| Meeting | Meeting Topic and Resources |
|---|---|
| 1 | Private, Secure, and Anonymous Internet Browsing Anonymous Internet Browsing |
| 2 | Unlocking Your Smartphone's Full Potential Smartphones: Unlocking there potential |
| 3 | Counterintelligence: Doxxing, Information Brokers, and More Counterintelligence |
| 4 | Virtual Machines: A Comparison of Virtual Technologies in IA Virtual Machines |
| 5 | NSA Recommendations and their elite hacking unit NSA Best Practices and TAO Unit |
| 6 | Digital Forensics Workshop and/or Middle Eastern Cyber-war Capabilities |