In the ever-evolving world of survival and preparedness, the wisdom of experience often provides the most valuable insights. For this reason, we've tapped into our community of avid readers as a resource for survival knowledge, and are sharing tips that stand out for their simplicity and effectiveness. This Readers' Survival Tip comes all the way from Southeast Asia, and is a great reminder of how many resources are out there during emergency situations.
Readers Bio
Name/Alias:Thaiger_Wa
Location: Thailand
Age: 53
Thaiger_Wa's Survival Tip
When you are lost in the jungle in a tropical area, finding a place to shelter is a priority. But more importantly, water. If you can't find an open water source, a plant that can help you is the bamboo tree. Bamboo trees are very useful. It can give water from its joints. Its shoots can be cooked and eaten. Its stem can be made into many useful things such as weapons, traps, shelter, and fuel. Moreover, that the worms that live in the joints of bamboo plants are a good source of protein. Do some research on the internet and you will find much more on how bamboo keeps you alive!
Submit Your Survival Tip
Want to see your own survival tip featured in our publications? Simply fill out the form here:Share Your Survival Tips
We are looking for your best tips, tactics and techniques to share with our audience! You do not need to be a survival expert to share with us, simply share any tip you find handy, useful or interesting.
Read More
Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.
Concealing a handgun in a backpack is relatively straightforward, since a pistol, holster, and spare mags can fit in even the smallest packs with ease. However, if you’re looking for a way to carry a concealed carbine, choosing your pack carefully becomes a much higher priority. Large backpacks can hold a rifle easily, but they practically scream there’s a gun in here — that may not be the message you want to send when you’re walking through a hotel lobby, parking lot, or other public location.
Smaller packs may not fit your rifle or may look awkward and bulky once they’re loaded with a weapon. The setup seen here was designed as a happy medium between these extremes, with priority placed on carrying a fully concealed, multi-role folding carbine.
Vertx has been a key name in the everyday carry backpack space for years with its Gamut series. As a happy owner of several of these bags, the larger Vertx Basecamp seemed like a natural choice for this application. I made sure to carefully compare its measurements to those of my carbine in advance, and I wasn’t disappointed when it arrived.
The Carbine Setup
The bag is a snug but functional fit for my 12.5-inch AR with a LAW Tactical folding stock adapter and 20-round magazine. This rifle is equipped with a Nightforce NX8 1-8x optic in a Badger Ordnance Condition One 1.7-inch-height mount, as well as a Holosun 509T red dot on the slimming KOENG.CO 12 o’clock mount.
The carbine was built to serve as the most effective general-purpose rifle I could fit in the bag, allowing easy access in a pinch. I wanted to ensure it could be fired immediately without pausing to unfold the stock or put on ear protection; this is accomplished by the addition of a LAW Tactical ARIC bolt carrier and a Thunder Beast Dominus-K suppressor. The base of the AR build is a San Tan Tactical Pillar matching receiver set and a VLTOR Freedom Handguard with a built-in hand stop and ARCA rail section (for quickly mounting on a tripod). It also needed to be day and night capable.
To this end, it’s equipped with a Modlite PLHv2 light on an Arisaka mount activated using a UNITY Tactical AXON switch. Utilizing a 12 o’clock mounted red dot also means I can passively aim the rifle through night vision, if necessary. The 12.5-inch Criterion barrel is excellently gassed, making suppressed usage downright pleasant. Equipping the carbine with a PRI M84 Gas Buster charging handle also helped reduce gas blowback to the face.
The choice to utilize a 20-round magazine wasn’t due to any regional restrictions, but rather to allow easier access to the carbine through the top of the bag without stripping the entire face open. A 30-round magazine will fit tightly, but it means having to rip the backpack wide open, which is less than ideal if you’re in a hurry to access the weapon.
Additional Features
The Basecamp is feature-rich with a removable laptop sleeve on the interior and zippered pouches for storing small items. The Dark Earth color was chosen for function as much as aesthetics. It fits the carbine with the custom M81 Arid paint job from Pro2Customs and makes it easy to conceal in an arid desert environment. To facilitate this setup, removing the laptop sleeve was absolutely necessary. This pack’s removable laptop sleeve wasn’t present in earlier versions of the Gamut series, which is another selling point of Vertx’s newer bags.
I prefer keeping things like batteries outside of direct sun and heat in the desert, so having those small storage options positioned away from the top of the pack is beneficial. I store paper goods or items less susceptible to heat in the large, zippered storage pocket on the top of the opening flap. Speaking of that top flap, I appreciate that Vertx includes a Hot-Pull Tab at its leading edge, which can be staged between the two zippers and pulled to quickly open the main compartment. This makes it faster to open without hunting for zippers that might have otherwise ended up in a different place every time.
The generous internal storage allows the effective concealment of not just the carbine but also a Dauntless Manufacturing Hiker Tanto fixed blade with its sheath mounted to the included TactiGami panel, a fully stocked Ryker Nylon ankle IFAK utilizing the hook of the kit itself to attach to the internal loop, and a SureFire Stiletto light stored beside the Dauntless fixed blade. I also keep a reversible MultiCam/black A3 Alpha Lochi jacket from Beyond Clothing inside the main compartment, offering concealment as well as warmth.
Lastly, there’s a GRAYL GeoPress water purifier bottle. In the metropolitan center of the desert city where I live, I can fill it with 24 ounces of clean water from any tap, or purify water scavenged from ponds and drainage ditches in a pinch. The external stretch pockets allow me to carry the GeoPress as well as a 32-ounce bottle on the opposite side.
Eventually, my buildout of the bag will be improved to utilize more TactiGami panels on the interior for better spare magazine storage. I also plan to use the external PALS webbing hidden under the flap on the outside of the pack. I’ve used this outer storage space effectively in the past by mounting specific pouches for sundry items that might require access without exposing the main compartment’s contents. Ideas that come to mind are basic toiletries, pen and paper, a book, a multi-tool, and, naturally, some snacks.
In my opinion, you’ll be hard-pressed to find a more well-rounded and durable backpack at this price point. The Gamut family has proven to be well-built and reliable over the years, and the Basecamp looks to be no different. If you’re in the market for a multi-role backpack that offers concealment for anything from a subcompact pistol to a carbine, medkit, and spare magazines, you should give this bag a closer look.
Scary Smart by Mo Gawdat isn’t your typical guide to bracing for life’s curveballs. Instead, it dives deep into the realm of artificial intelligence (AI) and its potential impact on humanity. Gawdat, a former Google executive, warns us about the rise of AI, which he argues could be both a blessing and a curse. The book serves as a wake-up call, urging us to prepare for a future where AI could either be our greatest ally or a formidable adversary.
The 411
Gawdat starts the book with a thought exercise. Imagine it’s the year 2050, and you’re sitting around a campfire with the author. You’re either living in a dystopia where AI turned against humanity, or a utopia where AI ushered in a new age of prosperity. Looking back at the current time, what words of wisdom would future you say to present you? Gawdat does just this, exploring how we could reach a worst-case conclusion or a best-case future.
The book explores the “dual use” of AI. For example, when Oppenheimer discovered how to recreate nuclear fission, he invented a paradigm-shifting technology that could be used to annihilate civilization or provide it with an abundance of energy. AI is similar in scope with this double-edged sword characteristic, and Scary Smart explores how humanity can prepare and approach AI’s development in an ethical way. The book emphasizes that AI has the potential to solve some of the world’s most pressing issues but also poses risks if not managed responsibly. Gawdat stresses the importance of programming ethics into AI, which is crucial for ensuring that these systems act in the best interests of humanity. The book argues we need to be mentally and emotionally prepared for a future where AI plays a significant role. This involves understanding the technology, its limitations, and how to co-exist with it.
While Scary Smart doesn’t directly address traditional notions of readiness for unforeseen events, it does offer a unique perspective on preparing for a future shaped by AI. It’s about adaptability, mental fortitude, and ethical considerations — qualities that are essential for any kind of readiness strategy. The book encourages us to think critically about the technology we’re creating and how it could affect us, a vital skill when planning for the unknown.
The book has faced criticism for its somewhat alarmist tone, with some readers arguing it paints an overly grim picture of AI’s potential impact. But Gawdat balances the potential for dystopia with an equal amount of how astonishingly well AI can solve some of the world’s most dire problems. Additionally, Gawdat’s focus on embedding ethics into AI has been met with skepticism, as defining “ethics” in a universally acceptable way is a complex task. Much like any tool humanity invents, often the only way to stop a bad guy who uses the technology in a nefarious way is a good guy using the tech to prevent the bad from happening.
The Verdict
Scary Smart is a thought-provoking read that challenges us to consider the ethical and practical implications of rapidly advancing AI technology. While it may not be a traditional guide on how to prepare for life’s uncertainties, it offers valuable insights into adapting and thriving in a world increasingly influenced by AI. If you’re someone who’s keen on understanding the broader landscape of threats and opportunities that lie ahead, this book is definitely worth your time.
About the Book
Book & Author Scary Smart: The future of Artificial Intelligence and How You Can Save Our World By Mo Gawdat
Publisher: Bluebird
MSRP: $15
URL: mogawdat.com
Pages: 326
Rating: Thrive | Survive | Die
Read More
Subscribe to Recoil Offgrid'sfree newsletter for more content like this.
When you think of a slingshot, what comes to mind? Maybe a nostalgic memory of childhood shenanigans comes to mind, or perhaps you envision a TV character like Bart Simpson or Dennis the Menace. You might be surprised to learn that slingshot technology has not only kept pace with modern advancements, they are an effective tool for hunting, recreation, and even defense. Enter into the world of Simpleshot, a name that's ubiquitous in the slingshot community. We'll take a look at several of their products, including the Scout X, Hammer XT, Torque, and Axiom X slingshots. Plus, I'll share my firsthand experience from a slingshot class held at the Georgia Bushcraft event.
Simpleshot Slingshots: An Overview
Simpleshot is not just another slingshot brand. They've carved a niche for themselves with innovative designs and a focus on quality. But how do these slingshots really stack up? Let's break it down by looking at a few of their models.
The Scout X Slingshot The Scout X is a versatile beast. It's designed for both beginners and pros, offering an ergonomic handle and a sturdy frame. What makes it stand out is its simplicity and adaptability. You can switch bands easily, and it's suitable for various shooting styles. However, it's not just about comfort; the accuracy this slingshot offers is impressive.
The Hammer XT Slingshot The Hammer XT is a powerhouse. It's built for heavy-duty use, and you can feel it. Its weight and construction make it a great choice for hunting or long-range shooting. The wrist brace adds stability, which is crucial for powerful shots. The forks can also be swapped out for an archery biscuit to shoot arrows.
The Torque Slingshot The Torque is a compact wonder. Its unique, angular design is not just for looks – it aids in grip and alignment. It's incredibly lightweight, making it a great travel companion. However, its small size might be a challenge for those with larger hands.
The Axiom X Slingshot Lastly, the Axiom X is a well-rounded option. It's designed for comfort and accuracy, with a frame that accommodates various grips. It's a solid choice for both recreational shooting and more serious endeavors.
Slingshot Accessories
When it comes to accessorizing your slingshot, Simpleshot has an array of options. For starters, their Clay Shooting Flat Bands are tailor-made for clay ammo enthusiasts, ensuring precision and durability. If you're aiming to improve your accuracy, the Bell Target is a fantastic choice with its high-visibility and ultra-durable design.
Simpleshot offers many ways to customize your slingshot rig. Their Scout LT Scales come in a 5-pack bundle, allowing you to personalize your slingshot's handle to your liking. And for those who love a bit of target practice, the Self-Resetting Knockdown Target and its accompanying replacement discs are a good option. These targets are not just fun but also aid in skill improvement. For the more competitive shooters, the Competition Training 5-Pack of Self-Resetting Knockdown Targets is designed to simulate a real-world shooting experience, perfect for upping your game. And for those late-night practice sessions, the Glow-In-The-Dark Golf Ball Target is a useful accessory. Simpleshot also caters to the digital age with their Foundations Online Course, a great resource for mastering slingshot techniques.
Finally, the brand offers various handle weights, scales, and clips specifically designed for their Scout X model, enhancing the overall shooting experience with added stability and grip customization. Plus, the quick-release keychains and hex screws are handy tools for making quick adjustments on the go.
Slingshot Fundamentals
At Georgia Bushcraft‘s Fall Gathering event, I had the opportunity to learn slingshot fundamentals from the Simpleshot experts themselves. The class focused on four key areas:
Finding Your Dominant Eye: This is crucial for accuracy. The instructors helped students identify their dominant eye, which is essential for proper aiming.
Proper Grip Techniques: A correct grip is the foundation of a good shot. We learned the proper grip for the slingshot shooting style. Rather than holding on to the handle exclusively, the grip also included the forks of the slingshot to prevent it from leaning backwards when pulling back on the band.
Preventing Band Twists: Twisted bands can affect accuracy and the lifespan of the bands. The instructors showed us how to attach and maintain the bands properly.
Archery Elbow Technique: Just like in archery, the elbow technique in slingshot shooting is vital for stability and precision. We practiced this to improve our shooting form.
The class included people of all ages and backgrounds participating, proving that slingshots continue to stand the test of time. It was a fantastic experience that not only improved my skills but also deepened my appreciation for the sport.
Final Thoughts
Simpleshot is leading a renaissance in the slingshot world. Their range of products caters to a wide spectrum of users, from beginners to experts. Each model has its unique strengths, and there's something for every preference.
Read More
Subscribe to Recoil Offgrid's free newsletter for more content like this.
Don’t believe everything you see on the internet. This is one of the fundamental rules of using the worldwide web, and it dates back to the earliest days of dial-up. In the ’90s, chain emails spread hoaxes like wildfire, but those of us who weren’t entirely gullible knew to question anything we received with “FW: FW: FW:” in the subject line. The rise of chat rooms and social media made it even easier to spread misinformation to thousands of strangers.
Around the same time, photo editing software was becoming vastly more powerful and accessible, so we began to see the spread of Photoshopped hoax images across the internet. Much like chain letters had morphed into chain emails, this type of hoax was nothing new, but the advancement of tech made it far easier to create and disseminate. Photo manipulation techniques that used to require hours of labor in a photographer’s darkroom could now be accomplished in seconds.
Today, misinformation has reached another new frontier: artificial intelligence. Publicly accessible AI tools are being used to automate the creation of so-called deepfakes, a term based on the “deep learning” neural network technology that’s harnessed to create them. Now, instead of manually blending images together in Photoshop, we can let AI do the hard work for us. And it’s not only useful for still images — deepfake technology can also process each frame of a video to swap a subject’s face (for example: youtu.be/CDMVaQOvtxU). AI can also be used to closely mimic a human voice based on audio samples and read back any text the user inputs (youtu.be/ddqosIpR2Mk).
Deepfakes aren’t just a hypothetical threat — they’re already being used to manipulate, confuse, or outright deceive viewers. In 2020, the parents of Joaquin Oliver, a 17-year-old who died during the Parkland school shooting, used deepfake technology to recreate their dead son’s likeness and create a video where he urged young Americans to vote for more aggressive gun control. More recently, deepfakes of both Ukrainian President Zelensky and Russian President Putin appeared in an attempt to encourage the opposing side’s troops to surrender or retreat; the latter clip was aired on Russian TV in what the Kremlin decried as a “hack.”
Cybercriminals are also using deepfake technology to persuade unsuspecting businesses and individuals to transfer money or give up sensitive info. And in the most twisted cases, AI is being used to generate deepfake pornography of people — even children — who are totally unaware of the disturbing and humiliating way their likenesses are being altered. A 2022 report by the U.S. Department of Homeland Security stated, “Non-consensual pornography emerged as the catalyst for proliferating deepfake content, and still represents a majority of AI-enabled synthetic content in the wild … The ramifications of deepfake pornography have only begun to be seen.”
It’s becoming increasingly difficult to distinguish real photos, video, and audio from deepfakes. What would you do if you suspected you may be the target of a manipulative deepfake attack by cybercriminals? How can you verify information you receive before falling prey to these high-tech social engineering tactics? We asked cybersecurity professional W. Dean Freeman and international risk management expert David Roy to weigh in on this complex attack.
The Scenario
Situation Type
Targeted by cybercriminals
Your Crew
Yourself
Location
Seattle, Washington
Season
Winter
Weather
Cloudy; high 47 degrees F, low 38 degrees F
The Setup
You’re the head IT guy at a family owned business near Seattle. Most of the time, your job duties consist of basic tech support and PC troubleshooting for the company’s 23 employees. Your employer deals with various vendors overseas, so you’re used to getting messages at odd hours with not-so-good English. Aside from a few obvious Nigerian prince scam emails and run-of-the-mill malware, the company hasn’t experienced any substantial cybersecurity threats in the past, but you’ve always tried to maintain good security protocols regardless.
The Complication
On a Tuesday afternoon, you get a panicked phone call from Susan, the owner of the company. She says her brother Dan, who is currently on a business trip to visit suppliers throughout Eastern Europe, sent her a video message a few minutes ago. In the video, he explained that one of the company’s key suppliers is owed a substantial amount of money and is demanding immediate payment. Supposedly, if they don’t receive the payment within the next few hours, they’ll switch to an exclusive partnership with your biggest competitor. Susan knows this would be catastrophic and might even cause the company to go out of business.
She tells you she immediately tried to call Dan back and called the supplier, but neither one is picking up — cell phone coverage isn’t the best in that country, and it’s outside normal business hours. She’s considering sending money to the indicated account, since she’s absolutely certain that the person in the video was her brother. It sounded and looked just like him, and he appeared to have knowledge about the business and its suppliers.
However, she wants to know if you have any ways to verify the video first. What methods or tools can you use to check the legitimacy of the video message and its sender? If you determine it’s a deepfake, what other steps should you take to protect the business (and its owners) from similar cyberattacks in the future?
Cybersecurity Professional W. Dean Freeman’s Approach
Alright, so I’m either facing the impending financial destruction of my employer, or an extremely sophisticated threat actor, and I need to figure out which one it is fast. Two out of the three outcomes here have me looking for a new job soon if I don’t stay on top of this. Luckily, I’m pretty good at what I do, if I do say so myself, and I’ve seen similar threats before. Just because there might be a new technology at play here doesn’t really change most of the fundamentals.
First, let’s think through the possible situations:
This is a legitimate, albeit unusual and concerning request.
The video is illegitimate, created via a generative AI tool to produce a “deepfake.”
The video is genuine, but Dan’s under duress and this is a whole different type of crime (extortion and possibly kidnapping).
Each of these potential situations is going to have its own set of tells and its own incident response playbook, as well as some specific countermeasures. They also share some preparatory mitigations in common.
Preparation
So, whenever employees, especially key staff or executives travel, the risk of data breaches resulting in intellectual property theft go way up, and depending on the region of travel and the industry you’re in, the threat varies. Knowing this, I’ve coached Dan and others on the following:
Never leave electronic devices unattended, not even in hotel rooms.
When crossing borders, always bring clean devices. Don’t take confidential company information through customs checkpoints.
Always use the company VPN when traveling, and make sure to use the full tunnel profile, not split tunnels. When traveling, there’s no such thing as trusted network access, even at a customer site.
Be aware of anyone you meet in hotels, bars, etc. who seems particularly interested in what you do for a living.
Make sure you have the highest privacy settings on personal social media accounts, and be careful what you post, especially regarding the company.
To varying degrees, I’ve also tried to lock down services such as email, such that users either have to be on the local network or VPN to send and receive their company email, and am leveraging defense in depth techniques, using proven technologies, for endpoint and network security, as well as access to cloud-based applications. While nothing is foolproof, the cost of attacking the network is much higher than it used to be when I first started at this job.
I’ve also prepared myself to identify and counter new and emerging threats, through self-study and formal classes. I stay on top of the state of the art in my craft so that I continue to be an asset, but also understand that it’s an arms race, and the momentum is generally with the attackers.
About: Nothing about this image is real. It was created using the free AI image generation tool PlaygroundAI.com in less than 30 seconds. The site also allows users to upload images to give the AI “inspiration.”
On-Site
Now that I’m on the phone with Susan, we have a potential catastrophe, and one where there isn’t necessarily a specific playbook yet. Luckily, it’s a small company with little red tape, but given the circumstances, it could have proved disastrous if she hadn’t called me and had just sent the money. It’s time to think fast, but think thoroughly.
To make sure I have my bases covered, I’m going to run through three parallel investigations: financial, traditional incident response, and also look specifically at the video to see if I can tell whether it’s genuine.
The financial investigation will go as follows:
Give the video a quick once-over and write down the account information.
Do a cursory lookup of the routing information to see where the bank is located and whether that provides any obvious red flags.
Check with the head of finance to see if she knows whether this is a bank (or even better, an account) that we’ve used associated with that partner before.
If the request is to a financial entity that’s known to us and the account is associated with the client, then that dramatically lowers the risk. It still doesn’t mean that the request is 100 percent genuine though.
The traditional forensic investigation will focus both on the email itself, specifically checking the header information to see where it truly originated from, as well as correlating that activity with logs from the company mail server and VPN. If it looks like Dan actually sent the email from his laptop, through the company server, then again, this reduces the chance that it’s false. If it comes from his personal email, that’d get my hackles up. If the mail headers are clearly forged, then we have multiple potential issues, and a deepfake is certainly a possibility.
So, the bank is in the same general region as the client but isn’t a bank that we’ve done business through before. We can’t know who the account belongs to at this time, so that’s a dead end but definitely suspicious. The email didn’t come through Dan’s corporate account, but did come from his personal Gmail account. The email was sent through Gmail. Dan’s apparently used his Gmail account to send a few messages to Susan recently, so she wouldn’t have thought that was unusual. At this point, I go ahead and disable Dan’s corporate accounts and make sure that he doesn’t have any access to company data.
Given these facts, it’s going to be important to review the video. The two major possibilities at this point are the video being a deepfake, or it being a genuine video and made under duress. The fact that Susan is Dan’s sister and is convinced the video is of Dan means it very well may well be a duress situation.
I have Susan pull a bunch of photos of Dan from social media and her cell phone and send them to me so I can bring them up on one monitor, while watching the video on another. Reviewing the video critically, I look for the following telltale signs that the video is a deepfake:
An overly shiny, waxy complexion to the skin.
Audio is out of sync with the movements of the mouth.
No blinking.
Eyes not moving in sync with each other (cross eyed, etc.).
Differences in the body, particularly the ears and limbs.
Any changes in speech patterns from what I and Susan know of Dan.
While lighting and other technical factors could produce the appearance of waxy skin or out-of-sync audio in a genuine video, the biometric factors are going to be the major giveaway. This is because of how deepfake videos are generally produced.
Feeding the generative AI with still images to produce the likeness tends to result in deepfake videos where the eyes don’t blink at all, which is generally unnatural for people. Additionally, the computer has a hard time lining up both eyes toward the same focal point when trying to adjust for movement, so if Dan appears cross-eyed in the video but is known not to be in real life, that’d be a good indicator as well.
Most deepfakes are made by applying an extruded face image onto a live actor. Often, the angles are hard to make for the computer and the human driving the production, so the AI won’t overlay on top of the ears, hands, etc. Because of this, I pay very close attention to any differences in Dan’s ears in the video from what I can see in the known photos of him I have available.
Because Dan often represents the company in public events, there’s ample opportunity for fraudsters to collect voice samples to synthesize is voice, but since any potential attackers are likely neither native English speakers, nor are they American from our region, there very well may be differences in speech cadence, grammar, and word selection that indicate that the voice is “reading” a script and isn’t actually Dan talking.
After identifying the potential indicators, I also review the video metadata to see if I can gain any insight into when and where it was recorded and on what device. Any mismatch between where Dan is and what type of phone he has will confirm that the video is fake.
About: Using voice samples collected from social media and other public sources, AI can recreate any human voice and use it to read a given script.
Crisis
We have enough evidence at this point to know the request is fake, and that Dan’s personal Gmail has been compromised. I’ve already disabled Dan’s account but will need to make a more thorough DFIR (Data Forensics and Incident Response) investigation into the network to see if any corporate data may have been compromised.
I convince Susan not to make the payment, but she’s still very shaken up. We’re almost certain the video is fake due to biometric mismatches that she didn’t catch at first — watching on her phone in a panic — which means he’s probably not kidnapped, but he’s still out of pocket and his status is unknown. Due to tensions in the region, we’re still worried.
At this point, we have multiple priorities, one being getting ahold of Dan. I have Susan call the U.S. Embassy in the country where Dan is and report that he may be the victim of a crime and ask to be put in touch with the relevant authorities. Additionally, we’ll still continue to try contacting Dan directly, and through the hotel, as well as any business associates at the vendor.
To help tie up loose ends on the cyber side, I’d likely reach out to industry contacts at relevant companies, as well as contacts made through the FBI’s InfraGard program. I may still have to fill out the paperwork, but friends and associates can help get the answer faster.
Final Thoughts
Deepfakes are a major issue, particularly as an information warfare weapon, and have societal level impact. As a tool for cybercrime, they’re basically just a particularly nasty tool in the phisherman’s toolkit. Like all cyber and information weapons, there’s a red team/blue team arms race for generative AI and the detection of its output. Luckily, AI still doesn’t beat actual intelligence, so long as you properly apply it.
In my opinion, defenders, whether professional incident response staff, or the average person who may be subject to an AI-fueled crime attempt, are best served by approaching the issue with strong critical thinking skills and a healthy dose of skepticism (the same mental tools that’ll help you ferret out “fake news” or determine if you’re being targeted for a “grandkid” phone scam).
Following defined DFIR protocols will help give you additional context within which to evaluate the media, in addition to looking for the “tells.”
Of course, prevention is worth an ounce of cure. So, what are some things that could’ve prevented this scenario from unfolding the way it did?
First of all, just like protecting against facial recognition, limiting the amount of data about you (photos, video, voice) that can be used to generate fakes is important.
Second, limit the crossover between personal and business IT systems. Your name probably isn’t Hillary, so eventually it’ll catch up to you.
Third, establish protocols with your organization or family for how requests like money transfers would be made, such as having key phrases or “safe words” that need to be present to authenticate the request. Treat any request that deviates from protocol or isn’t authenticated as illegitimate until proven otherwise.
Lastly, if you work for an organization that has the budget, seeking out tools designed for identifying deepfakes and starting to train models based on high-profile members of your organization, such as C-level executives, is worth exploring. The sooner you have those systems and models in place before an incident, the more useful they’ll be if there is one.
Risk Management Expert David Roy’s Approach
Preparation
In this scenario, the business owner is between a rock and a hard place, as deepfakes are becoming commonplace as a method of social engineering. However, there are still prudent steps in preparing for this type of situation. First, any person doing business internationally should be aware of the inherent risks this presents by default. Regardless of your business vertical, understanding how to work in high-risk places, particularly developing nations, and places where bribery and corruption are rampant is important.
You may face scenarios like this via subcontractors and supply chain partners, so it’s prudent to have diligence on your downstream operations, the financial status of your partners, and awareness of geopolitical risks presented in each region where you operate, especially those around personnel and information security.
Educating international travelers about information security best practices is critical to the success of operational security. These practices are a good start: ensuring that data-blocking phone chargers (sometimes called “USB condoms”) are being used in order to prevent data theft, swapping mobile devices (such as cell phones and laptops) for those that don’t contain proprietary company data before leaving the U.S., and performing general security awareness training with all staff annually.
But even with all of the cool tech in the world, you can’t remediate or patch a human — they’re an organization’s largest information security vulnerability. For this, you can only drill, train, and reinforce the importance of identifying social engineering, phishing, data mining threats, physical threats to obtain sensitive information, and the most difficult, resisting bribes (of all kinds).
To enhance operational security, additional levels of personnel validation should also be in place. Code words for team members or projects should be used for identity verification. However, these should be codes that are not stored electronically in the case of a data breach; instead, choose codes that will be easy to remember for the end users even in stressful situations. Other unique personnel identifiers such as authentication tools can also be used (such as one-time keys and codes from encryption devices).
All of the aforementioned methods are low cost and can be easily executed by an organization of any size, but of course, there are much more robust methods for businesses that do a higher volume of international travel. These methods include utilizing satellite communications for conferences, private international transport, and coordinating with local U.S. intelligence resources in host countries ahead of critical meetings (for organizations doing work on behalf of the U.S. government). Like most things, your risk mitigation capability is commensurate to the amount of cash you want to spend.
Above: Senior citizens are often the target of cyberattacks, since they tend to be less tech-savvy than younger people. It’s a good idea to discuss common forms of phishing and social engineering with your older family members and colleagues.
On-Site
The most intriguing part of the deepfake and AI craze might just be its mystery. Being able to tell fact from fiction quickly enough to make an important judgment is a challenge, and until this key piece is figured out, the risk will only become greater. Being able to disprove an AI-generated deepfake by validating identity (especially during an information breach) may end up being impossible in the case of a threat actor controlling an information systems environment.
In this situation, identity validation is key — assuming this method isn’t compromised as part of the communication breach. For organizations, and more commonly, individuals who don’t have access to software that can break down metadata, file structure, or other code that compiles a video, there are some easy methods that can at least begin to let a user understand if a video, photo, or other method of communication is faked.
Most importantly, one can start with simple geography. In the scenario, Susan is expecting a communication from Eastern Europe, however, if the deepfake video has clues that the subject appears to be in a place completely removed from the expected region, this might be an easy step in the process of elimination. Follow-up communications (if successful) can aid in understanding the origin. If this isn’t possible, or helpful, human and emotional intelligence can be used, as long as the person evaluating the suspected deepfake has familiarity with the person in question.
Voice cues, such as stuttering, tone, inflection, accent, and cadence of speech can be used along with physical cues such as blinking, general eye/pupil movement, breathing, and how facial movement aligns with voice tone and emotion. These items, mixed with any other communications received (such as texts, emails, voicemails, etc.) can be evaluated as a whole to determine if you are dealing with a malicious actor, versus a colleague that wants to relay important information with spotty cell and data coverage.
In a perfect world, the organization should train all personnel on security awareness so they can identify malicious actors, but also so they can differentiate themselves from those criminals when communicating with coworkers across the world. In many cases, cultures, translation tools, and the phrases/words we use can appear “non-standard” to international colleagues, and in turn, look somewhat suspicious. But if everyone is on the same page, and ensures clear communication methods are in place, this reduces the risk of misinterpretation.
Crisis Management
As terrifying as it might seem (and unreal, despite Liam Neeson movies), business travelers do get abducted overseas. Understanding the reality of this, and how to prepare is enough to fill an entire handbook, but there are a few ways to prepare. First, avoid places where this happens — business travelers (especially Americans) working for large multinationals are the most commonly kidnapped and most valuable. This commonly occurs in places like Iraq, Colombia, Mexico, Yemen, and various parts of Northern Africa.
That said, knowing where your personnel are at all times helps. Many international cellular services now offer satellite mobile device tracking for cell phones, laptops, and geotags for international travelers. This isn’t only intended for safety, but also for purposes of compliance with U.S. export regulations — a nice complement to both safety and operational security. This can help pinpoint if your colleagues are out of place, or exactly where they should be, when they should be there.
If you suspect your colleague has been kidnapped, most importantly, avoid contacting local police (odds are, they might be in on it). Contact your embassy, your insurance company (more on that later), and any additional resources that might assist in evidence collection or ransom extraction. With that in mind, having insurance helps. Rescue, kidnapping, and extortion insurance can carry millions of dollars in coverage — enough to make nasty threat actors hand over your colleague. In conjunction, an organization of any size these days should also have cyber insurance that covers data breach, ransomware, data theft, and eraserware events.
Make sure to preserve any (deepfake or not) information that has been provided from your suspected kidnapped colleague and be ready to provide information that could assist in locating them. In most cases, U.S. Federal agencies (mostly the FBI) and the State Department will have much more sophisticated tech to determine the validity of information you’ve been provided. Once you’ve quickly done all of this, it might be worth a heads up to other folks in your company traveling OCONUS to halt any additional travel and return home asap.
Above: Deepfake technology can learn a face from existing photos and videos, then superimpose it onto a live actor’s body. It can also generate new faces from scratch based on common facial features and parameters.
Final Thoughts
All things considered, this would be a pretty difficult scenario for an organization of any size. However, implementing and executing basic principles of personnel and operational security, paired with a process-driven international travel safety approach can go a long way. Effective communication methods with planned touchpoints, code words/obfuscation of information, and general information security best practices can be the difference between a deepfake compromising a business and resulting in an expensive wire transfer to an unsavory character, or a normal chaotic day at the office.
It’s important to remember that these attacks hit close to home as well. Deepfake phone calls threatening harm to a family member unless a ransom is paid or impersonating debt collectors for a known financial strain that was discovered through a stolen identity are becoming more commonplace. These types of events are draining ordinary people dry just because of a simple scam that a teenager can pull off with limited technology. To combat this, implementing “home-based” security awareness for your household members is good practice. In most cases, these sorts of targeted attacks focus on the elderly or individuals who have a history of financial hardship, as they become vulnerable and easily exploited targets for threat actors.
Considering all of the factors at play, the human element emerges as the most important. Awareness, intelligence, and critical decision making are paramount in being able to identify any sort of deepfake and justifying an appropriate response. With this exploit increasing in volume every day, preparedness and a proactive approach mean everything.
Conclusion
In September 2022, multinational cybersecurity firm Trend Micro released a report that stated, “The growing appearance of deepfake attacks is significantly reshaping the threat landscape for organizations, financial institutions, celebrities, political figures, and even ordinary people.” It continued, “The security implications of deepfake technology and attacks that employ it are real and damaging.
As we have demonstrated, it is not only organizations and C-level executives that are potential victims of these attacks but also ordinary individuals. Given the wide availability of the necessary tools and services, these techniques are accessible to less technically sophisticated attackers and groups, meaning that malicious actions could be executed at scale.” We’d recommend anyone interested in this topic read the full report — search for “How Underground Groups Use Stolen Identities and Deepfakes” on TrendMicro.com.
The report concludes with several recommendations for users concerned about deepfake attacks. Individuals should use multi-factor authentication for online accounts, set up logins based on biometric patterns that are less exposed to the public (e.g. irises and fingerprints) rather than simple facial recognition, and limit exposure of high-quality personal images and videos on social media.
Remember that every selfie, video, or audio clip you post can be fed into AI deepfake tools. The less data the bad guys have access to, the less accurate their fakes will be. For businesses, Trend Micro recommends authenticating each user/employee by three basic factors: something the user has (like a physical key), something the user knows (like a password), and something the user is (biometrics). Each factor should be chosen wisely based on analysis of the criminal threat landscape.
Meet Our Panel
W. Dean Freeman
W. Dean Freeman, CISSP-ISSEP CSSLP C|OSINT is a veteran of the cybersecurity industry with over 15 years of professional experience ranging from threat intelligence to systems security engineering, and over 25 years of hobbyist experience in related domains. He’s a regular contributor to RECOIL OFFGRID magazine, and his writings on preparedness and self-defense topics have, or will, appear in other publications as well. He lives with his family in central Texas.
David Roy
David Roy (a pseudonym, as required by his line of work) is a global risk management and information security executive at a multinational technology firm and specializes in critical infrastructure security. He has worked in this space for well over a decade and holds multiple industry certifications in information security, with an educational background in geopolitics and risk management. He has worked in both the private and public sector during his career, and has extensive experience working across North America, Europe, the Middle East, and Southeast Asia.
Read More
Subscribe to Recoil Offgrid's free newsletter for more content like this.
In the ever-evolving world of survival and preparedness, the wisdom of experience often provides the most valuable insights. For this reason, we've tapped into our community of avid readers as a resource for survival knowledge, and are sharing tips that stand out for their simplicity and effectiveness. This Readers' Survival Tip comes from the home of NASCAR, and may get you into trouble if you decide to try it at the office.
Readers' Bio
Name/Alias: Kyle.Goes.Wild
Location: Northeast Indiana
Age: 40
Above: Kyle.Goes.Wild lights the tip of a marker on fire with sparks from a ferro rod.
Kyle.Goes.Wilds‘ Readers Survival Tip
Sharpie Markers can catch a spark from a ferro rod. Aim your ferro rod close to the open felt tip of the sharpie marker and use the pump technique to shower the tip with as much sparks as possible. Continue until the felt lights and you can use it light your fire.
Above: The marker is lit like a candle, and can be used as a tool to get a larger fire going.
Want to see your own survival tip featured in our publications? Simply fill out the form here: Share Your Survival Tips
We are looking for your best tips, tactics and techniques to share with our audience! You do not need to be a survival expert to share with us, simply share any tip you find handy, useful or interesting.
Read More
Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.
Welcome back to our dive into the world of gear! In this edition of Gear Up, we explore the latest innovations and reliable classics that are key to staying prepared for any challenge. From cutting-edge technology to time-tested tools, our focus is on equipping you with insights and information that keep you one step ahead wherever the journey of life may take you. Whether you're bracing for the unknown or fine-tuning your preparedness kit, join us as we unpack the must-haves for this month.
Forloh Women’s ThermoNeutral Down Jacket
NOTES
The Women’s ThermoNeutral Down Jacket by Forloh sets a high bar when it comes to staying warm and agile in unpredictable conditions. This jacket is designed for those who don’t want to compromise on comfort or functionality. Its ThermoNeutral technology means this isn’t your average down jacket; it’s engineered to adapt to your body’s heat, providing optimal insulation whether you’re on the move or sitting still. The jacket comes in various sizes and several eye-catching colors. But it’s not just about aesthetics; the Deep Cover variant offers a camo pattern that can help you blend into natural surroundings, while the solid black is a versatile choice for any setting. Weighing between 13 to 21 ounces depending on the size, this jacket won’t weigh you down and makes it a good choice for those who need to pack light but still want a reliable layer of warmth.
COLORS
Black, Deep Cover, Exposed, Forloh Green, Magnet, Snowfall
Say hello to MPowerd’s AA USB Rechargeable Batteries, the eco-conscious power source you didn’t know you needed. These aren’t your run-of-the-mill batteries; they’re integrated, reusable, and cable-free. When they run out of juice, just pop them into a USB charging port, and they’re good to go in 1 to 2 hours. No more hunting for a store to buy conventional batteries, and no more waste piling up in landfills. With a 1200mAh capacity and 1.5V output, these batteries are versatile, powering everything from remote controls and video game controllers to baby monitors and headlamps. They’re a perfect fit for both tech-savvy city dwellers and off-the-grid adventurers. Rather than worrying about your flashlight dying on you during a blackout or your GPS running out of power while exploring the great outdoors, give more thought to the batteries you choose. What sets these apart is their longevity — they can be recharged over 1,000 times. That’s not just cost-effective; it’s a nod to sustainability.
Meet the Fire Flute, a versatile tool when it comes to outdoor readiness. This gadget is about the size of a standard Sharpie marker, making it a convenient addition to your pocket or backpack. Crafted from sturdy aluminum, it weighs a mere 1.7 ounces but offers a trio of essential features. First up is a powerful 120dB whistle, loud enough to alert anyone within earshot. Whether you’re lost in the woods or need to signal for help, this whistle ensures you’ll be heard. Next, the Fire Flute houses a water-tight compartment designed to store combustible fire tabs. These slow-burning tabs are included in the packaging and can be a game-changer when you need to get a fire going quickly. The other end of the Fire Flute features a replaceable ferrocerium rod. Paired with an integrated hardened striker plate, it throws large sparks to ignite your campfire or stove effortlessly. The device even comes with an attached pocket clip and a lanyard hole for multiple carrying options.
Step into the T8 Athena boots by Garmont and you’re stepping into a world of tactical innovation designed specifically for women. Crafted with a suede leather upper and polyester fabric, these boots offer increased arch support and a slightly raised heel, catering to women’s shorter Achilles tendon, ensuring you’re comfortable and stable whether you’re navigating rocky terrain or city streets. The dual-density EVA midsole is all about comfort and shock absorption. The Garmont Traction Formula Diamante outsole is engineered with specialized climbing and braking zones, providing stability on various surfaces. Weighing in at just 13.7 ounces per boot in size 7 US, these boots are AR 670-1 compliant, making them a reliable choice for those in the Armed Forces.
Introducing the Signature LRF 10×42 binoculars by Burris Optics, a serious upgrade for serious observers. With ultra-sharp HD glass, you get a crystal-clear view of your surroundings, making it easier to spot game, potential hazards, or resources. The device offers fast and precise ranging from 5 to 2,600 yards, ensuring you can measure distances with pinpoint accuracy. What sets this apart from other range finding binos is that it comes with three versatile ranging modes: Auto, Sport, and Hunt, allowing you to adapt to different scenarios. You can choose to see distances as line-of-sight or horizontal, complete with angles of degree, giving you a comprehensive understanding of your environment. The outer surfaces are rubber-armored, providing both protection and a secure grip. It’s also tripod adaptable, freeing your hands for other tasks. The adjustable eyepiece ensures you won’t miss a thing, and it operates in temperatures ranging from 5 to 131 degrees F. Powered by a single CR2 lithium battery, it boasts a battery life of over 2,000 measurements.
Whether you’re camping, tailgating, or spending a day at the beach, a portable fridge packed with cold food and drinks makes any outing more enjoyable — no ice required. However, any time your vehicle’s engine isn’t running, you’ll need an auxiliary power source. Dometic makes some of the best portable fridges on the market, so it was natural for the company to create a matching portable power solution. The PLB40 is a compact Lithium Iron Phosphate (LiFePO4) battery with a 40 Amp-hour/512 Watt-hour capacity — enough to keep a CFX 40W fridge powered for about 40 hours. Many portable power stations could double as boat anchors, but not this one; its square footprint, ergonomic carry handle, and 16-pound weight make it easy to transport. Output ports include standard 12V DC, locking two-pin 12V DC (for securely connecting Dometic fridges), and two USB ports. The PLB40 can be recharged via 12V DC from your vehicle, an AC wall charger, or a solar panel. A large LCD screen makes it easy to see the battery’s charge percentage and status.
Bear & Son Cutlery Sideliner w/Reverse Tanto Blade & Glass Breaker
NOTES
Bear & Son Cutlery’s 4.5-inch Black Aluminum Sideliner (BE127) is a versatile tool that’s more than just a knife. With an 8-inch open length and a 3.5-inch blade made from 440 stainless steel, this knife is built for everyday use. The black aluminum handle offers a sleek design that fits comfortably in your hand, ensuring a firm grip. One of its standout features is the ball bearing washers, which allow for rapid blade deployment at the push of a trigger, an action that can be crucial when you need to react fast. The knife also comes with a stainless steel sideliner lock, ensuring the blade stays in place when in use and is easy to close when you’re done. It also features a glass breaker, making it a multifunctional tool that can help you get out of tight spots. Additionally, the knife has a metal pocket clip and a lanyard spacer for secure fastening and storage, offering quick access and multiple carrying options.
When it comes to being prepared for the unexpected, the TA30C Tactical Flashlight offers more than illumination. Not just a flashlight; it’s a multifunctional tool designed to keep you one step ahead. With one-step-strobe technology, a simple tap gives you momentary light, while a heavy press activates a tactical strobe. This feature can disorient potential threats or can be used for quickly drawing the attention of passersby during an emergency. The lens is coated, tempered glass that ensures maximum light transmission and durability. The edges of the flashlight are embedded with super-hard ceramic strike tips that can be used to break glass or as a self-defense mechanism. Though not included, there’s a specially designed accessory called the FR-1 tactical flashlight ring. This add-on provides more versatile usage, whether you’re navigating through a power outage at home or finding your way in the great outdoors.
Jase Case could be a must-have for those who want to be prepared for the unexpected. This all-in-one kit comes packed with five essential antibiotics that can treat a wide range of infections, from pneumonia and bladder infections to wound complications. The medications included are Amoxicillin-Clavulanate, Azithromycin, Ciprofloxacin, Doxycycline, and Metronidazole, each carefully selected for their efficacy and safety. But it’s not just about the meds; the Jase Case offers a holistic approach to self-care. It starts with an online evaluation by a board-certified physician, ensuring that the antibiotics are appropriate for you. Once approved, the kit is delivered straight to your doorstep, eliminating the need for multiple pharmacy trips. The package also includes an Antibiotic Guide written by medical experts, giving you the confidence to use the medications effectively. Whether you’re an adventurer far from civilization or someone who wants peace of mind during supply chain disruptions, this kit empowers you to take control of your health.
Ready to elevate your outdoor experience? Meet the VSSL Insulated Flask + Speaker, a unique item for those who love to venture into the wild or simply chill in their backyard. Crafted from durable 18/8 stainless steel, this flask offers double-walled insulation to keep your drinks at the perfect temperature — cold for 10 hours and hot for 5. It also comes with a fully integrated, weatherproof Bluetooth speaker to add a soundtrack to your adventures. The flask features a patented pop-up drinking cap that doubles as a carabiner, making it super easy to clip onto your gear. Plus, the cap is leak-proof, ensuring you won’t lose a drop of your precious beverage. The locking carabiner top adds an extra layer of security, so you can focus on the journey ahead. What sets this flask apart is its multi-functionality. Not only does it keep your drink just the way you like it, but it also provides up to 5 hours of music playtime.
Guzzle H2O’s Stream is like the Swiss Army knife of water purification systems. Imagine you’re out camping near a creek or maybe you’re at a campground that has questionable water quality. This gadget is your go-to for clean, great-tasting water. With just a push of a button, it pumps, filters, and purifies water from any fresh water source at a rate of about 0.75 gallon per minute, processing up to 35 gallons on a single charge. It uses LED UV-C purification, which is third-party tested to inactivate 99.99 percent of bacteria, protozoa, and viruses. Plus, it has a 0.5-micron activated carbon block filtration system that’s effective at reducing sediment, unpleasant taste, and odor. The unit is also rechargeable and has a high-capacity LiFePO4 battery. It’s even waterproof with an IP67 rating, so no worries if it takes a little dip. Whether you’re an overlander who loves remote settings, or a family camper tired of your kids complaining about “icky” water, this system has got you covered. It’s versatile, portable, and perfect for those who want to be ready for whatever life throws at them.
Body Guard Armored Backpacks First Responder Bulletproof Backpack Level 3A Kit
NOTES
The First Responder Bulletproof Backpack is a discreet way to carry personal protection on the go. Designed to be both tactical and practical, this backpack has multiple compartments with a 40-liter capacity and webbing for MOLLE-compatible accessories. But what sets it apart is its patented deployment system that offers instant front and back armor protection without the need to fumble for a handle. Just pull up on the Velcro shoulder straps, and your vitals will be covered with this kit’s included 11×14-inch front and 16×12-inch rear Level 3A soft armor inserts. With soft armor, it weighs just 7 pounds. The pack’s Concealment Chamber keeps its protective nature discreet until the armor is deployed, and the Stay-Put armor system secures the front protection in place with ease. Body Guard also offers the pack with Level 3+ hard armor plates for rifle-caliber protection ($1,047) or as a stand-alone backpack ($499), which you can use with your armor of choice. This backpack is a robust, adaptable, and discreet way to stay ready for anything.
Ever since the aptly named Little Badger was released by Chiappa, it’s been highly regarded as a field, youth, and survival rifle. And it isn’t hard to see why. Regarding the end of the world as we know it — no, you won’t beat back totalitarian governments, nor hoards of zombies, with a wee single-shot .22LR. But when it comes to the backwoods it’s right at home.
At under 3 pounds with a street price south of $200, the Chiappa Little Badger is an appealing choice. It comes equipped with military-style peep sights that any serviceman will be intimately familiar with, and a rather decent (but not great) trigger. While we found the factory sights to be more than adequate for our purposes, many have taken it upon themselves to file the front sight thinner to obtain a more refined aiming point.
There are four removable Picatinny rails that serve as a handguard and a place to mount a small optic, if one so desires. Note that the panels themselves are polymer and therefore unlikely to hold any sort of hard zero with an optic.
The skeletonized buttstock features an integral round holder for those who wish to utilize it (we didn’t). And there are a number of factory accessories available, such as hammer extenders, buttstock pouches, pistol grips, and carrying cases.
But we did things a little differently.
As opposed to trying to cobble together an all-around survival rifle as so many have done, outfitting their Little Badgers with all manner of fishing gear, paracord, fire supplies, and compasses, we took a specific approach. Our Chiappa Little Badger would be a dedicated small game getter. A dinner maker or grocery shopper, if you will.
Stocking Up
Because we set up our Little Badger as a dedicated small game getter, we wanted everything to be in a single package. The integral shell holder not only exposes ammunition to the elements, it’s not very efficient. A pouch would be a better choice for us.
Chiappa has its own buttstock pouch, but we found it clunky. Many people mount pouches on the stock (surplus pistol magazine pouches are popular), and we did the same. An M16 cleaning kit bag we scored for $3 at a local surplus store would be the base.
As it is, the cleaning kit pouch was longer than we liked, so we broke out the needle and thread, along with an eyelet punch.
After we shortened the pouch and pounded the eyelets in place, we mounted our new stock pouch with zip ties. That provided a dedicated place to hold a considerable amount of ammunition.
A Wilmont Knives K23 small fixed blade was also attached to the stock in the same manner, allowing us to gut and skin game immediately if need be.
Making it Smaller
Though the Little Badger already has a small footprint when folded, making roughly a 17×8-inch base triangle, we wanted to reduce it even further. The first thing we did was remove the lower Picatinny rail from the barrel. Not only were we not using it, but the removal allows the Little Badger to fold slightly smaller.
But we weren’t totally satisfied by this and wanted to go smaller still.
To accomplish this, we broke the Badger down into two separate pieces rather than simply folding it. The factory screw itself is easy to remove, but we wanted something even easier. Initially we installed a thumbscrew in place of the factory bolt, but not only was it a bit cumbersome, it also added an additional part to possibly lose.
A 1-inch, 5⁄16 diameter hitch pin is a perfect fit. Not only can the rifle be broken down or assembled very quickly, the split ring on the end can be dummy corded to the rifle. While ours is still in the white, a spray or two of Krylon would quickly change that.
Of course, now that the Little Badger was in two pieces, we needed an efficient way to package the barrel and action together. We removed one screw from the rear right of the receiver to install our custom barrel bracket.
Staying true to our cheap and readily available theme, a ½-inch cable runner from the hardware store worked very well for this purpose. We took the additional steps of hitting it with heat gun to make it pliable to allow the barrel to fit a scootch more snugly. A wrap of electrical tape around the barrel of the Badger helped to increase the friction fit, but wasn't strictly necessary.
The combination of the barrel holder and a thick rubber band — one of those cause bracelets — makes for a small package indeed (that’s what she said?). How small? Damn small. Just around 17 inches long and a mere 4.5 inches in width at the widest point.
Having the Little Badger in two pieces does make it slower to employ, but this isn’t a defensive rifle — it’s an augment.
Shooting Fast
Since the Badger is a single-shot break action, you won't set any record split times, but that doesn’t mean we shouldn’t be as efficient as possible. The sheer nature of a single-shot rifle means that you need to be as accurate as possible, but we’re all human. While the Little Badger has a round carrier on the buttstock, it isn’t super fast to reload from, nor does it do anything to protect your ammo from the elements.
Stealing a concept from precision rifle competitions, we made our own quick-load point. Using elastic, a small piece of webbing, Velcro, and a needle and thread, we made a removable three-round holder. We placed it directly next to the action for the fastest-loading possible (left side for right-handers, and the reverse for the statistically insignificant left-handed crowd). It was important to place it on the trigger portion of the Little Badger rather than on the swinging-barrel portion to ensure reloads would be as fast as possible.
Ideally, the first shot would be loaded from ammunition storage, giving you four rounds on tap as you track down dinner.
Quiet Time
Full power .22LR isn’t terribly loud, and subsonic is quieter. To be very quiet, CB Caps can be used. These only use the power of the primer to propel the round. And of course, there are always silencers.
The Chiappa Little Badger comes threaded in ½x28mm, though you have to remove the glued-on plastic muzzle protector to get to it. A multitool made quick work of it, and a quick brush with some acetone removed the adhesive.
For a tiny silencer, we turned to Bowers and their new Bitty. The Bitty is only 2.8 inches long, weighing a paltry 2.6 ounces. Normally we’d just set it and forget it, but even though it’s small, we wanted to keep the pack size of our Badger to a minimum. To that end, a Gemtech 22QDA was installed, allowing the Bitty to be attached or removed in mere seconds.
The combination of the closed action of the Badger, Gemtech subsonic ammunition, and the Bowers Bitty resulted in a rifle so quiet it caused giggles the entire first day we used it. The round hitting the brush behind our targets 100 yards away was significantly louder than the report of the rifle itself.
On the Range
Recoil is nothing to speak of, nor is the report of the rifle (especially suppressed). While groupings at 100 yards were more of the “pie plate” variety, within 25 or 30 yards this is a damn near “can’t miss” rifle for small game. Squirrels, rats, and other critters a bit larger will quickly all lay dead at your feet, provided you’ve even a modicum of experience shooting a rifle.
Loose Rounds
It’s incumbent upon us to say that you should absolutely not dry-fire the Little Badger. While that’s good advice for damn near any .22LR weapon, dry-firing this rifle makes rounds very hard or impossible to extract due to chamber deformation. Thankfully, this is an easy fix if you have access to a round file, but is best avoided entirely.
As previously mentioned, we feel the Chiappa Little Badger should be an augment to your main fighting guns rather than a replacement. Keep your AR or AK defending against human threats, but that Little Badger will excel at keeping your stomach full.
Survivalists have a definite “thing” for big sticks. Caught in an unexpected situation, one of their first orders of business is to find or cut a large stick that can serve as a hiking staff, club, fishing pole, or even a spear. Beyond those specific functions, a big chunk of wood is also just a comforting thing to have when you’re facing the unknown.
No matter how creative you are, though, a stick plucked from nature is still only a stick. While it can certainly help you keep your balance on uneven terrain and give you a fighting chance against both two- and four-legged predators, its résumé pretty much ends there. To wring more function out of it, you need a better, “purpose-designed” stick like the Crawford Survival Staff.
As the brainchild of legendary custom knifemakers Pat Crawford and his son Wes, at first glance, the Survival Staff appears to be nothing more than a high-quality hiking staff made from aluminum instead of wood. In reality, it’s an incredibly versatile, completely modular survival system that offers functionality far beyond a humble stick.
Survival Staff Basics
Pat Crawford developed the original Survival Staff nearly 30 years ago and its brilliantly simple design is still unrivaled in today’s market. Hand-crafted one at a time from hardened, black-anodized aluminum, it consists of a two-piece body, a steel point, an aluminum handle and cap, a 440C stainless steel blade, a rubber crutch tip, and a soft rubber grip. When all these parts are assembled together, they yield a 57-inch hiking staff that conceals the 440C stainless steel blade within the upper section like a sword cane. The bottom section, provides on-board storage space for survival supplies and accessories — as well as other unique functions (more on that shortly). The real genius of the design, however, comes through when you start mixing and matching all those parts.
Meticulously machined threads at the ends of the various components of the staff allow them to be rearranged and screwed together in different configurations. Unscrew the handle, remove the blade, and replace the handle cap with it and the staff becomes an instant spear. Remove the top section of the staff and screw the handle into the lower tube to create a 38-inch walking cane for urban environments. Detach the handle and upper tube from the lower tube and you’ve got a skull-busting 24-inch baton/swagger stick and a fully functional 33 3/8-inch blowgun.
This group was shot from 7 yards. Small game beware.
All the screw-together joints of the Survival Staff feature O-ring seals that keep the parts from working loose and ensure that everything remains watertight. The screw engagement of all the parts is also extremely robust and ensures impressive strength in every joint. Strategically placed knurling provides non-slip surfaces on all key areas and makes assembly and disassembly of the parts a breeze without the need for tools.
In its basic configuration, the Survival Staff is a seriously stout hiking staff that also makes a kick-ass impact weapon. Although its on-board blade’s narrow profile and thick grind don’t make it a full-service survival knife, it still provides impressive cutting capability for most chores. When mounted as a spear blade, it’s also far more robust than the typical “lash-a-knife-to-a-stick” survival spear and can be assembled that way in under a minute. Although it’s not recommended as a throwing weapon, as a stabber, it’s very formidable.
Because the tube sections are joined by a solid threaded coupling, they cannot be used together as a blowgun; the longer lower section works best. Its .61-caliber bore is polished smooth to reduce friction and sized to accommodate modified .625-caliber commercial darts now manufactured by Cold Steel. Made from heavy steel nails with injection-molded plastic cones, these darts, in conjunction with the staff’s large bore size, are the most efficient way of maximizing ballistic performance in a short-barreled blowgun.
Within reason, a larger bore allows you to get more breath into the blowgun’s tube faster, generating more power and velocity. Smaller tubes (.38 and .40-caliber) compress your breath, but often fail to harness all of it. Blowgun bores of .50 to .625 are the real sweet spot, especially with heavier darts that hit with greater authority. If your stalking skills are good enough to get you close to small, tasty animals, the Survival Staff’s blowgun can help you stay well fed. You can also store up to eight 4 3/8-inch darts in the staff’s lower tube.
We tested the Survival Staff’s spear on a foam mannequin. The blade penetrated completely with very little effort.
The Dave Canterbury Package
The Survival Staff’s LEGO-like modular design has made it a favorite of serious survivalists for decades. It has also sparked countless ideas for other components and bolt-on parts that make it even more versatile. When noted survivalist Dave Canterbury got his hands on one a few years ago, he not only loved it, but began designing additional components for it.
Canterbury felt that the standard blade on the staff was too narrow and preferred something with a wider profile and better edge geometry. Although it wouldn’t store within the staff, it could be a more versatile cutting tool and, in its role as a spear blade, would create a large enough wound channel to tackle larger game, including wild boar and deer.
Wes Crawford responded by creating the Missile Spear Point/Neck Knife, an all-steel knife that works in concert with the staff. By itself, the Missile is a compact, double-edged neck knife that rides in a Kydex sheath with a small fire starter. Its blade is beveled on only one side and its twin cutting edges are both about 70-percent serrated.
Above: One optional accessory Crawford Knives offers is the Missile Neck Knife, which can also be used as a potent spear tip for the staff. It comes in a Kydex neck sheath with a fire starter.
Only 5.5 inches overall, the Missile knife provides instant access to a cutting tool without having to disassemble the staff. Holes in its skeletonized handle allow it to be attached to a stout stainless steel adapter using two slotted machine screws. Screwing the adapter into the end of the staff converts it into a serious double-edged spear.
Optional 3-pronged spear head
By eliminating the standard blade, Canterbury also freed up space inside the staff for storing other accessories, including a Firesteel fire starter and a three-pronged spearhead for taking fish in shallow waters. Because the staff’s steel tip, threaded coupling, and head all have matching internal threads, these accessories can be attached to any one of them for secure, rattle-free storage that leaves the rest of the staff’s internal real estate available for other items.
Missile knife mounted to the Survival Staff as a spear
Other Accessories
Every serious survivalist fine-tunes his gear to meet his individual needs and skills. That kind of personalization fits perfectly with the Crawford Survival Staff’s modular design concept. As more and more of their staffs got into the field, Pat and Wes began receiving requests for other components that either store within the staff or, like the Missile Neck Knife, can be carried as a complement to it.
Like a giant hollow-handled Rambo survival knife, the Survival Staff’s roughly 15 cubic inches of internal storage space can house a surprising amount of gear if it’s properly organized. Pat and Wes offer that organization in the form of a set of watertight plastic test tubes that can be filled with matches and tinder, water purification tablets, powdered drink mixes, medication, fishing tackle, hand sanitizer, and anything else small enough to fit into them. They also offer accessory kits with micro-sized flashlights, miniature lighters, fire starters, and whistles, all sized to ride inside the staff.
Optional storage test tubes
The stock handle section, which rides at the top of the staff and typically serves as the grip for the blade, is made of knurled aluminum. If you prefer something heavier that hits harder, Crawford sells an optional stainless steel version. Want a T-handled grip for the shorter “urban” configuration? No sweat; they offer that too. If your survival food plans include picking not-so-low-hanging fruits and nuts, they even make a “gaff” hook that attaches to the top end of the staff.
Many preppers consider a slingshot to be a very viable survival weapon. If you fall into that camp, Pat and Wes also have you covered. Their handcrafted slingshot design is made from hardened 440C stainless steel and surgical rubber tubing. Although it can be shot very effectively “as is,” its handle is also skeletonized to fit the same adapter as the Missile Neck Knife/Spear Point. The adapter provides an improved grip and allows the entire assembly to be attached to the top of the staff, where its leather-wrapped fork can also be used as a shooting rest. And if you’re into slingshots, don’t forget that you can also store your ball bearing ammo in the storage tubes inside the staff’s shaft.
Genius or Gimmick?
Optional T-Grip attachment
Like any tool, the real utility of the Crawford Survival Staff lies in your ability to make it and its components perform the tasks you need when you need them. Because it’s a modular system that you can configure, its ability to meet those needs is quite impressive. As a hiking staff or walking stick, it helps you keep your balance on any kind of terrain, makes a potent impact weapon, and provides on-board storage for a comprehensive survival kit.
Its standard blade, while not a full-service survival knife, is sharp, strong, and amazingly useful. It also transforms the staff into a real-deal spear in a matter of seconds. Similarly, the staff’s blowgun function is legit and shoots with serious authority and accuracy. In fact, in chronograph and penetration tests, it easily rivaled purpose-designed blowguns, including some with longer tubes. Depending upon your personal needs, skill set, and budget, you can selectively add options to your staff with Crawford’s wide range of bolt-on accessories, or put your own ingenuity to work and go the DIY route.
My first exposure to the Survival Staff was way back in 1991 when an Army buddy of mine bought one. As an avid knife collector, I was very familiar with Pat Crawford’s work and was blown away by the staff’s handmade quality, but I still wasn’t sure it was worth the price. Almost 30 years later, my buddy is long retired from active duty and has logged literally thousands of miles hiking with that staff. It’s still going strong and he wouldn’t part with it for anything. ’Nuff said.
Crawford Knives Survival Staff Specifications
For hunting fish in shallow water, Crawford offers an optional three-pronged spear head. It can also be stored within the staff when not in use. The interior of the staff offers quite a bit of on-board storage space. The optional test tubes help keep survival items separated, dry, and organized. The T-Grip attachment is paired with the heavy steel replacement handle for a hard-hitting combination. When the standard blade is attached to the top end of the handle, the Survival Staff instantly becomes a formidable spear.
Overall Length 57 inches
Weight 29 ounces (standard model with blade and six blowgun darts)
If you enjoy collecting and using knives like we do, it's important to know the terminology associated with blade designs. You can probably get away with referring to “the stabby part”, “the sharpened bit”, and “the thing you hold onto”, but you're not exactly going to sound educated on the subject. Using the correct knife anatomy terms eliminates confusion and shows you know what you're talking about.
Every knife has its own unique characteristics and variations—like snowflakes, but deadly.
We'll admit that knife terms can be confusing and hard to remember at first. So, we've created the infographic below to illustrate 20 different parts of a fixed blade knife. Specifically, we used the TOPS Knives Hazen Legion 6.0 for this illustration—you can read our complete review of this fixed blade here.
Here's some more detail on each term, since we couldn't fit it all in the diagram above:
Grind Line – The meeting point of a grind with a flat surface or opposing grind. In the illustration above, the line shown is where the swedge meets the flat and the primary bevel.
Swedge (also spelled swage) – A tapered or beveled false edge (usually not fully sharpened) along the spine of the knife. It reduces the point thickness for improved piercing ability.
Jimping – Repeating ridges or cuts. These may be decorative (such as those on the spine), or used for additional grip on the knife (such as those on the thumb rise).
This knife features jimping on the thumb rise and further forward on the spine.
Spine – The top edge of the knife, opposite the blade edge. The spine runs all the way from the tip to the butt.
Thumb Rise (also called thumb ramp) – A slight incline in the spine, meant to provide a place for the user's thumb while cutting.
Tang – A continuation of a fixed-blade knife's metal into the handle. The TOPS knife above is “full tang”, meaning the metal continues through the entire handle, all the way to the butt.
Pin/Rivet – Hardware that holds the scales onto the handle.
An Emerson logo and model information are etched onto the flat of the CQC blade.
Flat – The unground face of the knife. You'll often find etching or emblems applied to this flat surface.
Handle – The part you hold. This one's easy to remember.
Tip (also called point) – Exactly what it sounds like. Technically, the tip is the very end of the point, and the point includes the first few inches of the knife.
Belly (also called sweep) – The upwards-curved section of the blade edge. Some knives, such as the Wharncliffe design, lack a curved belly.
The ZT 0630 features a prominent swedge and compound grind.
Primary Bevel or Primary Grind – The first grind applied to the knife edge. Many knives only have a single bevel that forms the blade edge.
Secondary Bevel or Secondary Grind – The second grind applied to the knife, which alters the primary bevel to a new angle. Knives with two bevels (like this TOPS knife) are considered “compound” or “double” beveled.
Plunge Line – The abrupt ending of the bevel, where it meets the flat near the handle.
Choil – A curved indentation or notch at the end of the blade edge. Sometimes this can be large enough to fit a finger into, but on the knife above, it's quite small.
Ricasso – A thick, flat, unground portion between the end of the bevel(s) and the beginning of the handle.
The Gerber Strongarm has serrations, a prominent plunge line, and a short ricasso.
Front Quillion or Front Guard – Part of the knife handle that prevents your fingers from slipping onto the blade while pushing the knife forward.
Rear Quillion or Rear Guard – Part of the handle that prevents your fingers from slipping while drawing the knife backward.
Scales – Pieces of handle material (such as wood, bone, or polymer) that are attached to the knife's tang via rivets, pins, or other hardware.
Butt – The rear end of the knife, which may contain a lanyard hole or glass breaker. Some knives may have separate metal pommels attached here.
The TOPS Anaconda has decorative elements cut into its wide spine.
Our infographic on knife anatomy should give you a good head start on the key elements of a blade, but there are a few other terms that we didn't show there. Here are a handful of additional terms you might hear:
Bolster – A thick junction between the handle and the flat of the blade. Bolsters can be found at the front and the rear of some knives, and they strengthen the knife and add balance.
Guard – Part of the handle that prevents the user's hand from slipping. A curved quillion on the handle may form the guard, or a knife may have a separate guard plate installed between the handle and blade.
Fuller (also called cannelure or blood groove) – A groove cut into the blade, often at the center of double-edged knives and swords. These have been called “blood grooves” due to the myth that they release suction or vacuum created by stabbing a living thing, thus allow blood to run out more easily. However, there is little to no evidence that this actually happens. In reality, a fuller lightens the blade by removing steel, and may also stiffen some blade designs (such as a broadsword).
Serration – Repeated jagged cuts into the blade edge, providing the ability to saw and tear through tough materials.
This CRKT Liong Mah 6 has three distinct serrations on its edge.
Pivot – Only found on folding knives, this is where the blade attaches to the handle. Some knives feature caged ball bearing pivots for smoother opening.
Liner – Flat metal plates inside the handle of a folding knife. These provide structure for the pivot and handle scales, and may also serve as part of the locking mechanism (called a “liner lock”).
Line Cutter or Seatbelt Cutter – A sharpened notch in the blade, which is designed to slice through cordage or seatbelts. Some knives use a slotted opening in the handle or sheath, rather than a notch in the blade edge itself.
The SOG Seal Strike features a line cutter built into its sheath.
Glass Breaker – A sharpened point on the butt of the knife, designed to crack and shatter glass. Some knives may feature a dedicated carbide point, while others may use a pointed extension of the tang for this purpose.
Finger Groove – Distinct grooves or notches on the handle, designed to fit between the user's fingers and provide extra grip.
Clip – A portion of the spine near the tip that is angled down (or “clipped off”) for improved piercing ability. Knives with this feature are often called “clip point” knives.
Read More
Subscribe to Recoil Offgrid's free newsletter for updates, offers and more.