Skip to content
Menu
  • Original Short Fiction
Menu

Category: Cyber-Warfare

Going Inside the Ukrainian Power Grid Hack

Posted on 4 March 2016 by The Tactical Hermit

IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…

Continue reading

Why You Should More Afraid of Apple than the Feds

Posted on 1 March 2016 by The Tactical Hermit

I know I suggest this book alot, but you need to read Future Crimes by Marc Goodman. It will absolutely open your eyes to how companies like Apple, Microsoft and the thousands of other Data Brokers out there COLLECT your personal, private information and then treat it as a valuable commodity to be bought and…

Continue reading

Cyber-Security: Googles New “Neural Network” can Locate the Location of any Photo on the Web

Posted on 26 February 2016 by The Tactical Hermit

For those of you that are “seasoned” Science Fiction fans like myself, perhaps you remember the movie 2001: A Space Odyssey and the HAL Computer? Yeah this “neural network” called PLaNET kinda reminds me of that…unsettling in a way, no? -SF   Here’s a tricky task. Pick a photograph from the Web at random. Now…

Continue reading

Why You Should Side With Apple and Not the FBI in the San Bernardino I-Phone Case

Posted on 25 February 2016 by The Tactical Hermit

I have the utmost respect for Bruce. The man knows his stuff and is the final word in topics of this sort. -SF By Bruce Schneier Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight this order…

Continue reading

Cyber-Warfare: Nitro-Zeus

Posted on 20 February 2016 by The Tactical Hermit

A new documentary on “Stuxnet”, the joint U.S.-Israeli attack on Iran’s nuclear program, reveals it was just a small part of a much bigger cyber operation against the nation’s military and civilian infrastructure under the code name “NITRO ZEUS” The United States hacked into critical civilian and military infrastructure in Iran to allow its operatives…

Continue reading

Seven Ways Crowd-Sourcing is Changing Society

Posted on 19 February 2016 by The Tactical Hermit

I highly Recommend everybody read the book Future Crimes by Marc Goodman to get an in-depth look at how deep this cyber rabbit hole really goes. And really read those “Service Agreements” and “Privacy Statements” before you download that next free app!-SF The term was coined in 2005 when businesses began attempting to gather data…

Continue reading

Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees

Posted on 8 February 2016 by The Tactical Hermit

If the account given below is accurate, it will not matter HOW MUCH  money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF   A hacker, who wishes to…

Continue reading

The Espionage Economy

Posted on 7 February 2016 by The Tactical Hermit

U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…

Continue reading

Security Firm Warns of NEW Chinese Cyber Attacks

Posted on 4 February 2016 by The Tactical Hermit

China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…

Continue reading

Can China be Deterred in Cyber-Space?

Posted on 3 February 2016 by The Tactical Hermit

Deterring state actors from attacks that do not reach the level of force is difficult. If we look at the cyber realm, the effectiveness of deterrence depends on who (state or non-state) one tries to deter and which of their behaviors.  Ironically, deterring major states like China from acts of force may be easier than…

Continue reading
  • Previous
  • 1
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 20
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme