
Participatory Sensing, Opinions and Collective Awareness - Springer
Non-Equilibrium Social Science and Policy - Springer
EPJ Data Science, Volume 5, Issue 1 - Springer
Search Results - Springer
Search Results - Springer
Search Results - Springer
Search Results - Springer
Search Results - Springer
Latest Issue of ISIS Rumiyah Magazine Released
Searching for Saddam: Saddam had a lot of bodyguards. Which one was hiding him?
Le Monde, Internet Archives, HP Laptops, More: Friday Buzz, January 27, 2017 | ResearchBuzz
New statement from the Islamic Emirate of Afghanistan’s Zabīh Allah Mujāhid: “Open Letter To the American President Donald Trump”
HP Recalls Over 100,000 Laptop Batteries Due to Potential Fire and Burn Hazards
Gates: 'Big Mistake' to Push Key Intelligence, Military Leaders Out of Security Council Principals Committee - ABC News
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Search : Results page
IEEE Xplore - Conference Table of Contents
New release from Ḥarakat Aḥrār al-Shām al-Islāmīyyah: “Overcoming Suspicions and the Application of the Law of the Jungle”
SAIC | VP, Programs-National Intelligence Community Job | Marketing & Advertising
Journal of Peace Research - Volume 52, Number 4, Jul 01, 2015
Run for Office Shows You What Positions You Can Run for and How to Register
This Flowchart Helps You Decide If That Impulse Purchase Is a Good Idea
A Clarifying Moment in American History by Eliot A. Cohen
100 Search Engines Web Search Engine
2017 Directory of Directories by Marcus P. Zillman, M.S., A.M.H.A.
SENSORS AND CONTROL SYSTEMS – Creare
Everything I Need to Know about Russia’s Internet Interference I Learned Through College Pranks - Defense One
BATS | Behavior Analysis and Testing Software
White House Chief Strategist Steve Bannon Added To Top Of National Security Council : The Two-Way : NPR
Is Putin’s popularity real?: Post-Soviet Affairs: Vol 33, No 1
Meeting Security Challenges Through Data Analytics and Decision Support - Google Books
Botpress
ComputerCrimeInfo Blog » Blog Archive » Internet Search (OSINT) Resource: FindFace
DARPA licenses emerging chip technology -- Defense Systems
Air Force Research Lab supports DCGS hybrid cloud tech -- Defense Systems
Executive Authority to Exclude Aliens, & More from CRS |
FindFace - Login
A Psychological Thumbnail of Donald J Trump’s Narcissistic Personality Disorder and Its Implications | Krypt3ia
Blair: Comparing and combining list and endorsement... - Google Scholar
Al Boe (@AlBoeNEWS) | Twitter
Daily Open Source Infrastructure Report | Homeland Security
Algorithms for Sensor Systems - Google Search
IARPA N2N Challenge
Research into Twitter Bots - Schneier on Security
This is how Donald Trump engineers applause - The Washington Post
Executive Order: Border Security and Immigration Enforcement Improvements | whitehouse.gov
Utility of social media and crowd-sourced data for pharmacovigilance: a scoping review protocol | BMJ Open
Target Tracking for Sensor Networks
On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds - IEEE Xplore Document
The analytical study of terrorism - Aug 13, 2013
The search for rebel interdependence - Jan 24, 2017
Journal of Peace Research | SAGE Journals
Systems, Networks, and Policy - Springer
Towards a Complexity-Friendly Policy: Breaking the Vicious Circle of Equilibrium Thinking in Economics and Public Policy - Springer
The Fight for the Soul of the GOP Has Been Canceled - Linkis.com
Social and Behavioral Sciences | Open Access Articles | Digital Commons Network™
SBS Decadal White Papers 1
SBS_for_National_Security-Decadal_Survey
Poll: Trump reaches majority disapproval in eight days | TheHill
Officials worry that U.S. counterterrorism defenses will be weakened by Trump actions - Chicago Tribune
Making Things International 2: Catalysts and Reactions on JSTOR
Sensors | Special Issue : Advanced Algorithms for Mobile Sensing: from Wireless Sensor Networks to Mobile Crowd Sensing
House Democrats demand meeting with DHS chief over Trump ban - POLITICO
Improving Healthy Offerings by Food Trucks Is Possible, but Regulation May Be Needed to Sustain Efforts | RAND
A paper-based nanomodified electrochemical biosensor for ethanol detection in beers
A cyanostilbene-boronate based AIEE probe for hydrogen peroxide—Application in chemical processing
The Breakthrough Institute - Home
Ban Could Hurt U.S.-Iraqi Ties, Diplomats Say - WSJ
Trump EO: Protecting the Nation From Foreign Terrorist Entry into the United States, 1.27.2017 « Diplopundit
This Guy Went From Telling Jokes On Twitter To Driving A Tank In Syria
Donald Trump Opposite Day Itinerary
"Open Science - Desktop Digital Biology Laboratory" - "PLOS SynBio" Nuzzel Newsletter by PLOS for Sun, Jan 29 - stczztop@gmail.com - Gmail
The Opposite of Trump – Medium
I ranked every Intro to Data Science course on the internet, based on thousands of data points
Former Intelligence Official: Donald Trump’s Conflict With Spy Agencies Creates ‘Dangerous Moment’
U.S. Army Cyber Electromagnetic Activities (CEMA) Manual | Public Intelligence
U.S. Army War College Strategic Cyberspace Operations Guide | Public Intelligence
Sakaki: Earthquake shakes Twitter users: real-time... - Google Scholar
A (Short) History of Social Media Sentiment Analysis - Springer
Grizzly Nihilism
Ticking Time Bombs
(1) Kelsey D. Atherton (@AthertonKD) | Twitter
#ONTHEWIRE hashtag on Twitter
@politico/Playbook Plus on Twitter
Tova (@stczzop) | Twitter
Algorithms for social sensors - Google Search
Call for White Papers issued by The National Academies of Sciences, Engineering, and Medicine Board on Behavioral, Cognitive, and Sensory Sciences - Google Search
Profiling Western Jihadists: Meta-Analysis of Intelligence Reports and Proposal of a Standard Jihadist Radicalisation Model - Google Search
The Strategic Impact of Improvised Explosive Devices in the US Military - Google Search
PDXWIT #Action Jeff Merkley Town Hall Event - ChickTech Portland (Portland, OR) | Meetup
A Method of Data Aggregation for Wearable Sensor Systems
The social structure of gang violence in British Columbia
How Tulsi Gabbard became Assad’s mouthpiece in Washington - The Washington Post
8 tabs
Copy links to clipboard
Copy
Open
Investigating the Effects of Microchannel Size on the Performance of Microfluidics-Based Electrochemical Biosensor
Upstart Portland brewery embarks on a $1M expansion with new production facility and restaurant - Portland Business Journal
The Arms Trade, Military Services and the Security Market in the Gulf States: Trends and Implications on JSTOR
The Asia-Pacific in the Age of Transnational Mobility: The Search for Community and Identity on and through Social Media on JSTOR
What's the story? How to research old homes (photos) | OregonLive.com
Video | Pronk Palisades | Page 6
Jon Nichols on Twitter: "https://t.co/V61e4kOuz3 this is EASILY my favorite skit ever. Come nerd out with me."
Associate / Full Professor - Coupled Human-Natural Systems, Environmental Governance and Decision Making Job at The University of Arizona in Tucson, Arizona, United States - ResearchGate
55 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
philome.la
AFIO - Guide to the Study of Intelligence
Intelligence Engineering: Operating Beyond the Conventional, By Adam D. M. Svendsen, 9781442276642 | Rowman & Littlefield
Political Science / Security (National & International) | Rowman & Littlefield
Men's Spy Apparel & Clothing, Spy Tee Shirts, Spy Vs. Spy Tee Shirts, Classic Tuxedo Tee Shirts | International Spy Museum Store
Operations-Driven Intelligence: Is the Shirt on Backwards?: International Journal of Intelligence and CounterIntelligence: Vol 29, No 4
Home - Current Awareness - U.S. Army Heritage and Education Center at U.S. Army Heritage and Education Center
NOIR Resources
NOIR Featured in European Counterintelligence Journal - National Office for Intelligence Reconciliation (NOIR)
Article about NOIR in Newsweek
SSIR | research&resources
Advanced Strategic Guidance Online - portal
SSIR | research&resources
SSIR | research&resources
SSIR | research&resources
SSIR | research&resources
SSIR | research&resources
Adam D.M. Svendsen, PhD - Google Scholar Citations
Academic Journals Shop Now. International Spy Museum Store
Church of Spies | Intelligence Analysis and Reporting
Intelligence Analysis and Reporting | Primer on Intelligence Studies
Intelligence, Espionage, Counterespionage And Covert Operations | Intelligence Analysis and Reporting
President of the Republic of Poland Andrzej Duda’s Address to the Warsaw Summit Experts’ Forum: NATO in Defence of Peace
NATO - News: Experts' Forum debates on the margins of the NATO Summit in Warsaw, 07-Jul.-2016
Operations-Driven Intelligence: Is the Shirt on Backwards? - Google Search
Mendosa: Operations-Driven Intelligence: Is the Shirt... - Google Scholar
ATAC Process Proof of Concept Final Report (Technical Report) | SciTech Connect
Rolston: ATAC Process Proof of Concept Final Report - Google Scholar
OSINT: A “Grey Zone”?: International Journal of Intelligence and CounterIntelligence: Vol 27, No 3
15 Years After 9/11, Is America Any Safer? - The Atlantic
U.S. Army War College Library Periodical Articles for Current Awareness - Google Search
Inferring Centrality from Network Snapshots : Scientific Reports
A novel method of evaluating key nodes in complex networks
A smartphone-based introductory astronomy experiment: Seasons investigation: The Physics Teacher: Vol 55, No 2
Deep combining of local phase quantization and histogram of oriented gradients for indoor positioning based on smartphone camera - Jan 01, 2017
Magnetic paper – based ELISA for IgM-dengue detection - RSC Advances (RSC Publishing) DOI:10.1039/C6RA25992H
Simultaneous electrokinetic concentration and separation of proteins on a paper-based analytical device - RSC Advances (RSC Publishing) DOI:10.1039/C6RA26500F
Amperometric paper sensor based on Cu nanoparticles for the determination of carbohydrates
CORDIS - EU research projects under FP7 (2007-2013) - Datasets
IOS Press
Arije ANTINORI - Google Search
Home – Invixium
IXM Brochure
SCENARIOS + VISION: Strategic Prospective
EU-MENA COUNTER-TERRORISM PROJECT - Google Search
OODA Technologies Inc - Google Search
Helbing - Google Search
Identification of Potential Terrorists and Adversary Planning - Google Search
Theiler Head of Future Analysis Branch - Google Search
51 tabs
Copy links to clipboard
Copy
Open
UCI Machine Learning Repository
UCI Machine Learning Repository: Activity Recognition system based on Multisensor data fusion (AReM) Data Set
UCI Machine Learning Repository: Smartphone Dataset for Human Activity Recognition (HAR) in Ambient Assisted Living (AAL) Data Set
UCI Machine Learning Repository: UbiqLog (smartphone lifelogging) Data Set
CORDIS Archive : European Commission : CORDIS : Archives : European Commission : CORDIS : Archives : FP7
JSTAC – George C. Marshall Associations
start [myPersonality Project]
start [myPersonality Project]
download_databases [myPersonality Project]
mining [myPersonality Project]
publications [myPersonality Project]
publications [myPersonality Project]
Sitemap [myPersonality Project]
Home
SNAP: Counseling Conversation Analysis
Stanford Large Network Dataset Collection
Stanford Large Network Dataset Collection
Stanford Large Network Dataset Collection
SNAP: Network datasets: 96 million Memetracker memes
SNAP: Web and Blog datasets
SNAP: Higher-order organization of complex networks
SNAP: Papers
Sources And Methods: Another Color Of Hope: A "Choose Your Own Adventure" Intelligence Training Game
twine2:guide [Twine Wiki]
NATO - SPS - Key Priorities
NATO - Topic: Topics
NATO - Topic: Countering terrorism
NATO - The Science for Peace and Security Programme
Computer-based personality judgments are more accurate than those made by humans
PreferenceTool: Personality Insights and Targeting — The Psychometrics Centre
SysSec Red Book: About
Haewoon Kwak, Research scientist at Qcri | SlideShare
SysSec: About
SysSec: Publications
Trump Knows You Better Than You Know Yourself | aNtiDoTe Zine
Google Code Archive - Long-term storage for Google Code Project Hosting.
Portland State University Library · GitHub
Center for Computational Social Science | Institute for Research in the Social Sciences
Agenda: Computational Sociology Conference | Institute for Research in the Social Sciences
2016 Summer Workshop | Institute for Research in the Social Sciences
2016 Winter Workshop | Institute for Research in the Social Sciences
Publications | Institute for Research in the Social Sciences
OSF | Twitter Predicts Heart Disease
Michal Kosinski - Google Scholar Citations
SCL Defence | Projects
Twine / An open-source tool for telling interactive, nonlinear stories
Stanford IRiSS (@stanfordiriss) | Twitter
Action Intell Market Research for digital printer and MFP hardware and supplies
Audience Insights
An integrative psychological model for radicalism Evidence from structural equation modeling - Google Search
Zlatogor Minchev
58 tabs
Copy links to clipboard
Copy
Open
Private traits and attributes are predictable from digital records of human behavior
The IQ Big Data 50 | www.dataiq.co.uk
Talks / Presentations - Dr Michal Kosinski
New Technological Advances Provide Valuable Data for Personality Social Psychological Research | SPSP
Embrace the Data | SPSP
Demos - Dr Michal Kosinski
Birds of a Feather Do Flock Together - Jan 06, 2017
SAGE Journals: Your gateway to world-class journal research
SAGE Journals: Your gateway to world-class journal research
author:"Kosinski, Michal" - Google Scholar
PsycARTICLES - Mining big data to extract patterns and predict real-life outcomes.
Dr Michal Kosinski
Michal Kosinski (@michalkosinski) | Twitter
David Stillwell (@david_stillwell) | Twitter
Are You Smarter Than The President?
Jure Leskovec (@jure) | Twitter
Andrew Ng (@AndrewYNg) | Twitter
[1612.08228] The misleading narrative of the canonical faculty productivity trajectory
When is data science a house of cards? | Pinterest Engineering
Mining Massive Datasets | Stanford Lagunita
Computer-based personality judgments are more accurate than those made by humans
https://cambridgeanalytica.org/news/pressrelease/1293
My Personality 100-item - The Psychometrics Centre
SCL Group | Home
Cambridge Analytica (@CamAnalytica) | Twitter
Cambridge Analytica, the 'psychographic' data firm behind Donald Trump, eyes Australian move
Cambridge Analytica – About Us
Behavioral Microtargetin - Google Search
Cambridge Analytica – Products
Cambridge Analytica | LinkedIn
Cambridge Analytica - YouTube
Cambridge Analytica – Products
Association for Psychological Science: APS Rising Stars
Twine and Twee · GitHub
Graph Matching and Intelligence Analysis - Google Search
Graph Matching
NATO ARW - Google Search
NATO - Science for Peace and Security
NATO ARW - Countering Terrorism at the Borders
Identification of Potential Terrorists and Adversary Planning — Emerging Technologies and New Counter-Terror Strategies - Google Search
TAMC | Events
TAMC | Actionable Intelligence
CREATE - Center for Risk and Economic Analysis of Terrorism Events - CREATE
A Global Horizon Scanning System and NATO workshop: Inentification of…
PREVENTING TERRORISTS FROM EXPLOITING THE INTERNET AND SOCIAL MEDIA TO RECRUIT TERRORISTS 30 November 2016 - UN HQ, NY - Google Search
Information and communications technologies (ICT) - United Nations Security Council Counter-Terrorism Committee
Actionable Intelligence Briefings - Google Search
U.S. Department of Defense Daily Digest Bulletin - scitrenbaum@gmail.com - Gmail
Michal Kosinski - Google Search
Michal Kosinski (@michalkosinski) | Twitter
On What Facebook Knows – An Interview with the Man Behind Facebook’s Personality Experiment | Social Media Today
Apply Magic Sauce - Prediction API -
psychometrics, - Google Search
Cambridge Analytica - Google Search
The Terror-Crime Nexus & Chemical, Biological, Radiological, and Nuclear (CBRN) Threats | START.umd.edu
Alexander Nix | LinkedIn
David Stillwell | LinkedIn
Sandra Matz | LinkedIn
46 tabs
Copy links to clipboard
Copy
Open
Eric Filiol Homepage
Digital Commons Network | Free full-text scholarly articles
Contracts
International Security and Cooperation | Ford Dorsey Program
FSI | CISAC
FSI | CISAC - Martha Crenshaw
FSI - International Policy Implementation Lab
FSI | CISAC - Inaugural Online Lecture Series: Security Matters
Getting Started with Notebooks for Mac • Notebooks
Notebooks for Mac Tips • Notebooks
Predata
Hysterectomy-corrected cervical cancer mortality rates reveal a larger racial disparity in the United States - Beavis - 2017 - Cancer - Wiley Online Library
Interfaces: INFORMS
Spanish scientists create a 3-D bioprinter to print human skin - Science Bulletin
"Nuclear Power" by Sherrell R. Greene
Home - USMA Library Research Guides - Research Guides at U.S. Military Academy at West Point
War News Updates: A Look At How The Islamic State Is Turning Commercial Drones Into Weapons
Home - www.Amyx.com
Press Releases - www.Amyx.com
The Early Warning Project: Can Expert Crowd-Sourcing Spot the Next Atrocity on the Horizon? - Auschwitz Institute for Peace and Reconciliation
TNT renews made-in-Portland series 'The Librarians' for a fourth season - Portland Business Journal
News | Electronics EETimes
Suicide bombers are using babies to avoid detection | Fox News
Russia: Its Boundaries In 2050 | Hoover Institution
These 4 Maps Show The Geopolitical Hotspots of 2017 | Mauldin Economics
Former CIA agent says terror attacks can be predicted using technology that forecasts the future - Mirror Online
This computer algorithm might be able to predict the next ISIS attack | PBS NewsHour
Capabilities | Sotera Defense
[1701.02528] Why It Takes So Long to Connect to a WiFi Access Point
Dance With Joy Studio's Online
ComputerCrimeInfo Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 015
Airmail - Your Mail With You on the App Store
LexLeader - An online news magazine about the business and community surrounding NAS Patuxent River, Maryland.
Final - scitrenbaum@gmail.com - Gmail
THE FERMENTATION GUTHUB PROJECT AND THE INTERNET OF MICROBES - Academia.edu - scitrenbaum@gmail.com - Gmail
National Security | patribotics
Katz: The Weapon Wizards: How Israel Became a High-Tech... - Google Scholar
Russian Active Measures and September 11, 2001: Nostradamus Themed Disinformation? – To Inform is to Influence
(55) THE FERMENTATION GUTHUB PROJECT AND THE INTERNET OF MICROBES | Markéta Dolejšová and Denisa Kera - Academia.edu
January 2017 | Combating Terrorism Center at West Point
CIA officials are learning to live in an era when the president-elect publicly disparages them - Google Search
Predicting Terrorism? - Google Search
Trump’s Vainglorious Affront to the C.I.A. - Google Search
What US Social Media Is Doing and What US Social Media Should be Doing - Google Search
Innovations in Federal Statistics: Combining Data Sources While Protecting Privacy | The National Academies Press
It’s a Win-Win-Win Scenario for Russia | The Cipher Brief
42 tabs
Copy links to clipboard
Copy
Open
PSU Library Catalog
Multi-source models for civil unrest forecasting | SpringerLink
The Issue Correlates of War (ICOW) Project
Sci-Hub | Open access to scientific information | VK
Interfaces: INFORMS
Model-Based Forecasting of Significant Societal Events
Using Systems Thinking to Analyze ISIS
Predata - Products
Reports - Hybrid Warfare - NATO LibGuides at NATO Multimedia Library
Predata, Predictive Intelligence Pioneer, Raises $3.25 Million Financing Round Led by Edison
The Role of EU Agencies in Fighting Transnational Environmental Crime: New Challenges for Eurojust and Europol » Brill Online
Open Data Catalog | The World Bank
Formally Describing the Architectural Behavior of Software-Intensive Systems-of-Systems with SosADL - IEEE Xplore Document
A primer for hybrid modeling and simulation - IEEE Xplore Document
Optimal control for context-sensitive probabilistic Boolean networks with perturbation using probabilisitic model checking - IEEE Xplore Document
Game Theory-Based Control System Algorithms with Real-Time Reinforcement Learning: How to Solve Multiplayer Games Online - IEEE Xplore Document
CSS Blog Network
Risk Analysis | Open Access Articles | Digital Commons Network™
Forecasts
Russia and the World: 2016. Annual Forecast: Economy and Foreign Policy
ISPRS International Journal of Geo-Information | An Open Access Journal from MDPI
RiskTrack: a new approach for risk assessment of radicalisation based on social media data
Was Revolution Inevitable?: Turning Points of the Russian Revolution - Tony Brenton - Google Books
Meeting Security Challenges Through Data Analytics and Decision Support - Google Books
(55) Fodé Beaudet - Academia.edu
Model-Based Forecasting of Significant Societal Events
CrisisWatch | Crisis Group
Best photo and video cloud storage - Google Search
Biocomplexity Institute of Virginia Tech - Google Search
Discovery Analytics Center, Virginia Tech, - Google Search
Effectiveness in Active Adaptation Planning for the Contemporary Operational Environment from Influence to Change - Google Search
Establishing networks in a forensic DNA database to gain operational and strategic intelligence - Google Search
Meeting Security Challenges Through Data Analytics - Google Search
Overview of civilian counter drone systems - Google Search
Risk terrain modeling compendium - Google Search
Russia ́s Renewed Military Thinking Non-Linear Warfare and Reflexive Control - Google Search
Russia and the World: 2016 IMEMO Forecast - Google Search
Warfare in the Information Age. The RUSI - Google Search
Data on Armed Conflict - PRIO
Thomas Gannon
RiskTrack - Tracking tool based on social media for risk assessment on radicalisation by Irene Gilpérez López - Research Project on ResearchGate
Born to be Wild (Sort of) - Page 19 of 28 - The Nature of Cities
59 tabs
Copy links to clipboard
Copy
Open
Home : Occupational Outlook Handbook: : U.S. Bureau of Labor Statistics
CRS |
Sipri – Page Array – ATT Asissistance
American Housing Survey Statistics for Selected Metropolitan Areas
Problem Statements - Hacking 4 Diplomacy
Perception and Exploitation | Deutsche Gesellschaft für Auswärtige Politik e.V.
Team Formation & Startup Hacking4Diplomacy - Google Sheets
European Commission : CORDIS : Projects & Results Service : The science of forecasting reaches new heights
About – Page Array – Sipri
Add Extra Shelf Space To Any Closet For $9
Home | SIPRI
Subconscious Musings - Advanced analytics - from Research Drive to the world
About Guide on the Side | code.library
greta's gouge: Friday's Miscellany 01-20-2017
Strategic Studies Institute (SSI) | US Army War College
Argunet - Open-Source Argument Mapping
Visa® Gift Card
Bill O'Reilly: Stratfor.com Intel Briefing - The Islamic State in 2017: Rotting From the Outside In
Data
AHS 2015 Public Use File (PUF)
AHS 2015 Metropolitan Public Use File (PUF)
AHS 2015 National Public Use File (PUF)
2015 Definitions, Accuracy, Historical Changes, and Questionnaires
Top Auto Tools - Reviews & Comparisons
Fighting Terrorism with Technology | Israel Defense
Former CIA Officer Writes About The Shocking... - Matthew Aid
MITFORUM
OHSU's HIV vaccine technology acquired by Bay Area biotech | OregonLive.com
Special Measures: Donald Trump and Trans-Atlantic Relations | Oxford Research Group
The Air Force Deployment Transition Center: Assessment of Program Structure, Process, and Outcomes | RAND
SSI Publications - Most Popular
The Right Response to Russian Disinformation: Do Your Homework and Don't Panic! | Deutsche Gesellschaft für Auswärtige Politik e.V.
Nuclear Information Project Publications |
GitHub - pdxlibrary/Guide-on-the-Side: Guide on the Side - a freely available tool that allows librarians to quickly and easily create online, interactive tutorials that are based on the principles of authentic and active learning.
GitHub - pdxlibrary/proxy-link-builder: Simple Proxy Link Builder - Prepends persistent link with proxy prefix string
FSB Counterespionage Successes in 2016: The Yuri Ivanchenko Case | Intel Today
‘Russian Spy and I’ | Hans de Vreij's blog
IC ON THE RECORD • Release of Joint Assessments of Section 702...
IC ON THE RECORD
The Administration’s Response to Russia: What You Need to Know | whitehouse.gov
Remarks by the President in Farewell Address | whitehouse.gov
Political Conflict in Africa | Tableau Public
bellingcat - Mapping Mosul's SVBIED Attacks - bellingcat
Predicting Terrorism From Big Data Challenges U.S. Intelligence - Bloomberg
Rachel Levinson-Waldman | Brennan Center for Justice
The intelligence community and President Trump | Brookings Institution
Terrorism & Extremism | Brookings Institution
CACI Premier Technology, Inc. v. Rhodes, 536 F.3d 280 – CourtListener.com
Advanced Social Network Analysis - Google Search
Argument Mapper for Structured Reasoning - Google Search
Combating Terrorism Technology Startup and Advanced Analytic Application Challenges - Google Search
Events of 2016 | HRW
Executive Orders
TextTool 2.0 Review – MacStories
TextTool 2 - Transform Your Text on the App Store
OODA Loop - Terrorist laptop provides new revelations
Factoring Russia into the US–Chinese equation on hypersonic glide vehicles | SIPRI
World Military Expenditures and Arms Transfers 2016
The Inaugural Address | whitehouse.gov
9 tabs
Copy links to clipboard
Copy
Open
Muslim American Experience Bibliography | ISPU
Orsam - ORSAM
Materials for download – HAZARD Project
STO-MP-IST-123 - All Documents
84.89.132.1/~brossi/Barbara Rossi's research.htm
Advances in Optical Technologies | Directory of Open Access Journals
European Commission : CORDIS : Projects & Results Service : Total Airport Security System
Publications / Deliverables
English - Fraunhofer INT
19 tabs
Copy links to clipboard
Copy
Open
European Commission : CORDIS : News and Events : Predictive tools could help rescue workers contain disasters
European Commission : CORDIS : Projects & Results Service : Multi-Modal Situation Assessment & Analytics Platform
European Commission : CORDIS : Projects & Results Service : Final Report Summary - NEW FORECAST METHODS (New Methods For Forecast Evaluation)
Databases & Articles
Persistent Links to Library Content | Portland State University Library
EBSCOhost | Portland State University Library
Atlantic Council
CRITIS 2016 - The 11th International Conference on Critical Information Infrastructures Security
Terrorist threat and refugee crisis: French and German answers
Perfect Storm: The Implications of Middle East Chaos
DHS Seeks to Improve Analytics for Prediction of Bio-Threat Incidents
Elicitation of a Utility from Uncertainty Equivalent Without Standard Gambles
Home - Courage
> U.S. DEPARTMENT OF DEFENSE > Contract View
Computational Simulation of Online Social Behavior (SocialSim) - DARPA-SN-17-19 - Federal Business Opportunities: Opportunities
Analytics for Prediction of Bio-Threat Incidents - HSHQDC14RB0009OBAA14003CALL19 - Federal Business Opportunities: Opportunities
portland state library ezproxy - Google Search
TNO - innovation for life | TNO
The Jihadi Threat: ISIS, al-Qaeda, and Beyond | Wilson Center
01-22
Copy links to clipboard
Copy
Open
Sunday's Best Deals: Protein Sale, ThinkPad Yoga, Wireless Flash Drive, and More
PAR-13-374: Modeling Social Behavior (R01)
Journal of Artificial Societies and Social Simulation Index
Women's Boots in Sale! - Rocket Dog
Retro Floral Women's Casual Sneakers - Rocket Dog
Pär Anders Granhag - Publications
15 Google Photos Tips for Power Users - Hongkiat
This DIY Platform Bed Saves Space, Has Tons of Storage
12 Chrome Extensions to Maximize Your Google Drive Experience - Hongkiat
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
European Commission : CORDIS : Projects & Results Service : End-user driven DEmo for cbrNe
European Commission : CORDIS : Projects & Results Service : Privacy Preserving Perimeter Protection Project
Platforms - EDEN Security
Download - EDEN Security
Concert For America 2017 - YouTube
Vol 37, No 4
Lin_Manuel | Lin Manuel | Free Listening on SoundCloud
Standard Notes - standard notes app, un-standard every other way.
Standard Notes - standard notes app, un-standard every other way.
Standard Notes - standard notes app, un-standard every other way.
Jihadism in the Arab World after 2011: Explaining Its Expansion | Middle East Policy Council
Standard Notes - standard notes app, un-standard every other way.
GitHub - standardnotes/standard-journal: A blogging extension for Standard Notes
Publications - EDEN Security
CBRNE Innovation Fair & EDEN Final Conference - EDEN Security
Notes — Standard Notes
Open Journal Systems | Public Knowledge Project
European Commission : CORDIS : Projects & Results Service : PREparing for the Domino effect in Crisis siTuations
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 1 - HOMER (SEC-2012.1.3.2- Homemade explosives (HMEs) and recipes characterisation- Capability)
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Search : Results page
Politics and social media
Smartphone-Based Adaptive Driving Maneuver Detection: A Large-Scale Evaluation Study - IEEE Xplore Document
Distributed Multi-Unit Privacy Assured Bidding (PAB) for Smart Grid Demand Response Programs - IEEE Xplore Document
Catching crime: Detection of public safety incidents using social media - IEEE Xplore Document
An Experiment on Decision Diagrams for Model Checking Probabilistic Timed Automata - IEEE Xplore Document
Research publications
Fraunhofer-Publica List
Publications - Fraunhofer EMI
Information Professionals as Intelligence Analysts: Making the Transition - Government Info Pro
Analysing impression management strategies of Egyptian telecommunications companies on social media: International Journal of Technology Marketing: Vol 12, No 1
Cyber Intelligence Panel at Five Eye’s Analytic Training Workshop
A Preliminary Examination of Insider Threat programs in the U.S. Private Sector
Conceptualizing the silent risk of inadvertent information leakages
You have (1) unread message from PSU - scitrenbaum@gmail.com - Gmail
Source camera identification with computational intelligence techniques | PolyU Institutional Research Archive
Measuring the people fleet: general analysis, interventions and needs: Strategic HR Review: Vol 16, No 1
Improving Systems of Care in Time-Sensitive Emergencies - Journal of Emergency Medical Services
An agent-based model for diffusion of electric vehicles
A Reactive Agent-Based Decision-Making System for SBCE - IEEE Xplore Document
Dr. Edna Reid - Google Search
intelligence support systems for lawful interception, electronic surveillance and cyber intelligence gathering - Google Search
Understanding the Islamic State’s competitive advantages: Remaking state and nationhood in the Middle East and North Africa: Terrorism and Political Violence: Vol 0, No 0
System of Systems Capability Needs Analysis via a Stochastic Netw...: Ingenta Connect
A BAYESIAN ABDUCTION MODEL FOR EXTRACTING THE MOST PROBABLE EVIDENCE TO SUPPORT SENSEMAKING - ProQuest
Lin-Manuel Miranda Drops 8 Hamilton Demos -- Vulture
Parking | The City of Portland, Oregon
School of Security and Global Studies | American Public University
Internet Archive’s Trump Archive launches today | Internet Archive Blogs
Politics, Power, and Preventive Action Obama's Final Drone Strike Data - Politics, Power, and Preventive Action
Data.mil - LiveStories
The Cable | Foreign Policy
Tony Soprano visits the CIA HQ: Who does Trump think he is fooling with this? | Foreign Policy
Trump's Insurgency creates our Tahrir Square Moment - Global Guerrillas
The Open Source Protest To Oust Trump - Global Guerrillas
Journal of Artificial Societies and Social Simulation
Elucidating Transmission Patterns From Internet Reports: Ebola and Middle East Respiratory Syndrome as Case Studies
Top 10 Free Alternatives to Expensive Software
Identifying opinion leaders in social networks with topic limitation | SpringerLink
War News Updates: World News Briefs -- January 19, 2017 (Evening Edition)
Bashar al-Assad - WikiVisually
Import Evernote into Ulysses | Jeff Taekman's WiPPP
ABC-CLIO Corporate - Home
United States Women's March on Washington | | Al Jazeera
Computational models and social simulations | APRESO
Finding My Way Around the Corruption System with a Map: Mapping the Effects of an Intervention and Extending Systems Mapping to New Areas – CDA Perspectives
Compound Interest - This Week in Chemistry – Firefighting Phone Batteries and Light-Triggered On-Demand Pain Relief
DARPA Switching Networks and Conley-Morse Index for Modeling Systems of Systems Award | Contract Research and Development
Delitor - Intelligence Gathering
Datasets | Followthehashtag // Free twitter search analytics and business intelligence tool
Jamie Todd Rubin | Writer, Blogger, Coder
Sustainability | Free Full-Text | Social Dynamics Shaping the Diffusion of Sustainable Aquaculture Innovations in the Solomon Islands | HTML
How social media matter: Repression and the diffusion of the occupy Wall Street movement
Cluster analysis of multiplex networks: Defining composite network measures
The Women’s March movement is taking place on every continent, even Antarctica - The Verge
Interpreting Data About Islamic State Online - VOX - Pol
Nashville Recap: Like a Prayer -- Vulture
Innovation and Social Media: Cultural Impacts on the Opinion Influence Process in Brand Communities | Journal of Industrial Integration and Management , Vol 0, No 0 | World Scientific
[1701.05632] The Internet as Quantitative Social Science Platform: Insights from a Trillion Observations
The Central Intelligence Agency: An Encyclopedia of Covert Ops, Intelligence ... - Google Books
ComputerCrimeInfo Blog » Blog Archive » Internet Search Resource: Searx
The State of Information Visualization, 2017
Pandora Report 1.20.2017 – The Pandora Report
Computational Simulation of Online Social Behavior - Google Scholar
AmazonSmile: Brave New War: The Next Stage of Terrorism and the End of Globalization (9780471780793): John Robb: Books
Superforecasters, Software, and Spies: A Conversation With Jason Matheny by CFR.org | CFR Org | Free Listening on SoundCloud
Free Online Social Media Photo Editor | Adobe Spark Post
Twitter’s latest feature tries to identify your BFF | TechCrunch
(2) Malcolm Nance (@MalcolmNance) | Twitter
(2) Kyle Buchanan (@kylebuchanan) | Twitter
Mathematical and Computational Simulation of the Behavioral and Social Drivers of Population Health | Agency for Healthcare Research & Quality
CREST: 25-Year Program Archive | CIA FOIA (foia.cia.gov)
Search Results: Intelligence Officer’s Bookshelf
deseat.me
TRI Data and Tools | Toxics Release Inventory (TRI) Program | US EPA
An Encyclopedia of Covert Ops, Intelligence Gathering, and Spies Volume 2 pdf - Google Search
Computational Simulation of Online Social Behavior - Google Search
Google BigQuery Adds New Public Datasets
Mapping the Women's March on America | Mapbox
A guide to joining twitter now it’s an unremittingly bleak document of how awful everything is — Ned Potter
Simon Oleszkiewicz
Steven Kleinman - Publications
01-21
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
GEOINT and Machine Learning
DIVA
Finder
Machine Learning & Artificial Intelligence Workshop - USGIF
Machine Learning Presentations - USGIF
Home
Detection and Computational Analysis of Psychological Signals (DCAPS)
How to Turn Airmail Into the Ultimate Email App for iPhone
what to back up on my mac - Google Search
The paranoid person's guide to a complete Mac backup | Macworld
How to back up your Mac with Time Machine | iMore
Cogito – Real-time emotional intelligence
Research Areas
Projects
HFC BAA
System Dynamics Conference
Thwarting terrorism: Pitt professors track nuclear smuggling | Pittsburgh Post-Gazette
K9 United - Home Page - Team Cowboy
JSOU Press Publications - Joint Special Operations University Press Publications - Library at Joint Special Operations University
Other Research & Reports of Interest - Joint Special Operations University Press Publications - Library at Joint Special Operations University
JSOU Research & Reports - Joint Special Operations University Press Publications - Library at Joint Special Operations University
Prologue > Center for Complex Operations > PRISM 6.3
Underground Tradecraft
The US Postal Service Wants to Hunt Down Dark Web Criminals | Motherboard
Daily Russia Brief: U.S.-Russia Relations Enter the Trump Era
Paul Krugman Reveals Just How Dangerously Incompetent Trump Is Already Proving to Be | Alternet
IS turns hobby drones into remote-control bombs – Naked Security
Research Programs
CORE3D BAA
Aladdin Video
Aladdin Video BAA
2016 Year in Review
What Is the Adversary Likely to Do with the Clearance Records for 20 Million Americans? | RAND
What is the Adversary Likely to Do With the Clearance Records for 20 Million Americans? – InsideSources
This Week's Most Popular Posts: January 13th to 20th
Today's Best Deals: Madden 17, True Wireless Headphones, TurboTax, and More
Use Dropbox to Store a Mac's Settings for Easy Configuration When You Get a New Computer
Enhanced Interrogation: Inside the Minds and Motives of the Islamic Terrorists Trying To Destroy America - Kindle edition by James E. Mitchell, Bill Harlow. Politics & Social Sciences Kindle eBooks @ AmazonSmile.
Detection and Computational Analysis of Psychological Signals - Google Search
Rizzo: Detection and computational analysis of psychologi... - Google Scholar
Rizzo: Detection and computational analysis of psychologi... - Google Scholar
DARPA's Detection and Computational Analysis of Psychological Signals (DCAPS : technology
relevance of AI and ML for the warfighter. - Google Search
DTRA and Navy Looking to Sharks for Warfighter Protection | Open Source Cloud
Dr. Nina Berry, - Google Search
3131 sw talbot rd 97201 historic register - Google Search
3024 SW Talbot Rd - Google Maps
National Register of Historic Places listings in Southwest Portland, Oregon - Wikipedia
(953) #j20 hashtag on Twitter
(FORMER) U.S. Custom House, Portland, OR
How to back up a Mac: The 4 best data backup methods - Features - Macworld UK
Capture what’s on your mind | Evernote
Neutron spectrometry and dosimetry using passive methods
“Drop-slip” bulk sample flow on fully inkjet-printed microfluidic paper-based analytical device
203 tabs
Copy links to clipboard
Copy
Open
ethnosociology
A Five-Year Outlook for Russian Foreign Policy: Demands, Drivers, and Influences - Carnegie Moscow Center - Carnegie Endowment for International Peace
Going to the People—and Back Again: The Changing Shape of the Russian Regime - Carnegie Moscow Center - Carnegie Endowment for International Peace
Where Does Pakistan Fit in Russia’s South Asia Strategy? - Carnegie Moscow Center - Carnegie Endowment for International Peace
Carnegie Moscow Center - Carnegie Endowment for International Peace
A Transatlantic Strategy for Russia - Carnegie Endowment for International Peace
European Commission : CORDIS : Programmes : Specific Programme "Cooperation": Security
European Commission : CORDIS : Projects & Results Service : Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles
European Commission : CORDIS : Projects & Results Service : Rapid On-site Forensic Analysis of Explosives and Narcotics
European Commission : CORDIS : Projects & Results Service : Situation AWare Security Operations Center
European Commission : CORDIS : Projects & Results Service : Innovative Method and Procedure to Assess Counter-violent-radicalisation Techniques in Europe
European Commission : CORDIS : Projects & Results Service : PREparing for the Domino effect in Crisis siTuations
European Commission : CORDIS : Projects & Results Service : Generic Integrated Forensic Toolbox for CBRN incidents
European Commission : CORDIS : Projects & Results Service : Home
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Final Report Summary - PANDORA (Advanced Training Environment for Crisis Scenarios.)
European Commission : CORDIS : Projects & Results Service : Portable forensic tools
European Commission : CORDIS : Projects & Results Service : Final Report Summary - ROSFEN (Rapid On-site Forensic Analysis of Explosives and Narcotics)
European Commission : CORDIS : Projects & Results Service : Final Report Summary - MOSAIC (Multi-Modal Situation Assessment & Analytics Platform)
European Commission : CORDIS : Projects & Results Service : Protecting core utilities and services through targeted surveillance
European Commission : CORDIS : Projects & Results Service : Final Report Summary - SAWSOC (Situation AWare Security Operations Center)
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Search : Results page
ISLAMISM AND ANTISEMITISM. PRELIMINARY EVIDENCE ON THEIR RELATIONSHIP FROM CROSS-NATIONAL OPINION DATA - тема научной статьи по социологии, читайте бесплатно текст научно-исследовательской работы в электронной библиотеке КиберЛенинка
Sentiment analysis and visualisation in a backchannel system
An Effective Model for Anonymizing Personal Location Trajectory
Osama bin Laden, terrorist leader and doting father - CNN.com
Foreign Military Studies Office
Foreign Military Studies Office
SitRep on Inauguration Day: Infighting Between Mattis, Trump Team; Obama Staffers Staying; Intel Agencies Investigating Trump/Russia Ties | Foreign Policy
After Crimea: Top Intelligence Analysts Forecast 5 Things That Putin Might Do Next
How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument | Gary King
Will the World be Safer or More Dangerous Under a Trump Presidency? - Global Guerrillas
greta's gouge
Ethan Bueno de Mesquita's Webpage
Detection against Linear Deception Attacks on Multi-sensor Remote State Estimation - IEEE Xplore Document
A Comparison of Some Predictive Models for Modeling Abortion Rate in Russia - IEEE Xplore Document
IMPACT Europe - IMPACT Europe
Synthesis report on the state-of-the-art in evaluating the effectiveness of counter-violent extremism interventions - IMPACT Europe
Where does Pakistan fit in Russia’s South Asia strategy? | Russia & India Report
Forecasting Zika Incidence in the 2016 Latin America Outbreak Combining Traditional Disease Surveillance with Search, Social Media, and News Report Data
Quantitative Agent Based Model of Opinion Dynamics: Polish Elections of 2015
Examining the ethos of conflictby exploring lay people’s representations of the Kurdish conflict in Turkey - Jan 12, 2017
Katehon think tank. Geopolitics & Tradition
2017 Forecast: Russia | Katehon think tank. Geopolitics & Tradition
Foreign Policy - Situation Report
Law Enforcement and Technology - Springer
Security in the Persian Gulf Region - Springer
The History of Well-Being in the Middle East and North Africa (MENA) - Springer
Group Decision Making: Consensus Approaches Based on Soft Consensus Measures - Springer
Terrorism between Social Movements, the State and Media Societies - Springer
Technology and the Future of Policing - Springer
Regional Rise of the Al Qaeda Threat Following the Iraq War - Springer
Record Linkage - Springer
Can This Strategy Game Predict Whether Clinton or Trump Will Win the White House? | The National Interest Blog
Do Terrorist Attacks Leave an Identifiable ‘Fingerprint’ on International Tourist Arrival Data? - Morakabati - 2017 - International Journal of Tourism Research - Wiley Online Library
Instructional Programs - - 2017 - Higher Education Abstracts - Wiley Online Library
PREparing for the Domino effect in Crisis siTuations - PREDICT : D3.1 Methofolog :: TNO Repository
The Racial Infrastructure of the Terror-Industrial Complex
Big data, small wars, local insights
TOWARDS A GEOPOLITICS OF RUSSIA'S FUTURE | The Fourth Political Theory
Radio In A Box (RIAB) Afghanistan
How To Calibrate iPhone Battery | Appledystopia
U.S. Army taps Leidos for training and simulation equipment - Breitbart
Crimea Asks To Join Russia After Soviet-Style Vote - Business Insider
Military & Defense - Business Insider
Putin Is Now Darker Version Of Himself - Business Insider
Wikistrat: The Next Russian Military Invasion - Business Insider
The State of Defense 2017
The State of Defense 2017
The State of Defense 2017
The State of Defense 2017
SPECIAL REPORT: The State of Defense 2017 - Defense One
What the World Might Look Like in 5 Years, According to US Intelligence - Defense One
Tracking Trump’s National-Security Conflicts of Interest - Defense One
How Powerful Is Russia's Military? - Defense One
Ukraine and Russia: People, Politics, Propaganda and Perspectives
Publications — E-International Relations
An unpredictable Russia: the impact on Poland | European Council on Foreign Relations
Why al Qaeda and Islamic State Threats To Attack The West Should Be Taken More Seriously Now - Foreign Policy Research Institute
GEGeek - I don't reinvent the wheel, I just link to it.
Who is Behind the Islamic State in Syria? ISIS-Daesh Attempts to Torpedo the Astana Peace Negotiations | Global Research - Centre for Research on Globalization
How to fix iOS 10 and iPhone 7 battery life problems | iMore
Organisations: Research laboratory in Predictive Modeling and Optimization at PhysTech (PreMoLab): Research laboratory in Predictive Modeling and Optimization at PhysTech (PreMoLab), Moscow, Russia
FP7 MOSAIC Project
Scientific Publications
FP7 MOSAIC Project - News
Downloads
World predictions 2017: ISIS weakens further, Russia, China, US face uncertain times
Laurence Pope Appointed to Envoy Post in Libya - The New York Times
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
PANDORA Project
PREDICT | Home
The PREDICT Tool Suite | PREDICT
PROCeed | PREDICT
SBR | PREDICT
PROCeed | Symulacje Analizy Szkolenia
Trump and Russia: Challenges and Opportunities | RAND
Oregon Has Options to Move Toward Universal Health Coverage; Repeal of the Affordable Care Act Would Make All Options More Difficult | RAND
Exploring America's Role in a Turbulent World: Strategic Rethink | RAND
Russia and the West After the Ukrainian Crisis: European Vulnerabilities to Russian Pressures | RAND
ROSFEN Project | FP7 EU project
Technology | ROSFEN Project
Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
Understanding dark networks: a strategic framework for the use of social network analysis: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
Teaching Terrorism: A TRI Portal
The Mark News
Khodorkovsky makes gloomy forecast for Putin regime for next 10 years
Military Reading Lists | U.S. Naval Institute
US-RUSSIA CROSSTALK: Russia-U.S. mutual investments have a future - Washington Times
The Next Russian Military Intervention: Wikistrat Report | Wikistrat
Lightshot — screenshot tool for Mac & Win
Social and Information Networks authors/titles recent submissions
The Citizen Lab - Reports and Research Briefs
European Commission : CORDIS : My Account : View account
URGENT HELP! NEED TO GET RID OF MACKEEPER VIRUS... | Official Apple Support Communities
DSpace@MIT: MIT Theses
COMMENTARY: Means, goals and consequences of the pro-Kremlin disinformation campaign | EU vs Disinformation
Today / Me
Putin’s Machivellian Moment: 6 Noted Kremlinologists Attempt To Forecast What’s Next | Fortuna's Corner
Fortuna's Corner | You can never have too much information – knowledge is your best weapon!
Forecasting Russia in 2017 |
Terrorist Acts in Democracies | Insight Maker
"Google Scholar" (13) - scitrenbaum@gmail.com - Gmail
Objective-See
Privacy Training by Michael Bazzell
Political Science / World / Russian & Former Soviet Union | Rowman & Littlefield
A Socio-Political Model of Lies in Russia: Putin Against the Personal, By Jason C. Vaughn, 9780761867630 | Rowman & Littlefield
predictive modeling russia - Google Scholar
Quadrant - Islamic state, child soldiers, and intolerable Islamic schools (Literature & Culture Collection) - Informit
Experiencing bad iPhone battery life? Try this before restoring!
Russia’s information warfare is on the rise: David Ignatius – To Inform is to Influence
(9) Twitter
Steve Stalinsky (@SteveStalinsky) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
Jon Nichols (@wvualphasoldier) | Twitter
Making Russia Think Twice About Nuclear Threats
Bin Laden's Bookshelf
Why IR Theory Gets Russia Wrong | Foreign Affairs
Forecasting the world in 2017
Patent US9530104 - Scalable bootstrap method for assessing the quality of machine learning ... - Google Patents
A Socio-Political Model of Lies in Russia pdf - Google Search
Alexa Courtney - Google Search
HOW THE WEST MISJUDGED RUSSIA - Google Search
International Journal of Cyber Warfare and Terrorism - Google Search
NSI Discourse Analysis of Russian - Google Search
reset battery setting iphone - Google Search
Mitigating Disinformation Campaigns Against Air Power - Joint Air Power Competence Centre
Use of Predictive Modeling Packages for Effective Emergency Management--Nikolai Petrovich Kopylov and Irek Ravilevich Khasanov | Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops | The National Academies Press
reddit: the front page of the internet
So Mackeeper is a virus, right? : apple
Official Subreddit FAQ and Information Guide (redraft) : syriancivilwar
Annetta Burger
Dorothy E. Denning
Ian Lustick
Yeganeh Morakabati
Creative Cognitive Systems (CreaCogs) by Ana-Maria Olteteanu - Research Project on ResearchGate
Individual and social response to a nuclear WMD event by William George Kennedy - Research Project on ResearchGate
Individual and social response to a nuclear WMD event by William George Kennedy - Research Project on ResearchGate
Networked Governance by Ines Mergel - Research Project on ResearchGate
Personality Psychology and Agent-Based Modeling by Tom Briggs - Research Project on ResearchGate
Terrorism Research Initiative by Jeanine De Roy van Zuijdewijn - Research Project on ResearchGate
Estimating vulnerabilities in large covert networks
A Comparison of Some Predictive Models for Modeling Abortion Rate in Russia
Grounds for War: The Evolution of Territorial Conflict
Fragility and Destabilizing Protest: Combining Event and Structural Data for Improved Forecasts
Semantically correct representation of multi-model interoperations
Alternatives to Cyber Warfare: Deterrence and Assurance
Analysis of a probability-based SATCOM situational awareness model for parameter estimation
Complex Data-driven Predictive Modeling in Personalized Clinical Decision Support for Acute Coronary Syndrome Episodes
Improving Decision Making in Crisis Management through learning-by-doing: the Case Study of the ATTACS Project
PTIB: Profiling Top Influential Blogger in Online Social Networks
Towards an Extension of PROMELA for the Modeling, Simulation and Verification of Discrete-Event Systems
When Is a “War” a “Wave?” Two Approaches for the Detection of Waves in Gang Homicides
PowerPoint slides: The Public Nature of the Public Library - Inaugural Lecture, November 2014.
ResearchGate
ResearchGate
Schneier on Security: Crypto-Gram
RTO-TR-HFM-024
Prediction Market
Manipulating Russia's Political Future, One Election at a Time | Stratfor
2017 Annual Forecast | Stratfor
CCAPS Data Mapping Tool, SCAD, ACLED, & Malawi Aid Datasets
Unraveling in the Kremlin – The Cairo Review of Global Affairs
India’s N-material black market flourishing? | Pakistan | thenews.com.pk
Home - Your Ultimate Security Guide
Famous In NY Video - YouTube
Linda Wellington - YouTube
Ramin Karimloo 'High Flying, Adored' Curve Theatre Leicester 15.01.17 HD - YouTube
71 tabs
Copy links to clipboard
Copy
Open
FP7 MOSAIC Project
Scientific Publications
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Final Report Summary - MOSAIC (Multi-Modal Situation Assessment & Analytics Platform)
European Commission : CORDIS : Projects & Results Service : Home
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Projects & Results Service : PREparing for the Domino effect in Crisis siTuations
European Commission : CORDIS : Programmes : Specific Programme "Cooperation": Security
ROSFEN Project | FP7 EU project
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
The State of Defense 2017
PREDICT | Home
IMPACT Europe - IMPACT Europe
European Commission : CORDIS : Projects & Results Service : Rapid On-site Forensic Analysis of Explosives and Narcotics
European Commission : CORDIS : Projects & Results Service : Situation AWare Security Operations Center
European Commission : CORDIS : Projects & Results Service : Innovative Method and Procedure to Assess Counter-violent-radicalisation Techniques in Europe
European Commission : CORDIS : Projects & Results Service : Generic Integrated Forensic Toolbox for CBRN incidents
European Commission : CORDIS : Projects & Results Service : Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Final Report Summary - PANDORA (Advanced Training Environment for Crisis Scenarios.)
European Commission : CORDIS : Projects & Results Service : Portable forensic tools
European Commission : CORDIS : Projects & Results Service : Final Report Summary - ROSFEN (Rapid On-site Forensic Analysis of Explosives and Narcotics)
European Commission : CORDIS : Projects & Results Service : Protecting core utilities and services through targeted surveillance
European Commission : CORDIS : Projects & Results Service : Final Report Summary - SAWSOC (Situation AWare Security Operations Center)
European Commission : CORDIS : Search : Results page
Will the World be Safer or More Dangerous Under a Trump Presidency? - Global Guerrillas
Detection against Linear Deception Attacks on Multi-sensor Remote State Estimation - IEEE Xplore Document
A Comparison of Some Predictive Models for Modeling Abortion Rate in Russia - IEEE Xplore Document
Synthesis report on the state-of-the-art in evaluating the effectiveness of counter-violent extremism interventions - IMPACT Europe
Law Enforcement and Technology - Springer
PREparing for the Domino effect in Crisis siTuations - PREDICT : D3.1 Methofolog :: TNO Repository
The State of Defense 2017
The State of Defense 2017
The State of Defense 2017
Why al Qaeda and Islamic State Threats To Attack The West Should Be Taken More Seriously Now - Foreign Policy Research Institute
Who is Behind the Islamic State in Syria? ISIS-Daesh Attempts to Torpedo the Astana Peace Negotiations | Global Research - Centre for Research on Globalization
Organisations: Research laboratory in Predictive Modeling and Optimization at PhysTech (PreMoLab): Research laboratory in Predictive Modeling and Optimization at PhysTech (PreMoLab), Moscow, Russia
FP7 MOSAIC Project - News
Downloads
PANDORA Project
The PREDICT Tool Suite | PREDICT
PROCeed | PREDICT
SBR | PREDICT
PROCeed | Symulacje Analizy Szkolenia
Trump and Russia: Challenges and Opportunities | RAND
Oregon Has Options to Move Toward Universal Health Coverage; Repeal of the Affordable Care Act Would Make All Options More Difficult | RAND
Russia and the West After the Ukrainian Crisis: European Vulnerabilities to Russian Pressures | RAND
Technology | ROSFEN Project
Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
Understanding dark networks: a strategic framework for the use of social network analysis: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
The Mark News
Lightshot — screenshot tool for Mac & Win
Social and Information Networks authors/titles recent submissions
Objective-See
Privacy Training by Michael Bazzell
predictive modeling russia - Google Scholar
Russia’s information warfare is on the rise: David Ignatius – To Inform is to Influence
Use of Predictive Modeling Packages for Effective Emergency Management--Nikolai Petrovich Kopylov and Irek Ravilevich Khasanov | Russian Views on Countering Terrorism During Eight Years of Dialogue: Extracts from Proceedings of Four U.S.-Russian Workshops | The National Academies Press
A Comparison of Some Predictive Models for Modeling Abortion Rate in Russia
Home - Your Ultimate Security Guide
CCAPS Data Mapping Tool, SCAD, ACLED, & Malawi Aid Datasets
DSpace@MIT: MIT Theses
Steve Stalinsky (@SteveStalinsky) | Twitter
Radio In A Box (RIAB) Afghanistan
7 tabs
Copy links to clipboard
Copy
Open
New Mac Essentials - Product Hunt
Spectacle - Product Hunt
Magnet for Mac - Product Hunt
Better Snap Tool - Product Hunt
Caffeine - Product Hunt
Alfred 3 - Product Hunt
Product Hunt for Mac - Product Hunt
01-17
Copy links to clipboard
Copy
Open
Ethan Bueno de Mesquita's Publications and Working Papers
Ethan Bueno de Mesquita's Publications and Working Papers
Ethan Bueno de Mesquita's Other Writings
AC2 | Bio-Link Regional Center
Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration - Carnegie Endowment for International Peace
Task Force on U.S. Policy Toward Russia, Ukraine, and Eurasia - Carnegie Endowment for International Peace
The National Interest
TSG IntelBrief: The Islamic State in 2017 | The Soufan Group
Counter-IED initiatives, Trump, and Guns in Japan
How far is Russia willing to go in Syria? | Syria | Al Jazeera
Analysis: The Fifth Corps and the State of the Syrian Army
The Consequences of Merger Talks among Syrian Rebels
Page not found | Belfer Center for Science and International Affairs
Bio-Link | 2016-2017 Bio-Link webinar series
Bio-Link Program/Bluegrass Community and Technical College
HFM-140 Psychosocial, Organisational and Cultural Aspects of Terrorism
SAS-074 Integration of Psycho-Social Models and Methods in NATO’s Effects-Based Approach to Operations
SAS-082 Disruptive Technology Assessment Game: Extension and Applications
franklinbiologics
IVC Happenings - Bio-Link Depot at IVC
James J.F. Forest » Professor, Author, Consultant
10 Social Media Lessons from the Middle East for 2017 | Informed Comment
Spotlight’s Secret Search Syntax | Kirkville
Homeland Security Market: Accelerating Threat of Terrorism in Several Parts of the World boost Demand - openPR
The case for American nuclear leadership: Bulletin of the Atomic Scientists: Vol 73, No 1
A review of international, regional and bilateral initiatives that aim to provide counter-IED assistance | AOAV
Stanford bioengineers develop a 20-cent, hand-powered centrifuge - Google Groups
One sentence summaries of iGEM 2016 projects - Google Groups
How to advance a DIYBio lab beyond the basics. - Google Groups
Odin's Blessings for Friday $75 PCR Machine, $30 Pipettes and a bunch of Strains - Google Groups
Brian Hanley's garage gene therapy - Google Groups
A message to my doomed colleagues in the American media – Medium
Lima – The first Cloud that respects your privacy
Trump buildings are likely terror targets, but it’s unclear who will pay for extra security – VICE News
CIA officials are learning to live in an era when the president-elect publicly disparages them – VICE News
Donald Trump’s highly abnormal presidency: a running guide for January – VICE News
That billboard featuring a Disney princess on meth isn’t new and probably didn’t work – VICE News
Speckhard: Psychosocial, Organizational and Cultural... - Google Scholar
Trump Slams NATO, Floats Russia Nuke Deal in European Interview - Bloomberg
CTC Speaks at Googleideas Event Previewing Research Findings on Illicit Networks | Combating Terrorism Center at West Point
Edges of Radicalization: Ideas, Individuals and Networks in Violent Extremism | Combating Terrorism Center at West Point
Improve Spotlight Searches with Search Operators in Mac OS X - Google Search
PSI Guides to Terrorists, Insurgents, and Armed Groups - Google Search
RTO-TR-HFM-140 - Google Search
THE ISLAMIC STATE IN 2017 - Google Search
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. - The New York Times
How to Read a Large Amount of Information - Red (Team) Analysis
Red (Team) Analysis - The Impact of the Islamic State Terrorist Attacks - Geopolitics, Uncertainties and Business (4)
Consulting - Entrust Us with Your Geopolitical Uncertainty - Red (Team) Analysis
The Islamic State in 2017: Rotting From the Outside In | Stratfor
Russia’s influence has risen but Iran is the real winner in Aleppo | World news | The Guardian
Sh-K-Boom/Ghostlight Records - YouTube
The Late Late Show with James Corden - YouTube
Green Day - YouTube
Linda Wellington - YouTube
Public Domain Songs w/ Jamie Foxx - YouTube
(28200) Inoreader - From Community Detection to Community Profiling. (arXiv:1701.04528v1 [cs.SI])
Introducing Bombshell: The Explosive First Episode
Pentagon, services seek cross-domain DCGS -- Defense Systems
Fred Hutch study: Biotech company’s new genetic data system could advance cancer research | Fed Tech Ticker
Fred Hutch study: Biotech company's new genetic data system could advance cancer research - GeekWire
GeekWire Awards 2017, presented by Wave Business - GeekWire
Putin rejects Trump dossier report as plot against ‘legitimacy’ of president-elect
What the World Might Look Like in 5 Years, According to U.S. Intelligence - The Atlantic
In 2016 U.S. Special Operations Forces Deployed to 138 Nations, 70% of the World’s Countries | Alternet
CIDOB - Publications
James Mitchell Discusses Enhanced Interrogation | Video | C-SPAN.org
REACHBACK CELL PUBLICATIONS | NSI
Russian Analytical Digest (RAD) – Center for Security Studies | ETH Zurich
Library - Project Gray
DARPA Next Generation Social Science (NGS2) Proposers Day and BAA | Contract Research and Development
Deadline Extended - Feb 15 - Call for White Papers: Social and Behavioral Sciences for National Security: A Decadal Survey
War News Updates: Russian President Putin Accuses Obama Administration Of Trying To Undermine President-Elect Trump's Legitimacy
dblp: Yaneer Bar-Yam
Free GIS Datasets - Categorised List
An overview of forecasting for politics, conflict, and political violence - Less Wrong
Developing an early screening guide for jihadi terrorism: A behavioural analysis of 30 terror attacks | SpringerLink
Why ISIS Recruits from Uzbekistan and Kyrgyzstan | The National Interest
NECSI Research Projects
The Drone Center’s Weekly Roundup: 1/16/17 | Robohub
Daesh in Eurasia - Al Jazeera Center for Studies
Computers in Future Warfare OTS Military Topics - AL
DARPA Secure Handhelds on Assured Resilient networks at the tactical Edge (SHARE) Proposers Day | Contract Research and Development
Gulf of Aden Security Review - January 17, 2017 | Critical Threats
503 Backend fetch failed
Accelerating Discovery with New Tools and Methods for Next Generation Social Science
Next Generation Social Science (NGS2) Proposers Day
Data Downloads | University of Denver
Defence and intelligence Norway | ISIS Defector Reports on the Sale of Organs Harvested from ISIS held “Slaves”
Electronic Warfare | Information Operations | Association of Old Crows Resource Guide
404 Not Found
Assessing America's Wealth Crisis - by John C. Weicher
Terror Forecast : RNBC Terrorism? | Institute for Defence Studies and Analyses
INCORE: Conflict Data Service: Information Bank
(28587) Inoreader - How-To Geek
Could ISIL go nuclear?
Next Generation Social Science (NGS2) - Research Development at Northeastern University
www.soc.mil
Merrill Presidential Scholar honors Dr. Izsak as mentor | START.umd.edu
The Daily Beast
DARPA aims to scale social science research -- GCN
Pocket: My List
Major administrative datasets of the U.S. government — all in one place - Journalist's Resource Journalist's Resource
Inbox (1,276) - stczztop@gmail.com - Gmail
Penn-led Team Receives DARPA Support to Develop ‘Next Generation’ Social Science | Penn News
Evernote Workflows | Sayz Lim
Benjamin Allen - Google Scholar Citations
Predictive Modeling and Hypothesis Generation - Google Scholar
Predictive Modeling and Hypothesis Generation - Google Scholar
50 Shades of Gray: Why the Gray Wars Concept Lacks Strategic Sense
Build a Predictive Model in 10 Minutes (using Python)
20170116 Yonhap Jonathan Pollack | Brookings Institution
DEF CON® Hacking Conference: Resources - Links to Hacking Related Topics
> U.S. DEPARTMENT OF DEFENSE > Contract View
Next Generation Social Science (NGS2) Proposers Day
DARPA Next Generation Social Science - Google Search
David Howgill - Google Search
Defense Basic Research and Minerv - Google Search
ISW Resources for Aleppo - Google Search
Narcissistic Personality Disorder and suicidal behavior in mood disorders - Google Search
Predictive Modeling and Hypothesis Generation - Google Search
The Military Doctrine of the Islamic State and the Limits of Baâathist Influence - Google Search
Spotlight: “Kamikaze Drone” Accurate and Versatile for Military Missions | HDIAC.org
Pirates Could Build Their First Private Air Force With Drones | Inverse
DARPA Announces New Program for Conducting “Next Generation Social Science” | Inverse
DARPA “Project Improv” Asks DIY Enthusiasts and Makers How They'd Attack America | Inverse
National Consortium for the Study of Terrorism and Responses to Terrorism (START): Overview | LinkedIn
Curtis Boyd | LinkedIn
Jonathan Nichols | LinkedIn
Evernote 8.0 Released – MacStories
Modeling Journals | Open Agent Based Modeling Consortium
Home - Polaris Alpha
A terrorist group’s plot to create a radioactive ‘dirty bomb’ | Center for Public Integrity
Enrique Baca-Garcia - Publications
MA Oquendo - ResearchGate
The Mathematics of Evolution: Q&A with Biologist Marcus Feldman - Scientific American
Foreign investment is crucial to Fairfax County’s economy - The Washington Post
caesar0301/awesome-public-datasets: An awesome list of high-quality open datasets in public domains (on-going). By everyone, for everyone!
Robert J. Bunker - Google Scholar Citations
www.c-span.org
www.brookings.edu
www.brookings.edu
www.brookings.edu
www.brookings.edu
www.brookings.edu
ETH Zurich - Homepage | ETH Zurich
CSD:A Revanchist Russia versus an Uncertain West
Activities & Reports | United States Senate Committee on Foreign Relations
The German Marshall Fund of the United States | Strengthening Transatlantic Cooperation
The Intelligence National Security Alliance - Building a Stronger Intelligence Community
icct.nl
icct.nl
TM Volumes Archive - Jamestown
eng.unikorea.go.kr
Publication | Lowy Institute
Global Trends Home Page
Russia | RAND
Dr. Robert J. Bunker - Strategic Studies Institute
Amazon.com: Robert J. Bunker: Books, Biography, Blog, Audiobooks, Kindle
Interview – Robert J. Bunker
www.amazon.com
Terrorists, Insurgents, Something Else? Clarifying and Classifying the “Generational Challenge” - Lawfare
The National Intelligence Council Paints a Grim Future of ‘Disruption’
MIT LIDS | Laboratory for Information & Decision Systems
www.google.com
powersource.post-gazette.com
Will there be a revolution in Russia in 2017?
EVA - Explorable Visual Analytics
Home Feed
BlogTrackers: Analyzing Social Media for Cultural Modeling
International Security Advisory Board: Report on Gray Zone Conflict
www.doodly.com
www.google.com
SoSA Repository - Dropbox
Will there be a revolution in Russia in 2017 - Google Search
Command and Control Research Portal
greta's gouge: Friday's Miscellany 01-06-2017
Beyond Islamists and Autocrats: Prospects for Political Reform Post Arab Spring - Prospects for Political Reform Post Arab Spring - The Washington Institute for Near East Policy
(U//LES) ATF Chemical Analysis of Exploding Targets | Public Intelligence
Best of 2016: Mac apps for nerds - BrettTerpstra.com
Posts Tagged “review” - BrettTerpstra.com
Governance, Statehood, Security: Deutsches Institut für Entwicklungspolitik
OJP Publications - National Criminal Justice Reference Service
What Can Be Done About SOCOM? | Small Wars Journal
Terrorism Online Workshop | Abstracts
Uninstall Office 2016 for Mac - Office Support
"The International Community's Response to the Hypothetical Emergence o" by Brittany Nicole Woods
Policy Design, Analysis, and Evaluation | Open Access Articles | Digital Commons Network™
Models and Methods | Open Access Articles | Digital Commons Network™
A Missing Shade of Gray: Political Will and Waging Something Short of War
Center for Hazards Assessment, Response and Technology (CHART) | University of New Orleans Research | ScholarWorks@UNO
Disaster Resistant University Workshop: Linking Mitigation and Resilience | Conferences and Workshops | University of New Orleans
CHART Publications | Center for Hazards Assessment, Response and Technology (CHART) | University of New Orleans
"Leveraging Lexical Link Analysis (LLA) To Discover New Knowledge" by Ying Zhao, Douglas J. MacKinnon et al.
#Virtual Caliphate | Center for a New American Security
Research | MIT LIDS
The Islamists | Wilson Center
Systems, Networks, and Control | MIT LIDS
Intelligence: news and discussion about Intelligence and espionage matters around the world
UAVs As Mobile IEDs | The Cipher Brief
Smuggling radioactive material - a demonstration exercise in the framework of EU-project EDEN
Autonomous System for Rapid Airfield Assessment (AIAA)
CCICADA Homeland Security News, October 2016 | CCICADA
European Commission : CORDIS : Projects & Results Service : End-user driven DEmo for cbrNe
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 1 - EDEN (End-user driven DEmo for cbrNe)
European Commission : CORDIS : Error information
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
""Chinese Military Space Power: U.S. Department of Defense Annual Repo" by Bert Chapman
Key documents - European Commission
Electrospaces.net: The presidential communications equipment under Barack Obama
greta's gouge: Friday's Miscellany 01-13-2017
Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake - IEEE Xplore Document
Mining Social Response to Crisis via Electronic Media - IEEE Xplore Document
How Hackers Really Steal Passwords, How Close You Live to a Nuclear Bomb, and the Zero Waste Challenge
Trick Your Friends and Family With These 10 Bets You'll Always Win
Use the Fibonacci Sequence to Quickly Convert Between Miles and Kilometers
Analytical operations support part of JIDO subcontract won by Leidos - Military Embedded Systems
New Energy-Saving Technology Wins NSF Grant
Car-borne tracking of fissile material by covert search procedures
Fraunhofer-Publica List: covert search
The Drone Center’s Weekly Roundup: 01/09/17 | Robohub
Sources And Methods: How Many Entry-level Analysts Will The US IC Hire In 2017? (Survey)
Indian Strategic Studies: CYBER BEYOND THIRD OFFSET: A CALL FOR WARFIGHTER-LED INNOVATION
Stratfor Talks: Inauguration Security
Daily Russia Brief: Trump Concedes Russia’s Interference in Election
MacStories Weekly: Issue 62
Hearing | Hearings | United States Commitee on Armed Services
AF team improves counter-biological warfare capability, recognized for excellence | CBRNe Portal
ISIS using small drones to drop bombs on Iraqis | CBRNe Portal
The Stroz Friedberg Cyber Brief — Center on National Security
Trazodone: Common sleep drug is little-known antidepressant - Consumer Reports
Weaponized Narrative Is the New Battlespace - Defense One
The Drones of ISIS - Defense One
US Army Looking to 3D-Print Minidrones in 24 Hours - Defense One
The Islamic State In 2017: Rotting From The Outside In
US Intelligence Made 'Attempt to Recruit' Russian Diplomat
Economic Outlook for 2017
English - Fraunhofer INT
Attack to Reina Club Istanbul: the first video of claim? - By Alessandro Burato | ITSTIME
Sensors | Free Full-Text | Low Cost and Flexible UAV Deployment of Sensors
Sensors | Free Full-Text | Modulation Index Adjustment for Recovery of Pure Wavelength Modulation Spectroscopy Second Harmonic Signal Waveforms
Quilliam Foundation | Challenging Extremism, Promoting Pluralism, Inspiring Change
Rise of Technology in Criminal Proceedings Poses Risk to Protecting Individuals' Rights | RAND
RAND Review: January-February 2017 | RAND
Graph formulation of video activities for abnormal activity recognition
Leidos to support counter-IED organization
Global Terrorism Minor Information Session #1 | START.umd.edu
Nuclear Smuggling and Threats to Lithuanian Security | START.umd.edu
Transnational radicalization, diaspora groups, and within-group sentiment pools: Young Tamil and Somali Canadians on the LTTE and al Shabaab: Terrorism and Political Violence: Vol 0, No 0
United States Institute of Peace
USIP "Peace Terms" Glossary | United States Institute of Peace
Leidos Expands Intel & Threat Reduction with $202M JIDO Award - American Security Today
Event Log Analysis with the LogCluster Tool | CCDCOE
US: ‘Global Engagement Center’ set up to fight ‘Foreign Propaganda and Disinformation’ | Intel Today
Intel Report Suspiciously Anachronistic | Intel Today
Who Is Who in World Intelligence and Security Agencies : GRU Igor Korobov | Intel Today
Radio Pyongyang Resurects its ‘NUMBERS STATION’. How does it work anyway? | Intel Today
Underground Tradecraft : Inside The World Of ISIS Investigations In Europe...
Underground Tradecraft : The evolution of ISIS media
Using Simple Dictionaries in Workflow – nahumck.me
NIJ Sponsored Event
PAXsims | Conflict simulation, peacebuilding, and development
(U//FOUO) DHS Intelligence Note: Germany Christmas Market Attack Underscores Threat to Mass Gatherings and Open-Access Venues | Public Intelligence
The Virtual ‘Caliphate’: Understanding Islamic State’s Propaganda Strategy – To Inform is to Influence
How to Track the U.S. Air Force’s Secretive Commando Planes
The Wages of War without Strategy, Part I: Clausewitz, Vietnam, and the Roots of Strategic Confusion
CitizenHealthInnovationProject – Canva
Mosul is Pivotal in US Counterterrorism Strategy | Center for a New American Security
Nicholas Heras on New Report, "Combating Al-Qaeda in Syria" | Center for a New American Security
The Future of U.S.-Russia Relations | Center for a New American Security
A Contribution to Safety and Security at Major Events within Canada - Google Search
Car-borne tracking of fissile material by covert search procedures - Google Search
DRDC-RDDC-2016-C326 - Google Search
Laboratory for Information and Decision Systems - Google Search
ROBERT J. BUNKER - Google Search
fimd darpa publications by award number - Google Search
2016 The “Year of Terror”: January Terror Threat Snapshot – Homeland Security Digital Library
Paths to Extremism in America: Empirical Analysis Furthers Our Understanding – Homeland Security Digital Library
Unclassified Assessment of the World: What the NIC Thinks About the Future – Homeland Security Digital Library
Putin and Erdogan’s Marriage of Convenience | Wilson Center
8 tabs
Copy links to clipboard
Copy
Open
Adobe Creative Cloud desktop apps | Adobe Creative Cloud
Buy Adobe After Effects CC | Download video effects software free trial
Project Felix from Adobe | 2D and 3D compositing design tools
Buy Adobe Muse CC | Download HTML5 web design software free trial
Make Images, Videos and Web Stories for Free in Minutes | Adobe Spark
Adobe Experience Design CC | Download Adobe UX prototyping tools
Free audio recording, editing software | Download free Adobe Audition CC trial
Buy Adobe Premiere Pro CC | Download video editing software free trial
ICCRTS
Copy links to clipboard
Copy
Open
2016 Presentations and Papers — Command and Control Research Portal
The International Command and Control Institute — Command and Control Research Portal
C2 Agility — Command and Control Research Portal
CCRP Books — Command and Control Research Portal
Education Materials — Command and Control Research Portal
ELICIT — Command and Control Research Portal
NATO Research — Command and Control Research Portal
NEC2 Course — Command and Control Research Portal
SAS 085 — Command and Control Research Portal
RAND
Copy links to clipboard
Copy
Open
Arroyo Center Publications | RAND
Center for Applied Network Analysis and System Science | RAND
RAND Congressional Terrorism and Homeland Security Newsletter - December 2015 | RAND
Terrorism and Homeland Security Issues | RAND
RAND Gulf States Policy Institute | RAND
Center for Middle East Public Policy | RAND
Homeland Security & Defense Publications | RAND
Forces and Resources Policy Center | RAND
Intelligence Policy Center | RAND
RDWTI | RAND
NSRD Publications | RAND
Waging Insurgent Warfare: Lessons From the Vietcong to the Islamic State | RAND
Moving Beyond Population-Centric Vs. Enemy-Centric Counterinsurgency | RAND
National Security | RAND
Public Safety | RAND
Science and Technology | RAND
Terrorism and Homeland Security | RAND
01-15
Copy links to clipboard
Copy
Open
Surface Disturbances at the Punggye-ri Nuclear Test Site: Another Indicator of Nuclear Testing? | 38 North: Informed Analysis of North Korea
Publications
2016 Info Central — Command and Control Research Portal
KSCO 2016 - Papers and Presentations
Index of /ksco/ksco-2016/papers
The tree of political violence: a GMERT analysis | SpringerLink
Observers’ Real-Time Sensitivity to Deception in Naturalistic Interviews | SpringerLink
JOTS v32n1 - Technology-enabled Crime, Policing and Security
The Art of (Cyber)War - 1A
Research | Belfer Center for Science and International Affairs
Center For Global Development |
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
A Presidential Strategy Board: Enabling Strategic Competence - Foreign Policy Research Institute
Sectarianism and War in Iraq and Syria - Foreign Policy Research Institute
EU-India Cooperation on Space and Security | IAI Istituto Affari Internazionali
Toward Approaches to Big Data Analysis for Terroristic Behavior Identification: Child Soldiers in Illegal Armed Groups During the Conflict in the Donbas Region (East Ukraine): Security & Forensic IS&T Journal Article | IGI Global
Approaches to analyze cyber terrorist communities: survey and challenges
Behavior planning of intelligent agent with sign world model
An enhanced Graph Analytics Platform (GAP) providing insight in Big Network Data
Social Networks as the New Frontier of Terrorism: #Terror | START.umd.edu
Publications | StratCom
Al-Qaeda's Patient Approach in Syria May Be Paying Off - The Washington Institute for Near East Policy
The Latest Ceasefire Will Not Change Hezbollah's Role in Syria - The Washington Institute for Near East Policy
ICCRTS 2016 : 21st International Command and Control Research and Technology Symposium
Zazu App
Close to the Enemy, Close to the Truth? – Munitions of the Mind
CRIMINAL JUSTICE TECHNOLOGY IN THE 21st CENTURY: Third Edition - Laura J. Moriarty - Google Books
Social Networks as the New Frontier of Terrorism: #Terror - Laura Scaife - Google Books
CRIMINAL JUSTICE TECHNOLOGY IN THE 21st CENTURY: Third Edition - Laura J. Moriarty - Google Books
The Quadrennial Energy Review (QER) | Department of Energy
Smart Sync on the Mac App Store
Squash — Web Image Compression on the Mac App Store
An Evaluation of a Community-Based Program to Counter Violent Extremism
What Can We Learn From the Similarities and Differences Between Lone Wolf Terrorists and Mass Murderers?
Office of the Director of National Intelligence Background Report: Assessing Russian Activities and Intentions in Recent US Elections | Public Intelligence
Spillover Effects of Unconventional Monetary Policy in Asia and the Pacific | Asian Development Bank
Assadullah Sarwari Freed from Prison: What chances of war crimes trials in Afghanistan? | Afghanistan Analysts Network
Document | Amnesty International
From Awareness to Action | Center for Strategic and International Studies
21 st International Command and Control Research and Technology Symposium 2016 C2 in a Complex Connected Battlespace - Google Search
Toward Approaches to Big Data Analysis for Terrorist Behavior Identification - Google Search
Post-Extreme Event Damage Assessment and Response for Highway Bridges | The National Academies Press
Raul Caruso - Publications
20 tabs
Copy links to clipboard
Copy
Open
Search Results :
Pages - NATO Science & Technology Organization
STO-MP-SAS-OCS-ORA-2016
Pages - Technical Activities of the STO
Pages - Technical Activities of the STO
STO-MP-SAS-115
STO-MP-MSG-133
STO-MP-SAS-105
STO-MP-MSG-143
STO-MP-SAS-OCS-ORA-2015
IST-SAS-139 Visual Analytics for Exploring, Analysing and Understanding Vast, Complex and Dynamic Data
STO-MP-IST-148
STO-MP-SCI-278(S)
STO-MP-SCI-267
STO-MP-SET-228
STO-MP-HFM-249
STO-MP-IST-SAS-139
Search Results :
Resources and Knowledge Management
Leidos | Information Operations Assessment Planner - LACKLAND AIR FORCE BASE, TX - Leidos
45 tabs
Copy links to clipboard
Copy
Open
How Info Ops Could Be Used To Improve Military Engagement With Mexico
January News: Profiles of Individual Radicalization in the United States; Terrorist assassinations
Effectiveness in Active Adaptation Planning for the Contemporary Operational Environment: from Influence to Change | Fodé Beaudet - Academia.edu
U.S. Army | Infantry Magazine
COLSA Corporation
COLSA Corporation
COLSA Corporation
Engelsk forside - test
RIMFAX - ground penetrating radar
US Psychological Warfare in Ukraine: Targeting Online Independent Media Coverage | Global Research
How to reset iCloud Music Library for Apple Music and iTunes Match | iMore
Home
Our People
How to Delete Music from Your iPhone But Not From iTunes or iCloud Music Library | iPhoneLife.com
King's College London - Department of War Studies
Hand-powered ultralow-cost paper centrifuge : Nature Biomedical Engineering
Two-Step Amyloid Aggregation: Sequential Lag Phase Intermediates : Scientific Reports
Drug Response Prediction as a Link Prediction Problem : Scientific Reports
The Trump Team’s Holy War and the Remaking of the World Order - The New Yorker
Sayres
ICONS Gray Zone work gets international attention | START.umd.edu
Terrorist assassinations by region, target | START.umd.edu
Using social media as a tool for mobilization and collective learning | START.umd.edu
Dr. Steve Tatham - Strategic Studies Institute
The Panel
STORAGE in the CLOUD - Box
danielmorgan.academy
SICOMORES – Masa Group
SCL Defence | Home
About iCloud Music Library icons and status - Apple Support
Information Operations Holistic Organizers – To Inform is to Influence
Insurgency/Counterinsurgency(COIN) Research Papers - Academia.edu
Non Kinetic Warfare Research Papers - Academia.edu
Behavioural Conflict: Why Understanding People and Their Motives Will Prove Decisive in Future Conflict: Amazon.co.uk: Steve Tatham, Andrew MacKay, Stanley McChrystal: 9781780394688: Books
Countering Terrorism | Brookings Institution
Terrorism
Information Operations for Influence (IOI) (SAS-117) - Google Search
NATO SAS-105 Symposium - Google Search
STO-MP-SAS-105 - Information Operations for Influence - Google Search
Why Understanding People and their Motivations Will Prove Decisive in Future Conflict - Google Search
this sond has been deleted from your icloud music library - Google Search
Prescription-based prediction | Kaggle
Red (Team) Analysis
Manu Prakash: A 50-cent microscope that folds like origami | TED Talk | TED.com
The Paperfuge: A 20-Cent Device That Could Transform Health Care | WIRED
25 tabs
Copy links to clipboard
Copy
Open
Optimize performance Photoshop CC
iBooks App: The Ultimate Guide | iMore
batch compress images mac - Google Search
ImageOptim — better Save for Web
Best Free Image Compressor for Mac : ImageOptim
How to Resize Images in Batches Using Preview in OS X
Squash for Mac - Compress Images For The Web Without Losing Quality
How-To: Quickly resize images on OS X using a Service with Automator | 9to5Mac
Search
How to tune Photoshop CS6 for peak performance
PHOTOSHOP - image cache level setting can make banding more visible in 16 bit/channel images | Photoshop Family Customer Community
Introduction to Camera Raw files for Photoshop CC
Promotions (98) - scitrenbaum@gmail.com - Gmail
What you Stashed this week (12/18) - stczztop@gmail.com - Gmail
scholar.google.com/scholar_url?url=http://cs.au.dk/~dang/www2017.pdf&hl=en&sa=X&scisig=AAGBfm3Z5vdabysS4rAQ3SswL-HCloNyqg&nossl=1&oi=scholaralrt
Polski: Extending the Institutional Analysis and... - Google Scholar
scholar.google.com/scholar_url?url=https://pdfs.semanticscholar.org/ba21/5e0e8a9f765f9b9e76825e36b44c9d615ece.pdf&hl=en&sa=X&scisig=AAGBfm1EuHz0cnPyLkbr09SWOED5S3npjw&nossl=1&oi=scholaralrt
Do we have to agree? Accommodating unity in diversity in post-terror Norway - Jan 06, 2017
Networking optical antenna of space laser communication: Journal of Laser Applications: Vol 29, No 1
remove epub from ibooks - Google Search
Five Useful Tips To Master iBooks On Your iPhone, iPad, or iPod touch [Feature] | Cult of Mac
How to crack Fairplay DRM from iBooks with iBook DRM removal software
Remove iBooks DRM, Read iBooks on PC
iBooks and DRM removal? : ebooks
Use iCloud Drive or iBooks to access your PDF files, ePub files, and books - Apple Support
32 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
I Know What You Downloaded on BitTorrent.... - TorrentFreak
Inside the KGB Playbook to Recruit Americans - The Daily Beast
The minimalist guide to Back to My Mac | Computerworld
Access a Mac’s Files and Screen Over the Internet with Back to My Mac
Profiles of Individual Radicalization in the United States (PIRUS) | START.umd.edu
Profiles of Individual Radicalization in the United States - PIRUS (Keshif) | START.umd.edu
Keshif: Data Made Explorable
Datasets
Shift
Deseat.me - Product Hunt
deseat.me
Women's Sneakers - Slip Ons - Rocket Dog
Processing Affect in Social Media
EconPapers: Can Structural Conditions Explain the Onset of Nonviolent Uprisings?
Computing Critical Nodes in Directed Graphs | 2017 Proceedings of the Ninteenth Workshop on Algorithm Engineering and Experiments (ALENEX) | Society for Industrial and Applied Mathematics
Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders - IEEE Xplore Document
January News: Profiles of Individual Radicalization in the United States; Terrorist assassinations
Homeland Security
Limiting Civilian Casualties as Part of a Winning Strategy: The Case of Courageous Restraint | Daedalus | MIT Press Journals
What Comes Next | Daedalus | MIT Press Journals
Neural networks for deceptive opinion spam detection: An empirical study
Radionuclide identification algorithm for organic scintillator-based radiation portal monitor
Inbox (904) - scitrenbaum@gmail.com - Gmail
Al-Awlaki: The Need to weaponize Ideas - Google Scholar
ISIL’s Virtual Planners: A Critical Terrorist Innovation
Bibliography - Homegrown Terrorism and Radicalisation - Google Search
How States Carry Out Acts of Terror: Wars, Strategies and Tactics in Bosnia and Herzegovina and Kosovo | Lleshi | ILIRIA International Review
Strategic Thinking in the Russian Arctic: When Threats Become Opportunities (2) - Red (Team) Analysis
12 Advanced Dropbox Features That You Should Start Using
Small System Dynamics Models for Big Issues - Google Search
13 tabs
Copy links to clipboard
Copy
Open
Eightydays.me - Product Hunt
Productivity - Product Hunt
Gomix - Product Hunt
HyperDev - Product Hunt
Multi-Step Zaps by Zapier - Product Hunt
Trigger Happy - Product Hunt
MessageBird IFTTT Channel - Product Hunt
If No Reply - Product Hunt
Findo - Product Hunt
WeTransfer.com - Product Hunt
Mac - Product Hunt
Get Shit Done - Product Hunt
NoCode - Product Hunt
01-06
Copy links to clipboard
Copy
Open
Adelphi 3 for 2 | IISS
Home - R&D Program - Kantara Initiative
The strategic logic of Islamic State information operations. - Google Search
The Human Domain and Influence Operations in the 21st Century - Google Search
DARPA - Open Catalog
Emergency and Disaster Management | Open Access Articles | Digital Commons Network™
The Learner's Guide to Geospatial Analysis (V1.1) | The Learner's Guide to Geospatial Analysis
Statewatch: Resources for researchers on civil liberties, justice and home affairs, access to documents and democratic standards in Europe
Google Advanced Search Query Syntax - Updated Version
Journal of Strategic Security | USF Libraries | University of South Florida
Journal of Strategic Security | Vol 9 | No. 4
For Russia, Syria Is a Proving Ground for High-Tech Weapons
School of Security and Global Studies | American Military University
Acquisition and Preparation of Data for OSINT Investigations - Springer
Intelligence Analysis of Tay Twitter Bot - MU Digital Repository
Directory of Open Access Journals
Improve Spotlight Searches with Search Operators in Mac OS X
Electrochemiluminescence DNA sensor array for multiplex detection of biowarfare agents
Electrochemiluminescence DNA sensor array for multiplex detection of biowarfare agents | SpringerLink
European Commission : CORDIS : Projects & Results Service : The lab-free CBRN detection device for the identification of biological pathogens on nucleic acid and immunological level as lab-on-a-chip system applying multisensor technologies
Beyond Active Response: An Operational Concept for Police Counterterrorism Response | John P. Sullivan - Academia.edu
Biometrics, forensics, and identity applications | CrossResolve
Geospatial Rapid Assessment | The Learner's Guide to Geospatial Analysis
The Structured Analytic Techniques "Toolbox" | The Learner's Guide to Geospatial Analysis
Spatiotemporal Exploration and Visual Analytics - VACCINE - Purdue University
Intelligence Analysis of Tay Twitter Bot - Google Search
Homeland Security Centers of Excellence - Google Search
Inbox (880) - scitrenbaum@gmail.com - Gmail
MUCHMIND -- FEATURED FINDINGS/CONCLUSIONS
International Journal of Nuclear Security - Every link must hold. | University of Tennessee, Knoxville
Nuclear | Open Access Articles | Digital Commons Network™
Nuclear Engineering | Open Access Articles | Digital Commons Network™
Training and Development | Open Access Articles | Digital Commons Network™
"Janus Realized: The Use of Social Media as a Means of Transparency Nuc" by Frances Bachstein
"Radicalization into Violent Extremism I: A Review of Social Science Th" by Randy Borum
"Radicalization and the Use of Social Media" by Robin L. Thompson
network.bepress.com/social-and-behavioral-sciences/public-affairs-public-policy-and-public-administration/defense-and-security-studies/
International Relations | Open Access Articles | Digital Commons Network™
Peace and Conflict Studies | Open Access Articles | Digital Commons Network™
DCommander - Advanced File Manager for Mac, with FTP, SCP and ZIP
Demonstrating PlanetSense
Large-scale geolocalization of overhead imagery
A Two-Level Game Theory Approach for Joint Relay Selection and Resource Allocation in Network Coding Assisted D2D Communications - IEEE Xplore Document
Communication Security of Unmanned Aerial Vehicles - IEEE Xplore Document
Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communications - IEEE Xplore Document
Characterizing network behavior features using a cyber-security ontology - IEEE Xplore Document
Predicting sentiment toward transportation in social media using visual and textual features - IEEE Xplore Document
Automatic Rich Map Semantics Identification through Smartphone-based Crowd-sensing - IEEE Xplore Document
Combating Full-Duplex Active Eavesdropper: A Hierarchical Game Perspective - IEEE Xplore Document
Detecting the Determinants and Trajectories of Homicide Among Ransom Kidnappings - Jan 03, 2017
Internet of Things Meets Mobile Health Systems in Smart Spaces: An Overview - Springer
EBSCOhost | 120438200 | SOCIAL MEDIA, CIVIC ENGAGEMENT, AND THE SLACKTIVISM HYPOTHESIS: LESSONS FROM MEXICO'S "EL BRONCO".
EBSCOhost | 120438210 | HONING CYBER ATTRIBUTION: A FRAMEWORK FOR ASSESSING FOREIGN STATE COMPLICITY.
Air Force awards targeting algorithm contract
(13258) Inoreader - Channels
Games | An Open Access Game Theory Journal from MDPI
Open Source Intelligence Investigation - From Strategy to | Babak Akhgar | Springer
Donald Trump Plans Revamp of Top U.S. Spy Agency - WSJ
Untitled 1 - scitrenbaum@gmail.com - Gmail
Fusion of OSINT and Non-OSINT Data - Google Search
Tools for OSINT-Based Investigations - Google Search
Effectiveness in Active Adaptation Planning for the Contemporary Operational Environment - Google Search
2017 17-S-4710 FY 2018 Broad Agency Announcement - Google Search
Combating Terrorism Technical Support Office 17-S-4710 - Google Search
US Defense Dept. analyzing Bitcoin as potential terrorism threat — RT America
Biz Opps
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiIzoLc5q_RAhVCyFQKHaDdB_kQFggaMAA&url=http%3A%2F%2Facc.army.mil%2Fcontractingcenters%2Facc-wrn%2FOppt%2FAPBI2AO28July.pdf&usg=AFQjCNG9dobF1vgUVLmlYEwyAIrhYqGcfg&sig2=td9nUVuWiBJjztlZr39NCg&bvm=bv.142059868,d.cGc
Events
FBO Search - FY17 Team Redstone Center of Excellence Advance Planning Briefings to Industry (CE-APBI) - AMCOM
CTTSO APBI
Department of Homeland Security SBIR | Contract Research and Development
ONR Electronic Warfare Technology BAA | Contract Research and Development
DARPA Causal Exploration of Complex Operational Environments Proposer’s Day | Contract Research and Development
ONR Complex Event Recognition from Open Source Social Media Award | Contract Research and Development
IARPA DNAtoFace RFI | Contract Research and Development
It’s a Bird! It’s a Plane! No, It’s a Near-Earth Object! – Homeland Security Digital Library
MORS wargaming news | PAXsims
MWI's 2016 War Studies Conference - Modern War Institute
Demonstrating PlanetSense: gathering geo-spatial intelligence from crowd-sourced and social-media data - Google Search
Index of /
Vulnerability Assessment Method Pocket Guide - Google Search
⭐Science & Technology Directorate
iCloud
Center for Complex Operations > Publications
simulation and gaming news | PAXsims | Page 2
What’s Wrong With SOCOM? | Small Wars Journal
Baltic Challenge matrix game | PAXsims
The Broker - Connecting worlds of knowledge
Political • Military • Economic • Social • Information • Infrastructure
OneTab shared tabs
Transportation & Parking Services | PCC
OneTab shared tabs
OneTab shared tabs
GORDON
Copy links to clipboard
Copy
Open
Pinboard: bookmarks for scitrenb tagged 'scienceeducation'
Pinboard: bookmarks for scitrenb tagged 'sciencetools'
SCIENCE HOBBYIST: Top Page
Portland Resources for Dorks | DorkbotPDX
Oregon Swaps and Stores
Geiger Counter - Radiation Sensor Board for Arduino and Raspberry Pi
Home | DorkbotPDX
Page 1 - Useful Resources Site Links - Electronics Tutorials & Circuits - Discover Engineering Hobby Projects
EEVblog Electronics Resource Wiki
OneTab shared tabs
Pinboard: bookmarks for scitrenb tagged 'electronics'
Hackaday | Fresh hacks every day
Open source electronic projects
Electronics Projects and Circuits - Electronics-Lab
Phidgets Inc. - Unique and Easy to Use USB Interfaces
LucidScience - SHOWALL Electronics Projects, Plans, Schematics and Source Code.
Site Map of Hobby Projects - Electronics Circuits & Tutorials Resource
Arduino Projects - The Big List of 100+ Arduino Projects
Oscilloscope Tutorial - Learn Everything about Oscilloscope - Electronic Circuits and Tutorials Resource
Pinboard: bookmarks for scitrenb tagged 'gordon'
Test video - YouTube
Optical Tables, Used Lab Equipment, Scientific Equipment
Links - Hacked Gadgets – DIY Tech Blog
Pinboard: bookmarks for scitrenb tagged 'equipment'
Pinboard: bookmarks for scitrenb tagged 'surplus'
Pinboard: bookmarks for scitrenb tagged 'mostusefulsiteever'
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Conflict Analysis
Copy links to clipboard
Copy
Open
List of Frameworks for Conflict Analysis / Articles - The Broker
Conflict Analysis - Peace Portal
INEE Toolkit - Welcome
DME for Peace | Design, Monitoring and Evaluation for Peacebuilding
Evaluating Peacebuilding Activities in Settings of Conflict and Fragility | DME for Peace
Conflict Sensitivity
Conflict Analysis Tools – Conflict Sensitivity
Everyday Political Analysis
Multi-stakeholder processes - Peace Portal
Resources | UNSSC | United Nations System Staff College
Publications | Overseas Development Institute (ODI)
EU PROJECTS
Copy links to clipboard
Copy
Open
European Commission : CORDIS : Search : Results page
European Commission : CORDIS : Projects & Results Service : "Detection Technologies, Terrorism, Ethics and Human Rights"
European Commission : CORDIS : Projects & Results Service : SEC-2012.1.3.2- Homemade explosives (HMEs) and recipes characterisation- Capability
European Commission : CORDIS : Projects & Results Service : Results page
European Commission : CORDIS : Projects & Results Service : Bridging human rights and the fight against terrorism
European Commission : CORDIS : Projects & Results Service : Final Report Summary - DETECTER (Detection Technologies, Terrorism, Ethics and Human Rights)
Datasets | European Union Open Data Portal
Home | HOMER Project
DETECTER Home
www.detecter.bham.ac.uk/documents.shtml
FORTRESS- Foresight tools for responding to cascading effects
Swedish Defence Research Agency - Totalförsvarets forskningsinstitut
OpenAIRE - Project: Detection Technologies, Terror...
OpenAIRE - Publication: Unilateral Exceptions to Inter...
10 tabs
Copy links to clipboard
Copy
Open
Automate your Google Drive
Customer Login | InMotion Hosting
How to log into the most popular programs - InMotion Hosting
Customer Login | InMotion Hosting
Vulnerability Assessment Method Pocket Guide: A Tool for Center of Gravity Analysis | RAND
iBeam | The News Online site
Free Backup & Sync Software for Windows - SyncBackFree
Dropbox Google Drive - Sync and Integrate - cloudHQ
Backup, Copy, and Migrate Files Between Cloud Storage Services • Mover
Sync Google drive ,Dropbox ,Box, SugarSync and FTP
Science Hobbyest
Copy links to clipboard
Copy
Open
SCIENCE HOBBYIST: site map
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
SCIENCE HOBBYIST: Top Page
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
William J. Beaty
Electronic Dimensions, the best in military and industrial electronic surplus
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
ELECTRONICS HOBBYIST
SCIENCE HOBBYIST: My better stuff
SCIENCE HOBBYIST: Ideas, additions
Bill Beaty (@wbeaty) | Twitter
Surplus Shed
SCIENCE HOBBYIST FAQ
High voltage electrostatic power supply: negative ion generator as HV source
Laser Pointer Forums - Discuss Laser Pointers
Sam's Laser FAQ - Laser Instruments and Applications
01-03
Copy links to clipboard
Copy
Open
Peace and Conflict Impact Assessment Methodology Tip Sheet | DME for Peace
Robert Bunker | Small Wars Journal
Swedepeace – Options for Action
Phalanx
All of the fucks given in 2016 – Medium
SimuDocSandbox < Sandbox < TWiki
Center for Strategic and International Studies |
INCIDER encounter model i - Google Search
ISIS PMESII - Google Search
Search for Common Ground | Understanding Differences; Acting on Commonalities
ResearchGate
Caerus Associates
Maker Education Initiative – Every Child a Maker
PD Dr. Johannes Siebert
International - Analysis - U.S. Energy Information Administration (EIA)
IAI Istituto Affari Internazionali
Project AIR FORCE | RAND
Global Cultural Knowledge Network - Wiki - Global Cultural Knowledge Network - Wiki - Global Cultural Knowledge Network - APAN Community
Detlof von Winterfeldt // USC Price
Detlof von Winterfeldt - Google Scholar Citations
ScholarSpace at University of Hawaii at Manoa: Hawaii International Conference on System Sciences (HICSS) 2017
CIAO
Detlof von Winterfeldt - Google Search
Global Cultural Knowledge Network - Google Search
Johannes Siebert - Google Search
Modeling the Impact of Combat and Influence Actions on Population Attitudes toward Forces - Google Search
ROLF 2010 project - Google Search
STO-MP-IST-999 - Google Search
UCASS TECHNICAL REPORT 2015 - Google Search
Funding Opportunities - University Programs
Israel Defense Forces - Wikipedia
ISPI | Istituto per gli studi di politica internazionale
Understanding Russia today: Russia's many revisions - AEI
Open Windows, Closed Doors: Mutual Recognition Arrangements on Professional Services in the ASEAN Region | Asian Development Bank
After Mosul: Australia’s strategy to counter the Islamic State - Australian Strategic Policy Institute
Detect, disrupt and deny: Optimising Australia’s counterterrorism financing system - Australian Strategic Policy Institute
Digital land power: the Australian Army’s cyber future - Australian Strategic Policy Institute
CIDOB - The reconfiguration of the Global South: Africa, Latin America and the “Asian century”
CIDOB - War & Health. Defining the Protection of Health in War Zones
CIDOB - What does Radicalisation Look Like? Four Visualisations of Socialisation into Violent Extremism
After Aleppo: Iran’s Ascendancy and Its Implications | Begin-Sadat Center for Strategic Studies
Can Trump Construct a New World Order? | Begin-Sadat Center for Strategic Studies
UNSCR 2334: A Disservice to the Cause of Peace | Begin-Sadat Center for Strategic Studies
The 2016 Iranian Parliamentary Elections and the Future of Domestic Politics under the JCPOA - Harvard - Belfer Center for Science and International Affairs
Aid effectiveness in fragile states: How bad is it and how can it improve? | Brookings Institution
The current and future state of the sharing economy | Brookings Institution
Delivering on sustainable infrastructure for better development and better climate | Brookings Institution
New Briefer: Why the U.S. National Security Community Takes Climate Risks Seriously « The Center for Climate & Security
U.S. Arms Transfers to Saudi Arabia and the War in Yemen | Research | Center for International Policy
Donald Trump’s Middle East Policy and the Kurds - ORSAM
www.centerforsecuritypolicy.org/2017/01/03/what-could-possibly-go-wrong/
What the Assassination of the Russian Ambassador May Be Telling Us about Erdoğan’s Turkey - Foreign Policy Research Institute
Looking Back a Quarter Century after the USSR’s Collapse - Foreign Policy Research Institute
Foreign Policy Research Institute - International Policy Think Tank
EPC - European Policy Centre - Independent think tank
Remarks on Middle East Peace
This is One of Our Top Strategies for Fighting Terrorism
DoD IG - Reports and Publications - Assessment of U.S. and Coalition Efforts to Train, Advise, Assist, and Equip the Kurdish Security Forces in Iraq
DIIS | Danish Institute for International Studies
Hudson Institute
National Security and Defense
Govt. White Papers -china.org.cn
GIGA | German Institute of Global and Area Studies
Publications | Deutsche Gesellschaft für Auswärtige Politik e.V.
DCAF - Publications
The Kashmir Uprising and India-Pakistan Relations: A need for conflict resolution, not management | IFRI - Institut français des relations internationales
IFRI - Institut français des relations internationales | Institut de recherche et de débat indépendant, consacré à l’analyse des questions internationales et de gouvernance mondiale.
Publications | ICCT
“How to Slaughter the Disbelievers”: Insights into IS’ Instructional Video | ICCT
NK Instability Project | 38 North: Informed Analysis of North Korea
Ready or Not? - Trust for America's Health
Search results | Transnational Institute
Arms production | SIPRI
Strategy - Defense One
The Once and Future Insurgency: How ISIS Will Survive the Loss of Its 'State' - Defense One
U.S. Naval War College | War Gaming
Confronting Conflict In The ‘Gray Zone’ « Breaking Defense - Defense industry news, analysis and commentary
Information Security | Open Access Articles | Digital Commons Network™
Military Cyber Affairs (MCA) | Vol 2 | Iss 1
Home | U.S.-Korea Institute at SAIS
US Army War College
Weaponized Narrative Is the New Battlespace - Defense One
A new plan to track terrorists between COCOMs; DoD, CIA ‘bicker’ while Syrian proxies die; Attack in Tel Aviv; Boeing to test tanker fix; and a bit more. - Defense One
Meet the Navy SEAL Leading the Fight Against ISIS Messaging - Defense One
Hacking Into Future Nuclear Weapons: The US Military’s Next Worry - Defense One
Canadian Military Journal Vol. 17, No. 1
Three Hospitals Attacked in Rebel Side of Aleppo, Syria - The New York Times
www.rsis.edu.sg
The Stanley Foundation
Demystifying Gray Zone Conflict: A Typology of Conflict Dyads and Instruments of Power in Colombia, 2002-present | START.umd.edu
Outplayed: Regaining Strategic Initiative in the Gray Zone, <em>A Report Sponsored by the Army Capabilities Integration Center in Coordination with Joint Staff J-39/Strategic Multi-Layer Assessment Branch</em>
Pentagon Shifts Command Structure for Terror Fight - WSJ
NATO Cooperative Cyber Defence Centre of Excellence
| RUSI
Kaspersky Security Bulletin 2016. The ransomware revolution - Securelist
Campaign Plan for Countering Trans-Regional Terrorist Organization - Google Search
Pentagon Shifts Command Structure for Terror Fight - Google Search
Publications - GOV.UK
New America
National Institute of Standards and Technology | NIST
The Atlantic
Transnational Institute | ideas into movement
Explore Publications | Wilson Center
France says special forces in Syria advising rebels
Saved Session - Session Buddy
Laura R. Marusich - Google Scholar Citations
Frontiers | Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness | Cognitive Science
Access denied | MEMRI - The Middle East Media Research Institute
Sean M. Fitzhugh - Google Scholar Citations
Google Scholar Citations
Candescent Health
Homeland Security’s VACCINE Center pdf - Google Search
Cooperative Agreement No. 2009-ST-061-CI0001 - Google Search
HICSS – HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES
⭐Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency
⭐Visualization and Analytics Centers
CiteSeerX — Analogy, Intelligent IR, and Knowledge Integration for Intelligence Analysis: Situation Tracking and the Whodunit problem
Behavioral Profiling and the Biometrics of Intent - Harvard International ReviewHarvard International Review
Adapting strategies to dynamic environments in controllable stackelberg security games - IEEE Xplore Document
Perceptual Stability Analysis of a Graph Model System - IEEE Xplore Document
Hierarchical DSmP transformation for decision-making under uncertainty - IEEE Xplore Document
[COMM]gregater: A toolset for temporal communication patterns and dynamic network structure - IEEE Xplore Document
Do Good Fences Make Good Neighbors? Border Barriers and the Transnational Flow of Terrorist Violence | International Studies Quarterly
Research Outline for China’s Cultural Soft Power - Springer
Connecting Aged Parents with Their Adult Children Over Long Distances: Challenges and a Solution - Springer
Designing a Smart Scarf to Influence Group Members’ Emotions in Ambience: Design Process and User Experience - Springer
Chapter 11 | Russia > National Defense University Press > Charting a Course: Strategic Choices for a New Administration
Vapor Growth and Tunable Lasing of Band Gap Engineered Cesium Lead Halide Perovskite Micro/Nanorods with Triangular Cross Section - ACS Nano (ACS Publications)
Can Civil Society Tame Violent Extremism in Pakistan? - ProQuest
Aid as a Tool against Insurgency: Evidence from Contested and Controlled Territory in Afghanistan - ProQuest
Cell Press: Cell Press
The Stroz Friedberg Cyber Brief — Center on National Security
Informatics | Free Full-Text | Designing a Situational Awareness Information Display: Adopting an Affordance-Based Framework to Amplify User Experience in Environmental Interaction Design | HTML
Publications - VACCINE - Purdue University
Research Overview - VACCINE - Purdue University
DIUx: Capturing Technological Innovation | RAND
Research — Renard Sexton
Rocket Dog Women's Shoes - Trends - Rocket Dog
Counterplanning: A strategy-based model of adversary planning in real-world situations
Handbook on Securing Cyber-Physical Critical Infrastructure - ScienceDirect
A Utility-based Link Prediction Method in Social Networks
GeoHumanities, GIScience and Smart City Lifeworld approaches to geography and the new human condition
The true accessibility of mountaineering: The case of the High Himalaya
The Role of Aesthetics and Perception in Raising Situation Awareness: Lessons from SpringRain: International Journal of Human–Computer Interaction: Vol 32, No 4
The Washington Institute for Near East Policy - The Washington Institute for Near East Policy
25th Annual Computational Neuroscience Meeting: CNS-2016 | BMC Neuroscience | Full Text
Group Decision and Negotiation 2014 GDN 2014: Proceedings of the Joint ... - Google Books
Cases on Research and Knowledge Discovery: Homeland Security Centers of ... - Google Books
Replication Data for: Aid as a Tool against Insurgency: Evidence from Contested and Controlled Territory in Afghanistan - Harvard Dataverse
The “X” Is for Experimental – Medium
Jesus Garcia Herrero - Google Scholar Citations
Zhigang Zhu - Google Scholar Citations
Earl J. Wagner - Google Scholar Citations
Lauro Snidaro - Google Scholar Citations
Alex Aved - Google Scholar Citations
Kenneth D. Forbus - Google Scholar Citations
Erik Blasch - Google Scholar Citations
Zhenyu Cheryl Qian - Google Scholar Citations
Bingwei Liu - Google Scholar Citations
Yu Chen - Google Scholar Citations
Eloi Bosse - Google Scholar Citations
Haibin Ling (凌海滨) - Google Scholar Citations
Larry Birnbaum - Google Scholar Citations
Zhang: Real-time identification and monitoring of... - Google Scholar
Garcia: A Proposed Methodology for Predicting Opponent... - Google Scholar
Thoms: Situation awareness-a commander's view - Google Scholar
Centers of Excellence | Homeland Security
A Proposed Methodology for Predicting Opponent Behaviour in Conflict Analysis - Google Search
Command, Control, and Interoperability Center for Advanced Data Analysis - Google Search
Manual for Conflict Analysis - Google Search
Predictive Interactive Visual Analytics for CCI: Planning, Response, and Resiliency - Google Search
01-02
Copy links to clipboard
Copy
Open
Twenty-First Century Information Warfare and the Third Offset Strategy > National Defense University Press > News
Biographies of keynote speakers, panelists and conference committee members
Modeling and Simulation, Wargames, Wargaming, Military Simulations and Exercises
DSpace@MIT: Defeat in victory : organizational learning dysfunction in counterinsurgency
Thoughts on the DoD wargaming workshop at the Army War College | PAXsims
JDMS | PAXsims
PSOM | PAXsims
US Army War College | PAXsims
Revitalizing Wargaming is Necessary to Be Prepared for Future Wars
Decision Support for Complex Systems-of-Systems - Google Search
Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8 - Google Search
Modeling and Simulation, Wargames, Wargaming, Military Simulations and Exercises - Google Search
Thoughts on the DoD wargaming workshop at the Army War College - Google Search
Nicolas Sabouret
The Use of Information Operations (IO) in Immersive Virtual Environments (IVE)
Applying the Domains of Conflict to Information Operations
Information Operations Team Training & Information Operations Training Aid, Information Warfare Effectiveness (IWE) Program, Delivery Order 8
Influencing Friends and Allies: Information Operations Doctrine and the Role of the Combatant Commander
Modeling Information Operations in a Tactical-level Stabilization Environment
The Peace Support Operations Model: Modeling Techniques Present and Future
Understanding Strategic Information Manoeuvres in Network Media to Advance Cyber Operations: A Case Study Analysing pro-Russian Separatists’ Cyber Information Operations in Crimean Water Crisis
Joseph V. Benson - ResearchGate
R.J. Staker - ResearchGate
François Prenot-Guinard - ResearchGate
Unilateral Exceptions to International Law: Systematic Legal Analysis and Critique of Doctrines that Seek to Deny or Reduce the Applicability of Human Rights Norms in the Fight against Terrorism
Multimedia Knowledge and Social Media Analytics Laboratory
PLOS Currents Disasters
Europe PMC
Publications | Santa Fe Institute
MEMRI - The Middle East Media Research Institute |
greta's gouge: Friday's Miscellany 12-30-2016
BizMo Diaries: Wanderers 2017.12.27
Reporting Behind Enemy Lines in Mosul | Foreign Policy
Problems and Prospects of Defense COIN Wargaming | Small Wars Journal
Refining the MDMP for Operational Adaptability | Small Wars Journal
Wargaming Courses of Action During Other-Than-Major Combat Operations | Small Wars Journal
Monthly Newsletter
Resources | Unconstrained Analytics
Search Results
Homepage - CSS – Center for Security Studies | ETH Zurich
Datasets – Center for Security Studies | ETH Zurich
Digital Library – Center for Security Studies | ETH Zurich
The Ten Most Popular DARPA Stories of 2016
Defense Technical Information Center
Preventive Policing, Surveillance, and European Counter-Terrorism: Criminal Justice Ethics: Vol 30, No 1
Weekly Updates
Welcome to searx — searx 0.10.0 documentation
Pocket Explore
Terrorism: Commentary on Security Documents - Oxford University Press
Home - InformNapalm.org (English)
Drafts TapCellar – nahumck.me
Brousmiche: Modeling the Impact of Combat and Influence... - Google Scholar
(17) Effectiveness in Active Adaptation Planning for the Contemporary Operational Environment: from Influence to Change | Fodé Beaudet - Academia.edu
(17) Strategy (Military Science) Research Papers - Academia.edu
NATO Guest Lecture Part 3: We asked Juliette: How do information operations / public affairs offices figure into NATO’s operations? How does NATO manage its media relations? - University of Maryland, College Park | Coursera
NATO Science and Technology Organization Publications
SAS-105 Information Operations for Influence
SAS-117 Information Operations for Influence (IOI)
SAS-105 Symposium on "Information Operations for Influence “
STO-MP-SAS-105
Information Operations for Influence nato - Google Search
SAS-105 NATO - Google Search
STO-MP-SAS-105 - Information Operations for Influence - Google Search
STO Information Operations for Influence - Google Search
Symposium on "Information Operations for Influence - Google Search
: NATO STO System Analysis and Studies Panel ( - Google Search
NATO Psychological Operations (PSYOP) to Influence Emotions and Sway Public Opinion | Global Research - Centre for Research on Globalization
Modeling the impact of combat and influence actions on population attitudes towards forces: An agent-based approach
Deciphering Competition Between al-Qa`ida and the Islamic State | Combating Terrorism Center at West Point
the dimension of the information environment is composed of c2 systems - Google Search
Ccaps Conflict Dashboard - Google Search
DASW01-04-C-0003, Task AI-1-2810 - Google Search
Disinformation in Hybrid Warfare - Google Search
Tools
Copy links to clipboard
Copy
Open
Disk Sensei - Next Generation Trim Enabler | Cindori
Computer Crime Presentations and Training
⭐We offer you effective and free publishing and information sharing tools.
email checker: discover social networks from an email address |ManyContacts
Inoreader How-to: Save time with Rules | The Inoreader blog
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.