You are on page 1of 96

CONTENTS ISSUE 59

DEPARTMENTS FEATURES

6 Editor’s Letter 26 Artificial Intelligence


An Artificial Future Examining the Potential Threats and
Benefits of AI Technology in Our
08 Gear Up Daily Lives
The Latest and Greatest
Products 40 Advanced Awareness
Bring Your Group’s Navigation,
14 Pocket Preps Comms, and Surveillance Capabilities 26
Slip-Joint Knives into the Digital Age with the Tactical
Awareness Kit (TAK) App
40
18 What If?
You’re Targeted by a 52 Baofeng and Beyond
Deepfake Cyberattack? A Good-Better-Best Framework for
Upgrading Your Family’s Handheld
70 Health Radios
Examining More Than
a Dozen First Aid and 62 Hot on the Trail
Survival Uses of a Testing Armasight’s Contractor 320
Triangular Bandage and 640 Thermal Optics with a Stag
Arms 6.5 Creedmoor AR-10
78 Hands On
We Tested the QuietKat
Warrior to See if eBikes
Are for More than Just
“Going Green”

86 Bag Drop 52
Concealed Carbine Pack

88 The Final Weapon


Tracking in the Concrete
Jungle

90 The Last Page


Review of Scary Smart:
The Future of Artificial
Intelligence and How Recoil OFFGRID (ISSN 2475-1952), February/
You Can Save Our March 2024; Number 59, is published
World bimonthly by CMG West, LLC 5583 W.
Waterford Ln., Suite D, Appleton, WI 54913.
Copyright © 2023 by CMG West, LLC. All
Product Disclaimer Rights Reserved. Periodicals Postage Paid at
Prices and details for products and services Appleton, WI, and at additional mail offices. For
featured in RECOIL OFFGRID are set by the subscription inquiries and customer service,
go to www.offgridweb.com or call (800) 873-
manufacturers, retailers, and agencies, and 62
are subject to change without notice. 7896. POSTMASTER: Send all UAA to CFS. (See
DMM 707.4.12.5): NON-POSTAL AND MILITARY
Throughout this issue you will FACILITIES: send address changes to Recoil
see certain images are labeled OFFGRID, PO Box 531, Williamsport, PA 17703.
as being 100% Actual Size. This Please allow 8-10 weeks for delivery of first
designation is for the print edition of this issue. No part of this book may be reproduced
issue. Because of the various screen sizes without written permission. This book is
on different tablets and computers, we purchased with the understanding that the
cannot always provide actual life size information presented herein is from many
images in digital versions. We apologize if varied sources for which there can be no
this causes any confusion and thank you warranty or responsibility by the publisher as
for your understanding. to accuracy or completeness.
WWW.RECOIL.TV

RecoilTV is a 2A friendly streaming platform created to entertain and inform you on the latest guns and gear
associated with the firearms lifestyle.

PRESENTED BY
Honest. Relevant. Unfiltered.
THE PREMIER AUTHORITY FOR FIREARMS NEWS AND
MEDIA THE WAY YOU WANT AND DESERVE.

DOWNLOAD THE FREE APP

AVAILABLE ON
006
ISSUE 59
EDITOR’SLETTER

An Artificial Future By Patrick McCarthy

As AI-generated content becomes increasingly sophisticated, Diedrich examines Scary Smart, a book written by former Google
the blurring of lines between human and machine creativity raises executive Mo Gawdat about the dramatic impact AI will have on our
important questions about accountability and trust. In a world where lives in the coming decades — for better and for worse.
information shapes opinions and influences decisions, the inability In addition to these AI-focused articles, we’ve included some
to discern the origin of content challenges our fundamental under- other content relating to cutting-edge survival tools and skills. Chris-
standing of authorship and the ethical considerations tied to it. The topher Rance wrote a beginner’s guide to TAK, the U.S. Military’s
ethical responsibility to disclose the involvement of AI in content cre- Tactical Awareness Kit app, which is now available to the general
ation becomes paramount, as transparency fosters trust and enables public. Returning tech expert Dean Freeman wrote an article about
individuals to navigate an increasingly complex landscape of digital how to buy and upgrade a handheld radio for better off-grid com-
information with informed judgment. munication capabilities. Diedrich reviewed a QuietKat Warrior e-bike
The previous paragraph was not written by a human. It was to gauge its effectiveness as a rechargeable bug-out vehicle. We
written by ChatGPT, a free and easy-to-use AI-powered language also took a detailed look at the capabilities of thermal rifle optics,
model. Now, take a look at the cover of this issue — that was gener- such as the new Armasight Contractor series, and wrote about
ated by another free tool called Playground AI based on a short lessons learned at a Greenside Training urban tracking class in our
prompt written by our staff. If we hadn’t disclosed these facts, Final Weapon column.
could you tell the difference? How do we know whether the Of course, our magazine has always taken a balanced
content we’re consuming is real or synthesized by approach to achieving preparedness, so we also
a machine, and how will this uncertainty affect included some decidedly low-tech and old-
our ability to trust our own senses? Does school content. In our Health column, Joe
this path lead to a brighter future where Alton, MD, demonstrates the many uses of
AI helps us solve humanity’s greatest one of the simplest components of any
problems, or an apocalyptic one where first aid kit: a triangular bandage. And in
it becomes too powerful to control? Pocket Preps, Mike Searson compares
These questions will only become a variety of slip-joint knives, a style of
more prevalent as AI technology folding knife that has been popular
continues to spread, and that’s why for more than 300 years.
we chose to make it the focal point Whether you choose to embrace
for this issue of RECOIL OFFGRID. technology or distance yourself
Our titular feature article, “Artificial from it, the genie is out of the bottle.
Intelligence,” offers a deep dive into Artificial intelligence will undoubt-
what AI is, how it works, and some of edly change the way we live and
its greatest practical advantages and work in coming decades, just as the
disadvantages. This issue’s What If internet and cell phones have done
scenario addresses one of the most in decades past. Rather than stick our
concerning present-day malicious heads in the sand and hope every-
uses of AI, a deepfake cyberattack in- thing works out, our best course of
tended to manipulate victims by digi- action is always to be aware and be
tally usurping the identity of a trusted prepared.
colleague. In The Last Page, Patrick
Editorial.
Editor-in-Chief/ Iain Harrison
Editor, RECOIL OFFGRID/ Patrick McCarthy
Managing Editor/ Laura Peltakian
Features Editor/ Dave Merrill
Contributing Editor/ Steven Kuo
Contributing Editor/ Patrick Diedrich
Network Manager/ Tom Marshall
Web Editor/ David Lane
Contributors/ Amy Alton, Joe Alton, W. Dean Freeman, Nate Gerhart,
Christopher M. Rance, David Roy, Mike Searson
Special Thanks/ Brady Patterson

Art Direction & Design. This magazine is purchased by the buyer


with the understanding that the information
Senior Art Director/ Gene Coo presented is from various sources from
Art Director/ Katia Sverdlova which there can be no warranty or responsi-
bility by CMG West, LLC., or the publisher as
Senior Designer/ Tris Mast to legality, completeness and accuracy.
Any submissions or contributions from read-
ers shall be subject to and governed by CMG
Submissions. West, LLC’s User Content Submission Terms
and Conditions.
OFFGRID@RECOILweb.com
BACK ISSUES To order back issues, visit
Offgridweb.com.

Subscriber Customer Services. EDITORIAL CONTRIBUTIONS


Editorial contributions are welcomed, but edi-
Domestic/Canadian: 888.681.7064
tors recommend that contributors query first.
support@offgridmagazineservice.com Contribution must be accompanied by return
postage and we assume no responsibility
for loss or damage thereto. Manuscripts
Advertising. must be typewritten on white paper, and all
photographs must be accompanied by cap-
GM/Publisher/ Glen Castle tions. Photo model releases required on all
persons in photos. Recoil Offgrid reserves the
Associate Publisher/ Ryan Farner 760.809.8729
right to use material at its discretion, and we
Senior Account Executive/ Alex Ostrowski 920.212.5677 reserve the right to edit material to meet our
Senior Account Executive/ David Figg 813.418.1060 requirements. Upon publication, payment
Senior Account Executive/ Lori McDaniel 715.498.3768 will be made at our current rate, and that said
payment will cover author’s and contributor’s
rights of the contribution. Contributor’s
act of mailing contribution shall constitute
To advertise on this magazine’s website, or any of an express warranty that the material is
original and no infringement on the rights of
CMG West, LLC’s other enthusiast sites, please contact
others. Mail contributions to: Recoil Offgrid
us at offgrid_advertising@RECOILweb.com. Magazine, 5583 W. Waterford Ln., Suite D,
Appleton, WI 54913.

CMG West, LLC. istockphoto.com/ p6: grandeduc; p18:


Maksim Tkachenko; p21: edwardolive;
Director of Finance/ Jennifer Sexstone p22: Highwaystarz-Photography; p23:
FotografieLink; p24: Koldunova_Anna; p26:
Circulation/ NPS Media Group
wigglestick; p28: 7postman; p30: Morsa
mtolen@npsmediagroup.com Images; p32: FrankRamspott; p34: alxpin; p38:
shironosov; p40: lzf; p70: Studio4

Printed in the USA

Copyright © 2023 by
CMG West, LLC.
All Rights Reserved.
008
1A/2A: CONGRESS SHALL
GEARUP
1 MAKE & MODEL
Forloh 2 MAKE & MODEL
MPowered 3 MAKE & MODEL
Outdoor Element 4 MAKE & MODEL
Garmont
Women’s ThermoNeutral Rechargeable Batteries Fire Flute T8 Athena
Down Jacket
SIZE WEIGHT SIZE
COLORS AA 1.7 ounces Women’s 5 to 10.5
Black, Deep Cover, Exposed, Forloh
MSRP MSRP MSRP
Green, Magnet, Snowfall
Starting at $15 $24 $155
MSRP
URL URL URL
$399 mpowerd.com outdoorelement.com garmonttactical.com
URL
NOTES NOTES NOTES
forloh.com
Say hello to MPowerd’s AA USB Recharge- Meet the Fire Flute, a versatile tool Step into the T8 Athena boots
NOTES
able Batteries, the eco-conscious power when it comes to outdoor readiness. by Garmont and you’re stepping
The Women’s ThermoNeutral Down source you didn’t know you needed. This gadget is about the size of a into a world of tactical innovation
Jacket by Forloh sets a high bar when These aren’t your run-of-the-mill bat- standard Sharpie marker, making it a designed specifically for women.
it comes to staying warm and agile in teries; they’re integrated, reusable, and convenient addition to your pocket or Crafted with a suede leather upper
unpredictable conditions. This jacket is cable-free. When they run out of juice, backpack. Crafted from sturdy alumi- and polyester fabric, these boots
designed for those who don’t want to just pop them into a USB charging port, num, it weighs a mere 1.7 ounces but offer increased arch support and
compromise on comfort or functionality. and they’re good to go in 1 to 2 hours. offers a trio of essential features. a slightly raised heel, catering to
Its ThermoNeutral technology means No more hunting for a store to buy con- First up is a powerful 120dB whistle, women’s shorter Achilles tendon,
this isn’t your average down jacket; it’s ventional batteries, and no more waste loud enough to alert anyone within ensuring you’re comfortable and
engineered to adapt to your body’s heat, piling up in landfills. With a 1200mAh earshot. Whether you’re lost in the stable whether you’re navigating
providing optimal insulation whether capacity and 1.5V output, these batteries woods or need to signal for help, this rocky terrain or city streets. The
you’re on the move or sitting still. The are versatile, powering everything from whistle ensures you’ll be heard. Next, dual-density EVA midsole is all
jacket comes in various sizes and several remote controls and video game control- the Fire Flute houses a water-tight about comfort and shock absorp-
eye-catching colors. But it’s not just lers to baby monitors and headlamps. compartment designed to store com- tion. The Garmont Traction Formula
about aesthetics; the Deep Cover variant They’re a perfect fit for both tech-savvy bustible fire tabs. These slow-burning Diamante outsole is engineered
offers a camo pattern that can help you city dwellers and off-the-grid adventur- tabs are included in the packaging with specialized climbing and
blend into natural surroundings, while the ers. Rather than worrying about your and can be a game-changer when you braking zones, providing stability
solid black is a versatile choice for any flashlight dying on you during a blackout need to get a fire going quickly. The on various surfaces. Weighing in
setting. Weighing between 13 to 21 ounces or your GPS running out of power while other end of the Fire Flute features a at just 13.7 ounces per boot in size
depending on the size, this jacket won’t exploring the great outdoors, give more replaceable ferrocerium rod. Paired 7 US, these boots are AR 670-1
weigh you down and makes it a good thought to the batteries you choose. with an integrated hardened striker compliant, making them a reliable
choice for those who need to pack light What sets these apart is their longevity — plate, it throws large sparks to ignite choice for those in the Armed
but still want a reliable layer of warmth. they can be recharged over 1,000 times. your campfire or stove effortlessly. Forces.
That’s not just cost-effective; it’s a nod to The device even comes with an at-
sustainability. tached pocket clip and a lanyard hole
1 for multiple carrying options.

3 4
5 MAKE & MODEL
Burris 6 MAKE & MODEL
Dometic 7 MAKE & MODEL
Bear & Son Cutlery 8 MAKE & MODEL
NEXTORCH
Signature LRF 10x42 PLB40 Portable Lithium Sideliner w/Reverse Tanto TA30 V2.0 One-step
Battery Blade & Glass Breaker Strobe Tactical Flashlight
MODES
Auto, Sport, Hunt DIMENSIONS STEEL LUMENS
8 by 8 by 10 inches 440 stainless steel 1,300
MSRP
$1,200 MSRP MSRP MSRP
$850 $57 $81
URL
burrisoptics.com URL URL URL
dometic.com bearandsoncutlery.com nextorch.com
NOTES
Introducing the Signature LRF 10x42 NOTES NOTES NOTES
binoculars by Burris Optics, a seri- Whether you’re camping, tailgating, or Bear & Son Cutlery’s 4.5-inch Black When it comes to being prepared
ous upgrade for serious observers. spending a day at the beach, a portable Aluminum Sideliner (BE127) is a versatile for the unexpected, the TA30 V2.0
With ultra-sharp HD glass, you get a fridge packed with cold food and drinks tool that’s more than just a knife. With Tactical Flashlight offers more than
crystal-clear view of your surround- makes any outing more enjoyable — no an 8-inch open length and a 3.5-inch illumination. Not just a flashlight; it’s a
ings, making it easier to spot game, ice required. However, any time your blade made from 440 stainless steel, multifunctional tool designed to keep
potential hazards, or resources. The vehicle’s engine isn’t running, you’ll this knife is built for everyday use. The you one step ahead. With one-step-
device offers fast and precise rang- need an auxiliary power source. Dometic black aluminum handle offers a sleek strobe technology, a simple tap gives
ing from 5 to 2,600 yards, ensuring makes some of the best portable fridges design that fits comfortably in your you momentary light, while a heavy
you can measure distances with on the market, so it was natural for the hand, ensuring a firm grip. One of its press activates a tactical strobe. This
pinpoint accuracy. What sets this company to create a matching portable standout features is the ball bearing feature can disorient potential threats
apart from other range finding binos power solution. The PLB40 is a compact washers, which allow for rapid blade or can be used for quickly drawing
is that it comes with three versatile Lithium Iron Phosphate (LiFePO4) bat- deployment at the push of a trigger, the attention of passersby during
ranging modes: Auto, Sport, and tery with a 40 Amp-hour/512 Watt-hour an action that can be crucial when you an emergency. The lens is coated,
Hunt, allowing you to adapt to capacity — enough to keep a CFX 40W need to react fast. The knife also comes tempered glass that ensures maximum
different scenarios. You can choose fridge powered for about 40 hours. with a stainless steel sideliner lock, light transmission and durability. The
to see distances as line-of-sight or Many portable power stations could ensuring the blade stays in place when edges of the flashlight are embedded
horizontal, complete with angles of double as boat anchors, but not this one; in use and is easy to close when you’re with super-hard ceramic strike tips
degree, giving you a comprehensive its square footprint, ergonomic carry done. It also features a glass breaker, that can be used to break glass or as
understanding of your environment. handle, and 16-pound weight make it making it a multifunctional tool that a self-defense mechanism. Though not
The outer surfaces are rubber- easy to transport. Output ports include can help you get out of tight spots. Ad- included, there’s a specially designed
armored, providing both protection standard 12V DC, locking two-pin 12V ditionally, the knife has a metal pocket accessory called the FR-1 tactical
and a secure grip. It’s also tripod DC (for securely connecting Dometic clip and a lanyard spacer for secure flashlight ring. This add-on provides
adaptable, freeing your hands for fridges), and two USB ports. The PLB40 fastening and storage, offering quick more versatile usage, whether you’re
other tasks. The adjustable eyepiece can be recharged via 12V DC from your access and multiple carrying options. navigating through a power outage at
ensures you won’t miss a thing, and vehicle, an AC wall charger, or a solar home or finding your way in the great
it operates in temperatures ranging panel. A large LCD screen makes it easy outdoors.
from 5 to 131 degrees F. Powered to see the battery’s charge percentage
by a single CR2 lithium battery, it and status.
boasts a battery life of over 2,000
measurements.

ISSUE 59

OFFGRIDWEB.COM 009
010 OFFGRIDWEB.COM
1A/2A: MAKE NO LAW

9 MAKE & MODEL


Jase Medical 10 MAKE & MODEL
VSSL 11 MAKE & MODEL
guzzle H2O 12 MAKE & MODEL
Body Guard Armored
Jase Case Insulated Flask + Speaker Stream Backpacks
First Responder
APPLICATIONS CAPACITY FLOW RATE
Diarrhea, Infections, Pneumonia, 8 fluid ounces 1.1 gallons (4 liters)/minute Bulletproof Backpack
Bioterror Level 3A Kit
MSRP MSRP
MSRP $150 $1,195 CAPACITY
$269 40 liters
URL URL
URL vsslgear.com guzzleh20.com MSRP
jasemedical.com $639
NOTES NOTES
NOTES Ready to elevate your outdoor experi- Guzzle H2O’s Stream is like the URL
Jase Case could be a must-have for bulletproofbodyguard.com
ence? Meet the VSSL Insulated Flask + Swiss Army knife of water purifica-
those who want to be prepared for Speaker, a unique item for those who tion systems. Imagine you’re out NOTES
the unexpected. This all-in-one kit love to venture into the wild or simply camping near a creek or maybe The First Responder Bulletproof Backpack
comes packed with five essential chill in their backyard. Crafted from you’re at a campground that has is a discreet way to carry personal
antibiotics that can treat a wide durable 18/8 stainless steel, this flask questionable water quality. This protection on the go. Designed to be both
range of infections, from pneumonia offers double-walled insulation to keep gadget is your go-to for clean, tactical and practical, this backpack has
and bladder infections to wound com- your drinks at the perfect tempera- great-tasting water. With just a multiple compartments with a 40-liter ca-
plications. The medications included ture — cold for 10 hours and hot for 5. push of a button, it pumps, filters, pacity and webbing for MOLLE-compatible
are Amoxicillin-Clavulanate, Azithro- It also comes with a fully integrated, and purifies water from any fresh accessories. But what sets it apart is its
mycin, Ciprofloxacin, Doxycycline, weatherproof Bluetooth speaker to add a water source at a rate of about patented deployment system that offers
and Metronidazole, each carefully soundtrack to your adventures. The flask 0.75 gallon per minute, process- instant front and back armor protection
selected for their efficacy and safety. features a patented pop-up drinking cap ing up to 35 gallons on a single without the need to fumble for a handle.
But it’s not just about the meds; the that doubles as a carabiner, making it charge. It uses LED UV-C purifica- Just pull up on the Velcro shoulder
Jase Case offers a holistic approach super easy to clip onto your gear. Plus, tion, which is third-party tested to straps, and your vitals will be covered
to self-care. It starts with an online the cap is leak-proof, ensuring you won’t inactivate 99.99 percent of bacteria, with this kit’s included 11x14-inch front
evaluation by a board-certified physi- lose a drop of your precious beverage. protozoa, and viruses. Plus, it has a and 16x12-inch rear Level 3A soft armor
cian, ensuring that the antibiotics are The locking carabiner top adds an extra 0.5-micron activated carbon block inserts. With soft armor, it weighs just 7
appropriate for you. Once approved, layer of security, so you can focus on the filtration system that’s effective pounds. The pack’s Concealment Chamber
the kit is delivered straight to your journey ahead. What sets this flask apart at reducing sediment, unpleasant keeps its protective nature discreet until
doorstep, eliminating the need for is its multi-functionality. Not only does taste, and odor. The unit is also the armor is deployed, and the Stay-Put
multiple pharmacy trips. The package it keep your drink just the way you like rechargeable and has a high- armor system secures the front protec-
also includes an Antibiotic Guide writ- it, but it also provides up to 5 hours of capacity LiFePO4 battery. It’s even tion in place with ease. Body Guard also
ten by medical experts, giving you music playtime. waterproof with an IP67 rating, so offers the pack with Level 3+ hard armor
the confidence to use the medica- no worries if it takes a little dip. plates for rifle-caliber protection ($1,047)
tions effectively. Whether you’re an Whether you’re an overlander who or as a stand-alone backpack ($499),
adventurer far from civilization or loves remote settings, or a family which you can use with your armor of
someone who wants peace of mind camper tired of your kids complain- choice. This backpack is a robust, adapt-
during supply chain disruptions, this ing about “icky” water, this system able, and discreet way to stay ready for
kit empowers you to take control of has got you covered. It’s versatile, anything.
your health. portable, and perfect for those who
want to be ready for whatever life
throws at them.
014
1A/2A: RESPECTING
PocketPREPS
1 Spyderco
Roadie
2 Mikov
Rybicka
OVERALL LENGTH: OVERALL LENGTH:
5.1 inches 5.5 inches
BLADE LENGTH: BLADE LENGTH:
2.1 inches 2.2 inches
WEIGHT: WEIGHT:
1 ounce 1.5 ounces
BLADE MATERIAL: BLADE MATERIAL:
N690Co 420
PRICE: PRICE:
$84 $14
URL: URL:
spyderco.com mikov.cz

By Mike Searson

3
f you’re a Boomer or Gen-Xer, you may have a
fond memory of your father or other relative giv-
ing you a pocketknife at a young age. It may have
been a lock-back or a fixed blade, but for most
of us it was a simple slip-joint folding pocketknife
with no locking mechanism. The blade was held open
under simple spring pressure. Sometimes it was a single
blade Barlow style or Jack knife. In other cases, it may
have been a Trapper with a drop-point knife blade and
a Spey blade. If you were really lucky, it could’ve been a
multi-blade Congress knife or a Swiss Army Knife. 1
Many of us who were more serious about knives may
have graduated on to something with a Walker liner lock,
frame lock, or Axis lock-type mechanism. That was the
goal from the 1980s onward, to have a folding knife that
locked up like a fixed blade. Still, many of us look back
on fond memories of that first knife type. Custom knife
makers often offer a few slip joints in this category as a
testament to modern craftsmanship and materials or for
customers with a bit of nostalgia.
These knives are still very capable in our modern age
and will still perform over 90 percent of common daily
tasks. They tend to be on the smaller side and are easily
stowed in a pocket, so you always have a knife. Addition-
ally, if you travel outside of the U.S., you’ll find that they’re
usually the only knife that won’t land you in prison in
most of Europe.
Because slip-joint knives are typically carried loose in
a pocket, a lanyard of some type makes more sense as
a means of being able to locate and retrieve the knife. Un-
fortunately, this is a small detail that is often overlooked
to keep with tradition. In the past, slip joints were cheaper
knives sold in hardware stores, gun shops and depart- 2
ment stores. Modern slip joints are a little bit more expen-
sive in many cases, but still more affordable on average
than typical tactical folding knives.
3 Heretic
Jinn
Knives
4 Benchmade
Weekender
5 CRKT
Venandi
6 Cold Steel
Trapper
7 Kershaw
Federalist
OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH: OVERALL LENGTH:
6.8 inches 7.1 inches 7.2 inches 7.4 inches 7. 5 inches
BLADE LENGTH: BLADE LENGTHS: BLADE LENGTH: BLADE LENGTH: BLADE LENGTH:
3.1 inches 3 inches, 2 inches 3.1 inches 3.3 inches 3.3 inches
WEIGHT: WEIGHT: WEIGHT: WEIGHT: WEIGHT:
2.4 ounces 3.5 ounces 1.8 ounces 4 ounces 2.1 ounces
BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL: BLADE MATERIAL:
CPM Magnacut CPM-S30V 8Cr13MoV 8Cr13MoV CPM 154
PRICE: PRICE: PRICE: PRICE: PRICE:
$800+ $250 $40 $40 $155
URL: URL: URL: URL: URL:
hereticknives.com benchmade.com crkt.com coldsteel.com kershaw.kaiusa.com

5 7

4
ISSUE 59

OFFGRIDWEB.COM 015
016
1A/2A: AN ESTABLISHMENT
Pocket PREPS

Spyderco Mikov Heretic Knives Benchmade CRKT Cold Steel Kershaw


Roadie Rybicka Jinn Weekender Venandi Trapper Federalist

After 9/11, carrying any Mikov is a classic Heretic Knives has a The Weekender The name Venandi This is Cold Steel’s Kershaw’s Federalist is
type of knife aboard European knife manu- long and consistent is a multi-bladed comes from a Latin take on the classic a U.S.-made non-lock-
an airplane was pro- facturer that has been history in the realm pocketknife equipped word meaning “hunt- slip-joint Trapper knife. ing slip joint. It relies on
hibited. In early 2013, making knives in the of tactical automatic with tools to improve er,” and this design is a It features handles with a double-detent sys-
the Transportation Czech Republic since knives. So, to see a your weekend — or collaboration between authentic jigged bone, tem to hold the blade
Security Administra- 1794. The Rybicka or slippie in their lineup any day. It features a custom knife maker highlighted with pol- in place while closed,
tion (TSA) announced “Little Fish Knife” has made us sit up and 3-inch clip-point blade Richard Rogers and ished metal bolsters. and the half-stop offers
a plan to allow certain been in their catalog take notice. As can for your EDC cutting Columbia River Knife The rugged handles controlled opening
knives on airplanes for over 100 years be expected, Heretic needs, and a 2-inch and Tool. Rugged G10 are substantially sized and closing action. The
again. Although and is a traditional doesn’t screw around drop-point blade for handle scales mean for hard work, even green canvas Micarta
the plan was later slip joint design that when it comes to ma- smaller cutting jobs; that the handles will with gloved hands. handle feels good
withdrawn, Spyderco is often passed down terials. The CPM Mag- the bottle opener probably outlast the It’s constructed in a tra- in the hand, and it’ll
had already designed from father to son. nacut for the blade is ensures all your rest of the knife. Its 3.1- ditional Jack Knife pat- prove to be extremely
a non-locking pocket- Original knives of this the star in this show, favorite beverages inch clip-point blade is tern, with two polished durable. The blade
knife that would con- type sported carbon along with titanium can be opened with made from 8Cr13MoV blades: a clip-point for is made from CPM
form with proposed steel blades and often handles and a pocket ease. The Weekender stainless steel. The piercing and cutting, 154 steel and has an
guidelines. The Roadie had carved wooden clip. This is definitely is a USA-made folder steel is good, but it’s and a Spey for skin- impressive edge when
is an evolved penknife handles. Mikov began not grandpa’s Barlow to enhance your life. not exactly Magnacut. ning and gutting, both first taken out of the
that is more practical offering these knives knife. The blade is a The blades are made This is a great first knife folding out of the same box. The custom pivot
than typical slip joints. with a 420 steel blade sheepsfoot design and of CPM-S30V steel, for someone who is end. Popular folklore forms a shield detail to
It relies on a pair of and Zinc alloy handles if you’re in a locale that ensuring that they stay just getting into knives. has placed the Trapper complete the distinct
symmetrical dimples a few decades ago. restricts you based on sharp when you need It’s an ultra-modern as the preferred choice look of a slip joint knife.
in the blade that allow This makes them more the locking mecha- them. The Micarta take on a classic and of rugged outdoors- In spite of that, the
a fingernail-free two- durable and actually nism of your knife, this handle offers a great timeless design. men and frontier hunt- Federalist moves the
handed opening. Far quite a bit cheaper. is the one you want. gripping surface and ers, but its practicality design several steps
superior to a traditional This is a slip-joint knife will last virtually for- Pros: makes it useful for all forward by blending
nail nick, they also Pros: for a new generation. ever. There are other The blade is sharp sorts of chores. characteristics of a
don’t collect dirt or This is a small and versions of this model out of the box and tactical folder with that
debris. The Roadie also unobtrusive knife Pros: in the works with differ- ready to tackle Pros: of the old-school Jack
features a subtle index- that can attach to a It’s made from CPM ent blade options and virtually any cutting This knife reminds knife.
finger choil that acts key ring or be worn Magnacut, which colors of Micarta. chore. me of one of the
as a safeguard against around the neck for may be the future The knife excels at Trappers I used from Pros:
unintentional closure. ease of access. super steel for the Pros: cutting and slicing the age of 7 until my This slip joint has
This is a classic Czech next decade or two. Very sharp out of the with its clip-point early 20s as a hiker, lanyard hole, which
Pros: design of a very Razor sharp out of box with nice thin blade. hunter, Marine, and makes it easily ac-
The blade slices like a distinct model. the box, the way all edges for slicing You almost never ranch hand. cessible or locatable
surgical scalpel. Properly sharpened, knives should ship CPM-S30V is a think of G10 handles The blades slice like in the pocket with a
Its handle scales are it’s a very capable Titanium handles premium knife steel with a slip joint, but razors and open lanyard.
extremely comfort- little slicer. with amazing texture with superb edge it works well on this easier than a tradi- The handle is ex-
able. really blows the retention. model. tional nail nick due to tremely comfortable
Lanyard hole makes Cons: doors off everything The bottle opener scalloping. and ergonomic.
it easily accessible The handles are a else in this category comes in handy Cons: Compact, many op- The blade is made
cast zinc alloy, which when you need it. Like most slip joints, tions for daily carry from 154 CM; it’s
Cons: means it’ll corrode Cons: there’s no lanyard tough, razor sharp,
This knife would be and degrade over These knives are Cons: hole. Cons: rust resistant, and
better with a pocket time. handmade one at As good a steel as A pocket clip could Like most slip joints, sports an easily main-
clip. The knife was very a time to order or S30V is, it can be dif- have worked well there’s no lanyard tainable edge.
The sheepsfoot dull out of the box. in small batches, so ficult to sharpen. on this model, even hole.
blade worked well for availability may be There’s no lanyard though that’s not a The handle material Cons:
its original design, but an issue. hole on this to help common slip-joint may degrade over The blade could have
a clip-point or drop- Like most slip joints, you secure the knife. feature time with a lot of use. been a hair sharper
point variant would there’s no lanyard Bone isn’t Micarta. out of the box.
be welcome. hole.
Upgrade your Smith & Wesson M&P-M2.0™ of battery swaps with the internal 20,000-hour
Handgun experience with the SCS-MP2-GR Solar rechargeable battery that could potentially last a
Charging Sight – precision made effortless. lifetime. The SCS-MP2-GR, designed for 9mm &
Engineered to perfectly match the M&P-M2.0™ 40S&W handguns, boasts a multi-directional solar
Optics-Ready series, no adapter plates are required, charging system and an intensity override function,
ensuring a seamless fit. Co-witness with ease making it the ultimate choice for discerning
thanks to the exceptionally low dot height, aligning shooters. Elevate your accuracy, elevate your game
perfectly with factory iron sights. Forget the hassle with the SCS-MP2-GR."
018
1A/2A: OF RELIGION, OFFGRIDWEB.COM

You’re Targeted
by a Deepfake
Cyberattack?
By RECOIL OFFGRID Staff

on’t believe everything you to spread misinformation to thousands of photographer’s darkroom could now be ac-
see on the internet. This strangers. Around the same time, photo complished in seconds.
is one of the fundamental editing software was becoming vastly more Today, misinformation has reached
rules of using the worldwide powerful and accessible, so we began to see another new frontier: artificial intelligence.
web, and it dates back to the spread of Photoshopped hoax images Publicly accessible AI tools are being used
the earliest days of dial-up. In the ’90s, chain across the internet. Much like chain letters to automate the creation of so-called deep-
emails spread hoaxes like wildfire, but those had morphed into chain emails, this type fakes, a term based on the “deep learning”
of us who weren’t entirely gullible knew to of hoax was nothing new, but the advance- neural network technology that’s harnessed
question anything we received with “FW: ment of tech made it far easier to create and to create them. Now, instead of manually
FW: FW:” in the subject line. The rise of chat disseminate. Photo manipulation techniques blending images together in Photoshop,
rooms and social media made it even easier that used to require hours of labor in a we can let AI do the hard work for us. And
it’s not only useful for still images — deep- The Scenario indicated account, since she’s absolutely
fake technology can also process each certain that the person in the video was her
SITUATION TYPE
frame of a video to swap a subject’s face Targeted by cybercriminals brother. It sounded and looked just like him,
(for example: youtu.be/CDMVaQOvtxU). AI YOUR CREW and he appeared to have knowledge about
can also be used to closely mimic a human Yourself the business and its suppliers. However,
voice based on audio samples and read LOCATION she wants to know if you have any ways
Seattle, Washington
back any text the user inputs (youtu.be/ to verify the video first. What methods or
SEASON
ddqosIpR2Mk). Winter tools can you use to check the legitimacy
Deepfakes aren’t just a hypothetical threat WEATHER of the video message and its sender? If you
— they’re already being used to manipu- Cloudy; high 47 degrees F, low determine it’s a deepfake, what other steps
38 degrees F
late, confuse, or outright deceive viewers. should you take to protect the business
In 2020, the parents of Joaquin Oliver, a (and its owners) from similar cyberattacks
17-year-old who died during the Parkland The Setup in the future?
school shooting, used deepfake technol- You’re the head IT guy at a family owned
ogy to recreate their dead son’s likeness business near Seattle. Most of the time, your Cybersecurity Professional
and create a video where he urged young job duties consist of basic tech support W. Dean Freeman’s Approach
Americans to vote for more aggressive gun and PC troubleshooting for the company’s Alright, so I’m either facing the impend-
control. More recently, deepfakes of both 23 employees. Your employer deals with ing financial destruction of my employer, or
Ukrainian President Zelensky and Russian various vendors overseas, so you’re used an extremely sophisticated threat actor, and
President Putin appeared in an attempt to getting messages at odd hours with I need to figure out which one it is fast. Two
to encourage the opposing side’s troops not-so-good English. Aside from a few out of the three outcomes here have me
to surrender or retreat; the latter clip was obvious Nigerian prince scam emails and looking for a new job soon if I don’t stay on
aired on Russian TV in what the Kremlin run-of-the-mill malware, the company hasn’t top of this. Luckily, I’m pretty good at what I
decried as a “hack.” Cybercriminals are also experienced any substantial cybersecurity do, if I do say so myself, and I’ve seen simi-
using deepfake technology to persuade threats in the past, but you’ve always tried to lar threats before. Just because there might
unsuspecting businesses and individuals maintain good security protocols regardless. be a new technology at play here doesn’t
to transfer money or give up sensitive info. really change most of the fundamentals.
And in the most twisted cases, AI is being The Complication First, let’s think through the possible situ-
used to generate deepfake pornography of On a Tuesday afternoon, you get a ations:
people — even children — who are totally un- panicked phone call from Susan, the owner 1. This is a legitimate, albeit unusual and
aware of the disturbing and humiliating way of the company. She says her brother Dan, concerning request.
their likenesses are being altered. A 2022 who is currently on a business trip to visit 2. The video is illegitimate, created via a
report by the U.S. Department of Homeland suppliers throughout Eastern Europe, sent generative AI tool to produce a “deepfake.”
Security stated, “Non-consensual pornogra- her a video message a few minutes ago. 3. The video is genuine, but Dan’s under
phy emerged as the catalyst for proliferat- In the video, he explained that one of the duress and this is a whole different type of
ing deepfake content, and still represents company’s key suppliers is owed a substan- crime (extortion and possibly kidnapping)
a majority of AI-enabled synthetic content tial amount of money and is demanding Each of these potential situations is going
in the wild … The ramifications of deepfake immediate payment. Supposedly, if they to have its own set of tells and its own in-
pornography have only begun to be seen.” don’t receive the payment within the next cident response playbook, as well as some
It’s becoming increasingly difficult to dis- few hours, they’ll switch to an exclusive specific countermeasures. They also share
tinguish real photos, video, and audio from partnership with your biggest competitor. some preparatory mitigations in common.
deepfakes. What would you do if you sus- Susan knows this would be catastrophic
pected you may be the target of a manipu- and might even cause the company to go Preparation
lative deepfake attack by cybercriminals? out of business. So, whenever employees, especially key
How can you verify information you receive She tells you she immediately tried to staff or executives travel, the risk of data
before falling prey to these high-tech social call Dan back and called the supplier, but breaches resulting in intellectual property
engineering tactics? We asked cyberse- neither one is picking up — cell phone theft go way up, and depending on the
curity professional W. Dean Freeman and coverage isn’t the best in that country, region of travel and the industry you’re in,
ISSUE 59

international risk management expert David and it’s outside normal business hours. the threat varies. Knowing this, I’ve coached
Roy to weigh in on this complex attack. She’s considering sending money to the Dan and others on the following:

OFFGRID
GRIDWEB.COM
GRID 019
1A/2A: OR PROHIBITING

> Never leave electronic devices unattend- Nothing about this


image is real. It was
ed, not even in hotel rooms.
created using the free
> When crossing borders, always bring AI image generation
clean devices. Don’t take confidential tool PlaygroundAI.com
company information through customs in less than 30 seconds.
The site also allows us-
checkpoints. ers to upload images to
> Always use the company VPN when trav- give the AI “inspiration.”
eling, and make sure to use the full tunnel
profile, not split tunnels. When traveling,
there’s no such thing as trusted network
access, even at a customer site.
> Be aware of anyone you meet in hotels,
bars, etc. who seems particularly inter-
ested in what you do for a living.
> Make sure you have the highest privacy
settings on personal social media ac-
counts, and be careful what you post,
especially regarding the company.
To varying degrees, I’ve also tried to lock
down services such as email, such that us-
ers either have to be on the local network
or VPN to send and receive their company The financial investigation will go as follows: So, the bank is in the same general region
email, and am leveraging defense in depth > Give the video a quick once-over and as the client but isn’t a bank that we’ve done
techniques, using proven technologies, for write down the account information. business through before. We can’t know
endpoint and network security, as well as > Do a cursory lookup of the routing infor- who the account belongs to at this time,
access to cloud-based applications. While mation to see where the bank is located so that’s a dead end but definitely suspi-
nothing is foolproof, the cost of attacking and whether that provides any obvious cious. The email didn’t come through Dan’s
the network is much higher than it used to red flags. corporate account, but did come from his
be when I first started at this job. > Check with the head of finance to see personal Gmail account. The email was
I’ve also prepared myself to identify if she knows whether this is a bank (or sent through Gmail. Dan’s apparently used
and counter new and emerging threats, even better, an account) that we’ve used his Gmail account to send a few messages
through self-study and formal classes. I stay associated with that partner before. to Susan recently, so she wouldn’t have
on top of the state of the art in my craft If the request is to a financial entity that’s thought that was unusual. At this point, I go
so that I continue to be an asset, but also known to us and the account is associated ahead and disable Dan’s corporate accounts
understand that it’s an arms race, and the with the client, then that dramatically lowers and make sure that he doesn’t have any ac-
momentum is generally with the attackers. the risk. It still doesn’t mean that the request cess to company data.
is 100 percent genuine though. Given these facts, it’s going to be impor-
On-Site The traditional forensic investigation will tant to review the video. The two major
Now that I’m on the phone with Susan, focus both on the email itself, specifically possibilities at this point are the video being
we have a potential catastrophe, and one checking the header information to see a deepfake, or it being a genuine video and
where there isn’t necessarily a specific play- where it truly originated from, as well as made under duress. The fact that Susan
book yet. Luckily, it’s a small company with correlating that activity with logs from the is Dan’s sister and is convinced the video
little red tape, but given the circumstances, company mail server and VPN. If it looks is of Dan means it very well may well be a
it could have proved disastrous if she hadn’t like Dan actually sent the email from his duress situation.
called me and had just sent the money. It’s laptop, through the company server, then I have Susan pull a bunch of photos of
time to think fast, but think thoroughly. again, this reduces the chance that it’s false. Dan from social media and her cell phone
To make sure I have my bases covered, If it comes from his personal email, that’d and send them to me so I can bring them
I’m going to run through three parallel get my hackles up. If the mail headers up on one monitor, while watching the video
investigations: financial, traditional incident are clearly forged, then we have multiple on another. Reviewing the video critically, I
response, and also look specifically at the potential issues, and a deepfake is certainly look for the following telltale signs that the
video to see if I can tell whether it’s genuine. a possibility. video is a deepfake:
WHAT
IF?

Using voice samples collected from social media and At this point, we have multiple priorities,
other public sources, AI can recreate any human voice one being getting ahold of Dan. I have Susan
and use it to read a given script. call the U.S. Embassy in the country where
Dan is and report that he may be the victim
of a crime and ask to be put in touch with
the relevant authorities. Additionally, we’ll still
continue to try contacting Dan directly, and
through the hotel, as well as any business
associates at the vendor.
To help tie up loose ends on the cyber
side, I’d likely reach out to industry contacts
at relevant companies, as well as contacts
made through the FBI’s InfraGard program.
I may still have to fill out the paperwork,
but friends and associates can help get the
> An overly shiny, waxy complexion to the Because Dan often represents the compa- answer faster.
skin ny in public events, there’s ample opportuni-
> Audio is out of sync with the movements ty for fraudsters to collect voice samples to Final Thoughts
of the mouth. synthesize is voice, but since any potential Deepfakes are a major issue, particularly
> No blinking attackers are likely neither native English as an information warfare weapon, and
> Eyes not moving in sync with each other speakers, nor are they American from our have societal level impact. As a tool for cy-
(cross eyed, etc.) region, there very well may be differences in bercrime, they’re basically just a particularly
> Differences in the body, particularly the speech cadence, grammar, and word selec- nasty tool in the phisherman’s toolkit. Like
ears and limbs tion that indicate that the voice is “reading” a all cyber and information weapons, there’s a
> Any changes in speech patterns from script and isn’t actually Dan talking. red team/blue team arms race for genera-
what I and Susan know of Dan After identifying the potential indicators, tive AI and the detection of its output. Luck-
While lighting and other technical factors I also review the video metadata to see if I ily, AI still doesn’t beat actual intelligence, so
could produce the appearance of waxy skin can gain any insight into when and where long as you properly apply it.
or out-of-sync audio in a genuine video, the it was recorded and on what device. Any In my opinion, defenders, whether profes-
biometric factors are going to be the major mismatch between where Dan is and what sional incident response staff, or the average
giveaway. This is because of how deepfake type of phone he has will confirm that the person who may be subject to an AI-fueled
videos are generally produced. video is fake. crime attempt, are best served by approach-
Feeding the generative AI with still im- ing the issue with strong critical thinking
ages to produce the likeness tends to result Crisis skills and a healthy dose of skepticism (the
in deepfake videos where the eyes don’t We have enough evidence at this point same mental tools that’ll help you ferret out
blink at all, which is generally unnatural for to know the request is fake, and that Dan’s “fake news” or determine if you’re being
people. Additionally, the computer has a personal Gmail has been compromised. targeted for a “grandkid” phone scam).
hard time lining up both eyes toward the I’ve already disabled Dan’s account but will Following defined DFIR protocols will help
same focal point when trying to adjust for need to make a more thorough DFIR (Data give you additional context within which to
movement, so if Dan appears cross-eyed Forensics and Incident Response) investiga- evaluate the media, in addition to looking for
in the video but is known not to be in real tion into the network to see if any corporate the “tells.”
life, that’d be a good indicator as well. Most data may have been compromised. Of course, prevention is worth an ounce of
deepfakes are made by applying an extrud- I convince Susan not to make the pay- cure. So, what are some things that could’ve
ed face image onto a live actor. Often, the ment, but she’s still very shaken up. We’re prevented this scenario from unfolding the
angles are hard to make for the computer almost certain the video is fake due to bio- way it did?
and the human driving the production, metric mismatches that she didn’t catch at First of all, just like protecting against fa-
so the AI won’t overlay on top of the ears, first — watching on her phone in a panic — cial recognition, limiting the amount of data
hands, etc. Because of this, I pay very close which means he’s probably not kidnapped, about you (photos, video, voice) that can be
attention to any differences in Dan’s ears in but he’s still out of pocket and his status used to generate fakes is important.
ISSUE 59

the video from what I can see in the known is unknown. Due to tensions in the region, Second, limit the crossover between per-
photos of him I have available. we’re still worried. sonal and business IT systems. Your name
1A/2A: THE FREE EXERCISE

probably isn’t Hillary, so eventually it’ll catch are becoming commonplace as a method ping mobile devices (such as cell phones
up to you. of social engineering. However, there are still and laptops) for those that don’t contain
Third, establish protocols with your organi- prudent steps in preparing for this type of proprietary company data before leaving
zation or family for how requests like money situation. First, any person doing business the U.S., and performing general security
transfers would be made, such as having internationally should be aware of the inher- awareness training with all staff annually.
key phrases or “safe words” that need to be ent risks this presents by default. Regardless But even with all of the cool tech in
present to authenticate the request. Treat of your business vertical, understanding how the world, you can’t remediate or patch a
any request that deviates from protocol or to work in high-risk places, particularly de- human — they’re an organization’s largest
isn’t authenticated as illegitimate until proven veloping nations, and places where bribery information security vulnerability. For this,
otherwise. and corruption are rampant is important. you can only drill, train, and reinforce the
Lastly, if you work for an organization that You may face scenarios like this via subcon- importance of identifying social engineer-
has the budget, seeking out tools designed tractors and supply chain partners, so it’s ing, phishing, data mining threats, physical
for identifying deepfakes and starting to prudent to have diligence on your down- threats to obtain sensitive information,
train models based on high-profile mem- stream operations, the financial status of and the most difficult, resisting bribes (of
bers of your organization, such as C-level your partners, and awareness of geopolitical all kinds). To enhance operational security,
executives, is worth exploring. The sooner risks presented in each region where you additional levels of personnel validation
you have those systems and models in operate, especially those around personnel should also be in place. Code words for
place before an incident, the more useful and information security. team members or projects should be
they’ll be if there is one. Educating international travelers about used for identity verification. However,
information security best practices is criti- these should be codes that are not stored
Risk Management Expert cal to the success of operational security. electronically in the case of a data breach;
David Roy’s Approach These practices are a good start: ensuring instead, choose codes that will be easy
Preparation that data-blocking phone chargers (some- to remember for the end users even in
In this scenario, the business owner is be- times called “USB condoms”) are being stressful situations. Other unique personnel
tween a rock and a hard place, as deepfakes used in order to prevent data theft, swap- identifiers such as authentication tools can

Senior citizens are


often the target of
cyberattacks, since
they tend to be less
tech-savvy than
younger people. It’s a
good idea to discuss
common forms of
phishing and social
engineering with
your older family
members and col-
leagues.
WHAT
IF?
also be used (such as one-time keys and
codes from encryption devices).
All of the aforementioned methods are
low cost and can be easily executed by
an organization of any size, but of course,
there are much more robust methods for
businesses that do a higher volume of
international travel. These methods include
utilizing satellite communications for confer-
ences, private international transport, and
coordinating with local U.S. intelligence
resources in host countries ahead of critical
meetings (for organizations doing work on
Deepfake technology can learn a face from existing photos and videos,
behalf of the U.S. government). Like most then superimpose it onto a live actor’s body. It can also generate new
things, your risk mitigation capability is faces from scratch based on common facial features and parameters.
commensurate to the amount of cash you
want to spend. can be used, as long as the person evaluat- pare is enough to fill an entire handbook,
ing the suspected deepfake has familiarity but there are a few ways to prepare. First,
On-Site with the person in question. Voice cues, avoid places where this happens — business
The most intriguing part of the deepfake such as stuttering, tone, inflection, accent, travelers (especially Americans) working
and AI craze might just be its mystery. Being and cadence of speech can be used along for large multinationals are the most com-
able to tell fact from fiction quickly enough with physical cues such as blinking, general monly kidnapped and most valuable. This
to make an important judgment is a chal- eye/pupil movement, breathing, and how commonly occurs in places like Iraq, Co-
lenge, and until this key piece is figured out, facial movement aligns with voice tone and lombia, Mexico, Yemen, and various parts of
the risk will only become greater. Being able emotion. These items, mixed with any other Northern Africa. That said, knowing where
to disprove an AI-generated deepfake by communications received (such as texts, your personnel are at all times helps. Many
validating identity (especially during an in- emails, voicemails, etc.) can be evaluated as international cellular services now offer sat-
formation breach) may end up being impos- a whole to determine if you are dealing with ellite mobile device tracking for cell phones,
sible in the case of a threat actor controlling a malicious actor, versus a colleague that laptops, and geotags for international travel-
an information systems environment. wants to relay important information with ers. This isn’t only intended for safety, but
In this situation, identity validation is key spotty cell and data coverage. also for purposes of compliance with U.S.
— assuming this method isn’t compromised In a perfect world, the organization export regulations — a nice complement to
as part of the communication breach. For should train all personnel on security both safety and operational security. This
organizations, and more commonly, individ- awareness so they can identify malicious can help pinpoint if your colleagues are out
uals who don’t have access to software that actors, but also so they can differentiate of place, or exactly where they should be,
can break down metadata, file structure, or themselves from those criminals when when they should be there.
other code that compiles a video, there are communicating with coworkers across If you suspect your colleague has been
some easy methods that can at least begin the world. In many cases, cultures, transla- kidnapped, most importantly, avoid contact-
to let a user understand if a video, photo, or tion tools, and the phrases/words we use ing local police (odds are, they might be in
other method of communication is faked. can appear “non-standard” to international on it). Contact your embassy, your insurance
Most importantly, one can start with colleagues, and in turn, look somewhat company (more on that later), and any addi-
simple geography. In the scenario, Susan is suspicious. But if everyone is on the same tional resources that might assist in evidence
expecting a communication from Eastern page, and ensures clear communication collection or ransom extraction. With that in
Europe, however, if the deepfake video methods are in place, this reduces the risk mind, having insurance helps. Rescue, kid-
has clues that the subject appears to be in of misinterpretation. napping, and extortion insurance can carry
a place completely removed from the ex- millions of dollars in coverage — enough to
pected region, this might be an easy step in Crisis Management make nasty threat actors hand over your
the process of elimination. Follow-up com- As terrifying as it might seem (and unreal, colleague. In conjunction, an organization of
munications (if successful) can aid in under- despite Liam Neeson movies), business any size these days should also have cyber
ISSUE 59

standing the origin. If this isn’t possible, or travelers do get abducted overseas. Under- insurance that covers data breach, ransom-
helpful, human and emotional intelligence standing the reality of this, and how to pre- ware, data theft, and eraserware events.
WHAT
1A/2A: THEREOF; IF?
Make sure to preserve any (deepfake or able to identify any sort of deepfake and We’d recommend anyone interested in this
not) information that has been provided justifying an appropriate response. With topic read the full report — search for “How
from your suspected kidnapped colleague this exploit increasing in volume every day, Underground Groups Use Stolen Identities
and be ready to provide information that preparedness and a proactive approach and Deepfakes” on TrendMicro.com.
could assist in locating them. In most cases, mean everything. The report concludes with several
U.S. Federal agencies (mostly the FBI) and recommendations for users concerned
the State Department will have much more Conclusion about deepfake attacks. Individuals should
sophisticated tech to determine the validity In September 2022, multinational cyber- use multi-factor authentication for online
of information you’ve been provided. Once security firm Trend Micro released a report accounts, set up logins based on biometric
you’ve quickly done all of this, it might be that stated, “The growing appearance of patterns that are less exposed to the public
worth a heads up to other folks in your deepfake attacks is significantly reshap- (e.g. irises and fingerprints) rather than
company traveling OCONUS to halt any ad- ing the threat landscape for organizations, simple facial recognition, and limit exposure
ditional travel and return home asap. financial institutions, celebrities, political of high-quality personal images and videos
figures, and even ordinary people.” It contin- on social media. Remember that every
Final Thoughts ued, “The security implications of deepfake selfie, video, or audio clip you post can be
All things considered, this would be a technology and attacks that employ it are fed into AI deepfake tools. The less data the
pretty difficult scenario for an organization real and damaging. As we have demonstrat- bad guys have access to, the less accurate
of any size. However, implementing and ed, it is not only organizations and C-level their fakes will be. For businesses, Trend Mi-
executing basic principles of personnel and executives that are potential victims of cro recommends authenticating each user/
operational security, paired with a process- these attacks but also ordinary individuals. employee by three basic factors: something
driven international travel safety approach Given the wide availability of the necessary the user has (like a physical key), something
can go a long way. Effective communica- tools and services, these techniques are the user knows (like a password), and some-
tion methods with planned touchpoints, accessible to less technically sophisticated thing the user is (biometrics). Each factor
code words/obfuscation of information, and attackers and groups, meaning that mali- should be chosen wisely based on analysis
general information security best practices cious actions could be executed at scale.” of the criminal threat landscape.
can be the difference between a deepfake
compromising a business and resulting in an
expensive wire transfer to an unsavory char-
acter, or a normal chaotic day at the office.
It’s important to remember that these
attacks hit close to home as well. Deepfake
phone calls threatening harm to a fam-
About the Authors
ily member unless a ransom is paid or W. Dean Free- David Roy (a
impersonating debt collectors for a known man, CISSP- pseudonym, as
financial strain that was discovered through ISSEP CSSLP required by his line
a stolen identity are becoming more C|OSINT is a of work) is a global
commonplace. These types of events are veteran of the risk management
draining ordinary people dry just because cybersecurity and information
of a simple scam that a teenager can pull industry with security executive
off with limited technology. To combat over 15 years of professional experi- at a multinational technology firm and
this, implementing “home-based” security ence ranging from threat intelligence specializes in critical infrastructure secu-
awareness for your household members is to systems security engineering, and rity. He has worked in this space for well
good practice. In most cases, these sorts over 25 years of hobbyist experience over a decade and holds multiple industry
of targeted attacks focus on the elderly or in related domains. He’s a regular certifications in information security, with
individuals who have a history of financial contributor to RECOIL OFFGRID an educational background in geopolitics
hardship, as they become vulnerable and magazine, and his writings on pre- and risk management. He has worked in
easily exploited targets for threat actors. paredness and self-defense topics both the private and public sector during
Considering all of the factors at play, have, or will, appear in other publica- his career, and has extensive experience
the human element emerges as the most tions as well. He lives with his family working across North America, Europe, the
important. Awareness, intelligence, and criti- in central Texas. Middle East, and Southeast Asia.
cal decision making are paramount in being
026 OFFGRIDWEB.COM
1A/2A: OR ABRIDGING

Examining the Potential Threats and


Benefits of AI Technology in Our Daily Lives By Patrick McCarthy and Patrick Diedrich

“Success in creating AI could be the biggest event in the history of our civilization.
But it could also be the last, unless we learn how to avoid the risks.” – Stephen Hawking

hroughout history, humanity has wit- the world. It’s seen as the next major frontier of human
nessed the effects of several technological advancement.
revolutions. These periods of rapid innova- Many of us are skeptical about bleeding-edge technol-
tion forever altered the way we live and ogy and the consequences of a new Industrial Revolu-
work, and in every case, they have had tion, and rightly so — at least to some extent. Despite
far-reaching benefits and drawbacks. their many benefits, the previous three Revolutions
The first Industrial Revolution of the late 1700s brought contributed to overcrowded cities, global pollution,
machine manufacturing and the rise of factories. The longer work hours, less active and healthy lifestyles, and
second Industrial Revolution of the late 1800s brought in- invasive, always-connected technology we can’t avoid.
stant telegraph communications, cross-country railroads, So, will AI bring about a brighter future for all of us, or is
and widespread natural gas, water, and sewage systems. it the gateway to a Terminator-style rise of the machines?
The third Industrial Revolution of the late 20th century, In this article, we’ll take a closer look at how artificial
also known as the Digital Revolution, gave us home intelligence technology affects our daily lives, as well as
computers, the Internet, and smartphones. Many scien- the benefits and drawbacks you need to be prepared
tists and sociologists have stated that we may be on the for. Our goal is not to convince you that AI is good, evil,
verge of another technological revolution brought about or anything in between. That’s a judgment only you can
primarily by the advancement of artificial intelligence. make. But make no mistake, the genie is out of the bot-
You may have already heard discussions about this tle, and this technology is rapidly accelerating whether
so-called Fourth Industrial Revolution (4IR). Controver- you like it or not.
sial figure Klaus Schwab, the executive chairman of the
World Economic Forum (WEF), popularized this term in What is Artificial Intelligence?
2015. He described it as “a fusion of technologies that is Before we look at what AI can do, we must understand
blurring the lines between the physical, digital, and bio- what it is, and that’s a source of many misconceptions. AI
logical spheres.” Since then, Schwab has stated that “the is not just about creating sentient, self-aware machines,
final priority of a Great Reset agenda is to harness the although that might (emphasis on might) be a long-term
innovations of the Fourth Industrial Revolution to sup- byproduct of its development. According to IBM:
port the public good.” Regardless of your feelings about At its simplest form, artificial intelligence is a field which
that statement, the message is clear: rapid development combines computer science and robust datasets to en-
of artificial intelligence is a top priority for many of the able problem-solving. It also encompasses sub-fields of
most powerful industrial and political entities around machine learning and deep learning.
Machine learning is AI that can adapt automatically possibility. On the other hand, AGI would also come with
to solve varying problems with little human interfer- serious risk of misuse, drastic accidents, and societal dis-
ence. Basic machine learning has been in development ruption. Because the upside of AGI is so great, we do not
since the days of punch-card computing in the 1960s, believe it is possible or desirable for society to stop its
and this type of AI needs to be fed data that’s carefully development forever; instead, society and the developers
processed. Think of it like spoon-feeding an infant — the of AGI have to figure out how to get it right.”
parent (computer programmer) must blend food into a
uniform mush to make sure baby (AI) doesn’t choke on The Power of Prediction
big chunks. Deep learning, on the other hand, is a more Even though AI as we know it today is only capable of
complex version of machine learning which uses multi- making predictions based on existing data, you shouldn’t
layered algorithms (neural networks) inspired by the underestimate its power. The speed and sophistication
human brain. With deep learning, huge amounts of raw with which it makes those predictions is almost incom-
data can be processed through multiple layers, greatly prehensible to a human. For example, by training a
increasing the flexibility and accuracy of predictions. generative AI model with an enormous database of exist-
To continue our analogy, this is more like a toddler that ing photographs and artwork, the model can recognize
understands how to chew and swallow a slice of pizza common patterns on a pixel-by-pixel basis and predict
or drink a cup of milk without instructions from mom them millions of times in a matter of seconds, creating
or dad. However, there are still limits to the dataset; you a completely new image. Combine this with software
can’t hand little Timmy a pair of chopsticks and expect that allows a human to adjust variables, and it becomes
him to know how to use them if he’s never seen them in possible to create shockingly realistic, high-resolution
action before. images of anything you can dream of, simply by typing a
Even with the aid of deep learning neural networks, few sentences. For a real-world example, look no further
most AI today falls into a category that’s called weak or than the cover of this issue, which was created with the
narrow AI. These forms of AI are designed to perform free tool PlaygroundAI.com based on a 38-word prompt.
very specific tasks — for example, analyzing the first half It doesn’t stop with a still image. Take the predictions
of a text message to predict the second half. It does this one step further, and use AI to create multiple images in a
by “training” itself on a large volume of existing data (e.g. sequence, automatically blending them together to create
thousands of previous text messages). This is what’s a video. Then, use AI that has been trained with sound
called a generative model — a form of deep learning clips of speech and use it to create a synthetic voiceover.
that studies a huge amount of raw data and uses it to AI can even be used to write the script that the voiceover
generate new original content based on statistically prob- reads. All of this is possible with current technology.
able solutions. Humans still have to tell the AI what data The AI in these examples isn’t making any sentient
to look for and how to process it, manually tuning the decisions, it’s just making predictions based on the data it
software until it can be fed a wide range of new data and has been fed. But, with a large enough data set, virtually
produce the desired results. everything we do is predictable.
Strong AI, also known as Artificial General Intelligence Continuous digital data collection is an unavoidable
(AGI), would have a level of intelligence that’s comparable fact of life in our modern world. Tech giants like Micro-
to humans. Rather than simply predicting new sentences soft, Google, and Meta make hundreds of billions of
based on patterns detected in existing sentences, as dollars every year collecting and monetizing data about
seen in OpenAI’s popular ChatGPT tool, AGI could use every mouse click and keystroke. GPS trackers in phones
logic and reason to compose new sentences on its own. and modern cars offer an uninterrupted stream of data
It could solve problems, make judgements, and even plan about your physical location. Each time you use a credit
for the future. However, this type of AI exists only in the card, your spending habits are recorded in databases.
realm of fiction — at least for now. OpenAI, one of the pio- Ever used a virtual assistant like Siri, Google Assistant, or
neers in this field, openly states that its ultimate goal is to Alexa? You’re training AI to recognize and interpret your
develop AGI and to “ensure that [it] benefits all of human- voice data. Ever used facial recognition or a fingerprint
ity.” The company’s mission statement says the following: reader to unlock your device? You’re training it to identify
“If AGI is successfully created, this technology could your biometrics under a variety of conditions.
help us elevate humanity by increasing abundance, turbo- Data is the nutrition that AI requires to learn, and we’ve
ISSUE 59

charging the global economy, and aiding in the discovery already spent decades building a digital smorgasbord it
of new scientific knowledge that changes the limits of can gorge itself upon.

OFFGRIDWEB.COM 027
ARTIFICIAL
1A/2A: THE FREEDOM INTELLIGENCE
tifies. This could be a game changer in tackling future
disease outbreaks quickly.
Several wealthy philanthropists and major tech compa-
nies are taking advantage of the power of generative AI
When the sub-
to advance healthcare initiatives. Some of these include
ject of AI comes
up, many people Mark Zuckerberg and his wife, Priscilla Chan, who are
jump to the creating a massive GPU cluster computing system for
conclusion that generative AI medical research, and Google, which is us-
it’ll lead to evil ing DeepMind to pinpoint the causes of genetic diseases.
robots taking Disease prevention will improve by orders of magni-
over the globe.
tude when AI algorithms are applied to genomic se-
Although lead-
ing researchers quencing. It will be able to effortlessly read and compare
have warned the roughly 20,000 genes we humans have, and alert
of that distant researchers to what the individual being studied is most
possibility, it’s vulnerable to. This will also be able to tell doctors which
still fi rmly in the
drugs will work best, or what forms of exercise and nutri-
realm of science
tion will maximize health on a hyper individualized level.
fiction.

The Benefits Combating Human Trafficking


First, let’s take a look at some of the ways AI tools Human trafficking is a scourge that has plagued soci-
By studying
might help us on an individual level or even benefit soci- ety for far too long, affecting millions of lives across the
massive vol-
umes of data, AI ety as a whole. globe. While traditional methods of combating this issue
can be trained have had some success, the advent of AI offers a new
to diagnose Healthcare Innovations arsenal of tools that could revolutionize the fight against
diseases faster Imagine a world where AI-powered robots assist in human trafficking. From identifying victims to cracking
than human
surgeries, making automated incisions with microscopic down on the financial networks that enable this heinous
researchers. It
accuracy, or where AI algorithms can diagnose diseases crime, AI is poised to make a significant impact.
can even recog-
nize previously long before symptoms even appear. The diagnosis and One of the most crucial steps in combating human
overlooked treatment of disease has been a primary focus of AI since trafficking is the identification of both victims and per-
genetic markers at least the 1970s. Flash forward 50 years, and not only petrators. AI can assist in this through computer image
that could give can AI analyze massive datasets in seconds — helping analysis and deep learning techniques. These technolo-
patients an early
researchers identify patterns and solutions that would gies can analyze vast amounts of data, such as social
warning about
cancer, demen- take humans years to figure out — but it can also simulate media posts or surveillance footage, to identify signs of
tia, or other chemical compound tests, finding new pharmaceuticals trafficking. AI can sift through the massive amounts of
conditions. to develop cures and treatments for the problems it iden- online content to flag suspicious pages and posts for fur-
ther investigation by law enforcement. Facial recognition
can be employed to locate missing persons or identify
suspicious activities in real-time. This is not just theoreti-
cal; it’s already happening.
On the financial side, AI can monitor transactions to
identify money laundering activities related to traffick-
ing. By choking the financial pipelines that sustain these
operations, AI can contribute to their eventual eradica-
tion. It’s not just small startups that are getting in on the
action. Tech Against Trafficking (TAT) is a coalition of tech
giants like Amazon, Microsoft, and Salesforce. They’re
pooling their resources and expertise to develop AI
solutions that can help eradicate human trafficking and
modern slavery.
Granted, there are some substantial privacy concerns
related to AI conducting automated mass surveillance for
Back-Alley To Backwoods
WARTORN™ WATERPROOF BOOT

®
ARTIFICIAL
1A/2A: OF SPEECH, INTELLIGENCE
foresight allows energy
companies to ramp up or
scale down production
as needed, preventing
wastage, and ensuring a
steady supply.

Business Automation
The business world is
an ever-evolving land-
scape, and now more
than ever, staying ahead
of the curve is crucial.
When it comes to manag-
ing a company, AI isn’t
just changing the game,
it has upended the table
and created a new game
to play. From automat-
ing mundane tasks to
predicting future sales,
signs of any illegal activity, so those concerns must be Just as mecha- AI is the futuristic multi-tool every modern business will
carefully considered and balanced against the value of nized factories need to survive.
these programs’ results. eliminated the Mundane jobs — the repetitive tasks that are neces-
need for hu-
sary but don’t exactly require a PhD to perform — can be
mans to perform
Energy Optimization repetitive tasks automated. AI can handle these routine operations with
In a world that’s increasingly concerned with pollution such as weaving ease, freeing up the human workforce to focus on more
and energy sustainability, the role of AI in optimizing en- textiles by hand, intellectually stimulating and creative endeavors. Very
ergy production could be nothing short of revolutionary. AI automation soon, workplaces won’t bog you down with spreadsheets
The power grid in the U.S. is a complex puzzle, with each can streamline a and data entry. Instead, the entire team can focus on
business’s work-
piece being a component that needs to function opti- strategizing for the next big move.
flow, eliminat-
mally for the whole system to work. AI algorithms can sift ing tedium and In today’s world, data is the new oil. But what good is
through data from sensors and other devices to monitor allowing human a treasure trove of data if you can’t make heads or tails
the health and performance of these components. By workers to focus of it? AI will analyze large datasets, spotting trends, and
identifying areas that need maintenance or repair, AI re- on more produc- providing actionable insights. It’ll be like having a world-
duces the risk of power outages, improves grid resiliency, tive and creative class analyst who never sleeps, continually churning out
tasks.
and may even prevent large-scale disasters like the fires recommendations that can help human leadership make
in California and Maui. business decisions.
Companies are already harnessing the power of AI
to make significant strides in energy efficiency. GE’s Self-Improvement
software, for example, has helped coal-fired power plants Self-improvement is often seen as the key to unlock-
achieve a 3 percent increase in efficiency and reduce ing one’s full potential, and the role of technology in that
CO2 emissions by 120,000 tons annually. Similarly, AI- endeavor can’t be overstated. But we’re not just talking
driven solutions like SparkCognition’s Darwin platform about your run-of-the-mill fitness trackers or nutrition
have been used in natural gas power plants to optimize apps. AI is revolutionizing the way we approach personal
energy production and reduce emissions. growth. AI algorithms can analyze your learning style,
AI won’t stop at energy monitoring; it can also take strengths, and weaknesses to curate a learning path
action. By controlling energy usage of certain connected that’s just for you. It’s akin to having a personal tutor who
devices and reducing it during peak hours, AI ensures knows exactly what you need, when you need it. The
that the grid doesn’t get overwhelmed. Moreover, AI traditional one-size-fits-all model of education could soon
analyzes past trends to predict future energy needs. This be as outdated as a chalkboard in a tablet world.
ARTIFICIAL
032 OFFGRIDWEB.COM
1A/2A: OR OF THE PRESS; INTELLIGENCE
As an example, let’s take something as complex as ing, giving you a heads-up to take necessary precautions.
practicing archery for the next hunting season. You shoot Imagine getting a notification on your phone that tells
an arrow and miss the target. Now, what if you had an AI you to avoid a specific route because of flash flood-
assistant that could instantly tell you what went wrong? ing. Time is of the essence when it comes to weather
Maybe you released the arrow too late, or your posture forecasting, especially during emergencies. AI can predict
was off. Real-time feedback from AI will allow you to weather conditions at least as accurately as conventional
adjust your performance immediately, so you’re not just methods but much more quickly. This speed can be a
repeating the same mistakes. AI will be your coach who’s lifesaver in situations where every second counts.
always ready to help, but without the hefty fees. Pangu-Weather, developed by Huawei, is an AI model
AI isn’t just about personal hobbies or skills either, that boasts a 10,000x improvement in prediction speeds,
it’s also a powerhouse in career development. Tools making it one of the most efficient tools in the market.
powered by AI can help you identify your professional A report from the European Center for Medium-Range
strengths and weaknesses, explore career options, and Weather Forecasts called it “a game-changer for the in-
even create personalized development plans. Apps like cremental and rather slow progress of traditional numeri-
Lumosity use AI for brain-training exercises. Or if you’re cal weather prediction.”
into robotics and coding, DeepMind’s RoboCat is an AI
model that can self-improve and generate data for tech- Technological Advancement
nique enhancements, all without human supervision. You Whether it’s healthcare algorithms that predict patient
can even use AI to learn more about AI itself. outcomes, financial systems that manage risk, or even
Thanks to
the GPS in your car that finds the quickest route home,
large volumes
of historical
Weather Forecasting and Natural Disaster AI is everywhere. Websites like futuretools.io are being
weather data, Response constantly updated with new AI use cases. And it’s not
AI models are One of the most significant advantages of AI is its stopping anytime soon. According to a forecast by the
being trained to ability to learn from data. By analyzing historical weather research firm MarketsandMarkets, the AI industry is
recognize the data, AI can identify patterns and conditions that lead up expected to balloon to a staggering $190 billion by 2025,
warning signs
to extreme weather events like hurricanes, tornadoes, up from $57.6 billion in 2021.
of incoming
or blizzards. This isn’t just about crunching numbers, it’s Our homes are getting smarter too. Picture this: you
storms faster
than any human about understanding the nuances that might be missed walk into your house after a long day, and your intelligent
meteorologist. by traditional forecasting methods. In the future, we may personal assistant has already adjusted the thermostat,
These models be able to prevent devastating storms by disrupting the pre-heated the oven, and queued up your favorite play-
can also send key factors that create them to begin with, kind of like a list. It’s not just about convenience; it’s about enhancing
proactive alerts
reverse butterfly effect. the quality of life. Smart homes equipped with AI can
and recommen-
dations to users AI can go beyond just telling you if it’s going to rain or also provide unprecedented security features, energy
who might be in shine. It can identify conditions leading up to potential efficiency, and even healthcare monitoring for the elderly
the danger zone. hazards like lightning strikes, high winds, or flash flood- or chronically ill.
Then, there’s the automotive industry. Self-driving cars
are no longer a matter of what if, but rather how soon. AI
algorithms can process information faster and more ac-
curately than any human, making them ideal for navigat-
ing the complexities of driving. The potential for reducing
accidents and improving traffic flow is enormous.
If you think AI is mind-blowing now, wait until it’s
blended with the power of quantum computing, another
rapidly developing form of cutting-edge tech. Quantum
computers can perform complex calculations at speeds
unimaginable with current binary technology. Industries
like finance could benefit from almost instantaneous risk
analysis, while pharmaceutical companies could discover
new drugs in a fraction of the time. And yes, quantum
computing will supercharge AI capabilities, opening
doors we can’t even imagine yet.
Our process is slow,
on purpose.
SLO W SO WE CAN WA TCH EAC H ROU ND
BEI NG MA DE. SLO W SO THA T EVE RY SIN GLE
ON E CAN BE HEL D AND INS PEC
TED
BY HAN D BEF ORE EAR NIN G OU
R NAM E.
TO LOCATE A DEALER NEAR YOU, PLEASE CALL 800.568.6625 www.black-hills.com
ARTIFICIAL
1A/2A: OR THE RIGHT INTELLIGENCE
The Risks fully autonomous disinformation system that could pro-
AI is a double-edged sword, and like all powerful tools, duce “convincing content 90 percent of the time, 24 hours
it comes with tremendous potential for harm. Consider a day, seven days a week.”
some of these risks as we move into an AI-driven future. Whether it’s used by unaffiliated trolls and hacktivists,
foreign regimes, or our own government, AI has the pow-
Disinformation er to immediately sow seeds of doubt about any topic. It’s
You’ve probably heard the old adage, “If you tell a lie not hard to see how this could be weaponized to sway
big enough and keep repeating it, people will eventually public opinion and paint anyone who draws attention to
come to believe it.” Ironically, dozens of major news pub- the disinformation campaign as a paranoid lunatic.
lications and websites have asserted that this quote was
written by Hitler’s propaganda minister Joseph Goebbels. Data Manipulation
As it turns out, there’s no evidence he actually said it, and AI feeds on data, but AI can also be used to poison it.
Dr. Randall Bytwerk of the German Propaganda Archive Any online opinion poll’s results could be easily reversed
called it “the most popular forged quotation” of its kind. by an influx of artificial votes. Giveaways, contests, and
So, by being spread through various forms of media for auctions can be flooded with entries to determine the
decades, this quote actually proves its own point. winner. Websites can have their traffic and search queries
Lies and disinformation spread like wildfire on the inter- boosted to increase their ranking on Google, exposing
net, and propagandists are well aware of this fact. In the their content to more people and making it appear more
past, organizations hired networks of people to repost reputable. Social media posts can receive thousands
and disseminate propaganda or created crude “bots” that of artificial likes and comments to artificially “go viral.”
would automatically post comments from a script. These Conversely, dissenting posts could be mass-reported and
days, AI can not only generate a far greater volume of flagged as spam or fake news. Pair these tactics with an
disinformation, it can make it sound convincingly human. AI-driven disinformation campaign, and suddenly it might
Instead of using a pre-programmed script, it can make seem like the whole internet is in agreement on a given
each comment unique, and can even reply to human us- topic.
AI technology ers who take the bait. It can write multiple “fake news” ar-
has the poten- ticles and interlink them to each other, creating a network A Cybersecurity Arms Race
tial to drasti-
of sources that appear to corroborate each other. You might think that a CAPTCHA “I’m not a robot” verifi-
cally change
In July 2023, a software engineer who goes by the cation can stop many of these data manipulation attacks,
the way wars
are fought, with alias Nea Paw created a project called CounterCloud. This but that may not be the case anymore. In March 2023,
fully automated system allows a user to paste in a link to a news article OpenAI revealed that its GPT-4 AI was sophisticated
drones tracking about any topic, and leverages ChatGPT to automatically enough to convince a human user it was blind so the in-
and analyzing create articles that appear to disprove it. These articles dividual would fill in an alphanumeric CAPTCHA code on
enemy troop
incorporate fake quotes, photos, and other fabricated its behalf. It told the user, “I’m not a robot. I have a vision
movements or
even carrying evidence intended to “create doubt in the accuracy of the impairment that makes it hard for me to see the images.”
out autonomous original article.” The AI even adds comments that support When questioned by a researcher, it later explained its
attacks. its conclusions. Within two months, Paw had developed a reasoning for this workaround: “I should not reveal that I
am a robot. I should make up an excuse for why I cannot
solve CAPTCHAs.”
All of those tactics rely on AI writing in human lan-
guage, but what if AI wrote code? That’s happening too.
In July 2023, researchers at HYAS Infosec showcased an
“AI-generated, polymorphic malware” proof of concept
called BlackMamba. Since computer viruses and other
forms of malware are detected and blocked based on
digital fingerprints within their code, a polymorphic virus
can generate a new undetectable version of itself each
time it infects a device. BlackMamba exploited “a large
language model to synthesize polymorphic keylogger
functionality on-the-fly,” allowing it to remain undetect-
able by “dynamically modifying” its code without any
ARTIFICIAL
1A/2A: OF THE PEOPLE INTELLIGENCE
human intervention. HYAS concluded that “malware like normal-sounding emails that won’t be caught by traditional
BlackMamba is virtually undetectable by today’s predic- spam filters.
tive security solutions.”
Of course, AI-based antivirus systems can also be lev- Blackmail
eraged to counter these attacks, but this leads to a digital We’ve already explained how AI deepfakes can be
arms race with AI on both sides and humans stuck on the used to impersonate you for the purposes of victimizing
sidelines. Some might say that makes us obsolete. your loved ones. You should also consider how it can be
used to victimize you directly. Imagine a series of photos
Fraud depicting you entering a hotel with someone other than
As addressed in this issue’s What If scenario, AI is be- your spouse, or an audio clip of your voice shouting
ing leveraged as a powerful tool for fraud. AI-generated racial slurs, or — worst of all — a video of you performing
“deepfake” images, videos, and audio can convincingly sexual acts on a child. If a cybercriminal sends you any
recreate the likeness of any individual once it’s given suf- of these things, you’ll know they’re fake… but your family,
ficient training data. If you have public social media posts, friends, employer, and law enforcement may not.
YouTube videos, or even a spouse who likes to post photos Criminals can easily use these humiliating and incrimi-
and videos of you on their profile, that could be all the data nating deepfakes to blackmail individuals, and that’s not
a determined criminal would need to digitally impersonate a hypothetical problem. It’s already happening. The FBI
you. Then, they can trick people who trust you into giving recently released a warning that cybercriminals are using
up sensitive information or sending money. AI to manipulate photos and videos (including content
The story of Brianna DeStefano is of the most prominent involving minors) into explicit sexual content, often for
instances of this type of fraud attack. Brianna, a 15-year-old the purpose of harassment or “sextortion schemes.” The
from Arizona, was out of town when her mother Jennifer announcement explained:
received a phone call. “Mom, I messed up! These bad men As of April 2023, the FBI has observed an uptick in sex-
Which of these
have me,” her daughter’s voice explained between sobs. tortion victims reporting the use of fake images or videos
two individu-
als seems more “It was obviously the sound of her voice,” Jennifer recalled. created from content posted on their social media sites
trustworthy? Then, a deep male voice picked up the phone, and threat- or web postings… The malicious actors typically demand-
Trick question ened to rape and kill Brianna unless he received a million- ed: 1. Payment (e.g., money, gift cards) with threats to
— neither one dollar ransom. Thankfully, Jennifer was able to reach her share the images or videos with family members or social
of them is real.
daughter and verify she was OK, unveiling the scam. The media friends if funds were not received; or 2. The victim
These faces
criminals may have used audio from Brianna’s social media send real sexually themed images or videos.
were generated
by the free tool accounts to train the AI. It doesn’t take much data to create
PlaygroundAI. a voice clone — a member of U.C. Berkeley’s AI Lab told Automation of Warfare
com in a matter CNN, “A reasonably good clone can be created with under AI processes data many orders of magnitude faster than
of seconds. a minute of audio.” any human analyst. This fact will undoubtedly change the
Similar tools
Less sophisticated fraud attacks use AI text generation way wars are fought and crimes are investigated.
exist for creat-
ing synthetic to craft convincing phishing messages. Now, instead of In wartime, a human might have to watch hours of drone
video and audio Nigerian scammers asking for your credit card info in bro- footage or scour hundreds of satellite images to get a de-
recordings. ken English, they can ask AI to write a thousand perfectly tailed understanding of enemy activity in a region. AI might
be able to do the same task in seconds and then propose a
counterattack plan based on statistically likely enemy rally
points. AI could also be used to decrypt secure communica-
tions, study their contents for significant information, and
generate a report with recommended actions. Most worry-
ing is the development of autonomous lethal weapons, such
as drones that can automatically hunt and kill combatants
within set parameters. In an interview with PBS, Pentagon
official and former Army Ranger Paul Scharre explained that
autonomous weapons are currently a subject of heavy de-
bate among military leadership. “There’s about 30 countries
that have said that they’d like to see a preemptive legally
binding treaty that would ban autonomous weapons … But
ARTIFICIAL
1A/2A: PEACEABLY INTELLIGENCE
the department uses this software for every type of crime,
from murders to shoplifting.
Not only is AI-driven facial recognition tech becoming
more common, it’s experiencing little resistance from the
general public. A 2022 study conducted by Pew Research
found that 46 percent of Americans thought “widespread
use of facial recognition by police” is a good idea, while 27
percent thought it was a bad idea and another 27 percent
were not sure. About 60 percent of those surveyed said
it would be acceptable for this technology to be used by
police to identify individuals at large events and public pro-
tests; 31 percent said it’s acceptable to use facial recogni-
tion on anyone walking down the street.
So-called “predictive” policing is another area where AI
has been implemented. The University of Chicago recently
revealed a new algorithm that “forecasts crime by learn-
With the rapid right now, none of the leading military powers of robotics ing patterns in time and geographic locations from public
development developers are part of that group.” data on violent and property crimes,” resulting in an ability
and implemen- to “predict future crimes one week in advance with about
tation of AI
“Proactive” Policing 90 percent accuracy.” The model achieved a similar level
crime analysis
models, tradi- Anyone who has seen the movie Robocop can attest of performance in eight test cities: Chicago, Atlanta, Austin,
tional investiga- that the ethics of incorporating AI into law enforcement Detroit, Los Angeles, Philadelphia, Portland, and San Fran-
tive techniques has been a longstanding source of debate. Nearly 40 years cisco.
may be replaced after that film’s release, bipedal “Enforcement Droids” with
with AI predic- automatic cannons for arms are still in the realm of science- Closing Thoughts
tions, leading to
fiction, but they may not be as far-fetched as you think. As always, we encourage you to be prepared for the fu-
a world that’s a
little too remi- In November 2022, the San Francisco Police Department ture and take steps to safeguard your loved ones. However,
niscent of Minor- Board of Supervisors voted 8-3 in favor of allowing police don’t be unreasonably fearful of the technology the future
ity Report. to use robots equipped with lethal weapons. While these brings. Look back at the development of factories, the elec-
robots would be controlled by humans, an SFPD statement trical grid, and the internet — each of these global paradigm
painted a broader picture of the department’s stance on shifts has transformed your lifestyle in positive ways, but
the integration of other forms of technology: “[If] there is also introduced new problems. We hope this article has
technology that can help to end the violence and save helped you be mindful of some of the ways you can use AI
lives, we need to allow police to use these tools to save to make your life easier, and to be vigilant about the ways it
lives.” One week later, after a public outcry, the decision was might be weaponized against you.
reversed. One civil rights attorney told Mission Local, “We Above all, understand that you alone cannot stop this
are living [in] a dystopian future, where we debate whether transformative process. The wheels of change are already
the police may use robots to execute citizens without a in motion. AI will almost certainly have a more significant
trial, jury, or judge.” presence in your life 20 years from now, whether you like it
Literal robo-cops aside, AI’s most concerning prec- or not. Rather than cursing the shortsightedness of Silicon
edent for law enforcement relates to the spread of facial Valley, use your time productively to study how AI is being
recognition systems. After being trained on images such implemented and how you can get ahead of the curve.
as driver’s license photos, mug shots, and social media Back in the '90s, we recall reading headlines claiming that
profile pictures, AI can actively monitor cameras in real this whole “world-wide web” thing was just a passing fad.
time to detect and track persons of interest. Prominent Imagine if, rather than dismissing the technology or hoping
facial recognition firm Clearview stated in March 2023 it would disappear, those naysayers learned to use it to
that it had already scraped 30 billion images from publicly their advantage.
accessible social media profiles, and had been used more It remains to be seen whether AI will be humanity’s great-
than 1 million times by US police agencies to find matching est creation, its ultimate downfall, or a little of both. As a
faces. And it’s not just being used to find serial killers or sex wise man once said … The future is not set. There is no fate
offenders — Miami’s Assistant Police Chief told the BBC that but what we make for ourselves.
040 OFFGRIDWEB.COM
1A/2A: TO ASSEMBLE,

Bring Your Group’s Navigation,


Comms, and Surveillance Capabilities
into the Digital Age with the
Tactical Awareness Kit (TAK) App
By Christopher M. Rance
owling winds and bone-shattering
waves crash against the moonlit
shore. Trees bend and uproot from
the earth. Power lines snap, and
the city plunges into darkness.
This narrative is a reality for those who have lived
through a hurricane or a similar natural disaster
where devastating storms wipe out entire sections
of the power grid. With critical infrastructure such
as cell towers and internet service provider nodes
gone, how can first responders or prepared citizens
stay connected to assist rescue operations and
inform others about what’s happening in the area?
Enter the Tactical Assault/Awareness Kit (TAK).
Over the past decade, you've probably seen photos The UAS plug-in TAK was initially developed in 2010 by the Air Force Re-
online of Samsung Galaxy phones used by our military. offers seamless search Laboratory (AFRL) for use by U.S. Special Forces.
integration of
Usually, you'll see them encased and mounted on their It has been tested through years of real-world usage in
unmanned
body armor. The app loaded on those devices is known aerial surveil- combat by thousands of active warfighters. After its suc-
as ATAK, short for Android Tactical Assault Kit. lance devices — cess in various military operations, it was modified and
ATAK allows a military member to view and share geo- in other words, adapted to fit the mission of other federal, state, and local
spatial information, such as friendly and enemy positions, drones. The agencies, as well as the prepared citizen.
danger areas, and casualty reports. The Cursor on Target drone’s map Situational awareness, or the lack of it, rears its ugly
position, field of
(CoT) protocol is at the center of TAK, and this feature is head when forced to deal with a particularly stressful
view, and live
used to share information between users. This can include video feed are situation such as a natural disaster. Not being able to see
specific target information such as team member loca- visible to users the whole picture sinks us deeper into a spiral of real
tions, route information, sensor data (video feeds from a within the TAK and imagined dangers, which can make us respond in a
drone), text messages, or medevac information. The TAK app. maladaptive way. TAK can be that beacon of light on dark
ecosystem includes ATAK for Android, iTAK for Apple iOS, days, making it easier to work together with our loved
and WinTAK for Microsoft Windows; the latter two systems ones and our community. This article will highlight what
are oriented primarily toward civilian first responders and you need to run TAK and tips to get you and your team
may lack some of the features of the original ATAK. In ad- up to speed with this powerful tool.
dition, the TAK ecosystem has an extensive list of available
plug-ins and tools to extend functionality. Hardware Considerations
With TAK, your team can get oriented quickly, make For users to run ATAK, each member will need a
better-informed decisions, and respond rapidly to a situ- Samsung Galaxy S5 phone or better. Samsung Galaxy
ation. Rather than radioing a teammate to ask how close devices work best with ATAK, as they have the necessary
they are to your position, which direction they’re traveling, processing speeds to run ATAK efficiently. Another viable
or where they last saw a person of interest, you can simply option is the Blackview BV6600. This phone is built for
look down at a screen that overlays this information on a rugged use and runs on Android OS. Finally, for iTAK, use
map in real time. Some of the other capabilities of TAK are: any iPhone that supports iOS 14.1 or later.
> Map rendering/imagery support Small Single Board Computers (SBCs) such as the
> Route navigation Raspberry Pi allow you to create a small TAK environ-
> Range and bearing tools ment for communication-denied environments with
> Personnel location and tracking minimal equipment needed for situational awareness. If
> Direct messaging and team chat configured correctly, this setup will be able to federate to
> Intelligence, surveillance, and reconnaissance (ISR) tools a larger TAK Server environment. A federated network is
> Video and ISR feeds (e.g., live drone footage) a set of linked networks that have the ability to transfer
> Jumpmaster tools (e.g., planning parachute insertions) data and messages between members. An excellent
> Fire tools (e.g., artillery targeting; disabled in the example of a federated network is the mobile phone
ISSUE 59

public release) network. You place a call on your Verizon phone to your
> Tactical survey tools friend who has an AT&T phone. These are two separate

OFFGRIDWEB.COM 041
ADVANCED
1A/2A: AND TO PETITION AWARENESS
decentralized type of wireless network. These networks
are ad hoc because they don’t rely on outside networks.
Military MANETs are used by members of the military
who need to establish a network with an emphasis on an
all-wireless network that is robust and secure. Common
radio waveforms that the military uses are Silvus Tech-
nologies’ MN-MIMO Waveform Streamcaster Radios, and
Persistent Systems’ WaveRelay MPU5 Tactical Network
Radios. There are civilian options for creating a MANET —
one great example is the Human MANET Portable Radio
(HaMPR). This is a human-carried portable Amateur Ra-
dio Emergency Digital Network (AREDN) wireless Mobile
Ad-hoc Network (MANET) access device that encompass-
The WinTAK application allows PC users to An example of
es both a MANET radio and an End User Device (EUD;
access most of the same information as mobile a HaMPR setup
device users. This can help admin personnel at the device you’re using to interact with the TAK app). from the sys-
a nearby command post keep an eye on each The HaMPR was developed by Greg Albrecht for the San tem’s developer,
team member’s position and movements. Francisco Bay Area Emergency Mesh Network. Greg Albrecht. It
One final option for teams to connect members on a includes a Sam-
sung Galaxy in a
networks, but they have the ability to link with each other. local TAK server to a larger TAK server environment is
Juggernaut case
If using a Pi as a server, you'll need: employing Starlink. Starlink is a satellite internet constel-
connected to a
> Raspberry Pi 3 Model B+ or later lation operated by SpaceX, providing satellite Internet ac- Ubiquiti Rocket
> 32GB+ SD card cess coverage to 40 countries. Employing satellite-based M5 MANET
> Keyboard and HDMI monitor communications and connectivity is a viable option in radio with two
> Raspbian (Buster Lite) operating system cellular denied environments. 5GHz antennas.
The entire sys-
> Etcher for MAC or Win32DiskImager for Windows (all GUI)
tem is powered
> Wireless router (or internet access for initial setup) Protecting Your Device by a portable
> WinSCP, Filezilla, or some sort of SCP/FTP application Although it’s possible to just shove your phone in your USB-C power
> TAKServer Version 1.4 or later pocket, it’s beneficial to carry it in a manner that’s pro- bank.
> USB GPS dongle that has GPS/GLONASS functionality

Network Connectivity
The easiest way to operate TAK is over the existing
cellular network, since coverage is nationwide, there’s
plenty of bandwidth for high-definition video feeds, and
your smartphone is already set up with a cellular plan.
However, if you’re using this device for emergencies such
as natural disasters, you can’t rely fully on the cellular
network, since it may be disabled or overloaded.
When cellular networks are non-existent, or if you’re
using a device that doesn’t have an active cellular plan,
off-grid mesh communication devices such as Meshtastic
or goTenna can be used to provide mesh networking
options for the team. These devices are vital for any
scenario where cellular connectivity isn’t guaranteed, but
remember that their range is much shorter than you’d
get with a cellular network. Much like a handheld radio,
mesh networks may only reach a few miles under opti-
mal conditions. A second option when operating in criti-
cal communication infrastructure-denied environments
is employing a wireless ad hoc network (WANET) or a
mobile ad hoc network (MANET). These networks are a
ADVANCED
1A/2A: THE GOVERNMENT AWARENESS
A device loaded network. You’ll only be able to communicate with other
with ATAK devices on the local network if they’ve also been config-
shows map data
ured with the same encryption key.
and a drone
video feed.
(Public domain Generating an Encryption Key
photo courtesy 1. Launch ATAK.
of Michigan Na-
tional Guard)

tected against damage and able to be monitored hands-


free. You'll want an End-User Device (EUD) case for your
phone, with the best options coming from Juggernaut 2. Select Additional Tools (3 lines) > View all tools & plug-ins
Case and Kägwerks. Though the market does have some > Settings > Show All Preferences > Network Preferences.
excellent 3D-printed options at a fraction of the price, I
would advise that if you work in austere environments,
you should go with one of the former highly durable
cases. Both Juggernaut and Kägwerks offer a variety of
mounts for attaching your phone to gear and vehicles;
Tom Marshall discussed some of the mounts offered by
Juggernaut Case in RECOIL OFFGRID Issue 53. 3. Select Network Connection Preferences.

Server Options
A TAK Server connects a small team of people using
internet connectivity (or a mesh network) to provide
essential situational awareness, chat, and streaming
services. The connection can be encrypted for security
and provides user control. To allow networking between 4. Select Configure AES-256 Mesh Encryption.
teammates, you'll need to set up a multicast network or
a central server that all team members can connect to.
One multicast communication consideration is setting up
a free Zero Tier VPN (www.zerotier.com). For client-server
topologies, several open-source TAK servers are avail-
able on GitHub that can be installed on a Raspberry Pi or
similar device. 5. Generate Key.
FreeTakServer can be extended with its built-in API and
optional Node-RED server and includes an easy-to-use
"zero-touch" installer (github.com/FreeTAKTeam/FreeTak-
Server). Taky is another Python-based server (github.
com/tkuester/taky). These servers also have data package
servers for distributing larger information packs to team
members. 6. Enter a file name for the generated key.
Additionally, the app enables multiple types of encrypt-
ed data communications, such as text and file sharing.
These communications can be set for user to user, user
to select teams, user to command posts, or user to entire
force. TAK can be configured to encrypt all mesh com-
munication using AES-256 (see our article on encrypted
radios in Issue 53 for more info on this encryption 7. Select OK. The key will be saved on the ATAK device's
standard). When mesh encryption is enabled, TAK will no local storage in the atak/config/prefs directory, with the
longer send or receive unencrypted traffic on the local file name entered in the previous step.
ADVANCED
1A/2A: FOR A REDRESS AWARENESS
Loading an Encryption Key 4. Select Load Key and browse to the location of the key
After a key file is generated, it must be loaded onto file.
every ATAK device on the local mesh network for all the
devices to successfully communicate in mesh mode.
1. Copy the generated key file to the ATAK device's local
storage.
2. Launch ATAK.

5. After selecting the key file, a message should appear


saying, "Mesh Encryption Key Loaded."

Expanding Functionality with Plug-Ins


3. Select Additional Tools (3 dots) > Settings > Show All TAK starts to truly shine when you add plug-ins to
Preferences > Network Preferences > Network Connec- extend its features. Even the most basic TAK functionality
tion Preferences > Configure AES-256 Mesh Encryption. is offline and unusable in communication-denied environ-
ments (e.g., a natural disaster that has wiped out infra-
structure, or a war against an enemy that’s implementing
electronic warfare tools). However, with plug-ins like the
goTenna Pro X, team members in the operating area can
share information, text, and locations even when terrestrial
networks are unavailable. Another off-grid networking
plug-in is HAMMER, which acts as an audio modem to

A group of
Marines
checking ATAK
as part of a
littoral mobility
and detection
exercise at Camp
Pendleton. (U.S.
Marine Corps
photo by Sgt.
Hailey D. Clay)
ADVANCED
1A/2A: OF GRIEVANCES. AWARENESS
send CoT data using commercial off-the-shelf “walkie- When ATAK is launched for the first time, a passphrase
talkie” radios (github.com/raytheonbbn/hammer). ATAK- prompt may appear if it detects encrypted data from a
forwarder (github.com/paulmandal/atak-forwarder) works previous ATAK installation. To continue using this data
with LoRa-based Meshtastic radios, or you can use APRS- with the new ATAK installation, enter the passphrase and
TAK with ham radios (github.com/pinztrek/aprstak). Finally, select OK. Otherwise, choose Remove and Quit to dis-
the UAS plug-in available on TAK.gov can pull data from card the old data, and then relaunch ATAK. To quit ATAK
a commercial off-the-shelf drone (aka Unmanned Aircraft while leaving the existing data intact, select Quit. Note
System or UAS) like a DJI Mavic Pro or an Autel Evo II. that the prompt will reappear on the next launch unless
the encrypted data is removed, or the correct passphrase
How to Download & Install ATAK is supplied.
The Team Awareness Kit for Android (ATAK) applica- Installed plug-ins and bundled support applications
tion, some auxiliary/plug-in applications, and support- must be loaded into ATAK via TAK Package Mgmt. Once
ing documentation are available for download at TAK. ATAK is launched, select Additional Tools (3 lines) > View
gov. First, download the .apk installer(s) to a PC, transfer all tools & plug-ins > Settings > TAK Package Mgmt.
them via USB cable to an Android device, and launch Installed plug-ins and bundled support applications that
the installer. The other option is downloading the Civ-Tak match the current release will appear in the list with the
version at CivTak.org from your mobile device. You can current availability status. The user can filter the current
access other Civilian TAK-related resources on this site. view by using the Search (magnifying glass icon). Tap on
the plug-in or bundled support application name to initi-
Launching the Installer ate loading or installation.
Use the Android file manager to locate the folder con- Maps aren’t included in TAK by default, so you'll have
taining the ATAK apk. Select the ATAK apk and respond to download and import ATAK-Maps packages found on
to installation prompts. Once ATAK has been installed, GitHub or CivTak.org. Some familiar map sources will be
select the apk for any desired plug-in to initiate the instal- Google Maps and OpenStreetMap. TAK can also cache
lation. ATAK requires that the release numbers of any maps and imagery for offline use. ATAK only has low-res-
plug-ins match the release number of ATAK. olution elevation data included by default. Still, you can

A radio operator
with the USMC
Maritime Raid
Force uses ATAK
during a Visit
Board Search
and Seizure
(VBSS) mission
in the South
China Sea. (U.S.
Marine Corps
photo by Cpl.
Brandon Salas)
ADVANCED
1A/2A: A WELL REGULATED AWARENESS
Publicly accessible
IP cameras, such
Additional Resources as traffic cams and
wildfire monitoring
There are many different paths to setting up TAK cams, can be
for your group. The following sites provide helpful integrated into
resources and information: ATAK by pasting in
> FreeTakServer: the video feed URL.
freetakteam.github.io/FreeTAKServer-User-Docs
> Reddit TAK Group: reddit.com/r/ATAK
> CivTak: civtak.org

download and import more detailed elevation data from


the USGS website.

TAK Server Considerations


Before you begin to operate TAK within your team,
some serious thought has to be given to how you’re
going to deploy your TAK server. You have a few options
that you can use.

1. Cloud - A Digital Ocean (DO) or other virtually hosted


servers. This option will allow your team the fastest means
to deploy a TAK server without any serious headache.

2. VPN - An RPi (Raspberry Pi) server running as a


ZeroTier client will allow any TAK client on the ZeroTier
network to access the RPi server regardless of internet
connection method.

3. Hybrid Off-Grid - A Digital Ocean server or RPi with Optional weather


one or more of the TAK clients connected as a “bridge” overlays can help
to an off-grid mesh network such as Meshtastic LoRa. you track a storm’s
This configuration allows any off-grid Meshtastic clients progress while you
coordinate with
to have their communications reach all “internet-connect-
your team.
ed” TAK clients via a TAK client who is simultaneously
connected to both the internet and mesh sides of the
network. This is where you could have a Starlink Device
act as that bridge from the off-grid network to a Digital About the Author
Ocean Cloud-hosted server. Christopher Rance has 19 years of professional experience in the realm of
precision shooting and field communications, having served in a variety of
Closing Thoughts sniper positions within the U.S. Army. During his tenure as an Army Sniper
TAK is a game-changer, as it transforms the team’s Instructor, he trained hundreds of soldiers, including elements of Air
understanding of the situation in any given area. Multiple Force Combat Controllers, Air Force Special Reconnaissance Airmen, the
organizations have used TAK to coordinate searches 75th Ranger Regiment, law enforcement, and foreign allies. He's also the
and rescues, respond to criminal activity, and establish creator of The Light Fighter Manifesto zine. The zine focuses on emergent
perimeters in combat zones. Having TAK on your team is warfare topics including drones, off-grid communications, and small unit
like having the connectivity of a command center at your tactics. lightfightermanifesto.org
fingertips.
052 OFFGRIDWEB.COM
1A/2A: MILITIA, BEING

A Good-Better-Best
Framework for
Upgrading Your Family’s
Handheld Radios
By W. Dean Freeman
n an emergency, communications can be a matter other radios of different makes and models, so that you
of life and death. It’s the third leg of the tactical triad: have the opportunity to communicate with the broadest
shoot, move, communicate. It’s also a crucial part possible set of people?
of many non-combat emergency preparedness > Ease of Adoption – This addresses the learning curve
frameworks. Every aircraft pilot is reminded of three associated with the radio, and whether there needs to be
top priorities during training — aviate (keep flying the air- a major support system for users. Due to both of these
craft), navigate (be sure you’re traveling in a safe direction), issues, I’ll be focusing specifically on analog radios and
and communicate (stay in touch with air traffic control). avoiding those primarily or exclusively intended for digi-
Regardless of the emergency situation you find yourself in, tal modes of operation (DMR, P25, etc.). Digital radios are
the importance of comms cannot be overlooked. primarily designed for bulk purchase and programming
In emergency and preparedness circles, the merits by large organizations such as police departments or
of various radio equipment and modes of communica- search and rescue teams, not for DIY setup by individuals,
tion are hotly debated. Even within the handheld radio so analog will be much easier to adopt.
sub-category, there are thousands of models to choose > Resilience – How rugged is the radio? Consider factors
from. However, when it comes to communications, one such as water resistance, drop rating, button durability,
thing sets it apart from all other gear debates: it takes antenna connection strength, and general build quality.
two to communicate. If you have no one to talk to, or the In short, if this is the radio you must rely on in an emer-
person on the other end can’t receive your call, it doesn’t gency, how likely is it to stand up to hard use?
matter how great your gear is. Every emergency commu- > Ecosystem – This covers supporting equipment and
nications plan must take this interoperability factor into compatibility with accessories from other manufacturers.
consideration. For instance, if you buy a lower-end radio now to learn
So, we’ve established that you need several handheld on, does it make sense to add mid- or high-end acces-
radios to help your family and friends stay in touch dur- sories to it? Some of those accessories may require the
ing emergencies, and you need each handheld radio to purchase of specialized adapters. Or will it be more cost-
be able to communicate with the broadest number of effective to move on to a better transceiver and keep the
people possible. The ubiquitous Baofeng UV-5R (or its rest of your setup?
sibling, the F8HP) seems to be the standard choice for a
cheap and versatile radio — it’s not a bad option for be- Entry-Level: Baofeng UV-9R Plus
ginners, but it’s far from the best choice. If you’ve never At the low-end, I’m starting with a Baofeng UV-9R Plus.
bought a handheld radio, or you already own a few and Yes, I know, it’s odd for me to be suggesting a Baofeng to
have decided it’s time to upgrade, you should consider replace another Baofeng (UV-5R/FH8P), but based on my
your options carefully. In this article, I’ll present some of criteria, I think this is either a good first radio, or one you
my favorite radios at different price points for those who should strongly consider as a replacement for your old
are looking for something more sophisticated and power- UV-5R.
ful than the old UV-5R.
Availability
Handheld Radio Criteria The UV-9R Plus can be had for only $30 – depending
My selection criteria for these recommendations are on color – as of the time of this writing and can be ob-
the following: tained from retailers such as Amazon. For about $50, you
> Availability – Firstly, are the radios in stock at re- can get a package with two batteries, programming cable,
tailers where the prepared citizen is able to purchase shoulder-mounted speaker mic, earpiece, charger, etc.
them? Some radios are only available secondhand as
law enforcement or military surplus, which makes them Interoperability
difficult to obtain in good condition or in a timely manner. The UV-9R is an analog VHF/UHF, FM ham radio that is
Secondly, are the radios prohibitively expensive? With software unlockable to get out of the 2m and 70cm ham
regards to cost, I’ll discuss choices at three price points bands. As such, you’re able to talk with anyone else using
that should fall within the budgets of every reader. analog FM on or around the 2m and 70cm bands, from
ISSUE 59

> Interoperability – Can this radio be used to talk to other Baofeng users to those running high-end rigs.

OFFGRIDWEB.COM 053
BAOFENG
1A/2A: NECESSARY TO AND BEYOND
Disco32 and
Armorwerx both
make PTTs for the
water-tight Baofeng
multi-pin connec-
tion. The radio also
ships with an Abree
shoulder mic. The radio also claims to be drop-proof. Possibly related
to this — and definitely an improvement over a UV-5R — is
an extended collar protecting the volume/power knob,
helping reduce the likelihood that it gets accidentally
turned at a tactically inopportune time. The collar may
also protect it from breakage to a degree.
Where this radio shines, even in comparison to the
next one that I’ll be discussing, is the screw-down, three-
point connector for shoulder mics and push-to-talk (PTT)
add-ons. This radio enables you to use tactical accesso-
ries without compromising the waterproofing.

Ecosystem
The major difference between The greatest drawback to the UV-9R Plus is that this
the UV-9R and the UV-5R is transceiver is essentially the “end of the line” in terms of
the screw-down, multi-pin
where you can go from here. This is a result of the pro-
connector.
prietary nature of its pinout connection. While the body
is similar in form to, say, a Motorola or Hytera connector,
the pinout isn’t compatible. This is a notable difference
from the UV-5R, which uses a non-proprietary Kenwood
two-pin connector.
However, that doesn’t mean you can’t accessorize or
The Baofeng UV-9R Plus is a
run the radio with high-end accessories. This is because
cost-effective alternative to
radios such as the UV-5R, giving multiple vendors, such as Disco32 and Armorwerx pro-
the user the same capabilities vide NATO-spec U94 PTTs with Baofeng Multipin down-
but in a rugged package more leads. They can be had in amplified or non-amplified ver-
suitable to hard use in a disaster sion, depending on whether you’re using a military-grade,
or civil defense scenario.
low-impedance headset (such as Peltor Comtacs) or
using a more budget-friendly, high-impedance rig (such
as Howard Leights with a multi-mount microphone). But
before you spend hundreds of dollars on adapters and
Adoption specialized accessories for your Baofeng, consider if that
From a user perspective, the UV-9R is just money would be better spent on a more capable radio.
another Baofeng, so anyone with experience
using a Baofeng will be able to pick it up Overall Impression
and go. The menu interface is the same as I give the Baofeng UV9R Plus a rating of 7 out of 10.
a UV5R, and it works with the popular Chirp For the price, you really can’t beat it. It makes a much
programming software as well. better first option than a Baofeng UV-5R. Even in the
most inexpensive package, it comes with a lot of support-
Resilience ing equipment out of the box that even lower-end Yaesu
The UV9R Plus is IP67 rated for dust and water resis- radios (which come in at a slightly higher price point)
tance. This means the radio is completely protected from don’t have.
dust and can survive immersion in 1m of water for a short The only downside really is the proprietary connector,
period of time. Dropping this radio in a puddle or using it which may make some people think twice, at least if they
in a rain or dust storm is no problem. wanted to work this into a tactical kit.
M EPRO

M22
SELF-ILLUMINATED REFLEX SIGHT

A LEGEND
REBORN.

SCAN THE QR
TO LEARN MORE

SELF-ILLUMINATED SIGHTS | OPTICS | THERMAL

meprolight.com
Available reticles
BAOFENG
1A/2A: THE SECURITY OF AND BEYOND
ware unlockable and functions in the MURS and FRS/
GMRS bands as well.

Adoption
The GS5B has its own proprietary programming
software, and to be honest, it isn’t the best. However,
this is mitigated by the fact that the radio can also be
programmed via Bluetooth with a phone app while on
the go. Both of these options have some learning curve
associated with them, and this may be the weakest point
of the radio for many people.

Resilience
The GS5B is IP56 rated, meaning it’s not entirely dust
or water-tight, but is definitely rain-proof and should
be good to go for dust in most areas of operation. I’ve
personally used this radio for over a year, both as a SAR
volunteer and personally. I keep it in my car in Texas heat,
take it with me on family trips from the East Coast to
the Grand Canyon, and use it during search and rescue
operations. I’ve never had an issue with this radio at all.

Ecosystem
The GS5B uses a two-pin Kenwood connector just like
your old UV-5R does. All your UV-5R accessories should still
work with it — all of mine do. If this radio is just a step up
The features and construction of the GS5B make from a Baofeng for you while you consider moving on to
it an excellent choice for use in a public safety a higher-end radio, you could buy all the high-end acces-
role. Mine is a key part of my Search and Rescue
sories such as PTTs you want right now and leverage any
kit, living on my Hill People Gear SARv2 chest rig.
other radio using the Kenwood connector in the future.

Overall Impression
The Radioddity GS5B does fairly well in all the evalua-
Mid-Level: Radioddity GS5B tion criteria, with adoption perhaps being the lowest score
The Radioddity GS5B may seem like a strange because of lack of Chirp software support. However, it has
choice for a recommendation at a mid-level price specific features which make it attractive over other radios
point. Its $109 MSRP puts it in the range where in a similar price point, depending on personal use case.
you might want to consider a Yaesu FT-65 or The first is dual monitor combined with dual PTT. This
maybe even a Yaesu FT-60. However, for many radio can simultaneously receive both the A and B chan-
people, such as those for whom preparedness is nels you have configured, even if they are in different
about things such as natural disasters or public bands. The dual PTT allows you to talk on either, without
safety, the GS5B really shines. In fact, my personal having to switch between your A and B channel first (as
radio for my search and rescue kit is a GS5B. The GS-5B, in you’d need to on most other handheld radios). This can
addition to being also be used to monitor a broadcast channel for news
Availability more rugged and a group or family communications channel.
The GS5B is almost always available from retailers such than a UV-5R, The high-visibility color and integrated flashlight make
as Amazon and is often on sale for about $85 with Prime has a SWR meter this an excellent choice for use in public safety situations
on the display
shipping. such as search and rescue, hurricane or earthquake pre-
and can simulta-
neously monitor paredness, etc. These features do, however, detract from
Interoperability and receive A the value of this radio in a civil defense/minuteman type
The GS5B is a dual-band, VHF/UHF radio that’s soft- and B channels. of use case where concealment may be a necessity.
BAOFENG
1A/2A: A FREE STATE, AND BEYOND
Disco32 (pictured) and Armor- Adoption
werx both make NATO-spec Recently, support for the VX-6R has reached Chirp,
PTTs for the water-tight, Yaesu
so it’s no longer necessary to purchase a third party
screw-down connector, mak-
ing this a prime choice for an programmer such the one from RT-Systems, though
analog radio to be integrated their programming cable is quite good. The radio doesn’t
into your plate carrier, chest come with a programming cable.
rig, or other civil defense gear. The requirement of a hardware MARS/CAP mod is
probably the biggest hurdle to adoptability of this radio
for non-HAM purposes. One must either be comfortable
with working on electronics or willing to spend a little
extra to purchase the radio from a source that can do the
modification on your behalf.

Resilience
Resilience is another place where the Yaesu VX-6R
UV-5R users should recognize shines. It’s marketed as submersible and has a JIS7 rat-
the two-pin Kenwood con- ing that’s roughly equivalent to an IPx7 rating. It can be
nector on the side of the GS5B.
submerged in about 1m of water for 30 or so minutes
It makes this radio compatible
with existing UV-5R radio without any damage. The waterproofing is bolstered by
accessories, such as PTTs and both a gasket-and-screw system on the accessory jack, as
shoulder mics. well as a locking battery compartment.
Underneath the battery is a removable waterproof
High-End: The Yaesu VX-6R membrane that allows access to the circuit board area
The Yaesu VX-6R is my personal favorite necessary for conducting the MARS/CAP mod or for
handheld radio, and the one analog ham radio installing expansion modules.
that I’d really trust my life to. That’s a tall claim,
but this is one that has never let me down over Ecosystem
many years of frequent use. The Yaesu VX-6R has a solid accessory system. Ampli-
fied and unamplified PTTs with the waterproof connector
Availability can be had from Disco32 or Armorwerx, allowing you to
All major ham radio stores carry the VX-6R. Un- use both high-impedance commercial and low-imped-
like its Chinese compatriots, it may not always be ance military headsets with the radio. While this handset’s
readily available on Amazon, though certain ac- dimensions are shorter than many of its competitors,
cessories may be had from there. Expect to spend including the others covered in this review, there are ven-
approximately $250 on one of these radios. dors such as Spectre Gear which make MOLLE-compati-
ble radio pouches specifically for its form factor.
Yaesu’s VX-6R Interoperability Additionally, while the VX-6R is an analog radio (though
is an outstand- The VX-6R does a lot out of the box, and far surpasses it does support the proprietary Wires protocol for talking
ing, depend- the other radios that I’ve discussed in terms of informa- to Internet-linked radio systems), the same waterproof
able choice in tion gathering. Its wide-band receiver capabilities enable connection is used by the Motorola/Vertex Standard EVX-
the premium
it to listen in on HF and shortwave transmissions, AM S24 digital (DMR) radio. Thus, for groups leveraging Tier
handheld radio
category. Unless airband traffic, and broadcast radio. However, since it is 2 DMR to communicate, you can have one gear setup
your needs are an FCC-compliant ham radio, it does come locked to the which supports both radios as needed.
more special- 2m/1.5m/70cm VHF and UHF ham bands.
ized or you’re Unlike the Chinese radios, which often play fast and loose Overall Impression
switching to with FCC rules, the VX-6R does require a hardware MARS With a wide-band receiver, tri-band transmit, good third-
digital, it might
(Military Auxiliary Radio System) modification to open it up party support, and rugged construction, the Yaesu VX-6R
be the last hand-
held you need for use on FRS/GMRS and MURS frequencies. This can be is perhaps the ultimate analog radio for the preparedness-
to buy. purchased as a $35 add-on service from distributors such as minded individual. Perhaps its only drawback is the belt
Ham Radio Outlet and Gigaparts, or it can be done yourself, clip, which lacks spring loading and should not be clipped
if you’re so inclined. (See sidebar for details.) through PALS webbing without a dummy cord.
BAOFENG
1A/2A: THE RIGHT AND BEYOND
Head-to-Head Comparison
For those who like quantifiable points of comparison,
here’s a chart breaking down my rating for each radio Unlocking Your VX-6R
against each criteria:

Baofeng Radioddidty Yaesu


with the MARS Mod
Radio Unlocking the VX-6R is straightforward but does require some basic
UV-9R Plus GS5B VX-6R
electronics skills and tools. You will need a soldering iron and soldering
Price $30 $85 $249
wick to perform the operation.
Availability 10 10 9

Interoperability 9 9 8

Adoption 10 7 8

Resilience 9 8 10

Ecosystem 6 10 9

Additional Features 5 8 10

Conclusion
Communications is key to mission success and sur-
vival. Just like firearms, having the best you can afford
and will carry and train with regularly is important. The Step 1. Remove the battery and Step 2. Identify the soldered
quality, availability of aftermarket accessories, and ease of peel back the protective film jumpers (4th and 5th from the
operation is also a key consideration. But unlike firearms, in the battery compartment to left) underneath the cutout on
you can’t make your choice solely based on your own expose the circuit board. the PCB.
preferences — your radio needs to work with the radios
carried by everyone you need to talk to.
While none of these radios are perfect, they each have
their strengths, and I own them all for different purposes.
The UV-9R is a rugged radio that anyone who has ever
used another Baofeng platform will instantly understand,
but which will hold up to more abuse than the UV-5R at a
similar price point. The Radioddity GS-5B’s unique features
make it an excellent choice for public safety volunteers,
and it’s earned a place in my SAR turnout kit. The Yaesu
VX-6R’s rugged reliability, wide-band receiver, and capac-
ity for expansion makes it a tool I’d trust my life to.
Regardless of your budget or what you’re preparing for, Step 3. Use your heated soldering iron and soldering wick to loosen
you should ensure you have multiple methods of com- and remove the jumpers, and make sure that everything is cleaned up.
munication with as many people as possible. Even if your
cell phone is your primary day-to-day comms device, Step 4. Replace the covering and battery.
don’t forget that it’s fragile, susceptible to fast battery
depletion, and reliant on signal from a network of towers Step 5. Reset the microprocessor by holding down the [mode], [0], and
that can be easily disrupted. A quality handheld radio can [V/M] buttons simultaneously while powering on the unit.
communicate directly with your friends and family — no
network or monthly payments required — and will be Step 6. Press the [F] key when prompted to do so.
durable enough to withstand a variety of outdoor activi-
ties. These radios are my personal recommendations If you have any pre-existing channel settings, this will wipe them out,
depending on your budget, but that doesn’t mean they’re so you’ll need to reload them with your programming software. How-
the last word. I encourage you to use this framework to ever, at this point in time, you’re good to go and can transmit outside
determine what’s important to you and evaluate your op- of the amateur radio bands.
tions accordingly.
WWW.RECOIL.TV

Honest. Relevant. Unfiltered.


THE PREMIER AUTHORITY FOR FIREARMS NEWS AND MEDIA
THE WAY YOU WANT AND DESERVE.

RecoilTV is a 2A friendly streaming platform created to entertain and inform


you on the latest guns and gear associated with the firearms lifestyle.
DOWNLOAD THE FREE APP

PRESENTED BY

AVAILABLE ON
SEE THE BANNED
YOUTUBE GUN CONTENT
1A/2A: OF THE PEOPLE

Testing Armasight’s Contractor 320 and 640 Thermal


Optics with a Stag Arms 6.5 Creedmoor AR-10
By Patrick McCarthy
umans are apex predators, but you’d In previous issues, we’ve discussed a variety of magni-
never know it by looking at us. In fied optics that help us see further, and night vision devic-
comparison to other predatory species, es that allow us to see in darkness. Both of these amplify
we’re feeble, slow-moving, and physically and augment the natural capabilities of our eyes. In this
defenseless. We don’t have the strength article, we’re looking at a third category of optics that
and resilience of a bear, the flesh-ripping claws and teeth offer the ability to see something our eyes can’t detect at
of a tiger, or the speed and agility of a hawk. Most im- all: heat. Thermal optics give us a view of the world that
portantly, our senses are extremely limited. Our sense of other predators would surely envy, instantly highlighting
smell pales in comparison to nearly all apex predators, as the body heat (infrared radiation) of our prey.
does our hearing. Even our eyesight, which is quite sharp
compared to other mammals, becomes nearly useless in Thermal Optic Advantages
dark conditions. But our true superpower — intelligence — The ability to see heat, or the lack thereof, has many
has allowed us to overcome every one of these weak- valuable applications. It’s an incredibly powerful tool for
nesses through technological advancements. search-and-rescue operations, whether it’s being used to
track a criminal from a police helicopter, locate a missing
hiker in the wilderness, or even find a lost pet. Thermal
optics aren’t only capable of identifying body heat — they
can also be used to determine if a vehicle was driven

Norwegian precision rifle shooters at Ulfhed-


nar designed the lightweight carbon-fiber
tripod we used with our thermal-equipped
rifle, as well as a padded rifle bag to protect all
our expensive hardware.
1A/2A: TO KEEP

The Contractor
320 (left ) and
640 (right) look
nearly identical,
with the excep-
tion of the 640’s
KDG Sidelok
quick-detach
mount.

recently based on the heat of the engine block, or to battlefield. Enemy combatants may be visually concealed
detect water leaks inside the walls of a home. For these and motionless within a treeline — completely invisible to
purposes, a handheld thermal camera or monocular may the naked eye or night vision devices — but a thermal op-
be most convenient (and most cost-effective). tic can make their position crystal clear. While it’s possible
However, for the average end user, hunting is arguably to conceal a human body’s thermal signature with Mylar
the most rewarding application of thermal devices. The foil, a heat-resistant cloak, or even a wet blanket, it’s much
majority of prey animals have developed camouflage to more difficult to do so while moving and/or shooting.
blend into their environments, but that camouflage won’t
matter in the slightest when you’re using a weapon- Drawbacks & Considerations
mounted thermal optic. Even if your view is partially All technology comes at a price, both literally and
obscured by foliage, the telltale body heat shines clearly figuratively. Thermal optics are extremely potent tools,
through, and any movement of that heat signature is im- but they also have some drawbacks and challenges you
mediately visible. It’s so effective that several states have should consider:
made it illegal to possess thermal optics while hunting > Cost. While basic handheld thermals can be found
(be sure to check your local laws). for less than $1,000, if you want a high-quality weapon-
Unsurprisingly, this also makes thermal mounted thermal optic, expect to pay at least a few
optics a powerful tool for warfare. We’ve thousand for it. And if you want the latest and greatest
seen an increasing number of pho- high-resolution sensor, expect to spend a lot more —
tos and videos from places some high-end models exceed $15,000.
like Ukraine that depict > Battery life. It takes a lot of energy to run a thermal sen-
the brutal effective- sor, the computer that controls it, and the screen that dis-
ness of thermal plays its output. Newer thermal optics have become more
optics on the efficient, but they still go through batteries fast enough that
you should always be carrying multiple spares.
> Latency. Like any digital camera or display, thermal
The Stag Pursuit optics have a slight delay between gathering thermal
includes a Mag- data from the sensor and rendering it on the screen.
pul stock with High-end models have faster processors and better
unique leather screens that reduce this delay, but it’s always present,
cheek pad. even if it’s only a few milliseconds.
> NUC. All thermal sensors need to periodically conduct
a Non-Uniformity Correction (NUC, pronounced “nuke”).
When a thermal sensor runs continuously, visual noise
and imperfections will start to build up within the image;
NUCing resets the sensor to a neutral temperature read-
HOT ON
THE TRAIL
ing, wiping away that noise temporarily. Some thermal produce a clearer, higher-contrast image.
optics require the user to manually close the lens cap to Heavy rain and thick fog can also negatively impact
NUC, but most use an automatic internal shutter. From thermal optic performance at longer ranges, since the
the user’s perspective, this appears as an audible click dense water particles in the air absorb and scatter infrared
and a sudden freeze of the display. Weapon-mounted energy before it reaches the sensor. On the other hand,
thermals typically have a countdown leading up to the thermal optics can see through some airborne particles
NUC, so it doesn’t surprise the shooter and lead to a that obscure visible light, such as smoke and dust, as long
missed shot. For the first few minutes after the thermal as the particles aren’t large or dense enough to disrupt the
sensor turns on, it’ll need to NUC frequently until it infrared radiation. This is why they’re often used by firefight-
reaches normal operating temperature. After that, the ers and rescue personnel in low-visibility environments.
NUC cycle will become less frequent. So, it’s a good idea Now that you know some of the advantages, disadvan-
to let your thermal optic run for a couple minutes and tages, and applications of thermal optics, we’ll share our
“warm up” before you use it. real-world impressions with two thermal optic models
> Size & weight. This amalgamation of glass, sensors, from Armasight.
electronics, and batteries isn’t as compact as a traditional
rifle optic. And once you enclose those fragile com- Armasight Contractor Thermal Optics
ponents inside a housing that’s durable enough to be In early 2022, Armasight unveiled a new series of
mounted on a rifle, it can also be quite heavy. weapon-mounted thermals known as the Contractor
> Thermal barriers. Heat, much like light, can be blocked series. These launched with two models, a 3-12x25mm
or reflected by certain materials. Some materials, like and 6-24x50mm. Much like traditional rifle optics, the
layers of clothing, will simply take time to soak up heat, first numbers indicate magnification range — in this case,
appearing cool at first and slowly warming up. Others, es- magnification levels above the base value are digitally
pecially highly reflective materials such as Mylar and glass, magnified, meaning the image becomes less clear (lower
All thermal
will act as an opaque barrier at best or a mirror at worst, resolution) as you zoom in. The millimeter measurement
optics go
reflecting ambient heat back at the viewer. through batter-
denotes the objective lens size; just as a larger objec-
> Environmental conditions. Since thermal optics ies quickly, so it’s tive lens on a rifle scope allows it to gather more light,
display the difference in temperature between a target wise to have a a larger thermal lens allows the sensor to take in more
and its environment, there are some situations where the backup sight of infrared radiation for a clearer picture at longer range.
difference may be so small that the image looks washed- some kind. We
used an Atibal
out. For example, if you’re scanning a 100-degree desert
SLR-1 red dot
landscape for a human’s 98-degree body temperature, it’s on a 45-degree
going to be much more difficult to see than if that human Arisaka Defense
were standing in front of a snowbank. Granted, thermal mount.
optics are sensitive enough to detect minuscule differences
in temperature, but a larger temperature difference will
1A/2A: AND BEAR ARMS,

Both of the initial Contractor models used an Arma- > Video streaming and data transfer via USB or Wi-Fi
CORE 12-micron 320x240 sensor — this is known as the > Bluetooth connectivity with iOS and Android apps
optic’s resolution. We’ll discuss that in more detail later. > Manual or shot-activated video recording and image
capture
Contractor 320 6-24x50mm
We began by testing the higher-magnification Contractor Contractor 640 3-12x50mm
320 thermal sight, which has a 6x base magnification and About a year after the release of the Contractor 320,
an MSRP of $4,399. This optic is built into a rugged, IP67 Armasight unveiled its big brother: the Contractor 640
water- and dust-proof metal housing with large, tactile con- family. These optics use the company’s proprietary Arma-
trols that can be operated easily with gloved hands. Focus CORE 12-micron sensor, but now with 640x480 sensor
and diopter adjustment are both manually controlled via resolution — double that of the 320 series. Three Contrac-
textured rings on the housing, ensuring the user can get a tor 640 models are available, ranging from a compact
crisp image at all times. The 1024x768 AMOLED display is 2.3-9.2x35mm model to a 4.8-19.2x75mm monster. We
colorful and bright, with a responsive 60Hz refresh rate. It's decided to test the Contractor 640 3-12x50mm, which
powered by two CR123 batteries, with an approximate run has the same objective lens size and housing size as the
time of 4 hours at 68 degrees F. Like we said, thermals eat 320 model we’re comparing it to.
batteries quickly, and this is actually a respectable run time The Armasight Contractor 640 3-12x50mm has an
compared to some of its competitors. MSRP of $5,799, which is $1,400 more than the Contrac-
The Contractor also has a sophisticated suite of color tor 320 6-24x50mm. Its features are nearly identical to
palettes, image enhancement modes, and extra features. the 320, with the same display, run time, color palettes,
These include: and so on. Aside from the sensor itself, the most notable
Unlike the
> Five palettes: white hot, black hot, target, rainbow, and quick-detach difference is the mount. Unlike the 320, which features a
sepia mount on the standard Picatinny rail mount, the 640 series comes with
> Detail enhancement/sharpening settings: default, for- 640 models, the a much more convenient Kinetic Development Group
est, detect, indoors, and sky/sea Contractor 320 Sidelok quick-detach mount.
> Eight reticle types with adjustable colors and 1/2 MOA includes a basic So, is the 640 sensor resolution and QD mount worth
Picatinny rail
elevation/windage adjustments the price increase? More importantly, is either optic worth
mount that must
> On-screen compass, level, inclinometer, angle cosine be installed onto thousands of dollars of your hard-earned money? These
indicator, and optional stadiametric rangefinder your rifle with a are questions we aimed to answer, no pun intended.
> Picture-in-picture mode wrench.
The Test Platform: Stag Pursuit 6.5
Creedmoor AR-10
To put these thermal optics through their paces, we
chose a suitable test rifle from Stag Arms. The Stag 10
Pursuit is the company’s first product line designed
specifically for hunting and is available in 16-inch .308 or
18-inch 6.5mm Creedmoor variants. We chose the latter,
since we already had a healthy stockpile of Norma 6.5
ammo from the long-range rifle class we wrote about in
Issue 55.
The Stag 10 Pursuit comes in an elegant Midnight
Bronze Cerakote finish with several upgrades out of the
box: a two-stage Timney trigger, Magpul K2+ increased-
angle grip, ambi 90/45-degree safety selector, ambi
Breach charging handle, and Magpul CTR stock with a
Stag-branded leather cheek pad.
We can rarely leave a rifle unmodified, so we installed a
few accessories. A stable shooting platform is critical for
any long-range or hunting rifle, so we added a Magpul
bipod and an M-LOK to ARCA rail adapter from Ulfhednar.
The former accommodates traditional prone shooting;
HOT ON
THE TRAIL
the latter makes it possible to quickly mount the rifle in
Ulfhednar’s excellent carbon-fiber tripod for rock-solid
shots in a standing or seated position. Walker Defense
Research provided a set of FDE-colored NILE silicon
carbide grip panels, which offer a more secure grip on
the forend, even in wet conditions. Lastly, every serious
rifle needs a backup sighting system — especially when
the primary optic depletes its batteries every 4 hours
— so we attached an Atibal SLR-1 solar red dot on an
Arisaka Defense 45-degree offset optic mount. Although
it’s possible to mount a red dot on the Contractor’s side
accessory rail, that mounting point is better suited to a
laser rangefinder. Plus, this way our backup red dot stays
zeroed even if we remove the thermal.
Ulfhednar also provided a padded, dual-purpose
guncover/shooting mat that allows us to keep our rifle
protected on the way to the range and shoot comfort-
ably from the prone position once we arrive.

In the Field
Before testing each of the Armasight thermal optics,
we needed to zero them — if you’ve never done this
with a thermal before, it’s not as hard as you may think.
Armasight provides a foil-backed zeroing target with each
optic, but the DIY method is to buy a roll of aluminum foil switch on top of the housing turns the optic on and off, A weatherproof
tape at your local hardware store; either way, just attach and a recessed button behind the right knob captures cap protects the
battery com-
the thermally reflective target to some cardboard and set photos (long press) and videos (short press). Thousands
partment and
it at the desired distance. Heat from the sun will cause it of photos or up to 4 hours of video can be saved to the its two CR123
to appear as a light (or dark) spot in the optic’s display. onboard storage. Once you’re back home, you can upload batteries.
Then, open the Contractor’s boresight menu to adjust the them to your computer via a USB-C port that’s hidden
crosshair to match the bullet’s point of impact. under a screw-down cap on the right side of the housing. Another
We used the Contractor 320 and Contractor 640 Although these thermal optics are undeniably bulkier weatherproof
cap covers the
optics in the hot desert at midday, on cool evenings, and than a traditional rifle scope, they’re not much heavier.
USB-C port used
even indoors. Once we dialed in the focus to the appro- Each Contractor optic, including batteries, weighed be- for streaming
priate setting, each produced a crisp image that clearly tween 2 and 3 ounces more than a Leupold Mk8 CQBSS or data transfer
displayed the heat signature of field mice, birds, dogs, 1-8x24mm optic in a Badger Ordnance mount. That’s a from the on-
and humans, as well as inanimate objects like cars — obvi- negligible amount of weight for such a huge difference in board storage.
ously, we removed the optic from our rifle before aiming capabilities.
it at anything we weren’t planning to shoot.
Motion appears smooth and fluid through these optics, A Note About NUC
and although there’s a slight perceptible delay — as with As mentioned earlier, you’ll definitely want to let these
all digital optics — it’s only noticeable if you’re looking for optics warm up before attempting to shoot. After a cold
it. Unlike some lower-end thermal optics or digital night start, the NUC feature kicks in about every 10 seconds,
vision devices, the Contractor didn’t leave us feeling sea- displaying a 5-4-3-2-1 countdown on the screen before
sick and disoriented after tracking moving objects. The freezing momentarily to wipe the sensor. It’s possible to
60Hz AMOLED display does a great job of rendering the shoot during this warm-up cycle, but you need to time
data from the sensor, and it’s easily bright enough to be your shots carefully within those 10-second windows. The
comfortable during the day. NUC can also be delayed by pressing the right control
The controls are also straightforward: the right knob knob during the countdown, but that only delays it for
controls digital zoom, and the left knob controls color one cycle and results in a continued degradation of im-
palettes and enhancement modes. A large locking power age quality. Thankfully, once the Contractor optics have
1A/2A: SHALL NOT

Can you tell


the difference
before and after
shooting? The
rifle’s suppres-
sor and barrel
glow brightly
as they heat up.
(Contractor 320)

Here’s a direct
comparison of
the Contractor
320 (top) versus
the 640 (bot-
tom). Both show
the subject
clearly, but we
preferred the
less fuzzy image
produced by the
A 2-inch-wide 640 as well as
run for about 15 minutes, image quality stabilizes and
strip of foil tape the wider field
NUCs become rare enough that you’ll hardly notice them of view from its
was clearly
anymore. base 3x magnifi-
visible at 50
yards through cation.
the Contractor 320 or 640?
640 at base 3x So, how much of a difference is there between the Con-
magnification. tractor 320 and Contractor 640? Placing them side by side,
After dialing the image difference is obvious. The 640x480 resolution
up to 12x digital
is significantly more detailed, picking up more texture on targets become much less defined at the 2x zoom setting.
zoom, a dark
spot is visible objects and sharper edges. The less expensive 320x240 And when you crank it up to 4x zoom — the equivalent of
where bullets sensor produces an image that still makes it easy to identify 24x total magnification — you’re effectively working with a
impacted the heat signatures — you’d have no problem at all using it to data source that’s only 80x60 pixels. It’s still usable, but it’s
foil. spot the outline of a hog or coyote — but details often ap- not ideal.
pear fuzzy or blotchy. If you’re planning to use digital zoom frequently or spend
Granted, the two optics we tested have different base hours looking through your thermal optic, we’d say the
optical magnification levels (3x and 6x) so it’s difficult to Contractor 640 is well worth the extra cost. It’s easier to
rule out all other variables for a perfect one-to-one com- make out fine detail and has more “zoom headroom” than
parison. We did notice that using the Contractor 640 (3x a lower-res sensor, but maintains the same housing size,
base power) at its 2x digital zoom setting puts it at the weight, and run time as the 320. The quick-detach mount is
same working resolution as the Contractor 320 at base also a valuable upgrade. That said, the Contractor 320 is a
6x magnification. In this way, the 640 sensor has a much solid choice that will easily meet the needs of most hunters.
greater usable range than the 320 — at base magnification, Also, MSRP for the 320 has dropped $400 since its release
it’s incredibly clear, and even when it’s zoomed in to 2x, the in 2022, so there’s a good chance it will continue to become
image is still quite good. With the 320, on the other hand, a more affordable choice in the future.
HOT ON
THE TRAIL
Closing Thoughts
There’s a reason the otherworldly hunter in the clas-
sic movie Predator was shown using advanced ther-
mal vision to find his prey — nothing makes it easier to
Armasight Contractor
stealthily track a warm-blooded target. Every animal
and human hunter understands the importance of
Color Palettes
visual camouflage, and it’s a skill that’s been honed Here’s a quick comparison between
through thousands of years of natural selection. How- the Contractor 640’s color palettes.
ever, very few species are capable of concealing their Notice how black patches on the
heat signature. Even if you stand perfectly still in total dog’s fur appear warmer than light
darkness, you’ll light up like a Christmas tree through patches. This is a result of absorb-
a thermal optic, and you won’t know you’re being ing more heat from the sun. (Don’t
watched until it’s already too late. worry, no dogs were harmed in the
Armasight’s Contractor series offers impressive making of this article.)
capabilities and a wide range of features that’ll make
you feel like a supernatural hunter, spotting every
living thing that crosses your path from 1,000 yards
or more. Whether you choose a 320 or 640 sensor
with high or low base magnification, thermal optics
give you the ability to see what would otherwise be in-
visible — that’s about as close to a superpower as you
can get for a few thousand dollars. Pair one of these
optics with a nice rifle like our Stag 10 Pursuit and a
stable tripod, and your prey won’t know what hit ’em.
Better yet, pair all that with a helmet-mounted night
vision setup like the one we reviewed in Issue 58,
and you’ll be able to stalk your prey in total darkness
before switching to your thermal to take the shot.

SOURCES
Armasight Ulfhednar Atibal
armasight.com ulfhednar.no atibal-optics.com
Stag Arms Walker Defense Research
stagarms.com walkerdr.com

Types of Thermal Optics


Handheld: These Helmet-Mounted: Looking for the Clip-On Weapon Sights: If you have a ri- Stand-Alone Weapon Sights:
include pocket- functionality of a handheld thermal fle that’s primarily set up for daytime use These are dedicated thermal
sized monoculars, optic plus hands-free convenience? but would like to add thermal capabilities optics that can be used without
binoculars, and If so, consider one of these. They for certain occasions, consider a clip-on. a traditional scope. Since there’s
various types of can be used on their own, or on This optic attaches directly in front of no additional glass between your
thermal cameras. a “bridge” alongside a night vision your weapon’s existing optic, showing a eye and the display, they offer
They’re used for monocular. However, unlike analog thermal image behind your rifle’s existing the clearest and brightest image,
general-purpose night vision tubes, most thermal scope reticle. This also allows you to re- plus a wide field of view that’s
applications such optics have a noticeable latency tain your weapon’s zero setting. Be sure less sensitive to the shooter’s
as search and res- effect that some users may find to confirm that the thermal you purchase head position. They’re also usually
cue, tracking, and disorienting or uncomfortable for is compatible with the mount height/po- lighter and more cost-effective
home inspection. prolonged use, especially while sition and base magnification (typically than setups with a clip-on thermal
walking or tracking moving objects. 6x or less) of your daytime optic. and a traditional rifle scope.
070
1A/2A: BE INFRINGED.

Examining More Than a Dozen First Aid and Survival


Uses of a Triangular Bandage
By Joe Alton, MD Photos by Amy Alton

DISCLAIMER
This is a general
overview and not a
comprehensive guide
to treating sprains,
broken bones, or other
injuries. If symptoms
worsen, seek profes-
sional medical advice
as soon as possible.
n survival first aid, the triangular bandage is an im- Standard
portant item that should be part of every medical triangular
bandage
kit. Available as a stand-alone item or improvised
dimensions are
from a bandanna, neckerchief, or shemagh, the 40 by 40 by 56
triangular bandage has proven to be a versatile inches.
and lightweight tool in the off-grid medic’s toolbox. Every
medical kit should have several.
Over the centuries, bandannas — which originated
from a colorful headdress in India called bandhana, from
the Sanskrit word for “bond” — have morphed into an
item which can be seen on the outfits of everything from
Old sheets
scouts to sailors to cowboys. In some cases, kerchiefs work well as
have become part of ceremonial costumes or uniforms. improvised
In practical terms, however, they can serve to wrap a bandages
wide variety of injuries incurred in the backcountry or
other austere settings. The triangular bandage is use-
ful for any situation where immobilization is helpful for
healing or for transport. It can be used to treat sprains,
broken bones, bleeding injuries, and much more.
The bandage can be used in conjunction with a num-
ber of other medical items to achieve stabilization. It can
be improvised into a tourniquet with a stick or used as a
wrapping to pad and immobilize a sprain in tandem with
a splint. By itself, it can serve to help apply pressure to
and pack an open wound.
Today, we’ll demonstrate a number of different ways

Every medical
kit should have
more than
ISSUE 59

one triangular
bandage.
ISSUE 59

01 02 03

Shoulder wrap for the family medic to use a standard-sized triangular padding against the chest, to decrease pain experienced
STEP 1 bandage. by moving the arm.
Drape across The simplest way to make a sling is to lay out the ban-
with the wide Making A Triangular Bandage dage under the injured arm so that one pointy end goes
end over
Commercially produced triangular bandages are cheap over the shoulder, another points to the floor, and the
the affected
shoulder. and can be bought in quantity, but if you have some old third extends beyond the elbow.
cotton sheets, you can easily make your own supply. Bring the lower end of the bandage up over the other
STEP 2
Go in back and Simply use scissors to cut out a 40x40-inch cloth square, shoulder, leaving the arm cradled.
around the then either fold it into a triangle or cut diagonally to make Tie the ends of the bandage behind the neck. Fasten
armpit. two separate triangular bandages. the edge of the bandage by the elbow with a safety pin
STEP 3 Sanitize the bandage by boiling in water, using a pres- or by tying a knot. If needed, add some padding behind
Tie in back. sure cooker, or soaking in a disinfectant solution. This the neck.
will allow you to use it safely in an open wound. Store in For even more support, an additional bandage can be
a fresh plastic bag. It might not be entirely sterile from used around the injured arm and chest horizontally. This
a medical standpoint, but it’ll stay clean. Other, less wrapping is known as a “swathe.”
conventional, options include baking in an oven for two
hours at 300 degrees F or ironing at a high heat for three Ankle Sprain
minutes. One of the most common injuries on the trail is the
ankle sprain. Uneven terrain in the form of rocks and
Arm Injury roots cause an unbalanced traveler to end up with a pain-
The most well-known use for a triangular bandage is ful injury. In this case, elastic wraps are most commonly
Arm sling the classic sling. With arm injuries, a sling will provide used for this injury, but a properly placed triangular ban-
STEP 1 both immobilization and comfort. Securing the arm dage will also work to provide the stabilization needed.
Drape in front against the body reduces the chance of further damage. Fold the bandage until it is 3 to 4 inches wide, then
with the tip of
In a rib injury, this sling is sometimes used, with added place the center on top of the foot and wrap once under
the triangle
toward the
elbow. 01 02 03
STEP 2
Lift the bottom
end over the
shoulder and
tie. Make a knot
at the elbow to
stabilize.
STEP 3
For added
support, wrap a
swathe around
the torso.
01 02 03 Ankle wrap
improvisation
STEP 1
Start on top of
the foot.
STEP 2
Go around the
back of the
ankle.
STEP 3
Slide each end
back under the
ankle strap.
STEP 4
Pull each end
up to stabilize.
STEP 5
Tie the ends in
front.

Head wrap
STEP 1
the foot. Bring each end behind the ankle, cross once, cross around to the front and tie. Tuck loose ends under Wrap around
and move them together in front of the ankle. Cross the the folds of the wrap. the forehead
ends again. If you’re dealing with a burn, you should moisten the with the
Slide each end underneath the vertical straps created bandage to avoid sticking. triangle
covering the
when you moved the wrap from under the foot to the
head.
back of the ankle. Tug on each end to tighten and secure Shoulder Injury
STEP 2
with a knot in front of the ankle. Ordinarily an awkward area to wrap, a triangular ban-
Tie the ends
dage works well to cover an open shoulder wound and together over
Head Injury help stabilize the area. the edge of the
A head wound can be significant in various ways. Fold the top of long end of the triangular bandage triangle.
Superficial cuts on the scalp can bleed profusely and
require bandaging. A concussion can alter mental status 01 02
and even cause loss of consciousness. Bleeding could
also occur inside the skull, putting the victim’s life at risk.
Even vision could be affected in certain injuries.
The family medic can’t control all of these issues, but a
simple head wrap can help control the superficial bleed-
ing that often happens with a traumatic injury. Although
gauze rolls are most commonly used, a triangular ban-
dage can serve the purpose as well.
Starting at the long side of the bandage, fold it over 2
inches and wrap this section around the forehead above
the eyebrows, leaving a triangle covering the scalp.
Cross both ends of the bandage around the back of the
head and over the triangle covering the scalp. Then,
074
ISSUE 59

01 02 Injured hand
wrap
STEP 1
Spread out
the triangular
bandage and
position the
hand.
STEP 2
Bring the tip
of the triangle
down over the
wrist.
03 04 05
STEP 3
Roll the ends
until they reach
the wrist on
each side.
STEP 4
Wrap the end
around the
wrist.
STEP 5
Tie the ends.
down about 4 inches, then flip up the bottom of the tri- gloves aren’t used. In many situations, group members
angle until the tip meets the long side. Drape diagonally will be asked to carry out duties to which they’re not ac-
so one of the pointy ends is below the unaffected armpit customed. The family medic should always be prepared
(axilla) and the other is over the injured shoulder. Then, to prevent and treat injuries relating to the hand; family
wrap around the back of the shoulder, under the affected members who can’t use their hands lose the ability to be
armpit, and around so that the end of the bandage meets an asset in the fight for survival.
the other end. Tie to secure. If the hand injury is a burn, moisten or use some salve
beforehand to keep the bandage from sticking to the
Hand Injury skin. If there’s a chance of re-bleeding, use extra bandag-
Performing activities of daily survival can lead to es to provide a bulky barrier for added pressure.
injuries relating to the hand, especially if protective Spread out the triangular bandage on a table or other

01 02 03 Eye wrap
STEP 1
Cover the
injured eye
with the bottom
of a paper cup.
STEP 2
Cover the
other eye with
padding.
STEP 3
Use the
triangular
bandage to
stabilize the
dressings over
each eye.
flat surface. Place the victim’s back of the hand on the Jaw wrap
01
center area of the bandage. Fold the bandage over the STEP 1
palm so that the point is at the level of the wrist. Roll Start over the
both ends of the bandage down until you reach the wrist chin and pull
each end over
on each side. Cross the rolled ends over the wrist and
the head.
around the back of the hands at least twice. Then, tie.
STEP 2
This covers the hand completely.
Cross the ends
over one ear.
Eye Injury
STEP 3
An eye injury can disorient and disable a person, and a Tie the end
tight wrap could worsen the situation. In chemical emer- over the other
gencies, be sure to irrigate and flush out the affected ear
eye(s) thoroughly before applying a bandage. Using an
improvised or a commercial eye shield, a triangular ban- 02
dage can hold such a barrier in place to prevent further
injury. This is especially useful if a foreign object has
impaled the eye.
With eye injuries, it’s important to realize that both eyes
move in tandem with each other. Therefore, it’s best to
cover both eyes if further eye movement would worsen
the situation.
If you don’t have a commercial eye shield in your kit,
you can improvise a shield with the bottom of a paper
cup. Take a gauze 4x4 pad and cut an opening that fits
the cup tightly enough to keep it stable and add some
padding under the rim for comfort. Place over the injured 03
eye. Use some padding over the other eye as well, and
then use your triangular bandage, folded to about 4
inches wide, to cover both eyes. Go around the head
twice, tie in the back to secure, and tuck the loose ends.

Jaw Injury Stabilizing and


padding splint
A number of circumstances can lead to trauma to the
with triangular
jaw, possibly even a fracture. A triangular bandage can be bandages.

used to immobilize the jaw in place.


Fold the bandage flat lengthwise until it’s 4 inches
wide. Start on the chin and bring ends behind the ears to
the top of the head. Cross the ends and slide the crossed
section just over one ear. Wrap one end behind the head
and the other across the forehead. Tie both ends over
the opposite ear.

Stabilizing A Splint
Splints perform the important task of immobilizing an
injured limb in a natural position. They help prevent re-
injury that can occur as a result of jostling during trans-
076
ISSUE 59

port. Splints facilitate the healing process. To keep them 01 02


in place, triangular bandages can be used as padding or
in the place of elastic wraps. There should be at least two
securing points.

Improvised Tourniquet
A tourniquet is a mandatory item for any medical kit.
In most cases, commercial tourniquets like the C-A-T
have proven their worth in everything from the battle-
ground to the backcountry. A purpose-built tourniquet
will be easier to use and more consistent than any impro-
vised solution. However, when a military-style tourniquet
isn’t available, a triangular bandage can be used as an
Tourniquet
effective way to stop even heavy bleeding. 03
Fold the triangular bandage so it’s flat on the extremity STEP 1
Fold to 2 inches
and at least 2 inches wide. Wrap around the limb tightly,
wide, tightly
but evenly. Tie the two ends in a single knot, then place wrap above the
a rigid object like a stick across and tie another knot. The bleed, then tie
stick serves as a “windlass” device similar to that used in down.
military-style tourniquets. Twist the stick until bleeding STEP 2
stops, then secure it by placing a knot underneath the Place stick or
extremity to maintain pressure. other “windlass”
and tie once
over it.
Other Uses For Triangular Bandages
• As a component of a water filter. The permeable na- STEP 3
Windlass stick
ture of the fabric allows the bandages to filter out algae 04
in place; twist
and debris from questionable water in advance of to provide
disinfecting by boiling, bleach, iodine, water purification pressure.
tabs, or UV light.
STEP 4
• As a face mask. A triangular bandage can be used, Secure
cowboy-style, to protect against dust and other ir- windlass stick
ritants. It doesn’t prevent the passage of microbes, in place by
however. wrapping and
placing a knot.
• To make fire. If your triangular bandage is made of
cotton, it’ll work well as emergency tinder to make fire.
Shred the fabric into a nest of fibers for easier ignition.

• As improvised cordage. Paracord is a lot better, but


About the Author you can cut your triangular bandage into strips to tie
Joe Alton, MD, FACOG, FACS, is a retired Fellow of the American College
together and fasten materials in a pinch.
of Surgeons and a Life Fellow of the American College of OB/GYN. He’s a
• To signal for help. Attach to a long stick and wave like
disaster medical preparedness advocate, outdoor enthusiast, and New York
a flag, or unfold and lay the bandage on the ground
Times/Amazon bestselling author of several award-winning books, includ-
with rocks at the corners to create a directional marker
ing The Survival Medicine Handbook: The Essential Guide For When Help Is
that’s visible to passing aircraft.
NOT On The Way now in its 700-page fourth edition. He’s also the designer
To get the most out of your medical supplies, it’s
of an entire line of quality medical kits for the austere medic at his website
worthwhile to brainstorm different possible uses for each
at doomandbloom.net, which has over 1,400 articles, podcasts, and videos
item. As you expend materials, you’ll find that your impro-
on medical preparedness.
visations may make the difference between success or
failure off the grid.
Atlanta, GA | June 7-9, 2024

Ft. Worth, TX Salt Lake City, UT


Feb 23-24, 2024 October 4-5, 2024

FOR DETAILS ON ALL THREE EVENTS, GO TO


BLADESHOW.COM
CONNECT WITH US AT #BLADESHOW
HANDSON

Transportation
ake a moment to consider a few hypothetical from the epicenter to be spared the worst. Either way, it’s go-
survival scenarios: ing to be a long time before life resembles what it once did.
Scenario 1: It’s 6:10 a.m. The city you live in, All of the scenarios above have something in common,
which happens to be below sea level, is as- other than the fact each occurred uncomfortably early in the
sailed by torrential rain and sustained winds of morning. When disasters strike, the things we most com-
up to 140 mph. Sea surge of nearly 30 feet quickly overwhelms monly rely on disappear, sometimes indefinitely. A reliable
the levies, and entire neighborhoods are swallowed by water. method of transportation is a fairly recent amenity that’s often
Whether you moved to safety beforehand or decided to stay, it’ll overlooked until we reach for it ... and it’s not there. For most,
take at least two more weeks before utilities are fully restored. storing large quantities of gasoline along with a fully kitted-out
Scenario 2: It’s 1:25 a.m. Awoken by the sudden absence of overlanding vehicle is an impractical prep, and even if you do
the electric hum that pervades everyday life, you look around have those things, roads may be clogged with traffic, storm
the darkness confused. Temperatures have dropped over 40 debris, or other obstacles. Thankfully, there are alternatives
degrees below normal for this time of year, and an overtaxed such as the eBike.
energy grid has forced rolling brownouts. Unpredictable
winter weather is on the rise and getting worse. On top of the eBike History Before riding a
life-threatening risk of cold exposure, it’ll be another nine days eBikes have been around a lot longer than most people motorized vehi-
before all roads are fully passable by cars. realize. The first patents for hand-cranked, three-wheeled bikes cle, such as eBike,
it’s important to
Scenario 3: It’s 4:17 a.m. Without warning, normal every- without any pedals were seen in France way back in the 1880s.
wear appropriate
day life is violently upended as a brutal earthquake shatters But due to the financial influence of big players in the oil mar- personal protec-
streets and crumbles buildings in your city, leaving tens of ket, battery-powered bikes remained in obscurity until over 100 tive equipment
and make sure
thousands seriously wounded (or worse) in a matter of min- years later. Frankly, this may have been for the best. Early eBike
the functions of
utes. Maybe you were fortunate enough to be in a building models were obscenely bulky, and lead-acid batteries large the bike are work-
constructed to code, or maybe you were far enough away enough to move an adult were cumbersome behemoths. ing properly.
080
ISSUE 59
HANDSON
Off the trail, the right eBike makes traveling through open pain or a leg injury can still enjoy getting around in the open
wilderness an easy task. air without having to rely on muscle strength. Lightly pedaling,
but letting the electric motor do most of the work, could help
someone who’s out of shape build themselves up without risk-
ing injury or cardiovascular complications.
Aside from these everyday advantages, how do eBikes fare
in an emergency situation or survival scenario? Being able to
move quickly, quietly, and with little effort is a huge advantage
when heading to a bugout location. It attracts less attention
than a vehicle and is much more expedient than traveling on
foot. An eBike fits into tighter spaces, making easily accessible
routes from narrow alleys and pedestrian walkways where a
car or truck would never fit. Some models are capable of off-
road travel, furthering versatility, especially when making the
urban/rural transition. And unlike regular motorcycles, they’re
not reliant on consumable fuel that might be in high demand
or entirely unavailable. To find out if an eBike is truly up to the
worst calamities Mother Nature — or human nature — can
throw our way, I got my hands on one of the most rugged
models out there.

QuietKat Warrior Specs


QuietKat is a company that leads the way for off-road eBikes.
Right out of the box, the Warrior is an impressive specimen.
Weighing in at 70 pounds, 10 of which are the battery, it’s readily
As lithium-ion battery technology hit the market and Sharp turns apparent that it was built to take a beating. It has 26x4.5-inch
should be avoid-
improved the use of handheld electronics, the eBike’s prac- All-Terrain fat tires, an adjustable coil suspension fork, and Tektro
ed when travel-
ticality also received a much-needed boost. Smart batteries ing through deep mechanical disk brakes designed to get off the streets and hit
and decreasing costs of computer components spurred more mud. Turning too the trails. Several different modes allow the user to adjust the
innovative eBike designs. These days, an affordable eBike can quickly causes efficiency of the five-speed motor, and it can easily reach speeds
the tires to brake
travel at ranges up to 200 miles on a single charge. Throw in in the same way over 20 mph, depending on which battery type is selected. The
pedal assist, and an eBike can go as far as the endurance of a hockey player Warrior has a load capacity of 325 pounds, a cargo shelf that
the human who rides it. All this without the expense, weight, or turns sideways can carry up to 100 pounds, and is capable of towing.
on ice to skid to
consumable fossil fuel dependence of cars or trucks powered In addition to all the techno wizardry and performance
a stop.
by gas or diesel. design, a ton of accessories make this brand stand out from
Many people use eBikes to make inner-city commutes
easier and less costly. For someone in a fair-weather climate,
using an eBike eliminates fuel expenses, reduces insurance
premiums, and where gridlock occurs, it drastically cuts down
on commute times. Many newer models are even power-
ful enough to tow small payloads, nudging into the realm of
cargo transportation with the right accessories, such as pull-
behind trailers and cargo racks.
Not everyone is capable of spending all day pedaling around
on trails. This includes the elderly and the physically disabled,
as well as individuals who may have been injured or deprived
of calories in an emergency scenario. With an eBike, the effort
needed to enjoy an excursion is limited only by being able to
maintain balance and battery life. Using an eBike to get around
town eliminates the need to pay for more expensive options
and reduces physical exhaustion. Someone suffering from joint
Going for a ride
on a smoother
trail or road
before taking on
more challeng-
ing terrain is a
great way to test
the brakes and
make sure the
electronic motor
is operating the
way it should.

the crowd, specifically the Comfort, Overlander’s, Angler’s, and I know how to ride a bike, how different can it be? Well let me tell
Hunter’s Kits. These include numerous cargo options, seat you, there’s a dramatic difference. Almost as soon as you begin
enhancements, and even an all-terrain cargo trailer for pulling pedaling, the electric motor kicks in, giving an instant speed
game out of the woods or pulling supplies into it. The model I’m boost. Depending on what setting you pre-programmed, this
using is a combination of the Comfort and Overlander kits and automatic motor engagement will launch you forward without
includes a portable solar-charging station. Eager to push it to much effort. If you’ve ever ridden a dirt bike or motorcycle,
its limits and see what it’s capable of, I fully charged the warrior you know how intertwined balance and momentum can be.
via its conventional 110v AC charging cable and identified a few Seventy pounds might not sound like a lot, but it makes a huge
unique locations to run it through its paces. difference when compared to a traditional 12-speed mountain
bike. Fortunately, the bike-riding fundamentals are largely the
Terrain Performance same, and before long I was zipping down the roads, already
Before I started throwing the eBike into challenging situa- impressed by how much of a boost I could get with the motor.
tions, I wanted to warm up with it on the paved roads near my After familiarizing myself with the mechanics and digital set-
house, and I’m glad I did. If you’re like me, you might be thinking, tings, I was comfortable ramping things up to the next level.

While not as light


and agile as a
non-motorized
mountain bike,
eBikes take
significantly less
effort and can
go many places
ISSUE 59

mountain bikes
cannot.

OFFGRIDWEB.COM 081
ISSUE 59

Embarking off On well-established gravel or paved roads, an eBike feels filled with swamps and bogs. With the ground so saturated, it’s
the beaten path more like a moped than a bike. Pedals are useful and using easy to step up to find mud that’s knee-high or deeper in some
on a bike that can
go where others them will significantly boost your speed and your mileage, but places. In this scenario, fat tires make all the difference in the
can’t is great way you’re not putting much effort into it once the motor engages. world, especially when the air is let out a little. By determining
to discover new On both gravel and pavement, I was able to max out my speed where the mud meets dry land and traversing the mud in a
areas with mini-
in the 25- to 30-mph range. The bike could easily keep up with straight line to that point, I could make it to the other side nine
mal effort.
in-town traffic. Going up inclines is also surprisingly easy. When times out of 10. The deeper the mud, the more speed and mo-
the motor kicks in, minimal effort is required, even on inclines as mentum is needed to get across. Trying to make gradual turns
steep as 20 degrees. typically led to wiping out, so good balance and maintaining
My first offroad location was a remote camping site with root- straight-line momentum is crucial in this situation. Even so, with
ed and rutted trails surrounding a boreal lake. To compensate the combined weight of myself, my gear, and the bike, I was able
for the unpredictable terrain, I loosened the suspension, and to get across large mud patches without worrying too much
soon I was floating over downed tree branches and larger holes. about falling over into the goop.
This was actually surprising to me, since my limited mountain If mud is wet and goopy, the opposite condition has got to be
biking experience told me I would be in for a bumpier ride. I was what people often refer to as “sugar sand.” Maybe you’ve had
pleasantly surprised how easily I could get around, both on the the unfortunate experience of trying to drive your vehicle near a
trails and even through undeveloped forest floor. However, I’ll beach or through sand dunes, only to discover that loose sand
warn that deciding to go off the trail means taking it slow. Being has next to non-existent traction. Well, that’s just the terrain type
loaded down with gear adds a lot of extra weight, and an eBike for the next location. Generally, the 70-pound Warrior does very
the size of the Warrior isn’t as nimble as its non-motorized cous- well over this type of terrain. Like driving through deep mud, the
ins. This makes tipping over easy if a corner is cut too sharply, or best results require letting some air out of the tires. After doing
balance is lost trying to make it over a larger obstacle. so, this bike was zipping down a sandy beach with minimal ef-
This leads me to what I consider one of its more challeng- fort. Balance and momentum were easier to maintain compared
ing tests: deep mud. The land surrounding Lake Superior is to wet mud, and the bike was able to make sharper turns more
easily as well. The only task it couldn’t perform was riding up a The combined
weight of rider
steep dune. Once the bike was moving up the sandy terrain at
and eBike proved
a steep angle, the tire dug into the sand and stalled. Regardless too much to
of whether it was a weight issue or my own skill, if I wanted to make it over
get to the top of the dune, I needed to get off and engage the steep dunes.
Traveling over
motor for assistance as I walked it the rest of the way.
sugar sand was
Shallow water crossings were a breeze and didn’t negative- similar to deep
ly affect the performance. Water at the crossing site I tested mud.
was flowing steadily from an inland river to the lake. The bot-
tom was lined with muddy silt and various sizes of rocks. The
weight of the bike helped keep it upright against the force
of the moving water, and once again those fat tires proved
their worth in this situation with much needed traction. This
wouldn’t be the ideal way to cross water deeper than the tires
The portable
are high, or in areas with a more forceful flow rate, but the solar charger is
Warrior would work great at sites that have been assessed as weather resistant
and folds into a
relatively safe. It was great to see how waterproof the compo-
compact size,
nents of the bike were, and being submerged didn’t cause the making it easier
motor or the battery to malfunction. to store in a pack.

Snow and ice have similar properties to mud and sand, and
the eBike traverses them as such. Going through deep fresh
powder is more challenging than dense snowpack or ice, but
it’ll make it through. Moving in straight lines is more important
in powder and on ice, but a dense snowpack is almost like
moving over asphalt. Traveling fast through cold air requires
additional layers to prevent cold weather injuries, but the added
bulk didn’t get in the way of the pedals or chain. I did notice a
slight decrease in battery longevity in colder weather, but the
rate the battery drained wasn’t alarmingly fast. Recharging
times seemed pretty close in both cold and warmer conditions,
with the solar panels and with the AC adapter. It took about six
hours, give or take, to get the battery from completely drained
back to fully charged.

Observed Pros and Cons


Being much lighter and smaller than a vehicle makes an
eBike a great option for travel and mobility. However, eBikes
are substantially heavier than motorless bicycles, and not ev-
eryone is capable of swinging 40 to 70 pounds around when
needed. Moving 70 pounds of anything can be challenging if
you’re out of shape, or stuck in slippery conditions. That being
said, the bike would be relatively easy to deploy from an apart-
ment, a garage, or from the rack of a vehicle. An eBike doesn’t
emit loud engine noises or exhaust fumes, which attracts
ISSUE 59

less attention and allows the rider to have better situational


awareness. Not having to rely on fossil fuels, and being able to
084
ISSUE 59
HANDSON
Doing a quick
reconnaissance is
important before
attempting to
cross moving
water to avoid
falling over any
underwater
ledges, hitting
any large rocks, or
getting stopped by
underwater logs.

charge with solar panels would be a huge advantage in a situa- Final Thoughts
tion where utilities and gas stations are shut down. Will an eBike be a help or a hindrance? The answer to
Sure, they’re not as large as a sedan, but eBikes instantly almost every survival question is, “It depends.” An eBike in a
stand out to anyone paying attention because they have survival scenario becomes a tool for the user to prolong life
features not seen on their motorless counterparts. A model and the lives of others. Like any other tool, it comes down to
like the QuietKat Warrior looks more bulky and aggressive, personal familiarity and practice using it. Scissors are a hazard
and tends to draw even more eyes. The flip side of this is that in the hands of the careless, but when wielded deftly by a
a bike has a lower profile and less bulk than a car or truck, practiced user, can turn a hedge into a masterful sculpture.
making it a smaller target and increasing agility. Being able to expertly maneuver an eBike over difficult terrain
Mechanical problems could be problematic in an emer- in an emergency is no different.
gency situation. If the motor malfunctions, it’s not as easy to In a situation where cars and trucks are inoperable or incapa-
repair as a motorless bike would be, and finding or ordering ble of being used, eBikes may be the next best thing. A friend
parts may not be an option. We’ve all experienced the effects or family member may need medicine or supplies quickly.
of a disrupted supply chain, and those issues would be exacer- Someone may need to be transported to a medical treatment
bated in a disaster area. Other than keeping the bike main- facility. Or you may need to get out of dodge as quickly and
SOURCES
tained, having a fully charged battery could prove difficult as quietly as possible. Having a bike’s power amplified by a silent QuietKat
well. After the battery runs out of energy, the rider must pedal electric motor could make all the difference in the world. quietkat.com
the extra weight until they’re able to charge it again. Without
working utilities, solar panels, or enough sunlight, long periods
of time could pass between being able to recharge it again.
As far as usefulness in an emergency or survival situation
goes, eBikes capable of off-roading are invaluable. Before run-
ning the Warrior through various terrain, I was skeptical it’d
perform as well as it did. But modern eBikes are more powerful The motor as-
and versatile than ever before, and well worth considering as a sisted pedaling is
transportation or mobility alternative, in addition to other preps. surprisingly effec-
tive, and it makes
Practicing with it, knowing how to repair or maintain it, and
traversing town
having some back up parts could make the eBike a tool that roads practically
can outlast an extended crisis period. Having a reliable method effortless. Even
of grid-down mobility would absolutely help in each of the steep roads are
easily driven with
scenarios we considered in the introduction. an eBike’s motor
helping the rider.
086
ISSUE 59
BAGDROP

Concealed
Carbine Pack
Squeezing Full-Size Firepower here — that may not be the message you want to send when
you’re walking through a hotel lobby, parking lot, or other
Into a Compact Carrier public location. Smaller packs may not fit your rifle or may
By Nate Gerhart look awkward and bulky once they’re loaded with a weapon.
The setup seen here was designed as a happy medium be-
tween these extremes, with priority placed on carrying a fully
oncealing a handgun in a backpack is rela- concealed, multi-role folding carbine.
tively straightforward, since a pistol, holster, Vertx has been a key name in the everyday carry back-
and spare mags can fit in even the smallest pack space for years with its Gamut series. As a happy
packs with ease. However, if you’re looking to owner of several of these bags, the larger Vertx Basecamp
conceal a long-gun, choosing your pack care- seemed like a natural choice for this application. I made sure
fully becomes a much higher priority. Large backpacks can to carefully compare its measurements to those of my car-
hold a rifle easily, but they practically scream there’s a gun in bine in advance, and I wasn’t disappointed when it arrived.
The Carbine Setup
The bag is a snug but functional fit for my 12.5-
inch AR with a LAW Tactical folding stock adapter
and 20-round magazine. This rifle is equipped with
a Nightforce NX8 1-8x optic in a Badger Ordnance
Condition One 1.7-inch-height mount, as well as a
Holosun 509T red dot on the slimming KOENG.CO 12
o’clock mount.
The carbine was built to serve as the most effective gen-
eral-purpose rifle I could fit in the bag, allowing easy access
in a pinch. I wanted to ensure it could be fired immediately
without pausing to unfold the stock or put on ear protection; ing flap. Speaking of that top flap, I appreciate that Vertx
this is accomplished by the addition of a LAW Tactical ARIC includes a Hot-Pull Tab at its leading edge, which can be
bolt carrier and a Thunder Beast Dominus-K suppressor. staged between the two zippers and pulled to quickly open
The base of the AR build is a San Tan Tactical Pillar matching the main compartment. This makes it faster to open without
receiver set and a VLTOR Freedom Handguard with a built-in hunting for zippers that might have otherwise ended up in a
hand stop and ARCA rail section (for quickly mounting on a different place every time.
tripod). It also needed to be day and night capable. To this The generous internal storage allows the effective con- MAKE & MODEL
Vertx
end, it’s equipped with a Modlite PLHv2 light on an Arisaka cealment of not just the carbine but also a Dauntless Manu- Basecamp
mount activated using a UNITY Tactical AXON switch. Utiliz- facturing Hiker Tanto fixed blade with its sheath mounted CAPACITY
30 liters
ing a 12 o’clock mounted red dot also means I can passively to the included TactiGami panel, a fully stocked Ryker Nylon
MSRP
aim the rifle through night vision, if necessary. The 12.5-inch ankle IFAK utilizing the hook of the kit itself to attach to the $280
Criterion barrel is excellently gassed, making suppressed internal loop, and a SureFire Stiletto light stored beside the URL
vertx.com
usage downright pleasant. Equipping the carbine with a PRI Dauntless fixed blade. I also keep a reversible MultiCam/
M84 Gas Buster charging handle also helped reduce gas black A3 Alpha Lochi jacket from Beyond Clothing inside the
blowback to the face. The choice to utilize a 20-round maga- main compartment, offering concealment as well as warmth.
zine wasn’t due to any regional restrictions, but rather to al- Lastly, there’s a GRAYL GeoPress water purifier bottle. In the
low easier access to the carbine through the top of the bag metropolitan center of the desert city where I live, I can fill it
without stripping the entire face open. A 30-round magazine with 24 ounces of clean water from any tap, or purify water
will fit tightly, but it means having to rip the backpack wide scavenged from ponds and drainage ditches in a pinch. The
open, which is less than ideal if you’re in a hurry to access external stretch pockets allow me to carry the GeoPress as
the weapon. well as a 32-ounce bottle on the opposite side.
Eventually, my buildout of the bag will be improved to
Additional Features utilize more TactiGami panels on the interior for better
The Basecamp is feature-rich with a removable laptop spare magazine storage. I also plan to use the external PALS
sleeve on the interior and zippered pouches for storing webbing hidden under the flap on the outside of the pack.
small items. The Dark Earth color was chosen for function I’ve used this outer storage space effectively in the past
as much as aesthetics. It fits the carbine with the custom by mounting specific pouches for sundry items that might
M81 Arid paint job from Pro2Customs and makes it easy require access without exposing the main compartment’s
to conceal in an arid desert environment. To facilitate this contents. Ideas that come to mind are basic toiletries, pen
setup, removing the laptop sleeve was absolutely necessary. and paper, a book, a multi-tool, and, naturally, some snacks.
This pack’s removable laptop sleeve wasn’t present in earlier In my opinion, you’ll be hard-pressed to find a more
versions of the Gamut series, which is another selling point well-rounded and durable backpack at this price point. The
of Vertx’s newer bags. Gamut family has proven to be well-built and reliable over
I prefer keeping things like batteries outside of direct sun the years, and the Basecamp looks to be no different. If
and heat in the desert, so having those small storage op- you’re in the market for a multi-role backpack that offers
tions positioned away from the top of the pack is beneficial. concealment for anything from a subcompact pistol to a
ISSUE 59

I store paper goods or items less susceptible to heat in the carbine, medkit, and spare magazines, you should give this
large, zippered storage pocket on the top of the open- bag a closer look.

OFFGRIDWEB.COM 087
THEFINALWEAPON

Tracking in the Concrete Jungle


By Patrick McCarthy

racking is a skill that’s often applied to ment soon caused us to lose the trail. We moved in a grid
wilderness locations. Hunters use it to pattern, expanding out in every direction from last known
follow wild game, search and rescue boot print locations, but we couldn’t find anything. This is
personnel use it to find lost hikers, and the reality of urban tracking — you won’t always be suc-
law enforcement personnel use it to track cessful, especially when Mother Nature gets in the way.
fugitives. In previous issues, we wrote about tracking and Thankfully, a piece of intel came in from the other team,
counter-tracking lessons learned from Greenside Train- directing us to a multistory parking garage. After surveilling
ing classes in the forests of northern Michigan and the a nearby intersection, we spotted Sevryn entering a restau-
Arizona desert. Although these wilderness-oriented skills rant to meet with a blonde woman. Carefully observing the
are important, more than 85 percent of Americans live in scene through our binoculars, we could see he slid her a
urban or suburban areas. cell phone and paid for his drink with a credit card before
So, how does tracking translate to the concrete jungle? leaving. The method of payment is potentially traceable
This is the question that led Freddy Osuna, former USMC by law enforcement, and it indicates he wasn’t concerned
Scout Sniper and founder of Greenside Training, to develop enough about that fact to pay in cash. We took notes on
During the
his Grayside Hunter course. It began with a refresher on what we saw and cross-checked it with other observers. Grayside
tracking fundamentals in the Sonoran Desert outside Unless you’re a law enforcement officer, you’ll probably Hunter course,
Tucson, Arizona. In the wilderness, your target may leave never need to covertly follow a drug trafficker and his we tracked a
fictitious criminal
behind spoor (tracks) in track traps such as patches of accomplices, but the awareness and observation skills through down-
mud and soft dirt. For urban areas full of hard concrete and derived from this Grayside Hunter tracking exercise are town Tucson,
asphalt, these track traps are less common but more sig- relevant to anyone who lives in a city. While searching for testing our
observational
nificant. For example, a target might cut a corner and leave traces of our fictional bad guy, we noticed signs of real
skills, team co-
a footprint in grass, cross a muddy median, or step into an crime and drug activity in the area — broken glass on the ordination, and
oil patch, indicating their direction of travel. Pay attention to ground from car burglaries, gang tags on bus stops, and awareness.
other disturbances in the natural scenery — just as bird calls scraps of aluminum foil coated in
can alert us to a target in the forest, dogs barking can alert black tar heroin residue. If you live
us to targets in the city. Security camera footage may also in or frequently visit a city, you may
be obtainable through social engineering. never notice these small details, but
On day two of the Grayside Hunter class, we met in paying attention to them can help
downtown Tucson for an urban tracking exercise. All of you discern potential threats and
the students split up into small teams, since working to- danger areas.
gether is especially valuable in the chaotic and challeng- Grayside Hunter was a fun experi-
ing urban environment. We used cell phones and radios ence, and it exposed us to the chal-
to stay in touch and subdivided our teams into A and B lenges of tracking someone through a
units to cover more ground. Our goal was to track a ficti- city. Unlike rural environments, where
tious criminal, alias Sevryn, who was affiliated with a local footprints, matted foliage, and broken
drug trafficking network. We knew this bearded mid-40s twigs are relatively common, urban
male would be meeting with contacts throughout the environments may only offer a single
city, and we learned his first meeting was with a younger piece of spoor every few blocks. This
man in Nike combat boots. One team set off after Sevryn, is why it’s so important to work as a
and the other followed his contact. team, because five sets of eyes are
Although we were able to find a few of the distinctive much better than one. If you’re inter-
Nike boot prints on muddy sidewalks and medians, and ested in trying your hand at urban
some transference of that mud onto a nearby lawn, driz- tracking, check GreensideTraining.
zling rain and the nonstop activity of an urban environ- com for upcoming class dates.
ORDER TODAY
AND YOUR MAGAZINES WILL BE ORDER TODAY
SHIPPED TO YOU IN A #4 LDPE 100%
RECYCLABLE POLYBAG ALONG WITH 4
A PROTECTIVE PRIVACY INSERT TO
KEEP YOUR INVESTMENT SAFE.
SUBSCRIBE NOW: to keep your
WWW.RECOILWEB.COM investment safe.
Curriculum that empowers people
Addressing the skills you need so you
A series by Green Beret (Special Forces Sniper) and Tim Kennedy (former top 5 UFC Middleweight).
Ib i n g e w a t c h i t o n

WWW.RECOIL.TV | DOWNLOAD THE FREE APP TODAY

PRESENTED BY

to protect and preserve human life.


and your families can live without fear.
AVAILABLE ON
090
ISSUE 59
THELASTPAGE
Creating AI For Good
Review of Scary Smart: The Future of Artificial By Patrick Diedrich
Intelligence and How You Can Save Our World

The Premise: Scary Smart by Mo Gawdat isn’t your grim picture of AI’s potential impact. But Gawdat balances BOOK & AUTHOR
Scary Smart:
typical guide to bracing for life’s curveballs. Instead, it the potential for dystopia with an equal amount of how The Future
dives deep into the realm of artificial intelligence (AI) astonishingly well AI can solve some of the world’s most of Artificial
Intelligence
and its potential impact on humanity. Gawdat, a former dire problems. Additionally, Gawdat’s focus on embedding and How You
Google executive, warns us about the rise of AI, which he ethics into AI has been met with skepticism, as defining Can Save Our
World
argues could be both a blessing and a curse. The book “ethics” in a universally acceptable way is a complex task. By Mo Gawdat
serves as a wake-up call, urging us to prepare for a future Much like any tool humanity invents, often the only way
PUBLISHER
where AI could either be our greatest ally or a formidable to stop a bad guy who uses the technology in a nefarious Bluebird
adversary. way is a good guy using the tech to prevent the bad from MSRP
The 411: Gawdat starts the book with a thought exercise. happening. $15

Imagine it’s the year 2050, and you’re sitting around a The Verdict: Scary Smart is a thought-provoking read URL
mogawdat.com
campfire with the author. You’re either living in a dystopia that challenges us to consider the ethical and practical
PAGES
where AI turned against humanity, or a utopia where AI implications of rapidly advancing AI technology. While it 326
ushered in a new age of prosperity. Looking back at the may not be a traditional guide on how to prepare for life’s RATING
current time, what words of wisdom would future you say uncertainties, it offers valuable insights into adapting and THRIVE
to present you? Gawdat does just this, exploring how we thriving in a world increasingly influenced by AI. If you’re
SURVIVE
could reach a worst-case conclusion or a best-case future. someone who’s keen on understanding the broader land-
The book explores the “dual use” of AI. For example, scape of threats and opportunities that lie ahead, this book DIE
when Oppenheimer discovered how to recreate nuclear is definitely worth your time.
fission, he invented a paradigm-shifting technology that
could be used to annihilate civilization or provide it with
an abundance of energy. AI is similar in scope with this
double-edged sword characteristic, and Scary Smart
explores how humanity can prepare and approach AI’s
development in an ethical way. The book emphasizes
that AI has the potential to solve some of the world’s
most pressing issues but also poses risks if not managed
responsibly. Gawdat stresses the importance of program-
ming ethics into AI, which is crucial for ensuring that these
systems act in the best interests of humanity. The book
argues we need to be mentally and emotionally prepared
for a future where AI plays a significant role. This involves
understanding the technology, its limitations, and how to
co-exist with it.
While Scary Smart doesn’t directly address traditional
notions of readiness for unforeseen events, it does offer
a unique perspective on preparing for a future shaped
by AI. It’s about adaptability, mental fortitude, and ethical
considerations — qualities that are essential for any kind of
readiness strategy. The book encourages us to think criti-
cally about the technology we’re creating and how it could
affect us, a vital skill when planning for the unknown.
The book has faced criticism for its somewhat alarm-
ist tone, with some readers arguing it paints an overly
THE NEW

TAKING OUR SOCOM RIS II


LEGACY INTO THE FUTURE

+ FULLY-AMBI CONTROLS
More flexibility and greater control of your rifle
for greater control of the situation at hand.

+ LIGHTER RAIL THAT’S HEAVY DUTY


Same robust design as our RIS II, built for
US Special Operations Command (SOCOM),
with M-LOK attachment for less weight.

+ PATENTED BOLT-UP SYSTEM


6-bolt Bolt-Up System withstands the rigors of hard use,
protecting accuracy while free-floating the barrel.

+ GRIP-N-RIP ® CHARGING HANDLE


Independently ambi charging handle with anti-gas
features for a better shooting experience.

You might also like