Tactical Shorts Buyer’s Guide – Summer 2021

Those of us who carry concealed firearms often adhere to the “dress around the gun” philosophy. In other words, we wear clothing that makes it easy to conceal the firearm, rather than excessively tight, form-fitting apparel that might make the weapon more visible. However, it's possible to take this concept too far — you'll appear out-of-place wearing baggy jeans and an oversized sweatshirt in the middle of summer. For this reason, we're taking a look at a few pairs of lightweight, durable tactical shorts that are designed for concealed carry, range trips, and everyday use during the warmer months.

Tactical Shorts Buyer's Guide

So, what are tactical shorts, anyway? They might also be called range shorts or cargo shorts, although not all have traditional cargo pockets.

Whatever you call them, these shorts are designed with guns, range equipment, and every-day carry gear (i.e. knives, flashlights, medical kits) in mind. They're lightweight enough to remain breathable after hours of strenuous activity in the sun, but also durable enough to hold up to hard use. They have an array of pockets for common items, and some may be tailored to rifle or pistol mags. Flexibility is also a priority, since the wearer may need to climb or crawl around obstacles while running drills.

I live in Arizona, and shooting during the summer months usually means dealing with triple-digit heat, even after sunset. It's a top priority to find clothes that won't slow me down or leave me dripping sweat after a few minutes outside. Much like insulating apparel in cold climates, breathable clothing in the desert is worth its weight in gold.

With this in mind, I picked up a few pairs of tactical shorts from companies that specialize in this market — 5.11 Tactical, Vertx, and Viktos. Read on for my thoughts on each.

5.11 Tactical Aramis 10-inch Shorts

Sizes: 28 to 44
Colors: Khaki (pictured), Black, Ranger Green, Battle Brown, Grey Blue
MSRP: $45
URL: 511Tactical.com

Notes:
The Aramis shorts are constructed from 98% cotton with the remainder being stretchy Elastane. These materials keep them light and breathable; however, cotton soaks up moisture like a sponge, so be aware of this if the forecast predicts any rainfall. Reinforced belt loops and a V-shaped lower-back webbing loop will keep your favorite gun belt where it belongs.

A total of seven pockets are integrated into the design, including two back yoke pockets at the four-o-clock and eight-o-clock positions. These are well-suited to AR mags, notepads, cell phones, and the like. A running gusset in the crotch improves flexibility and durability, and N6 knife reinforcements at the corners of the front pockets are designed to alleviate wear in these key areas.

I appreciate that these shorts are a little sleeker than most other 5.11 Tactical shorts. They omit side cargo pockets, zipper or flap closures, and other duty-oriented features, and the end result is a design that won't turn any heads on or off the range.

Vertx Cutback 11-inch Shorts

Sizes: 30 to 44
Colors: Shock Cord (pictured), Exhaust
MSRP: $65
URL: Vertx.com

Notes:
Vertx calls this material VaporCore, and it's a blend of 48% cotton, 25% 37.5 polyester, and 27% T400 polyester. The combination results in fabric that's soft and light with excellent moisture-wicking capabilities. Plentiful double-stitched seams, bar tacks, and rivets ensure long-term durability.

These shorts feature eight pockets, including deep, mesh-lined front pockets that help considerably with airflow around the legs. Two back yoke pockets and one right thigh pocket offer storage for smartphones, rifle mags, and other large objects. There's also a watch/coin pocket that contains a pass-through slit for a radio headset or earbuds.

I've always liked the way Vertx integrates helpful hidden features that the average wearer might never notice. For example, there are several two-inch-long mini stash pockets inside the fly and waistband; they're the perfect size for folded emergency cash, hidden keys, or lockpicks. The front pockets contain anchor loops that can be used to retain the sheath of a concealed fixed-blade knife, or the holster of a pocket-sized handgun. Despite these features, the Cutback shorts are comfortable and look discreet enough for everyday wear.

Viktos Operatus 10-inch Shorts

Sizes: 28 to 44
Colors: Coyote (pictured), Nightfjall, Greyman Camo, Ranger Camo
MSRP: $50
URL: Viktos.com

Notes:
Viktos says the Operatus tactical shorts were “inspired by the Rhodesian bush wars' combat shorts.” While I can see some resemblance in the cargo pocket design, I'm glad to see it paired with a more conservative 10-inch inseam — the 1970s cutoff design left little to the imagination. These shorts are made of a modern 88% polyester and 12% spandex blend that's quick-drying and flexible.

Pocket configuration is unconventional, with two front pockets, two cargo pockets, a change pocket, a left front zippered EDC pocket, and a right rear pocket (probably not ideal if you're a lefty). These are lined with mesh for drainage and breathability.

Another unconventional feature is the use of a metal G-hook instead of a button. However, the more we thought about this, the more it makes perfect sense. It's strong, mimics the closure of many range belts, and lies flat against your abdomen (or IWB holster, if you're a fan of appendix carry). Three closure loops are sewn in, so you can tighten the fit by moving the G-hook to different positions. With the asymmetric pockets and prominent Viktos lettering on the thigh, these are a little flashier than other shorts, but they're very comfortable and functional on the range.

Closing Thoughts

This is only a small sample of the tactical shorts segment — there are plenty of other pairs to consider, even from the brands seen in this article. But these three styles are a great place to start, whether you need a pair that's low-profile for every-day carry or a pair that you'll only be wearing to the range on weekends. With a little forethought, it's always possible to “dress around the gun” while remaining comfortable and relatively discreet.


Doxing: What If Your Privacy is Compromised Online?

George Orwell was right — invasion of our private lives is becoming a greater threat with each passing decade. Even if it’s not being used by Big Brother’s totalitarian regime, our sensitive information is increasingly accessible to unscrupulous corporations, cybercriminals, and anonymous strangers who know where to look. According to Wikipedia, “Doxing or doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet.” It’s an increasingly common act of intimidation and an exposure meant to enable complete strangers to actively engage in harming you.

In 2012, an interactive map was posted online showing the names and addresses of New York handgun permit holders in Westchester and Rockland counties. Was this freedom of the press or potentially endangering people? Whether those gun owners like it or not, their info is now exposed, even if the post is deleted. More recently, the web site for the California Department of Justice leaked personal information — including full names, home addresses, dates of birth, and whether the individual works in law enforcement — for thousands of the state's gun owners. The President of the California Rifle and Pistol Association called this a “vindictive” act by “sore loser bureaucrats,” implying that it may have been a response to the recent Supreme Court ruling that forced the California DOJ to remove its “good cause” requirement for concealed carry permit applications.

The list of similar situations goes on. From the dentist who shot Cecil the Lion, the Ashley Madison data breach, or celebrities Tweeting out the home addresses of people they don’t like, one thing is for certain — the more information you have online, the greater the risk of it being used against you. If you were part of a group that’s becoming increasingly stigmatized — and you may already be without knowing it — how can you protect yourself from the prying eyes of the outrage culture zealots who mean to harm you?

The Doxing Scenario

Situation Type: You’re being doxed

Your Crew: You, your wife, and your children

Location: Your hometown

Season: Autumn

Weather: Normal

The Setup

Imagine you attended a city council meeting to express your concern about the side effects of a growing homeless population in your area. You plan to voice concern for your family’s safety after witnessing an increase in drug sales, sexual assaults, and public defecation. This meeting is packed with people on both sides of the issue. Some activists who attended this meeting did so in an effort to retaliate against residents who were speaking out against the homeless problem. While attending, they photographed attendees, got names and addresses off the sign-in list, and used public social media posts and press photos to identify the key participants in the meeting.

Also, an online petition appearing to solicit residents to push for legislation that imposes tougher penalties against homelessness had recently been started. By the time the petition had reached several thousand signatures, including your own, it was determined that everyone who’d signed up had been catfished. The fake petition was actually started by a self-proclaimed social justice blog that published all the names, addresses, phone numbers, and personal info for the world to see. The blogger didn’t openly condone violence, but encouraged his followers to go “have a conversation” with everyone on the list to teach them the error of their ways.

what if internet doxing cover

Illustrations by Joe Oesterle

The Complication

Now hostile notes are being left in your mailbox, harassing calls and texts from blocked numbers are coming in, and you genuinely fear that the reprisals will become physical. How can you protect yourself against open-source information collection, harden your digital footprint, and mitigate risk without abandoning technology altogether? We asked tactical trainer Katheryn Basso and financial industry expert Dennis Santiago to weigh in with their recommendations on how to stay safe when revenge-driven people are targeting you based on what they can find on the internet.

Tactical Trainer Katheryn Basso’s Approach

I used to take a lackadaisical approach to my internet and phone habits. I kept my location services on 24/7, connected Google to everything, and handed out my personal data and contact information to any account that needed it. After all, I had nothing to hide. In fact, I figured if something were to happen to me, maybe it would help the police locate me. Unfortunately, in today’s divisive climate where your beliefs, hobbies, or actions may offend the wrong person, limiting your internet footprint is vital to privacy and safety. In today's environment, Internet Doxing can quickly lead to real-world dangers. 

As memberships and access to even the most mundane interests become digital, the threat of your information falling into the wrong hands increases. Your hacker could be a 13-year-old boy just testing his latest Kali Linux skills, a highly sophisticated cybercriminal who makes a living off blackmail and extortion, or a violent person looking to harm you. This anonymity makes it difficult to identify and prosecute the perpetrator — you may never know who is committing a crime against you, or why they’re doing it. 

You may be surprised how much of your information is already available to the public, just waiting to be used against you in some hateful campaign. However, it’s not too late. With some dedicated work, you can increase your privacy and lessen doxing damage before it occurs. 

Preparation

Let’s first call out the biggest issue: I gave my true name and real address to an unverified online petition. Let’s say I wasn’t thinking straight and slipped up. That’s fair; it happens. In this particular situation, I assumed the petition going around was for government purposes: gather enough signatures of actual residents to push for legislation change. Most of these online petitions require personal information (full name and address) they ensure will remain “safe” within their site. In order to properly arm myself from doxing, I need to change my thinking. I need to assume a data breach will occur at some point with every online site. 

I’m sure you think that’s extreme, but I was in the military during the Office of Personnel Management breach. If 4.2-
million current, former, and prospective federal employees’ background information can be stolen, how secure do you think your information is at the local coffee shop? Is that free coffee for joining their mailing list really worth it? 

One free and easy way to see if your email address and/or phone number were part of a breach is to check them at HaveIBeenPwned.com.

Unfortunately, in today’s age of connectedness, digital marketing, and data analytics, most businesses and sites require a name, email address, and/or phone number to access member-only benefits. So, how can I live in today’s age of loyalty points, travel rewards, and grocery shopping discounts while also remaining as safe and secure as possible? I should assume I’ll be exposed, then take a few general security steps to mitigate the breach. 

1. Remove my information from data aggregates: Third-party data mining companies have been collecting my publicly accessible information since I got my driver’s license. This includes addresses, phone numbers, email addresses, known associates, etc. The good news is I can request they remove my personal data from these sites. This is a long and tedious task, but I know it’s worth it to gain control over my security. Check out Michael Bazzell’s IntelTechniques.com for a helpful list of data-removal options. 

2. Opt for a credit freeze: Putting a freeze on your credit prevents identity thieves from attempting to open new accounts (i.e. credit cards and loans) in your name. A credit freeze doesn’t prevent you from using your current accounts. You can unfreeze your credit at any time, and it’s absolutely free. Freeze your credit at each of the three main credit bureaus.

3. Use various junk email addresses: I use multiple email addresses for my junk email — those accounts that require an email address for access. I rarely check these accounts since I know they’ll be sold to third-party companies for marketing. Since these accounts are usually part of breaches and aren’t tied to important accounts, any follow-on phishing attempts are easily spotted. 

4. Create strong passwords: Most of these breaches include email and passwords. I use a secure password manager that creates strong passwords for my accounts. If you asked me what my password was for any given account, I wouldn’t be able to tell you without going into my password manager. I highly recommend you use unique passwords for each account and update them every 60 to 90 days. 

5. Use a VPN: A Virtual Private Network secures your connection by creating an encrypted tunnel between your device and the website you’re visiting. This not only prevents hackers from intercepting your data, but it also masks your Internet Protocol (IP) address so your activities cannot be traced back to you. Compare VPNs before you purchase; they are not all created equal.

6. Use VOIP phone numbers: My phone is constantly talking to cellular base stations that could be used to triangulate my location. While these services are restricted to authorized personnel — like law enforcement and bounty hunters — they aren’t 100-percent safe from the human factor (disgruntled employees, assistants wanting to make extra cash, or hackers). Google numbers or paid Voice-Over-Internet-Protocol numbers provide an extra layer of security between yourself and nefarious individuals. I hand out a VOIP number when required to provide full contact information. And if one of these numbers gets compromised, I can easily switch VOIP numbers without the hassle of changing my true number. 

7. Encourage security habits with family and friends: Those closest to you tend to be your weakest link when it comes to securing your privacy. Again, most people don’t think about their own physical security when they’re safely behind their phone or computer screens. While social media has provided us a way to connect, it’s also a treasure trove of open-source information that can lead people to your location. How much you restrict on social media is a personal choice — I know many people who refuse to have accounts. However, you can’t always control your friends and family. I tend to have a 24- to 72-hour rule with social media; I upload pictures one to three days after an event. My friends or family, however, may upload a picture of us immediately. There’s not much you can do except avoid pictures or ask them politely to wait or remove the image. Encouraging your friends and family to follow your privacy habits may not always be easy, but it’s worth the conversation. 

8. Encourage security habits with your neighbors: While the same privacy-minded habits can and should be pushed with neighbors, physical security habits are just as important. After a few scary incidents here, an active neighborhood watch, security cameras and trail cams have proliferated through the community. Deterrence is important to maintain physical security, especially if one of our addresses is posted online for nefarious purposes. 

Crisis

Now that I’ve taken certain privacy precautions, let’s return to the scenario. My name and address have been released online. All that work was easily compromised by one single mistake, yet my preparation has prevented a bigger disaster. Yes, they know my address, but my emails, accounts, credit, and passwords should still be safe. So, what are the next steps?

internet doxing text message rage

1) Get the police involved. Take a screenshot and report this to the police. Most states have some form of anti-harassment/anti-stalking laws that cover doxing situations. Do note, even if they’re able to take the site down, it doesn’t prevent the wrong people from obtaining my contact information. It’s out there now; it can be continually republished as long as there’s still a will to create harm. Thus, I’d request extra police presence; ask them to drive by my house as part of their rounds. Again, deterrence is important. Due to limited staffing, this may or may not be possible, but I can ask. Since I have security cameras, any physical trespassing will be caught on tape. I can provide this to the police as well to assist in their investigation. 

2) Change my number. Luckily, I provided a VOIP number that can easily be changed. If, for some reason, my real number was leaked, I’d cancel that plan, get another phone, and start using a different VOIP number. Get clean first. 

3) Become physically secure. Depending on the level of threats, I’d have to decide whether to stay at my residence, leave my house temporarily, or permanently move. This is a huge decision based solely on the danger and my willingness to accept risk. Often with these doxing situations, threats subside once the perpetrators move on to their next cause. 

I, like most people, have Googled myself. Now that I’m writing in true name and taking part in interviews, I am becoming more exposed in the public sphere. I’ve chosen a level of security that fits my goals and lifestyle: I want to exist, but not necessarily be found. The steps outlined above are a few basic privacy measures that’ll assist you in living safer in a digital age; they are by no means all encompassing, nor will they set you up for extreme privacy.

Financial Industry Expert Dennis Santiago’s Approach

You wake up to a nightmare. Out of the blue your privacy has been stripped away. It’s all because you said something, wrote something, or participated in an action that you believed was moral and ethical. You expressed your opinion like a free person in America has the right to do, but an organization of strangers didn’t like it.

And now you’re asking yourself three questions: What could I have done to avoid this? How do I make this end? What needs to change so it doesn’t happen to others? We’ll break that down, but first a little insight to let you know what you’re up against. This is vile, asymmetric warfare.

For instance, you’re probably aware of the term “Facebook jail,” a sort of purgatory for your residual self-image in the matrix of the internet. Anything you say on social media can result in anonymous complaints being filed against you. Your accounts become increasingly restricted, if not hacked and vandalized. You don’t wind up there by accident. Somewhere out there, strangers are accusing you of being a witch, turning in complaints, and asking the algorithms, moderators, and reviewers of the web to burn you at the proverbial stake.

That harassment also follows you to your workplace. The barrage of phone calls and emails affects you there too. Like the complainants on social media, this army of strangers are demanding you be fired. The company you work for goes into a panic because they’re in the headlines for all the wrong reasons. In some cases, your career may tumble out of control or come to an end.

Politically outspoken people who exercise their 1st Amendment right to free speech are particular targets of this sort of harassment. Doxing doesn’t care who it hurts. It can be for any cause. In this age of the tiniest thing triggering nuclear retaliation, you could’ve said you didn’t like wearing a mask. On the internet, someone will be angry enough to take offense; and where there’s one, there’ll be many more. And some of them will be vicious. 

What could I have done to avoid this?

The first thing to realize is that doxing is a very personal version of psychological warfare. It’s very much an antisocial and cowardly act by one human against another. If it’s done to you, the people engaging in it are actual enemies. They’re seeking to exploit your vulnerabilities to intimidate you. They’re out to silence you by whatever means they can. What you need to do is minimize your target profile.

The second thing to realize is that there’s no such thing as anonymity on the internet. Many people use pseudonyms. Such a practice almost always eventually gets you into trouble. It’s fun to come up with a catchy name for yourself and immerse into a role-playing persona with the anonymity of a pen name. You express thoughts standing on a soapbox from inside what feels like a cocoon of anonymity. This makes people brave, sometimes enough to take extreme edges of the argument. This is all but guaranteed to raise the ire of those who hold opposite views.

Before the internet, it was difficult for these opposing parties to find each other in the real world. Conflicts were avoided simply because the pairs of volatile personalities would never meet in real life.

With the internet, that barrier to interaction is gone. Billions of people can have access to every musing you express on the medium. And if they don’t like you, they’ll take note of you, not because of who you are, but because of the ideas you represent. Ideas they hate. When doxing perpetrators attack, they’re hoping the revelation of secret identity will be enough to silence the target. Avoiding an attack in the first place requires you manage your vulnerability.

First, consider not being anonymous in the first place. Being yourself in the universe of debate means there’s nothing hidden to expose. It’s taking the high ground with your opinions. Revealing who you are when you open your mouth forces you to heighten your awareness of the consequences of what you say. They can’t expose what’s already in the open.

Second, curate who you interact with. Engaging in politics with strangers is a dangerous thing we humans do to each other. Online, remember to trust no one. Do your homework and check out every person who tries to come into your orbit.

Did that person actually say they believe that anyone who’s hesitant to be vaccinated should be “compelled” to do so or be banned from participating in any social activity? Did you see that person comment to someone else that they actively report persons they don’t agree with politically to the social media platform’s anonymous complaint utility?

Situational awareness is something most people interested in their survival and happiness should practice. Detecting persons with dangerous antisocial traits who act on those impulses is one of those recognize-from-afar things. It’s OK to mute friends who’ve become hyperactivated by spending time in too many echo chambers. I now do that at the onset of political election cycles. It’s better for preserving friendships based on enjoying what’s common and tolerating what isn’t.

When I detect people who are truly dangerous, I just block them. I use the harshest protective tool available on the platform, and make sure I can’t see them and they can’t see me. The technical term for that in electronic warfare is “interrupting the firing solution sequence.” It’s really hard to click on the report-this-post option on a social media platform if that person can’t see the post in the first place. 

I’m not saying entirely avoid people who have colorful personalities, or those who have differences of opinion. That’s silly. Our ability to live within a culture of independent citizens depends on our ability to tolerate each other. You’re just trying to winnow the psychos, which is a prudent thing to do as far as I’m concerned.

Third, take the time to realize that every action you take is self-revealing, like a walk through a minefield. It’s important to know who’s real, who’s a fake personality, and what’s an artificial intelligence robot (those can now emulate humans very well indeed). They’re out there on the internet. You’ll run into them if you actively discuss current events and politics. They aren’t there to discuss things. They’re there to trigger to you discuss things and demonstrate subject matter affinity that they can sell as marketing data to other companies on the internet. 

It also could be as simple as ad revenue being the motivator — every digital news bureau and all their clickbait-packaged stories are all about making that top-line fraction of a penny each time they get someone like you to look. On the internet, the money has always been about the commercials, the ads that get served along with the stories. If you choose to involve yourself publicly in these issues, it’s important to stay aware of this. When you post or repost a story, meme, or article, you’re revealing a piece of research information about yourself. Hundreds of algorithms go to work on that information a microsecond after you click “send.”

Fourth, curate yourself responsibly. There’s a concept of how you comport yourself in public and in private that’s important to manage when interacting with the world on subjects that can trigger other people to take offense. My advice here is that what you say in public should always be measured. How you ponder the extreme ends of the spectrum of possibilities should always be private. What position you finally come up with should be a balance between emotion and reason. It’s good to take the time to research your opinion to see where it falls in the spectrum of society. Too many people think the privacy of what they type into a keyboard while alone late at night is profound, and then the sun rises in the East. Don’t be that guy.

Fifth, don’t fall into the trap of trying to be the most popular person in the room. There’s a macabre thrill that comes along with seeing what you’ve said explode virally into thousands, or even millions, of likes. It can be addicting to chase popularity. The internet beguiles with tales of riches for people who have turned the corner curating themselves into a money-making operation. But for a person selling nothing but their opinions, it tends to be a chase that ends in anguish. Eventually you’ll fly too close to the sun and your wings will melt. The most important people in a room have an aura that’s easy to spot. They’re just quietly there. They aren’t the ones jumping up and down yelling, “Look at me!” You don’t have to be one of them either.

How do I make this end?

In this case, whether you did or did not abide by the vulnerability management things listed above, you got doxed anyway. Now what? You’re in crisis mode. First, start limiting the damage. Change all your passwords and screen names. Review all your contacts and cull anyone overtly hostile. You just hit a moment on the internet where it’s better to have a few trusted friends than thousands of acquaintances. In the worst case, suspend your accounts, if there’s an option to do so.

Second, if the harassment becomes physical, don’t ignore it. Put up “no trespassing” signs at your property boundary. If it’s bad enough, change your phone number. Get a new email address. Put up multiple high-definition cameras and record everyone that comes to your doorstep. If you can, add additional cameras that record the license plates of cars coming and going. Do this until the hoopla passes. Then, you can consider going back to normality.

Third, deal with the consequence effects of being doxed. If you were using a pseudonym to hide your identity to participate while throwing flaming bombs yourself, you may now have a price to pay in the real world for having done so. That’s a risk you took. That’s a price you must be prepared to pay. I haven’t found anyone who’s done this and never had to face the day it blows up in their face. Karma. It’s real. Back to my advice, “Don’t be that guy.” But if it did happen, I have another piece of advice that’s seen me through many trying times, “Sometimes the only way to win is to lose gracefully.” That may be what you need to do. For your family’s sake, do what you need to do.

internet doxing

What needs to change so it doesn’t happen to others?

The thing about doxing is that your attackers are also ones hiding in the shadows of anonymity. I believe that’s the beginning from where society needs to mount a counterattack. Current laws and abuse reporting policies tend to protect the anonymity of whistle blowers. The problem is that these protections apply even when the whistle blowers are actually malicious witch hunters.

It’s not like the social media companies don’t have records of who made the complaints against you. Users’ emails and IP addresses are retained, and the presumed anonymity of the accusers can be pierced if malice is revealed. Artificial intelligence algorithms to test for maliciousness and abusive reports can be designed. Tech companies can scrub the internet to halt a viral contagion from propagating, or to manage a political war, as we saw in 2020. The problem is that none of these systems are being used to protect the maliciously accused from frivolous attack, particularly when it comes to real-time solutions that follow the principle of innocent until proven guilty. In corporate America, risk management is designed around the exact opposite principle — the accused is in the wrong until cleared. The technologists and the legal departments that advise them should probably be pushed to get those principles into a better balance.

It’s not that these detectors are hard to make either. Patterns of abuse tracking are certainly part of determining whether to put a user into virtual “jail.” Why not use patterns of abuse analysis to detect serial abusers of other people’s right to have an opinion? It’s similar to the process of hunting pedophiles online. It’s time to stop enabling abuses by the witch hunters.

To be sure, such an abuse-catching system would find bad behavior across the entire spectrum of opinion in America. The internet’s technology and legal framework design enables the problem. But is it so bad that everyone will have to learn to behave and be more civil while exercising the 1st Amendment?

Conclusion

Anyone can be doxed. Even if you avoid social media, use a VPN, two-factor authentication, firewall, and password manager to hold each unique password for each unique secure email account from a non-attributable computer or phone, you can’t control the human factor. This isn’t just a cyber issue — it’s a life issue. And if you plan on getting involved in your community, your children’s school fundraiser, or your work’s outreach program, there’s a chance your information, such as a picture of your face and contact information, could be released to the public. That’s a part of the world we now live in.

However, taking precautionary steps to limit exposure could prevent an event like this from becoming a nightmare. Security isn’t always convenient; it’s not always easy. But considering the alternative, it’s worth it. You choose — the life of an antisocial mountain hermit or existing in the real world with certain inconvenient steps to ensure privacy. 


About the Authors

katherine basso

Katheryn Basso

Katheryn Basso is a U.S. Marine Corps veteran trained in identifying sources of instability in foreign countries. Proficient at navigating the complex civil-military terrain of foreign policy, she has advised and advocated for military and civilian leaders from multiple partner nations. She’s currently the co-owner of TEAM TORN, a tactical training company based in Nevada that instructs U.S. military, government, and civilian personnel. She specializes in firearms instruction, conflict avoidance, and personal security strategies. www.teamtorn.com

dennis santiago

Dennis Santiago

Dennis Santiago is a global risk and financial analyst. His national policy expertise includes strategic warfare, asymmetric warfare, and global stability. He’s a financial industry subject matter expert on systemic risks to the U.S. economy and the safety and soundness testing of U.S. banking institutions. www.dennissantiago.com


More Scenarios to Consider


Invisible Preparedness: A Letter from the Editor

Preparedness has traditionally been a physical endeavor, highly focused on concrete tangibles: food, water, ammunition, medical supplies, and so on. But the information age is here to stay, and we feel there still exists a large dead space in current discussions about preparedness, and media representation of it.

Communications security, known in military parlance as COMSEC, is a critical part of your individual, family, or organizational preparedness infrastructure. It’s a nebulous concept that can encompass a wide array of different skillsets and best practices — most of which go well beyond the technological savvy of the average person. So, we felt it was important to dedicate some serious effort to the topic and try to help you add some electronic tools to your preparedness tool belt. 

As part of that effort, we’re happy to bring some new contributors into the fold who possess “a particular set of skills” in this arena. Dean Freeman penned two articles for us — one on Software Defined Radio, which allows you to turn a computer or tablet into a radio receiver/transmitter, and another on steganography, a method of embedding text messages in digital images for discreet communications. Our cover model is an electrical contractor and Instagram content creator who goes by the handle @socal_offgrid; he outlined his tech-oriented EDC in our Bag Drop column for this issue. RECOIL OFFGRID veterans Katheryn Basso and Dennis Santiago return for this issue’s What If… about doxing, a social-media-era phenomenon defined as “searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.” We’ve seen self-proclaimed activists from all angles of the sociopolitical spectrum use this tactic to devastating effect. Occasionally, it nets a positive result for the greater good, but it has also destroyed lives, careers, and reputations on account of a benign misquote or case of mistaken identity. Patrick McCarthy gives us a thorough review of the little black disc known as an NFC tag, an easily concealable data storage device that relies on near field communications, which he explains in lay terms. 

As I said earlier, digital security is only one facet of survival in the modern world. So, we brought back combatives expert Chad McBroom to review his process for making a functional knife from scratch using items you can source from the local junkyard and techniques you can perform in your garage. We also sent Steven Kuo on a weeklong training excursion designed by former CIA
officer and Shark Tank competitor Jason Hanson.

Changing your passwords and maxing out your privacy settings isn’t enough to keep your personal information safe anymore. As always, we hope to educate and inform you on not just what threats are out there, but what you can do about it. 


offgrid issue 45 cover

 


Judgement Day: Guardian Training and Consulting

Knowing how to shoot has obvious value. If your fundamentals are solid, you’ll be able to quickly and reliably put rounds where they need to go. But that’s only one piece of the puzzle — it’s also critical to know when to shoot. Missing a shot might have serious consequences, but shooting someone without adequate justification (or hesitating to shoot when you need to) is guaranteed to be a life-altering event. In order to hone my judgment, I connected with Josh and Karen Logan, the owners of Guardian Training and Consulting.

At the time I connected with Guardian, the company was sometimes hosting classes at the Scottsdale, Arizona, headquarters of Haley Strategic. While Haley’s courses are tailored to experienced shooters, Guardian offers a varied and affordable curriculum to a broader audience, and provides an abundance of one-on-one feedback.

I began by attending Guardian’s half-day Arizona CCW class — I already have a permit, so this served as a refresher on state laws regarding use of deadly force. Logan and his instructors did a good job explaining the legalese and its practical implications. I’d recommend everyone take similar classes periodically, since knowledge of the law will provide a foundation for your decisions in any self-defense situation.

Next, I attended another half-day Guardian class called Pistol Fundamentals and Judgmental Use of Force. This class covered both the how and the when mentioned above. It began with a segment on the nuts and bolts of shooting a handgun — stance, grip, sight picture, and trigger press. The students, several of whom were new gun owners, practiced these principles in front of Haley’s VirTra 100 simulator screen. The CO2-powered, laser-equipped VirTra pistols showed any flaws in our technique, and Guardian instructors provided feedback based on our shot groups.

guardian training and consulting

The other half of this class focused on combining these fundamentals with good judgment. We stepped into the wraparound VirTra 300 simulator and prepared to do some on-the-fly problem-solving. Instructors reminded us that, just like real life, not every scenario would require us to discharge a weapon.

The first scenario I faced involved the theft of an ATV from a barn on my property. As I approached to investigate, the culprits were revealed to be two young teenagers. One hesitantly brandished a knife but dropped it and retreated when I drew my gun. The second teen drew a gun of his own, so I fired three rounds, ending the threat. I was able to justify my actions when Guardian instructors asked probing questions, much like investigators and lawyers would in the aftermath of a real shooting.

Our second scenario took place in a crowded movie theater. As we waited for the previews, I noticed the emergency exit door was cracked. This seemed unusual, but I knew something was wrong when a man stepped through wearing a gas mask and tactical vest. I couldn’t see a weapon at first, so I waited to draw until I could clearly make out a shotgun in his hands. I drew and fired five rounds; he staggered but returned fire, so I kept shooting until he fell. This reinforced the fact that judgment isn’t only necessary before the first shot — it’s a continuous process of assessment. 

These courses from Guardian Training and Consulting helped me develop more confidence in my ability to react to an unfolding situation, and reinforced the tremendous importance of judgment in any use-of-force scenario. For more information on future classes, go to gtctrain.org or follow @gtctrain on Instagram.


MORE FROM OFFGRID ON TRAINING AND PREPAREDNESS


SB Tactical SB22 as a Survival 10/22 Chassis: Backpack Game Changer

The Ruger 10/22 is a decades-old, highly proven design that belongs in the safe of every red-blooded American. The 22LR cartridge has been used to take a wide variety of game and provides a reliable, lightweight, sometimes inexpensive plinking round that can be carried by the hundreds. The 10/22 is supported by an immense amount of aftermarket part manufacturers, and we were lucky enough to get our hands on SB Tactical’s new SB22 fixed 10/22 chassis for review. 

SB Tactical SB22 10-22 Chassis

Why Rimfire?

First, let’s beat the dead horse of how great the 22LR is as a survivalist cartridge. Carrying a brick of 22LR takes up little space and provides the shooter with several hundred rounds of ammunition for squirrels and such. We can all agree, however, that 22LR wouldn’t be our first, or even fifth, choice for a defensive cartridge. But for small and possibly even medium game, it’s a decent choice. In the not-so-distant past, when ammo flowed freely, the venerable rimfire cartridge was plentiful and the shooter had plenty of options to tailor the equipment to the mission. The shooter could carry a mixed bag of hollow points, heavy subsonics, shotshells, and even match ammo that’d give them different capabilities when it came to hunting and, in a pinch, defense. The 10/22 design is generally very reliable in feeding and functioning with these different loads, so in the lucky instance you come across a less-common load, you can feel confident it’ll run in your gun. 

SB Tactical SB22 10-22 Chassis

Outlining all the needs for a rimfire build would make for a long list, so we looked at what we’d want if we were carrying a 22 rifle or pistol as more of a secondary role — not as a primary defensive gun, but to supplement the primary for hunting. Ideally, this would be kept in a go-bag or a vehicle where it takes up little room but doesn’t scrimp on features or capability. 

The 10/22 Chassis

Enter the SB Tactical SB22 kit. This company’s offerings have become an industry-standard in braces for a wide variety of firearms over the past few years. The SB22 kit builds on their product portfolio, representing one of their first ventures into a brace-type product for non-pistols. The kit comes in two varieties, the fixed for your standard 10/22 or 10/22 charger and the SB22 Takedown for takedown 10/22s and Chargers. The 10/22 chassis was developed in collaboration with Unity Tactical, another awesome outfit bringing unique and needed items to market. 

SB Tactical SB22 10-22 Chassis

Above: The contents of the SB22 Chassis kit. The two top covers are a nice touch. 

The SB22 fixed kit is lightweight at 16.4 ounces with the Picatinny top cover. Two top covers are included, one with a Picatinny rail and one smooth, giving the user some mounting choices. The included grip is the Reptilia CQG Grip, which in our opinion is a nice touch over the Mil-spec AR-15 grip we all have a drawer full of. Besides including a great grip, SB Tactical incorporated an ambidextrous QD socket for your sling. This is part of the aluminum insert that also houses the grip mount and the increasingly common 1913 Picatinny rear mount for your choice of brace or stock. The vertical 1913 Picatinny piece allows the user to install a variety of braces and stocks, most of which fold. The handguard portion of the 10/22 chassis has M-LOK slots on both sides and the bottom for more attachments. 

SB Tactical SB22 10-22 Chassis

Above: What could’ve been a weak link is strengthened by an aluminum insert.

The Setup

We began setting up this little guy with a Brownells BRN-22R receiver. This had the added bonus of a Picatinny rail machined into the receiver for solid optics mounting. The bolt is a factory Ruger part, as well as the internals and charging handle. The trigger is Ruger’s BX-Trigger, which offers a 2.5- to 3-pound pull over the factory 5.5-pound. Fitting the receiver to the 10/22 chassis took a little more effort than other stocks. Full disclosure: We used copious amounts of elbow grease and a mallet to get it to fit. It eventually did, and the upside is that there’s now zero movement within the receiver. 

SB Tactical SB22 10-22 Chassis

We opted to keep this receiver as a pistol for maximum compactness, although a registered SBR would be equally awesome. The SB Tactical FS1913 brace was an easy choice because of its simplicity and the built-in folding mechanism. Affixed to the brace is an ITS Tactical Mini Nylon Zip Bag. Inside is one 10-round Ruger magazine (loaded), 40 rounds of 22LR ammunition, and an extra optic battery. There’s a little room left for other small items, limited only by one’s imagination. 

SB Tactical SB22 10-22 Chassis

Above: The Picatinny top mount fits flush and is topped with the Streamlight TLR RM 2 for 1,000 lumens.

The barrel was a small hurdle in this build. As of this writing, the firearms industry is in an unprecedented time of demand, so sourcing some parts proves more difficult than others. In this case, finding a 10/22 barrel shorter than 16 inches was difficult. We were fortunate to find a new old stock 9.75-inch Primary Weapon Systems tension barrel at a local shop. This barrel is a bit heavier and longer than we would’ve liked, but it came threaded and should prove to be plenty accurate for its short stature. Ideally, a 6-inch barrel would’ve been used to keep overall length to a minimum, but in this market we won’t complain. Adorning the barrel is a registered JK Armament MST 155R kit in Flat Dark Earth, set up in a short configuration. With subsonic ammunition, it doesn’t take much to tame the report of the rimfire, and this will certainly do it.

SB Tactical SB22 10-22 Chassis

Above: The folding brace makes for a great backpack gun. A shorter barrel would’ve made this even better.

The Picatinny top cover aligns perfectly with the receiver and is home to a Streamlight TLR-RM2 Laser. This is a light/laser combo that features 1,000 lumens on high and a 640nm red laser — plenty of oomph for seeing critters in low light. It can be used ambidextrously at the 12 o’clock position, and your hand can control the settings with a simple thumb push. Lastly, for accuracy, a Primary Arms red dot is mounted. The optic sits just high enough for the top-mounted flashlight to not be a hindrance to its field of view.  

The Verdict

The SB Tactical SB22 Fixed 10/22 Chassis kit is a great place to start a build or retrofit an existing firearm. It’s well built, plenty strong, and has included features that are very desirable for a rimfire. The build we put together will act as a game-getting gun and a fun plinker. The 10/22 is a proven package and very reliable as a survival rifle. With a shorter barrel and the folding mechanism, this serves as a great backpack or under-the-seat gun. 


SB Tactical SB22 Fixed Kit

MSRP: $125 (chassis only)
URL:
www.sb-tactical.com

Parts and Accessories Featured

Brownells BRN-22R receiver: www.brownells.com
JK Armament MST 155R Kit: www.jkarmament.com
Streamlight TLR-RM 2: www.streamlight.com


THE SURVIVAL GUNS OF OFFGRID: READ MORE


Intro to SDR: Software Defined Radio

Whether you’re on-grid or off, information is king. The data traveling around us via radio and microwaves can provide a wealth of intelligence about what’s going on, be it in our neighborhood or around the world, for anyone who can tap into it and make use of it. Thanks to advances in Software Defined Radio (SDR) receivers, anyone with a couple hundred dollars and some modest skills can turn their computer or tablet into a signals intelligence platform that was once the exclusive, multimillion-dollar domain of governments.

In this series, we’ll discuss the basics of SDR, from selecting the right receiver and antennas, to basic setup for gathering both communications intelligence (COMINT; listening to audio transmissions) and signals intelligence (SIGINT; receiving other types of signals such as tracking aircraft or getting weather satellite images).

The Setup: What is SDR?

While traditional radio receivers are hard-wired to handle only specific bands and modes, software defined radios (SDR) leverage computer processors and software to perform most of the demodulation. This allows a small package of radio frequency (RF) sensing hardware to support a wide range of frequencies and the ability to listen into all modes of transmission.

The receiver itself still has some limitations in terms of the range of frequencies it can support, the receiver bandwidth, and so on. However, compared to traditional radio receivers that may support a handful of modes and bands, the limits seem to fade away.

The flexibility comes at the price of the tyranny of choice, however. You need to not only choose the right piece of hardware for your purposes, but also learn to leverage various software packages to take full advantage of the capabilities.

Choosing the Right SDR

Perhaps the most popular SDR devices on the market today are those that rely on the RTL2832 chipset, commonly referred to as the “rtl-sdr.” These come in a number of flavors, such as the NooElec NESDR. Other popular SDR receivers include the SDRPlay, AirSpy series, and the HackRF. Some, such as The Great Scott Gadgets HackRF, can transmit as well, albeit at extremely low levels of RF output.

SDR Software Defined Radio setup

Above: SDR equipment and antennas can pack small. Often, the largest piece of equipment is going to be the laptop. You may consider an Android tablet or phone as well.

Each of these devices have their own pros and cons. Personally, I have both a NooElec NESDR Smart rtl-sdr as well as a HackRF. For those just getting started, I recommend the NooElec. A great starter bundle can be had on Amazon for $99, which includes the NESDR Smart, the NooElec Ham It Up upconverter, some antennas, and adapters.

The bundle allows the reception of signals down to 300Hz and up to 1.7GHz, giving a receive range of all high-frequency communications, including shortwave radio stations, and up into some of the microwave bands used by aircraft and satellites. 

Choosing the Right Antenna

There’s nothing magic about SDRs, so all the usual considerations regarding antennas apply if you want high performance. The better your antenna placement, and the more resonant it is on the bands that you want to receive, the better.

sdr radio antenna

Above: The SuperAntenna MP1C is a portable antenna system utilizing a loaded coil system for tuning the antenna. This same antenna can be used with a standard transcienver such as the popular Yaesu FT-891.

For most applications, low-gain whip antennas will be fine. However, for receiving highly polarized, highly directional microwave data from satellites, directional antennas (those that focus the transmission or reception) need to be used.

If you already have an established antenna deployment, you can share the antenna with both your traditional radio transceiver and the SDR using a device such as the MFJ-1708SDR. This gives you the added benefit of a wide-bandwidth panadapter display for your radio, if it doesn’t have one of its own.

For COMINT collection, any wire antenna or vertical whip which is resonant on high frequency (HF), very high frequency (VHF), or ultra-high frequency (UHF) bands that you have interest in is all you need.

Choosing the Right Software

The software that you use for your SDR will come down to a few criteria:

• The mission at hand

• What’s available for your chosen platform (both the operating system on your computer as well as what supports your chosen SDR receiver)

• Cost

Free and open-source (FOSS) platforms such as Linux have a plethora of choices available when it comes to SDR software, and they’re generally free. The GNU Radio project provides tools and libraries, which others have built upon to provide easy-to-use frontends for various purposes. On Linux, my favorite choice is Gqrx, which is easily installed through the package manager in any user-friendly Linux distribution such as Ubuntu. Windows users will find SDR# is a popular choice.

For mobile operations where weight is a consideration, bringing a full laptop may not be the best option. If you choose to use an Android phone or tablet, you’ll find programs such as RF Analyzer available in the Google Play store. This allows you to use an RTL-SDR for much the same purpose in a smaller package.

Many people in the amateur radio community use small computers such as the Raspberry Pi, running Linux, for both SDR purposes as well as running digital modes attached to their HF transceiver. Personally, I run Linux on my main laptop as well, but with a little research you’ll find something that suits you on whatever platform you choose.

Getting Started: The Install

Getting set up to listen to analog transmissions on VHF and UHF bands is incredibly easy. The demonstration is based on Gqrx, but the setup will be similar regardless of platform.

Installing the application and its supporting libraries is an easy point-and-click operation in modern Linux distributions. Search for “Gqrx” in the software store application on Ubuntu or Fedora Linux and click install. Once it’s installed, it’ll be ready to launch.

SDR software defined radio

Before launching the software, connect the antenna to the SMA connector on the RTL dongle and then plug the USB into your computer.

When you launch Gqrx for the first time, you’ll be asked to do some initial configuration. At this time, all you need to do is fill in the device string to read rtl=0 and then hit OK.

When the main window comes up, hit the Play button and you should begin receiving radio signals. There are a lot of controls and options, but you only need a few to get started.

The main window looks like this:

SDR software defined radioAbove: Gqrx provides a waterfall display to show signal intensity (X-axis) over time (Y-axis), with color indicating signal strength. Here, we see the waterfall display for some broadcast FM stations in the Austin, Texas, area. Note that the mode is set to Wide FM.

In the main pane, you see it’s split into two. From left to right, you see a spectrum analyzer which shows relative amplitudes in different frequencies within the receive bandwidth. Below that, you see a waterfall display showing the historical record of what was received on any given frequency and is read vertically.

To the right, we see that by default the Receiver Options are selected. The main control here you need to be aware of is the “Mode” selection. Different types of communications require a different demodulation mode. In general, just be aware of the following:

• Use WFM for commercial FM stations

• Use AM for air and marine band VHF/UHF, shortwave broadcasts, and commercial AM radio

• Use NFM for 2-way analog VHF/UHF in amateur or public safety bands

• For HF amateur radio transmissions, follow convention (USB in 20m and LSB in 40m, for example)

Knowing Where to Listen: VHF and UHF

You’ll likely know your favorite commercial FM stations in your area off-hand. If you’re a licensed ham radio operator with at least a tech class license (refer to our article “Can Anyone Hear Me?” in Issue 38 for more details on ham radio capabilities and licensing), you probably know the output frequencies of repeaters in your area that you can hit.

If you don’t already have that information, there are two great sources. First, to find repeaters in your area of operations (AO), The Repeater Book (www.repeaterbook.com) is where you want to look. To find air, public safety, and commercial frequencies in your AO, check out www.radioreference.com.

For instance, to find out what frequencies and modes are in use at my nearest airport, Austin-Bergstrom, all I need to do is look it up:

SDR software defined radio

Of course, you can always just tune around. One of the major advantages of an SDR versus running the scanning feature on a handheld radio is that you can see the spectrum activity across the entire receive bandwidth, giving you a quick visual indicator of activity that you might want to investigate and listen in on.

Shortwave and HF Listening

In a truly grid-down situation where the radio is your only tool to find out what’s going on in the world, the ability to listen to shortwave radio broadcasts and 2-way HF communication from hams or other radio operators could be a lifesaver, making an SDR receiver a prime source of intelligence. Just make sure you have a reliable emergency power source for all your electronic equipment, such as a solar backup system or a generator.

nooelec.com ham it up sdr software defined radioAbove: The Nooelec RTL-SDR bundle is a common, inexpensive way to get into SDR, including the ability to access HF bands with the Ham It Up up-converter. Depending on the antenna you want to use, you may need different cables.

Unfortunately, we can’t use the RTL-SDR by itself to receive most shortwave or other HF frequencies, such as those used by amateur radio operators, militaries, and the like. This is where the NooElec Ham It Up TXCO Up Converter comes in. This device is put in-line between the antenna and the SDR dongle, and shifts the RF signal into a frequency that’s within the receive range of the RTL-SDR.

nooelec.com ham it up sdr software defined radio

Above: If you want to utilize HF bands, the upconverter must be in line between the SDR and the antenna, with the antenna connected to “RF IN.”

nooelec.com ham it up sdr software defined radio

Above: The RTL-SDR must then be connected via USB to the laptop. If you want to operate only within the range of the RTL-SDR, you can leave the upconverter out of the circuit entirely, leave it unpowered (not connect its own USB power cable to the laptop, as pictured), or use the “Passthrough” switch. The Ham It Up fails open, so it can work unpowered.

Once the box is placed in-line with the “RF IN” connected to the antenna and the “RF OUT” connected to the RTL-SDR, power it on and make sure that the switch is set to “UPCONVERT”.

sdr radio antenna

Above: Here, the MP1C is set up on a standard, low-profile tripod with a flexible whip on top. The system is modular and can be configured in other ways depending on conditions.

The upconverter has a 125Mhz offset, so in order to make use of it, there are two options. The first is to add 125Mhz to every frequency that you want to listen to, but that’s tedious and prone to mistakes. The second option is to configure your SDR software to calculate the offset and allow you to directly input the frequency that you want to listen to. Option two is far better, and is accomplished by adjusting the setting LNB LO (Low Noise Blank Local Oscillator) setting in the Input Settings:

SDR software defined radio

Since we’re using an upconverter, we give a negative offset, so the field should read -125Mhz. Then here, coupled with a Super Antenna MP1C vertical whip antenna slide tuned to 20m, we can see we’re able to receive a shortwave radio station from Latin America on 13.818Mhz.

With the I/Q recorder, we can record the broadcast to replay at a later date, transcribe, or translate.


Emergency and Tactical Uses of SDR

  • Monitoring emergency communications
  • Listening to radio news and NOAA weather broadcasts
  • Pulling down weather satellite images
  • Tracking aircraft

Step-by-Step SDR Setup

1. Have your SDR gear ready (computer, SDR device, up/down converters, antenna, cables)

2. Install the software of your choice (Gqrx, SDR#, etc.) on the computer

3. If necessary, connect the up/down converter to the SDR

4. Connect the antenna to either the SDR or the up/down converter

5. Connect the SDR system via USB to the computer

6. Start the application

7. Choose your device

8. Start listening


Conclusion

With a few dollars spent, you now can listen in on analog communications, whether they’re around the world or in your neighborhood, helping to turn the RF spectrum into a source of information to give you the edge when it comes to situational awareness. This just scratches the surface of what SDRs can help you do when it comes to preparedness and intelligence gathering. In a future article, we’ll discuss using SDRs to intercept digital transmissions, such as satellite phone transmissions, aircraft transponders, and weather satellite imagery. 

Find Out More about nooelec.com


More on Radios and Comms


Organizing your EDC with Garage Built Gear

When it comes to survival gear, much like military equipment, utility is just as much a feature as an aesthetic. This fusion of both form and function manifests in EDC equipment, as well as gear built for expeditions, adventures, and travel. In our digital age, the fusion between a classic adventurer's notebook and the tablet come together in organizing pouches that very often become essential gear. Much like a medic's bag, it's not only what you carry, but how. Garage Built Gear combines survival elements into their organization gear. At the core, each piece of kit is designed, first and foremost, to survive. Rugged materials combined with reinforced construction produce organizers, wallets, and more to keep everything where it needs to be: where you can find it.

While vital to a Bug Out Bag, compartmentalizing your survival gear need not be restricted to emergency situations. Rather, keeping something as simple as pens and paper and technology-supporting batteries, memory cards, micro thumb drives organized as a daily effort alongside emergency medical gear goes a long way for on the day when one doesn't have time to waste finding it. In the same way, as ounces become lbs, so combined minutes spent looking for stuff compound over months and years.

Garage Built Gear tech

Above: The Tech Pouch Doubles as suppressor storage, could easy carry a moderate field maintenance kit, or keep daily tools in order. 

Garage Built Gear offers a series of pouches that thread the line between military-inspired gear and technological utility.

The Tech Organizer keeps cables in place with elastic molle-like stitching on one interior panel, and a zippered mesh pocket on the other. Able to hold batteries, cables, small EDC flashlights, and more, the width the pouch will fit pens, as well, keeping a small SSE (Sensitive Site Exploitation) kit contained and marked with a velcro section on the exterior.

The larger Ultimate EDC Organizer is for more regular use. with an expanded interior to include 3 zippered-off mesh sections, and a two-layer elastic section capable of holding tourniquets, spare pistol mags, larger flashlights, and multitools. Perfect for those who carry a camera for a living the upper pouch will hold memory cards and a card reader, while the larger option contains a charger and spare battery.

As a travel support, it quickly serves as a one-pouch-fits-most for specialty goods and can be labeled with a patch on the exterior.

Both the Tech Organizer and the Ultimate EDC Organizer are constructed out of 1000 and 500 denier Cordura, with YKK zippers on all enclosures, and come in patterns such as Multicam, Kryptec, and solid colors. Special runs in limited release patterns drop for those whose timing is met with the fortune to acquire a matching set.

Garage Built Gear Ultimate EDC organizer

As an option for the Tech pouch, and a constant on the EDC Organizer, a blaze orange interior stands out, harkening to Medical Pouches, for keeping account of what's inside.

Garage Built Gear also makes range bags and other storage solutions for something as personal as a hygiene kit, to something as utilitarian as padded and partitioned camera bags.

Sewn together in Tennessee, Garage Built Gear solves storage problems with American made solutions. Indicated by their name, each piece is stitched together in a Garage in small batches.


Garage Built Gear

Tech Organizer
Material
: 1000D Cordura, 500D Cordura, or Waxed Canvas
Dimensions
: 9.5 by 7.5 inches
Colors: Black, OD Green, Multicam, and Variants.
MSRP: $39

Ultimate EDC Organizer
Material
: 1000D Cordura, 500D Cordura, or Waxed Canvas
Dimensions: 12.5 by 7 inches
Colors: Black, OD Green, Multicam, and Variants.
MSRP: $59

URL: garagebuiltgear.com


More on EDC and Gear


Unobtainium Gear Active Night Vision Recording System: Taping What You See

The cost of entry for becoming night vision capable isn't nearly as high as it used to be. Only a few years ago one would not be faulted for believing that the required equipment: Night Vision Goggles, and a functional IR laser and illuminator, were arbitrarily out of reach of non Military or Law-Enforcement persons. The first drastic change came about when commercial ventures began selling night vision gear directly to “civilians,” and since then the availability continues to grow. With that, come the accessories, social media videos, and content, because how can you go do “goon shit” without recording it for an audience? The Unobtainium Gear Active Night Vision Recording System, or ANVRS solves this problem, and with a little ingenuity and experimentation, introduces the opportunity to own the night via an indie-esque film as well.

Unobtainium Gear ANVRS DTNVG L3 White Phosphor Unobtainium Gear has appeared on OFFGRID before, when we covered their Dank Robber Chest Rig. As the name suggests, they're on point with where so many are going: into the darkness, lightweight, low drag, and for fun and function as well. Beyond soft goods like carrier placards, chest rigs, and magazine pouches, they venture into unknown territory with a camera that attaches to NVGs, allowing the wearer to record what they see, while they see it. It's like a Dash Cam for your NODs, except way cooler, especially when driving.

Unobtainium gear ANVRS

The Unobtainium Gear Active Night Vision Recording System remains beautiful in it's simplicity: a ring attaches a small camera to the viewing end one's choice of night vision, and takes a micro SD card, with a simple on-off switch. A small light flashes to notify the wearer that it has turned on or off, and that's it.

Unobtainium gear ANVRS

The Camera, Ring, Ribbon Cable, and Housing all weigh next to nothing, and can easily be taped, or better, rubber-banded to the user's choice tube. The wearer will have to figure out how to check the light when turning it off, such as mounting the box on the bottom so they can check for a light by tipping their head up and looking for a reflection off their hand. The correct location for the camera is at the bottom of the tube, when worn, but we're still in the frontier of filmography here, so those with post-production pixie dust can do their magic if they so choose. The PVS-14 model has a small fastener to tighten the ring, but if lost, a rubber band will do the trick.

What you see is what you get when looking through night vision, and what you see is very close to what the ANVRS picks up. It's not exactly plug-and-play, as the user should take some time before going out on their adventure to familiarize themselves with the optimal distance to set the camera from the NVG lens in order to get the best picture. If attached at an angle, it will be distorted by any ambient light and can quickly ruin a good shot. Too close and you get a wonky picture, too far, and you're risking getting poked in the eye if you trip.

Unobtainium gear ANVRS

These are small hurdles to overcome, however, compared to the glory of adventure and exploration. From recording an otherwise invisible star-shower, to playing operator in your backyard, to pushing the envelope of documented experiences, the utility of the Unobtainium Gear ANVRS is only restricted to the mind of the one who has it.

Unobtainium gear ANVRS in tube

Above: A screenshot of the Milky Way through DTNVG NODs with L3 WP Tubes, assembled by 

With model-specific mounts, the Unobtainium Gear Active Night Vision Recording System fits most NVG models common to the American Market, from PVS-14 monoculars, to DTNVGs, to PVS-31's for those who get issued the cool stuff.

A Teaching Moment

Those with years of night vision experience, especially in a military environment, have heard the phrase “keep your head on a swivel” so many times, that it undoubtedly becomes lost in the sauce of pithy statement ooze. This charge to keep alert, and to remain vigilant when scanning your sector, or observing your environment is only further emphasized when one's field of view is limited to the 40 degrees of a set of night vision goggles.

The effect of this can be quickly observed when reviewing footage taken on the Unobtainium Gear Active Night Vision Recording System, as the wearer constantly moves his or her head back and forth, “scanning” their environment. With a limited field of view, those using night vision are habitually memorizing their environment, as they scan across rubble, refuse, woodland pitfalls, and so forth. When it comes to filming, however, this constant movement can cause motion sickness for the uninitiated.

Unobtainium Gear ANVRS DTNVG

The ANVRS serves as a teaching moment, on the one hand, for film, and the other, for those using Night Vision in a professional environment. Replaying footage taken on an ANVRS can quickly identify moments of tunnel vision as well as where and when the wearer identified a threat in training, or if they properly cleared their corner in room-clearing practice.

Going Deep

While various attempts have been made to record what one sees through Night Vision Goggles, few are as straightforward as the ANVRS, and fewer still as low profile when worn.

Unobtainium gear ANVRS

Like Night Vision itself, the Unobtainium Gear ANVRS opens up a field of potential that must be explored to be experienced. A positive take on Nietzsche's warning about staring into darkness, once a camera is obtained, no one but the owner can be blamed if they never go out and use it. From a creative outlet, to a tool of instruction, to recording what one sees for evidence, there's a long way to go before the opportunities this NVG camera presents are exhausted.

Unobtainium gear ANVRS

The Unobtainium Gear Active Night Vision Recording System remains simple, which translates into simple to use, and consistent in performance. On the frontier of civilian night vision experiences, and showing merit as a tool for both teaching and entertainment, this piece of equipment requires the owner to do the heavy creative lifting, and stay out the way when in use.


Unobtainium Gear Active Night Vision Recording System

Models For: PVS-14, PVS-15, PVS-31, PVS-7B/D
Video Recording Specs
: 1080p, 30fps

Audio: Built in microphone
Data Storage: Micro SD card compatible up to 32GB
Battery Life: 6 Hours (extendable with optional additional battery pack)
Weight: 32 grams (1.13oz)
MSRP: $104 (starting at)
URL: unobtainiumgear.com


[Editor's Note: Cover Photography by Samantha Lauraina.]


More on Night Vision


Micro Pry Tool: Pocket Preps Prybar

Few tools have as many practical applications as a pry bar. The mechanical advantages of the leverage that can be generated with a pry tool makes it the perfect implement for a variety of everyday tasks. Unfortunately, a standard crowbar isn’t the most convenient tool to carry around. Not only is it heavy and cumbersome, but lugging around a crowbar can also give onlookers the wrong impression about your intentions. 

Many a knife has been broken in the absence of the proper tool. Such blasphemous use of a blade can not only leave one frustrated and angry but also injured and bleeding. As the saying goes, “A knife is the most inefficient screwdriver and most expensive pry bar you’ll ever own.”

Thankfully, the advent and evolution of multi-tools has gradually led to the incorporation of miniature pry bars into a vast selection of everyday-carry tools. Although they’re limited in scope compared to their big brothers, mini pry bars can be used to pry open windows and interior doors, break glass, force open security gates, wedge car doors, open cabinets and lock boxes, and pry containers. They can also be used to perform more mundane tasks like opening beer and soda cans, removing staples, lifting nails, and tightening screws. When integrated into a multi-tool platform, their usefulness is expanded even further.

In this edition of Pocket Preps, we’ll highlight some of the most versatile mini pry tools on the market and help you determine which tool might be the best choice for your personal needs. 


Fix It Sticks || Mini Pry Bar 

Dimensions: 2.14 by 0.64 by 0.7 inches
Weight: 0.4 ounce
Material: S45C
MSRP: $10 (Driver Sold Separately)
URL: fixitsticks.com

Fix It Sticks || Mini Pry Bar 

Unlike the other tools in the lineup, the Fix It Sticks Mini Pry Bar isn’t a stand-alone tool, but an attachment designed to convert the Fix It Sticks or other ¼-inch bit driver into a mini pry tool. The bit has a small pry lever and nail puller for minor prying tasks. The inside cutouts allow the MPB to be used as a ¼-, 5/16-, and 3/8-inch wrench. The MPB integrates perfectly with the Fix It Sticks Replaceable Version Kit, which includes 16 assorted bits and two Fix It Sticks that combine to form a T-handle, or the stand-alone Fix It Sticks T-Way Ratcheting Wrench (both shown here).

Fix It Sticks || Mini Pry Bar  pry tool

Pros:

+ Quickly converts any ¼-inch driver into a min pry tool
+ A convenient and inexpensive solution for solving many common prying tasks

Cons:

Requires a separate driver
– The small pry head isn’t suitable for heavy-duty levering.


Gerber || Prybrid X

Dimensions: 4 by 0.875 inches
Weight: 1.7 ounces
Material: 3Cr
MSRP: $23
URLgerbergear.com

Gerber || Prybrid X pry tool

This miniature hybrid pry bar multi-tool combines the precision blade of a hobby knife with a multifunctional pry bar. It contains a replaceable standard #11 hobby knife blade inside the housing. The blade is retracted using a push-button slide lock, which offers resistance to prevent accidental opening. The dual-ended design also incorporates a mini pry bar, wire stripper, nail puller, small and medium flathead drivers, and bottle opener. A 550 cord wrap and raised notches on the spine and belly provide additional grip. When attached to a key ring, this key-sized multi-tool becomes an everyday travel companion that’s easily forgotten about but always within reach. 

Gerber || Prybrid X pry tool

Pros:

+ Perfect for fine tasks that require small, precise tools.
+ Replaceable hobby knife blades are easy to find at any big-box, hardware, or craft store.
+ Compact and easy to carry on a small keychain

Cons:

– The small tool design relegates this tool to basic tasks.
– Hobby knife isn’t suitable for heavy-duty cutting.
– The smooth metal housing is a little slick, even with the raised notches.


Elite Outfitting Solutions || TiShark

Dimensions: 4 by 1 by 0.14 inches
Weight: 1 ounce
Material: 6Al-4V Titanium
MSRP: $20
URL: eoscases.com

Elite Outfitting Solutions || TiShark pry tool prybar

The TiShark from Elite Outfitting Solutions is a simple but effective CNC-machined pry tool. The 6Al-4V Titanium construction and compact size makes the TiShark lightweight and easy to carry. Although the shark-mouth bottle opener is the drawing feature for most users, the pry bar/screwdriver is quite capable of handling daily tasks that involve prying, wedging, and tightening/loosening slotted screws. There’s also a ¼-inch hex wrench for holding standard hex bits. The TiShark has an integrated pocket clip and lanyard hole to offer multiple carry options. The orange, blue, and purple hues generated by the flame-treated titanium and the unique shark-like features makes the TiShark a beautiful conversation piece when not in use. A 3×0.75-inch Mini TiShark is also available.

Elite Outfitting Solutions || TiShark

Pros:

+ Light and compact
+ Stylish shark-themed design makes the TiShark an instant conversation starter
+ Available in an ultra-compact mini version
+ Tucks neatly along the front pocket inseam with the pocket clip

Cons:

Likely to be stolen by envious company if left unattended


Böker Plus || Minibar Pro

Dimensions: 4.45 by 0.15 inches
Weight: 2.01 ounces
Material: 8Cr13MoV
MSRP: $35
URL: bokerusa.com

Böker Plus || Minibar Pro pry tool

The Böker Plus Minibar Pro is a multifunctional leveraging tool designed by custom knifemaker Jim Burke. The pry end of the tool contains a dual-faced lever surface to accommodate a variety of levering tasks. The forward-facing portion of the lever head doubles as a flathead screwdriver. The pry end also contains a teardrop-shaped shackle opener. There’s a ¼-inch hex driver situated at the upper portion of the handle. This driver works with standard ¼-inch bits when extra leverage is needed to break loose a stubborn screw. The beaked end is ideal for levering on flat surfaces. There’s also a bottle opener located at the back of the beaked end. The tool has aggressive jimping on the sides for gripping and is equipped with a pocket clip and lanyard hole for convenient transport.

Böker Plus || Minibar Pro pry tool

Pros:

+ Offers six leveraging actions within a single tool
+ Small, compact, and easy to carry

Cons:

– When clipped inside a pocket, the sharp, beaked head becomes a snagging point.


Prometheus Design Werx || SFPB

Dimensions: 4.5 by 0.624 by 0.25 inches
Weight: 2.5 ounces
Material: D2
MSRP: $59
URL: prometheusdesignwerx.com

Prometheus Design Werx || SFPB pry tool

This multifunctional pocket pry tool is milled from D2 tool steel. The SFPB features a mini pry head, which can double as a screwdriver and a bottle opener. The SFPB also has an oxygen tank wrench located near the center of the tool, and a hex bit socket machined into the titanium pocket clip. The socket is located near the end of the tool to offer maximum leverage for overtightened screws. A Strikeback notch behind the pry head is designed to pair with just about any ferro rod to create sparks when starting campfires. The refined machined details of the SFPB, including the recessed hardware and chamfered edges are a testament of the quality craftmanship and invested into this versatile pry tool.  

Prometheus Design Werx || SFPB

Pros:

+ Compact and sleek design makes the SFPB easy to carry.
+ Perfect choice for wilderness rescue professionals
+ High-quality materials and craftsmanship give this tool a high-end feel.

Cons:

– Upper tier pricing puts the SFPB out of reach for many would-be users.


WE Knife || Gesila

Dimensions: 4.76 by 0.75 by 0.20 inches
Weight: 1.51 ounces
Material: 6AL4V Titanium
MSRP: $56.50
URL: weknife.com 

WE Knife || Gesila pry tool prybr

The Gesila from WE Knife is a simple but stylish mini pry bar with basic features. This tool, made from 6AL-4V Titanium, features a chisel-shaped pry end is also slotted and notched for pulling small nails. The back end has a bottle opener for busting open cold beverages. The overall design looks like it came straight out of a Star Wars movie. Fortunately, the same design features that give the Gesila a futuristic look also add a lot of function. The jimping located on both sides just behind the pry head adds just enough gripping surface to help with wedging the head into tight spaces. The tip-down pocket clip makes it easy to carry the Gesila in just about any pocket. This offering from WE Knife is a good choice for those who need serious prying capabilities in a small and simple package.

WE Knife || Gesila

Pros:

+ Small, light, and convenient to carry
+ Can be used as an improvised impact weapon
+ Aesthetically pleasing design

Cons:

Limited function as a multi-tool


Böker Plus || Tango Bar

Dimensions: 5.71 by 0.15 inches
Weight: 2.1 ounces
Material: 440C Stainless Steel
MSRP: $27
URL: bokerusa.com

Böker Plus || Tango Bar pry tool

The Böker Plus Tango Bar, designed by Peter Fegan, combines the utility of a pry tool with the defensive properties of a palm stick and the retention qualities of a karambit. Constructed of powdercoated 440C stainless steel, the Tango Bar is both sturdy and aesthetically appealing. An integrated clip allows the tool to be worn on a pocket hem or attached to MOLLE loops. The pry end, which can also serve as a flathead screwdriver, is stepped up to provide more control. What makes this pry tool truly unique is its double function as an impact weapon. The karambit-style improves retention and makes the tool easy to draw, especially when combined with the ripple texture on the sides and the top jimping.

Böker Plus || Tango Bar prybar

Pros:

+ Flat and lightweight, perfect for EDC
+ Offers excellent retention capabilities
+ Doubles as an impact device
+ Can be worn in a pocket or on MOLLE equipment

Cons:

The location of the clip causes the tool to turn inward in pockets.


MORE POCKET PREPS


New Survival Gear in OFFGRID 44

The new survival gear to be found in OFFGRID #44 includes some items that do not technically qualify as life-saving equipment, on the outside. But dig deeper and we find that culture and community are vital to both surviving communities and often defines the ones that thrive. Here's a few things to look for, from coolers, to books, to clothing, to patches.

The Patriot Militia || The Prayer

DIMENSIONS: 3 by 2 inches
MSRP: $8
URL: thepatriotmilitia.com

OG44 the Patriot Militia The Prayer

Before he became America’s O.G., George Washington was first the commander-in-chief of the Continental Army. By all accounts, it was an underfunded, under-supplied, and poorly trained force. Yet under his leadership, it defeated the world’s largest maritime superpower at the time. This PVC morale patch depicts the general on bended knee, praying at the army’s winter encampment at Valley Forge. It’s a simple design that conveys so much history, emotion, and patriotism. You can wear it as a source of inspiration whenever you’re faced with what seems like overwhelming odds. Or maybe to just express your love of country this Independence Day. Plus, it glows in the dark and has a Velcro backing to make it easier to attach to your hat, pack, or jacket.


Midland Radio || ER10VP E+READY Compact Emergency Alert AM/FM Weather Radio

DIMENSIONS: 5 by 3 by 1.2 inches
MSRP: $20
URLmidlandusa.com

OG44 midland radio ER10VP E+READY Compact Emergency Alert AM/FM Weather Radio

Whether you’re packing for a weekend of camping, prepping for the Atlantic hurricane season, or just about to head out on a road trip, having an emergency radio is vital. The ER10VP can alert you of incoming inclement weather — and the best part is that it’s so small you could carry it in your pants pocket. It has an AM/FM radio with digital clock, a wrist lanyard, and headphone jack in case you don’t want to wake up the family during your early morning check-ins. Plus, it comes with three Midland AA batteries. If that’s not enough, the radio also has an LED flashlight with three modes: high, low, and SOS strobe.


Boris Milinkovich || The True North Tradecraft Disaster Preparedness Guide

PAGES: 134
MSRP$18 (paperback), $8 (PDF)
URL: truenorthtradecraft.ca

Boris Milinkovich || The True North Tradecraft Disaster Preparedness Guide

Boris Milinkovich knows a thing or two about being prepared. He has served as an officer in federal law enforcement and as a member of the Canadian Forces Intelligence Branch. Nowadays, he’s the head of True North Tradecraft, a security consulting firm specializing in the training of non-destructive covert methods of entry, counter-custody, and personal security. The second edition of his book is an updated and revamped primer on urban survival and disaster preparedness, and it’s packed with tips, tricks, and entertaining tidbits. It covers the usual topics — fire, water, shelter, etc. — but also provides insights into electricity and power backups and prepping in small spaces like condos and apartments. While it’s not massively in-depth, it’s a great starting point for beginners and good practice for seasoned planners.


Buff USA || Lightweight Merino Wool Multifunctional Headwear 

COLORS: Various, including Black, Edgy Denim, and Fossil Multi
MSRP: $29
URL: buffusa.com

Buff USA || Lightweight Merino Wool Multifunctional Headwear 

Longtime readers of this publication will know that we’re big fans of apparel made of wool, even if it’s summer wear. Don’t let popular misconceptions fool you; sheep’s clothing is breathable, quick drying, moisture wicking, and odor resistant — all key attributes when things heat up. And when the temps drop, it’ll still keep you warm even when wet. That’s why the Multifunctional Headwear from Buff USA is so useful. It might look like a neck tube, but it’s actually a versatile piece of apparel that can be worn more than 10 ways. For example, it can be a neck gaiter, a bandana, a headband, or a face covering. The design is just as versatile as its super fabric.


PNW Bushcraft || Alder Waxed Canvas Roll Up

DIMENSIONS: 27 by 20.5 inches (open)
MSRP: $65
URL: pnwbushcraft.com

PNW Bushcraft || Alder Waxed Canvas Roll Up

If you’ve ever tried to store your knives in a pack, box, or plastic bin, you’ve realized that not only will they be unable to fit in an organized manner, but they’ll also get dinged up in transport. Enter the Alder Waxed Canvas Roll Up, a vintage solution to an age-old knife-nut problem. This rugged roll has a half-dozen pockets that are each 6 inches deep and 4.5 inches wide, more than enough room to protect a small collection of your knives, sheaths, and ferro rods that need to travel with you. It’s made from 100-percent waxed cotton using a specialized process that was created 200 years ago, giving the roll lifelong weather resistance and a cool, distressed look over time. Made in the USA.


WANDRD || Toiletry Bag

DIMENSIONS: 9 by 5.5 by 4 inches (large), 9 by 4.5 by 3 inches (medium)
MSRP: $59 (large), $39 (medium)
URL: wandrd.com

WANDRD || Toiletry Bag

This WANDRD pack looks like your standard toiletry bag … until closer inspection reveals a rugged, smartly designed model that has “best in class” written all over it. The front section has a zippered pocket, two divided mesh pockets, and a jewelry snap loop (so you don’t lose your rings). The main compartment has another zippered pocket, space for your travel-size items (toothpaste, shampoo, etc.), and an integrated antimicrobial sleeve to protect your toothbrush head. Plus, the back panel has slots to air out your razor and toothbrush. Made of weather-resistant ripstop and YKK zippers, this WANDRD pack works on a whole other level. Oh, and it comes in two sizes, which can be clipped together to create a mega toiletry bag.


Hawke Optics || Laser Range Finder 800

WEIGHT: 4.6 ounces
MSRP: $149
URL: us.hawkeoptics.com

Hawke Optics || Laser Range Finder 800

In some circumstances, you can certainly eyeball an object in the distance and estimate how far away it is. But when it comes to a dire situation, you don’t want to leave your survival to chance. Whether you’re hunting for sustenance in a post-SHTF world or on a search-and-rescue mission looking for a stranded hiker, precision is vital. The Laser Range Finder 800 provides accurate distance management with the push of a button. Nitrogen purged with a fully multi-coated optical system and 6x magnification, this Hawke Optics model has a range of 6 to 800 meters (7 to 875 yards) and an accuracy of 1 meter (3.2 feet). It’s also waterproof, fog-proof, lightweight, and ergonomically designed to fit in your hand.


Cameleon Bags || Smith & Wesson Tri-Fold Wallet

COLORS: Black, Red
MSRP: $45
URL: cameleonbags.com

Cameleon Bags || Smith & Wesson Tri-Fold Wallet

The Smith & Wesson Tri-Fold Wallet is a throwback to an era when cash was king and leather was everything. It has slots for up to 12 cards, a main compartment for bills, and vegetable-tanned cowhide that’s both durable and refined. As the name implies, it folds over on itself twice, producing a thick but narrow profile to make room in your pants, pack, or jacket pocket. It also has a RFID-blocking liner, though that’s mostly a moot point given the encryption technology of credit cards these days. Still, this S&W model is a well-made handcrafted wallet that can be a classy, old-school addition to your everyday-carry (EDC) loadout. 


HitchFire || Forge 15

WEIGHT: 70 pounds
MSRP: $549
URL: hitchfire.com

OG44 Hitchfire forge 15

There’s nothing in a survival guide that says you can’t enjoy good eats while you’re off the grid. The HitchFire Forge 15 is a two-burner grill that mounts directly to the hitch of your vehicle, allowing you to save valuable trunk space while also freeing you from the invisible chains of the campfire. Now you can cook anywhere you park (though it can detach for tabletop use). Using 16-ounce propane, the Forge 15 has an 18×22-inch cooking space and can serve eight to 10 people. Moreover, it has two hideaway prep tables, an integrated bottle opener, and anti-theft padlock and hood-latch security. This is an ideal investment for folks who want total culinary control during their camping, overlanding, tailgating, or bug-out adventures.

OG44 Hitchfire forge 15


GCI Outdoor || Sunshade Rocker

COLORS: Black, Blue
MSRP: $80
URL: gcioutdoor.com

GCI Outdoor || Sunshade Rocker

This ain’t your granddaddy’s lawn chair, that’s for sure. The SunShade Rocker is a foldable rocking chair with a mini canopy, giving you a relaxing resting spot at basecamp, the range, or the beach. The SPF SunShade is made with UPF 50+ fabric and adjustable, so you can move it as the sun does. GCI’s Spring-Action Rocking Technology looks like hydraulic shocks but provides a smooth rocking motion. Plus, the arm rests also have a cupholder and a convenient phone pocket. While the chair weighs 13 pounds (obviously this won’t be a part of your bug-out gear), it supports up to 250 pounds and comes with a large-mouth carry bag for easy storage and transportation.


Taiga Coolers || 27-Quart Terra

OUTSIDE DIMENSIONS: 23 by 15.5 by 15 inches
MSRP: $199
URL: taigacoolers.com

Taiga Coolers || 27-Quart Terra

’Tis the season for camping, fishing, tailgating, and barbecuing. That’s when this 27-Quart Terra comes in handy. Thanks to its 2-inch-thick walls, 3-inch-thick lid, R5 insulation, and leakproof lid gasket, it restricts air flow to seal in ice retention so that your drinks and food stay cool for the day. Speaking of which, it can hold up to 24 cans and a bag of ice. On the outside, the Terra has two heavy-duty, UV-protected latches, two secure tie-downs on either side that double as handles, and four hydro-turf traction feet to prevent slippage. And it has an opening for a lock to prevent unauthorized beer consumption. It’s made in the USA from hemp-filled polypropylene — which is a strong, sustainable bioplastic.

Taiga Coolers || 27-Quart Terra


5.11 Tactical || Trail 9.5-Inch Short

COLORS: Battle Brown, Black, Flint, and Ranger Green
MSRP: $70
URL: 511tactical.com

5.11 Tactical || Trail 9.5-Inch Short

With the mercury rising, it’s time to stretch your legs and let them breathe. The Trail 9.5-Inch Shorts are ideal for hikers, runners, or shooters who need the technical performance of athletic apparel but the capabilities of cargo pants. Made of 87-percent polyester and 13-percent elastane with a durable water-repellent finish, they offer durability, flexibility, and plenty of cargo capacity. There are eight pockets, including useful back yoke pockets that fit a smartphone, tools, or magazines. The thigh pockets have zipper closures while the hand pockets have reinforcements for knife pocket clips and such. And while these shorts are designed for outdoor pursuits, their versatile aesthetics let you fit into any casual urban environment, whether it’s a family picnic or a grocery store run.


OFFGRID LIBRARY OF RECOMMENDED BOOKS