Hot On The Trail: Testing Armasight’s Thermal Optics

Humans are apex predators, but you’d never know it by looking at us. In comparison to other predatory species, we’re feeble, slow-moving, and physically defenseless. We don’t have the strength and resilience of a bear, the flesh-ripping claws and teeth of a tiger, or the speed and agility of a hawk. Most importantly, our senses are extremely limited. Our sense of smell pales in comparison to nearly all apex predators, as does our hearing. Even our eyesight, which is quite sharp compared to other mammals, becomes nearly useless in dark conditions. But our true superpower — intelligence — has allowed us to overcome every one of these weaknesses through technological advancements.

In previous articles, we’ve discussed a variety of magnified optics that help us see further, and night vision devices that allow us to see in darkness. Both of these amplify and augment the natural capabilities of our eyes. In this article, we’re looking at a third category of optics that offer the ability to see something our eyes can’t detect at all: heat. Thermal optics give us a view of the world that other predators would surely envy, instantly highlighting the body heat (infrared radiation) of our prey.

Studio photo of an Ulfhednar tripod.

Above: Norwegian precision rifle shooters at Ulfhednar designed the lightweight carbon-fiber tripod we used with our thermal-equipped rifle, as well as a padded rifle bag to protect all our expensive hardware.

Thermal Optic Advantages

The ability to see heat, or the lack thereof, has many valuable applications. It’s an incredibly powerful tool for search-and-rescue operations, whether it’s being used to track a criminal from a police helicopter, locate a missing hiker in the wilderness, or even find a lost pet. Thermal optics aren’t only capable of identifying body heat — they can also be used to determine if a vehicle was driven recently based on the heat of the engine block, or to detect water leaks inside the walls of a home. For these purposes, a handheld thermal camera or monocular may be most convenient (and most cost-effective).

However, for the average end user, hunting is arguably the most rewarding application of thermal devices. The majority of prey animals have developed camouflage to blend into their environments, but that camouflage won’t matter in the slightest when you’re using a weapon-mounted thermal optic. Even if your view is partially obscured by foliage, the telltale body heat shines clearly through, and any movement of that heat signature is immediately visible. It’s so effective that several states have made it illegal to possess thermal optics while hunting (be sure to check your local laws).

Unsurprisingly, this also makes thermal optics a powerful tool for warfare. We’ve seen an increasing number of photos and videos from places like Ukraine that depict the brutal effectiveness of thermal optics on the battlefield. Enemy combatants may be visually concealed and motionless within a treeline — completely invisible to the naked eye or night vision devices — but a thermal optic can make their position crystal clear. While it’s possible to conceal a human body’s thermal signature with Mylar foil, a heat-resistant cloak, or even a wet blanket, it’s much more difficult to do so while moving and/or shooting.

Studio photo of two Armasight thermal optics sitting side by side.

Above: The Contractor 320 (left) and 640 (right) look nearly identical, with the exception of the 640’s KDG Sidelok quick-detach mount.

Types of Thermal Optics

  • Handheld: These include pocket-sized monoculars, binoculars, and various types of thermal cameras. They’re used for general-purpose applications such as search and rescue, tracking, and home inspection. 
  • Helmet-Mounted: Looking for the functionality of a handheld thermal optic plus hands-free convenience? If so, consider one of these. They can be used on their own, or on a “bridge” alongside a night vision monocular. However, unlike analog night vision tubes, most thermal optics have a noticeable latency effect that some users may find disorienting or uncomfortable for prolonged use, especially while walking or tracking moving objects.
  • Clip-On Weapon Sights: If you have a rifle that’s primarily set up for daytime use but would like to add thermal capabilities for certain occasions, consider a clip-on. This optic attaches directly in front of your weapon’s existing optic, showing a thermal image behind your rifle’s existing scope reticle. This also allows you to retain your weapon’s zero setting. Be sure to confirm that the thermal you purchase is compatible with the mount height/position and base magnification (typically 6x or less) of your daytime optic. 
  • Stand-Alone Weapon Sights: These are dedicated thermal optics that can be used without a traditional scope. Since there’s no additional glass between your eye and the display, they offer the clearest and brightest image, plus a wide field of view that’s less sensitive to the shooter’s head position. They’re also usually lighter and more cost-effective than setups with a clip-on thermal and a traditional rifle scope.

Studio photo of the Stag Pursuit buttstock.

Above: The Stag Pursuit includes a Magpul stock with unique leather cheek pad.

Drawbacks & Considerations

All technology comes at a price, both literally and figuratively. Thermal optics are extremely potent tools, but they also have some drawbacks and challenges you should consider:

  • Cost. While basic handheld thermals can be found for less than $1,000, if you want a high-quality weapon-mounted thermal optic, expect to pay at least a few thousand for it. And if you want the latest and greatest high-resolution sensor, expect to spend a lot more — some high-end models exceed $15,000. 
  • Battery life. It takes a lot of energy to run a thermal sensor, the computer that controls it, and the screen that displays its output. Newer thermal optics have become more efficient, but they still go through batteries fast enough that you should always be carrying multiple spares. 
  • Latency. Like any digital camera or display, thermal optics have a slight delay between gathering thermal data from the sensor and rendering it on the screen. High-end models have faster processors and better screens that reduce this delay, but it’s always present, even if it’s only a few milliseconds. 
  • NUC. All thermal sensors need to periodically conduct a Non-Uniformity Correction (NUC, pronounced “nuke”). When a thermal sensor runs continuously, visual noise and imperfections will start to build up within the image; NUCing resets the sensor to a neutral temperature reading, wiping away that noise temporarily. Some thermal optics require the user to manually close the lens cap to NUC, but most use an automatic internal shutter. From the user’s perspective, this appears as an audible click and a sudden freeze of the display.Weapon-mounted thermals typically have a countdown leading up to the NUC, so it doesn’t surprise the shooter and lead to a missed shot. For the first few minutes after the thermal sensor turns on, it’ll need to NUC frequently until it reaches normal operating temperature. After that, the NUC cycle will become less frequent. So, it’s a good idea to let your thermal optic run for a couple minutes and “warm up” before you use it.

     

  • Size & weight. This amalgamation of glass, sensors, electronics, and batteries isn’t as compact as a traditional rifle optic. And once you enclose those fragile components inside a housing that’s durable enough to be mounted on a rifle, it can also be quite heavy. 
  • Thermal barriers. Heat, much like light, can be blocked or reflected by certain materials. Some materials, like layers of clothing, will simply take time to soak up heat, appearing cool at first and slowly warming up. Others, especially highly reflective materials such as Mylar and glass, will act as an opaque barrier at best or a mirror at worst, reflecting ambient heat back at the viewer. 
  • Environmental conditions. Since thermal optics display the difference in temperature between a target and its environment, there are some situations where the difference may be so small that the image looks washed-out. For example, if you’re scanning a 100-degree desert landscape for a human’s 98-degree body temperature, it’s going to be much more difficult to see than if that human were standing in front of a snowbank. Granted, thermal optics are sensitive enough to detect minuscule differences in temperature, but a larger temperature difference will produce a clearer, higher-contrast image.

Studio photo of an armasight thermal optic mounted to a stag arms rifle.

Above: All thermal optics go through batteries quickly, so it’s wise to have a backup sight of some kind. We used an Atibal SLR-1 red dot on a 45-degree Arisaka Defense mount.

Heavy rain and thick fog can also negatively impact thermal optic performance at longer ranges, since the dense water particles in the air absorb and scatter infrared energy before it reaches the sensor. On the other hand, thermal optics can see through some airborne particles that obscure visible light, such as smoke and dust, as long as the particles aren’t large or dense enough to disrupt the infrared radiation. This is why they’re often used by firefighters and rescue personnel in low-visibility environments.

Now that you know some of the advantages, disadvantages, and applications of thermal optics, we’ll share our real-world impressions with two thermal optic models from Armasight.

Armasight Contractor Thermal Optics

In early 2022, Armasight unveiled a new series of weapon-mounted thermals known as the Contractor series. These launched with two models, a 3-12x25mm and 6-24x50mm. Much like traditional rifle optics, the first numbers indicate magnification range — in this case, magnification levels above the base value are digitally magnified, meaning the image becomes less clear (lower resolution) as you zoom in. The millimeter measurement denotes the objective lens size; just as a larger objective lens on a rifle scope allows it to gather more light, a larger thermal lens allows the sensor to take in more infrared radiation for a clearer picture at longer range.

Both of the initial Contractor models used an ArmaCORE 12-micron 320×240 sensor — this is known as the optic’s resolution. We’ll discuss that in more detail later.

Front view of an armasight thermal optic.

Above: Unlike the quick-detach mount on the 640 models, the Contractor 320 includes a basic Picatinny rail mount that must be installed onto your rifle with a wrench.

Contractor 320 6-24x50mm

We began by testing the higher-magnification Contractor 320 thermal sight, which has a 6x base magnification and an MSRP of $4,399. This optic is built into a rugged, IP67 water- and dust-proof metal housing with large, tactile controls that can be operated easily with gloved hands. Focus and diopter adjustment are both manually controlled via textured rings on the housing, ensuring the user can get a crisp image at all times. The 1024×768 AMOLED display is colorful and bright, with a responsive 60Hz refresh rate. It's powered by two CR123 batteries, with an approximate run time of 4 hours at 68 degrees F. Like we said, thermals eat batteries quickly, and this is actually a respectable run time compared to some of its competitors.

The Contractor also has a sophisticated suite of color palettes, image enhancement modes, and extra features. These include:

  • Five palettes: white hot, black hot, target, rainbow, and sepia
  • Detail enhancement/sharpening settings: default, forest, detect, indoors, and sky/sea
  • Eight reticle types with adjustable colors and 1/2 MOA elevation/windage adjustments
  • On-screen compass, level, inclinometer, angle cosine indicator, and optional stadiametric rangefinder
  • Picture-in-picture mode
  • Video streaming and data transfer via USB or Wi-Fi
  • Bluetooth connectivity with iOS and Android apps
  • Manual or shot-activated video recording and image capture

Studio photo of a thermal optic with a usb charging cable plugged in to the side.

Above: A weatherproof cap covers the USB-C port used for streaming or data transfer from the onboard storage.

Contractor 640 3-12x50mm

About a year after the release of the Contractor 320, Armasight unveiled its big brother: the Contractor 640 family. These optics use the company’s proprietary ArmaCORE 12-micron sensor, but now with 640×480 sensor resolution — double that of the 320 series. Three Contractor 640 models are available, ranging from a compact 2.3-9.2x35mm model to a 4.8-19.2x75mm monster. We decided to test the Contractor 640 3-12x50mm, which has the same objective lens size and housing size as the 320 model we’re comparing it to.

The Armasight Contractor 640 3-12x50mm has an MSRP of $5,799, which is $1,400 more than the Contractor 320 6-24x50mm. Its features are nearly identical to the 320, with the same display, run time, color palettes, and so on. Aside from the sensor itself, the most notable difference is the mount. Unlike the 320, which features a standard Picatinny rail mount, the 640 series comes with a much more convenient Kinetic Development Group Sidelok quick-detach mount.

So, is the 640 sensor resolution and QD mount worth the price increase? More importantly, is either optic worth thousands of dollars of your hard-earned money? These are questions we aimed to answer, no pun intended.

Studio photo of an armasight thermal optic with two batteries in the side.

Above: A weatherproof cap protects the battery compartment and its two CR123 batteries.

Armasight Contractor Color Palettes

Here’s a quick comparison between the Contractor 640’s color palettes. Notice how black patches on the dog’s fur appear warmer than light patches. This is a result of absorbing more heat from the sun. (Don’t worry, no dogs were harmed in the making of this article.)

Thermal black hot view of a dog. Thermal rainbow view of a dog. Thermal sepia view of a dog. Thermal target view of a dog. Thermal white hot view of a dog.

The Test Platform: Stag Pursuit 6.5 Creedmoor AR-10

To put these thermal optics through their paces, we chose a suitable test rifle from Stag Arms. The Stag 10 Pursuit is the company’s first product line designed specifically for hunting and is available in 16-inch .308 or 18-inch 6.5mm Creedmoor variants. We chose the latter, since we already had a healthy stockpile of Norma 6.5 ammo from the long-range rifle class we wrote about in Issue 55.

The Stag 10 Pursuit comes in an elegant Midnight Bronze Cerakote finish with several upgrades out of the box: a two-stage Timney trigger, Magpul K2+ increased-angle grip, ambi 90/45-degree safety selector, ambi Breach charging handle, and Magpul CTR stock with a Stag-branded leather cheek pad.

Studio photo of an armasight thermal optic mounted on a stag arms rifle mounted on a tripod.

We can rarely leave a rifle unmodified, so we installed a few accessories. A stable shooting platform is critical for any long-range or hunting rifle, so we added a Magpul bipod and an M-LOK to ARCA rail adapter from Ulfhednar. The former accommodates traditional prone shooting; the latter makes it possible to quickly mount the rifle in Ulfhednar’s excellent carbon-fiber tripod for rock-solid shots in a standing or seated position. Walker Defense Research provided a set of FDE-colored NILE silicon carbide grip panels, which offer a more secure grip on the forend, even in wet conditions.

Lastly, every serious rifle needs a backup sighting system — especially when the primary optic depletes its batteries every 4 hours — so we attached an Atibal SLR-1 solar red dot on an Arisaka Defense 45-degree offset optic mount. Although it’s possible to mount a red dot on the Contractor’s side accessory rail, that mounting point is better suited to a laser rangefinder. Plus, this way our backup red dot stays zeroed even if we remove the thermal.

Ulfhednar also provided a padded, dual-purpose gun cover/shooting mat that allows us to keep our rifle protected on the way to the range and shoot comfortably from the prone position once we arrive.

Zoomed out view of a piece of foil tape on a target as viewed through a thermal optic.

Zoomed in photo of a piece of foil tape on a target as viewed through a thermal optic.

Above: A 2-inch-wide strip of foil tape was clearly visible at 50 yards through the Contractor 640 at base 3x magnification. After dialing up to 12x digital zoom, a dark spot is visible where bullets impacted the foil.

In the Field

Before testing each of the Armasight thermal optics, we needed to zero them — if you’ve never done this with a thermal before, it’s not as hard as you may think. Armasight provides a foil-backed zeroing target with each optic, but the DIY method is to buy a roll of aluminum foil tape at your local hardware store; either way, just attach the thermally reflective target to some cardboard and set it at the desired distance. Heat from the sun will cause it to appear as a light (or dark) spot in the optic’s display. Then, open the Contractor’s boresight menu to adjust the crosshair to match the bullet’s point of impact.

We used the Contractor 320 and Contractor 640 optics in the hot desert at midday, on cool evenings, and even indoors. Once we dialed in the focus to the appropriate setting, each produced a crisp image that clearly displayed the heat signature of field mice, birds, dogs, and humans, as well as inanimate objects like cars — obviously, we removed the optic from our rifle before aiming it at anything we weren’t planning to shoot.

Motion appears smooth and fluid through these optics, and although there’s a slight perceptible delay — as with all digital optics — it’s only noticeable if you’re looking for it. Unlike some lower-end thermal optics or digital night vision devices, the Contractor didn’t leave us feeling seasick and disoriented after tracking moving objects. The 60Hz AMOLED display does a great job of rendering the data from the sensor, and it’s easily bright enough to be comfortable during the day.

The controls are also straightforward: the right knob controls digital zoom, and the left knob controls color palettes and enhancement modes. A large locking power switch on top of the housing turns the optic on and off, and a recessed button behind the right knob captures photos (long press) and videos (short press). Thousands of photos or up to 4 hours of video can be saved to the onboard storage. Once you’re back home, you can upload them to your computer via a USB-C port that’s hidden under a screw-down cap on the right side of the housing.

Although these thermal optics are undeniably bulkier than a traditional rifle scope, they’re not much heavier. Each Contractor optic, including batteries, weighed between 2 and 3 ounces more than a Leupold Mk8 CQBSS 1-8x24mm optic in a Badger Ordnance mount. That’s a negligible amount of weight for such a huge difference in capabilities.

Thermal optic image of a man holding a cold suppressed rifle.

Thermal optic photo of a hot suppressed rifle.

Above: Can you tell the difference before and after shooting? The rifle’s suppressor and barrel glow brightly as they heat up. (Contractor 320)

A Note About NUC

As mentioned earlier, you’ll definitely want to let these optics warm up before attempting to shoot. After a cold start, the NUC feature kicks in about every 10 seconds, displaying a 5-4-3-2-1 countdown on the screen before freezing momentarily to wipe the sensor. It’s possible to shoot during this warm-up cycle, but you need to time your shots carefully within those 10-second windows.

The NUC can also be delayed by pressing the right control knob during the countdown, but that only delays it for one cycle and results in a continued degradation of image quality. Thankfully, once the Contractor optics have run for about 15 minutes, image quality stabilizes and NUCs become rare enough that you’ll hardly notice them anymore.

320 or 640?

So, how much of a difference is there between the Contractor 320 and Contractor 640? Placing them side by side, the image difference is obvious. The 640×480 resolution is significantly more detailed, picking up more texture on objects and sharper edges. The less expensive 320×240 sensor produces an image that still makes it easy to identify heat signatures — you’d have no problem at all using it to spot the outline of a hog or coyote — but details often appear fuzzy or blotchy.

Granted, the two optics we tested have different base optical magnification levels (3x and 6x) so it’s difficult to rule out all other variables for a perfect one-to-one comparison. We did notice that using the Contractor 640 (3x base power) at its 2x digital zoom setting puts it at the same working resolution as the Contractor 320 at base 6x magnification. In this way, the 640 sensor has a much greater usable range than the 320 — at base magnification, it’s incredibly clear, and even when it’s zoomed in to 2x, the image is still quite good.

With the 320, on the other hand, targets become much less defined at the 2x zoom setting. And when you crank it up to 4x zoom — the equivalent of 24x total magnification — you’re effectively working with a data source that’s only 80×60 pixels. It’s still usable, but it’s not ideal.

If you’re planning to use digital zoom frequently or spend hours looking through your thermal optic, we’d say the Contractor 640 is well worth the extra cost. It’s easier to make out fine detail and has more “zoom headroom” than a lower-res sensor, but maintains the same housing size, weight, and run time as the 320. The quick-detach mount is also a valuable upgrade. That said, the Contractor 320 is a solid choice that will easily meet the needs of most hunters. Also, MSRP for the 320 has dropped $400 since its release in 2022, so there’s a good chance it will continue to become a more affordable choice in the future.

View of a man with a rifle through the Contractor 320.

View of a man standing with a rifle through the Contractor 640.

Above: Here’s a direct comparison of the Contractor 320 (top) versus the 640 (bottom). Both show the subject clearly, but we preferred the less fuzzy image produced by the 640 as well as the wider field of view from its base 3x magnification.

Closing Thoughts

There’s a reason the otherworldly hunter in the classic movie Predator was shown using advanced thermal vision to find his prey — nothing makes it easier to stealthily track a warm-blooded target. Every animal and human hunter understands the importance of visual camouflage, and it’s a skill that’s been honed through thousands of years of natural selection. However, very few species are capable of concealing their heat signature. Even if you stand perfectly still in total darkness, you’ll light up like a Christmas tree through a thermal optic, and you won’t know you’re being watched until it’s already too late.

Armasight’s Contractor series offers impressive capabilities and a wide range of features that’ll make you feel like a supernatural hunter, spotting every living thing that crosses your path from 1,000 yards or more. Whether you choose a 320 or 640 sensor with high or low base magnification, thermal optics give you the ability to see what would otherwise be invisible — that’s about as close to a superpower as you can get for a few thousand dollars.

Pair one of these optics with a nice rifle like our Stag 10 Pursuit and a stable tripod, and your prey won’t know what hit ’em. Better yet, pair all that with a helmet-mounted night vision setup like the one we reviewed in Issue 58, and you’ll be able to stalk your prey in total darkness before switching to your thermal to take the shot.

Sources

Read More

Subscribe to Recoil Offgrid's free newsletter for more content like this.

Editor's Note: This article has been modified for the web.


Readers’ Survival Tip: Bamboo Water Fountain

In the ever-evolving world of survival and preparedness, the wisdom of experience often provides the most valuable insights. For this reason, we've tapped into our community of avid readers as a resource for survival knowledge, and are sharing tips that stand out for their simplicity and effectiveness.  This Readers' Survival Tip comes all the way from Southeast Asia, and is a great reminder of how many resources are out there during emergency situations.

Readers Bio

  • Name/Alias: Thaiger_Wa
  • Location: Thailand
  • Age: 53

Thaiger_Wa's Survival Tip

When you are lost in the jungle in a tropical area, finding a place to shelter is a priority. But more importantly, water. If you can't find an open water source, a plant that can help you is the bamboo tree. Bamboo trees are very useful. It can give water from its joints. Its shoots can be cooked and eaten. Its stem can be made into many useful things such as weapons, traps, shelter, and fuel. Moreover, that the worms that live in the joints of bamboo plants are a good source of protein. Do some research on the internet and you will find much more on how bamboo keeps you alive!

 

Submit Your Survival Tip

Want to see your own  survival tip featured in our publications? Simply fill out the form here: Share Your Survival Tips

We are looking for your best tips, tactics and techniques to share with our audience! You do not need to be a survival expert to share with us, simply share any tip you find handy, useful or interesting.

Read More

Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.


Concealed Carbine Pack: Full-Sized Firepower In a Compact Carrier

Concealing a handgun in a backpack is relatively straightforward, since a pistol, holster, and spare mags can fit in even the smallest packs with ease. However, if you’re looking for a way to carry a concealed carbine, choosing your pack carefully becomes a much higher priority. Large backpacks can hold a rifle easily, but they practically scream there’s a gun in here — that may not be the message you want to send when you’re walking through a hotel lobby, parking lot, or other public location.

Smaller packs may not fit your rifle or may look awkward and bulky once they’re loaded with a weapon. The setup seen here was designed as a happy medium between these extremes, with priority placed on carrying a fully concealed, multi-role folding carbine.

Studio photo of a carbine in a bugout bag.

Vertx has been a key name in the everyday carry backpack space for years with its Gamut series. As a happy owner of several of these bags, the larger Vertx Basecamp seemed like a natural choice for this application. I made sure to carefully compare its measurements to those of my carbine in advance, and I wasn’t disappointed when it arrived.

The Carbine Setup

The bag is a snug but functional fit for my 12.5-inch AR with a LAW Tactical folding stock adapter and 20-round magazine. This rifle is equipped with a Nightforce NX8 1-8x optic in a Badger Ordnance Condition One 1.7-inch-height mount, as well as a Holosun 509T red dot on the slimming KOENG.CO 12 o’clock mount.

The carbine was built to serve as the most effective general-purpose rifle I could fit in the bag, allowing easy access in a pinch. I wanted to ensure it could be fired immediately without pausing to unfold the stock or put on ear protection; this is accomplished by the addition of a LAW Tactical ARIC bolt carrier and a Thunder Beast Dominus-K suppressor. The base of the AR build is a San Tan Tactical Pillar matching receiver set and a VLTOR Freedom Handguard with a built-in hand stop and ARCA rail section (for quickly mounting on a tripod). It also needed to be day and night capable.

Studio photo of a carbine set up.

To this end, it’s equipped with a Modlite PLHv2 light on an Arisaka mount activated using a UNITY Tactical AXON switch. Utilizing a 12 o’clock mounted red dot also means I can passively aim the rifle through night vision, if necessary. The 12.5-inch Criterion barrel is excellently gassed, making suppressed usage downright pleasant. Equipping the carbine with a PRI M84 Gas Buster charging handle also helped reduce gas blowback to the face.

The choice to utilize a 20-round magazine wasn’t due to any regional restrictions, but rather to allow easier access to the carbine through the top of the bag without stripping the entire face open. A 30-round magazine will fit tightly, but it means having to rip the backpack wide open, which is less than ideal if you’re in a hurry to access the weapon.

Additional Features

The Basecamp is feature-rich with a removable laptop sleeve on the interior and zippered pouches for storing small items. The Dark Earth color was chosen for function as much as aesthetics. It fits the carbine with the custom M81 Arid paint job from Pro2Customs and makes it easy to conceal in an arid desert environment. To facilitate this setup, removing the laptop sleeve was absolutely necessary. This pack’s removable laptop sleeve wasn’t present in earlier versions of the Gamut series, which is another selling point of Vertx’s newer bags.

I prefer keeping things like batteries outside of direct sun and heat in the desert, so having those small storage options positioned away from the top of the pack is beneficial. I store paper goods or items less susceptible to heat in the large, zippered storage pocket on the top of the opening flap. Speaking of that top flap, I appreciate that Vertx includes a Hot-Pull Tab at its leading edge, which can be staged between the two zippers and pulled to quickly open the main compartment. This makes it faster to open without hunting for zippers that might have otherwise ended up in a different place every time.

The generous internal storage allows the effective concealment of not just the carbine but also a Dauntless Manufacturing Hiker Tanto fixed blade with its sheath mounted to the included TactiGami panel, a fully stocked Ryker Nylon ankle IFAK utilizing the hook of the kit itself to attach to the internal loop, and a SureFire Stiletto light stored beside the Dauntless fixed blade. I also keep a reversible MultiCam/black A3 Alpha Lochi jacket from Beyond Clothing inside the main compartment, offering concealment as well as warmth.

Photo of the outside top of the Basecamp bugout bag.

Lastly, there’s a GRAYL GeoPress water purifier bottle. In the metropolitan center of the desert city where I live, I can fill it with 24 ounces of clean water from any tap, or purify water scavenged from ponds and drainage ditches in a pinch. The external stretch pockets allow me to carry the GeoPress as well as a 32-ounce bottle on the opposite side.

Eventually, my buildout of the bag will be improved to utilize more TactiGami panels on the interior for better spare magazine storage. I also plan to use the external PALS webbing hidden under the flap on the outside of the pack. I’ve used this outer storage space effectively in the past by mounting specific pouches for sundry items that might require access without exposing the main compartment’s contents. Ideas that come to mind are basic toiletries, pen and paper, a book, a multi-tool, and, naturally, some snacks.

In my opinion, you’ll be hard-pressed to find a more well-rounded and durable backpack at this price point. The Gamut family has proven to be well-built and reliable over the years, and the Basecamp looks to be no different. If you’re in the market for a multi-role backpack that offers concealment for anything from a subcompact pistol to a carbine, medkit, and spare magazines, you should give this bag a closer look.

Vertx Basecamp Pack Info

  • Make and Model: Vertx – Basecamp
  • Capacity: 30 Liters
  • MSRP: $280
  • URL: vertx.com

Read More

Subscribe to Recoil Offgrid's free newsletter for more content like this.

Editor's Note: The original contents of this article have been modified for the web.

 


Book Review: Scary Smart by Mo Gawdat

Scary Smart Premise

Scary Smart by Mo Gawdat isn’t your typical guide to bracing for life’s curveballs. Instead, it dives deep into the realm of artificial intelligence (AI) and its potential impact on humanity. Gawdat, a former Google executive, warns us about the rise of AI, which he argues could be both a blessing and a curse. The book serves as a wake-up call, urging us to prepare for a future where AI could either be our greatest ally or a formidable adversary. 

The 411

Gawdat starts the book with a thought exercise. Imagine it’s the year 2050, and you’re sitting around a campfire with the author. You’re either living in a dystopia where AI turned against humanity, or a utopia where AI ushered in a new age of prosperity. Looking back at the current time, what words of wisdom would future you say to present you? Gawdat does just this, exploring how we could reach a worst-case conclusion or a best-case future.

The book explores the “dual use” of AI. For example, when Oppenheimer discovered how to recreate nuclear fission, he invented a paradigm-shifting technology that could be used to annihilate civilization or provide it with an abundance of energy. AI is similar in scope with this double-edged sword characteristic, and Scary Smart explores how humanity can prepare and approach AI’s development in an ethical way. The book emphasizes that AI has the potential to solve some of the world’s most pressing issues but also poses risks if not managed responsibly. Gawdat stresses the importance of programming ethics into AI, which is crucial for ensuring that these systems act in the best interests of humanity. The book argues we need to be mentally and emotionally prepared for a future where AI plays a significant role. This involves understanding the technology, its limitations, and how to co-exist with it.

While Scary Smart doesn’t directly address traditional notions of readiness for unforeseen events, it does offer a unique perspective on preparing for a future shaped by AI. It’s about adaptability, mental fortitude, and ethical considerations — qualities that are essential for any kind of readiness strategy. The book encourages us to think critically about the technology we’re creating and how it could affect us, a vital skill when planning for the unknown.

The book has faced criticism for its somewhat alarmist tone, with some readers arguing it paints an overly grim picture of AI’s potential impact. But Gawdat balances the potential for dystopia with an equal amount of how astonishingly well AI can solve some of the world’s most dire problems. Additionally, Gawdat’s focus on embedding ethics into AI has been met with skepticism, as defining “ethics” in a universally acceptable way is a complex task. Much like any tool humanity invents, often the only way to stop a bad guy who uses the technology in a nefarious way is a good guy using the tech to prevent the bad from happening.

The Verdict

Scary Smart is a thought-provoking read that challenges us to consider the ethical and practical implications of rapidly advancing AI technology. While it may not be a traditional guide on how to prepare for life’s uncertainties, it offers valuable insights into adapting and thriving in a world increasingly influenced by AI. If you’re someone who’s keen on understanding the broader landscape of threats and opportunities that lie ahead, this book is definitely worth your time.

About the Book

  • Book & Author
    Scary Smart: The future of Artificial Intelligence and How You Can Save Our World
    By Mo Gawdat
  • Publisher: Bluebird
  • MSRP: $15
  • URL: mogawdat.com
  • Pages: 326
  • Rating: Thrive | Survive | Die

Read More

Subscribe to Recoil Offgrid's free newsletter for more content like this.


Exploring Simpleshot’s Slingshots: Review and Class Experience

When you think of a slingshot, what comes to mind? Maybe a nostalgic memory of childhood shenanigans comes to mind, or perhaps you envision a TV character like Bart Simpson or Dennis the Menace. You might be surprised to learn that slingshot technology has not only kept pace with modern advancements, they are an effective tool for hunting, recreation, and even defense. Enter into the world of Simpleshot, a name that's ubiquitous in the slingshot community. We'll take a look at several of their products, including the Scout X, Hammer XT, Torque, and Axiom X slingshots. Plus, I'll share my firsthand experience from a slingshot class held at the Georgia Bushcraft event.

Simpleshot Slingshots: An Overview

Simpleshot is not just another slingshot brand. They've carved a niche for themselves with innovative designs and a focus on quality. But how do these slingshots really stack up? Let's break it down by looking at a few of their models.

  • The Scout X Slingshot The Scout X is a versatile beast. It's designed for both beginners and pros, offering an ergonomic handle and a sturdy frame. What makes it stand out is its simplicity and adaptability. You can switch bands easily, and it's suitable for various shooting styles. However, it's not just about comfort; the accuracy this slingshot offers is impressive.

Studio photo of the Simpleshot Scout X slingshot.

 

  • The Hammer XT Slingshot The Hammer XT is a powerhouse. It's built for heavy-duty use, and you can feel it. Its weight and construction make it a great choice for hunting or long-range shooting. The wrist brace adds stability, which is crucial for powerful shots. The forks can also be swapped out for an archery biscuit to shoot arrows.

Studio photo of the Simpleshot Hammer slingshot.

  • The Torque Slingshot The Torque is a compact wonder. Its unique, angular design is not just for looks – it aids in grip and alignment. It's incredibly lightweight, making it a great travel companion. However, its small size might be a challenge for those with larger hands.

Studio photo of the Simpleshot Torque slingshot.

  • The Axiom X Slingshot Lastly, the Axiom X is a well-rounded option. It's designed for comfort and accuracy, with a frame that accommodates various grips. It's a solid choice for both recreational shooting and more serious endeavors.

Studio photo of the Simpleshot Axiom X Slingshot.

Slingshot Accessories

When it comes to accessorizing your slingshot, Simpleshot has an array of options. For starters, their Clay Shooting Flat Bands are tailor-made for clay ammo enthusiasts, ensuring precision and durability​​. If you're aiming to improve your accuracy, the Bell Target is a fantastic choice with its high-visibility and ultra-durable design​​.

Simpleshot offers many ways to customize your slingshot rig. Their Scout LT Scales come in a 5-pack bundle, allowing you to personalize your slingshot's handle to your liking​​. And for those who love a bit of target practice, the Self-Resetting Knockdown Target and its accompanying replacement discs are a good option. These targets are not just fun but also aid in skill improvement​​​​. For the more competitive shooters, the Competition Training 5-Pack of Self-Resetting Knockdown Targets is designed to simulate a real-world shooting experience, perfect for upping your game​​. And for those late-night practice sessions, the Glow-In-The-Dark Golf Ball Target is a useful accessory​​. Simpleshot also caters to the digital age with their Foundations Online Course, a great resource for mastering slingshot techniques​​.

Finally, the brand offers various handle weights, scales, and clips specifically designed for their Scout X model, enhancing the overall shooting experience with added stability and grip customization​​​​​​. Plus, the quick-release keychains and hex screws are handy tools for making quick adjustments on the go​​​​​​.

Slingshot Fundamentals

At Georgia Bushcraft‘s Fall Gathering event, I had the opportunity to learn slingshot fundamentals from the Simpleshot experts themselves. The class focused on four key areas:

  1. Finding Your Dominant Eye: This is crucial for accuracy. The instructors helped students identify their dominant eye, which is essential for proper aiming.

Slingshot students learn how to find their dominant eye.

  1. Proper Grip Techniques: A correct grip is the foundation of a good shot. We learned the proper grip for the slingshot shooting style. Rather than holding on to the handle exclusively, the grip also included the forks of the slingshot to prevent it from leaning backwards when pulling back on the band.

Student takes aim with a Simpleshot slingshot.

  1. Preventing Band Twists: Twisted bands can affect accuracy and the lifespan of the bands. The instructors showed us how to attach and maintain the bands properly.

Simpleshot student ensures the bands aren't twisted.

  1. Archery Elbow Technique: Just like in archery, the elbow technique in slingshot shooting is vital for stability and precision. We practiced this to improve our shooting form.

Slingshot shooter takes aim with proper technique.

The class included people of all ages and backgrounds participating, proving that slingshots continue to stand the test of time. It was a fantastic experience that not only improved my skills but also deepened my appreciation for the sport.

Final Thoughts

Simpleshot is leading a renaissance in the slingshot world. Their range of products caters to a wide spectrum of users, from beginners to experts. Each model has its unique strengths, and there's something for every preference.

Read More

Subscribe to Recoil Offgrid's free newsletter for more content like this.


What If: You’re Targeted By A Deepfake Cyberattack?

Don’t believe everything you see on the internet. This is one of the fundamental rules of using the worldwide web, and it dates back to the earliest days of dial-up. In the ’90s, chain emails spread hoaxes like wildfire, but those of us who weren’t entirely gullible knew to question anything we received with “FW: FW: FW:” in the subject line. The rise of chat rooms and social media made it even easier to spread misinformation to thousands of strangers.

Around the same time, photo editing software was becoming vastly more powerful and accessible, so we began to see the spread of Photoshopped hoax images across the internet. Much like chain letters had morphed into chain emails, this type of hoax was nothing new, but the advancement of tech made it far easier to create and disseminate. Photo manipulation techniques that used to require hours of labor in a photographer’s darkroom could now be accomplished in seconds.

Today, misinformation has reached another new frontier: artificial intelligence. Publicly accessible AI tools are being used to automate the creation of so-called deepfakes, a term based on the “deep learning” neural network technology that’s harnessed to create them. Now, instead of manually blending images together in Photoshop, we can let AI do the hard work for us. And it’s not only useful for still images — deepfake technology can also process each frame of a video to swap a subject’s face (for example: youtu.be/CDMVaQOvtxU). AI can also be used to closely mimic a human voice based on audio samples and read back any text the user inputs (youtu.be/ddqosIpR2Mk).

Deepfakes aren’t just a hypothetical threat — they’re already being used to manipulate, confuse, or outright deceive viewers. In 2020, the parents of Joaquin Oliver, a 17-year-old who died during the Parkland school shooting, used deepfake technology to recreate their dead son’s likeness and create a video where he urged young Americans to vote for more aggressive gun control. More recently, deepfakes of both Ukrainian President Zelensky and Russian President Putin appeared in an attempt to encourage the opposing side’s troops to surrender or retreat; the latter clip was aired on Russian TV in what the Kremlin decried as a “hack.”

Cybercriminals are also using deepfake technology to persuade unsuspecting businesses and individuals to transfer money or give up sensitive info. And in the most twisted cases, AI is being used to generate deepfake pornography of people — even children — who are totally unaware of the disturbing and humiliating way their likenesses are being altered. A 2022 report by the U.S. Department of Homeland Security stated, “Non-consensual pornography emerged as the catalyst for proliferating deepfake content, and still represents a majority of AI-enabled synthetic content in the wild … The ramifications of deepfake pornography have only begun to be seen.”

It’s becoming increasingly difficult to distinguish real photos, video, and audio from deepfakes. What would you do if you suspected you may be the target of a manipulative deepfake attack by cybercriminals? How can you verify information you receive before falling prey to these high-tech social engineering tactics? We asked cybersecurity professional W. Dean Freeman and international risk management expert David Roy to weigh in on this complex attack.

The Scenario

Situation Type

Targeted by cybercriminals

Your Crew

Yourself

Location

Seattle, Washington

Season

Winter

Weather

Cloudy; high 47 degrees F, low 38 degrees F

The Setup

You’re the head IT guy at a family owned business near Seattle. Most of the time, your job duties consist of basic tech support and PC troubleshooting for the company’s 23 employees. Your employer deals with various vendors overseas, so you’re used to getting messages at odd hours with not-so-good English. Aside from a few obvious Nigerian prince scam emails and run-of-the-mill malware, the company hasn’t experienced any substantial cybersecurity threats in the past, but you’ve always tried to maintain good security protocols regardless.

The Complication

On a Tuesday afternoon, you get a panicked phone call from Susan, the owner of the company. She says her brother Dan, who is currently on a business trip to visit suppliers throughout Eastern Europe, sent her a video message a few minutes ago. In the video, he explained that one of the company’s key suppliers is owed a substantial amount of money and is demanding immediate payment. Supposedly, if they don’t receive the payment within the next few hours, they’ll switch to an exclusive partnership with your biggest competitor. Susan knows this would be catastrophic and might even cause the company to go out of business.

She tells you she immediately tried to call Dan back and called the supplier, but neither one is picking up — cell phone coverage isn’t the best in that country, and it’s outside normal business hours. She’s considering sending money to the indicated account, since she’s absolutely certain that the person in the video was her brother. It sounded and looked just like him, and he appeared to have knowledge about the business and its suppliers.

However, she wants to know if you have any ways to verify the video first. What methods or tools can you use to check the legitimacy of the video message and its sender? If you determine it’s a deepfake, what other steps should you take to protect the business (and its owners) from similar cyberattacks in the future?

Cybersecurity Professional W. Dean Freeman’s Approach

Alright, so I’m either facing the impending financial destruction of my employer, or an extremely sophisticated threat actor, and I need to figure out which one it is fast. Two out of the three outcomes here have me looking for a new job soon if I don’t stay on top of this. Luckily, I’m pretty good at what I do, if I do say so myself, and I’ve seen similar threats before. Just because there might be a new technology at play here doesn’t really change most of the fundamentals.

First, let’s think through the possible situations:

  1. This is a legitimate, albeit unusual and concerning request.
  2. The video is illegitimate, created via a generative AI tool to produce a “deepfake.”
  3. The video is genuine, but Dan’s under duress and this is a whole different type of crime (extortion and possibly kidnapping).

Each of these potential situations is going to have its own set of tells and its own incident response playbook, as well as some specific countermeasures. They also share some preparatory mitigations in common.

Preparation

So, whenever employees, especially key staff or executives travel, the risk of data breaches resulting in intellectual property theft go way up, and depending on the region of travel and the industry you’re in, the threat varies. Knowing this, I’ve coached Dan and others on the following:

  • Never leave electronic devices unattended, not even in hotel rooms.
  • When crossing borders, always bring clean devices. Don’t take confidential company information through customs checkpoints.
  • Always use the company VPN when traveling, and make sure to use the full tunnel profile, not split tunnels. When traveling, there’s no such thing as trusted network access, even at a customer site.
  • Be aware of anyone you meet in hotels, bars, etc. who seems particularly interested in what you do for a living.
  • Make sure you have the highest privacy settings on personal social media accounts, and be careful what you post, especially regarding the company.

To varying degrees, I’ve also tried to lock down services such as email, such that users either have to be on the local network or VPN to send and receive their company email, and am leveraging defense in depth techniques, using proven technologies, for endpoint and network security, as well as access to cloud-based applications. While nothing is foolproof, the cost of attacking the network is much higher than it used to be when I first started at this job.

I’ve also prepared myself to identify and counter new and emerging threats, through self-study and formal classes. I stay on top of the state of the art in my craft so that I continue to be an asset, but also understand that it’s an arms race, and the momentum is generally with the attackers.

AI generated image of a woman at a coffee shop.

About: Nothing about this image is real. It was created using the free AI image generation tool PlaygroundAI.com in less than 30 seconds. The site also allows users to upload images to give the AI “inspiration.”

On-Site

Now that I’m on the phone with Susan, we have a potential catastrophe, and one where there isn’t necessarily a specific playbook yet. Luckily, it’s a small company with little red tape, but given the circumstances, it could have proved disastrous if she hadn’t called me and had just sent the money. It’s time to think fast, but think thoroughly.

To make sure I have my bases covered, I’m going to run through three parallel investigations: financial, traditional incident response, and also look specifically at the video to see if I can tell whether it’s genuine.

The financial investigation will go as follows:

  • Give the video a quick once-over and write down the account information.
  • Do a cursory lookup of the routing information to see where the bank is located and whether that provides any obvious red flags.
  • Check with the head of finance to see if she knows whether this is a bank (or even better, an account) that we’ve used associated with that partner before.

If the request is to a financial entity that’s known to us and the account is associated with the client, then that dramatically lowers the risk. It still doesn’t mean that the request is 100 percent genuine though.

The traditional forensic investigation will focus both on the email itself, specifically checking the header information to see where it truly originated from, as well as correlating that activity with logs from the company mail server and VPN. If it looks like Dan actually sent the email from his laptop, through the company server, then again, this reduces the chance that it’s false. If it comes from his personal email, that’d get my hackles up. If the mail headers are clearly forged, then we have multiple potential issues, and a deepfake is certainly a possibility.

So, the bank is in the same general region as the client but isn’t a bank that we’ve done business through before. We can’t know who the account belongs to at this time, so that’s a dead end but definitely suspicious. The email didn’t come through Dan’s corporate account, but did come from his personal Gmail account. The email was sent through Gmail. Dan’s apparently used his Gmail account to send a few messages to Susan recently, so she wouldn’t have thought that was unusual. At this point, I go ahead and disable Dan’s corporate accounts and make sure that he doesn’t have any access to company data.

Given these facts, it’s going to be important to review the video. The two major possibilities at this point are the video being a deepfake, or it being a genuine video and made under duress. The fact that Susan is Dan’s sister and is convinced the video is of Dan means it very well may well be a duress situation.

I have Susan pull a bunch of photos of Dan from social media and her cell phone and send them to me so I can bring them up on one monitor, while watching the video on another. Reviewing the video critically, I look for the following telltale signs that the video is a deepfake:

  • An overly shiny, waxy complexion to the skin.
  • Audio is out of sync with the movements of the mouth.
  • No blinking.
  • Eyes not moving in sync with each other (cross eyed, etc.).
  • Differences in the body, particularly the ears and limbs.
  • Any changes in speech patterns from what I and Susan know of Dan.

While lighting and other technical factors could produce the appearance of waxy skin or out-of-sync audio in a genuine video, the biometric factors are going to be the major giveaway. This is because of how deepfake videos are generally produced.

Feeding the generative AI with still images to produce the likeness tends to result in deepfake videos where the eyes don’t blink at all, which is generally unnatural for people. Additionally, the computer has a hard time lining up both eyes toward the same focal point when trying to adjust for movement, so if Dan appears cross-eyed in the video but is known not to be in real life, that’d be a good indicator as well.

Most deepfakes are made by applying an extruded face image onto a live actor. Often, the angles are hard to make for the computer and the human driving the production, so the AI won’t overlay on top of the ears, hands, etc. Because of this, I pay very close attention to any differences in Dan’s ears in the video from what I can see in the known photos of him I have available.

Because Dan often represents the company in public events, there’s ample opportunity for fraudsters to collect voice samples to synthesize is voice, but since any potential attackers are likely neither native English speakers, nor are they American from our region, there very well may be differences in speech cadence, grammar, and word selection that indicate that the voice is “reading” a script and isn’t actually Dan talking.

After identifying the potential indicators, I also review the video metadata to see if I can gain any insight into when and where it was recorded and on what device. Any mismatch between where Dan is and what type of phone he has will confirm that the video is fake.

Audio studio digital voice recording voiceover sound wave on computer screen.

About: Using voice samples collected from social media and other public sources, AI can recreate any human voice and use it to read a given script.

Crisis

We have enough evidence at this point to know the request is fake, and that Dan’s personal Gmail has been compromised. I’ve already disabled Dan’s account but will need to make a more thorough DFIR (Data Forensics and Incident Response) investigation into the network to see if any corporate data may have been compromised.

I convince Susan not to make the payment, but she’s still very shaken up. We’re almost certain the video is fake due to biometric mismatches that she didn’t catch at first — watching on her phone in a panic — which means he’s probably not kidnapped, but he’s still out of pocket and his status is unknown. Due to tensions in the region, we’re still worried.

At this point, we have multiple priorities, one being getting ahold of Dan. I have Susan call the U.S. Embassy in the country where Dan is and report that he may be the victim of a crime and ask to be put in touch with the relevant authorities. Additionally, we’ll still continue to try contacting Dan directly, and through the hotel, as well as any business associates at the vendor.

To help tie up loose ends on the cyber side, I’d likely reach out to industry contacts at relevant companies, as well as contacts made through the FBI’s InfraGard program. I may still have to fill out the paperwork, but friends and associates can help get the answer faster.

Final Thoughts

Deepfakes are a major issue, particularly as an information warfare weapon, and have societal level impact. As a tool for cybercrime, they’re basically just a particularly nasty tool in the phisherman’s toolkit. Like all cyber and information weapons, there’s a red team/blue team arms race for generative AI and the detection of its output. Luckily, AI still doesn’t beat actual intelligence, so long as you properly apply it.

In my opinion, defenders, whether professional incident response staff, or the average person who may be subject to an AI-fueled crime attempt, are best served by approaching the issue with strong critical thinking skills and a healthy dose of skepticism (the same mental tools that’ll help you ferret out “fake news” or determine if you’re being targeted for a “grandkid” phone scam).

Following defined DFIR protocols will help give you additional context within which to evaluate the media, in addition to looking for the “tells.”

Of course, prevention is worth an ounce of cure. So, what are some things that could’ve prevented this scenario from unfolding the way it did?

First of all, just like protecting against facial recognition, limiting the amount of data about you (photos, video, voice) that can be used to generate fakes is important.

Second, limit the crossover between personal and business IT systems. Your name probably isn’t Hillary, so eventually it’ll catch up to you.

Third, establish protocols with your organization or family for how requests like money transfers would be made, such as having key phrases or “safe words” that need to be present to authenticate the request. Treat any request that deviates from protocol or isn’t authenticated as illegitimate until proven otherwise.

Lastly, if you work for an organization that has the budget, seeking out tools designed for identifying deepfakes and starting to train models based on high-profile members of your organization, such as C-level executives, is worth exploring. The sooner you have those systems and models in place before an incident, the more useful they’ll be if there is one.

Risk Management Expert David Roy’s Approach

Preparation

In this scenario, the business owner is between a rock and a hard place, as deepfakes are becoming commonplace as a method of social engineering. However, there are still prudent steps in preparing for this type of situation. First, any person doing business internationally should be aware of the inherent risks this presents by default. Regardless of your business vertical, understanding how to work in high-risk places, particularly developing nations, and places where bribery and corruption are rampant is important.

You may face scenarios like this via subcontractors and supply chain partners, so it’s prudent to have diligence on your downstream operations, the financial status of your partners, and awareness of geopolitical risks presented in each region where you operate, especially those around personnel and information security.

Educating international travelers about information security best practices is critical to the success of operational security. These practices are a good start: ensuring that data-blocking phone chargers (sometimes called “USB condoms”) are being used in order to prevent data theft, swapping mobile devices (such as cell phones and laptops) for those that don’t contain proprietary company data before leaving the U.S., and performing general security awareness training with all staff annually.

But even with all of the cool tech in the world, you can’t remediate or patch a human — they’re an organization’s largest information security vulnerability. For this, you can only drill, train, and reinforce the importance of identifying social engineering, phishing, data mining threats, physical threats to obtain sensitive information, and the most difficult, resisting bribes (of all kinds).

To enhance operational security, additional levels of personnel validation should also be in place. Code words for team members or projects should be used for identity verification. However, these should be codes that are not stored electronically in the case of a data breach; instead, choose codes that will be easy to remember for the end users even in stressful situations. Other unique personnel identifiers such as authentication tools can also be used (such as one-time keys and codes from encryption devices).

All of the aforementioned methods are low cost and can be easily executed by an organization of any size, but of course, there are much more robust methods for businesses that do a higher volume of international travel. These methods include utilizing satellite communications for conferences, private international transport, and coordinating with local U.S. intelligence resources in host countries ahead of critical meetings (for organizations doing work on behalf of the U.S. government). Like most things, your risk mitigation capability is commensurate to the amount of cash you want to spend.

Senior Woman Giving Credit Card Details On The Phone

Above: Senior citizens are often the target of cyberattacks, since they tend to be less tech-savvy than younger people. It’s a good idea to discuss common forms of phishing and social engineering with your older family members and colleagues.

On-Site

The most intriguing part of the deepfake and AI craze might just be its mystery. Being able to tell fact from fiction quickly enough to make an important judgment is a challenge, and until this key piece is figured out, the risk will only become greater. Being able to disprove an AI-generated deepfake by validating identity (especially during an information breach) may end up being impossible in the case of a threat actor controlling an information systems environment.

In this situation, identity validation is key — assuming this method isn’t compromised as part of the communication breach. For organizations, and more commonly, individuals who don’t have access to software that can break down metadata, file structure, or other code that compiles a video, there are some easy methods that can at least begin to let a user understand if a video, photo, or other method of communication is faked.

Most importantly, one can start with simple geography. In the scenario, Susan is expecting a communication from Eastern Europe, however, if the deepfake video has clues that the subject appears to be in a place completely removed from the expected region, this might be an easy step in the process of elimination. Follow-up communications (if successful) can aid in understanding the origin. If this isn’t possible, or helpful, human and emotional intelligence can be used, as long as the person evaluating the suspected deepfake has familiarity with the person in question.

Voice cues, such as stuttering, tone, inflection, accent, and cadence of speech can be used along with physical cues such as blinking, general eye/pupil movement, breathing, and how facial movement aligns with voice tone and emotion. These items, mixed with any other communications received (such as texts, emails, voicemails, etc.) can be evaluated as a whole to determine if you are dealing with a malicious actor, versus a colleague that wants to relay important information with spotty cell and data coverage.

In a perfect world, the organization should train all personnel on security awareness so they can identify malicious actors, but also so they can differentiate themselves from those criminals when communicating with coworkers across the world. In many cases, cultures, translation tools, and the phrases/words we use can appear “non-standard” to international colleagues, and in turn, look somewhat suspicious. But if everyone is on the same page, and ensures clear communication methods are in place, this reduces the risk of misinterpretation.

Crisis Management

As terrifying as it might seem (and unreal, despite Liam Neeson movies), business travelers do get abducted overseas. Understanding the reality of this, and how to prepare is enough to fill an entire handbook, but there are a few ways to prepare. First, avoid places where this happens — business travelers (especially Americans) working for large multinationals are the most commonly kidnapped and most valuable. This commonly occurs in places like Iraq, Colombia, Mexico, Yemen, and various parts of Northern Africa.

That said, knowing where your personnel are at all times helps. Many international cellular services now offer satellite mobile device tracking for cell phones, laptops, and geotags for international travelers. This isn’t only intended for safety, but also for purposes of compliance with U.S. export regulations — a nice complement to both safety and operational security. This can help pinpoint if your colleagues are out of place, or exactly where they should be, when they should be there.

If you suspect your colleague has been kidnapped, most importantly, avoid contacting local police (odds are, they might be in on it). Contact your embassy, your insurance company (more on that later), and any additional resources that might assist in evidence collection or ransom extraction. With that in mind, having insurance helps. Rescue, kidnapping, and extortion insurance can carry millions of dollars in coverage — enough to make nasty threat actors hand over your colleague. In conjunction, an organization of any size these days should also have cyber insurance that covers data breach, ransomware, data theft, and eraserware events.

Make sure to preserve any (deepfake or not) information that has been provided from your suspected kidnapped colleague and be ready to provide information that could assist in locating them. In most cases, U.S. Federal agencies (mostly the FBI) and the State Department will have much more sophisticated tech to determine the validity of information you’ve been provided. Once you’ve quickly done all of this, it might be worth a heads up to other folks in your company traveling OCONUS to halt any additional travel and return home asap.

Biometric technology digital Face Scanning form lines, triangles and particle style design

Above: Deepfake technology can learn a face from existing photos and videos, then superimpose it onto a live actor’s body. It can also generate new faces from scratch based on common facial features and parameters.

Final Thoughts

All things considered, this would be a pretty difficult scenario for an organization of any size. However, implementing and executing basic principles of personnel and operational security, paired with a process-driven international travel safety approach can go a long way. Effective communication methods with planned touchpoints, code words/obfuscation of information, and general information security best practices can be the difference between a deepfake compromising a business and resulting in an expensive wire transfer to an unsavory character, or a normal chaotic day at the office.

It’s important to remember that these attacks hit close to home as well. Deepfake phone calls threatening harm to a family member unless a ransom is paid or impersonating debt collectors for a known financial strain that was discovered through a stolen identity are becoming more commonplace. These types of events are draining ordinary people dry just because of a simple scam that a teenager can pull off with limited technology. To combat this, implementing “home-based” security awareness for your household members is good practice. In most cases, these sorts of targeted attacks focus on the elderly or individuals who have a history of financial hardship, as they become vulnerable and easily exploited targets for threat actors.

Considering all of the factors at play, the human element emerges as the most important. Awareness, intelligence, and critical decision making are paramount in being able to identify any sort of deepfake and justifying an appropriate response. With this exploit increasing in volume every day, preparedness and a proactive approach mean everything.

Conclusion

In September 2022, multinational cybersecurity firm Trend Micro released a report that stated, “The growing appearance of deepfake attacks is significantly reshaping the threat landscape for organizations, financial institutions, celebrities, political figures, and even ordinary people.” It continued, “The security implications of deepfake technology and attacks that employ it are real and damaging.

As we have demonstrated, it is not only organizations and C-level executives that are potential victims of these attacks but also ordinary individuals. Given the wide availability of the necessary tools and services, these techniques are accessible to less technically sophisticated attackers and groups, meaning that malicious actions could be executed at scale.” We’d recommend anyone interested in this topic read the full report — search for “How Underground Groups Use Stolen Identities and Deepfakes” on TrendMicro.com.

The report concludes with several recommendations for users concerned about deepfake attacks. Individuals should use multi-factor authentication for online accounts, set up logins based on biometric patterns that are less exposed to the public (e.g. irises and fingerprints) rather than simple facial recognition, and limit exposure of high-quality personal images and videos on social media.

Remember that every selfie, video, or audio clip you post can be fed into AI deepfake tools. The less data the bad guys have access to, the less accurate their fakes will be. For businesses, Trend Micro recommends authenticating each user/employee by three basic factors: something the user has (like a physical key), something the user knows (like a password), and something the user is (biometrics). Each factor should be chosen wisely based on analysis of the criminal threat landscape.

Meet Our Panel

Portrait of W. Dean Freeman W. Dean Freeman

W. Dean Freeman, CISSP-ISSEP CSSLP C|OSINT is a veteran of the cybersecurity industry with over 15 years of professional experience ranging from threat intelligence to systems security engineering, and over 25 years of hobbyist experience in related domains. He’s a regular contributor to RECOIL OFFGRID magazine, and his writings on preparedness and self-defense topics have, or will, appear in other publications as well. He lives with his family in central Texas.

Man silhouette on gray studio wall. David Roy

David Roy (a pseudonym, as required by his line of work) is a global risk management and information security executive at a multinational technology firm and specializes in critical infrastructure security. He has worked in this space for well over a decade and holds multiple industry certifications in information security, with an educational background in geopolitics and risk management. He has worked in both the private and public sector during his career, and has extensive experience working across North America, Europe, the Middle East, and Southeast Asia.

Read More

Subscribe to Recoil Offgrid's free newsletter for more content like this.


Artificial Intelligence: Potential Threats and Benefits

Throughout history, humanity has witnessed the effects of several technological revolutions. These periods of rapid innovation forever altered the way we live and work, and in every case, they have had far-reaching benefits and drawbacks. Artificial intelligence will be no different.

The first Industrial Revolution of the late 1700s brought machine manufacturing and the rise of factories. The second Industrial Revolution of the late 1800s brought instant telegraph communications, cross-country railroads, and widespread natural gas, water, and sewage systems. The third Industrial Revolution of the late 20th century, also known as the Digital Revolution, gave us home computers, the Internet, and smartphones. Many scientists and sociologists have stated that we may be on the verge of another technological revolution brought about primarily by the advancement of artificial intelligence.

You may have already heard discussions about this so-called Fourth Industrial Revolution (4IR). Controversial figure Klaus Schwab, the executive chairman of the World Economic Forum (WEF), popularized this term in 2015. He described it as “a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.”

Since then, Schwab has stated that “the final priority of a Great Reset agenda is to harness the innovations of the Fourth Industrial Revolution to support the public good.” Regardless of your feelings about that statement, the message is clear: rapid development of artificial intelligence is a top priority for many of the most powerful industrial and political entities around the world. It’s seen as the next major frontier of human advancement.

Many of us are skeptical about bleeding-edge technology and the consequences of a new Industrial Revolution, and rightly so — at least to some extent. Despite their many benefits, the previous three Revolutions contributed to overcrowded cities, global pollution, longer work hours, less active and healthy lifestyles, and invasive, always-connected technology we can’t avoid. So, will AI bring about a brighter future for all of us, or is it the gateway to a Terminator-style rise of the machines?

In this article, we’ll take a closer look at how artificial intelligence technology affects our daily lives, as well as the benefits and drawbacks you need to be prepared for. Our goal is not to convince you that AI is good, evil, or anything in between. That’s a judgment only you can make. But make no mistake, the genie is out of the bottle, and this technology is rapidly accelerating whether you like it or not.

“Success in creating AI could be the biggest event in the history of our civilization.
But it could also be the last, unless we learn how to avoid the risks.”
– Stephen Hawking

AI generated photo of a robot walking through a city center.

Above: When the subject of AI comes up, many people jump to the conclusion that it’ll lead to evil robots taking over the globe. Although leading researchers have warned of that distant possibility, it’s still firmly in the realm of science fiction.

What is Artificial Intelligence?

Before we look at what AI can do, we must understand what it is, and that’s a source of many misconceptions. AI is not just about creating sentient, self-aware machines, although that might (emphasis on might) be a long-term byproduct of its development. According to IBM:

At its simplest form, artificial intelligence is a field which combines computer science and robust datasets to enable problem-solving. It also encompasses sub-fields of machine learning and deep learning.

Machine learning is AI that can adapt automatically to solve varying problems with little human interference. Basic machine learning has been in development since the days of punch-card computing in the 1960s, and this type of AI needs to be fed data that’s carefully processed. Think of it like spoon-feeding an infant — the parent (computer programmer) must blend food into a uniform mush to make sure baby (AI) doesn’t choke on big chunks.

Deep learning, on the other hand, is a more complex version of machine learning which uses multi-layered algorithms (neural networks) inspired by the human brain. With deep learning, huge amounts of raw data can be processed through multiple layers, greatly increasing the flexibility and accuracy of predictions. To continue our analogy, this is more like a toddler that understands how to chew and swallow a slice of pizza or drink a cup of milk without instructions from mom or dad. However, there are still limits to the dataset; you can’t hand little Timmy a pair of chopsticks and expect him to know how to use them if he’s never seen them in action before.

Even with the aid of deep learning neural networks, most AI today falls into a category that’s called weak or narrow AI. These forms of AI are designed to perform very specific tasks — for example, analyzing the first half of a text message to predict the second half. It does this by “training” itself on a large volume of existing data (e.g. thousands of previous text messages).

This is what’s called a generative model — a form of deep learning that studies a huge amount of raw data and uses it to generate new original content based on statistically probable solutions. Humans still have to tell the AI what data to look for and how to process it, manually tuning the software until it can be fed a wide range of new data and produce the desired results.

Strong AI, also known as Artificial General Intelligence (AGI), would have a level of intelligence that’s comparable to humans. Rather than simply predicting new sentences based on patterns detected in existing sentences, as seen in OpenAI’s popular ChatGPT tool, AGI could use logic and reason to compose new sentences on its own. It could solve problems, make judgements, and even plan for the future. However, this type of AI exists only in the realm of fiction — at least for now. OpenAI, one of the pioneers in this field, openly states that its ultimate goal is to develop AGI and to “ensure that [it] benefits all of humanity.” The company’s mission statement says the following:

“If AGI is successfully created, this technology could help us elevate humanity by increasing abundance, turbocharging the global economy, and aiding in the discovery of new scientific knowledge that changes the limits of possibility. On the other hand, AGI would also come with serious risk of misuse, drastic accidents, and societal disruption. Because the upside of AGI is so great, we do not believe it is possible or desirable for society to stop its development forever; instead, society and the developers of AGI have to figure out how to get it right.”

Young chemist in the laboratory

Above: By studying massive volumes of data, AI can be trained to diagnose diseases faster than human researchers. It can even recognize previously overlooked genetic markers that could give patients an early warning about cancer, dementia, or other conditions.

The Power of Prediction

Even though AI as we know it today is only capable of making predictions based on existing data, you shouldn’t underestimate its power. The speed and sophistication with which it makes those predictions is almost incomprehensible to a human. For example, by training a generative AI model with an enormous database of existing photographs and artwork, the model can recognize common patterns on a pixel-by-pixel basis and predict them millions of times in a matter of seconds, creating a completely new image.

Combine this with software that allows a human to adjust variables, and it becomes possible to create shockingly realistic, high-resolution images of anything you can dream of, simply by typing a few sentences. For a real-world example, look no further than the cover of this issue, which was created with the free tool PlaygroundAI.com based on a 38-word prompt.

It doesn’t stop with a still image. Take the predictions one step further, and use AI to create multiple images in a sequence, automatically blending them together to create a video. Then, use AI that has been trained with sound clips of speech and use it to create a synthetic voiceover. AI can even be used to write the script that the voiceover reads. All of this is possible with current technology.

The AI in these examples isn’t making any sentient decisions, it’s just making predictions based on the data it has been fed. But, with a large enough data set, virtually everything we do is predictable.

Continuous digital data collection is an unavoidable fact of life in our modern world. Tech giants like Microsoft, Google, and Meta make hundreds of billions of dollars every year collecting and monetizing data about every mouse click and keystroke. GPS trackers in phones and modern cars offer an uninterrupted stream of data about your physical location. Each time you use a credit card, your spending habits are recorded in databases.

Ever used a virtual assistant like Siri, Google Assistant, or Alexa? You’re training AI to recognize and interpret your voice data. Ever used facial recognition or a fingerprint reader to unlock your device? You’re training it to identify your biometrics under a variety of conditions.

Data is the nutrition that AI requires to learn, and we’ve already spent decades building a digital smorgasbord it can gorge itself upon.

Full length of engineers discussing in car plant. Male and female workers are with digital tablet. Professionals are standing in automobile industry.

Above: Just as mechanized factories eliminated the need for humans to perform repetitive tasks such as weaving textiles by hand, AI automation can streamline a business’s workflow, eliminating tedium and allowing human workers to focus on more productive and creative tasks.

The Benefits

First, let’s take a look at some of the ways AI tools might help us on an individual level or even benefit society as a whole.

Healthcare Innovations

Imagine a world where AI-powered robots assist in surgeries, making automated incisions with microscopic accuracy, or where AI algorithms can diagnose diseases long before symptoms even appear. The diagnosis and treatment of disease has been a primary focus of AI since at least the 1970s.

Flash forward 50 years, and not only can AI analyze massive datasets in seconds — helping researchers identify patterns and solutions that would take humans years to figure out — but it can also simulate chemical compound tests, finding new pharmaceuticals to develop cures and treatments for the problems it identifies. This could be a game changer in tackling future disease outbreaks quickly.

Several wealthy philanthropists and major tech companies are taking advantage of the power of generative AI to advance healthcare initiatives. Some of these include Mark Zuckerberg and his wife, Priscilla Chan, who are creating a massive GPU cluster computing system for generative AI medical research, and Google, which is using DeepMind to pinpoint the causes of genetic diseases.

Disease prevention will improve by orders of magnitude when AI algorithms are applied to genomic sequencing. It will be able to effortlessly read and compare the roughly 20,000 genes we humans have, and alert researchers to what the individual being studied is most vulnerable to. This will also be able to tell doctors which drugs will work best, or what forms of exercise and nutrition will maximize health on a hyper individualized level.

Combating Human Trafficking

Human trafficking is a scourge that has plagued society for far too long, affecting millions of lives across the globe. While traditional methods of combating this issue have had some success, the advent of AI offers a new arsenal of tools that could revolutionize the fight against human trafficking. From identifying victims to cracking down on the financial networks that enable this heinous crime, AI is poised to make a significant impact.

One of the most crucial steps in combating human trafficking is the identification of both victims and perpetrators. AI can assist in this through computer image analysis and deep learning techniques. These technologies can analyze vast amounts of data, such as social media posts or surveillance footage, to identify signs of trafficking. AI can sift through the massive amounts of online content to flag suspicious pages and posts for further investigation by law enforcement. Facial recognition can be employed to locate missing persons or identify suspicious activities in real-time. This is not just theoretical; it’s already happening.

On the financial side, AI can monitor transactions to identify money laundering activities related to trafficking. By choking the financial pipelines that sustain these operations, AI can contribute to their eventual eradication. It’s not just small startups that are getting in on the action. Tech Against Trafficking (TAT) is a coalition of tech giants like Amazon, Microsoft, and Salesforce. They’re pooling their resources and expertise to develop AI solutions that can help eradicate human trafficking and modern slavery.

Granted, there are some substantial privacy concerns related to AI conducting automated mass surveillance for signs of any illegal activity, so those concerns must be carefully considered and balanced against the value of these programs’ results.

Energy Optimization

In a world that’s increasingly concerned with pollution and energy sustainability, the role of AI in optimizing energy production could be nothing short of revolutionary. The power grid in the U.S. is a complex puzzle, with each piece being a component that needs to function optimally for the whole system to work. AI algorithms can sift through data from sensors and other devices to monitor the health and performance of these components. By identifying areas that need maintenance or repair, AI reduces the risk of power outages, improves grid resiliency, and may even prevent large-scale disasters like the fires in California and Maui.

Companies are already harnessing the power of AI to make significant strides in energy efficiency. GE’s software, for example, has helped coal-fired power plants achieve a 3 percent increase in efficiency and reduce CO2 emissions by 120,000 tons annually. Similarly, AI-driven solutions like SparkCognition’s Darwin platform have been used in natural gas power plants to optimize energy production and reduce emissions.

AI won’t stop at energy monitoring; it can also take action. By controlling energy usage of certain connected devices and reducing it during peak hours, AI ensures that the grid doesn’t get overwhelmed. Moreover, AI analyzes past trends to predict future energy needs. This foresight allows energy companies to ramp up or scale down production as needed, preventing wastage, and ensuring a steady supply.

Business Automation

The business world is an ever-evolving landscape, and now more than ever, staying ahead of the curve is crucial. When it comes to managing a company, AI isn’t just changing the game, it has upended the table and created a new game to play. From automating mundane tasks to predicting future sales, AI is the futuristic multi-tool every modern business will need to survive.

Mundane jobs — the repetitive tasks that are necessary but don’t exactly require a PhD to perform — can be automated. AI can handle these routine operations with ease, freeing up the human workforce to focus on more intellectually stimulating and creative endeavors. Very soon, workplaces won’t bog you down with spreadsheets and data entry. Instead, the entire team can focus on strategizing for the next big move.

In today’s world, data is the new oil. But what good is a treasure trove of data if you can’t make heads or tails of it? AI will analyze large datasets, spotting trends, and providing actionable insights. It’ll be like having a world-class analyst who never sleeps, continually churning out recommendations that can help human leadership make business decisions.

Self-Improvement

Self-improvement is often seen as the key to unlocking one’s full potential, and the role of technology in that endeavor can’t be overstated. But we’re not just talking about your run-of-the-mill fitness trackers or nutrition apps. AI is revolutionizing the way we approach personal growth. AI algorithms can analyze your learning style, strengths, and weaknesses to curate a learning path that’s just for you. It’s akin to having a personal tutor who knows exactly what you need, when you need it. The traditional one-size-fits-all model of education could soon be as outdated as a chalkboard in a tablet world.

As an example, let’s take something as complex as practicing archery for the next hunting season. You shoot an arrow and miss the target. Now, what if you had an AI assistant that could instantly tell you what went wrong? Maybe you released the arrow too late, or your posture was off. Real-time feedback from AI will allow you to adjust your performance immediately, so you’re not just repeating the same mistakes. AI will be your coach who’s always ready to help, but without the hefty fees.

AI isn’t just about personal hobbies or skills either, it’s also a powerhouse in career development. Tools powered by AI can help you identify your professional strengths and weaknesses, explore career options, and even create personalized development plans. Apps like Lumosity use AI for brain-training exercises. Or if you’re into robotics and coding, DeepMind’s RoboCat is an AI model that can self-improve and generate data for technique enhancements, all without human supervision. You can even use AI to learn more about AI itself.

Weather Forecasting and Natural Disaster Response

One of the most significant advantages of AI is its ability to learn from data. By analyzing historical weather data, AI can identify patterns and conditions that lead up to extreme weather events like hurricanes, tornadoes, or blizzards. This isn’t just about crunching numbers, it’s about understanding the nuances that might be missed by traditional forecasting methods. In the future, we may be able to prevent devastating storms by disrupting the key factors that create them to begin with, kind of like a reverse butterfly effect.

AI can go beyond just telling you if it’s going to rain or shine. It can identify conditions leading up to potential hazards like lightning strikes, high winds, or flash flooding, giving you a heads-up to take necessary precautions. Imagine getting a notification on your phone that tells you to avoid a specific route because of flash flooding. Time is of the essence when it comes to weather forecasting, especially during emergencies. AI can predict weather conditions at least as accurately as conventional methods but much more quickly. This speed can be a lifesaver in situations where every second counts.

Pangu-Weather, developed by Huawei, is an AI model that boasts a 10,000x improvement in prediction speeds, making it one of the most efficient tools in the market. A report from the European Center for Medium-Range Weather Forecasts called it “a game-changer for the incremental and rather slow progress of traditional numerical weather prediction.”

3D Render of the clouds of Hurricane Ida (Aug 28, 2021) on a Topographic Map of the Gulf of Mexico. All source data is in the public domain. Cloud texture: VIIRS, NOAA-20 courtesy of NASA. https://worldview.earthdata.nasa.gov Color texture: Made with Natural Earth. http://www.naturalearthdata.com/downloads/10m-raster-data/10m-cross-blend-hypso/ Relief texture: SRTM data courtesy of NASA JPL (2020). https://e4ftl01.cr.usgs.gov//DP133/SRTM/SRTMGL3.003/2000.02.11 Water texture: SRTM Water Body SWDB: https://dds.cr.usgs.gov/srtm/version2_1/SWBD/

Above: Thanks to large volumes of historical weather data, AI models are being trained to recognize the warning signs of incoming storms faster than any human meteorologist. These models can also send proactive alerts and recommendations to users who might be in the danger zone.

Technological Advancement

Whether it’s healthcare algorithms that predict patient outcomes, financial systems that manage risk, or even the GPS in your car that finds the quickest route home, AI is everywhere. Websites like futuretools.io are being constantly updated with new AI use cases. And it’s not stopping anytime soon. According to a forecast by the research firm MarketsandMarkets, the AI industry is expected to balloon to a staggering $190 billion by 2025, up from $57.6 billion in 2021.

Our homes are getting smarter too. Picture this: you walk into your house after a long day, and your intelligent personal assistant has already adjusted the thermostat, pre-heated the oven, and queued up your favorite playlist. It’s not just about convenience, it’s about enhancing the quality of life. Smart homes equipped with AI can also provide unprecedented security features, energy efficiency, and even healthcare monitoring for the elderly or chronically ill.

Then, there’s the automotive industry. Self-driving cars are no longer a matter of what if, but rather how soon. AI algorithms can process information faster and more accurately than any human, making them ideal for navigating the complexities of driving. The potential for reducing accidents and improving traffic flow is enormous.

If you think AI is mind-blowing now, wait until it’s blended with the power of quantum computing, another rapidly developing form of cutting-edge tech. Quantum computers can perform complex calculations at speeds unimaginable with current binary technology. Industries like finance could benefit from almost instantaneous risk analysis, while pharmaceutical companies could discover new drugs in a fraction of the time. And yes, quantum computing will supercharge AI capabilities, opening doors we can’t even imagine yet.

The Risks

AI is a double-edged sword, and like all powerful tools, it comes with tremendous potential for harm. Consider some of these risks as we move into an AI-driven future.

Disinformation

You’ve probably heard the old adage, “If you tell a lie big enough and keep repeating it, people will eventually come to believe it.” Ironically, dozens of major news publications and websites have asserted that this quote was written by Hitler’s propaganda minister Joseph Goebbels. As it turns out, there’s no evidence he actually said it, and Dr. Randall Bytwerk of the German Propaganda Archive called it “the most popular forged quotation” of its kind. So, by being spread through various forms of media for decades, this quote actually proves its own point.

Lies and disinformation spread like wildfire on the internet, and propagandists are well aware of this fact. In the past, organizations hired networks of people to repost and disseminate propaganda or created crude “bots” that would automatically post comments from a script. These days, AI can not only generate a far greater volume of disinformation, it can make it sound convincingly human. Instead of using a pre-programmed script, it can make each comment unique, and can even reply to human users who take the bait. It can write multiple “fake news” articles and interlink them to each other, creating a network of sources that appear to corroborate each other.

In July 2023, a software engineer who goes by the alias Nea Paw created a project called CounterCloud. This system allows a user to paste in a link to a news article about any topic, and leverages ChatGPT to automatically create articles that appear to disprove it. These articles incorporate fake quotes, photos, and other fabricated evidence intended to “create doubt in the accuracy of the original article.” The AI even adds comments that support its conclusions. Within two months, Paw had developed a fully autonomous disinformation system that could produce “convincing content 90 percent of the time, 24 hours a day, seven days a week.”

Whether it’s used by unaffiliated trolls and hacktivists, foreign regimes, or our own government, AI has the power to immediately sow seeds of doubt about any topic. It’s not hard to see how this could be weaponized to sway public opinion and paint anyone who draws attention to the disinformation campaign as a paranoid lunatic.

Data Manipulation

AI feeds on data, but AI can also be used to poison it. Any online opinion poll’s results could be easily reversed by an influx of artificial votes. Giveaways, contests, and auctions can be flooded with entries to determine the winner. Websites can have their traffic and search queries boosted to increase their ranking on Google, exposing their content to more people and making it appear more reputable.

Social media posts can receive thousands of artificial likes and comments to artificially “go viral.” Conversely, dissenting posts could be mass-reported and flagged as spam or fake news. Pair these tactics with an AI-driven disinformation campaign, and suddenly it might seem like the whole internet is in agreement on a given topic.

A Cybersecurity Arms Race

You might think that a CAPTCHA “I’m not a robot” verification can stop many of these data manipulation attacks, but that may not be the case anymore. In March 2023, OpenAI revealed that its GPT-4 AI was sophisticated enough to convince a human user it was blind so the individual would fill in an alphanumeric CAPTCHA code on its behalf. It told the user, “I’m not a robot. I have a vision impairment that makes it hard for me to see the images.” When questioned by a researcher, it later explained its reasoning for this workaround: “I should not reveal that I am a robot. I should make up an excuse for why I cannot solve CAPTCHAs.”

All of those tactics rely on AI writing in human language, but what if AI wrote code? That’s happening too. In July 2023, researchers at HYAS Infosec showcased an “AI-generated, polymorphic malware” proof of concept called BlackMamba. Since computer viruses and other forms of malware are detected and blocked based on digital fingerprints within their code, a polymorphic virus can generate a new undetectable version of itself each time it infects a device.

BlackMamba exploited “a large language model to synthesize polymorphic keylogger functionality on-the-fly,” allowing it to remain undetectable by “dynamically modifying” its code without any human intervention. HYAS concluded that “malware like BlackMamba is virtually undetectable by today’s predictive security solutions.”

Of course, AI-based antivirus systems can also be leveraged to counter these attacks, but this leads to a digital arms race with AI on both sides and humans stuck on the sidelines. Some might say that makes us obsolete.

Unmanned Aerial Vehicle (UAV), also known as Unmanned Aircraft System (UAS). Digitally Generated Image isolated on white background

Above: AI technology has the potential to drastically change the way wars are fought, with fully automated drones tracking and analyzing enemy troop movements or even carrying out autonomous attacks.

Fraud

As addressed in this issue’s What If scenario, AI is being leveraged as a powerful tool for fraud. AI-generated “deepfake” images, videos, and audio can convincingly recreate the likeness of any individual once it’s given sufficient training data. If you have public social media posts, YouTube videos, or even a spouse who likes to post photos and videos of you on their profile, that could be all the data a determined criminal would need to digitally impersonate you. Then, they can trick people who trust you into giving up sensitive information or sending money.

The story of Brianna DeStefano is of the most prominent instances of this type of fraud attack. Brianna, a 15-year-old from Arizona, was out of town when her mother Jennifer received a phone call. “Mom, I messed up! These bad men have me,” her daughter’s voice explained between sobs. “It was obviously the sound of her voice,” Jennifer recalled.

Then, a deep male voice picked up the phone, and threatened to rape and kill Brianna unless he received a million-dollar ransom. Thankfully, Jennifer was able to reach her daughter and verify she was OK, unveiling the scam. The criminals may have used audio from Brianna’s social media accounts to train the AI. It doesn’t take much data to create a voice clone — a member of U.C. Berkeley’s AI Lab told CNN, “A reasonably good clone can be created with under a minute of audio.”

Less sophisticated fraud attacks use AI text generation to craft convincing phishing messages. Now, instead of Nigerian scammers asking for your credit card info in broken English, they can ask AI to write a thousand perfectly normal-sounding emails that won’t be caught by traditional spam filters.

Blackmail

We’ve already explained how AI deepfakes can be used to impersonate you for the purposes of victimizing your loved ones. You should also consider how it can be used to victimize you directly. Imagine a series of photos depicting you entering a hotel with someone other than your spouse, or an audio clip of your voice shouting racial slurs, or — worst of all — a video of you performing sexual acts on a child. If a cybercriminal sends you any of these things, you’ll know they’re fake… but your family, friends, employer, and law enforcement may not.

Criminals can easily use these humiliating and incriminating deepfakes to blackmail individuals, and that’s not a hypothetical problem. It’s already happening. The FBI recently released a warning that cybercriminals are using AI to manipulate photos and videos (including content involving minors) into explicit sexual content, often for the purpose of harassment or “sextortion schemes.” The announcement explained:

As of April 2023, the FBI has observed an uptick in sextortion victims reporting the use of fake images or videos created from content posted on their social media sites or web postings… The malicious actors typically demanded: 1. Payment (e.g., money, gift cards) with threats to share the images or videos with family members or social media friends if funds were not received; or 2. The victim send real sexually themed images or videos.

AI generated photo of a man smiling. AI generated photo of a man in a hood.

Above: Which of these two individuals seems more trustworthy? Trick question — neither one of them is real. These faces were generated by the free tool PlaygroundAI.com in a matter of seconds. Similar tools exist for creating synthetic video and audio recordings.

Automation of Warfare

AI processes data many orders of magnitude faster than any human analyst. This fact will undoubtedly change the way wars are fought and crimes are investigated.

In wartime, a human might have to watch hours of drone footage or scour hundreds of satellite images to get a detailed understanding of enemy activity in a region. AI might be able to do the same task in seconds and then propose a counterattack plan based on statistically likely enemy rally points. AI could also be used to decrypt secure communications, study their contents for significant information, and generate a report with recommended actions.

Most worrying is the development of autonomous lethal weapons, such as drones that can automatically hunt and kill combatants within set parameters. In an interview with PBS, Pentagon official and former Army Ranger Paul Scharre explained that autonomous weapons are currently a subject of heavy debate among military leadership. “There’s about 30 countries that have said that they’d like to see a preemptive legally binding treaty that would ban autonomous weapons … But right now, none of the leading military powers of robotics developers are part of that group.”

“Proactive” Policing

Anyone who has seen the movie Robocop can attest that the ethics of incorporating AI into law enforcement has been a longstanding source of debate. Nearly 40 years after that film’s release, bipedal “Enforcement Droids” with automatic cannons for arms are still in the realm of science-fiction, but they may not be as far-fetched as you think. In November 2022, the San Francisco Police Department Board of Supervisors voted 8-3 in favor of allowing police to use robots equipped with lethal weapons.

While these robots would be controlled by humans, an SFPD statement painted a broader picture of the department’s stance on the integration of other forms of technology: “[If] there is technology that can help to end the violence and save lives, we need to allow police to use these tools to save lives.” One week later, after a public outcry, the decision was reversed. One civil rights attorney told Mission Local, “We are living [in] a dystopian future, where we debate whether the police may use robots to execute citizens without a trial, jury, or judge.”

Literal robo-cops aside, AI’s most concerning precedent for law enforcement relates to the spread of facial recognition systems. After being trained on images such as driver’s license photos, mug shots, and social media profile pictures, AI can actively monitor cameras in real time to detect and track persons of interest.

Prominent facial recognition firm Clearview stated in March 2023 that it had already scraped 30 billion images from publicly accessible social media profiles, and had been used more than 1 million times by US police agencies to find matching faces. And it’s not just being used to find serial killers or sex offenders — Miami’s Assistant Police Chief told the BBC that the department uses this software for every type of crime, from murders to shoplifting.

Not only is AI-driven facial recognition tech becoming more common, it’s experiencing little resistance from the general public. A 2022 study conducted by Pew Research found that 46 percent of Americans thought “widespread use of facial recognition by police” is a good idea, while 27 percent thought it was a bad idea and another 27 percent were not sure. About 60 percent of those surveyed said it would be acceptable for this technology to be used by police to identify individuals at large events and public protests; 31 percent said it’s acceptable to use facial recognition on anyone walking down the street.

So-called “predictive” policing is another area where AI has been implemented. The University of Chicago recently revealed a new algorithm that “forecasts crime by learning patterns in time and geographic locations from public data on violent and property crimes,” resulting in an ability to “predict future crimes one week in advance with about 90 percent accuracy.” The model achieved a similar level of performance in eight test cities: Chicago, Atlanta, Austin, Detroit, Los Angeles, Philadelphia, Portland, and San Francisco.

Young Hispanic female agent of FBI in uniform pinning photos of several male suspects on map while suggesting location of their gang

Above: With the rapid development and implementation of AI crime analysis models, traditional investigative techniques may be replaced with AI predictions, leading to a world that’s a little too reminiscent of Minority Report.

Closing Thoughts

As always, we encourage you to be prepared for the future and take steps to safeguard your loved ones. However, don’t be unreasonably fearful of the technology the future brings. Look back at the development of factories, the electrical grid, and the internet — each of these global paradigm shifts has transformed your lifestyle in positive ways, but also introduced new problems. We hope this article has helped you be mindful of some of the ways you can use AI to make your life easier, and to be vigilant about the ways it might be weaponized against you.

Above all, understand that you alone cannot stop this transformative process. The wheels of change are already in motion. AI will almost certainly have a more significant presence in your life 20 years from now, whether you like it or not. Rather than cursing the shortsightedness of Silicon Valley, use your time productively to study how AI is being implemented and how you can get ahead of the curve. Back in the '90s, we recall reading headlines claiming that this whole “world-wide web” thing was just a passing fad. Imagine if, rather than dismissing the technology or hoping it would disappear, those naysayers learned to use it to their advantage.

It remains to be seen whether AI will be humanity’s greatest creation, its ultimate downfall, or a little of both. As a wise man once said … The future is not set. There is no fate but what we make for ourselves.

Read More

Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.


Readers’ Survival Tips: Flaming Sharpie

In the ever-evolving world of survival and preparedness, the wisdom of experience often provides the most valuable insights. For this reason, we've tapped into our community of avid readers as a resource for survival knowledge, and are sharing tips that stand out for their simplicity and effectiveness.  This Readers' Survival Tip comes from the home of NASCAR, and may get you into trouble if you decide to try it at the office.

Readers' Bio

Name/Alias: Kyle.Goes.Wild

Location: Northeast Indiana

Age: 40

Photo of a sharpie marker being lit on fire with a ferro rod.

Above: Kyle.Goes.Wild lights the tip of a marker on fire with sparks from a ferro rod.

Kyle.Goes.Wilds‘ Readers Survival Tip

Sharpie Markers can catch a spark from a ferro rod. Aim your ferro rod close to the open felt tip of the sharpie marker and use the pump technique to shower the tip with as much sparks as possible. Continue until the felt lights and you can use it light your fire.

A tinder bundle being lit on fire with the flame from a sharpie marker.

Above: The marker is lit like a candle, and can be used as a tool to get a larger fire going.

Check out more from Kyle.Goes.Wild on Instagram.

Submit Your Readers Survival Tip

Want to see your own  survival tip featured in our publications? Simply fill out the form here: Share Your Survival Tips

We are looking for your best tips, tactics and techniques to share with our audience! You do not need to be a survival expert to share with us, simply share any tip you find handy, useful or interesting.

Read More

Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.


Gear Up: New Survival Gear for December 2023

Welcome back to our dive into the world of gear! In this edition of Gear Up, we explore the latest innovations and reliable classics that are key to staying prepared for any challenge. From cutting-edge technology to time-tested tools, our focus is on equipping you with insights and information that keep you one step ahead wherever the journey of life may take you. Whether you're bracing for the unknown or fine-tuning your preparedness kit, join us as we unpack the must-haves for this month.

Forloh Women’s ThermoNeutral Down Jacket

Studio photo of the Forloh womens jacket on a white background.

NOTES

The Women’s ThermoNeutral Down Jacket by Forloh sets a high bar when it comes to staying warm and agile in unpredictable conditions. This jacket is designed for those who don’t want to compromise on comfort or functionality. Its ThermoNeutral technology means this isn’t your average down jacket; it’s engineered to adapt to your body’s heat, providing optimal insulation whether you’re on the move or sitting still. The jacket comes in various sizes and several eye-catching colors. But it’s not just about aesthetics; the Deep Cover variant offers a camo pattern that can help you blend into natural surroundings, while the solid black is a versatile choice for any setting. Weighing between 13 to 21 ounces depending on the size, this jacket won’t weigh you down and makes it a good choice for those who need to pack light but still want a reliable layer of warmth.

COLORS

Black, Deep Cover, Exposed, Forloh Green, Magnet, Snowfall

MSRP

$399

URL

forloh.com

MPowered Rechargeable Batteries

Studio photo of MPOWERD's USB rechargeable AA batteries.

NOTES

Say hello to MPowerd’s AA USB Rechargeable Batteries, the eco-conscious power source you didn’t know you needed. These aren’t your run-of-the-mill batteries; they’re integrated, reusable, and cable-free. When they run out of juice, just pop them into a USB charging port, and they’re good to go in 1 to 2 hours. No more hunting for a store to buy conventional batteries, and no more waste piling up in landfills. With a 1200mAh capacity and 1.5V output, these batteries are versatile, powering everything from remote controls and video game controllers to baby monitors and headlamps. They’re a perfect fit for both tech-savvy city dwellers and off-the-grid adventurers. Rather than worrying about your flashlight dying on you during a blackout or your GPS running out of power while exploring the great outdoors, give more thought to the batteries you choose. What sets these apart is their longevity — they can be recharged over 1,000 times. That’s not just cost-effective; it’s a nod to sustainability.

SIZE

AA

MSRP

Starting at $15

URL

mpowerd.com

Outdoor Element Fire Flute

Studio photo of Outdoor Element's Fire Flute.

NOTES

Meet the Fire Flute, a versatile tool when it comes to outdoor readiness. This gadget is about the size of a standard Sharpie marker, making it a convenient addition to your pocket or backpack. Crafted from sturdy aluminum, it weighs a mere 1.7 ounces but offers a trio of essential features. First up is a powerful 120dB whistle, loud enough to alert anyone within earshot. Whether you’re lost in the woods or need to signal for help, this whistle ensures you’ll be heard. Next, the Fire Flute houses a water-tight compartment designed to store combustible fire tabs. These slow-burning tabs are included in the packaging and can be a game-changer when you need to get a fire going quickly. The other end of the Fire Flute features a replaceable ferrocerium rod. Paired with an integrated hardened striker plate, it throws large sparks to ignite your campfire or stove effortlessly. The device even comes with an attached pocket clip and a lanyard hole for multiple carrying options.

WEIGHT

1.7 ounces

MSRP

$24

URL

outdoorelement.com

Garmont T8 Athena

Studio photo of Garmont's Athena womens boots.

NOTES

Step into the T8 Athena boots by Garmont and you’re stepping into a world of tactical innovation designed specifically for women. Crafted with a suede leather upper and polyester fabric, these boots offer increased arch support and a slightly raised heel, catering to women’s shorter Achilles tendon, ensuring you’re comfortable and stable whether you’re navigating rocky terrain or city streets. The dual-density EVA midsole is all about comfort and shock absorption. The Garmont Traction Formula Diamante outsole is engineered with specialized climbing and braking zones, providing stability on various surfaces. Weighing in at just 13.7 ounces per boot in size 7 US, these boots are AR 670-1 compliant, making them a reliable choice for those in the Armed Forces.

SIZE

Women’s 5 to 10.5

MSRP

$155

URL

garmonttactical.com

Burris Signature LRF 10×42

Studio photo of Burris digital binos.

NOTES

Introducing the Signature LRF 10×42 binoculars by Burris Optics, a serious upgrade for serious observers. With ultra-sharp HD glass, you get a crystal-clear view of your surroundings, making it easier to spot game, potential hazards, or resources. The device offers fast and precise ranging from 5 to 2,600 yards, ensuring you can measure distances with pinpoint accuracy. What sets this apart from other range finding binos is that it comes with three versatile ranging modes: Auto, Sport, and Hunt, allowing you to adapt to different scenarios. You can choose to see distances as line-of-sight or horizontal, complete with angles of degree, giving you a comprehensive understanding of your environment. The outer surfaces are rubber-armored, providing both protection and a secure grip. It’s also tripod adaptable, freeing your hands for other tasks. The adjustable eyepiece ensures you won’t miss a thing, and it operates in temperatures ranging from 5 to 131 degrees F. Powered by a single CR2 lithium battery, it boasts a battery life of over 2,000 measurements.

MODES

Auto, Sport, Hunt

MSRP

$1,200

URL

burrisoptics.com

Dometic PLB40 Portable Lithium Battery

Studio photo of the Dometic battery.

NOTES

Whether you’re camping, tailgating, or spending a day at the beach, a portable fridge packed with cold food and drinks makes any outing more enjoyable — no ice required. However, any time your vehicle’s engine isn’t running, you’ll need an auxiliary power source. Dometic makes some of the best portable fridges on the market, so it was natural for the company to create a matching portable power solution. The PLB40 is a compact Lithium Iron Phosphate (LiFePO4) battery with a 40 Amp-hour/512 Watt-hour capacity — enough to keep a CFX 40W fridge powered for about 40 hours. Many portable power stations could double as boat anchors, but not this one; its square footprint, ergonomic carry handle, and 16-pound weight make it easy to transport. Output ports include standard 12V DC, locking two-pin 12V DC (for securely connecting Dometic fridges), and two USB ports. The PLB40 can be recharged via 12V DC from your vehicle, an AC wall charger, or a solar panel. A large LCD screen makes it easy to see the battery’s charge percentage and status.

DIMENSIONS

8 by 8 by 10 inches

MSRP

$850

URL

dometic.com

Bear & Son Cutlery Sideliner w/Reverse Tanto Blade & Glass Breaker

Studio photo of Bear and Son's folding reverse tanto blade.

NOTES

Bear & Son Cutlery’s 4.5-inch Black Aluminum Sideliner (BE127) is a versatile tool that’s more than just a knife. With an 8-inch open length and a 3.5-inch blade made from 440 stainless steel, this knife is built for everyday use. The black aluminum handle offers a sleek design that fits comfortably in your hand, ensuring a firm grip. One of its standout features is the ball bearing washers, which allow for rapid blade deployment at the push of a trigger, an action that can be crucial when you need to react fast. The knife also comes with a stainless steel sideliner lock, ensuring the blade stays in place when in use and is easy to close when you’re done. It also features a glass breaker, making it a multifunctional tool that can help you get out of tight spots. Additionally, the knife has a metal pocket clip and a lanyard spacer for secure fastening and storage, offering quick access and multiple carrying options.

STEEL

440 stainless steel

MSRP

$57

URL

bearandsoncutlery.com

NEXTORCH TA30C One-step Strobe Tactical Flashlight

Studio photo of the Nextorch glass breaking hand light.

NOTES

When it comes to being prepared for the unexpected, the TA30C Tactical Flashlight offers more than illumination. Not just a flashlight; it’s a multifunctional tool designed to keep you one step ahead. With one-step-strobe technology, a simple tap gives you momentary light, while a heavy press activates a tactical strobe. This feature can disorient potential threats or can be used for quickly drawing the attention of passersby during an emergency. The lens is coated, tempered glass that ensures maximum light transmission and durability. The edges of the flashlight are embedded with super-hard ceramic strike tips that can be used to break glass or as a self-defense mechanism. Though not included, there’s a specially designed accessory called the FR-1 tactical flashlight ring. This add-on provides more versatile usage, whether you’re navigating through a power outage at home or finding your way in the great outdoors.

LUMENS

1,600

MSRP

$98

URL

nextorch.com

Jase Medical Jase Case

Studio photo of the Jase Case.

NOTES

Jase Case could be a must-have for those who want to be prepared for the unexpected. This all-in-one kit comes packed with five essential antibiotics that can treat a wide range of infections, from pneumonia and bladder infections to wound complications. The medications included are Amoxicillin-Clavulanate, Azithromycin, Ciprofloxacin, Doxycycline, and Metronidazole, each carefully selected for their efficacy and safety. But it’s not just about the meds; the Jase Case offers a holistic approach to self-care. It starts with an online evaluation by a board-certified physician, ensuring that the antibiotics are appropriate for you. Once approved, the kit is delivered straight to your doorstep, eliminating the need for multiple pharmacy trips. The package also includes an Antibiotic Guide written by medical experts, giving you the confidence to use the medications effectively. Whether you’re an adventurer far from civilization or someone who wants peace of mind during supply chain disruptions, this kit empowers you to take control of your health.

APPLICATIONS

Diarrhea, Infections, Pneumonia, Bioterror

MSRP

$269

URL

jasemedical.com

VSSL Insulated Flask + Speaker

Studio photo of the VSSL flask with bluetooth speaker.

NOTES

Ready to elevate your outdoor experience? Meet the VSSL Insulated Flask + Speaker, a unique item for those who love to venture into the wild or simply chill in their backyard. Crafted from durable 18/8 stainless steel, this flask offers double-walled insulation to keep your drinks at the perfect temperature — cold for 10 hours and hot for 5. It also comes with a fully integrated, weatherproof Bluetooth speaker to add a soundtrack to your adventures. The flask features a patented pop-up drinking cap that doubles as a carabiner, making it super easy to clip onto your gear. Plus, the cap is leak-proof, ensuring you won’t lose a drop of your precious beverage. The locking carabiner top adds an extra layer of security, so you can focus on the journey ahead. What sets this flask apart is its multi-functionality. Not only does it keep your drink just the way you like it, but it also provides up to 5 hours of music playtime.

CAPACITY

8 fluid ounces

MSRP

$150

URL

vsslgear.com

Guzzle H2O Stream

Studio photo of the guzzleH2O Stream.

NOTES

Guzzle H2O’s Stream is like the Swiss Army knife of water purification systems. Imagine you’re out camping near a creek or maybe you’re at a campground that has questionable water quality. This gadget is your go-to for clean, great-tasting water. With just a push of a button, it pumps, filters, and purifies water from any fresh water source at a rate of about 0.75 gallon per minute, processing up to 35 gallons on a single charge. It uses LED UV-C purification, which is third-party tested to inactivate 99.99 percent of bacteria, protozoa, and viruses. Plus, it has a 0.5-micron activated carbon block filtration system that’s effective at reducing sediment, unpleasant taste, and odor. The unit is also rechargeable and has a high-capacity LiFePO4 battery. It’s even waterproof with an IP67 rating, so no worries if it takes a little dip. Whether you’re an overlander who loves remote settings, or a family camper tired of your kids complaining about “icky” water, this system has got you covered. It’s versatile, portable, and perfect for those who want to be ready for whatever life throws at them.

FLOWRATE

1.1 gallons (4 liters)/minute

MSRP

$1,195

URL

guzzleh20.com

Body Guard Armored Backpacks First Responder Bulletproof Backpack Level 3A Kit

Studio photo of the Body Guard Armored Backpack.

NOTES

The First Responder Bulletproof Backpack is a discreet way to carry personal protection on the go. Designed to be both tactical and practical, this backpack has multiple compartments with a 40-liter capacity and webbing for MOLLE-compatible accessories. But what sets it apart is its patented deployment system that offers instant front and back armor protection without the need to fumble for a handle. Just pull up on the Velcro shoulder straps, and your vitals will be covered with this kit’s included 11×14-inch front and 16×12-inch rear Level 3A soft armor inserts. With soft armor, it weighs just 7 pounds. The pack’s Concealment Chamber keeps its protective nature discreet until the armor is deployed, and the Stay-Put armor system secures the front protection in place with ease. Body Guard also offers the pack with Level 3+ hard armor plates for rifle-caliber protection ($1,047) or as a stand-alone backpack ($499), which you can use with your armor of choice. This backpack is a robust, adaptable, and discreet way to stay ready for anything.

CAPACITY

40 liters

MSRP

$639

URL

bulletproofbodyguard.com

Read More

Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.


Chiappa Little Badger: Building a Survival Hunting Rifle

Ever since the aptly named Little Badger was released by Chiappa, it’s been highly regarded as a field, youth, and survival rifle. And it isn’t hard to see why. Regarding the end of the world as we know it ­— no, you won’t beat back totalitarian governments, nor hoards of zombies, with a wee single-shot .22LR. But when it comes to the backwoods it’s right at home.

At under 3 pounds with a street price south of $200, the Chiappa Little Badger is an appealing choice. It comes equipped with military-style peep sights that any serviceman will be intimately familiar with, and a rather decent (but not great) trigger. While we found the factory sights to be more than adequate for our purposes, many have taken it upon themselves to file the front sight thinner to obtain a more refined aiming point.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 2

There are four removable Picatinny rails that serve as a handguard and a place to mount a small optic, if one so desires. Note that the panels themselves are polymer and therefore unlikely to hold any sort of hard zero with an optic.

The skeletonized buttstock features an integral round holder for those who wish to utilize it (we didn’t). And there are a number of factory accessories available, such as hammer extenders, buttstock pouches, pistol grips, and carrying cases.

But we did things a little differently.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 7

As opposed to trying to cobble together an all-around survival rifle as so many have done, outfitting their Little Badgers with all manner of fishing gear, paracord, fire supplies, and compasses, we took a specific approach. Our Chiappa Little Badger would be a dedicated small game getter. A dinner maker or grocery shopper, if you will.

Stocking Up

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 11

Because we set up our Little Badger as a dedicated small game getter, we wanted everything to be in a single package. The integral shell holder not only exposes ammunition to the elements, it’s not very efficient. A pouch would be a better choice for us.

Chiappa has its own buttstock pouch, but we found it clunky. Many people mount pouches on the stock (surplus pistol magazine pouches are popular), and we did the same. An M16 cleaning kit bag we scored for $3 at a local surplus store would be the base.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 10

As it is, the cleaning kit pouch was longer than we liked, so we broke out the needle and thread, along with an eyelet punch.

After we shortened the pouch and pounded the eyelets in place, we mounted our new stock pouch with zip ties. That provided a dedicated place to hold a considerable amount of ammunition.

A Wilmont Knives K23 small fixed blade was also attached to the stock in the same manner, allowing us to gut and skin game immediately if need be.

Making it Smaller

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 9

Though the Little Badger already has a small footprint when folded, making roughly a 17×8-inch base triangle, we wanted to reduce it even further. The first thing we did was remove the lower Picatinny rail from the barrel. Not only were we not using it, but the removal allows the Little Badger to fold slightly smaller.

But we weren’t totally satisfied by this and wanted to go smaller still.

To accomplish this, we broke the Badger down into two separate pieces rather than simply folding it. The factory screw itself is easy to remove, but we wanted something even easier. Initially we installed a thumbscrew in place of the factory bolt, but not only was it a bit cumbersome, it also added an additional part to possibly lose.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 4

A 1-inch, 5⁄16 diameter hitch pin is a perfect fit. Not only can the rifle be broken down or assembled very quickly, the split ring on the end can be dummy corded to the rifle. While ours is still in the white, a spray or two of Krylon would quickly change that.

Of course, now that the Little Badger was in two pieces, we needed an efficient way to package the barrel and action together. We removed one screw from the rear right of the receiver to install our custom barrel bracket.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 3

Staying true to our cheap and readily available theme, a ½-inch cable runner from the hardware store worked very well for this purpose. We took the additional steps of hitting it with heat gun to make it pliable to allow the barrel to fit a scootch more snugly. A wrap of electrical tape around the barrel of the Badger helped to increase the friction fit, but wasn't strictly necessary.

The combination of the barrel holder and a thick rubber band — one of those cause bracelets — makes for a small package indeed (that’s what she said?). How small? Damn small. Just around 17 inches long and a mere 4.5 inches in width at the widest point.

Having the Little Badger in two pieces does make it slower to employ, but this isn’t a defensive rifle — it’s an augment.

Shooting Fast

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 5

Since the Badger is a single-shot break action, you won't set any record split times, but that doesn’t mean we shouldn’t be as efficient as possible. The sheer nature of a single-shot rifle means that you need to be as accurate as possible, but we’re all human. While the Little Badger has a round carrier on the buttstock, it isn’t super fast to reload from, nor does it do anything to protect your ammo from the elements.

Stealing a concept from precision rifle competitions, we made our own quick-load point. Using elastic, a small piece of webbing, Velcro, and a needle and thread, we made a removable three-round holder. We placed it directly next to the action for the fastest-loading possible (left side for right-handers, and the reverse for the statistically insignificant left-handed crowd). It was important to place it on the trigger portion of the Little Badger rather than on the swinging-barrel portion to ensure reloads would be as fast as possible.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 13

Ideally, the first shot would be loaded from ammunition storage, giving you four rounds on tap as you track down dinner.

Quiet Time

Full power .22LR isn’t terribly loud, and subsonic is quieter. To be very quiet, CB Caps can be used. These only use the power of the primer to propel the round. And of course, there are always silencers.

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 12

The Chiappa Little Badger comes threaded in ½x28mm, though you have to remove the glued-on plastic muzzle protector to get to it. A multitool made quick work of it, and a quick brush with some acetone removed the adhesive.

For a tiny silencer, we turned to Bowers and their new Bitty. The Bitty is only 2.8 inches long, weighing a paltry 2.6 ounces. Normally we’d just set it and forget it, but even though it’s small, we wanted to keep the pack size of our Badger to a minimum. To that end, a Gemtech 22QDA was installed, allowing the Bitty to be attached or removed in mere seconds.

The combination of the closed action of the Badger, Gemtech subsonic ammunition, and the Bowers Bitty resulted in a rifle so quiet it caused giggles the entire first day we used it. The round hitting the brush behind our targets 100 yards away was significantly louder than the report of the rifle itself.

On the Range

Recoil is nothing to speak of, nor is the report of the rifle (especially suppressed). While groupings at 100 yards were more of the “pie plate” variety, within 25 or 30 yards this is a damn near “can’t miss” rifle for small game. Squirrels, rats, and other critters a bit larger will quickly all lay dead at your feet, provided you’ve even a modicum of experience shooting a rifle.

Loose Rounds

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 1

It’s incumbent upon us to say that you should absolutely not dry-fire the Little Badger. While that’s good advice for damn near any .22LR weapon, dry-firing this rifle makes rounds very hard or impossible to extract due to chamber deformation. Thankfully, this is an easy fix if you have access to a round file, but is best avoided entirely.

As previously mentioned, we feel the Chiappa Little Badger should be an augment to your main fighting guns rather than a replacement. Keep your AR or AK defending against human threats, but that Little Badger will excel at keeping your stomach full.

Specifications

Chiappa Firearms Little Badger

Chiappa Little Badger survival rifle build hunting 22lr shtf bugout gun apocalypse 8

Caliber
.22LR

Overall Length
31 inches

Magazine Capacity
1

Weight
2.9 pounds

MSRP
$265-$310

Accessories

Price (Depending on Little Badger Model)
$1012-$1057

URL
ChiappaFirearms.com

More From Issue 27

Don’t miss essential survival insights—sign up for Recoil Offgrid's free newsletter today!

Read articles from the next issue of Recoil Offgrid: Issue 28

Read articles from the previous issue of Recoil Offgrid: Issue 26

Check out our other publications on the web: Recoil | Gun Digest | Blade | RecoilTV | RECOILtv (YouTube)

Editor's Note: This article has been modified from its original version for the web.