Light theme
Dark theme
Automatic (use operating system setting)
Shared: 1,014 tabs
Scan this QR code using the camera app on your smartphone or tablet
Unshare this page
About OneTab
Copy all links to clipboard
OneTabs
Copy links to clipboard
Copy
Open
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
OneTab shared tabs
Passport
Copy links to clipboard
Copy
Open
U.S. Passports & International Travel
How to Apply for a Passport
Differences Between Passport Book and Passport Card
Passport Fees
Photo Composition Template
Photo Requirements
Renew a Passport
Renew a Passport
Passport Applications | Multnomah County
Tunnels
Copy links to clipboard
Copy
Open
NCE Tunnelling Conference
NCE Tunnelling & Underground Space Awards
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
The British Tunnelling Society
Methods for tunneling construction - More about - Bulgarian Association for Geotechnical and Tunneling Construction
Geotechnical Engineering, Geological Engineering, Geotechnical Data Inquiries - Geotechpedia
Blogs Links and Sites - Geotechpedia
Tunnel Engineering Publications - Geotechpedia
Tunnel Induced Settlements Publications - Geotechpedia
Tunnel Design Publications - Geotechpedia
Tunnel Investigation Publications - Geotechpedia
Event Data
Copy links to clipboard
Copy
Open
GDELT Blog - The Official Blog of the Global Database of Events, Language, and Tone (GDELT) Project! www.gdeltproject.org
GDELT Translingual: Translating the Planet - GDELT Blog
Modeling Science, Technology & Innovation Conference At The National Academies - GDELT Blog
NGramming 9.5 Billion Words of Arabic News - GDELT Blog
Event Registry
Event registry
Event registry
Event Registry: Moldova Arrests Seven Suspected Of Smuggling Radioactive Material
Event Registry: AP INVESTIGATION: Nuclear Black Market Seeks IS Extremists
Event Registry: Georgia nabs three men in effort to sell radioactive cesium-137
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia arrests 6 on suspicion of trying to sell uranium
Event Registry: Georgia detains five suspected of illegal uranium trade
Event Registry: Armenia's possible dirty bomb threatens entire region
Event registry
Event registry
Data: Political Instability Task Force Worldwide Atrocities Dataset
Data: CAMEO
Data
Computational Event Data System
Papers: Automated
Papers: Forecasting
Papers
Software
mdwardlab.com
Comparing GDELT and ICEWS Event Data | mdwardlab.com
Biblio | mdwardlab.com
6 tabs
Copy links to clipboard
Copy
Open
IAEA Nuclear Data Services
ADS Library Home Page
ADS-ACE
International Network of Nuclear Reaction Data Centres
INTERNATIONAL NETWORK OF NUCLEAR STRUCTURE AND DECAY DATA EVALUATORS (NSDD)
NDS Publications
Conflict Data Sources
Copy links to clipboard
Copy
Open
Data Resources: Conflicts, Wars, Terrorism
Datasets and Research - POL 347 Conflict Analysis and Resolution - LibGuides at Stonehill College
Data Sources
UCDP/PRIO Armed Conflict Dataset - Uppsala University, Sweden
47 tabs
Copy links to clipboard
Copy
Open
Hacking Drones … Overview of the Main Threats - InfoSec Resources
Hunchly - Better Online Investigations
Psiaki, Mark Lockwood
Concise Courses Information Security/ Cyber Security Training Certification Search Directory. Offering dozens of free continuing education courses in the USA and UK
Suits and Spooks DC 2016: Schedule
Best Hacker Tools Online - Wireless, Wifi Hacking, firewall hacking, digital forensic tools fuzzers, intrusion detection, packet crafting, password crackers, port scanners and rootkit detectors
OSINT for Fun & Games - YouTube
What software/web apps do you use? : Intelligence
Create a Pack - First Draft News
Resources - First Draft News
Free GIS Datasets - Categorised List
Ben Jackson
Centre for Analysis of Social Media - Demos
Verification Junkie
Graduate Certificate (online) | START.umd.edu
Weapons of Mass Destruction | www.hampshire.edu
A Wiki of Social Media Monitoring Solutions
ExogenesisBen (Ben Jackson)
A List of iOS URL Schemes - The Joy of Hack
Followthehashtag // Twitter keyword search analytics, influence, geo content analysis tool, and much more
Impact of Social Sciences – Using Twitter as a data source: An overview of current social media research tools
Bibliography on the History and Evolution of the Islamic State of Iraq and al-Sham | JIHADOLOGY: A clearinghouse for jihādī primary source material, original analysis, and translation service
The Joint Threat Anticipation Center
License Plate Tracking Has Gone Open-Source | Motherboard
Autocorrect hates you - The Oatmeal
100 print infographics that summarize 2015 – part 1 - Visualoop
BBC World Service - Newshour Extra, What Drives Islamic State?
CBRNE-Terrorism Newsletter
Got Rhythm? - Neatorama
OneTab shared tabs
Beautiful web-based People Plots and Family Trees
OSINT Tools - Recommendations List | Subliminal Hacking
Wireless Attack and Audit Tools - Recommendations List by Subliminal Hacking | Subliminal Hacking
UCS Satellite Database | Union of Concerned Scientists
Interactive graphic: Every active satellite orbiting earth — Quartz
https://s3.amazonaws.com/ucs-documents/nuclear-weapons/sat-database/2-25-16+update/UCS_Satellite_Database_1-1-16.txt
https://s3.amazonaws.com/ucs-documents/nuclear-weapons/sat-database/2-25-16+update/UCS_Satellite_Database_officialname_1-1-16.txt
Release cree.py v1.4.1 codename GIJC · jkakavas/creepy
Metadata Investigation : Inside Hacking Team | Share Lab
A curated list of speech and natural language processing resources — Medium
security in-a-box | tools and tactics for digital security
Terrogence :: Home
bellingcat - Online Identification of Conflict Related Environmental Damage - bellingcat
Science, Technology & Weapons Analyst — Central Intelligence Agency
Belief Networks | Probability Modeling
OpenAIRE - OpenAIRE
What Overview can do for you
43 tabs
Copy links to clipboard
Copy
Open
Quick Start Guide - Click&Clean
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Pinboard: your settings
barodeur/pocket-archive-all: Archive All items on Pocket
How to Use Pocket Like a Pro to Save Everything from the Web
Thinkst Research
9 Ways to Get More Out of Pocket
Hacktivity - Downloads
MITCIO 2016 | May 18, 2016
Fortinet Blog
Full Disclosure: Hacktivity 2015 CFP
Free Document Scanning Apps Are Sleazy and Gross, Don't Download Them
Fifteen Terminal tricks that every Mac user should know | iMore
Google's New Science Journal App Is A Science Nerd's Dream, Be It Your Kid Or The Kid Within You
thinkst Thoughts...: Your company's security posture is probably horrible (but it might be OK).
Thinkst Research
Con Collector
The DNA Typewriter | PLOS Synthetic Biology Community
Tracks/Measurement/Interlab study - 2016.igem.org
The World Changed Overnight – ZERO ANTHROPOLOGY
Hamilton - CBS News
Mr. Wade Shen
Uranium Enrichment and Fuel Fabrication Bibliography
Fred Meyer
Fred Meyer
Read it Later: Pocket vs. Instapaper — Adventures in Consumer Technology — Medium
Why I'm leaving Spotify after six years
5 hacks for getting more out of Gmail | Macworld
Online Organisation: 6 Tips to Clear Digital Clutter
The best must-have apps to edit your Instagram pictures. — Desk of van Schneider — Medium
How to Keep a Mac's Hard Drive Clean
OneLook Reverse Dictionary Helps Find That Word You Can't Remember
9 Google Calendar Features You Should Be Using
The In-Depth Guide to Using Pocket
Overwhelmed by Content? How to Consistently Achieve Content Inbox Zero with Pocket and Evernote | Residue
15 Great Mac OS X Terminal Commands That You Might Not Know
Hacktivity - The IT Security Festival in Central and Eastern Europe
29 tabs
Copy links to clipboard
Copy
Open
A new version of Gitrob is out | michenriksen.com
Bookmarks
Stanford Large Network Dataset Collection
Social Computing Data Repository at ASU
see what's happening | etrigg.com
KONECT - The Koblenz Network Collection
A Military Guide to Accessing Research on Fragile States
Downloads - KONECT - The Koblenz Network Collection
Concept Catalog |
BundleHunt.com | Buy What You Want & Create Your Mac Bundle
Fighting the Islamic State's Terrorism at Home - The Third Way - Red (Team) Analysis
BiodiversityCatalogue - Home
How I Use Automation for Mac Power Users — Katie Floyd
ArthurHub/Productivity-Tools: Tools I created for myself: OneNote to Markdown Converter, HTML Obfuscator, Simple RegEx and more...
How to write an email to someone who is frustrated with you - Business Insider
awesome-dotfiles/README.md at master · webpro/awesome-dotfiles
The ultimate Online Privacy Test Resource List - gHacks Tech News
‘Could he actually win?’ Dave Eggers at a Donald Trump rally | Books | The Guardian
3quarksdaily: Personal Data for Public Good
Terror Trends Bulletin | Tracking and Analysis of Jihadist Terrorism
The Open Source Analysis of Competing Hypotheses Project
Librarian and Resource Specialist job - The International School - Portland, OR | Indeed.com
Thinking — The Mitra Network
Online Course - Geopolitical Risk and Crisis Anticipation: Analytical Model - Red (Team) Analysis
Red (Team) Analysis
Master List of Logical Fallacies
Intelligence, Strategic Foresight and Warning, Risk Management, Forecasting or Futurism? - Red (Team) Analysis
Demos
Portal to the Islamic State War - Red (Team) Analysis
15 tabs
Copy links to clipboard
Copy
Open
Gitrob: Putting the Open Source in OSINT | michenriksen.com
michenriksen (Michael Henriksen)
Tools | Technology Radar | ThoughtWorks
CORE
Understanding the Islamic State's System - Structure and Wilayat - Red (Team) Analysis
How Many People Have Been Killed in ISIS Attacks Around the World - The New York Times
School of Computing, Informatics, and Decision Systems Engineering
Data Mining and Machine Learning Laboratory @ ASU
Does war foster cooperation? - Chris Blattman
Edward Miguel (@tedmiguel) | Twitter
davidkevans
EarlySense Pad tries to predict when patients will worsen during a hospital stay - iMedicalApps
bellingcat - Automatically Reverse Image Search YouTube Videos - bellingcat
Narcissiana: On Collecting : Longreads Blog
USGS - Core Science Analytics, Synthesis, and Libraries - Core Science Metadata Clearinghouse: Standards
20 tabs
Copy links to clipboard
Copy
Open
New Mac. Part 1 — OS X Customization — Directly from AgileBits — Medium
New Mac. Part 1 — OS X Customization — Directly from AgileBits — Medium
Automatic File Organisation with Hazel — Paperless Space
Little Things That Improve the Way I Work on a Mac — Shawn Blanc
Pinboard: bookmarks for larryaway tagged 'mac_automation'
Pinboard: bookmarks for larryaway tagged 'hazel'
Mac Automation: Rename multiple files efficiently
Great Email Copy | Well-crafted emails to inspire
Quickly Download Or Install Common Apps Without Going To The Website – Jacob Salmela
Mac Automation: Rename multiple files efficiently
Mac Power Users #319: Teaching Workflows with Teddy Svoronos - Relay FM
War is Over If You Want It — Fraser Speirs
Mac Automation: Rename multiple files efficiently
10 Apps to Keep You More Organized and Productive | Inc.com
DocumentSnap: Going Paperless And The Paperless Office
How to Use Keyboard Maestro to Archive Email in Mail.app - Let's Talk Tech
Hints & Tips Archives - Let's Talk Tech
Workflows - Tags - Alfred Blog
Agora
Alfred Workflows for Advanced Users
43 tabs
Copy links to clipboard
Copy
Open
Print Archive - Obey Giant
Jure Leskovec @ Stanford
Mining of Massive Datasets
Stanford CS246: Mining Massive Data Sets (Winter 2016)
The Stanford University InfoLab
Jure Leskovec: Videos of talks and tutorials
Stanford CS224W: Social and Information Network Analysis (Autumn 2015)
SNAP: Web and Blog datasets
SNAP: Papers
MemeTracker: Download MemeTracker data
BGU Social Networks Security Research Group
Social Computing Data Repository at ASU - Datasets
Social Computing / Online Social Networks Research @ MPI-SWS
Articles Archive - Intelligence/Information Sharing in Combating Terrorism - NATO LibGuides at NATO Multimedia Library
Centre for Security Governance
Stability: International Journal of Security and Development
Twitter Experts Search
Publication Listing
Home - Hybrid Warfare - NATO LibGuides at NATO Multimedia Library
Publications - KONECT - The Koblenz Network Collection
Bibliographies
Paul N. Bennett's MSR Homepage
Journal Articles - Drones and Unmanned Aerial vehicles (UAVs) - LibGuides at FBI Library
Useful Websites - Hezbollah and the Qods Force - LibGuides at FBI Library
Social Computing / Online Social Networks Research @ MPI-SWS: Software
Jennifer Widom's Home Page
The Stanford - Santa-Cruz Project for Cooperative Computing with Algorithms, Data, and People - Google Search
Home - LibGuides at FBI Library
Useful Websites - Terrorism - LibGuides at FBI Library
Government Information - Intelligence Analysis - LibGuides at FBI Library
The Stanford University InfoLab
Page not found : Stanford University
WebBase Project
Stanford WebBase project
Stanford Trio Project
SNAP: Stanford Network Analysis Project
Stanford Entity Resolution Framework
The Stanford University Database Group
Web Archive Cooperative (WAC)
KONECT - The Koblenz Network Collection - KONECT Toolbox
Papers | SIGIR Portland Oregon 2012
SNAP: Additional network dataset resources
Social Computing / Online Social Networks Research @ MPI-SWS: Projects
6 tabs
Copy links to clipboard
Copy
Open
NATO - Science for Peace and Security
Articles Archive - Conflict Prevention and Diplomacy - NATO LibGuides at NATO Multimedia Library
Reports - Conflict Prevention and Diplomacy - NATO LibGuides at NATO Multimedia Library
Home - Intelligence/Information Sharing in Combating Terrorism - NATO LibGuides at NATO Multimedia Library
Reports - Intelligence/Information Sharing in Combating Terrorism - NATO LibGuides at NATO Multimedia Library
Websites - Intelligence/Information Sharing in Combating Terrorism - NATO LibGuides at NATO Multimedia Library
6 tabs
Copy links to clipboard
Copy
Open
CSG Papers - Centre for Security Governance
Exploring the transition from first to second generation SSR in conflict-affected societies - Centre for Security Governance
Non-State Security Providers - Centre for Security Governance
Research - Centre for Security Governance
SSR Resource Centre - Centre for Security Governance
Stability: International Journal of Security & Development - Centre for Security Governance
5 tabs
Copy links to clipboard
Copy
Open
Stability: International Journal of Security and Development
Berto Jongman - Google Search
JSCSC LIBRARY BIBLIOGRAPHY - Google Search
inauthor:"Adam D.M. Svendsen" - Google Search
Pages - Applied Vehicle Technology
109 tabs
Copy links to clipboard
Copy
Open
Search Results :
Clint Watts - Foreign Policy Research Institute
Scientific tools & databases - EU Science Hub - European Commission
Teaching Terror Annotated Bibliography
State Nuclear Regulatory Inspectorate of Ukraine
re3data.org | Registry of Research Data Repositories
Directory of Open Access Journals
Making Decisions in a Complex Adaptive System
Johnston's Archive
Johnston's Archive--Nuclear Weapons
KWSnet Intelligence/National Security/Secrecy Index [A-I]
KWSnet Annotated Subject Directory for the Web
Image
INFILTRATE - Security Conference // CFP
DARPA - Open Catalog
DARPA - Open Catalog
DARPA - Open Catalog
Air War College Maxwell Papers
Military Portal, augmenting the U.S. Air Force Portal and DoD portal, Army, Navy, Marine, National Guard portals
Air War College Military Index to the Internet, Internet Index
Air War College: References, Online and Off
Home - NATO LibGuides - NATO LibGuides at NATO Multimedia Library
NATO - Alphabetical index
NATO - Topic: Countering terrorism
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Reports - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Centre of Excellence Defence Against Terrorism
Pages - Applied Vehicle Technology
Saved Session - Session Buddy
Alexa OBrien › Chelsea Manning
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
Con Collector
2016 - Center for International Maritime Security
Compendiums - Center for International Maritime Security
The #CrowdedSeas Project - Center for International Maritime Security
ᴅᴧτᴧ ᴘοᴙᴎ ѕтᴧᴙ
DeepDive
Lewis Research Group
Research Briefings - Automation in Military Operations
RETHINKING SECURITY
Stanford Network Analysis Project | re3data.org
http://supertroopers.wtf/gr/0417-Shirt3.jpg is not available
Home - USMA Library Research Guides - Research Guides at U.S. Military Academy at West Point
Stanford CS224W: Handouts
Stanford CS224W: Social and Information Network Analysis (Autumn 2015)
Stanford CS224W: Social and Information Network Analysis (Autumn 2015)
SiVNAP - Links
AboveTopSecret.com - Conspiracy Theories, UFOs, Paranormal, Politcs, and other "alternative topics" - home page for Monday, June 27, 2016
Blog Posts | Andrew S. Erickson
Argonne National Laboratory
The Early Warning Project: Can Expert Crowd-Sourcing Spot the Next Atrocity on the Horizon? - Auschwitz Institute for Peace and Reconciliation
Categories at Aviation Top 1000 - Avitop.com
Broken Lizard
Day 25: Shirt 3, New Perks & World Tour! — Broken Lizard
CRInfo
Using The 36 Stratagems For Social Engineering
Social Media in Strategic Communication (SMISC)
Weapons Complex Monitor Vol. 27 No. 26 - ExchangeMonitor
Johnston's Archive--Terrorism, Counterterrorism, and Unconventional Warfare
What's New at Johnston's Archive--2016 Part 1
KWSnet Surveillance/Spy Gear Index
KWSnet Weapons: Nuclear Weapons Index
KWSnet Whistleblower Index
NATO - Homepage
NATO - Publications
Home - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
eBooks - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Official Texts - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
Websites - Science and Technology to Combat Terrorism - NATO LibGuides at NATO Multimedia Library
NuclearMarket - Business opportunities and Sourcing services
NuclearMarket - Business opportunities and Sourcing services
Aviation links
https://athenanavy.wordpress.com
Social Engineering Attacks: Common Techniques & How to Prevent an Attack | Digital Guardian
mitll/MITIE: MITIE: library and tools for information extraction
snap-stanford/snap: Stanford Network Analysis Platform (SNAP) is a general purpose network analysis and graph mining library.
NATOTermOTAN - Home
Obey Giant - The Art of Shepard Fairey
CV - Obey Giant
Warnings - Obey Giant
Manifesto - Obey Giant
DARPA Social Media in Strategic Communication - Google Scholar
SecureDrop | The open-source whistleblower submission system managed by Freedom of the Press Foundation.
Google Image Result for http://i.imgur.com/aXeDw0G.png
Google Image Result for http://i3.cpcache.com/product/346235179/ceiling_cat_is_watching_you_mousepad.jpg?width=225&height=225&Filters=%5B%7B%22name%22%3A%22background%22%2C%22value%22%3A%22F2F2F2%22%2C%22sequence%22%3A2%7D%5D
Google Image Result for http://img15.deviantart.net/51e0/i/2011/003/1/f/ceiling_cat_is_watching_you_by_spasmodelique-d36bduu.png
Google Image Result for http://rlv.zcache.ca/ceiling_cat_is_watching_you_t_shirt-r7ca0360d1216402d90a12e057d82dbb8_jgn66_1024.jpg?rlvnet=1
Google Image Result for http://rlv.zcache.com/ceiling_cat_is_watching_you_2_inch_round_magnet-rdef6e9b25a24410496112df85864ba64_x7qgl_1024.jpg?rlvnet=1
Google Image Result for http://rlv.zcache.com/ceiling_cat_is_watching_you_classic_round_sticker-r9d4b938f35b745b18606e5865b7c407c_v9waf_8byvr_324.jpg
Google Image Result for http://rlv.zcache.com/ceiling_cat_is_watching_you_t_shirt-r7ca0360d1216402d90a12e057d82dbb8_jynro_512.jpg
Google Image Result for http://static.fjcdn.com/pictures/Medieval_9f29aa_494347.jpeg
Google Image Result for http://t05.deviantart.net/7GZSyFOLs7An9X1cdhDgCDV78TQ=/300x200/filters:fixed_height(100,100):origin()/pre12/b2b3/th/pre/f/2008/222/e/b/ceiling_cat_is_watching_you_by_dufte.jpg
Google Image Result for http://www.allmystery.de/i/t8cf3e2_ceilingcat.jpg
Google Image Result for https://obeygiant.com/images/2014/01/Radical_Cat_Print.jpg
ceiling cat original - Google Search
In-Q-Tel
Pages - Technical Activities of the STO
Pages - NATO Science & Technology Organization
Pages - Applied Vehicle Technology
Search Results :
25 tabs
Copy links to clipboard
Copy
Open
Live #Ham4Ham 6/22/16 -- #TveitForIt - YouTube
Digital #Ham4Ham 3/30 -- Hamilton Pillow Talk with Lea and Groff - YouTube
Undrafted (2016) ft James Belushi - Sports Comedy Movie - YouTube
The Doctor & Ashildr Save The Day - The Woman Who Lived - Doctor Who - BBC - YouTube
Matthew Morrison - "Aint Gonna Live With One Hand Tied Behind Your Back" (Erik Della Penna) - YouTube
FamousInNY - YouTube
Theater Talk: TONY Wrap-Up and “Turn Me Loose" - YouTube
cunytv75 - YouTube
Theater Talk: Critics, Spring 2016 - YouTube
Watch Later - YouTube
ISIS: Inside the Army of Terror - YouTube
The Agenda with Steve Paikin - YouTube
web-based early warning system to forecast mass atrocities - Google Search
Spreadsheets and Global Mayhem - The New York Times
Verdeja: Predicting Genocide and Mass Atrocities - Google Scholar
DARPA and How The Government Created the Surveillance State with Annie Jacobsen - YouTube
Schieffer Series: Breaking ISIL's Brand - YouTube
DEF CON 23 - Mike Walker and Jordan Wiens - Machine vs. Machine: Inside DARPA’s Fully Automated CTF - YouTube
DEFCONConference - YouTube
Counter Intelligence | Part I - The Company - YouTube
OODA Loop - California Terrorism Update
Prisma uses AI to turn your photos into graphic novel fodder double quick | TechCrunch
Anti-surveillance mask enables you to pass as someone else
Speaking Nonsense to Power: Misadventures in Dissent Over Syria
Twitter Trends in Portland, United States - Trendsmap
22 tabs
Copy links to clipboard
Copy
Open
Choose Early or Choose Wisely - A Chinese Restaurant Game Approach
IEEE Xplore Abstract - Smartphone Inertial Sensor Based Indoor Localization and Tracking with iBeacon Corrections
Are Coups Really Contagious? An Extreme Bounds Analysis of Political Diffusion
PLOS ONE: Digital Social Norm Enforcement: Online Firestorms in Social Media
Self-organization and social science | SpringerLink
Models, solution, methods and their applicability of dynamic location problems (DLPs) (a gap analysis for further research) | SpringerLink
System-Level Use of Contextual Information - Springer
Armed Struggle: A One-Way Path? - Springer
Enabling Military Coalition Command and Control with Interoperating Simulations as a System of Systems - Springer
The Advocacy Coalition Framework: An Approach for the Comparative Analysis of Contentious Policy Issues - Springer
Combining structure, content and meaning in online social networks: The analysis of public's early reaction in social media to newly launched movies
Online masquerade detection resistant to mimicry
Assisting consumers in detecting fake reviews: The role of identity information disclosure and consensus
Beyond the Double Game: Lessons from Pakistan’s Approach to Islamist Militancy - Journal of Strategic Studies -
Can psychoanalysis help us to understand the causes and prevention of violence? - Psychoanalytic Psychotherapy -
Abdel Bari Atwan. Islamic State: The Digital Caliphate - Asian Affairs - Volume 47, Issue 2
Knowing the adversary: leaders, intelligence, and assessment of intentions in international relations - Canadian Foreign Policy Journal -
The Puzzle of Nonviolence in Western Sahara - Democracy and Security - Volume 12, Issue 2
“Hybrid Orders” between Terrorism and Organized Crime: The Case of Al Qaeda in the Islamic Maghreb - African Security - Volume 9, Issue 2
The Earthquake Network Project: Toward a Crowdsourced Smartphone‐Based Earthquake Early Warning System | Bulletin of the Seismological Society of America
FBI Cyber Bulletin: Android Malware Phishing for Financial Institution Customer Credentials | Public Intelligence
Orange County Sheriff Office Orlando Nightclub Shooting Incident Reports | Public Intelligence
36 tabs
Copy links to clipboard
Copy
Open
Refind aims to re-invent social bookmarking
Nuclear Terrorism | Union of Concerned Scientists
Matter — Medium
10 features of Google Docs you should be using - CNET
This Week's Most Popular Posts: June 17th to 24th
Seven tricks to speed up Google Chrome | Technology | The Guardian
The Nuclear Weapons States - Who Has Them And How Many - Forbes
Arms Industries of the Middle East | Middle East Research and Information Project
Most Popular DIY Projects of 2015
Twitter Natural Language Processing -- Noah's ARK
Data: Government, State, City, Local and Public
Uranium: Its Uses and Hazards - Institute for Energy and Environmental Research
Nuclear Weapons | Union of Concerned Scientists
All Things Nuclear - Insights on Science and Security
Nuclear Plant Emergency Preparedness – Southern Exposure 2015 - All Things Nuclear
Home | Union of Concerned Scientists
Sunday showdown News, Videos, Reviews and Gossip - Lifehacker
All in One – System Rescue Toolkit | Paul Bryan Vreeland
Mac Menu Bar Apps - Product Hunt
Gmelius Adds Tons of Scheduling, Snoozing, Tweaking, and Customization Options to Gmail
YakYak Is a Desktop Client for Hangouts with a Dark Mode, Notification Options, and More
Lacona Is a Launcher for OS X That Uses Natural Language Input
Read It Later Showdown: Pocket vs. Instapaper
Note-Taking Showdown: Evernote vs. OneNote (2016 Edition)
File Syncing Showdown: Google Drive vs. Dropbox vs. OneDrive
The Best App Launcher for Mac
Camera+ Adds a Slow Shutter for Manual Exposures, Deeper iOS Integration
Pocket: My List
Taking Down Bigots With Their Own Weapons is Sweet, Satisfying —And Very, Very Wrong — Matter — Medium
DroneWatcher App
The U.S. Nuclear Weapons Complex: Major Facilities | Union of Concerned Scientists
Readings – i-intelligence
Multiple Criteria Decision Aid Bibliography
Kaisa Miettinen - Links
What You Don't Understand about Suicide Attacks - Scientific American
What Research Says about Defeating Terrorism - Scientific American
3 tabs
Copy links to clipboard
Copy
Open
Ben Heck Guides You Through Which Electronics Board Is Best for Your Project
Download Dozens of Free Coursera Courses Before They Disappear Forever
Command Center Crams an iOS-Style Control Center Onto Your Mac
4 tabs
Copy links to clipboard
Copy
Open
A quick puzzle to tell whether you know what people are thinking - Washington Post
How-To: Setup Photos and iCloud Photo Library with external storage + Time Machine backups | 9to5Mac
Best manual camera apps for iPhone - The App Factor
iPhone photography tips: Best apps for shooting and editing
27 tabs
Copy links to clipboard
Copy
Open
BetaList – Discover and get early access to tomorrow's startups
Suits : Spooks – Innovative Problem-Solving On National Security Issues
Digital Dao: The Next Evolution of Suits and Spooks: Entertainment
How to Hack CCTV Private Cameras « Null Byte
Police Wireless Surveillance Networks Easy to Hack
Hackers Can Easily Disrupt Aircraft Satellite Links
Hack Satellites - get access to their cameras and more? | Yahoo Answers
Mike Lockwood - Google Scholar Citations
nonlinear dynamics
Cornell Engineering: Faculty Profile
Mark Lockwood Psiaki Inventions, Patents and Patent Applications - Justia Patents Search
Mark Lockwood Psiaki's Research | Cornell University
Covalent Data - Innovation Intelligence
The Pentagon Is Worried About Hacked GPS | The National Interest
GPS Terrorism: Hackers Could Exploit Location Technology To Hijack Ships, Airplanes
5 Best Tools For Hacking Web Applications ~ My Experiments with Hacking
Tools | iHackers
Learn to Hack
Top 10 Best Hacking Tools ~ My Experiments with Hacking
Best Hacker Tools Online - Wireless, Wifi Hacking, firewall hacking, digital forensic tools fuzzers, intrusion detection, packet crafting, password crackers, port scanners and rootkit detectors
Hacking Exposed - Web Applications
100+ Free Hacking Tools To Become Powerful Hacker | FromDev
Appendix A: Testing Tools - OWASP
Hack Like a Pro: How to Hack Web Apps, Part 1 (Getting Started) « Null Byte
Inbox (296) - stczztop@gmail.com - Gmail
GitHub
Digital Dao
5 tabs
Copy links to clipboard
Copy
Open
SMA PUBLICATIONS | NSI
Nuclear Terrorism: How Big a Threat?
Occasional Papers | pherson.org
Amazon.com: DoD White Paper - Anticipating Rare Events: Can Acts of Terror, Use of Weapons of Mass Destruction or Other High Profile Acts Be Anticipated? eBook: U.S. Department Of Defense: Kindle Store
Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security - Gary M. Jackson - Google Books
74 tabs
Copy links to clipboard
Copy
Open
Use These Secret Codes to Unlock Hidden Features on Your iPhone
‘Imposing quantity’ of uranium seized in raid on smugglers in Moldova (VIDEO) — RT News
terrorism - Semantic Scholar
Lacona - Natural Language Commands for your Mac
Md Tanvir Al Amin - Google Scholar Citations
Tanvir Amin
DEF CON® Hacking Conference
DEF CON® 24 Hacking Conference
DEF CON® 23 Hacking Conference
DEF CON® 24 Hacking Conference - Schedule
DEF CON® 24 Hacking Conference - Speakers
Transparent Accountable Datamining Initiative (TAMI)
Con Collector
Michael Schrenk: DEFCON Talks
In The News
overview for 3AlarmLampscooter
DEF CON CTF 2016
Hello World · GitHub Guides
Your Actions
The Digital Underworld: What You Need to Know | RAND
DEF CON 23—part I: hackers highlight evolving cyber threats - Lexology
nderstanding the Role of Social Media in a Counter-Insurgency Context. - Google Search
A Wiki of Social Media Monitoring Solutions
Downloads
Con Collector
AliData
An Open Agent-Based Model to Simulate the Effect of WOM Marketing Campaigns
Gizmodo - We come from the future.
IEEE Xplore Abstract - The relation between microfinacing and corruption by country: An analysis of an open source dataset
Security is a Big Concern for Rio Olympics
Blink Annotates, Crops, Edits, and Adds Emoji to iPhone Screenshots
Top 10 Ways to Stay Cool Without Air Conditioning
Tweetbot Adds Timeline Filters to Give Your Full Control Over Your Twitter Feed
Policing Wars - Springer
Detecting Illicit Drugs on Social Media Using Automated Social Media Intelligence Analysis (ASMIA) - Springer
The Relationships Between Customer Brand Engagement in Social Media and Share of Wallet - Springer
Agent-Based Modeling of Excitable Social Media Fluctuations - Springer
Discovering Patterns in Social Networks with Graph Matching Algorithms - Springer
Vietnam Journal of Computer Science - Springer
Multilateral Institutions and Conflict Resolution - Grigorescu - 2016 - Conflict Resolution Quarterly - Wiley Online Library
scholar.google.com/scholar_url?url=http://anthology.aclweb.org/N/N16/N16-1163.pdf&hl=en&sa=X&scisig=AAGBfm3Bc5d9Xg6P0EONFcqIqPnAWt4OOQ&nossl=1&oi=scholaralrt
Michael Schrenk: DEFCON Talks
Fitting Intelligence to the Fight: Lessons from Afghanistan | Small Wars Journal
Stir Trek / Evan Booth
Stir Trek / Sessions
The ISIS Economy | Cato Institute
Facebook Tracking - The Hacker Factor Blog
Keep 7 Times More Photos on iPhone with Avast Photo Space
5 Free Websites to Increase Size of Image Online
Morgan & Claypool Publishers - Synthesis Lectures on Information Concepts, Retrieval, and Services - 8(3):1 - Abstract
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar | RAND
Build a Helping Hand
Using agent-based modeling to explore policy options supporting adoption of natural gas vehicles in Indonesia
Intelligence Assessment Regarding Social Developments: The Israeli Experience - International Journal of Intelligence and CounterIntelligence - Volume 26, Issue 1
Beheading the Hydra: Counterinsurgent violence and insurgent attacks in Iraq - Terrorism and Political Violence -
Managing social media uncertainty to support the decision making process during Emergencies - Journal of Decision Systems - Volume 25, Issue sup1
Computer Science authors/titles "new"
DEF CON® Hacking Conference - Speaker's Corner
DEF CON® Hacking Conference - Speaker's Corner
DEF CON® Hacking Conference - Speaker's Corner
DEF CON® Hacking Conference - Speaker's Corner
DEF CON® Hacking Conference
Loughborough University Institutional Repository: Engineering social media driven intelligent systems through crowdsourcing: Insights from a financial news summarisation system
Raspberry PI (auto) Flickr uploader |
santegoeds/oanda: Oanda for Go
"Google Scholar" (26) - scitrenbaum@gmail.com - Gmail
Groombridge: Sports Criminology: A Critical Criminology... - Google Scholar
Bunker: Blood Sacrifices: Violent Non-State Actors... - Google Scholar
DEF CON® 24 Hacking Conference - Speakers
Dark Web Terrorism Research - Google Search
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker - Google Search
The Art of Intelligence Analysis: Some Thoughts. - Google Search
Microsoft Flow Adds iOS App – MacStories
Saved Session - Session Buddy
7 tabs
Copy links to clipboard
Copy
Open
PSU Library Catalog
Databases and Articles | Portland State University Library
Proquest Tech & Business Books - Home
http://www.science.gov/ is not available
ScienceDirect.com | Science, health and medical journals, full text articles and books.
Social Explorer
Search eLibrary :: SSRN
5 tabs
Copy links to clipboard
Copy
Open
Arvind Narayanan - Semantic Scholar
Social Network Graph - Semantic Scholar
Discovering patterns in social networks with graph matching algorithms - Semantic Scholar
50 Smartest Companies 2016
As It Searches for Suspects, the FBI May Be Looking at You
1 tab
Copy links to clipboard
Copy
Open
YouTube
34 tabs
Copy links to clipboard
Copy
Open
Defense Acquisition University | Defense ARJ and Defense AT&L Publications Website
Pursuit of the Possible: USSOCOM’s Technical Experimentation Program | Defense Acquisition University
Saturday's Best Deals: Philips Hue Starter Kit, George Foreman, Sony TVs, and More
Johnny Lists – Page 2
10 Completely Ridiculous Websites – Johnny Lists
Make a Memorable First Impression With Unusual Answers to Basic Questions
Make Your Own Tiny FM Spy Transmitter
10 Podcasts That Will Make You Feel Smarter | Mental Floss
MUSINGS ON IRAQ: Islamic State Picks Up Its Suicide Bombers In Iraq And Syria
MUSINGS ON IRAQ: Power Struggles Amongst Iraq’s Ruling Shiite Parties
Science
A Game Theory Approach to Battlefield Interrogations | Small Wars Journal
ISIS: State or Terror Group? | Small Wars Journal
The Durability of Ethnicity: Intra-state and Non-state Violence | Small Wars Journal
Pro-ISIS Online Groups Use Social Media Survival Strategies to Evade Authorities - IEEE Spectrum
Stuff of Men
Instead of TV, you should watch...
Project Vulcan: Special Ops and the Tech Innovation End Game - War on the Rocks
The complex economics of self interest - CSMonitor.com
Russian "hybrid warfare": nothing new
The social contingency of momentary subjective well-being : Nature Communications : Nature Publishing Group
Experiment With US
Home - Special Operations International
StopFake | Tools
Weather From - Weather you need it or not
Coursmos
Cyber Jihad Marketing: Yelling FIRE! In A Crowded Theater | Krypt3ia
Battle of the Secure Messaging Apps: How Signal Beats WhatsApp
How Terrorists Use Encryption | Combating Terrorism Center at West Point
SOCOM Technical Experimentation - Google Search
Lessons from Fort Hood and Asking the Right Questions in Orlando - Lawfare
Divya Priya Anantsri | LinkedIn
Scott E. Page - ResearchGate
Yachts, jets and stacks of cash: super-rich discover risks of Instagram snaps | Technology | The Guardian
15 tabs
Copy links to clipboard
Copy
Open
Download the difference Books Torrents - Kickass Torrents
computational models of social life - Google Search
Project MUSE - Complex Adaptive Systems: An Introduction to Computational Models of Social Life
Complex Adaptive Systems: an Introduction to Computational Models of Social Life - Breadcrumbs
Review of Miller, John H. and Page, Scott E.: Complex Adaptive Systems: an Introduction to Computational Models of Social Life (Princeton Studies in Complexity)
Research | Scott E Page
Diversity Research | Scott E Page
The Difference | Scott E Page
Research on Complexity | Scott E Page
Research on Culture | Scott E Page
Scott E Page | Leonid Hurwicz Collegiate Professor
Scott Page on Leveraging Diversity - YouTube
diversity and complexity pdf - Google Search
Scott e Page - Google Scholar Citations
Plugins
50 tabs
Copy links to clipboard
Copy
Open
Erik Blasch - Google Scholar
FPI Bulletin: Countering Online Radicalization | Foreign Policy Initiative
M/C Journal
List of Conflict and Security Databases - Google Search
The Sociologists, The Spider and The Fighter Pilot; The Influence of Bureaucracy on Irregular War | Small Wars Journal
Radio Spectrum Management and Allocations - The RadioReference Wiki
National Communications Fast Food Frequencies
www.panix.com/~clay/scanning/Frequencies/handy-info/fastfood.txt
GeoNames
Download Proceedings of Books Torrents - Kickass Torrents
Profile of LeipzigMRD - Uploads - Kickass Torrents
Profile of clouderzero - Uploads - Kickass Torrents
Procedia Manufacturing - ScienceDirect.com
Social Media for Situational Awareness - Google Search
ErikBlasch
ICONS Project | Maneuver and Engagement in the Narrative Space | Simulation Data
Everyone tried confrontation. Here’s a better road for the Middle East - Your Middle East
Continuity and Innovation in Russia's Way of War | Center for Strategic and International Studies
Human-Agent Collaboration for Time-Stressed Multicontext Decision Making. - Semantic Scholar
EPB Publications by Subject Area - ErikBlasch
https://www.icsworld.com/Private_Investigation_Case_Types/Social_Media_Investigation.aspx
Social Media Research Foundation | Tools and data for social media network insights
Social Media Investigation for Law Enforcement - ScienceDirect
IACP Center for Social Media > Topics > Parent
Five Social Media Investigation Tools for Law Enforcement | LESMChief
Online Research Tools and Investigative Techniques | Global Investigative Journalism Network
Intel
Michael Chesbro
Adam Svendsen
Adam Svendsen D-9577-2015 - ResearcherID.com
ADAMSairmed.org
The Texas Social Media Research Institute (@TSMRI): New Social Media Research
The Journal of Social Media in Society
Social Media Situational Awareness
Navigating Movie (M)apps: Film Locations, Tourism and Digital Mapping Tools | Leotta | M/C Journal
IEEE Xplore Abstract - Keynote speakers: Computational imaging: How much imaging ??? How much computation?
Comparing Intimately Violent to Non-violent Veterans in Treatment for Posttraumatic Stress Disorder - Online First - Springer
Sectarian and Ethnic Politics: The Syrian Conflict - Springer
From Disaffection to Desertion: How Networks Facilitate Military ...: Ingenta Connect
Nomos - eLibrary | S&F Sicherheit und Frieden
Field Effects of Social Media Platforms on Information-Sharing Continuance: Do Reach and Richness Matter?
Public Relations, Media Coverage, and Public Opinion in Contemporary China: Testing Agenda Building Theory in a Social Mediated Crisis
TOSI: A Trust-Oriented Social Influence Evaluation Method in Contextual Social Networks
Authenticated Key Establishment for Low-Resource Devices Exploiting Correlated Random Channels
Persistent Jamming in Wireless Local Area Networks: Attack and Defense
MeDrone: On the Use of a Medical Drone to Heal a Sensor Network Infected by a Malicious Epidemic
Hit the core or weaken the periphery? Comparing strategies to break the circle of violence with an embryonic terrorist group: The case of Galician Resistance - Terrorism and Political Violence -
Development of proxy relationships: a case study of the Lebanese Civil War - Small Wars & Insurgencies - Volume 27, Issue 4
Narrating Networks - Digital Journalism -
Evaluation in the Extreme
14 tabs
Copy links to clipboard
Copy
Open
Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - PRISM Break
Zotero | Home
Archivarius 3000 – Document Search – Desktop Search :: Likasoft
social media investigation for law enforcement pdf - Google Search
Hackers Just Leaked Personal Data of US Military Officials and it's Legit
Download Tor
Spear Phishing Attack at Pentagon’s Network, Breached 4000 Military Accounts
JestersCourt by JΞSTΞR ✪ ΔCTUAL³³º¹
Status Report on the Forgotten War in Libya - Matthew Aid
Hacked-DB - Data Breach Alerts
The Great DevOps Train Wreck is About to Crash into Your Data Center - The New Stack
US Customs wants to collect social media account names at the border | The Verge
War drives terrorism - The Washington Post
It’s impossible to monitor all terror suspects. These charts show why. - The Washington Post
27 tabs
Copy links to clipboard
Copy
Open
Social Media Investigation Services Inc.
Hodson P.I. Professional Investigations | Private Investigator
How Social Media Can Be Your "Friend" in an Investigation | i-Sight
Using Social Media Posts as Evidence in an Investigation | i-Sight
Empowering the Next-Generation Analyst - Springer
Pursuit Magazine Social Media and Criminal Investigations
Social Media Tracking & Research Plaintiff | Social Media Monitoring Personal Injury | Social Discovery & eDiscovery | Social Media Evidence
Intelligence & Investigations — AFIMAC Canada
CES PRISM for Social Media Research and Analytics
Intelligence
Using Social Media in Claims Investigations
Advancing Veterans Mental Health - Cohen Veterans Bioscience
Social Media: Covert Investigations | Canada's Leader in Online Learning for Police
CRCnetBASE - Improvised Explosive Devices in Asymmetric Conflicts: Multisource Data Fusion for Providing Situational Information
How police use social networks for investigations | Digital Trends
The Manual - The Essential Guide for Men
ConnectedCOPS.net | Law enforcement's partner on the social web since 2009
7 Tools and Recommendations for Social Media Investigations
Social Media Research
Social Media in Fraud Investigations | Forensic Strategic Solutions
Foreign Policy Research Institute - International Policy Think Tank
Social Networking Fact Sheet | Pew Research Center
X1 Social Discovery - Social media evidence collection for investigations
Use of social network websites in investigations - Wikipedia, the free encyclopedia
FBI — Legal Digest - Social Media: Legal Challenges and Pitfalls for Law Enforcement
SMI | Social Media Information, LLC - Find Social Media Evidence
Demystifying Ontologies and Their Utility for BiomedicineShare event 1 - Google Search
10 tabs
Copy links to clipboard
Copy
Open
Erik Blasch - Google Scholar Citations
Publications - ErikBlasch
dblp: Erik Blasch
dblp: Michael D. McNeese
Erik Blasch - Google Scholar Citations
David L. Hall - Publications
Erik Blasch
Erik Blasch - Publications
James Llinas - Publications
Michael D. Mcneese - Publications
55 tabs
Copy links to clipboard
Copy
Open
USSOCOM Research Topics Publications
Humanitarian Technology: Science, Systems and Global Impact 2016 – 7 – 9 June 2016 | Boston MA
Humanitarian Technology: Science, Systems and Global Impact 2015 | 12 – 14 May 2015 | Boston MA
Questioning Data that Drives the Global War on Terrorism – Homeland Security Digital Library
Key Trends in the Uncertain Metrics of Terrorism | Center for Strategic and International Studies
Comparing Estimates of Key Trends in the Uncertain Metrics of Terrorism - Google Scholar
Analysis | Gulf Security, Stability and Terrorism – Cordesman | SUSRIS
Resident Research Fellow at Booz Allen Hamilton
MMS Paper Topics - Research Topics - Research Guides Home at Library of the Marine Corps
NSO > Home
JSOU Publications - globalECCO
SSI Publications - Military Strategy, National Security, and Regional Security
Home - LibGuides at American Public University System
dblp: James Llinas
Country Studies - Research Topics - Research Guides Home at Library of the Marine Corps
Joint Forces - Research Topics - Research Guides Home at Library of the Marine Corps
Lessons Learned - Research Topics - Research Guides Home at Library of the Marine Corps
Regional Studies - Research Topics - Research Guides Home at Library of the Marine Corps
Bibliographies - Research Topics - Research Guides Home at Library of the Marine Corps
LOMC Home - Library of the Marine Corps - Research Guides Home at Library of the Marine Corps
Home - Marine Corps Topics of Interest - Research Guides Home at Library of the Marine Corps
IEEE Xplore Abstract - Considerations for model curation in model-centric systems engineering
IEEE Xplore Abstract - Network based discrete event analysis for coordination processes in crisis response operations
PLOS ONE: PSOLA: A Heuristic Land-Use Allocation Model Using Patch-Level Operations and Knowledge-Informed Rules
Mining user preferences of new locations on location-based social networks: a multidimensional cloud model approach - Online First - Springer
Home - Default
New Equation Shows How Other People's Fortunes Affect Our Happiness
Adam D.M. Svendsen — E-International Relations
cgsmonitor Afghanistan and Failed State Wars: An Update - cgsmonitor
WHY ARE WE SO BAD AT FIGHTING TERRORISM? - Globalo
NSO > Academics > Resident Courses > Course Catalogue > Course Description
The use of state-of-the-art transport models by policymakers – beauty in simplicity? - Planning Theory & Practice -
e-Study Guide for The Oxford Handbook of National Security Intelligence ... - Cram101 Textbook Reviews - Google Books
SciTech Daily
Publications
USSOCOM Research Topics Publications
Inbox (179) - scitrenbaum@gmail.com - Gmail
Information Operations | Public Intelligence
North Atlantic Treaty Organization | Public Intelligence
Understanding the Non-Linear Event: A Framework for Complex Systems Analysis - International Journal of Intelligence and CounterIntelligence - Volume 25, Issue 3
Project MUSE - Of Note: To Deny and Deceive: The Limits of Counterdeception—an Addendum
Lindoff: Challenges in Utilising Key Leader Engagement... - Google Scholar
Search results for 'Radicalization' | Combating Terrorism Center at West Point
Home - Dropbox
Adam D.M. Svendsen - Google Search
Understanding the globalization of intelligence, by Adam D.M. Svendsen - Journal of Intelligence History - Volume 13, Issue 1
Adam D.M. Svendsen (@intstrategist) | Twitter
Adam D.M. Svendsen on Twitter: "AM: Presentation on #cyber #intelligence #CYBINT @mkppfi #ISMS15 @LEAD_Standards #leadingpractice @futuresstudies #cifsactivities"
Analytic Support to Intelligence in Counterinsurgencies - Google Search
Center for Multisource Information Fusion - Google Search
Course of Action Analysis War Game Results - Google Search
Early Warning Systems: State-of-Art Analysis and Future Directions - Google Search
START.umd.edu
Security Weekly | Stratfor
Understanding the Globalization of Intelligence - Google Search
11 tabs
Copy links to clipboard
Copy
Open
Respmail is a response HTML email designed to work on all major email platforms and smartphones
Cohen Veterans Bioscience - Google+
Melissa Haendel, PhD - Google Search
Download Campbell Biology - 10th Edition (2013).pdf Gooner Torrent - Kickass Torrents
Download Critical Thinking for Students: Learn the Skills of Analysing, Evaluating and Producing Arguments Torrent - Kickass Torrents
GitHub - mit-ll/LL-Fuzzer: An automated NFC fuzzing framework for Android devices.
FBI Facial Recognition Database Ten Times Larger Than Promised, Contains 90% Non-Criminals : Intelligence
Former Shin Bet head ‘bursts myth’ on cyber hackers who attack Israel - Israel News - Jerusalem Post
The Space Review: The wizard war in orbit (part 1): Early American signals intelligence satellites
June 2016 | Combating Terrorism Center at West Point
The Influence of Regional State Actors in Afghanistan’s Political Stability | Small Wars Journal
8 tabs
Copy links to clipboard
Copy
Open
Save $15 On Practically Any $75 Order on eBay, Including Gift Cards
Today's Best Deals: Anker PowerCore 1300, $10 Kitchen Scale, Apple Laptop, and More
Store 5TB (!!) of Files For Just $110
Profile of AhashareTeam - Uploads - Kickass Torrents
Profile of philtoms - Uploads - Kickass Torrents
Download {~DarkU$3R~} Torrents - Kickass Torrents
Profile of Dr.Soc. - Uploads - Kickass Torrents
Profile of ae_tauranga - Uploads - Kickass Torrents
64 tabs
Copy links to clipboard
Copy
Open
Brown Moses Blog: CBRN Threat Assessment For Sochi Winter Olympics
IFTTT Blog - Recipes for following politics
Project Argus
Learn | NTI
The Creative World’s Bullshit Industrial Complex - 99U
mail.app - How to setup Apple Mail so it truly removes email from Google? - Ask Different
lion - Is it safe to remove ~/Library/Mail folders - Ask Different
Nuclear Terrorism: How Serious a Threat to Russia? - Harvard - Belfer Center for Science and International Affairs
casmi : Gallery : nuclear plants map
Just Delete Me | A directory of direct links to delete your account from web services.
Knight Lab | Northwestern University
Online Audio Converter (MP3, WAV, Ogg, WMA, M4A, AAC) – media.io
Author Debriefing: Climate Change and Conflict Prevention · SpyCast · International Spy Museum
STANCE - State-Making and the Origins of Global Order in the Long 19th Century and Beyond - Home
Visualizing the Crisis in Syria
TargetMap - Create & share customized data maps on OpenStreetMap. Free Online Mapping tool
Countering Terrorism and Insurgency in the 21st Century
lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain – an Open Source Inventory | Schmid | Perspectives on Terrorism
8 Great Performances Nobody Is Talking About
What Happens When You Quit Showering? - The Atlantic
A New, Free Tool Lets You Analyze and Archive Twitter Simultaneously - The Atlantic
Create timelines, share them on the web | Timetoast timelines
Featured Sims - Forio Simulate
FoxType
A Socio-Cultural Geospatial Analysis and Modeling Framework in Support of Stability Operations and Infrastructure Applications | GeoDa Center
GitHub - casmi/nuclear-plant-map: Nuclear Plants Map is a viewer for nuclear power plants on the earth. This is one of the grallery projects of casmi.
Investigative Dashboard
Investigative Dashboard - Google Ideas
Compare Lists
twXplorer
VIS. Visual Investigative Scenarios platform: Pages
Nuclear power stations worldwide.csv - Google Fusion Tables
Herbert Tinsley "Terrorism: A Short Course" | START.umd.edu
Threat Crowd | Threatcrowd.org Open Source Threat Intelligence
Phoenix Data Project
Open Data Resources
New Tool to Burst Twitter Rumours | news.sys-con.com
Frontex | Publications
The Fund for Peace
GeoSocial Footprint
Red Teams Needed to Critique Military Operations
Favorite and Forget: 15 Useful Internet Tools
9 Secret Google Search Tricks
View Every App You've Ever Installed on Your Smartphone
Professor Thomas W. Lucas
Data Journalism | Global Investigative Journalism Network
MIT Media Lab: GroupMedia
101+ OSINT Resources for Investigators | i-Sight
10.4: Remove some extraneous Mail mailboxes - Mac OS X Hints
11 Tools to Verify that Online Info - Julie Smith
OneTab shared tabs
University of Foreign Military and Cultural Studies / Red Teaming | US Army Combined Arms Center
PDFPolitics < Dmi < digitalmethods.net
Newsletters Archive - Toddington
JSON to Text Converter - Transform JSON to Plain Text - Online - Browserling Web Developer Tools
Labs & Projects
[1606.04695] Strategic Attentive Writer for Learning Macro-Actions
[1606.04956] Assessing Human Error Against a Benchmark of Perfection
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
arXiv.org Search
CivicApps API Reference : eGovernment Team, City of Portland
Things to Do
Copy links to clipboard
Copy
Open
Lost Lake Resort and Campground - Lost Lake Resort
www.wweek.com
Willamette Week — Portland News, Movies, Music, Restaurants, Arts - Willamette Week
Willamette Week's Oregon Coast Guide - Willamette Week
Thrillist Portland | Best Restaurants, Bars and Things to Do
» Places to Play Table Tennis in Portland, Oregon Paddle Palace
15 tabs
Copy links to clipboard
Copy
Open
AI, Deep Learning, and Machine Learning: A Primer – Andreessen Horowitz
Report: FBI Helps Bust International Nuclear Smuggling Plot Video - ABC News
'Failure in Nuclear Security': The Moldova Wake-Up Call - ABC News
Moldova Seizes Radioactive Uranium, Detains Several People - ABC News
US Concern Over Nuclear Material Smuggling Video - ABC News
ACL Anthology » W15
How To Order Delivery Without Feeling Like Shit, You Lazy Bum
There Should Be A "Soo" For Expressing Emphasis
Women’s connectivity in extreme networks | Science Advances
api.civicapps.org/business-licenses/
Where the Black Flag of ISIS Flies
Articles/Journals - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
Web Resources - INTL454 Forecasting Terrorism | Course Guide - LibGuides at American Public University System
Revisiting the Metsamor Nuclear Power Plant | Armenian Weekly
Army Research Papers - Australian Army
5 tabs
Copy links to clipboard
Copy
Open
Russia Offers to Subsidize Nuclear Plant | Asbarez.com
Application of the Theory of Inventive Problem Solving in Tunnel Construction: Journal of Construction Engineering and Management: (ASCE)
Russia to Fund Component of Armenia’s New Nuclear Plant | Asbarez.com
Pile Responses Caused by Tunneling: Journal of Geotechnical and Geoenvironmental Engineering: (ASCE)
Journal of Construction Engineering and Management - 131(10):1099 - PDF (ASCE)
24 tabs
Copy links to clipboard
Copy
Open
What is Root Cause Analysis (RCA)? | ASQ
ASSERT Toolkit for Societal Impact Assessment in Security Research | Assessing Security Research – Tools and Methodologies to Measure Social Impact
VERGE | Video Search Engine
Multimedia Knowledge and Social Media Analytics Laboratory
YFCC
REVEAL | Multimedia Knowledge and Social Media Analytics Laboratory
Successful participation of CERTH-ITI in the interactive Surveillance Event Detection task of TRECVID 2015 | Multimedia Knowledge and Social Media Analytics Laboratory
USEMP | Multimedia Knowledge and Social Media Analytics Laboratory
Event-oriented sentiment-annotated Twitter datasets | Multimedia Knowledge and Social Media Analytics Laboratory
Visual features and search index for Flickr 100M corpus | Multimedia Knowledge and Social Media Analytics Laboratory
SocialSensor (co-ordinator) | Multimedia Knowledge and Social Media Analytics Laboratory
Research | Multimedia Knowledge and Social Media Analytics Laboratory
Semantic multi-sensor fusion | Multimedia Knowledge and Social Media Analytics Laboratory
Reveal
REVEAL | Social Media Verification
Use Cases | REVEAL
Systems Analysis Laboratory: Frontpage
Systems Analysis Laboratory: Web resources
NORAD Catalog
Why Political Instability Forecasts Are Less Precise Than We’d Like (and Why It’s Still Worth Doing) | Dart-Throwing Chimp
When Forecasting Rare Events, the Value Comes from the Surprises | Dart-Throwing Chimp
ICEWS | Dart-Throwing Chimp
Yes, Forecasting Conflict Can Help Make Better Foreign Policy Decisions | Dart-Throwing Chimp
Down the Country-Month Rabbit Hole | Dart-Throwing Chimp
This page has been deleted.
To enable your browser to open multiple tabs at once, please install the OneTab extension.
Install OneTab
Note: This feature only works with the newest version of OneTab. If you are using an older version, please DO NOT uninstall OneTab, as this will cause you to lose your OneTab data. Instead, wait a few days while we gradually make the new version of OneTab available to all existing users.