If you’re a Boomer or Gen-Xer, you may have a fond memory of your father or other relative giving you a pocket knife at a young age. It may have been a lock-back or a fixed blade, but for most of us it was a simple slip-joint folding pocket knife with no locking mechanism. The blade was held open under simple spring pressure. Sometimes it was a single blade Barlow style or Jack knife. In other cases, it may have been a Trapper with a drop-point knife blade and a Spey blade. If you were really lucky, it could’ve been a multi-blade Congress knife or a Swiss Army Knife.
Many of us who were more serious about knives may have graduated on to something with a Walker liner lock, frame lock, or Axis lock-type mechanism. That was the goal from the 1980s onward, to have a folding knife that locked up like a fixed blade. Still, many of us look back on fond memories of that first knife type. Custom knife makers often offer a few slip joints in this category as a testament to modern craftsmanship and materials or for customers with a bit of nostalgia.
These knives are still very capable in our modern age and will still perform over 90 percent of common daily tasks. They tend to be on the smaller side and are easily stowed in a pocket, so you always have a knife. Additionally, if you travel outside of the U.S., you’ll find that they’re usually the only knife that won’t land you in prison in most of Europe.
Because slip-joint knives are typically carried loose in a pocket, a lanyard of some type makes more sense as a means of being able to locate and retrieve the knife. Unfortunately, this is a small detail that is often overlooked to keep with tradition. In the past, slip joints were cheaper knives sold in hardware stores, gun shops and department stores. Modern slip joints are a little bit more expensive in many cases, but still more affordable on average than typical tactical folding knives.
Spyderco
Roadie
After 9/11, carrying any type of knife aboard an airplane was prohibited. In early 2013, the Transportation Security Administration (TSA) announced a plan to allow certain knives on airplanes again. Although the plan was later withdrawn, Spyderco had already designed a non-locking pocketknife that would conform with proposed guidelines. The Roadie is an evolved penknife that is more practical than typical slip joints. It relies on a pair of symmetrical dimples in the blade that allow a fingernail-free two-handed opening. Far superior to a traditional nail nick, they also don’t collect dirt or debris. The Roadie also features a subtle index-finger choil that acts as a safeguard against unintentional closure.
Overall length:5.1 inches
Blade Length:2.1 inches
Weight:1 ounce
Blade Material:N690Co
Pros:
The blade slices like a surgical scalpel.
Its handle scales are extremely comfortable.
Lanyard hole makes it easily accessible
Cons:
This knife would be better with a pocket clip.
The sheepsfoot blade worked well for its original design, but a clip-point or drop-point variant would be welcome.
Mikov is a classic European knife manufacturer that has been making knives in the Czech Republic since 1794. The Rybicka or “Little Fish Knife” has been in their catalog for over 100 years and is a traditional slip joint design that is often passed down from father to son. Original knives of this type sported carbon steel blades and often had carved wooden handles. Mikov began offering these knives with a 420 steel blade and Zinc alloy handles a few decades ago. This makes them more durable and actually quite a bit cheaper.
Overall length:5.5 inches
Blade Length: 2.2 inches
Weight: 1.5 ounces
Blade Material:420
Pros:
This is a small and unobtrusive knife that can attach to a key ring or be worn around the neck for ease of access.
This is a classic Czech design of a very distinct model.
Properly sharpened, it’s a very capable little slicer.
Cons:
The handles are a cast zinc alloy, which means it’ll corrode and degrade over time.
Heretic Knives has a long and consistent history in the realm of tactical automatic knives. So, to see a slippie in their lineup made us sit up and take notice. As can be expected, Heretic doesn’t screw around when it comes to materials. The CPM Magnacut for the blade is the star in this show, along with titanium handles and a pocket clip. This is definitely not grandpa’s Barlow knife. The blade is a sheepsfoot design and if you’re in a locale that restricts you based on the locking mechanism of your knife, this is the one you want. This is a slip-joint knife for a new generation.
Overall length:6.8 inches
Blade Length:3.1 inches
Weight: 2.4 ounces
Blade Material:CPM Magnacut
Pros:
It’s made from CPM Magnacut, which may be the future super steel for the next decade or two.
Razor sharp out of the box, the way all knives should ship
Titanium handles with amazing texture really blows the doors off everything else in this category
Cons:
These knives are handmade one at a time to order or in small batches, so availability may be an issue.
The Weekender is a multi-bladed pocketknife equipped with tools to improve your weekend — or any day. It features a 3-inch clip-point blade for your EDC cutting needs, and a 2-inch drop-point blade for smaller cutting jobs; the bottle opener ensures all your favorite beverages can be opened with ease. The Weekender is a USA-made folder to enhance your life. The blades are made of CPM-S30V steel, ensuring that they stay sharp when you need them. The Micarta handle offers a great gripping surface and will last virtually forever. There are other versions of this model in the works with different blade options and colors of Micarta.
Overall length:7.1 inches
Blade Lengths: 3 inches, 2 inches
Weight: 3.5 ounces
Blade Material: CPM-S30V
Pros:
Very sharp out of the box with nice thin edges for slicing
CPM-S30V is a premium knife steel with superb edge retention.
The bottle opener comes in handy when you need it.
Cons:
As good a steel as S30V is, it can be difficult to sharpen.
There’s no lanyard hole on this to help you secure the knife.
The name Venandi comes from a Latin word meaning “hunter,” and this design is a collaboration between custom knife maker Richard Rogers and Columbia River Knife and Tool. Rugged G10 handle scales mean that the handles will probably outlast the rest of the knife. Its 3.1-inch clip-point blade is made from 8Cr13MoV stainless steel. The steel is good, but it’s not exactly Magnacut. This is a great first knife for someone who is just getting into knives. It’s an ultra-modern take on a classic and timeless design.
Overall length:7.2 inches
Blade Length:3.1 inches
Weight: 1.8 ounces
Blade Material:8Cr13MoV
Pros:
The blade is sharp out of the box and ready to tackle virtually any cutting chore.
The knife excels at cutting and slicing with its clip-point blade.
You almost never think of G10 handles with a slip joint, but it works well on this model.
Cons:
Like most slip joints, there’s no lanyard hole.
A pocket clip could have worked well on this model, even though that’s not a common slip-joint feature.
This is Cold Steel’s take on the classic slip-joint Trapper knife. It features handles with authentic jigged bone, highlighted with polished metal bolsters. The rugged handles are substantially sized for hard work, even with gloved hands. It’s constructed in a traditional Jack Knife pattern, with two polished blades: a clip-point for piercing and cutting, and a Spey for skinning and gutting, both folding out of the same end. Popular folklore has placed the Trapper as the preferred choice of rugged outdoorsmen and frontier hunters, but its practicality makes it useful for all sorts of chores.
Overall length:7.4 inches
Blade Length:3.3 inches
Weight:4 ounces
Blade Material: 8Cr13MoV
Pros:
This knife reminds me of one of the Trappers I used from the age of 7 until my early 20s as a hiker, hunter, Marine, and ranch hand.
The blades slice like razors and open easier than a traditional nail nick due to scalloping.
Compact, many options for daily carry.
Cons:
Like most slip joints, there’s no lanyard hole.
The handle material may degrade over time with a lot of use. Bone isn’t Micarta.
Kershaw’s Federalist is a U.S.-made non-locking slip joint. It relies on a double-detent system to hold the blade in place while closed, and the half-stop offers controlled opening and closing action. The green canvas Micarta handle feels good in the hand, and it’ll prove to be extremely durable. The blade is made from CPM 154 steel and has an impressive edge when first taken out of the box. The custom pivot forms a shield detail to complete the distinct look of a slip joint knife. In spite of that, the Federalist moves the design several steps forward by blending characteristics of a tactical folder with that of the old-school Jack knife.
Overall length:7. 5 inches
Blade Length:3.3 inches
Weight: 2.1 ounces
Blade Material:CPM 154
Pros:
This slip joint has lanyard hole, which makes it easily accessible or locatable in the pocket with a lanyard.
The handle is extremely comfortable and ergonomic.
The blade is made from 154 CM; it’s tough, razor sharp, rust resistant, and sports an easily maintainable edge.
Cons:
The blade could have been a hair sharper out of the box.
Today, we're taking a look at a handy piece of kit for all Jeep enthusiasts: the Hazard 4 Headliner. We found this at the Hazard 4 booth during SHOT Show 2024, and although it was designed for Jeep JL/Gladiator models (with new models on the way for the Ford Bronco and Hummer EV), it may also fit it other vehicles depending on whether or not there is enough room on the ceiling.
Design and Construction
The Hazard 4 Headliner is crafted with a dual-foam construction – a feature not commonly seen in standard headliners. This design aims to provide enhanced insulation, both in terms of temperature control and sound dampening. There are other features built into the design, including HardPoint ports (those two holes you see in the top corner of the picture above), which allow you to mout things like Hazard 4's LED Beacon lights or other accessories.
Additional loops on the corner can be used to secure the Headliner to the Jeep's existing tie downs for an even more secure attachment, but the heavy duty velcro on the back will hold a reasonable amount of weight. YKK zippers along the side provide secure access, and the zipper ends can be tucked into the front.
Storage and Utility
A key feature of the Hazard 4 Headliner is its storage capability. Designed with hard-molle modular channels, it allows for customization and additional storage options. This could be useful for those who need extra space for gear, especially when off-roading, overlanding, or camping.
Hazard 4 Headliner Specs
Overall Dimensions: 18.8″ L x 16″ W x 2″ D (47.6 x 40.6 x 5.1 cm)
Big news for lever gun enthusiasts: Aero Precision is breaking into the modernized lever action rifle market. Aero is well known for its AR-15s, AR-10s, pistol caliber carbines, and most recently the Solus bolt gun, but this was a surprising turn. Although the new Aero Precision lever action rifle is still very much in its prototype phase — it doesn't even have an official name yet — we were able to get a first look and some key details about it from company representatives at SHOT Show.
Aero Lever Gun Prototype Features & Specs
Right out of the box, the Aero lever gun will come with some of the most common upgrades that would typically be added to a tactical lever gun. It has a 16-inch threaded barrel to allow installation of muzzle brakes and suppressors, as well as a machined aluminum handguard with M-LOK slots and QD sockets for a sling.
The handguard extends into a full-length Picatinny top rail with a ghost ring rear sight and fiber optic front sight. The handguard, top rail, and stock will be available in a few different finishes, including OD green and FDE.
The receiver is finished with an upgraded loading gate, aftermarket trigger, and a unique lever that matches the contour of the rifle's grip. The grip also features polymer panels on either side with texture reminiscent of an AR pistol grip.
The Aero Precision lever action stock is a skeletonized aluminum design, very similar to existing aftermarket options. It features an adjustable cheek riser, attachment points for sidesaddle ammo carriers, and QD sling sockets. The end is finished with a cushy rubber buttpad and what appears to be a spacer for length of pull adjustment.
Above: Aero's lever design is slightly more angular than a traditional lever loop, and lines up with the shape of the grip.
As you might expect, the Aero lever action will be offered in two of the most popular rifle calibers immediately at launch: 30-30 and 45-70. The company tells us there will be more caliber choices coming after that, including some especially interesting ones (that's all we're allowed to say right now).
Keep in mind this is a very early prototype, so some of the smaller details and finishing touches may change before it hits production. However, after handling the gun and running the action, it feels impressively smooth for this stage of development.
When and How Much?
Aero Precision staff told us the release of this lever gun is tentatively slated for the fourth quarter of 2024. Pricing is estimated at $1,700 to $1,800, but that may also change as the design and features are finalized.
Stag Arms Lever Action
Stag Arms, Aero's sister company, is also releasing its own variant of the same lever gun. In line with Stag's hunting-oriented rifles, the Stag lever action will be a more traditional lever gun with iron sights, wood furniture, and a classic lever loop. It should be a solid choice for fans of the traditional lever gun, comparable to existing Marlin, Henry, and Winchester offerings.
For more information on the new Aero Precision lever action rifles, keep an eye on aeroprecisionusa.com later this year.
Established in Switzerland in 1863, Hammerli Arms is best known today for its high-end target pistols and rifles, many of which have appeared in the hands of Olympic shooters. However, at SHOT Show 2024, the company showed off its newest release: the Hammerli Force B1. This .22LR rifle uses a toggle-style straight pull bolt action inspired by the mechanism used in competition rifles, but combines it with a quick-change barrel system, rugged polymer stock, and Ruger 10/22 trigger and magazine compatibility.
Hammerli Force B1 Rimfire Rifle
Above: The Hammerli Force B1 was on display in the Walther booth at SHOT Show Range Day, since Hammerli is part of the Walther family of brands.
The short-throw toggle action (as seen in this video) makes the Force B1's bolt easy to actuate quickly and without disturbing the rifle's sight picture. The locked bolt also makes this an excellent suppressor host, so we're glad to see it comes with a 1/2×28 TPI threaded barrel.
Speaking of the barrel, it detaches without any tools and can be swapped to accept different calibers (.22LR, .22 WMR, and more options to come later) or changed for a different barrel length. A Hammerli representative told us the company is also working on an integrally suppressed barrel for it.
Any time the subject of rimfire rifles comes up, so does the Ruger 10/22. Thankfully, Hammerli noticed the widespread support for that platform, and made the Force B1 compatible with 10/22 triggers and magazines. If you already have a 10/22 or some spare parts laying around, this is a great way to get into an even quieter bolt-action rifle with cross-compatible parts.
For caliber changes, the Adaptable Magwell can be used to convert the rifle to accept the appropriate Ruger magazine once the barrel has been swapped out.
The Hammerli Force B1's stock also features toolless adjustments for length of pull and comb height. The underside of the forend also has integrated MLOK slots for bipods and other accessories. Total weight is only 5.75 pounds, optic and accessories not included.
MSRP for the Hammerli Force B1 is $649. We hope to get our hands on one of these rifles in the near future for a full review, but until then, you can find more information on the Force B1 at HammerliArms.com.
Humans are apex predators, but you’d never know it by looking at us. In comparison to other predatory species, we’re feeble, slow-moving, and physically defenseless. We don’t have the strength and resilience of a bear, the flesh-ripping claws and teeth of a tiger, or the speed and agility of a hawk. Most importantly, our senses are extremely limited. Our sense of smell pales in comparison to nearly all apex predators, as does our hearing. Even our eyesight, which is quite sharp compared to other mammals, becomes nearly useless in dark conditions. But our true superpower — intelligence — has allowed us to overcome every one of these weaknesses through technological advancements.
In previous articles, we’ve discussed a variety of magnified optics that help us see further, and night vision devices that allow us to see in darkness. Both of these amplify and augment the natural capabilities of our eyes. In this article, we’re looking at a third category of optics that offer the ability to see something our eyes can’t detect at all: heat. Thermal optics give us a view of the world that other predators would surely envy, instantly highlighting the body heat (infrared radiation) of our prey.
Above: Norwegian precision rifle shooters at Ulfhednar designed the lightweight carbon-fiber tripod we used with our thermal-equipped rifle, as well as a padded rifle bag to protect all our expensive hardware.
Thermal Optic Advantages
The ability to see heat, or the lack thereof, has many valuable applications. It’s an incredibly powerful tool for search-and-rescue operations, whether it’s being used to track a criminal from a police helicopter, locate a missing hiker in the wilderness, or even find a lost pet. Thermal optics aren’t only capable of identifying body heat — they can also be used to determine if a vehicle was driven recently based on the heat of the engine block, or to detect water leaks inside the walls of a home. For these purposes, a handheld thermal camera or monocular may be most convenient (and most cost-effective).
However, for the average end user, hunting is arguably the most rewarding application of thermal devices. The majority of prey animals have developed camouflage to blend into their environments, but that camouflage won’t matter in the slightest when you’re using a weapon-mounted thermal optic. Even if your view is partially obscured by foliage, the telltale body heat shines clearly through, and any movement of that heat signature is immediately visible. It’s so effective that several states have made it illegal to possess thermal optics while hunting (be sure to check your local laws).
Unsurprisingly, this also makes thermal optics a powerful tool for warfare. We’ve seen an increasing number of photos and videos from places like Ukraine that depict the brutal effectiveness of thermal optics on the battlefield. Enemy combatants may be visually concealed and motionless within a treeline — completely invisible to the naked eye or night vision devices — but a thermal optic can make their position crystal clear. While it’s possible to conceal a human body’s thermal signature with Mylar foil, a heat-resistant cloak, or even a wet blanket, it’s much more difficult to do so while moving and/or shooting.
Above: The Contractor 320 (left) and 640 (right) look nearly identical, with the exception of the 640’s KDG Sidelok quick-detach mount.
Types of Thermal Optics
Handheld: These include pocket-sized monoculars, binoculars, and various types of thermal cameras. They’re used for general-purpose applications such as search and rescue, tracking, and home inspection.
Helmet-Mounted: Looking for the functionality of a handheld thermal optic plus hands-free convenience? If so, consider one of these. They can be used on their own, or on a “bridge” alongside a night vision monocular. However, unlike analog night vision tubes, most thermal optics have a noticeable latency effect that some users may find disorienting or uncomfortable for prolonged use, especially while walking or tracking moving objects.
Clip-On Weapon Sights: If you have a rifle that’s primarily set up for daytime use but would like to add thermal capabilities for certain occasions, consider a clip-on. This optic attaches directly in front of your weapon’s existing optic, showing a thermal image behind your rifle’s existing scope reticle. This also allows you to retain your weapon’s zero setting. Be sure to confirm that the thermal you purchase is compatible with the mount height/position and base magnification (typically 6x or less) of your daytime optic.
Stand-Alone Weapon Sights: These are dedicated thermal optics that can be used without a traditional scope. Since there’s no additional glass between your eye and the display, they offer the clearest and brightest image, plus a wide field of view that’s less sensitive to the shooter’s head position. They’re also usually lighter and more cost-effective than setups with a clip-on thermal and a traditional rifle scope.
Above: The Stag Pursuit includes a Magpul stock with unique leather cheek pad.
Drawbacks & Considerations
All technology comes at a price, both literally and figuratively. Thermal optics are extremely potent tools, but they also have some drawbacks and challenges you should consider:
Cost. While basic handheld thermals can be found for less than $1,000, if you want a high-quality weapon-mounted thermal optic, expect to pay at least a few thousand for it. And if you want the latest and greatest high-resolution sensor, expect to spend a lot more — some high-end models exceed $15,000.
Battery life. It takes a lot of energy to run a thermal sensor, the computer that controls it, and the screen that displays its output. Newer thermal optics have become more efficient, but they still go through batteries fast enough that you should always be carrying multiple spares.
Latency. Like any digital camera or display, thermal optics have a slight delay between gathering thermal data from the sensor and rendering it on the screen. High-end models have faster processors and better screens that reduce this delay, but it’s always present, even if it’s only a few milliseconds.
NUC. All thermal sensors need to periodically conduct a Non-Uniformity Correction (NUC, pronounced “nuke”). When a thermal sensor runs continuously, visual noise and imperfections will start to build up within the image; NUCing resets the sensor to a neutral temperature reading, wiping away that noise temporarily. Some thermal optics require the user to manually close the lens cap to NUC, but most use an automatic internal shutter. From the user’s perspective, this appears as an audible click and a sudden freeze of the display.Weapon-mounted thermals typically have a countdown leading up to the NUC, so it doesn’t surprise the shooter and lead to a missed shot. For the first few minutes after the thermal sensor turns on, it’ll need to NUC frequently until it reaches normal operating temperature. After that, the NUC cycle will become less frequent. So, it’s a good idea to let your thermal optic run for a couple minutes and “warm up” before you use it.
Size & weight. This amalgamation of glass, sensors, electronics, and batteries isn’t as compact as a traditional rifle optic. And once you enclose those fragile components inside a housing that’s durable enough to be mounted on a rifle, it can also be quite heavy.
Thermal barriers. Heat, much like light, can be blocked or reflected by certain materials. Some materials, like layers of clothing, will simply take time to soak up heat, appearing cool at first and slowly warming up. Others, especially highly reflective materials such as Mylar and glass, will act as an opaque barrier at best or a mirror at worst, reflecting ambient heat back at the viewer.
Environmental conditions. Since thermal optics display the difference in temperature between a target and its environment, there are some situations where the difference may be so small that the image looks washed-out. For example, if you’re scanning a 100-degree desert landscape for a human’s 98-degree body temperature, it’s going to be much more difficult to see than if that human were standing in front of a snowbank. Granted, thermal optics are sensitive enough to detect minuscule differences in temperature, but a larger temperature difference will produce a clearer, higher-contrast image.
Above: All thermal optics go through batteries quickly, so it’s wise to have a backup sight of some kind. We used an Atibal SLR-1 red dot on a 45-degree Arisaka Defense mount.
Heavy rain and thick fog can also negatively impact thermal optic performance at longer ranges, since the dense water particles in the air absorb and scatter infrared energy before it reaches the sensor. On the other hand, thermal optics can see through some airborne particles that obscure visible light, such as smoke and dust, as long as the particles aren’t large or dense enough to disrupt the infrared radiation. This is why they’re often used by firefighters and rescue personnel in low-visibility environments.
Now that you know some of the advantages, disadvantages, and applications of thermal optics, we’ll share our real-world impressions with two thermal optic models from Armasight.
Armasight Contractor Thermal Optics
In early 2022, Armasight unveiled a new series of weapon-mounted thermals known as the Contractor series. These launched with two models, a 3-12x25mm and 6-24x50mm. Much like traditional rifle optics, the first numbers indicate magnification range — in this case, magnification levels above the base value are digitally magnified, meaning the image becomes less clear (lower resolution) as you zoom in. The millimeter measurement denotes the objective lens size; just as a larger objective lens on a rifle scope allows it to gather more light, a larger thermal lens allows the sensor to take in more infrared radiation for a clearer picture at longer range.
Both of the initial Contractor models used an ArmaCORE 12-micron 320×240 sensor — this is known as the optic’s resolution. We’ll discuss that in more detail later.
Above: Unlike the quick-detach mount on the 640 models, the Contractor 320 includes a basic Picatinny rail mount that must be installed onto your rifle with a wrench.
Contractor 320 6-24x50mm
We began by testing the higher-magnification Contractor 320 thermal sight, which has a 6x base magnification and an MSRP of $4,399. This optic is built into a rugged, IP67 water- and dust-proof metal housing with large, tactile controls that can be operated easily with gloved hands. Focus and diopter adjustment are both manually controlled via textured rings on the housing, ensuring the user can get a crisp image at all times. The 1024×768 AMOLED display is colorful and bright, with a responsive 60Hz refresh rate. It's powered by two CR123 batteries, with an approximate run time of 4 hours at 68 degrees F. Like we said, thermals eat batteries quickly, and this is actually a respectable run time compared to some of its competitors.
The Contractor also has a sophisticated suite of color palettes, image enhancement modes, and extra features. These include:
Five palettes: white hot, black hot, target, rainbow, and sepia
Detail enhancement/sharpening settings: default, forest, detect, indoors, and sky/sea
Eight reticle types with adjustable colors and 1/2 MOA elevation/windage adjustments
Video streaming and data transfer via USB or Wi-Fi
Bluetooth connectivity with iOS and Android apps
Manual or shot-activated video recording and image capture
Above: A weatherproof cap covers the USB-C port used for streaming or data transfer from the onboard storage.
Contractor 640 3-12x50mm
About a year after the release of the Contractor 320, Armasight unveiled its big brother: the Contractor 640 family. These optics use the company’s proprietary ArmaCORE 12-micron sensor, but now with 640×480 sensor resolution — double that of the 320 series. Three Contractor 640 models are available, ranging from a compact 2.3-9.2x35mm model to a 4.8-19.2x75mm monster. We decided to test the Contractor 640 3-12x50mm, which has the same objective lens size and housing size as the 320 model we’re comparing it to.
The Armasight Contractor 640 3-12x50mm has an MSRP of $5,799, which is $1,400 more than the Contractor 320 6-24x50mm. Its features are nearly identical to the 320, with the same display, run time, color palettes, and so on. Aside from the sensor itself, the most notable difference is the mount. Unlike the 320, which features a standard Picatinny rail mount, the 640 series comes with a much more convenient Kinetic Development Group Sidelok quick-detach mount.
So, is the 640 sensor resolution and QD mount worth the price increase? More importantly, is either optic worth thousands of dollars of your hard-earned money? These are questions we aimed to answer, no pun intended.
Above: A weatherproof cap protects the battery compartment and its two CR123 batteries.
Armasight Contractor Color Palettes
Here’s a quick comparison between the Contractor 640’s color palettes. Notice how black patches on the dog’s fur appear warmer than light patches. This is a result of absorbing more heat from the sun. (Don’t worry, no dogs were harmed in the making of this article.)
The Test Platform: Stag Pursuit 6.5 Creedmoor AR-10
To put these thermal optics through their paces, we chose a suitable test rifle from Stag Arms. The Stag 10 Pursuit is the company’s first product line designed specifically for hunting and is available in 16-inch .308 or 18-inch 6.5mm Creedmoor variants. We chose the latter, since we already had a healthy stockpile of Norma 6.5 ammo from the long-range rifle class we wrote about in Issue 55.
The Stag 10 Pursuit comes in an elegant Midnight Bronze Cerakote finish with several upgrades out of the box: a two-stage Timney trigger, Magpul K2+ increased-angle grip, ambi 90/45-degree safety selector, ambi Breach charging handle, and Magpul CTR stock with a Stag-branded leather cheek pad.
We can rarely leave a rifle unmodified, so we installed a few accessories. A stable shooting platform is critical for any long-range or hunting rifle, so we added a Magpul bipod and an M-LOK to ARCA rail adapter from Ulfhednar. The former accommodates traditional prone shooting; the latter makes it possible to quickly mount the rifle in Ulfhednar’s excellent carbon-fiber tripod for rock-solid shots in a standing or seated position. Walker Defense Research provided a set of FDE-colored NILE silicon carbide grip panels, which offer a more secure grip on the forend, even in wet conditions.
Lastly, every serious rifle needs a backup sighting system — especially when the primary optic depletes its batteries every 4 hours — so we attached an Atibal SLR-1 solar red dot on an Arisaka Defense 45-degree offset optic mount. Although it’s possible to mount a red dot on the Contractor’s side accessory rail, that mounting point is better suited to a laser rangefinder. Plus, this way our backup red dot stays zeroed even if we remove the thermal.
Ulfhednar also provided a padded, dual-purpose gun cover/shooting mat that allows us to keep our rifle protected on the way to the range and shoot comfortably from the prone position once we arrive.
Above: A 2-inch-wide strip of foil tape was clearly visible at 50 yards through the Contractor 640 at base 3x magnification. After dialing up to 12x digital zoom, a dark spot is visible where bullets impacted the foil.
In the Field
Before testing each of the Armasight thermal optics, we needed to zero them — if you’ve never done this with a thermal before, it’s not as hard as you may think. Armasight provides a foil-backed zeroing target with each optic, but the DIY method is to buy a roll of aluminum foil tape at your local hardware store; either way, just attach the thermally reflective target to some cardboard and set it at the desired distance. Heat from the sun will cause it to appear as a light (or dark) spot in the optic’s display. Then, open the Contractor’s boresight menu to adjust the crosshair to match the bullet’s point of impact.
We used the Contractor 320 and Contractor 640 optics in the hot desert at midday, on cool evenings, and even indoors. Once we dialed in the focus to the appropriate setting, each produced a crisp image that clearly displayed the heat signature of field mice, birds, dogs, and humans, as well as inanimate objects like cars — obviously, we removed the optic from our rifle before aiming it at anything we weren’t planning to shoot.
Motion appears smooth and fluid through these optics, and although there’s a slight perceptible delay — as with all digital optics — it’s only noticeable if you’re looking for it. Unlike some lower-end thermal optics or digital night vision devices, the Contractor didn’t leave us feeling seasick and disoriented after tracking moving objects. The 60Hz AMOLED display does a great job of rendering the data from the sensor, and it’s easily bright enough to be comfortable during the day.
The controls are also straightforward: the right knob controls digital zoom, and the left knob controls color palettes and enhancement modes. A large locking power switch on top of the housing turns the optic on and off, and a recessed button behind the right knob captures photos (long press) and videos (short press). Thousands of photos or up to 4 hours of video can be saved to the onboard storage. Once you’re back home, you can upload them to your computer via a USB-C port that’s hidden under a screw-down cap on the right side of the housing.
Although these thermal optics are undeniably bulkier than a traditional rifle scope, they’re not much heavier. Each Contractor optic, including batteries, weighed between 2 and 3 ounces more than a Leupold Mk8 CQBSS 1-8x24mm optic in a Badger Ordnance mount. That’s a negligible amount of weight for such a huge difference in capabilities.
Above: Can you tell the difference before and after shooting? The rifle’s suppressor and barrel glow brightly as they heat up. (Contractor 320)
A Note About NUC
As mentioned earlier, you’ll definitely want to let these optics warm up before attempting to shoot. After a cold start, the NUC feature kicks in about every 10 seconds, displaying a 5-4-3-2-1 countdown on the screen before freezing momentarily to wipe the sensor. It’s possible to shoot during this warm-up cycle, but you need to time your shots carefully within those 10-second windows.
The NUC can also be delayed by pressing the right control knob during the countdown, but that only delays it for one cycle and results in a continued degradation of image quality. Thankfully, once the Contractor optics have run for about 15 minutes, image quality stabilizes and NUCs become rare enough that you’ll hardly notice them anymore.
320 or 640?
So, how much of a difference is there between the Contractor 320 and Contractor 640? Placing them side by side, the image difference is obvious. The 640×480 resolution is significantly more detailed, picking up more texture on objects and sharper edges. The less expensive 320×240 sensor produces an image that still makes it easy to identify heat signatures — you’d have no problem at all using it to spot the outline of a hog or coyote — but details often appear fuzzy or blotchy.
Granted, the two optics we tested have different base optical magnification levels (3x and 6x) so it’s difficult to rule out all other variables for a perfect one-to-one comparison. We did notice that using the Contractor 640 (3x base power) at its 2x digital zoom setting puts it at the same working resolution as the Contractor 320 at base 6x magnification. In this way, the 640 sensor has a much greater usable range than the 320 — at base magnification, it’s incredibly clear, and even when it’s zoomed in to 2x, the image is still quite good.
With the 320, on the other hand, targets become much less defined at the 2x zoom setting. And when you crank it up to 4x zoom — the equivalent of 24x total magnification — you’re effectively working with a data source that’s only 80×60 pixels. It’s still usable, but it’s not ideal.
If you’re planning to use digital zoom frequently or spend hours looking through your thermal optic, we’d say the Contractor 640 is well worth the extra cost. It’s easier to make out fine detail and has more “zoom headroom” than a lower-res sensor, but maintains the same housing size, weight, and run time as the 320. The quick-detach mount is also a valuable upgrade. That said, the Contractor 320 is a solid choice that will easily meet the needs of most hunters. Also, MSRP for the 320 has dropped $400 since its release in 2022, so there’s a good chance it will continue to become a more affordable choice in the future.
Above: Here’s a direct comparison of the Contractor 320 (top) versus the 640 (bottom). Both show the subject clearly, but we preferred the less fuzzy image produced by the 640 as well as the wider field of view from its base 3x magnification.
Closing Thoughts
There’s a reason the otherworldly hunter in the classic movie Predator was shown using advanced thermal vision to find his prey — nothing makes it easier to stealthily track a warm-blooded target. Every animal and human hunter understands the importance of visual camouflage, and it’s a skill that’s been honed through thousands of years of natural selection. However, very few species are capable of concealing their heat signature. Even if you stand perfectly still in total darkness, you’ll light up like a Christmas tree through a thermal optic, and you won’t know you’re being watched until it’s already too late.
Armasight’s Contractor series offers impressive capabilities and a wide range of features that’ll make you feel like a supernatural hunter, spotting every living thing that crosses your path from 1,000 yards or more. Whether you choose a 320 or 640 sensor with high or low base magnification, thermal optics give you the ability to see what would otherwise be invisible — that’s about as close to a superpower as you can get for a few thousand dollars.
Pair one of these optics with a nice rifle like our Stag 10 Pursuit and a stable tripod, and your prey won’t know what hit ’em. Better yet, pair all that with a helmet-mounted night vision setup like the one we reviewed in Issue 58, and you’ll be able to stalk your prey in total darkness before switching to your thermal to take the shot.
In the ever-evolving world of survival and preparedness, the wisdom of experience often provides the most valuable insights. For this reason, we've tapped into our community of avid readers as a resource for survival knowledge, and are sharing tips that stand out for their simplicity and effectiveness. This Readers' Survival Tip comes all the way from Southeast Asia, and is a great reminder of how many resources are out there during emergency situations.
Readers Bio
Name/Alias:Thaiger_Wa
Location: Thailand
Age: 53
Thaiger_Wa's Survival Tip
When you are lost in the jungle in a tropical area, finding a place to shelter is a priority. But more importantly, water. If you can't find an open water source, a plant that can help you is the bamboo tree. Bamboo trees are very useful. It can give water from its joints. Its shoots can be cooked and eaten. Its stem can be made into many useful things such as weapons, traps, shelter, and fuel. Moreover, that the worms that live in the joints of bamboo plants are a good source of protein. Do some research on the internet and you will find much more on how bamboo keeps you alive!
Submit Your Survival Tip
Want to see your own survival tip featured in our publications? Simply fill out the form here:Share Your Survival Tips
We are looking for your best tips, tactics and techniques to share with our audience! You do not need to be a survival expert to share with us, simply share any tip you find handy, useful or interesting.
Read More
Subscribe to Recoil Offgrid's free newsletter for updates, offers, and more.
Concealing a handgun in a backpack is relatively straightforward, since a pistol, holster, and spare mags can fit in even the smallest packs with ease. However, if you’re looking for a way to carry a concealed carbine, choosing your pack carefully becomes a much higher priority. Large backpacks can hold a rifle easily, but they practically scream there’s a gun in here — that may not be the message you want to send when you’re walking through a hotel lobby, parking lot, or other public location.
Smaller packs may not fit your rifle or may look awkward and bulky once they’re loaded with a weapon. The setup seen here was designed as a happy medium between these extremes, with priority placed on carrying a fully concealed, multi-role folding carbine.
Vertx has been a key name in the everyday carry backpack space for years with its Gamut series. As a happy owner of several of these bags, the larger Vertx Basecamp seemed like a natural choice for this application. I made sure to carefully compare its measurements to those of my carbine in advance, and I wasn’t disappointed when it arrived.
The Carbine Setup
The bag is a snug but functional fit for my 12.5-inch AR with a LAW Tactical folding stock adapter and 20-round magazine. This rifle is equipped with a Nightforce NX8 1-8x optic in a Badger Ordnance Condition One 1.7-inch-height mount, as well as a Holosun 509T red dot on the slimming KOENG.CO 12 o’clock mount.
The carbine was built to serve as the most effective general-purpose rifle I could fit in the bag, allowing easy access in a pinch. I wanted to ensure it could be fired immediately without pausing to unfold the stock or put on ear protection; this is accomplished by the addition of a LAW Tactical ARIC bolt carrier and a Thunder Beast Dominus-K suppressor. The base of the AR build is a San Tan Tactical Pillar matching receiver set and a VLTOR Freedom Handguard with a built-in hand stop and ARCA rail section (for quickly mounting on a tripod). It also needed to be day and night capable.
To this end, it’s equipped with a Modlite PLHv2 light on an Arisaka mount activated using a UNITY Tactical AXON switch. Utilizing a 12 o’clock mounted red dot also means I can passively aim the rifle through night vision, if necessary. The 12.5-inch Criterion barrel is excellently gassed, making suppressed usage downright pleasant. Equipping the carbine with a PRI M84 Gas Buster charging handle also helped reduce gas blowback to the face.
The choice to utilize a 20-round magazine wasn’t due to any regional restrictions, but rather to allow easier access to the carbine through the top of the bag without stripping the entire face open. A 30-round magazine will fit tightly, but it means having to rip the backpack wide open, which is less than ideal if you’re in a hurry to access the weapon.
Additional Features
The Basecamp is feature-rich with a removable laptop sleeve on the interior and zippered pouches for storing small items. The Dark Earth color was chosen for function as much as aesthetics. It fits the carbine with the custom M81 Arid paint job from Pro2Customs and makes it easy to conceal in an arid desert environment. To facilitate this setup, removing the laptop sleeve was absolutely necessary. This pack’s removable laptop sleeve wasn’t present in earlier versions of the Gamut series, which is another selling point of Vertx’s newer bags.
I prefer keeping things like batteries outside of direct sun and heat in the desert, so having those small storage options positioned away from the top of the pack is beneficial. I store paper goods or items less susceptible to heat in the large, zippered storage pocket on the top of the opening flap. Speaking of that top flap, I appreciate that Vertx includes a Hot-Pull Tab at its leading edge, which can be staged between the two zippers and pulled to quickly open the main compartment. This makes it faster to open without hunting for zippers that might have otherwise ended up in a different place every time.
The generous internal storage allows the effective concealment of not just the carbine but also a Dauntless Manufacturing Hiker Tanto fixed blade with its sheath mounted to the included TactiGami panel, a fully stocked Ryker Nylon ankle IFAK utilizing the hook of the kit itself to attach to the internal loop, and a SureFire Stiletto light stored beside the Dauntless fixed blade. I also keep a reversible MultiCam/black A3 Alpha Lochi jacket from Beyond Clothing inside the main compartment, offering concealment as well as warmth.
Lastly, there’s a GRAYL GeoPress water purifier bottle. In the metropolitan center of the desert city where I live, I can fill it with 24 ounces of clean water from any tap, or purify water scavenged from ponds and drainage ditches in a pinch. The external stretch pockets allow me to carry the GeoPress as well as a 32-ounce bottle on the opposite side.
Eventually, my buildout of the bag will be improved to utilize more TactiGami panels on the interior for better spare magazine storage. I also plan to use the external PALS webbing hidden under the flap on the outside of the pack. I’ve used this outer storage space effectively in the past by mounting specific pouches for sundry items that might require access without exposing the main compartment’s contents. Ideas that come to mind are basic toiletries, pen and paper, a book, a multi-tool, and, naturally, some snacks.
In my opinion, you’ll be hard-pressed to find a more well-rounded and durable backpack at this price point. The Gamut family has proven to be well-built and reliable over the years, and the Basecamp looks to be no different. If you’re in the market for a multi-role backpack that offers concealment for anything from a subcompact pistol to a carbine, medkit, and spare magazines, you should give this bag a closer look.
Scary Smart by Mo Gawdat isn’t your typical guide to bracing for life’s curveballs. Instead, it dives deep into the realm of artificial intelligence (AI) and its potential impact on humanity. Gawdat, a former Google executive, warns us about the rise of AI, which he argues could be both a blessing and a curse. The book serves as a wake-up call, urging us to prepare for a future where AI could either be our greatest ally or a formidable adversary.
The 411
Gawdat starts the book with a thought exercise. Imagine it’s the year 2050, and you’re sitting around a campfire with the author. You’re either living in a dystopia where AI turned against humanity, or a utopia where AI ushered in a new age of prosperity. Looking back at the current time, what words of wisdom would future you say to present you? Gawdat does just this, exploring how we could reach a worst-case conclusion or a best-case future.
The book explores the “dual use” of AI. For example, when Oppenheimer discovered how to recreate nuclear fission, he invented a paradigm-shifting technology that could be used to annihilate civilization or provide it with an abundance of energy. AI is similar in scope with this double-edged sword characteristic, and Scary Smart explores how humanity can prepare and approach AI’s development in an ethical way. The book emphasizes that AI has the potential to solve some of the world’s most pressing issues but also poses risks if not managed responsibly. Gawdat stresses the importance of programming ethics into AI, which is crucial for ensuring that these systems act in the best interests of humanity. The book argues we need to be mentally and emotionally prepared for a future where AI plays a significant role. This involves understanding the technology, its limitations, and how to co-exist with it.
While Scary Smart doesn’t directly address traditional notions of readiness for unforeseen events, it does offer a unique perspective on preparing for a future shaped by AI. It’s about adaptability, mental fortitude, and ethical considerations — qualities that are essential for any kind of readiness strategy. The book encourages us to think critically about the technology we’re creating and how it could affect us, a vital skill when planning for the unknown.
The book has faced criticism for its somewhat alarmist tone, with some readers arguing it paints an overly grim picture of AI’s potential impact. But Gawdat balances the potential for dystopia with an equal amount of how astonishingly well AI can solve some of the world’s most dire problems. Additionally, Gawdat’s focus on embedding ethics into AI has been met with skepticism, as defining “ethics” in a universally acceptable way is a complex task. Much like any tool humanity invents, often the only way to stop a bad guy who uses the technology in a nefarious way is a good guy using the tech to prevent the bad from happening.
The Verdict
Scary Smart is a thought-provoking read that challenges us to consider the ethical and practical implications of rapidly advancing AI technology. While it may not be a traditional guide on how to prepare for life’s uncertainties, it offers valuable insights into adapting and thriving in a world increasingly influenced by AI. If you’re someone who’s keen on understanding the broader landscape of threats and opportunities that lie ahead, this book is definitely worth your time.
About the Book
Book & Author Scary Smart: The future of Artificial Intelligence and How You Can Save Our World By Mo Gawdat
Publisher: Bluebird
MSRP: $15
URL: mogawdat.com
Pages: 326
Rating: Thrive | Survive | Die
Read More
Subscribe to Recoil Offgrid'sfree newsletter for more content like this.
When you think of a slingshot, what comes to mind? Maybe a nostalgic memory of childhood shenanigans comes to mind, or perhaps you envision a TV character like Bart Simpson or Dennis the Menace. You might be surprised to learn that slingshot technology has not only kept pace with modern advancements, they are an effective tool for hunting, recreation, and even defense. Enter into the world of Simpleshot, a name that's ubiquitous in the slingshot community. We'll take a look at several of their products, including the Scout X, Hammer XT, Torque, and Axiom X slingshots. Plus, I'll share my firsthand experience from a slingshot class held at the Georgia Bushcraft event.
Simpleshot Slingshots: An Overview
Simpleshot is not just another slingshot brand. They've carved a niche for themselves with innovative designs and a focus on quality. But how do these slingshots really stack up? Let's break it down by looking at a few of their models.
The Scout X Slingshot The Scout X is a versatile beast. It's designed for both beginners and pros, offering an ergonomic handle and a sturdy frame. What makes it stand out is its simplicity and adaptability. You can switch bands easily, and it's suitable for various shooting styles. However, it's not just about comfort; the accuracy this slingshot offers is impressive.
The Hammer XT Slingshot The Hammer XT is a powerhouse. It's built for heavy-duty use, and you can feel it. Its weight and construction make it a great choice for hunting or long-range shooting. The wrist brace adds stability, which is crucial for powerful shots. The forks can also be swapped out for an archery biscuit to shoot arrows.
The Torque Slingshot The Torque is a compact wonder. Its unique, angular design is not just for looks – it aids in grip and alignment. It's incredibly lightweight, making it a great travel companion. However, its small size might be a challenge for those with larger hands.
The Axiom X Slingshot Lastly, the Axiom X is a well-rounded option. It's designed for comfort and accuracy, with a frame that accommodates various grips. It's a solid choice for both recreational shooting and more serious endeavors.
Slingshot Accessories
When it comes to accessorizing your slingshot, Simpleshot has an array of options. For starters, their Clay Shooting Flat Bands are tailor-made for clay ammo enthusiasts, ensuring precision and durability. If you're aiming to improve your accuracy, the Bell Target is a fantastic choice with its high-visibility and ultra-durable design.
Simpleshot offers many ways to customize your slingshot rig. Their Scout LT Scales come in a 5-pack bundle, allowing you to personalize your slingshot's handle to your liking. And for those who love a bit of target practice, the Self-Resetting Knockdown Target and its accompanying replacement discs are a good option. These targets are not just fun but also aid in skill improvement. For the more competitive shooters, the Competition Training 5-Pack of Self-Resetting Knockdown Targets is designed to simulate a real-world shooting experience, perfect for upping your game. And for those late-night practice sessions, the Glow-In-The-Dark Golf Ball Target is a useful accessory. Simpleshot also caters to the digital age with their Foundations Online Course, a great resource for mastering slingshot techniques.
Finally, the brand offers various handle weights, scales, and clips specifically designed for their Scout X model, enhancing the overall shooting experience with added stability and grip customization. Plus, the quick-release keychains and hex screws are handy tools for making quick adjustments on the go.
Slingshot Fundamentals
At Georgia Bushcraft‘s Fall Gathering event, I had the opportunity to learn slingshot fundamentals from the Simpleshot experts themselves. The class focused on four key areas:
Finding Your Dominant Eye: This is crucial for accuracy. The instructors helped students identify their dominant eye, which is essential for proper aiming.
Proper Grip Techniques: A correct grip is the foundation of a good shot. We learned the proper grip for the slingshot shooting style. Rather than holding on to the handle exclusively, the grip also included the forks of the slingshot to prevent it from leaning backwards when pulling back on the band.
Preventing Band Twists: Twisted bands can affect accuracy and the lifespan of the bands. The instructors showed us how to attach and maintain the bands properly.
Archery Elbow Technique: Just like in archery, the elbow technique in slingshot shooting is vital for stability and precision. We practiced this to improve our shooting form.
The class included people of all ages and backgrounds participating, proving that slingshots continue to stand the test of time. It was a fantastic experience that not only improved my skills but also deepened my appreciation for the sport.
Final Thoughts
Simpleshot is leading a renaissance in the slingshot world. Their range of products caters to a wide spectrum of users, from beginners to experts. Each model has its unique strengths, and there's something for every preference.
Read More
Subscribe to Recoil Offgrid's free newsletter for more content like this.
Don’t believe everything you see on the internet. This is one of the fundamental rules of using the worldwide web, and it dates back to the earliest days of dial-up. In the ’90s, chain emails spread hoaxes like wildfire, but those of us who weren’t entirely gullible knew to question anything we received with “FW: FW: FW:” in the subject line. The rise of chat rooms and social media made it even easier to spread misinformation to thousands of strangers.
Around the same time, photo editing software was becoming vastly more powerful and accessible, so we began to see the spread of Photoshopped hoax images across the internet. Much like chain letters had morphed into chain emails, this type of hoax was nothing new, but the advancement of tech made it far easier to create and disseminate. Photo manipulation techniques that used to require hours of labor in a photographer’s darkroom could now be accomplished in seconds.
Today, misinformation has reached another new frontier: artificial intelligence. Publicly accessible AI tools are being used to automate the creation of so-called deepfakes, a term based on the “deep learning” neural network technology that’s harnessed to create them. Now, instead of manually blending images together in Photoshop, we can let AI do the hard work for us. And it’s not only useful for still images — deepfake technology can also process each frame of a video to swap a subject’s face (for example: youtu.be/CDMVaQOvtxU). AI can also be used to closely mimic a human voice based on audio samples and read back any text the user inputs (youtu.be/ddqosIpR2Mk).
Deepfakes aren’t just a hypothetical threat — they’re already being used to manipulate, confuse, or outright deceive viewers. In 2020, the parents of Joaquin Oliver, a 17-year-old who died during the Parkland school shooting, used deepfake technology to recreate their dead son’s likeness and create a video where he urged young Americans to vote for more aggressive gun control. More recently, deepfakes of both Ukrainian President Zelensky and Russian President Putin appeared in an attempt to encourage the opposing side’s troops to surrender or retreat; the latter clip was aired on Russian TV in what the Kremlin decried as a “hack.”
Cybercriminals are also using deepfake technology to persuade unsuspecting businesses and individuals to transfer money or give up sensitive info. And in the most twisted cases, AI is being used to generate deepfake pornography of people — even children — who are totally unaware of the disturbing and humiliating way their likenesses are being altered. A 2022 report by the U.S. Department of Homeland Security stated, “Non-consensual pornography emerged as the catalyst for proliferating deepfake content, and still represents a majority of AI-enabled synthetic content in the wild … The ramifications of deepfake pornography have only begun to be seen.”
It’s becoming increasingly difficult to distinguish real photos, video, and audio from deepfakes. What would you do if you suspected you may be the target of a manipulative deepfake attack by cybercriminals? How can you verify information you receive before falling prey to these high-tech social engineering tactics? We asked cybersecurity professional W. Dean Freeman and international risk management expert David Roy to weigh in on this complex attack.
The Scenario
Situation Type
Targeted by cybercriminals
Your Crew
Yourself
Location
Seattle, Washington
Season
Winter
Weather
Cloudy; high 47 degrees F, low 38 degrees F
The Setup
You’re the head IT guy at a family owned business near Seattle. Most of the time, your job duties consist of basic tech support and PC troubleshooting for the company’s 23 employees. Your employer deals with various vendors overseas, so you’re used to getting messages at odd hours with not-so-good English. Aside from a few obvious Nigerian prince scam emails and run-of-the-mill malware, the company hasn’t experienced any substantial cybersecurity threats in the past, but you’ve always tried to maintain good security protocols regardless.
The Complication
On a Tuesday afternoon, you get a panicked phone call from Susan, the owner of the company. She says her brother Dan, who is currently on a business trip to visit suppliers throughout Eastern Europe, sent her a video message a few minutes ago. In the video, he explained that one of the company’s key suppliers is owed a substantial amount of money and is demanding immediate payment. Supposedly, if they don’t receive the payment within the next few hours, they’ll switch to an exclusive partnership with your biggest competitor. Susan knows this would be catastrophic and might even cause the company to go out of business.
She tells you she immediately tried to call Dan back and called the supplier, but neither one is picking up — cell phone coverage isn’t the best in that country, and it’s outside normal business hours. She’s considering sending money to the indicated account, since she’s absolutely certain that the person in the video was her brother. It sounded and looked just like him, and he appeared to have knowledge about the business and its suppliers.
However, she wants to know if you have any ways to verify the video first. What methods or tools can you use to check the legitimacy of the video message and its sender? If you determine it’s a deepfake, what other steps should you take to protect the business (and its owners) from similar cyberattacks in the future?
Cybersecurity Professional W. Dean Freeman’s Approach
Alright, so I’m either facing the impending financial destruction of my employer, or an extremely sophisticated threat actor, and I need to figure out which one it is fast. Two out of the three outcomes here have me looking for a new job soon if I don’t stay on top of this. Luckily, I’m pretty good at what I do, if I do say so myself, and I’ve seen similar threats before. Just because there might be a new technology at play here doesn’t really change most of the fundamentals.
First, let’s think through the possible situations:
This is a legitimate, albeit unusual and concerning request.
The video is illegitimate, created via a generative AI tool to produce a “deepfake.”
The video is genuine, but Dan’s under duress and this is a whole different type of crime (extortion and possibly kidnapping).
Each of these potential situations is going to have its own set of tells and its own incident response playbook, as well as some specific countermeasures. They also share some preparatory mitigations in common.
Preparation
So, whenever employees, especially key staff or executives travel, the risk of data breaches resulting in intellectual property theft go way up, and depending on the region of travel and the industry you’re in, the threat varies. Knowing this, I’ve coached Dan and others on the following:
Never leave electronic devices unattended, not even in hotel rooms.
When crossing borders, always bring clean devices. Don’t take confidential company information through customs checkpoints.
Always use the company VPN when traveling, and make sure to use the full tunnel profile, not split tunnels. When traveling, there’s no such thing as trusted network access, even at a customer site.
Be aware of anyone you meet in hotels, bars, etc. who seems particularly interested in what you do for a living.
Make sure you have the highest privacy settings on personal social media accounts, and be careful what you post, especially regarding the company.
To varying degrees, I’ve also tried to lock down services such as email, such that users either have to be on the local network or VPN to send and receive their company email, and am leveraging defense in depth techniques, using proven technologies, for endpoint and network security, as well as access to cloud-based applications. While nothing is foolproof, the cost of attacking the network is much higher than it used to be when I first started at this job.
I’ve also prepared myself to identify and counter new and emerging threats, through self-study and formal classes. I stay on top of the state of the art in my craft so that I continue to be an asset, but also understand that it’s an arms race, and the momentum is generally with the attackers.
About: Nothing about this image is real. It was created using the free AI image generation tool PlaygroundAI.com in less than 30 seconds. The site also allows users to upload images to give the AI “inspiration.”
On-Site
Now that I’m on the phone with Susan, we have a potential catastrophe, and one where there isn’t necessarily a specific playbook yet. Luckily, it’s a small company with little red tape, but given the circumstances, it could have proved disastrous if she hadn’t called me and had just sent the money. It’s time to think fast, but think thoroughly.
To make sure I have my bases covered, I’m going to run through three parallel investigations: financial, traditional incident response, and also look specifically at the video to see if I can tell whether it’s genuine.
The financial investigation will go as follows:
Give the video a quick once-over and write down the account information.
Do a cursory lookup of the routing information to see where the bank is located and whether that provides any obvious red flags.
Check with the head of finance to see if she knows whether this is a bank (or even better, an account) that we’ve used associated with that partner before.
If the request is to a financial entity that’s known to us and the account is associated with the client, then that dramatically lowers the risk. It still doesn’t mean that the request is 100 percent genuine though.
The traditional forensic investigation will focus both on the email itself, specifically checking the header information to see where it truly originated from, as well as correlating that activity with logs from the company mail server and VPN. If it looks like Dan actually sent the email from his laptop, through the company server, then again, this reduces the chance that it’s false. If it comes from his personal email, that’d get my hackles up. If the mail headers are clearly forged, then we have multiple potential issues, and a deepfake is certainly a possibility.
So, the bank is in the same general region as the client but isn’t a bank that we’ve done business through before. We can’t know who the account belongs to at this time, so that’s a dead end but definitely suspicious. The email didn’t come through Dan’s corporate account, but did come from his personal Gmail account. The email was sent through Gmail. Dan’s apparently used his Gmail account to send a few messages to Susan recently, so she wouldn’t have thought that was unusual. At this point, I go ahead and disable Dan’s corporate accounts and make sure that he doesn’t have any access to company data.
Given these facts, it’s going to be important to review the video. The two major possibilities at this point are the video being a deepfake, or it being a genuine video and made under duress. The fact that Susan is Dan’s sister and is convinced the video is of Dan means it very well may well be a duress situation.
I have Susan pull a bunch of photos of Dan from social media and her cell phone and send them to me so I can bring them up on one monitor, while watching the video on another. Reviewing the video critically, I look for the following telltale signs that the video is a deepfake:
An overly shiny, waxy complexion to the skin.
Audio is out of sync with the movements of the mouth.
No blinking.
Eyes not moving in sync with each other (cross eyed, etc.).
Differences in the body, particularly the ears and limbs.
Any changes in speech patterns from what I and Susan know of Dan.
While lighting and other technical factors could produce the appearance of waxy skin or out-of-sync audio in a genuine video, the biometric factors are going to be the major giveaway. This is because of how deepfake videos are generally produced.
Feeding the generative AI with still images to produce the likeness tends to result in deepfake videos where the eyes don’t blink at all, which is generally unnatural for people. Additionally, the computer has a hard time lining up both eyes toward the same focal point when trying to adjust for movement, so if Dan appears cross-eyed in the video but is known not to be in real life, that’d be a good indicator as well.
Most deepfakes are made by applying an extruded face image onto a live actor. Often, the angles are hard to make for the computer and the human driving the production, so the AI won’t overlay on top of the ears, hands, etc. Because of this, I pay very close attention to any differences in Dan’s ears in the video from what I can see in the known photos of him I have available.
Because Dan often represents the company in public events, there’s ample opportunity for fraudsters to collect voice samples to synthesize is voice, but since any potential attackers are likely neither native English speakers, nor are they American from our region, there very well may be differences in speech cadence, grammar, and word selection that indicate that the voice is “reading” a script and isn’t actually Dan talking.
After identifying the potential indicators, I also review the video metadata to see if I can gain any insight into when and where it was recorded and on what device. Any mismatch between where Dan is and what type of phone he has will confirm that the video is fake.
About: Using voice samples collected from social media and other public sources, AI can recreate any human voice and use it to read a given script.
Crisis
We have enough evidence at this point to know the request is fake, and that Dan’s personal Gmail has been compromised. I’ve already disabled Dan’s account but will need to make a more thorough DFIR (Data Forensics and Incident Response) investigation into the network to see if any corporate data may have been compromised.
I convince Susan not to make the payment, but she’s still very shaken up. We’re almost certain the video is fake due to biometric mismatches that she didn’t catch at first — watching on her phone in a panic — which means he’s probably not kidnapped, but he’s still out of pocket and his status is unknown. Due to tensions in the region, we’re still worried.
At this point, we have multiple priorities, one being getting ahold of Dan. I have Susan call the U.S. Embassy in the country where Dan is and report that he may be the victim of a crime and ask to be put in touch with the relevant authorities. Additionally, we’ll still continue to try contacting Dan directly, and through the hotel, as well as any business associates at the vendor.
To help tie up loose ends on the cyber side, I’d likely reach out to industry contacts at relevant companies, as well as contacts made through the FBI’s InfraGard program. I may still have to fill out the paperwork, but friends and associates can help get the answer faster.
Final Thoughts
Deepfakes are a major issue, particularly as an information warfare weapon, and have societal level impact. As a tool for cybercrime, they’re basically just a particularly nasty tool in the phisherman’s toolkit. Like all cyber and information weapons, there’s a red team/blue team arms race for generative AI and the detection of its output. Luckily, AI still doesn’t beat actual intelligence, so long as you properly apply it.
In my opinion, defenders, whether professional incident response staff, or the average person who may be subject to an AI-fueled crime attempt, are best served by approaching the issue with strong critical thinking skills and a healthy dose of skepticism (the same mental tools that’ll help you ferret out “fake news” or determine if you’re being targeted for a “grandkid” phone scam).
Following defined DFIR protocols will help give you additional context within which to evaluate the media, in addition to looking for the “tells.”
Of course, prevention is worth an ounce of cure. So, what are some things that could’ve prevented this scenario from unfolding the way it did?
First of all, just like protecting against facial recognition, limiting the amount of data about you (photos, video, voice) that can be used to generate fakes is important.
Second, limit the crossover between personal and business IT systems. Your name probably isn’t Hillary, so eventually it’ll catch up to you.
Third, establish protocols with your organization or family for how requests like money transfers would be made, such as having key phrases or “safe words” that need to be present to authenticate the request. Treat any request that deviates from protocol or isn’t authenticated as illegitimate until proven otherwise.
Lastly, if you work for an organization that has the budget, seeking out tools designed for identifying deepfakes and starting to train models based on high-profile members of your organization, such as C-level executives, is worth exploring. The sooner you have those systems and models in place before an incident, the more useful they’ll be if there is one.
Risk Management Expert David Roy’s Approach
Preparation
In this scenario, the business owner is between a rock and a hard place, as deepfakes are becoming commonplace as a method of social engineering. However, there are still prudent steps in preparing for this type of situation. First, any person doing business internationally should be aware of the inherent risks this presents by default. Regardless of your business vertical, understanding how to work in high-risk places, particularly developing nations, and places where bribery and corruption are rampant is important.
You may face scenarios like this via subcontractors and supply chain partners, so it’s prudent to have diligence on your downstream operations, the financial status of your partners, and awareness of geopolitical risks presented in each region where you operate, especially those around personnel and information security.
Educating international travelers about information security best practices is critical to the success of operational security. These practices are a good start: ensuring that data-blocking phone chargers (sometimes called “USB condoms”) are being used in order to prevent data theft, swapping mobile devices (such as cell phones and laptops) for those that don’t contain proprietary company data before leaving the U.S., and performing general security awareness training with all staff annually.
But even with all of the cool tech in the world, you can’t remediate or patch a human — they’re an organization’s largest information security vulnerability. For this, you can only drill, train, and reinforce the importance of identifying social engineering, phishing, data mining threats, physical threats to obtain sensitive information, and the most difficult, resisting bribes (of all kinds).
To enhance operational security, additional levels of personnel validation should also be in place. Code words for team members or projects should be used for identity verification. However, these should be codes that are not stored electronically in the case of a data breach; instead, choose codes that will be easy to remember for the end users even in stressful situations. Other unique personnel identifiers such as authentication tools can also be used (such as one-time keys and codes from encryption devices).
All of the aforementioned methods are low cost and can be easily executed by an organization of any size, but of course, there are much more robust methods for businesses that do a higher volume of international travel. These methods include utilizing satellite communications for conferences, private international transport, and coordinating with local U.S. intelligence resources in host countries ahead of critical meetings (for organizations doing work on behalf of the U.S. government). Like most things, your risk mitigation capability is commensurate to the amount of cash you want to spend.
Above: Senior citizens are often the target of cyberattacks, since they tend to be less tech-savvy than younger people. It’s a good idea to discuss common forms of phishing and social engineering with your older family members and colleagues.
On-Site
The most intriguing part of the deepfake and AI craze might just be its mystery. Being able to tell fact from fiction quickly enough to make an important judgment is a challenge, and until this key piece is figured out, the risk will only become greater. Being able to disprove an AI-generated deepfake by validating identity (especially during an information breach) may end up being impossible in the case of a threat actor controlling an information systems environment.
In this situation, identity validation is key — assuming this method isn’t compromised as part of the communication breach. For organizations, and more commonly, individuals who don’t have access to software that can break down metadata, file structure, or other code that compiles a video, there are some easy methods that can at least begin to let a user understand if a video, photo, or other method of communication is faked.
Most importantly, one can start with simple geography. In the scenario, Susan is expecting a communication from Eastern Europe, however, if the deepfake video has clues that the subject appears to be in a place completely removed from the expected region, this might be an easy step in the process of elimination. Follow-up communications (if successful) can aid in understanding the origin. If this isn’t possible, or helpful, human and emotional intelligence can be used, as long as the person evaluating the suspected deepfake has familiarity with the person in question.
Voice cues, such as stuttering, tone, inflection, accent, and cadence of speech can be used along with physical cues such as blinking, general eye/pupil movement, breathing, and how facial movement aligns with voice tone and emotion. These items, mixed with any other communications received (such as texts, emails, voicemails, etc.) can be evaluated as a whole to determine if you are dealing with a malicious actor, versus a colleague that wants to relay important information with spotty cell and data coverage.
In a perfect world, the organization should train all personnel on security awareness so they can identify malicious actors, but also so they can differentiate themselves from those criminals when communicating with coworkers across the world. In many cases, cultures, translation tools, and the phrases/words we use can appear “non-standard” to international colleagues, and in turn, look somewhat suspicious. But if everyone is on the same page, and ensures clear communication methods are in place, this reduces the risk of misinterpretation.
Crisis Management
As terrifying as it might seem (and unreal, despite Liam Neeson movies), business travelers do get abducted overseas. Understanding the reality of this, and how to prepare is enough to fill an entire handbook, but there are a few ways to prepare. First, avoid places where this happens — business travelers (especially Americans) working for large multinationals are the most commonly kidnapped and most valuable. This commonly occurs in places like Iraq, Colombia, Mexico, Yemen, and various parts of Northern Africa.
That said, knowing where your personnel are at all times helps. Many international cellular services now offer satellite mobile device tracking for cell phones, laptops, and geotags for international travelers. This isn’t only intended for safety, but also for purposes of compliance with U.S. export regulations — a nice complement to both safety and operational security. This can help pinpoint if your colleagues are out of place, or exactly where they should be, when they should be there.
If you suspect your colleague has been kidnapped, most importantly, avoid contacting local police (odds are, they might be in on it). Contact your embassy, your insurance company (more on that later), and any additional resources that might assist in evidence collection or ransom extraction. With that in mind, having insurance helps. Rescue, kidnapping, and extortion insurance can carry millions of dollars in coverage — enough to make nasty threat actors hand over your colleague. In conjunction, an organization of any size these days should also have cyber insurance that covers data breach, ransomware, data theft, and eraserware events.
Make sure to preserve any (deepfake or not) information that has been provided from your suspected kidnapped colleague and be ready to provide information that could assist in locating them. In most cases, U.S. Federal agencies (mostly the FBI) and the State Department will have much more sophisticated tech to determine the validity of information you’ve been provided. Once you’ve quickly done all of this, it might be worth a heads up to other folks in your company traveling OCONUS to halt any additional travel and return home asap.
Above: Deepfake technology can learn a face from existing photos and videos, then superimpose it onto a live actor’s body. It can also generate new faces from scratch based on common facial features and parameters.
Final Thoughts
All things considered, this would be a pretty difficult scenario for an organization of any size. However, implementing and executing basic principles of personnel and operational security, paired with a process-driven international travel safety approach can go a long way. Effective communication methods with planned touchpoints, code words/obfuscation of information, and general information security best practices can be the difference between a deepfake compromising a business and resulting in an expensive wire transfer to an unsavory character, or a normal chaotic day at the office.
It’s important to remember that these attacks hit close to home as well. Deepfake phone calls threatening harm to a family member unless a ransom is paid or impersonating debt collectors for a known financial strain that was discovered through a stolen identity are becoming more commonplace. These types of events are draining ordinary people dry just because of a simple scam that a teenager can pull off with limited technology. To combat this, implementing “home-based” security awareness for your household members is good practice. In most cases, these sorts of targeted attacks focus on the elderly or individuals who have a history of financial hardship, as they become vulnerable and easily exploited targets for threat actors.
Considering all of the factors at play, the human element emerges as the most important. Awareness, intelligence, and critical decision making are paramount in being able to identify any sort of deepfake and justifying an appropriate response. With this exploit increasing in volume every day, preparedness and a proactive approach mean everything.
Conclusion
In September 2022, multinational cybersecurity firm Trend Micro released a report that stated, “The growing appearance of deepfake attacks is significantly reshaping the threat landscape for organizations, financial institutions, celebrities, political figures, and even ordinary people.” It continued, “The security implications of deepfake technology and attacks that employ it are real and damaging.
As we have demonstrated, it is not only organizations and C-level executives that are potential victims of these attacks but also ordinary individuals. Given the wide availability of the necessary tools and services, these techniques are accessible to less technically sophisticated attackers and groups, meaning that malicious actions could be executed at scale.” We’d recommend anyone interested in this topic read the full report — search for “How Underground Groups Use Stolen Identities and Deepfakes” on TrendMicro.com.
The report concludes with several recommendations for users concerned about deepfake attacks. Individuals should use multi-factor authentication for online accounts, set up logins based on biometric patterns that are less exposed to the public (e.g. irises and fingerprints) rather than simple facial recognition, and limit exposure of high-quality personal images and videos on social media.
Remember that every selfie, video, or audio clip you post can be fed into AI deepfake tools. The less data the bad guys have access to, the less accurate their fakes will be. For businesses, Trend Micro recommends authenticating each user/employee by three basic factors: something the user has (like a physical key), something the user knows (like a password), and something the user is (biometrics). Each factor should be chosen wisely based on analysis of the criminal threat landscape.
Meet Our Panel
W. Dean Freeman
W. Dean Freeman, CISSP-ISSEP CSSLP C|OSINT is a veteran of the cybersecurity industry with over 15 years of professional experience ranging from threat intelligence to systems security engineering, and over 25 years of hobbyist experience in related domains. He’s a regular contributor to RECOIL OFFGRID magazine, and his writings on preparedness and self-defense topics have, or will, appear in other publications as well. He lives with his family in central Texas.
David Roy
David Roy (a pseudonym, as required by his line of work) is a global risk management and information security executive at a multinational technology firm and specializes in critical infrastructure security. He has worked in this space for well over a decade and holds multiple industry certifications in information security, with an educational background in geopolitics and risk management. He has worked in both the private and public sector during his career, and has extensive experience working across North America, Europe, the Middle East, and Southeast Asia.
Read More
Subscribe to Recoil Offgrid's free newsletter for more content like this.