MeetingMeeting Topic and Resources
1Private, Secure, and Anonymous Internet Browsing Anonymous Internet Browsing
2Unlocking Your Smartphone's Full Potential Smartphones: Unlocking there potential
3Counterintelligence: Doxxing, Information Brokers, and More Counterintelligence
4Virtual Machines: A Comparison of Virtual Technologies in IA Virtual Machines
5NSA Recommendations and their elite hacking unit NSA Best Practices and TAO Unit
6Digital Forensics Workshop and/or Middle Eastern Cyber-war Capabilities