Meeting Meeting Topic and Resources
1 Private, Secure, and Anonymous Internet Browsing Anonymous Internet Browsing
2 Unlocking Your Smartphone's Full Potential Smartphones: Unlocking there potential
3 Counterintelligence: Doxxing, Information Brokers, and More Counterintelligence
4 Virtual Machines: A Comparison of Virtual Technologies in IA Virtual Machines
5 NSA Recommendations and their elite hacking unit NSA Best Practices and TAO Unit
6 Digital Forensics Workshop and/or Middle Eastern Cyber-war Capabilities