Skip to content
Menu
  • Original Short Fiction
Menu

Category: Privacy

Flying Malware Injectors, Invisible UAV’s and Anti-Drone Lasers (Part 4)

Posted on 3 September 2015 by The Tactical Hermit

This is the fourth and final installment of Drones and the Civilian Operator. If you missed the preceding installments, the First, Second and Third, are available to read. Think about it, if somebody were to have used terms like: “Counter-UAV Lasers”, “Hacker Drones” or “Invisible UAV’s” ten years ago, you would have called them nuts;…

Continue reading

Defeating Drone Surveillance (Part 3)

Posted on 26 August 2015 by The Tactical Hermit

This is third installment of Drones and the CO. If you missed them or just want to review, here are the FIRST and SECOND installments.   There is no doubt that the U.S. is fast becoming a “Surveillance State” similar to the ‘Islamic Bastion of Great Britain’, where there is currently one CCTV camera for every 11…

Continue reading

The Personal ‘Stealth’ Existence: Remain Deadly

Posted on 25 August 2015 by The Tactical Hermit

Sage Advice Indeed..Heed it Well! -SF   By John Farnam Ft Collins, CO –-(Ammoland.com)- In the wake of Friday’s heroic action by US Servicemen in Europe, who are currently getting microphones and camera lenses shoved into their faces by the minute, as well as being invited to appear on all manner of TV talk-shows, along…

Continue reading

Rape Prevention: Understanding Personal Location Data on “Dating” Apps

Posted on 21 August 2015 by The Tactical Hermit

Whether you are a female CO or have one in your life that you care about, this is very important information..the Predators out there are getting smarter and using cyber tools more and more to track, stalk and eventually rape or murder young women all over this nation. Knowledge is Power, let’s start using it….

Continue reading

Emergence of License Plate Readers

Posted on 8 August 2015 by The Tactical Hermit

Are you still naive enough to think it’s nobody’s business where you’ve been??? Big Brother begs to differ! Suppose someone were to follow you around in your car 24 hours a day and record where you were, who you were with, where you parked and how long you were there. Then suppose this person put…

Continue reading

Going Grey: The TOR Browser

Posted on 2 August 2015 by The Tactical Hermit

**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.**     Since I come to the conclusion there is no such…

Continue reading

Hackers can Disable a Sniper Rifle-or Change it’s Target

Posted on 29 July 2015 by The Tactical Hermit

Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…

Continue reading

We Are All Big Brother Now

Posted on 28 July 2015 by The Tactical Hermit

This article presents an interesting question…in a world where connectivity and constant surveillance are a given, where is the line drawn in who is REALLY Big Brother? By exposing the wrongs of police and politicians, video-phone democracy is reinventing freedom. But is this just another form of mob rule? By MICHAEL HIRSH July 23, 2015…

Continue reading

Ever Wonder Which Words Will Flag You as a Terrorist?

Posted on 15 July 2015 by The Tactical Hermit

I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”.  by Joshua Krause   By now, we all know that the NSA is spying on us. They…

Continue reading

Backdoor Gov’t Encryption: Is it about Criminals or about you?

Posted on 10 July 2015 by The Tactical Hermit

by Mr. A (HCS’ Resident Cyber-Gandalf) A lot of citizens would immediately think they should so that the government could better catch criminals and terrorist. After all, wouldn’t all of us want terrorist stopped and criminals caught? Of course we would. Does backdoor encryption access accomplish this, or is there something else at work? Here’s…

Continue reading
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme