Skip to content
Menu
  • Original Short Fiction
Menu

Category: Cyber-Warfare

The Surveillance State: Big Brother Will Soon Be Able To Legally Hack You

Posted on 15 September 2016 by The Tactical Hermit

The Feds Will Soon Be Able to Legally Hack Almost Anyone (click on the above link to be re-directed to source page) Well if you have been keeping up, this is no friggin’ surprise. But like all things, there is a work around to Big Brother’s antics. Remember, A Civilian Operator’s Cyber skill-set in the…

Continue reading

Cyber-Warfare Update: iPhone Weaknesses Made Apparent by Israeli “Digital Arms” Company

Posted on 26 August 2016 by The Tactical Hermit

Apple boosts iPhone security after Israeli spyware reveals startling weaknesses (click on above link to be re-directed to source page)   Leave it to a bunch of retired Mossad Cyber-Spies to start up a “Digital Arms” Company and wreak havok on the most “secure phone on the planet”. The Silicon “Wadi” not Valley, Strikes Again!…

Continue reading

Surveillance State: Ways Your Wi-Fi Router Can Spy on You

Posted on 25 August 2016 by The Tactical Hermit

All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…

Continue reading

Cyber-Warfare for Sale

Posted on 16 August 2016 by The Tactical Hermit

Hackers claim to auction NSA source code (click above title link to be re-directed to Source page) More shenanigans from State Sponsored hacking groups most likely. Just another reminder that we have not yet begun to see the true capabilities of what warfare in the fifth domain entails. Stay Alert, Stay Armed and Stay Dangerous!

Continue reading

Cyber Threats – 3 Easy Steps To Getting Your Door Kicked In

Posted on 9 August 2016 by The Tactical Hermit

By Mr. A The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart  phones, and tablets really understand…

Continue reading

Espionage Files: Brit Spies Used URL Shortener to Honeypot Arab Spring Dissidents

Posted on 29 July 2016 by The Tactical Hermit

A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group…

Continue reading

Understanding 4th Generation Warfare: The Real Paranoia Inducing Purpose of Russian Hacks

Posted on 28 July 2016 by The Tactical Hermit

For six months, starting in the fall of 2014, I investigated a shadowy online Russian propaganda operation called the Internet Research Agency. The agency has been widely reported in Russian media to be the brainchild of Evgeny Prigozhin, an oligarch and ally of Vladimir Putin. At the time, it employed hundreds of Russians in a…

Continue reading

Examining Terrorist Tactics: The Jihadist Comms Toolkit

Posted on 25 July 2016 by The Tactical Hermit

A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…

Continue reading

4GW: Cyberpower Crushes Coup in Turkey

Posted on 16 July 2016 by The Tactical Hermit

Rewriting the Rulebook on coups, time to add cyberpower   Mere hours after the putsch in Turkey has failed, it is still too early to understand exactly what went on. Given those constraints, I still want to discuss something which has altered “the game” so much that the existing guidebook needs to be significantly revised….

Continue reading

Deconstructing Terrorism: World-Check Terrorism Database Exposed

Posted on 30 June 2016 by The Tactical Hermit

A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…

Continue reading
  • Previous
  • 1
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 20
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme