Light theme
Dark theme
Automatic (use operating system setting)
Shared: 271 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Social Media Lab
Copy links to clipboard
Copy
Open
Politically Polarized Online Groups and their Social Structures formed around the 2013-2014 crisis in Ukraine | Social Media Lab
Social Media Lab | "Making sense of a networked world"
Apps | Social Media Lab
Netlytic – Social Networks & Text Analyzer | Social Media Lab
PoliDashboard | Social Media Lab
Social Media Research Toolkit | Social Media Lab
“A Mathematical Approach to Identifying and Forecasting Shifts in the Mood of Social Media Users” | Social Media Lab
Social Media & Scholars | Social Media Lab
Political Polarization on Social Media | Social Media Lab
Text Mining and Social Network Visualizations | Social Media Lab
H4D
Copy links to clipboard
Copy
Open
Stanford H4D - Spring 2016 - Home
DOD/IC Problems - Stanford H4D - Spring 2016
Teaching Team - Stanford H4D - Spring 2016
Steve BlankEntrepreneurship and Innovation
Steve BlankLean LaunchPad
Steve BlankSlides/Videos
Day 0
Copy links to clipboard
Copy
Open
The Next Generation of Government CVE Strategies at Home
Building Resilience against Violent Extremism
Counter-Radicalization via the Internet
Integrating ISR Data with Open Source Indicators (AIAA)
Integrating ISR Data with Open Source Indicators (AIAA)
AIAA SPACE 2016 (AIAA)
Armed Forces Journal – Must-Reads
ESSA – accountability, indicators and analytics to drive informed decision making - SAS Voices
C2COE | Catalysing C2
Session 4: Future Key C4I Technologies | Center of Excellence in Command, Control, Communications, Computing and Intelligence | George Mason University
Moldova Update: Contested Elections Threaten to Destabilize Eastern Europe
Counting conflict | News & Analysis | Data Driven Journalism
Today's Best Deals: Tri-Ply Cookware, Discounted Watches, Nike Clearance, and More
Nano Sensors Enhancing Warfighters’ Situational Awareness | Defense Update:
Exploring the role of sequential computation in distributed systems: motivating a programming paradigm shift
Actor profiling in virtual execution environments
Alfresco One 5.1 | Alfresco Documentation
Alfresco Documentation | Alfresco Documentation
Alfresco Support Handbook | Alfresco Documentation
Electrospaces.net: NSA's TAO Division Codewords
Online social networks and offline protest | EPJ Data Science | Full Text
CIA’s CREST Leaves Cavity in Public Domain |
IEEE Xplore Document - Towards Automatic Persona Generation Using Social Media
IEEE Xplore Document - A testbed for integrated fault diagnosis and cyber security investigation
IEEE Xplore Document - A Mathematical Approach to Gauging Influence by Identifying Shifts in the Emotions of Social Media Users
Welcome | The Internet, Policy & Politics Conferences
Special Issue: Non-state Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
Do Jews and Arabs Differ in Their Fear of Terrorism and Crime?
PLOS ONE: Demographics, Management Strategies, and Problems in ST-Elevation Myocardial Infarction from the Standpoint of Emergency Medicine Specialists: A Survey-Based Study from Seven Geographical Regions of Turkey
Electromagnetic tunnel detection using a magnetic-dipole source in three-dimensional space : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Depth estimation of voids using backscattered surface waves : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Batch Resize Images in OS X With This Automator Script
Survey on using constraints in data mining | SpringerLink
SIP and SDP based content adaptation during real-time video streaming in Future Internets | SpringerLink
Mining tag-clouds to improve social media recommendation | SpringerLink
Multithreading cascade of SURF for facial expression recognition | SpringerLink
Information Systems for Crisis Response and Management in Mediterranean Countries - Springer
A Study on Security and Surveillance System Using Gait Recognition - Springer
Dynamic User Attribute Discovery on Social Media - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
An Architecture for processing of Heterogeneous Sources - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Missing and Spurious Interactions in Heterogeneous Military Networks - Springer
Overview of Text Visualization Techniques - Springer
Data Model - Springer
Visualizing Sentiments and Emotions - Springer
LIWC | Linguistic Inquiry and Word Count
Nightmare Machine
Is Evan Kohlmann Qualified to Be the Government’s Expert Witness for Terrorism Cases? -- New York Magazine
Event Prediction With Learning Algorithms—A Study of Events Surrounding the Egyptian Revolution of 2011 on the Basis of Micro Blog Data - Boecking - 2015 - Policy & Internet - Wiley Online Library
PopClip Extensions
Considerations for developing technologies for an integrated person-borne IED countermeasure architecture | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX | DSS10 | SPIE Proceedings | SPIE
STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII | DSS09 | SPIE Proceedings | SPIE
A review of sensor data fusion for explosives and weapons detection | Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XIV | DSS13 | SPIE Proceedings | SPIE
Improved colour matching technique for fused nighttime imagery with daytime colours | Electro-Optical and Infrared Systems: Technology and Applications XIII | ESD16 | SPIE Proceedings | SPIE
The Event Camera Dataset
Using publicly visible social media to build detailed forecasts of civil unrest | Security Informatics | Full Text
Military Analysts: Islamic State Would Not Survive Fall of Raqqa | Small Wars Journal
Bespredel and the Conduct of Russian “Hybrid Operations” | Small Wars Journal
Center of Excellence collaboration examines critical infrastructure | START.umd.edu
Indian Strategic Studies
Tampermonkey • Home
The Ukraine Crisis Timeline
War News Updates: Afghanistan War News Updates -- October 26, 2016
War News Updates: An Analysis On The Afghan War
Time for Washington to Amp up the Power to Coerce
WORDij Semantic Network Tools
Topics | 2016 ARL Open Campus Open House
Information Operations, Warfare, Info Ops, Infowar, Cyberwar
Mosul battle: Four ways IS is fighting back - BBC News
OHSU gets pieces of up to $90M of Defense Department trauma research - Portland Business Journal
CISE Publications Database | Center for Information & Systems Engineering
The Stroz Friedberg Cyber Brief — Center on National Security
James Clapper reflects on lessons learned over his six years as Director of National Intelligence and discusses critical intelligence concerns facing the next U.S. president. - Council on Foreign Relations
WORDij
Content analysis and text analysis resources: bibliographies, research, software, electronic texts
Control Alt Achieve: Google Save - Your new home for saved images and links
Crow vs Crow | Olivier Terrien
SET-048 Information-Centric Sensor Management
SCI-158 Systems, Concepts And Integration Methods And Technologies For Defence Against Terrorism
SET-158 Disposable Multi-Sensor Unattended Ground Sensors Systems for Detecting Personnel
SET-161 Leading Body for the C-IED LTCR
SET-174 EO-TDA Modeling
US military hopes to use artificial intelligence to create cybersoldiers and help fly its F-35 jets | Daily Mail Online
'Unprecedented' Challenge in Countering Adversarial Propaganda, Official Says > U.S. DEPARTMENT OF DEFENSE > Article
DoD Chemical-Biological Program has a Global Mission > U.S. DEPARTMENT OF DEFENSE > Article
Centcom Counters ISIL Propaganda > U.S. DEPARTMENT OF DEFENSE > Article
Defense One
Echoes of Future War: How the Fight for Mosul Will Change IED Science - Defense One
State of the Art - Demos
eCrow Newsletter
Electronic Warfare | Information Operations | Association of Old Crows Resource Guide
Apple iOS 10.1 Has A Nasty Surprise
Apple iOS 10.1 Has A Nasty Surprise
Globalytica
Al-Qaeda Still Threatens Europe: How the U.S. Can—and Should—Help
Databases, Gateways, Search Engines, Libraries, and Educational Insitutions
International Society for Photogrammetry and Remote Sensing
ISPRS Ornagebook: Working Groups
American vigilante hacker sends Russia a warning
Accurint® Virtual Crime Center - LexisNexis®
Islamic State continues to plot against the West, US military warns | The Long War Journal
Status Report on the Iraqi/Kurdish Mosul Offensive - Matthew Aid
WG 32 Special Operations and Irregular Warfare
Inside the CIA's (Sort of) Secret Document Stash | Mother Jones
White House: Small satellites bring “Moore’s Law” into space | Network World
What IARPA Knows About Your Canceled Dinner Reservation - Nextgov.com
The Nuclear Threat | NTI
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - The New York Times
The 282 People, Places and Things Donald Trump Has Insulted on Twitter: A Complete List - The New York Times
Microsoft Open Sources Cognitive Toolkit | News & Opinion | PCMag.com
Analytic Tools and Techniques | pherson.org
Network dismantling
Data Mining for Predictive Social Network Analysis
Predict Crime | Predictive Policing Software | PredPol
Predictive Policing For Crime Analysts | PredPol
Command & Control Apps
Driving to Safety: Autonomous Vehicle Questions, Answered | RAND
The Power to Coerce: Countering Adversaries Without Going to War | RAND
Inside the Artificial Intelligence Revolution: A Special Report, Pt. 2 - Rolling Stone
The Team Payam Banazadeh M.S
Steve Blank’s Presentations on SlideShare
Battle For Mosul Begins in Iraq Against Islamic State - SPIEGEL ONLINE
Computational Social Science: Understanding terrorist attacks on Twitter | START.umd.edu
Waging Cyber War the American Way: Survival: Vol 57, No 4
Journal of Policing, Intelligence and Counter Terrorism: Vol 11, No 2
Artifically intelligent ‘judge’ developed which can predict court verdicts with 79 per cent accuracy
Stephen Hawking says artificial intelligence could be humanity's greatest disaster
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
AT&T Is Spying on Americans for Profit - The Daily Beast
Institute for the Study of War
New report series--U.S. Grand Strategy: Destroying ISIS and al Qaeda | Institute for the Study of War
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online - VOX - Pol
Joint INFOCORE, MeCoDem, VOX-Pol Workshop on Social Media, Conflict and Democracy to be held in Brussels - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study - Part 1: The First 20 Minutes - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath - VOX - Pol
Grey’s Anatomy Recap: Good News, Bad News -- Vulture
Google Photos now shows albums in search results | 9to5Google
CoRR - Computing Research Repository
arXiv.org Search
Computers and Society authors/titles recent submissions
Social and Information Networks authors/titles recent submissions
Attack the System
Records Management User Guide | Alfresco Community
Virginia: Hamas-linked CAIR enraged that sheriff’s office hosting seminar on jihad threat | The Counter Jihad Report
Embed Google Photos in your Website
Alfresco Activiti
Air Force Doctrine
KETs Deployment Visualization Tool - European Commission
Pocket: My List
Pocket: Recommended
Pocket: Pocket Premium
GitHub - lockfale/OSINT-Framework: OSINT Framework
Pocket Premium FAQ - Pocket Support
Premium Subscriber FAQ - Pocket Support
Nigeria Expands Its ‘War on Terrorism’ to the Niger Delta - Jamestown
Darknet Numbers Pages Proof of Concept | Krypt3ia
The Jester Effect and #iAWACS | Lady Liberty 1885
Stress-testing iPhone 7 Plus’ Portrait Mode – Medium
Netlytic - social media text and social networks analyzer
Alfresco » Repository Browser
PDF Viewer for iOS & Android - Reading, Reviewing, Annotating - Made Easy.
The Complete Privacy & Security Podcast
AT&T Analytical Services for Government Agencies Model Statement of Work | Public Intelligence
DoD Science and Technology Strategic Communication/Social Media Programs | Public Intelligence
Browse the USGS Publications Warehouse
Iris AI drastically expedites research through the power of artificial intelligence | TechCrunch
Compare Lists
#iAWACS hashtag on Twitter
steve blank (@sgblank) | Twitter
FBI — Home
ToolDatabase < Dmi < digitalmethods.net
Amazon.com: WD 3TB Black My Passport Ultra Portable External Hard Drive - USB 3.0 - WDBBKD0030BBK-NESN: Computers & Accessories
Russia | Federal Academy for Security Policy
Association of Old Crows (AOC) | Electronic Warfare | Information Operations
IO Publications & Links | IO Academy | The IO Institute
ICWSM Tutorial: Predictive Modeling with Social Networks
Center for Strategic and International Studies |
“Putin Is Corrupt” and Other Uncertainties Related to U.S. Policy toward Russia | Center for Strategic and International Studies
The Civil Side of Counterterrorism | Center for Strategic and International Studies
The Kremlin Playbook | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe | Center for Strategic and International Studies
Anthony H. Cordesman | Center for Strategic and International Studies
Heather A. Conley | Center for Strategic and International Studies
Curated Conversations | Center for Strategic and International Studies
Counterterrorism and Homeland Security | Center for Strategic and International Studies
SAS-071 Analytical Tools for Irregular Warfare
Operation Manul | Electronic Frontier Foundation
Every CRS Report - EveryCRSReport.com
The First Day of a New Congress: A Guide to Proceedings on the Senate Floor - EveryCRSReport.com
Military Expenditure in the Baltic - Totalförsvarets forskningsinstitut
Top Articles and Videos about Mosul on Pocket
FDsys - Browse Compilation of Presidential Documents
HSDL Search Results
Check Out These Resources on Biodefense Before Seeing Tom Hanks’ “Inferno” – Homeland Security Digital Library
Whole Body Image Acquisition and Analysis | InnoCentive Challenge
Triggers and Thresholds of Non-International Armed Conflict | Just Security
LookingGlass Cyber Solutions
The Microsoft Cognitive Toolkit - Microsoft Research
Advanced Technologies Overview | The MITRE Corporation
Law Enforcement | The MITRE Corporation
Prevent Terrorism | The MITRE Corporation
Deception: The Quest for Detection | The MITRE Corporation
Human Odor: Sniffing Out Identity and Deception | The MITRE Corporation
Instant Collaboration: Using Social Networks in Emergency Response | The MITRE Corporation
Systems Engineering Strategies for Uncertainty and Complexity | The MITRE Corporation
Tools to Enable a Comprehensive Viewpoint | The MITRE Corporation
What can we 3D print? Everything! Here are 8 awesome examples | New Scientist
NUVI - Real-Time Social Intelligence
OCCRP
Bio - O'Reilly Media
Arie Croitoru - Publications
Automating social network analysis: A power tool for counter-terrorism
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology
RIMS - RIMS Annual Conference 2016 - Attendee - SESSION HANDOUTS
SD2 Proposers' Day
Schneier on Security: Blog Entries Tagged social engineering
Brain changes seen in youth football players without concussion -- ScienceDaily
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Data and trends for multilateral peace operations | SIPRI
Pages - Technical Activities of the STO
Search Results :
Search Results : Analytical Support to Tactical Development"
Search Results :
Search Results :
RTO-MP-HFM-201 - All Documents
Search Results : analytical support to operations"
Techdirt.
The Internet of Things Goes Rogue
Massive Internet Outage Could Be a Sign of Things to Come
How the Internet of Things Took Down the Internet
AT&T Is Selling Law Enforcement Access to Its Customers’ Data
Tenable Unveils Industry’s First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents - Press Release | Tenable Network Security
Revealed: US spy operation that manipulates social media | Technology | The Guardian
Middle East Leaders at UN on Extremism | Wilson Center
Zotero | People > Spencer L Willardson > Library > Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.