Light theme
Dark theme
Automatic (use operating system setting)
Shared: 2,515 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTab Tab Group
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Mac Tips
Copy links to clipboard
Copy
Open
How to add and print to a WiFi or network printer - How to - Macworld UK
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
Quick Look - OS X El Capitan: The Missing Manual [Book]
Must Have MacOS Quick Look Plugins | Sayz Lim
sindresorhus/quick-look-plugins: List of useful Quick Look plugins for developers
jaketmp/ePub-quicklook: ePub quicklook and spotlight plugins for Mac OS X.
bfabiszewski/QLMobi: Quick Look plugin for Kindle ebook formats
for Mac OS X | Favorite Book Reader
Quick Look - Wikipedia, the free encyclopedia
Quick Look Plugins Make File Browsing On OS X Even Better
How to View Epub, Kindle eBooks in OSX Quick Look | The Digital Reader
OS X Hidden Treasures: Services
OS X Hidden Treasures: Quick Look
Daring Fireball: Markdown Syntax Documentation
BetterZip 3 - Easy Zip and Unzip for Your Mac
09-22
Copy links to clipboard
Copy
Open
High-Priority Information Technology Needs for Law Enforcement | RAND
Law Enforcement | RAND
License Plate Readers for Law Enforcement: Opportunities and Obstacles | RAND
Browse RAND Reports by Series | RAND
First Responders | Homeland Security
FRG Publications | Homeland Security
Publications Library | Homeland Security
Counterterrorism Publications | Homeland Security
Communication Systems | RAND
Evaluation of National Institute of Justice–Funded Geospatial Software Tools: Technical and Utility Assessments to Improve Tool Development, Dissemination, and Usage | RAND
Corrections Technology and Practice Taxonomy | RAND
Social Media Research: Behavioral Sciences | Explore Taylor & Francis Online
System Dynamics Conference
EMM News Explorer
Social Media Research | Explore Taylor & Francis Online
LandsatLook Viewer
Conflict Tracking - Terrorism - Research Guides at Naval Postgraduate School (NPS), Dudley Knox Library (DKL)
AutomatingOSINT.com - Learn How to Automate OSINT Collection
Monthly Newsletter
MacStories Weekly: Issue 49
Yahoo’s Data Breach: What to Do If Your Account Was Hacked - Bloomberg
INSS Military and Strategic Affairs
Broadway Musicals: A Jewish Legacy | Full Episode | Great Performances | PBS
Exclusive: Probe of leaked U.S. NSA hacking tools examines operative's 'mistake' | Reuters
Advancing machine learning algorithms that could predict terrorist threats | START.umd.edu
Developing algorithms to thwart terrorism | START.umd.edu
OSINT Forum by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Gmail - MacStories Weekly: Issue 49
Emails From A CEO Who’s Making The Presentation Himself This Time – Slackjaw – Medium
Algorithms in plain English: time complexity and Big-O notation
FlashAlert Newswire
Security Experts Agree: The NSA Was Hacked
The Spies Who Loved iPhones
AngelsBwayTunes - YouTube
On the reception and detection of pseudo-profound bullshit
How to Change Yahoo Password
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
TRIPwire
So You Think You're Smarter Than A CIA Agent : Parallels : NPR
Andrew Sullivan: My Distraction Sickness — and Yours
Apple Music Customer Service Lauren Totally Nails It
Detecting emotions with wireless signals | MIT News
BrettTerpstra.com
Security Informatics | Home page
Jigsaw - Visual Analytics for Investigative Analysis
II Projects Page
II Publications Page
Information Visualization Links Page
Software Visualization Publications
John Stasko's Publications
Information Interfaces Group
VACCINE - Discovery Park
Information Technology Laboratory | NIST
Charlotte Exposes a Critical Flaw in the Rise of Body Cams | WIRED
jeff weyers - Google Search
FAQ
greta's gouge: Friday's Miscellany 09-16-2016
Sean Gourley: The mathematics of war | TED Talk | TED.com
Hany Farid
Us and them: identifying cyber hate on Twitter across multiple protected characteristics | EPJ Data Science | Full Text
The Science of Tannerite - Explosive Likely Used in Chelsea Bombing
Sense-making for intelligence analysis on social media data | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Social media for intelligence: practical examples of analysis for understanding | Next-Generation Analyst IV | SI16D | SPIE Proceedings | SPIE
Defense Innovation Marketplace
Analysis of the current situation in the global Jihad total war jihadica
Sensors | Free Full-Text | Small Moving Vehicle Detection in a Satellite Video of an Urban Area
WARNING : Russia Issues New “Rules of Engagement” in Syria: Any Aircraft Threatening the Syrian Army WILL BE SHOT DOWN (US/Turkey/Israel in the cross-hairs!)
The New York Times - Breaking News, World News & Multimedia
iBRABO | "BEFORE YOU SLAY THE GIANT YOU MUST FIND HIM"
portland science/biotech - craigslist
Jeff Weyers | re:publica
Next-Generation Social Media Intelligence Analysis - Google Scholar
Next-Generation Social Media Intelligence Analysis - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods - Google Search
SA.660.732- Insurgency and Counterinsurgency - Google Search
Small Moving Vehicle Detection in a Satellite Video of an Urban Area - Google Search
quizlet biology protists slides - Google Search
socmint - Google Search
socmint tools - Google Search
Like It or Not: A Survey of Twitter Sentiment Analysis Methods
Timeline: US Policy on ISIS | Wilson Center
Tentative Schedule
Journal of Strategic Security | USF Libraries | University of South Florida
How Police Trace Cellphones in IEDs Like the Ones in NYC | WIRED
QuickLook Plugins List
CCI Blog » Blog Archive » Searching the Dark Web
Disruptive Technologies Push Bioterrorism To A Whole New Level - The Medical Futurist
TII Online Research and Intelligence Newsletter - September 2016
EPIC - EPIC Online Guide to Practical Privacy Tools
BBB Scam Tracker
Investigative Dashboard
JSON To CSV Converter
C.J. Chivers (@cjchivers) | Twitter
Resources - Toddington
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Turkey is the export-hub for detonating cords; a crucial component for IEDs used by ISIS and Jabhat al Nusra affiliates – Doğu Eroğlu
Doğu Eroğlu
C. J. Chivers on Sulfur Mustard Attack (with tweets) · crofer · Storify
Current.ly
FindGram - Search Instagram Photos
GeoSocial Footprint
Wonder How To » Fresh Hacks For a Changing World
This Tool Lets You Check If Your Personal Info Is on the Dark Web | Motherboard
Why Homeland Security Unleashed an 'Alien Virus' on Silicon Valley | Motherboard
Finding a Nuclear Weapon: Hope Beyond the Screwdriver | The National Interest Blog
snitch.name :: The Social White Pages
News Article – Center for Security Studies | ETH Zurich
8 Search Tricks That Work on DuckDuckGo but Not on Google
How Spy Tech Firms Let Governments See Everything on a Smartphone - The New York Times
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations | RAND
Terrorism and Political Violence: Vol 28, No 4
Computer Crime Presentations and Training by Michael Bazzell
Watched - Post and Courier
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
OSINT Training by Michael Bazzell
Hany Farid - Google Scholar Citations
(2) bellingcat (@bellingcat) | Twitter
C.J. Chivers on Twitter: "just like crazy IED twitter, expect hyperventilating. mustard & ISIS are not new. and mustard is typically much less lethal than explosives."
(7) JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
How To Protect Your Data And Remove Personal Information From The Internet | Abine
SOCMINT, OSINT - Google Search
open source spying - Google Search
How One Journalist Uses Social Media to Get Inside the Minds of ISIS | WIRED
Russian Hackers Get Bolder in Anti-Doping Agency Attack | WIRED
How the FBI Could Have Hacked the San Bernardino Shooter’s iPhone | WIRED
The Quest to Build a Portable Anti-Neutrino Detector for Nukes | WIRED
Cifas: Data to Go - YouTube
Forecasting the Future: Can The Hive Mind Let Us Predict the Future?
Metaculus
Good Judgment® Open
CymaSpace | We make arts & cultural events more accessible & inclusive to the Deaf & Hard of Hearing through Technology, Education & Outreach.
Used Coffee Grounds Can Clean Contaminated Water | Popular Science
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
IJGI | December 2015 - Browse Articles
Black Hat USA 2016 | Arsenal
Spatial Science | Open Access Articles | Digital Commons Network™
Social Media | Open Access Articles | Digital Commons Network™
Browse by Research Unit, Center, or Department | Purdue e-Pubs | Purdue University Scholarship Online
Who’s Afraid of the Big, Bad Bioterrorist?
PLOS ONE: Spatiotemporal Detection of Unusual Human Population Behavior Using Mobile Phone Data
PLOS ONE: Measures of Human Mobility Using Mobile Phone Records Enhanced with GIS Data
Dynamic User Attribute Discovery on Social Media - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Statistics and Probability | Open Access Articles | Digital Commons Network™
Geography | Open Access Articles | Digital Commons Network™
Technical Program | 2016 IEEE Workshop on Statistical Signal Processing
EBSCOhost | 117599006 | Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism.
EBSCOhost | 117742343 | Deterring Emergent Technologies.
EBSCOhost | 117742345 | DARPA Emerging Technologies.
EBSCOhost | 117613471 | Prototyping an Automated Video Surveillance System Using FPGAs.
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism / CSJM v.24, n.2 (71), 2016 / Issues / CSJM / Publications / IMCS
IJGI | Special Issue : Big Data for Urban Informatics and Earth Observation
IJGI | Special Issue : Geoinformation for Disaster Risk Management
Evaluation of Urban Mobility Using Surveillance Cameras
Using Analytics and Social Media for Monitoring and Mitigation of Social Disasters
Advances in data-driven computational social sciences
Information Systems Architecture and Technology: Proceedings of 37th ... - Google Books
EPJ Data Science | Home page
Why WMD Terrorism Isn’t as Scary as it Seems – Politics in Theory and Practice
Fabio Pinelli - Google Scholar Citations
Dou Wenwen - Google Scholar Citations
Dobra: Spatiotemporal detection of unusual human... - Google Scholar
Dong: Inferring unusual crowd events from mobile... - Google Scholar
Leo: Call detail records to characterize usages and... - Google Scholar
Stein: Visual Soccer Analytics: Understanding the... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
A survey of data mining and social network analysis based anomaly detection techniques
Roick: Location based social networks–definition,... - Google Scholar
Chae: Spatiotemporal social media analytics for abnormal... - Google Scholar
Black Hat USA 2013 | Briefings
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Passive Visual Analytics of Social Media Data for Detection of Unusual Events - Google Search
Tools for Texts Monitoring and Analysis Aimed at the Field of Social Disasters, Catastrophes, and Terrorism. - Google Search
Copper Thermite Explodes and Smolders Successfully | Hackaday
Watch Full Episodes Online of NOVA on PBS | 15 Years of Terror
NOVA - Official Website | 15 Years of Terror
CEH.V6.-.Module - Google Search
09-24
Copy links to clipboard
Copy
Open
A look at the explosives used in the New York bombing | September 26, 2016 Issue - Vol. 94 Issue 38 | Chemical & Engineering News
Amphetamine boosts rats’ recovery from brain injuries | Chemical & Engineering News
How the NYPD Turned Itself Into a Little CIA
How Palantir Is Taking Over New York City
How To Get Slack Notifications on Gmail
Networks of New York » Melville House Books
Using Sound and Artificial Intelligence to Detect Human Rights Violations | iRevolutions
A Walking Tour of New York’s Massive Surveillance Network
How Hired Hackers Got “Complete Control” Of Palantir - BuzzFeed News
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Afghan War News
Afghan War News: Afghan Security News - Good and Bad
Afghan War News: RS Cdr's News Conference - Some Facts and Some Spin
OK, nvALT 2.2 take 2 - BrettTerpstra.com
Deals - Kinja Deals
Saturday's Best Deals: Dyson Fan Heater, Tevas, Bluetooth Headphones and More
Buying Guide: Affordable Accessories For Your Car
Airmail for iPhone Gets a Bunch of iOS 10 Integration Features
All the New Features in iOS 10 In Two Minutes
All the New Features in macOS Sierra
Build An Insanely Small, Fully Functional MAME Cabinet
Google Trips Personalizes and Automates Your Travel Plans From Start to Finish
Learn How to Win at Carnival Games With This Handy Guide
Polarr 3.0 Uses iOS 10's Facial Recognition for Robust, Automatic Photo Retouching
Speedify 4.0 Uses Wi-Fi and Mobile Data At the Same Time for Better Speed and Reliability
SwiftKey's New "Neural Network" Text Prediction Is Impressively Good
The Quickstart Guide to Decluttering Your Home
Top 10 Secret Features in iOS 10
Top 10 Ways to Improve Your Daily Commute
Resources and Links | Arthur D. Simons Center
How to Choose the Best Facial Moisturizer for Healthy Skin
The Coming of the Russian Jihad: Part I
Afghan War News
The Case for Integrated Civilian, Military ISR/C4ISR Stra | Defense News
Minnesota Mall Stabbing Could Be Realization of Terror Fears | Military.com
'Likes' Less Likely to Affect Self-Esteem of People with Purpose
Visual Hunt: 350+ Million Photos For Free Commercial Use | NOUPE
Using social network analysis to prevent money laundering
Cellphone Bombs: The New American Terror - The Daily Beast
How the New York City Bomber Was Caught - The Daily Beast
Indoor navigation tool for blind individuals now available as open-source app
Tribal Leaders Say IS Regrouping in Afghan-Pakistan Border Areas
S&T News | Homeland Security
Information & Analysis | EUROPEAN ASYLUM SUPPORT OFFICE
Analysis and Statistics | EUROPEAN ASYLUM SUPPORT OFFICE
Country reports | EUROPEAN ASYLUM SUPPORT OFFICE
EASO publishes a Country of Origin Information (COI) report on recruitment by armed groups in Afghanistan | EUROPEAN ASYLUM SUPPORT OFFICE
Types of operations | EUROPEAN ASYLUM SUPPORT OFFICE
National Preparedness Report | FEMA.gov
Losing in Afghanistan | Foreign Affairs
A Director of the Present? Nowcasting Homeland Security’s Challenges - HOMELAND SECURITY AFFAIRS
HOMELAND SECURITY AFFAIRS - The Journal of the NPS Center for Homeland Defense and Security
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
National Preparedness Directorate | FEMA.gov
Naval Postgraduate School
Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes | WIRED
FEMA & DHS
Copy links to clipboard
Copy
Open
Browse 6,645 Document files | FEMA.gov
OpenFEMA | FEMA.gov
Technology
List of Awards
Technology Research, Development, Testing, and Evaluation Process | National Institute of Justice
Preparedness, Response and Recovery Publications | Homeland Security
National Incident Management System | FEMA.gov
S&T Publications | Homeland Security
Inbox (231) - scitrenbaum@gmail.com - Gmail
Through-the-Wall Surveillance | National Institute of Justice
DHS Policy Regarding the Use of Cell-Site Simulator Technology | Homeland Security
List of Awards
arXiv.org Search
Featured Publication Archive | Homeland Security
Detection and Surveillance Technologies | National Institute of Justice
Detecting Items Hidden on a Person or Inside a Body | National Institute of Justice
Detecting Hidden Items and Substances in the Surrounding Environment | National Institute of Justice
Detecting Weapons, Contraband and Chemicals | National Institute of Justice
Enhanced Surveillance for Public and Officer Safety
Cell-site simulators - Google Search
Afghan War News: Afghan Security News - Good and Bad
If You Only Have Room For One Trashy Network Thriller In Your Autumn Viewing Schedule, Make It Secrets & Lies - Secrets & Lies - Previously.TV
Pentagon quietly studying Islamic theology to understand the Islamic State and al-Qaeda
Stephen E. Arnold: Palantir Attacks US Army, Geosparsing, DoD Buries In-Q-Tel, Digital Currencies Neither Anonymous nor Reliable « Public Intelligence Blog
Crowdsourced intelligence gathering can prevent such incidents as Chelsea bombing | Government Security News
Modeling Precursors for Event Forecasting via Nested Multi-Instance Learning
LiveSafe - Safety in everyone's hands and connecting people to help
[1609.07302] Building accurate HAV exploiting User Profiling and Sentiment Analysis
Sensors | An Open Access Journal from MDPI
Computer Vision and Pattern Recognition authors/titles recent submissions
arXiv.org Search
Physical Sensors - A section of Sensors
Sensors | Special Issue : Big Data and Cloud Computing for Sensor Networks
Data Feeds | FEMA.gov
2016 National Preparedness Report | FEMA.gov
OpenFEMA (31) | FEMA.gov
Resources & Documents Collections | FEMA.gov
Emergency Preparedness Materials (Families, Pets, Seniors, Disabled, Businesses) (35) | FEMA.gov
America's PrepareAthon! (11) | FEMA.gov
America’s PrepareAthon! Materials (36) | FEMA.gov
National Preparedness | FEMA.gov
Emergency Alerts | Ready.gov
Make A Plan | Ready.gov
National Preparedness Month | Ready.gov
Types of Technology and Tools | National Institute of Justice
Mapping and Analysis for Public Safety | National Institute of Justice
Office of Science and Technology Policy | The White House
CrimeStat: Spatial Statistics Program for the Analysis of Crime Incident Locations | National Institute of Justice
Course Materials for Intermediate Crime Mapping Using ArcGIS 10.1
List of Awards
Thesis and Dissertation Collection
Homeland Security Market Research
Copy links to clipboard
Copy
Open
Our People - Homeland Security Market Research
Global Homeland Security & Public Safety Market - 2015-2022 - Homeland Security Market Research
U.S. Airport Security Market - 2015-2020
Video Analytics & Intelligent Video Surveillance Technologies
Global Video Analytics
Global People Security Screening: Technologies, Industry & Market - 2015-2020 - Homeland Security Market Research
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
Homeland Security Market Research - Premium HLS & Public Safety Technology & Market Reports
Category - Homeland Security Market Research
Market Reports - Homeland Security Market Research
Category - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Americas Market-2015-2020 - Homeland Security Market Research
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
Middle East & Africa Airport Security Market - 2015-2020 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
Global Homeland Security & Public Safety Industry - 2016 Edition - Homeland Security Market Research
European Homeland Security & Public Safety Technologies & Markets - 2016-2022 - Homeland Security Market Research
U.S. Homeland Security & Public Safety Market - 2016-2022 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Europe, Middle East and Africa Market-2015-2020 - Homeland Security Market Research
Video Analytics, ISR & Intelligent Video Surveillance: Asia-Pacific Market-2015-2020 - Homeland Security Market Research
Saved Session - Session Buddy
09-26
Copy links to clipboard
Copy
Open
EarlyWarning
Knowledge Foundation - Technology Commercialization Alliance
Media Partners - Homeland Security Market Research
Knowledge Foundation - Technology Commercialization Alliance
Defence and Security | Clarion Events ltd
AnkerDirect @ Amazon.com
Kinja Deals Timbuk2 CMB
MacOS Sierra Breaks Popular Keygens, Pirate Finds Fix - TorrentFreak
Amazon.com: anker powercore - Portable Power Banks / Batteries & Battery Packs: Cell Phones & Accessories
Examining ISIS Support and Opposition Networks on Twitter | RAND
Policy Analysis: Terrorism - The Washington Institute for Near East Policy
Stein Program on Counterterrorism and Intelligence - The Washington Institute for Near East Policy
Literally Trump
Sondergaard: TACTICS - Google Scholar
Real-time crowd labeling for deployable activity recognition
Useful Websites - Radical Islam - LibGuides at FBI Library
greta's gouge: Friday's Miscellany 09-23-2016
Hyper Key hack in MacOS 10.12 Sierra using Karabiner-Elements and Keyboard Maestro - Album on Imgur
inessential: Memory Graph Debugger Tips
How to Stream Tonight's First Presidential Debate Online, No Cable Required
Featured Bag News, Videos, Reviews and Gossip - Lifehacker
The Notebook-Packed Shoulder Bag
I Think Nate Silver Is Broken, Maybe?
Not Up For Debate...
The Stroz Friedberg Cyber Brief — Center on National Security
Technology To Find Concealed Weapons, Coming To Your Street Corner.
Intelligent Automation, Inc.
The Rise of ISIL: Counterterrorism Lectures 2015 - Counterterrorism Lectures 2015 - The Washington Institute for Near East Policy
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Virtual Packs of Lone Wolves – Small World, Big Ideas – Medium
/dev/lawyer The MIT License, Line by Line
Usar Marked 2 para previsualizar AsciiDoc | adictosaltrabajo
Compendium of scenario-based attack profiles and compendium of full scenarios - Google Search
Deployable, near-real time field biometrics - Google Search
Predictive policing tools showing situational awareness - Google Search
STEIN COUNTERTERRORISM LECTURES - Google Search
Standoff Electromagnetic Concealed Weapons Detection - Google Search
Title: TACTICS: Policy and strategic impacts, implications and recommendations - Google Search
exploiting social media - Google Search
OJP Publications - National Criminal Justice Reference Service
Advanced Search - ProQuest Dissertations & Theses Global - ProQuest
License Plate Recognition - National Institute of Justice Search Results
American Military University | Online Degrees & Certificates | 877-755-2787 or info@apus.edu
Countering Drones - Day 2
CRCnetBASE
CRCnetBASE
CRCnetBASE
CRCnetBASE - Risk and Crisis Management in the Public Sector
CRCnetBASE - The Counterterrorism Handbook
CRCnetBASE - Effective Surveillance for Homeland Security
CRCnetBASE - Policing Major Events
CRCnetBASE - Soft Target Hardening
CRCnetBASE - Soft Target Hardening
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
National Center for Campus Public Safety Library | NCCPS
Real-Time Crime Forecasting Challenge
Video Analytics for Criminal Justice Uses | National Institute of Justice
Browse - Oxford Reference
Databases and Data Collection, Analysis, and Processing | RAND
The Science and Technology of Counterterrorism - ScienceDirect
Directory of Open Access Journals
National Law Enforcement and Corrections Technology Center TechBeat, September 2016
JTIC Corrections - Contraband Detection and Other Facility Operations and Population Services
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Public Intelligence
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk: Carl Young: 9780124200562: Amazon.com: Books
BJA Body-Worn Camera
A Futurist's Guide to Emergency Management - CRC Press Book
Encyclopedia of U.S. Intelligence - Two Volume Set (Print Version) - CRC Press Book
Grasping the Moment: Sensemaking in Response to Routine Incidents and Major Emergencies - CRC Press Book
New Developments in Biological and Chemical Terrorism Countermeasures - CRC Press Book
Soft Target Hardening: Protecting People from Attack - CRC Press Book
Soft Targets and Crisis Management: What Emergency Planners and Security Professionals Need to Know - CRC Press Book
The Complete Guide to Physical Security - CRC Press Book
Security Management from CRC Press - Page 1
Homeland Security from CRC Press - Page 1
Federal Register :: Home - Monday, September 26th
Managing Critical Incidents and Large-Scale Event Security - Google Search
The Science and Technology of Counterterrorism - Google Search
Mass Gatherings; Large-Scale Events Security Symposium – Homeland Security Digital Library
JTIC - Popular Publications
National Criminal Justice Reference Service
NCJRS Abstract - National Criminal Justice Reference Service
DMI TOOLS
Copy links to clipboard
Copy
Open
ToolDatabase < Dmi < digitalmethods.net
DMI single sign-on
Compare Lists
Geo Extraction
Harvester
Image Scraper
Itunes store
Link Ripper
Sentence Ripper
TOOLS
Copy links to clipboard
Copy
Open
Remove Numbers from the Beginning of Terms in a List
Free Online TEXT Tools
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Convertjson.com - Convert JSON to other Formats and Vice-Versa
Clarion Events ltd |
Mefancy Text and html tools
Extract URLs
Data Design Group, Inc.
Add / Remove Line Breaks
Text Alphabetical Order tool
Playlist Machinery
09-26 PM
Copy links to clipboard
Copy
Open
Chris Seibold - O'Reilly Media
How to Download Example Code - Customer Service - O'Reilly Media
Handbook of Terahertz Technologies: Devices and Applications [20 (download torrent) - TPB
Mobile Devices Tools and Technologies [2015] [PDF] (download torrent) - TPB
NoctDeath - TPB
Facebook Graph Search Generator by Henk van Ess and Torment Gerhardsen
Global Video Analytics
European Explosives & Weapons Detection Technologies Markets - 2016-2022 - Homeland Security Market Research
U.S. People Security Screening Technologies, Industry & Market - 2014-2020 - Homeland Security Market Research
X-ray Baggage, Cargo, People, Container & Vehicle Screening Systems: Global Market - 2016-2021 - Homeland Security Market Research
The Counterterrorism Handbook: Tactics, Procedures, and Techniques, Fourth Edition - CRC Press Book
CRCnetBASE - The Counterterrorism Handbook
Intelbriefs | The Soufan Group
Explosives & Narcotics Trace Detection (ETD): Technologies & Global Market - 2015-2020 - Homeland Security Market Research
Heavy metal music meets complexity and sustainability science | SpringerLink
Intelligent Behavior Modeling on Information Delivery of Time-Sensitive Targets - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Abnormal Event Detection Based on Crowd Density Distribution and Social Force Model - Springer
Pre-Incident Indicators
Most Wanted Terrorists — FBI
Every Acronym Project Name From DARPA's Demo Day. - Google Search
Social Media in Strategic Communication - Google Search
Hybrid Warfare Keywords - NATO LibGuides - Google Search
Science and Technology to Combat Terrorism - Google Search
How to Gather Intelligence on Targeted Attacks - Tricks and Tips - Google Search
Search – Findo
Home - Dropbox
Audacity®
Battery Health 2 for Mac - FIPLAB
About | Acqualia
krypted.com - Tiny Deathstars of Foulness
Apple Configurator 2 - krypted.com
List Of Mac OS X Error Codes - krypted.com
Mac Commands - krypted.com
Common Apple Ports - krypted.com
Glossary of Apple Terms - krypted.com
Posts Tagged “bookmarks” - BrettTerpstra.com
Pantsuit: The Hillary Clinton UI pattern library – Git out the vote – Medium
Stand-Off Detection of Suicide Bombers - Google Search
The tool that can sniff out a suicide bomber from 100 metres away | Daily Mail Online
Amazon.com: John G. Voeller: Books, Biography, Blog, Audiobooks, Kindle
Counterterrorism and Cybersecurity - Springer
Mobile Devices: Tools and Technologies - CRC Press Book
Missing Manuals
Data Mining Resources
DataMiningConsultant.com
DHS Apps | Homeland Security
Data.gov
National Preparedness Month | Ready.gov
Region X: AK, ID, OR, WA | FEMA.gov
State of Oregon: Oregon Office of Emergency Management
Emergency Management Division | Washington State Military Department
Cascadia Rising - Preparedness Toolkit
Signup for FEMA Email Updates
Site map | Homeland Security
The Great Oregon ShakeOut - Get Ready!
Oregon Office of Emergency Management Tsunami Information
State of Oregon: Oregon Office of Emergency Management
Oregon Office of Emergency Management Earthquakes
Benton County (OR) Amateur Radio Emergency Service
Oregon Office of Emergency Management Prepare, Protect, and Recover
Search Capabilities | www.ara.com
Clean Your Cluttered Hard Drive with macOS Sierra's New Storage Manager
This Page Lets You Disable a Lot of Google's Activity Tracking
People followed by Portland OR Alerts (@pdxalerts) | Twitter
Profiling the Islamic State | Brookings Institution
Wiki TOC scraper
Remove Extra Spaces tool
Add / Remove Line Breaks
Find Web Tools and Apps | Homeland Security
DHS S&T Center of Excellence Technology Fact Sheets - University Programs
Defense Threat Reduction Agency
After Action Report (AAR) Templates
People Screening Technologies & Global Markets - 2012-2016 - Homeland Security Market Research
Global Safe City: Industry, Technologies & Market - 2015-2020 - Homeland Security Market Research
Standoff IED, Person-Borne & Vehicle-Borne Explosives & Weapon Detection: Technologies & Global Market - 2015-2020 - Homeland Security Market Research
HSSAI | ANSER
Homeland Security Market Intelligence | World Leading Homeland Security & Public Safety Market Research
Homeland Security and Defense Center | RAND
Emergency Management Institute | Independent Study Program (IS)
Publications Library | Bureau of Alcohol, Tobacco, Firearms and Explosives
Science and Technology | Homeland Security
National Counterterrorism Center (NCTC)
National Institute of Standards and Technology | NIST
Ready.gov
USFA NFA Courses, Schedules and Instructors Course Search Results
Mobile App | FEMA.gov
U.S. Fire Administration resources for National Preparedness Month
FEMA on the App Store
Download fire data and data analysis tools
Emergency Response to Terrorism: Strategic and Tactical Considerations for Supervisors (F0549)
10-03
Copy links to clipboard
Copy
Open
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Arthur - Safely optimize some of your Mac's hidden settings
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
Browse All Guides - LibGuides at FBI Library
Home - Community Policing - LibGuides at FBI Library
Journal Articles - Intelligence Analysis - LibGuides at FBI Library
Home - Interviewing and Interrogation - LibGuides at FBI Library
Government Information - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
Home - LibGuides at FBI Library
A new version of Gitrob is out | michenriksen.com
Moral Machine
Proceedings of the Tenth International Conference on Web and Social Media
Jewish Calendar
CISN: EEW Project
America’s New Special Operations Commander Wants to Predict the Future - Defense One
Carry On Luggage and Bags - Up To 70% Off - eBags.com
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
Homeland Security Today: NYPD Developing Strategy to Counter Terrorist Drone Use
Conflict with ISIS
Snap It - Lose It!
Implementing graph grammars for intelligence analysis in OCaml
Motorcycle routes in Portland, United States on Mopedmap - Your bike routes online
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Home
Science.gov: USA.gov for Science - Government Science Portal
ShakeAlert | Earthquake Early Warning
2016 Conference
IARPA wants intel tools that can predict the future -- Defense Systems
DuckDuckGo
Two Person Bags | The Earthquake Bag
GitHub - gingerbeardman/Emojipedia at producthunt
Push/press/click: A smart button roundup
Connect OneDrive to hundreds of apps - IFTTT
Sync new files added to Dropbox to your Google Drive by lbrfabio - IFTTT
Predictive Heuristics | Blog by Ward Lab @ Duke U.
Blasch: Revisiting the JDL model for information... - Google Scholar
Gómez-Romero: Strategies and techniques for use... - Google Scholar
Taylor: A comparison of approaches to detect deception - Google Scholar
(1) The West Wing Weekly (@WestWingWeekly) | Twitter
ACAPS | Tools, know-how and training for assessments in crises
IST-132 Multi-Level Fusion of Hard and Soft Information
Fast Company | Business + Innovation
Architectures for contextual information exploitation - Google Search
Fundamentals of multiple-hypothesis tracking - Google Search
Hard & soft fusion – military application - Google Search
INVESTIGATIONS INVOLVING THE INTERNET AND COMPUTER NETWORKS - Google Search
Social Media Screening for Supporting Real-Time Decision Making - Google Search
ecent advances in multiple-hypothesis tracking - Google Search
ountering Nontraditional HUMINT Collection Threats. - Google Search
CheatSheet
Save for later by Sara Citrenbaum - Product Hunt
TagSpaces - Your Hackable File Organizer
Searching for evidence of Trump’s personal giving - Washington Post
40 maps that explain the world - The Washington Post
A Military-Grade Drone That Can Be Printed Anywhere | WIRED
Hacker Lexicon: What Is Password Hashing? | WIRED
Publications and Conferences
Bandit, criminal, robber, robbery, terrorist, thief, thug icon | Icon search engine
Afghan War News: Afghan Security News Update (20161002)
greta's gouge: Friday's Miscellany 09-30-2016
Jake Viens' Forensic Blog: Dropbox Forensics
The 6 Types Of Contractors You Encounter Overseas
CBNW
Digital Issues | CBNW
US Army unveils its 'Big 8' initiatives
How Do I Clear My Dropbox Cache? - The Unofficial Dropbox Wiki
Published Research | RAND
Tools | RAND
Brief Treatment for Substance Use Disorders: A Guide for Behavioral Health Providers | RAND
Costs of the Conflict Calculator | RAND
ENGAGED Toolkit: Improving the Role of Nongovernmental Organizations in Disaster Response and Recovery | RAND
Terrorism and Homeland Security | RAND
Terrorism Threat Assessment | RAND
How I lived like a badger and learned more about the world.
Statewatch: Resources for researchers on civil liberties, justice and home affairs, access to documents and democratic standards in Europe
Advanced Certificate in Terrorism Studies from the University of St Andrews - Informa plc
Department of Defense Laboratories: Innovation through Science and Engineering in Support of Military Operations | Armed Services Republicans
Home Page | DHS BAA
Funding Opportunities | DHS BAA
Funding Opportunities | DHS BAA
Enhanced Passive Surveillance System | Federal Crowdsourcing and Citizen Science Toolkit
Keyboard shortcuts and Multi-Touch gestures | DaisyDisk - Analyze disk usage and free up disk space on Mac
Locating space wasters | DaisyDisk - Analyze disk usage and free up disk space on Mac
Tips and tricks | DaisyDisk - Analyze disk usage and free up disk space on Mac
Bioresearch Labs and Inactivation of Dangerous Pathogens | Energy and Commerce Committee
Robotics & Autonomy | Global Security Initiative | ASU
CBNW 2016 Vol 1 by immags - issuu
(U//FOUO) DHS-FBI-NCTC Bulletin: Homegrown Violent Extremists Focusing More on Civilian Targets | Public Intelligence
Find and remove duplicate items in your iTunes library - Apple Support
About backups for iOS devices - Apple Support
Install Project - Office Support
Bitmoji
Bruker: Applications - Life Science and material research applications and solutions
Center for a New American Security
sigstore.dbx - Google Search
Story Wars
Providing text analysis APIs that understand human text - Twinword
Sentiment Analysis API - Twinword Inc.
Advanced Ctrl+F Search. Research Tool. Twinword Finder
Write with a Built-In Thesaurus - Twinword Writer
10-11 PM
Copy links to clipboard
Copy
Open
Multimodal-based Multimedia Analysis, Retrieval, and Services in Support of Social Media Applications
Contextual Enrichment of Remote-Sensed Events with Social Media Streams
FALSETTOSONBROADWAY.COM
Inspire Magazine | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
Repository maps
"Making It Personal: How the Islamic State Targets the Alienated" by Andi M. Shackleton
Civil and Environmental Engineering Undergraduate Honors Theses | Civil and Environmental Engineering | Portland State University
Dissertations and Theses | Dissertations and Theses | Portland State University
Casting homelessness in a different light: Can you solve it? « Silicon Florist
Office Humor, Tech Culture, Trending News
Your Procrastination Horoscope for This Month, or Whenever
Ultimate Email Cheat Sheet
trendwatching.com | AUTONOMANIA!
(1) Home - USMA Library Research Guides - Research Guides at U.S. Military Academy at West Point
Islamic State recruiters create complex network of Facebook accounts to entice Australian teens - ABC News (Australian Broadcasting Corporation)
Cult of Mac | Tech and culture through an Apple lens
New Western Digital My Passport drive puts terabytes in palm of your hand
DSpace | DSpace is a turnkey institutional repository application.
Police militarization in the United States: the state of the field: Policing: An International Journal of Police Strategies & Management: Vol 39, No 4
Automatically Find Payments, Receipts, Invoices from Emails
Resize and Optimize Online Images Before Downloading Them
Neuropsychopharmacology - Brain Stimulation in Addiction
Facebook Live: ‘A Day in the Life at Lincoln Center’ - The New York Times
ISIS Media Output Drops as Military Pressure Rises, Report Says - The New York Times
Calendar | OMSI
A Day in the Life at Lincoln Center Live-Streamed Today | Playbill
Pitfalls of Predictive Policing | RAND
Combatting the Islamic State's Digital Dominance: Revitalizing U.S. Communication Strategy: The Washington Quarterly: Vol 39, No 1
How Twitter Is Changing Modern Warfare - The Atlantic
Diseases
WeSeeHSE – Medium
Homeland Security – Medium
Research and Publications
The Pirate Bay - The galaxy's most resilient bittorrent site
The Pirate Bay - The galaxy's most resilient bittorrent site
Brad Thor Ebook Collection (epub format) (download torrent) - TPB
Skyeater - TPB
Suits : Spooks – Innovative Problem-Solving On National Security Issues
Jewish Tashlich Ritual of Rosh HaShanah
What is Tashlich? - High Holidays
Video > HD - TV shows - TPB
Command and Control Research Portal
2016 T4 — Command and Control Research Portal
2016 Presentations and Papers — Command and Control Research Portal
2016 Tracks — Command and Control Research Portal
2016 T3 — Command and Control Research Portal
2016 T5 — Command and Control Research Portal
2016 T7 — Command and Control Research Portal
EtHD - TPB
Project Socrate - Google Search
Project Socrates
kol nidre translation - Google Search
What is Kol Nidrei?
Judaism 101: Yom Kippur
(1) Sesame Street (@sesamestreet) | Twitter
KOL NIDRE - JewishEncyclopedia.com
A lost Europe is mourned in this version of Kol Nidrei – Slipped Disc
Kol Nidre live streams offer forgiveness with a click | Jewish Telegraphic Agency
Text of Kol Nidrei Prayer - High Holidays
Examining the Mystery of Kol Nidre | B'nai Jeshurun
Kol Nidrei - My Jewish Learning
kol nidre transliteration - Google Search
Tashlich - Guide - Jewish Kids
Tashlich's Subtle Message
Scholar Alert - [ Metrics of Terrorism ] - scitrenbaum@gmail.com - Gmail
Inbox (688) - stczztop@gmail.com - Gmail
Browse by Research Unit, Center, or Department | Research Showcase @ CMU
scholar.google.com/scholar_url?url=http://digitalcommons.law.scu.edu/cgi/viewcontent.cgi%3Farticle%3D1605%26context%3Dchtlj&hl=en&sa=X&scisig=AAGBfm1gGqQMEbiNPuLDEU_3Gwwjznuauw&nossl=1&oi=scholaralrt
Sign prediction in social networks based on users reputation and optimism | SpringerLink
Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime | SpringerLink
Journal of Ambient Intelligence and Humanized Computing - Springer
Personal - Dropbox
New approach to block binge eating -- ScienceDaily
Fighting the Islamic State on Social Media | RAND
Police Body-Worn Cameras: More to It Than What You See | RAND
Big Pharma's Manufactured Epidemic: The Misdiagnosis of ADHD - Scientific American
The Trump Campaign Is Ready To Burn This Motherfucker Down
10-12 AM
Copy links to clipboard
Copy
Open
Mission-Informed Needed Information - Discoverable Available Sensing Sources - Google Search
Projects - Research portal
Institute for Military Operations - Research portal
2015 Tracks — Command and Control Research Portal
Graduate Studies | Utah State University Research | DigitalCommons@USU
Knowledge Systems For Coalition Operations
Knowledge Systems for Coalition Operations
How to Make Social Media More Effective as an Exploitation Area | ARSLAN | Journal of Military and Information Science
The Intelligence Exploitation of Social Media - Research portal
5350 - 2015 Human Systems Conference
6350 - 2016 Human Systems Conference
Arslan: A New Discipline of Intelligence: Social Media - Google Scholar
Charles River Analytics Staff Describe Human Systems Challenges at NDIA Human Systems Conference | Charles River Analytics
Intelligence Exploitation of Social Media - Google Search
The Weaponization of Social Media: How Social Technology Enables and Challenges Defence - Google Search
jp 2-01.2 counterintelligence and human intelligence support to joint operations - Google Search
Liked videos - YouTube
Green Day celebrates 30 years together + new album ‘Revolution Radio’ in Town Hall | SiriusXM Blog
Calhoun Home
The Real 'Stuff White People Like’
NATO SAS-IST-RTG-102 Intelligence Exploitation of Social Media - Research portal
Tim Harford — Messy
The Green Day Authority
Watch clips from Green Day's town-hall interview with SiriusXM
IAI announces the release of Scraawl 2.0, a social network analytics tool for brand monitoring and
Predictive Policing: Forecasting Crime for Law Enforcement | RAND
The Nailbot Prints Art on Your Fingernails Using Your Smartphone
Medium
Dave Pell – Medium
30 Quick Takes on Debate 2 – Medium
Full List of Stuff White People Like | Stuff White People Like
I’m Angry At Facebook
28 Simple Things All White People Just Love To Do
SAS-IST-102 Intelligence Exploitation of Social Media
IST-124 Heterogeneous Tactical Networks - Improving Connectivity and Network Efficiency
IST-SAS-139 Visual Analytics for Exploring, Analysing and Understanding Vast, Complex and Dynamic Data
Discourse Analysis & Conflict Prediction - Google Search
NATO SAS-RTG-102 - Google Search
SCRAAWL: Joint Army/Navy Social Media Analysis - Google Search
Scraawl - Actionable Insights from Analytics
YouTube
Official London Theatre - YouTube
Elsie - YouTube
Ramin Karimloo @ B.B. King NYC (7/24/2016) - YouTube
michele - YouTube
Jennifer Rickerson - YouTube
jsalow2 - YouTube
ren598 - YouTube
West End Live 2016 Samantha Barks - YouTube
West End Live 2016 Ramin Karimloo - YouTube
STICKERS
Copy links to clipboard
Copy
Open
Google Search
French Bulldog-PIGU II by OneGod-Ethan
【個人原創貼圖】貓狗大戰篇--可愛寵物大集合 : LINE台灣 官方BLOG
豆卡頻道2-茶包&飯丸 | Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
法鬥皮古 | LINE貼圖輕鬆購 | 原創主題購買及超商付款請賴客服line2941
法鬥皮古LINE貼圖資訊站
豆卡頻道-動動貼LINE貼圖資訊站
Hi! French Bulldog - Creators' Stickers
French Bulldog Mochi - Creators' Stickers
Google Search
Google Search
Google Search
10/15
Copy links to clipboard
Copy
Open
102.1 the Edge - YouTube
No Day But Today - The Story of Rent - YouTube
FamousInNY - YouTube
Benjamin Rauhala - YouTube
FamousInNY - YouTube
Benjamin Rauhala - YouTube
Suman Tharan - YouTube
BRDW lovers - YouTube
FULL- the Sound of Musicals ep 1: Charlie and the Chocolate Factory - YouTube
max chernin - YouTube
Dr.Soc - TPB
Singer: Max Chernin - YouTube
Alysha Deslorieux - Satisfied (Hamilton) - YouTube
CCM - YouTube
Alexander Sage Oyen -- "Introduction" - YouTube
Use Somebody - Max Chernin - YouTube
Max Chernin & Rachel Bahler // Part Of Your World - YouTube
"I'll Cover You (Reprise)" - Max Chernin and the cast of WE GREW UP LIKE THIS - YouTube
Trevor McQueen & Michael Campayno - "Someone Like You/Edge of Glory" (Adele/Lady Gaga) - YouTube
Trevor McQueen & Michael Campayno - YouTube
sMASHed UP: a late-night mash-up bash - YouTube
Steven Grant Douglas - "Somewhere Only We Know/Closing Time" (Keane/Semisonic) - YouTube
The DMV’s cyber community is steadily attracting more interest from venture capitalists - The Washington Post
Content analysis to classify and compare Live, Virtual, Constructive simulations and System of Systems
Europe’s prisons are ‘breeding grounds for terrorists’, new study claims | IRIA News
Book Holiday Flights Now to Avoid Rising Fares
Bitstrips - Home
Person of Interest - CBS.com
#sploot - DeviantArt
Merrill Rainey
misscatlo
Sheldon® Comic Strip: Daily webcomic by Dave Kellett
Saturday Morning Breakfast Cereal - The Presidency
Bitmoji - Chrome Web Store
Sticky Draw - Create your own stickers on the App Store
Amazon.com: iPhone 7 Cases, Accessories & Bluetooth Headphones
Today Will Be Different: Maria Semple: 9780316403436: AmazonSmile: Books
AmazonSmile: iPhone 7 Plus Case, Crosspace Wallet Card Holder Defender Bumper Soft Rubber Hard PC Back Hybrid [Dual Layer] Shockproof Cover Flexible Protective with Card Slots for Apple iPhone 7 Plus (2016)-Gold: Cell Phones & Accessories
Bitmoji
BuzzFeed Animals
16 Adorable Corgi Sploots To Get You Out Of Any Rut
24 Very Important Corgi Sploots
Command and Control of Proactive Defense - Google Search
bastille a cappella - Google Search
Stumpers & rump. #imgur | Aww | Pinterest | Corgis, Cartoon and Google Search
BBC Radio 1 - YouTube
3voor12 - YouTube
anrina - YouTube
More Elsie Fest 2015 - YouTube
Ramin Karimloo @ B.B. King Blues NYC (7-23-16) - YouTube
Miscast Gala 2016 [Official MCC Theater Videos] - YouTube
Sanna Kihlman - YouTube
Matt Doyle - YouTube
Ramin Karimloo Sings "Being Alive" from COMPANY and PRINCE OF BROADWAY - YouTube
Adam Pascal & Anthony Rapp - No Day But Today / Seasons of Love - Adelphi University 9-20-13 - YouTube
Lea Salonga - Lea's Medley (Live @ 54 Below) - YouTube
Ramin Karimloo @ B.B. King NYC "Lily's Eyes" with Andrew Kober - YouTube
Adam Pascal @ Feinstein's 54 Below (10/8/2016) "Memory" - YouTube
Ramin Karimloo @ B.B. King NYC "Music of the Night" - YouTube
Imagine Dragons - It's Time - Acoustic [ Live in Paris ] - YouTube
Bastille - Flaws - Acoustic [ Live in Paris ] - YouTube
Bastille - "Good Grief" Acoustic | Elvis Duran Live - YouTube
In the Recording Studio: "If You Knew My Story" from BRIGHT STAR - YouTube
Ramin Karimloo, Hadley Fraser 'Bring Him Home' Union Chapel London 19.01.16 HD - YouTube
Lea Salonga sings I Dreamed A Dream on Seth Speaks - YouTube
Bastille - Pompeii - Acoustic [ Live in Paris ] - YouTube
This Week's Top Downloads
Crash: how computers are setting us up for disaster | Tim Harford | Technology | The Guardian
English man spends 11 hours trying to make cup of tea with Wi-Fi kettle | Technology | The Guardian
Facebook, Instagram, and Twitter Provided Data Access for a Surveillance Product Marketed to Target Activists of Color | ACLU of Northern California
Doo Pigou law | skinhead sell - the largest map Shopping Network | Holy crap stores can store over one thousand members of Free formalities sending 30 straight 300
Details - Stanford H4D - Spring 2016
Weaponized Mini-Drones Entering the Fight | Defense Update:
Saturday's Best Deals: Dash Cam, Pressure Cookers, $22 Bidet, and More
How To Turn Off Read Receipts And Typing Alerts For LinkedIn Messages
News
Newsletter Archive – Club MacStories
Exploring the iMessage App Store One Month Later: Our Favorite Stickers and iMessage Apps – MacStories
Lost Keys? Save up to 30% to Help Find Your Keys with Tile’s Wireless Key Tracker | Tile
iPhone 7: Computer from the Future – MacStories
Command and Control of Proactive Defense (C2PD) - Federal Business Opportunities: Opportunities
Islamic State-inspired Muslim cell plotted jihad weapons tunnel into Israel
What is the difference between Tile Mate, Tile Slim, and Tile Original? – Tile Support
Exify - Tools for Photos on the App Store
AppsGoneFree
News
How to Quickly and Easily Convert to PDF on iOS
iPhone 7 Plus vs DSLR Camera
Palantir Technologies: Pushing Back at Labor : Stephen E. Arnold @ Beyond Search
"Development and Characterization of Reagent Pencils for Microfluidic P" by Cheyenne H. Liu
3D printing Jurassic Park: Copyright law, cultural institutions, and makerspaces | QUT ePrints
NSA to BRICS counterparts: Step up terror fight, put in place legal regime | The Indian Express
The Most Important Scenes from Fantastic Four (As I Remember Them)
http://israeliwarcriminals.zzl.org/ is not available
Lifehacker - Tips and downloads for getting things done
Get an Empty Seat Next to You On Your Flight With This Airline App Trick
Top 10 Gmail Tips for Power Users
Motherboard | Home | Motherboard
Cocaine Bust Shows How Close the Dark Web and Street Crime Really Are | Motherboard
No satellites needed for next-gen navigation system that uses "signals of opportunity"
Nuclear Weapons 232 - DARPA Considering Blockchaining To Help Protect Nuclear Arsenal Computers | Nucleotidings
Building a Smart Home With Apple’s HomeKit | The Wirecutter
MacStories Weekly: Issue 52
Why Your Farts Stink So Bad, and How to Stop Them
Skim Split Screen Workaround | Jeff Taekman's WiPPP
Writing and Reading Workflow: Batching and Automating Full-Text Retrieval | Jeff Taekman's WiPPP
Writing Workflows: Processing Annotations (All Roads Lead to Skim) | Jeff Taekman's WiPPP
Aardman
AddictiveTips - Tech tips to make you smarter
How To Customize Assistive Touch In iOS
The Stroz Friedberg Cyber Brief — Center on National Security
AFRL Command and Control of Proactive Defense (C2PD) BAA | Contract Research and Development
CSV Templates
Extract Emails
Joe's Blog » On Making Quality Sticker Screenshots
Micromachines | Free Full-Text | Review of Microfluidic Photobioreactor Technology for Metabolic Engineering and Synthetic Biology of Cyanobacteria and Microalgae
Report of the Independent Commission of Inquiry on the 2014 Gaza Conflict
The Hot Spots of the World | RAND
Three arrested in alleged scheme to export sensitive U.S. technology to Russia | Reuters
Paper-Based Magnetic Nanoparticle-peptide probe for Rapid and Quantitative Colorimetric Detection of Escherichia coli O157:H7
Addicted to Your iPhone? You’re Not Alone - The Atlantic
Keep track of your tasks hands-free with the new Alexa integration - Todoist Blog
Club MacStories
CCI Blog » Blog Archive » The Complete Privacy & Security Podcast
Today / Me
OSINT Video Training by Michael Bazzell | Open Source Intelligence Techniques
Chapik on the App Store
Coffee Snob Stickers on the App Store
Espresso Stickers on the App Store
Meow Stickers on the App Store
Monster Desserts on the App Store
Pun Pals Sticker Pack on the App Store
SketchBook Motion on the App Store
Sploot the Corgi on the App Store
Stickers: Photo Props on the App Store
Toca Life Paper Bag Cat on the App Store
Truth Truth Lie on the App Store
Pinboard: network for scitrenb
Pinboard: bookmarks for scitrenb tagged 'mostusefulsiteever'
iMessage App Store Already Tops 400 Apps and 1,250 Sticker Packs
Doing the two-step: Switching to Apple's two-factor authentication - Six Colors
Cat (@catlo) | Twitter
Cory Bohon (@coryb) | Twitter
Merrill Rainey (@LittleRainey) | Twitter
Amazon.com - Motion Activated Bed Light, Vansky Flexible LED Strip Sensor Night Light Illumination with Automatic Shut Off Timer (Warm Soft Glow) -
The Iconfactory Goes All Out for Halloween – MacStories
Walt Mossberg on Siri’s Failures and Inconsistencies – MacStories
Healthy Competition – MacStories
Canvas - Relay FM
Sploot the Corgi - Google Search
oceansjenny - YouTube
nikimak12 - YouTube
Next to Normal US Tour - Original Tour Cast - YouTube
Aaron Tveit & Leslie Odom Jr. "What You Own" @ Elsie Fest - YouTube
The Little Shop Archive - YouTube
How Does Ethnic Rebellion Start?
Get started with iPhone 7: The Ultimate Guide | iMore
“They will rot the society, rot the party, and rot the army”*: Toxification as an ideology and motivation for perpetrating violence in the Khmer Rouge genocide?: Terrorism and Political Violence: Vol 0, No 0
Reassessing the Threat of Homegrown Violent Extremism in the United States: Overstated or Underestimated? | Small Wars Journal
ISPRS International Journal of Geo-Information | An Open Access Journal from MDPI
Democratic Participation in the Air Strikes Against Islamic State: A Qualitative Comparative Analysis | Foreign Policy Analysis
Formation of raiding parties for intergroup violence is mediated by social network structure
Approval network: a novel approach for sentiment analysis in social networks | SpringerLink
Industry Day V: Intelligence Analysis Tools | The MITRE Corporation
Russia has 'playbook' for covert influence - Google Search
Today / Me
How Do We Stop Our Social Feeds from Being Spied On?
Facebook, Instagram, and Twitter Provided Data Access for a Surveillance Product Marketed to Target Activists of Color | ACLU of Northern California
Marcus P. Zillman, M.S., A.M.H.A. Author/Speaker/Consultant
US warship fires defenses off Yemen; ISIS debuts drone IEDs; Iraq’s Abadi vs. Turkey’s Erdogan; Army looks to cut paperwork; and just a bit more... - Defense One
Developing cyber attack prediction capability for IARPA | BAE Systems | United States
Predicting Terrorism From Big Data Challenges U.S. Intelligence - Bloomberg
Trump's refusal to accept intelligence briefing on Russia stuns experts - Chicago Tribune
Spy agencies team up with National Academies | Science | AAAS
Russia has 'playbook' for covert influence in Eastern Europe: study | Reuters
The Shadow Commander - The New Yorker
10/21 IMPORTANT
Copy links to clipboard
Copy
Open
American vigilante hacker sends Russia a warning
Electrospaces.net: NSA's TAO Division Codewords
(6) #iAWACS hashtag on Twitter
Things Take Too Long Now
Terrorism and Political Violence: Vol 28, No 5
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "Riddle me this. Why is RUSSIA TODAY releasing WIKILEAKS dumps 20 minutes BEFORE WIKILEAKS if they are not in bed together?? >> https://t.co/hetApWD9cl"
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
Twitter cuts off Snaptrends, which mines tweets for law enforcement
Meet the vigilante who hacks jihadists - Jan. 16, 2015
Electrospaces.net: NSA Nicknames and Codewords
(9416) Inoreader - Apple/IOS
Jokes Aside | Duck of Minerva
Night Sky 4 Is Apple's Free iOS App Of The Week, Download Now [$1 Value] | Redmond Pie
Best Free Torrent Search Engines | Gizmo's Freeware
Check If iPhone 7 Has Intel Or Qualcomm Modem, Here's How | Redmond Pie
Best Free Torrent Search Engines | Gizmo's Freeware
Sign-in – Homeland Security Digital Library
A Flare For Preparedness: Obama Issues Executive Order on Space Weather Events – Homeland Security Digital Library
ISIS’ Social Media Ops Are Declining, US Military Researchers Say - Defense One
Meet the Navy SEAL Leading the Fight Against ISIS Messaging - Defense One
US intelligence targets advanced security management of virtual systems | Network World
Now Anyone Can Buy Amazon's Cheapest Echo
Security Economics of the Internet of Things - Schneier on Security
tao-organization.jpg (719×540)
Pentagon Metrics on Afghan War are Useless - Matthew Aid
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
New tools and trainings for security practitioners and scholars
The Terrorism and Extremist Violence in the United States (TEVUS) Database | START.umd.edu
Data and Tools | START.umd.edu
Today's Best Deals: Lady Gaga, Eneloop Batteries, Patio Heaters, and More
DDoS Attack on DNS; Major sites including GitHub, Twitter Suffering Outage
Amazon Prime Now: WD 1TB Black My Passport Ultra Portable External Hard Drive - USB 3.0 - WDBGPU0010BBK-NESN: Computers & Accessories
Algorithms Can Tell Bosses How Employees Are Feeling - The Atlantic
MomoNote: iPhone, Memo, Sync
This Item Is Not Eligible For iCloud ... What?
Friday Freeebie: User Interface Line Icon set - BrettTerpstra.com
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
How to Quickly Research All Your Local Elections
This Week's Most Popular Posts: October 14th to 21st
How to Change Siri Keyboard Shortcut for Mac
These Non-Sappy Cards Help You Support Friends With Cancer
War News Updates: Islamic State Is Claiming To Have Shot Down An A-10 In Syria. The Pentagon Is Denying This Story
How to Spot a Concealed Handgun | The Art of Manliness
With 'Donald Trump's BS' food cart, Wieden+Kennedy serves up baloney, sass in Portland's living room (Photos) - Portland Business Journal
HoudahSpot — Find Files by Name, Text, Date, Extension, etc.
Tembo — Simple File Search for Mac
These 4 Apps Will Help You Organize Your Mac [Deals Hub]
Spy Agency To Pilot Insider-Threat Hunting Tech - Nextgov.com
DHS Assesses Tetracore’s Anthrax Lateral Flow Assay
RadioBio: DARPA Explores Physical Modes of Microbial Communication
Zika Rapid Test Named ‘Best of What's New’ by Popular Science
Dress Pant Sweatpants | Men's Sweatpants | Betabrand
LaunchBar 6
Merged Session #0032 - Session Buddy
Remove Duplicate Lines and sort
Portable Flash Drives, 128 GB at Office Depot
Office Depot & OfficeMax: Office Supplies and Furniture
This Is Probably Why Half the Internet Shut Down Today [Update: It’s Getting Worse]
This 4-In-1 Gadget is Only $30, and Essential For Frequent Travelers
Cyberattack on 3D-Printed Component Destroys Drone Mid-Air | Motherboard
How Hackers Broke Into John Podesta and Colin Powell’s Gmail Accounts | Motherboard
News and Transcript Resources: Fact Sheet - EveryCRSReport.com
Al Smith V: Trump ‘Crossed the Line’ at Charity Roast - The Daily Beast
New Threats Spark DoD Spending Debate: Thinktanks Ponder $2 Trillion In Options « Breaking Defense - Defense industry news, analysis and commentary
The psychological effects of cyber terrorism: Bulletin of the Atomic Scientists: Vol 72, No 5
On Patrol with America’s Top Bioterror Cop
Doing Biotech in My Bedroom
TEVUS Portal | START.umd.edu
(8446) Inoreader - Giving Intelligence Analysts Their Voices Back: The Case for Analyst Perspectives
Giving Intelligence Analysts Their Voices Back: The Case for Analyst Perspectives | RAND
Prof. Tunnard's Social Network Analysis and Social Media Classes: After ISIS: What associations and conflicts between Al-Qaeda and ISIS Affiliates can tell us about the next phase of the War on Terror
QCRI - Resources Detail
The secret network of political tweeters making debate memes go viral - The Washington Post
▶ Is Social Media Making News Generation and Consumption Better? - VideoLectures.NET
News You Can Use: 10/21/16 | Arthur D. Simons Center
Mission Possible: A Spy Agency Builds a Tech Scout Network - Nextgov.com
What an NFL Coach, the Pentagon and Election Systems Have in Common - Nextgov.com
Edward Alden: Failure to Adjust - Council on Foreign Relations
Prof. Tunnard's Social Network Analysis and Social Media Classes: Applying the Crime-Terror Nexus to the Sahel - Andrew Taylor
What does an adviser do? Mosul operation highlights the elasticity of military support operations. - The Washington Post
Outside the wire: How U.S. Special Operations troops secretly help foreign forces target terrorists - The Washington Post
Missile Threat | Analysis | Missile Threat
Ex-NSA Hacker Creates Tool To Warn You Of Webcam Spies | Motherboard
Watch a Speed Test Comparing All the iPhones Ever Made | Motherboard
The 2016 Election Has Failed the Future | Motherboard
Hack This: An Overdue Python Primer | Motherboard
While Alleged NSA Thief Sits in Detention, Shadow Brokers Post Messages | Motherboard
Mercedes Decides Who An Autonomous Car Should Save And The Answer Is Worrying
Carl Miller, Andrew Crooks, and Frank Stech uploaded papers - scitrenbaum@gmail.com - Gmail
What you need to know about the battle for Mosul, Iraq – Medium
Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica
War Goes Viral - Defense One
OSINT Framework
Mac Downloads News, Videos, Reviews and Gossip - Lifehacker
U.S. Identifies Key Player in ISIS Attacks on Europe - ProPublica
ISIS Has a Drone Strategy Too - The Atlantic
OneTab shared tabs
Islamism and Islamists: a very short introduction
TextExpander: communicate smarter (and save 50%) - BrettTerpstra.com
Afghan War News: Afghan War News Snippets
Today’s Apps Gone Free: Dark Matty, Ballpoint, dB Meter and More
Get Up To $60 in Amazon Credit For Uploading Images To Prime Photos
Here It Is: Your Last Best Chance To Rip DVDs To Your Mac | Bohemian Boomer
New Threats Spark DoD Spending Debate: Thinktanks Ponder $2 Trillion In Options « Breaking Defense - Defense industry news, analysis and commentary
DARPA Do-It-All Drone Among New VTOLs Nearing Flight « Breaking Defense - Defense industry news, analysis and commentary
Five Steps the US Army Should Take to Counter Hybrid Threats in the Gray Zone - Modern War Institute
The Next War? Trench Warfare With Smart Bombs « Breaking Defense - Defense industry news, analysis and commentary
Web Excursions for October 19, 2016 - BrettTerpstra.com
DARPA Just Launched a Podcast
How To Find, Buy, And Renovate A Titan II Missile Silo | Hackaday
The Archivist: Stories of the Mujahideen: Women of the Islamic State | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
Recently Added Documents - MiPAL: Terrorism - LibGuides at National Defense University
Cheap: A New Stats Widget That Monitors Your Mac’s System 24/7 | noodlemac
‘Islamic State’ Turning Into a Guerrilla Army, Top General Warns - The Daily Beast
Waging #Eurojihad: foreign fighters in ISIL
Reports - EUISS
Frontline . TV | OPB
Animation: What is gene editing and how does it work? | Big Picture
House Committee on Homeland Security
Megaupload User Fears Complete Data Loss, Asks Court For Help - TorrentFreak
Every CRS Report - EveryCRSReport.com
masterworksbwayVEVO - YouTube
The Broadway Prince Party @ Feinstein's 54 Below (10/17/2016) - YouTube
Gilmore Guys - 719 - It's Just Like Riding A Bike (Live In Boulder, CO) - YouTube
10-23 Linky Links
Copy links to clipboard
Copy
Open
Most Popular Cheap Travel Booking Site: Google Flights
Add Sticky Notes to Any Page With Note Anywhere
Annotable Is a Powerful Image Annotation Tool for iPhone With Zooming, Text Marking, and More
Hopper Shows the Very Best Time to Fly and Buy a Ticket for Your Route
How Much You Have to Make to Buy a Home In 27 Major U.S. Cities
The Best Tips for Finding Cheap Airfare With Google Flights
This Week's Top Downloads
Apocalypse Delayed jihadica
Geek | Wireless Bluetooth V3.0 Keyboard Case Leather Cover with Stand Universal for 4.5 / 6.5 inch Cell Phones
Geek | (USA Stock ONLY SHIP TO USA) Portable 360 Adjustable Laptop Notebook Table Stand Tray Desk Black/Pink for Sofa Bed Carpet Lawn (Color: Pink)
Geek | Cart
Amazon Best Sellers: Best Monitor Arms & Monitor Stands
37 tabs
Copy links to clipboard
Copy
Open
A Little Note on Notes – nahumck.me
51 Spring Street #4 in Nolita, Manhattan | StreetEasy
Jihadist Identifiers :: Jihad Intel
Hacking In The Name Of The Islamic State (ISIS)
The Islamic State leadership in Mosul :: Jihad Intel
Jihad Intel
Twitter cuts off Snaptrends, which mines tweets for law enforcement
Police are using multiple social media surveillance programs
The Jester Effect and #iAWACS – Grumpy Opinions
ISIS in Bangladesh – Acleddata – Crisis
2015 Review of Jammu & Kashmir – Acleddata – Crisis
Targeting Religious Minorities in Pakistan – Acleddata – Crisis
Military, civilian first responders participate in relief hackathon | Arthur D. Simons Center
DoD Participates in Disaster Relief Hackathon in New York City > U.S. DEPARTMENT OF DEFENSE > Article
DoD Accelerator Program Aims to Spur Public-Private Natl Security Tech Collaboration
Geopolitical Futures | Keeping the future in focus
Yemen’s Civil War | Geopolitical Futures
BI Video (@BI_Video) | Twitter
Giving Intelligence Analysts Their Voices Back: The Case for Analyst Perspectives
Whodunnit? Russia and Coercion through Cyberspace
Latest Issue of ISIS Rumiyah Magazine Released – To Inform is to Influence
Treat Yourself to a Massage Any Time You Want It With This Discounted Pillow
Untangling the Arab-Kurdish Web in Post-ISIL Northern Iraq | Small Wars Journal
The Cyber Espionage Predominant Purpose Test | Small Wars Journal
Give Intelligence Analysts Back Their Voices! - Matthew Aid
The power of prediction markets : Nature News & Comment
IARPA seeks to predict the unpredictable -- FCW
FACT SHEET: Harnessing the Possibilities of Science, Technology, and Innovation | whitehouse.gov
[1610.06242] Finding Online Extremists in Social Networks
Outlook Web App - Sign out
staff system in the IDF general staff - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0ahUKEwiXl9i62uvPAhUJ1WMKHaHdAFoQFgg4MAQ&url=http%3A%2F%2Fwww.inss.org.il%2Fuploadimages%2FImport%2F(FILE)1326273177.pdf&usg=AFQjCNGZ8HXsIUHquHmfJZd4q65FM4qVBQ&sig2=eIPEgOf8-4nE15zCiF35kw&cad=rja
Resources | Defense Systems Information Analysis Center (DSIAC)
Counter-Drone Exercise Black Dart Expands, Moves To Eglin AFB « Breaking Defense - Defense industry news, analysis and commentary
Civilian Drones: Fixing an Image Problem? « CSS Blog Network
ISIS Is Reportedly Packing Drones With Explosives Now
Armed Drones Used by Islamic State Posing New Threat in Iraq - Bloomberg
4 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
Accurint® Virtual Crime Center - LexisNexis®
Computational Social Science: Understanding terrorist attacks on Twitter | START.umd.edu
Data and trends for multilateral peace operations | SIPRI
10/19
Copy links to clipboard
Copy
Open
Stash Waitlist
Russia This Week – October 5 - 10, 2016
Islamist Trends: July-September 2016 | Wilson Center
NotePlan: Lean Markdown Calendar, Todos and Notes on the Mac App Store
Toby - Make tabs work for you
Exporter on the Mac App Store
How to Make Apple Maps Not Terrible
These Apps Will Save You Huge Chunks of Time
IAP wins $53M Army intelligence contract | Government Security News
Detention & Interrogation of Terrorism Suspects - MiPAL: Terrorism - LibGuides at National Defense University
Terrorist Acts - MiPAL: Terrorism - LibGuides at National Defense University
Web Gateways - MiPAL: Terrorism - LibGuides at National Defense University
October Newsletter:
New interactive map shows bioscience companies in Oregon - Portland Business Journal
OTRADI readies new space for digital health startups - Portland Business Journal
IARPA Virtuous User Environment (VirtUE) Phase 1 BAA | Contract Research and Development
Why Is My Battery Estimate Never Accurate?
(10460) Inoreader - Adequate Man
A New Smartphone Sensor Detects Disease Biomarkers in Multiple Samples at Once | Medgadget
Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary
Panama: The Hidden Trillions | by Alan Rusbridger | The New York Review of Books
Cory Davenport: An Introduction to Insider Threats | START.umd.edu
[1610.04872] Fault Detection Engine in Intelligent Predictive Analytics Platform for DCIM
Center for Democracy & Technology | Keeping the Internet Open, Innovative and Free
About the name change from Google Apps to G Suite - G Suite Administrator Help
Type with your voice - Docs editors Help
Five new ways to reach your goals faster with G Suite
Combating Terrorism Center at West Point
Criminal Justice Information Services (CJIS) — FBI
Jihad Watch – Exposing the role that Islamic jihad theology and ideology play in the modern global conflicts
Attacks in Europe - ProPublica
The Threat of Nuclear Terrorism | Wilson Center
Never Lose Your Phone, Keys, or Wallet Again Using Tile’s new Slim Bluetooth Tracker | Tile
Amazon.com: Save up to 20% on Select High Sierra Products: Sports & Outdoors
GitHub - kdeldycke/awesome-falsehood: Curated list of falsehoods programmers believe in.
After the Battle for Mosul, Get Ready for the Islamic State to Go Underground
2016 NSA Codebreaker Challenge
Weapons of the Syrian War: Overview - Defense One
Non-Linear Warfare in Ukraine: The Critical Role of Information Operations and Special Operations | Small Wars Journal
Winning the Cyber Gage: Intelligence Dominance in the Digital Information Age | Small Wars Journal
Today's Best Deals: Fresh Water, Holiday Laser Light, Tire Pressure Monitor
Carry an Extra Phone Charge Anywhere With Two Thin Battery Deals
Let There Be Light With This OxyLED Stick-Anywhere LED Sale
Why the Flying IED Threat Has Barely Started
Perpetual Line Up - Unregulated Police Face Recognition in America
Defence Data Portal
Gilmore Guys - YouTube
Workflow Update Brings Ability to Interact with Any Web API – MacStories
Learn The Dutch Reach And You May Save A Bicyclist's Life
Building Peace |
ISW Blog: ISIS Sanctuary Map: October 17, 2016
ISW Blog: Russia Advances its IADS in Syria
Plan Your Free Online Education at Lifehacker U: Fall Semester 2016
Terrifying Truths and Myths About Halloween | Portland State Online
Terrifying Truths and Myths About Halloween | Portland State Online
timripley.co.uk
Web Links
Russia in Europe: May 1 - June 14, 2016 | Institute for the Study of War
Ukraine | Institute for the Study of War
Uplift Aeronautics | Innovate Aid Empower
Uplift advances STEM education for girls | Uplift Aeronautics
Uplift Aeronautics Final Letter | Uplift Aeronautics
War on the Rocks
Elusive Victories: How Counterterrorism Campaigns Can Link Back Up with Strategy
The Misadventures of Russia and the United States in Syria: Complete Strategy Implosion Edition
The reality of Portland's self-storage market - Portland Business Journal
The Stroz Friedberg Cyber Brief — Center on National Security
Escalation in the Red Sea: Yemen’s Civil War, Iran, and Saudi Arabia | Critical Threats
Defense One
Pentagon Urgently Pushing Anti-Drone Tech to ISIS Fight - Defense One
Aliya Sternstein - Defense One
LinkedIn Profiles - The Hacker Factor Blog
(10414) Inoreader - Matthew Aid
Russia This Week – Part II - October 10-13
Preparation For A Military Clash - Russia's Drills And Army Update – September-October 2016
The Race of Gentlemen Is a Rat Rod Carnival of Vintage Horsepower
Could Russian-Style Hybrid Warfare Happen in America?
From Mosul to Raqqa? A complex, risky battle against the Islamic State - Middle East - Stripes
So You Want to Learn Physics... — Susan J. Fowler
Uplift Project Dashboard - Google Docs
Today / Me
Flash Sale today! SAVE 50% on All Kroger Health & Beauty Care - scitrenbaum@gmail.com - Gmail
SAS-117 Information Operations for Influence (IOI)
Acoustic Transient Threat Detection Sensors & Signal Processing for Battlefield Situational Awareness - Google Search
Information Operations for Influence nato - Google Search
Irregular Warfare and Operations Assessment - Google Search
Evidence of a ‘difficult fight’ ahead as forces move toward ISIS-held Mosul - The Washington Post
Background and Documents on Attempts to Frame Assange as a Pedophile and Russian spy
Here’s What Happens When Two Designers Speak Only in Infographics | WIRED
Cops Have a Database of 117M Faces. You’re Probably in It | WIRED
Imagine if Donald Trump Controlled the NSA | WIRED
The Kremlin Playbook | Center for Strategic and International Studies
Government Agency Websites - Terrorism - LibGuides at American University
Countering Gray-Zone Hybrid Threats: An MWI Report - Modern War Institute
The Pentagon’s Virtuous Insurgency
OneTab shared tabs
ISIS Has a Drone Strategy Too - The Atlantic
The Military’s Tech Matchmaker Is Getting Ready to Open Its Wallet - Defense One
The NSA Is Using Bomb-Defusing Software to Grow the Next Generation of Analysts - Defense One
The Apps They Carried: Software, Big Data, and the Fight for Mosul - Defense One
Pentagon Urgently Pushing Anti-Drone Tech to ISIS Fight - Defense One
Latest News | The Defense Entrepreneurs Forum
Hack the Pentagon Bug Bounty Cybersecurity Program: from idea to successful results - HackerOne
How America’s Drones Can Defeat ISIS - Defense One
How to Survive a Siege: We Made It Through Sarajevo. Here's How We're Keeping Connected In Aleppo - Defense One
Trump vs. the Generals - Defense One
The Jester Effect and #iAWACS | Lady Liberty 1885
CRCnetBASE - Modeling Sociocultural Influences on Decision Making
11 tabs
Copy links to clipboard
Copy
Open
extension - 1Password Support
Homeland Security Advisors Series: Part VI - Cascadia Rising with Major General Bret Daugherty (Washington)
Modeling Sociocultural Influences on Decision Making: Understanding Conflict, Enabling Stability - CRC Press Book
Journal of Policing, Intelligence and Counter Terrorism: Vol 11, No 2
Watson | IBM Watson Personality Insights: The science behind the service
Pepsi wants to make its sodas better for you — eventually - The Washington Post
Watch TV and movies on Xbox, PS3, Apple TV, and more | Hulu
Procedia Computer Science - ScienceDirect.com
Speed-Clean Your Home Before Company Comes! - Texture
Giving meaning to tweets in emergency situations: a semantic approach for filtering and visualizing social data | SpringerLink
Can CRISPR Save Ben Dupree?
10/17
Copy links to clipboard
Copy
Open
The iMessage Apps and Stickers That Are Actually Useful
Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
I Love Dachshund (Pop) | Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網
MiniPlay Controls Spotify or iTunes From a Small Window or Notification Center
DARPA RadioBio RFI | Contract Research and Development
link: Yabe-LINE貼圖代購 | 台灣No.1,最便宜高效率的代購網 - stczztop@gmail.com - Gmail
$40 adapter lets you enjoy audiobooks AND charge your iPhone 7 at once
Download this new guide to approaching social sources for journalists - First Draft News
Views from the Occident: Sources & Studies — White Banners of the Islamic Emirate: Afghan...
Getting started in social newsgathering, verification, debunking and more - First Draft News
Tweetdeck just made searching for tweets by date and location a lot easier - First Draft News
Sources: Iraqi army receiving anti-drone weapons following ISIS attack - Al Arabiya English
Foreign Policy | the Global Magazine of News and Ideas
Slides, guides and musings on misinformation
Syria Comment - Syrian politics, history, and religion
Socks – Up Attire
The 5 habits of trustworthy social reporting - First Draft News
How to get started investigating the Arabic-language internet - First Draft News
ICSR Report: Criminal Pasts, Terrorist Futures: European Jihadists and the New Crime-Terror Nexus / ICSR
Fix iOS 10's Weird Mail Threading with a Settings Toggle
IOS 10 News, Videos, Reviews and Gossip - Lifehacker
This Interactive Guide Teaches You Photo Editing Slang in Five Minutes
how should your resume list a bunch of different jobs at the same place? — Ask a Manager
How National Security Decisions are Made - Foreign Policy Research Institute
OneZoom Tree of Life Explorer
Green’s Dictionary of Slang
Standings
Alfresco » Login
Confronting Conflict In The ‘Gray Zone’ « Breaking Defense - Defense industry news, analysis and commentary
Frontiers | Expatriates’ Multiple Fears, from Terrorism to Working Conditions: Development of a Model | Organizational Psychology
Microblogging in higher education: Digital Natives, knowledge creation, social engineering, and intelligence analysis of educational tweets
From Schism to Synthesis: The Off-Centre Radical-Reformist Role of Development Management - Ramizo - 2016 - Development Policy Review - Wiley Online Library
Hillary Clinton Broadway Fundraiser Live Stream: How to Watch Online | Variety
LexisNexis' provides a new platform for identifying criminals, solving crimes | Government Security News
CRCnetBASE - Modeling Sociocultural Influences on Decision Making
The Crisis Of Russian-American Relations And America's Failed Russia Policy
Lin-Manuel Miranda Re-Writes ‘The World Was Wide Enough’ For Broadway For Hillary Event – Read the Lyrics! | Jake Gyllenhaal, Jon Hamm, Josh Groban, Lin-Manuel Miranda, Neil Patrick Harris, Renee Elise Goldsberry : Just Jared
James Cartwright, Ex-General, Pleads Guilty in Leak Case - The New York Times
OneTab shared tabs
greta's gouge: Friday's Miscellany 10-14-2016
4 tabs
Copy links to clipboard
Copy
Open
LaSilkie - TPB
marty14 - TPB
GoonerTPB - TPB
24 Hour Fitness Promo Codes & Coupons 2016 - Groupon
10/14
Copy links to clipboard
Copy
Open
GitHub - lockfale/OSINT-Framework: OSINT Framework
Bound is a Dropbox-Connected Audiobook Player – MacStories
Bound - Audiobooks for Dropbox on the App Store
One Thing Well | YakYak
GitHub - yakyak/yakyak: Desktop chat client for Google Hangouts
Access Two Hard Drives Or SSDs At Once With This USB Dock
Find Your Way To the Bathroom With This $20 Under-Bed Motion Light
Buy An $18 Quick Charge USB Hub, Get a Car Charger and Lightning Cable FREE
Add Four Lightning Cables To Your Collection For $15
Toshiba Canvio Aerocast 1TB Wireless Portable Hard Drive HDTU110XKWC1 Black | eBay
Personal - Dropbox
convert m4b - Google Search
Audio books M4b to MP3 Converter
move to iphoe 7 - Google Search
How to transfer data from your old iPhone to your new iPhone 7 | iMore
How to transfer data from old iPhone to iPhone 7
delete iphone 7 apps - Google Search
Gold Box Deals | Today's Deals - Amazon.com
AmazonSmile: Hapurs 9-in-1 3 Port Portable USB 3.0 Hub, USB3.0 High speed SD TF MMC card reader with Power Switch: Computers & Accessories
SoSACorp
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
Ukraine Update: September 1 - October 13, 2016
ISW Blog: Ukraine Update: September 1 - October 13, 2016
audiobook take up too much space iphone - Google Search
How to free up your iPhone and iPad storage space by removing unwanted books
best aodiobook player iphone 7 - Google Search
Bookmobile Audiobook and Podcast Player on the App Store
Best Audiobook Apps
What audiobook player (on the iPhone) do you use? : audiobooks
: iPad/iPhone Apps AppGuide
Best Audiobook Apps for iPhone/iPad To Manage Your Audiobook Collection
10.1.10.18:54000/create.html
10-13
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Flying IEDs: The Next Big Threat?
The Cabaret - YouTube
Adam Pascal & Anthony Rapp - YouTube
START Education Blog
Unconventional Weapons and Technology Hourly Research Assistant(s) | START.umd.edu
Armed Forces, Cyberspace, and Global Images
Experts address the “blind spot” in extremist web content | START.umd.edu
Seeking participants for START research project | START.umd.edu
The Terror-Crime Nexus & Chemical, Biological, Radiological, and Nuclear (CBRN) Threats | START.umd.edu
Core Capabilities and Potential Durability of the Islamic State of Iraq and the Levant (ISIL) | START.umd.edu
Tweelyzer. An Approach to Sentiment Analysis of Tweets - Google Search
The Journal of Homeland Security Education - Home
"They Won't Magically Turn You Into A Lustful Cockmonster": Chris Kluwe Explains Gay Marriage To The Politician Who Is Offended By An NFL Player Supporting It
I Was An NFL Player Until I Was Fired By Two Cowards And A Bigot
I am only posting this to prove that you need to remove this shared icon
DOD/IC Problems - Stanford H4D - Spring 2016
How much terror? Dissidents, governments, institutions, and the cross-national study of terror attacks
Guiding Principles for Countering and Displacing Extremist Narratives
Stash Is a Bookmarking Tool with Automatic Organization, Reminders, and More
Who are the spoilers in social media marketing? Incremental learning of latent semantics for social spam detection | SpringerLink
Multimode co-clustering for analyzing terrorist networks | SpringerLink
Identifying individuals at risk of being radicalised via the internet | SpringerLink
Portland 2016-17 Season
A smartphone-based platform to test the performance of wireless mobile networks and preliminary findings | Fourth International Conference on Wireless and Optical Communications | WOC16 | SPIE Proceedings | SPIE
A Potable Optical Chemical Probe for Rapid Bio-Monitoring of Trinitrotoluene (TNT) in Environmental
Degradation of Organophosphate Pesticides Using Pyridinium Based Functional Surfactants - ACS Sustainable Chemistry & Engineering (ACS Publications)
October Newsletter:
Water Science and Technology: Water Supply
CRCnetBASE - Soft Target Threat Assessment
CRCnetBASE - Soft Targets, Active Shooters, and Workplace Violence
CRCnetBASE - Infrastructure Protection
CRCnetBASE - Complex Coordinated Attacks
CRCnetBASE - Planning for Terrorism
Blog Posts in Forecasting Methodology | RAND
SafetyLit: The Islamic State Wilayats and global expansion
Chris Kluwe’s “Beautifully Unique Sparkleponies” is a weird, wild ride - Salon.com
Disaster Forensics: Understanding Root Cause and Complex Causality | START.umd.edu
Ethical Conduct of Research in the Aftermath of Mass Shootings | START.umd.edu
How Much Terror? Dissidents, Governments, Institutions, and the Cross-national Study of Terror Attacks | START.umd.edu
The Islamic State Wilayats and Global Expansion | START.umd.edu
Present and Potential Factors Destabilizing Central Asia as a Challenge to the European Union | START.umd.edu
START Annual Meeting 2016: Quick-Fire Presentation - Unconventional Weapons and Technology, Political Instability, Risk Communication | START.umd.edu
Violence and Restraint in Civil War: Civilian Targeting in the Shadow of International Law | START.umd.edu
News of Terrorism and the Israeli-Palestinian Conflict (September 27 – October 9, 2016)
Sexual assault allegations against Donald Trump: more women come forward - Vox
Donald Trump's history of misogyny, sexism, and harassment: a comprehensive review - Vox
Why WikiLeaks hates Hillary Clinton - Vox
Dear Donald Trump: I played in the NFL. Here’s what we really talk about in the locker room. - Vox
The Wiley Handbook of the Psychology of Mass Shootings - Google Books
Disaster Forensics: Understanding Root Cause and Complex Causality - Google Books
Biohacking Start Equipment - Google Groups
Nuclear forensics: a supporting tool for ensuring ..|INIS
Scenarios on Outcomes from Russian Information Operations on the US 2016 Election | Krypt3ia
Marshall Center Transnational Weekly 09 - 15 October 2016 - stczztop@gmail.com - Gmail
bellingcat - Russia was not behind Donald Trump's false Blumenthal-Benghazi claim - bellingcat
A--SHAVE - - Federal Business Opportunities: Opportunities
FossHub
Download qBittorrent
IST-145 RSM - Google Search
Soft Targets and Crisis Management - Google Search
The Wiley Handbook of the Psychology of Mass Shootings - Google Search
Let War Work | The Cipher Brief
WIRED Binge-Watching Guide: Crazy Ex-Girlfriend | WIRED
Corey Cott - YouTube
Corey Cott Newsies Santa Fe - YouTube
Corey Cott - "Grenade" at BROADWAY SINGS BRUNO MARS - YouTube
16 tabs
Copy links to clipboard
Copy
Open
BWW TV: Watch the IN TRANSIT Cast Harmonize in Opening Number! Video
BWW TV Exclusive: WAITRESS Cast Serves It Up at Broadway Sessions! Video
Anthony Rapp @ Feinstein's 54 Below (10/8/2016) "Happiness" - YouTube
Rock Talk: Adam Pascal, Anthony Rapp & Phil Lipof @ 54 Below (10/9/2016) "Open Arms" - YouTube
WIRED Binge-Watching Guide: Catastrophe | WIRED
WIRED Binge-Watching Guide: Agent Carter | WIRED
Red (Team) Analysis - Behind-the-Scenes Summer-Autumn 2016
VIDEO: Miranda Sings Sets HATERS BACK OFF Debut on Netflix Video
EarlyWarning
Personal - Dropbox
Behold the Best Tweets of the Second Presidential Debate | WIRED
Ken Bone and the Best Memes of the Second Presidential Debate | WIRED
Nation State Threat Attribution: a FAQ | Hacks4Pancakes' tisiphone.net
Ministry of National Defence Republic of Lithuania :: News » News Releases
Centre of Gravity: Joining the Dots from Strategic to Tactical Level Plans | Small Wars Journal
Google
16 tabs
Copy links to clipboard
Copy
Open
Whole Artist Management (January 28, 2016) - YouTube
Open Mic (November 12, 2015) - YouTube
Beth Kirkpatrick - Moments in the Woods (Into the Woods) - YouTube
Subscriptions - YouTube
Short Story Long: Ogre & Little Girl - YouTube
Hamilton's America - Extended Trailer - YouTube
KROQ - YouTube
ren598 - YouTube
jenn broadwaynerd - YouTube
katie leepacey - YouTube
rkralles - YouTube
Jennifer Rickerson - YouTube
OBSESSED!: Just in Time for Easter, "Playboy Bunny" Laura Benanti - YouTube
Corey Cott - Santa Fe @ 54 Below Newsies Reunion 8/24/15 - YouTube
"King of New York," Episode 5: Corey Cott Shows Off the "Newsies" Cast's Hidden Talents - YouTube
Corey Cott and Kara Lindsay - "A Whole New World" (ALADDIN/Alan Menken & Tim Rice) - YouTube
28 tabs
Copy links to clipboard
Copy
Open
Espionage and Covert Operations - A Global History : Vejas Gabriel Liulevicius : Free Download & Streaming : Internet Archive
Audio > Audio books - TPB
The Tashlich Prayer - Hebrew - High Holidays
Cast Away Your Sins - Tashlich - High Holidays
Velveteen Rabbi: A prayer for Tashlich
Page not found
Weather Disasters Can Fuel War in Volatile Countries - Scientific American
Citrenbaum, Sara - Outlook Web App
iOS
Drive Oregon puts out the call: They're hiring electric vehicle devotees - Portland Business Journal
Dropbox update brings iMessage app, PDF signing, Today widget | Cult of Mac
Intel replaces 2 Aloha campus sinks, water fountain after lead tests - Portland Business Journal
Eric Dishman is working harder, longer in the name of precision medicine - Portland Business Journal
5 Corporations Now Dominate Our Privatized Intelligence Industry | The Nation
Why Aren't Coalition Forces Planning Raqqa Assault?
Internet Websites and Links for (Counter-)Terrorism Research | Jongman | Perspectives on Terrorism
Biotinkering Berlin (Berlin) | Meetup
Tackle Your Next DIY Project With This $60 Tool Kit, Today Only
These $16 Bluetooth Earbuds Are Perfect For Your New iPhone
Today's Best Deals: Anker Flashlights, Vizio Sound Bars, BOGO Chipotle
(2432) Inoreader - Global Investigative Journalism Network
U.S. Military Operations Are Biggest Motivation for Homegrown Terrorists, FBI Study Finds
Memo Shows What Major Donors Like Goldman Sachs Want From Democratic Party
tashlich prayer - Google Search
Why is Kol Nidrei considered the holiest of Jewish prayers? - High Holidays
The Kol Nidre
prayers for kol nidre - Google Search
Guide to Rosh Hashana: Tashlich
16 tabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
Homeland Security's 'Pre-Crime' Screening Will Never Work - The Atlantic
Military Analysts: Islamic State Would Not Survive Fall of Raqqa | Small Wars Journal
Google Assistant Is a Mega AI Bot That Wants To Be Absoutely Everywhere
Actually, Ken Bone Is Bad
Fact Check Last Night's Presidential Debate With These Roundups
Today's Best Deals: Fire HD 6, Pants For Everyone, Hoover Carpet Steamer, and More
Applying Lessons from Sun Tzu and The Art of War to Everyday Life
How to Survive a Deer or Moose Attack
Animal attacks News, Videos, Reviews and Gossip - Lifehacker
Alfresco » Repository Browser
Nano Sensors Enhancing Warfighters’ Situational Awareness | Defense Update:
Databases, Gateways, Search Engines, Libraries, and Educational Insitutions
Future Attribute Screening Technology - Google Search
EPIC - EPIC v. DHS - FAST Program
We all lie. Will that help catch terrorists? | Toronto Star
10-10
Copy links to clipboard
Copy
Open
HCIL - Visualization
EventFlow: Visual Analysis of Temporal Event Sequences and Advanced Strategies for Healthcare Discovery – HCIL
SEMVAST
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Investigative Analysis and Anomaly Detection - VACCINE - Purdue University
NICAR 2016: QGIS 2
SIGNAL Magazine | - stczztop@gmail.com - Gmail
SIGNAL Content | SIGNAL Magazine
Wearables Find Easy Fit With Police, Troops | SIGNAL Magazine
Download InvestigateIX
Download | Open Semantic Search
Open Semantic Search Appliance (search server VM)
How to install Open Semantic Search Server
Open Semantic Desktop Search: Open source desktop search engine for full text search in documents
GeoJunction: Collaborative Visual-Computational Information Foraging and Contextualization to Support Situation Awareness - Google Search
Mr. Data Converter
Online regex tester and debugger: PHP, PCRE, Python, Golang and JavaScript
Video Surveillance | Security Cameras | Panasonic
greta's gouge
Stage 1 - Log in to Facebook
Visualization Research at WPI
BabyNameWizard.com Signup: Join in the Name Talk! | Baby Name Wizard
SOCMINT - Cloudbreak Analysis
The everyday technology helping terrorists plot evil
The Imager Laboratory for Graphics, Visualization, and HCT
Excentric Labeling for Information Visualization
Excentric Labeling - Noncommercial Use License distribution
Graph Visualization
ManyLists
HCE - Hierarchical Clustering Explorer
HCIL - Products
HCIL - Project Highlights
SINQ
Summary of HCIL Projects in Temporal Visualizations
LifeLines for Visualizing Patient Records
50 Tools to Get the Most Out of Dropbox - Docurated
Electricians Toolbox Etc...
Computer Hardware, Software & IT Solutions | Insight
Fighting Terrorism with Technology | Israel Defense
NATO - Topic: Countering terrorism
Funding Current Funding Opportunities
News - VACCINE - Purdue University
Research Overview - VACCINE - Purdue University
Resources - VACCINE - Purdue University
Trend Identification and Predictive Analytics - VACCINE - Purdue University
New Research Finds Counter-Terrorism TACTICS for European Cities | RAND
Raytheon Cyber
Thinkmap Visual Thesaurus - An online thesaurus and dictionary of over 145,000 words that you explore using an interactive map.
3 new and upcoming open-source investigation tools to check out – First Draft News – Medium
Algorithms in plain English: time complexity and Big-O notation
Phil Bradley's weblog: 1000 social media tools
Police, Detective, Private Investigator and Legal Resources
Investigation Software & Apps | eInvestigator.com
law enforcement social media tools - Google Search
counter terrorism technologies - Google Search
OneTab shared tabs
OneTab shared tabs
Location-Based Intelligence Platform by Geofeedia
GE RFID tech turns stickers into explosives detectors
Publications Publication List
Welcome to the MSFRIC Articles Pagee
Welcome to MSFRIC Bibliographies Page
SortMyBox — Organize your Dropbox
StatLib---Datasets Archive
NCSTL
Just Delete Me | A directory of direct links to delete your account from web services.
HTML Editor
200 Free Textbooks: A Meta Collection | Open Culture
300+ Awesome Free Internet Resources You Should Know
Design & Code - Growth Supply
Signature Maker - Create your electronic signature online
The 101 Most Useful Websites on the Internet
How-to Guides and Software Tutorials
GlyphSearch: Search for icons from Font Awesome, Foundation, Glyphicons, IcoMoon, Ionicons, Material Design, and Octicons
The Name App | Find an available name for your brilliant idea
Open Site Explorer: Link Research & Backlink Checker | Moz
Fontello - icon fonts generator
Release Material Design Icons · google/material-design-icons · GitHub
easy, fast, free image and file hosting
Federal Bureau of Investigation
NCSTL
NCSTL
Predict Social Unrest - Google Scholar
Predict Social Unres - Google Search
Big Data Help CIA Predict Social Unrest 5 Days Before It Begins : TECH : Tech Times
A Mathematical Formula Predicted Today's Worldwide Protests Over a Year Ago
Home
Daring Deal - Features - Magazine - GovExec.com
100+ Tried & True Problem-Solving Tools - Partnering Resources
The Structure of a Good SWOT - How to do it Right | SMI
IAVO Research and Scientific: Products
Food and Agriculture Organization of the United Nations: Country Profiles
Princeton University Library Catalog
Sociometrics | Princeton University Library
Data Science Central
Statistical Sources and Web Sites - POL 347 Conflict Analysis and Resolution - LibGuides at Stonehill College
mil aul guides Terrorist Soft Targets - Google Search
Books and Documents - Terrorist Soft Targets - The FRIC LibGuides at Muir S. Fairchild Research Information Center
Terrorism and Soft Targets Guide - HL
Soft Targets Bib - CyberSecurity
CyberSecurity
Journalist's Toolbox | A Society of Professional Journalists Blog
Mailinator
Personal - Dropbox
HTML Instant : Real-Time HTML Editor
Save paper & ink printing only what you want « PrintWhatYouLike.com
10 Websites to Make Your Life Easier – Johnny Lists
Otixo: Organize, Share and Encrypt Files across Clouds
HTML Mail - Design and Send Responsive Emails Online
Tagaholic - Machine Tagging With Delicious
Spicynodes : Cooking with SpicyNodes
Favorite and Forget
Johnny Lists – Page 11
MSFRIC Subject Resource Guides
Publications Publication List
Free GIS Datasets - Categorised List
Nuclear power stations worldwide - Google Fusion Tables
Intelligence, Surveillance, and Reconnaissance (ISR) Operations Guide - AL
Open Data
Terrorist Screening Database - Data.gov
PortlandMaps
Home | City of Portland, Oregon
Hedonometer
Data Resources: Conflicts, Wars, Terrorism
Portland/Oregon Data - Geography - Research Guides at Portland Community College
Maps, GIS & Open Data | The City of Portland, Oregon
COPS Office: Grants and Resources for Community Policing
Research Desk: Open Data Guides, Migration, Terrorism | Global Investigative Journalism Network
Open Data Network
Population Count Data for Portland Metro Area (OR-WA) - Population on the Open Data Network
Military Strategy for a Twitter War
Home - Data Portals
Computational Event Data System
face.com
Research Desk: Weather Disasters, Population, ICT | Global Investigative Journalism Network
Search for * | City of Portland, Oregon
DARPA - Open Catalog
Home | the DC GIS Open Data Site
Open Data Resources
Data Catalogs | Open Government Data
Phoenix Data Project
SNAP: Higher-order organization of complex networks
UCDP - Uppsala Conflict Data Program
Africa Data | ACLED
Home | CivicApps.org
Datasets | CivicApps.org
Garbage Collection Schedule Areas | CivicApps.org
GEOFABRIK // Downloads
Data Sources | NNIP
Open Data | NNIP
Open Data | NNIP
Open Data | NNIP
Catalog | NNIP
Ignite Showcase September 2016: Part I | NNIP
Publications Publication List
Teaching Terror Annotated Bibliography
Dark Motives Online: An Analysis of Overlapping Technologies Used by Cybercriminals and Terrorist Organizations - Security News - Trend Micro USA
USGS Projects in Afghanistan
USGS Projects in Afghanistan » Hyperspectral Data
Million Song Dataset - AWS Public Data Set
Jure Leskovec: Videos of talks and tutorials
NYC Open Data
City of Portland Open Data Initiative - Datasets - the Datahub
DuckDuckGo
see what's happening | etrigg.com
NYS GIS Clearinghouse
NYC Open Data
Open Data, Open Source, and the City of Portland | Opensource.com
ArcGIS
COPS Office: Grants and Resources for Community Policing
COPS Office: Grants and Resources for Community Policing
Data
Google Public Data Explorer
Terrorist Screening Database - Google Search
portland or open data - Google Search
Data: Humanitarian Data Exchange | HumanitarianResponse
City financial data
Population Count Data for Portland, OR - Population on the Open Data Network
Population Count Data for Washington Metro Area (DC-VA-MD-WV) - Population on the Open Data Network
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 3 - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
European Commission : CORDIS : Projects & Results Service : PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts
European Commission : CORDIS : Projects & Results Service : Terrorism detectors
European Commission : CORDIS : Projects & Results Service : Final Report Summary - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
CORDIS Archive : European Commission : CORDIS : FP7 : ICT : Future and emerging technologies (FET)
SUPER-FP7 | Social sensors for security assessments and proactive emergencies management
Innovative Lie Detector | EyeDetect Lie Detection
HDIAC.org |
Biometrics | HDIAC.org
Informational Resources | HDIAC.org
Biometrics Institute
HDIAC Journal Archive | HDIAC.org
Jure Leskovec: Publications
Improvised Threats Organization Becomes Part of Defense Threat Reduction Agency > U.S. DEPARTMENT OF DEFENSE > Article
Scientific tools & databases - European Commission
Special Report: Science and Technology
ARGOS Project: Short Wave Infrared (SWIR) imaging
Lie Detection Solution | Lie Detector Services
Lie Detector Tests | EyeDetect by Converus
Law Enforcement - Converus EyeDetect
Science Team | Converus
Screen Refugees, Find Terrorists by Monitoring Eye Behavior, Says Lie Detection Tech Co. - Converus EyeDetect
European Commission : CORDIS : Projects & Results Service : Periodic Report Summary 2 - PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts)
SUPER
Homeland Defense: Novel Radiation Surveillance Technology Could Help Thwart Nuclear Terrorism | Georgia Tech Research Institute
Table of Contents — March 2014, 51 (2)
The analytical study of terrorism
Dataset
A Startup Wants to Use Eye Tracking to Detect If Syrian Refugees Are Terrorists | Motherboard
GE develops battery-free RFID tags
Antiterrorism equipment, metall detector, IED
VSTEP EyeObserve - Camera Operator Trainer | VSTEP
The Defense Forensics & Biometrics Agency (DFBA) - Home
ARGOS Clustering with PROACTIVE Project
Dissemination Material
Public Deliverables
PUBLICATIONS
Council for Scientific and Industrial Research develops contactless fingerprinting device | BiometricUpdate
DHS considering expanding biometric data collection at US borders | BiometricUpdate
Researchers train software to recognize pixelated faces | BiometricUpdate
SIGMA
Defense Threat Reduction Agency > Missions > WMD Training and Education > VIRTUS
Weapons Complex Monitor Vol. 27 No. 26 - ExchangeMonitor
Homeland Security Today: Threat of Nuke Terrorism Drives Radiation Detection Market, Analysis Says
SIBAssoc
Predictive profiling - Wikipedia, the free encyclopedia
McCreadie: SUPER: Towards the use of Social Sensors... - Google Scholar
U.S. Army Research, Development and Engineering Command | RDECOM
An Approach to Intelligent Information Fusion in Sensor Saturated Urban Environments
The Evolving Challenges for Explosive Detection in the Aviation Sector and Beyond | Combating Terrorism Center at West Point
An approach to intelligent information fusion in sensor saturated urban environments. - Google Search
Biometric Image Sensing - Google Search
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. - Google Search
OGC sensor web enablement: Overview and High Level Architecture - Google Search
Social sensors for security assessments and proactive emergencies management - Google Search
Terrorism detectors - Google Search
fp7 proactive eu - Google Search
Highlight: Improvised Threats Organization Becomes Part of Defense Threat Reduction Agency | HDIAC.org
Cross-Spectral Face Verification in the Short Wave Infrared (SWIR) Band. | HDIAC.org
Volume: 3 Issue: 2 | HDIAC.org
Detecting Terrorist Surveillance | Stratfor
MacScripter
Dan Rodney's List of Mac Keyboard Shortcuts & Keystrokes
StrategyPage | Military News Humor Photos
greta's gouge: Friday's Miscellany 10-07-2016
'West Wing' Cast Reunites 10 Years After Series Finale For Exclusive Interview (Full) | TODAY - YouTube
JewBelong
I SPY DOC
XKeyscore - IC OFF THE RECORD
List of government mass surveillance projects - Wikipedia, the free encyclopedia
BuzzFeed News
LOL Feed (lol) on BuzzFeed
GitHub - MISP/misp-taxonomies: Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Bradley Whitford & Allison Janney Are All Over Each Other - YouTube
Walk-and-Talk Monologue (w/ Allison Janney & Bradley Whitford) - YouTube
'The Grand Tour' Grand Racing Quiz - YouTube
Here’s A Bunch Of Things Donald Trump Got Wrong At The Debate - BuzzFeed News
Begin-Sadat Center for Strategic Studies
Maps Mania: Sky View
Next Reality » AR, VR, & MR News - Watching Technology Redefine Reality
Migrant workers bear the brunt of Saudi's archaic kafala system | Middle East Eye
Predicting Physical Features and Diseases by DNA Analysis: Current Advances and Future Challenges | Open Access Journals
DHS AWARDS $494.7M TO RAND CORP TO OPERATE STUDY & ANALYSIS CENTER | Homeland Security
News Release: DHS S&T Selects 10 Start-Ups for First Responder Innovation | Homeland Security
John Oliver Destroys Pussy Grabbing Warthog Donald Trump October 9 2016 (HBO) - YouTube
xkeyscore - Google Search
XKeyscore - Wikipedia, the free encyclopedia
Marc Ambinder (@marcambinder) | Twitter
SOG: GEOINT/CQB/H2H (@UZIEL_CQC) | Twitter
(310) #LockerRoomTalkIn5Words hashtag on Twitter
(17) @stczzop/***** on Twitter
All Stories by Marc Ambinder - The Atlantic
An Educated Guess About How the NSA Is Structured - The Atlantic
Marc Ambinder
File:XKeyscore presentation from 2008.pdf - Wikipedia, the free encyclopedia
XKEYSCORE: NSA’s Google for the World’s Private Communications
NSA XKeyscore surveillance program details revealed in new Snowden documents - Business Insider
Inside Palantir, Silicon Valley's Most Secretive Company - BuzzFeed News
Confidential Document Shows How Peter Thiel Really Feels About Palantir - BuzzFeed News
Well, That Was Easily The Craziest And Most Surreal Debate In Modern History - BuzzFeed News
23 Tweets That Will Make Carb Lovers Laugh Harder Than They Should
31 Insanely Easy And Clever DIY Projects
23 Struggles Curly-Haired Girls Know Too Well
Just 27 Really, Really Good Tweets About Debate Hero Ken Bone - BuzzFeed News
This Twitter Parody Account Keeps Predicting Political Events And It's Scary - BuzzFeed News
BuzzFeed Buzz
27 Tweets About Tonight’s Debate That’ll Make You Laugh, Then Stare Blankly Into The Dark Void
What do Palantir employees think of BuzzFeed's article? - Quora
Vox.com | Explain the news
Notes on the garbage fire that is American politics - Vox
Donald Trump couldn’t stop lurking behind Hillary Clinton, and it ruined his night - Vox
The entire Donald Trump family tree, in one graphic - Vox
The Funniest Tweets on The Second Presidential Debate - Vogue
The 22 Funniest Tweets About the First Presidential Debate
The Funniest Internet Reactions To Sunday Night’s Presidential Debate
Debate giggles: 16 funniest tweets - CNN.com
This Muslim Professor's Clapback Was Perhaps The Funniest Tweet Of The Debate - BuzzFeed News
Donald Trump Is Now So Toxic Even This Parody Twitter Account Can't Deal - BuzzFeed News
Kred | The Home of Influence
Social Media Monitoring Tools - How to Pick The Right One | Convince and Convert: Social Media Consulting and Content Marketing Consulting
Guide to monitoring social media conversations | Socialbrite
A Taxonomy of OSINT Sources - Google Search
Taxonomy of OSINT Sources – i-intelligence
Study of social networking technologies Social networking analysis in a counter- insurgency context - Google Search
GraphCT – Streaming Graph Analysis
OODA loop - Wikipedia, the free encyclopedia
Page not Found | Artificial Intelligence Laboratory
Saved Session - Session Buddy
Technical assistance tools
The Role of Technology in Modern Terrorism
NATO - Science for Peace and Security
[OFFICIAL] KeepVid: Download YouTube Videos, Facebook, Vimeo, Twitch.Tv, Dailymotion, Youku, Tudou, Metacafe and more!
Types of Nuclear Weapons: CTBTO Preparatory Commission
Security Tools
Search WikiLeaks
Location, Sensors, Voice, Photos?! Spotify Just Got Real Creepy With The Data It Collects On You
Meet the GynePunks Pushing the Boundaries of DIY Gynecology | Motherboard
A Look at Terrorist Behavior: How They Prepare, Where They Strike | National Institute of Justice
Paulo Shakarian | Arizona State University - Academia.edu
Rosh Hashanah REBOOT | Oregon Jewish Life
Tetra Tech Receives $400 Million Contract From US Department of Energy (NASDAQ: TTEK) - 24/7 Wall St.
html2text: THE ASCIINATOR (aka html2txt)
OneTab shared tabs
Hack In The Box Security Conference
BioPharmaAmbition 2016 and first MIT Health Hackathon
Nearly 60 percent of US smartphone owners use phones to manage health | MobiHealthNews
Monitoring and Feedback for Long-term Weight Loss | Lifestyle Behaviors | JAMA | The JAMA Network
HackUMass lV
MDP Hackathon
Hack-A-Thon | SOAR
MIT Hacking Medicine
Reality guide: How everything fits together | New Scientist
Secure Account - Account Settings
How to transfer data from your old iPhone to your new iPhone 7 | iMore
How to Set Up Your New iPhone 7 | WIRED
iPhone 7 With Trade-in Offer - Wireless Support
New York police department deploys new counter-terrorism unit - Diaspora - Jerusalem Post
Counterterrorism Night Fighting Principles Workshop | Condition Gray
Terrorism and counterterrorism | Homeland Security News Wire
What FBI, police are doing to prevent terror attacks - The San Diego Union-Tribune
Meet NYPD’s counterterrorism K-9 unit | New York's PIX11 / WPIX-TV
Global Engagement Center
The Instruments of Counterterrorism
NATO - Official text: NATO’s policy guidelines on counter-terrorism , 21-May.-2012
The Future of Anti-Terrorism Technologies
Anti-terror measures: How tech helps fight the counter-terrorism war | IT PRO
Terrorism and Counterterrorism | edX
Counterterrorism | National Nuclear Security Administration | (NNSA)
UN Counterterrorism Framework: Key Programs and Tools | Charity & Security Network
Global Counterterrorism Forum Co-Chairs' Fact Sheet: The Deliverables
RAND Benchmark | Measure Law Enforcement Officer Performance...Fairly and Accurately
CIASavedLives
Watch A 3 Hour Movie In 2 Hours + You Get More Time - Efficiency Is Everything
The data set Terrorism in Western Europe: Events Data, or TWEED for short, was constructed and collected for the purpose of analysing patterns of terrorism in Western Europe as related to historical and structural preconditions (see Jan Oskar Engene: Eur
Mac Guides - Mac Tutorials, Product Guides and More...
IEEE Xplore Document - Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards
IEEE Xplore Document - A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts
IEEE Xplore Document - Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: GREAT OSINT RESEARCH SOURCES! - WEEK OF 12/12/14
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: 6 OSINT RESOURCES ON IRAN'S PURSUIT OF NUCLEAR WEAPONS
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: THIS NEWSLETTER IS ALL ABOUT WEBSITES ON TERRORISM, NATIONAL SECURITY & RADICAL ISLAM
Terrorism and Political Violence :
About the Correlates of War Project — Corelates of War
urn:nbn:se:kth:diva-89582 : Using Temporal Analytics for Early Discovery of Upcoming Threats
Unmasked: the far-right blogger idolised by Breivik | The Independent
The State of the American Surveillance State and... - Matthew Aid
RDWTI | RAND
Local Police Using CIA-funded Software to Track All Citizens' Social Media Posts
CCI Blog » Blog Archive » Internet Search Links for October 2016 #OSINT
CCI Blog » Blog Archive » Recovering from Identity Theft
Biodefense Headlines – October 9, 2016
Johan Dahlin - Google Scholar Citations
Renee Marlin-Bennett - Google Scholar Citations
Christian Mårtenson - Google Scholar Citations
Dahlin: Combining entity matching techniques for... - Google Scholar
Gustavi: A tool for generating, structuring, and... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Dahlin: Combining entity matching techniques for... - Google Scholar
Johansson: Timeprints for identifying social media... - Google Scholar
Teljstedt: A semi-automatic approach for labeling... - Google Scholar
Brynielsson: Harvesting and analysis of weak signals... - Google Scholar
hematologyoncologyoutlines - hemoncoutlines
A Semi-automatic Approach for Labeling Large Amounts of Automated and Non-automated Social Media User Accounts - Google Search
Analysis of Weak Signals for Detecting Lone Wolf Terrorists - Google Search
Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards, - Google Search
Everyday rules and embodied information: anti-money laundering/counter-terrorist financing practices and radio frequency identification tags as security politics - Google Search
International Terrorism: Attributes of Terrorist Events - Google Search
On the Feasibility of Internet-Scale Author Identification - Google Search
Operation Southern Cross - Google Search
The 9/11 Effect: Comparative Counter-Terrorism. - Google Search
The Role of Warning Behaviors in Threat Assessment - Google Search
The Analytical Study of Terrorism: Taking Stock - Google Search
Understanding Lone Wolf Terrorism Global Patterns, Motivations and Preventions - Google Search
Using Temporal Analytics for Early Discovery of Upcoming Threats - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj854fl8s_PAhVM52MKHevGBlQQFggjMAA&url=http%3A%2F%2Frandomwalker.info%2Fpublications%2Fauthor-identification-draft.pdf&usg=AFQjCNEJqt1oo3x3uHgxvQ1URFQ__h4A5A&sig2=y9uqqMnkXsQc0M85aYm9_Q&cad=rja
The Year in Hate and Extremism | Southern Poverty Law Center
Electronic Weapons: How FM Signals Can Kill
Center for Terrorism & Security Studies | UMass Lowell
Live Fact Checking The 2nd Clinton-Trump Debate | CPR
ExtraTorrentRG - TPB
Lion.King - TPB
DHS Emerging Risk to Infrastructure from Unmanned Aerial Vehicles (UAVs) | Public Intelligence
2nd presidential debate transcript: live updates from Hillary Clinton and Donald Trump’s face-off - Vox
e-Books (Microbiology & Immunology) - Microbiology and Immunology for Medical Students: Course Guide - Research Guides at Tulane University
Sherris Medical Microbiology : Free Download & Streaming : Internet Archive
Community Texts : Free Books : Free Texts : Download & Streaming : Internet Archive
From Dropbox to iCloud Drive: a review and some thoughts – Finer Things in Tech
Sunday's Best Deals: Tailgating Gear, Rowing Machine, $3 Kindle Books, and More
Messages Apps and Sticker Packs Roundup – MacStories
U.S. Secret Service Training Guide: Characteristics of the Armed Individual | Public Intelligence
30 Quick Takes on Debate 2 – Medium
Natural Hair Coloring (2016) (Pdf) Gooner (download torrent) - TPB
The Day's Most Fascinating News with Dave Pell
Sixteen Quick Thoughts on Pussy-gate – Medium
News
Put Magic in Your Messages With Disney iMessage Stickers
Send Some Love With Adorable Character Stickers for iMessage
Message Collections
The Best Non-Sticker iMessage Apps
Wayfair.com - Online Home Store for Furniture, Decor, Outdoors & More | Wayfair
Portable Battery Packs For Your Laptop Are Finally a Reality
D.C. City Council Owns Self
5 Top Tips and Tools For the Social Media Reporter
News You Can Use: 10/07/16 | Arthur D. Simons Center
Top CIA officers to face questions about brutal interrogations in civil suit - The Washington Post
Artificial Intelligence, real-life applications - CBS News
Meet the Man Reinventing CIA for the Big Data Era - Defense One
iMessage, metadata, and law enforcement: What you need to know! | iMore
Terror-Events.com – Tracking terror events and victims all over the world
Community Texts : Free Books : Free Texts : Download & Streaming : Internet Archive
Today / Me
Grumpy Stickers on the App Store
Snappy Browser - send links and quotes on the App Store
Inbox (338) - scitrenbaum@gmail.com - Gmail
Defense Intelligence Agency | Public Intelligence
Intelligence Advanced Research Projects Agency | Public Intelligence
Open Source Center | Public Intelligence
Amazon.com: [Apple MFI Certified] Jackery Bolt 6,000 mAh Ultra-Compact External Battery Charger, Portable Power Bank and Travel Charger with Built-in Lightning & Micro USB Cables (Black): Cell Phones & Accessories
Digital Innovation — Central Intelligence Agency
VICE News watches the debate so you don't have to
Saved Session - Session Buddy
10-09
Copy links to clipboard
Copy
Open
You Dumb Motherfuckers, By James Madison | The Yale Record
Top 10 Browser Extensions that Eliminate Web Annoyances
The CIA Says It Can Predict Social Unrest as Early as 3 to 5 Days Out - Defense One
Otaku Ninja on the App Store
Trash Doves on the App Store
A Wiki of Social Media Monitoring Solutions
EQ-Radio: Emotion Recognition using Wireless Signals
The Good Place - Previously.TV Forums
Popular Photo-Altering App Prisma Will Now Transform Your Videos Into Wild, Otherworldly Scenes - BuzzFeed News
How Can Foreign Policy Survive Trump? Look to the CIA | Overt Action | Research, analysis, & debate on critical intelligence challenges
iOS 10 Widgets Are Great: Here's How to Put Them to Good Use
4 Best Free Mac Preview Alternatives for Reading PDFs
DARPA’s Microsystems Technology Offers Companies with Limited or No Experience Working with the Government
Election 2016: The International Issues | RAND
Latest Threatening Communique from the Islamic State | Terror Trends Bulletin
Semantics — What does data science reveal about Clinton and Trump ? – Reputation Squad – Medium
7 Google Chrome Alternatives That Will Make You More Productive – Product Hunt – Medium
1000 Life Hacks
FotoForensics
Comcast Is Rolling Out 1TB Data Caps to a Lot More People On November 1st
Everything Google Announced at Its "Made By Google" Event that Actually Matters
How to Stream the Second Presidential Debate Online, No Cable Required
Instantly Reset Your Mac's Dock to Default with a Terminal Command
WiFox Puts Thousands of Airport Wi-Fi Networks and Their Passwords On Your Phone
Paper-based FRET for direct detection of collagen triple helix - Journal of Materials Chemistry B (RSC Publishing)
Silicon Florist links arrangement for October 7, 2016 « Silicon Florist
MacStories Weekly: Issue 51
Lose It! Now Tracks Your Diet by Snapping Photos of Your Food
Apple Offers INKS. as a Free Download via the Apple Store App - iClarified
7090 - Combating Terrorism Technical Support Office (CTTSO) APBI
At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit - The New York Times
Audio: Pasadena company snags contract to expand nuclear monitoring | 89.3 KPCC
Science startups make research faster, cheaper, more accurate - The Globe and Mail
DASHlink - Projects
NNSA, Bulgaria complete implementation of nuclear detection systems - Homeland Preparedness News
(26) Stefano R L Campana | University of Siena - Academia.edu
Fred Meyer
41 tabs
Copy links to clipboard
Copy
Open
Best Apps With Photo Effects & Filters
Best Remote Desktop Apps
TableFlip: the cure for Markdown table editing - BrettTerpstra.com
Assign Keyboard Shortcuts to Avoid Ambiguity « Doug's AppleScripts for iTunes
Zoomable tree of all life on Earth
We Need to Save the Internet from the Internet of Things | Motherboard
Goals Scored Picks *** Friday *** 7 October 2016
DARPA MTP Commercial Performer Program Announcement | Contract Research and Development
AFRL Advanced Cyber, SIGINT and Personal Communications Collection and Exploitation BAA | Contract Research and Development
4 Free Large File Viewer To Open Very Large Text Files
Flower Recognition iPhone App from Microsoft Garage
Bookmarking Service with Auto Categorization, Sync Across Devices
How To Bulk Unlike Facebook Pages
Mac Kung Fu: Thoroughly testing your Mac's RAM – an up-to-date how to (2016; macOS Sierra-tested)
Watch Kristin Chenoweth Duet with James Corden on Late Night | Playbill
Flashback! Relive BroadwayCon’s Epic Finale With Lena Hall, Lesli Margherita and More | Playbill
Social Explorer
OpenWERX - SOFWERX
Best Free Digital Image Viewer | Gizmo's Freeware
Unfridgeworthy: Interstellar
[1609.09761] Detecting Cognitive Appraisals from Facial Expressions for Interest Recognition
[1610.01578] A new algorithm for identity verification based on the analysis of a handwritten dynamic signature
[1610.01670] The Gun Violence Database
gun-violence.org
Social and Information Networks authors/titles recent submissions
DHS to Host Strategic Industry Conversation
DTRA-Backed Ebola Vaccine Moves Closer to Being Licensed
On Grant Rejection Affect: A Treatment Case Study | SAS Confidential
CBRNE Articles | Global Biodefense
(11) #phdchat hashtag on Twitter
Methamphetamine or amphetamine abuse linked to higher risk of Parkinson’s disease | National Institute on Drug Abuse (NIDA)
DrugFacts: Methamphetamine | National Institute on Drug Abuse (NIDA)
3-Minute Thesis - Google Search
SUNRISE DIVE analytics - Google Search
Cybercrime Roundup: A Pivot to Asia in Espionage Prosecutions - Lawfare
TableFlip Takes the Pain Out of MultiMarkdown Tables – MacStories
Kid Theater with Ben Affleck - YouTube
AngelsBwayTunes - YouTube
BROADWAY SESSIONS - YouTube
'Bring Him Home', John Owen-Jones - BBC Proms in the Park NI 2016 - YouTube
Adobe Add-ons
Gordon
Copy links to clipboard
Copy
Open
Excellent Tektronix P6015 High Voltage Probe | eBay
Amazon.com Shopping Cart
Checkaflip - Buy Low, Sell High
General Radio Equipment
General Radio Historic Manuals
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
GSI 16 Clinical Audiometer System with Accessories User Manual Grason Stadler | eBay
10-06
Copy links to clipboard
Copy
Open
IEEE Xplore Document - Visual Analytics of Political Networks from Face-tracking of News Video
Patent US9454785 - Systems and user interfaces for holistic, data-driven investigation of bad ... - Google Patents
Patents by Assignee Palantir Technologies - Justia Patents Search
United States Patent: 9454785
inassignee:"Palantir Technologies Inc." - Google Search
United States Patent and Trademark Office
US2005014363 FORECASTING DATA WITH REAL-TIME UPDATES
Patent WO2005104736A3 - Forecasting data with real-time updates - Google Patents
IEEE Xplore Document - Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks
European Journal of Futures Research - Springer
Virus trading cards
Tabletop Whale's guide to making GIFs
Home - Nerdcore Medical
Human Factors and the U.S. Department of Homeland Security | The Human Factor Advocate
9 Tricks to Appear Smart in Brainstorming Meetings – The Cooper Review – Medium
An important update to your XFINITY Internet service - scitrenbaum@gmail.com - Gmail
Virtual Interactive Bacteriology Laboratory
ICE: Information Credibility Evaluation on Social Media via Representation Learn
Electrochimica Acta - ScienceDirect.com
(De)constructing difference: a qualitative review of the ‘othering’ of UK Muslim communities, extremism, soft harms, and Twitter analytics: Behavioral Sciences of Terrorism and Political Aggression: Vol 0, No 0
(11783) Inoreader - The Best Apps for Wikipedia on iOS
The Best Apps for Reading Wikipedia on iOS
Papaly | Start Page
Little Shop of Horrors - 2015 Encores! Off-Center Concert - YouTube
macOS Automation
The Nationwide Network Working to Bring Mobile Biometrics to Your Community | Public Intelligence
NYPD Operations Order 34: Use of Social Networks for Investigative Purposes | Public Intelligence
New York | Public Intelligence
Social Media | Public Intelligence
Social Networking | Public Intelligence
Department of Homeland Security | Public Intelligence
Cultural Intelligence | Public Intelligence
Agenda | DIA Innovation Day 2013
New surveillance technology can track everyone in an area for several hours at a time - The Washington Post
Wide-area surveillance technology triggers privacy concerns | PBS NewsHour
AppleScript: The Language of Automation
Methamphetamine | National Institute on Drug Abuse (NIDA)
GitHub - threatcrowd/ApiV2: Version 2 of the ThreatCrowd API
[1610.01790] Predicting encounter and colocation events in metropolitan areas
DHS Social Network Analysis, Behavioral Threat Detection, Biometrics Presentation | Public Intelligence
The Schuyler Sisters Music Video - Hamilton Broadway Musical in Real Life - YouTube
Police Accountability: Last Week Tonight with John Oliver (HBO) - YouTube
FamousInNY - YouTube
Advanced Analytic Techniques: Serotonin Modulates Behavioral Reactions to Unfairness
Best Apps To Store And Share Large Files
apple photos extensions - Google Search
apple photos duplicates - Google Search
what is the easiest way to delete duplicate photos | Official Apple Support Communities
Removing duplicate pictures from the Photos app on Mac with Photos Duplicate Cleaner
Photos Duplicate Cleaner on the Mac App Store
How-To: Safely shrink your Mac’s giant photo library, deleting duplicate images to save space | 9to5Mac
PhotoSweeper - Fast and powerful duplicate photo cleaner for the Mac - Overmacs Team
How to Supercharge Your Apple Photos Workflow With Extensions
workerbee - TPB
The All New DEVONthink To Go for iOS
New ebook packs for August 2016 (download torrent) - TPB
FAQ
Audio > Music - TPB
Billboard Mainstream Top 40 15-Oct-2016 (download torrent) - TPB
Sum 41 - 13 Voices (Deluxe) (2016) (download torrent) - TPB
tbohana - TPB
Our Solution Suite | Crime Tech Solutions
Intellectual Property - Investigative Dashboard
Watch Speechless Online - P-I-PILOT | Hulu
A field guide to dangerous bacteria
threatcrowd · GitHub
Patent US20100295717 - Weapon detection and elimination system - Google Patents
VIS. Visual Investigative Scenarios platform: Users
Is Your Big Data Project a “Weapon of Math Destruction”? - IEEE Spectrum
Critical infrastructure protection
InfoGram EMR-ISAC - Google Search
Investigative Reporters and Editors | Tipsheets
Office Supplies, Furniture, Technology at Office Depot
RAND Corp. Chosen to Operate New Research Center for U.S. Department of Homeland Security | RAND
SIGNAL Magazine |
Search Grants | GRANTS.GOV
Centers of Excellence | Homeland Security
10-05
Copy links to clipboard
Copy
Open
A social media and crowd-sourcing data mining system for crime prevention during and post-crisis situations: Journal of Systems and Information Technology: Vol 18, No 4
Where has this tweet come from? Fast and fine-grained geolocalization of non-geotagged tweets | SpringerLink
START launches online course on terror-crime nexus and CBRN | START.umd.edu
Terrorist planning and success rates; Case study in radicalization; Strategies to limit groups’ lethality | START.umd.edu
Intelligence Collection 101: Signatures – Vetted Intelligence
DD0S: Posters From Walls To Legitimate Weapon Of War and Its Possible Use Scenarios | Krypt3ia
dblp: Themis Palpanas
Private Sector Resources Catalog | Homeland Security
Proper Application of ADR Techniques regarding Violent Non-State Actors Notes 31 Ohio State Journal on Dispute Resolution 2016
Developing expert political judgment: The impact of training and practice on judgmental accuracy in geopolitical forecasting tournaments
Modeling of urban change using remote sensing data and cellular automata technique | SpringerLink
A Novel Direct and Cost Effective Fabrication of Paper-Based Microfluidic Device by Commerical Eye
Risk assessment of high schools in Lebanon for potential terrorist threat: International Journal of Disaster Resilience in the Built Environment: Vol 7, No 5
Risk assessment of high schools in Lebanon for potential terrorist threat - Google Search
A social media and crowd-sourcing data mining system for crime prevention during and post-crisis situations - Google Search
Where has this tweet come from? Fast and fine-grained geolocalization of non-geotagged tweets - Google Search
Publicly Available Social Media Monitoring and Situational Awareness Initiative - Google Search
Privacy Documents for the Office of Operations Coordination (OPS) | Homeland Security
System of Records Notices (SORNs) | Homeland Security
IS-60.A: The Homeland Security Geospatial Concept-of-Operations (GeoCONOPS) for Planners and Decision Makers | FEMA - Emergency Management Institute (EMI) Course
Homeland Security |
Journal Articles - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
National Security | www.ara.com
Defense Technical Information Center
Public Technical Reports Thesaurus Source
Home - Counterinsurgency Strategy - NATO LibGuides at NATO Multimedia Library
Home - Hybrid Warfare - NATO LibGuides at NATO Multimedia Library
Multiple hypothesis tracking for data association in vehicular networks
Fighting Iran: Intelligence Support During Operation Earnest Will, 1987–88 — Central Intelligence Agency
Why Bad Things Happen to Good Analysts — Central Intelligence Agency
Social Media Use in Emergencies
Mexican Cartel Tactical Note #21 | Small Wars Journal
Drone Fear and the FAA Ban on Model Aircraft Near Stadiums
FAA List Of Reported Drone Incidents Indicates A Problem. But It's Not What You Think.
Pseudo-Wisdom and Intelligence Failures - Google Search
Pseudo-Wisdom and Intelligence Failures: International Journal of Intelligence and CounterIntelligence: Vol 23, No 1
Semantic Scholar
Here's How To Use Google Play Music From a Desktop App
This Is A Real Tweet From The Russian Embassy In The United States
Databases and Articles | Portland State University Library
All the Things You Can Do With Google Assistant That You Couldn't Do Before
This Infographic Shows the Common Ways Scammers Try to Phish Your Account
An Incredible Thing Dogs Can Do With Their Noses: Tell Time -- Science of Us
Hack away the weekend with Portland Science Hack Day and Hack Oregon « Silicon Florist
At least you can wear your skinny jeans on Thursday
Digital World Biology News October 2016
Contract Research and Development | R&D Business Opportunity Abstracts
DARPA Strategic Technologies BAA | Contract Research and Development
CSIA
www.darpa.mil/program/hypersonic-air-breathing-weapon-concept
Mr. Mark Gustafson
The Sorry, Dangerous State of NJ Transit - by Harry Zieve Cohen
Charlie Brown to Stop Running Toward Football. Maybe. - by Walter Russell Mead
Inderscience Online
Biosensors | Free Full-Text | Biosensing with Paper-Based Miniaturized Printed Electrodes–A Modern Trend | HTML
Sensors | Special Issue : Enabling the Move from Wireless Sensor Networks to Internet of Things and Cyber-Physical Systems
U.S. Army Leaders Warn About Russia's Bold Moves in Information Warfare - Blog
OneTab shared tabs
OneTab shared tabs
Organization formalization, sector and social media: Does increased standardization of policy broaden and deepen social media use in organizations?
Analysis & Decision Systems - Systems & Technology Research
Intelligence Tools & Applications - Systems & Technology Research
Sensors & Signal Processing - Systems & Technology Research
The Daily Beast
NSA Thief Worked With Elite Hacker Squad - The Daily Beast
Rudy Giuliani Used to Know Better - The Daily Beast
Trump Takes ‘Credit’ for Pence’s Debate Performance - The Daily Beast
‘Immense Human Suffering’ Predicted as Hurricane Matthew Approaches - The Daily Beast
A DIY Venue in Toronto Has Started Carrying Overdose Kits On-Site | VICE | Canada
Inside the Covert War In Ukraine | VICE | Canada
Alfresco » Login
[1609.09546] Dynamic Models of Appraisal Networks Explaining Collective Learning
[1610.00054] Outlier Detection from Network Data with Subnetwork Interpretation
[1610.01381] The Predictive Context Tree: Predicting Contexts and Interactions
Findo
SiriusXM Streaming Radio: Listen Now | SiriusXM Radio
Alfresco » Site Dashboard
Vol. 60 No. 3 — Central Intelligence Agency
Crowd-Sourced Intelligence from Social Media - Google Search
OODA Loop - DHS Issues Alert on U.S. Election Hacking
OODA Loop - Armed Drone Export Standards Sought by U.S. and Dozens of Allies
OODA Loop - CIA Can Anticipate Social Unrest ‘Three to Five Days’ Out in Some Cases
OODA Loop - N.S.A. Contractor Arrested in Possible New Theft of Secrets
Home Feed
Early development reveals axolotl mysteries -- ScienceDaily
Dead Drop: September 30 | The Cipher Brief
34 tabs
Copy links to clipboard
Copy
Open
bellerphon - Google Search
Findo
Forums - Previously.TV Forums
VIS. Visual Investigative Scenarios platform: Pages
Digital Public Library of America » Select Collections Available for Re-use
Quickdata
Useful Stuff | ResearchBuzz: Firehose | Page 2
Insight Maker | Free Simulation and Modeling in your Browser
19 Useful Google Apps Scripts to Automate Google Drive - Hongkiat
American Babe: A White Girl Problems Book: Babe Walker: 9781501124846: AmazonSmile: Books
The Wonder Trail: True Stories from Los Angeles to the End of the World: Steve Hely: 9780525955016: AmazonSmile: Books
Awesomely Luvvie | Best Humor Blog EVER. Serving Pop Culture Tea.
S03.E02: God - Black-ish - Previously.TV Forums
The West Wing - Previously.TV Forums
All Episodes Talk: Walk With Me - Page 6 - The West Wing - Previously.TV Forums
The West Wing Weekly & Other The West Wing Podcasts - Page 2 - The West Wing - Previously.TV Forums
Anonymous Internet Vigilantes Are Taking Peer Review Into Their Own Hands | Motherboard
A History of Violence: A Quantitative Analysis of the History of Terrorism in New York City - HOMELAND SECURITY AFFAIRS
Social Media Manager Becomes Facebook Legend After Grocery Store Customer Finds Worm in Her Salad | The Daily Dot
FOIA Wiki launches in beta – Poynter
How to Make YouTube Playlists with a Google Spreadsheet
Silent Site Sound Blocker Only Lets Whitelisted Tabs Play Audio
Export and Retain Formatting from Google Docs - Make Tech Easier
Ditch Popular Google Services With These Alternatives - Make Tech Easier
DuckDuckGo Search Tips You Should Know to Boost Productivity - Make Tech Easier
Generative Data Models for Validation and Evaluation of Visualization Techniques
Ada Twist, Scientist: Andrea Beaty, David Roberts: 9781419721373: AmazonSmile: Books
Atlas Obscura: An Explorer's Guide to the World's Hidden Wonders: Joshua Foer, Dylan Thuras, Ella Morton: 9780761169086: AmazonSmile: Books
AmazonSmile: I'm Judging You: The Do-Better Manual (9781627796064): Luvvie Ajayi: Books
I'm Judging You: The Do-Better Manual - Google Search
I'M JUDGING YOU: The Do-Better Manual by Luvvie Ajayi
Because the Only Thing Chip Readers are Good For is Embarrassing Us | Awesomely Luvvie
https://smile.amazon.com/gp/yourstore/recs/ref=pd_ys_nav_?ie=UTF8&nodeID=4461&parentID=4456&parentStoreNode=4456
AmazonSmile: This Book Loves You (9781101999042): PewDiePie: Books
37 tabs
Copy links to clipboard
Copy
Open
Full List of Performances & More Details Revealed for PBS' HAMILTON'S AMERICA Documentary
Office Supplies, Furniture, Technology at Office Depot
Tektronix P6015A High Voltage Probe 1000x | eBay
IARPA Multimodal Objective Sensing to Assess Individuals with Context (MOSAIC) BAA | Contract Research and Development
Carmel-by-the-Sea Historical Fun Facts (Media Kit - Carmel-by-the-Sea, California)
The Stroz Friedberg Cyber Brief — Center on National Security
Metadata Extractors | Alfresco Documentation
Metadata Extractors | Alfresco Documentation
Growing pains for global monitoring of societal events | Science
Metadata Extraction to Tags | Alfresco Developer Blog
Home
Platform extension points | Alfresco Documentation
Alfresco » Site Dashboard
Amazon.com: Scout Sling Pack (Black): Sports & Outdoors
Amazon.com : Yukon Outfitters Survival Kit (Storm Grey) : Sports & Outdoors
Amazon.com : Gonex 550 Paracord Survival Bracelet Grenade Keychain Emergency Survival Kit with Carabiner, Eye Knife, Fire Starter, Fishing Tool for Camping, Hiking, Hunting, Travel : Sports & Outdoors
Amazon.com : Trident Survival Kit (Black) : Sports & Outdoors
Amazon.com: Prime Reading: Kindle Store
Defeating ISIS: Who They Are, How They Fight, What They Believe - Kindle edition by Malcolm Nance, Richard Engel. Politics & Social Sciences Kindle eBooks @ Amazon.com.
Vetted Intelligence – An Open Source Intelligence Resource
Website is offline | 504: Gateway time-out
Science
Growing pains for global monitoring of societal events | Science
(8909) Inoreader - Channels
2Do Is Going Free (with In-App Purchases) – MacStories
Where Will Google Assistant Live? – MacStories
10 Products and Websites to Improve Your Morning – Johnny Lists
iPhone 7 Plus Depth Effect Is Legit – MacStories
The Omni Group Is Moving to Free Downloads with In-App Purchases – MacStories
Top Spymaster Explains How Russian Intelligence Sees the US
The UK Snooper’s Charter and the Anderson Report on Bulk Powers | Just Security
Back Up All of the Things With This $110, 5TB External
This $6 Survival Grenade Includes a Fire Starter, Fishing Gear, and More
Today's Best Deals: 30% Off Starbucks, Stainless Steel Tumblers, 3D Printer
MacStories
iOS 10: The MacStories Review – MacStories
2 tabs
Copy links to clipboard
Copy
Open
Disk Inventory X - Screenshots
Use the Creative Cloud Cleaner Tool to solve installation problems
Terrorist Icons
Copy links to clipboard
Copy
Open
terrorism icon - Google Search
Terrorist icons | Noun Project
Bomb, bomber, explosion, explosive, leverage, suicide bomber, terrorist icon | Icon search engine
Terrorist Vector Stock Photos Images, Royalty Free Terrorist Vector Images And Pictures
Islamic Terrorist With Islamic Terrorist With Machine Gun, Islamic.. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234766.
Terrorist Set With Mask Gun And Camouflage Clothes Vector Illustration. Royalty Free Cliparts, Vectors, And Stock Illustration. Image 34234371.
8 tabs
Copy links to clipboard
Copy
Open
How to use Optimized Storage in macOS Sierra | Macworld
Using Finder’s Advanced Search to Find Recently Modified Files - The Mac Observer
Make Spotlight Sing: Use Dates To Search Your Files [OS X Tips] | Cult of Mac
September 20, 2016 | iDownloadBlog.com
Recently added
Rajaraman: Jure Leskovec - Google Scholar
Data mining of extremely large ad hoc data sets to produce inverted indices
mirador
37 tabs
Copy links to clipboard
Copy
Open
FlashAlert Newswire
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
http://flashalert.net/id/portlandpolice?alert=1 is not available
PopClip for Mac
Dropshelf Preferences - Pilotmoon Software Knowledge Base
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Aptonic - Dropzone 3 Actions
Change PopClip's Search Engine - Pilotmoon Software Knowledge Base
Adding Dictionaries to OS X - Pilotmoon Software Knowledge Base
PopClip Known Issues - Pilotmoon Software Knowledge Base
Typinator - the fastest text expander in town
TextSoap - Automate Your Text Cleanup
StartPage Search Engine
Slicereader - Easy reading for Mac
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
FlashAlert Newswire - Subscription List in Portland/Vanc/Salem
Police Are Sweeping Up Tweets and Friending You on Facebook, Whether You Know It or Not
Jack Smith IV's Profile - Mic
However We Fight Terrorism, Ubiquitous Government Surveillance Isn't the Answer
Basic Statistics Part 3: The Dangers of Large Data Sets: A Tale of P values, Error Rates, and Bonferroni Corrections | The Logic of Science
'Minority Report' Is Real — And It's Really Reporting Minorities
U.S. Police Are Getting a Crime Prediction Map Straight Out of 'Minority Report'
Hitachi Says It Can Predict Crimes Before They Happen | Fast Company | Business + Innovation
Darrin Lipscomb - Google Search
Meagan Cahill - Profile | RAND
computational criminology - Google Search
Computational Criminology
Hitachi Visualization Suite - Google Search
Hitachi's Public Safety and Visualization division - Google Search
How to Email - The Atlantic - The Atlantic
Culture - The Atlantic
Donald Trump's 'Miss Piggy' Comments Expose a Double-Standard on Weight - The Atlantic
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
PredPol - Google Search
Predict Crime | Predictive Policing Software | PredPol
12 tabs
Copy links to clipboard
Copy
Open
Bio - O'Reilly Media
AMRC | The University of Sheffield Advanced Manufacturing Research Centre with Boeing
workerbee - TPB
clouderone - TPB
Self-image threat decreases stereotyping: The role of motivation toward closure | SpringerLink
On the physics of high-rise building collapses | OffGuardian
Apple Tracks Your iMessage Contacts, May Share Them With Law Enforcement
How to Totally Disable Widgets on the iOS 10 Lock Screen
Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them
US-Backed Effort to Fight Afghan Corruption Is a Near-Total Failure, Audit Finds | Small Wars Journal
Triggers and Thresholds of Non-International Armed Conflict | Just Security
100 Greatest TV Shows of All Time | Rolling Stone
45 tabs
Copy links to clipboard
Copy
Open
VPN Forever
The Hit List for Mac: Handles life’s little tasks & big projects
Pay What You Want: The Award-Winning Mac Bundle | MacAppware Deals
MacAppware Deals
DeltaWalker: Advanced file and folder comparison and synchronization
Today's Best Deals: Your Favorite Car Charger, Discounted Food Saver, Dyson V6, and More
Amazon.com: Fresh Limited Time Offer
iStockNow Live iPhone 7 and 7 Plus Stock Map
Small Victories
50 Tools to Get the Most Out of Dropbox - Docurated
How to Host Your Website with Dropbox - The Ultimate Unofficial Dropbox Guide
Pancake
Give people view-only access to your files - Dropbox Help - Dropbox
12 Advanced Dropbox Features That You Should Start Using
Secure Online Collaboration | Box
Home | DropPages.com
The 10 Best Widgets for iOS 10 Home and Lock Screens
The Pirate Bay - The galaxy's most resilient bittorrent site
A Nearly Complete Bill Bryson (10 Audiobooks) (download torrent) - TPB
Horisarte - TPB
Travels in Europe - Bill Bryson (2013 - Unabridged) (download torrent) - TPB
[Audiobook] 5 Bill Bryson Books (download torrent) - TPB
Simple Domain Name Registrar - iwantmyname
Theses
DIYbio Project: Help Discover New Antibiotics through Citizen Science
TIP: Make a list of where all your credit cards are listed! | Budgets Are Sexy
(1116) Inoreader - Political Violence @ a Glance
10 Tricks to Make Yourself an iPhone Message Master
Is your ZIP code one of Portland's wealthiest? (Map/Slideshow) - Portland Business Journal
Apple Logs Your iMessage Contacts — and May Share Them With Police
Eddy Cloud Music Player & Streamer Pro on the App Store
8 Awesome Apps You Won't Hear People Talking About
ProPublica’s new Chrome extension wants to decipher what Facebook thinks it knows about its users » Nieman Journalism Lab
Enabling Unconventional Warfare to Address Grey Zone Conflicts | Small Wars Journal
THE MISSING CREDITS
Search Nearby | Delivery & Takeout | BeyondMenu
BeyondMenu.com Mobile App | BeyondMenu
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Aroy Thai Cuisine | Order Online | Portland | BeyondMenu
Other > E-books - TPB
The Encyclopedia of Middle East Wars: The United States in the Persian Gulf, Afghanistan, and Iraq Conflicts - ABC-CLIO
The Pirate Bay - The galaxy's most resilient bittorrent site
Bill Bryson Ebook Collection (bookeek) (download torrent) - TPB
Bill Bryson - At Home: A Short History of Private Life (download torrent) - TPB
Saved Session - Session Buddy
09-28
Copy links to clipboard
Copy
Open
Book Excerpt: “The Embassy: A Story of War and Diplomacy” | Small Wars Journal
Unconventional Warfare is Not the Answer to Your Problem
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
Bio - O'Reilly Media
Homeland Security from CRC Press - Page 1
Forensics & Criminal Justice from CRC Press - Page 1
Home - NATO LibGuides - NATO LibGuides at NATO Multimedia Library
Anniversary – Club MacStories
Sensors | Free Full-Text | Effective Waterline Detection of Unmanned Surface Vehicles Based on Optical Images
GAO-10-898, Technology Assessment: Explosives Detection Technologies to Protect Passenger Rail
Apple Music Festival
Getting Started with Alfresco in the cloud | Alfresco
Nuwber
How Washington, D.C., Is Preparing for the Next Terrorist Attack
EtreCheck: About EtreCheck
Mac Hacks - O'Reilly Media
Quicksilver — Mac OS X at your Fingertips
Copy files on Mac OS X using drag-and-drop | alvinalexander.com
Search and filter the iTunes App Store with your browser
IntelCenter Database (ICD)
Remove Duplicate Lines and sort
Potential Indicators, Common Vulnerabilities, and Protective Measures - Google Search
Potential Indicators of Terrorist Activities Related to the General Public - Google Search
Potential Indicators of Terrorist Activities Related to Sleepers - Google Search
An Expert Analysis of the Cyber Threats Facing America
Saved Session - Session Buddy
PAPERS
Copy links to clipboard
Copy
Open
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Bolz Jr: The counterterrorism handbook: Tactics,... - Google Scholar
Subrahmanian: Handbook of computational approaches... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Schrodt: Data-based computational approaches to forecasti... - Google Scholar
Concealed threat detection with the IRAD sub-millimeter wave 3D imaging radar | Passive and Active Millimeter-Wave Imaging XVII | DEF14 | SPIE Proceedings | SPIE
People Screening Portals - Threats and Associated Detection Technologies - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
Inbar: Detection of nuclear materials - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
Robertson: Concealed threat detection with the IRAD... - Google Scholar
DeLia: Surveillance with subject screening - Google Scholar
OSA | Automatic image segmentation for concealed object detection using the expectation-maximization algorithm
OSA | Real-time outdoor concealed-object detection with passive millimeter wave imaging
OSA | Real-time concealed-object detection and recognition with passive millimeter wave imaging
10 tabs
Copy links to clipboard
Copy
Open
This X-Men: Apocalypse Blooper Reel Features Oscar Isaac Dancing, Which Justifies the Entire Movie
22 Movies Roger Ebert Really Hated | Mental Floss
Fall TV Preview: Your Complete Guide to the Season's Premieres
Hamilton: Watch an ASL cover of the Broadway show's opening number | EW.com
5 Incredible Instagram Tools (Windows & Mac Desktop Clients Too)
PBS.NOVA.2015.CyberWar.Threat.720p.HDTV.x264.AAC.MVGroup (download torrent) - TPB
PBS NOVA 15 Years of Terror 720p x264 AAC HDTV MVGroup.org (download torrent) - TPB
nayhtut - TPB
Log in to your account | New Scientist
Google Allo: The Super-Smart Future of Messaging Is Kind of an Idiot Sometimes | WIRED
YouTube
Copy links to clipboard
Copy
Open
Broadwaycom - YouTube
BastilleVEVO - YouTube
FamousInNY - YouTube
BROADWAY SESSIONS - YouTube
theatermania - YouTube
Watch Highlights From Rehearsal for The Producers at Paper Mill Playhouse - YouTube
SpringerBriefs in Applied Sciences and Technology (download torrent) - TPB
Everything Wrong With Shrek In 13 Minutes Or Less - YouTube
Digital Ham4Ham 9/21 -- Talk Less, Sign More - YouTube
22 tabs
Copy links to clipboard
Copy
Open
The Pirate Bay - The galaxy's most resilient bittorrent site
Remove information from Google - Search Help
Jeff R. Weyers | LinkedIn
Sara T Citrenbaum, 527 Spokane St, Portland, OR - Nuwber
Syncios iPhone Data Recovery Tool Lets You Recover Data from iPhone, iTunes and iCloud Backups - iOS Hacker | iOS Hacker
Google Drive Search Just Got a Lot Smarter
Google Drive Blog: What you love about Google Search — now for Drive
Dropbox Isn't Playing Nice With macOS Sierra, Here's How to Fix It
ImageThink Making an Impact in Education | ImageThink
Hazel 10 Year Sale [Link]
Sharing a Contact and Voicemail with iOS
the story of an america jihadi - Google Search
national counterterrorism center - Google Search
The open source revolution is coming and it will conquer the 1% - ex CIA spy | Nafeez Ahmed | Environment | The Guardian
Here’s What It Really Means To Call Something “Terrorism” | GOOD
The Asimov Institute - The Asimov Institute
Artificial Intelligence For Air Force: Cyber & Electronic Warfare « Breaking Defense - Defense industry news, analysis and commentary
How to Undo the Changes on the iOS 10 Lock Screen
5 Ways to Make Gmail Even Better
hany farid - Google Search
I am Hany Farid, a Dartmouth Professor specializing in photo forensics technology. Ask me anything. : IAmA
NOVA - Official Website | Profile: Hany Farid
Mama's Got A Brand New Tab
Copy links to clipboard
Copy
Open
The Art Of The Future Project | The Art of the Future Project
RSOE EDIS - Emergency and Disaster Information Service
ICPEM | Institute of Civil Protection and Emergency Management | Alert - The journal of the ICPEM
floatingsheep
Powerful new metric quickly reveals network structure at multiple scales | Santa Fe Institute
Incident Dashboard
Open Wetlab - Waag Society
BioHack Academy #4 - Waag Society
CESSDA - Data Catalogue
Path Finder 7 by Cocoatech
Dataproofer
Российская экзотика - Обитель цивилизатора
Infegy: Social Media Intelligence and Text Analysis Solutions
Online vCard Converter
How to Jump Ship From Evernote and Take Your Data With You
This Script Converts Google Documents to Markdown for Easy Exporting
78 Tools for Writing and Previewing Markdown
IINSTP
YFCC
NSI SMA Publications | NSI
Organizational Analysis (Self-Paced) | Stanford Online
PopClip Extensions
Richard's Toolbox
DrawMyData
2016 CSS-US Army TRADOC Mad Scientist Conference at the Georgetown University Center for Security Studies | Small Wars Journal
How do I export notes from Evernote using AppleScript? - Stack Overflow
Terminal Lance - Home
News You Can Use | Arthur D. Simons Center
Presentations and Authors
AFIO - Association of Former Intelligence Officers
Cyberspace Security Guide - AL
DARPA Forensic Social Science Supercolliders (FS3) RFI | Contract Research and Development
Force Your Mac to Sort Folders on Top of Files (Windows Style)
Tactical Shit News -When Shit Hits the Fan, Read the Right Shit
Wapack Labs
Manage your Apple ID
Aptonic - Dropzone 3 Actions
Link Analysis, and Visualization Software| Social Network Analysis
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
Amateur Rocketeers Are Keeping the Space Age Spirit Alive
Dictation Dingus – nahumck.me
Lexical Link Analysis - Home - MMOWGLI Portal
Biometrics | Public Intelligence
Use iTunes on your Mac or PC to restore your iPhone, iPad, or iPod to factory settings - Apple Support
ThereAreNoSunglasses | American Resistance To Empire
bellingcat - Who Killed Adnani? An Open Source Survey - bellingcat
Internet Data Sources for Social Scientists
Operation Manul | Electronic Frontier Foundation
FEMA.gov | Federal Emergency Management Agency
Terrorist Group Prediction Model for Counter Terrorism - Google Search
LookingGlass Cyber Solutions
OCCRP
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.