Light theme
Dark theme
Automatic (use operating system setting)
Shared: 591 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
591 tabs
Copy links to clipboard
Copy
Open
Adequate Man - Be good enough at everything
How To Line Up Groceries On A Conveyor Belt
The First Time We Got High: A Deadspin Confessional
Afghan Quest
iPhone/iPad AppLists by AppAdvice
The Ultimate Guide to Solving iPhone, iPad, and iOS Battery Drain — Appinstructor
Hungarian Danuvia K1 for sale in Libya via social media | Armament Research Services
A slide into obsolescence: iOS 8 on the iPad 2 | Ars Technica
Rolling an iPad and iPhone back to iOS 7 - Ars Technica OpenForum
[Updated] Using a Dyson hand dryer is like setting off a viral bomb in a bathroom | Ars Technica
“Patriotic hacktivist” The Jester unmasked—or maybe it’s a big troll | Ars Technica
Artificial Intelligence - foundations of computational agents -- 11.3 Reinforcement Learning
Rebuttal: The Curious Case of Sam Bowne
Teaching
Visualizing DomainTools Data with Maltego : DomainTools Blog
Wikipedia Year of Science: An Open Opportunity for Participation | The Official PLOS Blog
A Tech Framework For Innovations In Open Science | PLOS Tech
Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist / Boing Boing
Advanced Search
Advanced Search
Advanced Search
Advanced Search
Advanced Search
Modeling Jihad: A System Dynamics Model of the Salafist Group for Preaching and Combat Financial Subsystem; Strategic Insights, v. 5, issue 8 November 2006
Political Economy in Practice : Fragile States Assessment Methodology (FSAM) | capacity4dev
Executive-Control Processes in High-Calorie Food Consumption
THE GUN.
PLOS Collections: Article collections published by the Public Library of Science
Oral history interview with Harriet Steinhorn-Roth - USHMM Collections Search
Cut the cost of college life with these 5 discounts | Campus Beat News for College Students | USA TODAY College
Pilot Study of Entacapone for Methamphetamine Abuse - Full Text View - ClinicalTrials.gov
Small Wars Council - Powered by vBulletin
Doctrine & TTPs - Small Wars Council
Military Art & Science Applied - Small Wars Council
General Petraeus: collection - Small Wars Council
HUMINT, Informants and more (merged thread) - Small Wars Council
Intelligence, Data, COIN and CT - Small Wars Council
Cops or Police in Counterinsurgency COIN - Small Wars Council
The David Kilcullen Collection (merged thread) - Small Wars Council
'One of the single most insightful documents leaked since 2013' - Small Wars Council
Indicators of terrorist intent and capability: Tools for threat assessment - Small Wars Council
The Ultimate Student Discount Guide - Couponasaurus
Collective Intelligence Framework — CSIRT Gadgets Foundation
ISIS's Hunt for WMDs: Navigating the Nuclear Underworld with C.J. Chivers | Center for Strategic and International Studies
Global Summit on Computer & Information Technology (GSCIT 2016) (Tunisia) | Upcoming Events | Data Driven Journalism
dblp: Dung T. Nguyen
Deals - Kinja Deals
Double Your iPhone's Battery Life With These $10 Cases
Save a Bundle on Select Magazine Subscriptions, Today Only
This Discounted Shelving System Can Collapse and Roll For Easy Transport
Today's Best Deals: AeroGardens, USB Power Receptacles, Bladeless Fans, and More
Transform Your Closet With This $84 Rubbermaid Kit
Deep Web Research Resource
Added Shodan | Deep Web Search - A How-To Site
deep web resources | Deep Web Search - A How-To Site
Uncategorized | Deep Web Search - A How-To Site
Intelligence Analyst Resources and White Papers | Deep Web Search - A How-To Site
Strategic Surprise? Or The Foreseeable Future | Duck of Minerva
Earthquake “Top 10” Lists & Maps
1 Day, Magnitude 2.5+ Worldwide
US Earthquake Information by State/Territory
Event Registry
Intelligence Cooperation in the EU: Debates and Issues | Explore Taylor & Francis Online
DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 2/12 - Community Open Source Program
Starting from scratch : Twitter lists expose the heart of a story |
DARPA Wants To Swarm Enemy Skies With Small Reusable Drone Armies Called 'Gremlins'
Watch These Army Humvees Violently Crash Into The Ground After A Failed Airdrop
Anti-Terrorist HydraWedge wins Innovation Award at ISC West | Government Security News
Hacker Halted - Hacker Conferences Database
MIT GRAND HACK 2016 - MIT Hacking Medicine
WSC 2015 Proceedings
Norwegian Court Rules Man Who Killed 77 Had Rights Violated
How To Safely Downgrade From iOS 9 To iOS 8.4.1 Firmware
IRNAS
IRNAS :: symbiolab
Message to #anonOOPS « JESTERS COURT – OFFICIAL BLOG
Offensive Counter-Measures – Be Like Water « JESTERS COURT – OFFICIAL BLOG
Anonymous « JESTERS COURT – OFFICIAL BLOG
Weekly Eye on ISIS in Libya Update – April 20, 2016 | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
New statement from the Islamic Emirate of Afghanistan: “Notice to All Media Chiefs and Media Protection Committees in Afghanistan” | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
PLOS ONE: Kickoff to Conflict: A Sequence Analysis of Intra-State Conflict-Preceding Event Structures
Why Even the Best Forecasters Sometimes Miss the Mark - Knowledge@Wharton
SOCOM wants real video game & superhero tech
Dudley Knox Library - Naval Postgraduate School
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
Databases and Articles | Portland State University Library
How to Get Student Discounts Forever
Get Over the Stigma That Something's Wrong With You Because You Want More Friends
Seer Brings Mac-Like Preview Views to Windows
TextExpander Backs Down, but They’re Still Subscription-Based and You Can Do Better
Handbook of Science and Technology Convergence - Springer
‘Linguistics-Lite’ Topic Extraction from Multilingual Social Media Data - Springer
Context Modeling and Metamodeling: A State of the Art - Springer
Science and Technology Forecasting - Springer
adidas ACE 16.3 Turf Shoes - Black | adidas US
Maker Education Initiative – Every Child a Maker
Car Hacking 101: Tools of the Trade
Who Googled You? This Website Knows
Home - System Dynamics
How to Turn Your Smartphone Into a Microscope | Motherboard
The Arabic News Site Empowering Women to Challenge Extremism | Motherboard
This Tool Turns Your Online Investigations into a Searchable Case File | Motherboard
Mid-Pacific ICT Center: Why the Jester and Anonymous are Both Wrong
Media outlets and journalists on Snapchat: here's who you should follow - Muck Rack
Directed Energy Weapons: The Key to Securing America’s Dominance over Russia and China | The National Interest Blog
Sun Tzu vs. ISIS: The Art of War on Terror | The National Interest Blog
The Pentagon's Master Plan to Crack into Silicon Valley | The National Interest Blog
MiPAL: Terrorism - Research Guides at National Defense University
Good Fences: The Importance of Setting Boundaries for Peaceful Coexistence | NECSI
Defense and Security Studies | Open Access Articles | Digital Commons Network™
13 Queen Performances That Prove Freddie Mercury's Voice Is Incredible
Quick test for Ebola | MIT News
Nuzzel - Recently Read Stories
Lecture Notes | Principles of Optimal Control | Aeronautics and Astronautics | MIT OpenCourseWare
Passive Fingerprinting
When Doves Cry: International Rivalry, Unreciprocated Cooperation, and Leadership Turnover - Colaresi - 2004 - American Journal of Political Science - Wiley Online Library
Introductions to Adversary Behavior: Validating the Models - Zhuang - 2016 - Risk Analysis - Wiley Online Library
List of Student Discounts with .EDU Email Address | OnTheHub
Free Oregon Company Registry Search
osintframework.com
Author Page for Katya Drozdova :: SSRN
Covert Organizations' Asymmetric Arms Race: Comparative Case Study Toward Multi-Method Research by Katya Drozdova :: SSRN
Experts discover new gait pattern among top Russian officials
Open Source Intelligence by Jeff Bardin | Privacy PC
Oregon drug trafficking organizations
Influences and vulnerabilities in radicalised lone-actor terrorists
Sign In
Heilbronn Institute for Mathematical Research - University of Bristol
Theses - University of Bristol
OSINT (Open-Source Intelligence) - InfoSec Resources
OSINT Open Source Intelligence tools resources methods techniques
scholar.google.com/scholar_url?url=http://168.176.5.108/index.php/ingeinv/article/download/50384/55836&hl=en&sa=X&scisig=AAGBfm1Pazt8AQxkTvwp_l9MTCZQuYu8QA&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://ceur-ws.org/Vol-1577/paper_5.pdf&hl=en&sa=X&scisig=AAGBfm1FDSEWBMoO8GYADOMShBD3KsxFXQ&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://learningpolicyinstitute.org/wp-content/uploads/2016/04/Evidence_Based_Interventions_Guide_for_States.pdf&hl=en&sa=X&scisig=AAGBfm0M8R7VWt31YhVMrU2p92HVWPF2sA&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://ling.go.mail.ru/dsm/static/webvectors.pdf&hl=en&sa=X&scisig=AAGBfm0fPZKmuj_v7r39MPHsSgcB2HjxoA&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://ojs.uem.br/ojs/index.php/ActaSciAgron/article/download/27230/pdf_124&hl=en&sa=X&scisig=AAGBfm1xv6CvDd8jxJaaVi8sCL4ftEpycQ&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://www.dc.fi.udc.es/~cabalar/LRC16/LRC16.pdf%23page%3D145&hl=en&sa=X&scisig=AAGBfm0QqrVZ5YG3TIoGvhrm0y3yr7KGZg&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=http://www.public.asu.edu/~jundongl/paper/IJCAI16_MIFS.pdf&hl=en&sa=X&scisig=AAGBfm3ZJqjut3j7ZeoQ0TvcRuS6-JlG3A&nossl=1&oi=scholaralrt
scholar.google.com/scholar_url?url=https://morningconsult.com/wp-content/uploads/2016/04/MRP_whitepaper-5-1.pdf&hl=en&sa=X&scisig=AAGBfm35vIeYOFijye6IKerh_3EZB-nYVw&nossl=1&oi=scholaralrt
United States Holocaust Memorial Museum Collections - Ancestry.com
PSU Library Catalog
RasKal: MEMEX: a DARPA Project (DARPA-BAA-14-21)
RasKal
Small Wars Journal
The U.S. Army War College Quarterly Parameters - Latest Edition Now Online | Small Wars Journal
Library | Small Wars Journal
Reference | Small Wars Journal
Tribal Engagement Workshop | Small Wars Journal
Hacking for Defense: Week 3 | Small Wars Journal
On ISIS: The Reality of the 21st Century Battlefield | Small Wars Journal
Small Wars Journal
Amazon.com: Intelligence & Espionage: Kindle Store
The Five Disciplines of Intelligence Collection - Kindle edition by Mark M. Lowenthal, Robert M. Clark. Politics & Social Sciences Kindle eBooks @ AmazonSmile.
AmazonSmile Shopping Cart
AmazonSmile: Left of Boom: How a Young CIA Case Officer Penetrated the Taliban and Al-Qaeda (9781250081360): Douglas Laux, Ralph Pezzullo: Books
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer: William R. Johnson, William Hood: 9781589012554: AmazonSmile: Books
AmazonSmile: Left of Boom: How a Young CIA Case Officer Penetrated the Taliban and Al-Qaeda (9781250081360): Douglas Laux, Ralph Pezzullo: Books
Amazon.com: Robert M. Clark: Books, Biography, Blog, Audiobooks, Kindle
Amazon.com: Gary Citrenbaum: Kindle Store
Import from other applications
About CubeSat | Space Systems Laboratory
Government Information » The Islamic State’s Acolytes and the Challenges They Pose to U.S. Law Enforcement
The 29th System Dynamics PhD Colloquium
30th System Dynamics Colloquium
Top 20 Stores That Offer Student Discounts - The Krazy Coupon Lady
The OSINT Journal
Daesh/IS Armored Vehicle Borne Improvised Explosive Devices (AVBIEDs): Insurgent Use and Terrorism Potentials | TRENDS
Sic Semper Tyrannis : Syria War Digest - 20 April 2016
Pauls Online Math Notes
Technological Response to Hamas Tunnels is Crucial, Says Defense Expert | United with Israel
New Soccer T-shirts by Ultras 20% Off
Violent non-state actors & complex engineering; New nuclear facility attack database; Radicalization among immigrants; Public health lessons for CVE
MacStories Weekly: Issue 26
Left of Boom | Douglas Laux | Macmillan
War News Updates: EU And Nato Security Chiefs: Islamic State Plotting To Carry Out Biological And Nuclear Attacks On Britain And Europe
War News Updates: Military And Intelligence News Briefs -- April 21, 2016
Advanced Search: EBSCOhost
Understanding the Islamic State: the Strategic Architecture of ISIS and how to combat its capabilities. (Working DRAFT)
In-Depth Report: Israeli Intelligence
Demystifying ISIS | Daily Herd
WPI System Dynamics Club
It's Time to Understand: Paris, ISIS, and Action | Worcester Polytechnic Institute (WPI) News
George Danezis's HomePage
George Danezis's HomePage
IBM SPSS Modeler
Human Performance Training and Biosystems Directorate: Human Systems
How To Search The Text In Multiple PDF Files Without Opening Them
Israeli Defense Expert: Technological Response to Tunnels, Plan for Next Confrontation With Hamas Crucial | Jewish & Israel News Algemeiner.com
Amazon.com: Nicholas Crowder: Books, Biography, Blog, Audiobooks, Kindle
(OSINT) Open Source Intelligence Glossary: Guide to Keywords, Phrases for Improved Internet Research Results - Kindle edition by Nicholas Crowder. Reference Kindle eBooks @ Amazon.com.
Articles: ISIS and the Tijuana Drug-Smuggling Tunnels
Unprecedented technology poses challenges for special ops | Article | The United States Army
The United States Army | Page not found
selected Congressional Research Service (CRS) reports
Islamic State Training Camp Textbook: Excerpt and Analysis :: Aymenn Jawad Al-Tamimi
How four men survived as hostages of IS - BBC News
Islamic State 'forced out' of key Libyan city of Derna - BBC News
“Gunslinger’s gait”: a new cause of unilaterally reduced arm swing | The BMJ
What does it mean to sponsor terrorism? | Brookings Institution
Do Islamists have an intellectual deficit? | Brookings Institution
27 Art History Photos That Are Too Funny For Their Own Good
10 Places Smart Students Look for Discounts | Cheapism.com
Center for a New American Security |
C-IED COE - DEFEAT THE DEVICE
CollectionSpace | collections management software for museums and more
Original crime stories, exclusive excerpts, blog posts, giveaways | CriminalElement.com
Dénes | Professional
Interview with th3j35t3r - SecureNinjaTV on YouTube | CSO Online
Articles by Jeff Bardin | CSO Online
Resources / White Papers | CSO
Got an iPhone 4s or iPad 2? Why you should never upgrade from iOS 7 | Cult of Mac
Anonymous-Linked Hacker Claims North Korea Win
Dartmouth College : Laboratory For Human Terrain
Drones, lasers, hypersonic weapons will be ‘game-changers’ | www.daytondailynews.com
DEA / Intelligence
SOCOM Seeks TALOS (Tactical Assault Light Operator Suit) | Defense Media Network
eHam.net Home - Amateur Radio (Ham Radio) Community Site
Sports Lottery Game Prediction System Development and Evaluation on Social Networks: Internet Research: Vol 26, No 3
Social Media Landscape 2013 - FredCavazza.net
GlobalSecurity.org - Reliable Military News and Military Information
What iPad 2 Users Need to Know About iOS 8.1.3
How to Downgrade the iPad 2 to iOS 6 in 2015
Twitter: 100 Funniest Tweets of All Time | GQ
38 Stores With Student Discounts | Her Campus
Dangerous game: Israel battles Hamas in tunnel 'hide-and-seek' | News - Hot Pepper
How to Save All Your Current Tabs in Chrome for Reading Later
Islamic State Experts Modify Missiles And Build Remote-Controlled Car Bombs, 'Jihadi University' Footage Claims
The Best Student Discounts You Can Find
FBI Paid More Than $1.3 Million To Break Into San Bernardino iPhone
Developer creates a way to downgrade the iPad 2 and iPhone 4s to iOS 6.1.3
Research Associate - Portland, OR - Indeed Mobile
John Saxon - Senior Intelligence ... - Woodbridge, VA | Indeed
anycompany:(Six3systems) resumes | Indeed Resume Search
Download the April 2016 issue of Information Age magazine | Information Age
Hackers demonstrate how to hack into every call you make using just your phone number | Information Age
Live in Peace and Play Safe all over Europe
(6297) Inoreader - MEMRI Latest Reports
(4694) Inoreader - Shtetl-Optimized
Islamic State Executes 250 Women After They Refuse To Become Sex Slaves
Homes for Rent in Portland, Beaverton, and More! | InterWest Properties, Inc.
Expert: Oil Industry Has Tunnel Attack Solutions - Defense/Security - News - Arutz Sheva
The Caliphate Beyond ISIS: An Interview with Salman Sayyid (Part Two)
Guest Post: Surviving an Active Shooter – By Fmr SEAL TEAM 6 Operator – Rob O’Neill « JESTERS COURT – OFFICIAL BLOG
Analysis: Tunnel-detection techniques limiting Hamas’s attack options - Arab-Israeli Conflict - Jerusalem Post
Egyptian technical expert: Jewish-owned Uber could serve Israel's intelligence services - Arab-Israeli Conflict - Jerusalem Post
Mac Attender - FAQ
The Marines have a new plan to combat terrorists' IEDs
Marine Corps Engineer School tests new counter-IED course > The Official United States Marine Corps Public Website > News Display
George C. Marshall Center - European Center for Security Studies - Public Web - ttest
Hamas's Tunnels: Preparation For The Next Conflict With Israel
Hamas's Tunnels: Preparation For The Next Conflict With Israel
Security threats unable to take shine off Mali gold | MINING.com
CIA Whistleblower Kiriakou Joins Anti-War Activists To Write Letters To Political Prisoners
Executive Team MIT Enterprise Forum Israel
CubeSats Overview | NASA
CubeSat to Demonstrate Miniature Laser Communications in Orbit | NASA
Power Remains Key Challenge for Building SOCOM's Iron Man Suit (UPDATED)
Small Businesses See ‘Golden Opportunities’ in Special Operations Command - Blog
Open hardware: Self-built labware stimulates creativity : Nature : Nature Publishing Group
Gene-editing hack yields pinpoint precision : Nature News & Comment
College Is Expensive, but These Retailers Offer Student Discounts - NBC News
Obama Nixed CIA Plan That Could Have Stopped ISIS: Officials - NBC News
Spy Kid: A Young CIA Officer Breaks Cover and Spills Secrets - NBC News
Meet the ISIS Defector Who Handed Over Stolen Personnel Files - NBC News
Global Pattern Formation and Ethnic/Cultural Violence | NECSI
Step by Step to Stability and Peace in Syria | NECSI
Saved you a tap: Gmail’s Inbox now lets you email links to stories to read later, streamlines newsletters » Nieman Journalism Lab
The Growth of Citizen Science | The New York Academy of Sciences
In Tunnel War, Israeli Playbook Offers Few Ideas - The New York Times
Where the Islamic State Gets Its Weapons - The New York Times
A C.I.A. Grunt’s Tale of the Fog of Secret War - The New York Times
Facebook Groups Act as Weapons Bazaars for Militias - The New York Times
100+ Best Student Discounts for 2016
Research | OHSU Study Participation Opportunities | OHSU
Research | OHSU Study Participation Opportunities | OHSU
Clinical Trials | Healthcare | OHSU
Clinical Trials | Contraception, Birth Control, Incontinence, Menopause | Clinical Trials | Center for Women's Health in Portland Oregon | OHSU
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OpenMarkov : Developers
Portland's 19 best soccer bars | OregonLive.com
Oxford Handbook of National Security Intelligence - Oxford Handbooks
National Security Intelligence - Oxford Handbooks
Security State - Oxford Handbooks
Zika Research Projects List
Paterva / Maltego
How to downgrade iOS 9.3 to iOS 9.2.1 - How-To - PC Advisor
How to use Google Drive's selective sync | PCWorld
Visual Business Intelligence – Tools for Smart Thinking
Tetrad IV Download
Shafer: Myth of the Terrorist Mastermind - POLITICO Magazine
A Drone For The Everyday Cousteau | Popular Science
Former CIA Agent Reveals What It's Really Like to Be a Spy
ISIS Is Reportedly Packing Drones With Explosives Now
Flying Bazooka Drones Are Now a Real Thing
Why ISIS Is Building Mad Max Truck Bombs
Suspect Arrested After Robbing a Hawthorne Boulevard Bank
Blog – Lab Girl - Powell's Books
Powerpoint Ranger: Where The Battle Staff Commiserates
DNA Analysis Test Kit For Amateur Scientists
Great One Liners of the Month
Expert: Oil Industry Has Solutions for Israel's Tunnel Problem |
Downgrade iOS 9, 9.0.2, 9.0.1 To iOS 8.4.1, Here's How [Guide] | Redmond Pie
Chris Dorner: A glossary of terms in the manifesto of a deranged former LAPD officer | RedState
Reading The Terrorism Tea Leaves
The 10 nerdiest jokes of all time - Salon.com
“Homeland” made me laugh: Here’s what it’s really like being a CIA agent in the Middle East - Salon.com
Data | SAMHSA
Science.gov: USA.gov for Science - Government Science Portal
Terrorist Attack Assessment: Paris November 2015 and Brussels March 2016
An empirically grounded model for simulating normative energy use feedback interventions
Mining Social Networks for Anomalies: Methods and Challenges
Journal of Policy Modeling | Vol 37, Iss 6, Pgs 891-1080, (November–December 2015) | ScienceDirect.com
Sciencemadness Discussion Board - nitroglycerin - Powered by XMB 1.9.11
Phone Hacking Fears and Facts - Scientific American
Science Moves and Shakes Time's Top 100 List - Scientific American
Publications and resources · Sense about Science
Barefoot volunteers: 2016 Portland Barefoot Volunteers
Fighting the Islamic State in the Fifth Domain: Transnational Terrorism in the Indo-Pacific — SIR Journal
Create reports and export data - Social Explorer
United States Special Operations Command (USSOCOM) - Home
Reference management and bibliography generation software for Macintosh
Engineering Books | Springer
SRC, Inc. | Research, Development, Manufacturing and Life Cycle Management
System Dynamics Society
Foreign Terrorist Fighters: managing a twenty-first century threat - Third World Quarterly -
The use of specialized cybercrime policing units: an organizational analysis - Criminal Justice Studies -
Earthquake preparedness of households in Jeddah, Saudi Arabia: a perceptual study - Environmental Hazards -
Indicators of terrorist intent and capability: Tools for threat assessment - Dynamics of Asymmetric Conflict - Volume 8, Issue 3
Web Snapper | Capture Full Web Pages in PDF, PNG, SVG on Mac | TastyApps.com
Socom’s ‘hackathon’ opens process of creating high-tech commando gear | TBO.com and The Tampa Tribune
Terror (related) news April 20, 2016
The Spy Who Spilled Everything | The Lineup
The Confused Person's Guide to Middle East Conflict - The Atlantic
A Brief Guide to the Syrian Civil War - The Atlantic
Philip Gordon: Obama Should Have Bombed Assad Over Chemical Weapons - The Atlantic
What ISIS Really Wants - The Atlantic
What to Do About ISIS? - The Atlantic
Marines Test New Counter-IED Training Course at Pendleton | The Gun Page
Lock-hackers crack restricted keys used to secure data centres • The Register
60 Awesome Student Discounts - The Simple Dollar
The Space Review: Special Operations takes the fight to the high ground
Expert: Hamas Has Nearly Same Number of Tunnels It Did Before 2014 War | The Tower
World Cafe Method :: The World Cafe
Thunderbird School of Global Management
Tunnel detection tech can work for Israel, says expert | The Times of Israel
TRAC Incident Report: Abu Sayyaf group's 4 different sets of hostages - 21 April 2016 | Chatter Control | TRAC
Parking Sensors Market - Global Industry Analysis, Market Size, Share, Trends, Analysis, Growth and Forecast 2015 - 2023
8035 Southeast 6th Avenue, Portland, OR For Sale | Trulia.com
Seinfeld to Share N.J. Stage With Margaret Cho -- Vulture
Left of Boom: The Struggle to Defeat Roadside Bombs (washingtonpost.com)
The Underground War on Israel | The Weekly Standard
Gaza Preparing For New War As IDF Expert Warns Israel Will Not Be Ready For Hamas' New Weapon
DNA analysis suggests Yiddish originated in Turkey (Wired UK)
Why ISIS Is Winning the Social Media War | WIRED
Google’s New YouTube Analysis App Crowdsources War Reporting | WIRED
Tech Fails: What Annoys Us Most About Gadgets and Apps in 2016 - WSJ
Portland Sees a 674 Percent Jump in Startup Funding - Willamette Week
The Potlander - Willamette Week
How to secure Windows 10: The paranoid's guide | ZDNet
xkcd: Laws of Physics
Long Read – Anupam Katkar
Call for Participation: Summer 2016
Automation for iOS | Workflows, tips & tricks
Quantifying the Qualitative: Information Theory for Comparative Case Analysis - Katya Drozdova, Kurt Taylor Gaubatz - Google Books
Modelling Human Behaviour in Landscapes: Basic Concepts and Modelling Elements - Oliver Nakoinz, Daniel Knitter - Google Books
Saudi Arabia in a Multipolar World: Changing dynamics - Zakir Hussain - Google Books
Linguistic Linked Open Data: 12th EUROLAN 2015 Summer School and RUMOUR 2015 ... - Google Books
Post-Conflict Development in East Asia - Brendan M. Howe - Google Books
Political Corruption in Comparative Perspective: Sources, Status and Prospects - Google Books
BRABO | Terrorist Social Networks, OSINT, and Preventing Violent Extremism
Online Reputation Management | BrandYourself.com
CIAO Search Results
Concise Magazine | Succinct articles that help us understand the time in which we find ourselves. This is an Adult site and this is a good read. Like a giant scroll across the sky.
A technical reading of the “HIMR Data Mining Research Problem Book” | Conspicuous Chatter
Prosecutors: ISIS Ebook Helped Inspire Aborted Attack on Pamela Geller | The Counter Jihad Report
منظمة ارهابية داعش Daesh Terrorist Org Urban Cyber Warfare – The Cyber Shafarat – Treadstone 71
Cyware - News
Road-Testing GDELT as a Resource for Monitoring Atrocities | Dart-Throwing Chimp
Using GDELT to Monitor Atrocities, Take 2 | Dart-Throwing Chimp
A Coda to “Using GDELT to Monitor Atrocities, Take 2” | Dart-Throwing Chimp
Jeb! The Musical
Clandestine HUMINT and covert action - Wikipedia, the free encyclopedia
Human Terrain System - Wikipedia, the free encyclopedia
List of intelligence gathering disciplines - Wikipedia, the free encyclopedia
Open-source intelligence - Wikipedia, the free encyclopedia
Palantir Technologies - Wikipedia, the free encyclopedia
Portal:Intelligence - Wikipedia, the free encyclopedia
The Jester (hacktivist) - Wikipedia, the free encyclopedia
Yahalom (IDF) - Wikipedia, the free encyclopedia
Yiddish - Wikipedia, the free encyclopedia
Tech
Gimlet Media | » #62 Decoders
GitHub - symbiolab/bio-labware
bio-labware/000_bio-labware_overview.md at master · symbiolab/bio-labware · GitHub
DIY Labware review - Google Groups
DIY air sterilizer using electricity - Google Groups
Hacktivity - Archiv - Hacktivity 2013
Innovative Companies Get Their Best Ideas from Academic Research — Here’s How They Do It
ICWATCH
ICWATCH
ICWATCH
ICWATCH
ICWATCH
OSINT Training by Michael Bazzell
OSINT Search Tool by Michael Bazzell | Open Source Intelligence Techniques
Facebook Search Tool by IntelTechniques.com
Artificial Intelligence Powered by Crowdsourcing: The Future of Big Data and Humanitarian Action | iRevolutions
How Can Digital Humanitarians Best Organize for Disaster Response? | iRevolutions
KAT - Kickass Torrents
Download Academic Torrents - Kickass Torrents
Download Domestic Dog Cognition and Behavior - The Scientific Study of Canis familiaris - Horowitz (Ed.) Torrent - Kickass Torrents
Download Dynamic Process Methodology in the Social and Developmental Sciences - Valsiner et al. (Eds.) Torrent - Kickass Torrents
Download GMAT Books Torrents - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
Profile of ssitimefill - Uploads - Kickass Torrents
ARTICLE: CHAPTER 2 IN THE HISTORY OF CMBS: COMING TO TERMS WITH THE NEW RULES
Inbox (86) - scitrenbaum@gmail.com - Gmail
Using Hunchly’s Selectors for Google Analytics Tracking Codes — Medium
Going the extra 10,000 miles to serve customers — The Pathfinder — Medium
Resource Library in George C. Marshall European Center for Security Studies | GlobalNET
Eye on terror finance: suggested reading | Money Jihad
Social agent modeling and simulation : an aid to pre-adapting populations to serious societal disruptions - UBC Library Open Collections
Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - PRISM Break
Bulk Personal Datasets Challenge | Privacy International
Jeff Weyers | re:publica
RiskMap
samsclass.info: Sam Bowne Class Information
samsclass.info: Sam Bowne Class Information
Balduzzi Marco - Citazioni di Google Scholar
Taylor: The several worlds of the intelligence analyst - Google Scholar
Martínez-Álvarez: Hybrid Artificial Intelligent... - Google Scholar
Toyama: Maintain and Improve Mental Health by Smart... - Google Scholar
Leweling: Using systems dynamics to explore effects... - Google Scholar
Sakharova: Al Qaeda terrorist financing and technologies... - Google Scholar
Grynkewich: Modeling Jihad: A System Dynamics Model... - Google Scholar
Search is Back!
Top 5 Qualifications for CIA's Clandestine Service | SOFREP
U.S. Marines are Evolving to Counter New IED Threats | SOFREP
Left Of Boom”– A Different Way of Thinking About Prepping, by The Retired Professor – SurvivalBlog.com
How a Simple Request Got Me Blacklisted by the Pentagon
Documents Reveal Secretive U.K. Surveillance Policies
The Intercept
The Productivity Pack
(169) Twitter
Adam Harvey (@adamhrv) | Twitter
BBC News (World) on Twitter: "Meet the brave teenage activists who became the "Islamic State's Most Wanted" https://t.co/P4gLk7yZ0w https://t.co/Xz7xVxF00V"
Charles Lister on Twitter: "1: https://t.co/vTMxf991cp 2: https://t.co/9xxt0wdiei 3: https://t.co/YHs1U8UwPK 4: https://t.co/ygfdm1UGZF 5: https://t.co/YFcUHH8SnP"
Cole Calistra (@coleca) | Twitter
(8) Frank Turner (@frankturner) | Twitter
#sofwerx hashtag on Twitter
Jason Leopold (@JasonLeopold) | Twitter
Sam Bowne (@sambowne) | Twitter
Jon Nichols (@wvualphasoldier) | Twitter
Smartphones and caregiving – seize the opportunity to be useful | Aging In Place Technology Watch
Counter-IED Training
bellingcat - by and for citizen investigative journalists
Dyson's Airblade hand dryer in food hygiene, case studies from Campden BRI
Computer Articles Archive | IEEE Computer Society - IEEECS
RTO-MP-HFM-201 Social Media: Risks and Opportunities in Military Applications
CTC Sentinel | Combating Terrorism Center at West Point
Welcome to DEF CON, the Largest Underground Hacking Convention in the World
DHS, NASA Partner in Search of Innovation in Homeland Security | Homeland Security
Prize Competitions | Homeland Security
QAYIMAT ENGLISH.pdf - DocDroid
Problem-Book-Redacted
VIDEO UPLOAD - Dropbox
DVIDS - News - Marine Corps Engineer Schools tests new Counter-IED course
Maltego Part I - Intro and Personal Recon - EH-Net Online Mag
Industry Exchange Fellowship - SOCOMFELLOW - Federal Business Opportunities: Opportunities
101 Student Discounts
@BestWorkflows | Automation for iOS - Google Search
A Survey of Mobile Phone Sensing, - Google Search
marine Corps Intelligence Activity report IEDs - Google Search
Bruce Forrester - Google Search
Cooperative Communities (CoCo) framework. - Google Search
CounterHack Reloaded - Google Search
dance your phd - Google Search
Database on nuclear smuggling, theft and orphan radiation sources - Google Search
DEA Intelligence Report - Google Search
Defeat the Device Counter-IED Training Class - Google Search
Documentation | CollectionSpace - Google Search
Dr. Sam Bowne. - Google Search
Experts discover new gait pattern among top Russian officials - Google Search
Hacker Halted - Google Search
Hacktivity - Archiv - Hacktivity 2012 - Google Search
homeland security investigations intelligence report - Google Search
iHLS Israel Homeland Security i-HLS - Google Search
Intelligence Analyst Resources and White Papers | Deep Web Search - Google Search
Intelligence Link Directory - Google Search
International Panel on Fissile Materials - Google Search
ipad 2 ios 8 - Google Search
israel tunnel expert - Google Search
Karl Sharro - The Atlantic - Google Search
M, Balduzzi, R - Google Search
MEMEX: - Google Search
Modeling Jihad: A System Dynamics Model of the Salafist Group for Preaching and Combat Financial Subsystem - Google Search
New Security Challenge - Google Search
NSO > Academics > Resident Courses > Course Catalogue > Course Description - Google Search
Open Source Intelligence by Jeff Bardin | Privacy PC - Google Search
Open Source Intelligence News (OSIN) - Google Search
Open-source intelligence - Wikipedia, - Google Search
RasKal - Google Search
reinstall ios 7 on ipad 2 - Google Search
set ipad back to ios 8 - Google Search
Social Media Exploitation - Google Search
SocialC2IS - Google Search
streamlined counter-IED course - Google Search
Stuart Croft, - Google Search
System Dynamics Society - Google Search
TERRORIST BEHAVIOR MODELING - Google Search
The Confused Person's Guide to Middle East Conflict - The Atlantic - Google Search
thunderbird business school - Google Search
Timothy Clancy, WPI - Google Search
Timothy Clancy ISIS - Google Search
Understanding the Islamic State: the Strategic Architecture of ISIS and how to combat its capabilities - Google Search
What to Do About ISIS? - The Atlantic  - Google Search
Why ISIS Is Winning the Social Media War - Google Search
Worcester Polytechnic Institute ISIS - Google Search
HDIAC.org
HDIAC Journal Archive | HDIAC.org
HDIAC Publications | HDIAC.org
Highlight: Harnessing Biotechnology to Accelerate Advanced Biofuels Production | HDIAC.org
Informational Resources | HDIAC.org
Military Role in Homeland Security
Earthquakes
Questioning Data that Drives the Global War on Terrorism – Homeland Security Digital Library
https://www.hunch.ly/hunchlysignup/
iFLY Portland Indoor Skydiving - Fly in our Indoor Wind Tunnel
Al Qaeda terrorist financing and technologies to track the finance network
Free File: Do Your Federal Taxes for Free
Need More Time to File Your Taxes?
JIDA - Defeat Threat Networks
The Early Edition: April 20, 2016 | Just Security
56 Facial Recognition Research Groups to Watch
The NSA, the Washington Post, and the Administration - Lawfare
Timothy Clancy | LinkedIn
Using Systems Thinking to Analyze ISIS | Melio Saenz | LinkedIn
Search | LinkedIn
CBR to EPUB - Online Converter
Modeling Platforms | Open Agent Based Modeling Consortium
Paterva / Maltego
About Us - Planet Labs
Register for Anonymous VPN Services | PIA Services
Jason Leopold vs. the United States - ProPublica
Earthquakes | Ready.gov
HOW TO: Remove yourself from ALL background check websites. Thanks to LawyerCT. : reddit.com
IamA former CIA Case Officer who recently revealed my career to my family and now the world. AMA! : IAmA
Ex CIA agent and case officer books? : Intelligence
Reveal | from The Center for Investigative Reporting
RiskMap
Ex-Taliban British bomb expert joins ISIS — RT UK
Essays: Inside the Twisted Mind of the Security Professional - Schneier on Security
Privacy error
Semantic Scholar
DNA sat nav uncovers ancient Ashkenaz and predicts where Yiddish originated - News releases - News - The University of Sheffield
Evenwel v Abbott
SocioSpyder – OSINT Collection and Mapping
Core Capabilities and Potential Durability of the Islamic State of Iraq and the Levant (ISIL) | START.umd.edu
Nuclear Facilities Attack Database (NuFAD) | START.umd.edu
Resources - Toddington
The best military Reddit IAmA's
OSINT
Targeted Destructive Malware | US-CERT
Ex-CIA officer faces extradition from Portugal to Italy for alleged role in cleric’s rendition - The Washington Post
A compassionate judge sentences a veteran to 24 hours in jail, then joins him behind bars - The Washington Post
ECE: Past MQP Winners - WPI
Engineering: Project Search - WPI
The Late Late Show with James Corden - YouTube
Hairspray On Broadway - Mama, I'm A Big Girl Now - YouTube
'Islamic State's' most wanted: ISIS take over (Part 1) - BBC News - YouTube
World Leading Intelligence Analysis - Analyst's Notebook 8.5 - YouTube
Hairspray on Broadway - Act 1 - YouTube
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.