Light theme
Dark theme
Automatic (use operating system setting)
Shared: 905 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
905 tabs
Copy links to clipboard
Copy
Open
Saved Session - Session Buddy
Three hacks for adding permanent storage to your MacBook Air or Retina Pro through the SD card slot | 9to5Mac
1000 Life Hacks
Microsoft Academic
Toward Culturally Informed Option Awareness for Influence Operations with S-CAT
How to turn Evernote into your personal Wikipedia!
Annie Jacobsen
The Best iOS Apps for Journaling
The best podcast players for iOS
Best Unusual News Apps for iPhone + iPad
Best To-do & Task Management Apps for iPhone + iPad
The best way to recover data from iCloud backup
mail.app - Why do I have 8.3 GB mail on my hard drive even when using gmail? - Ask Different
The Missing Twitter Manual Located : Stephen E. Arnold @ Beyond Search
Ruya Foundation launches Iraqi Contemporary Artist Database
[1503.05438] Optimal management and spatial patterns in a distributed shallow lake model
[1604.03647] Modeling Inter-Country Connection from Geotagged News Reports: A Time-Series Analysis
arXiv.org Search
arXiv.org Search
arXiv.org Search
Jade Helm is a Computer Driven Exercise | Military
The Syrian Civil War: An Interim Balance Sheet | Begin-Sadat Center for Strategic Studies
Charlie Hebdo March - Freedom, Religion and Trade: What does the data say?
JS Bin
Deadly Timeline | Global Causes of Death Visualization
It’s about time: a round-up of time-lining tools — @joycevalenza NeverEndingSearch
Books Arena - Index page
US, Allies Must ‘Stop Fixating’ On ISIL & Friends; ‘Frankly, We Are Losing’ « Breaking Defense - Defense industry news, analysis and commentary
Peace Technology: Scope, Scale, and Cautions : Building Peace
Combined Arms Research Library (CARL) Digital Library
Combined Arms Research Library (CARL) Digital Library
Combined Arms Research Library (CARL) Digital Library
Combined Arms Research Library (CARL) Digital Library
Hezbollah: the dynamics of recruitment. :: School of Advanced Military Studies Monographs
COLLENDER.ORG — The Academic Website of Dr. Michael Collender
Useful Ideas
Insurgent Dynamics | 1980
Parking - Parking Citation Payment
Creative Automata | Exploring Computing Representation
Anthony H. Cordesman | Center for Strategic and International Studies
Robert Popp | Center for Strategic and International Studies
Video: Predicting the Health Consequences of Nuclear Terrorism Scenarios | Center for Strategic and International Studies
Anthony H. Cordesman | Center for Strategic and International Studies
Indian Ocean Region Strategic Net Assessment: The Red Sea and Horn Subregion | Center for Strategic and International Studies
Syria and Iraq: How Should These Wars End? | Center for Strategic and International Studies
Center for Unconventional Weapons Studies | at The Air University
Center for Unconventional Weapons Studies | at The Air University | Outreach Journal Archive
Center for Unconventional Weapons Studies | at The Air University | Nuclear Enterprise Library
The Air University 404 Page
The Air University 404 Page
Center for Unconventional Weapons | at The Air University | Monographs
Center for Unconventional Weapons Studies | at The Air University
Center for Unconventional Weapons Studies | at The Air University
dblp: Kuo-Chu Chang
dblp: Genshe Chen
dblp: Dimitrios Christopoulos
dblp: Dieter Grass
dblp: Andreas Tolk
dblp: Gernot Tragler
Dog Hockey Is The Best Hockey
Deals - Kinja Deals
Save an Extra 20% On Every Local Groupon Deal, Today Only
Stop Overpaying Your ISP and Buy Your Own Modem
Start a Fire or Call For Help With This $5 Survival Bracelet
Today's Best Deals: Flash Storage, Smart Outlet, 802.11ac Router, and More
Today's Best Deals: Flash Storage, Smart Outlet, 802.11ac Router, and More
Today's Best Deals: Haggar Clothes, Logitech Harmony, 4K TV, and More
Conferences
Systems social seience
Text detection in scene images based on feature detection and tensor voting
Modeling Collaborations in Adaptive Systems of Systems
Spatial-aware Multimodal Location Estimation for Social Images
Modeling and simulation as a service (MSaaS) for education
Analytic Approaches to the Study of Future Conflict
DIME/PMESII Data
DIME/PMESII Community of Interest
Dean S. Hartley III
Hartley Consulting, Dean S. Hartley III, Principal
IW Metric Ontology
IW Ontology GUI Development
Total IW Ontology
A FRAMEWORK FOR MODELING PSYCHO-SOCIAL ATTRIBUTES IN CONFLICT
Interim Static Stability Model (ISSM)
OOTW Toolbox
dynamictyping
EconPapers: LISER Working Paper Series
The Great Big List of Twitter Lists, Ideas, and Tools
7. Models for the Transmission Dynamics of Fanatic Behaviors : Frontiers in Applied Mathematics: Vol. , No. (Society for Industrial and Applied Mathematics)
Event Registry
JASON GROUP of military scientists (classified as 2 star generals and responsible for U.S. HAARP and all U.S. weapons of mass destruction development [Taken offline by hackers from original source] - TRUTH
Robert Hanneman's Homepage
Next U.S. National Military Strategy to be Classified
by Ingrao and James Holland
JASON Defense Advisory Panel: Reports on Defense Science and Technology
A Counterintelligence Reader
4 Tips to Make Your Mac Run Faster
8 Ways to Use Your Phone as a Scientific Instrument
10 Tips To Make You a Slack Wizard
14 Netflix Hacks to Help You Binge Like a Pro
Field Guide
Clean Up Your Gmail Inbox Using Drag-and-Drop Filters
How to Customize Android's Quick Settings Dropdown Menu
How to Downgrade iOS 9.3 to an Older Version
How to Find the Best Spotify Playlists
How to Get a Strong Wi-Fi Signal in Every Room of Your House
How To Install Unauthorized Apps on Android and iOS
How to Make Your Fitbit Even More Accurate
How To Use a USB Stick To Securely Log In to Gmail
How to Use One of iTunes' Best Features in Google Play Music
New App Lets You Clean Your Inbox By Swiping Left and Right
Remove Recent Google Searches on Your Mobile Device With This Hidden Trick
Safely Delete Old Gmail Messages in Bulk to Free Up Space
Save More Photos on Your iPhone Using This Storage App
Search Hashtags in Google Photos To Find Pics Faster
Tame Long Email Threads Using This Easy Trick
firstdraftnews.com
Are you a journalist? Download this free guide for verifying photos and videos |
Uncloaking Terrorist Networks | Krebs | First Monday
How a Journalist Helped Al-Shabab Kill Other Reporters | Foreign Policy
Security Manager | The first stop for G-2, S-2 and Security Manager resources
Paul Ryan Is a Very Dangerous Man
The Mathematics Genealogy Project - Gustav Feichtinger
GeoTime® by Uncharted™ | Visual Analysis of Time Series Data
gevkaffeegal.typepad.com/the_alliance/2006/08/new_precision_g_2.html
Sixteen Sensors Let Withings' New Forehead Thermometer Make Easy Instant Readings
When Things Go Viral and Everybody Wins
DARPA INTERCEPT Program for Biodefense Countermeasures
greta's gouge: Friday's Miscellany 04-08-2016
Belief Dynamics and Decision Making
MIT GRAND HACK 2016 - MIT Hacking Medicine
MS&T: Military Simulation & Training | Halldale
ISIS Cell Phone Network? Terrorists Show Off Alleged Islamic State SIM Cards | Heavy.com
Hjson, the Human JSON
Prof. Dr. Holger Giese - Hasso-Plattner-Institut
IDART™
IEEE Xplore Abstract - Modeling and detection techniques for Counter-Terror Social Network Analysis and Intent Recognition
IEEE Xplore Abstract - Imagery-based modeling of social, economic, and governance indicators in sub-Saharan Africa
Vol 9, No 1
InDeep Software: InDeep File List Maker
David Mimno | Cornell Information Science
Institute for National Strategic Studies > Media > News
Bibliography Home
Covert Operations - Table of Contents
NSA and Cryptography - Table of Contents
Liaison - Table of Contents
Main Table of Contents
Post-WWII - Issues - Open Source
Open Source Intelligence - From 2010
Web Sites - Table of Contents
Literature Review: Social Network Analysis
INTL520-Project - home
Risk Analysis
International Society of Information Fusion
Institute for Science and International Security
Pakistan: failing state or neoliberalism in crisis? – International Socialism
Pakistan: Timeline of key events – International Socialism
International Society for the Systems Sciences
ISW Blog: Aleppo Warning Update: April 7, 2016
Convert DOCX to PDF Natively With A Right-Click – Jacob Salmela
Your Twitter Trend Analysis Is Not Deep, and It’s Probably Wrong
The Archivist: Unseen Islamic State Military Commanders Manual: Qualities and Manners of the Mujahid Commander | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
PLOS ONE: Models of Individual Dietary Behavior Based on Smartphone Data: The Influence of Routine, Physical Activity, Emotion, and Food Environment
Kaedrin Weblog
The Jasons
The Best Tools For Making Online Timelines | Larry Ferlazzo’s Websites of the Day…
TimeRime | Larry Ferlazzo’s Websites of the Day…
Systems Social Seience: A design inquiry approach for stabilization and reconstruction of social systems
Lifehacker - Tips and downloads for getting things done
Download These Music Compilations to Lull Yourself to Sleep
Five Tips That Might Save Your Life In a Knife Attack
Google Voice Access App Lets You Control Your Phone Entirely With Your Voice
How to Choose the Perfect Backpack for Comfort, Organization, and Style
How to Master Microsoft Office Excel
Make a DIY Photo Reflector Out of Poster Board and a Survival Blanket
Mac downloads News, Videos, Reviews and Gossip - Lifehacker
TextExpander Switches to a Subscription Model, Here's How to Take Your Snippets Elsewhere
This Week's Most Popular Posts: April 8th to 15th
This Week's Top Downloads
What to Look for in OS X Crash Reporter When Diagnosing a Crash
Terrorists’ Eradication Versus Perpetual Terror War - Springer
An overview of modeling and simulation using content analysis - Springer
State of the Arab Liberation Tide Origins, Features, Extent of Success of Popular Uprisings, Implications, and Future Prospects - Springer
Forecasting the Use of Violence by Ethno–Political Organizations: Middle Eastern Minorities and the Choice of Violence - Springer
Connecting Designing and Engineering Activities III - Springer
Towards Smart Systems of Systems - Springer
Lushprojects.com - www.lushprojects.com - Circuit Simulator
Free Mac Downloads
Download Automator Actions & Workflows - All Applications - Sorted by User rating
Download Business
Become a Maker-in-Residence this Summer with Maker Corps
Manuel Kehl
Will the proliferation of affordable AI decimate the middle class? - Marginal REVOLUTION
John D. Lowrance, Director, Representation and Reasoning Program, Artificial Intelligence Center | SRI International
Projects | SRI International
PRIME: Probative Rapid Interactive Modeling Environment | SRI International
Phil Taylor's Papers » Index
Analytics Conference 2015 » Unstructured Data Analytics
MENASTREAM | Middle East and North Africa direct
University-Led Research (Minerva Initiative)
Here Is Portland’s Cold War Plan for Surviving Nuclear Armageddon | Motherboard
Nuclear Weapons & the Vietnam War | Nautilus Institute for Security and Sustainability
Essentially Annihilated: What is JASON? | Nautilus Institute for Security and Sustainability
Home - MERLN - Research Guides at National Defense University
Foundational Documents - Women Peace and Security (WPS) - Research Guides at National Defense University
MiPAL: Terrorism - Research Guides at National Defense University
Good Fences: The Importance of Setting Boundaries for Peaceful Coexistence | NECSI
How Some 370 Journalists in 80 Countries Made the Panama Papers Happen - Nieman Reports
NanoDays | NISE Network
COIN Operational Variables - PMESII-PT - NOBLECO TACTICAL
Field Information Support Tool | NOVA Corporation
ROBERT POPP | NSI
Operational Dynamics of Boko Haram's Terrorist Campaign Following Leadership Succession - Regens - 2016 - Social Science Quarterly - Wiley Online Library
Automating social network analysis: A power tool for counter-terrorism – Open Criminology
BioBuilding: Synthetic Biology for Teachers: Lab 1 - OpenWetWare
ORCOS : PEOPLE
Orcos: Feichtinger
Search eLibrary :: SSRN
Product Innovation with Lumpy Investment by Mohammed Chahim, Dieter Grass, R. F. Hartl, Peter M. Kort :: SSRN
Ankur Moitra's Homepage
A Neural Network Playground
Poetweet
Publikationsliste
Operations Research: INFORMS
Red Team Journal: understand + anticipate + adapt
"Optimizing Counter-Terror Operations: Should One Fight Fire with "Fire" by Jonathan P. Caulkins, Dieter Grass et al.
Selected Works of Barry Silverman
"Social network analysis and counter-terrorism: measures of centrality " by Samuel J. Mullins
OSINT Open Source Intelligence tools resources methods techniques
RunTheModel - Insurgency Dynamics - Social Dynamics
RunTheModel - Global Aviation Industry Dynamic Transitions Test Model - Ecosystem Dynamics
RunTheModel - Game Theory Simulation: Repeated and Evolutionary Games - Marketplace & Competition
RunTheModel - Model of taxation optimization and budget vertical alignment - Finance
Sankey Diagram
Manage Your Notes | Sayz Lim
Bruce Arena Has Some Truly Wrongheaded Shit To Say About Nigel de Jong's Horror Tackle
Hey New York Times: a causal loop diagram is not a PowerPoint fail - SD wise
SD wise - A blog about current applications of System Dynamics
PSU Library Catalog
PSU Library Catalog
The hairball that stabalized Iraq - National Defense University Search Results
SEOR Projects
Holistically evaluating agent-based social systems models: a case study
Grand challenges for modeling and simulation: simulation everywhere—from cyberinfrastructure to clouds to citizens
21 Home Office Must Haves
Ben Zweibelson | Small Wars Journal
Steve Blank | Small Wars Journal
Charting Out the Digital Ecosystem of Gangs in the U.S. and Mexico | Small Wars Journal
Does Design Help or Hurt Military Planning: How NTM-A Designed a Plausible Afghan Security Force in an Uncertain Future - Part II | Small Wars Journal
Hacking for Defense (H4D) @ Stanford – Week 1 | Small Wars Journal
Hacking for Defense: Week 2 | Small Wars Journal
How PowerPoint Stifles Understanding, Creativity, and Innovation Within Your Organization | Small Wars Journal
Institutional Failure: USA Today and the Human Terrain System | Small Wars Journal
Military ‘Deep Dives’ and Organizational Management: The Continuing Hazards of Hubris, Centralized Hierarchies, and Insular Perspectives | Small Wars Journal
No COIN Left In Afghanistan – Or The Elephant In The Room That No One Is Talking About | Small Wars Journal
Pakistani Unconventional Warfare Against Afghanistan | Small Wars Journal
The Vital Role of Religion in Civil-Military Interaction | Small Wars Journal
What’s in a Name: A Strategic Analysis of The Islamic State | Small Wars Journal
Search | Small Wars Journal
Science Against the People - the story of JASON
Making Complexity Simple, Useful, and Profitable - SOLVE WICKED PROBLEMS
Import from other applications
TSG IntelBrief: The Philippines Battles Abu Sayyaf | The Soufan Group
The 1st Open Database Spoiler | spoil me
Peter Bühlmann - Publications
From the streets to The Street | TechCrunch
Clearbit Connect’s new Gmail widget can help you find anyone’s email address | TechCrunch
Botlist is an app store for bots | TechCrunch
Radiological terrorism: The unaddressed threat | Bulletin of the Atomic Scientists
The Gulf Intelligence
This app gets pros to edit your Instagram pictures for free
Toolkit - The Research School
WORLDBEAT
The Metamorphosis – from AQI to ISIS (An excerpt from The Terrorists of Iraq, 2nd Edition, 2014) – TAPSTRI
The Wire
The Best Tech and Apps for Your Home Office | The Wirecutter
TimbersArmy.org
UNEPLive
Special Edition: New Analysis & Data on Foreign Fighters
COIN Reader - Special Edition 2006 - Military Review - Combined Arms Center - Knowledge
VOX – Pol | Extremist Forums Provide Digital OPSEC Training
How a Hipster City Planned to Survive Nuclear Armageddon | War Is Boring
War News Updates: DARPA Wants To Buy Your Weapons Ideas
Play On: Supporting Decision-Makers by Sustaining Wargaming
The Nautilus Institute: Vietnam FOIA "Essentially Annihilated"
The Nautilus Institute: Vietnam FOIA Background (What is JASONS)
Josh Tenenbaum's home page
WordSift 2
SelectedWorks - Barry G Silverman
Big Data Software & Analytics Solutions | Hewlett Packard Enterprise
ACASA Home
Research
NonKin Village
NonKin Village
Defense Science Board
Intelligence Support to Counterinsurgency in Afghanistan
AFIO - Guide to the Study of Intelligence
Welcome to The Air Force Institute of Technology / 404 Error!
7th AHFE International Conference 2016
Artificial Intelligence Center @ SRI
AI Center :: Projects
AI Center :: Publications Search Results
AI Center :: Projects
AI Center :: Projects
Dr John D Lowrance
www.ai.sri.com/~lowrance/thesis-genealogy.txt
The "Red Team" Forging a Well-Conceived Contingency Plan
Help
Artificial Glaciers and AnyLogic Fight Against the Climate Change — AnyLogic Simulation Software
Home - Apollo Mechanical
ATIA - Advanced Technical Intelligence Association
ATIC - Advanced Technical Intelligence Center
Atlantis Press : 2015 International conference on Applied Science and Engineering Innovation
Air University
Welcome to MSFRIC Bibliographies Page
Battlefield Deception Operations : Deception
Writing, Speaking, Listening, Interviewing, Communication, Negotiation Skills
Writing, Speaking, Listening, Interviewing, Communication, Negotiation Skills
Writing, Speaking, Listening, Interviewing, Communication, Negotiation Skills
United States Government, Laws, and Documents
DoD Military Lessons Learned - Joint, Army, Air Force, Navy, Marine Corps, Coast Guard Lessons Learned, After Action Reviews (AAR)
Air War College Maxwell Papers
Air War College Military Index to the Internet, Internet Index
forbidden links - sites we no longer can link to
Military Intelligence, Intelligence Studies, Intelligence Operations, National Intelligence, Intelligence Analysis, Gateway to Intelligence,
Military Intelligence, Intelligence Studies, Intelligence Operations, National Intelligence, Intelligence Analysis, Gateway to Intelligence,
Military Portal, augmenting the U.S. Air Force Portal and DoD portal, Army, Navy, Marine, National Guard portals
Air War College: References, Online and Off
Creativity, Thinking Skills, Critical Thinking, Problem solving, Decision making, innovation
Creativity, Thinking Skills, Critical Thinking, Problem solving, Decision making, innovation
Military Theory of War, Warfare Theory, Principles of War, Military Strategy, Theories, Theorists
Military Theory of War, Warfare Theory, Principles of War, Military Strategy, Theories, Theorists
Air War College Gateway to the Internet
Detecting Online Deception and Responding to It
mowbray1
How to Identify Misinformation
Behavioral Influences Analysis Center, military intelligence human factors analysis, adversary intelligence
Adversary Behavioral Modeling: Available Tools and Applications for the Warfighter
Inferring Adversary Intent & Estimating Behavior - Computational Modeling Tools to Assess Adversary Behavior
Strategy to Tactics: BIA for Actionable Insights on Adversary Behavior
links
behavioral influences analysis and assessment modeling and simulation tools and research
US government, military resources
Air War College | at The Air University - Residence Program Contact Us
Homeland Security, Homeland Defense, WMD Counterproliferation, US Northern Command, NORTHCOM, Future Conflict Studies,
ANG Air National Guard - Homeland Defense Homeland Security CONOPS, Plans, Planning, WMD, NBC, Concept of Operations, Commander's Concept
ANG Air National Guard - Homeland Defense Homeland Security CONOPS, Plans, Planning, WMD, NBC, Concept of Operations, Commander's Concept
ANG Air National Guard - Conflict 21 - News and Publications
ANG Air National Guard - Conflict 21 - Other Links
Behavioral Influences Analysis Center, military intelligence human factors analysis, adversary intelligence
links
information operations education, training, schools, courses
influence operations ops, propaganda, deception, counterpropaganda
information operations subject index
cloud computing, fiction, miscellaneous, related topics
new media, social media, blogs, twitter, facebook, etc.
information operations theory, theories, communications theory
The Archivist: Unseen Islamic State Military Commanders Manual: Qualities and Manners of the Mujahid Commander :: Aymenn Jawad Al-Tamimi
The Best Free Cloud Storage - 22 Services That Give You More - BackupReview.com
BBC - Future - Can you beat a lie detector test?
Conflict Mapping | Beyond Intractability
The Jason Group
Homeland Security, IRS search Portland-area home of accused counterfeit shoe seller - Portland Business Journal
Boxy. Inbox by Gmail, finally on your Mac.
Crime | Breaking News Blast | Page 2
Can America Win a War in Syria? - Breitbart
Activities and Conversations About Synthetic Biology | www.buildingwithbiology.org
These 9 little-known perks show why Amazon Prime is so much more than free shipping - Business Insider
New Age Of Asymmetric Warfare - Business Insider
20+ Free and Open Source Social Network Analysis Software - Butler Analytics
Why Hamilton Matters
This iTunes Trick Will Automagically Free Up iPhone Storage
Here's What To Do If Your Phone's Storage Is Full
See Maps Showing Where FBI Planes Are Watching From Above
Student Symposium on RSCA | California State University, Los Angeles
CERDEC U.S.ARMY RDECOM | I2WD
Speeding motorists watch out! Army developing more adaptable, secure radar technology
CI CENTRE
Forget 'The Innovators': 'Maintainers' Conference Advances Alternative History of Technology - CityLab
Russia's Evolving Nuclear Doctrine and its Implications | Center for a New American Security
Tip: Change Mail settings to save hard drive space - CNET
DARPA Next Generation Social Science (NGS2) Proposers Day and BAA | Contract Research and Development
DARPA Innovative Systems for Military Missions Program Award | Contract Research and Development
UC Berkeley graduate student creates model-sharing program | The Daily Californian
ISIS 'sends large number of terrorists to Libya to carry out attack on oil wells' | Daily Mail Online
USAF’s GSC Issues RFP Jammin’ Drone Fighters | Pratt & Whitney Wins $1.4B Deal F-35 Engines | Rafael Unveils New Drone Dome Neutralize Malicious UAVs
More dems pushing for arms; Obama mulls; Carter’s nod could come today; An ISIS recruiter killed – in Afghanistan; Why did the Pentagon spend $500k?; And a bit more. - Defense One
Boko Haram Has Stepped Up Its Use of Children as Suicide Bombers—and Most Are Girls - Defense One
Home
National Counterintelligence and Security Center
DSD Laboratories | Big Data / Decision Support Analytics
Defense Technical Information Center
Tax Day 2016 for IRS Tax Year 2015 Return Filing Deadlines
The Economist Intelligence Unit
The End of War
Open-source collaborative platform to collect content from over 350 institutions' archives | EurekAlert! Science News
EUROSIS | "The European Multidisciplinary Society for Modelling and Simulation Technology"
Publications | Ellick Chan, Ph.D. | Professionals | Exponent
Professionals | Exponent
Circuit Simulator Applet
Why Certain Facebook Friends Can Boost Your Chance Of Landing A New Job | Fast Company | Business + Innovation
SYSTEM FOR IMAGE INTELLIGENCE EXPLOITATION AND CREATION - RAYTHEON COMPANY
Game Theory .net - Resources for Learning and Teaching Strategy for Business and Life
How big is the Google Earth database? - Google Earth Blog
Michael Izady’s Amazingly Detailed Map of Ethnicity in Syria (and the Syrian Armenians) | GeoCurrents
The Islamic State (Daesh) Healthcare Paradox: A Caliphate in Crisis – The Journal of Global Health
Wargaming for Leaders: Strategic Decision Making from the Battlefield to the Boardroom by Mark L. Herman — Reviews, Discussion, Bookclubs, Lists
DaisyDisk: Best App to Find Large Files on Mac's Hard Drive
Deleting Attachmentsin Mac's Mail App to Free Up Space
Carnegie Mellon University's Heinz College - Faculty Details
The Hawaii International Conference on System Sciences (HICSS) | Digital Library
Dynamical Behavior of a Rumor Transmission Model with Psychological Effect in Emergency Event
5 Ways To Free Up Disk Space on Your OS X Mac
How to Stop Your Mac’s Mail App From Wasting Gigabytes of Space
Downloads | How To Measure Anything
Hearings | Homeland Security & Governmental Affairs Committee
DIAGRAM OF A WAR STRATEGY: The Pentagon's PowerPoint Misses the Big Picture in Afghanistan
about us
2012
The Silent War against the Japanese Navy
40+ ways to save storage space on iPhone and iPad
IFAC-PapersOnLine: Optimizing counter-terror operations
IFAC-PapersOnLine: International Stability/2010 IFAC Workshop on Supplemental Ways for Improving International Stability (2010)
Gustav Feichtinger - IIASA
IJCA - Number 9 (ISBN: 973-93-80885-38-9)
Intelligence Revolution
3 Checklist Extensions For Chrome
5 eBook Organizer Software For Windows 10
File List Maker that lets you Search Files and Folders in a List
5 Free iPhone Apps to Create Bucket List
IMAO: Precision Guided Humor Assignments Archives
The 20 features in iOS 9 I'm actually using | iMore
International Council on Systems Engineering Website
IndraStra Global : Analysis, On The Dot
LYONS, JOHN W, supplier of NDU, National Defense University, Joint Forces Staff College, Information
Datasheet: Paper The Hairball That Stabilized Iraq: Modeling Fm 3 - 24 By Brett Pierson, Walter
(14595) Inoreader - How Big Is the Google Earth Database?
(13824) Inoreader - Radicalisation Research
(14471) Inoreader - OSINT
International Network for Social Network Analysis - INSNA
Defeat U.S. War on Afghanistan and Iraq
ISW Blog: Iraq Government Collapse Likely as a Rump Parliament Calls for Resignations
IZA - Gustav Feichtinger
National Security Analysis
Home
KWSnet Annotated Subject Directory for the Web
KWSnet Military: Research Program/Papers/Studies Index
KWSnet Public Records: Resources Index
How to Create Multiple Copies of an Email Draft inside Gmail
How to Write your own Twitter Bots without Code
Libya Analysis
To betray one’s cause or one’s friends? The dilemmas facing ISIS and Jabhat al-Nusra
7 Best Tools for Managing Subtitles/CC on YouTube
7 Unexpected Benefits of Creating a Wikipedia Account
How to Create Custom Functions in Google Sheets
Make Google Drive Absolutely Awesome with These Tools
George C. Marshall Center - European Center for Security Studies - Public Web - Mullins, Sam
Publications Authored by Dieter Grass
Humor: Soft Glowing Skin, Complements of Your... - Matthew Aid
Danish Spy Agency Takes Out Full-Page Ads Looking... - Matthew Aid
Spies and the Space Race: Apollo 8 and the CIA - Matthew Aid
NSA Appoints Its First "Transparency Officer" - Matthew Aid
Where is In-Q-Tel, the CIA's Venture Capital Firm,... - Matthew Aid
McSweeney’s Internet Tendency
Sensors | April 2016 - Browse Articles
Sensors | Free Full-Text | Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges | HTML
Shifting Eastern Mediterranean Alliances :: Middle East Quarterly
150x Micro Phone Lens Starter Kit
Mihand
These War Games Will Determine the Future of the Marine Corps | Military.com
Hashtag warfare: Anti-ISIS coalition looks to enhance its online messaging
Modeling & Simulation Coordination Office
Home
New iRobot Spinoff Eyes Big Pentagon Contracts - Blog
Former Pentagon Official Offers Insight and Warnings to Defense Contractors - Blog
NATO - Topic: Countering terrorism
CRISPR : Nature News & Comment
Governance: Learn from DIY biologists : Nature News & Comment
Human mind excels at quantum-physics computer game : Nature News & Comment
Synthetic biology tackles global antivenom shortage : Nature News & Comment
Global Pattern Formation and Ethnic/Cultural Violence | NECSI
Step by Step to Stability and Peace in Syria | NECSI
Troubleshooting Apple Mail in OS X 10.11 El Capitan | Need Help 4 Mac
Pessoptimism - The New Yorker
Daniel "Fig" Leaf Addresses Irregular Warfare (IW) Conference
Profile - New Saint Andrews College
Dr. Gray Associations | Biomedical Engineering | OHSU
Joe Gray | Biomedical Engineering | OHSU
Patrick Roberts | Biomedical Engineering | OHSU
Point of Care Laboratory | Biomedical Engineering | OHSU
Joe Gray, Ph.D. | Researcher | OHSU
Startup Advisory Group | Technology Transfer & Business Development | OHSU
OneTab shared tabs
OneTab shared tabs
Reuser's Intelligence Catalogue
Our Homeless Crisis | OregonLive.com
Social & Organizational Network Analysis software & services for organizations, communities, and their consultants
Social Network Analysis: An Introduction by Orgnet,LLC
Orgnet, LLC - Applications and Case Studies of Social Network Analysis and Organizational Network Analysis
Remote Control Project: Remote-Control Warfare Briefing #14 | Oxford Research Group
NOVA - Official Website | The Immutable Nature of War
NOVA | Battle Plan Under Fire | PBS
NOVA | Battle Plan Under Fire | Links & Books | PBS
Perseus Digital Library
Americans, Libraries and Learning | Pew Research Center
Review: Critical Path « Public Intelligence Blog
Search: Strategic Analytic Model « Public Intelligence Blog
Search: The Future of OSINT [is M4IS2-Multinational] « Public Intelligence Blog
Reference: World Brain Institute & Global Game « Public Intelligence Blog
Reference: COIN Dynamic Planning, Full Text Found « Public Intelligence Blog
Reference (2010): Fixing Intel–A Blueprint for Making Intelligence Relevant in Afghanistan « Public Intelligence Blog
Get a First Look at Jesse Tyler Ferguson’s Fully Committed Bow Tie | Playbill
Political • Military • Economic • Social • Information • Infrastructure
Political • Military • Economic • Social • Information • Infrastructure
File or Pay Online | The City of Portland, Oregon
Opportunities in Military Training and Simulation: Current and Future Market Trends
How to Galvanise the NHS to Adopt Innovation | RAND
Jonathan P. Caulkins - Publications | RAND
Gernot Tragler | RAND
Presenting Complex Data Visually: Using web-based tools to make your development data travel • Research to Action
RFI : Army Reprogramming Analysis Team - Program Office Operations Center (SEC ARAT-PO/OC) in Maryland, United States
Iran Political Summary
Sandia National Laboratories: Page Not Found
dynamic bayesian networks: Topics by Science.gov
Optimal control of terrorism and global reputation: A case study with novel threshold behavior
Should We Fear DIY Biologists' Use of Cutting-Edge Gene-Editing Technology? - Scientific American
The Society for Modelling and Simulation Europe - Index Page
Resource Links | The Society for Modeling & Simulation International
Publications | The Society for Modeling & Simulation International
SIMULATION: Transactions of The Society for Modeling and Simulation International | The Society for Modeling & Simulation International
Home | Print Window 5
Barry G. Silverman
HBMR
sg
Information Warfare: Surveillance & Encryption - Shelly Palmer
Steve Blank’s Presentations on SlideShare
How to Automate the Discovery of Twitter Leads : Social Media Examiner
How to Customize Your Social Media Inbox on Your Smartphone : Social Media Examiner
Editorial Board – Society for Terrorism Research
John Irvine
Social Science Research Council (SSRC) | Brooklyn, NY, USA
Background Briefing on Manama and Baghdad
Background Briefing on Afghanistan
Index Author
Underground Clinics Help War Wounded to Fight On | Syria Deeply, Covering the Crisis
The Non-Random Nature of Terrorism: An exploration of where and how global trends of terrorism have developed over 40 years - Studies in Conflict & Terrorism -
New Metrics for Dynamic Analysis of Online Radicalization - Journal of Applied Security Research - Volume 11, Issue 2
Social network analysis and counter-terrorism: measures of centrality as an investigative tool - Behavioral Sciences of Terrorism and Political Aggression - Volume 5, Issue 2
How to see the terrifying things Google knows about you
Home-grown Terrorism: Issues and Implications | Mullins | Perspectives on Terrorism
The Libya Intervention: Obama's 'Worst Mistake' as America's Worst Habit - The Atlantic
Why I Am Not a Maker - The Atlantic
SBP: Social Computing, Behavioral-Cultural Modeling and Prediction
What are the best practices for counterinsurgency operations? | Institute for the Study of War
LTG James M. Dubik | Institute for the Study of War
Publications | Institute for the Study of War
USFOR-A | Institute for the Study of War
United States Institute of Peace
Tools for Peacebuilding | United States Institute of Peace
The Islamic State in Afghanistan: Assessing the Threat | United States Institute of Peace
Vision of Humanity
33 maps that explain terrorism - Vox
Filelist Creator equivalent for mac?
It’s 2016. Why Can’t Anyone Make a Decent Freaking To-Do App? | WIRED
Chill. It’s Not Books vs. Amazon. You Can Have Both! | WIRED
Darpa’s Developing Tiny Drones That Swarm to and From Motherships | WIRED
Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers? | WIRED
Ex-Darpa Head Regina Dugan Leaves Google for Facebook | WIRED
Security This Week: Tax Day Is Near, and the IRS Is as Hackable as Ever | WIRED
You searched for darpa | WIRED
darpa | WIRED
Gustav Feichtinger - VID/ÖAW
IntelTechniques.com Blog » OSINT
What If Everything You Know About Terrorism Is Wrong? | The XX Committee
Aptonic - Dropzone 3
Aptonic - Dropzone 3 Actions
Aptonic – Blog
Aptonic - Dropzone 3 Actions
AWS Big Data Blog
Anomaly Detection – Using Machine Learning to Detect Abnormalities in Time Series Data | Cortana Intelligence and Machine Learning Blog
Advances in Design for Cross-Cultural Activities - Google Books
Social Computing and Behavioral Modeling - Google Books
Electronic Warfare in Operations: U. S. Army Field Manual FM 3-36 - Google Books
Embracing the Fog of War: Assessment and Metrics in Counterinsurgency - Ben Connable - Google Books
Quantitative Intelligence Analysis: Applied Analytic Models, Simulations ... - Edward Waltz - Google Books
The Science of War: Defense Budgeting, Military Technology, Logistics, and ... - Michael E. O'Hanlon - Google Books
Behavioral Modeling and Simulation: From Individuals to Societies - Committee on Organizational Modeling: From Individuals to Societies, Board on Behavioral, Cognitive, and Sensory Sciences, Division of Behavioral and Social Sciences and Education, National Research Council - Google Books
Engineering Principles of Combat Modeling and Distributed Simulation - Andreas Tolk - Google Books
Conflict and Complexity: Countering Terrorism, Insurgency, Ethnic and ... - Google Books
Conflict and Complexity: Countering Terrorism, Insurgency, Ethnic and ... - Google Books
Megacities and Dense Urban Areas - TRADOC G-2 Mad Scientist - APAN Community
Clearbit
Charlie Hebdo March – Freedom, Religion and Trade: What does the data say? | Try something new. Everyday.
Charlie Hebdo March – Freedom, Religion and Trade: What does the data say? | Try something new. Everyday.
The modern researcher’s toolbox | Try something new. Everyday.
Deadly Timeline | Global Causes of Death Visualization | Try something new. Everyday.
Try something new. Everyday. | Science. Development. Datactivism. And everything in between.
Politics & Networks | debates, readings, thoughts
Jabhat al-Nusra: Intelligence, Counter-Intelligence, Values and Ethics | Elijah J M | ايليا ج مغناير
ADVISE - Wikipedia, the free encyclopedia
Center on Irregular Warfare and Armed Groups - Wikipedia, the free encyclopedia
Clandestine HUMINT operational techniques - Wikipedia, the free encyclopedia
Command & Conquer: Red Alert (series) - Wikipedia, the free encyclopedia
Command and control - Wikipedia, the free encyclopedia
Fog of war - Wikipedia, the free encyclopedia
Global surveillance - Wikipedia, the free encyclopedia
Human intelligence (intelligence gathering) - Wikipedia, the free encyclopedia
Information Awareness Office - Wikipedia, the free encyclopedia
Intelligence cycle management - Wikipedia, the free encyclopedia
Irregular warfare - Wikipedia, the free encyclopedia
JASON (advisory group) - Wikipedia, the free encyclopedia
List of established military terms - Wikipedia, the free encyclopedia
List of military strategies and concepts - Wikipedia, the free encyclopedia
Mark Abdollahian - Wikipedia, the free encyclopedia
Measurement and signature intelligence - Wikipedia, the free encyclopedia
Modeling and simulation - Wikipedia, the free encyclopedia
Network-centric warfare - Wikipedia, the free encyclopedia
Open-source intelligence - Wikipedia, the free encyclopedia
Outline of military science and technology - Wikipedia, the free encyclopedia
Reconnaissance, surveillance, and target acquisition (United States) - Wikipedia, the free encyclopedia
Signals intelligence - Wikipedia, the free encyclopedia
Swarming (military) - Wikipedia, the free encyclopedia
Synthetic Environment for Analysis and Simulations - Wikipedia, the free encyclopedia
TALON (database) - Wikipedia, the free encyclopedia
Three-Dimensional (3D) Tactics Analysis - Wikipedia, the free encyclopedia
War - Wikipedia, the free encyclopedia
Section 3 - ADVERSARY FOREIGN INTELLIGENCE OPERATIONS - Operations Security - INTELLIGENCE THREAT HANDBOOK</h3></td>
Phishing no catch - Ministry of Foreign Affairs under attack
Hodge Podge
Science
Security Matters
SWJ Blog
Pocket: Australian Institute of International Affairs
Pocket: DARPA's 'Improv' initiative crowdsources solutions to DIY terrorists
https://getpocket.com/redirect?url=http%3A%2F%2Fsourcesandmethods.blogspot.com%2F2014%2F04%2Fthe-best-job-in-intelligence-that-youve.html is not available
GitHub - csaladenes/sankey: Sankey Diagram Generator
MyHumbleSelf (Catalin Voss) · GitHub
O’Reilly Media, Inc. · GitHub
GitHub - polynumeral/academia-citations: Code, data, and paper for Academia.edu citation advantage analysis
(7) Andrew Crooks | George Mason University - Academia.edu
Official Google Blog: Find time for your goals with Google Calendar
PENTAGON FILES : (U//FOUO) Joint Improvised Explosive Device Defeat Organization (JIEDDO) Attack the Network Lexicon - Google Groups
The Internet Makes You Think You’re Smarter Than You Are: An Interview with Matthew Fisher
Insight Maker | Free Simulation and Modeling in your Browser
Names of intelligence officials, agents, appear in Panama Papers | intelNews.org
Domain Search Tool by Michael Bazzell
Email Search Tool by Michael Bazzell
OSINT Training by Michael Bazzell
Social Network Analysis in Intelligence - home
UPDATED: "This Site Contains Harmful Programs/Deceptive Site" EASY Solution - Page 45 - Community - Kickass Torrents
wolfye's DMCA'ed torrents [Textbooks] - Community - Kickass Torrents
Download Non fiction Torrents - Kickass Torrents
Download Science and Its Times Volume 3: 1450 to 1699 - Neil Schlager [pdf] Torrent - Kickass Torrents
Profile of ae_tauranga - Uploads - Kickass Torrents
Profile of alotofthings - Uploads - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
https://kat.cr/user/LeipzigMRD/uploads/ is not available
Profile of Marcs1102 - Uploads - Kickass Torrents
Profile of ssitimefill - Uploads - Kickass Torrents
Profile of Unlucky.Ninja - Uploads - Kickass Torrents
Profile of wolfye - Uploads - Kickass Torrents
Eric Ravenscraft
Jihadi Hacking Tutorials: Irhabi 007’s Text and More…. | Krypt3ia
Inspire 14: Assassination Operations and Dabiq 11: The War of Coalitions | Krypt3ia
Krypt3ia | (Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)
FBI — FBI Law Enforcement Bulletin
Inbox (192) - scitrenbaum@gmail.com - Gmail
Dr. Annie Sparrow uploaded a paper - scitrenbaum@gmail.com - Gmail
The Archivist: Unseen Islamic State Military Commanders Manual: Qualities and Manners of the Mujahid Commander - scitrenbaum@gmail.com - Gmail
Marshall Center Transnational Weekly 10 April - 16 April 2016 - stczztop@gmail.com - Gmail
(13) Denes Csala | Masdar Institute of Science and Technology - Academia.edu
Cool Tools — Medium
What’s in My Laptop? — Cool Tools — Medium
Headlamps & Orange Highlighters — The Military Writers Guild — Medium
George C. Marshall European Center for Security Studies | GlobalNET
Opinion: The Navy Needs a Wider Look at Wargaming - USNI News
Prospective CENTCOM CO Votel Calls for Bringing Arab Ground Troops Into Fight Against Islamic State - USNI News
Document: DoD Plans to Integrate Women Into Special Operations Forces - USNI News
Special Operations Forces Archives - USNI News
Find Your Citation or Court Case
OR 2015
Ceno3v5WIAA_Aej.jpg:large (1024×1049)
Lessons in Failure: Libya Five Years Later | Political Violence @ a Glance
Political Violence @ a Glance
(U//FOUO) MS-ISAC Intel Paper: Common Cyber Threats to Universities | Public Intelligence
Law Enforcement Guide to the Path of an Outlaw Motorcycle Gang Member | Public Intelligence
Useful Stuff | ResearchBuzz: Firehose
Introducing the ResearchBuzz Firehose: How to Use It | ResearchBuzz
ResearchBuzz | News and resources covering social media, search engines, databases, archives, and other such information collections. Since 1998.
youtube-dl
Law, Humanities and The Arts @ UOW
Sam S. Mullins: a blog about anything
Joe Gray - Google Scholar Citations
Genshe Chen - Google Scholar Citations
David Greenwood - Google Scholar Citations
Michael J. Kwinn, Jr. - Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Google Scholar Citations
Weinstein: Modeling and detection techniques for... - Google Scholar
Blasy: An analysis of counterinsurgency campaigns... - Google Scholar
Hartley III: ONTOLOGIES SUPPORT M&S AND ANALYSIS... - Google Scholar
Cao: Spatial-aware Multimodal Location Estimation... - Google Scholar
Silverman: Toward realism in human performance simulation - Google Scholar
Davis: Evaluating army geospatial data collection tools - Google Scholar
JP Caulkins - Google Scholar
Mullins: Social network analysis and counter-terrorism:... - Google Scholar
Murray: Toward culturally informed option awareness... - Google Scholar
Elsaesser: 10 Computational sociocultural models... - Google Scholar
Caulkins: What drug dealers tell us about their costs... - Google Scholar
Everything you need to know about natural language search | Search Engine Watch
Puns - Richard Stallman
Steve Blank | Entrepreneurship and Conservation
Mail (El Capitan): Free up storage space for an account
Mail (El Capitan): Use rules to manage your inbox
Academics can change the world – if they stop talking only to their peers
The Intercept
Documents - The Intercept
The OSINT Blog – Open Source Intelligence and Analysis with a focus on the Middle East and South/Central Asia
The Productivity Pack
TISS - Grass Dieter
404 - Page Not Found
Filing an Income Tax Extension - TurboTax Tax Tips & Videos
C.J. Chivers (@cjchivers) | Twitter
(15) Jade Parker (@counterjihader) | Twitter
Dénes Csala (@csaladenes) | Twitter
(1) Gartenstein-Ross (@DaveedGR) | Twitter
Dave Pell (@davepell) | Twitter
#DEFAus hashtag on Twitter
Malcolm Nance (@MalcolmNance) | Twitter
Marc Andreessen (@pmarca) | Twitter
JΞSTΞR ✪ ΔCTUAL³³º¹ (@th3j35t3r) | Twitter
WorldPeaceFoundation on Twitter: "Fight, flee or follow? @PaulineMoore12 & @cassyld on civilian agency in times of conflict: https://t.co/0qXXMBC4xr via @PVGlance"
Ami M Pedahzur | The University of Texas at Austin - Academia.edu
Artificial Intelligence Techniques Applied to Electromagnetic Interference Problems | Denes Csala - Academia.edu
Insurgent Dynamics: A systematic analysis of social unrest using the GDELT Event database | Denes Csala - Academia.edu
Michael Lanham's Non-Peer Reviewed Publications Page
jdp's blog | UK College of Arts & Sciences
bellingcat - Islamic State Captures Masses of Iranian-supplied Weaponry Near Khanasir - bellingcat
Center for Homeland Defense and Security – The Nation's Homeland Security Educator
Sailing the Sea of OSINT in the Information Age — Central Intelligence Agency
Toward a Complex Adaptive Intelligence Community — Central Intelligence Agency
Complexity Explorer
Control Risks | Home
Air Force Analytics for Decision Support | CSIAC
Modeling & Simulation Special Edition | CSIAC
The NATO Modelling and Simulation Master Plan
NATO STO's Modelling and Simulation Group at ITEC 2015
STO - NATO Modelling and Simulation Group (MSG)
The Ties that Bind: How Terrorists Exploit Family Bonds | Combating Terrorism Center at West Point
DataCards | Log In
Organize your folders - Dropbox
Dad - Dropbox
VIDEOS - Dropbox
Defense Systems Information Analysis Center (DSIAC)
FBI — Research and Technology - Analysis of Jihadi Extemist Groups' Videos - July 2009
INTERfering and Co-Evolving Prevention and Therapy (INTERCEPT) Proposers Day - DARPA-SN-16-28 - Federal Business Opportunities: Opportunities
Paper · Wiki · Fenrir / Fenrir_Project · GitLab
17th ISDG 2016
Google Computer Science Education
A Social Network Analysis of Islamic Terrorism and the Malian Rebellion - Google Search
Advances in Design for Cross-Cultural Activities - Google Search
Ami M Pedahzur - Google Search
An exploratory, dynamic application of Social Network Analysis for modelling the development of Islamist terror‐cells in the West - Google Search
modeling and analysis of strategic contexts - Google Search
Apollo Mechanical Contractors - Google Search
assessing counterinsurgency and stabilization missions - Google Search
Attack the Network (AtN) Simulation to Support Military Staff Training - Google Search
Automating social network analysis: A power tool for counter-terrorism - Google Search
Ben Benavides - Google Search
cadsiM - Google Search
Complexity Explorer: - Google Search
Denes Csala - Google Search
Dieter Grass - Google Search
DIME/PMESII Tools: Past, Present and Future, - Google Search
Dr. Michael Collender. - Google Search
Gernot Tragler - Google Search
Global Risk Survey - Google Search
Gustav Feichtinger - Google Search
HSCB-PMESII Framework - Google Search
Information Analysis Center (MSIAC) Modeling & Simulation - Google Search
Irregular Warfare Modeling and Simulation Senior Coordinating Group - Google Search
jieddo attack the network - Google Search
joc_iw_v1 - Google Search
John D. Lowrance - Google Search
Jonathan P. Caulkin - Google Search
Lanchestrian Based Marketing differential equations - Google Search
Measuring Progress in Conflict Environment - Google Search
MIT #HackMed - Google Search
Models of the transmission dynamics of fanatic behaviors - Google Search
Optimizing Counter-Terror Operations: Should One Fight Fire with “Fire” or “Water”? - Google Search
PERICLES social network - Google Search
Probative Rapid Interactive Modeling Environment - Google Search
Sam Mullins - Google Search
Scott Fortmann-Roe - Google Search
Senturion A Predictive Political Simulation Model - Google Search
Senturion - Google Search
Social network analysis and counter-terrorism: Measures of centrality as an investigative tool - Google Search
Supporting situation understanding (past, present, and implications on the future) in the STRATCOM - Google Search
System dynamics and COIN - Google Search
The hairball that destabalized Iraq. - Google Search
The Hairball that Stabilized Iraq: Modeling FM 3-24 - Google Search
The Hairball that Stabilized Iraq: - Google Search
The interconnections of threats in the global security environment - Google Search
Thrush Weaponization Blueprint pdf - Google Search
Tracking Changes in Resilience and Level of Coordination in Terrorist Groups - Google Search
US Army Reprogramming Analysis Team (ARAT) - Google Search
Utilizing Social Science Technology to Understand and Counter the 21st Century Strategic Threat. - Google Search
bacth reduce size pdf mac - Google Search
barry silverman upenn - Google Search
danny hillis cancer - Google Search
delete mail on macbook pro - Google Search
encyclopedia of electronic components volume 3 pdf - Google Search
joe grey ohsu - Google Search
Jonathan P. Caulkins - Google Search
pmesii model - Google Search
sitrep - Google Search
stability analysis pmesii - Google Search
why is gmail taking up so much space on macbook - Google Search
Maintenance
DARPA Squad X program to help troops pinpoint enemy in warfare
Location Data on Social Media Apps can Disclose Identity of Anonymous Users
The Heinz School - About the Heinz School
Homeland Security Digital Library (HSDL)
Homeland Security Digital Library (HSDL)
Homeland Security Digital Library (HSDL): Search Results
Homeland Security Digital Library (HSDL): Search Results
Homeland Security Digital Library (HSDL): Search Results
On the Homefront - Homeland Security Digital Library Blog
Counter-Terrorism 101: Five Ways to Fight TerrorIDF Blog | The Official Blog of the Israel Defense Forces
Declassified CIA Documents—Studies in Intelligence - Lawfare
New podcast launching on the defense and intelligence innovation ecosystem | 4 days left for innovation workshop early-bird pricing | Free Cyber Security and Innovation Events next week + more...
Dylan Schmorrow | LinkedIn
Michael Gibson ✔ | LinkedIn
Michael Parodi, LTC, U.S. Army, (Retired) | LinkedIn
Scott Fortmann-Roe, PhD | LinkedIn
Using the OS X crash reporter to diagnose a program failure | MacIssues
Record Your Mind with Thoughtful – MacStories
Human Security | Mendeley Group
Papers in Threat Analysis | Mendeley Group
The Naval Postgraduate School's MOVES Institute | Modeling, Virtual Environments and Simulation
Karen Watanabe, PhD | Public Health & Preventive Medicine | OHSU
2016 OHSU Startup Symposium - Sponsors | Technology Transfer & Business Development | OHSU
Portland State Systems Science Program | Systems Science Seminar Series
Keeping Tabs on the Hacking Hero Who Became a Criminal Kingpin - ProPublica
How to use Facebook properly in the USA? : AskAnAmerican
Get some storage back by trying to download a movie (more info inside) : iphone
Home Feed
Andreas Tolk
Baojun Song - Publications
Carlos Castillo-Chávez - Publications
Dieter Grass
Dieter Grass - Publications
Dimitrios C Christopoulos
Erik Blasch - Publications
Gary Klein - Publications
Jeff Hansberger - Publications
John D. Lowrance - Publications
Jonathan P. Caulkins - Publications
Kathryn Blackmond Laskey
Kuochu C Chang - Publications
Paul Bello - Publications
Peter S. Corpac - Publications
Robert Eggleston - Publications
Toward Culturally Informed Option Awareness for Influence Operations with S-CAT
An exploratory, dynamic application of Social Network Analysis for modelling the development of Islamist terror‐cells in the West
The Human Factors of Intelligence Analysis
Developing a Model of Distributed Sensemaking: A Case Study of Military Analysis
Corey Lofdahl, Charles River Analytics - ResearchGate
Nicholas L. Cassimatis, Rensselaer Polytechnic Institute, Department of Cognitive Science - ResearchGate
Ken Murray, SRI International - ResearchGate
Robert Tynes, Bard College - ResearchGate
Olivier Walther, University of Southern Denmark, Department of Border Region Studies - ResearchGate
Sam Mullins, University of Wollongong, Centre for Transnation Crime Prevention (CTCP) - ResearchGate
Scott B. Shadrick - ResearchGate
Edward Waltz - ResearchGate
Nicholas J. Pioch - ResearchGate
Penn Engineering - Research Directory Profile
Semantic Scholar
Game-theoretic modeling and control of military operations with partially emotional civilian players - Semantic Scholar
Modular architecting for effects based operations - Semantic Scholar
Intelligence & Information Systems | SRI International
Homeland Security and National Defense | SRI International
PRIME: Probative Rapid Interactive Modeling Environment | SRI International
ISIL in Libya: A Bayesian Approach to Mapping At-Risk Regions | START.umd.edu
Surveying CVE Metrics in Prevention, Disengagement and De-Radicalization Programs | START.umd.edu
U.S. Naval War College | Center on Irregular Warfare and Armed Groups
U.S. Naval War College | Home
U.S. Naval War College | 2015 CIWAG Symposium
MOC Warfighter - Main Page
MOC Warfighter - Main Page
U.S. Naval War College | Game Reports
U.S. Naval War College | International Sea Power Symposium Proceedings
5 ‘big ideas’ to guide us in the Long War against Islamic extremism - The Washington Post
Policy Statement for Countering Improvised Explosive Devices Announced | whitehouse.gov
TheCarterCollection - YouTube
Sheddie9 - YouTube
quityounow - YouTube
American Idiot - LA - YouTube
ArguingTheOE - YouTube
Arguing the OE, Episode 7: Are PMESII-PT and Systems Thinking in Tension? - YouTube
Systems Thinking Demystified Webinar 16.02.23 - YouTube
Arguing the OE, Episode 8: PMESII-PT versus Systems Thinking -- A Classroom Experiment - YouTube
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.