Skip to content
Technical Info and Support for Targeted Individuals
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video
General Info

Protect your Credit Cards With RFID Shielded Wallets

  • Post Author By Targeted Tech Talk
  • Post Date September 20, 2024
Estimated read time 2 min read

Almost all credit cards now include a chip that allows for ‘tap to pay’ functionality, the ability to wave your card over a sensor to [Read More…]

General Info Secure Computing

Technology Checklist Page Now Available

  • Post Author By Targeted Tech Talk
  • Post Date September 14, 2024
Estimated read time 1 min read

A new site feature is now available, the technology checklist page. This checklist makes it easy to see at a glance a consolidated list that [Read More…]

Secure Computing

The NSA’s Relationships with Private Companies

  • Post Author By Targeted Tech Talk
  • Post Date August 31, 2024
Estimated read time 2 min read

As a targeted individual, it is important to understand some of the fundamental behavior and organization of the NSA which is responsible directly or indirectly [Read More…]

Artificial Intelligence

New EBook Available for Free – A Quick Guide To AI Prompt Engineering For Targeted Individual Research

  • Post Author By Targeted Tech Talk
  • Post Date August 11, 2024
Estimated read time 1 min read

My latest EBook is now available – A Quick Guide To AI Prompt Engineering For Targeted Individual Research. This guide introduces the topic of prompt [Read More…]

Secure Computing

Drive Encryption Recommendation – VeraCrypt

  • Post Author By Targeted Tech Talk
  • Post Date August 6, 2024
Estimated read time 2 min read

The article below is a good review of file and drive encryption. If you store files on an external drive or have a usb drive [Read More…]

Secure Computing

NSA “Upgrade” Factory Photos

  • Post Author By Targeted Tech Talk
  • Post Date August 3, 2024
Estimated read time 1 min read

In a previous article I recommended that targeted individuals consider purchasing electronics from retail stores. Here is further information to back up that recommendation. The [Read More…]

Secure Computing

Hardware Authentication Keys – Analysis and Top Picks for Targeted Individuals

  • Post Author By Targeted Tech Talk
  • Post Date July 30, 2024
Estimated read time 3 min read

Targeted Individuals should consider the use of a hardware authentication key.  A hardware authentication key is a physical device that looks and functions much like [Read More…]

General Info

New EBook in Development – AI Prompt Engineering for Targeted Individual Research

  • Post Author By Targeted Tech Talk
  • Post Date June 30, 2024
Estimated read time 1 min read

My next EBook is in progress. The title is ‘AI Prompt Engineering for Targeted Individual Research’. Many Targeted Individuals are concerned about how artificial intelligence [Read More…]

Secure Computing

TI Safe Computing: WiFi Can Be Used for Through Walls Surveillance

  • Post Author By Targeted Tech Talk
  • Post Date June 7, 2024
Estimated read time 2 min read

Personally, I recommend the use of ethernet cables for network connections over the use of WiFi as a best practice for Targeted Individuals.  If you’re [Read More…]

Secure Computing

Why TI’s May Wish to Purchase Electronics in a Retail Store

  • Post Author By Targeted Tech Talk
  • Post Date June 5, 2024
Estimated read time 1 min read

Some targeted individuals have indicated that their devices may be tampered with. According to Newman(2013), the NSA’s elite hacking division Tailored Access Operations (TAO) has [Read More…]

Posts navigation

← Older Posts
→ Newer Posts

Recent Posts

  • Enable The Secure Boot Feature to Block Rootkits and Malware
  • Steganography – Messages Hidden Inside of Files
  • Free Online File Scanning With VirusTotal
  • Tails Operating System for Increased Online Privacy and Security
  • Check The Reputation of Websites and IP Addresses

Archives

  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024

Categories

  • Artificial Intelligence
  • General Info
  • Secure Computing

You May Also Like:

Enable The Secure Boot Feature to Block Rootkits and Malware
Secure Computing

Enable The Secure Boot Feature to Block Rootkits and Malware

Posted on May 4, 2025May 4, 2025 by Targeted Tech Talk
Steganography – Messages Hidden Inside of Files
Secure Computing

Steganography – Messages Hidden Inside of Files

Posted on April 21, 2025April 21, 2025 by Targeted Tech Talk
Free Online File Scanning With VirusTotal
Secure Computing

Free Online File Scanning With VirusTotal

Posted on April 14, 2025April 14, 2025 by Targeted Tech Talk
Tails Operating System for Increased Online Privacy and Security
Secure Computing

Tails Operating System for Increased Online Privacy and Security

Posted on April 6, 2025April 6, 2025 by Targeted Tech Talk
Check The Reputation of Websites and IP Addresses
Secure Computing

Check The Reputation of Websites and IP Addresses

Posted on March 23, 2025March 23, 2025 by Targeted Tech Talk
In-Q-Tel, Venture Capital Fund for CIA, NSA, DHS Technology Research
General Info

In-Q-Tel, Venture Capital Fund for CIA, NSA, DHS Technology Research

Posted on March 16, 2025March 16, 2025 by Targeted Tech Talk

Email – targetedtechtalk@protonmail.com

Follow @TargetedTechTlk
Scroll to top
  • Contact Us
  • Free Ebooks and Papers
  • Links + Resources
  • Technology Checklist
  • Video