Light theme
Dark theme
Automatic (use operating system setting)
Shared: 333 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
333 tabs
Copy links to clipboard
Copy
Open
Jose Miguel Sokoloff: How Christmas lights helped guerrillas put down their guns | TED Talk Subtitles and Transcript | TED.com
Operation Christmas and Rivers of Light Case Study | D&AD | D&AD
Transcript | This American Life
What a Real Guerrilla Marketing Campaign Can Teach Us : The Buzz Bin
US Political, Financial & Business News | FT.com
Operation Christmas - Wikipedia, the free encyclopedia
Advertising With Social Value: Interview with José Miguel Sokoloff · MullenLowe Group
Case Study: Behavioral Communications Done Right
How Jose Sokoloff demobilised guerillas with advertising (Wired UK)
What Star Wars & Xmas can tell us about the fight against ISIS.
INSS Strategic Assessment
UNHCR - Middle East and North Africa
Syria Complex Emergency - Fact Sheet #7 | U.S. Agency for International Development
UNHCR - Middle East
UNHCR - Global Appeal 2015 Update
Michael Izady’s Amazingly Detailed Map of Ethnicity in Syria (and the Syrian Armenians) | GeoCurrents
Carter Center Conflict Resolution in Syria
Global open data, scholarships, and mapping a civil war - O'Reilly Radar
How the Global Open Data Movement is Transforming Journalism | WIRED
GDELT: a big data history of life, the universe and everything | News | The Guardian
Islamic State of Iraq and Syria (ISIS) a Global Threat: Analysis of the Effects on Cyberspace of the Iraqi Situation - InfoSec Resources
Welcome to the QGIS project!
Carter Center Videos
The Gulf/2000 Project - SIPA - COLUMBIA UNIVERSITY
Iranian cards in Irancarto
Imperial History of the Middle East
Global Connections . Maps | PBS
United Nations Geospatial Information Section Web Site
HCL Libraries - Harvard College Library
Middle East Maps - Perry-Castañeda Map Collection - UT Library Online
The Gulf, explained in 40 maps
The Gulf, explained in 40 maps - part 2
Results and Data | U.S. Agency for International Development
INSS The Middle East in the New Media
INSS Institute for National Security Studies
Case Studies | Ethnographic Research & Video
Written testimony of I&A Under Secretary for a House Committee on Homeland Security hearing titled “Countering Violent Islamist Extremism: The Urgent Threat of Foreign Fighters and Homegrown Terror” | Homeland Security
So what to do with the Islamic State? | SAGE International
Seven unlikely events in the fight against Islamic State, and their likely outcomes
Toxic Remnants of War
Center News - Center for Refugee and Disaster Response - Johns Hopkins Bloomberg School of Public Health
Defeating ISIS: An Integrated Strategy to Advance Middle East Stability | Center for American Progress
Syria's civil war mapped using new global events database | News | theguardian.com
OneTab shared tabs
Sci-Hub: removing barriers in the way of science
Going Paperless 2.0: Quickly Access Frequently-Used Information in Evernote | Jamie Todd Rubin
FEATURED | Big Data in Military Information & Intelligence
50 Tools to Get the Most Out of Dropbox - Docurated
How to Use Evernote for Your Creative Workflow — Forte Labs — Medium
How to Use the New Disk Utility in OS X El Capitan
10 Tweetbot tips for power users
Put Only the Apps That Are Good for You on Your Phone's Home Screen
The complete, easy guide to backing up your Mac | Macworld
How Not to Stop a Terrorist Attack
VOX – Pol | Analyzing the Islamic State’s Information Campaign: Interview With Australian National Univ’s Haroro Ingram
The Patience of the Jihadists | The Counter Jihad Report
Sour Note
iPhone 6s Tricks And Secrets: 5 great hidden features | BGR
How a Reporter’s Quest for Online Bargains Led to a Network of Syrian Contacts - The New York Times
Nuclear Resources Links
GitHub - Quartz/bad-data-guide: An exhaustive reference to problems seen in real-world data along with suggestions on how to resolve them.
Systems Behaviour | Dr. JAH
KeepVid: Download YouTube Videos, Facebook, Vimeo, Twitch.Tv, Dailymotion, Youku, Tudou, Metacafe and more!
bellingcat - Tip of the Spear? Meet ISIS' Special Operations Unit, Katibat al-Battar - bellingcat
DHS Critical Infrastructure Vulnerability and Terrorist Activity Indicator Reports | Public Intelligence
U.S. Maintains Secret List of International Critical Infrastructure/Key Resources (CIKR) | Public Intelligence
Siege Warfare in Syria Revives Debate Over Ancient Tactic - ABC News
If Aleppo Falls | Bipartisan Policy Center
Drug Lord 'El Chapo' Plotting Third Prison Escape | SOFREP
Iraqi federal police destroy ISIS infiltration tunnel | SOFREP
Netanyahu, Ya'alon reject Bennett plan to act against tunnels - Arutz Sheva Israel News - Discussion on Topix
Mount Weather | Public Intelligence
Page not found | The Center for Land Use Interpretation
oregon | Public Intelligence
Erez Crossing | Public Intelligence
UN Report of the Independent Commission of Inquiry on the 2014 Gaza Conflict | Public Intelligence
DHS, FBI Warn “Malicious Actors” Are Using Company Websites, Social Media to Plan Attacks | Public Intelligence
(U//FOUO) DHS-FBI Bulletin: Use of the Internet for Attack Planning | Public Intelligence
(U//FOUO) DHS Warning: Internet Sites Allow Detailed Surveillance and Pre-Attack Planning | Public Intelligence
National Counterterrorism Center Says Urban Exploration Could “Aid Terrorists” | Public Intelligence
You May Be a Terrorist | Public Intelligence
Article published in Significance magazine - Visualising Data
Significance - Volume 13, Issue 1 - February 2016 - Wiley Online Library
Suite of data tools for beginners, focused on fun | FlowingData
The NSA's Terrorist-Hunting Computer for Pakistan May Have Targeted Innocents - Defense One
How To Steal A Decryption Key From An Air-Gapped Computer In Another Room; Researchers Highlight The Threat To What Was Once Considered A Safe Option To Store Highly Sensitive Data/Material - The Stand-Alone Computer - Fortuna's Corner
Computers and Society authors/titles recent submissions
4 data resources for journalists reporting on Zika | News & Analysis | Data Driven Journalism
Homepage | Data Driven Journalism
Two Revolutions
Data Visualization Course Notes
Tweeting Terrorists, Part I: Don’t Look Now But a Lot of Terrorist Groups are Using Twitter - Lawfare
The Afghan Taliban Have Become a Full-Fledged Drug... - Matthew Aid
The Mess That Is Russia Today - Matthew Aid
Nature News & Comment
Welcome to the Department of Peace and Conflict Research - Uppsala University, Sweden
Dart-Throwing Chimp | Thoughtful analysis or bloviation? Your call.
The Gulf/2000 Project - SIPA - COLUMBIA UNIVERSITY
The Blue-Green-Red Metaphor in the Context of Counterterrorism: Clarifications and Anthropological Emendations - globalECCO
Decoding Data | Exposing the Invisible
Investigative Dashboard, a helpline for investigators | Exposing the Invisible
Welcome - Humanitarian Data Exchange
USNews.com: Nation and World: AP Article
Ultrascan HUMINT
Australians ripped off by online romance scams could be funding deadly Nigerian terror group Boko Haram, linked to al-Qa'ida | The Courier-Mail
Edward Snowden Is Acting Very Strange Inside Russia - The Daily Beast
Solutions: The GDELT Project
All GDELT GKG Files
All GDELT Event Files
GDELT Analysis Service: The Global Database of Events, Language, and Tone
EVENT Time Mapper Visualizer: GDELT Analysis Service
Expediting Extraction and Exporting: GDELT Event and GKG Exporter Tools - GDELT Blog
Warfare Modeling - Google Search
Why Are Islamic Militants More Likely to Emerge from Science/Engineering Departments - Google Search
cuws outreach journal pdf - Google Search
Solutions: The GDELT Project
The Tehran Connection | Foreign Policy
New GDELT Daily Trend Reports - GDELT Blog
New GDELT World Leaders Index - GDELT Blog
The GDELT Story: About the GDELT Project
The GDELT Project
search for theft in gdelt - Google Search
Data: Querying, Analyzing and Downloading: The GDELT Project
EVENT Record Exporter: GDELT Analysis Service
Data Map Shows Protests Around the World Increase, With Caveat | IPI Global Observatory
October | 2013 | iRevolutions
Johnny Lists – Page 2
Favorite and Forget
Programming - Postmodum37 | Papaly
Alfred - Productivity App for Mac OS X
Mac OS X Automation
Arab unrest index: The Shoe-Thrower's index | The Economist
Conflict Early Warning and Early Response | The Blogosphere’s First Blog on Conflict Early Warning
Cyber Caliphate
What are Gravitational Waves? | LIGO Lab | Caltech
LIGO Scientific Collaboration - The science of LSC research
Revising the Battle of the Narrative | Small Wars Journal
Arab unrest: Build your own revolutionary index | The Economist
LIGO's Interferometer | LIGO Lab | Caltech
ERIC - Education Resources Information Center
How White Hat Hackers Stole Crypto Keys from an Offline Laptop in Another Room | Motherboard
That Time the Super Bowl Secretly Used Facial Recognition Software on Fans | Motherboard
The Global Intelligence Files - List of Releases
richard tarling goldman sachs - Google Search
Stop Islamic State in Libya before it is too late: Former undercover CIA operative
(7279) Inoreader - Current Work
Books are one of the most influential weapons against extremism | Aaj News
Plans, Reorgs, and Assessments in the World of Intel | Overt Action | Research, analysis, & debate on critical intelligence challenges
DARPA Released Official Images Of Its Cutting Edge Sub Hunter Drone Ship
War in Context – ... with attention to the unseen
Review: How Kendrick Lamar's Grammys 2016 Performance Shed Light on Internal Struggles Over Racial Injustice - The Atlantic
Saudi Arabia’s Master Plan Against ISIS, Assad and Iran in Syria - Harvard - Belfer Center for Science and International Affairs
Electrospaces.net: How NSA contact chaining combines domestic and foreign phone records
The Only Educational Websites You Need to Know – Johnny Lists
How We Work, 2016: Thorin Klosowski's Gear and Productivity Tips
militarywritersguild.org/#medium
Congressional Research Service (Library of Congress)
Homeland Security Digital Library (HSDL): Search Results
(7278) Inoreader - Channels
(39) Twitter
Russia having success in hybrid war against Germany
Celebrity gossip site TMZ runs more like a global spying operation / Boing Boing
U.S. wants Apple to help unlock iPhone used by San Bernardino shooter - The Washington Post
Doom and Gloom: Five Key Takeaways from the Munich Security Conference
U.S. Mass Surveillance Has No Record of Thwarting Large Terror Attacks, Regardless of Snowden Leaks - Linkis.com
LaunchBar 6
Home - LibGuides at American Public University System
Preparing for Nontraditional Biothreats | Abstract
Latest Articles | Journal of Global Security Studies
Preparing for Nontraditional Biothreats - Google Search
Profile of Mohammad_AT - Uploads - Kickass Torrents
The Role of Social Network Sites in Security Risks and Crises: The Information Warfare of Terrorism - Springer
The isolated Islamists: The case of the Allied Democratic Forces in the Ugandan-Congolese borderland - Terrorism and Political Violence -
Chiefs of State and Cabinet Members of Foreign Governments - Google Search
Chiefs of State and Cabinet Members of Foreign Governments
Combating Terrorism Center at West Point
Terrorism Guide - National Counterterrorism Center
Disrupting Terrorist and Criminal Networks: Crime Script Analysis Through DODAF Applications - Springer
Critical Infrastructure Vulnerabilities: Embracing a Network Mindset - Springer
Differentiating Al Qaeda and the Islamic State through Strategies Publicized in Jihadist Magazines - Studies in Conflict & Terrorism -
The Fight against the ‘Islamic State’ in Syria and the Right to Self-Defence
The Jakarta Attack and the Islamic State Threat to Indonesia | Combating Terrorism Center at West Point
People Detection, Tracking and Visualization Using ROS on a Mobile Service Robot - Springer
Project MUSE - Killing by Drone: Towards Uneasy Reconciliation with the Values of a Liberal State
Cumulative Response to Sequences of Terror Attacks Varying in Frequency and Trajectory - Cui - 2016 - Risk Analysis - Wiley Online Library
Operation Iraqi Freedom (OIF) and the Use of Forwarding Operating Bases (FOBs) - Springer
Asymmetric warfare: Geospatial analysis to combat IED attacks
Border militarisation and the re-articulation of sovereignty - Jones - 2016 - Transactions of the Institute of British Geographers - Wiley Online Library
Armies of God, armies of men: A global comparison of secular and religious terror organizations - Terrorism and Political Violence -
Exploring the Security Landscape: Non-Traditional Security Challenges - Springer
METHODS AND DEVICES FOR INSPECTING LIQUID
Detection of Explosives Using Differential Laser-Induced Perturbation Spectroscopy with a Raman-based Probe
Handbook on Migration and Social Policy - Google Books
Handbook on Migration and Social Policy - Google Books
Agent-based simulation of alternative classroom evacuation scenarios
Research Handbook on Global Administrative Law - Google Books
Emerald Insight
Numbers Count: Dead Bodies, Statistics, and the Politics of Armed Conflicts - Springer
A New Typology of Contemporary Armed Non-State-Actors: Interpreting The Diversity - Studies in Conflict & Terrorism -
Iran's Security and the Islamic State through the Lenses of the Copenhagen School - Studies in Conflict & Terrorism -
Journal of Criminal Psychology: Vol 6, No 1
Social psychological dynamics of hostage negotiation: forensic psychology, suicide intervention, police intelligence/counterintelligence, and tactical entry: Journal of Criminal Psychology: Vol 6, No 1
Is ROC analysis a tool that should replace probative analysis in studying lineups?: Journal of Criminal Psychology: Vol 6, No 1
Social psychological dynamics of hostage negotiation: forensic psychology, suicide intervention, police intelligence/counterintelligence, and tactical entry - Google Search
Understanding Thermal Face Detection: Challenges and Evaluation - Springer
Handbook on Migration and Social Policy - Google Books
Artificial Intelligence and Evolutionary Computations in Engineering Systems ... - Google Books
From Game Theory to Complexity, Emergence and Agent-Based Modeling in World Politics - Springer
Smartphone based LSPR sensing platform for bio-conjugation detection and quantification - RSC Advances (RSC Publishing)
The role of weighted and topological network information to understand animal social networks: a null model approach
Scenario Building - The GBN Method
Scenario Planning Guidebook - Scenario Planning - Scenario And Visualization - Planning - FHWA
Scenario planning | Jisc
Summitas - Learnings From the Long View
Future Scenarios: The Art of Storytelling - systems thinking, futurist, strategic planning, Kahane, Mont Fleur Scenarios, GBN, Peter Schwartz, Pierre Wack, Royal Dutch Shell, Herman Kahn, organizational mapping
the latest delivery — Dear Data
Lessons in statistical significance, uncertainty, and their role in science | FlowingData
Ten apps every Mac user should own | iMore
Predictive policing | FlowingData
FlowingData
10 Best Data Visualization Projects of 2015 | FlowingData
Visualization | FlowingData
Science Isn’t Broken | FiveThirtyEight
Graduate student makes up data for fake findings | FlowingData
Policing the Future | The Marshall Project
Predicting crime before it happens | FlowingData
xkcd: Degrees
Mattel Unveils ThingMaker, A $300 3D Printer That Lets Kids Make Their Own Toys | TechCrunch
Too many people have peed in the pool - Official site of Stephen Fry
Dropshare 4 is a Great Alternative to File Sharing Services – MacStories
No Excuse List
Going Paperless 2.0: Searching in Evernote, Part 2 of 4: “What?” | Jamie Todd Rubin
Kanye West Just Spoke The Truth About College Textbooks
U.S. Hacked Into Iran's Critical Civilian Infrastructure For Massive Cyberattack, New Film Claims - BuzzFeed News
Adele Said A Mic Dropped In The Piano And That's Why Her Grammy Performance Was Off
Here's Where "Joy" Went Very, Very Wrong
Everything You Need To Know About What Happens Now With The Supreme Court - BuzzFeed News
A Gene-Editing Startup Just Won A CRISPR Patent - BuzzFeed News
Report From Aid Groups Calls Syria Hospital Attacks “Unprecedented” - BuzzFeed News
BuzzFeed News
This Is How Boko Haram Is Trying To Turn Captives Into Suicide Bombers - BuzzFeed News
D.C. Circuit Quietly Set to Hear Major National Security Appeals | Just Security
Law Enforcement Online: Innovative Doesn’t Mean Illegal | Just Security
Lessons Learned From the 2015 Fighting Season in... - Matthew Aid
The Challenge of the U.S.-Mexico Border | Small Wars Journal
WORLD | Staying power | Mindy Belz | Feb. 6, 2016
GOOGLE IDEAS BECOMES JIGSAW — Medium
McSweeney’s Internet Tendency: Building Code Violations for the Love Shack.
Recorded Future - New Analysis
From Stalemate to Settlement: Lessons for Afghanistan from Historical Insurgencies That Have Been Resolved Through Negotiations | RAND
Instapaper
Best Free iPhone Apps: 12 paid iOS apps on sale for free, Feb 1 | BGR
10 Apps to Organize Your Life | Mental Floss
Apps and Workflows: iPhone (6s Plus) Edition — Shawn Blanc
Using Effective Titles: An Evernote Tutorial - Simplify Days
My (Apparently) Obligatory Response to ‘Formation’: In List Form | Radical Faggot
Bartender 2 | Mac Menu Bar Item Control
Your reaction to this confusing headline reveals more about you than you know - The Washington Post
What Football Does to the Brain
Secret OS X keyboard shortcuts that will turn anyone into a power user | BGR
Wi-Fi network issues and fixes: Change bands from 2.4GHz to 5GHz | BGR
Why Apple's Time Machine Utterly Fails User Needs - The Mac Observer
The unsexy truth about why the Arab Spring failed - Vox
How-To: Migrate notes from Evernote to Apple Notes | 9to5Mac
Cheat Sheet : All Cheat Sheets in one page
Inbox (66) - scitrenbaum@gmail.com - Gmail
(8) Academia.edu
Hacks | The Verge
Spotify | The Verge
Pre-Conflict Anticipation and Shaping (PCAS): Models-2-Shaping Integration
Robert Lempert - Publications
Steven W. Popper - Publications
Steven Bankes - Publications
Applied Artificial Intelligence Laboratory
Huan Liu's Graduate Students in Feature Selection, Social Computing, Social Media Mining
Terror-Events.com – Tracking terror events and victims all over the world
Jürgen Pfeffer
Jürgen Pfeffer
Jürgen Pfeffer
AAAI Publications
Presentations and Authors
Homepage | CASOS
Huan Liu
Syria: Mapping the conflict - BBC News
The self-government revolution that’s happening under the radar in Syria - The Washington Post
GeoCurrents | The Geography Blog Of Current Events
Syrian Civilians Take Reins in Test of Self-Government - The New York Times
SSI Publications - Military Strategy, National Security, and Regional Security
Shop Sugru Lowes Kit at Lowes.com
Top 10 DIY Miracles You Can Accomplish with Sugru
Articles - Project Gray
10 Mac storage tips to help you free up extra hard drive space | Cult of Mac
ISIS Gets Syrian Air Defense System
The Iran Primer
SOF's Cyber FRINGE - Project Gray
United States Institute of Peace
Can Your PlayStation Stop a War? | United States Institute of Peace
Peace Channel | United States Institute of Peace
What Can Be Done to Revive Afghanistan’s Economy? | United States Institute of Peace
Iran | United States Institute of Peace
http://www.soc.mil/swcs/ProjectGray/JSOMA%202016%20CfP.pdf is not available
Fusion Center Locations and Contact Information | Homeland Security
Law Enforcement Interrogation Techniques | Writings
Interrogation Principles and Techniques | Writings
Identifying Marks on Vehicles, Part III (The Interior) | Writings
Improving DHS Biological Detection and Surveillance Programs
Cybersecurity National Action Plan - Homeland Security Digital Library Blog
VOX – Pol | VOX-Pol Newsletter 3(1) February 2016
VOX – Pol | Challenges of using Twitter as a data source: An overview of current resources
IAI’s ROTEM – Tactical Multirotor Killer Drone | Defense Update:
Pandora Report 2.12.2016 | The Pandora Report
Saudi Arabia’s Master Plan Against ISIS, Assad and Iran in Syria - Harvard - Belfer Center for Science and International Affairs
What Vladimir Putin is really up to in Syria - Harvard - Belfer Center for Science and International Affairs
OPINION | Russia’s Growing Military Power and Iran's Reaction
First UN report on ISIL | Terrorism Watch
ISIS Gets Syrian Air Defense System | The Counter Jihad Report
Sniper Cuts Short ISIS Beheading Class With A Well-Placed Head Shot | The Counter Jihad Report
Online library | StratCom
Assessing nation-state instability and failure
Pre-Conflict Anticipation and Shaping - Google Search
CIFP - Country Indicators for Foreign Policy
pattrn | data-driven, participatory fact mapping
Presentations: Penn State Event Data Project
Parus Analytical Systems
Applied Artificial Intelligence Laboratory - Bae, J. W., Kim, J. H., Moon, I.-C., & Kim, T. G. (2016). Accelerated Simulation of Hierarchical Military Operations with Tabulation Technique. Journal of Simulation, 10(1), 36–49.
isis reuse old jet missiles - Google Search
Explosive Growth in ISIS Tweets: Arabic Overtakes English
Islamic State has a R&D where prepares missiles and moreSecurity Affairs
Ian McCulloch's articles on arXiv
Worldcam - Search Instagram by location
ISIS facility masters ‘missiles, hi-tech bombs’ - report — RT News
ISIS Is Working on a Surface-to-Air Missile: Report | The Fiscal Times
ISIS Is Working on a Surface-to-Air Missile: Report - Yahoo Finance
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab.