Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Counterintelligence

Surveillance State: The F.B.I.’s Growing Surveillance Gap

Posted on 17 June 2016 by The Tactical Hermit

There are more homegrown jihadists than the feds can actually watch. And not everyone likes what the FBI is doing instead. A day after Omar Mateen killed 49 and wounded 53 in an Orlando nightclub, purportedly under the banner of the Islamic State or other terrorist groups, the FBI announced that it had repeatedly scrutinized…

Continue reading

Espionage Files: Elite Hamas Commander Reportedly Defects to Israel

Posted on 15 June 2016 by The Tactical Hermit

A senior member of the military wing of Hamas, the Palestinian militant group that governs the Gaza Strip, is believed to have defected to Israel. News of the rumored defection first appeared on the website of Al-Hayat al-Jadida, the official newspaper of the Palestinian Authority, which is based in the West Bank. On Tuesday, Al-Hayat…

Continue reading

Surveillance State: DIVA Software Designed to Spot Suspicous Behavior BEFORE it Happens

Posted on 7 June 2016 by The Tactical Hermit

The program is called Deep Intermodal Video Analytics—or DIVA—and it seeks to locate shooters and terrorists before they strike. The intelligence community is working on amping up people-recognition power to spot, in live videos, shooters and potential terrorists before they have a chance to attack. Part of the problem with current video surveillance techniques is the difficulty…

Continue reading

Espionage Files: Low Profile Terror Attack in Jordan Kills 3 Jordanian GID Officers

Posted on 7 June 2016 by The Tactical Hermit

A rare armed attack on a Jordanian intelligence agency facility has left five people dead, including three intelligence officers. The attack took place on Monday at the General Intelligence Department (GID) building in the Baqa’a refugee camp, located just north of the capital Amman. Built in 1968, Baqa’a is the largest of Jordan’s 10 government-sanctioned…

Continue reading

Espionage Files: North Korea’s Shadow War, Part IV

Posted on 2 June 2016 by The Tactical Hermit

South Korea’s Covert Operations in North Korea After Pyongyang attacked Seoul in the late 1960s, the South counterattacked This is the fourth story in a series. Read parts one, two and three. In the late 1960s, North Korea unleashed a guerrilla war on South Korea, sending spies and special operations troops across the Military Demarcation…

Continue reading

Future Warfare: 21st Century DIY Insurgency

Posted on 23 May 2016 by The Tactical Hermit

It started innocuously enough. The prime minister-for-life never missed the annual “Liberation Day” parade. With the drums and platoons thundering, nobody noticed as the quadcopter, barely larger than a sparrow, floated down toward the dais, its faint whirr drowned out by the industrial machinery rolling by in formation. It was at once a child’s birthday…

Continue reading

Military News: China and Russia Field “Anti-Stealth” Drones

Posted on 23 May 2016 by The Tactical Hermit

Both China and Russia appear to be building unmanned aerial vehicles designed to negate America’s advantages in stealth aircraft. Earlier this year, photos first emerged of a new High Altitude, Long Endurance (HALE) UAV termed the Divine Eagle that foreign observers believe is designed to detect and eliminate stealth enemy aircraft far from the Chinese…

Continue reading

Surveillance State: Inside The NSA’s Real-Time Regional Gateway (RT-RG)

Posted on 18 May 2016 by The Tactical Hermit

It is a very common trend to see “Counter-Terrorism” programs and technology that were once used to save American Military and Civilian lives in war get re-directed to spy on American citizens in Peace time. This is something to keep in mind with this program. -SF Relentless attacks on American military personnel at the height…

Continue reading

Surveillance State: Everything We Know About How the FBI Hacks People

Posted on 17 May 2016 by The Tactical Hermit

RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…

Continue reading

The Surveillance State: Twitter and Data Mining

Posted on 9 May 2016 by The Tactical Hermit

Twitter has barred Dataminr, a service that analyzes tweets from across the globe to inform users about news events, from providing its information to US intelligence agencies, according to the Wall Street Journal. The social network has not confirmed that it cut the agencies off from the service, which claims to have informed clients about the…

Continue reading
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 18
  • Next

Tactical Hermit Substack

Recent Post

  • Jew Watch: Arsonist Jew Shenaningans in Argentina
  • Musical Interlude
  • Lock and Load
  • Texas News: Brandon Herrera wins GOP’s 23rd Congressional District Seat
  • In Memoriam: Coach Lou Holtz

Buy Me a Coffee

General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

Wyoming Survival

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

The Feral Irishman

Bustednuckles

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Jack Lawson Books

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2026 | Powered by Minimalist Blog WordPress Theme