First Aid in the Field: Become Your Own First Responder

It was a spring-like day in early March when I met Nick Gaines. He was our instructor for Prolonged Field Care (PFC), which I would endure over the following 48 hours. Gaines was a former 18D and Special Operations Forces Austere Course (SOFAC) instructor. He currently works as a flight medic in eastern Texas. To our knowledge, this was the first time a PFC course was offered to a civilian cadre over a weekend anywhere in the country. The only prerequisite for the class was that you had to have taken Tactical Combat Casualty Care (TCCC) in the past. Eager students ranged from everyday people to paramedics, law enforcement officers, nurses, and myself. On day one, we reviewed the 75-page guidelines most recently released in December 2021. Day two was a hands-on practical scenario.

Above: Nick Gaines sharing his expertise.

Where TCCC focuses on the immediate care of the casualty, PFC focuses on what happens after stabilization of the life-threatening injury and evacuation to higher care. Transportation of the casualty to definitive care could be hours or even days. An example would be something like this: A mass casualty has occurred. At the scene, the triage would occur, and MARCH protocol would be initiated. A Casualty Collection Point (CCP) would then receive the casualties before transport to the Field Hospital (FH). Once at the FH, the casualty is continually assessed and treated accordingly. Any casualty who needs further treatment is then evacuated to definitive care.

Above: Our field hospital.

Day One

The daunting task of whittling down 75 pages of PFC guidelines (www.prolongedfieldcare.org) to an eight-hour course was a challenge that Gaines handled well. An initial caveat that he emphasized was this: “Everyone is expected to participate in their own survival.” With that, he had a captive audience eager to learn more about improving their odds in the austere setting.

After the opening remarks, we started with a brief review of TCCC concepts. Gaines reiterated throughout the day that if you are in a mass-casualty setting and don’t know what to do, go back to the MARCH algorithm. As a quick reminder, the MARCH acronym stands for Massive hemorrhage, Airway, Respiration, Circulation, and Head injury. In PFC, MARCH was expanded to MARCH PAWS L. This added communication as a second “C” in MARCH and continued with Pain, Allergies, Wounds, and Logistics. Once the initial triage was performed, it was necessary to hand the patient off to the next level of care in an efficient manner. We were given the MISTE acronym, which stands for Mechanism of Injury, Injury/Illness type, Signs and Symptoms, Treatments, and ETA to the next level of care. This was one area that many of us took shortcuts on, erroneously, on day two during the scenario.

Above: Field triage of myocardial infarction.

We next reviewed the 10 PFC tasks. The PFC working group developed these to establish a minimum, better, and best practice for PFC of the casualty. For simplicity’s sake, I will list the tasks, and you can read further in the guidelines that I have provided in the link above. The first task is to (1) monitor the casualty to create a useful trend in vitals. Next, (2) resuscitate using blood products if needed. (3) Ventilate and/or oxygenate the patient. (4) Control the airway. (5) Use a sedation or pain control protocol that allows the provider to perform all tasks. (6) Perform a physical exam and any diagnostic measures. (7) Provide nursing care or comfort measures. (8) Perform surgical procedures (e.g., chest tube, cricothyrotomy). (9) Perform a telemedicine consult if needed, and lastly, (10) prepare the patient for transport. The students in the class picked up on many of these tasks, given the brief overview in such a compressed class.

Next, Gaines recognized the daze of the postprandial hypersomnolence that followed lunch. He decided to give us a tour of his truck medic bag and emphasized having items that had multiple uses. He suggested that it wouldn’t be possible to lift the medic’s bag if we tried to plan for every medical emergency we encountered. As it took about half an hour to review the contents of his bag, there wasn’t a space that wasn’t utilized in the bag. Admittedly, my bag isn’t as sexy as his, but you can see mine in Bag Drop of RECOIL OFFGRID Issue 51.

Above: Awaiting transport to Casualty Collection Point.

For the last bit of didactics, we discussed the ramifications and reasoning of tourniquet conversion. The goal of TQ conversion is to move toward a hemostatic agent or a pressure dressing. This can safely be done in the 30- to 120-minute window as long as the bleeding has stopped. The window of two to six hours is also considered safe but not ideal. After six hours, it’s not recommended to convert a TQ unless the casualty is in a definitive care location. The risk of tissue damage, kidney problems, and elevated potassium are problems that could occur after the TQ has been on for greater than six hours.

Day one ended with preparation for the day two scenario. We identified the strengths of the participants and placed them in roles to carry out the following day. We took about 90 minutes to organize during this portion of the class.

Above: SAR assessing the casualty.

Day Two

We started the morning with a one-hour review of the previous day’s didactic session. We then continued to break down our group into their definitive roles. Overall, there were 24 people in the class. We had an additional 12 casualties for the scenario. The breakdown of our roles for the scenario was as follows: Security (two), search and rescue (two), triage (five), FH (four), transport team (three), resources manager (one), operations manager (one), communications manager (one), medical director (one), logistic coordinator (one), dispatch (one), and incident commander (one). We were given two hours to ready resources such as medical kits, litters, and logistics.

Above: Security taking charge of motor vehicle accident.

As the scenario started, security (two people), SAR team (two people), triage team (five people), comms manager, transport teams (two), and logistics coordinator traveled from FH to CCP. SAR went from the CCP to locate the incident. Once they identified the scene, they radioed for triage and transport to mobilize to the scene. SAR performed the initial TCCC/MARCH assessment. Triage arrived on the scene and started secondary assessments with essential documentation. Casualties were then prioritized and transported to the CCP, which was approximately 500 yards from the incident.

Once at the CCP, Triage performed their assessment and documentation to prepare for transport to FH. Transport took 13 minutes from the CCP to the FH. We used one vehicle for transportation from the incident scene to the CCP and one for transport from the CCP to the FH. Later in the scenario, we used other vehicles to transport casualties to speed up the scenario. Once at FH, four people were serving as nurses. We established a 12-bed FH with one charge nurse and three circulating nurses. The total time of the scenario went from 1,000 to 1,515 hours with no stop for food. The after-action review/debriefing lasted 45 minutes.

Above: Triage team assessing casualties.

There was a consensus that it was a successful learning experience for everyone involved. We proved that you could teach civilians with varying degrees of medical skills the basics of PFC. The exercise was complete chaos for five hours, but everyone did a fantastic job handling their role. The casualties were only given a few items to incorporate into their role play to keep it simple. They did an amazing job as well. We used Zello for our communications during the exercise, which worked out reasonably well. There were lapses in communicating information throughout the exercise, but given the chaos and inexperience of the students, I thought they did an excellent job. The transportation logistics were also a bit of a bottleneck at the scene and CCP. Had there been more participants, this would’ve been the area to bolster aid.

In summary, this was a successful exercise in PFC for the civilian population. During the scenario, everyone was actively involved, and nobody had any downtime during the event. Gaines did an exceptional job presenting the information, and we were pleased with how everything turned out. Everyone, including me, came away with more knowledge to add to their skill set.

Above: Transport team loads casualty.

About the Author

David L. Miller, DO, FACOI, is an internist in private practice for 20 years. His experiences away from the office have included time as a fight doctor in regional MMA events and as a team physician for 10 years at a midmajor university in the Midwest. Currently, he serves as the lead medical instructor for the Civilian Crisis Response team based out of Indianapolis.


Situational Awareness Evaluation: Part 3 – Baselines & Anomalies

Most of your training in the emergency response field is reactive. You definitely want to be trained in how to react to events, because we can’t observe everything all the time. Muscle memory is a huge advantage when faced with violence or stressful situations. But what if there was a way to be proactive instead of reactive with your situational awareness? Analyzing behavior is proactive and is a method of observing human behavior (baselining) and looking for suspicious indicators (anomalies), which may indicate an individual’s or group’s intentions.

Editor's Note: This is Part 3 in a series on the benefits of situational awareness. We'd recommend reading Part 1 and Part 2 if you haven't already.

Why Behavior Analysis Is Important

Above: As behavioral expert David Matsumoto discussed in his interview in RECOIL OFFGRID Issue 51, there are common physiological giveaways inherent to dishonesty and maligned behavior.

Analyzing behavior offers a unique approach to threat mitigation that begins from the point of view of the threat and is based on the actual adversary’s methods of operation. It allows us to anticipate the behavior and intentions of the bad actors, rather than just react to their actions.

The Left of Bang Mindset

 

If you think about an incident time line, imagine bang is right there in the middle. After a bang event there are “good guy” actions and “bad guy” actions that happen. The good actions are people calling 911, rendering medical aid, locking down their area, and so forth. Examples of bad guy actions would be escaping from the area, ditching weapons or clothing used in the crime, or selling stolen goods. All of these actions fall into the right of bang category. Bad things have happened and we’re just cleaning up the mess.

We want to be observant of everything left of bang. The pre-event indicators and actions that happen before violence or an attack. If you can spot a crime or attack before it happens, your chances of stopping or disrupting the attack go up exponentially. So it’s important to know and train how to react to these events, but there’s a whole other side of the coin that most people don’t pay attention to.

Establish Behavioral and Atmospheric Baselines

You may not realize it, but you use baselines all the time in your everyday life. A baseline is simply what’s normal and usual given a particular time, situation, and context. You create a baseline by observation. The longer you can observe an individual or area, the better baseline you establish but you’re not going to have an infinite amount of time to make these observations in the real world. Baselines can also be developed through past experiences, historical examples, or knowledge of bad actor tactics. Baselines are constantly changing based upon new people, events, and time. For example, a certain section of town may look and feel one way during the daytime but may be extremely different at night.

So why are baselines important? By having a baseline, you’re able to more easily detect anomalies. Anomalies can be anything out of the ordinary — things that just don’t seem right. And when it comes to safety and security, anomalies can be extremely important to pay attention to. By being aware of your surroundings and knowing what’s normal for that particular environment, you’re more likely to spot something that isn’t right. This could be anything from someone loitering around your neighborhood to an unusual package left on your doorstep.

Above: Were you expecting a package? If not, this may be a ploy someone uses to get you to open your door or make observations about your behavior or lifestyle without you realizing it.

Establishing Individual Baselines

To establish individual baselines, you need to get a read on a person’s nonverbal communication and what they’re putting out to the world. Depending on what research you look at, nonverbal communication makes up 60 to 65 percent of communication, but most people just focus on the spoken word. You should pay attention to what people are saying, but there’s a whole world of other indicators out there to pay attention to. The good news is most people don’t even realize the amount of information they’re giving away as they go about their day to day.

Individual Baseline Indicators

Posture: Does the person seem closed off and appearing to make themselves smaller (submissive behavior) or do they stand tall with their shoulders back making eye contact with everyone in their vicinity (dominant behavior)?

Tone of Voice: Is their tone of voice and volume consistent or erratic? The more bass someone adds to their voice can be viewed as trying to intimidate. The more high-pitched their tone gets can be viewed as a stress indicator.

Speed of Movement: Does the person walk with a purpose and have their head on a swivel, or do they look down as they move with little to no arm swing in their gait. If a person is walking slower than everyone else around them but then starts moving faster with a longer gait, why? What caused this shift?

Attention: Where is the person’s attention focused? Is their attention where it should be? If I am at the end of a marathon waiting to see the winners cross the line, why is this person’s attention focused down at purses and pockets?

Clothing: Does their closing match the baseline of the area you’re in? Are they wearing a bulky sweater with sweatpants but it’s 92 degrees outside? Is this a corporate event where everyone is in a suit and tie, but one individual is wearing flip-flops?

You can use these questions and any of the other nonverbal indicators like facial expressions, gestures, touching, physical movements, body adornment, and so on to become a student of people and establish these behavioral baselines.

Establish Group Baselines

Above: One person is standing still while others are fluid. This individual is out of baseline and stands out. This is a common way to spot someone whose behavior isn’t consistent with the group. Reviews of surveillance footage immediately following the Boston Marathon bombing showed the bombers moving against the flow of the crowd, which enabled authorities to zero in on them.

You can establish group indicators using the above nonverbals, but would also want to pay attention to proxemics or the distances people keep from people or objects. Proxemics is the branch of knowledge that deals with the amount of space that people feel is necessary to set between themselves and others. Proxemics consists of the messages people express when, for example, they prefer to sit at the front or back of a classroom, or whether they sit near to or far from the head of the table at a meeting. Basically, the more comfortable you are with a person or object, the closer you get. The more uncomfortable you are, the farther you get.

Proxemic baselines definitely have cultural variance, depending on where you’re from. But generally, in the Western world, we like to keep about one arm’s distance from people. If you see a group of people with less than that distance between, you can confidently say they’re comfortable with each other and know each other well. By noticing how a group of people interacts with each other, you can start to gather critical information.

Group Baseline Indicators

Distance Apart: How close or far does the group maintain their distance from each other? Does it appear that they just met, or do they act like they’re very comfortable?

Attention: Does their attention stay inward with each other like they’re having a conversation or are their eyes wandering, taking in the area. If one individual notices something and orients themselves, does the rest of the group change their focus too?

Noise Level: Is the group loud and obnoxious or are they quiet and having personal conversations with each other?

Mimicry: Is there one individual in the group who people are mimicking with their posture? If one person goes from hands-on-hips to hand-on-chin, does everyone else follow? That’s usually the leader or “alpha” of the group.

Intrusion: If someone approaches their group, do they “open the gate” and let them into the group or do they close ranks and go shoulder to shoulder?

These are just a few examples of what Group Baseline Indicators are, but there are many more out there. The best way to learn about them is to pay attention to the next conversation you have and see if you can spot any of these indicators being used.

Above: Is someone getting in your bubble without your expressed interest or consent? This may be an indication of someone trying to take advantage of you.

Establish Environmental Baselines

You’ve probably heard of reading the room, but have you ever heard of reading the atmospheric indicators around you? Just like the mood of a room can change based on the people in it, the collective attitude or mood of a place can also change. These changes can be caused by a combination of cultural, social, geographic, and individual elements. By asking specific questions about the area, you can start to read what that geographic area is communicating to you.

Your Immediate Surroundings: This may seem obvious, but it’s important to take the time to look at your surroundings and notice the details. What kind of environment are you in? Is it dirty or clean? Bright or dim? Quiet or loud? By taking a moment to really see your surroundings, you’ll start to get a feel for the atmosphere.

Listen to People Around You: Another important element of reading atmospheric indicators is listening to the people around you. What are they saying? How are they saying it? What kind of emotions does their conversation evoke in you? By paying attention to both verbal and nonverbal cues, you can start to get a sense of what the mood is like.

Overt Security Elements: If there are security cameras and “No Trespassing” signs on almost every block, it’s a good indication that the residents are afraid of something — or someone. Bad actors often conduct their shenanigans out of abandoned buildings or vacant lots, so property owners put up these types of signs to deter them.

Pay Attention to Graffiti: While graffiti can be an expression of art, it can also be used by criminals to mark their territory. Not just what the specific graffiti communicates, but any change in its frequency. If there’s a complete lack of it one day and then there’s a huge amount the next or vice versa. If there’s always fresh graffiti in the area, then one day it just stops, I want to know why.

Above: Get to know the symbols that gangs known to congregate in certain areas use to mark their territory. 

The key to reading an environment is noticing the little details. But don’t just look at what’s happening right now — take time each day over weeks or months until eventually these things become clearer than ever before because all aspects combined create an atmosphere that tells us everything we need to know about any location whether good/bad, warming/cold, etc.

Detecting Anomalies

Now that we’ve established our different baselines (what should be), we can start scanning proactively for our anomalies. Anomalies are any changes or new developments in a situation that rise above or fall below the baseline. When most people hear the word anomalies, we instantly connect it to a deadly threat, and that could be the case. But sometimes anomalies aren’t an immediate threat, but just more information. The street sweeper who shows up every Tuesday at 9 a.m. doesn’t show up is an anomaly. Would I call 911 immediately? No, but I might want to find out what caused the anomaly. That’s the essence of the left-of-bang mindset; you’re a hunter out in the wild searching for any deviations from the baseline. If it’s a threat anomaly, make a decision and act. If it’s a less serious anomaly, you go in investigative mode and don’t stop until your questions have been answered.

The presence of these oddities suggests there has been some kind disruption; it might even hint toward what caused said change. And since we’re trying to figure out why things went haywire here, looking into every last detail will help us get closer toward solving this mystery quicker than ever imagined possible.

Above: Pay attention to things like cars following you. While it may be completely reasonable someone is going the same way you are, there’s a point where you need to realize that the odds of coincidence are dropping fast and you may be getting set up for an ambush.

Tomorrow Is a New Day

As we wrap up this three-part series on tightening your awareness shot group, it’s important to remember that being observant of the world around us is key to preventing violence. Most people only take in 20 to 30 percent of the information flying around their head, so by becoming a student of behavior and expanding your baselines you can truly increase your chances of disrupting or stopping a violent event before it happens. It may seem like a daunting task, but with the current state of our world it’s more important than ever to be “left of bang.” Thank you for reading and keep your eyes open — something you observe tomorrow might just save your life.

About the Author

Yousef Badou is the owner and founder of Emergence, a service-disabled veteran-owned small business (SDVOSB) providing behavioral awareness training to Fortune 500 companies, military, and other government agencies. Yousef began his journey into security training after multiple deployments with the U.S. Marine Corps. He’s an Arabic speaker and former infantryman, along with being the longest-standing member of the USMC Combat Hunter Training Program. With so many threats on the horizon, Yousef believes the best way to disrupt these threats is through education on pre-event indicators and behaviors of violence. www.emergencedisrupt.com


Bond Arms Lever Action AR-15 – 2024 Update

Whether you love them or hate them, modernized or so-called “tactical” lever action rifles have skyrocketed in popularity in recent years. We can attest that our own Marlin 336 Dark Series project is a ton of fun to shoot, but it still has a few downsides. The magazine tube can only hold five rounds, it must be reloaded one round at a time, and the manual of arms is substantially different from a modern semi-auto rifle, leading to a steep learning curve. At SHOT Show 2023, we found a new Bond Arms lever action rifle that fuses this classic operating mechanism with the ergonomics, capacity, and modularity of an AR-15. The Bond Arms lever action AR lower can be used with any milspec AR-15 upper, feeds from an AR-15 mag, and accepts a variety of Remington 870 shotgun stocks.

About Bond Arms

Bond Arms is a Texas-based gun manufacturer that has been around since 1995, but they're not typically associated with rifles. The company primarily makes Derringer-style double-barrel handguns. So, when we walked by the Bond Arms booth at SHOT Show this week, we were surprised and intrigued to see the lever gun pictured above on a table surrounded by handguns. We immediately asked for more information and were directed to the rifle's designer, who gave us a detailed run-down of its features. See it in action here!

The Bond Arms Lever Action AR-15

To be clear, this rifle is still in a pre-production prototype phase, but Bond Arms tells us they've been testing and refining it for more than a year already. It's not the first lever-gun-meets-AR project we've heard of — the FightLite Herring Model 2024 comes to mind — but it certainly seems like a major step forward in this category.

Starting from the top, it accepts a standard AR-15 upper receiver. Bond Arms says it has been proven to work with everything from a .223/5.56mm upper all the way up to a .50 Beowulf upper. Most of us already own multiple AR upper receivers that can be used with the Bond Arms lever action lower.

Moving on to the lower receiver, this is where it gets really interesting. There's a push-button safety similar to what you'd find on a lever gun, and a unique mag release that extends rearward to offer easy access to the shooter's index finger. The front portion of this mag release — the part where a regular AR mag release button would be — can also be pressed directly to drop the mag. On the opposite side of the receiver, there's another mag release button for ambidextrous use. The mag well is flared for quick reloads; we tested its retention and release with a 30-round PMAG.

The most surprising part of the Bond Arms lever action AR is the lever mechanism itself. According to the designer, it uses an asymmetric cam that rides in a track (the slotted silver piece protruding from the receiver in these photos). This allows the leverage applied to the bolt to increase at points where more force is needed, such as while feeding a round from the magazine. Bond Arms says this complex cam mechanism wasn't necessary for 5 or 10-round mags, but feeding the first few rounds from a full 30-round mag created more resistance and required more leverage for smooth operation.

There's also a secondary “grip safety” built into the lever — in order for the rifle to fire, the lever must be squeezed lightly against the stock. This functions similarly to a 1911 grip safety, only reversed to the front of the grip.

We were able to handle and dry fire the lever gun prototype, and found it to be smooth and easy to use. Compared to a traditional lever gun, this rifle has a noticeably shorter throw that lends itself to rapid fire. The only time we noticed the grip safety mechanism was when we attempted to press the trigger without touching the lever; it worked as intended and prevented the rifle from firing.

Another ingenious aspect of this design is the interchangeable lever loop. Bond Arms realized that some users prefer large loops for use with gloves, while others prefer more traditional small loops. They also wanted to allow users to swap to various Remington 870 shotgun stocks, such as the Magpul SGA 870 stock and Hogue Overmolded stock pictured here — this would require different loop shapes to match the contour of the grip. The solution was simple: make the the loop and trigger guard a separate piece from the internal part of the lever. The loop attaches to the gun via two dovetailed sections around the trigger guard.

This modular design allows the user to easily swap lever loops (and stocks) without affecting the rifle's internal mechanism or requiring gunsmithing work. Want to learn more about the history behind its inspiration, watch the video here.

Price and Availability

We haven't had a chance to shoot the Bond Arms lever action AR yet, but we hope to get our hands on one soon for a thorough review. Bond Arms told us their goal is to release the retail version of this lever gun by early 2024 at an MSRP of $1,499. Obviously, the price and time frame are not set in stone at this point. For more information, keep an eye on BondArms.com or follow the company's Instagram @BondArms_.

2024 Update – Bond Arms LVRB Final Prototype

At SHOT Show 2024, one year after we first saw the Bond Arms Lever Action, we learned a few new details about this rifle. According to Bond Arms owner Gordon Bond, this rifle has been named the Bond Arms LVRB and will be available in the second quarter (Q2) of 2024. MSRP will start at $1,599, a slight increase from the original estimated price. Gordon showed us the final prototype of the LVRB and explained that its action has been refined with improvements to the locking mechanism that ensures the rifle won't be able to fire out of battery. We're glad to see the dovetailed interchangeable lever is still present, and the trigger feels great. After handling and cycling this final prototype, we're more excited than ever to get our hands on the production model later this year!

FAQ

  • Q: How much is the new lever-action ar15?
    A: The Bond Arms LVRB is estimated to cost $1,599
  • Q: When will the Bond Arms lever-action be available?
    A: Bond Arms says it's coming in Q2 of 2024, meaning between April and June.
  • Q: Is there another 556 lever-action?
    A: Yes! Other than the Bond Arms lever action AR in this article, there is also the Henry Long Ranger Express.
  • Q: Are lever-action rifles obsolete?
    A: No! Although they are not as common as they were in the past, they are still used in a variety of shooting sports.
  • Q: Why are lever guns so expensive now?
    A: Lever action rifles use older technology which must be machined and fitted to work properly. This is a work intensive and time consuming process that usually costs more than their semi-automatic counterparts.

Read More

Don't forget to subscribe to our free newsletter for more content like this.


Cell Phone Surveillance: Can They Hear You Now?

Editor’s Note: The author of this article works full-time in law enforcement in a major metropolitan area of the United States, within a state that has used StingRay devices and other cell phone surveillance systems for various investigations. Due to the sensitive nature of this topic, his article has been published under a pseudonym.

It’s safe to assume our readers fall into one of two groups: you know your cell phone tracks you constantly without your permission, or you’re unaware of the potentially serious privacy risks from the neat little device in your pocket. Being in the latter category doesn’t make you wrong — most people tend not to think about things that haven’t affected their lives yet, or dwell on dangers they believe are outside their control. However, when you’re in a particular line of work, the thoughts and ideas mentioned above constantly run through your mind. As writers in this industry, we often joke about being on government watch lists, but those jokes lose their humor when Big Brother may actually be watching.

Above: Cell phones automatically connect to nearby towers, but a StingRay device can drown out these towers within a targeted radius, tricking devices into connecting to it instead. The StingRay then collects data and passes it along to the real tower.

If you’ve been watching cases of domestic surveillance in the United States over the last 20 years, you may have heard references to a surveillance device known as a StingRay. So, what is the StingRay, you might ask? Well, it’s not the animal that killed Steve Irwin. It’s a whole different animal in terms of what it can do. Keep in mind that some of this information can get pretty technical, so I’ll do my best to make this as easily readable as possible.

According to a report by the American Civil Liberties Union (ACLU), there are at least 75 agencies in 27 states that are currently known to use StingRay surveillance devices — the actual count is believed to be much higher, since “many agencies continue to shroud their purchase and use of StingRays in secrecy.” On a federal level, users include all branches of the military as well as the FBI, NSA, DEA, ICE, ATF, and even the IRS. However, the devices are also employed by numerous state and local police departments.

Above: The transition from a legitimate cell tower to a cell site simulator is seamless, and the typical user will have no idea that anything unusual has occurred.

Terminology

Before I get started, let’s go over two acronyms I’ll be using. These are important for you to know in general as they are things that can link you to a device:

IMSI: International Mobile Subscriber Identity is a 14- to 15-digit number that identifies your specific device on a cellular network

IMEI: International Mobile Equipment Identity is a 15-digit number that identifies a device but does not have a permanent tie to the owner(s)

For further phone identifier information, go to imei.info/FAQ-what-is-IMEI

How Does the Stingray Work?

Above: Few images of these devices have been released to the public. These illustrations show the layout of two known variants, the StingRay and StingRay II. A document obtained by VICE magazine showed a StingRay II package was offered to Rochester Police Department in New York for $148,000.

The StingRay is a suitcase-sized device created by L3Harris Technologies, formerly known as the Harris Corporation. It allows the user(s) to gather information about a device, and as a result, a person by multiple methods. The StingRay is designed to be used while mobile or stationary; the live use of the device is conducted by a secondary operator via computer. Due to advancements in technology, the ability to hide the device and antennae have significantly improved in recent years, leaving the public utterly unaware of a StingRay’s location.

The primary application we’ll be going over is using the StingRay as a cell site simulator. A cell site simulator is just what it sounds like — the device impersonates a cell tower. The difference is the simulator will put out a more robust signal that essentially forces smartphones, tablets, and other cellular devices in the area to connect to it. Once your device connects to the StingRay, the IMSI, IMEI, GPS location, and much more information about the device is collected. The connection also stops a device from connecting to an actual cell tower, so certain functions of the device can be disabled on demand. The StingRay can intercept calls, text, and other data depending on the model.

Keep in mind that authorities can still obtain all of this information through traditional investigative channels, by contacting a cellular service provider and requesting data with a warrant. The StingRay is an alternative tool that can be exploited and manipulated to gather information on large groups of subjects without their knowledge, and as we’ve seen from past examples, without a warrant.

Real-World Cell Phone Surveillance Cases

Above: The Los Angeles Police Department was involved in a 2013 scandal that indicated StingRay devices had been used extensively for investigations without warrants and were intercepting private data from innocent bystanders.

Starting with a warrantless use case, let me first address one thing: There are multiple exceptions that allow warrantless searches, granted by the supreme court; there are also ways to get an exigent data request without a warrant. Authorities are still required to get a search warrant within a reasonable amount of time for the collected information or data. An example of an exigent request could be live location data from a cell phone provider for a kidnapping suspect. When going over these cases, let’s look at the facts of the case — I want you to think of how devices such as the StingRay could be abused in certain situations.

The first case, 15-CF-322, originates from the Metropolitan Police Department in Washington, D.C. The case facts are explicit, so I will do my best to make them easy to read. A male, Jones, met a woman for a paid sexual encounter. During that encounter, he forced her to perform sexual acts at knifepoint, then robbed the female and another female who came with her of their belongings, including cellphones. A police report was made, and the StingRay device was used to track Jones’ and a victim’s phones without a warrant. Jones was arrested and subsequently found guilty of the crimes. However, he fought the conviction to the court of appeals, where the following ruling was made in September 2017: using a StingRay type device violates the Fourth Amendment (unreasonable searches and seizures) and a warrant must be authored when utilizing the StingRay. The court then ruled to reverse the conviction unless the arresting agency could prove the use of the StingRay on Jones’ device did not contribute to the verdict. This was the case that paved the way for true rights when it comes to our cellular data privacy. It also showed a local law enforcement agency’s willingness to abuse million-dollar technology in order to spy on citizens.

Above: Washington, D.C., has been the epicenter of more than one controversy regarding use of StingRay devices, both by local law enforcement and by unknown, potentially foreign entities.

Another case comes from the Los Angeles Police Department (LAPD) in 2013. The LAPD has used the StingRay device since approximately 2006; in 2013, information about how often it was being used was revealed to the public. The LAPD used the device to assist in locating burglars, drug dealers, and murderers. LA Weekly reported that LAPD had 155 cellular phone investigations within four months, but only requested 21 search warrants during that time. In many of these cases, the privacy of citizens was blatantly disregarded. Private data including device information, text messages, or other data transmissions were able to be intercepted by the LAPD from individuals who were innocent bystanders in their cases. Whether that data was stored or looked at — a violation without a search warrant — is unknown. Just like the previous case, a pattern is emerging of local law enforcement’s ability to take private and personal information absent a search warrant.

We’ve seen glimpses of how local law enforcement uses this technology, but upon a request filed through the Freedom of Information Act, the department should give information about tools it uses, right? For that, we’ll take a look at a lawsuit filed by the ACLU of Arizona against the Tucson Police Department (TPD). The lawsuit was filed in 2014 on behalf of Beau Hodai, an investigative journalist. Hodai requested information on the StingRay device used by TPD. However, due to the non-disclosure agreement TPD had with the Harris Corporation, Hodai was denied this information based on the NDA. Fast-forward to 2016 after multiple appeals, and the ACLU got what it was after. The appeals court held that when TPD failed to release records, it violated the public records laws in Arizona. This shows that while citizens are supposed to be granted access to information on technology that’s used against them, larger entities will use technicalities to fight giving that information out.

We’ve focused quite heavily on local law enforcement, so now we’ll zoom out to a larger entity. In 2016, the Department of Homeland Security (DHS) disclosed knowledge of multiple unauthorized cell site simulators in and around Washington D.C. DHS explains there isn’t much to be done, goes on to blame the phone companies for poor security, and further deflects the reason for failing to stop the malicious cell site simulators to cost and lack of equipment. As far as we know, DHS still hasn’t determined who was responsible for placing these illegal cell site simulators in D.C. — a foreign intelligence agency, corporate spies, an organized crime ring, or a rogue element of our own government. According to a 2018 article by the Electronic Frontier Foundation (EFF), “DHS doesn’t know who’s operating them or why, or whether these fake cell towers are installed elsewhere in the country.” The prior cases focused on civilians, Jane and John Doe, working hard to live the American Dream, but this one potentially violated the privacy of many high-ranking politicians (including foreign nationals) in our nation’s Capitol. The question remains: if senators and dignitaries can be spied on, how can civilians protect themselves from this technology?

What Can You Do?

Above: The StingRay is capable of silently intercepting calls, text messages, and other data from all devices within its operational radius — that may include the target of an investigation and everyone else nearby.

Directly protecting oneself from cell site simulators is virtually impossible, since you have very little control over which cell tower your phone is using, and no way to know for sure if it’s legitimate, but there are other steps you can take. It must be remembered that the same data collected by the StingRay, and much more, is available from your cell phone provider via a warrant.

The use of Virtual Private Networks (VPN’s) to direct and encrypt your internet traffic is a basic step to start a privacy journey and is something I suggest everyone use. However, the best way to prevent a StingRay, and your cellphone provider, from gathering information on you is the proper use of two items: a burner phone and a faraday bag. The faraday bag is the most accessible and user-friendly option. Buying a reputable bag — not just an Amazon brandless bag — can make all the difference in your phone’s ability to block GPS tracking. I’ve had good experiences with Mission Darkness (mosequipment.com) bags, and SoCal Offgrid wrote about his experience with EDEC Digital Forensics’ OffGrid line of bags (offgrid.co) in Issue 48. Using it is simple; put your burner or daily-use phone in the bag and close it. The signals will be blocked, and the device cannot be communicated with. The obvious drawback to this method is that your phone also can’t send or receive calls, texts, or any other data while it’s inside the bag.

If it’s used properly, a burner phone can give you great privacy; with improper use, it can lead right back to you. Using a burner phone in the same way a daily phone is used — i.e. contacting your spouse, talking to friends and family, not using secure messaging and calling applications — gives the same information to cell phone providers (or StingRays) as a daily use phone. Collecting that data and showing the same patterns of life in two devices can easily link a person to those devices. It’s critical to be cautious about keeping your burner phone isolated from your other electronics and networks. For more details, refer to W. Dean Freeman’s article on burner phone basics in Issue 52.

Lastly, there are unconventional and old-school spycraft techniques for communication. One that’s becoming more popular to talk about, making it more common now, is the use of video game chat functions. Though it’s less obvious than communicating through a phone, most online games don’t dispose of chat logs or have end-to-end encryption, so the messages (and the user’s IP and account information) can still be revealed via search warrant. This is mostly a matter of security through obscurity, which isn’t ideal. Another technique, and one still used today, is a dead drop. Storing a flash drive or SD card in an unlikely location, such as drilled into a tree or concrete wall, allows users to create an offline file sharing system. However, this secret location is only secret when it’s not talked about. Failing to understand proper operational security, a.k.a. OPSEC, paves way for all the private information to become public, or worse, available to an adversary. It’s wise to encrypt any data you share via dead drop, so that any third party who accidentally finds it won’t be able to access it.

The Future of Cell Phone Surveillance

The StingRay is a device that has been used against citizens and criminals without a warrant, time and time again. For every high-profile incident we know about, it’s safe to assume there are dozens more that were never revealed to the public. The device takes naivety, complacency, and blind trust in the government — an entity that employs humans just like you and I, all capable of great good or evil — to gather intelligence on our whereabouts, conversations, and so much more.

The good news is that most of the cases mentioned were quite old, and due to misuse of their devices and the media backlash it generated, L3Harris Technologies stopped selling StingRay technology directly to local law enforcement at the end of 2020. Do not cheer just yet, as Nyxcell, a competitor of L3Harris, has created its own cell site simulator. The Nyxcell can perform the same surveillance as the StingRay, but also has upgraded features for the newer phones hitting the market. Jacobs Solutions, a Fortune 500 company with $14 billion in annual revenue, offers another cell site simulator device through its subsidiary KeyW Corporation. The mysteriously barren web sites of both companies offer no information about the existence of these products or their capabilities, but Nyxcell’s slogan — “When lives and security are at stake, Nyxcell solutions get results” — certainly seems ominous given the context.

I want to leave you with this: Do not be afraid of your phones. A cellphone is an amazing piece of technology that truly helps us all on various levels, from basic communication to controlling life-saving medical equipment attached to our bodies. Just be aware of the risks taken while using them and pause to consider the information you’re revealing before you hit “send.”


Infographic: Digital vs. Analog Radios

If you're learning about radios, it's important to understand the key differences between digital and analog radios. Explaining all the details of the digital vs. analog radio debate would require a lengthy technical article, and that would be overwhelming for beginners, so we'll give you the simplified Cliff's Notes version instead.

Most consumer-grade two-way radios and walkie-talkies are analog, meaning they send information (i.e. your voice) in a continuous wave. Digital radios convert information into packets of binary data (ones and zeros), which are sent over the air and converted back into audio by the receiver. Rather than a continuous wave, digital signal is intermittent.

In practical terms, this means that the quality of analog transmissions gradually declines as distance increases. If you’re near the edge of an analog radio’s range, voices may sound garbled or may be drowned out by white noise. On the other hand, digital radios maintain loud and clear audio quality all the way to the end of the covered area, at which point signal will cut out completely.

Pros and Cons of Digital Radios

For the sake of brevity, we’ll leave you with some general pros and cons for digital radio:

PROS

  • Clearer audio quality
  • Longer usable range
  • Up to 50-percent longer battery life due to low standby power consumption
  • Capable of transmitting voice or data (text messages, GPS coordinates, caller ID, etc.)
  • Capable of “splitting” channels to allow simultaneous private conversations from multiple users
  • Wide variety of encryption and privacy features

CONS

  • Vastly more expensive than analog
  • Programming has a steep learning curve, and often requires special (expensive) equipment and/or software
  • Most systems are designed for enterprise applications with dozens of radios, making features unfriendly to personal or family use

Digital vs. Analog Radios Infographic


Plate Carrier Radio Setups: Safariland Liberator & Silynx Clarus

Napoleon famously said, “The secret of war lies in the communications.” This concise statement reinforces the importance of communication at all levels of a fighting force — individuals, squads, platoons, companies, battalions, and so on. If communications are severed, the ability to coordinate often follows suit. Outside of a military context, the same principles apply to civilian emergency preparedness. If your group of family and friends is your squad, you should establish a solid plan for communications for any emergency. In yesterday's article about encrypted radios, we provided an introduction to how encryption can help you ensure communication security (COMSEC). Today, we'll take a look at two plate carrier radio setups from Safariland and Silynx that integrate our encrypted Off Grid Comms handhelds into our load-bearing gear.

Radio Setups & Applications

Above: Integrating a dual-comm setup into this TYR Tactical plate carrier was easy, with one radio placed on each side of the cummerbund.

You can do a lot better than clipping your radio to your belt or shoving it into a pocket. There’s a nearly endless ecosystem of accessories and upgrades for radios, especially popular models such as the Motorola XTS series. To make the most of your radio, we recommend integrating it into the rest of your gear. A few options to consider:

  • Add a speaker mic so you can use the radio while it’s stowed in your hiking pack or on your duty belt
  • Connect a low-profile earpiece so you can talk more discreetly in public
  • Pair your radio with an active ear protection system for use at the shooting range, or other loud environments
  • Build a complete dual-comm system that includes two radios on separate frequencies with a push-to-talk (PTT) button to activate each radio

Above: The Motorola XTS 3000 radios provided by Off Grid Comms can be used as stand-alone handsets, or can be connected to a variety of headsets and PTT systems.

Read on as we share two plate carrier radio setups configured by our staff. Each of these is connected to one of the Motorola XTS 3000 radios featured in our encrypted radio article. However, through the use of modular connectors, each of these systems can also be connected to a variety of other radios and comms devices.

Patrick McCarthy: Safariland Liberator V

I spend a lot of time shooting, whether it’s out in the desert with friends, at local competitions, or taking classes to learn about specific skills and weapon platforms. These activities don’t always require the same amount of gear — sometimes it’s just ear pro and eye pro, and other times it’s a full plate carrier, battle belt, and helmet with night vision system attached. With this in mind, I wanted a scalable, modular comms system.

The Safariland Liberator V is a professional-grade headset that integrates active ear pro and a dual-comm radio setup. Ordering the Liberator V reveals options for color (black, FDE, or OD green), left or right-side microphone placement, three types of suspension systems, two types of PTT controls, and even a gas mask input. Each system is made to order, and can be configured for a wide variety of military, law enforcement, and commercial radios. Certain configurations also offer a connector to integrate a cell phone into the system.

Above: Safariland's Adaptive Suspension Kit allowed me to mount the Liberator V headset to the back of the rails on my Team Wendy helmet, keeping the top rails open for lights and other accessories.

Since the Liberator V is a dual-comm system, I requested connectors for two Motorola XTS radios. This allows me to use one in digital encrypted mode for secure communication with Off Grid Comms radios, and one in analog GMRS mode for general use, or use both in encrypted mode to communicate on two separate encrypted channels. Audio from both radios is piped into the headset, and I can control each from the two-button PTT. This configuration didn’t offer a cell phone connector, but I’m OK with that. My phone is clipped into a Juggernaut Case PALS mount for navigation and video-recording duties.

Above: This PALS Plate Carrier Mount from Juggernaut Case offers quick access to a cell phone for communication and navigation.

Both XTS radios are mounted on opposing sides of my TYR Tactical plate carrier’s cummerbund in Blue Force Gear elastic pouches. The PTT’s inline disconnects allow me to unplug or replace a radio without any hassle. In situations where I don’t need one of the radios, I can shove a rifle mag into the vacant pouch.

Safariland’s Adaptive Suspension system makes it possible to swap the headset from a headband to a helmet mount in seconds. When I’m training with night vision, I attach it to the Safariland rail mount installed on my Team Wendy Exfil LTP bump helmet. The rest of the time, I use the headset in the standard Comfort Fit headband. And in situations where I just need ear pro without comms — like casual range sessions with friends — I can disconnect the headset from the PTT and use it as active ear protection. Clear sound and comfy gel cups make the Liberator system easy to wear all day, no matter what I’m using it for.

Above: The Safariland Liberator V headset can be used as standalone ear protection, or it can be connected to the included push-to-talk button that offers control over two separate radios.

Tom Marshall: Silynx Clarus

Setting up my comms system, I was looking for two things. First, I wanted my communications system to be independent of my helmet. While over-the-ear muffs attached to helmet rails look cool and are awesome for combat operations where a helmet is mandatory, nowadays I rarely wear one outside of a photo shoot. Even working as a security contractor overseas, helmets weren’t widely used, even though comms capability was mandatory when rolling out of bed in the morning. The other factor important to me was a system that could integrate with multiple types of communication devices. While having an encrypted setup is a boon for family or neighborhood teams working together, prepared civilians cannot ensure everyone around them will be operating on the same frequency or even using the same radio platforms. Enter Silynx. Though their bread-and-butter is outfitting military and government organizations, almost all of their equipment is available to civilians, and they offer scaled hardware suites for a variety of applications.

I started with their Clarus dual-lead push-to-talk (PTT) box, the cornerstone of this entire setup. I wanted to make sure I had the ability to communicate within my family/team on the Off Grid Comms encrypted radios as well as outside elements or responders who may be talking to me on other devices. The Clarus has a modular split-cable adapter system allowing you to configure the PTT box to interface with multiple types of devices. Silynx offers adapters for a variety of device types. I focused on three: the Motorola XTS pattern, a two-pin adapter for Baofeng radios, and a 3.5mm headphone jack that’s compatible with smart phones.

After playing with a couple of different permutations, I settled on setting up my Arbor Arms Communicator Armor System (CAS) plate carrier to run the Silynx Clarus with one Motorola and my smartphone. The Motorola is stowed in an Esstac radio pouch on the left cummerbund arm of the CAS. The smartphone is on a Juggernaut Case phone case and PALS Adapter tray, which lets me attach my phone directly to my plate carrier for hands-free operation. It should be noted that most current-gen smartphones don’t have legacy-style headphone ports built in anymore. But there are small adapters available that will interface this jack with either USB-C or Apple Lightning Cable ports. Since I run a Galaxy phone, I purchased a $20 USB-C adapter from Amazon and was in business. This particular capability — integrating your cell phone into your radio communication setup — is perhaps the most unique and useful feature of the Silynx system for prepared citizens.

With this setup, I’m able to make a phone call and keep the line open hands free. But the person on the other end of the phone can only hear me when I press the corresponding transmit button on my Clarus PTT box. This is an outstanding capability to have if, for example, you have to call 911 and speak with first responders while also coordinating with a family member, neighbor, or friend who has an Off Grid Comms Motorola. Now you no longer have to be at the scene of the incident to direct responders to someone else who needs help — you can relay information remotely by having two lines of communication open. While a regular phone call will not be secure, you can use apps like Signal or Threema (both discussed in Issue 53), to make voice or video calls with end-to-end encryption, while still having the ability to transmit/receive through your Off Grid Comms Motorola, also encrypted.

Above: We used an Esstac pouch to secure the radio to the cummerbund, routing the wires through it and into the rear plate bag.

Since I specifically wanted my communications to be independent of a helmet, Silynx sent me their Clarus in-ear buds, which are equipped with an in-line microphone as well as their hear-thru and sound localization technology. This feature directionally amplifies low-level ambient sound to enhance situational awareness but cuts out when receiving or transmitting communication so you can have clear conversations over radio or phone. This technology functions much like current-generation active hearing protection systems, but with the added benefit of receiving radio and phone transmissions as well. It should be noted that the Clarus we used also has a modular top lead, meaning you can unhook the in-ear buds and switch to helmet-mounted muffs or boom mic-style headsets if that better fits your application.

Above: The Arbor Arms CAS 2.0 offers plenty of routing pass-throughs, which let us bury most of the Silynx wiring underneath the carrier.

I was able to route all my cables through sleeves integrated into the Arbor Arms CAS, to minimize the amount of cable exposed to snagging or environment damage. While the Silynx system does include clips that are sized to pass through MOLLE/PALS-style webbing, I used a couple of small zip-ties to fully secure the hardware to my carrier. Routing the antenna and PTT cables through one arm of the wraparound cummerbund lets me don and doff the carrier without having to swim through a sea of cables to get the carrier off.

My experience with Silynx’s communication hardware suite was excellent. Transmission and receiving quality were both clean and clear. The modularity of the Clarus system offers a high degree of flexibility for both user interface and communication/radio platform interface. There are also single-channel and fixed-lead versions of the Clarus available that’ll save you some money if you don’t need dual-comms capability or don’t plan on switching radio types.

Plate Carrier Radio Gear Sources


California’s Electronic License Plate System Just Got Hacked

The “Internet of Things” (IoT) is a tech industry term that sounds innocuous, but its existence has some serious implications for our security and privacy. IoT devices are ordinary objects or appliances with embedded sensors, computer processors, and communication modules — WiFi-connected cars, smart picture frames, internet-connected thermostats, and so on. These devices offer some conveniences, but they've also become more invasive and prone to security vulnerabilities. You might be concerned about someone hacking your computer or phone, but you probably hadn't thought about someone hacking your smart fridge. A powerful example of this comes from California, where new digital license plates — promoted as an optional upgrade — were legalized by Governor Gavin Newsom in October 2022. A few months after release, California's electronic license plate system has already been hacked, allowing hackers to track GPS location, access the owner's personal info, change text on the plate, and more. They could even flag the vehicle as stolen, which could prompt police to conduct a high-intensity felony stop.

Screenshot via Reviver.com

The Electronic License Plate Hack

Above: Reviver's product page touts “control in the palm of your hand” by using the mobile app to customize your RPlate.

Luckily, the hackers in this case were benevolent “white hats” who had no intention of using this vulnerability to cause chaos. Instead, they immediately reported the vulnerability (likely for a large cash bounty) to Reviver, the company that sells and manages the new RPlate electronic license plates. Reviver reportedly patched the flaw within 24 hours. After an internal investigation, the company claimed that it had never been used maliciously and that no user data had been leaked to the public.

Above: This privacy promise from Reviver seems rather ironic given the recent cybersecurity revelations.

Even though a cybersecurity disaster was narrowly averted in this case, it's certainly concerning to learn how serious the vulnerability was. Security researcher Sam Curry explained that a Javascript flaw in Reviver's web site allowed his team to switch their account access level from that of a standard user to a “super administrator.” Once they had admin access, they could…

  • Access personal information of any electronic plate owner, including vehicles owned, physical address, phone number, and email address
  • Remotely track the GPS location of any electronic license plate
  • Delete license plates from the system
  • Add new license plates to the system
  • Replace the dealer logo on temporary tags for new cars
  • Change the custom text line at the bottom of the plate
  • Update the status of any electronic plate to “STOLEN,” which might potentially lead police to stop the driver at gunpoint

Above: Under normal circumstances, the ability to mark a plate as “STOLEN” instantly might seem beneficial. In this case, it almost became a huge safety issue.

A Growing Cybersecurity Problem

This isn't even close to the only serious vulnerability documented by Sam Curry in his blog post, Web Hackers vs. The Auto Industry. He also showed web backdoors that affected a staggering list of automakers, including Kia, Hyundai, Honda, Toyota, Infiniti, Nissan, Acura, Ford, Mercedes-Benz, BMW, Porsche, and even Ferrari. Many of these included the ability to “remote lock, unlock, engine start, engine stop, precision locate, flash headlights, and honk” using only the vehicle's publicly-visible VIN number.

Photo via Reviver

In the past, hackers have also demonstrated the ability to remotely turn off vehicles that are already in motion, which could lead to a serious crash.

Auto industry aside, the state of California is no stranger to glaring cybersecurity vulnerabilities. Last summer, the CA Department of Justice confirmed that the personal data of everyone who was granted or denied a concealed-carry weapon permit between 2011 and 2021 had been leaked. This info included “names, date of birth, gender, race, driver's license number, addresses, and criminal history.” This leak affected nearly a quarter-million Californians, including judges and police officers, possibly making these individuals a target for home invasion robberies and other crimes.

Talk is Cheap

In almost every case, the affected companies or governing bodies have been quick to apologize and assure everyone it was an isolated incident. But it's clear that these hacks will continue happening unless those responsible for our data spend the time and money to make cybersecurity a much higher priority.

In the meantime, we encourage you to weigh the pros and cons carefully before adding more IoT smart devices to your home (or garage).


New: Magpul DAKA Grid Rifle Case Organizer

Whether you're going hunting, heading out for some target practice at the range, or loading up for an emergency situation, it's a good idea to keep your gear in a hard case. This ensures your guns, ammo, tools, and other equipment will make it to the destination safely. But all hard cases are not created equal — the best cases have organizational systems that can be configured to prevent gear from sliding around in transit. Most of the time, this means “pick and pluck” foam that can be cut or torn out to fit the outline of your gear, but that's a one-way process. If you change your loadout after you cut the foam, you'll need to buy new foam. Magpul recently announced a new modular rifle case organization system for Pelican, Plano, and other hard cases known as the Magpul DAKA Grid organizer.

The Magpul DAKA Grid case organizer consists of three pieces. It starts with a thin layer of bottom foam to provide cushioning, and tops this with a middle layer containing a grid of equidistant holes. Included sets of 10 double and 10 triple blocks can be inserted into these holes like pegs to create any layout you need. Best of all, they can be reconfigured in seconds if you want to change the layout.

Magpul says that additional expansion sets will be offered for the DAKA Grid in the future, including:

  • Angled blocks to fill atypical gaps
  • V blocks to support barrels, bows, fishing rods, and other narrow items
  • Tie-down straps to secure items onto the grid
  • Organizational containers for small items

Currently, the DAKA Grid system is only available for two gun cases, the Pelican Vault V730 and V800. However, Magpul's announcement video mentions that models will also be available for the Pelican 1720 and 1750, the Plano AW2 42″ case, and a new DAKA rifle case manufactured by Magpul itself (coming soon). You can read more about the Magpul DAKA rifle case line, available in 35, 44, and 53-inch sizes, here.

MSRP for the DAKA Grid system is $140 for Vault V730, and $160 for Vault V800. Block expansion kits (6 additional double-blocks and 6 triple-blocks) will be $30, but they're currently marked “coming soon.” The remaining case systems and accessories are expected to be available later in 2023. For more information, check out the video below or go to Magpul.com.


Video: Stealth Camping in a Nissan NV200 Panel Van

When someone mentions “urban survival,” what comes to mind? For many, that term evokes images of wandering alone through a barren, dystopian landscape like those seen in I Am Legend or The Walking Dead. But the reality of urban survival is much more practical — it's about finding a way to live in a densely-populated, fully-functioning metropolis while avoiding confrontations with other residents or authorities. The so-called stealth camping movement is an interesting approach to this everyday form of urban survival. One YouTube content creator known as Stories from a Van filmed a 15-minute video showing how he lives comfortably under the radar in his innocuous-looking Nissan NV200 panel van.

Evan, the man behind Stories from a Van, says he built this Nissan NV200 with help from his father, a carpenter. Aside from a small vent and some low-profile solar panels on top, it appears to be a completely normal delivery or utility van from the outside. These small vans are common in cities, so no one will bat an eye at it, unlike a larger 10-passenger or Sprinter van.

The build began by insulating the interior and adding a layer of vinyl to cover the insulation. Custom wood cabinets were built across the full length of the van's floor, offering storage space as well as some surprises like the shower pan and drain in the center compartment. A folded foam mattress serves as Evan's bed, and a simple Igloo cooler acts as his refrigerator.

At the back of the van, there's a sink concealed underneath the desk surface, along with a clever U-shaped drawer that makes use of the dead space around the sink. The lighting on the ceiling and power outlets are connected to a custom electrical system Evan built. It includes onboard batteries linked to the solar panels as well as a charge controller hooked up to the van's engine for cloudy days.

The rear of the van also contains a custom plumbing system with two fresh water containers and a gray water tank underneath the body. There's clearly a lot of thought put into this setup, and we appreciate how truly discreet this stealth camping van looks. Check out the full video walkthrough below:


New: LifeSaver Wayfarer Compact Water Purifier

On the hierarchy of resources required for survival, clean water is near the top. As the old adage goes, humans may survive as little as three minutes without air, three hours without shelter (in extreme climates), and three days without water. But even if you have access to a nearby lake or stream, there's a high likelihood the water is contaminated by microorganisms that will make you violently ill. To avoid this, you'll need to purify the water first. British water purifier company LifeSaver, whose products we've reviewed in the past, recently launched a new compact purifier called the LifeSaver Wayfarer — the company's smallest and lightest device yet.

The LifeSaver Wayfarer is designed to fit easily into a pocket or small backpack, and weighs only 11.4 ounces. As with other LifeSaver products, it's made in Britain and tested to exceed NSF/ANSI P231 standards for removal of bacteria, protozoan cysts, and viruses. It also removes chemicals, microplastics, heavy metals, and unpleasant taste/odor from water. Additionally, the Wayfarer features the company's FailSafe technology that cuts off water flow once the filter reaches the end of its lifespan, ensuring contaminated water won't pass through.

The Wayfarer consists of a black polymer housing with a retractable pump handle, inlet tube, and outlet tube. The 4.2-foot scavenger hose is connected to the inlet, then placed into a body of water; the integrated float keeps it from sinking to the bottom. A shorter clean water hose connects to the outlet, and can be placed into your water bottle or hydration bladder. Pumping the handle forces water up through the first-stage ultrafiltration (UF) cartridge and second-stage activated carbon disc. Both components are replaceable — the cartridge lasts for up to 5,000 liters, and the disc lasts for up to 100 liters.

We were pleasantly surprised to learn that the LifeSaver Wayfarer will retail at an MSRP of $105. Many purifiers in the sub-$100 price range are made in China with questionable testing standards or no mention of lab testing at all. So, the Wayfarer seems like a solid value in comparison.

LifeSaver says the Wayfarer will become available on February 1st, 2023, but it's currently available for preorder. we're looking forward to seeing it in person later this month at SHOT Show. For more updates, keep an eye on IconLifeSaver.com.