Skip to content
Menu
  • Original Short Fiction
Menu

Category: Cyber-Warfare

Approaching UAV’s as a CO Skill-Set and not just a Weekend Hobby

Posted on 3 August 2015 by The Tactical Hermit

  The civilian operator has to understand that the future of conflict, regardless if it is domestic or foreign, is going to involve technology on a massive scale. With hybrid warfare now being perfected by both state and non-state actors, the civilian operator/prepper needs to plan on also using a combination of conventional, asymmetrical and…

Continue reading

Going Grey: The TOR Browser

Posted on 2 August 2015 by The Tactical Hermit

**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.**     Since I come to the conclusion there is no such…

Continue reading

Hackers can Disable a Sniper Rifle-or Change it’s Target

Posted on 29 July 2015 by The Tactical Hermit

Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…

Continue reading

Vehicle Ambush v2.0

Posted on 24 July 2015 by The Tactical Hermit

  The definition of hybrid warfare designates a combination of tactics and strategies; some from the conventional school, some from the asymmetrical and some from the cyber. It is this integration of cyber techniques that can make traditional and asymmetric battlefield strategies much more deadly and efficient. Imagine this: a small insurgent force, (platoon strength…

Continue reading

Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth

Posted on 22 July 2015 by The Tactical Hermit

In response to a recent article in Motherboard, Mr. A had this to say….     This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…

Continue reading

Ever Wonder Which Words Will Flag You as a Terrorist?

Posted on 15 July 2015 by The Tactical Hermit

I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”.  by Joshua Krause   By now, we all know that the NSA is spying on us. They…

Continue reading

“This is not your Grandfathers Al-Qaeda”

Posted on 14 July 2015 by The Tactical Hermit

FBI Director James Comey made this statement in front of the Senate Judiciary Committee this past Wednesday in talking about ISIS. And although, not the main topic of discussion, one could since from the tone of all involved that ISIS continues to be a MAJOR concern to our Government, both in their campaigns in Iraq and…

Continue reading

Backdoor Gov’t Encryption: Is it about Criminals or about you?

Posted on 10 July 2015 by The Tactical Hermit

by Mr. A (HCS’ Resident Cyber-Gandalf) A lot of citizens would immediately think they should so that the government could better catch criminals and terrorist. After all, wouldn’t all of us want terrorist stopped and criminals caught? Of course we would. Does backdoor encryption access accomplish this, or is there something else at work? Here’s…

Continue reading

And This is How War Starts…

Posted on 10 July 2015 by The Tactical Hermit

NATO missile system hacked remotely by ‘foreign source’ JULY 10, 2015 BY JOSEPH FITSANAKIS   A Patriot missile system stationed in Turkey by the North Atlantic Treaty Organization (NATO) was allegedly hacked by a remote source, according to reports. German magazine Behörden Spiegel said this week that the hacked missile system is owned and operated by…

Continue reading

Mandating Insecurity?

Posted on 9 July 2015 by The Tactical Hermit

  The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then…

Continue reading
  • Previous
  • 1
  • …
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme