Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,214 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
9 tabs
Copy links to clipboard
Copy
Open
AmazonSmile: ClosetMaid 5082 All-Purpose Organizer, Espresso: Home & Kitchen
AmazonSmile: Over the Door Magazine Storage Pockets Hooks Books Organizational Back to School Office Home, 14'W x32"H, Color: Black & Silver.: Home & Kitchen
AmazonSmile : Ohuhu Adjustable Vented Lapdesk with Mouse Board : Office Products
AmazonSmile: RAVPower 16750mAh Portable Charger External Battery Pack + 2A Wall Charger (iSmart Technology, Dual USB 5V / 4.5A Output, Upgraded Capacity) - Black: Cell Phones & Accessories
AmazonSmile: Retractable Lightning Cable [Apple MFi Certified], 3.3 Feet, 8 Pin Lightning to USB Sync Cable Charging Cord for iPhone 7, 7 Plus, 6s, 6s Plus, 6, 6 Plus, iPad Pro 12.9, 9.7, iPad Air, iPad Mini, iPod: Cell Phones & Accessories
AmazonSmile: Closet Organizer Collection, MaidMAX Clothes Organizer Storage Closet Organizer with 3 Tier Shelves and 2 Collapsible Drawers: Home & Kitchen
AmazonSmile: iPhone 7 Plus Case, Matone Apple iPhone 7 Plus Crystal Clear Shock Absorption Technology Bumper Soft TPU Cover Case for iPhone 7 Plus 5.5 Inch (2016) - Clear: Cell Phones & Accessories
AmazonSmile: Naztech Slim Mfi Certified Power Bank 3200mAH Powerful Portable Charger for iPhone 6/6s/6 Plus/6s plus & iPad: Cell Phones & Accessories
AmazonSmile: Mingo Heavy Duty Gooseneck Desk Bedside iPad Mount & Tablet Stand. 2-in-1 with a Car Phone Mount. Flexible 360 Degree Rotating Cell Phones Mount with Bolt Clamp Stand – iPhone, Android, iPad: Computers & Accessories
1 tab
Copy links to clipboard
Copy
Open
I made a chemical weapon in my toilet
66 tabs
Copy links to clipboard
Copy
Open
Bookmarks
Ulysses
A curated list of speech and natural language processing resources – Medium
https://nypd.sosacorp.com/share/proxy/alfresco/slingshot/node/content/workspace/SpacesStore/60c04f04-3ca9-4f96-9368-9100e652c3bb/Link List
American vigilante hacker The Jester defaces Russian government website - Oct. 22, 2016
PNNL: News - State's three largest public research institutions to increase collaboration
Why We Cannot Deter Terror in America – It’s Not Politically Correct - Google Search
Hacking Drones … Overview of the Main Threats
Find Out If One of Your Devices Helped Break the Internet | Motherboard
Police Are Sweeping Up Tweets and Friending You on Facebook, Whether You Know It or Not
'Minority Report' Is Real — And It's Really Reporting Minorities
IFTTT - Google Drive
New tweet by @rcallimachi - Google Sheets
New tweet by @th3j35t3r - Google Sheets
New tweet by @th3j35t3r (1) - Google Sheets
th3j35t3r - Google Search
The Jester (hacktivist) - Wikipedia
JΞSTΞR ✪ ΔCTUAL³³º¹, Author at JestersCourt
Hackers that suck: TH3J35T3R | Tango Clown: The Jester Exposed
How the Boy Next Door Accidentally Built a Syrian Spy Tool | WIRED
th3j35t3r | SOLDIERX.COM
Illuminat3: BREAKING: th3j35t3r "The Patriot Hacker" To Be Unmasked
2016 Annual Visitor Survey
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
HACKMAGEDDON – Information Security Timelines and Statistics
https://www.linkpack.io/lp/bWvGay/ - scitrenbaum@gmail.com - Gmail
th3j35t3r – HACKMAGEDDON
heckyesmarkdown.com/go/
Event Registry
Overview — Visualize your documents
2016 Annual Visitor Survey
Schema-Root.org Encyclopedia of Current Events
markdown to html - Google Search
Online Markdown Editor - Dillinger, the Last Markdown Editor ever.
markdown-to-html
StackEdit – In-browser markdown editor
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Adv%20Recon%20Framework](http://osintframework.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Resources%20-%20Toddington](https://www.toddington.com/resources/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/Collected%20from:%20[Anything%20We%20Can%20Do%20They%20Have%20Done%20Better%20-%20A%20Linkpack%20by%20Sara%20Citrenbaum](https://www.linkpack.io/lp/bWvGay/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Welcome%20to%20TaxBrain%20%20TaxBrain](http://www.ospc.org/taxbrain/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[https-::www.recordedfuture.com:](https://www.recordedfuture.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[CrisisWatch](https://www.crisisgroup.org/crisiswatch)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[PNNL:%20IN-SPIRE™%20-%20Home](http://in-spire.pnnl.gov/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Welcome%20to%20Crowdmap](https://crowdmap.com/welcome)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Howdy,%20This%20is%20a%20holding%20blurb%20until%20I%20get%20around%20](https://justpaste.it/rdaj)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Predata%20-%20Products](http://www.predata.com/products/#intelligence)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Mapping%20Militant%20Organizations](http://web.stanford.edu/group/mappingmilitants/cgi-bin/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Computational%20Event%20Data%20System](http://eventdata.parusanalytics.com/index.html)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[http://courageservices.com/Scorpion/](http://courageservices.com/Scorpion/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Mr.%20Looquer](https://mrlooquer.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Home%20-%20AllSource%20Analysis](http://allsourceanalysis.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[mdwardlab.com](http://mdwardlab.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Welcome%20-%20Aleph](https://data.occrp.org/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[VIS.%20Visual%20Investigative%20Scenarios%20platform:%20User](https://vis.occrp.org/account/users/login)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[RiskMap](https://www.riskmap.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[AidData%203.0%20%20Open%20data%20for%20international%20developm](http://aiddata.org/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Syria%20Tracker%20(سوريا%20تراكر)](https://syriatracker.crowdmap.com/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[syriatracker5%20–%20TIBCO%20Spotfire](https://spotfire.cloud.tibco.com/spotfire/wp/render/761194424092/analysis?file=/users/dmosenkis/public/syriatracker5&waid=DUeXYp-taUmdqfaDznuMI-251929dda6BQYI&wavid=0)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Paterva%20Home](https://www.paterva.com/web7/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[http://www.babelstreet.com/Default.aspx](http://www.babelstreet.com/Default.aspx)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[The%20GDELT%20Project](http://gdeltproject.org/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Conflict%20Armament%20Research](http://www.conflictarm.com/itrace/)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Hedonometer](http://hedonometer.org/index.html)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[D-PLACE](https://d-place.org/home)
chrome-extension://djdmadneanknadilpjiknlnanaolmbfk/-%20[Kaspersky%20Cyberthreat%20real-time%20map](https://cybermap.kaspersky.com/)
Saved Session - Session Buddy
Day 05
Copy links to clipboard
Copy
Open
Who is th3j35t3r? | T3h H3r0d07u5 R3p0r7
Internet of Things (IoT) Scanner - BullGuard
GitHub - edobashira/speech-language-processing: A curated list of speech and natural language processing resources
The Jester Hacker: 5 Fast Facts You Need to Know | Heavy.com
https://www.babelstreet.com/Company.aspx#Partnerships
Recorded Future: Real-Time Threat Intelligence
Discover IFTTT and Applets - IFTTT
BROADWAY SESSIONS - YouTube
A curated list of speech and natural language processing resources – Medium
Babel Street, Inc. | Law Enforcement Intelligence Units
Law Enforcement Intelligence Units | Trust, Integrity, and Communication---Your Voice at the National Level
These Affordable Dongles Add a Bunch of Ports Back To Your New MacBook
The OSINT Toolkit – osint – Medium
Alfresco » Repository Browser
ISIS propaganda collected in real time
SUPPORT 'J' - JestersCourt
JΞSTΞR ✪ ACTUAL³³º¹ (th3j35t3r) | Keybase
JesterGear: Products on Zazzle
BREACH OR CLEAR | Jesterscourt
Doug Ross @ Journal: Larwyn's Linx: FBI Agents Say Comey ‘Stood In The Way’ Of Clinton Email Investigation
Explosives cause concern in Hanover - News - Hanover Mariner - Hanover, MA
InternetAWACS | Jesterscourt
InternetAWACS | Jesterscourt
How Twitter Is Changing Modern Warfare - The Atlantic - Linkis.com
Twitter cuts ties with another social media surveillance company
Medical Xpress - Violence and Gender
Isis mobile wallet abandons name to militant group
46,000 Twitter accounts linked to Islamic State: study
Student studies Twitter tactics of ISIS supporters
Cybersecurity expert analyzes Anonymous' hacking attacks on ISIS
Microsoft to address UN on 'digital terror'
Data mining of Twitter posts can help identify when people become sympathetic to groups like ISIS
Israel firm wants super-efficient engine to power car revolution
New 'digital life' initiative aims to create 3-D models of all living creatures
The 30 Most Influential People on the Internet | TIME
Home | U.S. Army Research Laboratory
US intelligence agency to 'foresee news' before it happens using Twitter | Daily Mail Online
The CIA Says It Can Predict Social Unrest as Early as 3 to 5 Days Out - Defense One
OneTab shared tabs
ISIS in America | Center for Cyber & Homeland Security | The George Washington University
Minority Report (film) - Wikipedia
JestersCourt by JΞSTΞR ✪ ΔCTUAL³³º¹
Site-Wide Activity – JestersCourt
Site-Wide Activity – JestersCourt
VIDS - JestersCourt
Sent Mail - scitrenbaum@gmail.com - Gmail
Safer Already – Medium
Police can't use Twitter to predict hate crimes — but that could change soon
Alfresco » Shared Files
Why We Cannot Deter Terror in America - It's Not Politically Correct
The 3:10 To Huma (@GayPatriot) | Twitter
Kron (@Kronykal) | Twitter
(10) Defeat Killary (@SassyJerseyGirl) | Twitter
Sebastian Anthony (@mrseb) | Twitter
Public Intelligence (@publicintel) | Twitter
List members
The Joint Staff (@thejointstaff) | Twitter
Hacking Drones … Overview of the Main Threats - InfoSec Resources
Find Out If One of Your Devices Helped Break the Internet
The OSINT Toolkit
The Jester Effect and #iAWACS
(4) Welcome! | LinkedIn
Fighting ISIS Online
What Google and Facebook Can Do to Fight ISIS
Can a Social-Media Algorithm Predict a Terror Attack?
How artificial intelligence could help warn us of another Dallas - The Washington Post
Day 04
Copy links to clipboard
Copy
Open
Home - The Iran Project
Sublime Text: The text editor you'll fall in love with
10 Awesome Brackets Extensions You Really Need
OSINT Training by Michael Bazzell
Resources - Toddington
Adobe Max 2016: Creative Cloud app updates, Stock & Reuters partnership, Sensei, Project Felix, more | 9to5Mac
Anything We Can Do They Have Done Better - A Linkpack by Sara Citrenbaum
***** - A Linkpack by Sara Citrenbaum
Checklists.com — Concise advice for living longer & better
NSA Playset
MetaTool | CaptureBites
Storage Plans | Mendeley
Atlas Informatics
Open Source Intelligence Links
Intel RSS
Home - AllSource Analysis
f85d5f50fd6e0132ef1a005056a9545d (900×184)
Brackets - A modern, open source code editor that understands web design.
A Miniature Radar Enables Smart Phones To See Through Walls | Defense Update:
Using the Bulk Import tool | Alfresco Documentation
7 Camera Apps Better Than the One on Your Phone
New App Turns Play-Doh Creations Into Animated Characters
Apps News, Videos, Reviews and Gossip - Gizmodo
PNNL: IN-SPIRE™ - Home
IPTC Standard - IPTC
Microsoft Flow Is Out of Beta, Ready to Challenge IFTTT's Automation
You Can Now Use LastPass On Multiple Devices for Free
Jeffrey Friedl's Image Metadata Viewer
Salmon Run: Keyword Extraction with KEA
Mendeley | Sorry, there was a problem syncing your ...
Mendeley | exporting bibliography as a text file
scrapetools.com - scrapetools Resources and Information.
convertcsv.com - Convert CSV To JSON, XML, SQL, ...
CSV Templates
薄毛に悩むあなたの為のパーフェクト医薬品プロペシア!
DRIZZLECHAIR - NSA Playset
SLOTSCREAMER (PCI) - NSA Playset
Rise Of The Drones | Popular Science
The Latest Anti-Drone Weapon Is A Pumpkin Cannon | Popular Science
Thermobaric Bombs And Other Nightmare Weapons Of The Syrian Civil War | Popular Science
How To Detect Nuclear Warheads Without Revealing Their Secrets | Popular Science
West Point Cadets Are Shooting Down Drones With Cyber Rifles | Popular Science
Predata - Products
Alfresco 4 Enterprise Content Management Implementation - Munwar Shariff - Google Books
Alfresco 3 Cookbook: Over 70 Recipes for Implementing the Most Important ... - Snig Bhaumik - Google Books
Mendeley Advisor Program | Mendeley
Kaspersky Cyberthreat real-time map
customer/portal/articles/300304 at DuckDuckGo
IntelTechniques Blog
IntelTechniques Blog » Blog Archive » New Data Mining Concern
IntelTechniques Blog » Blog Archive » Internet Search Links for September 2016 #OSINT
IntelTechniques Blog » Blog Archive » Internet Search Links for October 2016 #OSINT
(no subject) - scitrenbaum@gmail.com - Gmail
Message#5 — Trick or Treat? – Medium
Army’s Hybrid Warfare, ISIS in Saudi Arabia, and Robotic Risks – Daily Intelligence - ClearanceJobs
IC OFF THE RECORD - Intelligence Leaks Published in 2016
Alfresco » Document Library
https://nypd.sosacorp.com/share/proxy/alfresco/slingshot/node/content/workspace/SpacesStore/abff67a5-20c3-4bb3-be3a-e40a33c8dbff/test
One Tap Less | Workflow: Automation for Everyone
Gardener: Hybrid Warfare: Iranian and Russian Version... - Google Scholar
The Intercept
VIS. Visual Investigative Scenarios platform: Users
Metadata Extraction to Tags | Alfresco Developer Blog
Powerful Alfresco search engine and searching Alfresco documents directly from your browser | Appnovation Technologies Inc.
alfresco extract keywords - Google Search
html to wiki - Google Search
iran hybrid warfare saudi arabia - Google Search
mendeley plans - Google Search
simple code editor mac - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=0ahUKEwiZt6abo4rQAhVJlVQKHafrAQU4ChAWCB0wAQ&url=http%3A%2F%2Fforefrontec.com%2Fen%2Fdownload.aspx%3Ffile%3D1deaa220ffCaptureBites%2520Alfresco%2520Export%2520Connector.pdf%26loc%3Dpdfs&usg=AFQjCNFeGmvNr_5S_cjrgysVzTz1y97Krg&sig2=_utr_t6R-yihOss8tAeXow&bvm=bv.137132246,d.cGw&cad=rja
Key Websites - A Linkpack by Sara Citrenbaum
Research Resources - A Linkpack by Sara Citrenbaum
OSINT - A Linkpack by Sara Citrenbaum
Online Tools & Resources Rock - A Linkpack by Sara Citrenbaum
Cyber - A Linkpack by Sara Citrenbaum
Data Bases-Sources-Sets - A Linkpack by Sara Citrenbaum
Free reference manager and PDF organizer | Mendeley
GroupIntel - OODA Loop
Paterva Home
Ground Combat | The Cipher Brief
Two Iowa police officers killed in ‘ambush-style attacks’ as authorities hunt suspect in Des Moines area - The Washington Post
Darpa's Alias Program Turns Old Aircraft Autonomous | WIRED
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
WALTR 2 (+Giveaway!) - BrettTerpstra.com
Monthly Newsletter
Sensors | Special Issue : UAV-Based Remote Sensing
Q-DART Toolset - Decision Support Analysis | RAND
Saudi Arabia vs. Iran: Predominance in the Middle East | Foreign Policy Journal
Asymmetric weapons of war – The invention of sectarianism in the Middle East - American Herald Tribune
Guest Post: Surviving an Active Shooter - By Fmr SEAL TEAM 6 Operator - Rob O'Neill - JestersCourt
U.S. Army Commercial: "Cyber" - YouTube
Sean Gallagher (@thepacketrat) | Twitter
Russia is preparing for nuclear war - Business Insider
Russian Expat Founds CrowdStrike to Guard Against Russian Email Hackers - Who Is Dmitri Alperovitch?
A Veteran Spy Has Given the FBI Information Alleging a Russian Operation to Cultivate Donald Trump | Mother Jones
Joss Whedon Explains Why Donald Trump Is America's Scariest Big Bad | Mother Jones
I WENT UNDERCOVER INTO THE TRUMP CAMPAIGN… AND COULDN’T BELIEVE WHAT I FOUND – Medium
137 öğretim görevlisi hakkında gözaltı kararı - CNN TÜRK - tarafsız güvenilir haberler
SOFREP editor-in-chief interviews President Assad in Syria | SOFREP
Don Del Priore (@Don_DelPriore) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ on Twitter: "@DRGiggl3 @Liam_Orodochain @Kronykal I sure as hell do have a resource for K9's. In fact I have two. Hit up @Don_DelPriore or @l1k34g1rl"
Imgur: The most awesome images on the Internet
CrimeStat Spatial Statistics Program - Version 3.0
Rigel Geographic Pro ling Tool - Google Search
RAND-developed Action- able HotSpot - Google Search
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiGm5TH64nQAhVGilQKHSQ0ClAQFgggMAA&url=http%3A%2F%2Fwww.rand.org%2Fcontent%2Fdam%2Frand%2Fpubs%2Ftechnical_reports%2F2011%2FRAND_TR768.pdf&usg=AFQjCNHDi8zmq8-Psqa-jRZNkeN6hzlm7g&sig2=YhBPOFmF4WOrxITf6WiYnQ&cad=rja
Resource-Constrained Spatial Hot Spot Identification | RAND
Predictive Policing Research
Analyzing Iranian Leaders’ Conflict Framing With Leximancer Automated Text Analysis (PDF Download Available)
Kenneth L Hacker
Iran vs. Saudi Arabia: Heating up the confrontation - Google Search
BBVA Research » Iran vs. Saudi Arabia: Heating up the confrontation
Confrontation heats up between Iran and Saudi Arabia: Iran's leader calls Saudi rulers small and puny satans - American Herald Tribune
The folly of Saudi Arabia’s battle with Iran
Iranian Hybrid Warfar - Google Search
NDC - News
Resources – Center for Security Studies | ETH Zurich
Hybrid Warfare: Iranian and Russian Versions of “Little Green Men” and Contemporary Conflict – To Inform is to Influence
Collections Online | George Eastman Museum
Iran News Round Up - November 1, 2016 | Critical Threats
How to Stay on the Strongest Wi-Fi Network at All Times
Apple's iOS 10.2 Contains a Number of New Emoji Including Face Palm, Fingers Crossed
Searching Through Everything | Internet Archive Blogs
We’re Bringing You Some New Features! | Flickr Blog
oaDOI: A New Tool for Discovering OA Content | Scholars Cooperative - Wayne State University Blogs
Google Maps Streetview Player animates any entered trip / Boing Boing
Medical Laboratory and Biomedical Science: Blood type compatibility chart
Prof. Tunnard's Social Network Analysis and Social Media Classes
Building the Ibrahim Index of African Governance | News & Analysis | Data Driven Journalism
New START Data Shows Russian Warhead Increase Before Expected Decrease |
Pakistan’s Evolving Nuclear Missile Infrastructure |
Although it's never had to deploy, DoD's CBRN task force is national 'insurance policy' - FederalNewsRadio.com
Tidy Text Mining with R – data science ish
Findo Searches All Your Cloud Data to Help You Find a File Anywhere
How to Quickly Research All Your Local Elections
Information Fusion for Cyber-Security Analytics - Springer
How Anonymous and Other Hacktivists Fight ISIS Online | Motherboard
Revisiting an Afghan Battlefield in Virtual Reality - Modern War Institute
Felling ISIS and Facing Reality About Terrorism | The National Interest Blog
OpenRefine
Researchers create technology to detect bad bots in social media
QCRI - Resources Detail
Green’s, the Most Bodacious Slang Dictionary Ever, Just Went Online | TIME
Save and organize your most-used browser tabs into lists: Toby T5 - Top Free Tools for Communication Professionals
Yahoo launches an app to help you find its bots | VentureBeat | Bots | by Khari Johnson
Preserving and Extending Knowledge Through the Digital Yiddish Theater Project | WUWM
2017 Directory of Directories by Marcus P. Zillman, M.S., A.M.H.A.
What Twitter Moments Means for Small Businesses | SocialTimes
This Free Tool Takes 3D Models into VR with One Click | ArchDaily
Update and Assessment: October 26, 2016 | Critical Threats
Carter to Implement 3 Recommendations from Defense Innovation Board > U.S. DEPARTMENT OF DEFENSE > Article
> U.S. DEPARTMENT OF DEFENSE > Contract View
The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works - Defense One
What’s Next in Government: 2017 & Beyond - Management - GovExec.com
(18397) Inoreader - Underground Tradecraft
Palestinian Social Media Reacts To Shooting Attack At Beit El Carried Out By Palestinian Policeman: Praise For Attacker, Calls For Other Palestinian Security Personnel To Carry Out Further Attacks
Netvibes Decision-Making Dashboards
The Russian Hacking Whodunnit
Try out this open source tool for editing video and audio transcripts » Nieman Journalism Lab
Page No Longer Available
Speaker Bios | Technology Transfer & Business Development | OHSU
OHSU's $1 billion investment in early detection cancer research will fuel economy | OregonLive.com
Oregon Technology Development Partners
FOIA Wiki launches in beta – Poynter
Compare Your County to the 3,143 Others in the U.S. - Route Fifty
Terrorism and Extremist Violence in the United States (TEVUS) Portal Introduction and Demonstration: 12/15/16 | START.umd.edu
The Shia Power Brokers of the New Iraq - The Atlantic
Finding Experts By Using the Internet 2017 - Marcus P. Zillman
Introducing Sprayscape: a perfectly imperfect VR-ish camera app for Android
Shits Gone Plaid: GDD53 and Slate | Krypt3ia
Outlook Web App
For New Social Networks, Offering an Audience is No Longer Enough – Bumpers – Medium
Open Sourcing 223GB of Driving Data – Udacity Inc – Medium
The Operational-Security Newsletter by Justin Carroll
Fact-Checking Senate Campaign Ads Just Got Easier | Duke Today
How Despots Use Twitter to Hunt Dissidents - Bloomberg
Lessons From the Pentagon's Shameful Bonus Clawback - Bloomberg View
The Islamic State’s coming rural revival | Brookings Institution
Airline Carry-on Bag Sizes, from Minaal
Joseph Carroll at the Knight Cancer Institute - Google Search
GovTrack.us: Tracking the U.S. Congress
Joseph Carroll | LinkedIn
Export and Retain Formatting from Google Docs - Make Tech Easier
TTBD Leadership team | Technology Transfer & Business Development | OHSU
The Easiest Way to Use Google Sheets as a Database - Sheetrock.js - Powerslacker #2 - YouTube
Newsgathering Using Facebook Live Map - YouTube
Zotero | People > Spencer L Willardson > Library > Democracy Declassified: The Secrecy Dilemma in National Security
Lincoln Group: External Links - SourceWatch
Top 13 Propaganda Analyst profiles | LinkedIn
Resources
Home
United States Special Operations Command (USSOCOM) - Home
Home - U.S. Strategic Command
Tonight in Santa Fe: The Power of Uncertainty and Contradiction in Mathematics | KSFR
Sensai has been acquired by D.C. based risk analytics firm Sovereign Intelligence | Jonas Lamis | Pulse | LinkedIn
2016: A Bot Odyssey | Jonas Lamis | Pulse | LinkedIn
propaganda analyst lincoln group - Google Search
Welcome! | LinkedIn
DOD adding a chief innovation officer
Special Report: Force of the Future
Psychology « SIGs of the System Dynamics Society
Home : Human Genetic Variation
Meteorologist concerned about radar gap along southern Oregon co - KPTV - FOX 12
System of Systems Analytics, Inc. (SoSACorp): Overview | LinkedIn
Guiding Principles for Countering and Displacing Extremist Narratives | Alejandro J. Beutel | Pulse | LinkedIn
Watch Live - Mad Scientist "The 2050 Cyber Army" Conference | Joel Lawton | Pulse | LinkedIn
World of Sensors Highlights Pacific NW Semiconductor Industry | JB's Circuit
Documents show Islamic State obsessions: beards and concubines | Reuters
Janus The Nameless (@JanusThe2) | Twitter
atmospherics manager aecom - Google Search
Beyond SOF » Native Arabic Linguist, Iraqi Advisor, Atmospherics Analysis, LNA Network Manager, Secret Clearance
Suicide bombers hit peacekeeping base in Somali capital, 13 dead: police
The Word at War
Lincoln Group - Wikipedia
Sensei - Google Search
Sovereign Intelligence - Google Search
sovereign | SI Reconnaissance
Sovereign Intelligence LLC | EMIA
sovereign | Advisory Board
Sensai forecasting - Google Search
How can big data and smart analytics tools ignite growth for your company? - Inter Sources
Sensai Raises $900K To Help Data Scientists Query Unstructured Data | TechCrunch : Related Articles | OOYUZ
AI Investor
Saved Session - Session Buddy
SaneBox
System Dynamics Review - Volume 29, Issue 3 - July/September 2013 - Wiley Online Library
System Dynamics Review - - Wiley Online Library
BrettTerpstra.com
TextExpander: communicate smarter (and save 50%) - BrettTerpstra.com
Archives - BrettTerpstra.com
Conflict Intelligence Team - investigation of military conflicts
Guatemalan Gangs Are Now Crafting Remote-Detonated Bombs
Terrorism & The Upcoming Presidential Election – Medium
War on drugs
Exploiting Time-Derived, Activity-Based Intelligence « Earth Imaging Journal: Remote Sensing, Satellite Images, Satellite Imagery
Welcome - Investigative Dashboard Search
Estimating the Value of Overseas Security Commitments: An Interactive Visualization | RAND
Russian Propaganda Is Pervasive, and America Is Behind the Power Curve in Countering It | RAND
Time to Bury Plans for Counterterrorism Cooperation with Russia in Syria | RAND
System Dynamics Review Articles
Asia Pacific Conference
About | Meta Search
OSINT-Framework - Google Search
Find Juicy Data on Your Targets Using the OSINT Framework - Cybrary
Oryon Portable - OSINTINSIGHT | Advanced OSINT Tools
OSINT Framework
Birdwatcher: Data analysis and OSINT framework for Twitter | michenriksen.com
Oryon C Portable : Open Source Intelligence (OSINT) Framework | Prawez Samani (Seeking for New Opportunity) | Pulse | LinkedIn
WALTR 2 – All-in-one Direct-to iPhone Converter| Softorino
CCI Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
Zotero | People > Massimo Menichinelli > Library > Polarized User and Topic Tracking in Twitter
Handsome Uncle : Animated - Creators' Stickers
Stickers by EdSants
Vaultedge
Get Shit Done - Product Hunt
odrive - Sync all cloud storage in one place
400 Free Tools & Resources for Entrepreneurs and Startups
Free Business / Domain Name Generators - NoCode
Russia Matters | Russia Matters
Laz Laz The Blob - Creators' Stickers
Free Productivity Tools: Resources for Entrepreneurs & Startups
New - Growth Supply
MakeAppIcon - Generate app icons of all sizes with a click!
Mapme: Map Creator | Plot your story
IntelTechniques Blog » Blog Archive » The Complete Privacy & Security Podcast-Episode 003
Privacy-Training Blog » Blog Archive » Episode 002-The Complete Privacy & Security Podcast
Privacy-Training Blog » Blog Archive » Episode 001-The Complete Privacy & Security Podcast
The VeraCrypt Audit Results – OSTIF.org
VeraCrypt has been audited. Here are the results. Also Ask Us Anything! -OSTIF : privacy
Terror Events (@TerrorEvents) | Twitter
J 👻P (@counterjihader) | Twitter
@stczzop/*LIST of BESTS on Twitter
Jon Nichols ☕ (@wvualphasoldier) | Twitter
Tool for newsgathering: Archive videos and collaborate on verification with Video Vault - First Draft NewsFirst Draft News
Jonathan Nichols | LinkedIn
Wvusoldier - Vine
Shop — The Lights of Broadway Show Cards™
ESPN Sport Science Shows Lion King Dancers Match Top Athletes | Playbill
Terrorism and Political Violence, Volume 28, Issue 5, November-December 2016 is now available online on Taylor & Francis Online - scitrenbaum@gmail.com - Gmail
Message#5 — Trick or Treat? – Medium
Cuomo Tours State to Highlight Economic Development Strategy - The New York Times
DEF 14A
Iraq Control of Terrain Map: October 26, 2016
System Dynamics Conference
System Dynamics Society
Terrorism and Political Violence: Vol 28, No 5
Why the “Sacred” Is a Better Resource Than “Religion” for Understanding Terrorism: Terrorism and Political Violence: Vol 28, No 5
Atlas Informatics
Tech - Product Hunt
Startup Stash - Curated resources and tools for startups
Makerbook - The best free resources for creatives.
Startup Resources - the best tools for your Startup business
How I launched the #2 most upvoted product of all time on Product Hunt – Medium
NoCode - A curated directory of resources, tools & hacks for non-techs
HelpSite.io: Make a Knowledge Base / Support Center - for free!
Knowleey - Product Hunt
webdesignrepo - a compact list of helpful webdesign links
1 new laboratory technician job in Portland, OR - scitrenbaum@gmail.com - Gmail
Activate your Atlas Recall account - stczztop@gmail.com - Gmail
Atlas Informatics
Vaultedge
Records on 2000 arms caches seized in Iraq in 2007 – Arms trafficking, arms trade, and weapons ID docs
Advanced Analytic Techniques: Summary of Findings: Monte Carlo Simulation (4 out of 5 Stars)
Advanced Analytic Techniques: Summary of Findings: Wargaming ( 4 out of 5 Stars)
Leaked Border Report Shows Need for Better Metrics | Bipartisan Policy Center
Microsoft PowerApps and Flow are generally available starting tomorrow - The Official Microsoft Blog
2015 Brainhack Proceedings | GigaScience | Full Text
GroupLab - Publications » 2010-RethinkingRFID.CHI
Twitter is now worth less than its Chinese clone
Tagebücher der Wissenschaft » SciLogs - Wissenschaftsblogs
RFID + Camera + Lock = Smart Mailbox - IEEE Spectrum
The local projects that are making police complaint data open and accessible - Sunlight Foundation Blog
CIA to put millions of declassified documents online | TheHill
War News Updates: Military And Intelligence News Briefs -- November 1, 2016
War News Updates: US Coast Guard Seizes A Narco Sub Laden With $73 Million Worth Of Cocaine
Russia: Hidden chips 'launch spam attacks from irons' - BBC News
UB offers industry, researchers new tool for analyzing big data - University at Buffalo
Crime alerts and offender registry app for your Apple Watch and iphone - Computer Business Review
The Stroz Friedberg Cyber Brief — Center on National Security
How to Memorize a Speech [Infographic] | Daily Infographic
Deep Web Research and Discovery Resources 2016
GifCities
Free JPG Image Compressor Software: JPEG Archive
(19112) Inoreader - Child Sexual Abuse in Fayoum Governorate Egypt 20102014
Intelligence Assessments, Politicization, and Denialism ⋆ Intelligence Analyst Careers
Islamic State recognizes oath of allegiance from jihadists in Mali | The Long War Journal
Analysis: US military assessment of Taliban control of Afghan districts is flawed | The Long War Journal
I Went Undercover With a Border Militia. Here's What I Saw. | Mother Jones
The Pentagon’s ‘Terminator Conundrum’: Robots That Could Kill on Their Own - The New York Times
Al Qaeda's Ruthless Pragmatism Makes It More Dangerous Than the Islamic State | RAND
YPG Imposes Compulsory Recruitment, Again · Raqqa is Being Slaughtered Silently
The Rudeness of the Popular Mobilization Forces and ISIS Systematic Stupidity · Raqqa is Being Slaughtered Silently
White Papers - Marcus P. Zillman
Uncovering the Truth Behind the Salem Witch Trials with Google Expeditions
Humanitarian Intelligence: A Practitioner's Guide to Crisis Analysis and ... - Andrej Zwitter - Google Books
CCI Blog » Blog Archive » Keyword Searching the Wayback Machine
CCI Blog » Blog Archive » Extract GPS from OfferUp
CCI Blog » Blog Archive » Extract bulk Facebook User IDs with SEOToolStation
Index
Automate processes + tasks | Microsoft Flow
Laverna - keep your notes private
Stickers by AMSTICKERS - stczztop@gmail.com - Gmail
What my Facebook feed looks like without news – Medium
OCW Courses Represented in Crosslinks | MIT OpenCourseWare | Free Online Course Materials
Build Custom Business Apps | Microsoft PowerApps
Power BI | Interactive Data Visualization BI Tools
Shift
Tehran, USA
The Pentagon’s Urge to Splurge
Wayback Machine
Google's Assistant just got even smarter thanks to IFTTT
Giphy is giving orphaned Vines a new home
EurekAlert! Science News
Why Chat May Be King Of The New Mobile Landscape | Co.Design | business + design
Summary of Information on Jihadist Websites The First Half of June 2016
5 of the Best Free Web-Based Alternatives to Photoshop - Make Tech Easier
OODA Loop - New leak may show if you were hacked by the NSA
Terrorist Narratives & Communicative Devices: Findings from a Study of Online Terrorist Magazines
Zotero | People > Massimo Menichinelli > Library
Zotero | People > Massimo Menichinelli > Library > filter bubble
Zotero | People > Massimo Menichinelli > Library
Saved Session - Session Buddy
bellingcat - A Brief History of Open Source Intelligence - bellingcat
Today's Best Deals: Amazon Coat Sale, OLED TV, Pet-Friendly Vacuum, and More
Purchase | TarDisk – TarDisk.com
Security Report Archives -
FIRST LISTEN - New Lin-Manuel Miranda Song 'How Far I'll Go' from Disney's MOANA!
Armed Forces Journal – Hybrid vs. compound war
New leak may show if you were hacked by the NSA | Ars Technica UK
Bellingcat Weekly Newsletter
Amazon's Got You Covered With Their Giant, One-Day Coat and Jacket Sale
Supercharge Your PC With the Humble Lifehacker Software Bundle
FotoForensics
The Deadliest Volcano in the United States Just Got Really Weird
IEEE Xplore Document - Network-Based Modeling for Characterizing Human Collective Behaviors During Extreme Events
Stop Using iCloud
Researchers watch in 3D as neurons talk to each other in a living mouse brain | Newswire
Practical Cryptography
Carnegie Mellon made a special pair of glasses that lets you steal a digital identity — Quartz
RootAbout
The Islamic State is a Hybrid Threat: Why Does That Matter? | Small Wars Journal
Signal Processing, Sensor/Information Fusion, and Target Recognition XXV| Publications | Spie
Open Access SPIE Publications -- SPIE.org
studies.aljazeera.n
Superforecasting for the Farm | Successful Farming
Review Roundup: FALSETTOS Opens on Broadway
VIDEO: Kelly Ripa, Matt Bomer & More Channel HAMILTON on Special Halloween LIVE
CIDOB - Barcelona Centre for International Affairs
Russian Analytical Digest (RAD) – Center for Security Studies | ETH Zurich
Apple Music price drop might fuel subscription surge
Introducing RootAbout - The Hacker Factor Blog
Catching Viral Photos - The Hacker Factor Blog
Healthcare Consultancy Group - Our Brain Trust
(19111) Inoreader - Channels
Federal Court Says Rules Barring NY Police... - Matthew Aid
IJGI | Free Full-Text | Context-Aware Location Recommendation Using Geotagged Photos in Social Media | HTML
Nature Communications
Predata
Checklist for a U.S.-Russia Cyberwar | RAND
Smarter Power, Stronger Partners, Volume I: Exploiting U.S. Advantages to Prevent Aggression | RAND
Investing in the Fight: Assessing the Use of the Commander's Emergency Response Program in Afghanistan | RAND
IFAC-PapersOnLine | Vol 49, Iss 16, Pgs 1-480, (2016) | ScienceDirect.com
The Insane D.I.Y. Weapons of the ISIS War - The Daily Beast
New Tricks Make ISIS, Once Easily Tracked, a Sophisticated Opponent - WSJ
Small Wars Journal Articles
Getgee: Tools for self-governance Part 1 | GeorgieBC's Blog
Sign In
Stealth Cell Tower
nypd toolsuite.docx - scitrenbaum@gmail.com - Gmail
Secrecy News -- 11/01/16 - scitrenbaum@gmail.com - Gmail
Security Report Archives - - scitrenbaum@gmail.com - Gmail
Pinboard: bookmarks for scitrenb
Toman: Analysis of discourse accent and discursive... - Google Scholar
WALTR 2 Download | Softorino
Here’s the Problem With the Story Connecting Russia to Donald Trump’s Email Server
Daveed Diggs on Twitter: "New @clppng video!! Shooter. Feat. Choreography by @tisVoltaire of @HamiltonMusical https://t.co/PzX998ZHPl https://t.co/SPzurb4FQC"
Falsettos Broadway (@FalsettosBway) | Twitter
Predata (@predataofficial) | Twitter
Donald J. Trump on Twitter: "I just got back from Russia-learned lots & lots. Moscow is a very interesting and amazing place! U.S. MUST BE VERY SMART AND VERY STRATEGIC."
Tova (@stczzop) | Twitter
(95) @stczzop/#1 on Twitter
(3) @stczzop/Apple on Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
the grugq on Twitter: "@thegrugq @CopperheadOS @benhawkes @revskills @uglypackets here: Twitter is all infosec and terrorism."
Brett Terpstra on Twitter: "My best release notes ever? Possibly. Quick nvALT update is out, by the way. https://t.co/ywF2BGPpdx"
Amazon.com: Deal of the Day | Up to 70% Off Coats & Jackets: Clothing, Shoes & Jewelry
Page Not Found | Center for Strategic and International Studies
Flashpoint - The Shadow Brokers's "Trick or Treat" Leak Exposes International Stage Server Infrastructure
Analysis of Discourse for Indications and Warnings. - Google Search
Denise Bottiglieri - Google Search
Information fusion for the Gray Zone - Google Search
Terrorist on Remote Control: Leader Guided Recruits via Apps - Google Search
emic - Google Search
Customer and graphic designer - Customer feedback on mythical posters
Denise Bottiglieri, PhD | LinkedIn
Annotable Adds Wide Color Support and Haptic Feedback on iPhone 7 – MacStories
Hacker Halloween: Inside a Shadow Brokers leak – My Hacker House
Another Shadow Brokers Leak - Schneier on Security
The Islamic State creates a new type of jihadist: Part terrorist, part gangster - The Washington Post
Timeline: Rise and Spread of the Islamic State | Wilson Center
Day 03
Copy links to clipboard
Copy
Open
A Decision on the Palantir US Army Dust Up Looms : Stephen E. Arnold @ Beyond Search
Bizarre leaked Pentagon video is a science fiction story about the future of cities | Ars Technica
UN has reports IS using 1,000s as 'human shields' in Mosul
TabLinks 3.0 - BrettTerpstra.com
Disparity Between Fusion Center Web Content and Self-Reported Activity
Blue Horizons briefings, papers, reports, publications
SBA - Dynamic Small Business Search
U.S. Intelligence Budget Data
Body Face References favourites by FreakyComics on DeviantArt
Misc. Resources favourites by GlowingLimes on DeviantArt
greta's gouge: Friday's Miscellany 10-28-2016
IEEE Xplore Document - Multi-level fusion of hard and soft information
poses favourites by jigglytut on DeviantArt
Bases_Poses favourites by Kastagir on DeviantArt
Find Articles - Corrections - LibGuides at Lorain County Community College
The Always Up-to-Date Guide to Building a Hackintosh (macOS Sierra)
They Die to Kill: A Brief History and Analysis of Suicide Terrorism
Countering Gray-Zone Hybrid Threats: An MWI Report - Modern War Institute
Wargaming the Third Offset Strategy > National Defense University Press > Joint Force Quarterly 83
Special Forces Think Pieces « Public Intelligence Blog
Terrorism, Technology and Translation
Advice from SOF on the Use of SOF for the Next Administration | Small Wars Journal
Fire, Film, Tweet: The Taliban’s New Way of War | Small Wars Journal
Latest Joint Force Quarterly Now Online | Small Wars Journal
Indian Strategic Studies: Not Cleared for Takeoff: Lessons Learned from the AWG’s Efforts to Counter the Use of Commercially Available UAS
Indian Strategic Studies: The Apps They Carried: Software, Big Data, and the Fight for Mosul
Indian Strategic Studies: ISIS: An Adaptive Hybrid Threat in Transition
ISIS uses booby trapped drone to kill two Kurdish fighters, injure others | The Tech Portal
Social media-driven propaganda: in the crosshairs of the black flag.(Social Media-Driven Propaganda)(Essay) - Version details - Trove
Isis weaponised consumer drones | Android OMG
Congratulations, Your Genius Patent Is Now a Military Secret - Bloomberg
Intelligence Services Capabilities | CACI
CIDOB - US Presidential Election. What Scenarios for the World after Obama?
TD Intelligence Aggregation System • Circinus
TD Intelligence Aggregation System • Circinus
Contracts • Circinus
Iran News Round Up - October 31, 2016 | Critical Threats
SET-166 Signature Management System for Underwater Signatures of Surface Ships
SET-163 Aspects of Multi-Parameter Radar ATR in Complex Environments
SET-181 Metamaterials for Defense and Security Applications
IST-106 Information Filtering and Multi-source Information Fusion
IST-110 Visualization for Analysis
Daesh Daily - An Update On Daesh Activities
Experts reveal the secretive war apps being used to defeat ISIS in Mosul | Daily Mail Online
> U.S. DEPARTMENT OF DEFENSE > Contract View
Counter-siege in Aleppo; ISIS gathers human shields in Mosul; Marines want radio-hunting mini-missiles; Refueling F-35s from V-22; and a bit more... - Defense One
The Military’s Tech Matchmaker Is Getting Ready to Open Its Wallet - Defense One
The Marines Want Mini-Missiles That Hunt for Specific Radio Signals - Defense One
Sangaris Operation: A Case Study in Military Intervention Limited | IFRI - French Institute for International Relations
(17798) Inoreader - (U//FOUO) U.S. Army Commanders Guide to Human Intelligence (HUMINT)
Recent Information Fusion Articles - Elsevier
Sensors | Special Issue : New Paradigms in Cyber-Physical Social Sensing
Jihad and Terrorism Threat Monitor (JTTM) Weekend Summary
Russia's Drills Update
Russia This Week – October 22-30, 2016
AIJ 2011 to Present - National Military Intelligence Association
Act Now to Deter the Next Nuclear Smuggling State | NTI
Pentagon Confronts a New Threat From ISIS: Exploding Drones - The New York Times
N.S.A. Appears to Have Missed ‘Big Red Flags’ in Suspect’s Behavior - The New York Times
OneTab shared tabs
OneTab shared tabs
Intelligence, Surveillance and Reconnaissance Thrust - Office of Naval Research
US ARMY PEO STRI: Simulation, Training and Instrumentation - Product Manager for Special Operations Forces Training Systems (PM - STS)
Intelligence Electronic Warfare Tactical Proficiency Trainer (IEWTPT)
Sacred Violence Industry, ISIS and Hezbollah · Raqqa is Being Slaughtered Silently
Why be jihadist? Public intellectuals' blind spot for Islamist terrorism | Demant | Malala
Home - Schafer Corporation
Combat utility prediction
USASOC Talks - Read
A Lesson of Military Tactics Failing To Keep Up With Technological Change
Engineering eBooks | Springer
New tools and trainings for security practitioners and scholars | START.umd.edu
Disparity Between Fusion Center Web Content and Self-Reported Activity | START.umd.edu
Why Be Jihadist? Public Intellectualls' Blind Spot for Islamist Terrorism | START.umd.edu
Perspectives on Terrorism
Involvement Mechanisms of Jihadist Networks | de Bie | Perspectives on Terrorism
‘Criminalised’ Islamic State Veterans – A Future Major Threat in Organised Crime Development? | Gallagher | Perspectives on Terrorism
IS and its Predecessors: Violent Extremism in Historical Perspective | de Graaff | Perspectives on Terrorism
Watchlisting | Duncan | Perspectives on Terrorism
Bibliography: Terrorism and the Media (including the Internet) (Part 3) | Tinnes | Perspectives on Terrorism
Vol 10, No 5 (2016)
From Whitewater to Benghazi: A Primer on Bill and Hillary Clinton Scandals - The Atlantic
ISIS Has a Drone Strategy Too - The Atlantic
The Space Review: A NEMESIS in the sky: PAN, MENTOR 4, and close encounters of the SIGINT kind
Analyst Team - 451 Research - Analyzing the Business of Enterprise IT Innovation
Experts reveal the secretive war apps being used to defeat ISIS in Mosul - WorldNews
audioBoom / IED Big Data Goes to War. Battlefield Drone Defense. @DefTechPat, Defense One.
Which iOS Content Blocker is the Fastest? — The Brooks Review
ClintonCircle / Hillary Clinton
GitHub - bdesham/pinboard-notes-backup: Efficiently back up the notes you’ve saved to Pinboard
GitHub - blue-yonder/tsfresh: Automatic extraction of relevant features from time series:
InformNapalm Chronicles: a year of Russia destroying Syria - InformNapalm.org (English)
LinkedIN: The APT Phisherman’s Friend | Krypt3ia
Promotions (217) - scitrenbaum@gmail.com - Gmail
Inbox (457) - scitrenbaum@gmail.com - Gmail
Inbox (990) - stczztop@gmail.com - Gmail
Analytics and Predictive Models for Social Media - stczztop@gmail.com - Gmail
Why ISIS Is Winning the Social Media War | WIRED - stczztop@gmail.com - Gmail
Alfresco » Site Dashboard
(U//FOUO) U.S. Army Commanders Guide to Human Intelligence (HUMINT) | Public Intelligence
Qadir: Crisis Analytics: Big Data Driven Crisis Response - Google Scholar
Information Filtering and Multi-source Information Fusion - Google Scholar
Visualization for Analysis - Google Scholar
Biermann: Multi-level fusion of hard and soft information - Google Scholar
SouthFront: Crisis News, World Events, Political Survey
About SouthFront
Car Bombs and the Means to Combat Them
Military Analysis Archives -
International Military Review
SF Announce
Footage: 'Moderate' Terrorists with MANPADs Appear in Daraa Province
Militants Launch New Offensive to Break Aleppo Siege. Detailed Overview of Military Situation on Octber 28, 2016 (Maps, Photos)
Results of Russian Military Campaign in Syria: Sep. 30, 2015 - Oct. 20, 2016
Syrian War Report – October 28, 2016: Militants Make Do-Or-Die Attempt to Break Aleppo Siege
Stickers by AMSTICKERS
The Pirate Bay - The galaxy's most resilient bittorrent site
Audio > Music - TPB
Other > E-books - TPB
MAGAZINES - WEAPONS AND SHOOTING 2016-10^V (download torrent) - TPB
Junk Drawer Chemistry (2016) (Pdf) Gooner (download torrent) - TPB
Affordable Care Act For Dummies (2014) (Pdf) Gooner (download torrent) - TPB
MILITARY AND HISTORY MAGAZINES 2016-10^V (download torrent) - TPB
VP52 - TPB
Ulysses › Features
Counterterrorism action: Bankstown, 12 October 2016 - Australian Strategic Policy Institute
IST-106 Information Filtering and Multi-source Information Fusion
October 2016 | Combating Terrorism Center at West Point
My Saves
Air Force Scrambles to Defeat Islamic State's Flying Bomb Drones - Google Search
Analysis of the Military Effectiveness on Future C2 Concepts and Systems - Google Search
Disparity Between Fusion Center Web Content and Self-Reported Activity - Google Search
HUMINT Targeting, Open Source Intelligence And Training Support - Google Search
IED Big Data Goes to War. Battlefield Drone Defense - Google Search
Social media-driven propaganda: in the crosshairs of the black flag - Google Search
TDIA System - Google Search
CDC’s Preparedness 101: Zombie Pandemic – Homeland Security Digital Library
OPEN SOURCE INTELLIGENCE | IPS intelligence
iOS 10.2 Beta Brings New Emoji, Wallpapers, and More – MacStories
MacStories Guide: Design and Launch Your Own iMessage Sticker Pack on the App Store – MacStories
Analysis and Analytics | The MITRE Corporation
MITRE Licenses Social Radar Technology to AtrocityWatch | The MITRE Corporation
Concept of Operations | The MITRE Corporation
All the Popular Stores That'll Reward You Big-Time For Recycling
MOC Warfighter - Article
You Can Legally Hack Your Own Car, Pacemaker, or Smartphone Now | WIRED
theatermania - YouTube
Gilmore Guys - YouTube
Денис Паришков - YouTube
Subscriptions - YouTube
BBC Proms - Musicals - YouTube
2015 BBC Proms HD - YouTube
Broadway Sessions Anniversary Show (June 14, 2012) - YouTube
Little Shop of Horrors - 2015 Encores! Off-Center Concert - YouTube
Glee Performance A-F - YouTube
Bright Star cast - YouTube
Broadway - YouTube
ramin - YouTube
Ramin Karimloo - YouTube
Watch Later - YouTube
bbc proms - YouTube
joe's pub - YouTube
Broadwaycom - YouTube
BROADWAY SESSIONS - YouTube
Up and Coming Broadway Stars - YouTube
Hrern1313 - YouTube
Charlotte Campbell - YouTube
TimesTalks - YouTube
Sierra Boggess singing I Have Confidence from BBC Proms 2010 - YouTube
Hold On - The Secret Garden (Concert) - YouTube
Linzi Hateley Gives "The Secret Garden"'s "Hold On" the 30 Days of Pride Treatment - YouTube
Sunday in the Park with George 1986 (Stephen Sondheim) - Subtitulos en Español - YouTube
Sydney Lucas, Ramin Karimloo, and More Preview Songs From The Secret Garden - YouTube
Ramin Karimloo Live At The London Palladium - YouTube
Les Misérables Colm & Ramin: Together At Last! - YouTube
Crazy for You 18 Gershwin standards - YouTube
Seth MacFarlane singing Ya Got Trouble from BBC Proms 2012 - Broadway Sound - YouTube
Les Miserables - Olivier Awards 2016 - Covent Garden Piazza - YouTube
Ramin Karimloo and Colm Wilkinson duet - "Bring Him Home" - YouTube
Sara Masterson - Hold On (The Secret Garden) - YouTube
Company 2011 (Stephen Sondheim) - Subtitulos en Español - YouTube
THE SECRET GARDEN with Sierra Boggess, Ramin Karimloo, Cheyenne Jackson, Sydney Lucas & More - YouTube
Mary Poppins - Medley - BBC Proms 2014 - YouTube
A Chorus Line (2006) Broadway Show *FULL* - YouTube
Disney Podcast - NEWSIES LIVE ONE NIGHT ONLY AT PANTAGES - Dizney Coast to Coast - Ep. 335 - YouTube
Les Miserables at the Classic Brit Awards 2011 - YouTube
Watch Tony Winner Daisy Eagan Sing 'I Wish You Love' at 54 Below - YouTube
My Favorite Broadway: The Leading Ladies - Full Concert - 09/28/98 - Carnegie Hall (OFFICIAL) - YouTube
Sierra Boggess singing Falling in Love with Love from BBC Proms 2012 - Broadway Sound - YouTube
Broadway Baby - Daisy Eagan - Follies - YouTube
Broken - Ramin Karimloo & Hadley Fraser 16/7/2016 @ The Palladium - YouTube
LES MISERABLES 10th Anniversary Dream Cast with Lyrics - YouTube
Day 01
Copy links to clipboard
Copy
Open
Home | CEPA
CrisisNET
dblp: ISCRAM-med 2015
The Writer Who Was Too Strong To Live
TraffTrend
Adversarial Data Mining
Acing the IOC Game
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
From Cybersecurity to Collaborative Resiliency
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
Data Resources: Conflicts, Wars, Terrorism
Everhelper - Authorization
Foreign Military Studies Office
Information Warfare in the Second (1999-Present) Chechen War: Motivator for Military Reform?
Free GIS Datasets - Categorised List
Your Pick For Best Kitchen Trash Can: Simplehuman
IEEE Xplore Document - Smartphone based car-searching system for large parking lot
IEEE Xplore Document - Towards a General Architecture for Social Media Data Capture from a Multi-Domain Perspective
Internet of Things (IoT) Scanner - BullGuard
ISW Blog: The Campaign for Mosul: October 25-28, 2016
PLOS ONE: Search Results
Lifehacker - Tips and downloads for getting things done
App directory News, Videos, Reviews and Gossip - Lifehacker
The Calendar Service in macOS Server Is a Surprisingly Robust Alternative to Commercial Apps
This Week's Top Downloads
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection - Springer
Sensing Social Media: A Range of Approaches for Sentiment Analysis - Springer
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats - Springer
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Springer
Research of Conventional Data Mining Tools for Big Data Handling in Finance Institutions - Springer
AI & SOCIETY - Springer
European View - All Volumes & Issues - Springer
Social Media and the Diffusion of Information: A Computational Experiment on the Emergence of Food Scares - Desmarchelier - 2016 - Kyklos - Wiley Online Library
DARPA - Open Catalog
Open Data Barometer
A support vector machine approach to the automatic identification of fluorescence spectra emitted by biological agents | Optics and Photonics for Counterterrorism, Crime Fighting, and Defence XII | ESD16 | SPIE Proceedings | SPIE
Enhancing Capillary-Driven Flow for Paper-Based Microfluidic Channels - ACS Applied Materials & Interfaces (ACS Publications)
The Effect of Category Spanning on the Lethality and Longevity of Terrorist Organizations
ISIS: An Adaptive Hybrid Threat in Transition | Small Wars Journal
Analytics and Predictive Models for Social Media
Threat Knowledge Group
Addicaid Is an App and Social Network to Help You Find Treatment and Recover from Addiction
ISIL driven out of Bartella, fighting continues elsewhere near Mosul | CCTV America
Hallmark Envisions Real-Time Space Command and Control
Social Media in Strategic Communication (SMISC)
Data Science Toolkit
Tektronix P6015 High Voltage Oscilloscope Probe | eBay
Political Finance Database | International IDEA
Rolopanel: Tracking Game Behaviour through Mobile Analytics: Media and Communication IS&T Journal Article | IGI Global
Information Operations Matters - University of Nebraska Press
A simple analytical platform based on thin-layer chromatography coupled with paper-based analytical device for determination of total capsaicinoids in chilli samples
Smartphone-based personalized blood glucose prediction
Steve Blank presentations channel
Steve Blank presentations channel
SPIEGEL ONLINE - Aktuelle Nachrichten
StratCom | NATO Strategic Communications Centre of Excellence Riga, Latvia
Academic journal “Defence Strategic Communications” | StratCom
Social media’s role in ‘Hybrid Strategies’. Author: Thomas Elkjer Nissen | StratCom
Job Details
Social Media Listening and Monitoring for Business Applications - Google Books
Reflections: Guy Julier, From shanzhai to social innovation via makerspaces? – China's Creative Communities: Making Value and The Value(s) of Making
Peek - Chrome Web Store
Data catalog - NASA
Google Sheets
GitHub - hasherezade/ViDi: ViDi Visual Disassembler (experimental)
ViDi | hasherezade's 1001 nights
SurkovLeaks: 1GB mail cache retrieved by Ukrainian hacktivists - InformNapalm.org (English)
This American Life by WBEZ on iTunes
What The Hell Are We Doing? – Medium
Insulinomics – Medium
Keeping nuclear materials secure in an uncertain world – Medium
Pushing the envelope: The World Cup and Arab revolts drive change – Medium
A Field Guide for Online Reading Material – The Mission – Medium
Alfresco » Login
UBC Theses and Dissertations - UBC Library Open Collections
Corsar: Social Media Data in Research: Provenance Challenges - Google Scholar
JIHADISMSTUDIES.NET
Steve BlankSecret History
Steve BlankSlides/Videos
Exposing Russian Trolling and Information Warfare Tactics – Do NOT Take Boris Word for It
Bomb A Head Girl! - Creators' Stickers
WTF is machine learning? | TechCrunch
Other > E-books - TPB
The Pirate Bay - The galaxy's most resilient bittorrent site
NoctDeath - TPB
Judd Legum on Twitter: "I fixed Comey's letter https://t.co/caQpqXfoPM"
Your Guide to a Stress-free Bedroom - LuxPad
Personal - Dropbox
Personal - Dropbox
DARPA Social Media in Strategic Communication - Google Search
Defence Strategic Communications - Google Search
Finding Needles in a Haystack: The Eastern Bloc's Counterintelligence Capabilities, - Google Search
KANAME Co.,Ltd Bomb A Head Girl! - Google Search
Krueger and Malecková - Google Search
Laying the Groundwork for the Successful Deployment of Communication Interception Technology - Google Search
Modeling position selection by individuals during information warfare in society - Google Search
Social Media as a Tool for Information Warfare pdf - Google Search
"Killing Lists" – The Evolution of Cyber Terrorism?
Links | Infinity Journal | Strategy | Analysis
Readings | Infinity Journal | Strategy | Analysis
Instapaper
Edwin ‘Leigh’ Armistead | Journal of Information Warfare
Hackers reverse-engineer NSA's leaked bugging devices | New Scientist
[DEV] Peek, a Chrome extension to preview files before you download them : chrome
Information Warfare: Fighting Back Through the Matrix (PDF Download Available)
Innovator Under 35: Nora Ayanian
The World as Free-Fire Zone
Agricultural Drones
AI Body Scanners Could Solve the Worst Thing About Airports
IBM’s Watson Is Everywhere—But What Is it?
US military studied how to influence Twitter users in Darpa-funded research | World news | The Guardian
Why ISIS Is Winning the Social Media War | WIRED
onthestreetwhereyoulive - YouTube
Dork Geek
Copy links to clipboard
Copy
Open
The HP 8640B RF Signal Generator | eBay
HP Signal Sources
HP / AGILENT 8640B RF SIGNAL GENERATOR opt 1 - Google Search
Choosing an RF Signal Generator
Hewlett-Packard 8640B Signal Generator
FR-603 Full Carbon Cyclocross cross Bike Frameset : Frame 53cm fork Headset | eBay
General Microwave Power Meter KS-19978 | eBay
HP 8640B Signal Generator Opt 1 Hewlett Packard Agilent | eBay
HP AGILENT 8640b | eBay
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 • CAD 300.81 - PicClick CA
HP 8640B / AGILENT 8640B SIGNAL GENERATOR w OPTIONS 001, 003 | eBay
CTRL-H - PDX Hackerspace - Google Search
www.ebay.tv/sch/i.html?_sacat=0&_nkw=microwave+power+meter&_sop=12&_frs=1
HP 8640B Signal Generator Agilent - Partially Working OPT 001,002,003 • CAD 534.77 - PicClick CA
HP Agilent 8640B Signal Generator Options 001 003 • CAD 534.77 - PicClick CA
Hp 8640B Singnal Generator • CAD 334.17 - PicClick CA
Checkaflip - Buy Low, Sell High
HP 8640B SINGNAL GENERATOR | eBay
HP 8640B /001/002/003 ( REBUILT TO ORIGINAL MANUF. SPEC.) | eBay
HP 8640B Signal Generator Agilent | eBay
HP / AGILENT 8640B RF SIGNAL GENERATOR, 449 KHz - 550 MHz, Reverse Power Prot. | eBay
HP Agilent Hewlett Packard 8640B opt. 323 AN/USM-323 Military Signal Generator | eBay
HP Agilent Hewlett Packard 8640B opt. 323 AN/USM-323 Military Signal Generator | eBay
Hewlett Packard 8656B/8657A/8657B RF Signal Generators, Refurbished HP Agilent Hewlett Packard - Used Test Equipment at Test Equipment Depot
Keysight Technologies (Agilent HP) 8640B used or new for sale at used-line
Untitled spreadsheet - Request for access - scitrenbaum@gmail.com - Gmail
Personal - Dropbox
general microwave model 476 power meter - Google Search
General Microwave Power Meter 476 115/230 VAC | eBay
Fluke Differential Voltmeter; Model 893A (CTAM# 7086) | eBay
Vintage FLUKE 893A AC/DC Differential Voltmeter | eBay
Fluke Differential Voltmeter; Model 893A | eBay
Fluke Differential Voltmeter; Model 893A | eBay
acscalibrations | eBay
Used and New Oscilloscopes For Sale | Used and New Test Equipment | BMI Surplus
Portland Resources for Dorks | DorkbotPDX
Free Geek – Computer/Technology Reuse, Education, Recycling & Sales
SCIENCE HOBBYIST: Top Page
Electronics surplus and science catalogs list, outlet stores and surplus supply websites
ELECTRONICS HOBBYIST
Infrared Goggles for $10, inexpensive IR filters, SCIENCE HOBBYIST
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
Electronics Surplus: services and non-surplus mail order catalogs
Electronics surplus and science catalogs list [SITE: SCIENCE HOBBYIST]
OPTICS, Surplus Electronics and list of science catalogs [SITE: SCIENCE HOBBYIST]
Science Experiments, Amateur Science demonstrations, projects: SCIENCE HOBBYIST
SCIENCE HOBBYIST: Ideas, additions
Surplus Shed
ELECTRONICS HOBBYIST: NEWSGROUPS
All Mail - scitrenbaum@gmail.com - Gmail
Portland Resources for Dorks - Google Search
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Social Media Lab
Copy links to clipboard
Copy
Open
Politically Polarized Online Groups and their Social Structures formed around the 2013-2014 crisis in Ukraine | Social Media Lab
Social Media Lab | "Making sense of a networked world"
Apps | Social Media Lab
Netlytic – Social Networks & Text Analyzer | Social Media Lab
PoliDashboard | Social Media Lab
Social Media Research Toolkit | Social Media Lab
“A Mathematical Approach to Identifying and Forecasting Shifts in the Mood of Social Media Users” | Social Media Lab
Social Media & Scholars | Social Media Lab
Political Polarization on Social Media | Social Media Lab
Text Mining and Social Network Visualizations | Social Media Lab
H4D
Copy links to clipboard
Copy
Open
Stanford H4D - Spring 2016 - Home
DOD/IC Problems - Stanford H4D - Spring 2016
Teaching Team - Stanford H4D - Spring 2016
Steve BlankEntrepreneurship and Innovation
Steve BlankLean LaunchPad
Steve BlankSlides/Videos
Day 0
Copy links to clipboard
Copy
Open
The Next Generation of Government CVE Strategies at Home
Building Resilience against Violent Extremism
Counter-Radicalization via the Internet
Integrating ISR Data with Open Source Indicators (AIAA)
Integrating ISR Data with Open Source Indicators (AIAA)
AIAA SPACE 2016 (AIAA)
Armed Forces Journal – Must-Reads
ESSA – accountability, indicators and analytics to drive informed decision making - SAS Voices
C2COE | Catalysing C2
Session 4: Future Key C4I Technologies | Center of Excellence in Command, Control, Communications, Computing and Intelligence | George Mason University
Moldova Update: Contested Elections Threaten to Destabilize Eastern Europe
Counting conflict | News & Analysis | Data Driven Journalism
Today's Best Deals: Tri-Ply Cookware, Discounted Watches, Nike Clearance, and More
Nano Sensors Enhancing Warfighters’ Situational Awareness | Defense Update:
Exploring the role of sequential computation in distributed systems: motivating a programming paradigm shift
Actor profiling in virtual execution environments
Alfresco One 5.1 | Alfresco Documentation
Alfresco Documentation | Alfresco Documentation
Alfresco Support Handbook | Alfresco Documentation
Electrospaces.net: NSA's TAO Division Codewords
Online social networks and offline protest | EPJ Data Science | Full Text
CIA’s CREST Leaves Cavity in Public Domain |
IEEE Xplore Document - Towards Automatic Persona Generation Using Social Media
IEEE Xplore Document - A testbed for integrated fault diagnosis and cyber security investigation
IEEE Xplore Document - A Mathematical Approach to Gauging Influence by Identifying Shifts in the Emotions of Social Media Users
Welcome | The Internet, Policy & Politics Conferences
Special Issue: Non-state Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
Do Jews and Arabs Differ in Their Fear of Terrorism and Crime?
PLOS ONE: Demographics, Management Strategies, and Problems in ST-Elevation Myocardial Infarction from the Standpoint of Emergency Medicine Specialists: A Survey-Based Study from Seven Geographical Regions of Turkey
Electromagnetic tunnel detection using a magnetic-dipole source in three-dimensional space : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Depth estimation of voids using backscattered surface waves : SEG Technical Program Expanded Abstracts: Vol. , No. (Society of Exploration Geophysicists)
Batch Resize Images in OS X With This Automator Script
Survey on using constraints in data mining | SpringerLink
SIP and SDP based content adaptation during real-time video streaming in Future Internets | SpringerLink
Mining tag-clouds to improve social media recommendation | SpringerLink
Multithreading cascade of SURF for facial expression recognition | SpringerLink
Information Systems for Crisis Response and Management in Mediterranean Countries - Springer
A Study on Security and Surveillance System Using Gait Recognition - Springer
Dynamic User Attribute Discovery on Social Media - Springer
Which Centrality Metric for Which Terrorist Network Topology? - Springer
An Architecture for processing of Heterogeneous Sources - Springer
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology - Springer
Enhancement of Detecting Wicked Website Through Intelligent Methods - Springer
Missing and Spurious Interactions in Heterogeneous Military Networks - Springer
Overview of Text Visualization Techniques - Springer
Data Model - Springer
Visualizing Sentiments and Emotions - Springer
LIWC | Linguistic Inquiry and Word Count
Nightmare Machine
Is Evan Kohlmann Qualified to Be the Government’s Expert Witness for Terrorism Cases? -- New York Magazine
Event Prediction With Learning Algorithms—A Study of Events Surrounding the Egyptian Revolution of 2011 on the Basis of Micro Blog Data - Boecking - 2015 - Policy & Internet - Wiley Online Library
PopClip Extensions
Considerations for developing technologies for an integrated person-borne IED countermeasure architecture | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX | DSS10 | SPIE Proceedings | SPIE
STIDP: A U.S. Department of Homeland Security program for countering explosives attacks at large public events and mass transit facilities | Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VIII | DSS09 | SPIE Proceedings | SPIE
A review of sensor data fusion for explosives and weapons detection | Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Sensing XIV | DSS13 | SPIE Proceedings | SPIE
Improved colour matching technique for fused nighttime imagery with daytime colours | Electro-Optical and Infrared Systems: Technology and Applications XIII | ESD16 | SPIE Proceedings | SPIE
The Event Camera Dataset
Using publicly visible social media to build detailed forecasts of civil unrest | Security Informatics | Full Text
Military Analysts: Islamic State Would Not Survive Fall of Raqqa | Small Wars Journal
Bespredel and the Conduct of Russian “Hybrid Operations” | Small Wars Journal
Center of Excellence collaboration examines critical infrastructure | START.umd.edu
Indian Strategic Studies
Tampermonkey • Home
The Ukraine Crisis Timeline
War News Updates: Afghanistan War News Updates -- October 26, 2016
War News Updates: An Analysis On The Afghan War
Time for Washington to Amp up the Power to Coerce
WORDij Semantic Network Tools
Topics | 2016 ARL Open Campus Open House
Information Operations, Warfare, Info Ops, Infowar, Cyberwar
Mosul battle: Four ways IS is fighting back - BBC News
OHSU gets pieces of up to $90M of Defense Department trauma research - Portland Business Journal
CISE Publications Database | Center for Information & Systems Engineering
The Stroz Friedberg Cyber Brief — Center on National Security
James Clapper reflects on lessons learned over his six years as Director of National Intelligence and discusses critical intelligence concerns facing the next U.S. president. - Council on Foreign Relations
WORDij
Content analysis and text analysis resources: bibliographies, research, software, electronic texts
Control Alt Achieve: Google Save - Your new home for saved images and links
Crow vs Crow | Olivier Terrien
SET-048 Information-Centric Sensor Management
SCI-158 Systems, Concepts And Integration Methods And Technologies For Defence Against Terrorism
SET-158 Disposable Multi-Sensor Unattended Ground Sensors Systems for Detecting Personnel
SET-161 Leading Body for the C-IED LTCR
SET-174 EO-TDA Modeling
US military hopes to use artificial intelligence to create cybersoldiers and help fly its F-35 jets | Daily Mail Online
'Unprecedented' Challenge in Countering Adversarial Propaganda, Official Says > U.S. DEPARTMENT OF DEFENSE > Article
DoD Chemical-Biological Program has a Global Mission > U.S. DEPARTMENT OF DEFENSE > Article
Centcom Counters ISIL Propaganda > U.S. DEPARTMENT OF DEFENSE > Article
Defense One
Echoes of Future War: How the Fight for Mosul Will Change IED Science - Defense One
State of the Art - Demos
eCrow Newsletter
Electronic Warfare | Information Operations | Association of Old Crows Resource Guide
Apple iOS 10.1 Has A Nasty Surprise
Apple iOS 10.1 Has A Nasty Surprise
Globalytica
Al-Qaeda Still Threatens Europe: How the U.S. Can—and Should—Help
Databases, Gateways, Search Engines, Libraries, and Educational Insitutions
International Society for Photogrammetry and Remote Sensing
ISPRS Ornagebook: Working Groups
American vigilante hacker sends Russia a warning
Accurint® Virtual Crime Center - LexisNexis®
Islamic State continues to plot against the West, US military warns | The Long War Journal
Status Report on the Iraqi/Kurdish Mosul Offensive - Matthew Aid
WG 32 Special Operations and Irregular Warfare
Inside the CIA's (Sort of) Secret Document Stash | Mother Jones
White House: Small satellites bring “Moore’s Law” into space | Network World
What IARPA Knows About Your Canceled Dinner Reservation - Nextgov.com
The Nuclear Threat | NTI
Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s - The New York Times
The 282 People, Places and Things Donald Trump Has Insulted on Twitter: A Complete List - The New York Times
Microsoft Open Sources Cognitive Toolkit | News & Opinion | PCMag.com
Analytic Tools and Techniques | pherson.org
Network dismantling
Data Mining for Predictive Social Network Analysis
Predict Crime | Predictive Policing Software | PredPol
Predictive Policing For Crime Analysts | PredPol
Command & Control Apps
Driving to Safety: Autonomous Vehicle Questions, Answered | RAND
The Power to Coerce: Countering Adversaries Without Going to War | RAND
Inside the Artificial Intelligence Revolution: A Special Report, Pt. 2 - Rolling Stone
The Team Payam Banazadeh M.S
Steve Blank’s Presentations on SlideShare
Battle For Mosul Begins in Iraq Against Islamic State - SPIEGEL ONLINE
Computational Social Science: Understanding terrorist attacks on Twitter | START.umd.edu
Waging Cyber War the American Way: Survival: Vol 57, No 4
Journal of Policing, Intelligence and Counter Terrorism: Vol 11, No 2
Artifically intelligent ‘judge’ developed which can predict court verdicts with 79 per cent accuracy
Stephen Hawking says artificial intelligence could be humanity's greatest disaster
The Many Scandals of Donald Trump: A Cheat Sheet - The Atlantic
AT&T Is Spying on Americans for Profit - The Daily Beast
Institute for the Study of War
New report series--U.S. Grand Strategy: Destroying ISIS and al Qaeda | Institute for the Study of War
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online - VOX - Pol
Joint INFOCORE, MeCoDem, VOX-Pol Workshop on Social Media, Conflict and Democracy to be held in Brussels - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study - Part 1: The First 20 Minutes - VOX - Pol
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath - VOX - Pol
Grey’s Anatomy Recap: Good News, Bad News -- Vulture
Google Photos now shows albums in search results | 9to5Google
CoRR - Computing Research Repository
arXiv.org Search
Computers and Society authors/titles recent submissions
Social and Information Networks authors/titles recent submissions
Attack the System
Records Management User Guide | Alfresco Community
Virginia: Hamas-linked CAIR enraged that sheriff’s office hosting seminar on jihad threat | The Counter Jihad Report
Embed Google Photos in your Website
Alfresco Activiti
Air Force Doctrine
KETs Deployment Visualization Tool - European Commission
Pocket: My List
Pocket: Recommended
Pocket: Pocket Premium
GitHub - lockfale/OSINT-Framework: OSINT Framework
Pocket Premium FAQ - Pocket Support
Premium Subscriber FAQ - Pocket Support
Nigeria Expands Its ‘War on Terrorism’ to the Niger Delta - Jamestown
Darknet Numbers Pages Proof of Concept | Krypt3ia
The Jester Effect and #iAWACS | Lady Liberty 1885
Stress-testing iPhone 7 Plus’ Portrait Mode – Medium
Netlytic - social media text and social networks analyzer
Alfresco » Repository Browser
PDF Viewer for iOS & Android - Reading, Reviewing, Annotating - Made Easy.
The Complete Privacy & Security Podcast
AT&T Analytical Services for Government Agencies Model Statement of Work | Public Intelligence
DoD Science and Technology Strategic Communication/Social Media Programs | Public Intelligence
Browse the USGS Publications Warehouse
Iris AI drastically expedites research through the power of artificial intelligence | TechCrunch
Compare Lists
#iAWACS hashtag on Twitter
steve blank (@sgblank) | Twitter
FBI — Home
ToolDatabase < Dmi < digitalmethods.net
Amazon.com: WD 3TB Black My Passport Ultra Portable External Hard Drive - USB 3.0 - WDBBKD0030BBK-NESN: Computers & Accessories
Russia | Federal Academy for Security Policy
Association of Old Crows (AOC) | Electronic Warfare | Information Operations
IO Publications & Links | IO Academy | The IO Institute
ICWSM Tutorial: Predictive Modeling with Social Networks
Center for Strategic and International Studies |
“Putin Is Corrupt” and Other Uncertainties Related to U.S. Policy toward Russia | Center for Strategic and International Studies
The Civil Side of Counterterrorism | Center for Strategic and International Studies
The Kremlin Playbook | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
Analysis | Center for Strategic and International Studies
The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe | Center for Strategic and International Studies
Anthony H. Cordesman | Center for Strategic and International Studies
Heather A. Conley | Center for Strategic and International Studies
Curated Conversations | Center for Strategic and International Studies
Counterterrorism and Homeland Security | Center for Strategic and International Studies
SAS-071 Analytical Tools for Irregular Warfare
Operation Manul | Electronic Frontier Foundation
Every CRS Report - EveryCRSReport.com
The First Day of a New Congress: A Guide to Proceedings on the Senate Floor - EveryCRSReport.com
Military Expenditure in the Baltic - Totalförsvarets forskningsinstitut
Top Articles and Videos about Mosul on Pocket
FDsys - Browse Compilation of Presidential Documents
HSDL Search Results
Check Out These Resources on Biodefense Before Seeing Tom Hanks’ “Inferno” – Homeland Security Digital Library
Whole Body Image Acquisition and Analysis | InnoCentive Challenge
Triggers and Thresholds of Non-International Armed Conflict | Just Security
LookingGlass Cyber Solutions
The Microsoft Cognitive Toolkit - Microsoft Research
Advanced Technologies Overview | The MITRE Corporation
Law Enforcement | The MITRE Corporation
Prevent Terrorism | The MITRE Corporation
Deception: The Quest for Detection | The MITRE Corporation
Human Odor: Sniffing Out Identity and Deception | The MITRE Corporation
Instant Collaboration: Using Social Networks in Emergency Response | The MITRE Corporation
Systems Engineering Strategies for Uncertainty and Complexity | The MITRE Corporation
Tools to Enable a Comprehensive Viewpoint | The MITRE Corporation
What can we 3D print? Everything! Here are 8 awesome examples | New Scientist
NUVI - Real-Time Social Intelligence
OCCRP
Bio - O'Reilly Media
Arie Croitoru - Publications
Automating social network analysis: A power tool for counter-terrorism
Inspiration for Battlefield Situation Cognition from AI Military Programs Launched by DARPA of USA and Development of AI Technology
RIMS - RIMS Annual Conference 2016 - Attendee - SESSION HANDOUTS
SD2 Proposers' Day
Schneier on Security: Blog Entries Tagged social engineering
Brain changes seen in youth football players without concussion -- ScienceDaily
Aroy Thai - Portland, OR Restaurant | Menu + Delivery | Seamless
Data and trends for multilateral peace operations | SIPRI
Pages - Technical Activities of the STO
Search Results :
Search Results : Analytical Support to Tactical Development"
Search Results :
Search Results :
RTO-MP-HFM-201 - All Documents
Search Results : analytical support to operations"
Techdirt.
The Internet of Things Goes Rogue
Massive Internet Outage Could Be a Sign of Things to Come
How the Internet of Things Took Down the Internet
AT&T Is Selling Law Enforcement Access to Its Customers’ Data
Tenable Unveils Industry’s First Integrated Threat and Vulnerability Management Capabilities for Faster Resolution of Critical Security Incidents - Press Release | Tenable Network Security
Revealed: US spy operation that manipulates social media | Technology | The Guardian
Middle East Leaders at UN on Extremism | Wilson Center
Zotero | People > Spencer L Willardson > Library > Facing Off and Saving Face: Covert Intervention and Escalation Management in the Korean War
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.