Light theme
Dark theme
Automatic (use operating system setting)
Shared: 593 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
593 tabs
Copy links to clipboard
Copy
Open
U.S. Passports & International Travel
How to Apply for a Passport
Differences Between Passport Book and Passport Card
Passport Fees
Photo Composition Template
Photo Requirements
Renew a Passport
Renew a Passport
Passport Applications | Multnomah County
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Ubicon: Ubiquitous and Social Computing
Web Resources - INTL610 Counterintelligence | Course Guide - LibGuides at American Public University System
NICAR 2016 Slides, Links & Tutorials #NICAR16 // Ricochet by Chrys Wu
Center for Complex Operations > ACTIVITIES > Events
MINERVA PROJECT - IMPUNITY
Thwarting the Enemy: Providing Counterintelligence and Threat Awareness to the Defense Industrial Base
Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
Links I liked - Chris Blattman
IPA's weekly links - Chris Blattman
What if Dr. Seuss wrote Star Wars? - Chris Blattman
Welcome - The Data Journalism Handbook
DBLP: Paolo Dell'Olmo
dblp: Huan Liu
Huan Liu - ACM author profile page
Download | Social Media Mining
1_Introductions | HST Maker Lab
IEEE Xplore Abstract - Uncovering and Predicting Human Behaviors
Dataset digest: Open data, tools and resources that can help fuel your stories - Journalist's Resource Journalist's Resource
http://journals.isss.org/ is not available
Listening to geophysics: Audio processing tools for geophysical data analysis and interpretation : The Leading Edge: Vol. 32, No. 8 (Society of Exploration Geophysicists)
Adobe Spark Lets You Create Beautiful Images, Web Pages, and Videos Easily
An iPhone User's Guide to Falling In Love With Android Wear
Spotify's Family Plan Just Got Cheaper and Better
Sunday showdown News, Videos, Reviews and Gossip - Lifehacker
This Week's Most Popular Posts: May 13th to 20th
This Week's Top Downloads
Top 10 PC and Workspace Upgrades You Can Do in an Afternoon
Complex & Intelligent Systems - Springer
CORE Lab Professional Publications - Naval Postgraduate School
ISIS Threat Is 'Extremely Worrying' Says Counter-Insurgency Expert | NSPR
NAACL HLT 2015: Welcome
National Security Agency Releases History of Cold War Intelligence Activities
Communities Reporter
Open Data Barometer
OpenPrism
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: THIS ISSUE OF SPY AGENCY HAPPENING! HOW 9/11 TRANSFORMED CIA
Please note that some of these audiobooks have been removed by copyright request - Pastebin.com
Dr. Angelos D. Keromytis, "Toward Self-healing Software" from CERIAS Security Seminar Podcast on podbay
Project Euclid - mathematics and statistics online
Outside the Battlefield
PSYOP Regimental Blog: Muppets and The Taleban
Research | Rock Health
ESISC | Security Database
14 key features that define a successful insurgency
IARPA Invites GEOINT Community to Share Ideas
Breaking ISIL’s Brand
TweetTracker
Twitter Data Analytics
Smartphone communication using magnetic fields – Center for Ubiquitous Computing
Welcome to ulno.net | ulno.net
research | ulno.net
MacStories Weekly: Issue 33
Verification Junkie
Visualization Lab | UC Berkeley
Visualization Lab | Extracting References Between Text and Charts via Crowdsourcing
Highlighting application for crowdsourced results
Data Wrangler
Phil Kivett's USAFSS COMINT Experiences
DIY Insurgency: Emerging Technologies Threaten the SOF Mission
Presentations and Authors
16w5160: Computational Modeling in Games | Banff International Research Station
Counterintelligence
Counterintelligence Job Aids
CDSE Posters
Counterterrorism
CI Awareness Toolkit: Help
Insider Threat
DSS / Counterintelligence Reports
DSS / Counterintelligence Training Materials
Defense Security Service (DSS)
Discrete Dynamics in Nature and Society — An Open Access Journal
INFILTEC: The Inexpensive Infrasound Monitor Project. - simple microbarograph design for DIY
As Hamas Tunnels Back Into Israel, Palestinians Are Afraid, Too - The New York Times
Social Sciences
The Secret History of ISIS | FRONTLINE | PBS
Songwriter Alan Menken Tells Which of His Disney Films He'd Like To See on Broadway Next | Playbill
Huan Liu
Professional Activities
Project Description: BlogTrackers
Publications, Huan Liu, Feature Selection, Social Computing
QCRI - Social Computing
Supervolcano Locations | List of Super Volcanoes of the World
real-time video applications: Topics by Science.gov
American Journal of Operations Research - Scientific Research Publishing
SWOT Hunter: April 2013
Geo-spatial Information Science
Open journals | Taylor & Francis Online
Gazans Fear Being Used as Human Shields as Hamas Builds Tunnels Under Homes | The Tower
CASL | Complex & Adaptive Systems Laboratory
www.uky.edu/~rmfarl2/sp11dip600syllabus.htm
Taking the Fight to ISIL: Operationalizing CT Lines of Effort Against the Islamic State Group - Operationalizing CT Lines of Effort Against the Islamic State Group - The Washington Institute for Near East Policy
The Ultimate 3D Printing Cheat Sheet - AstroPrint
Terror in the World - Google Sheets
List of ongoing armed conflicts - Wikipedia, the free encyclopedia
see what's happening | etrigg.com
ICWATCH
Insight Maker | Free Simulation and Modeling in your Browser
The Domestic Surveillance Directorate
Parse addresses, names & more - Parserator
Huan Liu - Google Scholar Citations
Gunter: Social Media in the Arab World: Communication... - Google Scholar
Ranganath: Understanding and identifying advocates... - Google Scholar
Web Login Service - Error
U.S. Army Laser Chief — ‘We Absolutely Blew Lots of Stuff Up’ — War Is Boring
Arms Cache Archive: Iraq, October 2008 – Arms trafficking, arms trade, and weapons ID docs
AFGHANISTAN: A PERSON OF INTEREST | Richard J. Campbell - Academia.edu
2014 Green Book: ARSOF 2022: The future of Army SOF | Article | The United States Army
Infrasound monitoring: CTBTO Preparatory Commission
DVIDS - Publications - Special Warfare
Computational Modeling of Complex User Behaviors: Challenges and Opportunities - Google Search
infrasound monitoring - Google Search
NEXT GENERATION SOCIAL SCIENCE - Google Search
Location-based Social Media Search | Ground Signal
Home
International Network of Social Network Analysis - INSNA
sigacts.com alternative : Intelligence
overview for IrrelevantPenguins
Rain or Shine? Forecasting Search Process Performance in Exploratory Search Tasks - Semantic Scholar
SENSIAC - Military Sensing Symposium
A Suicidal Nuclear Gambit in the Caucasus | Geopoliticalmonitor.com
UCLA MURI
Sentiment Analysis and Social Cognition Engine (SEANCE): An automatic tool for sentiment, social cognition, and social-order analysis - Online First - Springer
OCCRP
Georgia: Six Arrested for Attempting to Sell $200 Mil in Uranium
Nuclear
georgia
smuggling
Suspicious transactions on the Moldovan-Bosnian drug market
The Taxi Drivers Turned Black-Market Nuke Smugglers - The Daily Beast
Identification of innovation solvers in open innovation communities using swarm intelligence
Eurasia Diary
Uranium season: 2nd group of isotope smugglers busted in Georgia in 10 days — RT News
Russia and Turkey Escalate: Russia’s Threat to NATO Goes Beyond Eastern Europe | Institute for the Study of War
ISCIP - The ISCIP Analyst
Daniel Lebowitz | LinkedIn
Nuclear Smuggling: From Moldova to ISIS? | Center for Strategic and International Studies
Stopping Nuclear Smuggling | Nuclear Security Matters
AP INVESTIGATION: Nuclear black market seeks IS extremists | The Big Story
The fuel for a nuclear bomb is in the hands of an unknown black marketeer from Russia, U.S. officials say | Center for Public Integrity

Uranium Smuggling Arrests in Moldova Revive Security Debate - The Daily Beast
Using Organizational Similarity to Identify Statistical Interactions for Improving Situational Awareness of CBRN Activities
Ronald Breiger - Publications
Current Grants
Xie: Sketching for Sequential Change-Point Detection - Google Scholar
Inbox (88) - scitrenbaum@gmail.com - Gmail
Prospective Research Topic Database
Application of a Profile Similarity Methodology for Identifying Terrorist Groups That Use or Pursue CBRN Weapons - Springer
Terrorism and Violent Extremism | START.umd.edu
Global | START.umd.edu
The Asymmetry of Legitimacy: Analyzing the Legitimation of Violence in 30 Cases of Insurgent Revolution - Google Search
Comparative Configurational Analysis as a Two-Mode Network Problem: A Study of Terrorist Group Engagement in the Drug Trade - Google Search
Inbox (88) - scitrenbaum@gmail.com - Gmail
UNEPLive
UNEP KNOWLEDGE REPOSITORY
UNEP - Disasters and Conflicts
UNEP Annual Report 2015
afghanistan
ECP Progress Report
Terrapattern
Workflow 1.5: App Store Automation, Trello and Ulysses Actions, Audio Metadata, Safari View Controller, and More – MacStories
Canvas #11: Travelling with iOS - Relay FM
Shell Tricks: halp -- a universal help tool - BrettTerpstra.com
ReNotify Creates Undismissable Notes in Android Notifications
Downloads News, Videos, Reviews and Gossip - Lifehacker
Ios News, Videos, Reviews and Gossip - Lifehacker
The Best IFTTT Recipes to Make the Most of Your Vacation
This Week's Most Popular Posts: May 20th to 27th
This Week's Top Downloads
Top 10 PC and Workspace Upgrades You Can Do in an Afternoon
Sorted - todo app that keeps up with you
Airtable
Chemistry – SciTech Daily
Download Academic Torrents - Kickass Torrents
Download Routledge Key Guides Torrent - Kickass Torrents
Profile of sargoddha - Uploads - Kickass Torrents
Adobe Spark
The last remaining Pentagon-trained rebel group in Syria is now in jeopardy - The Washington Post
OneTab shared tabs
War News Updates: Search results for smuggling
The Canadian Way of Counterterrorism: Introducing the GATE-Canada Data Set | START.umd.edu
A quick look at the public ICEWS data | MI Regression
Integrated Crisis Early Warning System (ICEWS) Dataverse
Data: Querying, Analyzing and Downloading: The GDELT Project
All GDELT Event Files
In the opponent’s shoes: modelling dynamic preferences of malicious agents - LSE Theses Online
Download Unclassified Non-Fiction Book Collection 70 books Torrent - Kickass Torrents
Profile of LeipzigMRD - Uploads - Kickass Torrents
Profile of ssitimefill - Uploads - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
Profile of sptorrents1 - Uploads - Kickass Torrents
Profile of Mr.Gooner - Uploads - Kickass Torrents
About today's outage | The Inoreader blog
Brutally Honest News, Gossip, & Advice for Young Women | Betches
Karma Decay - Reverse image search of Reddit.com
(29) Mahmoud Eid | University of Ottawa | Université d'Ottawa - Academia.edu
Government Information
Amazon Prime Now
Addiction Inbox
The Drugs Wheel: a new model for substance awareness
Download Textbooks Torrents - Kickass Torrents
Aram Galstyan - Publications
The Campaign for Fallujah: May 26, 2016 | Institute for the Study of War
Cheap Flights from Portland to Norway from $611 - KAYAK
When to Fly and Buy for Portland (PDX) to Oslo (OSL)
This Map Tracks Where Governments Hack Activists and Reporters | WIRED
Digital Freedom Alliance - Map
georgia armenia smuggling - Google Search
How Twitter users tracked down 4 ISIS ‘fanboys’ from a PR campaign gone wrong |
MacStories Weekly: Issue 34
GPS Mapping - The Hacker Factor Blog
Watch Two Heroes Race to Chop a Car in Half With an Ax | WIRED
DARPA wants to find the vital limitations of machine learning | Network World
Assessing Community Reilience: A CART Survery Application in an Impoverished Urban Community | START.umd.edu
FACT SHEET: The White House Summit on Countering Violent Extremism | whitehouse.gov
United Nations Official Document
pdx to norway - Google Search
Weather in Oslo - Lonely Planet
Spring
pdxindoorsoccer.com/wp-content/schedules/spring/women/DIV 1.TXT
pdxindoorsoccer.com/wp-content/schedules/spring/women/DIV 2.TXT
nomadpdx - Google Search
Reservations — Nomad.PDX
Portland Monthly's Rising Star Restaurant of the Year: Nomad.PDX | Portland Monthly
Nomad.PDX Expands Hours and Adds Staff - Eater Portland
Nomad.PDX - Eater Portland
U.S. Increases Antiterrorism Exercises With African Militaries - The New York Times
ISIS Will Not Get Far in Asia | Small Wars Journal
MUSINGS ON IRAQ: The Bureaucratic Structure Of the Islamic State
(14920) Inoreader - ISIS Wants To Use Migrant Routes To Send 'Sleeper Cells' To Europe
Newsletter
greta's gouge: Friday's Miscellany 05-20-2016
Research & Development - Galois, Inc.
Published Special Issues - OJPS - Scientific Research Publishing
behavioral influences analysis and assessment research and theory
Publications Sentinel Issues | Combating Terrorism Center at West Point
Journal | ACIPSS
Military Intelligence, Intelligence Studies, Intelligence Operations, National Intelligence, Intelligence Analysis, Gateway to Intelligence,
CNS Global Incidents and Trafficking Database | Analysis | NTI
Stopping Nuclear Smuggling | Nuclear Security Matters
Georgia | Countries | NTI
lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain – an Open Source Inventory | Schmid | Perspectives on Terrorism
National Progress Report: Georgia — The 2016 Nuclear Security Summit
Illicit Trafficking in Nuclear and Radioactive Materials in the Caucasus: the Case of Georgia - Google Search
Nuclear Booty - More Smugglers Use Asia Route - NYTimes.com
Dr. Alex P. Schmid – Research Fellow | ICCT
(27) Alex SCHMID | Director, Terrorism Research Initiative (TRI), Vienna - Academia.edu
Perspectives on Terrorism
Bibliography: Terrorism Research Literature (Part 2) | Tinnes | Perspectives on Terrorism
Alleged Iran Plot Would Be Latest in Clash of Spies and Assassinations - The Atlantic
Lebanese 'Al-Safir' Daily Marks 16th Anniversary Of Israel's Withdrawal From South Lebanon: Hizbullah Is Digging Tunnels On Israel Border
Laboratory for Computational Cultural Dynamics
Profile of ssitimefill - Uploads - Kickass Torrents
State Department’s questionable testimony on U.S. heavy water purchase from Iran | Institute for Science and International Security
Why the U.S. military turned a hipster tattoo parlor into a Special Operations lab - The Washington Post
Recap of Recent Posts on Just Security (May 14–20) | Just Security
Search results | Center for a New American Security
Download Non fiction Torrents - Kickass Torrents
DMCA Torrent Downloader
America’s New Special Operations Commander Wants to Predict the Future - Defense One
Interesting statistics / Dr. Simon Moss - Sicotests
CAC Scan - May Statistics on Google Play Store | Mobbo
FreeMapTools | Resources | Data Driven Journalism
Hunchly 1.1.6 Released
ACIPSS | Austrian Center for Intelligence, Propaganda & Security Studies
SHIELD (Smuggled HEU Interdiction through Enhanced anaLysis and Detection): A Framework for Developing Novel Detection Systems Focused on Interdicting Shielded HEU | Educating the Next Generation of Leaders in Nuclear Security Sciences
cesium.smuggling georgia - Google Search
Securing the Bomb | NTI
ACIPSS Newsletter 6
ACIPSS Newsletter 5, 16
Acipss Newsletter 4
Organized Crime and Corruption Reporting Project
Sharon Squassoni | Center for Strategic and International Studies
The SHIELD Project at Texas A&M University -The SHIELD Project at TAMU
Mutable Detector Array Software for the Detection of Gamma Emissions in Classrooms and the Field | Educating the Next Generation of Leaders in Nuclear Security Sciences
Cost-Sensitive Classification Methods for the Detection of Smuggled Nuclear Material in Cargo Containers | Educating the Next Generation of Leaders in Nuclear Security Sciences
The smugglers trying to help ISIS make a dirty bomb | New York Post
Al-Qaeda's Pursuit of Weapons of Mass Destruction: The Authoritative Timeline.” - Google Search
SAVER Documents
The Trust Paradox in Nuclear Smuggling | START.umd.edu
Israel foils attempt to smuggle rocket materials to Hamas in Gaza - Arab-Israeli Conflict - Jerusalem Post
Parallel Paths: The CVE Program and U.S. Foreign Policy in Somalia | Rise Up Times
Saved Session - Session Buddy
The Pentagon’s Huge Atomic Floppies | TIME
Fundamental Changes in Warfare | Small Wars Journal
Beyond Half-Measures: Influencing Syria’s Political Order through Non-State Proxies | Small Wars Journal
Violent Intent Modeling System - Google Scholar
Eric B Bell - Google Scholar Citations
Sanfilippo: Computer modeling of violent intent:... - Google Scholar
The hidden implications of radical group rhetoric: Integrative complexity and terrorism - Dynamics of Asymmetric Conflict - Volume 4, Issue 2
Hermann: Leadership, terrorism, and the use of violence - Google Scholar
Privacy Documents for S&T | Homeland Security
Norman D. Geddes: Publications, bio, bibliography, etc. » Interaction Design Foundation
Norman D. Geddes Inventions, Patents and Patent Applications - Justia Patents Search
dblp: Norman D. Geddes
content analysis approach: Topics by Science.gov
Network Science for Military Coalition Operations: Information Exchange and Interaction (Premier Reference Source): Dinesh Verma: 9781615208555: Amazon.com: Books
3 Networks and the Military | Network Science | The National Academies Press
Melhuish: Adversarial intent modeling using embedded... - Google Scholar
Unknown URL
Thompson: Model Analytic Processes for Export License... - Google Scholar
Unknown URL
Computer Modeling of Violent Intent: A Content Analysis Approach (Book) | SciTech Connect
UNDERSTANDING TERRORISM: THE INNER WORLD AND THE WIDER WORLD - Alderdice - 2006 - British Journal of Psychotherapy - Wiley Online Library
Conway III: The hidden implications of radical group... - Google Scholar
Trends & Controversies: Sociocultural Predictive Analytics and Terrorism Deterrence (Journal Article) | SciTech Connect
Winter: Scoring motive imagery in documents from... - Google Scholar
International Handbook of Threat Assessment - J. Reid Meloy, Jens Hoffmann - Google Books
Walker: Anticipating attacks from the operational... - Google Scholar
Pennebaker: Using computer analyses to identify language... - Google Scholar
Technosocial predictive analytics for security informatics - Springer
International Handbook of Threat Assessment - Google Books
Meloy: Warning behaviors and their configurations... - Google Scholar
Perceptions of Policing: Improving Communication in Local Communities
Advances in Cross-Cultural Decision Making - Google Books
International Handbook of Threat Assessment - J. Reid Meloy; Jens Hoffmann - Oxford University Press
SBP-BRiMS 2016
Bibliographic Library | Open Agent Based Modeling Consortium
Michael L. Bernard - Publications
George Backus - Publications
CoMSES Computational Model Library | Open Agent Based Modeling Consortium
A Validation Process for Predicting Stratagemical Behavior Patterns of Powerful Leaders in Conflict
Sieck: 12 Training for sociocultural forecasting:... - Google Scholar
A Cultural Models Approach for Investigating the Cognitive Basis of Terrorism
Modeling Political Belief and Its Propagation, with Malaysia as a Driving Context
Education | Open Agent Based Modeling Consortium
International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction | Open Agent Based Modeling Consortium
dblp: Social Computing, Behavioral Modeling, and Prediction
SBP-BRiMS 2016
ACM TIST | Intelligent Systems and Technology
Crowdsourcing Without a Crowd
A case for Sandia investment in complex adaptive systems science and technology.
SBP-BRiMS 2016
Richard Colbaugh
Jeff Y Tsao
George Backus
Resources | Open Agent Based Modeling Consortium
Bernard: Modeling the interaction between leaders... - Google Scholar
A Validation Process for Predicting Stratagemical Behavior Patterns of Powerful Leaders in Conflict - Springer
A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions - Springer
IEEE Xplore Abstract - ASC: A Proposed Architecture for Computing a Social Capital Gaming Metric
Supporting the Evaluation of Sustainability by Listening In to Populations - ProQuest
Expressing Effects-Based Outcomes from Patterns of Emergent Population Behaviors - Springer
A Cultural Models Approach for Investigating the Cognitive Basis of Terrorism
Galois gets $10M DARPA contract to make legacy military, commercial systems less vulnerable - FierceGovernmentIT
The Interviews
Burundi: A Dangerous Third Term - International Crisis Group
Countering Violent Extremism in the MENA Region | IAI Istituto Affari Internazionali
EU Operation Sophia failing to disrupt people smuggling, says Committee - News from Parliament - UK Parliament
House of Lords - Operation Sophia, the EU’s naval mission in the Mediterranean: an impossible challenge - European Union Committee
Georgia Unveils Details of Nuclear Smuggling Case | European Dialogue
Anna Nemtsova - The Daily Beast
Center for Complex Operations > Publications > Articles
Center for Complex Operations > News
Alarming trail of Armenia's nuclear ambitions - report
ISIS (@TheGoodISIS) | Twitter
News & Publications | Oxford Research Group
Intelligence Community | RAND
The Nonproliferation Review - Volume 22, Issue 3-4
Columbia-Employee-Store-2016_Timbers-Army-Members2.jpg (2550×3300)
Modeling Terrorism Onset and Intensity Dynamics Using the GTD | START.umd.edu
Vector Representations of Words
Claudio Cioffi-Revilla | START.umd.edu
Nina Fefferman | START.umd.edu
Al-Qaeda's Propaganda Decoded: A Psycholinguistic System for Detecting Variations in Terrorism Ideology | START.umd.edu
AZERI DAILY
A New Front Door For PLOS | PLOS Tech
CHAPTER 15 The Hitchhiker’s Guide to Intelligence-Led Policing > Center for Complex Operations > News
What Should We Have Learned by Now? Enduring Lessons from Thirty Years of Conflict and Transition > Center for Complex Operations > News
Nukes Smuggled In TAXIS- Embarrassing Find Right After Nuke Summit ⋆ Dc Gazette
$1.5 Million Scanner to Prevent Smuggling on Georgia – Armenia Border - Georgia Today on the Web
Links between Terrorism and Migration: An Exploration | ICCT
Countering Violent Extremism | ICCT
Securing America's Future | National Strategy for Energy Security: The Innovation Revolution - Securing America's Future
What Is It? Why Is It Important? | Nuclear Threat Initiative
ISW Tracking of Iraq’s 2016 Political Crisis | Institute for the Study of War
Civil.Ge | Five Men, Suspected of Trying to Sell Uranium, Arrested
Armenia travel and tourism news and events and media reports in Armenia. Travel news. - CountryReports
Georgia Busts Second Case of Uranium Peddling This Month | EurasiaNet.org
Islamist Movements and Political Change in the Arab World | IAI Istituto Affari Internazionali
How does war become a legitimate undertaking? Re-engaging the post-structuralist foundation of securitization theory - Publication | NUPI
Building Bridges for Global Security | Oxford Research Group
Collaborative Disaster Preparedness: Vietnam, the United States, and Regional Experiences (Proceedings from Da Nang, Vietnam, August 18–20, 2015) | RAND
What Role Does the Private Sector Have in Supporting Disaster Recovery, and What Challenges Does It Face in Doing So? | RAND
Foundations of the Islamic State: Management, Money, and Terror in Iraq, 2005–2010 | RAND
The Center for Excellence in Disaster Management and Humanitarian Assistance (CFE-DMHA): An Assessment of Roles and Missions | RAND
Deception in Covert Nuclear Weapons Development: A Framework to Identify, Analyze, and Mitigate Future Long-Term Deception Efforts | RAND
Tracking Refugees with Biometrics: More Questions Than Answers | RAND
Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence | RAND
Following Online Footprints to Catch Terrorists | RAND
Troubling Truth Beneath Litvinenko Headlines | RAND
Using Causal Models in Heterogeneous Information Fusion to Detect Terrorists | RAND
ISIS vs Special Ops | RAND
Assessing and Evaluating DoD Inform, Influence, and Persuade Efforts: Guidance for Practitioners | RAND
Nuclear Deterrence | RAND
Publications | Institute for the Study of War
EU-funded initiative to support open and secure borders between Armenia and Georgia | UNDP Representation Office in Brussels
Afghanistan National Defense and Security Forces | United States Institute of Peace
The Current Situation in Libya | United States Institute of Peace
How the U.S. Tracked and Killed the Leader of the Taliban - WSJ
CNS (@CNS_Updates) | Twitter
Elena Sokova (@esokova) | Twitter
alarming trail armenias nuclear ambitions - Google Search
smuggling georgia - Google Search
Machine Bias: There’s Software Used Across the Country to Predict Future Criminals. And it’s Biased Against Blacks. - ProPublica
(13) #SOFIC2016 hashtag on Twitter
How to Control Your Mac with Your Voice
(13179) Inoreader - To Inform is to Influence
The Old Arguments About US Nukes in Europe Aren’t Working. Here’s A New Approach. - Defense One
Iraq Live Update (@IraqLiveUpdate) | Twitter
Libyaschannel EN (@LibyaschannelEN) | Twitter
Terrorist or pedophile? This start-up says it can out secrets by analyzing faces - The Washington Post
Innovations - The Washington Post
Politics, Power, and Preventive Action » You Might Have Missed: Academic Journals V
Full Disclosure: poisoning / hijacking DNS locally of a third party domain: in shared and custom web hosting and in ISP, in automated /custom control panel software
Terror-Events.com – Tracking terror events and victims all over the world
Sebastian Junger: Over-Valorizing Vets Does More Harm Than Good
BREACH OR CLEAR | Jesterscourt
Access Google Authenticator on the Desktop
Drop the Mic w/ Anne Hathaway - YouTube
Photos! Go Inside Rehearsals for Paper Mill’s West Side Story | Playbill
FACEPTION | Facial Personality Profiling
Lab Failures Turn to Gold in Search for New Materials - Scientific American
Access : An epigenetic mechanism links socioeconomic status to changes in depression-related brain function in high-risk adolescents : Molecular Psychiatry
Solar storm of 1859 - Wikipedia, the free encyclopedia
David Rieff on his provocative new book In Praise of Forgetting.
Google Now Lets You Search With Emoji Characters
You are being followed: The business of social media surveillance | Eyes on the Ties
Using Facebook to Learn About Scientists | Peer Assisted Learning at Wayne State University - Wayne State University Blogs
Tourism Instagrams you should be following
VOX – Pol | My Islamic State Social Network
VOX – Pol | America is ‘dropping cyberbombs’ – but how do they work?
The Crime-Terror Nexus: Ideology’s Misleading Role in Islamist Terrorist Groups
metaBUS
Field Mapping: An Archival Protocol for Social Science Research Findings | Digging Into Data
AACSB Innovations That Inspire Recipients
6 Logless VPNs That Take Your Privacy Seriously
Googling History: The AHR Explores Implications of Using Digital Sources for Historians - American Historical Association
The 2016 Dean's List: EdTech’s 50 Must-Read Higher Ed IT Blogs | EdTech Magazine
Official Google Blog: An eye for detail: Zoom through 1,000 artworks thanks to the new Art Camera from the Google Cultural Institute
MSU News - MSU professor creates online photobook of regional insects
Home :: SSRN
How I turned my resume into a bot. (And how you can too!) — Life Learning — Medium
Georgia's Delicate Foreign Policy Dance | RAND
The Intercept
https://www.ctc.usma.edu/ is not available
Galois Awarded $10m DARPA Contract To Make Legacy Systems More Secure
Multi annual Defence Agreements in the Netherlands | Clingendael
Prosecuting foreign terrorist fighters: What role for the military? | Clingendael
Look at the Military’s New Stealth Bikes - Defense One
bellingcat - ISIS Had a Social Media Campaign, So We Tracked Them Down - bellingcat
THINK TANK | Does ISIS Pose a WMD Threat?
Are you ready for the era of big data? 14 popular JavaScript based data visualization tools : visualization
War News Updates: Military And Intelligence News Briefs -- May 18, 2016
The Early Edition: May 17, 2016 | Just Security
War News Updates: World News Briefs -- May 16, 2016 (Evening Edition)
War News Updates: World News Briefs -- May 16, 2016
Zotero | People > Spencer L Willardson > Library > Improving Intelligence Studies as an Academic Discipline
bellingcat - Investigating the "ISIS earthquake" - bellingcat
Award-winning academic research search engine metaBUS to launch in June | UToday | University of Calgary
Google To Offer A Site Clinic Hangout: Submit Your Site Today
Free Technology for Teachers: 5 Good Options for Creating End-of-Year Audio Slideshow Videos
The 7 Best Tools to Present & Share Your PDF Files Online
A science lab in an app - Waag Society
Zotero | People > Massimo Menichinelli > Library > Political Turbulence: How Social Media Shape Collective Action
COMPASSS: Bibliography
CBRN terrorism by non-state actors | START.umd.edu
A Global Picture of Non-State Actors and CBRN - War on the Rocks
Not Secure Enough: The Threat of Terrorists Acquiring Nuclear Materials is Still Serious
CBRN Weapons and Non-State Actors | theriskyshift.com
Capabilities Analysis of Bioterrorism: Roadblocks
Archives
Modeling and Simulation Agent-based of Natural Disaster Complex Systems
2nd Workshop on Agent-Based modeling and Simulation of complex systems: Engineering and Applications (ABSEA) | ISCRAM
Profile of P.R.G - Uploads - Kickass Torrents
Download Academic Torrents - Kickass Torrents
Download Non fiction Torrents - Kickass Torrents
Today's Best Deals: Haribo Bears, Dremel 3000, Anker PowerLine, and More
Items in PayPal Digital Gifts store on eBay!
LOOKMARK
Hazel Field Guide — MacSparky
Pay What You Want: Spring 2016 Mac Bundle | StackSocial
Men's Sale | adidas US
1Password Update Brings Improvements in VoiceOver, Large Type and Browser Support - iClarified
Amazon.com: HICKIES Elastic Tieless Shoelaces, Brown
StackSocial
Middle East - The Washington Post
Research Programs
Amazon.com: The Arduino Starter Kit - K000007: Computers & Accessories
SanDisk Ultra 200GB microSDXC Flash Card with adapter - Newegg.com
International Workshop on Agent-Based Modeling for Policy Engineering - Google Search
Index - A Primer for Agent-Based Simulation and Modeling in Transportation Applications , November 2013 - FHWA-HRT-13-054
iris - NUI Galway
AMPLE Home
Agent Based Modeling « Systems Engineering Modelling and Simulation
“Engineering” Agent-Based Simulation Models? - Springer
SWEENEY TODD Discount Offer - scitrenbaum@gmail.com - Gmail
Inbox (127) - stczztop@gmail.com - Gmail
A Synthetic Biologist's Beautiful Palette of Bacteria Art | The Creators Project
Hezbollah says it is digging tunnels 'to make Israeli enemy lose sleep' - Breaking News - Jerusalem Post
Aviation Sector — New Jersey Office of Homeland Security and Preparedness
In Faint Praise of Voice Assistance
Quick Tip: Restore missing Share menu options - Six Colors
Georgia’s Delicate Foreign Policy Dance | The National Interest Blog
Hezbollah says it is digging tunnels 'to make Israeli enemy lose sleep - Google Search
Resources | ACAPS
DVIDS - Publications - Special Warfare
Publications | Banff International Research Station
ACAPS Report: South Sudan Food Insecurity and Conflict - Google Search
Reports from Workshops in 2016 | Banff International Research Station
IARPA Releases Its Shopping List For Spy Technology | Popular Science
darpa | Popular Science
ICWSM-15 - Datasets - Datasets
Global emergency overview by country | ACAPS
Proceedings of the Ninth International Conference on Web and Social Media
AAAI Digital Library — International Conference on Web and Social Media
The International Conference on Weblogs and Social Media (ICWSM)
Proceedings of the Tenth International Conference on Web and Social Media
Proceedings of the Eighth International Conference on Weblogs and Social Media
ACAPS | Tools, know-how and training for assessments in crises
network dynamics @ mcgill | ICWSM 2015 Workshop on Standards and Practices
ACAPS Briefing Note: Armed conflict and severe food insecurity in South Sudan, 24 March 2016 - South Sudan | ReliefWeb
Every Acronym Project Name From DARPA's Demo Day | Popular Science
Fundamental Limits of Learning (Fun LoL) Request for Information (RFI) - DARPA-SN-16-37 - Federal Business Opportunities: Opportunities
DARPA's "Programmable Matter" Project Creating Shape-Shifting Materials | Popular Science
The 2016 Invention Awards | Popular Science
New Computer Chip Modeled on a Living Brain Can Learn and Remember | Popular Science
Why the Islamic State won’t become a normal state - The Washington Post
How much of a state is the Islamic State? - The Washington Post
Why academics can’t get beyond moderates and radicals - The Washington Post
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.