Skip to content
Menu
  • Original Short Fiction
Menu

Category: Computer Related

Security Firm Warns of NEW Chinese Cyber Attacks

Posted on 4 February 2016 by The Tactical Hermit

China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…

Continue reading

Israel: Quietly Rising as a Cyber Super-Power in the Middle East

Posted on 30 January 2016 by The Tactical Hermit

Israel now has more than 300 cybersecurity companies, exports totaling $6 billion, and 20 percent of the world’s private cyber investment dollars. Cybertech 2016 convened this week in Tel Aviv, and I was in the audience for Prime Minister Benjamin Netanyahu’s plenary address, courtesy of the America-Israel Friendship League and the Israeli Foreign Ministry. Israel has an ambitious…

Continue reading

Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System

Posted on 29 January 2016 by The Tactical Hermit

OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the…

Continue reading

Sharpen Your Cyber-Skills: NSA Hacker Chief Explains How to Keep Him OUT of Your System

Posted on 29 January 2016 by The Tactical Hermit

IT WAS THE talk most anticipated at this year’s inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to hear. Rob Joyce, the nation’s hacker-in-chief, took up the ironic task of telling a roomful of computer security professionals and academics how to keep people like him and his…

Continue reading

Device OPSEC: If You Use an LG Device, Read This!

Posted on 28 January 2016 by The Tactical Hermit

Millions of LG phones at risk, Israeli team discovers For the second time in a month, researchers at cyber-security firms BugSec and CyNet have discovered a major security problem that leaves tens of millions of users at risk For the second time in a month, an Israeli team has uncovered a major security breach built…

Continue reading

Chinese Military Revamps Cyber and Intelligence Capabilities

Posted on 27 January 2016 by The Tactical Hermit

This story reminds me of Paul Newman’s famous line in the scene from Cool Hand Luke where the “Road Boss” with the Mirror sun glasses Shoots a bird flying with a rifle with one shot: “That man don’t say much, but I think he just said something right there….” The Chinese are continuously making statements…

Continue reading

Humor: New DOD Regulations Confirm that OPSEC Does Not Apply to Everyone

Posted on 25 January 2016 by The Tactical Hermit

I always get a kick out of the Duffel Blog. This is what Everybody is thinking and this is what should be printed versus the spin and outright lies. -SF   THE PENTAGON — The Department of Defense is set to release new security rules later this week, making it clear that consequences for violations don’t apply…

Continue reading

Singularity- Future Tense or Tense Future?

Posted on 22 January 2016 by The Tactical Hermit

A Sci-Fi short story about homeland security at the edge of humanity   Singularity Secretary Turing was still half asleep, restlessly tossing in bed, trying to shake the visceral angst she had been building up throughout the night. She was somnolent enough to continue her dream yet awake enough to realize it was rapidly becoming…

Continue reading

The Encryption Debate: Is Privacy More Important Than National Security?

Posted on 17 January 2016 by The Tactical Hermit

The title to this article IMHO, aims to make the reader CHOOSE SIDES as to what is more important, Privacy or National Security. I propose to you that the expectation of Privacy, which is clearly defined in the 4th Amendment, and the DEFENSE of that Right, is what makes the United States unique as a…

Continue reading

An Easy Way for Hackers to Burn Industrial Motors

Posted on 13 January 2016 by The Tactical Hermit

HACKS THAT CAUSE physical destruction are so rare they can be counted on one hand. The infamous Stuxnet worm was the first, causing physical destruction of nuclear centrifuges in Iran in 2009. In 2014, Germany reported the second known case of physical destruction involving a furnace at a steel mill. Both of these attacks required…

Continue reading
  • Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • Next

Tactical Hermit Substack

Recent Post

  • AK Corner: VZ58 – The Most Overlooked Capable Rifle Today
  • Race Reality 101: Anybody Can Make a Helicopter and Fly Right?
  • Morning Laugh
  • Bee PSA
  • Evening Laugh
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme