Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,157 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Passport
Copy links to clipboard
Copy
Open
U.S. Passports & International Travel
How to Apply for a Passport
Differences Between Passport Book and Passport Card
Passport Fees
Photo Composition Template
Photo Requirements
Renew a Passport
Renew a Passport
Passport Applications | Multnomah County
Things to Do
Copy links to clipboard
Copy
Open
Lost Lake Resort and Campground - Lost Lake Resort
www.wweek.com
Willamette Week — Portland News, Movies, Music, Restaurants, Arts - Willamette Week
Willamette Week's Oregon Coast Guide - Willamette Week
Pat's Acres
Global Event Databases
Copy links to clipboard
Copy
Open
Event Registry
Data: CAMEO
Phoenix Data Project
GDELT Blog - The Official Blog of the Global Database of Events, Language, and Tone (GDELT) Project! www.gdeltproject.org
GDELT Translingual: Translating the Planet - GDELT Blog
Modeling Science, Technology & Innovation Conference At The National Academies - GDELT Blog
NGramming 9.5 Billion Words of Arabic News - GDELT Blog
ICEWS | Dart-Throwing Chimp
Yes, Forecasting Conflict Can Help Make Better Foreign Policy Decisions | Dart-Throwing Chimp
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
When Forecasting Rare Events, the Value Comes from the Surprises | Dart-Throwing Chimp
CrisisLex: Crisis-Related Social Media Data and Tools
12 tabs
Copy links to clipboard
Copy
Open
PDFPolitics < Dmi < digitalmethods.net
PopTag < Dmi < digitalmethods.net
ProjectsByTheme < Dmi < digitalmethods.net
ProjectsByTheme < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolDatabase < Dmi < digitalmethods.net
ToolGoogleScraper < Dmi < digitalmethods.net
ToolHarvester < Dmi < digitalmethods.net
ToolIssueCrawler < Dmi < digitalmethods.net
ToolLinkRipper < Dmi < digitalmethods.net
16 tabs
Copy links to clipboard
Copy
Open
mdwardlab.com
Comparing GDELT and ICEWS Event Data | mdwardlab.com
Biblio | mdwardlab.com
Minerva Initiative
Home - System Dynamics
VERGE | Video Search Engine
Multimedia Knowledge and Social Media Analytics Laboratory
YFCC
REVEAL | Multimedia Knowledge and Social Media Analytics Laboratory
Successful participation of CERTH-ITI in the interactive Surveillance Event Detection task of TRECVID 2015 | Multimedia Knowledge and Social Media Analytics Laboratory
USEMP | Multimedia Knowledge and Social Media Analytics Laboratory
Event-oriented sentiment-annotated Twitter datasets | Multimedia Knowledge and Social Media Analytics Laboratory
Visual features and search index for Flickr 100M corpus | Multimedia Knowledge and Social Media Analytics Laboratory
SocialSensor (co-ordinator) | Multimedia Knowledge and Social Media Analytics Laboratory
Research | Multimedia Knowledge and Social Media Analytics Laboratory
Semantic multi-sensor fusion | Multimedia Knowledge and Social Media Analytics Laboratory
Tunnels
Copy links to clipboard
Copy
Open
WATCH: IDF Discovers First Hamas Terror Tunnel Inside Israel Since 2014 Gaza War | The Tower
Gazans Fear Being Used as Human Shields as Hamas Builds Tunnels Under Homes | The Tower
Israel Steps Up Efforts to Locate Terror Tunnels Inside Gaza | The Tower
Captured Hamas Operative: Terror Tunnel Network Extends Across Gaza | The Tower
Inside the IDF’s Super-Secret Elite Brain Trust - The Tower
Your Complete Guide to Hamas’ Network of Terror Tunnels - The Tower
Hamas tunnels crisscross entire length of the Gaza Strip, Israel says | The Times of Israel
10 tabs
Copy links to clipboard
Copy
Open
IHR Nexus Lab at Arizona State University | Growing Transdisciplinary Collaborations for Meaningful Change
How to Build a Text-Based Model (...or Corpus) | IHR Nexus Lab at Arizona State University
Stopwords and Reference Corpora | IHR Nexus Lab at Arizona State University
Nexus Lab Projects | IHR Nexus Lab at Arizona State University
Tools and Resources | IHR Nexus Lab at Arizona State University
Hathi Trust Research Center | IHR Nexus Lab at Arizona State University
Introduction to Social Network Methods | IHR Nexus Lab at Arizona State University
Introduction to Mapping Humanities Data with Google Tools | IHR Nexus Lab at Arizona State University
Introduction to Mapping Data with Google Tools Materials | IHR Nexus Lab at Arizona State University
Text-Based Modeling | IHR Nexus Lab at Arizona State University
Event Registry
Copy links to clipboard
Copy
Open
Event registry
Event registry
Event Registry: Moldova Arrests Seven Suspected Of Smuggling Radioactive Material
Pat's Acres
Event Registry: AP INVESTIGATION: Nuclear Black Market Seeks IS Extremists
Event Registry: Georgia nabs three men in effort to sell radioactive cesium-137
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia detains five suspected of illegal uranium trade
Event Registry: Armenia's possible dirty bomb threatens entire region
Event registry
Event registry
EVENT DATA
Copy links to clipboard
Copy
Open
INSCRdata
The Lightning Press | ADRP and Military Smartbooks
UAlbany-MIT SD Colloquia « System Dynamics Society
ICEWS Coded Event Data - Integrated Crisis Early Warning System (ICEWS) Dataverse
Social Sensor Project - Social Event Detection (SED) 2012 dataset
Links – i-intelligence
101+ OSINT Resources for Investigators | i-Sight
2016 Terrorism and Political Violence Risk Map | Aon
Web Resources - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
Open Source Intelligence News (OSIN)
Social Sensor Project - Events
Free software and open source tools for investigative journalism and research
How to Keep a Mac's Hard Drive Clean
Data
Computational Event Data System
The Open Event Data Alliance Software Page
Data: Political Instability Task Force Worldwide Atrocities Dataset
GeoNames
Visualizing the Crisis in Syria
Open Event Data Alliance
Center for Documentation of Violations in Syria
Papers: Automated
Papers
Papers: Forecasting
philip-schrodt (Philip Schrodt ) · GitHub
Philip A. Schrodt Dataverse
Software
TUNNELS
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Forgotten Relics of an Enterprising Age
Home - ITA-AITES
Equipment - ITA-AITES
The British Tunnelling Society
The British Tunnelling Society
Archive
Réflexif : Comment le mur produit le tunnel, Evelyne Ritaine, juillet 2014 | ENIGMUR
UCDP Download Center
Certified Social Media Intelligence Expert (CSMIE)
Home | CivicApps.org
Central IntelliGIF | Central Intelligence | In Theaters June 17, 2016
trash.mbox taking lots of disk space | Communities
Update: air strikes against Daesh - News stories - GOV.UK
How to Delete All Emails from Mail in Mac OS X
Google Open Source Blog: New open source tools to import mail to Gmail
Stanford H4D - Spring 2016 - Home
HOMELAND SECURITY AFFAIRS | The Journal of the NPS Center for Homeland Defense and Security
7 Characteristics of Technological Terrorism Scenarios and Impact Factors--Nikolai A. Makhutov, Vitaly P. Petrov, and Dmitry O. Reznikov | Countering Terrorism: Biological Agents, Transportation Networks, and Energy Systems. Summary of a U.S.-Russian Workshop | The National Academies Press
covert tunnels site:www.geoconsol.com at DuckDuckGo
Covert Tunnels Detection & Subterranean Warfare 2015-2020 Market to Reach $1.9B by 2019 Driven by New Transformational Technologies Says a Homeland Security Research Corp
differing site conditions, entitlement
Underground Infrastructure - The Missing Forty Trillion Dollars
'geotechnical, tunnel boring, differing site conditions'
Covert Tunnels Detection & Subterranean Warfare 2015-2020 Market to Reach $1.9B by 2019 Driven by New Transformational Technologies Says a - One News Page
How Tunnels Work | HowStuffWorks
The Subterrene Machine
Science.gov Results
Expert witnesses - TunnelTalk
TunnelTalk.com - Your gateway to the international tunnelling industry on the web
Books and Reports
The British Tunnelling Society
ICE Virtual Library
ITA Activities - ITA-AITES
After 1980 - ITA-AITES
The British Tunnelling Society
Disused tunnels database
Risks - ITA-AITES
Norwegian Tunnels Database Search
Saved Session - Session Buddy
Pile Responses Caused by Tunneling: Journal of Geotechnical and Geoenvironmental Engineering: (ASCE)
Search results | TU Delft Repositories
International Journal of Engineering Research and Technology
Influence of Tunneling on Adjacent Existing Pile Foundation
Tunnel - Main glossary - ITA-AITES
Architecture - ITA-AITES
Energy, Water & Telecommunication - ITA-AITES
Non Urban Utilities - ITA-AITES
Urban Utilities - ITA-AITES
Mining - ITA-AITES
Other Subsurface Facilities - ITA-AITES
Goods Storage - ITA-AITES
Industrial Facilities - ITA-AITES
Military Facilities - ITA-AITES
Public Buildings - ITA-AITES
Transport - ITA-AITES
Underground Planning - ITA-AITES
2016 World Tunnel Congress coming to San Francisco - Mining Metallurgy and Exploration - SME
Poulos: Ground movements–A hidden source of loading... - Google Scholar
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
Comparisons between measured and computed responses of piles adjacent to tunnelling operations - Google Search
Hard Rock Miner's Handbook - Google Search
Pile Responses Caused by Tunneling - Google Search
Tunnels database - Google Search
related:www.forgottenrelics.co.uk/tunnels/database/a.html Tunnels database - Google Search
world-tunnel-congress - Google Search
Books and Reports
Current Content - TunnelTalk
'geotechnical, tunnel boring, differing site conditions'
Project Camelot | Underground bases and tunnels
In Gaza's smuggling tunnels, Egypt's interests trump Brotherhood ties - CSMonitor.com
Al-Alam exclusive of Gaza-Egypt covert tunnels
tunnels and underground excavations | engineering | Britannica.com
27 tabs
Copy links to clipboard
Copy
Open
ADS Library Home Page
ADS-ACE
IAEA Nuclear Data Services
Nuclear power stations worldwide.csv - Google Fusion Tables
This Week's Most Popular Posts: June 10th to 17th
Hack the Planet! | PLOS Synthetic Biology Community
Online Audio Converter (MP3, WAV, Ogg, WMA, M4A, AAC) – media.io
Julian Ivanov - Publications
Feasibility of parallel line beamsteering for enhanced tunnel detection - Google Search
This Week's Top Downloads
iPhone Twitter App Showdown: Tweetbot vs. Twitter
Near-surface scattering phenomena and implications for tunnel detection - Google Search
CVPR 2016 Open Access Repository
This cartoon explains why predicting a mass shooting is impossible - Vox
Decision support systems and information fusion
Reports and publications
Scientific publications
Technical reports
Popular science publications
IEEE Xplore - Conference Table of Contents
Why Lone Wolf Attacks Are So Hard To Predict - Defense One
Keynote speech from the Seminar Global Jihad, Islamic Radicalism and the Challenge to Europe - Institute for Security and Development Policy
Check Your Ticketmaster Account, You Probably Have Free Tickets Waiting
This Week's Top Downloads
SiriusXM
42 tabs
Copy links to clipboard
Copy
Open
Drdc Valcartier - ResearchGate
Robert Rousseau - Publications
A System Dynamics model of the FM 3-24 COIN Manual, - Google Search
ACL Anthology » W15
Uranium Enrichment and Fuel Fabrication Bibliography
Brynielsson: 14th ICCRTS:“C2 and Agility” Development... - Google Scholar
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKEwimjcfH-LXNAhUG4mMKHctODFQQFggqMAE&url=http%3A%2F%2Fdodccrp.org%2Fevents%2F14th_iccrts_2009%2Fpresentations%2F048.pdf&usg=AFQjCNF9wFoxIRtL_IuPrpL38OL8iujBfA&sig2=UdnGDXDV_dL10nYulrh08w
Development of Computerized Support Tools for Intelligence Work
Expert Systems and Applied Artificial Intelligence
Apps Developer — Central Intelligence Agency
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0ahUKEwimjcfH-LXNAhUG4mMKHctODFQQFghlMAk&url=http%3A%2F%2Fwvchealth.org%2Fimages%2Fpdf%2Fjobs%2FSenior%2520Business%2520Intelligence%2520Analyst.pdf&usg=AFQjCNHpr8Xo0wAXTs7OaPE7U-jfD5GkIw&sig2=4CeUFNaeduUlgZXbqLtbgA
Detecting Linguistic Markers for Radical Violence in Social Media - Terrorism and Political Violence - Volume 26, Issue 1
Eigen-Optimization on Large Graphs by Edge Manipulation
9 Secret Google Search Tricks
Surface-wave methods for anomaly detection : GEOPHYSICS: Vol. 81, No. 4 (Society of Exploration Geophysicists)
Camera+ Adds a Slow Shutter for Manual Exposures, Deeper iOS Integration
How to Clean Up and Fine Tune Your Twitter Feed
Lacona Is a Launcher for OS X That Uses Natural Language Input
Microsoft Launches Planner, a Trello-Like Project Management Tool
Search Twitter More Efficiently with These Search Operators
Download roundup News, Videos, Reviews and Gossip - Lifehacker
Sunday showdown News, Videos, Reviews and Gossip - Lifehacker
The Alfred Emoji Pack Makes Searching for Emoji on a Mac Less Painful
Using Geographic Information Systems and Smartphone-Based Vibration Data to Support Decision Making on Pavement Rehabilitation - Springer
Build a Wi-Fi Drone Disabler with Raspberry Pi | Make:
The Mad Scientists at DARPA Plan to Crush Russia and China with 'Swarm' Weapons | The National Interest Blog
ISIS's Next Big Terror Target Might Be Tunisia | The National Interest
Cats seem to grasp the laws of physics
Experts discuss discuss the latest developments in synthetic biology and biotechnology, and their implications for U.S. national security over the next decade. - Council on Foreign Relations
orlando: total intelligence - CounterStrikeMedia
PSU Library Catalog
Check out these great sketchnotes from Apple’s WWDC
The Computer Vision Foundation – A non-profit organization that fosters and supports research in all aspects of computer vision
Carter Announces 'Hack the Pentagon' Program Results > U.S. DEPARTMENT OF DEFENSE > Article View
Special Report: Cyber Strategy
The Triangle of Recruitment, Selection, and Training in 21st Century Policing : The Politics of Policing: Between Force and Legitimacy
Confidential Report Shows Hired Hackers Able to... - Matthew Aid
The Faith Campaign and the Rise of the Islamic State | NU Middle East Review
Home Should Not Be a War Zone - The New York Times
A framework for information dissemination in social networks using Hawkes processes
Securing Afghanistan: from the inside out - Central Asian Survey -
IC Data Mining in the Post-Snowden Era - International Journal of Intelligence and CounterIntelligence - Volume 29, Issue 4
53 tabs
Copy links to clipboard
Copy
Open
Research | Department of Political Science
Politics, History and State Making | Department of Political Science
Policing the 2012 London Olympics: Legacy and Social Exclusion - Gary Armstrong, Richard Giulianotti, Dick Hobbs - Google Books
greta's gouge: Friday's Miscellany 06-17-2016
CIDOB - The Voices Behind the Refugee Outflow from Afghanistan
Finding Clarity in a Middle East Unbalanced - Carnegie Endowment for International Peace
Publications | Vienna Center for Disarmament and Non-Proliferation (VCDNP)
Special offers and deals to help you save | CenturyLink
June 2016 | Combating Terrorism Center at West Point
Basic Information for US Amateurs Travelling Abroad
The RAND Blog
Search Results
Download Encore #5: 25 non-fiction books Torrent - Kickass Torrents
Download Non fiction Torrents - Kickass Torrents
Profile of marty14 - Uploads - Kickass Torrents
The Orlando Transcript and a Renewed Terrorist Threat - Global Guerrillas
Bot Platforms and the race for Nation-State Advantage - Global Guerrillas
In a Race to Save a Man on the Tracks, a Reminder of What’s Good in the World - The New York Times
Research portal
Army Research Papers - Australian Army
GIS tools for connectivity, corridor, or habitat modeling - Corridordesign.org
Danger ISIS Targeting Rio Olympics 2016
Bad Guys Know What Works: Asymmetric Warfare and the Third Offset - War on the Rocks
(14) Timothy Hanratty | US Army - Academia.edu
Projects
Timothy Hanratty - Publications
Modeling and Simulation, Wargames, Wargaming, Military Simulations and Exercises
Thomas Elkjer Nissen - Research portal
Department of Language and Culture :: Research
NATO Review - Social Media: The Frontline of Cyber Defence
A Fuzzy-Based Approach to Support Decision Making in Complex Military Environments
Coalition Cohesion and the Practices of Peacekeeping - A Sociological Survey of the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA) - Forskningsportal
Kultur som Operativt Værktøj - Forskningsportal
Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts - Research portal
From Territorial Defence to Expeditionary Forces - Research portal
Human terrain exploitation suite: applying visual analytics to open source information. | (2014) | Hanratty | Publications | Spie
Home | U.S. Army Research Laboratory
Kongressen.com – Danske erfaringer i Afghanistan
MINUSMA Background - United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA)
Research portal - stczztop@gmail.com - Gmail
Agent based modeling in tactical wargaming | (2016) | James | Publications | Spie
Agent based modeling in tactical wargaming - Google Search
Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts - Google Search
Institute for Military Operations - Research portal
The Art of Deception and the Role of Intelligence Education - Research portal
Counterinsurgency and Counterterrorism: Sharing Experiences in Afghanistan and Pakistan - Research portal
International Seminar on Counterinsurgency and Counter-Terrorism: Sharing Experiences in Afghanistan and Pakistan - Research portal
Counterinsurgency and Counterterrorism: Sharing Experiences in Afghanistan and Pakistan - Research portal
Training to Discover and Learn in the Operational Environment - Research portal
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&ved=0ahUKEwj49aPIocDNAhUH82MKHWqLAN4QFghVMAk&url=http%3A%2F%2Fijoc.org%2Findex.php%2Fijoc%2Farticle%2FviewFile%2F1658%2F919&usg=AFQjCNG3pR8lc5wV3FDIwPaqt2LNbP0nLQ&sig2=KXkkvT-nyZjzLShOoDpDxA
Human Terrain Exploitation Suite - Google Search
Robert J. Hammell II - Publications
The Art of Deception and the Role of Intelligence Education - Google Search
14 tabs
Copy links to clipboard
Copy
Open
Royal Danish Defence College: Official Minutes from Seminar on Open Source Intelligence, 19 April 2016 « Public Intelligence Blog
Bradley Grimm: Operational OSINT « Public Intelligence Blog
Only The Onion Can Save Us Now | WIRED
DDoS emotions - O'Reilly Media
Keynotes from Velocity in Santa Clara 2016 - O'Reilly Media
Ghosts in the machines - O'Reilly Media
How the Red Cross Killed Non-Lethal Weapons - WSJ
Outplayed: Regaining Strategic Initiative in the Gray Zone, <em>A Report Sponsored by the Army Capabilities Integration Center in Coordination with Joint Staff J-39/Strategic Multi-Layer Assessment Branch</em>
CNAS Announces Formation of ISIS Study Group | Center for a New American Security
Inside the Spy Mapping Agency's Virtual Reality Lab - Nextgov.com
Study finds brain markers of numeric, verbal and spatial reasoning abilities | EurekAlert! Science News
IARPA Wants To Stop You From Spoofing Facial Scans and Fingerprints - Nextgov.com
Analyzing how ISIS recruits through social media: Researchers apply the laws of physics to study how terrorist support groups grow online, and how law enforcement can track activities -- ScienceDaily
How 'deviant' messages flood social media -- ScienceDaily
18 tabs
Copy links to clipboard
Copy
Open
The for-profit student debt dilemma | Brookings Institution
Policy Papers - Canadian Global Affairs Institute
Defeating the Islamic State: A Bottom-Up Approach | Center for a New American Security
Global Health, Aid and Corruption: Can We Escape the Scandal Cycle? | Center For Global Development
Protecting Euro 2016 and the Rio Olympics: Lessons Learned from London 2012 | Combating Terrorism Center at West Point
The Road to Orlando: Jihadist-Inspired Violence in the West, 2012-2016 | Combating Terrorism Center at West Point
Belgian Radical Networks and the Road to the Brussels Attacks | Combating Terrorism Center at West Point
How Terrorists Use Encryption | Combating Terrorism Center at West Point
Combating Terrorism Center at West Point
Air Dominance and the Critical Role of Fifth Generation Fighter Aircraft | Armed Services Republicans
Full Committee Hearing: “Department of Defense Update on the Financial Improvement and Audit Readiness (FIAR) plan” | Armed Services Republicans
Combatting Superbugs: U.S. Public Health Responses to Antibiotic Resistance | Energy and Commerce Committee
FCC Overreach: Examining the Proposed Privacy Rules | Energy and Commerce Committee
Subcommittee Hearing: Egypt: Challenges and Opportunities for U.S. Policy - Committee on Foreign Affairs
Subcommittee Hearing: The Global Religious Freedom Crisis and Its Challenge to U.S. Foreign Policy - Committee on Foreign Affairs
Hearing: U.S. Policy Toward Putin’s Russia - Committee on Foreign Affairs
House Committee on Homeland Security
Geolounge - Geography and Maps
24 tabs
Copy links to clipboard
Copy
Open
Weapons and Warfare | History and Hardware of Warfare
Publications | ICCT
Sharq Forum
How to attack the Islamic State online | Science
Critical Infrastructure Protection—How to Assess the Protection Efficiency - Springer
Reintegration of Child Soldiers: The Role of Social Identity in the Recruitment and Reintegration of Child Soldiers - Springer
Civic Participation in Contentious Politics - Springer
Data-Driven Discovery of Models (D3M) - Federal Business Opportunities: Opportunities
Mr. Wade Shen
DARPA Data-Driven Discovery of Models (D3M) BAA | Contract Research and Development
Whole Community, Any Hazard: The Updated National Planning Frameworks – Homeland Security Digital Library
U.S. Army War College Paper: Preparation for Megacity Operations | Public Intelligence
International Journal of Disaster Risk Science - Springer
Between Radicalization and Violence | Political Violence @ a Glance
Publishing Graph Degree Distribution with Node Differential Privacy
Fast and accurate identification of implicit enterprise users in social media
Enabling reliable data center demand response via aggregation
Inbox (174) - scitrenbaum@gmail.com - Gmail
(6581) Inoreader - Hack Read
How war drives terrorism | Brookings Institution
The Intercept
The Intercept
Defeating the Next Strain of Terrorism
Started from the Bottom: A New Approach to Countering ISIS – Homeland Security Digital Library
3 tabs
Copy links to clipboard
Copy
Open
J. Tyler Schwenk - Publications
Steven D. Sloan - Publications
Richard D. Miller, United States Geological Survey - ResearchGate
17 tabs
Copy links to clipboard
Copy
Open
Project Argus
Adam Svendsen (0000-0002-0684-9967) - ORCID | Connecting Research and Researchers
Adam Svendsen D-9577-2015 - ResearcherID.com
Current Projects
Adam D.M. Svendsen, PhD - Google Scholar Citations
Revisiting Aum Shinrikyo: New Insights into the Most Extensive Non-State Biological Weapons Program to Date | NTI
Nuclear Threat Initiative | NTI Education Tutorials
Richard Medina - University of Utah Geography Department
Place still matters: The operational geography of jihadist terror attacks against the US Homeland 1990–2012 - Dynamics of Asymmetric Conflict - Volume 6, Issue 1-3
The Future of Chemical Weapons - The New Atlantis
Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations - Analytical Chemistry (ACS Publications)
AUCSO 2010 National Conference (Part Two): Project Argus and background checks - IFSEC Global
SSIR | research&resources
Contemporary intelligence innovation in practice: enhancing “macro” to “micro” systems thinking via “System of Systems” dynamics - Defence Studies - Volume 15, Issue 2
Advancing “Defence-in-depth”: intelligence and systems dynamics - Defense & Security Analysis - Volume 31, Issue 1
Sharpening SOF Tools, Their Strategic Use and Direction: Optimising the Command of Special Operations amid Wider Contemporary Defence Transformation and Military Cuts - Defence Studies - Volume 14, Issue 3
Saved Session - Session Buddy
19 tabs
Copy links to clipboard
Copy
Open
» Places to Play Table Tennis in Portland, Oregon Paddle Palace
GitHub - casmi/nuclear-plant-map: Nuclear Plants Map is a viewer for nuclear power plants on the earth. This is one of the grallery projects of casmi.
casmi : Gallery : nuclear plants map
International Network of Nuclear Reaction Data Centres
INTERNATIONAL NETWORK OF NUCLEAR STRUCTURE AND DECAY DATA EVALUATORS (NSDD)
NDS Publications
CBRNE-Terrorism Newsletter
Nuclear Weapons Materials Gone Missing - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=0ahUKEwiO-L3tsrPNAhVU1mMKHRwQCIkQFgg1MAM&url=http%3A%2F%2Fwww.npolicy.org%2Fbooks%2FMaterials_Unaccounted_For%2Ffull_muf_book.pdf&usg=AFQjCNH-SjqnNK3OboiY-CGZ64weILFCeQ&sig2=xMTTWLaoLx9LKfC-3an4HQ
Operating nuclear reactors csv - Google Search
NRC: Operating Nuclear Power Reactors (by Location or Name)
Uranium from Russia, Inv. 731-TA-539-C (Second Review) - Google Books
World Nuclear Power Plants in Operation - Google Search
Illicit Trafficking Issues in the Black Sea Region - Google Search
argonne National Laboratory, EVS - Google Search
ALBANIA’S CHEMICAL WEAPONS CON - Google Search
Neutralizing Radicalized Threat Networks, Disrupting WMD Illicit Traffickers and Targeting Corrupt Facilitator - Google Search
Understanding Clandestine Nuclear Procurement Networks - Google Search
Disrupting WMD Illicit Traffickers and Targeting Corrupt Facilitators - Google Search
53 tabs
Copy links to clipboard
Copy
Open
Ticket Code Dedicated Site Home Page
Download Explorer Fighting ISIS 720p x264 HDTV [MVGroup] Torrent - Kickass Torrents
Profile of MVGroup - Uploads - Kickass Torrents
Profile of sharpysword - Uploads - Kickass Torrents
Current Events tv shows torrents - Kickass Torrents
Download PBS Frontline 2016 Business of Disaster 1080p HDTV x264 AAC [MVGroup] Torrent - Kickass Torrents
Business of Disaster | FRONTLINE | PBS
FRONTLINE - Documentary films and thought-provoking journalism
The Secret History of ISIS | FRONTLINE | PBS
Watch: FBI, USSOCOM and International SOF - Snipers, Movers, and Shooters
How Does the CIA Gather Intelligence? Robert Baer on Information Sharing, Agents (2003) - YouTube
Starr Forum: The ISIS Apocalypse (entire event) - YouTube
ABCA 2016 Round-up: 25 papers on urbanization in Africa | Impact Evaluations
Rose City (Tetris) ‘Til I Die « Silicon Florist
UFMCS - Google Search
University of Foreign Military and Cultural Studies / Red Teaming | US Army Combined Arms Center
University of Foreign Military and Cultural Studies Courses | US Army Combined Arms Center
Some New Tools for Your Analytical Red Teaming Kit | RED TEAM JOURNAL
Mapping Militant Organizations - Google Search
DARPA Social Media in Strategic Communication - Google Search
The Oil & Gas Threat Map |
Pinboard: bookmarks for scitrenb
WISE Uranium Project
Countering Terrorism and Insurgency in the 21st Century
National Intelligence Press – National Intelligence University
NI Press Publications – National Intelligence University
Internet Archive Search: creator:"National Intelligence University"
The Islamic State Psyops - Foreign Fighters' Complexes (2) - Red (Team) Analysis
Author Debriefing: Climate Change and Conflict Prevention · SpyCast · International Spy Museum
Where the Black Flag of ISIS Flies
Dryad Digital Repository - Dryad
GUEST POST: ISIS and the Hollywood Visual Style | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
Psychometric properties of the Norwegian version of the Evidence-Based Practice Attitude Scale (EBPAS): to measure implementation readiness | Health Research Policy and Systems | Full Text
Washington and Lee Law Review
Pen-on-Paper Flexible Electronics - Russo - 2011 - Advanced Materials - Wiley Online Library
The Red Teamer’s Go-To Move #4: Understand and Exploit Metrics | RED TEAM JOURNAL
The Nuclear Suppliers Group’s Critical India Decision | The Diplomat
Global Islamic State | Mapping Militant Organizations
Pocket: My List: _untagged_
AppRecs Filters Out BS iTunes App Store Reviews
Distracted in 2016? Reboot Your Phone with Mindfulness — The Startup — Medium
Sunnis vs. Shiites, Abadi vs. Maliki, Kurds vs. Everyone | Foreign Policy
Pocket: My List
What I Learned When I Left My iPhone Behind - The Atlantic
Why Are Macs So Expensive? | noodlemac
View Every App You've Ever Installed on Your Smartphone
All the Roku Secret Commands and Menus In One Graphic
Instapaper
McMahon: Joint Special Operations University and... - Google Scholar
USING INDUSTRY ANALYSIS FOR STRATEGIC INTELLIGENCE - Google Search
Howe: USING INDUSTRY ANALYSIS FOR STRATEGIC INTELLIGENCE - Google Scholar
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwighrfekLPNAhVS6mMKHRxoAB4QFggeMAA&url=http%3A%2F%2Fni-u.edu%2Fwp%2Fwp-content%2Fuploads%2F2015%2F03%2FHowe.pdf&usg=AFQjCNH9Y6ZuPaKkaak-0vx6MLdXy4iYyQ&sig2=GuV2DyR3Y5fHNHudAVT2cg
CIDOB Policy Research Project - Google Search
26 tabs
Copy links to clipboard
Copy
Open
Here's the ranked list of Oregon's 100 Fastest-Growing Private Companies - Portland Business Journal
Uber Portland launches partnerships with WeWork, PSU - Portland Business Journal
Washington Journal Seamus Hughes Homegrown | Video | C-SPAN.org
How To Prevent Another Domestic Terror Attack
Where To Find ISIS Supporters: A Map Of Militant Groups Aligned With The Islamic State Group
KB0165: How can I reduce the file size of my book?
How to shrink ePub file size - MobileRead Forums
PBS: Charlie Rose The Week Videos
Watch Full Episodes Online of NOVA on PBS
Watch Full Episodes Online of Vicious on PBS
The Clashing Agendas In The Fight Against ISIS | The ISIS Threat | FRONTLINE | PBS
FRONTLINE - Documentary films and thought-provoking journalism
FRONTLINE - Documentary films and thought-provoking journalism
How To Sort Through Your Threat Intelligence Feeds
Russia’s Track And Field Team Barred From Rio Olympics Amid Doping Controversy – Consumerist
What US Social Media Is Doing and What US Social Media Should be Doing - JestersCourt
GUEST POST by Kronykal Jones: The 'Internet of Feels' - JestersCourt
Amazon KDP Support: Apple Pages ePub export - how to shrink ...
Red Team Tools - Lock Picks, Field Gear, & Training Equipment
Beaty: Bomdetec wide area surveillance and suicide... - Google Scholar
Watch: Special Forces Advanced Urban Combat Course | SOFREP
DVIDS - Defense Video & Imagery Distribution System
reduce epub file size - Google Search
Red Teaming Tools: - Google Search
Winning the War at Home: Stability Operations Strategy for Homeland Security | HOMELAND SECURITY AFFAIRS
RCT-YES - Home
3 tabs
Copy links to clipboard
Copy
Open
Wolves and wolf packs | Brookings Institution
STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities - Google Search
PNNL: Publication Details
6 tabs
Copy links to clipboard
Copy
Open
Episode 5 - Aaron Burr, Sir: Backstage at Broadway's HAMILTON with Leslie Odom Jr. - YouTube
Watch Later - YouTube
The Marines - PBS Documentary (full length) - YouTube
What ISIS Really Wants - YouTube
The "Islamic State": The Future of Global Jihad? - ICT15 - YouTube
Nukes and Spooks: Intelligence Lessons from the Cuban Missile Crisis: Setting the Stage - YouTube
24 tabs
Copy links to clipboard
Copy
Open
Robot Mounted GroundEye Sensor Set to Combat Hidden IEDs | Defense Update:
Maps Mania: Club vs Country
Download Tons of Free Coursera Courses Before They Disappear Forever
Strengthen Your Network Connections With Monthly People Checklists
vmp - Error Site | Motherboard
First comprehensive report examines Americans recruited by ISIS
Syria Situation Report: June 10 - 17, 2016 | Institute for the Study of War
New website captures 150 years of Russian history in 80,000 photos | Russia Beyond The Headlines
City of Detroit Launches Online Demolition Tracker
Russia bombs US-backed rebels in Syria; Iraqi SOF raises flag in Fallujah; New tools to fight lone wolves; Another record year for arms makers; and a bit more. - Defense One
How to Stop the Next Viral Jihadi Video - Defense One
The Pentagon is Developing A New Suite of Tools to Fight the Lone Wolf Problem - Defense One
Advanced Microscopy Technique Images Detailed Structure of DNA | Medgadget
9 Visual Tools to Create Awesome Social Media Images : Social Media Examiner
Synthetic Biology Special Interest Group - innovateuk
Intelligence
Profile of -PUNISHER- - Uploads - Kickass Torrents
Profile of Dr.Soc. - Kickass Torrents
Profile of zeke23 - Uploads - Kickass Torrents
Net Data Directory
IRS Unleashes Flood of Searchable Charity Data - The Chronicle of Philanthropy
Home | Internet Monitor
Preceden Timeline Maker: Create a timeline in minutes
Zotero | People > Massimo Menichinelli > Library > Pen-on-Paper Flexible Electronics
46 tabs
Copy links to clipboard
Copy
Open
Publications Sentinel Issues | Combating Terrorism Center at West Point
The Evolving Challenges for Explosive Detection in the Aviation Sector and Beyond | Combating Terrorism Center at West Point
Heidelberg Institute for International Conflict Research
Heidelberger Institut für Internationale Konfliktforschung
related:www.au.af.mil/au/awc/awcgate/army-usawc/shifting_fire.pdf shifting fire information effects in counterinsurgency and stability operations - Google Search
Uranium Enrichment Process Module - Google Search
Nuclear Basics - World Nuclear Association
World Nuclear Power Reactors | Uranium Requirements | Future Nuclear Power - World Nuclear Association
Number of nuclear reactors - World Nuclear Association
List of nuclear reactors - Wikipedia, the free encyclopedia
Nuclear Units Under Construction Worldwide - Nuclear Energy Institute
Osint Tools Related Keywords & Suggestions - Osint Tools Long Tail Keywords
Toolkit - The Research School
Intelligence Analysis | Canadian Police College
Conference Proceedings « System Dynamics Society
FOI - Swedish Defence Research Agency
Alert4All - Publications
Brynielsson: Social Media Screening for Supporting... - Google Scholar
Conference Proceedings
HFM-201 Social Media: Risks and Opportunities in Military Applications
Calogero G. Zarba - ResearchGate
Exploring the Security Landscape: Non-Traditional Security Challenges - Google Books
WISE Uranium Project - Uranium Enrichment and Fuel Fabrication
This document has moved to https://www.sto.nato.int.
Alert4All - Home
Nuclear Energy Institute - Advancing Clean, Reliable Energy
NRC: Uranium Enrichment
NRC: Backgrounder on Uranium Enrichment
NRC: Map of Power Reactor Sites
CBRNE - Chemical Decontamination: Overview, Purpose of Chemical Decontamination, Recognizing a Chemical Contamination
Top U.S. Intelligence Official Calls Gene Editing a WMD Threat
Defense Threat Reduction Agency
Islamic Sleeper Cell Investigation Looking for Evidence - SPIEGEL ONLINE
Dispersed Computing (DC) Proposers' Day
Why Tradecraft Will Not Save Intelligence Analysis
Welcome to The Air University
2016 Robert Steele on OSINT – Why and How « Public Intelligence Blog
Osint | LinkedIn
(2940) Inoreader - Channels
RTO-MP-HFM-201 - Google Search
Defense Secretary Ash Carter Releases Hack the Pentagon Results > U.S. DEPARTMENT OF DEFENSE > News Release View
Hack the Pentagon - Google Search
Hack the Pentagon: Vulnerability Disclosure via HackerOne
Department of Defense expanding Hack the Pentagon program | TechCrunch
Teen hacks Pentagon websites, gets thanked for finding 'bugs' | Reuters
Intelligence | Foley & Lardner LLP
8 tabs
Copy links to clipboard
Copy
Open
More HUMINT Needed for Counterterrorism Fight - Matthew Aid
Syria Has Resumed Building Weapons for Hezbollah,... - Matthew Aid
50 US Ambassadors Slam Obama Policy on Syria, Urge... - Matthew Aid
Pentagon Playing Great Role in US Drone Program,... - Matthew Aid
Trying to Predict Terrorist Attacks With... - Matthew Aid
How Pro-ISIS Groups Adapt Like Online Organisms - Scientific American
U.S. Government Wants to Jump-Start Next-Generation Nuclear Reactors
Why You Should Keep a Journal (and How to Start Yours)
41 tabs
Copy links to clipboard
Copy
Open
NCE Tunnelling Conference
Innovations in Tunnel Construction Methods | NJIT Online
Tunneling Innovation: - Tunnel Business Magazine
cost of gaza tunnel - Google Search
Geotechnical Engineering, Geological Engineering, Geotechnical Data Inquiries - Geotechpedia
Tunnel Engineering Publications - Geotechpedia
Tunnel Design Publications - Geotechpedia
Tunnel Induced Settlements Publications - Geotechpedia
Tunnel Investigation Publications - Geotechpedia
Blogs Links and Sites - Geotechpedia
Publications :: Manuals For Download - Geotechnical Engineering Directory
Databases - Geotechnical Engineering Directory
Geotechdata.info - Free database of geotechnical information
Free open-access database of geotechnical testing information - Geotechdata.info
Geotechnical Resources: Publications
Home - Pile Buck International, Inc.
(1712) Inoreader - The Intercept
Washington’s War on the Islamic State Is Only Making It Stronger | Foreign Policy
Dead Drop June 17 | The Cipher Brief
[1606.04695] Strategic Attentive Writer for Learning Macro-Actions
[1606.04956] Assessing Human Error Against a Benchmark of Perfection
Sensors | Free Full-Text | A Thermal Performance Analysis and Comparison of Fiber Coils with the D-CYL Winding and QAD Winding Methods
ProjecToR - Microsoft Research
Stable Matching Algorithm for an Agile Reconfigurable Data Center Interconnect - Microsoft Research
Sensors | Free Full-Text | Detection and Classification of Finer-Grained Human Activities Based on Stepped-Frequency Continuous-Wave Through-Wall Radar
Armenia Nuclear Power Plant theft at DuckDuckGo
Nuclear Power in Armenia - World Nuclear Association
INSP: Soviet-Designed Nuclear Power Plant Profiles: Armenia
Metsamor Nuclear Power Plant - Wikipedia, the free encyclopedia
Revisiting the Metsamor Nuclear Power Plant | Armenian Weekly
Nuclear Power Plants from All Over the World Are Vulnerable to Cyberattacks
Is Armenia's Nuclear Plant the World's Most Dangerous?
Russia Offers to Subsidize Nuclear Plant | Asbarez.com
Armenia | Countries | NTI
Russia to Fund Component of Armenia’s New Nuclear Plant | Asbarez.com
Moscow, Yerevan mull boosting Armenian NPP nuclear fuel reserves - PanARMENIAN.Net
Visit: IAEA experts will test Armenian Nuclear Power Plant - News | ArmeniaNow.com
Nuclear alarm from Armenia – EurActiv.com
The EU and Armenia’s Nuclear Power Plant | Far Outliers
NRC: Event Notification Report for January 28, 2015
The Finest Hours (2016 film) - Wikipedia, the free encyclopedia
5 tabs
Copy links to clipboard
Copy
Open
Innovations-in-Tunnel_A3.png (600×6882)
Methods for tunneling construction - More about - Bulgarian Association for Geotechnical and Tunneling Construction
TUNNEL EXCAVATION METHODS | Gautrain - Construction
Tunnel Construction: Soft Ground and Hard Rock - How Tunnels Work | HowStuffWorks
Tunnelling: Mechanics, methods, and mistakes
6 tabs
Copy links to clipboard
Copy
Open
Peter J. Tarkoy, PhD, | Geotechnical Engineering & Geology | Massachusetts
Peter J. Tarkoy | LinkedIn
Tunnels, Gaza Strip, Hamas, Israel | Homeland Security News Wire
Hydraulic Cutters, Roadheaders, Rotary Cutters | Antraquip Corporation | Roadheaders & Hydraulic Cutters | Rock Grinders, Concrete Cutters
WHAT HAPPENED TO INNOVATION IN US TUNNELLING - Google Search
Tunneling, Explosive Compounds, and Rock Drills: Also, Descriptions of the ... - Henry Sturgis Drinker - Google Books
9 tabs
Copy links to clipboard
Copy
Open
Application of the Theory of Inventive Problem Solving in Tunnel Construction: Journal of Construction Engineering and Management: (ASCE)
Journal of Construction Engineering and Management - 131(10):1099 - PDF (ASCE)
Underground innovation: Tunneling technology advancements boost efficiency, cost savings | Construction Dive
Multi-mode TBM - Herrenknecht AG
Home - Herrenknecht AG
NCE Tunnelling & Underground Space Awards
The Tunnel Dismantling Machine (TDM): the Next Generation of Tunnellers | Bouygues Construction
Innovation - Herrenknecht AG
References Tunnelling - Herrenknecht AG
20 tabs
Copy links to clipboard
Copy
Open
London's Rumoured Secret Tunnels | Londonist
Nuclear Terrorism: How Serious a Threat to Russia? - Harvard - Belfer Center for Science and International Affairs
Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide - Volume 8, Issue 3
Sensor integration study for a shallow tunnel detection system. (Technical Report) | SciTech Connect
TACTICS: Policy and strategic impacts, implications and recommendations | RAND
Active Shooter Preparedness | Homeland Security
Cut-and-Cover Tunnels
Hamas ‘Terror Tunnel’ Chief Defected To Israel – PC Jewish Pulse
Hamas tunnel shows conflict has continued unabated since 2014 war | The Times of Israel
Arrest of 17-Year-Old Hamas Member Reveals Valuable Information About Terror Tunnels |
2nd Gaza terror tunnel discovered on Israel border in a month | Israel | Jewish Journal
MabatIsrael – IDF uncovers Gaza ‘terror tunnel’ dug into Israeli territory by Judah Ari Gross
A thing or two about “terror tunnels” | Sixteen Minutes to Palestine
Raytheon: Clear View Security Solutions
Tunnel Activity Monitoring Project - Google Scholar
Tunnel Detection Project - Google Search
Tunnel Vision | Homeland Security
Innovative Air-Deliverable Tunnel Detection Sensor Suite | SBIR.gov
Innovative Air-Deliverable Tunnel Detection Sensor Suite - Google Search
Award Listing | SBIR.gov
19 tabs
Copy links to clipboard
Copy
Open
Humble Book Bundle: Electronics Presented by Make: (pay what you want and help charity)
OTL: Lionel Messi, Here & Gone - Soccer - ESPN
HotKey | Code Nuts
Home - Marginnote
iOS Apps reviews, how to advice, and news
Download Encore #3: 15 non-fiction books Torrent - Kickass Torrents
Herbert Tinsley "Terrorism: A Short Course" | START.umd.edu
Sensors | Free Full-Text | Advanced Unsupervised Classification Methods to Detect Anomalies on Earthen Levees Using Polarimetric SAR Imagery
bellingcat - The Thuraya Network: A Satellite Data Network for the Syrian Rebels - bellingcat
Statement by Director Brennan as Prepared for Delivery Before the Senate Select Committee on Intelligence — Central Intelligence Agency
Peering Into Darkness Beneath the Israel-Gaza Border - The New York Times
New online ecology of adversarial aggregates: ISIS and beyond | Science
New online ecology of adversarial aggregates: ISIS and beyond | Science
A Maritime Threat Assessment of Sea Based Criminal Organizations and Terrorist Operations | HOMELAND SECURITY AFFAIRS
Richard G Brody - Publications
Tunnelling borders | openDemocracy
isayeret.com | The Israeli Special Forces Database
CIA Director John Brennan Warns Lawmakers | Video | C-SPAN.org
C-SPAN TV Schedule | C-SPAN.org
27 tabs
Copy links to clipboard
Copy
Open
Human Costs of Border Control |
Digital Libraries | Recovery Diva
Red Teams Needed to Critique Military Operations
ISIS has found a way to pierce US counter-terrorism defenses - Global Guerrillas
Home
The Red (Team) Analysis Weekly – 16 June 2016 - Red (Team) Analysis
The Chemistry of Cats (video) | Lab Manager
The World of 2020 According to DARPA - Defense One
usmc tunnels 2016 at DuckDuckGo
Desperation Rising at Home, Africans Increasingly Turn to Risky Seas - The New York Times
Michael Clemens | Open Borders: The Case
The Use of FBI’s Facial Recognition Is Growing, Despite Rampant Inaccuracy and Privacy Concerns
Why Orlando Happened and How to Prevent Future Attacks | Political Violence @ a Glance
Top Ten #ddj: The Week’s Most Popular Data Journalism Links | Global Investigative Journalism Network
Labour law: three months of alleged police violence, summarized in a table
'Threat Map' Aims to Highlight the Worst of Oil and Gas Air Pollution | InsideClimate News
National Map | The Oil & Gas Threat Map
Federation Of American Scientists -
A New Era for Nuclear Security | Arms Control Association
War News Updates: Military And Intelligence News Briefs -- June 16, 2016
Building with Biology online workshops - Google Search
operation pillar of cloud, - Google Search
openSecurity | openDemocracy
‘Iranians help Hezbollah build tunnels in Lebanon' - Middle East - Jerusalem Post
Analyzing Various Social Networking Approaches for Covert Networks - Springer
Welcome to ABCHS - American Board for Certification in Homeland Security
Gaza Strip smuggling tunnels - Wikipedia, the free encyclopedia
16 tabs
Copy links to clipboard
Copy
Open
AspireAssist Stomach Emptying System for Weight Loss FDA Approved | Medgadget
How Geophysicists Built a Scale Model of Earth’s Core Out of Sulfuric Acid
Inside Jaguar Land Rover's incubator, and a look at 3 more startups (Photos) - Portland Business Journal
This Central Intelligence GIF maker could be misused in so many ways · Great Job, Internet! · The A.V. Club
The A.V. Club
Billy provokes the wrath of Lin-Manuel Miranda in the Difficult People season 2 trailer · Coming Distractions · The A.V. Club
delete [Gmail].mbox mac - Google Search
How to clean up Mail in OS X Yosemite | OOPS TECH BLOG
mail.app - How to setup Apple Mail so it truly removes email from Google? - Ask Different
lion - Is it safe to remove ~/Library/Mail folders - Ask Different
10.4: Remove some extraneous Mail mailboxes - Mac OS X Hints
delete .mbox mac - Google Search
Gmail Exports: How to import MBOX exports back to your Gmail account. – Backupify Support
How to view Gmail Exports locally on your computer – Backupify Support
GitHub - google/import-mailbox-to-gmail: Import .mbox files into Google Apps for Work
Google Open Sources Two Tools To Import Mail Into Gmail | TechCrunch
13 tabs
Copy links to clipboard
Copy
Open
ininventor:"Howard Kaushansky" - Google Search
7 Tools and Recommendations for Social Media Investigations
IACP Center for Social Media > Topics > Parent
IACP Center for Social Media > Resources > Tools & Tutorials
Set Piece
Worldwide Governance Indicators | Data
Public Alerts | CivicApps.org
iScience Maps
Articles/Journals - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
2018 Security Outlook - Potential Risks and Threats | CSIS
Intelligence Agency Wants to Keep ‘Novel Organisms’ From Threatening Humans - Nextgov.com
This Hilarious, Imaginative Icelandic Twitter Account Is The One To Follow For The Euros
SOCOM Adds 24 Firms to $450M Mission Support Contract
6 tabs
Copy links to clipboard
Copy
Open
Terror Watch Lists and Adverse Action - Lawfare
FBI — TSC's Role in the Interagency Watchlisting and Screening Process
Journals
Open Data Inception - A Comprehensive List of 2500+ #OpenData Portals in the World
Search for a Dataset - Data.gov
10 essential Finder tips every Mac user should know
9 tabs
Copy links to clipboard
Copy
Open
Datasets | CivicApps.org
Crime Incidents - 2014 | CivicApps.org
Employment Data | CivicApps.org
New Business Licenses API | CivicApps.org
api.civicapps.org/business-licenses/
Restaurant Inspections | CivicApps.org
CivicApps API Reference : eGovernment Team, City of Portland
City Parks | CivicApps.org
CivicApps API Reference : eGovernment Team, City of Portland
41 tabs
Copy links to clipboard
Copy
Open
Data Journalism | Global Investigative Journalism Network
One Thing Well | googler
DARPA DEMO DAY
SocialSensor · GitHub
Social Sensor Project - Publications
101+ OSINT Resources for Investigators | i-Sight
Thrillist Portland | Best Restaurants, Bars and Things to Do
Defense Advanced Research Projects Agency
Data journalism training materials
iOS gestures you may not have known - Six Colors
The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos
Twitter Guide - The Best Twitter Apps and Tools
Instapaper
Downloads – DevDH.org
Investigation Cheat Sheets To Help Run A Successful Investigation | i-Sight
Infalia - Home
When ISIS Hackers Call You Out By Name | Motherboard
emergency
One Thing Well | Goose
Markdown for Beginners | Techinch
News
Predicting Contagiousness to Limit the Spread of Disease
Resources – i-intelligence
Research – i-intelligence
Readings – i-intelligence
Omar Mateen’s Imam: Blind Sheikh’s Bodyguard in the 1990s | National Review
Login in to your Social Explorer account - Social Explorer
Social Sensor Project - Project
Social Sensor Project - Work Packages
Social Sensor Project - Deliverables
DG CONNECT | Digital Single Market
IC OFF THE RECORD - Intelligence Leaks Published in 2016
How to use the Dropbox 1TB deal effectively with an external hard drive and a roving laptop - Quora
Uranium season: 2nd group of isotope smugglers busted in Georgia in 10 days — RT News
Tools | Decision Theater

Five Great Online Tools for Mining Public Records
the narcosphere
Home
List of active rebel groups - Wikipedia, the free encyclopedia
JUNE 15 AM START - Session Buddy
6 tabs
Copy links to clipboard
Copy
Open
MacStories Weekly: Issue 18
MacStories Weekly: Issue 13
MacStories Weekly: Issue 12
MacStories Weekly: Issue 11
MacStories Weekly: Issue 6
MacStories Weekly: Issue 10
06-14 9:30PM
Copy links to clipboard
Copy
Open
GeoLite2 Free Downloadable Databases « Maxmind Developer Site
DMML Projects
Publications
In Which We Get to the Bottom of Some Crazy-Ass Language | JSTOR Daily
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
AmazonSmile: Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more
THOMAS THWAITES » A holiday from being human (GoatMan)
Conflict Trends Reports | ACLED
ACLED | ACLED
About ACLED | ACLED
Acleddata - Crisis | Data and Analysis of Africa's Political Crisis
Hunchly 1.1.7 Released!
Mars Explorers Wanted Posters
Appliances |
Home - Droplr
arXiv.org Search
2016 International Conference on Social Media & Society (#SMSociety: Full Schedule
Resources - Toddington
Just Delete Me | A directory of direct links to delete your account from web services.
GeoSocial Footprint
Girls Inc. of the Pacific Northwest
Oregonian Newsroom Staffers Sickened by Morale Booster - Willamette Week
Real Time Search - Social Mention
Publications | ACLED
No, Actually, NASA’s Social Media Team Wins the Internet | WIRED
How Bangladesh Became Fertile Ground for al-Qa`ida and the Islamic State | Combating Terrorism Center at West Point
My Drive - Google Drive
One Tap Less | Direct Links to Dropbox Files with Workflow
30 New Links for @WorkflowHQ I found this week (18) on Twitter @BestWorkflows] | Automation for iOS
10 great ways to put Workflow to work
Taylor: Acquiring Agent-Based Models of Conflict... - Google Scholar
How to find and remove files from the 'Other' storage category on your Mac | iMore
Twitter Informants (Part 3) [READ] - Pastebin.com
Newsletters Archive - Toddington
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
Automated Workflow & Task Automation | Microsoft Flow
Gadgets to Get Organized, Daily To-Dos for a Good Life, and the Truth Behind "Credit Repair" Agencies
Bulgarian PM: Cigarette Smuggling Will Be Eradicated by 2012, Page 1 - Investigative Dashboard Search
Search documents - Investigative Dashboard Search
Stop Forgetting Things by Jordan Gonen - Product Hunt
Social Media in the Arab World: Communication and Public Opinion in the Gulf ... - Barrie Gunter, Mokhtar Elareshi - Google Books
Social Media Tools by Constantin Colac | ZEEF
The Joint Threat Anticipation Center
Archives — Command and Control Research Portal
Metadata Investigation : Inside Hacking Team | Share Lab
Share Lab | Investigative Data Reporting Lab
START News: Forecasting the flow of foreign fighters; Equipping educators to understand mass violence and extremism
53 tabs
Copy links to clipboard
Copy
Open
The Creative World’s Bullshit Industrial Complex - 99U
AI, Deep Learning, and Machine Learning: A Primer – Andreessen Horowitz
How To Order Delivery Without Feeling Like Shit, You Lazy Bum
There Should Be A "Soo" For Expressing Emphasis
Women’s connectivity in extreme networks | Science Advances
Finding Clarity in a Middle East Unbalanced - Carnegie Endowment for International Peace
Cat Tracker – Cat Tracks
Huan Liu - ACM author profile page
Measuring the Semantic Uncertainty of News Events for Evolution Potential Estimation
Low-cost Semantic Enhancement to Digital Library Metadata and Indexing
The Cultural Geography Model: Evaluating the Impact of Tactical Operational Outcomes on a Civilian Population in an Irregular Warfare Environment
ETTIS Project | European security Trends and Threats In Society( ETTIS)
SitRep: Complex Picture of Orlando Shooter; Apaches In Mosul Fight | Foreign Policy
My Data Is Dirty! Basic Spreadsheet Cleaning Functions | Global Investigative Journalism Network
Fealty and Modern Terrorism - Global Guerrillas
IEEE Xplore Abstract - Use of Reality Mining Dataset for Human Behavior Analysis -- A Survey
11 Useful Things You Can Do with Paperclips
Five Creative Ways to Use Hummus That Don't Involve Dipping
Predictive visual analytics of event evolution for user-created context - Online First - Springer
Towards the Improvement of Citizen Communication Through Computational Intelligence - Springer
GeoLife GPS Trajectories - Microsoft Research
scholar.google.com/scholar_url?url=http://arxiv.org/pdf/1606.02821&hl=en&sa=X&scisig=AAGBfm0b3lzcTEKNHIZgKTkFemhyJV2fTg&nossl=1&oi=scholaralrt
Bible Verses Where "Behold" Is Replaced With "Look, Buddy" - The Toast
Hack the Pentagon: Hackers find over 100 Bugs in U.S. Defense Systems
Sensay, a chatbot for getting help with any task, passes 1 million users | VentureBeat | Bots | by Matt Marshall
Ditching passwords will boost Android - Business Insider
David Crystal |
National Crime Agency - Careers
Nature: Nature Index Saudi Arabia
An Interview With Thomas Thwaites, Who Spent 3 Days Being A Goat With A Herd On The Alps : Goats and Soda : NPR
Paula Broadwell, David Petraeus and the Afterlife of a Scandal - The New York Times
Generating patent development maps for technology monitoring using semantic patent-topic analysis
Semantic Complex Event Processing Model for Reasoning Research Activities
Detecting Influenza States based on Hybrid Model with Personal Emotional Factors from Social Networks
Opinion mining based on fuzzy domain ontology and Support Vector Machine: A proposal to automate online review classification
No Confidence: Confidentiality, Ethics and the Law of Academic Privilege - Communication Law and Policy - Volume 21, Issue 3
Project Abacus is coming in 2016 - Tech Insider
The Toaster Project
THOMAS THWAITES » The Toaster Project
Your Wild Life
Your Wild Life - Our Projects
The EU, Strategy and Security Policy: Regional and Strategic Challenges - Google Books
Demonization in International Politics: A Barrier to Peace in the Israeli ... - Linn Normand - Google Books
The Irrational Actor and Asymmetric Propaganda Jihads | Krypt3ia
Scholar Alert - [ Semantic Analytics in ... ]; Articles excluding ... - scitrenbaum@gmail.com - Gmail
In Defense of Voodoo Doughnut — Medium
False Medium (@FalseMedium) | Twitter
Amazon.com: GoatMan: How I Took a Holiday from Being Human eBook: Thomas Thwaites: Kindle Store
U.S. Officials Concerned Over Intelligence Gaps That Failed To Prevent Orlando Attack - BuzzFeed News
Here's What Google Photos Could Do Next - BuzzFeed News
Home - Dropbox
Geolife Trajectories - Google Search
Euro 2016: The Multicultural Championship
189 tabs
Copy links to clipboard
Copy
Open
Pages - NATO Science & Technology Organization
Daily Schedule
Threads « System Dynamics Conference
Directory of Open Access Journals
The Mitchell Institute | News & Events
Down the Country-Month Rabbit Hole | Dart-Throwing Chimp
GeoDa Center | Spatial methods and tools - geodacenter.asu.edu
The Fund for Peace
Fragile States Index - Wikipedia, the free encyclopedia
CAST Conflict Assessment Framework Manual | The Fund for Peace
If my dogs were a pair of middle-aged men - PART TWO - The Oatmeal
Today's Best Deals: Gifts For Dad, Beginner Drones, Bluetooth Receiver, and More
Deals - Kinja Deals
Risk-Mitigating Policies and Adversarial Behavior: Case of Backlash - Mohtadi - 2016 - Risk Analysis - Wiley Online Library
Open Data Resources
EarlyWarning
MobileDataMap
AAAI Conferences
David Rumsey Historical Map Collection | The Collection
Use Cases | REVEAL
Tools for Peacebuilding | United States Institute of Peace
Every Device Apple's Making Obsolete with Its New Operating Systems
Earn Your Wings With These Ultra-Affordable Quadcopters, On Sale Today Only
Knight Lab | Northwestern University
ICONS Project | Maneuver and Engagement in the Narrative Space | Simulation Data
MIT Media Lab: GroupMedia
What is Root Cause Analysis (RCA)? | ASQ
ASSERT Toolkit for Societal Impact Assessment in Security Research | Assessing Security Research – Tools and Methodologies to Measure Social Impact
Home
Labs & Projects
CoDE Department, Université Libre de Bruxelles
Find News on Hamas, Hezbollah ,Netanyahu and the Palestine / Israel War- EBSCO Online Search Engine Directory
CrisisMappers - THE HUMANITARIAN TECHNOLOGY NETWORK
IARPA DIVA Proposers' Day - Overview
Professor Thomas W. Lucas
Edward H Kaplan | Yale School of Management
EEHolmes
Favorite and Forget: Archive
Favorite and Forget: 15 Useful Internet Tools
Product Reputation Trend Extraction from Twitter
http://forum.ggll.org/UCR+Codes.html is not available
greta's gouge: Friday's Miscellany 06-10-2016
11 Tools to Verify that Online Info - Julie Smith
ICIT Brief – The Anatomy of Cyber-Jihad: Cyberspace is the New Great Equalizer
iCrank Knowlege Center
Homeland Security and Counter-Terrorism Research
IEEE Xplore Abstract - Sensing Trending Topics in Twitter
Intelligence Briefings for the US Presidential Nominees | Strategic intelligence Briefs
All Publications - Bell School - ANU
Which tool should I use?
Electronic Tools for Use in the Continuum of Care for Patients With Addiction | IRETA
Related Links | Increasing Resilience in Surveillance Societies
ISF 2017
Jihad Intel
Archives
Politics and Religion - Ethno-political Organizations in the Middle East: When Do They Opt for Violence? - Cambridge Journals Online
Modsti | Modeling Science, Technology & Innovation Conference
N3TUQ - 6 Meter DX Map
Digital Commons Network | Free full-text scholarly articles
New Tool to Burst Twitter Rumours | news.sys-con.com
NodeXL Graph Gallery
NASA Technical Reports Server (NTRS) - Multi-Dimensional Damage Detection
Nuclear Weapons 204 - Armenia Is Smuggling Nuclear Materials | Nucleotidings
Lecture Notes | Readings in Optimization | Sloan School of Management | MIT OpenCourseWare
Journal of Digital Forensics, Security and Law
Archives
Collective Action to Avoid Catastrophe: When Countries Succeed, When They Fail, and Why - Barrett - 2016 - Global Policy - Wiley Online Library
OpenGazettes
OpenPrism
Exploratory Analysis
Simon Springer | People & Places Department of Geography
Peoples Under Threat - An annual ranking of countries according to the risk of mass violence faced by communities
Special Operations Command | washingtonpost.com
Public Records Directory
Operations Research: INFORMS
realitycommons.media.mit.edu
Eric Horvitz's Homepage
Reveal
REVEAL | Social Media Verification
Systems Analysis Laboratory: Frontpage
Systems Analysis Laboratory: Web resources
SBP 2015
Journal of Strategic Security | Vol 9 | No. 2
Projects | Laboratory for Social Machines
Social Physics
Social Technologies in Emergency Management | Social Media Reports
Sources And Methods: Top 5 Intelligence Analysis Methods: Multi-Criteria Decision Making Matrices/Multi-Criteria Intelligence Matrices (#2)
The SocialSensor Project - Sensing User Generated Input for Improved Media Discovery and Experience - Special Technical Community on Social Networking
osx - IMAP gmail - how to delete a mail forever on Mail.app Mac OS X - Super User
Next Generation Social Science | School of Global Environmental Sustainability
Syria Direct
30th System Dynamics Colloquium
How Social Media Can Predict Instability - TCV
Is it time for me to ditch Calibre? - TeleRead News: E-books, publishing, tech and beyond
Google launches Science Journal to turn your phone into a research lab
OpenSample — science for everyone
ISIS nuclear attack in Europe is a real threat, say experts - Times of India
Deep Twitter Analytics
TweetTracker
TweetXplorer Supplementary Page
Tweepsmap Intelligent Twitter Analytics And Visualization | Twitter Tools and Twitter Tips Blog
Publications
SMARTnews - CTS1: The Counterterrorism, WMD & Hybrid Threat SMARTbook
Ventity 1.0 Beta | Vensim
Influence Modeling of System Interactions
Phil Kivett's USAFSS COMINT Experiences
Archives
WhatMoji: Identify Emojis
Flora Amato Home Page
Presentations and Authors
Presentations and Authors
International AAAI Conference on Web and Social Media
Drugs and drones: The crime empire strikes back | Brookings Institution
Six ways to disable a drone | Brookings Institution
Building with Biology 2016 Kit | www.buildingwithbiology.org
Cascade Huts
www.cidob.org/en/
Superforecasting: How ordinary people can predict everything from world events to election results | City A.M.
Contract Research and Development | R&D Business Opportunity Abstracts
Local Violence Monitoring | Acleddata - Crisis
ONE YEAR SPECIAL REPORT — Burundi Local Data on Recent Unrest (26 Apr 2015 – 25 April 2016) | Acleddata - Crisis
Homepage - International Crisis Group
AQIM and ISIS in Algeria: Competing Campaigns | Critical Threats
Accelerating Discovery with New Tools and Methods for Next Generation Social Science
Security and defence | IAI Istituto Affari Internazionali
Institute for Defence Studies and Analyses
Archives
Convert TXT to PDF in Seconds: TXT2PDF
Daily Intelligence Briefing
Improve My City | Citizens Requests, Complaints & Suggestions
European Working Group Multicriteria Aid for Decisions: Books
InfoHarvest, Inc., Contact Information
MAR | MAR Data
Implementing graph grammars for intelligence analysis in OCaml
Georgian Intelligence Service Arrests Five for... - Matthew Aid
The Extremists Living Amongst Us and Why... - Matthew Aid
Multiple Criteria Decision Making | International Society on MCDM
Sensor Networks - A section of Sensors
Code | Multisensor Project EU
MULTISENSOR – in short | Multisensor Project EU
Research Arm for Intel Agencies Looking for Nontraditional Sensors
Websites - Counterinsurgency Strategy - NATO LibGuides at NATO Multimedia Library
Websites - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Nick Diakopoulos » Projects
Introducing OpenFuego, your very own heat-seeking Twitter bot » Nieman Journalism Lab
CNS Global Incidents and Trafficking Database | Analysis | NTI
Huan Liu
Project Description: BlogTrackers
SNOW Workshop | Third Workshop on Social News on the Web @ WWW '16, Montreal, Canada
Veracity and Velocity of Social Media Content during Breaking News: Analysis of November 2015 Paris Shootings | SNOW Workshop
Sessions by Thread
TargetMap - Create & share customized data maps on OpenStreetMap. Free Online Mapping tool
lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain – an Open Source Inventory | Schmid | Perspectives on Terrorism
8 Great Performances Nobody Is Talking About
What Happens When You Quit Showering? - The Atlantic
A New, Free Tool Lets You Analyze and Archive Twitter Simultaneously - The Atlantic
Create timelines, share them on the web | Timetoast timelines
The TREsPASS Project
www.uk-osint.net
Research projects | UMIACS
The Official Todd Sandler Homepage - Open Access
Vision of Humanity
Here’s How to Clean Up Your Gmail Inbox, You Hoarder | WIRED
Publications - Multimedia & Sensors Lab, Georgia Tech
Mapping the conflict in Burundi in 2015
Welcome - Humanitarian Data Exchange
Welcome - Investigative Dashboard Search
see what's happening | etrigg.com
Strategic Intelligence Service
How to find and use Twitter lists - First Draft News
Speed up your social newsgathering with these Twitter search shortcuts - First Draft News
Featured Sims - Forio Simulate
FoxType
Research | Center on the Future of War
Privacy error
A Socio-Cultural Geospatial Analysis and Modeling Framework in Support of Stability Operations and Infrastructure Applications | GeoDa Center
Insight Maker | Free Simulation and Modeling in your Browser
Investigative Dashboard
Investigative Dashboard - Google Ideas
Mohammed Hafez | Naval Postgraduate School - Academia.edu
Scholarly Open Access | Critical analysis of scholarly open-access publishing
NSC Decision Making and Operation Allied Force
OSINT Resources - The Grey Network
Compare Lists
Geo Extraction
twXplorer
VIS. Visual Investigative Scenarios platform: Pages
Systems Software Laboratory | Computer Science at Virginia Tech
Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.