Skip to content
Menu
  • Original Short Fiction
Menu

Category: Cyber-Skills

Examining Terrorist Tactics: The Jihadist Comms Toolkit

Posted on 25 July 2016 by The Tactical Hermit

A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…

Continue reading

4GW: Cyberpower Crushes Coup in Turkey

Posted on 16 July 2016 by The Tactical Hermit

Rewriting the Rulebook on coups, time to add cyberpower   Mere hours after the putsch in Turkey has failed, it is still too early to understand exactly what went on. Given those constraints, I still want to discuss something which has altered “the game” so much that the existing guidebook needs to be significantly revised….

Continue reading

OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges

Posted on 12 July 2016 by The Tactical Hermit

There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded.  Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…

Continue reading

Modern Crime: Is This A Vast Government Conspiracy or Just A Simple Story About Revenge?

Posted on 6 July 2016 by The Tactical Hermit

This is a really good object lesson in adhering to the old adage by Edgar Allen Poe: “Believe only HALF of what you SEE and NOTHING that you HEAR.” -SF Who is this man who seems to die in every terrorist attack?   If you’ve clicked on any articles about the victims of recent terror…

Continue reading

Deconstructing Terrorism: World-Check Terrorism Database Exposed

Posted on 30 June 2016 by The Tactical Hermit

A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…

Continue reading

Espionage Files: Surveillance For Hire In Africa

Posted on 24 June 2016 by The Tactical Hermit

In July 2012, one year after the Arab Spring shook Arab regimes around the world, an email appeared in the inbox of Mamfakinch, a Moroccan online publication critical of the government. Under the subject line “dénonciation” — French for “denunciation” — was a single sentence. “Please don’t use my name or anything else, I don’t want any trouble.” And…

Continue reading

Cyber-War: The Big Hack of NYC

Posted on 21 June 2016 by The Tactical Hermit

A scenario that could happen based on what already has.   On December 4, 2017, at a little before nine in the morning, an executive at Goldman Sachs was swiping through the day’s market report in the backseat of a hired SUV heading south on the West Side Highway when his car suddenly swerved to the…

Continue reading

Surveillance State: The F.B.I.’s Growing Surveillance Gap

Posted on 17 June 2016 by The Tactical Hermit

There are more homegrown jihadists than the feds can actually watch. And not everyone likes what the FBI is doing instead. A day after Omar Mateen killed 49 and wounded 53 in an Orlando nightclub, purportedly under the banner of the Islamic State or other terrorist groups, the FBI announced that it had repeatedly scrutinized…

Continue reading

Modern Crime: Will Cyber-Assassinations Soon Be A Reality?

Posted on 12 June 2016 by The Tactical Hermit

As we hurtle forward into the digital, connected future, ever more objects are becoming targets for hackers and malicious software. Where once hacks only affected computers, they now bring down everything from cars to power grids and thermostats to secretive nuclear enrichment programs. So how long until a hack doesn’t just cause a nuisance or…

Continue reading

Modern Crime: Inside a Russian Hacker Ring

Posted on 12 June 2016 by The Tactical Hermit

A man with intense eyes crouches over a laptop in a darkened room, his face and hands hidden by a black ski mask and gloves. The scene is lit only by the computer screen’s eerie glow. Exaggerated portraits of malicious hackers just like this keep popping up in movies and TV, despite the best efforts…

Continue reading
  • Previous
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • Next

Tactical Hermit Substack

Recent Post

  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
  • The Great Anti-Southern Psyop!
  • Know Your White History: Rudolf Diesel and Clessie Cummins
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme