IR Illuminator: Part of a Complete Night Raid

There is a great difference between having access to night vision goggles and being truly night capable. When talking about armed preparedness, the next issue after getting night vision, is having one or more ways to aim your weapon when using them. Taller mounts for red dot sights and holographic optics, as well as infrared (IR) lasers, meet these requirements. But being fully setup for night-fighting doesn't even stop there. A deeper familiarization with night vision technology reveals the limits of its capability: it doesn't work in absolute darkness, and even under NVGs, there still are shadows to hide in. More than just an advantage, an IR Illuminator is necessary for those who seek to take maximum advantage of the darkness, so much so that those without it face a serious, if not final disadvantage.

What is an IR Illuminator?

In the most basic description, an IR illuminator is a flashlight that only uses light within the IR spectrum. Invisible to the naked eye, it can be seen only by optical tools that pick up the infrared side of the spectrum, such as security cameras and night vision goggles. They typically come in two forms: integrated into an IR laser/illuminator device such as an ATPIAL-C or in a stand-alone format, much like a weapon mounted light. 

Integrated

Military-style laser/illuminators dominate this market, by far, with representatives starting to pop up from Russia and beyond. These devices typically have the option to select what type and intensity of light is being emitted. The foundation of a laser/illuminator will focus on IR wavelength transmission, but some include features such as visible lasers, white (visible) light integration, and the option to use a pressure switch/tape switch for activation. Most laser/illuminators are designed for use on larger frame guns, such as AR-15's, but some handgun models are starting to become more common.

Zenitco Perst-3 IR illuminator

 

A key feature that an integrated IR illuminator will include, is the ability to “slave” the flood illumination to the laser: when one is on, so is the other. With one press of the activation switch, both the IR illuminator and laser turn on, providing both a point of aim, and a cone of illumination around it. Propper functioning models will allow the user to both adjust the aiming laser, and the IR illuminator. Some include the ability to adjust the throw of the illuminator as well, for focusing or diffusing the circle. 

Stand-Alone

In some cases, IR-capable laser devices are not equipped with an integrated IR Illuminator, or they could be damaged. Whether as a backup or as supplemental, some modern flashlights and weapon-mounted lights have the ability to be switched from white-light to IR by either rotating the bezel or engaging a toggle. While in most cases this is viewed as an alternative less desirable than an integrated option, there are examples (such as searching a woodline) that challenge the supremacy of integrated units.

Inforce WML White/ ir illuminator

Generally speaking, stand-alone IR illuminators have a wider, softer throw of light: the center of the beam is not as hot, and tends to be much wider with a softer edge. The advantage of this beam pattern comes to life in heavily vegetated environments, as the wider illumination provides more visible context in a shorter amount of time. In addition, it is less likely to reflect as intensely towards the user.

IR illuminator stand alone

Above: A Stand-Alone IR illuminator typically throws a pattern similar to a flashlight: less concentrated. Below: the IR Flood pattern on a PEQ-15/Atpial-C is much smaller, and more focused, but evenly distributes the “light” without hotspots.

IR illuminator integrated

Apart from the downside of having two buttons to press instead of a single laser/illuminator slaved combo, the crisp circle that an integrated unit typically projects helps in team activities, drawing attention to a specific object, person, or area. The more focused beam of an integrated unit is better for searching people at distance, especially as they produce an even amount of illumination across a target, rarely with hotspots, showing contours and helping to identify concealed weapons. With the more focused illumination, it reflects less on the foreground, providing the benefit of target discrimination, with the downside of further encouraging tunnel vision in addition to already looking through night vision goggles.

Getting Set Up

When setting up a firearm for use with NODs, one must be able to at least activate the laser and illuminator at the same time. This can be accomplished by either using an integrated unit such as a PEQ-15, BE Meyers MAWL, Perst-4, ATPIAL-C, L3 NGAL, or similar devices, or by attaching the illuminator in such a way that both can be activated simultaneously. For example, on an AR-15, two pressure switches placed next to each other can be pressed at the same time. Another option is to place an IR capable light, such as an INFORCE WML WHITE/IR, with its slanted tail switch directly in front of a remote pressure switch for a laser of some type. Finally, opposing activating buttons, on the 3- and 9-o'clock sections of a rail allow the user to “pinch” the whole rail for dual activation. There are also niche dedicated solutions like the TAPS or Hot Button from Unity Tactical.

Above: An Atpial-C has the same form factor as a PEQ-15, but without the same output.

Regardless of equipment and setup, significant practice adjusting and activating both must take place. In addition, the user must be able to replace the batteries of all equipment in the dark, as disaster waits for no man.

How to Use: More than Just a Flashlight Invisible to Most

The first rule of any night operations is light discipline: as much as the darkness can be used as an advantage, accidentally turning on your white light will beacon your location to anyone looking in that direction. In hostile environments, this can give away your position faster than carrying a torch. As more and more people, foreign and domestic, are acquiring night vision technology, this applies more and more to the IR spectrum as well.

Easily overlooked at first, the illuminator ranks as one of the most vital components of night activities. Capable of searching and area or designating to allies, as well as dissipating the shadows that remain in even a very-dimly-lit environment.

For example, when looking at a building from the outside, when all the internal lights have been turned off, even under night vision, darkness envelopes the interior rooms. An illuminator, if shined in through a window, even at a distance, allows the user to see into the building. In this case, an IR illuminator accomplishes what solo night vision cannot: truly seeing in otherwise absolute darkness.

IR Illuminator B&T APC9K

Depending on cloud cover, the phase of the moon, and the presence or lack of light pollution from nearby man-made structures, it is possible for an outdoor area to become so dark at night that it limits the usefulness of night vision on its own. Even on nights where the natural lume (ambient light) allows the wearer to see things such as buildings and treelines, they will be unable to see into them without the help of an illuminator. Since the primary advantage of night vision is to use darkness to one's advantage, without an IR illuminator the results are severely limited.

Just as with a laser, activating an IR illuminator must be restricted to when needed, and limited in use so as to avoid giving away one's position. When observed with a night vision camera, a laser will draw a straight line to the one holding it. In similar fashion, an IR illuminator works like a flashlight, which allows enemies to locate you as easily as allows you to locate them.

Combined with the limited field of vision that NVGs allow, this ability to make quick observations of one's environment, and mentally mapping them subconsciously to avoid obstacles like holes in the ground or low furniture is the hallmark of a skilled user. Further, while moving and continually scanning through their night vision, and limiting their use of their laser/illumanator except for when identifying threats, known and suspected, the wearer is more likely to maintain the element of surprise, especially in near-peer scenarios, such as force-on-force training.

MK18 EOtech ir illuminator

Above: The proliferation of taller optics risers can largely be credited to the concern of near-peer threats: hostile forces who are also night vision capable. The taller mount makes it easier to use one's Red Dot or Holographic as a method of aiming, even under NVG's. 

The ability to set the brightness of an IR illuminator, if your unit has that feature, comes into play when changing environments. For example, when entering and exiting a building. The confined environment reflects the illuminator's beam such that it could quickly blind out the wearer. Most modern laser/illuminator combinations have this option, but it is up to the user to be skilled in turning it down before entering a building. When in doubt, stay dimmer. Most stand-alone options do not have this option, but instead cast a more diffused beam to avoid blinding out the user's night vision devices as much as possible.

Less natural light = Lower intensity setting on your IR Illumination. 

IR Iluminator: Conclusion

Even if equipped with night vision goggles, and a laser aiming device, excluding an IR illuminator creates a significant disadvantage. It’s it best not to think of an IR illuminator as one more piece of kit to improve one's capabilities, but vital to the system as a whole. Without it, you can find yourself in places too dark even for night vision, or gain no advantage over anything that creeps in the shadows.

Zenitco Perst-3 IR illuminator

Those in the military are faced with different decisions than civilians who own night vision. Bound by various limitations such as cost and timing, a private citizen may have to take becoming night capable one step at a time, starting with NVGs, and not being able to acquire a light/laser combination, opt for a systematic acquisition over time. A Perst-4 laser, which has no illuminator, can be purchased for around $550-600, leaving plenty of room for an IR-capable weapon mounted light, all for nearly half the price of most integrated models.

Weighing the pros and cons of each approach, an integrated system will most often be the better option. When making a serious commitment to building true-night-capability into your preparedness plan, the cost of entry is high but the payoff is worth it. Whether for hunting, night exploration, or recreation, consider an IR illuminator mission-essential equipment.


Some IR Illuminators to Look At:

– INTEGRATED –

L3Harris ATPIAL-C
Dimensions: 4.6″(L) x 2.8″(W) x 1.6″(H)
Weight
: 7.5 ounces with battery
Battery
: One CR123A
Visible Option
: Yes, Red Laser
MSRP: $1,350
URL: www.tnvc.com

– STAND ALONE –

Inforce WML White/IR – Gen 2
Dimensions
:  4.25″(L) x 2″(W) x 1.25 (H)
Weight
: 3.2 ounces with battery
Battery
: One CR123A
Visible Option
: Yes, 400 Lumen, 3,800 Candela White Light
MSRP
: $140
URL
: inforce-mil.com

Inforce WMLx White/IR – Gen 2
Dimensions
:  5.25″(L) x 2″(W) x 1.25 (H)
Weight
: 4 ounces with battery
Battery
: Two CR123A
Visible Option
: Yes, 700 Lumen, 6,000 Candela White Light
MSRP
: $160
URL
: inforce-mil.com


MORE ON NIGHT VISION, TACTICAL GEAR, AND FIREARMS


Rescue Whistles: Pocket Preps

Whistles have developed a bad rap among survivalists, so we’d like to set the record straight. Some claim that only wimps carry these devices, since a truly prepared individual will be able to self-rescue in any scenario. Frankly, this is an ignorant viewpoint, and it seems most common among those who naïvely believe they’re infallible. In reality, there’s always a slim chance that Murphy’s Law will kick in and you’ll end up in a situation you can’t get yourself out of. If that happens, you should be able to make your whereabouts known to anyone in the area. Although calling in the cavalry should never be your primary plan for survival, it’s a necessary contingency for times when all else fails.

In Issue 37, we covered visual rescue signals such as flares, strobes, reflectors, and smoke. These tools are ideal for signaling over long distances — for example, to a helicopter overhead or a ship on the horizon. They’re also suitable for wide-open spaces. On the other hand, audible signals are most valuable at shorter range, especially when visibility is impaired. You might be stranded in a dense forest, stuck at the bottom of a deep ravine, concealed by darkness, or cloaked in a snowstorm. In any case, it’s a good idea to carry at least one of each type of signaling device when you venture off the beaten path.

Whistles are inexpensive, compact, and weigh next to nothing. They can be tucked into a pocket, attached to a keychain, or integrated into other pieces of gear, only to be used if circumstances get dire. More importantly, they allow you to generate clear and consistent sound that can carry for miles. It sure beats yelling until your vocal cords give out, or attempting to whistle through lips parched by dehydration and exposure.

We collected seven rescue whistles and used a decibel meter to compare the maximum decibel output of each (average of three blasts at 10 feet). Read on and consider whether one of these last-ditch tools deserves a place in your SHTF kit. 


Coghlan’s Six Function Whistle

Dimensions: 3.2 by 1.2 by 0.9 inches
Weight: 1 ounce
Maximum Output: 106 dB
MSRP: $14
URL: www.coghlans.com

rescue whistle Coghlan’s Six Function Whistle

Long-time readers may recall that we’re not typically fans of all-in-one survival tools, and this whistle hasn’t changed our minds. The sound is loud and clear, and the liquid-filled compass can help you get your bearings. There’s also a fold-out lens for fire-starting, and the world’s tiniest signal mirror — as last-resort options, they’re better than nothing. A single LED offers weak, bluish light output, and a thermometer indicates ambient temperature. The latter tool is an afterthought; if you’re trying to survive scorching heat or freezing cold, knowing the exact temperature will be near the bottom of your priority list.

Coghlan’s Six Function Whistle

Pros:

  • The whistle works great.
  • A spare compass is always handy.

Cons:

  • Jack of many trades, master of none, and bulky as a result
  • Flashlight is dim, takes obscure SR1121 batteries, and is easy to accidentally activate.

DIY Paracord Bracelet Whistle

Dimensions: 10 by 1 by 0.3 inches
Weight: 1 ounce
Maximum Output: 95 dB
MSRP: Approxamately $15
URL: N/A

diy paracord rescue whistle

If things go off the rails, you may not have access to your backpack or even the contents of your pockets. So, we made this paracord bracelet using about 15 feet of 550 cord, a button compass, and a polymer buckle that contains a whistle, ferro rod, and ceramic razor blade/striker. We even slipped two individually wrapped water purification tablets under the compass. All of these items were found in a parts bin, but you can buy the components for a few dollars each on Amazon or eBay. Search “paracord bracelet instructions” online for a DIY weaving guide.

diy paracord rescue whistle

Pros:

  • Wearable design makes it virtually impossible to lose
  • Customizable with tools for navigation, fire-starting, water purification, and more

Cons:

  • Ordering and assembling the parts requires more patience than off-the-shelf options
  • Mini whistle requires more pressure to produce clear sound

Nitecore NWE30

Dimensions: 2.6 by 0.9 inches
Weight: 1.9 ounces
Maximum Output: 80 dB
MSRP: $30
URL: www.nitecore.com

Nitecore NWE30 rescue whistle

This keychain-sized device uses a single CR123A lithium battery to produce audible and visual distress signals for up to 72 hours. To activate it, simply twist to loosen the tailcap. A shrill siren blasts from the omnidirectional emitter once every 10 seconds; if it’s dark, a light sensor will also trigger four white LEDs for a 2,000-
lumen flash every 3 seconds. The NWE30 is impact-resistant against 1-meter drops, and IP68 waterproof up to 2 meters of immersion. A battery and key ring clip are included.

Nitecore NWE30

Pros:

  • Produces continuous signals with no effort from the user. Just set it and forget it.
  • Takes a common battery, so you probably already have spares in your pack.

Cons:

  • Didn’t come close to the advertised 120 dB, and was far quieter than other whistles
  • If the battery dies and you don’t have a replacement, it’s useless.

SABRE Personal Alarm with Key Ring

Dimensions: 3.3 by 1 by 0.5 inches
Weight: 0.8 ounces
Maximum Output: 92 dB
MSRP: $10
URL: www.sabrered.com

SABRE Personal Alarm with Key Ring rescue whistle

Of all the whistles in this guide, this has the most dubious premise. Rather than being marketed as a backcountry signaling device, it’s said to “deter an attacker and help you to escape to safety.” SABRE’s product description even uses the cringeworthy line, “Empower yourself with extreme stopping power when you need it most.” Hyperbolic marketing aside, the alarm is activated by pulling it firmly to separate from the attached key ring pin. Replace the pin to silence the alarm. A National Breast Cancer Foundation pink version is also available, indicating this product’s target demographic.

SABRE Personal Alarm with Key Ring

Pros:

  • Pull-pin operation doesn’t require fine motor skills, and works one-handed

Cons:

  • Perpetuates negative perceptions of rescue whistles. If you want to be truly empowered for self-defense, seek training and lethal/less-lethal tools.
  • Requires four tiny, specialized LR41 alkaline batteries

TOPS Knives Survival Whistle

Dimensions: 2.8 by 1.1 by 0.3 inches
Weight: 0.3 ounces
Maximum Output: 110 dB
MSRP: Free with Knife purchase, $15 for 5 pack
URL: www.topsknives.com

TOPS Knives Survival Whistle

Many gear companies include promotional swag with their products — stickers, pens, beer coozies, etc. Whoever thought up the idea of including a free whistle with every TOPS survival knife deserves a raise. It’s something we can actually use, rather than toss in the junk drawer or trash can. This simple polymer whistle feels durable, produces a multi-tonal “train horn”-style sound, and slips into a pocket or knife sheath pouch easily. We were pleased to learn that, just like the company’s knives, these whistles are made in the USA.

TOPS Knives Survival Whistle

Pros:

  • Free with any knife purchase; also available in inexpensive five-packs
  • Made in the USA

Cons:

  • Thin rectangular mouthpiece makes it slightly more difficult to produce clear tones 

WE Knife A-05B

Dimensions: 2.2 by 0.3 inches
Weight: 0.3 ounces
Maximum Output: 104 dB
MSRP: $22
URL: www.weknife.com

WE Knife A-05B rescue whistle

If you’re hiking in the backcountry, functionality is much more important than aesthetics, but for everyday-carry tools, we prefer a sleeker appearance. WE Knife nailed it with this slim whistle, which is machined from a solid piece of 6AL-4V titanium. This material makes it light, durable, and reliable. It also looks great, with intricate grooves, a laser-etched logo, and a contoured nozzle. Three flame-anodized colors are available, including purple (model A), blue-bronze (B), and teal (C).

WE Knife A-05B

Pros:

  • Machined titanium construction is light and very strong
  • Small and stylish enough to remain on your keychain at all times

Cons:

  • Nothing noteworthy — it has one job and does it well.

Weewooday Loud Sound Emergency Whistles for Camping Hiking Hunting Outdoors Sports

Dimensions: 1.8 by 0.3 inches
Weight: 0.1 ounces
Maximum Output: 96 dB
MSRP: $7 for 12 pack
URL: www.amazon.com

Weewooday Loud Sound Emergency Whistles for Camping Hiking Hunting Outdoors Sports

Yet again, we dove into Amazon’s virtual bargain bin to see what low-budget offerings we could uncover. You can make wee-woo noises all day with this aluminum whistle from Weewooday, available in 12-packs straight from China. Black or red anodized finishes are available. Each whistle consists of a thin aluminum tube, a plastic sound insert, and a key ring. The product description says it’s useful for a wide range of purposes, including “contact partner and confirm location,” “anti-harassment,” and “playing with dogs.”

Weewooday Loud Sound Emergency Whistles for Camping Hiking Hunting Outdoors Sports

Pros:

  • Low bulk price means you can hand these out like candy on Halloween

Cons:

  • Shoddy machining and assembly left us with some whistles that work fine, and others that barely function at all
  • Requires significant pressure to produce a clear tone

MORE POCKET PREPS


Steganography: More than Meets the Eye

The digital spaces that society has become virtually dependent upon over the last 10 to 15 years are increasingly becoming nonpermissive. Big Tech censorship, intelligence organizations, and law-enforcement agencies continue to push against the First Amendment rights of Americans in ways that were previously only encountered by those living in overtly authoritarian regimes such as Iran, China, or Russia. While covert communications are often depicted as suspicious in film and politics, Steganography is a method to keep private communications secret in the digital age. 

It’s not surprising then, that many people have been turning to secure communications (COMSEC) tools such as Signal or Keybase, both of which provide end-to-end encryption. COMSEC is essential, protecting the contents of your communications, whether you’re chatting with family members on Signal or accessing your online banking via HTTPS. Sometimes, COMSEC isn’t enough to protect your privacy or security, however.


Glossary 

COMSEC: Communications Security

COVCOM: Covert Communications

Cover File: An image or video containing a hidden file within it

Message File: The secret message we want to hide

OPSEC: Operational Security

Dead Drop: A physical or digital location where files or items can be left by one party and retrieved by another without the two directly interacting. See Issue 37 for examples of physical dead drops.

Tradecraft: The application of tools, tactics, and procedures by intelligence or cybersecurity professionals


The Problems with Cryptography

When operating in a nonpermissive space, traditional cryptographic systems like PGP or modern systems like Signal provide two key disadvantages:

1. They do nothing to hide the fact that a communication has taken place.

2. The cryptography itself provides non-repudiation of the message by mathematically tying it to the owner of a signer’s private key.

Taken together, this means an adversary with means will know who is talking to whom and, should the keys be recovered or the messages decrypted via cryptanalysis, you won’t be able to make the case that you weren’t the one doing the communicating.

stock image steganography

Introducing Covert Communications

Intelligence officers and their agents have had this problem for centuries, and so over that period of time many methods to hide the fact that a communication even took place. Rather than COMSEC, these techniques make up COVCOM, or Covert Communications. In the analog world, COVCOM techniques have included disappearing ink and microdots. In the digital world, one of the more common techniques is steganography.

Digital steganography is the process of encrypting a file and then embedding it into another in order to hide its existence. Typically, the encapsulate is an image or video file, as data can be encoded into pixels without affecting the appearance of the image to the human eye.

Getting Started with Steganography

There are many free software options for steganography, with options available for all major operating systems. One very popular option is called OpenStego. Written in Java, it can run on Windows, Mac, Linux, or any other OS with support for Java. This makes it an excellent choice for adoption by a MAG or other group.

OpenStego can be downloaded from https://www.openstego.com and the Java Runtime Environment (JRE) can be downloaded from https://www.java.com, if necessary.

Once you’ve got Java and have downloaded the OpenStego zip file, unzip it and look for the appropriate starter. On Windows, you’ll want the “openstego.bat” file:

Running the .bat file should start the application:

steganography openstego

We see here that we need four things:

  • Message file is the secret text or other file that we’re trying to hide.
  • Cover file is the file we want to embed our message into, and what the world will see.
  • Output Stego File is the name of the file that we want to create, which will be the combination of our message and the cover file.
  • Encryption algorithm selection and password. This is something that’ll have to be known to all the intended recipients of the file and is used to protect the contents of the message even if its existence becomes known to an adversary.

Walking Through an Example

Let’s say that Big Tech has shut down a group used to organize an event or group of people, but the group still wants to organize. We may have an invitation such as this:

steganography openstego text

(This, of course, being a verse from the Irish rebel song “Rising of the Moon.”) We would save this file and then find some image file to hide it in. After running the program, we’d have two images. Side by side, they’d be indistinguishable:

steganography openstego two images

We would then post this image someplace:

steganography openstego doggo message

Later, another group member comes by, sees the message, and downloads the image:

steganography openstego doggo message

Using OpenStego, the member inputs the shared secret password and is able to recover the message:

steganography openstego

Notes on Tradecraft

Tradecraft is sum of the tools, techniques, and procedures (TTPs) used by intelligence or cybersecurity professionals. Adoption and proper application of these TTPs is key to successfully operating in the increasingly nonpermissive digital space and to making use of steganography worth it.

First, the dead drop isn’t really dead. (See sidebar for a definition and refer to Issue 37 for a detailed look at real-world dead drop applications.) Websites like 4chan or 7chan, for instance, allow anonymous users to post image files, making excellent digital dead drops. The reasonably high volume of traffic, coupled with the anonymous nature of these sites, help to confuse any links between visitors. Keep in mind, however, that some of these sites have controversial profiles that may make them targets of surveillance. Throwaway profiles and free image hosting sites like Imgur.com are also good options.

cat in bed steganography cryptology

Above: Steganography can be applied to any photo, but it’s often advantageous to use commonly shared memes or generic images that can be hidden in plain sight. Be sure the cover file you use fits the theme of the site you post it on.

Secondly, the digital-analog of a surveillance detection run would be leveraging Tor or a VPN before accessing any site that’ll be used as a digital dead drop. For a further layer of operational security (OPSEC), consider doing so away from your home or place of work.

Thirdly, when choosing cover files, you want to find files that are big enough that when your message is embedded, the overall size of the output file won’t be cause for obvious note. Additionally, choose cover files that are a good fit for the site you plan to dead drop them on. Common memes are always a good bet, but “adult” images on image sharing boards dedicated to the topic can be a fit, depending on your comfort level and risk profile.

Fourthly, remember to sanitize your clear text data when not using it. On Linux systems, for instance, you can securely delete files with the shred command (available as gshred on Macs). Windows systems will require a third-party software program to accomplish this. If you’re using a “live” operating system image like Tails when conducting the work, then all information is ephemeral anyway.

Last, but not least, keep in mind that there are some concerns related to the fact that everyone has to be aware of the same shared secret for this scheme to work. Failure to consider OPSEC when distributing the key to your group may provide an opportunity for a well-positioned and resourced adversary to gain information about the structure of the group. This infiltration could completely undermine your ability to set up covert communications channels. Choosing long pass phrases that are easy to remember but hard to guess will also decrease the likelihood of you or one of your peers needing to write it down, and the likelihood of an adversary being able to guess it.

steganography embarrassed woman Above: Hiding a message inside a raunchy “adult” photo may cause casual onlookers to click away in disgust, or deter them from visiting the type of sites that host that content in the first place.

Conclusion

The movement toward private and secure communications that began with Edward Snowden’s revelations of illegal domestic spying by U.S. intelligence has picked up steam since the general chaos that was 2020. While secure communications should be a cornerstone of everyone’s communications plan, the increasingly nonpermissive environment created by Big Tech and government censorship means that covert communications will become ever more important. Thanks to a proliferation of free software tools, anyone with common sense and a little basic tradecraft can integrate COVCOM into a well-rounded digital communications plan, whether for their family, their emergency preparedness group, or even just for fun. 

[Illustration by Cassandra Dale.]


More on Digital Security


The Tactical and Survival Application of Body Armor

On its face, the concept of body armor seems rather self-explanatory: better to have it and not need it, than the opposite. Having said that, body armor is a specific tool designed for a specific purpose and, more importantly, a certain environment. Let’s take a look at the concept of Body Armor in the 21st century, and hone in on various uses and applications, as well as relevancy against the current threats an prepared citizen might face. 

Modern Body Armor Theory

When we think of modern body armor, two things typically come to mind: the plate carriers worn by those in the military and the vests worn by police officers, political officials, and VIPs in both film and the real world. Although most people consciously recognize the difference between the real world and the virtual, it cannot be over-emphasized the importance of drawing a hard line between how body armor is represented in video games and movies, and the very real, very dangerous world. Both are bound to various constraints, but it would be catastrophic to confuse in-game statistics with NIJ level ratings of body armor.

Modern Body armor was created as a reaction to the dominant violent threats of the day: bullets and blades. The colloquial difference between hard and soft body armor is often simplified down to the ability of plates to stop rifle rounds which typically move at such velocity to pass straight through flexible kevlar vests. However, in the decades since these types of equipment arrived in military and law enforcement hands, two dynamics have changed: firearms and munition types, and a rise in civilian ownership of both guns and body armor.

S&S Plateframe - Redux full

Above: The S&S Precision PlateFrame Redux reprents a high end minimalist plate carrier

Foundational to the use of body armor is understanding how bullets, blades, and blunt force objects interact with the human body. It is said “the body is made up of timers and switches,” where if one organ is destroyed the person dies immediately, but if another is lost, there could still be seconds, minutes, hours, or days before death occurs. Losing blood or preventing oxygen from reaching the brain acts as a timer, but the severing of the nervous system can work as a switch. The lethality of a knife or gunshot wound is determined by the amount of time it takes to make the victim functionally unresponsive, and this guides the application of body armor.

hoplite plate carrier esapi

When it comes to bodily organs, one could say that the intestines are almost as vital as the heart and lungs, especially in regard to day-to-day living. Digestion, Respiration, and the Circulatory system all work together, but the sudden disabling of each system impacts the body at different rates. Which is why properly worn body armor covers the heart and lungs, as well as some of the spine. The purpose of Body Armor is to increase the likelihood that an injured person will live long enough to reach a hospital in the event they suffer wounds typical to modern combat. Plate carriers and soft armor protect the organs that, if harmed, would result in death before surgical-level medical care could take place.

Takeaways:

  • Body Armor is for a world with Hospitals.
  • Properly-fit, and properly-worn Body Armor protects the heart and lungs: the most vital organs in the short term.

Modern Body Armor Dynamics

Beyond theory, modern body armor introduces unique dynamics into any survival scenario: logistically, physically, and socially. Each of these dynamics applies to both a group and to an individual, sometimes differently.

 Logistics: Whether as an individual or as a group, one must deal with how body armor is acquired, transported, and stored. Militaries may be able to source gear for a whole unit and are bound by internal standards for protection levels and storage requirements. But the individual must face the market without the resources of an agency or organization to do the research or purchasing for them. This means that they may not have the ability to purchase multiple levels or types of body armor from the beginning, and they must rely on external resources to inform their decision. The individual will also be solely responsible for care of the armor. For soft armor, improper long-term storage can create folds, ridges or pockets that create gaps between the outer carrier and the Kevlar layers inside. Likewise, hanging a vest for long period can cause the Kevlar panels to “sag” inside the vest itself, again creating coverage gaps. For plates, the primary concern is impact. Bumping, dropping or hitting hard plates can creates dents or micro-cracks that reduce the plate’s ability to fully stop incoming fire.

 Physical: Body armor, be it hard plates or soft armor, changes how a person moves and carries themselves. Beyond the weight alone, it can make riding in a vehicle difficult if not impossible, and the physical limitations of the wearer (such as those based on injuries, illnesses or physical fitness level) are only amplified under the increased burden. Without consistent practice, carrying the weight debilitates some on even an easy day, and quickly turns a bad situation worse. For those not able to perform in the gear, body armor quickly becomes a net negative.

Regardless if you are operating as an individual or as part of a group, deliberate training and practice with body armor is necessary. Regardless of how much training an individual completes in body armor, it will always impact their ability to cover terrain, with increasing effects over time.

body armor s&s precision plateframe Modular

Above: A fully loaded plate carrier will provide the best protection, but will almost certainly draw attention.

 Social: As much as we could wax poetic about the Second Amendment in principle, it simply is not common in most Western countries to see people walking around in body armor of any sort, with the closest exception being city police. In some social situations, gear of this sort is viewed as a symbol of authority and, in others, it stands out as a target. Whether out of suspicion or admiration, body armor is most often seen and treated as a sign of intent: one does not wear it simply for fashion, training classes and range days notwithstanding.

 Takeaways:

  • The acquisition, storage, and implementation of body armor requires proactive attention.
  • Unlike a jacket, it is equipment that requires familiarization and practice to wear properly.
  • Body Armor will draw attention, in useful or harmful ways depending on the circumstances.

 Modern Body Armor Situations

The phrase “mission dictates gear” works well in clearly defined military circumstances, such as night raids or long-distance reconnaissance movements, but when it comes to something as ambiguous as survival we are faced with a much more abstract problem. In order to properly apply body armor in a survival situation, we must define the mission.

For all application considerations, it will be assumed that the wearer is capable and practiced in wearing body armor.

 Group vs Individual

A lone individual will have to assess whether it is better for their situation to attempt to socially blend in if possible, or stand out due to the greater likelihood of receiving small arms fire. In the event that a gunfight is inevitable, opting for armor will increase their chances of survival, but such situations are extremely rare.

In most families, there is at least one person who cannot effectively wear body armor, be they children, the elderly, or those with physical conditions. This adds a dynamic unique to civilian survivors and magnifies the complications a sole individual would face, because the family may choose to acquire more gear and thus accrue more cost. For those who can wear body armor, not all will experience the same comfort and protection level based on body type and fitness level.

One step higher, at the level of a neighborhood, the greatest level of complication manifests across all dynamics. It is all but guaranteed that the diversity of skill and equipment across larger groups will vary so greatly and, depending on personalities, could produce internal strife. Most people in a neighborhood do not have their own body armor and, of those who do, even fewer are capable with it.

Effectively a collection of individuals and families who have, in all likelihood, not organized or trained with each other before an emergency scenario, it is unreasonable to assume common equipment and skill level. But if unified by community esirit de corps, or sheer self-preservation, the abilities of some can greatly benefit the whole. A community that coordinates an armed and armored security force will eventually be faced with how others react to the group's appearance. Those leary of gangs, militias, or the actions of the State may view impromptu security with suspicion. For example, look at how the “guards” of Seattle's CHAZ/CHOP were perceived by the surrounding neighborhoods, city officials, and the nation.

 Short Term versus Long Term

A situation will determine if, how, and which type of body armor should be used. A traditional divide between military or government activities, and those of individual citizens is shifting, if not dissolving in the 21st century. With situations such as the American riots of 2020, and the takeover of Kabul by the Taliban in 2021, survival in the short term can mean reaching a safe house, escaping a city, or protecting a neighborhood until relative peace returns. Even in these scenarios, the physical requirements of body armor demand them to be a proactive measure, not merely a reaction.

The distinction between short-term and long-term use of body armor is determined by the level of sustainment available. By consulting Maslow's Hierarchy of Needs, we note that food, water, warmth, and rest are more important than the security that body armor brings in a long-term crisis. It is here that we begin to find a holistic application of such equipment. In regard to survival, a plate carrier is the means to live through a short-term crisis. But only if there is access to food and shelter will it have long-term viability at defending such resources.

The terms proactive and reactive, in regard to body armor, do not necessarily translate into offensive and defensive.

 Takeaways

  • Proactive vs. Reactive: It is absolutely vital to first consider the need, and acquire body armor to meet that goal, instead of first buying gear and later try to find a use for it.
  • The application differs for an individual, family, or community
  • Not everyone's skill, comfort, and equipment levels will be equal in a group or family setting.
  • Body Armor is a tool in the short term

 Types Determined by Threat

The National Institute of Justice (NIJ) categorizes different levels or standards of body armor according to what types of threats they can stop. A manufacturer may state that their armor meets or exceeds a specific level, but not all have been NIJ certified. The history behind these levels is best understood as being developed to address specific threats, most often directed towards different international conflicts. The development of technology and material has been gently guided by the needs of the NIJ, not necessarily private citizens, in order to produce the current categories.

armor express soft armor

Above: Soft armor is easier to wear underneath clothing, but provides less protection.

While the NIJ rating for bullet-stopping capabilities begins at IIA and currently goes as high as IV, each of the standards is specified by the type and velocity of the projectile. It can be safely generalized that, at the time of writing, soft armor stops most handgun rounds between 9mm and .44 magnum, so long as the armor achieves at least a Level IIA rating.

The two NIJ ratings for hard plates are:

-Level III which are rated to stop a 7.62 mm projectile traveling at 2780 ft/s ± 30 ft/s (non-armor-piercing .308)

-Level IV which are rated to stop .30 caliber at 2880 ft/s ± 30 ft/s  (military-grade armor-piercing projectiles in .30-06)

-Level III plates will stop standard 7.62x39mm AK rounds (except for the mild steel core variation) but will not stop M855 “green tip” 5.56mm rounds, which are prolific in the US. The matter is only further complicated by the great variety of projectile types and barrel lengths found in the United States. As a result, various manufacturers have begun making what is commonly referred to as “special threat plates,” or “Level III+” plates. These are boutique armor plates that fall short of Level IV, but typically cover the “light armor piercing” gray space where 5.56mm green tip and 7.62x39mm steel core live. It should be noted that Level III+ and Special Threat Rated are not an official NIJ ratings, and buyers should review manufacturers specs carefully. Don’t be afraid to ask a company about their testing/rating process. The good ones typically use an independent research laboratory to certify their plates against specific threats, whether or not they are within the specific NIJ rating system.

 Takeaways:

  • Body Armor is categorized into levels according to what NIJ standards they meet.
  • Read the fine print: some are NIJ certified, others use non-standard certification methods.
  • Soft Armor can stop pistol rounds, but Hard Armor is required to stop rifle rounds.

 Finally, Application

Theory, dynamics, and situational considerations come together to provide the framework for both if and how body armor would be implemented in known and suspected events.

Three recent examples provide the context for what such a survival situation might look like: the worldwide 2020 riots, the prolonged civil unrest in cities like Portland, and the violent upheaval of nation-states like Venezuela and, more recently, Afghanistan.

 Riot Season

From theory, we recognize that body armor belongs in a world with hospitals. During the Minneapolis riots of 2020, individual citizens volunteered to protect their communities from those who took advantage of the chaos and outrage. In some cases, this drew attention to their neighborhoods but, in the end, those who stood up for themselves were mostly left untouched. In the event that “things went wrong” the hospitals were still up and running, and capable of treating injuries from burns to gunshot wounds. As buildings burned, some chose to leave the city, opting to live with families until the unrest died down.

body armor ferro slickster worn

Above: The Ferro Concepts Slickster can quickly be scaled up and down to the needs of the moment. 

From street demonstrations to the rooftops of local businesses, AR-15's, shotguns, and handguns became a normal sight in certain areas. Protestors could be seen wearing body armor and carrying AR-style firearms through downtown Minneapolis. In events like evacuations, personal armor went a long way to add security to an otherwise chaotic environment. In the short term, body armor was a means to an end.

body armor under all skill no luck flannel

Above: If trying to conceal a minimalist plate carrier under a full sized shirt, opt for something with a pattern. It will help disguise the body armor from unsuspecting eyes, but those who know what to look for will still be able to spot it. Shirt: Ntchwaidumela by All Skill No Luck.

In terms of body armor, both soft and hard options have something to offer. To this day, handguns are the most used firearm in violent crime, especially in deeply urban environments. Properly rated soft armor, being easier to conceal, and requiring less familiarization, could be one of the few examples where the phrase “better than nothing” is not the pitch of a snake oil salesman.

 Prolonged Unrest

But in some parts of the city and the country, the unrest became a prolonged reality with no clear end in sight. This is the ideal place for Body Armor to show its value, as the medical institutions continued to function, despite the unrest, treating all who entered their doors with medical attention. As factions continued to clash in the street, non-participants in the area were caught in the crossfire, often to tragic ends.

body armor ferro slickster worn under triple aught design ranger LT

Above: Even under a hoodie, the edges of a plate carrier will still stand out. 

It would be a stretch to argue that body armor should be worn daily to and from the grocery store. Rather, the ability for a family or individual to use it in the event a local street fight (or gunfight) takes place in their front yard or brings comfort in the day-to-day, as well. Prolonged unrest resides in the uncertainty between the likelihood of order restoring, and the possibility of violent revolution or societal breakdown. Many of the greatest dangers in these situations are psychological and mental, as those caught in the crossfire are faced with a hard decision: hold on to hope that the violence will end soon, or leave the area, possibly indefinitely.

Prolonged unrest is an ideal example of how body armor can benefit the private citizen, as these events are often defined by the crippling of police response and a considerable rise in local crime. Body armor can bring a sense of comfort, and a capability, albeit small, and improves one's position whether they choose to remain in place or leave the area.

 Brave New World

Since even the concept of a total-collapse scenario quickly devolves into near-infinite possibilities, it should never be the starting point at which one considers body armor. This means that one should not make decisions on if or what type of body armor they invest in with the apocalypse in mind. This protects against panic buying and facilitates a proactive, productive approach to self-defense and survival.

 In Conclusion

Body Armor is, first and foremost, a tool to be used to aid the accomplishment of certain objectives. The ambiguity of survival as an objective must be refined by the parameters of your individual situation: urban vs. rural, bug-in vs. bug-out, solo vs family-, or community-level planning, and so forth. Not all armor is created equal, and it is far from magic. Instead, body armor is best seen as a supporting option, not a solution in and of itself. That being the case, the support it brings extends beyond the physical, as it can add a small sense of security to an otherwise chaotic situation.


Plate Carriers Featured

S&S Precision PlateFrame-Redux
Colors:
 Black, Multicam, Tan, Toadvine
MSRP: $372
URLsandsprecision.com

S&S Precision PlateFrame-Modular
Colors: Black, Multicam, Tan, Toadvine
MSRP (Base): $1,142 (as Bundle at time of writing with additional 3x AR-15 Mag shingle)
URLsandsprecision.com

Ferro Concepts Slickster
Colors
: Black, Coyote Brown, Ranger Green, Wolf Grey, Multicam, Multicam Black
MSRP: $16o
URL: www.ferroconcepts.com


MORE ON NIGHT VISION, TACTICAL GEAR, AND FIREARMS


Tactical Shorts Buyer’s Guide – Summer 2021

Those of us who carry concealed firearms often adhere to the “dress around the gun” philosophy. In other words, we wear clothing that makes it easy to conceal the firearm, rather than excessively tight, form-fitting apparel that might make the weapon more visible. However, it's possible to take this concept too far — you'll appear out-of-place wearing baggy jeans and an oversized sweatshirt in the middle of summer. For this reason, we're taking a look at a few pairs of lightweight, durable tactical shorts that are designed for concealed carry, range trips, and everyday use during the warmer months.

Tactical Shorts Buyer's Guide

So, what are tactical shorts, anyway? They might also be called range shorts or cargo shorts, although not all have traditional cargo pockets.

Whatever you call them, these shorts are designed with guns, range equipment, and every-day carry gear (i.e. knives, flashlights, medical kits) in mind. They're lightweight enough to remain breathable after hours of strenuous activity in the sun, but also durable enough to hold up to hard use. They have an array of pockets for common items, and some may be tailored to rifle or pistol mags. Flexibility is also a priority, since the wearer may need to climb or crawl around obstacles while running drills.

I live in Arizona, and shooting during the summer months usually means dealing with triple-digit heat, even after sunset. It's a top priority to find clothes that won't slow me down or leave me dripping sweat after a few minutes outside. Much like insulating apparel in cold climates, breathable clothing in the desert is worth its weight in gold.

With this in mind, I picked up a few pairs of tactical shorts from companies that specialize in this market — 5.11 Tactical, Vertx, and Viktos. Read on for my thoughts on each.

5.11 Tactical Aramis 10-inch Shorts

Sizes: 28 to 44
Colors: Khaki (pictured), Black, Ranger Green, Battle Brown, Grey Blue
MSRP: $45
URL: 511Tactical.com

Notes:
The Aramis shorts are constructed from 98% cotton with the remainder being stretchy Elastane. These materials keep them light and breathable; however, cotton soaks up moisture like a sponge, so be aware of this if the forecast predicts any rainfall. Reinforced belt loops and a V-shaped lower-back webbing loop will keep your favorite gun belt where it belongs.

A total of seven pockets are integrated into the design, including two back yoke pockets at the four-o-clock and eight-o-clock positions. These are well-suited to AR mags, notepads, cell phones, and the like. A running gusset in the crotch improves flexibility and durability, and N6 knife reinforcements at the corners of the front pockets are designed to alleviate wear in these key areas.

I appreciate that these shorts are a little sleeker than most other 5.11 Tactical shorts. They omit side cargo pockets, zipper or flap closures, and other duty-oriented features, and the end result is a design that won't turn any heads on or off the range.

Vertx Cutback 11-inch Shorts

Sizes: 30 to 44
Colors: Shock Cord (pictured), Exhaust
MSRP: $65
URL: Vertx.com

Notes:
Vertx calls this material VaporCore, and it's a blend of 48% cotton, 25% 37.5 polyester, and 27% T400 polyester. The combination results in fabric that's soft and light with excellent moisture-wicking capabilities. Plentiful double-stitched seams, bar tacks, and rivets ensure long-term durability.

These shorts feature eight pockets, including deep, mesh-lined front pockets that help considerably with airflow around the legs. Two back yoke pockets and one right thigh pocket offer storage for smartphones, rifle mags, and other large objects. There's also a watch/coin pocket that contains a pass-through slit for a radio headset or earbuds.

I've always liked the way Vertx integrates helpful hidden features that the average wearer might never notice. For example, there are several two-inch-long mini stash pockets inside the fly and waistband; they're the perfect size for folded emergency cash, hidden keys, or lockpicks. The front pockets contain anchor loops that can be used to retain the sheath of a concealed fixed-blade knife, or the holster of a pocket-sized handgun. Despite these features, the Cutback shorts are comfortable and look discreet enough for everyday wear.

Viktos Operatus 10-inch Shorts

Sizes: 28 to 44
Colors: Coyote (pictured), Nightfjall, Greyman Camo, Ranger Camo
MSRP: $50
URL: Viktos.com

Notes:
Viktos says the Operatus tactical shorts were “inspired by the Rhodesian bush wars' combat shorts.” While I can see some resemblance in the cargo pocket design, I'm glad to see it paired with a more conservative 10-inch inseam — the 1970s cutoff design left little to the imagination. These shorts are made of a modern 88% polyester and 12% spandex blend that's quick-drying and flexible.

Pocket configuration is unconventional, with two front pockets, two cargo pockets, a change pocket, a left front zippered EDC pocket, and a right rear pocket (probably not ideal if you're a lefty). These are lined with mesh for drainage and breathability.

Another unconventional feature is the use of a metal G-hook instead of a button. However, the more we thought about this, the more it makes perfect sense. It's strong, mimics the closure of many range belts, and lies flat against your abdomen (or IWB holster, if you're a fan of appendix carry). Three closure loops are sewn in, so you can tighten the fit by moving the G-hook to different positions. With the asymmetric pockets and prominent Viktos lettering on the thigh, these are a little flashier than other shorts, but they're very comfortable and functional on the range.

Closing Thoughts

This is only a small sample of the tactical shorts segment — there are plenty of other pairs to consider, even from the brands seen in this article. But these three styles are a great place to start, whether you need a pair that's low-profile for every-day carry or a pair that you'll only be wearing to the range on weekends. With a little forethought, it's always possible to “dress around the gun” while remaining comfortable and relatively discreet.


Doxing: What If Your Privacy is Compromised Online?

George Orwell was right — invasion of our private lives is becoming a greater threat with each passing decade. Even if it’s not being used by Big Brother’s totalitarian regime, our sensitive information is increasingly accessible to unscrupulous corporations, cybercriminals, and anonymous strangers who know where to look. According to Wikipedia, “Doxing or doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet.” It’s an increasingly common act of intimidation and an exposure meant to enable complete strangers to actively engage in harming you.

In 2012, an interactive map was posted online showing the names and addresses of New York handgun permit holders in Westchester and Rockland counties. Was this freedom of the press or potentially endangering people? Whether those gun owners like it or not, their info is now exposed, even if the post is deleted. More recently, the web site for the California Department of Justice leaked personal information — including full names, home addresses, dates of birth, and whether the individual works in law enforcement — for thousands of the state's gun owners. The President of the California Rifle and Pistol Association called this a “vindictive” act by “sore loser bureaucrats,” implying that it may have been a response to the recent Supreme Court ruling that forced the California DOJ to remove its “good cause” requirement for concealed carry permit applications.

The list of similar situations goes on. From the dentist who shot Cecil the Lion, the Ashley Madison data breach, or celebrities Tweeting out the home addresses of people they don’t like, one thing is for certain — the more information you have online, the greater the risk of it being used against you. If you were part of a group that’s becoming increasingly stigmatized — and you may already be without knowing it — how can you protect yourself from the prying eyes of the outrage culture zealots who mean to harm you?

The Doxing Scenario

Situation Type: You’re being doxed

Your Crew: You, your wife, and your children

Location: Your hometown

Season: Autumn

Weather: Normal

The Setup

Imagine you attended a city council meeting to express your concern about the side effects of a growing homeless population in your area. You plan to voice concern for your family’s safety after witnessing an increase in drug sales, sexual assaults, and public defecation. This meeting is packed with people on both sides of the issue. Some activists who attended this meeting did so in an effort to retaliate against residents who were speaking out against the homeless problem. While attending, they photographed attendees, got names and addresses off the sign-in list, and used public social media posts and press photos to identify the key participants in the meeting.

Also, an online petition appearing to solicit residents to push for legislation that imposes tougher penalties against homelessness had recently been started. By the time the petition had reached several thousand signatures, including your own, it was determined that everyone who’d signed up had been catfished. The fake petition was actually started by a self-proclaimed social justice blog that published all the names, addresses, phone numbers, and personal info for the world to see. The blogger didn’t openly condone violence, but encouraged his followers to go “have a conversation” with everyone on the list to teach them the error of their ways.

what if internet doxing cover

Illustrations by Joe Oesterle

The Complication

Now hostile notes are being left in your mailbox, harassing calls and texts from blocked numbers are coming in, and you genuinely fear that the reprisals will become physical. How can you protect yourself against open-source information collection, harden your digital footprint, and mitigate risk without abandoning technology altogether? We asked tactical trainer Katheryn Basso and financial industry expert Dennis Santiago to weigh in with their recommendations on how to stay safe when revenge-driven people are targeting you based on what they can find on the internet.

Tactical Trainer Katheryn Basso’s Approach

I used to take a lackadaisical approach to my internet and phone habits. I kept my location services on 24/7, connected Google to everything, and handed out my personal data and contact information to any account that needed it. After all, I had nothing to hide. In fact, I figured if something were to happen to me, maybe it would help the police locate me. Unfortunately, in today’s divisive climate where your beliefs, hobbies, or actions may offend the wrong person, limiting your internet footprint is vital to privacy and safety. In today's environment, Internet Doxing can quickly lead to real-world dangers. 

As memberships and access to even the most mundane interests become digital, the threat of your information falling into the wrong hands increases. Your hacker could be a 13-year-old boy just testing his latest Kali Linux skills, a highly sophisticated cybercriminal who makes a living off blackmail and extortion, or a violent person looking to harm you. This anonymity makes it difficult to identify and prosecute the perpetrator — you may never know who is committing a crime against you, or why they’re doing it. 

You may be surprised how much of your information is already available to the public, just waiting to be used against you in some hateful campaign. However, it’s not too late. With some dedicated work, you can increase your privacy and lessen doxing damage before it occurs. 

Preparation

Let’s first call out the biggest issue: I gave my true name and real address to an unverified online petition. Let’s say I wasn’t thinking straight and slipped up. That’s fair; it happens. In this particular situation, I assumed the petition going around was for government purposes: gather enough signatures of actual residents to push for legislation change. Most of these online petitions require personal information (full name and address) they ensure will remain “safe” within their site. In order to properly arm myself from doxing, I need to change my thinking. I need to assume a data breach will occur at some point with every online site. 

I’m sure you think that’s extreme, but I was in the military during the Office of Personnel Management breach. If 4.2-
million current, former, and prospective federal employees’ background information can be stolen, how secure do you think your information is at the local coffee shop? Is that free coffee for joining their mailing list really worth it? 

One free and easy way to see if your email address and/or phone number were part of a breach is to check them at HaveIBeenPwned.com.

Unfortunately, in today’s age of connectedness, digital marketing, and data analytics, most businesses and sites require a name, email address, and/or phone number to access member-only benefits. So, how can I live in today’s age of loyalty points, travel rewards, and grocery shopping discounts while also remaining as safe and secure as possible? I should assume I’ll be exposed, then take a few general security steps to mitigate the breach. 

1. Remove my information from data aggregates: Third-party data mining companies have been collecting my publicly accessible information since I got my driver’s license. This includes addresses, phone numbers, email addresses, known associates, etc. The good news is I can request they remove my personal data from these sites. This is a long and tedious task, but I know it’s worth it to gain control over my security. Check out Michael Bazzell’s IntelTechniques.com for a helpful list of data-removal options. 

2. Opt for a credit freeze: Putting a freeze on your credit prevents identity thieves from attempting to open new accounts (i.e. credit cards and loans) in your name. A credit freeze doesn’t prevent you from using your current accounts. You can unfreeze your credit at any time, and it’s absolutely free. Freeze your credit at each of the three main credit bureaus.

3. Use various junk email addresses: I use multiple email addresses for my junk email — those accounts that require an email address for access. I rarely check these accounts since I know they’ll be sold to third-party companies for marketing. Since these accounts are usually part of breaches and aren’t tied to important accounts, any follow-on phishing attempts are easily spotted. 

4. Create strong passwords: Most of these breaches include email and passwords. I use a secure password manager that creates strong passwords for my accounts. If you asked me what my password was for any given account, I wouldn’t be able to tell you without going into my password manager. I highly recommend you use unique passwords for each account and update them every 60 to 90 days. 

5. Use a VPN: A Virtual Private Network secures your connection by creating an encrypted tunnel between your device and the website you’re visiting. This not only prevents hackers from intercepting your data, but it also masks your Internet Protocol (IP) address so your activities cannot be traced back to you. Compare VPNs before you purchase; they are not all created equal.

6. Use VOIP phone numbers: My phone is constantly talking to cellular base stations that could be used to triangulate my location. While these services are restricted to authorized personnel — like law enforcement and bounty hunters — they aren’t 100-percent safe from the human factor (disgruntled employees, assistants wanting to make extra cash, or hackers). Google numbers or paid Voice-Over-Internet-Protocol numbers provide an extra layer of security between yourself and nefarious individuals. I hand out a VOIP number when required to provide full contact information. And if one of these numbers gets compromised, I can easily switch VOIP numbers without the hassle of changing my true number. 

7. Encourage security habits with family and friends: Those closest to you tend to be your weakest link when it comes to securing your privacy. Again, most people don’t think about their own physical security when they’re safely behind their phone or computer screens. While social media has provided us a way to connect, it’s also a treasure trove of open-source information that can lead people to your location. How much you restrict on social media is a personal choice — I know many people who refuse to have accounts. However, you can’t always control your friends and family. I tend to have a 24- to 72-hour rule with social media; I upload pictures one to three days after an event. My friends or family, however, may upload a picture of us immediately. There’s not much you can do except avoid pictures or ask them politely to wait or remove the image. Encouraging your friends and family to follow your privacy habits may not always be easy, but it’s worth the conversation. 

8. Encourage security habits with your neighbors: While the same privacy-minded habits can and should be pushed with neighbors, physical security habits are just as important. After a few scary incidents here, an active neighborhood watch, security cameras and trail cams have proliferated through the community. Deterrence is important to maintain physical security, especially if one of our addresses is posted online for nefarious purposes. 

Crisis

Now that I’ve taken certain privacy precautions, let’s return to the scenario. My name and address have been released online. All that work was easily compromised by one single mistake, yet my preparation has prevented a bigger disaster. Yes, they know my address, but my emails, accounts, credit, and passwords should still be safe. So, what are the next steps?

internet doxing text message rage

1) Get the police involved. Take a screenshot and report this to the police. Most states have some form of anti-harassment/anti-stalking laws that cover doxing situations. Do note, even if they’re able to take the site down, it doesn’t prevent the wrong people from obtaining my contact information. It’s out there now; it can be continually republished as long as there’s still a will to create harm. Thus, I’d request extra police presence; ask them to drive by my house as part of their rounds. Again, deterrence is important. Due to limited staffing, this may or may not be possible, but I can ask. Since I have security cameras, any physical trespassing will be caught on tape. I can provide this to the police as well to assist in their investigation. 

2) Change my number. Luckily, I provided a VOIP number that can easily be changed. If, for some reason, my real number was leaked, I’d cancel that plan, get another phone, and start using a different VOIP number. Get clean first. 

3) Become physically secure. Depending on the level of threats, I’d have to decide whether to stay at my residence, leave my house temporarily, or permanently move. This is a huge decision based solely on the danger and my willingness to accept risk. Often with these doxing situations, threats subside once the perpetrators move on to their next cause. 

I, like most people, have Googled myself. Now that I’m writing in true name and taking part in interviews, I am becoming more exposed in the public sphere. I’ve chosen a level of security that fits my goals and lifestyle: I want to exist, but not necessarily be found. The steps outlined above are a few basic privacy measures that’ll assist you in living safer in a digital age; they are by no means all encompassing, nor will they set you up for extreme privacy.

Financial Industry Expert Dennis Santiago’s Approach

You wake up to a nightmare. Out of the blue your privacy has been stripped away. It’s all because you said something, wrote something, or participated in an action that you believed was moral and ethical. You expressed your opinion like a free person in America has the right to do, but an organization of strangers didn’t like it.

And now you’re asking yourself three questions: What could I have done to avoid this? How do I make this end? What needs to change so it doesn’t happen to others? We’ll break that down, but first a little insight to let you know what you’re up against. This is vile, asymmetric warfare.

For instance, you’re probably aware of the term “Facebook jail,” a sort of purgatory for your residual self-image in the matrix of the internet. Anything you say on social media can result in anonymous complaints being filed against you. Your accounts become increasingly restricted, if not hacked and vandalized. You don’t wind up there by accident. Somewhere out there, strangers are accusing you of being a witch, turning in complaints, and asking the algorithms, moderators, and reviewers of the web to burn you at the proverbial stake.

That harassment also follows you to your workplace. The barrage of phone calls and emails affects you there too. Like the complainants on social media, this army of strangers are demanding you be fired. The company you work for goes into a panic because they’re in the headlines for all the wrong reasons. In some cases, your career may tumble out of control or come to an end.

Politically outspoken people who exercise their 1st Amendment right to free speech are particular targets of this sort of harassment. Doxing doesn’t care who it hurts. It can be for any cause. In this age of the tiniest thing triggering nuclear retaliation, you could’ve said you didn’t like wearing a mask. On the internet, someone will be angry enough to take offense; and where there’s one, there’ll be many more. And some of them will be vicious. 

What could I have done to avoid this?

The first thing to realize is that doxing is a very personal version of psychological warfare. It’s very much an antisocial and cowardly act by one human against another. If it’s done to you, the people engaging in it are actual enemies. They’re seeking to exploit your vulnerabilities to intimidate you. They’re out to silence you by whatever means they can. What you need to do is minimize your target profile.

The second thing to realize is that there’s no such thing as anonymity on the internet. Many people use pseudonyms. Such a practice almost always eventually gets you into trouble. It’s fun to come up with a catchy name for yourself and immerse into a role-playing persona with the anonymity of a pen name. You express thoughts standing on a soapbox from inside what feels like a cocoon of anonymity. This makes people brave, sometimes enough to take extreme edges of the argument. This is all but guaranteed to raise the ire of those who hold opposite views.

Before the internet, it was difficult for these opposing parties to find each other in the real world. Conflicts were avoided simply because the pairs of volatile personalities would never meet in real life.

With the internet, that barrier to interaction is gone. Billions of people can have access to every musing you express on the medium. And if they don’t like you, they’ll take note of you, not because of who you are, but because of the ideas you represent. Ideas they hate. When doxing perpetrators attack, they’re hoping the revelation of secret identity will be enough to silence the target. Avoiding an attack in the first place requires you manage your vulnerability.

First, consider not being anonymous in the first place. Being yourself in the universe of debate means there’s nothing hidden to expose. It’s taking the high ground with your opinions. Revealing who you are when you open your mouth forces you to heighten your awareness of the consequences of what you say. They can’t expose what’s already in the open.

Second, curate who you interact with. Engaging in politics with strangers is a dangerous thing we humans do to each other. Online, remember to trust no one. Do your homework and check out every person who tries to come into your orbit.

Did that person actually say they believe that anyone who’s hesitant to be vaccinated should be “compelled” to do so or be banned from participating in any social activity? Did you see that person comment to someone else that they actively report persons they don’t agree with politically to the social media platform’s anonymous complaint utility?

Situational awareness is something most people interested in their survival and happiness should practice. Detecting persons with dangerous antisocial traits who act on those impulses is one of those recognize-from-afar things. It’s OK to mute friends who’ve become hyperactivated by spending time in too many echo chambers. I now do that at the onset of political election cycles. It’s better for preserving friendships based on enjoying what’s common and tolerating what isn’t.

When I detect people who are truly dangerous, I just block them. I use the harshest protective tool available on the platform, and make sure I can’t see them and they can’t see me. The technical term for that in electronic warfare is “interrupting the firing solution sequence.” It’s really hard to click on the report-this-post option on a social media platform if that person can’t see the post in the first place. 

I’m not saying entirely avoid people who have colorful personalities, or those who have differences of opinion. That’s silly. Our ability to live within a culture of independent citizens depends on our ability to tolerate each other. You’re just trying to winnow the psychos, which is a prudent thing to do as far as I’m concerned.

Third, take the time to realize that every action you take is self-revealing, like a walk through a minefield. It’s important to know who’s real, who’s a fake personality, and what’s an artificial intelligence robot (those can now emulate humans very well indeed). They’re out there on the internet. You’ll run into them if you actively discuss current events and politics. They aren’t there to discuss things. They’re there to trigger to you discuss things and demonstrate subject matter affinity that they can sell as marketing data to other companies on the internet. 

It also could be as simple as ad revenue being the motivator — every digital news bureau and all their clickbait-packaged stories are all about making that top-line fraction of a penny each time they get someone like you to look. On the internet, the money has always been about the commercials, the ads that get served along with the stories. If you choose to involve yourself publicly in these issues, it’s important to stay aware of this. When you post or repost a story, meme, or article, you’re revealing a piece of research information about yourself. Hundreds of algorithms go to work on that information a microsecond after you click “send.”

Fourth, curate yourself responsibly. There’s a concept of how you comport yourself in public and in private that’s important to manage when interacting with the world on subjects that can trigger other people to take offense. My advice here is that what you say in public should always be measured. How you ponder the extreme ends of the spectrum of possibilities should always be private. What position you finally come up with should be a balance between emotion and reason. It’s good to take the time to research your opinion to see where it falls in the spectrum of society. Too many people think the privacy of what they type into a keyboard while alone late at night is profound, and then the sun rises in the East. Don’t be that guy.

Fifth, don’t fall into the trap of trying to be the most popular person in the room. There’s a macabre thrill that comes along with seeing what you’ve said explode virally into thousands, or even millions, of likes. It can be addicting to chase popularity. The internet beguiles with tales of riches for people who have turned the corner curating themselves into a money-making operation. But for a person selling nothing but their opinions, it tends to be a chase that ends in anguish. Eventually you’ll fly too close to the sun and your wings will melt. The most important people in a room have an aura that’s easy to spot. They’re just quietly there. They aren’t the ones jumping up and down yelling, “Look at me!” You don’t have to be one of them either.

How do I make this end?

In this case, whether you did or did not abide by the vulnerability management things listed above, you got doxed anyway. Now what? You’re in crisis mode. First, start limiting the damage. Change all your passwords and screen names. Review all your contacts and cull anyone overtly hostile. You just hit a moment on the internet where it’s better to have a few trusted friends than thousands of acquaintances. In the worst case, suspend your accounts, if there’s an option to do so.

Second, if the harassment becomes physical, don’t ignore it. Put up “no trespassing” signs at your property boundary. If it’s bad enough, change your phone number. Get a new email address. Put up multiple high-definition cameras and record everyone that comes to your doorstep. If you can, add additional cameras that record the license plates of cars coming and going. Do this until the hoopla passes. Then, you can consider going back to normality.

Third, deal with the consequence effects of being doxed. If you were using a pseudonym to hide your identity to participate while throwing flaming bombs yourself, you may now have a price to pay in the real world for having done so. That’s a risk you took. That’s a price you must be prepared to pay. I haven’t found anyone who’s done this and never had to face the day it blows up in their face. Karma. It’s real. Back to my advice, “Don’t be that guy.” But if it did happen, I have another piece of advice that’s seen me through many trying times, “Sometimes the only way to win is to lose gracefully.” That may be what you need to do. For your family’s sake, do what you need to do.

internet doxing

What needs to change so it doesn’t happen to others?

The thing about doxing is that your attackers are also ones hiding in the shadows of anonymity. I believe that’s the beginning from where society needs to mount a counterattack. Current laws and abuse reporting policies tend to protect the anonymity of whistle blowers. The problem is that these protections apply even when the whistle blowers are actually malicious witch hunters.

It’s not like the social media companies don’t have records of who made the complaints against you. Users’ emails and IP addresses are retained, and the presumed anonymity of the accusers can be pierced if malice is revealed. Artificial intelligence algorithms to test for maliciousness and abusive reports can be designed. Tech companies can scrub the internet to halt a viral contagion from propagating, or to manage a political war, as we saw in 2020. The problem is that none of these systems are being used to protect the maliciously accused from frivolous attack, particularly when it comes to real-time solutions that follow the principle of innocent until proven guilty. In corporate America, risk management is designed around the exact opposite principle — the accused is in the wrong until cleared. The technologists and the legal departments that advise them should probably be pushed to get those principles into a better balance.

It’s not that these detectors are hard to make either. Patterns of abuse tracking are certainly part of determining whether to put a user into virtual “jail.” Why not use patterns of abuse analysis to detect serial abusers of other people’s right to have an opinion? It’s similar to the process of hunting pedophiles online. It’s time to stop enabling abuses by the witch hunters.

To be sure, such an abuse-catching system would find bad behavior across the entire spectrum of opinion in America. The internet’s technology and legal framework design enables the problem. But is it so bad that everyone will have to learn to behave and be more civil while exercising the 1st Amendment?

Conclusion

Anyone can be doxed. Even if you avoid social media, use a VPN, two-factor authentication, firewall, and password manager to hold each unique password for each unique secure email account from a non-attributable computer or phone, you can’t control the human factor. This isn’t just a cyber issue — it’s a life issue. And if you plan on getting involved in your community, your children’s school fundraiser, or your work’s outreach program, there’s a chance your information, such as a picture of your face and contact information, could be released to the public. That’s a part of the world we now live in.

However, taking precautionary steps to limit exposure could prevent an event like this from becoming a nightmare. Security isn’t always convenient; it’s not always easy. But considering the alternative, it’s worth it. You choose — the life of an antisocial mountain hermit or existing in the real world with certain inconvenient steps to ensure privacy. 


About the Authors

katherine basso

Katheryn Basso

Katheryn Basso is a U.S. Marine Corps veteran trained in identifying sources of instability in foreign countries. Proficient at navigating the complex civil-military terrain of foreign policy, she has advised and advocated for military and civilian leaders from multiple partner nations. She’s currently the co-owner of TEAM TORN, a tactical training company based in Nevada that instructs U.S. military, government, and civilian personnel. She specializes in firearms instruction, conflict avoidance, and personal security strategies. www.teamtorn.com

dennis santiago

Dennis Santiago

Dennis Santiago is a global risk and financial analyst. His national policy expertise includes strategic warfare, asymmetric warfare, and global stability. He’s a financial industry subject matter expert on systemic risks to the U.S. economy and the safety and soundness testing of U.S. banking institutions. www.dennissantiago.com


More Scenarios to Consider


Invisible Preparedness: A Letter from the Editor

Preparedness has traditionally been a physical endeavor, highly focused on concrete tangibles: food, water, ammunition, medical supplies, and so on. But the information age is here to stay, and we feel there still exists a large dead space in current discussions about preparedness, and media representation of it.

Communications security, known in military parlance as COMSEC, is a critical part of your individual, family, or organizational preparedness infrastructure. It’s a nebulous concept that can encompass a wide array of different skillsets and best practices — most of which go well beyond the technological savvy of the average person. So, we felt it was important to dedicate some serious effort to the topic and try to help you add some electronic tools to your preparedness tool belt. 

As part of that effort, we’re happy to bring some new contributors into the fold who possess “a particular set of skills” in this arena. Dean Freeman penned two articles for us — one on Software Defined Radio, which allows you to turn a computer or tablet into a radio receiver/transmitter, and another on steganography, a method of embedding text messages in digital images for discreet communications. Our cover model is an electrical contractor and Instagram content creator who goes by the handle @socal_offgrid; he outlined his tech-oriented EDC in our Bag Drop column for this issue. RECOIL OFFGRID veterans Katheryn Basso and Dennis Santiago return for this issue’s What If… about doxing, a social-media-era phenomenon defined as “searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.” We’ve seen self-proclaimed activists from all angles of the sociopolitical spectrum use this tactic to devastating effect. Occasionally, it nets a positive result for the greater good, but it has also destroyed lives, careers, and reputations on account of a benign misquote or case of mistaken identity. Patrick McCarthy gives us a thorough review of the little black disc known as an NFC tag, an easily concealable data storage device that relies on near field communications, which he explains in lay terms. 

As I said earlier, digital security is only one facet of survival in the modern world. So, we brought back combatives expert Chad McBroom to review his process for making a functional knife from scratch using items you can source from the local junkyard and techniques you can perform in your garage. We also sent Steven Kuo on a weeklong training excursion designed by former CIA
officer and Shark Tank competitor Jason Hanson.

Changing your passwords and maxing out your privacy settings isn’t enough to keep your personal information safe anymore. As always, we hope to educate and inform you on not just what threats are out there, but what you can do about it. 


offgrid issue 45 cover

 


Judgement Day: Guardian Training and Consulting

Knowing how to shoot has obvious value. If your fundamentals are solid, you’ll be able to quickly and reliably put rounds where they need to go. But that’s only one piece of the puzzle — it’s also critical to know when to shoot. Missing a shot might have serious consequences, but shooting someone without adequate justification (or hesitating to shoot when you need to) is guaranteed to be a life-altering event. In order to hone my judgment, I connected with Josh and Karen Logan, the owners of Guardian Training and Consulting.

At the time I connected with Guardian, the company was sometimes hosting classes at the Scottsdale, Arizona, headquarters of Haley Strategic. While Haley’s courses are tailored to experienced shooters, Guardian offers a varied and affordable curriculum to a broader audience, and provides an abundance of one-on-one feedback.

I began by attending Guardian’s half-day Arizona CCW class — I already have a permit, so this served as a refresher on state laws regarding use of deadly force. Logan and his instructors did a good job explaining the legalese and its practical implications. I’d recommend everyone take similar classes periodically, since knowledge of the law will provide a foundation for your decisions in any self-defense situation.

Next, I attended another half-day Guardian class called Pistol Fundamentals and Judgmental Use of Force. This class covered both the how and the when mentioned above. It began with a segment on the nuts and bolts of shooting a handgun — stance, grip, sight picture, and trigger press. The students, several of whom were new gun owners, practiced these principles in front of Haley’s VirTra 100 simulator screen. The CO2-powered, laser-equipped VirTra pistols showed any flaws in our technique, and Guardian instructors provided feedback based on our shot groups.

guardian training and consulting

The other half of this class focused on combining these fundamentals with good judgment. We stepped into the wraparound VirTra 300 simulator and prepared to do some on-the-fly problem-solving. Instructors reminded us that, just like real life, not every scenario would require us to discharge a weapon.

The first scenario I faced involved the theft of an ATV from a barn on my property. As I approached to investigate, the culprits were revealed to be two young teenagers. One hesitantly brandished a knife but dropped it and retreated when I drew my gun. The second teen drew a gun of his own, so I fired three rounds, ending the threat. I was able to justify my actions when Guardian instructors asked probing questions, much like investigators and lawyers would in the aftermath of a real shooting.

Our second scenario took place in a crowded movie theater. As we waited for the previews, I noticed the emergency exit door was cracked. This seemed unusual, but I knew something was wrong when a man stepped through wearing a gas mask and tactical vest. I couldn’t see a weapon at first, so I waited to draw until I could clearly make out a shotgun in his hands. I drew and fired five rounds; he staggered but returned fire, so I kept shooting until he fell. This reinforced the fact that judgment isn’t only necessary before the first shot — it’s a continuous process of assessment. 

These courses from Guardian Training and Consulting helped me develop more confidence in my ability to react to an unfolding situation, and reinforced the tremendous importance of judgment in any use-of-force scenario. For more information on future classes, go to gtctrain.org or follow @gtctrain on Instagram.


MORE FROM OFFGRID ON TRAINING AND PREPAREDNESS


SB Tactical SB22 as a Survival 10/22 Chassis: Backpack Game Changer

The Ruger 10/22 is a decades-old, highly proven design that belongs in the safe of every red-blooded American. The 22LR cartridge has been used to take a wide variety of game and provides a reliable, lightweight, sometimes inexpensive plinking round that can be carried by the hundreds. The 10/22 is supported by an immense amount of aftermarket part manufacturers, and we were lucky enough to get our hands on SB Tactical’s new SB22 fixed 10/22 chassis for review. 

SB Tactical SB22 10-22 Chassis

Why Rimfire?

First, let’s beat the dead horse of how great the 22LR is as a survivalist cartridge. Carrying a brick of 22LR takes up little space and provides the shooter with several hundred rounds of ammunition for squirrels and such. We can all agree, however, that 22LR wouldn’t be our first, or even fifth, choice for a defensive cartridge. But for small and possibly even medium game, it’s a decent choice. In the not-so-distant past, when ammo flowed freely, the venerable rimfire cartridge was plentiful and the shooter had plenty of options to tailor the equipment to the mission. The shooter could carry a mixed bag of hollow points, heavy subsonics, shotshells, and even match ammo that’d give them different capabilities when it came to hunting and, in a pinch, defense. The 10/22 design is generally very reliable in feeding and functioning with these different loads, so in the lucky instance you come across a less-common load, you can feel confident it’ll run in your gun. 

SB Tactical SB22 10-22 Chassis

Outlining all the needs for a rimfire build would make for a long list, so we looked at what we’d want if we were carrying a 22 rifle or pistol as more of a secondary role — not as a primary defensive gun, but to supplement the primary for hunting. Ideally, this would be kept in a go-bag or a vehicle where it takes up little room but doesn’t scrimp on features or capability. 

The 10/22 Chassis

Enter the SB Tactical SB22 kit. This company’s offerings have become an industry-standard in braces for a wide variety of firearms over the past few years. The SB22 kit builds on their product portfolio, representing one of their first ventures into a brace-type product for non-pistols. The kit comes in two varieties, the fixed for your standard 10/22 or 10/22 charger and the SB22 Takedown for takedown 10/22s and Chargers. The 10/22 chassis was developed in collaboration with Unity Tactical, another awesome outfit bringing unique and needed items to market. 

SB Tactical SB22 10-22 Chassis

Above: The contents of the SB22 Chassis kit. The two top covers are a nice touch. 

The SB22 fixed kit is lightweight at 16.4 ounces with the Picatinny top cover. Two top covers are included, one with a Picatinny rail and one smooth, giving the user some mounting choices. The included grip is the Reptilia CQG Grip, which in our opinion is a nice touch over the Mil-spec AR-15 grip we all have a drawer full of. Besides including a great grip, SB Tactical incorporated an ambidextrous QD socket for your sling. This is part of the aluminum insert that also houses the grip mount and the increasingly common 1913 Picatinny rear mount for your choice of brace or stock. The vertical 1913 Picatinny piece allows the user to install a variety of braces and stocks, most of which fold. The handguard portion of the 10/22 chassis has M-LOK slots on both sides and the bottom for more attachments. 

SB Tactical SB22 10-22 Chassis

Above: What could’ve been a weak link is strengthened by an aluminum insert.

The Setup

We began setting up this little guy with a Brownells BRN-22R receiver. This had the added bonus of a Picatinny rail machined into the receiver for solid optics mounting. The bolt is a factory Ruger part, as well as the internals and charging handle. The trigger is Ruger’s BX-Trigger, which offers a 2.5- to 3-pound pull over the factory 5.5-pound. Fitting the receiver to the 10/22 chassis took a little more effort than other stocks. Full disclosure: We used copious amounts of elbow grease and a mallet to get it to fit. It eventually did, and the upside is that there’s now zero movement within the receiver. 

SB Tactical SB22 10-22 Chassis

We opted to keep this receiver as a pistol for maximum compactness, although a registered SBR would be equally awesome. The SB Tactical FS1913 brace was an easy choice because of its simplicity and the built-in folding mechanism. Affixed to the brace is an ITS Tactical Mini Nylon Zip Bag. Inside is one 10-round Ruger magazine (loaded), 40 rounds of 22LR ammunition, and an extra optic battery. There’s a little room left for other small items, limited only by one’s imagination. 

SB Tactical SB22 10-22 Chassis

Above: The Picatinny top mount fits flush and is topped with the Streamlight TLR RM 2 for 1,000 lumens.

The barrel was a small hurdle in this build. As of this writing, the firearms industry is in an unprecedented time of demand, so sourcing some parts proves more difficult than others. In this case, finding a 10/22 barrel shorter than 16 inches was difficult. We were fortunate to find a new old stock 9.75-inch Primary Weapon Systems tension barrel at a local shop. This barrel is a bit heavier and longer than we would’ve liked, but it came threaded and should prove to be plenty accurate for its short stature. Ideally, a 6-inch barrel would’ve been used to keep overall length to a minimum, but in this market we won’t complain. Adorning the barrel is a registered JK Armament MST 155R kit in Flat Dark Earth, set up in a short configuration. With subsonic ammunition, it doesn’t take much to tame the report of the rimfire, and this will certainly do it.

SB Tactical SB22 10-22 Chassis

Above: The folding brace makes for a great backpack gun. A shorter barrel would’ve made this even better.

The Picatinny top cover aligns perfectly with the receiver and is home to a Streamlight TLR-RM2 Laser. This is a light/laser combo that features 1,000 lumens on high and a 640nm red laser — plenty of oomph for seeing critters in low light. It can be used ambidextrously at the 12 o’clock position, and your hand can control the settings with a simple thumb push. Lastly, for accuracy, a Primary Arms red dot is mounted. The optic sits just high enough for the top-mounted flashlight to not be a hindrance to its field of view.  

The Verdict

The SB Tactical SB22 Fixed 10/22 Chassis kit is a great place to start a build or retrofit an existing firearm. It’s well built, plenty strong, and has included features that are very desirable for a rimfire. The build we put together will act as a game-getting gun and a fun plinker. The 10/22 is a proven package and very reliable as a survival rifle. With a shorter barrel and the folding mechanism, this serves as a great backpack or under-the-seat gun. 


SB Tactical SB22 Fixed Kit

MSRP: $125 (chassis only)
URL:
www.sb-tactical.com

Parts and Accessories Featured

Brownells BRN-22R receiver: www.brownells.com
JK Armament MST 155R Kit: www.jkarmament.com
Streamlight TLR-RM 2: www.streamlight.com


THE SURVIVAL GUNS OF OFFGRID: READ MORE


Intro to SDR: Software Defined Radio

Whether you’re on-grid or off, information is king. The data traveling around us via radio and microwaves can provide a wealth of intelligence about what’s going on, be it in our neighborhood or around the world, for anyone who can tap into it and make use of it. Thanks to advances in Software Defined Radio (SDR) receivers, anyone with a couple hundred dollars and some modest skills can turn their computer or tablet into a signals intelligence platform that was once the exclusive, multimillion-dollar domain of governments.

In this series, we’ll discuss the basics of SDR, from selecting the right receiver and antennas, to basic setup for gathering both communications intelligence (COMINT; listening to audio transmissions) and signals intelligence (SIGINT; receiving other types of signals such as tracking aircraft or getting weather satellite images).

The Setup: What is SDR?

While traditional radio receivers are hard-wired to handle only specific bands and modes, software defined radios (SDR) leverage computer processors and software to perform most of the demodulation. This allows a small package of radio frequency (RF) sensing hardware to support a wide range of frequencies and the ability to listen into all modes of transmission.

The receiver itself still has some limitations in terms of the range of frequencies it can support, the receiver bandwidth, and so on. However, compared to traditional radio receivers that may support a handful of modes and bands, the limits seem to fade away.

The flexibility comes at the price of the tyranny of choice, however. You need to not only choose the right piece of hardware for your purposes, but also learn to leverage various software packages to take full advantage of the capabilities.

Choosing the Right SDR

Perhaps the most popular SDR devices on the market today are those that rely on the RTL2832 chipset, commonly referred to as the “rtl-sdr.” These come in a number of flavors, such as the NooElec NESDR. Other popular SDR receivers include the SDRPlay, AirSpy series, and the HackRF. Some, such as The Great Scott Gadgets HackRF, can transmit as well, albeit at extremely low levels of RF output.

SDR Software Defined Radio setup

Above: SDR equipment and antennas can pack small. Often, the largest piece of equipment is going to be the laptop. You may consider an Android tablet or phone as well.

Each of these devices have their own pros and cons. Personally, I have both a NooElec NESDR Smart rtl-sdr as well as a HackRF. For those just getting started, I recommend the NooElec. A great starter bundle can be had on Amazon for $99, which includes the NESDR Smart, the NooElec Ham It Up upconverter, some antennas, and adapters.

The bundle allows the reception of signals down to 300Hz and up to 1.7GHz, giving a receive range of all high-frequency communications, including shortwave radio stations, and up into some of the microwave bands used by aircraft and satellites. 

Choosing the Right Antenna

There’s nothing magic about SDRs, so all the usual considerations regarding antennas apply if you want high performance. The better your antenna placement, and the more resonant it is on the bands that you want to receive, the better.

sdr radio antenna

Above: The SuperAntenna MP1C is a portable antenna system utilizing a loaded coil system for tuning the antenna. This same antenna can be used with a standard transcienver such as the popular Yaesu FT-891.

For most applications, low-gain whip antennas will be fine. However, for receiving highly polarized, highly directional microwave data from satellites, directional antennas (those that focus the transmission or reception) need to be used.

If you already have an established antenna deployment, you can share the antenna with both your traditional radio transceiver and the SDR using a device such as the MFJ-1708SDR. This gives you the added benefit of a wide-bandwidth panadapter display for your radio, if it doesn’t have one of its own.

For COMINT collection, any wire antenna or vertical whip which is resonant on high frequency (HF), very high frequency (VHF), or ultra-high frequency (UHF) bands that you have interest in is all you need.

Choosing the Right Software

The software that you use for your SDR will come down to a few criteria:

• The mission at hand

• What’s available for your chosen platform (both the operating system on your computer as well as what supports your chosen SDR receiver)

• Cost

Free and open-source (FOSS) platforms such as Linux have a plethora of choices available when it comes to SDR software, and they’re generally free. The GNU Radio project provides tools and libraries, which others have built upon to provide easy-to-use frontends for various purposes. On Linux, my favorite choice is Gqrx, which is easily installed through the package manager in any user-friendly Linux distribution such as Ubuntu. Windows users will find SDR# is a popular choice.

For mobile operations where weight is a consideration, bringing a full laptop may not be the best option. If you choose to use an Android phone or tablet, you’ll find programs such as RF Analyzer available in the Google Play store. This allows you to use an RTL-SDR for much the same purpose in a smaller package.

Many people in the amateur radio community use small computers such as the Raspberry Pi, running Linux, for both SDR purposes as well as running digital modes attached to their HF transceiver. Personally, I run Linux on my main laptop as well, but with a little research you’ll find something that suits you on whatever platform you choose.

Getting Started: The Install

Getting set up to listen to analog transmissions on VHF and UHF bands is incredibly easy. The demonstration is based on Gqrx, but the setup will be similar regardless of platform.

Installing the application and its supporting libraries is an easy point-and-click operation in modern Linux distributions. Search for “Gqrx” in the software store application on Ubuntu or Fedora Linux and click install. Once it’s installed, it’ll be ready to launch.

SDR software defined radio

Before launching the software, connect the antenna to the SMA connector on the RTL dongle and then plug the USB into your computer.

When you launch Gqrx for the first time, you’ll be asked to do some initial configuration. At this time, all you need to do is fill in the device string to read rtl=0 and then hit OK.

When the main window comes up, hit the Play button and you should begin receiving radio signals. There are a lot of controls and options, but you only need a few to get started.

The main window looks like this:

SDR software defined radioAbove: Gqrx provides a waterfall display to show signal intensity (X-axis) over time (Y-axis), with color indicating signal strength. Here, we see the waterfall display for some broadcast FM stations in the Austin, Texas, area. Note that the mode is set to Wide FM.

In the main pane, you see it’s split into two. From left to right, you see a spectrum analyzer which shows relative amplitudes in different frequencies within the receive bandwidth. Below that, you see a waterfall display showing the historical record of what was received on any given frequency and is read vertically.

To the right, we see that by default the Receiver Options are selected. The main control here you need to be aware of is the “Mode” selection. Different types of communications require a different demodulation mode. In general, just be aware of the following:

• Use WFM for commercial FM stations

• Use AM for air and marine band VHF/UHF, shortwave broadcasts, and commercial AM radio

• Use NFM for 2-way analog VHF/UHF in amateur or public safety bands

• For HF amateur radio transmissions, follow convention (USB in 20m and LSB in 40m, for example)

Knowing Where to Listen: VHF and UHF

You’ll likely know your favorite commercial FM stations in your area off-hand. If you’re a licensed ham radio operator with at least a tech class license (refer to our article “Can Anyone Hear Me?” in Issue 38 for more details on ham radio capabilities and licensing), you probably know the output frequencies of repeaters in your area that you can hit.

If you don’t already have that information, there are two great sources. First, to find repeaters in your area of operations (AO), The Repeater Book (www.repeaterbook.com) is where you want to look. To find air, public safety, and commercial frequencies in your AO, check out www.radioreference.com.

For instance, to find out what frequencies and modes are in use at my nearest airport, Austin-Bergstrom, all I need to do is look it up:

SDR software defined radio

Of course, you can always just tune around. One of the major advantages of an SDR versus running the scanning feature on a handheld radio is that you can see the spectrum activity across the entire receive bandwidth, giving you a quick visual indicator of activity that you might want to investigate and listen in on.

Shortwave and HF Listening

In a truly grid-down situation where the radio is your only tool to find out what’s going on in the world, the ability to listen to shortwave radio broadcasts and 2-way HF communication from hams or other radio operators could be a lifesaver, making an SDR receiver a prime source of intelligence. Just make sure you have a reliable emergency power source for all your electronic equipment, such as a solar backup system or a generator.

nooelec.com ham it up sdr software defined radioAbove: The Nooelec RTL-SDR bundle is a common, inexpensive way to get into SDR, including the ability to access HF bands with the Ham It Up up-converter. Depending on the antenna you want to use, you may need different cables.

Unfortunately, we can’t use the RTL-SDR by itself to receive most shortwave or other HF frequencies, such as those used by amateur radio operators, militaries, and the like. This is where the NooElec Ham It Up TXCO Up Converter comes in. This device is put in-line between the antenna and the SDR dongle, and shifts the RF signal into a frequency that’s within the receive range of the RTL-SDR.

nooelec.com ham it up sdr software defined radio

Above: If you want to utilize HF bands, the upconverter must be in line between the SDR and the antenna, with the antenna connected to “RF IN.”

nooelec.com ham it up sdr software defined radio

Above: The RTL-SDR must then be connected via USB to the laptop. If you want to operate only within the range of the RTL-SDR, you can leave the upconverter out of the circuit entirely, leave it unpowered (not connect its own USB power cable to the laptop, as pictured), or use the “Passthrough” switch. The Ham It Up fails open, so it can work unpowered.

Once the box is placed in-line with the “RF IN” connected to the antenna and the “RF OUT” connected to the RTL-SDR, power it on and make sure that the switch is set to “UPCONVERT”.

sdr radio antenna

Above: Here, the MP1C is set up on a standard, low-profile tripod with a flexible whip on top. The system is modular and can be configured in other ways depending on conditions.

The upconverter has a 125Mhz offset, so in order to make use of it, there are two options. The first is to add 125Mhz to every frequency that you want to listen to, but that’s tedious and prone to mistakes. The second option is to configure your SDR software to calculate the offset and allow you to directly input the frequency that you want to listen to. Option two is far better, and is accomplished by adjusting the setting LNB LO (Low Noise Blank Local Oscillator) setting in the Input Settings:

SDR software defined radio

Since we’re using an upconverter, we give a negative offset, so the field should read -125Mhz. Then here, coupled with a Super Antenna MP1C vertical whip antenna slide tuned to 20m, we can see we’re able to receive a shortwave radio station from Latin America on 13.818Mhz.

With the I/Q recorder, we can record the broadcast to replay at a later date, transcribe, or translate.


Emergency and Tactical Uses of SDR

  • Monitoring emergency communications
  • Listening to radio news and NOAA weather broadcasts
  • Pulling down weather satellite images
  • Tracking aircraft

Step-by-Step SDR Setup

1. Have your SDR gear ready (computer, SDR device, up/down converters, antenna, cables)

2. Install the software of your choice (Gqrx, SDR#, etc.) on the computer

3. If necessary, connect the up/down converter to the SDR

4. Connect the antenna to either the SDR or the up/down converter

5. Connect the SDR system via USB to the computer

6. Start the application

7. Choose your device

8. Start listening


Conclusion

With a few dollars spent, you now can listen in on analog communications, whether they’re around the world or in your neighborhood, helping to turn the RF spectrum into a source of information to give you the edge when it comes to situational awareness. This just scratches the surface of what SDRs can help you do when it comes to preparedness and intelligence gathering. In a future article, we’ll discuss using SDRs to intercept digital transmissions, such as satellite phone transmissions, aircraft transponders, and weather satellite imagery. 

Find Out More about nooelec.com


More on Radios and Comms