Meeting | Meeting Topic and Resources |
---|---|
1 | Private, Secure, and Anonymous Internet Browsing Anonymous Internet Browsing |
2 | Unlocking Your Smartphone's Full Potential Smartphones: Unlocking there potential |
3 | Counterintelligence: Doxxing, Information Brokers, and More Counterintelligence |
4 | Virtual Machines: A Comparison of Virtual Technologies in IA Virtual Machines |
5 | NSA Recommendations and their elite hacking unit NSA Best Practices and TAO Unit |
6 | Digital Forensics Workshop and/or Middle Eastern Cyber-war Capabilities |