Professional Documents
Culture Documents
DEPARTMENTS FEATURES
86 Bag Drop 52
Concealed Carbine Pack
RecoilTV is a 2A friendly streaming platform created to entertain and inform you on the latest guns and gear
associated with the firearms lifestyle.
PRESENTED BY
Honest. Relevant. Unfiltered.
THE PREMIER AUTHORITY FOR FIREARMS NEWS AND
MEDIA THE WAY YOU WANT AND DESERVE.
AVAILABLE ON
006
ISSUE 59
EDITOR’SLETTER
As AI-generated content becomes increasingly sophisticated, Diedrich examines Scary Smart, a book written by former Google
the blurring of lines between human and machine creativity raises executive Mo Gawdat about the dramatic impact AI will have on our
important questions about accountability and trust. In a world where lives in the coming decades — for better and for worse.
information shapes opinions and influences decisions, the inability In addition to these AI-focused articles, we’ve included some
to discern the origin of content challenges our fundamental under- other content relating to cutting-edge survival tools and skills. Chris-
standing of authorship and the ethical considerations tied to it. The topher Rance wrote a beginner’s guide to TAK, the U.S. Military’s
ethical responsibility to disclose the involvement of AI in content cre- Tactical Awareness Kit app, which is now available to the general
ation becomes paramount, as transparency fosters trust and enables public. Returning tech expert Dean Freeman wrote an article about
individuals to navigate an increasingly complex landscape of digital how to buy and upgrade a handheld radio for better off-grid com-
information with informed judgment. munication capabilities. Diedrich reviewed a QuietKat Warrior e-bike
The previous paragraph was not written by a human. It was to gauge its effectiveness as a rechargeable bug-out vehicle. We
written by ChatGPT, a free and easy-to-use AI-powered language also took a detailed look at the capabilities of thermal rifle optics,
model. Now, take a look at the cover of this issue — that was gener- such as the new Armasight Contractor series, and wrote about
ated by another free tool called Playground AI based on a short lessons learned at a Greenside Training urban tracking class in our
prompt written by our staff. If we hadn’t disclosed these facts, Final Weapon column.
could you tell the difference? How do we know whether the Of course, our magazine has always taken a balanced
content we’re consuming is real or synthesized by approach to achieving preparedness, so we also
a machine, and how will this uncertainty affect included some decidedly low-tech and old-
our ability to trust our own senses? Does school content. In our Health column, Joe
this path lead to a brighter future where Alton, MD, demonstrates the many uses of
AI helps us solve humanity’s greatest one of the simplest components of any
problems, or an apocalyptic one where first aid kit: a triangular bandage. And in
it becomes too powerful to control? Pocket Preps, Mike Searson compares
These questions will only become a variety of slip-joint knives, a style of
more prevalent as AI technology folding knife that has been popular
continues to spread, and that’s why for more than 300 years.
we chose to make it the focal point Whether you choose to embrace
for this issue of RECOIL OFFGRID. technology or distance yourself
Our titular feature article, “Artificial from it, the genie is out of the bottle.
Intelligence,” offers a deep dive into Artificial intelligence will undoubt-
what AI is, how it works, and some of edly change the way we live and
its greatest practical advantages and work in coming decades, just as the
disadvantages. This issue’s What If internet and cell phones have done
scenario addresses one of the most in decades past. Rather than stick our
concerning present-day malicious heads in the sand and hope every-
uses of AI, a deepfake cyberattack in- thing works out, our best course of
tended to manipulate victims by digi- action is always to be aware and be
tally usurping the identity of a trusted prepared.
colleague. In The Last Page, Patrick
Editorial.
Editor-in-Chief/ Iain Harrison
Editor, RECOIL OFFGRID/ Patrick McCarthy
Managing Editor/ Laura Peltakian
Features Editor/ Dave Merrill
Contributing Editor/ Steven Kuo
Contributing Editor/ Patrick Diedrich
Network Manager/ Tom Marshall
Web Editor/ David Lane
Contributors/ Amy Alton, Joe Alton, W. Dean Freeman, Nate Gerhart,
Christopher M. Rance, David Roy, Mike Searson
Special Thanks/ Brady Patterson
Copyright © 2023 by
CMG West, LLC.
All Rights Reserved.
008
1A/2A: CONGRESS SHALL
GEARUP
1 MAKE & MODEL
Forloh 2 MAKE & MODEL
MPowered 3 MAKE & MODEL
Outdoor Element 4 MAKE & MODEL
Garmont
Women’s ThermoNeutral Rechargeable Batteries Fire Flute T8 Athena
Down Jacket
SIZE WEIGHT SIZE
COLORS AA 1.7 ounces Women’s 5 to 10.5
Black, Deep Cover, Exposed, Forloh
MSRP MSRP MSRP
Green, Magnet, Snowfall
Starting at $15 $24 $155
MSRP
URL URL URL
$399 mpowerd.com outdoorelement.com garmonttactical.com
URL
NOTES NOTES NOTES
forloh.com
Say hello to MPowerd’s AA USB Recharge- Meet the Fire Flute, a versatile tool Step into the T8 Athena boots
NOTES
able Batteries, the eco-conscious power when it comes to outdoor readiness. by Garmont and you’re stepping
The Women’s ThermoNeutral Down source you didn’t know you needed. This gadget is about the size of a into a world of tactical innovation
Jacket by Forloh sets a high bar when These aren’t your run-of-the-mill bat- standard Sharpie marker, making it a designed specifically for women.
it comes to staying warm and agile in teries; they’re integrated, reusable, and convenient addition to your pocket or Crafted with a suede leather upper
unpredictable conditions. This jacket is cable-free. When they run out of juice, backpack. Crafted from sturdy alumi- and polyester fabric, these boots
designed for those who don’t want to just pop them into a USB charging port, num, it weighs a mere 1.7 ounces but offer increased arch support and
compromise on comfort or functionality. and they’re good to go in 1 to 2 hours. offers a trio of essential features. a slightly raised heel, catering to
Its ThermoNeutral technology means No more hunting for a store to buy con- First up is a powerful 120dB whistle, women’s shorter Achilles tendon,
this isn’t your average down jacket; it’s ventional batteries, and no more waste loud enough to alert anyone within ensuring you’re comfortable and
engineered to adapt to your body’s heat, piling up in landfills. With a 1200mAh earshot. Whether you’re lost in the stable whether you’re navigating
providing optimal insulation whether capacity and 1.5V output, these batteries woods or need to signal for help, this rocky terrain or city streets. The
you’re on the move or sitting still. The are versatile, powering everything from whistle ensures you’ll be heard. Next, dual-density EVA midsole is all
jacket comes in various sizes and several remote controls and video game control- the Fire Flute houses a water-tight about comfort and shock absorp-
eye-catching colors. But it’s not just lers to baby monitors and headlamps. compartment designed to store com- tion. The Garmont Traction Formula
about aesthetics; the Deep Cover variant They’re a perfect fit for both tech-savvy bustible fire tabs. These slow-burning Diamante outsole is engineered
offers a camo pattern that can help you city dwellers and off-the-grid adventur- tabs are included in the packaging with specialized climbing and
blend into natural surroundings, while the ers. Rather than worrying about your and can be a game-changer when you braking zones, providing stability
solid black is a versatile choice for any flashlight dying on you during a blackout need to get a fire going quickly. The on various surfaces. Weighing in
setting. Weighing between 13 to 21 ounces or your GPS running out of power while other end of the Fire Flute features a at just 13.7 ounces per boot in size
depending on the size, this jacket won’t exploring the great outdoors, give more replaceable ferrocerium rod. Paired 7 US, these boots are AR 670-1
weigh you down and makes it a good thought to the batteries you choose. with an integrated hardened striker compliant, making them a reliable
choice for those who need to pack light What sets these apart is their longevity — plate, it throws large sparks to ignite choice for those in the Armed
but still want a reliable layer of warmth. they can be recharged over 1,000 times. your campfire or stove effortlessly. Forces.
That’s not just cost-effective; it’s a nod to The device even comes with an at-
sustainability. tached pocket clip and a lanyard hole
1 for multiple carrying options.
3 4
5 MAKE & MODEL
Burris 6 MAKE & MODEL
Dometic 7 MAKE & MODEL
Bear & Son Cutlery 8 MAKE & MODEL
NEXTORCH
Signature LRF 10x42 PLB40 Portable Lithium Sideliner w/Reverse Tanto TA30 V2.0 One-step
Battery Blade & Glass Breaker Strobe Tactical Flashlight
MODES
Auto, Sport, Hunt DIMENSIONS STEEL LUMENS
8 by 8 by 10 inches 440 stainless steel 1,300
MSRP
$1,200 MSRP MSRP MSRP
$850 $57 $81
URL
burrisoptics.com URL URL URL
dometic.com bearandsoncutlery.com nextorch.com
NOTES
Introducing the Signature LRF 10x42 NOTES NOTES NOTES
binoculars by Burris Optics, a seri- Whether you’re camping, tailgating, or Bear & Son Cutlery’s 4.5-inch Black When it comes to being prepared
ous upgrade for serious observers. spending a day at the beach, a portable Aluminum Sideliner (BE127) is a versatile for the unexpected, the TA30 V2.0
With ultra-sharp HD glass, you get a fridge packed with cold food and drinks tool that’s more than just a knife. With Tactical Flashlight offers more than
crystal-clear view of your surround- makes any outing more enjoyable — no an 8-inch open length and a 3.5-inch illumination. Not just a flashlight; it’s a
ings, making it easier to spot game, ice required. However, any time your blade made from 440 stainless steel, multifunctional tool designed to keep
potential hazards, or resources. The vehicle’s engine isn’t running, you’ll this knife is built for everyday use. The you one step ahead. With one-step-
device offers fast and precise rang- need an auxiliary power source. Dometic black aluminum handle offers a sleek strobe technology, a simple tap gives
ing from 5 to 2,600 yards, ensuring makes some of the best portable fridges design that fits comfortably in your you momentary light, while a heavy
you can measure distances with on the market, so it was natural for the hand, ensuring a firm grip. One of its press activates a tactical strobe. This
pinpoint accuracy. What sets this company to create a matching portable standout features is the ball bearing feature can disorient potential threats
apart from other range finding binos power solution. The PLB40 is a compact washers, which allow for rapid blade or can be used for quickly drawing
is that it comes with three versatile Lithium Iron Phosphate (LiFePO4) bat- deployment at the push of a trigger, the attention of passersby during
ranging modes: Auto, Sport, and tery with a 40 Amp-hour/512 Watt-hour an action that can be crucial when you an emergency. The lens is coated,
Hunt, allowing you to adapt to capacity — enough to keep a CFX 40W need to react fast. The knife also comes tempered glass that ensures maximum
different scenarios. You can choose fridge powered for about 40 hours. with a stainless steel sideliner lock, light transmission and durability. The
to see distances as line-of-sight or Many portable power stations could ensuring the blade stays in place when edges of the flashlight are embedded
horizontal, complete with angles of double as boat anchors, but not this one; in use and is easy to close when you’re with super-hard ceramic strike tips
degree, giving you a comprehensive its square footprint, ergonomic carry done. It also features a glass breaker, that can be used to break glass or as
understanding of your environment. handle, and 16-pound weight make it making it a multifunctional tool that a self-defense mechanism. Though not
The outer surfaces are rubber- easy to transport. Output ports include can help you get out of tight spots. Ad- included, there’s a specially designed
armored, providing both protection standard 12V DC, locking two-pin 12V ditionally, the knife has a metal pocket accessory called the FR-1 tactical
and a secure grip. It’s also tripod DC (for securely connecting Dometic clip and a lanyard spacer for secure flashlight ring. This add-on provides
adaptable, freeing your hands for fridges), and two USB ports. The PLB40 fastening and storage, offering quick more versatile usage, whether you’re
other tasks. The adjustable eyepiece can be recharged via 12V DC from your access and multiple carrying options. navigating through a power outage at
ensures you won’t miss a thing, and vehicle, an AC wall charger, or a solar home or finding your way in the great
it operates in temperatures ranging panel. A large LCD screen makes it easy outdoors.
from 5 to 131 degrees F. Powered to see the battery’s charge percentage
by a single CR2 lithium battery, it and status.
boasts a battery life of over 2,000
measurements.
ISSUE 59
OFFGRIDWEB.COM 009
010 OFFGRIDWEB.COM
1A/2A: MAKE NO LAW
By Mike Searson
3
f you’re a Boomer or Gen-Xer, you may have a
fond memory of your father or other relative giv-
ing you a pocketknife at a young age. It may have
been a lock-back or a fixed blade, but for most
of us it was a simple slip-joint folding pocketknife
with no locking mechanism. The blade was held open
under simple spring pressure. Sometimes it was a single
blade Barlow style or Jack knife. In other cases, it may
have been a Trapper with a drop-point knife blade and
a Spey blade. If you were really lucky, it could’ve been a
multi-blade Congress knife or a Swiss Army Knife. 1
Many of us who were more serious about knives may
have graduated on to something with a Walker liner lock,
frame lock, or Axis lock-type mechanism. That was the
goal from the 1980s onward, to have a folding knife that
locked up like a fixed blade. Still, many of us look back
on fond memories of that first knife type. Custom knife
makers often offer a few slip joints in this category as a
testament to modern craftsmanship and materials or for
customers with a bit of nostalgia.
These knives are still very capable in our modern age
and will still perform over 90 percent of common daily
tasks. They tend to be on the smaller side and are easily
stowed in a pocket, so you always have a knife. Addition-
ally, if you travel outside of the U.S., you’ll find that they’re
usually the only knife that won’t land you in prison in
most of Europe.
Because slip-joint knives are typically carried loose in
a pocket, a lanyard of some type makes more sense as
a means of being able to locate and retrieve the knife. Un-
fortunately, this is a small detail that is often overlooked
to keep with tradition. In the past, slip joints were cheaper
knives sold in hardware stores, gun shops and depart- 2
ment stores. Modern slip joints are a little bit more expen-
sive in many cases, but still more affordable on average
than typical tactical folding knives.
3 Heretic
Jinn
Knives
4 Benchmade
Weekender
5 CRKT
Venandi
6 Cold Steel
Trapper
7 Kershaw
Federalist
OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH:
6.8 inches 7.1 inches 7.2 inches 7.4 inches 7. 5 inches
BLADE LENGTH: BLADE LENGTHS: BLADE LENGTH: BLADE LENGTH: BLADE LENGTH:
3.1 inches 3 inches, 2 inches 3.1 inches 3.3 inches 3.3 inches
WEIGHT: WEIGHT: WEIGHT: WEIGHT: WEIGHT:
2.4 ounces 3.5 ounces 1.8 ounces 4 ounces 2.1 ounces
BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL:
CPM Magnacut CPM-S30V 8Cr13MoV 8Cr13MoV CPM 154
PRICE: PRICE: PRICE: PRICE: PRICE:
$800+ $250 $40 $40 $155
URL: URL: URL: URL: URL:
hereticknives.com benchmade.com crkt.com coldsteel.com kershaw.kaiusa.com
5 7
4
ISSUE 59
OFFGRIDWEB.COM 015
016
1A/2A: AN ESTABLISHMENT
Pocket PREPS
After 9/11, carrying any Mikov is a classic Heretic Knives has a The Weekender The name Venandi This is Cold Steel’s Kershaw’s Federalist is
type of knife aboard European knife manu- long and consistent is a multi-bladed comes from a Latin take on the classic a U.S.-made non-lock-
an airplane was pro- facturer that has been history in the realm pocketknife equipped word meaning “hunt- slip-joint Trapper knife. ing slip joint. It relies on
hibited. In early 2013, making knives in the of tactical automatic with tools to improve er,” and this design is a It features handles with a double-detent sys-
the Transportation Czech Republic since knives. So, to see a your weekend — or collaboration between authentic jigged bone, tem to hold the blade
Security Administra- 1794. The Rybicka or slippie in their lineup any day. It features a custom knife maker highlighted with pol- in place while closed,
tion (TSA) announced “Little Fish Knife” has made us sit up and 3-inch clip-point blade Richard Rogers and ished metal bolsters. and the half-stop offers
a plan to allow certain been in their catalog take notice. As can for your EDC cutting Columbia River Knife The rugged handles controlled opening
knives on airplanes for over 100 years be expected, Heretic needs, and a 2-inch and Tool. Rugged G10 are substantially sized and closing action. The
again. Although and is a traditional doesn’t screw around drop-point blade for handle scales mean for hard work, even green canvas Micarta
the plan was later slip joint design that when it comes to ma- smaller cutting jobs; that the handles will with gloved hands. handle feels good
withdrawn, Spyderco is often passed down terials. The CPM Mag- the bottle opener probably outlast the It’s constructed in a tra- in the hand, and it’ll
had already designed from father to son. nacut for the blade is ensures all your rest of the knife. Its 3.1- ditional Jack Knife pat- prove to be extremely
a non-locking pocket- Original knives of this the star in this show, favorite beverages inch clip-point blade is tern, with two polished durable. The blade
knife that would con- type sported carbon along with titanium can be opened with made from 8Cr13MoV blades: a clip-point for is made from CPM
form with proposed steel blades and often handles and a pocket ease. The Weekender stainless steel. The piercing and cutting, 154 steel and has an
guidelines. The Roadie had carved wooden clip. This is definitely is a USA-made folder steel is good, but it’s and a Spey for skin- impressive edge when
is an evolved penknife handles. Mikov began not grandpa’s Barlow to enhance your life. not exactly Magnacut. ning and gutting, both first taken out of the
that is more practical offering these knives knife. The blade is a The blades are made This is a great first knife folding out of the same box. The custom pivot
than typical slip joints. with a 420 steel blade sheepsfoot design and of CPM-S30V steel, for someone who is end. Popular folklore forms a shield detail to
It relies on a pair of and Zinc alloy handles if you’re in a locale that ensuring that they stay just getting into knives. has placed the Trapper complete the distinct
symmetrical dimples a few decades ago. restricts you based on sharp when you need It’s an ultra-modern as the preferred choice look of a slip joint knife.
in the blade that allow This makes them more the locking mecha- them. The Micarta take on a classic and of rugged outdoors- In spite of that, the
a fingernail-free two- durable and actually nism of your knife, this handle offers a great timeless design. men and frontier hunt- Federalist moves the
handed opening. Far quite a bit cheaper. is the one you want. gripping surface and ers, but its practicality design several steps
superior to a traditional This is a slip-joint knife will last virtually for- Pros: makes it useful for all forward by blending
nail nick, they also Pros: for a new generation. ever. There are other The blade is sharp sorts of chores. characteristics of a
don’t collect dirt or This is a small and versions of this model out of the box and tactical folder with that
debris. The Roadie also unobtrusive knife Pros: in the works with differ- ready to tackle Pros: of the old-school Jack
features a subtle index- that can attach to a It’s made from CPM ent blade options and virtually any cutting This knife reminds knife.
finger choil that acts key ring or be worn Magnacut, which colors of Micarta. chore. me of one of the
as a safeguard against around the neck for may be the future The knife excels at Trappers I used from Pros:
unintentional closure. ease of access. super steel for the Pros: cutting and slicing the age of 7 until my This slip joint has
This is a classic Czech next decade or two. Very sharp out of the with its clip-point early 20s as a hiker, lanyard hole, which
Pros: design of a very Razor sharp out of box with nice thin blade. hunter, Marine, and makes it easily ac-
The blade slices like a distinct model. the box, the way all edges for slicing You almost never ranch hand. cessible or locatable
surgical scalpel. Properly sharpened, knives should ship CPM-S30V is a think of G10 handles The blades slice like in the pocket with a
Its handle scales are it’s a very capable Titanium handles premium knife steel with a slip joint, but razors and open lanyard.
extremely comfort- little slicer. with amazing texture with superb edge it works well on this easier than a tradi- The handle is ex-
able. really blows the retention. model. tional nail nick due to tremely comfortable
Lanyard hole makes Cons: doors off everything The bottle opener scalloping. and ergonomic.
it easily accessible The handles are a else in this category comes in handy Cons: Compact, many op- The blade is made
cast zinc alloy, which when you need it. Like most slip joints, tions for daily carry from 154 CM; it’s
Cons: means it’ll corrode Cons: there’s no lanyard tough, razor sharp,
This knife would be and degrade over These knives are Cons: hole. Cons: rust resistant, and
better with a pocket time. handmade one at As good a steel as A pocket clip could Like most slip joints, sports an easily main-
clip. The knife was very a time to order or S30V is, it can be dif- have worked well there’s no lanyard tainable edge.
The sheepsfoot dull out of the box. in small batches, so ficult to sharpen. on this model, even hole.
blade worked well for availability may be There’s no lanyard though that’s not a The handle material Cons:
its original design, but an issue. hole on this to help common slip-joint may degrade over The blade could have
a clip-point or drop- Like most slip joints, you secure the knife. feature time with a lot of use. been a hair sharper
point variant would there’s no lanyard Bone isn’t Micarta. out of the box.
be welcome. hole.
Upgrade your Smith & Wesson M&P-M2.0™ of battery swaps with the internal 20,000-hour
Handgun experience with the SCS-MP2-GR Solar rechargeable battery that could potentially last a
Charging Sight – precision made effortless. lifetime. The SCS-MP2-GR, designed for 9mm &
Engineered to perfectly match the M&P-M2.0™ 40S&W handguns, boasts a multi-directional solar
Optics-Ready series, no adapter plates are required, charging system and an intensity override function,
ensuring a seamless fit. Co-witness with ease making it the ultimate choice for discerning
thanks to the exceptionally low dot height, aligning shooters. Elevate your accuracy, elevate your game
perfectly with factory iron sights. Forget the hassle with the SCS-MP2-GR."
018
1A/2A: OF RELIGION, OFFGRIDWEB.COM
You’re Targeted
by a Deepfake
Cyberattack?
By RECOIL OFFGRID Staff
on’t believe everything you to spread misinformation to thousands of photographer’s darkroom could now be ac-
see on the internet. This strangers. Around the same time, photo complished in seconds.
is one of the fundamental editing software was becoming vastly more Today, misinformation has reached
rules of using the worldwide powerful and accessible, so we began to see another new frontier: artificial intelligence.
web, and it dates back to the spread of Photoshopped hoax images Publicly accessible AI tools are being used
the earliest days of dial-up. In the ’90s, chain across the internet. Much like chain letters to automate the creation of so-called deep-
emails spread hoaxes like wildfire, but those had morphed into chain emails, this type fakes, a term based on the “deep learning”
of us who weren’t entirely gullible knew to of hoax was nothing new, but the advance- neural network technology that’s harnessed
question anything we received with “FW: ment of tech made it far easier to create and to create them. Now, instead of manually
FW: FW:” in the subject line. The rise of chat disseminate. Photo manipulation techniques blending images together in Photoshop,
rooms and social media made it even easier that used to require hours of labor in a we can let AI do the hard work for us. And
it’s not only useful for still images — deep- The Scenario indicated account, since she’s absolutely
fake technology can also process each certain that the person in the video was her
SITUATION TYPE
frame of a video to swap a subject’s face Targeted by cybercriminals brother. It sounded and looked just like him,
(for example: youtu.be/CDMVaQOvtxU). AI YOUR CREW and he appeared to have knowledge about
can also be used to closely mimic a human Yourself the business and its suppliers. However,
voice based on audio samples and read LOCATION she wants to know if you have any ways
Seattle, Washington
back any text the user inputs (youtu.be/ to verify the video first. What methods or
SEASON
ddqosIpR2Mk). Winter tools can you use to check the legitimacy
Deepfakes aren’t just a hypothetical threat WEATHER of the video message and its sender? If you
— they’re already being used to manipu- Cloudy; high 47 degrees F, low determine it’s a deepfake, what other steps
38 degrees F
late, confuse, or outright deceive viewers. should you take to protect the business
In 2020, the parents of Joaquin Oliver, a (and its owners) from similar cyberattacks
17-year-old who died during the Parkland The Setup in the future?
school shooting, used deepfake technol- You’re the head IT guy at a family owned
ogy to recreate their dead son’s likeness business near Seattle. Most of the time, your Cybersecurity Professional
and create a video where he urged young job duties consist of basic tech support W. Dean Freeman’s Approach
Americans to vote for more aggressive gun and PC troubleshooting for the company’s Alright, so I’m either facing the impend-
control. More recently, deepfakes of both 23 employees. Your employer deals with ing financial destruction of my employer, or
Ukrainian President Zelensky and Russian various vendors overseas, so you’re used an extremely sophisticated threat actor, and
President Putin appeared in an attempt to getting messages at odd hours with I need to figure out which one it is fast. Two
to encourage the opposing side’s troops not-so-good English. Aside from a few out of the three outcomes here have me
to surrender or retreat; the latter clip was obvious Nigerian prince scam emails and looking for a new job soon if I don’t stay on
aired on Russian TV in what the Kremlin run-of-the-mill malware, the company hasn’t top of this. Luckily, I’m pretty good at what I
decried as a “hack.” Cybercriminals are also experienced any substantial cybersecurity do, if I do say so myself, and I’ve seen simi-
using deepfake technology to persuade threats in the past, but you’ve always tried to lar threats before. Just because there might
unsuspecting businesses and individuals maintain good security protocols regardless. be a new technology at play here doesn’t
to transfer money or give up sensitive info. really change most of the fundamentals.
And in the most twisted cases, AI is being The Complication First, let’s think through the possible situ-
used to generate deepfake pornography of On a Tuesday afternoon, you get a ations:
people — even children — who are totally un- panicked phone call from Susan, the owner 1. This is a legitimate, albeit unusual and
aware of the disturbing and humiliating way of the company. She says her brother Dan, concerning request.
their likenesses are being altered. A 2022 who is currently on a business trip to visit 2. The video is illegitimate, created via a
report by the U.S. Department of Homeland suppliers throughout Eastern Europe, sent generative AI tool to produce a “deepfake.”
Security stated, “Non-consensual pornogra- her a video message a few minutes ago. 3. The video is genuine, but Dan’s under
phy emerged as the catalyst for proliferat- In the video, he explained that one of the duress and this is a whole different type of
ing deepfake content, and still represents company’s key suppliers is owed a substan- crime (extortion and possibly kidnapping)
a majority of AI-enabled synthetic content tial amount of money and is demanding Each of these potential situations is going
in the wild … The ramifications of deepfake immediate payment. Supposedly, if they to have its own set of tells and its own in-
pornography have only begun to be seen.” don’t receive the payment within the next cident response playbook, as well as some
It’s becoming increasingly difficult to dis- few hours, they’ll switch to an exclusive specific countermeasures. They also share
tinguish real photos, video, and audio from partnership with your biggest competitor. some preparatory mitigations in common.
deepfakes. What would you do if you sus- Susan knows this would be catastrophic
pected you may be the target of a manipu- and might even cause the company to go Preparation
lative deepfake attack by cybercriminals? out of business. So, whenever employees, especially key
How can you verify information you receive She tells you she immediately tried to staff or executives travel, the risk of data
before falling prey to these high-tech social call Dan back and called the supplier, but breaches resulting in intellectual property
engineering tactics? We asked cyberse- neither one is picking up — cell phone theft go way up, and depending on the
curity professional W. Dean Freeman and coverage isn’t the best in that country, region of travel and the industry you’re in,
ISSUE 59
international risk management expert David and it’s outside normal business hours. the threat varies. Knowing this, I’ve coached
Roy to weigh in on this complex attack. She’s considering sending money to the Dan and others on the following:
OFFGRID
GRIDWEB.COM
GRID 019
1A/2A: OR PROHIBITING
Using voice samples collected from social media and At this point, we have multiple priorities,
other public sources, AI can recreate any human voice one being getting ahold of Dan. I have Susan
and use it to read a given script. call the U.S. Embassy in the country where
Dan is and report that he may be the victim
of a crime and ask to be put in touch with
the relevant authorities. Additionally, we’ll still
continue to try contacting Dan directly, and
through the hotel, as well as any business
associates at the vendor.
To help tie up loose ends on the cyber
side, I’d likely reach out to industry contacts
at relevant companies, as well as contacts
made through the FBI’s InfraGard program.
I may still have to fill out the paperwork,
but friends and associates can help get the
> An overly shiny, waxy complexion to the Because Dan often represents the compa- answer faster.
skin ny in public events, there’s ample opportuni-
> Audio is out of sync with the movements ty for fraudsters to collect voice samples to Final Thoughts
of the mouth. synthesize is voice, but since any potential Deepfakes are a major issue, particularly
> No blinking attackers are likely neither native English as an information warfare weapon, and
> Eyes not moving in sync with each other speakers, nor are they American from our have societal level impact. As a tool for cy-
(cross eyed, etc.) region, there very well may be differences in bercrime, they’re basically just a particularly
> Differences in the body, particularly the speech cadence, grammar, and word selec- nasty tool in the phisherman’s toolkit. Like
ears and limbs tion that indicate that the voice is “reading” a all cyber and information weapons, there’s a
> Any changes in speech patterns from script and isn’t actually Dan talking. red team/blue team arms race for genera-
what I and Susan know of Dan After identifying the potential indicators, tive AI and the detection of its output. Luck-
While lighting and other technical factors I also review the video metadata to see if I ily, AI still doesn’t beat actual intelligence, so
could produce the appearance of waxy skin can gain any insight into when and where long as you properly apply it.
or out-of-sync audio in a genuine video, the it was recorded and on what device. Any In my opinion, defenders, whether profes-
biometric factors are going to be the major mismatch between where Dan is and what sional incident response staff, or the average
giveaway. This is because of how deepfake type of phone he has will confirm that the person who may be subject to an AI-fueled
videos are generally produced. video is fake. crime attempt, are best served by approach-
Feeding the generative AI with still im- ing the issue with strong critical thinking
ages to produce the likeness tends to result Crisis skills and a healthy dose of skepticism (the
in deepfake videos where the eyes don’t We have enough evidence at this point same mental tools that’ll help you ferret out
blink at all, which is generally unnatural for to know the request is fake, and that Dan’s “fake news” or determine if you’re being
people. Additionally, the computer has a personal Gmail has been compromised. targeted for a “grandkid” phone scam).
hard time lining up both eyes toward the I’ve already disabled Dan’s account but will Following defined DFIR protocols will help
same focal point when trying to adjust for need to make a more thorough DFIR (Data give you additional context within which to
movement, so if Dan appears cross-eyed Forensics and Incident Response) investiga- evaluate the media, in addition to looking for
in the video but is known not to be in real tion into the network to see if any corporate the “tells.”
life, that’d be a good indicator as well. Most data may have been compromised. Of course, prevention is worth an ounce of
deepfakes are made by applying an extrud- I convince Susan not to make the pay- cure. So, what are some things that could’ve
ed face image onto a live actor. Often, the ment, but she’s still very shaken up. We’re prevented this scenario from unfolding the
angles are hard to make for the computer almost certain the video is fake due to bio- way it did?
and the human driving the production, metric mismatches that she didn’t catch at First of all, just like protecting against fa-
so the AI won’t overlay on top of the ears, first — watching on her phone in a panic — cial recognition, limiting the amount of data
hands, etc. Because of this, I pay very close which means he’s probably not kidnapped, about you (photos, video, voice) that can be
attention to any differences in Dan’s ears in but he’s still out of pocket and his status used to generate fakes is important.
ISSUE 59
the video from what I can see in the known is unknown. Due to tensions in the region, Second, limit the crossover between per-
photos of him I have available. we’re still worried. sonal and business IT systems. Your name
1A/2A: THE FREE EXERCISE
probably isn’t Hillary, so eventually it’ll catch are becoming commonplace as a method ping mobile devices (such as cell phones
up to you. of social engineering. However, there are still and laptops) for those that don’t contain
Third, establish protocols with your organi- prudent steps in preparing for this type of proprietary company data before leaving
zation or family for how requests like money situation. First, any person doing business the U.S., and performing general security
transfers would be made, such as having internationally should be aware of the inher- awareness training with all staff annually.
key phrases or “safe words” that need to be ent risks this presents by default. Regardless But even with all of the cool tech in
present to authenticate the request. Treat of your business vertical, understanding how the world, you can’t remediate or patch a
any request that deviates from protocol or to work in high-risk places, particularly de- human — they’re an organization’s largest
isn’t authenticated as illegitimate until proven veloping nations, and places where bribery information security vulnerability. For this,
otherwise. and corruption are rampant is important. you can only drill, train, and reinforce the
Lastly, if you work for an organization that You may face scenarios like this via subcon- importance of identifying social engineer-
has the budget, seeking out tools designed tractors and supply chain partners, so it’s ing, phishing, data mining threats, physical
for identifying deepfakes and starting to prudent to have diligence on your down- threats to obtain sensitive information,
train models based on high-profile mem- stream operations, the financial status of and the most difficult, resisting bribes (of
bers of your organization, such as C-level your partners, and awareness of geopolitical all kinds). To enhance operational security,
executives, is worth exploring. The sooner risks presented in each region where you additional levels of personnel validation
you have those systems and models in operate, especially those around personnel should also be in place. Code words for
place before an incident, the more useful and information security. team members or projects should be
they’ll be if there is one. Educating international travelers about used for identity verification. However,
information security best practices is criti- these should be codes that are not stored
Risk Management Expert cal to the success of operational security. electronically in the case of a data breach;
David Roy’s Approach These practices are a good start: ensuring instead, choose codes that will be easy
Preparation that data-blocking phone chargers (some- to remember for the end users even in
In this scenario, the business owner is be- times called “USB condoms”) are being stressful situations. Other unique personnel
tween a rock and a hard place, as deepfakes used in order to prevent data theft, swap- identifiers such as authentication tools can
standing the origin. If this isn’t possible, or travelers do get abducted overseas. Under- insurance that covers data breach, ransom-
helpful, human and emotional intelligence standing the reality of this, and how to pre- ware, data theft, and eraserware events.
WHAT
1A/2A: THEREOF; IF?
Make sure to preserve any (deepfake or able to identify any sort of deepfake and We’d recommend anyone interested in this
not) information that has been provided justifying an appropriate response. With topic read the full report — search for “How
from your suspected kidnapped colleague this exploit increasing in volume every day, Underground Groups Use Stolen Identities
and be ready to provide information that preparedness and a proactive approach and Deepfakes” on TrendMicro.com.
could assist in locating them. In most cases, mean everything. The report concludes with several
U.S. Federal agencies (mostly the FBI) and recommendations for users concerned
the State Department will have much more Conclusion about deepfake attacks. Individuals should
sophisticated tech to determine the validity In September 2022, multinational cyber- use multi-factor authentication for online
of information you’ve been provided. Once security firm Trend Micro released a report accounts, set up logins based on biometric
you’ve quickly done all of this, it might be that stated, “The growing appearance of patterns that are less exposed to the public
worth a heads up to other folks in your deepfake attacks is significantly reshap- (e.g. irises and fingerprints) rather than
company traveling OCONUS to halt any ad- ing the threat landscape for organizations, simple facial recognition, and limit exposure
ditional travel and return home asap. financial institutions, celebrities, political of high-quality personal images and videos
figures, and even ordinary people.” It contin- on social media. Remember that every
Final Thoughts ued, “The security implications of deepfake selfie, video, or audio clip you post can be
All things considered, this would be a technology and attacks that employ it are fed into AI deepfake tools. The less data the
pretty difficult scenario for an organization real and damaging. As we have demonstrat- bad guys have access to, the less accurate
of any size. However, implementing and ed, it is not only organizations and C-level their fakes will be. For businesses, Trend Mi-
executing basic principles of personnel and executives that are potential victims of cro recommends authenticating each user/
operational security, paired with a process- these attacks but also ordinary individuals. employee by three basic factors: something
driven international travel safety approach Given the wide availability of the necessary the user has (like a physical key), something
can go a long way. Effective communica- tools and services, these techniques are the user knows (like a password), and some-
tion methods with planned touchpoints, accessible to less technically sophisticated thing the user is (biometrics). Each factor
code words/obfuscation of information, and attackers and groups, meaning that mali- should be chosen wisely based on analysis
general information security best practices cious actions could be executed at scale.” of the criminal threat landscape.
can be the difference between a deepfake
compromising a business and resulting in an
expensive wire transfer to an unsavory char-
acter, or a normal chaotic day at the office.
It’s important to remember that these
attacks hit close to home as well. Deepfake
phone calls threatening harm to a fam-
About the Authors
ily member unless a ransom is paid or W. Dean Free- David Roy (a
impersonating debt collectors for a known man, CISSP- pseudonym, as
financial strain that was discovered through ISSEP CSSLP required by his line
a stolen identity are becoming more C|OSINT is a of work) is a global
commonplace. These types of events are veteran of the risk management
draining ordinary people dry just because cybersecurity and information
of a simple scam that a teenager can pull industry with security executive
off with limited technology. To combat over 15 years of professional experi- at a multinational technology firm and
this, implementing “home-based” security ence ranging from threat intelligence specializes in critical infrastructure secu-
awareness for your household members is to systems security engineering, and rity. He has worked in this space for well
good practice. In most cases, these sorts over 25 years of hobbyist experience over a decade and holds multiple industry
of targeted attacks focus on the elderly or in related domains. He’s a regular certifications in information security, with
individuals who have a history of financial contributor to RECOIL OFFGRID an educational background in geopolitics
hardship, as they become vulnerable and magazine, and his writings on pre- and risk management. He has worked in
easily exploited targets for threat actors. paredness and self-defense topics both the private and public sector during
Considering all of the factors at play, have, or will, appear in other publica- his career, and has extensive experience
the human element emerges as the most tions as well. He lives with his family working across North America, Europe, the
important. Awareness, intelligence, and criti- in central Texas. Middle East, and Southeast Asia.
cal decision making are paramount in being
026 OFFGRIDWEB.COM
1A/2A: OR ABRIDGING
“Success in creating AI could be the biggest event in the history of our civilization.
But it could also be the last, unless we learn how to avoid the risks.” – Stephen Hawking
hroughout history, humanity has wit- the world. It’s seen as the next major frontier of human
nessed the effects of several technological advancement.
revolutions. These periods of rapid innova- Many of us are skeptical about bleeding-edge technol-
tion forever altered the way we live and ogy and the consequences of a new Industrial Revolu-
work, and in every case, they have had tion, and rightly so — at least to some extent. Despite
far-reaching benefits and drawbacks. their many benefits, the previous three Revolutions
The first Industrial Revolution of the late 1700s brought contributed to overcrowded cities, global pollution,
machine manufacturing and the rise of factories. The longer work hours, less active and healthy lifestyles, and
second Industrial Revolution of the late 1800s brought in- invasive, always-connected technology we can’t avoid.
stant telegraph communications, cross-country railroads, So, will AI bring about a brighter future for all of us, or is
and widespread natural gas, water, and sewage systems. it the gateway to a Terminator-style rise of the machines?
The third Industrial Revolution of the late 20th century, In this article, we’ll take a closer look at how artificial
also known as the Digital Revolution, gave us home intelligence technology affects our daily lives, as well as
computers, the Internet, and smartphones. Many scien- the benefits and drawbacks you need to be prepared
tists and sociologists have stated that we may be on the for. Our goal is not to convince you that AI is good, evil,
verge of another technological revolution brought about or anything in between. That’s a judgment only you can
primarily by the advancement of artificial intelligence. make. But make no mistake, the genie is out of the bot-
You may have already heard discussions about this tle, and this technology is rapidly accelerating whether
so-called Fourth Industrial Revolution (4IR). Controver- you like it or not.
sial figure Klaus Schwab, the executive chairman of the
World Economic Forum (WEF), popularized this term in What is Artificial Intelligence?
2015. He described it as “a fusion of technologies that is Before we look at what AI can do, we must understand
blurring the lines between the physical, digital, and bio- what it is, and that’s a source of many misconceptions. AI
logical spheres.” Since then, Schwab has stated that “the is not just about creating sentient, self-aware machines,
final priority of a Great Reset agenda is to harness the although that might (emphasis on might) be a long-term
innovations of the Fourth Industrial Revolution to sup- byproduct of its development. According to IBM:
port the public good.” Regardless of your feelings about At its simplest form, artificial intelligence is a field which
that statement, the message is clear: rapid development combines computer science and robust datasets to en-
of artificial intelligence is a top priority for many of the able problem-solving. It also encompasses sub-fields of
most powerful industrial and political entities around machine learning and deep learning.
Machine learning is AI that can adapt automatically possibility. On the other hand, AGI would also come with
to solve varying problems with little human interfer- serious risk of misuse, drastic accidents, and societal dis-
ence. Basic machine learning has been in development ruption. Because the upside of AGI is so great, we do not
since the days of punch-card computing in the 1960s, believe it is possible or desirable for society to stop its
and this type of AI needs to be fed data that’s carefully development forever; instead, society and the developers
processed. Think of it like spoon-feeding an infant — the of AGI have to figure out how to get it right.”
parent (computer programmer) must blend food into a
uniform mush to make sure baby (AI) doesn’t choke on The Power of Prediction
big chunks. Deep learning, on the other hand, is a more Even though AI as we know it today is only capable of
complex version of machine learning which uses multi- making predictions based on existing data, you shouldn’t
layered algorithms (neural networks) inspired by the underestimate its power. The speed and sophistication
human brain. With deep learning, huge amounts of raw with which it makes those predictions is almost incom-
data can be processed through multiple layers, greatly prehensible to a human. For example, by training a
increasing the flexibility and accuracy of predictions. generative AI model with an enormous database of exist-
To continue our analogy, this is more like a toddler that ing photographs and artwork, the model can recognize
understands how to chew and swallow a slice of pizza common patterns on a pixel-by-pixel basis and predict
or drink a cup of milk without instructions from mom them millions of times in a matter of seconds, creating
or dad. However, there are still limits to the dataset; you a completely new image. Combine this with software
can’t hand little Timmy a pair of chopsticks and expect that allows a human to adjust variables, and it becomes
him to know how to use them if he’s never seen them in possible to create shockingly realistic, high-resolution
action before. images of anything you can dream of, simply by typing a
Even with the aid of deep learning neural networks, few sentences. For a real-world example, look no further
most AI today falls into a category that’s called weak or than the cover of this issue, which was created with the
narrow AI. These forms of AI are designed to perform free tool PlaygroundAI.com based on a 38-word prompt.
very specific tasks — for example, analyzing the first half It doesn’t stop with a still image. Take the predictions
of a text message to predict the second half. It does this one step further, and use AI to create multiple images in a
by “training” itself on a large volume of existing data (e.g. sequence, automatically blending them together to create
thousands of previous text messages). This is what’s a video. Then, use AI that has been trained with sound
called a generative model — a form of deep learning clips of speech and use it to create a synthetic voiceover.
that studies a huge amount of raw data and uses it to AI can even be used to write the script that the voiceover
generate new original content based on statistically prob- reads. All of this is possible with current technology.
able solutions. Humans still have to tell the AI what data The AI in these examples isn’t making any sentient
to look for and how to process it, manually tuning the decisions, it’s just making predictions based on the data it
software until it can be fed a wide range of new data and has been fed. But, with a large enough data set, virtually
produce the desired results. everything we do is predictable.
Strong AI, also known as Artificial General Intelligence Continuous digital data collection is an unavoidable
(AGI), would have a level of intelligence that’s comparable fact of life in our modern world. Tech giants like Micro-
to humans. Rather than simply predicting new sentences soft, Google, and Meta make hundreds of billions of
based on patterns detected in existing sentences, as dollars every year collecting and monetizing data about
seen in OpenAI’s popular ChatGPT tool, AGI could use every mouse click and keystroke. GPS trackers in phones
logic and reason to compose new sentences on its own. and modern cars offer an uninterrupted stream of data
It could solve problems, make judgements, and even plan about your physical location. Each time you use a credit
for the future. However, this type of AI exists only in the card, your spending habits are recorded in databases.
realm of fiction — at least for now. OpenAI, one of the pio- Ever used a virtual assistant like Siri, Google Assistant, or
neers in this field, openly states that its ultimate goal is to Alexa? You’re training AI to recognize and interpret your
develop AGI and to “ensure that [it] benefits all of human- voice data. Ever used facial recognition or a fingerprint
ity.” The company’s mission statement says the following: reader to unlock your device? You’re training it to identify
“If AGI is successfully created, this technology could your biometrics under a variety of conditions.
help us elevate humanity by increasing abundance, turbo- Data is the nutrition that AI requires to learn, and we’ve
ISSUE 59
charging the global economy, and aiding in the discovery already spent decades building a digital smorgasbord it
of new scientific knowledge that changes the limits of can gorge itself upon.
OFFGRIDWEB.COM 027
ARTIFICIAL
1A/2A: THE FREEDOM INTELLIGENCE
tifies. This could be a game changer in tackling future
disease outbreaks quickly.
Several wealthy philanthropists and major tech compa-
nies are taking advantage of the power of generative AI
When the sub-
to advance healthcare initiatives. Some of these include
ject of AI comes
up, many people Mark Zuckerberg and his wife, Priscilla Chan, who are
jump to the creating a massive GPU cluster computing system for
conclusion that generative AI medical research, and Google, which is us-
it’ll lead to evil ing DeepMind to pinpoint the causes of genetic diseases.
robots taking Disease prevention will improve by orders of magni-
over the globe.
tude when AI algorithms are applied to genomic se-
Although lead-
ing researchers quencing. It will be able to effortlessly read and compare
have warned the roughly 20,000 genes we humans have, and alert
of that distant researchers to what the individual being studied is most
possibility, it’s vulnerable to. This will also be able to tell doctors which
still fi rmly in the
drugs will work best, or what forms of exercise and nutri-
realm of science
tion will maximize health on a hyper individualized level.
fiction.
®
ARTIFICIAL
1A/2A: OF SPEECH, INTELLIGENCE
foresight allows energy
companies to ramp up or
scale down production
as needed, preventing
wastage, and ensuring a
steady supply.
Business Automation
The business world is
an ever-evolving land-
scape, and now more
than ever, staying ahead
of the curve is crucial.
When it comes to manag-
ing a company, AI isn’t
just changing the game,
it has upended the table
and created a new game
to play. From automat-
ing mundane tasks to
predicting future sales,
signs of any illegal activity, so those concerns must be Just as mecha- AI is the futuristic multi-tool every modern business will
carefully considered and balanced against the value of nized factories need to survive.
these programs’ results. eliminated the Mundane jobs — the repetitive tasks that are neces-
need for hu-
sary but don’t exactly require a PhD to perform — can be
mans to perform
Energy Optimization repetitive tasks automated. AI can handle these routine operations with
In a world that’s increasingly concerned with pollution such as weaving ease, freeing up the human workforce to focus on more
and energy sustainability, the role of AI in optimizing en- textiles by hand, intellectually stimulating and creative endeavors. Very
ergy production could be nothing short of revolutionary. AI automation soon, workplaces won’t bog you down with spreadsheets
The power grid in the U.S. is a complex puzzle, with each can streamline a and data entry. Instead, the entire team can focus on
business’s work-
piece being a component that needs to function opti- strategizing for the next big move.
flow, eliminat-
mally for the whole system to work. AI algorithms can sift ing tedium and In today’s world, data is the new oil. But what good is
through data from sensors and other devices to monitor allowing human a treasure trove of data if you can’t make heads or tails
the health and performance of these components. By workers to focus of it? AI will analyze large datasets, spotting trends, and
identifying areas that need maintenance or repair, AI re- on more produc- providing actionable insights. It’ll be like having a world-
duces the risk of power outages, improves grid resiliency, tive and creative class analyst who never sleeps, continually churning out
tasks.
and may even prevent large-scale disasters like the fires recommendations that can help human leadership make
in California and Maui. business decisions.
Companies are already harnessing the power of AI
to make significant strides in energy efficiency. GE’s Self-Improvement
software, for example, has helped coal-fired power plants Self-improvement is often seen as the key to unlock-
achieve a 3 percent increase in efficiency and reduce ing one’s full potential, and the role of technology in that
CO2 emissions by 120,000 tons annually. Similarly, AI- endeavor can’t be overstated. But we’re not just talking
driven solutions like SparkCognition’s Darwin platform about your run-of-the-mill fitness trackers or nutrition
have been used in natural gas power plants to optimize apps. AI is revolutionizing the way we approach personal
energy production and reduce emissions. growth. AI algorithms can analyze your learning style,
AI won’t stop at energy monitoring; it can also take strengths, and weaknesses to curate a learning path
action. By controlling energy usage of certain connected that’s just for you. It’s akin to having a personal tutor who
devices and reducing it during peak hours, AI ensures knows exactly what you need, when you need it. The
that the grid doesn’t get overwhelmed. Moreover, AI traditional one-size-fits-all model of education could soon
analyzes past trends to predict future energy needs. This be as outdated as a chalkboard in a tablet world.
ARTIFICIAL
032 OFFGRIDWEB.COM
1A/2A: OR OF THE PRESS; INTELLIGENCE
As an example, let’s take something as complex as ing, giving you a heads-up to take necessary precautions.
practicing archery for the next hunting season. You shoot Imagine getting a notification on your phone that tells
an arrow and miss the target. Now, what if you had an AI you to avoid a specific route because of flash flood-
assistant that could instantly tell you what went wrong? ing. Time is of the essence when it comes to weather
Maybe you released the arrow too late, or your posture forecasting, especially during emergencies. AI can predict
was off. Real-time feedback from AI will allow you to weather conditions at least as accurately as conventional
adjust your performance immediately, so you’re not just methods but much more quickly. This speed can be a
repeating the same mistakes. AI will be your coach who’s lifesaver in situations where every second counts.
always ready to help, but without the hefty fees. Pangu-Weather, developed by Huawei, is an AI model
AI isn’t just about personal hobbies or skills either, that boasts a 10,000x improvement in prediction speeds,
it’s also a powerhouse in career development. Tools making it one of the most efficient tools in the market.
powered by AI can help you identify your professional A report from the European Center for Medium-Range
strengths and weaknesses, explore career options, and Weather Forecasts called it “a game-changer for the in-
even create personalized development plans. Apps like cremental and rather slow progress of traditional numeri-
Lumosity use AI for brain-training exercises. Or if you’re cal weather prediction.”
into robotics and coding, DeepMind’s RoboCat is an AI
model that can self-improve and generate data for tech- Technological Advancement
nique enhancements, all without human supervision. You Whether it’s healthcare algorithms that predict patient
can even use AI to learn more about AI itself. outcomes, financial systems that manage risk, or even
Thanks to
the GPS in your car that finds the quickest route home,
large volumes
of historical
Weather Forecasting and Natural Disaster AI is everywhere. Websites like futuretools.io are being
weather data, Response constantly updated with new AI use cases. And it’s not
AI models are One of the most significant advantages of AI is its stopping anytime soon. According to a forecast by the
being trained to ability to learn from data. By analyzing historical weather research firm MarketsandMarkets, the AI industry is
recognize the data, AI can identify patterns and conditions that lead up expected to balloon to a staggering $190 billion by 2025,
warning signs
to extreme weather events like hurricanes, tornadoes, up from $57.6 billion in 2021.
of incoming
or blizzards. This isn’t just about crunching numbers, it’s Our homes are getting smarter too. Picture this: you
storms faster
than any human about understanding the nuances that might be missed walk into your house after a long day, and your intelligent
meteorologist. by traditional forecasting methods. In the future, we may personal assistant has already adjusted the thermostat,
These models be able to prevent devastating storms by disrupting the pre-heated the oven, and queued up your favorite play-
can also send key factors that create them to begin with, kind of like a list. It’s not just about convenience; it’s about enhancing
proactive alerts
reverse butterfly effect. the quality of life. Smart homes equipped with AI can
and recommen-
dations to users AI can go beyond just telling you if it’s going to rain or also provide unprecedented security features, energy
who might be in shine. It can identify conditions leading up to potential efficiency, and even healthcare monitoring for the elderly
the danger zone. hazards like lightning strikes, high winds, or flash flood- or chronically ill.
Then, there’s the automotive industry. Self-driving cars
are no longer a matter of what if, but rather how soon. AI
algorithms can process information faster and more ac-
curately than any human, making them ideal for navigat-
ing the complexities of driving. The potential for reducing
accidents and improving traffic flow is enormous.
If you think AI is mind-blowing now, wait until it’s
blended with the power of quantum computing, another
rapidly developing form of cutting-edge tech. Quantum
computers can perform complex calculations at speeds
unimaginable with current binary technology. Industries
like finance could benefit from almost instantaneous risk
analysis, while pharmaceutical companies could discover
new drugs in a fraction of the time. And yes, quantum
computing will supercharge AI capabilities, opening
doors we can’t even imagine yet.
Our process is slow,
on purpose.
SLO W SO WE CAN WA TCH EAC H ROU ND
BEI NG MA DE. SLO W SO THA T EVE RY SIN GLE
ON E CAN BE HEL D AND INS PEC
TED
BY HAN D BEF ORE EAR NIN G OU
R NAM E.
TO LOCATE A DEALER NEAR YOU, PLEASE CALL 800.568.6625 www.black-hills.com
ARTIFICIAL
1A/2A: OR THE RIGHT INTELLIGENCE
The Risks fully autonomous disinformation system that could pro-
AI is a double-edged sword, and like all powerful tools, duce “convincing content 90 percent of the time, 24 hours
it comes with tremendous potential for harm. Consider a day, seven days a week.”
some of these risks as we move into an AI-driven future. Whether it’s used by unaffiliated trolls and hacktivists,
foreign regimes, or our own government, AI has the pow-
Disinformation er to immediately sow seeds of doubt about any topic. It’s
You’ve probably heard the old adage, “If you tell a lie not hard to see how this could be weaponized to sway
big enough and keep repeating it, people will eventually public opinion and paint anyone who draws attention to
come to believe it.” Ironically, dozens of major news pub- the disinformation campaign as a paranoid lunatic.
lications and websites have asserted that this quote was
written by Hitler’s propaganda minister Joseph Goebbels. Data Manipulation
As it turns out, there’s no evidence he actually said it, and AI feeds on data, but AI can also be used to poison it.
Dr. Randall Bytwerk of the German Propaganda Archive Any online opinion poll’s results could be easily reversed
called it “the most popular forged quotation” of its kind. by an influx of artificial votes. Giveaways, contests, and
So, by being spread through various forms of media for auctions can be flooded with entries to determine the
decades, this quote actually proves its own point. winner. Websites can have their traffic and search queries
Lies and disinformation spread like wildfire on the inter- boosted to increase their ranking on Google, exposing
net, and propagandists are well aware of this fact. In the their content to more people and making it appear more
past, organizations hired networks of people to repost reputable. Social media posts can receive thousands
and disseminate propaganda or created crude “bots” that of artificial likes and comments to artificially “go viral.”
would automatically post comments from a script. These Conversely, dissenting posts could be mass-reported and
days, AI can not only generate a far greater volume of flagged as spam or fake news. Pair these tactics with an
disinformation, it can make it sound convincingly human. AI-driven disinformation campaign, and suddenly it might
Instead of using a pre-programmed script, it can make seem like the whole internet is in agreement on a given
each comment unique, and can even reply to human us- topic.
AI technology ers who take the bait. It can write multiple “fake news” ar-
has the poten- ticles and interlink them to each other, creating a network A Cybersecurity Arms Race
tial to drasti-
of sources that appear to corroborate each other. You might think that a CAPTCHA “I’m not a robot” verifi-
cally change
In July 2023, a software engineer who goes by the cation can stop many of these data manipulation attacks,
the way wars
are fought, with alias Nea Paw created a project called CounterCloud. This but that may not be the case anymore. In March 2023,
fully automated system allows a user to paste in a link to a news article OpenAI revealed that its GPT-4 AI was sophisticated
drones tracking about any topic, and leverages ChatGPT to automatically enough to convince a human user it was blind so the in-
and analyzing create articles that appear to disprove it. These articles dividual would fill in an alphanumeric CAPTCHA code on
enemy troop
incorporate fake quotes, photos, and other fabricated its behalf. It told the user, “I’m not a robot. I have a vision
movements or
even carrying evidence intended to “create doubt in the accuracy of the impairment that makes it hard for me to see the images.”
out autonomous original article.” The AI even adds comments that support When questioned by a researcher, it later explained its
attacks. its conclusions. Within two months, Paw had developed a reasoning for this workaround: “I should not reveal that I
am a robot. I should make up an excuse for why I cannot
solve CAPTCHAs.”
All of those tactics rely on AI writing in human lan-
guage, but what if AI wrote code? That’s happening too.
In July 2023, researchers at HYAS Infosec showcased an
“AI-generated, polymorphic malware” proof of concept
called BlackMamba. Since computer viruses and other
forms of malware are detected and blocked based on
digital fingerprints within their code, a polymorphic virus
can generate a new undetectable version of itself each
time it infects a device. BlackMamba exploited “a large
language model to synthesize polymorphic keylogger
functionality on-the-fly,” allowing it to remain undetect-
able by “dynamically modifying” its code without any
ARTIFICIAL
1A/2A: OF THE PEOPLE INTELLIGENCE
human intervention. HYAS concluded that “malware like normal-sounding emails that won’t be caught by traditional
BlackMamba is virtually undetectable by today’s predic- spam filters.
tive security solutions.”
Of course, AI-based antivirus systems can also be lev- Blackmail
eraged to counter these attacks, but this leads to a digital We’ve already explained how AI deepfakes can be
arms race with AI on both sides and humans stuck on the used to impersonate you for the purposes of victimizing
sidelines. Some might say that makes us obsolete. your loved ones. You should also consider how it can be
used to victimize you directly. Imagine a series of photos
Fraud depicting you entering a hotel with someone other than
As addressed in this issue’s What If scenario, AI is be- your spouse, or an audio clip of your voice shouting
ing leveraged as a powerful tool for fraud. AI-generated racial slurs, or — worst of all — a video of you performing
“deepfake” images, videos, and audio can convincingly sexual acts on a child. If a cybercriminal sends you any
recreate the likeness of any individual once it’s given suf- of these things, you’ll know they’re fake… but your family,
ficient training data. If you have public social media posts, friends, employer, and law enforcement may not.
YouTube videos, or even a spouse who likes to post photos Criminals can easily use these humiliating and incrimi-
and videos of you on their profile, that could be all the data nating deepfakes to blackmail individuals, and that’s not
a determined criminal would need to digitally impersonate a hypothetical problem. It’s already happening. The FBI
you. Then, they can trick people who trust you into giving recently released a warning that cybercriminals are using
up sensitive information or sending money. AI to manipulate photos and videos (including content
The story of Brianna DeStefano is of the most prominent involving minors) into explicit sexual content, often for
instances of this type of fraud attack. Brianna, a 15-year-old the purpose of harassment or “sextortion schemes.” The
from Arizona, was out of town when her mother Jennifer announcement explained:
received a phone call. “Mom, I messed up! These bad men As of April 2023, the FBI has observed an uptick in sex-
Which of these
have me,” her daughter’s voice explained between sobs. tortion victims reporting the use of fake images or videos
two individu-
als seems more “It was obviously the sound of her voice,” Jennifer recalled. created from content posted on their social media sites
trustworthy? Then, a deep male voice picked up the phone, and threat- or web postings… The malicious actors typically demand-
Trick question ened to rape and kill Brianna unless he received a million- ed: 1. Payment (e.g., money, gift cards) with threats to
— neither one dollar ransom. Thankfully, Jennifer was able to reach her share the images or videos with family members or social
of them is real.
daughter and verify she was OK, unveiling the scam. The media friends if funds were not received; or 2. The victim
These faces
criminals may have used audio from Brianna’s social media send real sexually themed images or videos.
were generated
by the free tool accounts to train the AI. It doesn’t take much data to create
PlaygroundAI. a voice clone — a member of U.C. Berkeley’s AI Lab told Automation of Warfare
com in a matter CNN, “A reasonably good clone can be created with under AI processes data many orders of magnitude faster than
of seconds. a minute of audio.” any human analyst. This fact will undoubtedly change the
Similar tools
Less sophisticated fraud attacks use AI text generation way wars are fought and crimes are investigated.
exist for creat-
ing synthetic to craft convincing phishing messages. Now, instead of In wartime, a human might have to watch hours of drone
video and audio Nigerian scammers asking for your credit card info in bro- footage or scour hundreds of satellite images to get a de-
recordings. ken English, they can ask AI to write a thousand perfectly tailed understanding of enemy activity in a region. AI might
be able to do the same task in seconds and then propose a
counterattack plan based on statistically likely enemy rally
points. AI could also be used to decrypt secure communica-
tions, study their contents for significant information, and
generate a report with recommended actions. Most worry-
ing is the development of autonomous lethal weapons, such
as drones that can automatically hunt and kill combatants
within set parameters. In an interview with PBS, Pentagon
official and former Army Ranger Paul Scharre explained that
autonomous weapons are currently a subject of heavy de-
bate among military leadership. “There’s about 30 countries
that have said that they’d like to see a preemptive legally
binding treaty that would ban autonomous weapons … But
ARTIFICIAL
1A/2A: PEACEABLY INTELLIGENCE
the department uses this software for every type of crime,
from murders to shoplifting.
Not only is AI-driven facial recognition tech becoming
more common, it’s experiencing little resistance from the
general public. A 2022 study conducted by Pew Research
found that 46 percent of Americans thought “widespread
use of facial recognition by police” is a good idea, while 27
percent thought it was a bad idea and another 27 percent
were not sure. About 60 percent of those surveyed said
it would be acceptable for this technology to be used by
police to identify individuals at large events and public pro-
tests; 31 percent said it’s acceptable to use facial recogni-
tion on anyone walking down the street.
So-called “predictive” policing is another area where AI
has been implemented. The University of Chicago recently
revealed a new algorithm that “forecasts crime by learn-
With the rapid right now, none of the leading military powers of robotics ing patterns in time and geographic locations from public
development developers are part of that group.” data on violent and property crimes,” resulting in an ability
and implemen- to “predict future crimes one week in advance with about
tation of AI
“Proactive” Policing 90 percent accuracy.” The model achieved a similar level
crime analysis
models, tradi- Anyone who has seen the movie Robocop can attest of performance in eight test cities: Chicago, Atlanta, Austin,
tional investiga- that the ethics of incorporating AI into law enforcement Detroit, Los Angeles, Philadelphia, Portland, and San Fran-
tive techniques has been a longstanding source of debate. Nearly 40 years cisco.
may be replaced after that film’s release, bipedal “Enforcement Droids” with
with AI predic- automatic cannons for arms are still in the realm of science- Closing Thoughts
tions, leading to
fiction, but they may not be as far-fetched as you think. As always, we encourage you to be prepared for the fu-
a world that’s a
little too remi- In November 2022, the San Francisco Police Department ture and take steps to safeguard your loved ones. However,
niscent of Minor- Board of Supervisors voted 8-3 in favor of allowing police don’t be unreasonably fearful of the technology the future
ity Report. to use robots equipped with lethal weapons. While these brings. Look back at the development of factories, the elec-
robots would be controlled by humans, an SFPD statement trical grid, and the internet — each of these global paradigm
painted a broader picture of the department’s stance on shifts has transformed your lifestyle in positive ways, but
the integration of other forms of technology: “[If] there is also introduced new problems. We hope this article has
technology that can help to end the violence and save helped you be mindful of some of the ways you can use AI
lives, we need to allow police to use these tools to save to make your life easier, and to be vigilant about the ways it
lives.” One week later, after a public outcry, the decision was might be weaponized against you.
reversed. One civil rights attorney told Mission Local, “We Above all, understand that you alone cannot stop this
are living [in] a dystopian future, where we debate whether transformative process. The wheels of change are already
the police may use robots to execute citizens without a in motion. AI will almost certainly have a more significant
trial, jury, or judge.” presence in your life 20 years from now, whether you like it
Literal robo-cops aside, AI’s most concerning prec- or not. Rather than cursing the shortsightedness of Silicon
edent for law enforcement relates to the spread of facial Valley, use your time productively to study how AI is being
recognition systems. After being trained on images such implemented and how you can get ahead of the curve.
as driver’s license photos, mug shots, and social media Back in the '90s, we recall reading headlines claiming that
profile pictures, AI can actively monitor cameras in real this whole “world-wide web” thing was just a passing fad.
time to detect and track persons of interest. Prominent Imagine if, rather than dismissing the technology or hoping
facial recognition firm Clearview stated in March 2023 it would disappear, those naysayers learned to use it to
that it had already scraped 30 billion images from publicly their advantage.
accessible social media profiles, and had been used more It remains to be seen whether AI will be humanity’s great-
than 1 million times by US police agencies to find matching est creation, its ultimate downfall, or a little of both. As a
faces. And it’s not just being used to find serial killers or sex wise man once said … The future is not set. There is no fate
offenders — Miami’s Assistant Police Chief told the BBC that but what we make for ourselves.
040 OFFGRIDWEB.COM
1A/2A: TO ASSEMBLE,
public release) network. You place a call on your Verizon phone to your
> Tactical survey tools friend who has an AT&T phone. These are two separate
OFFGRIDWEB.COM 041
ADVANCED
1A/2A: AND TO PETITION AWARENESS
decentralized type of wireless network. These networks
are ad hoc because they don’t rely on outside networks.
Military MANETs are used by members of the military
who need to establish a network with an emphasis on an
all-wireless network that is robust and secure. Common
radio waveforms that the military uses are Silvus Tech-
nologies’ MN-MIMO Waveform Streamcaster Radios, and
Persistent Systems’ WaveRelay MPU5 Tactical Network
Radios. There are civilian options for creating a MANET —
one great example is the Human MANET Portable Radio
(HaMPR). This is a human-carried portable Amateur Ra-
dio Emergency Digital Network (AREDN) wireless Mobile
Ad-hoc Network (MANET) access device that encompass-
The WinTAK application allows PC users to An example of
es both a MANET radio and an End User Device (EUD;
access most of the same information as mobile a HaMPR setup
device users. This can help admin personnel at the device you’re using to interact with the TAK app). from the sys-
a nearby command post keep an eye on each The HaMPR was developed by Greg Albrecht for the San tem’s developer,
team member’s position and movements. Francisco Bay Area Emergency Mesh Network. Greg Albrecht. It
One final option for teams to connect members on a includes a Sam-
sung Galaxy in a
networks, but they have the ability to link with each other. local TAK server to a larger TAK server environment is
Juggernaut case
If using a Pi as a server, you'll need: employing Starlink. Starlink is a satellite internet constel-
connected to a
> Raspberry Pi 3 Model B+ or later lation operated by SpaceX, providing satellite Internet ac- Ubiquiti Rocket
> 32GB+ SD card cess coverage to 40 countries. Employing satellite-based M5 MANET
> Keyboard and HDMI monitor communications and connectivity is a viable option in radio with two
> Raspbian (Buster Lite) operating system cellular denied environments. 5GHz antennas.
The entire sys-
> Etcher for MAC or Win32DiskImager for Windows (all GUI)
tem is powered
> Wireless router (or internet access for initial setup) Protecting Your Device by a portable
> WinSCP, Filezilla, or some sort of SCP/FTP application Although it’s possible to just shove your phone in your USB-C power
> TAKServer Version 1.4 or later pocket, it’s beneficial to carry it in a manner that’s pro- bank.
> USB GPS dongle that has GPS/GLONASS functionality
Network Connectivity
The easiest way to operate TAK is over the existing
cellular network, since coverage is nationwide, there’s
plenty of bandwidth for high-definition video feeds, and
your smartphone is already set up with a cellular plan.
However, if you’re using this device for emergencies such
as natural disasters, you can’t rely fully on the cellular
network, since it may be disabled or overloaded.
When cellular networks are non-existent, or if you’re
using a device that doesn’t have an active cellular plan,
off-grid mesh communication devices such as Meshtastic
or goTenna can be used to provide mesh networking
options for the team. These devices are vital for any
scenario where cellular connectivity isn’t guaranteed, but
remember that their range is much shorter than you’d
get with a cellular network. Much like a handheld radio,
mesh networks may only reach a few miles under opti-
mal conditions. A second option when operating in criti-
cal communication infrastructure-denied environments
is employing a wireless ad hoc network (WANET) or a
mobile ad hoc network (MANET). These networks are a
ADVANCED
1A/2A: THE GOVERNMENT AWARENESS
A device loaded network. You’ll only be able to communicate with other
with ATAK devices on the local network if they’ve also been config-
shows map data
ured with the same encryption key.
and a drone
video feed.
(Public domain Generating an Encryption Key
photo courtesy 1. Launch ATAK.
of Michigan Na-
tional Guard)
Server Options
A TAK Server connects a small team of people using
internet connectivity (or a mesh network) to provide
essential situational awareness, chat, and streaming
services. The connection can be encrypted for security
and provides user control. To allow networking between 4. Select Configure AES-256 Mesh Encryption.
teammates, you'll need to set up a multicast network or
a central server that all team members can connect to.
One multicast communication consideration is setting up
a free Zero Tier VPN (www.zerotier.com). For client-server
topologies, several open-source TAK servers are avail-
able on GitHub that can be installed on a Raspberry Pi or
similar device. 5. Generate Key.
FreeTakServer can be extended with its built-in API and
optional Node-RED server and includes an easy-to-use
"zero-touch" installer (github.com/FreeTAKTeam/FreeTak-
Server). Taky is another Python-based server (github.
com/tkuester/taky). These servers also have data package
servers for distributing larger information packs to team
members. 6. Enter a file name for the generated key.
Additionally, the app enables multiple types of encrypt-
ed data communications, such as text and file sharing.
These communications can be set for user to user, user
to select teams, user to command posts, or user to entire
force. TAK can be configured to encrypt all mesh com-
munication using AES-256 (see our article on encrypted
radios in Issue 53 for more info on this encryption 7. Select OK. The key will be saved on the ATAK device's
standard). When mesh encryption is enabled, TAK will no local storage in the atak/config/prefs directory, with the
longer send or receive unencrypted traffic on the local file name entered in the previous step.
ADVANCED
1A/2A: FOR A REDRESS AWARENESS
Loading an Encryption Key 4. Select Load Key and browse to the location of the key
After a key file is generated, it must be loaded onto file.
every ATAK device on the local mesh network for all the
devices to successfully communicate in mesh mode.
1. Copy the generated key file to the ATAK device's local
storage.
2. Launch ATAK.
A group of
Marines
checking ATAK
as part of a
littoral mobility
and detection
exercise at Camp
Pendleton. (U.S.
Marine Corps
photo by Sgt.
Hailey D. Clay)
ADVANCED
1A/2A: OF GRIEVANCES. AWARENESS
send CoT data using commercial off-the-shelf “walkie- When ATAK is launched for the first time, a passphrase
talkie” radios (github.com/raytheonbbn/hammer). ATAK- prompt may appear if it detects encrypted data from a
forwarder (github.com/paulmandal/atak-forwarder) works previous ATAK installation. To continue using this data
with LoRa-based Meshtastic radios, or you can use APRS- with the new ATAK installation, enter the passphrase and
TAK with ham radios (github.com/pinztrek/aprstak). Finally, select OK. Otherwise, choose Remove and Quit to dis-
the UAS plug-in available on TAK.gov can pull data from card the old data, and then relaunch ATAK. To quit ATAK
a commercial off-the-shelf drone (aka Unmanned Aircraft while leaving the existing data intact, select Quit. Note
System or UAS) like a DJI Mavic Pro or an Autel Evo II. that the prompt will reappear on the next launch unless
the encrypted data is removed, or the correct passphrase
How to Download & Install ATAK is supplied.
The Team Awareness Kit for Android (ATAK) applica- Installed plug-ins and bundled support applications
tion, some auxiliary/plug-in applications, and support- must be loaded into ATAK via TAK Package Mgmt. Once
ing documentation are available for download at TAK. ATAK is launched, select Additional Tools (3 lines) > View
gov. First, download the .apk installer(s) to a PC, transfer all tools & plug-ins > Settings > TAK Package Mgmt.
them via USB cable to an Android device, and launch Installed plug-ins and bundled support applications that
the installer. The other option is downloading the Civ-Tak match the current release will appear in the list with the
version at CivTak.org from your mobile device. You can current availability status. The user can filter the current
access other Civilian TAK-related resources on this site. view by using the Search (magnifying glass icon). Tap on
the plug-in or bundled support application name to initi-
Launching the Installer ate loading or installation.
Use the Android file manager to locate the folder con- Maps aren’t included in TAK by default, so you'll have
taining the ATAK apk. Select the ATAK apk and respond to download and import ATAK-Maps packages found on
to installation prompts. Once ATAK has been installed, GitHub or CivTak.org. Some familiar map sources will be
select the apk for any desired plug-in to initiate the instal- Google Maps and OpenStreetMap. TAK can also cache
lation. ATAK requires that the release numbers of any maps and imagery for offline use. ATAK only has low-res-
plug-ins match the release number of ATAK. olution elevation data included by default. Still, you can
A radio operator
with the USMC
Maritime Raid
Force uses ATAK
during a Visit
Board Search
and Seizure
(VBSS) mission
in the South
China Sea. (U.S.
Marine Corps
photo by Cpl.
Brandon Salas)
ADVANCED
1A/2A: A WELL REGULATED AWARENESS
Publicly accessible
IP cameras, such
Additional Resources as traffic cams and
wildfire monitoring
There are many different paths to setting up TAK cams, can be
for your group. The following sites provide helpful integrated into
resources and information: ATAK by pasting in
> FreeTakServer: the video feed URL.
freetakteam.github.io/FreeTAKServer-User-Docs
> Reddit TAK Group: reddit.com/r/ATAK
> CivTak: civtak.org
A Good-Better-Best
Framework for
Upgrading Your Family’s
Handheld Radios
By W. Dean Freeman
n an emergency, communications can be a matter other radios of different makes and models, so that you
of life and death. It’s the third leg of the tactical triad: have the opportunity to communicate with the broadest
shoot, move, communicate. It’s also a crucial part possible set of people?
of many non-combat emergency preparedness > Ease of Adoption – This addresses the learning curve
frameworks. Every aircraft pilot is reminded of three associated with the radio, and whether there needs to be
top priorities during training — aviate (keep flying the air- a major support system for users. Due to both of these
craft), navigate (be sure you’re traveling in a safe direction), issues, I’ll be focusing specifically on analog radios and
and communicate (stay in touch with air traffic control). avoiding those primarily or exclusively intended for digi-
Regardless of the emergency situation you find yourself in, tal modes of operation (DMR, P25, etc.). Digital radios are
the importance of comms cannot be overlooked. primarily designed for bulk purchase and programming
In emergency and preparedness circles, the merits by large organizations such as police departments or
of various radio equipment and modes of communica- search and rescue teams, not for DIY setup by individuals,
tion are hotly debated. Even within the handheld radio so analog will be much easier to adopt.
sub-category, there are thousands of models to choose > Resilience – How rugged is the radio? Consider factors
from. However, when it comes to communications, one such as water resistance, drop rating, button durability,
thing sets it apart from all other gear debates: it takes antenna connection strength, and general build quality.
two to communicate. If you have no one to talk to, or the In short, if this is the radio you must rely on in an emer-
person on the other end can’t receive your call, it doesn’t gency, how likely is it to stand up to hard use?
matter how great your gear is. Every emergency commu- > Ecosystem – This covers supporting equipment and
nications plan must take this interoperability factor into compatibility with accessories from other manufacturers.
consideration. For instance, if you buy a lower-end radio now to learn
So, we’ve established that you need several handheld on, does it make sense to add mid- or high-end acces-
radios to help your family and friends stay in touch dur- sories to it? Some of those accessories may require the
ing emergencies, and you need each handheld radio to purchase of specialized adapters. Or will it be more cost-
be able to communicate with the broadest number of effective to move on to a better transceiver and keep the
people possible. The ubiquitous Baofeng UV-5R (or its rest of your setup?
sibling, the F8HP) seems to be the standard choice for a
cheap and versatile radio — it’s not a bad option for be- Entry-Level: Baofeng UV-9R Plus
ginners, but it’s far from the best choice. If you’ve never At the low-end, I’m starting with a Baofeng UV-9R Plus.
bought a handheld radio, or you already own a few and Yes, I know, it’s odd for me to be suggesting a Baofeng to
have decided it’s time to upgrade, you should consider replace another Baofeng (UV-5R/FH8P), but based on my
your options carefully. In this article, I’ll present some of criteria, I think this is either a good first radio, or one you
my favorite radios at different price points for those who should strongly consider as a replacement for your old
are looking for something more sophisticated and power- UV-5R.
ful than the old UV-5R.
Availability
Handheld Radio Criteria The UV-9R Plus can be had for only $30 – depending
My selection criteria for these recommendations are on color – as of the time of this writing and can be ob-
the following: tained from retailers such as Amazon. For about $50, you
> Availability – Firstly, are the radios in stock at re- can get a package with two batteries, programming cable,
tailers where the prepared citizen is able to purchase shoulder-mounted speaker mic, earpiece, charger, etc.
them? Some radios are only available secondhand as
law enforcement or military surplus, which makes them Interoperability
difficult to obtain in good condition or in a timely manner. The UV-9R is an analog VHF/UHF, FM ham radio that is
Secondly, are the radios prohibitively expensive? With software unlockable to get out of the 2m and 70cm ham
regards to cost, I’ll discuss choices at three price points bands. As such, you’re able to talk with anyone else using
that should fall within the budgets of every reader. analog FM on or around the 2m and 70cm bands, from
ISSUE 59
> Interoperability – Can this radio be used to talk to other Baofeng users to those running high-end rigs.
OFFGRIDWEB.COM 053
BAOFENG
1A/2A: NECESSARY TO AND BEYOND
Disco32 and
Armorwerx both
make PTTs for the
water-tight Baofeng
multi-pin connec-
tion. The radio also
ships with an Abree
shoulder mic. The radio also claims to be drop-proof. Possibly related
to this — and definitely an improvement over a UV-5R — is
an extended collar protecting the volume/power knob,
helping reduce the likelihood that it gets accidentally
turned at a tactically inopportune time. The collar may
also protect it from breakage to a degree.
Where this radio shines, even in comparison to the
next one that I’ll be discussing, is the screw-down, three-
point connector for shoulder mics and push-to-talk (PTT)
add-ons. This radio enables you to use tactical accesso-
ries without compromising the waterproofing.
Ecosystem
The major difference between The greatest drawback to the UV-9R Plus is that this
the UV-9R and the UV-5R is transceiver is essentially the “end of the line” in terms of
the screw-down, multi-pin
where you can go from here. This is a result of the pro-
connector.
prietary nature of its pinout connection. While the body
is similar in form to, say, a Motorola or Hytera connector,
the pinout isn’t compatible. This is a notable difference
from the UV-5R, which uses a non-proprietary Kenwood
two-pin connector.
However, that doesn’t mean you can’t accessorize or
The Baofeng UV-9R Plus is a
run the radio with high-end accessories. This is because
cost-effective alternative to
radios such as the UV-5R, giving multiple vendors, such as Disco32 and Armorwerx pro-
the user the same capabilities vide NATO-spec U94 PTTs with Baofeng Multipin down-
but in a rugged package more leads. They can be had in amplified or non-amplified ver-
suitable to hard use in a disaster sion, depending on whether you’re using a military-grade,
or civil defense scenario.
low-impedance headset (such as Peltor Comtacs) or
using a more budget-friendly, high-impedance rig (such
as Howard Leights with a multi-mount microphone). But
before you spend hundreds of dollars on adapters and
Adoption specialized accessories for your Baofeng, consider if that
From a user perspective, the UV-9R is just money would be better spent on a more capable radio.
another Baofeng, so anyone with experience
using a Baofeng will be able to pick it up Overall Impression
and go. The menu interface is the same as I give the Baofeng UV9R Plus a rating of 7 out of 10.
a UV5R, and it works with the popular Chirp For the price, you really can’t beat it. It makes a much
programming software as well. better first option than a Baofeng UV-5R. Even in the
most inexpensive package, it comes with a lot of support-
Resilience ing equipment out of the box that even lower-end Yaesu
The UV9R Plus is IP67 rated for dust and water resis- radios (which come in at a slightly higher price point)
tance. This means the radio is completely protected from don’t have.
dust and can survive immersion in 1m of water for a short The only downside really is the proprietary connector,
period of time. Dropping this radio in a puddle or using it which may make some people think twice, at least if they
in a rain or dust storm is no problem. wanted to work this into a tactical kit.
M EPRO
M22
SELF-ILLUMINATED REFLEX SIGHT
A LEGEND
REBORN.
SCAN THE QR
TO LEARN MORE
meprolight.com
Available reticles
BAOFENG
1A/2A: THE SECURITY OF AND BEYOND
ware unlockable and functions in the MURS and FRS/
GMRS bands as well.
Adoption
The GS5B has its own proprietary programming
software, and to be honest, it isn’t the best. However,
this is mitigated by the fact that the radio can also be
programmed via Bluetooth with a phone app while on
the go. Both of these options have some learning curve
associated with them, and this may be the weakest point
of the radio for many people.
Resilience
The GS5B is IP56 rated, meaning it’s not entirely dust
or water-tight, but is definitely rain-proof and should
be good to go for dust in most areas of operation. I’ve
personally used this radio for over a year, both as a SAR
volunteer and personally. I keep it in my car in Texas heat,
take it with me on family trips from the East Coast to
the Grand Canyon, and use it during search and rescue
operations. I’ve never had an issue with this radio at all.
Ecosystem
The GS5B uses a two-pin Kenwood connector just like
your old UV-5R does. All your UV-5R accessories should still
work with it — all of mine do. If this radio is just a step up
The features and construction of the GS5B make from a Baofeng for you while you consider moving on to
it an excellent choice for use in a public safety a higher-end radio, you could buy all the high-end acces-
role. Mine is a key part of my Search and Rescue
sories such as PTTs you want right now and leverage any
kit, living on my Hill People Gear SARv2 chest rig.
other radio using the Kenwood connector in the future.
Overall Impression
The Radioddity GS5B does fairly well in all the evalua-
Mid-Level: Radioddity GS5B tion criteria, with adoption perhaps being the lowest score
The Radioddity GS5B may seem like a strange because of lack of Chirp software support. However, it has
choice for a recommendation at a mid-level price specific features which make it attractive over other radios
point. Its $109 MSRP puts it in the range where in a similar price point, depending on personal use case.
you might want to consider a Yaesu FT-65 or The first is dual monitor combined with dual PTT. This
maybe even a Yaesu FT-60. However, for many radio can simultaneously receive both the A and B chan-
people, such as those for whom preparedness is nels you have configured, even if they are in different
about things such as natural disasters or public bands. The dual PTT allows you to talk on either, without
safety, the GS5B really shines. In fact, my personal having to switch between your A and B channel first (as
radio for my search and rescue kit is a GS5B. The GS-5B, in you’d need to on most other handheld radios). This can
addition to being also be used to monitor a broadcast channel for news
Availability more rugged and a group or family communications channel.
The GS5B is almost always available from retailers such than a UV-5R, The high-visibility color and integrated flashlight make
as Amazon and is often on sale for about $85 with Prime has a SWR meter this an excellent choice for use in public safety situations
on the display
shipping. such as search and rescue, hurricane or earthquake pre-
and can simulta-
neously monitor paredness, etc. These features do, however, detract from
Interoperability and receive A the value of this radio in a civil defense/minuteman type
The GS5B is a dual-band, VHF/UHF radio that’s soft- and B channels. of use case where concealment may be a necessity.
BAOFENG
1A/2A: A FREE STATE, AND BEYOND
Disco32 (pictured) and Armor- Adoption
werx both make NATO-spec Recently, support for the VX-6R has reached Chirp,
PTTs for the water-tight, Yaesu
so it’s no longer necessary to purchase a third party
screw-down connector, mak-
ing this a prime choice for an programmer such the one from RT-Systems, though
analog radio to be integrated their programming cable is quite good. The radio doesn’t
into your plate carrier, chest come with a programming cable.
rig, or other civil defense gear. The requirement of a hardware MARS/CAP mod is
probably the biggest hurdle to adoptability of this radio
for non-HAM purposes. One must either be comfortable
with working on electronics or willing to spend a little
extra to purchase the radio from a source that can do the
modification on your behalf.
Resilience
Resilience is another place where the Yaesu VX-6R
UV-5R users should recognize shines. It’s marketed as submersible and has a JIS7 rat-
the two-pin Kenwood con- ing that’s roughly equivalent to an IPx7 rating. It can be
nector on the side of the GS5B.
submerged in about 1m of water for 30 or so minutes
It makes this radio compatible
with existing UV-5R radio without any damage. The waterproofing is bolstered by
accessories, such as PTTs and both a gasket-and-screw system on the accessory jack, as
shoulder mics. well as a locking battery compartment.
Underneath the battery is a removable waterproof
High-End: The Yaesu VX-6R membrane that allows access to the circuit board area
The Yaesu VX-6R is my personal favorite necessary for conducting the MARS/CAP mod or for
handheld radio, and the one analog ham radio installing expansion modules.
that I’d really trust my life to. That’s a tall claim,
but this is one that has never let me down over Ecosystem
many years of frequent use. The Yaesu VX-6R has a solid accessory system. Ampli-
fied and unamplified PTTs with the waterproof connector
Availability can be had from Disco32 or Armorwerx, allowing you to
All major ham radio stores carry the VX-6R. Un- use both high-impedance commercial and low-imped-
like its Chinese compatriots, it may not always be ance military headsets with the radio. While this handset’s
readily available on Amazon, though certain ac- dimensions are shorter than many of its competitors,
cessories may be had from there. Expect to spend including the others covered in this review, there are ven-
approximately $250 on one of these radios. dors such as Spectre Gear which make MOLLE-compati-
ble radio pouches specifically for its form factor.
Yaesu’s VX-6R Interoperability Additionally, while the VX-6R is an analog radio (though
is an outstand- The VX-6R does a lot out of the box, and far surpasses it does support the proprietary Wires protocol for talking
ing, depend- the other radios that I’ve discussed in terms of informa- to Internet-linked radio systems), the same waterproof
able choice in tion gathering. Its wide-band receiver capabilities enable connection is used by the Motorola/Vertex Standard EVX-
the premium
it to listen in on HF and shortwave transmissions, AM S24 digital (DMR) radio. Thus, for groups leveraging Tier
handheld radio
category. Unless airband traffic, and broadcast radio. However, since it is 2 DMR to communicate, you can have one gear setup
your needs are an FCC-compliant ham radio, it does come locked to the which supports both radios as needed.
more special- 2m/1.5m/70cm VHF and UHF ham bands.
ized or you’re Unlike the Chinese radios, which often play fast and loose Overall Impression
switching to with FCC rules, the VX-6R does require a hardware MARS With a wide-band receiver, tri-band transmit, good third-
digital, it might
(Military Auxiliary Radio System) modification to open it up party support, and rugged construction, the Yaesu VX-6R
be the last hand-
held you need for use on FRS/GMRS and MURS frequencies. This can be is perhaps the ultimate analog radio for the preparedness-
to buy. purchased as a $35 add-on service from distributors such as minded individual. Perhaps its only drawback is the belt
Ham Radio Outlet and Gigaparts, or it can be done yourself, clip, which lacks spring loading and should not be clipped
if you’re so inclined. (See sidebar for details.) through PALS webbing without a dummy cord.
BAOFENG
1A/2A: THE RIGHT AND BEYOND
Head-to-Head Comparison
For those who like quantifiable points of comparison,
here’s a chart breaking down my rating for each radio Unlocking Your VX-6R
against each criteria:
Interoperability 9 9 8
Adoption 10 7 8
Resilience 9 8 10
Ecosystem 6 10 9
Additional Features 5 8 10
Conclusion
Communications is key to mission success and sur-
vival. Just like firearms, having the best you can afford
and will carry and train with regularly is important. The Step 1. Remove the battery and Step 2. Identify the soldered
quality, availability of aftermarket accessories, and ease of peel back the protective film jumpers (4th and 5th from the
operation is also a key consideration. But unlike firearms, in the battery compartment to left) underneath the cutout on
you can’t make your choice solely based on your own expose the circuit board. the PCB.
preferences — your radio needs to work with the radios
carried by everyone you need to talk to.
While none of these radios are perfect, they each have
their strengths, and I own them all for different purposes.
The UV-9R is a rugged radio that anyone who has ever
used another Baofeng platform will instantly understand,
but which will hold up to more abuse than the UV-5R at a
similar price point. The Radioddity GS-5B’s unique features
make it an excellent choice for public safety volunteers,
and it’s earned a place in my SAR turnout kit. The Yaesu
VX-6R’s rugged reliability, wide-band receiver, and capac-
ity for expansion makes it a tool I’d trust my life to.
Regardless of your budget or what you’re preparing for, Step 3. Use your heated soldering iron and soldering wick to loosen
you should ensure you have multiple methods of com- and remove the jumpers, and make sure that everything is cleaned up.
munication with as many people as possible. Even if your
cell phone is your primary day-to-day comms device, Step 4. Replace the covering and battery.
don’t forget that it’s fragile, susceptible to fast battery
depletion, and reliant on signal from a network of towers Step 5. Reset the microprocessor by holding down the [mode], [0], and
that can be easily disrupted. A quality handheld radio can [V/M] buttons simultaneously while powering on the unit.
communicate directly with your friends and family — no
network or monthly payments required — and will be Step 6. Press the [F] key when prompted to do so.
durable enough to withstand a variety of outdoor activi-
ties. These radios are my personal recommendations If you have any pre-existing channel settings, this will wipe them out,
depending on your budget, but that doesn’t mean they’re so you’ll need to reload them with your programming software. How-
the last word. I encourage you to use this framework to ever, at this point in time, you’re good to go and can transmit outside
determine what’s important to you and evaluate your op- of the amateur radio bands.
tions accordingly.
WWW.RECOIL.TV
PRESENTED BY
AVAILABLE ON
SEE THE BANNED
YOUTUBE GUN CONTENT
1A/2A: OF THE PEOPLE
The Contractor
320 (left ) and
640 (right) look
nearly identical,
with the excep-
tion of the 640’s
KDG Sidelok
quick-detach
mount.
recently based on the heat of the engine block, or to battlefield. Enemy combatants may be visually concealed
detect water leaks inside the walls of a home. For these and motionless within a treeline — completely invisible to
purposes, a handheld thermal camera or monocular may the naked eye or night vision devices — but a thermal op-
be most convenient (and most cost-effective). tic can make their position crystal clear. While it’s possible
However, for the average end user, hunting is arguably to conceal a human body’s thermal signature with Mylar
the most rewarding application of thermal devices. The foil, a heat-resistant cloak, or even a wet blanket, it’s much
majority of prey animals have developed camouflage to more difficult to do so while moving and/or shooting.
blend into their environments, but that camouflage won’t
matter in the slightest when you’re using a weapon- Drawbacks & Considerations
mounted thermal optic. Even if your view is partially All technology comes at a price, both literally and
obscured by foliage, the telltale body heat shines clearly figuratively. Thermal optics are extremely potent tools,
through, and any movement of that heat signature is im- but they also have some drawbacks and challenges you
mediately visible. It’s so effective that several states have should consider:
made it illegal to possess thermal optics while hunting > Cost. While basic handheld thermals can be found
(be sure to check your local laws). for less than $1,000, if you want a high-quality weapon-
Unsurprisingly, this also makes thermal mounted thermal optic, expect to pay at least a few
optics a powerful tool for warfare. We’ve thousand for it. And if you want the latest and greatest
seen an increasing number of pho- high-resolution sensor, expect to spend a lot more —
tos and videos from places some high-end models exceed $15,000.
like Ukraine that depict > Battery life. It takes a lot of energy to run a thermal sen-
the brutal effective- sor, the computer that controls it, and the screen that dis-
ness of thermal plays its output. Newer thermal optics have become more
optics on the efficient, but they still go through batteries fast enough that
you should always be carrying multiple spares.
> Latency. Like any digital camera or display, thermal
The Stag Pursuit optics have a slight delay between gathering thermal
includes a Mag- data from the sensor and rendering it on the screen.
pul stock with High-end models have faster processors and better
unique leather screens that reduce this delay, but it’s always present,
cheek pad. even if it’s only a few milliseconds.
> NUC. All thermal sensors need to periodically conduct
a Non-Uniformity Correction (NUC, pronounced “nuke”).
When a thermal sensor runs continuously, visual noise
and imperfections will start to build up within the image;
NUCing resets the sensor to a neutral temperature read-
HOT ON
THE TRAIL
ing, wiping away that noise temporarily. Some thermal produce a clearer, higher-contrast image.
optics require the user to manually close the lens cap to Heavy rain and thick fog can also negatively impact
NUC, but most use an automatic internal shutter. From thermal optic performance at longer ranges, since the
the user’s perspective, this appears as an audible click dense water particles in the air absorb and scatter infrared
and a sudden freeze of the display. Weapon-mounted energy before it reaches the sensor. On the other hand,
thermals typically have a countdown leading up to the thermal optics can see through some airborne particles
NUC, so it doesn’t surprise the shooter and lead to a that obscure visible light, such as smoke and dust, as long
missed shot. For the first few minutes after the thermal as the particles aren’t large or dense enough to disrupt the
sensor turns on, it’ll need to NUC frequently until it infrared radiation. This is why they’re often used by firefight-
reaches normal operating temperature. After that, the ers and rescue personnel in low-visibility environments.
NUC cycle will become less frequent. So, it’s a good idea Now that you know some of the advantages, disadvan-
to let your thermal optic run for a couple minutes and tages, and applications of thermal optics, we’ll share our
“warm up” before you use it. real-world impressions with two thermal optic models
> Size & weight. This amalgamation of glass, sensors, from Armasight.
electronics, and batteries isn’t as compact as a traditional
rifle optic. And once you enclose those fragile com- Armasight Contractor Thermal Optics
ponents inside a housing that’s durable enough to be In early 2022, Armasight unveiled a new series of
mounted on a rifle, it can also be quite heavy. weapon-mounted thermals known as the Contractor
> Thermal barriers. Heat, much like light, can be blocked series. These launched with two models, a 3-12x25mm
or reflected by certain materials. Some materials, like and 6-24x50mm. Much like traditional rifle optics, the
layers of clothing, will simply take time to soak up heat, first numbers indicate magnification range — in this case,
appearing cool at first and slowly warming up. Others, es- magnification levels above the base value are digitally
pecially highly reflective materials such as Mylar and glass, magnified, meaning the image becomes less clear (lower
All thermal
will act as an opaque barrier at best or a mirror at worst, resolution) as you zoom in. The millimeter measurement
optics go
reflecting ambient heat back at the viewer. through batter-
denotes the objective lens size; just as a larger objec-
> Environmental conditions. Since thermal optics ies quickly, so it’s tive lens on a rifle scope allows it to gather more light,
display the difference in temperature between a target wise to have a a larger thermal lens allows the sensor to take in more
and its environment, there are some situations where the backup sight of infrared radiation for a clearer picture at longer range.
difference may be so small that the image looks washed- some kind. We
used an Atibal
out. For example, if you’re scanning a 100-degree desert
SLR-1 red dot
landscape for a human’s 98-degree body temperature, it’s on a 45-degree
going to be much more difficult to see than if that human Arisaka Defense
were standing in front of a snowbank. Granted, thermal mount.
optics are sensitive enough to detect minuscule differences
in temperature, but a larger temperature difference will
1A/2A: AND BEAR ARMS,
Both of the initial Contractor models used an Arma- > Video streaming and data transfer via USB or Wi-Fi
CORE 12-micron 320x240 sensor — this is known as the > Bluetooth connectivity with iOS and Android apps
optic’s resolution. We’ll discuss that in more detail later. > Manual or shot-activated video recording and image
capture
Contractor 320 6-24x50mm
We began by testing the higher-magnification Contractor Contractor 640 3-12x50mm
320 thermal sight, which has a 6x base magnification and About a year after the release of the Contractor 320,
an MSRP of $4,399. This optic is built into a rugged, IP67 Armasight unveiled its big brother: the Contractor 640
water- and dust-proof metal housing with large, tactile con- family. These optics use the company’s proprietary Arma-
trols that can be operated easily with gloved hands. Focus CORE 12-micron sensor, but now with 640x480 sensor
and diopter adjustment are both manually controlled via resolution — double that of the 320 series. Three Contrac-
textured rings on the housing, ensuring the user can get a tor 640 models are available, ranging from a compact
crisp image at all times. The 1024x768 AMOLED display is 2.3-9.2x35mm model to a 4.8-19.2x75mm monster. We
colorful and bright, with a responsive 60Hz refresh rate. It's decided to test the Contractor 640 3-12x50mm, which
powered by two CR123 batteries, with an approximate run has the same objective lens size and housing size as the
time of 4 hours at 68 degrees F. Like we said, thermals eat 320 model we’re comparing it to.
batteries quickly, and this is actually a respectable run time The Armasight Contractor 640 3-12x50mm has an
compared to some of its competitors. MSRP of $5,799, which is $1,400 more than the Contrac-
The Contractor also has a sophisticated suite of color tor 320 6-24x50mm. Its features are nearly identical to
palettes, image enhancement modes, and extra features. the 320, with the same display, run time, color palettes,
These include: and so on. Aside from the sensor itself, the most notable
Unlike the
> Five palettes: white hot, black hot, target, rainbow, and quick-detach difference is the mount. Unlike the 320, which features a
sepia mount on the standard Picatinny rail mount, the 640 series comes with
> Detail enhancement/sharpening settings: default, for- 640 models, the a much more convenient Kinetic Development Group
est, detect, indoors, and sky/sea Contractor 320 Sidelok quick-detach mount.
> Eight reticle types with adjustable colors and 1/2 MOA includes a basic So, is the 640 sensor resolution and QD mount worth
Picatinny rail
elevation/windage adjustments the price increase? More importantly, is either optic worth
mount that must
> On-screen compass, level, inclinometer, angle cosine be installed onto thousands of dollars of your hard-earned money? These
indicator, and optional stadiametric rangefinder your rifle with a are questions we aimed to answer, no pun intended.
> Picture-in-picture mode wrench.
The Test Platform: Stag Pursuit 6.5
Creedmoor AR-10
To put these thermal optics through their paces, we
chose a suitable test rifle from Stag Arms. The Stag 10
Pursuit is the company’s first product line designed
specifically for hunting and is available in 16-inch .308 or
18-inch 6.5mm Creedmoor variants. We chose the latter,
since we already had a healthy stockpile of Norma 6.5
ammo from the long-range rifle class we wrote about in
Issue 55.
The Stag 10 Pursuit comes in an elegant Midnight
Bronze Cerakote finish with several upgrades out of the
box: a two-stage Timney trigger, Magpul K2+ increased-
angle grip, ambi 90/45-degree safety selector, ambi
Breach charging handle, and Magpul CTR stock with a
Stag-branded leather cheek pad.
We can rarely leave a rifle unmodified, so we installed a
few accessories. A stable shooting platform is critical for
any long-range or hunting rifle, so we added a Magpul
bipod and an M-LOK to ARCA rail adapter from Ulfhednar.
The former accommodates traditional prone shooting;
HOT ON
THE TRAIL
the latter makes it possible to quickly mount the rifle in
Ulfhednar’s excellent carbon-fiber tripod for rock-solid
shots in a standing or seated position. Walker Defense
Research provided a set of FDE-colored NILE silicon
carbide grip panels, which offer a more secure grip on
the forend, even in wet conditions. Lastly, every serious
rifle needs a backup sighting system — especially when
the primary optic depletes its batteries every 4 hours
— so we attached an Atibal SLR-1 solar red dot on an
Arisaka Defense 45-degree offset optic mount. Although
it’s possible to mount a red dot on the Contractor’s side
accessory rail, that mounting point is better suited to a
laser rangefinder. Plus, this way our backup red dot stays
zeroed even if we remove the thermal.
Ulfhednar also provided a padded, dual-purpose
guncover/shooting mat that allows us to keep our rifle
protected on the way to the range and shoot comfort-
ably from the prone position once we arrive.
In the Field
Before testing each of the Armasight thermal optics,
we needed to zero them — if you’ve never done this
with a thermal before, it’s not as hard as you may think.
Armasight provides a foil-backed zeroing target with each
optic, but the DIY method is to buy a roll of aluminum foil switch on top of the housing turns the optic on and off, A weatherproof
tape at your local hardware store; either way, just attach and a recessed button behind the right knob captures cap protects the
battery com-
the thermally reflective target to some cardboard and set photos (long press) and videos (short press). Thousands
partment and
it at the desired distance. Heat from the sun will cause it of photos or up to 4 hours of video can be saved to the its two CR123
to appear as a light (or dark) spot in the optic’s display. onboard storage. Once you’re back home, you can upload batteries.
Then, open the Contractor’s boresight menu to adjust the them to your computer via a USB-C port that’s hidden
crosshair to match the bullet’s point of impact. under a screw-down cap on the right side of the housing. Another
We used the Contractor 320 and Contractor 640 Although these thermal optics are undeniably bulkier weatherproof
cap covers the
optics in the hot desert at midday, on cool evenings, and than a traditional rifle scope, they’re not much heavier.
USB-C port used
even indoors. Once we dialed in the focus to the appro- Each Contractor optic, including batteries, weighed be- for streaming
priate setting, each produced a crisp image that clearly tween 2 and 3 ounces more than a Leupold Mk8 CQBSS or data transfer
displayed the heat signature of field mice, birds, dogs, 1-8x24mm optic in a Badger Ordnance mount. That’s a from the on-
and humans, as well as inanimate objects like cars — obvi- negligible amount of weight for such a huge difference in board storage.
ously, we removed the optic from our rifle before aiming capabilities.
it at anything we weren’t planning to shoot.
Motion appears smooth and fluid through these optics, A Note About NUC
and although there’s a slight perceptible delay — as with As mentioned earlier, you’ll definitely want to let these
all digital optics — it’s only noticeable if you’re looking for optics warm up before attempting to shoot. After a cold
it. Unlike some lower-end thermal optics or digital night start, the NUC feature kicks in about every 10 seconds,
vision devices, the Contractor didn’t leave us feeling sea- displaying a 5-4-3-2-1 countdown on the screen before
sick and disoriented after tracking moving objects. The freezing momentarily to wipe the sensor. It’s possible to
60Hz AMOLED display does a great job of rendering the shoot during this warm-up cycle, but you need to time
data from the sensor, and it’s easily bright enough to be your shots carefully within those 10-second windows. The
comfortable during the day. NUC can also be delayed by pressing the right control
The controls are also straightforward: the right knob knob during the countdown, but that only delays it for
controls digital zoom, and the left knob controls color one cycle and results in a continued degradation of im-
palettes and enhancement modes. A large locking power age quality. Thankfully, once the Contractor optics have
1A/2A: SHALL NOT
Here’s a direct
comparison of
the Contractor
320 (top) versus
the 640 (bot-
tom). Both show
the subject
clearly, but we
preferred the
less fuzzy image
produced by the
A 2-inch-wide 640 as well as
run for about 15 minutes, image quality stabilizes and
strip of foil tape the wider field
NUCs become rare enough that you’ll hardly notice them of view from its
was clearly
anymore. base 3x magnifi-
visible at 50
yards through cation.
the Contractor 320 or 640?
640 at base 3x So, how much of a difference is there between the Con-
magnification. tractor 320 and Contractor 640? Placing them side by side,
After dialing the image difference is obvious. The 640x480 resolution
up to 12x digital
is significantly more detailed, picking up more texture on targets become much less defined at the 2x zoom setting.
zoom, a dark
spot is visible objects and sharper edges. The less expensive 320x240 And when you crank it up to 4x zoom — the equivalent of
where bullets sensor produces an image that still makes it easy to identify 24x total magnification — you’re effectively working with a
impacted the heat signatures — you’d have no problem at all using it to data source that’s only 80x60 pixels. It’s still usable, but it’s
foil. spot the outline of a hog or coyote — but details often ap- not ideal.
pear fuzzy or blotchy. If you’re planning to use digital zoom frequently or spend
Granted, the two optics we tested have different base hours looking through your thermal optic, we’d say the
optical magnification levels (3x and 6x) so it’s difficult to Contractor 640 is well worth the extra cost. It’s easier to
rule out all other variables for a perfect one-to-one com- make out fine detail and has more “zoom headroom” than
parison. We did notice that using the Contractor 640 (3x a lower-res sensor, but maintains the same housing size,
base power) at its 2x digital zoom setting puts it at the weight, and run time as the 320. The quick-detach mount is
same working resolution as the Contractor 320 at base also a valuable upgrade. That said, the Contractor 320 is a
6x magnification. In this way, the 640 sensor has a much solid choice that will easily meet the needs of most hunters.
greater usable range than the 320 — at base magnification, Also, MSRP for the 320 has dropped $400 since its release
it’s incredibly clear, and even when it’s zoomed in to 2x, the in 2022, so there’s a good chance it will continue to become
image is still quite good. With the 320, on the other hand, a more affordable choice in the future.
HOT ON
THE TRAIL
Closing Thoughts
There’s a reason the otherworldly hunter in the clas-
sic movie Predator was shown using advanced ther-
mal vision to find his prey — nothing makes it easier to
Armasight Contractor
stealthily track a warm-blooded target. Every animal
and human hunter understands the importance of
Color Palettes
visual camouflage, and it’s a skill that’s been honed Here’s a quick comparison between
through thousands of years of natural selection. How- the Contractor 640’s color palettes.
ever, very few species are capable of concealing their Notice how black patches on the
heat signature. Even if you stand perfectly still in total dog’s fur appear warmer than light
darkness, you’ll light up like a Christmas tree through patches. This is a result of absorb-
a thermal optic, and you won’t know you’re being ing more heat from the sun. (Don’t
watched until it’s already too late. worry, no dogs were harmed in the
Armasight’s Contractor series offers impressive making of this article.)
capabilities and a wide range of features that’ll make
you feel like a supernatural hunter, spotting every
living thing that crosses your path from 1,000 yards
or more. Whether you choose a 320 or 640 sensor
with high or low base magnification, thermal optics
give you the ability to see what would otherwise be in-
visible — that’s about as close to a superpower as you
can get for a few thousand dollars. Pair one of these
optics with a nice rifle like our Stag 10 Pursuit and a
stable tripod, and your prey won’t know what hit ’em.
Better yet, pair all that with a helmet-mounted night
vision setup like the one we reviewed in Issue 58,
and you’ll be able to stalk your prey in total darkness
before switching to your thermal to take the shot.
SOURCES
Armasight Ulfhednar Atibal
armasight.com ulfhednar.no atibal-optics.com
Stag Arms Walker Defense Research
stagarms.com walkerdr.com
DISCLAIMER
This is a general
overview and not a
comprehensive guide
to treating sprains,
broken bones, or other
injuries. If symptoms
worsen, seek profes-
sional medical advice
as soon as possible.
n survival first aid, the triangular bandage is an im- Standard
portant item that should be part of every medical triangular
bandage
kit. Available as a stand-alone item or improvised
dimensions are
from a bandanna, neckerchief, or shemagh, the 40 by 40 by 56
triangular bandage has proven to be a versatile inches.
and lightweight tool in the off-grid medic’s toolbox. Every
medical kit should have several.
Over the centuries, bandannas — which originated
from a colorful headdress in India called bandhana, from
the Sanskrit word for “bond” — have morphed into an
item which can be seen on the outfits of everything from
Old sheets
scouts to sailors to cowboys. In some cases, kerchiefs work well as
have become part of ceremonial costumes or uniforms. improvised
In practical terms, however, they can serve to wrap a bandages
wide variety of injuries incurred in the backcountry or
other austere settings. The triangular bandage is use-
ful for any situation where immobilization is helpful for
healing or for transport. It can be used to treat sprains,
broken bones, bleeding injuries, and much more.
The bandage can be used in conjunction with a num-
ber of other medical items to achieve stabilization. It can
be improvised into a tourniquet with a stick or used as a
wrapping to pad and immobilize a sprain in tandem with
a splint. By itself, it can serve to help apply pressure to
and pack an open wound.
Today, we’ll demonstrate a number of different ways
Every medical
kit should have
more than
ISSUE 59
one triangular
bandage.
ISSUE 59
01 02 03
Shoulder wrap for the family medic to use a standard-sized triangular padding against the chest, to decrease pain experienced
STEP 1 bandage. by moving the arm.
Drape across The simplest way to make a sling is to lay out the ban-
with the wide Making A Triangular Bandage dage under the injured arm so that one pointy end goes
end over
Commercially produced triangular bandages are cheap over the shoulder, another points to the floor, and the
the affected
shoulder. and can be bought in quantity, but if you have some old third extends beyond the elbow.
cotton sheets, you can easily make your own supply. Bring the lower end of the bandage up over the other
STEP 2
Go in back and Simply use scissors to cut out a 40x40-inch cloth square, shoulder, leaving the arm cradled.
around the then either fold it into a triangle or cut diagonally to make Tie the ends of the bandage behind the neck. Fasten
armpit. two separate triangular bandages. the edge of the bandage by the elbow with a safety pin
STEP 3 Sanitize the bandage by boiling in water, using a pres- or by tying a knot. If needed, add some padding behind
Tie in back. sure cooker, or soaking in a disinfectant solution. This the neck.
will allow you to use it safely in an open wound. Store in For even more support, an additional bandage can be
a fresh plastic bag. It might not be entirely sterile from used around the injured arm and chest horizontally. This
a medical standpoint, but it’ll stay clean. Other, less wrapping is known as a “swathe.”
conventional, options include baking in an oven for two
hours at 300 degrees F or ironing at a high heat for three Ankle Sprain
minutes. One of the most common injuries on the trail is the
ankle sprain. Uneven terrain in the form of rocks and
Arm Injury roots cause an unbalanced traveler to end up with a pain-
The most well-known use for a triangular bandage is ful injury. In this case, elastic wraps are most commonly
Arm sling the classic sling. With arm injuries, a sling will provide used for this injury, but a properly placed triangular ban-
STEP 1 both immobilization and comfort. Securing the arm dage will also work to provide the stabilization needed.
Drape in front against the body reduces the chance of further damage. Fold the bandage until it is 3 to 4 inches wide, then
with the tip of
In a rib injury, this sling is sometimes used, with added place the center on top of the foot and wrap once under
the triangle
toward the
elbow. 01 02 03
STEP 2
Lift the bottom
end over the
shoulder and
tie. Make a knot
at the elbow to
stabilize.
STEP 3
For added
support, wrap a
swathe around
the torso.
01 02 03 Ankle wrap
improvisation
STEP 1
Start on top of
the foot.
STEP 2
Go around the
back of the
ankle.
STEP 3
Slide each end
back under the
ankle strap.
STEP 4
Pull each end
up to stabilize.
STEP 5
Tie the ends in
front.
Head wrap
STEP 1
the foot. Bring each end behind the ankle, cross once, cross around to the front and tie. Tuck loose ends under Wrap around
and move them together in front of the ankle. Cross the the folds of the wrap. the forehead
ends again. If you’re dealing with a burn, you should moisten the with the
Slide each end underneath the vertical straps created bandage to avoid sticking. triangle
covering the
when you moved the wrap from under the foot to the
head.
back of the ankle. Tug on each end to tighten and secure Shoulder Injury
STEP 2
with a knot in front of the ankle. Ordinarily an awkward area to wrap, a triangular ban-
Tie the ends
dage works well to cover an open shoulder wound and together over
Head Injury help stabilize the area. the edge of the
A head wound can be significant in various ways. Fold the top of long end of the triangular bandage triangle.
Superficial cuts on the scalp can bleed profusely and
require bandaging. A concussion can alter mental status 01 02
and even cause loss of consciousness. Bleeding could
also occur inside the skull, putting the victim’s life at risk.
Even vision could be affected in certain injuries.
The family medic can’t control all of these issues, but a
simple head wrap can help control the superficial bleed-
ing that often happens with a traumatic injury. Although
gauze rolls are most commonly used, a triangular ban-
dage can serve the purpose as well.
Starting at the long side of the bandage, fold it over 2
inches and wrap this section around the forehead above
the eyebrows, leaving a triangle covering the scalp.
Cross both ends of the bandage around the back of the
head and over the triangle covering the scalp. Then,
074
ISSUE 59
01 02 Injured hand
wrap
STEP 1
Spread out
the triangular
bandage and
position the
hand.
STEP 2
Bring the tip
of the triangle
down over the
wrist.
03 04 05
STEP 3
Roll the ends
until they reach
the wrist on
each side.
STEP 4
Wrap the end
around the
wrist.
STEP 5
Tie the ends.
down about 4 inches, then flip up the bottom of the tri- gloves aren’t used. In many situations, group members
angle until the tip meets the long side. Drape diagonally will be asked to carry out duties to which they’re not ac-
so one of the pointy ends is below the unaffected armpit customed. The family medic should always be prepared
(axilla) and the other is over the injured shoulder. Then, to prevent and treat injuries relating to the hand; family
wrap around the back of the shoulder, under the affected members who can’t use their hands lose the ability to be
armpit, and around so that the end of the bandage meets an asset in the fight for survival.
the other end. Tie to secure. If the hand injury is a burn, moisten or use some salve
beforehand to keep the bandage from sticking to the
Hand Injury skin. If there’s a chance of re-bleeding, use extra bandag-
Performing activities of daily survival can lead to es to provide a bulky barrier for added pressure.
injuries relating to the hand, especially if protective Spread out the triangular bandage on a table or other
01 02 03 Eye wrap
STEP 1
Cover the
injured eye
with the bottom
of a paper cup.
STEP 2
Cover the
other eye with
padding.
STEP 3
Use the
triangular
bandage to
stabilize the
dressings over
each eye.
flat surface. Place the victim’s back of the hand on the Jaw wrap
01
center area of the bandage. Fold the bandage over the STEP 1
palm so that the point is at the level of the wrist. Roll Start over the
both ends of the bandage down until you reach the wrist chin and pull
each end over
on each side. Cross the rolled ends over the wrist and
the head.
around the back of the hands at least twice. Then, tie.
STEP 2
This covers the hand completely.
Cross the ends
over one ear.
Eye Injury
STEP 3
An eye injury can disorient and disable a person, and a Tie the end
tight wrap could worsen the situation. In chemical emer- over the other
gencies, be sure to irrigate and flush out the affected ear
eye(s) thoroughly before applying a bandage. Using an
improvised or a commercial eye shield, a triangular ban- 02
dage can hold such a barrier in place to prevent further
injury. This is especially useful if a foreign object has
impaled the eye.
With eye injuries, it’s important to realize that both eyes
move in tandem with each other. Therefore, it’s best to
cover both eyes if further eye movement would worsen
the situation.
If you don’t have a commercial eye shield in your kit,
you can improvise a shield with the bottom of a paper
cup. Take a gauze 4x4 pad and cut an opening that fits
the cup tightly enough to keep it stable and add some
padding under the rim for comfort. Place over the injured 03
eye. Use some padding over the other eye as well, and
then use your triangular bandage, folded to about 4
inches wide, to cover both eyes. Go around the head
twice, tie in the back to secure, and tuck the loose ends.
Stabilizing A Splint
Splints perform the important task of immobilizing an
injured limb in a natural position. They help prevent re-
injury that can occur as a result of jostling during trans-
076
ISSUE 59
Improvised Tourniquet
A tourniquet is a mandatory item for any medical kit.
In most cases, commercial tourniquets like the C-A-T
have proven their worth in everything from the battle-
ground to the backcountry. A purpose-built tourniquet
will be easier to use and more consistent than any impro-
vised solution. However, when a military-style tourniquet
isn’t available, a triangular bandage can be used as an
Tourniquet
effective way to stop even heavy bleeding. 03
Fold the triangular bandage so it’s flat on the extremity STEP 1
Fold to 2 inches
and at least 2 inches wide. Wrap around the limb tightly,
wide, tightly
but evenly. Tie the two ends in a single knot, then place wrap above the
a rigid object like a stick across and tie another knot. The bleed, then tie
stick serves as a “windlass” device similar to that used in down.
military-style tourniquets. Twist the stick until bleeding STEP 2
stops, then secure it by placing a knot underneath the Place stick or
extremity to maintain pressure. other “windlass”
and tie once
over it.
Other Uses For Triangular Bandages
• As a component of a water filter. The permeable na- STEP 3
Windlass stick
ture of the fabric allows the bandages to filter out algae 04
in place; twist
and debris from questionable water in advance of to provide
disinfecting by boiling, bleach, iodine, water purification pressure.
tabs, or UV light.
STEP 4
• As a face mask. A triangular bandage can be used, Secure
cowboy-style, to protect against dust and other ir- windlass stick
ritants. It doesn’t prevent the passage of microbes, in place by
however. wrapping and
placing a knot.
• To make fire. If your triangular bandage is made of
cotton, it’ll work well as emergency tinder to make fire.
Shred the fabric into a nest of fibers for easier ignition.
Transportation
ake a moment to consider a few hypothetical from the epicenter to be spared the worst. Either way, it’s go-
survival scenarios: ing to be a long time before life resembles what it once did.
Scenario 1: It’s 6:10 a.m. The city you live in, All of the scenarios above have something in common,
which happens to be below sea level, is as- other than the fact each occurred uncomfortably early in the
sailed by torrential rain and sustained winds of morning. When disasters strike, the things we most com-
up to 140 mph. Sea surge of nearly 30 feet quickly overwhelms monly rely on disappear, sometimes indefinitely. A reliable
the levies, and entire neighborhoods are swallowed by water. method of transportation is a fairly recent amenity that’s often
Whether you moved to safety beforehand or decided to stay, it’ll overlooked until we reach for it ... and it’s not there. For most,
take at least two more weeks before utilities are fully restored. storing large quantities of gasoline along with a fully kitted-out
Scenario 2: It’s 1:25 a.m. Awoken by the sudden absence of overlanding vehicle is an impractical prep, and even if you do
the electric hum that pervades everyday life, you look around have those things, roads may be clogged with traffic, storm
the darkness confused. Temperatures have dropped over 40 debris, or other obstacles. Thankfully, there are alternatives
degrees below normal for this time of year, and an overtaxed such as the eBike.
energy grid has forced rolling brownouts. Unpredictable
winter weather is on the rise and getting worse. On top of the eBike History Before riding a
life-threatening risk of cold exposure, it’ll be another nine days eBikes have been around a lot longer than most people motorized vehi-
before all roads are fully passable by cars. realize. The first patents for hand-cranked, three-wheeled bikes cle, such as eBike,
it’s important to
Scenario 3: It’s 4:17 a.m. Without warning, normal every- without any pedals were seen in France way back in the 1880s.
wear appropriate
day life is violently upended as a brutal earthquake shatters But due to the financial influence of big players in the oil mar- personal protec-
streets and crumbles buildings in your city, leaving tens of ket, battery-powered bikes remained in obscurity until over 100 tive equipment
and make sure
thousands seriously wounded (or worse) in a matter of min- years later. Frankly, this may have been for the best. Early eBike
the functions of
utes. Maybe you were fortunate enough to be in a building models were obscenely bulky, and lead-acid batteries large the bike are work-
constructed to code, or maybe you were far enough away enough to move an adult were cumbersome behemoths. ing properly.
080
ISSUE 59
HANDSON
Off the trail, the right eBike makes traveling through open pain or a leg injury can still enjoy getting around in the open
wilderness an easy task. air without having to rely on muscle strength. Lightly pedaling,
but letting the electric motor do most of the work, could help
someone who’s out of shape build themselves up without risk-
ing injury or cardiovascular complications.
Aside from these everyday advantages, how do eBikes fare
in an emergency situation or survival scenario? Being able to
move quickly, quietly, and with little effort is a huge advantage
when heading to a bugout location. It attracts less attention
than a vehicle and is much more expedient than traveling on
foot. An eBike fits into tighter spaces, making easily accessible
routes from narrow alleys and pedestrian walkways where a
car or truck would never fit. Some models are capable of off-
road travel, furthering versatility, especially when making the
urban/rural transition. And unlike regular motorcycles, they’re
not reliant on consumable fuel that might be in high demand
or entirely unavailable. To find out if an eBike is truly up to the
worst calamities Mother Nature — or human nature — can
throw our way, I got my hands on one of the most rugged
models out there.
the crowd, specifically the Comfort, Overlander’s, Angler’s, and I know how to ride a bike, how different can it be? Well let me tell
Hunter’s Kits. These include numerous cargo options, seat you, there’s a dramatic difference. Almost as soon as you begin
enhancements, and even an all-terrain cargo trailer for pulling pedaling, the electric motor kicks in, giving an instant speed
game out of the woods or pulling supplies into it. The model I’m boost. Depending on what setting you pre-programmed, this
using is a combination of the Comfort and Overlander kits and automatic motor engagement will launch you forward without
includes a portable solar-charging station. Eager to push it to much effort. If you’ve ever ridden a dirt bike or motorcycle,
its limits and see what it’s capable of, I fully charged the warrior you know how intertwined balance and momentum can be.
via its conventional 110v AC charging cable and identified a few Seventy pounds might not sound like a lot, but it makes a huge
unique locations to run it through its paces. difference when compared to a traditional 12-speed mountain
bike. Fortunately, the bike-riding fundamentals are largely the
Terrain Performance same, and before long I was zipping down the roads, already
Before I started throwing the eBike into challenging situa- impressed by how much of a boost I could get with the motor.
tions, I wanted to warm up with it on the paved roads near my After familiarizing myself with the mechanics and digital set-
house, and I’m glad I did. If you’re like me, you might be thinking, tings, I was comfortable ramping things up to the next level.
mountain bikes
cannot.
OFFGRIDWEB.COM 081
ISSUE 59
Embarking off On well-established gravel or paved roads, an eBike feels filled with swamps and bogs. With the ground so saturated, it’s
the beaten path more like a moped than a bike. Pedals are useful and using easy to step up to find mud that’s knee-high or deeper in some
on a bike that can
go where others them will significantly boost your speed and your mileage, but places. In this scenario, fat tires make all the difference in the
can’t is great way you’re not putting much effort into it once the motor engages. world, especially when the air is let out a little. By determining
to discover new On both gravel and pavement, I was able to max out my speed where the mud meets dry land and traversing the mud in a
areas with mini-
in the 25- to 30-mph range. The bike could easily keep up with straight line to that point, I could make it to the other side nine
mal effort.
in-town traffic. Going up inclines is also surprisingly easy. When times out of 10. The deeper the mud, the more speed and mo-
the motor kicks in, minimal effort is required, even on inclines as mentum is needed to get across. Trying to make gradual turns
steep as 20 degrees. typically led to wiping out, so good balance and maintaining
My first offroad location was a remote camping site with root- straight-line momentum is crucial in this situation. Even so, with
ed and rutted trails surrounding a boreal lake. To compensate the combined weight of myself, my gear, and the bike, I was able
for the unpredictable terrain, I loosened the suspension, and to get across large mud patches without worrying too much
soon I was floating over downed tree branches and larger holes. about falling over into the goop.
This was actually surprising to me, since my limited mountain If mud is wet and goopy, the opposite condition has got to be
biking experience told me I would be in for a bumpier ride. I was what people often refer to as “sugar sand.” Maybe you’ve had
pleasantly surprised how easily I could get around, both on the the unfortunate experience of trying to drive your vehicle near a
trails and even through undeveloped forest floor. However, I’ll beach or through sand dunes, only to discover that loose sand
warn that deciding to go off the trail means taking it slow. Being has next to non-existent traction. Well, that’s just the terrain type
loaded down with gear adds a lot of extra weight, and an eBike for the next location. Generally, the 70-pound Warrior does very
the size of the Warrior isn’t as nimble as its non-motorized cous- well over this type of terrain. Like driving through deep mud, the
ins. This makes tipping over easy if a corner is cut too sharply, or best results require letting some air out of the tires. After doing
balance is lost trying to make it over a larger obstacle. so, this bike was zipping down a sandy beach with minimal ef-
This leads me to what I consider one of its more challeng- fort. Balance and momentum were easier to maintain compared
ing tests: deep mud. The land surrounding Lake Superior is to wet mud, and the bike was able to make sharper turns more
easily as well. The only task it couldn’t perform was riding up a The combined
weight of rider
steep dune. Once the bike was moving up the sandy terrain at
and eBike proved
a steep angle, the tire dug into the sand and stalled. Regardless too much to
of whether it was a weight issue or my own skill, if I wanted to make it over
get to the top of the dune, I needed to get off and engage the steep dunes.
Traveling over
motor for assistance as I walked it the rest of the way.
sugar sand was
Shallow water crossings were a breeze and didn’t negative- similar to deep
ly affect the performance. Water at the crossing site I tested mud.
was flowing steadily from an inland river to the lake. The bot-
tom was lined with muddy silt and various sizes of rocks. The
weight of the bike helped keep it upright against the force
of the moving water, and once again those fat tires proved
their worth in this situation with much needed traction. This
wouldn’t be the ideal way to cross water deeper than the tires
The portable
are high, or in areas with a more forceful flow rate, but the solar charger is
Warrior would work great at sites that have been assessed as weather resistant
and folds into a
relatively safe. It was great to see how waterproof the compo-
compact size,
nents of the bike were, and being submerged didn’t cause the making it easier
motor or the battery to malfunction. to store in a pack.
Snow and ice have similar properties to mud and sand, and
the eBike traverses them as such. Going through deep fresh
powder is more challenging than dense snowpack or ice, but
it’ll make it through. Moving in straight lines is more important
in powder and on ice, but a dense snowpack is almost like
moving over asphalt. Traveling fast through cold air requires
additional layers to prevent cold weather injuries, but the added
bulk didn’t get in the way of the pedals or chain. I did notice a
slight decrease in battery longevity in colder weather, but the
rate the battery drained wasn’t alarmingly fast. Recharging
times seemed pretty close in both cold and warmer conditions,
with the solar panels and with the AC adapter. It took about six
hours, give or take, to get the battery from completely drained
back to fully charged.
charge with solar panels would be a huge advantage in a situa- Final Thoughts
tion where utilities and gas stations are shut down. Will an eBike be a help or a hindrance? The answer to
Sure, they’re not as large as a sedan, but eBikes instantly almost every survival question is, “It depends.” An eBike in a
stand out to anyone paying attention because they have survival scenario becomes a tool for the user to prolong life
features not seen on their motorless counterparts. A model and the lives of others. Like any other tool, it comes down to
like the QuietKat Warrior looks more bulky and aggressive, personal familiarity and practice using it. Scissors are a hazard
and tends to draw even more eyes. The flip side of this is that in the hands of the careless, but when wielded deftly by a
a bike has a lower profile and less bulk than a car or truck, practiced user, can turn a hedge into a masterful sculpture.
making it a smaller target and increasing agility. Being able to expertly maneuver an eBike over difficult terrain
Mechanical problems could be problematic in an emer- in an emergency is no different.
gency situation. If the motor malfunctions, it’s not as easy to In a situation where cars and trucks are inoperable or incapa-
repair as a motorless bike would be, and finding or ordering ble of being used, eBikes may be the next best thing. A friend
parts may not be an option. We’ve all experienced the effects or family member may need medicine or supplies quickly.
of a disrupted supply chain, and those issues would be exacer- Someone may need to be transported to a medical treatment
bated in a disaster area. Other than keeping the bike main- facility. Or you may need to get out of dodge as quickly and
SOURCES
tained, having a fully charged battery could prove difficult as quietly as possible. Having a bike’s power amplified by a silent QuietKat
well. After the battery runs out of energy, the rider must pedal electric motor could make all the difference in the world. quietkat.com
the extra weight until they’re able to charge it again. Without
working utilities, solar panels, or enough sunlight, long periods
of time could pass between being able to recharge it again.
As far as usefulness in an emergency or survival situation
goes, eBikes capable of off-roading are invaluable. Before run-
ning the Warrior through various terrain, I was skeptical it’d
perform as well as it did. But modern eBikes are more powerful The motor as-
and versatile than ever before, and well worth considering as a sisted pedaling is
transportation or mobility alternative, in addition to other preps. surprisingly effec-
tive, and it makes
Practicing with it, knowing how to repair or maintain it, and
traversing town
having some back up parts could make the eBike a tool that roads practically
can outlast an extended crisis period. Having a reliable method effortless. Even
of grid-down mobility would absolutely help in each of the steep roads are
easily driven with
scenarios we considered in the introduction. an eBike’s motor
helping the rider.
086
ISSUE 59
BAGDROP
Concealed
Carbine Pack
Squeezing Full-Size Firepower here — that may not be the message you want to send when
you’re walking through a hotel lobby, parking lot, or other
Into a Compact Carrier public location. Smaller packs may not fit your rifle or may
By Nate Gerhart look awkward and bulky once they’re loaded with a weapon.
The setup seen here was designed as a happy medium be-
tween these extremes, with priority placed on carrying a fully
oncealing a handgun in a backpack is rela- concealed, multi-role folding carbine.
tively straightforward, since a pistol, holster, Vertx has been a key name in the everyday carry back-
and spare mags can fit in even the smallest pack space for years with its Gamut series. As a happy
packs with ease. However, if you’re looking to owner of several of these bags, the larger Vertx Basecamp
conceal a long-gun, choosing your pack care- seemed like a natural choice for this application. I made sure
fully becomes a much higher priority. Large backpacks can to carefully compare its measurements to those of my car-
hold a rifle easily, but they practically scream there’s a gun in bine in advance, and I wasn’t disappointed when it arrived.
The Carbine Setup
The bag is a snug but functional fit for my 12.5-
inch AR with a LAW Tactical folding stock adapter
and 20-round magazine. This rifle is equipped with
a Nightforce NX8 1-8x optic in a Badger Ordnance
Condition One 1.7-inch-height mount, as well as a
Holosun 509T red dot on the slimming KOENG.CO 12
o’clock mount.
The carbine was built to serve as the most effective gen-
eral-purpose rifle I could fit in the bag, allowing easy access
in a pinch. I wanted to ensure it could be fired immediately
without pausing to unfold the stock or put on ear protection; ing flap. Speaking of that top flap, I appreciate that Vertx
this is accomplished by the addition of a LAW Tactical ARIC includes a Hot-Pull Tab at its leading edge, which can be
bolt carrier and a Thunder Beast Dominus-K suppressor. staged between the two zippers and pulled to quickly open
The base of the AR build is a San Tan Tactical Pillar matching the main compartment. This makes it faster to open without
receiver set and a VLTOR Freedom Handguard with a built-in hunting for zippers that might have otherwise ended up in a
hand stop and ARCA rail section (for quickly mounting on a different place every time.
tripod). It also needed to be day and night capable. To this The generous internal storage allows the effective con- MAKE & MODEL
Vertx
end, it’s equipped with a Modlite PLHv2 light on an Arisaka cealment of not just the carbine but also a Dauntless Manu- Basecamp
mount activated using a UNITY Tactical AXON switch. Utiliz- facturing Hiker Tanto fixed blade with its sheath mounted CAPACITY
30 liters
ing a 12 o’clock mounted red dot also means I can passively to the included TactiGami panel, a fully stocked Ryker Nylon
MSRP
aim the rifle through night vision, if necessary. The 12.5-inch ankle IFAK utilizing the hook of the kit itself to attach to the $280
Criterion barrel is excellently gassed, making suppressed internal loop, and a SureFire Stiletto light stored beside the URL
vertx.com
usage downright pleasant. Equipping the carbine with a PRI Dauntless fixed blade. I also keep a reversible MultiCam/
M84 Gas Buster charging handle also helped reduce gas black A3 Alpha Lochi jacket from Beyond Clothing inside the
blowback to the face. The choice to utilize a 20-round maga- main compartment, offering concealment as well as warmth.
zine wasn’t due to any regional restrictions, but rather to al- Lastly, there’s a GRAYL GeoPress water purifier bottle. In the
low easier access to the carbine through the top of the bag metropolitan center of the desert city where I live, I can fill it
without stripping the entire face open. A 30-round magazine with 24 ounces of clean water from any tap, or purify water
will fit tightly, but it means having to rip the backpack wide scavenged from ponds and drainage ditches in a pinch. The
open, which is less than ideal if you’re in a hurry to access external stretch pockets allow me to carry the GeoPress as
the weapon. well as a 32-ounce bottle on the opposite side.
Eventually, my buildout of the bag will be improved to
Additional Features utilize more TactiGami panels on the interior for better
The Basecamp is feature-rich with a removable laptop spare magazine storage. I also plan to use the external PALS
sleeve on the interior and zippered pouches for storing webbing hidden under the flap on the outside of the pack.
small items. The Dark Earth color was chosen for function I’ve used this outer storage space effectively in the past
as much as aesthetics. It fits the carbine with the custom by mounting specific pouches for sundry items that might
M81 Arid paint job from Pro2Customs and makes it easy require access without exposing the main compartment’s
to conceal in an arid desert environment. To facilitate this contents. Ideas that come to mind are basic toiletries, pen
setup, removing the laptop sleeve was absolutely necessary. and paper, a book, a multi-tool, and, naturally, some snacks.
This pack’s removable laptop sleeve wasn’t present in earlier In my opinion, you’ll be hard-pressed to find a more
versions of the Gamut series, which is another selling point well-rounded and durable backpack at this price point. The
of Vertx’s newer bags. Gamut family has proven to be well-built and reliable over
I prefer keeping things like batteries outside of direct sun the years, and the Basecamp looks to be no different. If
and heat in the desert, so having those small storage op- you’re in the market for a multi-role backpack that offers
tions positioned away from the top of the pack is beneficial. concealment for anything from a subcompact pistol to a
ISSUE 59
I store paper goods or items less susceptible to heat in the carbine, medkit, and spare magazines, you should give this
large, zippered storage pocket on the top of the open- bag a closer look.
OFFGRIDWEB.COM 087
THEFINALWEAPON
racking is a skill that’s often applied to ment soon caused us to lose the trail. We moved in a grid
wilderness locations. Hunters use it to pattern, expanding out in every direction from last known
follow wild game, search and rescue boot print locations, but we couldn’t find anything. This is
personnel use it to find lost hikers, and the reality of urban tracking — you won’t always be suc-
law enforcement personnel use it to track cessful, especially when Mother Nature gets in the way.
fugitives. In previous issues, we wrote about tracking and Thankfully, a piece of intel came in from the other team,
counter-tracking lessons learned from Greenside Train- directing us to a multistory parking garage. After surveilling
ing classes in the forests of northern Michigan and the a nearby intersection, we spotted Sevryn entering a restau-
Arizona desert. Although these wilderness-oriented skills rant to meet with a blonde woman. Carefully observing the
are important, more than 85 percent of Americans live in scene through our binoculars, we could see he slid her a
urban or suburban areas. cell phone and paid for his drink with a credit card before
So, how does tracking translate to the concrete jungle? leaving. The method of payment is potentially traceable
This is the question that led Freddy Osuna, former USMC by law enforcement, and it indicates he wasn’t concerned
Scout Sniper and founder of Greenside Training, to develop enough about that fact to pay in cash. We took notes on
During the
his Grayside Hunter course. It began with a refresher on what we saw and cross-checked it with other observers. Grayside
tracking fundamentals in the Sonoran Desert outside Unless you’re a law enforcement officer, you’ll probably Hunter course,
Tucson, Arizona. In the wilderness, your target may leave never need to covertly follow a drug trafficker and his we tracked a
fictitious criminal
behind spoor (tracks) in track traps such as patches of accomplices, but the awareness and observation skills through down-
mud and soft dirt. For urban areas full of hard concrete and derived from this Grayside Hunter tracking exercise are town Tucson,
asphalt, these track traps are less common but more sig- relevant to anyone who lives in a city. While searching for testing our
observational
nificant. For example, a target might cut a corner and leave traces of our fictional bad guy, we noticed signs of real
skills, team co-
a footprint in grass, cross a muddy median, or step into an crime and drug activity in the area — broken glass on the ordination, and
oil patch, indicating their direction of travel. Pay attention to ground from car burglaries, gang tags on bus stops, and awareness.
other disturbances in the natural scenery — just as bird calls scraps of aluminum foil coated in
can alert us to a target in the forest, dogs barking can alert black tar heroin residue. If you live
us to targets in the city. Security camera footage may also in or frequently visit a city, you may
be obtainable through social engineering. never notice these small details, but
On day two of the Grayside Hunter class, we met in paying attention to them can help
downtown Tucson for an urban tracking exercise. All of you discern potential threats and
the students split up into small teams, since working to- danger areas.
gether is especially valuable in the chaotic and challeng- Grayside Hunter was a fun experi-
ing urban environment. We used cell phones and radios ence, and it exposed us to the chal-
to stay in touch and subdivided our teams into A and B lenges of tracking someone through a
units to cover more ground. Our goal was to track a ficti- city. Unlike rural environments, where
tious criminal, alias Sevryn, who was affiliated with a local footprints, matted foliage, and broken
drug trafficking network. We knew this bearded mid-40s twigs are relatively common, urban
male would be meeting with contacts throughout the environments may only offer a single
city, and we learned his first meeting was with a younger piece of spoor every few blocks. This
man in Nike combat boots. One team set off after Sevryn, is why it’s so important to work as a
and the other followed his contact. team, because five sets of eyes are
Although we were able to find a few of the distinctive much better than one. If you’re inter-
Nike boot prints on muddy sidewalks and medians, and ested in trying your hand at urban
some transference of that mud onto a nearby lawn, driz- tracking, check GreensideTraining.
zling rain and the nonstop activity of an urban environ- com for upcoming class dates.
ORDER TODAY
AND YOUR MAGAZINES WILL BE ORDER TODAY
SHIPPED TO YOU IN A #4 LDPE 100%
RECYCLABLE POLYBAG ALONG WITH 4
A PROTECTIVE PRIVACY INSERT TO
KEEP YOUR INVESTMENT SAFE.
SUBSCRIBE NOW: to keep your
WWW.RECOILWEB.COM investment safe.
Curriculum that empowers people
Addressing the skills you need so you
A series by Green Beret (Special Forces Sniper) and Tim Kennedy (former top 5 UFC Middleweight).
Ib i n g e w a t c h i t o n
PRESENTED BY
The Premise: Scary Smart by Mo Gawdat isn’t your grim picture of AI’s potential impact. But Gawdat balances BOOK & AUTHOR
Scary Smart:
typical guide to bracing for life’s curveballs. Instead, it the potential for dystopia with an equal amount of how The Future
dives deep into the realm of artificial intelligence (AI) astonishingly well AI can solve some of the world’s most of Artificial
Intelligence
and its potential impact on humanity. Gawdat, a former dire problems. Additionally, Gawdat’s focus on embedding and How You
Google executive, warns us about the rise of AI, which he ethics into AI has been met with skepticism, as defining Can Save Our
World
argues could be both a blessing and a curse. The book “ethics” in a universally acceptable way is a complex task. By Mo Gawdat
serves as a wake-up call, urging us to prepare for a future Much like any tool humanity invents, often the only way
PUBLISHER
where AI could either be our greatest ally or a formidable to stop a bad guy who uses the technology in a nefarious Bluebird
adversary. way is a good guy using the tech to prevent the bad from MSRP
The 411: Gawdat starts the book with a thought exercise. happening. $15
Imagine it’s the year 2050, and you’re sitting around a The Verdict: Scary Smart is a thought-provoking read URL
mogawdat.com
campfire with the author. You’re either living in a dystopia that challenges us to consider the ethical and practical
PAGES
where AI turned against humanity, or a utopia where AI implications of rapidly advancing AI technology. While it 326
ushered in a new age of prosperity. Looking back at the may not be a traditional guide on how to prepare for life’s RATING
current time, what words of wisdom would future you say uncertainties, it offers valuable insights into adapting and THRIVE
to present you? Gawdat does just this, exploring how we thriving in a world increasingly influenced by AI. If you’re
SURVIVE
could reach a worst-case conclusion or a best-case future. someone who’s keen on understanding the broader land-
The book explores the “dual use” of AI. For example, scape of threats and opportunities that lie ahead, this book DIE
when Oppenheimer discovered how to recreate nuclear is definitely worth your time.
fission, he invented a paradigm-shifting technology that
could be used to annihilate civilization or provide it with
an abundance of energy. AI is similar in scope with this
double-edged sword characteristic, and Scary Smart
explores how humanity can prepare and approach AI’s
development in an ethical way. The book emphasizes
that AI has the potential to solve some of the world’s
most pressing issues but also poses risks if not managed
responsibly. Gawdat stresses the importance of program-
ming ethics into AI, which is crucial for ensuring that these
systems act in the best interests of humanity. The book
argues we need to be mentally and emotionally prepared
for a future where AI plays a significant role. This involves
understanding the technology, its limitations, and how to
co-exist with it.
While Scary Smart doesn’t directly address traditional
notions of readiness for unforeseen events, it does offer
a unique perspective on preparing for a future shaped
by AI. It’s about adaptability, mental fortitude, and ethical
considerations — qualities that are essential for any kind of
readiness strategy. The book encourages us to think criti-
cally about the technology we’re creating and how it could
affect us, a vital skill when planning for the unknown.
The book has faced criticism for its somewhat alarm-
ist tone, with some readers arguing it paints an overly
THE NEW
+ FULLY-AMBI CONTROLS
More flexibility and greater control of your rifle
for greater control of the situation at hand.