Skip to content
Menu
  • Original Short Fiction
Menu

Tag: NSA

The Surveillance State: The CIA is Investing in Firms that “Mine” Your Twitter and Instagram Data

Posted on 17 April 2016 by The Tactical Hermit

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept….

Continue reading

The Surveillance State: NSA Wants to Share Citizen Data Mines with other Fed’s

Posted on 8 April 2016 by The Tactical Hermit

Civil liberties and government transparency groups are rallying to oppose a new plan that would allow the National Security Agency (NSA) to share more of the information that it collects about people’s communications and activity on the Internet with other federal agencies. On Thursday, 33 advocacy groups signed on to a letter insisting the changes…

Continue reading

Cyber-Warfare Front: NSA Chief Makes ‘Secret’ Israel Trip to talk Iran, Hezbollah Cyber-Warfare

Posted on 28 March 2016 by The Tactical Hermit

Admiral Rogers said to meet with IDF intelligence officials, including head of 8200 unit, during visit last week The director of the US National Security Agency, Admiral Michael Rogers, reportedly paid a secret visit to Israel last week to discuss cooperation in cyber-defense, in particular to counter attacks by Iran and its Lebanon-based proxy Hezbollah….

Continue reading

Inside “Eligible Receiver”

Posted on 7 March 2016 by The Tactical Hermit

The NSA’s disturbingly successful hack of the American military   Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…

Continue reading

Can China be Deterred in Cyber-Space?

Posted on 3 February 2016 by The Tactical Hermit

Deterring state actors from attacks that do not reach the level of force is difficult. If we look at the cyber realm, the effectiveness of deterrence depends on who (state or non-state) one tries to deter and which of their behaviors.  Ironically, deterring major states like China from acts of force may be easier than…

Continue reading

Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System

Posted on 29 January 2016 by The Tactical Hermit

OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the…

Continue reading

This article Will NOT Boost Your Confidence in American Cyber-Defense Capabilities

Posted on 21 December 2015 by The Tactical Hermit

Iranian hackers infiltrated the control system of a small dam less than 20 miles from New York City two years ago, sparking concerns that reached to the White House, according to former and current U.S. officials and experts familiar with the previously undisclosed incident. The breach came amid attacks by hackers linked to Iran’s government…

Continue reading

What @Snowden told me about NSA’s Cyberweapons

Posted on 30 September 2015 by The Tactical Hermit

By James Bamford Stephen Gerwin, chief of the Howard County Bureau of Utilities, it was “a peculiar project.” His workers were told they needed to get background checks and sign nondisclosure forms before they could begin work on a wastewater pump station in a forested area near the Little Patuxent River. “You sign a document…

Continue reading

Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth

Posted on 22 July 2015 by The Tactical Hermit

In response to a recent article in Motherboard, Mr. A had this to say….     This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…

Continue reading

Ever Wonder Which Words Will Flag You as a Terrorist?

Posted on 15 July 2015 by The Tactical Hermit

I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”.  by Joshua Krause   By now, we all know that the NSA is spying on us. They…

Continue reading
  • Previous
  • 1
  • 2
  • 3
  • Next

Tactical Hermit Substack

Recent Post

  • Musical Interlude
  • Texas News: 43 Dead in Texas Floods So Far
  • Crime Awareness: Deadly social media ‘door-kicking’ trend could end tragically for kids and homeowners
  • Let Freedom Ring
  • In Memoriam: Michael Madsen
General Franco (2008-2024)

Book of the Month

Fellow Conspirators

Area Ocho

American Partisan

Western Rifle Shooters Association

Brushbeater

Von Steuben Training and Consulting

CSAT

Politically Incorrect Humor and Memes

Freedom is Just Another Word

Prepared Gun Owners

Fix Bayonets

The Firearm Blog

BorderHawk

Cold Fury

Don Shift SHTF

NC Renegades

Big Country Ex-Pat

The Bayou Renaissance Man

Bustednuckles

The Feral Irishman

It Ain’t Holy Water

Evil White Guy

Pacific Paratrooper

Badlands Fieldcraft

Riskmap

Stuck Pig Medical

Swift Silent Deadly

Spotter Up

The Survival Homestead

Bacon Time!

SHTF Preparedness

Sigma 3 Survival School

The Organic Prepper

The Zombie Apocalypse Survival Homestead

Texas Gun Rights

The Gatalog

Taki’s Magazine

Defensive Training Group

The Trail Up Blood Hill

No White Guilt

Europe Renaissance

Vermont Folk Truth

The Occidental Observer

The Dissident Right

Daily Stormer

American Renaissance

Blacksmith Publishing

Arktos Publishing

Antelope Hill Publishing

White People Press

White Rabbit Radio

White Papers Substack

Viking Life Blog (Archived)

Identity Dixie

The Texian Partisan

Southern Vanguard

League of the South

The Unz Review

Dissident Thoughts

The Third Position

Renegade Tribune

COPYRIGHT NOTICE/DISCLAIMER & FAIR USE ACT

All blog postings, including all non-fiction and fictional works are copyrighted and considered the sole property of the Tactical Hermit Blog. The names, characters and incidents portrayed in the short stories and novelettes are entirely fictional and are of the author's imagination. Any resemblance to actual events, locales or organizations or persons living or dead is entirely coincidental, The information contained in the articles posted to this site are for informational and/or educational purposes only. The Tactical Hermit disclaims any and all liability resulting from the use or misuse of the information contained herein.

The views and opinions expressed on this blog are those of the authors and do not necessarily reflect the official policy or position of any of the companies that advertise here. 

Much of the information on this blog contains copyrighted material whose use has not always been specifically authorized by the rightful copyright owner. This material is made available in an effort to educate and inform and not for remuneration. Under these guidelines this constitutes "Fair Use" under Section 107 of the U.S. Copyright Law. The publisher of this site DOES NOT own the copyrights of the images on the site. The copyrights lie with the respective owners.

© 2025 | Powered by Minimalist Blog WordPress Theme