Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Cyber-Skills

Cyber-Crime: JP Morgan Invents Algorithm to “Sniff Out” Rogue Traders

Posted on 21 February 2016 by The Tactical Hermit

I swear every day we get closer to the movie “Minority Report” being a reality..the “authorities” knowing you are guilty of a crime before you commit it! Combine this with the current fight with Apple and the FBI you start to see the big SCARY picture. -SF   Wall Street traders are already threatened by…

Continue reading

Cyber-Warfare: Nitro-Zeus

Posted on 20 February 2016 by The Tactical Hermit

A new documentary on “Stuxnet”, the joint U.S.-Israeli attack on Iran’s nuclear program, reveals it was just a small part of a much bigger cyber operation against the nation’s military and civilian infrastructure under the code name “NITRO ZEUS” The United States hacked into critical civilian and military infrastructure in Iran to allow its operatives…

Continue reading

Seven Ways Crowd-Sourcing is Changing Society

Posted on 19 February 2016 by The Tactical Hermit

I highly Recommend everybody read the book Future Crimes by Marc Goodman to get an in-depth look at how deep this cyber rabbit hole really goes. And really read those “Service Agreements” and “Privacy Statements” before you download that next free app!-SF The term was coined in 2005 when businesses began attempting to gather data…

Continue reading

Apple’s FBI Battle is Complicated, Here is What is Really Going On

Posted on 19 February 2016 by The Tactical Hermit

  THE NEWS THIS week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation. Those who support the government say Apple has cooperated in the past to unlock dozens of phones in other cases—so why…

Continue reading

Crusader Corner: FBI Unable to Crack San Bernardino Killers Cell Phone

Posted on 10 February 2016 by The Tactical Hermit

Wow. Mind Boggling. One of the biggest, bloated bureaucracies on the planet and we cannot crack a damn cell phone? I mean consider the resources at hand: we have the monstrosity that is the DHS, the NSA, CIA, DIA and still no dice on a cell phone? Something tells me the FBI is back to…

Continue reading

Cyber Crime Update: Cyber Criminals Getting Smarter, More Sophisticated and More Organized

Posted on 8 February 2016 by The Tactical Hermit

Just this morning alone I have received two specially crafted scam emails from cyber criminals targeting unsuspecting Nigerians (mostly those that have bank accounts). I must say I am impressed! I almost fell for this scam email even with my years of Information Security Research and Ethical Hacking. The reasons I almost fell for this…

Continue reading

Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees

Posted on 8 February 2016 by The Tactical Hermit

If the account given below is accurate, it will not matter HOW MUCH  money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF   A hacker, who wishes to…

Continue reading

The Espionage Economy

Posted on 7 February 2016 by The Tactical Hermit

U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…

Continue reading

Security Firm Warns of NEW Chinese Cyber Attacks

Posted on 4 February 2016 by The Tactical Hermit

China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…

Continue reading

Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System

Posted on 29 January 2016 by The Tactical Hermit

OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the…

Continue reading
  • Previous
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • Next

Tactical Hermit Substack

Recent Post

  • Young Men, Political Violence is Your Obligation
  • Morning Laugh
  • Freikorps v2.0
  • On the 24th Anniversary of 9/11 Sharia Law Patrols make their rounds in Houston, Texas
  • White Self-Preservation
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme