Skip to content
Menu
  • Original Short Fiction
Menu

Category: Cyber-Warfare

Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)

Posted on 23 November 2015 by The Tactical Hermit

  In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…

Continue reading

The Truth about Terrorist and Encryption Technology

Posted on 21 November 2015 by The Tactical Hermit

Terrorists were using encryption technology to evade detection long before Snowden and the Paris attacks By Natasha Bertrand A wave of coordinated terror attacks that killed at least 130 people in Paris last week have had experts grappling with how French intelligence could have missed an operation that was most likely months in the making….

Continue reading

The Civilian Guide to Fighting ISIS Online

Posted on 19 November 2015 by The Tactical Hermit

Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t   In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS…

Continue reading

Where Americans Can Be Tracked Without A Warrant

Posted on 16 November 2015 by The Tactical Hermit

Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via “Dark Comms” or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the “Surveillance” net wider to compensate, meaning more…

Continue reading

TOR Browser Compromised by Feds?

Posted on 12 November 2015 by The Tactical Hermit

Say it ain’t so! EVER SINCE A Carnegie Mellon talk on cracking the anonymity software Tor was abruptly pulled from the schedule of the Black Hat hacker conference last year, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet’s anonymous…

Continue reading

Tradecraft: Geo-Locating by Photos

Posted on 9 November 2015 by The Tactical Hermit

They say photos say a 1,000 words; well in the 21st Century they can also tell your exact location. -SF Russian soldiers geolocated by photos in multiple Syria locations, bloggers say By Maria Tsvetkova MOSCOW (Reuters) – Three serving or former Russian soldiers have been geolocated by photographs in Syria, including locations near Hama, Aleppo…

Continue reading

Islam Invasion: Islamic State hackers post phone numbers of heads of the CIA and FBI

Posted on 9 November 2015 by The Tactical Hermit

ISIS is now in the same league as North Korea, China and Russia when it comes to cyber-threats. Welcome to the Fifth Dimension of Warfare folks.-SF “ISIS ‘cyber caliphate’ hacks 54,000 Twitter accounts and posts phone numbers of heads of the CIA and FBI in revenge for the drone attack that killed a British extremist,”…

Continue reading

The Social Science of Online Radicalization

Posted on 30 October 2015 by The Tactical Hermit

As Charlie Winter noted recently at War on the Rocks, the Islamic State’s robust social media apparatus has been propagating a remarkably effective, multi-faceted communications strategy that incorporates narratives of statehood, military success, and religious legitimacy. The Islamic State’s success in using social media to disseminateits extremist ideas and mobilize tens of thousands of foreign…

Continue reading

It is Time for the U.S. Military to Innovate like Insurgents

Posted on 28 October 2015 by The Tactical Hermit

These three Army captains built a gun that kills drones. It took them ten hours and cost $150. What can the Army learn from them? The recently concluded meeting of the Association of the United States Army (AUSA) has become a yearly tradition for senior military leaders, congressional staff, and members of foreign armies to…

Continue reading

Facebook Friend or Terrorist: Who’s in Your Online Social Network?

Posted on 24 October 2015 by The Tactical Hermit

As a law enforcement officer in Northeast Florida, the arrest of a 19-year-old local man named Shelton Thomas Bell got my attention. In January of this year, Bell was sentenced to twenty years in federal prison for conspiring and attempting to provide material support to terrorists. He burned American flags, recruited support locally, conducted “training…

Continue reading
  • Previous
  • 1
  • …
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • …
  • 20
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme