Light theme
Dark theme
Automatic (use operating system setting)
Shared: 555 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
555 tabs
Copy links to clipboard
Copy
Open
IntelCenter
InternetAWACS | Jesterscourt
The GDELT Project
InternetAWACS | Jesterscourt
Syria Tracker (سوريا تراكر)
Jihad Intel
Flu & Ebola Map | Virus & Contagious Disease Surveillance
CrisisNET
Home - Data Portals
Violence Early Warning System - beta | Niger Delta Watch
Open Source Center - Login
Verification Junkie
DSpace@MIT: Community List
Replication Datasets - Journal of Peace Research - PRIO
Country Analysis A-Z | The Fund for Peace
Investigative Reporters and Editors | NICAR
Vol 6 (2011)
OneTab shared tabs
(15) fajar muhammad - Academia.edu
Reading Out Single-Molecule Digital RNA and DNA Isothermal Amplification in Nanoliter Volumes with Unmodified Camera Phones - ACS Nano (ACS Publications)
Counting molecules with an ordinary cell phone -- ScienceDaily
IARPA Reveals Opportunities | SIGNAL Magazine
Reports and publications
Afghan War News: ISIS, CTF, CT, and IO News
Afghan War News: ISIS, CTF, CT, and IO News
Afghan War News
Rangers Radar Chart
Russia in Review - Harvard - Belfer Center for Science and International Affairs
CrisisNET
The 25 Gmail Keyboard Shortcuts That Save Me 60 Hours Per Year
The Human Algorithm | Storyful Blog
The Human Algorithm | Storyful Blog
PLOS iGEM Collection – Open For Submissions | PLOS Collections
The Pentagon, the CIA, and the Saudis vs. Vladimir Putin - Washington Wire - WSJ
Data on conflict, economic shocks, war violence, and other happy things - Chris Blattman
Chris Blattman - International development, economics, politics, and policy
Research - Chris Blattman
Conference of Defence Resources Management
Systems Social Seience: A design inquiry approach for stabilization and reconstruction of social systems - IOS Press
HIJRAH, IMMIGRATION: THE ISLAMIC PRACTICE IN THE INFIDELS’ LANDS | The Counter Jihad Report
Home | CREATE
Publications | CREATE
FY 2016 Weapon Systems Factbook |
Afghanistan: The Uncertain Impact of a Year of Transition | Center for Strategic and International Studies
Data | The World Bank
Home - Data Portals
dblp: Kenneth D. Strang
DCAF - Publications
Google Scholar Metrics and Scholarly Productivity in International Relations | Duck of Minerva
Strategic Surprise? Or The Foreseeable Future | Duck of Minerva
Duck of Minerva
Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy
Edge Master Class 2015: A Short Course in Superforecasting, Class I | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class II | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class III | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class IV | Edge.org
Edge Master Class 2007 DANIEL KAHNEMAN: "A SHORT COURSE IN THINKING ABOUT THINKING" | Edge.org
Edge Master Class 2015: Philip Tetlock: A Short Course in Superforecasting | Edge.org
tags - Al Arabiya English
Can you identify violent extremists using a screening checklist and open-source intelligence alone? - Nottingham ePrints
Data: Political Instability Task Force Worldwide Atrocities Dataset
Findings for Mac - Your lab notebook, reinvented.
How to find breaking news on Twitter - firstdraftnews.com
SAFS | forendex | home
Using Google, Twitter and Facebook to Try and Stop ISIS Is Wrong - Fortune
NJ Transit Police Intelligence Analyst position.
Syria | The Fund for Peace
Country Analysis A-Z | The Fund for Peace
Indicators | The Fund for Peace
Reviews | The Fund for Peace
Full Text Reports... | A top-tier research professional's hand-picked selection of documents from academe, corporations, government agencies (including the Congressional Research Service), interest groups, NGOs, professional societies, research institutes, think tanks, trade associations, and more.
think tanks | Full Text Reports...
US Department of Homeland Security, Citizenship and Immigration Services, Fusion Center
US Department of Homeland Security, Citizenship and Immigration Services, Fusion Center
The GDELT Project
Conflict Early Warning & Assessment | The Fund for Peace
Center for Global Policy —
Archived: Political Instability Task Force
Heidelberg Institute for International Conflict Research
Lone Actor Terrorism: Database | ICCT
IEEE Xplore Abstract - Statistical Modeling and Visualizing Open Big Data Using a Terrorism Case Study
IEEE Xplore Abstract - Multi-factor Analysis of Terrorist Activities Based on Social Network
IEEE Xplore Abstract - Peer-to-Peer Communication in Neuronal Nano-Network
IEEE Xplore Abstract - Asymmetric Threat Modeling Using HMMs: Bernoulli Filtering and Detectability Analysis
Looking for an Intelligence Career? Learn About this Acronym
The Future of Unmanned Aerial Vehicles (UAVs)
IntelCenter
InternetAWACS | Jesterscourt
Iraq Da'ish report (Number 10) regarding fighting on Mt.Makhul showing their intended targets, a heavy DIY mortar - Ramadi map. War on ISIS Interactive Map, Fresh news from Iraq and Syria on the map, Daesh map - liveuamap.com
The Diffusion of Nonviolent Campaigns
Jihad Intel
Journal of Global Security Studies
Journal of Defense Resources Management
Home - Journalist's Resource Journalist's Resource
Security, Military Archives - Journalist's Resource Journalist's Resource
Crowdsourced projects and skewed results: Research findings on participation and social influence factors - Journalist's Resource Journalist's Resource
The growing problem of Internet “link rot” and best practices for media and online publishers - Journalist's Resource Journalist's Resource
Digital media and society: Covering social media, technology and a networked world - Journalist's Resource Journalist's Resource
Journalism Ethics in the Digital Age: A Model/Open Source Syllabus - Journalist's Resource Journalist's Resource
Political reporting: Covering elections, governance and the democratic process - Journalist's Resource Journalist's Resource
Syllabus: Critical thinking, ethics and knowledge-based practice in visual media - Journalist's Resource Journalist's Resource
data journalism Archives - Journalist's Resource Journalist's Resource
dataset digest Archives - Journalist's Resource Journalist's Resource
Tip sheets Archives - Journalist's Resource Journalist's Resource
Data journalism lesson with crime stats: Parsing close-call numbers and producing valid stories - Journalist's Resource Journalist's Resource
Investigating nonprofits and charities: Where to find internal data, public records - Journalist's Resource Journalist's Resource
Dataset digest, April 2015: Federal datasets that can inform local coverage - Journalist's Resource Journalist's Resource
Tools for verifying and assessing the validity of social media and user-generated content - Journalist's Resource Journalist's Resource
Writing about a research study: Good examples of using scholarship as a basis for reporting - Journalist's Resource Journalist's Resource
Using Python to scrape a website and gather data: Practicing on a criminal justice dataset - Journalist's Resource Journalist's Resource
Statistical terms used in research studies: A primer for media - Journalist's Resource Journalist's Resource
Major administrative datasets of the U.S. government — all in one place - Journalist's Resource Journalist's Resource
PLOS ONE: accelerating the publication of peer-reviewed science
PLOS ONE: Kickoff to Conflict: A Sequence Analysis of Intra-State Conflict-Preceding Event Structures
PLOS ONE: Optimizing Semantic Pointer Representations for Symbol-Like Processing in Spiking Neural Networks
Journal of Peace Research
Terrorism experiments
Unpacking nonviolent campaigns
jpr.sagepub.com/site/includefiles/ucdp_collection.xhtml
- Home - Library at Joint Special Operations University
Fundamentalism and Terrorism
202.174.84.89
Odafin Tutuola - Law and Order - Wikia
Law Officer Drug Survey - Law Officer
Blog | The Fund for Peace
The World in 2015: Country-by-Country Trend Analysis | The Fund for Peace
How We Work, 2016: Eric Ravenscraft's Gear and Productivity Tricks
Harvesting and analysis of weak signals for detecting lone wolf terrorists - Springer
‘Linguistics-Lite’ Topic Extraction from Multilingual Social Media Data - Springer
Applications of Social Systems Modeling to Political Risk Management - Springer
First System: Help Beacons - Springer
Damage Analysis I: Probit Functions and Probability Distributions - Springer
A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics - Springer
Afghan Ex-IS Commanders Say Money, Not Ideology Drove Them
IS Getting Bomb-making Materials with Ease, Report Says
Verification Handbook Mixes Tools, Tips and Culture for Fact-Checking
Biometric attack detection technologies sought by IARPA - Military Embedded Systems
Minerva Initiative
Funding Opportunities (Minerva Initiative)
Minerva Initiative
Airbus 321: Using Tragedy to Create Effective Discourse on Modern Terrorism | McGill International Review
Momin M. Malik: Research works
Monitor360 - Strategy, Strategy Consulting Firm, Intelligence Analysis, Intelligence Community
This Guy Matched with Over 1,000 Women on Tinder by Pretending to Be a Bagel | Motherboard
CORE Lab Projects - Naval Postgraduate School
New England Complex Systems Institute
Good Fences: The Importance of Setting Boundaries for Peaceful Coexistence | NECSI
Conflict in Yemen: From Ethnic Fighting to Food Riots | NECSI
Maker Shed
One Earth Future
Research | One Earth Future
Agent Directed Simulation for Combat Modeling and Distributed Simulation - Engineering Principles of Combat Modeling and Distributed Simulation - Bharathy - Wiley Online Library
Community detection in social networks - Bedi - 2016 - Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery - Wiley Online Library
OPEN SOURCE INTELLIGENCE (OSINT) NEWS: CONSPIRACY THEORIES OR WEIRD THINGS DONE BY SPY AGENCIES?
Search eLibrary :: SSRN
Covert Organizations' Asymmetric Arms Race: Comparative Case Study Toward Multi-Method Research by Katya Drozdova :: SSRN
Home | Pardee Center for International Futures
Introduction to Projects | Pardee Center for International Futures
Patterns of Potential Human Progress | Pardee Center for International Futures
PPHP 1: Reducing Global Poverty | Pardee Center for International Futures
Weekly Links | Political Violence @ a Glance
Political Violence @ a Glance
Denver Dialogues | Political Violence @ a Glance
Applied Projects
Private Security Monitor | Sie | Korbel | University of Denver
Lab-on-a-drone: Toward pinpoint deployment of smartphone-enabled nucleic acid-based diagnostics for mobile health care - Analytical Chemistry (ACS Publications)
Reading Out Single-Molecule Digital RNA and DNA Isothermal Amplification in Nanoliter Volumes with Unmodified Camera Phones - ACS Nano (ACS Publications)
Analytical Red Team Exercises for Irregular Conflict | RED TEAM JOURNAL
Theories of Conflict and Violence | University of Kent
Theories of Conflict and Violence | University of Kent
SEI Digital Library
Project Search
Global Pattern Formation and Ethnic/Cultural Violence | Science
Global Pattern Formation and Ethnic/Cultural Violence | Science
References - ProQuest
Calibrating risk for violent political extremists and terrorists: The VERA 2 structured assessment. - ProQuest
ICB Project – International Crisis Behavior
Duke MINERVA
Database & Mapping | Duke MINERVA
Global Value Chains | Duke MINERVA
Using the Internet of Things to Gain and Maintain Situational Awareness in Dense Urban Environments and Mega Cities | Small Wars Journal
Will the NSA Finally Build Its Superconducting Spy Computer? - IEEE Spectrum
Biodefense Course Sampler - School of Policy, Government, and International Affairs
Gregory Koblentz - School of Policy, Government, and International Affairs
Real-time monitoring and sensing of atmospheric explosive vapors | SPIE Homepage: SPIE
Violence Early Warning System - beta | Niger Delta Watch
Statistics Dictionary
The Virtues of Violence: The Salafi-Jihadi Political Universe
Risk Intelligence — Tegumen
Say Terrorist, Think Insurgent: Labeling and Analyzing Contemporary Terrorist Actors | Moghadam | Perspectives on Terrorism
The Intelligence Community, LLC
How many Yemeni civilians have been harmed so far in the Saudi-led bombing campaign?
MacStories Weekly: Issue 21
Checks and Balances: Securing Small Arms during Peace Operations
Verification Handbook: homepage
Verification Handbook: homepage
Verification Handbook for Investigative Reporting
Verification Junkie
USC - Viterbi School of Engineering - Azad M. Madni
Russian Military Analysis
Civilian Employment
Future Cities pose Security Challenges today and tomorrow - NATO keeps ready to face those risks
Publications
NATO Urbanisation Project
Volume 1 – Innovation in Operations Assessment: Recent Developments in Measuring Progress in Conflict Environments
Homegrown Islamic Extremism in 2014
IARPA Reveals Opportunities | SIGNAL Magazine
Afghan War News
NATO’s Next Challenges
Roundtable on Urbanization and the Global Future
Information Systems :: Programs
Instructor-Led Training: Learning Team Past Performance | OPM TMA | Booz Allen Hamilton | Booz Allen Hamilton
Political realism: How hacks, machines, big money and back-room deals can strengthen American democracy | Brookings Institution
ISIS's influence is declining on Twitter - Business Insider
What it's like to be a hacker in Iran - Business Insider
Crime and Intelligence Courses - College of Continuing Education at Sacramento State
My Congressional District
Experts assess the current situation in Afghanistan, analyze U.S. involvement, and offer policy options moving forward. - Council on Foreign Relations
Zika Virus and Microcephaly - Council on Foreign Relations
Conflict Armament Research
Critical Thinking Index Page
www.cs.cmu.edu/~chongw/citeulike/docs/doc12187.html
Military-Funded Study Predicts When You’ll Protest on Twitter - Defense One
CCRP - Command and Control Research Program
DRESMARA
Faculty Publications | University of Denver
Policy Papers | University of Denver
Registration | University of Denver
Research | University of Denver
Networks, Governance and Global Security | University of Denver
The Private Security Monitor | University of Denver
Nonviolent Action in Violent Settings | University of Denver
DATE Project | University of Denver
External Support for Nonviolent Campaigns | University of Denver
GATE Data Project | University of Denver
Major Episodes of Contention | University of Denver
Terrorism Network Project | University of Denver
Data Downloads | University of Denver
Social Conflict in Africa Database | University of Denver
Research | University of Denver
Religion and Social Cohesion in Conflict Affected Countries | University of Denver
Terrorism as Gravitational Attraction : Terrorism and Counterterrorism Today
Infographic of the Day: Watch Egypt's Twitter Uprising Bloom [Video] | Co.Design | business + design
www.firstmonday.org
FOI - Swedish Defence Research Agency
Reports and publications
Popular science publications
Scientific publications
Short research summaries
Technical reports
Welcome to Fort Davis, Texas
Germanna Community College | Fredericksburg, Virginia
Germanna's Center for Workforce launches Homeland Security program | Germanna Community College
Event Recap: Global Shell Games, Experiments in Transnational Relations, Crime, and Terrorism
Flu & Ebola Map | Virus & Contagious Disease Surveillance
Henley-Putnam Request Information
Homeland Security Today: The Kimery Report
Watch Jane the Virgin Online - Chapter Thirty-Two | Hulu
IACA Resource Center
Basic Criminal Intelligence Analysis Training
Model-Based Systems Engineering - IEEE SMC
IfmPt | Near Repeats
Kenneth David Strang | IGI Global
What and Where are the Risks of International Terrorist Attacks: A Descriptive Study of the Evidence: Business IS&T Journal Article | IGI Global
What and Where are the Risks of International Terrorist Attacks: A Descriptive Study of the Evidence: Business IS&T Journal Article | IGI Global
Daily Intelligence Briefing
Entry Level Intelligence Analyst Jobs, Employment | Indeed.com
Syria civil war: The untold story of the siege of two small Shia villages - and how the world turned a blind eye | Middle East | News | The Independent
Syria civil war: State-of-the-art technology gives President Assad’s army the edge | Middle East | News | The Independent
Based on a *True* True Story? | Information is Beautiful
The Hollywood In$ider | Information is Beautiful
(8976) Inoreader - Political Violence @ a Glance
(5711) Inoreader - Duffel Blog
(8976) Inoreader - Marcus P. Zillman
Intelligence Analysis Training Ltd
International Alert
Hamas Rebuilding War Machine as Gaza Deteriorates :: The Investigative Project on Terrorism
Iraq news, the latest Iraq news by Iraqi News
Investigative Reporters and Editors | NICAR
Wholeness Seminar Home page
ISS WORLD Europe - Conference Agenda
The Foundations of Intelligence Analysis Training (FIAT) Program | Law Enforcement Intelligence Units
Intelligence Training · Lockheed Martin
AQAP publishes insider’s account of 9/11 plot | The Long War Journal
Intel Agencies Explain How They Determined That... - Matthew Aid
Congressman Accused Pentagon of Deliberately... - Matthew Aid
Spy Buffs Searching for Secret FBI Spy Tunnel... - Matthew Aid
Level 100 - DOD Military Acronyms, - Memrise
MKG-INTL250 Open Source Intelligence for Managers (OSINT-M) - MKGroup – Strategic Solutions & Training
WG 32 Special Operations and Irregular Warfare
Military Operations Research Society > Publications > MOR Journal > Online Issues
Emerging Cognitive Neuroscience and Related Technologies | The National Academies Press
Field Evaluation in the Intelligence and Counterintelligence Context: Workshop Summary | The National Academies Press
Intelligence Analysis for Tomorrow: Advances from the Behavioral and Social Sciences | The National Academies Press
Enhancing the Effectiveness of Team Science | The National Academies Press
Measuring Human Capabilities: An Agenda for Basic Research on the Assessment of Individual and Group Performance Potential for Military Accession | The National Academies Press
Understanding Pathways to Successful Aging: How Social and Behavioral Factors Affect Health at Older Ages: Workshop in Brief | The National Academies Press
Measuring Serious Emotional Disturbance in Children: Workshop Summary | The National Academies Press
The National Academies Press
The National Academies Press
The National Academies Press
The National Bureau of Economic Research
Smartphone and tablet self management apps for asthma. - PubMed - NCBI
Johnson J[au] - PubMed - NCBI
Intelligence Analyst Training Program (IATP)
Peace for Syria | NECSI
Global Pattern Formation and Ethnic/Cultural Violence | NECSI
Step by Step to Stability and Peace in Syria | NECSI
Swiss-ification: Syria's Best Hope for Peace | NECSI
Can You Keep a Secret? - The New Yorker
Nordregio
John Brennan On The FBI-Apple Standoff, ISIS And His Future At The CIA : The Two-Way : NPR
http://www.nps.navy.mil/ is not available
Facing the Taliban and His Past, an Afghan Leader Aims for a Different Ending - The New York Times
OneTab shared tabs
Our courses - Open University
D271_1_1.0: Politics, media and war: 9/11 and its aftermaths: View as single page
Access : Automating social network analysis: A power tool for counter-terrorism : Security Journal
The Issue Correlates of War (ICOW) Project
ICOW Territorial Claims Data
Links I like. - Pauline L. Moore
Have a Healthy, Happy March with These Local Wellness Events | Portland Monthly
Jürgen Pfeffer
Robert Steele: Open Source Intelligence 101 (Intelligence Tradecraft in the Third Millennium) « Public Intelligence Blog
How social influence can undermine the wisdom of crowd effect
Innovations for Poverty Action
New research suggests it’s possible to automatically identify fake images on Twitter – Poynter
Vol 6 (2011)
Case Studies - Professional Security
Web Links - Professional Security
Associations - Professional Security
Scientists Can Now Genetically Modify Organisms in the Wild - Pacific Standard
Quilliam Foundation | Challenging Extremism, Promoting Pluralism, Inspiring Change
A Peace Plan for Syria | RAND
Toward Operational Art in Special Warfare | RAND
Air Base Attacks and Defensive Counters: Historical Lessons and Future Challenges | RAND
BAR, Braz. Adm. Rev. - Available issues
Staffing models for covert counterterrorism agencies
Interventional consensus for high-order multi-agent systems with unknown disturbances on coopetition networks
Study on Correlation Factors that Influence Terrorist Attack Fatalities Using Global Terrorism Database
White Papers & Articles - SCIP
Spectral Analysis Review - Scientific Research Publishing
SCS PUBLICATIONS
About Us | Our Organization | Emerging Technology Center | Reference Sheets
About Us | Our Organization | Emerging Technology Center | Cyber Intelligence Tradecraft Project
Comment on “The rise of ISIS: the role of the West and Regional Powers” – by Agha Jafri | ShiaPAC
Small Arms Survey - Home
Small Arms Survey - Stockpile Management and Security
Small Arms Survey - Special Reports
Society for Terrorism Research
SUPERFORECASTING IN ACTION
Master Class | SUPERFORECASTING IN ACTION
Iran Adversarial Collaboration Challenge Update: The Neutral Forecasters Are Leading | SUPERFORECASTING IN ACTION
SWGDRUG Organization Representation
SWGDRUG Supplemental Documents
SWGDRUG Tools
ConflictTrends
INSCRdata
CSP - Warfare Coding Guidelines
CSP - Major Episodes of Political Violence, 1946-2013
Tactical Decision Making Research Group – University of Liverpool
More Combatant Groups, More Terror?: Empirical Tests of an Outbidding Logic - Terrorism and Political Violence - Volume 24, Issue 5
The Evolutionary Path of Hamas: Examining the Role of Political Pragmatism in State Building and Activism - Terrorism and Political Violence - Volume 27, Issue 3
Estimating the Duration of Jihadi Terror Plots in the United States - Studies in Conflict & Terrorism - Volume 35, Issue 12
Combating maritime transnational crime: an Australian perspective - Journal of the Indian Ocean Region - Volume 12, Issue 1
Terror (related) news February 27, 2016
Daily terror news
Terrorism Research Initiative
Perspectives on Terrorism
Analysis of Al-Qaeda Terrorist Attacks to Investigate Rational Action | Hepworth | Perspectives on Terrorism
“Join the Caravan”: The Ideology of Political Authority in Islam from Ibn Taymiyya to Boko Haram in North-Eastern Nigeria | Barkindo | Perspectives on Terrorism
Counting Lives Lost – Monitoring Camera-Recorded Extrajudicial Executions by the “Islamic State” | Tinnes | Perspectives on Terrorism
Why is Contemporary Religious Terrorism Predominantly Linked to Islam? Four Possible Psychosocial Factors | Wright | Perspectives on Terrorism
How Dangerous Are Domestic Terror Plotters with Foreign Fighter Experience? The Case of Homegrown Jihadis in the US | Wright | Perspectives on Terrorism
In Conversation with Morten Storm: A Double Agent’s Journey into the Global Jihad | Bonino | Perspectives on Terrorism
If Publicity is the Oxygen of Terrorism – Why Do Terrorists Kill Journalists? | Lopez | Perspectives on Terrorism
Counterterrorism Bookshelf: Twenty New Publications on Israeli & Palestinian Issues | Sinai | Perspectives on Terrorism
ISIS Is Losing Its Capital - The Daily Beast
My Lunch With ‘The Spider’ Who Nearly Wrecked the CIA - The Daily Beast
Isis has been thwarted militarily. But now it could seize chance to advance | World news | The Guardian
Syrian rebel factions say they will respect two-week truce | World news | The Guardian
Course Descriptions – The Intelligence & Security Academy
Transparency International - The Global Anti-Corruption Coalition
Developing Your Cyber Intelligence Analyst Skills | The State of Security
Research & Education | UMass Lowell
Institute of Security and Global Affairs - Universiteit Leiden
TextSoap - Automate Your Text Cleanup
United Nations Peacebuilding Fund
Measuring Progress in Conflict Environments (MPICE) | United States Institute of Peace
The 2015 U.S. News/Raytheon STEM Index - US News
Vinyl Recap: Billion-Dollar Babies -- Vulture
Vulture - Entertainment News - Celebrity News, TV Recaps, Movies, Music, Art, Books, Theater
Resources | War On Want
Defeating the Islamic State: The Economic Campaign - The Washington Institute for Near East Policy
Russia using Syria as testing ground for new weapons - Washington Times
Wikistrat · Crowdsourced Consulting
The Failure of the Failed States Index | World Policy Institute
World Policy Institute - The Counter Terrorism Project | World Policy Institute
SPMF - Open Source Data Mining Library - Marcus P. Zillman
victor asal | SUNY: University at Albany - Academia.edu
Agent and Multi-Agent Systems: Technologies and Applications: Second KES ... - Google Books
Sociocultural Intelligence: A New Discipline in Intelligence Studies - Kerry Patton - Google Books
BRABO | Terrorist Social Networks, OSINT, and Preventing Violent Extremism
A Useful Data Set on Political Violence that Almost No One Is Using | Dart-Throwing Chimp
Dart-Throwing Chimp | Thoughtful analysis or bloviation? Your call.
Digital Access to Scholarship at Harvard
Kickoff to Conflict: A Sequence Analysis of Intra-State Conflict-Preceding Event Structures - Vito D'Orazio Dataverse
Government Actions in a Terror Environment - Israel (GATE-Israel) - START Terrorism Data Archive Dataverse
Vito D'Orazio Dataverse
DSpace@MIT: Community List
How To Win At Forecasting | Edge.org
Clandestine HUMINT and covert action - Wikipedia, the free encyclopedia
Fin Tutuola - Wikipedia, the free encyclopedia
Why Sci-Hub is the true solution for Open Access: reply to criticism | engineuring
Terrorist Threat Assessment Netherlands | National Coordinator for Security and Counterterrorism
Statistics Tutorial - Help on Statistics and Research
Subcommittee on Terrorism, Nonproliferation, and Trade | House Committee on Foreign Affairs - Ed Royce, Chairman
(15) fajar muhammad - Academia.edu
Portland Bikes on the App Store
Links
2016 JSOU Publications
Publications
Download AAP Research Notes on Polymer Engineering Science and Technology [Updated at 2016.02.27] Torrent - Kickass Torrents
Download Environmental Science, Engineering and Technology - Nova [Updated at 2016.01.22] Torrent - Kickass Torrents
Download Nanostructure Science and Technology [Updated at 2016.02.25] Torrent - Kickass Torrents
Download Non fiction Torrents - Kickass Torrents
Download SpringerBriefs in Applied Sciences and Technology [Updated at 2016.01.24] Torrent - Kickass Torrents
Download Textbooks Torrents - Kickass Torrents
Inbox (88) - scitrenbaum@gmail.com - Gmail
Scholar Alert - [ terror attack indicators ] - scitrenbaum@gmail.com - Gmail
ICD-Video #6395: Turkistan Islamic Party (TIP): A Call From the Frontlines of Jihad 9 - scitrenbaum@gmail.com - Gmail
Inbox - stczztop@gmail.com - Gmail
Criminal Intelligence Training Master Calendar - List View
APG5667 Terrorism, fringe politics and extremist violence (Caulfield) | Monash University
The Secret Lives of Tumblr Teens | New Republic
Political Methodology | Substantively significant discussion of quantitative social science.
New Jersey Cybersecurity Bulletin: Swatting Mitigation Strategies and Reporting Procedures | Public Intelligence
Open Source Intelligence: Terrorism Prevention and Intelligence Collection in the Age of Social Media | re:publica
Lone-Actor Terrorism: Literature Review | RUSI
| RUSI
Claudio Cioffi-Revilla, Ph.D., D.Pol.Sc. - Google Scholar Citations
Christopher Blattman - Google Scholar Citations
Google Scholar Citations
Drozdova: Predictive analysis of concealed social... - Google Scholar
Bausch: Warnings, terrorist threats and resilience:... - Google Scholar
Smith: Pre-incident indicators of terrorist incidents:... - Google Scholar
Global Pattern Formation and Ethnic/Cultural Violence - Google Scholar
Kaplan: Staffing models for covert counterterrorism agencies - Google Scholar
Bausch: Warnings, terrorist threats and resilience:... - Google Scholar
Ball: Automated Counter-Terrorism. - Google Scholar
Ball: Automated Counter-Terrorism. - Google Scholar
Chew: ‘Linguistics-Lite’Topic Extraction from... - Google Scholar
Strom: Building on clues: examining successes and... - Google Scholar
Google Scholar - Alerts for scitrenbaum@gmail.com
Training (On-Line) - Law Enforcement Intelligence Analysis
https://sso.pdx.edu/idp/profile/cas/login;jsessionid=21DB836E7AEBEFB8CAAE28ACAE09FD04?execution=e1s1 is not available
Syria Tracker (سوريا تراكر)
Independent Reviewer of Terrorism Legislation «
Introduction to Intelligence Analysis - Toddington International Inc.Toddington International Inc.
(335) Twitter
Afghan War News (@AfghanWarBlog) | Twitter
Jade Parker (@counterjihader) | Twitter
J. Faraday on Twitter: "#Qalamoon Daesh utilizing their DIY rocket's to target regime forces in the area of the 128th Brigade https://t.co/cU5teYMsSQ"
Jihadology Podcast (@JihadPod) | Twitter
MENASTREAM (@MENASTREAM) | Twitter
(2) Vulture (@vulture) | Twitter
Improvised Explosive Devices seized in Iraq shortly after the ‘surge’ – Arms trafficking, arms trade, and weapons ID docs
(15) Intelligence Analysis: How to Think in Complex Environments (Praeger Security International | fajar muhammad - Academia.edu
Al Masdar News
Amazon.com Shopping Cart
Analytic Positions — Central Intelligence Agency
Training Resources — Central Intelligence Agency
Counter Extremism :: Guidance for Identifying People Vulnerable to Recruitment into Violent Extremism
SAS-071 Analytical Tools for Irregular Warfare
HFM-220 Human Behaviour Modelling for Military Training Applications
RTO-MP-HFM-202 Human Modelling for Military Application
RTO-MP-MSG-107 Human Behaviour Modelling for Military Training Applications
ISIL, Syria & Iraq Resources | Combating Terrorism Center at West Point
The Global Terror Threat in 2016: A Forecast | Combating Terrorism Center at West Point
FEMA Approved Intelligence Analyst Training Courses | Homeland Security
S&T Awards $200K for Internet of Things Systems Security | Homeland Security
https://www.emptywheel.net/wp-content/uploads/2011/02/101001-Building_on_Clues_Strom.pdf is not available
Page Not Found | FLETC
Intelligence Analyst Training Program | FLETC
Good Judgment™ Open
intelligence analyst training courses - Google Search
Core Competenciesfor IntelligenceAnalysis slides - Google Search
Finding Allies for the War of Words: Mapping the Diffusion and Influence of Counter-Radical Muslim Discourse” - Google Search
Global Pattern Formation and Ethnic/Cultural Violence - Google Search
which of the following might be considered a suspicious object? - Google Search
Kenneth David Strang - Google Search
Project Metropolis - Google Search
The Issue Correlates of War (ICOW) Identity Claims Dataset - Google Search
Warfighting Lab - Google Search
What and Where are the Risks of International Terrorist Attacks - Google Search
US Government Publishing Office - FDsys - Home
The Rise and Fall of Terrorist Organizations - Homeland Security Digital Library Blog
The Changing Nature of Terrorism and Counterterrorism | IISS
USDOJ: U.S. Department of Justice Archive NDIC: NDIC Training Information
Improving the Recommendations of the Blue Ribbon Biodefense Report | Just Security
Recap of Recent Posts at Just Security (February 20–26) | Just Security
Conflating Terrorism and Insurgency - Lawfare
The Intelligence Community
Afghan War News | LinkedIn
Explosives and Tactics Not Detected by Security Measures | Frank Engelsman | LinkedIn
MintPress News | Independent, non-partisan journalism
‘Mercenaries Unleashed’: Report Highlights Threats Posed By Booming Private Security Industry
Search Results - National Criminal Justice Reference Service
Terrorism | New Scientist
How ISIS is winning the online war for Iraq | New Scientist
Why Westerners are driven to join the jihadist fight | New Scientist
Pre-crime software recruited to track gang of thieves | New Scientist
Pre-crime software recruited to track gang of thieves | New Scientist
Radicalisation: A mental health issue, not a religious one | New Scientist
ISIS tweets reveal how the group rules its territories | New Scientist
John Sokolowski - Old Dominion University
Open Source Center - Login
OSA | The Detection of Energetic Materials by Laser Photoacoustic Overtone Spectroscopy
Overview — Visualize your documents
HarvardKey Login
Book Notes - Journal of Peace Research - PRIO
Replication Datasets - Journal of Peace Research - PRIO
Papers in the journal Analytical Chemistry | Read by QxMD
Azad M. Madni - Publications
Kenneth David Strang
Victor Asal
Comparative Configurational Analysis as a Two-Mode Network Problem: A Study of Terrorist Group Engagement in the Drug Trade
Indicators of Terrorist Intent and Capability: Tools for Threat Assessment
Statistical modeling and visualizing of big data using a terrorism case study
Counting molecules with an ordinary cell phone -- ScienceDaily
Bacteria take 'RNA mug shots' of threatening viruses -- ScienceDaily
Home Page
Database Spotlight: Government Actions in a Terror Environment-Israel | START.umd.edu
Publications
CCAPS Data Mapping Tool, SCAD, ACLED, & Malawi Aid Datasets
Mapping Tools | ccaps content
CCAPS Social Conflict Presentation
CEPSA : Exploring Climate Security Issues in Africa
Data | cepsa content
CCAPS Social Conflict Analysis Database
Publications
One 3-D Printer for 21 Metals
| find the right people and products for your mission
What lies beneath? FBI tunnel in Glover Park heated up the Cold War. - The Washington Post
Winners and losers from the 10th Republican presidential debate - The Washington Post
Advanced Crime Analytics Technology | Wynyard Group
Master Class | SUPERFORECASTING IN ACTION
Edge Master Class 2015: Philip Tetlock: A Short Course in Superforecasting | Edge.org
Edge Master Class 2007 DANIEL KAHNEMAN: "A SHORT COURSE IN THINKING ABOUT THINKING" | Edge.org
Good Judgment™ Open
How To Win At Forecasting | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class I | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class II | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class III | Edge.org
Edge Master Class 2015: A Short Course in Superforecasting, Class IV | Edge.org
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.