Skip to content
Menu
  • Original Short Fiction
Menu

Category: Computer Related

Crusader Corner: Entire Church on ISIS Kill List – Names Taken From Online Church Directories

Posted on 9 August 2016 by The Tactical Hermit

Entire church in U.S. on ISIS kill lists (click link above to be re-directed to original page) Christian church security is nothing new in the age of islamic terrorism, many mid to large capacity churches have either hired armed security or encouraged their parishioners to form their own security details during services. This current threat…

Continue reading

Surveillance State: Proof “Being the Gray Man” is an Urban Myth

Posted on 5 August 2016 by The Tactical Hermit

Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you.   It’s time to come to terms with the fact that regardless of how “off the grid” or “careful” or “Gray” you THINK you are online, you have been made. An extensive online profile exist…

Continue reading

OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges

Posted on 12 July 2016 by The Tactical Hermit

There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded.  Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…

Continue reading

Surveillance State: Secret Rules Make it Easy for the FBI to Spy on Journalist

Posted on 1 July 2016 by The Tactical Hermit

SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures. The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a…

Continue reading

Deconstructing Terrorism: World-Check Terrorism Database Exposed

Posted on 30 June 2016 by The Tactical Hermit

A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…

Continue reading

Surveillance State: Hackers Have Found a Pulsating New Way to Spy on You on Your Phone and FitBit

Posted on 8 June 2016 by The Tactical Hermit

Hackers may be pickin’ up good vibrations from your phone. All the better to surveil you with, my dear. Researchers at the Electrical and Computer Engineering school of the University of Illinois at Urbana-Champaign discovered that the vibration motor in your devices can operate like a microphone, according to the researchers’ paper. That means, if…

Continue reading

Technology: Sci-Fi Classics That Accurately Predicted the Future

Posted on 27 May 2016 by The Tactical Hermit

With all this talk lately of “Minority Report” type technology in Bio-Metrics and other Security apparatus, I thought it would be interesting to look at other sci-fi movies that nailed it as far as actual current or “coming soon” technology. -SF   Did you know a kid’s cartoon predicted 3D-printed food in 1962? Or that…

Continue reading

Surveillance State: The FBI’s Secret Biometric Database

Posted on 24 May 2016 by The Tactical Hermit

FBI wants to keep secret who’s stored in its massive biometric database The FBI said it would retain the data to “aid in establishing patterns of activity” to help discover new criminals when they arise. The FBI is proposing keeping information that it stores as part of a massive biometric database private — even to…

Continue reading

Cyber-Security Threat Update: Don’t Get Juice-Jacked

Posted on 20 May 2016 by The Tactical Hermit

You are racing through the airport. The low power light is blinking red. You are desperate to plug into any outlet you can find. Watch out. You could get juice jacked. Guess what? In every smart phone—no matter what the model—power and data flow through the same USB port and power cable. That creates a potential attack…

Continue reading

Surveillance State: Everything We Know About How the FBI Hacks People

Posted on 17 May 2016 by The Tactical Hermit

RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…

Continue reading
  • Previous
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 16
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme