Skip to content
Menu
  • Tactical Hermit Substack
Menu

Category: Technology

Engineering Humans for War

Posted on 25 September 2015 by The Tactical Hermit

By Annie Jacobsen Inside the Pentagon’s efforts to create a super-soldier—and change the future of the battlefield. Retired four-star general Paul F. Gorman recalls first learning about the “weakling of the battlefield” from reading S.L.A. Marshall, the U.S. Army combat historian during World War II. After interviewing soldiers who participated in the Normandy beach landings,…

Continue reading

OPM Now Admits 5.6 Million Feds Fingerprints Were Stolen by Hackers

Posted on 25 September 2015 by The Tactical Hermit

  WHEN HACKERS STEAL your password, you change it. When hackers steal your fingerprints, they’ve got an unchangeable credential that lets them spoof your identity for life. When they steal 5.6 million of those irrevocable biometric identifiers from U.S. federal employees—many with secret clearances—well, that’s very bad. On Wednesday, the Office of Personnel Management admitted…

Continue reading

Buck Rogers Eat Your Heart Out! Drones Armed with High Energy Lasers Coming Soon

Posted on 24 September 2015 by The Tactical Hermit

Predator maker looks beyond Hellfire missiles to the weapons of the future. Flying military robots armed with high-energy lasers? It’s a future that is exciting, terrifying — and perhaps just two years away. General Atomics Aeronautical Systems, Inc., or GA–ASI,  the San Diego-based company that makes the Predator and Reaper drones, is undertaking a privately funded…

Continue reading

The CIA’s Campaign to Steal Apple’s Secrets

Posted on 22 September 2015 by The Tactical Hermit

  RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security…

Continue reading

Spy Agency Contractor Puts Out a $1M Bounty for an iPhone Hack

Posted on 21 September 2015 by The Tactical Hermit

AS LONG AS hackers have sold their secret hacking techniques known as zero-day exploits to government spies, they’ve generally kept that trade in the shadows. Today it’s come into the spotlight with the biggest bounty ever publicly offered for a single such exploit: $1 million for a technique that can break into an iPhone or…

Continue reading

Apt. 29, aka “The Dukes”: 7 Years of Russian Cyber Espionage

Posted on 18 September 2015 by The Tactical Hermit

Today we release a new whitepaper on an APT group commonly referred to as “the Dukes”. We believe that the Dukes are a well-resourced, highly dedicated, and organized cyber-espionage group that has been working for the Russian government since at least 2008 to collect intelligence in support of foreign and security policy decision-making. The Dukes…

Continue reading

How To Keep Hackers from Causing Chaos at the Gas Pumps

Posted on 16 September 2015 by The Tactical Hermit

By Aliya Sternstein The FBI and Department of Homeland Security just issued new warnings about everyday objects that stay connected to an unsecured internet. Their public service announcements concern security risks posed by the so-called Internet of Things, or IoT, a situation where everyday objects connect to a network. Researchers this summer proved that connected items…

Continue reading

21st Century Facial Recognition Software: What the CO Needs to Know

Posted on 14 September 2015 by The Tactical Hermit

By Hammerhead    With America well on its way to becoming known as “Uncle Snoopy” versus “Uncle Sam”, one has only to look at the current surveillance state of Great Britain to see where most American cities will be in five years. At current count, Great Britain has over 5.9 Million CCTV cameras spread over…

Continue reading

Non-Kinetic Warfare Skills for the Civilian

Posted on 4 September 2015 by The Tactical Hermit

The Kinetic Threats faced by the 21st Century Civilian Operator are getting more and more violent and random. Every day it seems we hear on the news about another  Active Shooter, Carjacking, Kidnapping or Home Invasion.  For most CO’s, this ignites a burning desire to train harder, more realistic and more enthusiastic than ever before….

Continue reading

Asymmetrical Warfare Moves Into Your iPad

Posted on 3 September 2015 by The Tactical Hermit

  Now that the Internet is so ubiquitous that you must accept direct deposit for your paycheck, and your refrigerator has to get online to check for sales on cottage cheese, we find ourselves totally dependent on a service that we don’t understand and can’t live without. System engineers, whether they work for huge companies…

Continue reading
  • Previous
  • 1
  • …
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • …
  • 35
  • Next

Tactical Hermit Substack

Recent Post

  • In Memoriam: David Allan Coe
  • Grenade blast inside Cartel Truck
  • A Hermit Original Meme
  • On this Day in History, 1986: The Chernobyl Disaster
  • Jailhouse Justice Times Three: Inmate Serving 16 Life Sentences Kills Three Child Sex Offender Pedo’s

Buy Me a Coffee

General Franco (2008-2024)

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Dirty Civilian

Barbarian Spirit

Von Steuben Training and Consulting

Wyoming Survival

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

The Feral Irishman

Bustednuckles

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Jack Lawson Books

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2026 | Powered by Minimalist Blog WordPress Theme