Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Computer Related

AI Generated CCTV Footage Non-Admissible?

Posted on 30 November 2023 by The Tactical Hermit
Continue reading

Sign of Sporky Times to Come?

Posted on 29 November 2023 by The Tactical Hermit

Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group   As we move forward toward what is sure to be a Sporky New Year, remember the basics of Fourth Generation Warfare, with the most fundamental being Cyber-Attacks. If this is a pre-cursor of what is to come, expect more attacks like these on banking…

Continue reading

Cyber-Crime 101: How Hacker’s Launder Their Stolen Loot

Posted on 17 November 2023 by The Tactical Hermit

Hackers Use Online Casinos to Gamble Mountains of Cash They Steal from Victims   I find it fascinating that despite how complex things become in the cyber-world, the fundamentals of crime remain the same. Criminals will always have to launder their ill-gotten gains somehow and casino’s, especially online casinos, provide the best way to do…

Continue reading

Cyber Crime: SIM Swappers Are Working Directly with Ransomware Gangs Now

Posted on 28 October 202328 October 2023 by The Tactical Hermit

SIM Swappers Are Working Directly with Ransomware Gangs Now   In a highly unusual marriage in the cybercrime underground, English-speaking members of “the Comm,” a wide spanning entity that includes SIM swappers and physically violent criminals, are working with the Eastern European ransomware group called ALPHV, two cybersecurity industry sources told 404 Media. 404 Media…

Continue reading

Riskmap

Posted on 22 October 202322 October 2023 by The Tactical Hermit

  Riskmap is a free global monitoring platform which Sources data from global media and social channels. Their intelligence engine continuously monitors thousands of sources in multiple languages which filter out the noise and enpower you to extract useful information to provide accurate intelligence insights. Riskmap is a free threat assessment service that requires an…

Continue reading

You Heard it From the Hermit First!

Posted on 3 September 20233 September 2023 by The Tactical Hermit

ICE SVU Doesn’t Want To Know About Alien Smugglers Thank You Vdare for confirming my article! Texas Border News: More Proof The Feds are more Interested in Subsidizing rather than Stopping the Invasion. Just remember, You heard it here first folks!    

Continue reading

You Supply the Pictures, I’ll Supply the War

Posted on 3 September 20233 September 2023 by The Tactical Hermit

You supply the pictures. I’ll supply the War   When you combine the recent article of Govt. Agencies employing AI to both censor and deceive the general public with the past shenanigans of one William Randolph Hearst, you have a 100% bonafide WARNING! Remember: There is nothing new under the Sun and Government’s don’t change…

Continue reading

Mass Censorship and Deception Courtesy of AI

Posted on 2 September 20232 September 2023 by The Tactical Hermit

H/T Montana A   USSOCOM to Use AI to Detect Disinformation Threats on Social Media   For an Example of how AI can be used for Mass Deception, check out this Deep Fake of DeSantis “Dropping Out” of the 2024 Presidential Race.     Tell me that does not look like a Polished Media Sound…

Continue reading

The Surveillance State: The A.I. Surveillance Tool DHS Uses to Detect ‘Sentiment and Emotion’

Posted on 26 August 2023 by The Tactical Hermit

H/T Lenny Ladner     The A.I. Surveillance Tool DHS Uses to Detect ‘Sentiment and Emotion’   Customs and Border Protection (CBP), part of the Department of Homeland Security, has bought millions of dollars worth of software from a company that uses artificial intelligence to detect “sentiment and emotion” in online posts, according to a…

Continue reading

Comm Corner: Encrypted Radio Comms Compromised

Posted on 29 July 2023 by The Tactical Hermit

H/T WRSA   An Intentional Backdoor discovered in Encrypted Radio Comms used Globally for over 25 years.   Via Source Article from WIRED.   This backdoor could allow someone to snoop on communications and potentially send harmful commands. The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications…

Continue reading
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • …
  • 16
  • Next

Tactical Hermit Substack

Recent Post

  • ISIL Affiliated ADF Slaughters 49 Christians in Brutal Machete Attack in DR Congo
  • Jew’s and Satanic Child Rape and Sacrifice: Not just an Urban Myth
  • The Most Redneck Man in the World
  • White Boy Summer
  • Black Fatigue #100
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme