Recoil Offgrid - October 2021 Flipbook PDF


95 downloads 119 Views 72MB Size

Story Transcript

58 66 72 78 42 CON T E N T S ISSUE 45 FEATURES 42 Airwave Autonomy Using Software Defined Radio for the Information Edge: Part 1 50 More Than Meets the Eye Steganography Can Be Used to Send and Receive Clandestine Information Hidden with Images 58 Cybersecurity and Travel Techniques to Keep Your Digital Footprint Safe, Both Stateside and Abroad 66 Unleashing Your Inner Spy 5 Survival Lessons from a Former CIA Officer 72 Backpack-Sized Game Getter SB Tactical’s SB22 Chassis Kit as a Survival Gun 78 A Poor Man’s Guide to Knifemaking DIY Bladesmithing Your Own Knife at Home Throughout this issue you will see certain images are labeled as being 100% Actual Size. This designation is for the print edition of this issue. Because of the various screen sizes on different tablets and computers, we cannot always provide actual life size images in digital versions. We apologize if this causes any confusion and thank you for your understanding. DEPARTMENTS 06 On the Cover All the Great Gear on the Cover 10 Editor’s Letter Invisible Preparedness 14 Gear Up The Latest and Greatest Products 20 Pocket Preps Whistles 24 What If? Your Privacy Has Been Compromised by Internet Doxing? 32 Survivalist Spotlight Michael Rozin 84 Health Eating Reptiles 88 Hands On NFC Tags 94 Bag Drop Urban Communication Kit 96 The Final Weapon Judgment Day 98 The Last Page Review of A Burglar’s Guide to the City Product Disclaimer Prices and details for products and services featured in RECOIL OFFGRID are set by the manufacturers, retailers, and agencies, and are subject to change without notice. Recoil OFFGRID (ISSN 2475-1952), October/November 2021; Number 45, is published bimonthly by CMG West, LLC 5600 W. Grande Market Drive, Suite 100 Appleton, WI 54913. Copyright © 2021 by CMG West, LLC. All Rights Reserved. Periodicals Postage Paid at Appleton, WI, and at additional mail offices. For subscription inquiries and customer service, go to www.offgridweb.com or call (800) 873-7896. POSTMASTER: Send all UAA to CFS. (See DMM 707.4.12.5): NON-POSTAL AND MILITARY FACILITIES: send address changes to Recoil OFFGRID, P.O. Box 460429, Escondido, CA 92046-0429. Please allow 8-10 weeks for delivery of first issue. No part of this book may be reproduced without written permission. This book is purchased with the understanding that the information presented herein is from many varied sources for which there can be no warranty or responsibility by the publisher as to accuracy or completeness.


Relevant. Honest. Unfiltered. Online streaming hosts can get rid of any content they don’t like with a click of a mouse—and the major players absolutely don’t like guns. So, we made our own. RECOILtv is a streaming platform created to bring you only the best from testing the latest guns and gear, in-depth reviews and expert tutorials, partner-generated content, and loads more. RECOILtv is the premier authority for the content you want and deserve. RECOIL. Relevant. Honest. Unfiltered. AVAILABLE ON: Brought to you by: Presented by:


DOWNLOAD THE FREE APP TODAY!


006 ISSUE 45 OFFGRIDWEB.COM ON THE COVER Cover Photos: RECOIL OFFGRIDStaff 1. Case Make: Mystery Ranch Model: Low Viz 3 Way CC MSRP: $199 URL: www.mysteryranch.com 2. Watch Make: Suunto Model: Core Alpha Stealth MSRP: $299 URL: www.suunto.com 3. PowerBank Make: Dark Energy Model: Poseidon Pro MSRP: $120 URL: darkenergy.com 4. Holster Make: Safariland Model: Model 5197Open Top Concealment Belt LoopHolster withDetent MSRP: $37 to $52 URL: safariland.com 5. Wallet Make: Vanquest Model: R CACHE (Gen-3) RFID-Blocking Security Wallet MSRP: $22 URL: vanquest.com 6. Knife Make: Coast Model: F401 MSRP: $50 URL: coastportland.com 7. Flashlight Make: SureFire Model: E2DDefenderUltra MSRP: $219 URL: surefire.com 8. Wrist Light Make: SureFire Model: 2211 Wristlight MSRP: $199 URL: surefire.com 9. Jacket Make: Viktos Model: Actual Waterproof Leather Jacket MSRP: $500 URL: viktos.com 10.Boots Make: Viktos Model: Johnny Combat Waterproof MSRP: $130 URL: viktos.com 11. Pants Make: Viktos Model: Multi-Mission MultiCam MSRP: $170 URL: viktos.com 12. SoftwareDefinedRadio Make:Nooelec Model:HackRFOne SoftwareDefined Radio Bundle MSRP: $320to $711 URL: nooelec.com 13. Penetration Test Tool Make:Hak5 Model: WiFi Pineapple MSRP: $100 URL: shop.hak5.org Notes: Best known for its ability to passively gather intelligence, target, and track Wi-Fi-enabled devices and effectively deploy a rogue access point for man-in-the-middle attacks. 1 2 4 12 13 14 16 17 15 18 19 20 21 5 7 8 6


007 ISSUE 45 OFFGRIDWEB.COM 14. LongRange Extender Make: Alfa Model: Tube-U(N) 802.11nOutdoor Long RangeUSB CPEAdapter MSRP: $39 URL: store.rokland.com 15.Ballistic Panel Make: DFNDRArmor Model: Level III Rifle Rated Backpack Shield MSRP: $395 URL: dfndrarmor.com 16. Mesh NetworkDevice Make: goTenna Model: Mesh MSRP: $179 URL: gotennamesh.com Notes: Allows you to communicate without cellular connection or internet. 17. USBAdapter Make: Alfa Model: AWUS036NHA URL: alfa.com.tw 18. Homemade Mesh Communicator Make: Scott Powell LoRa Communicator URL: hackaday.io/project/174019-loraqwerty-messenger 19. Mobile Pen Tester Make:Nexus 6P RootedNethunter URL: forum.xda-developers.com/t/romofficial-kali-nethunter-for-the-huaweinexus-6p-android-8-1.4080807 20. Ham Radio Make: Baofeng Model: BaofengHam RadioUV-5RA MIRKIT Edition URL: baofengtech.com 21. Portable HardDrive Make: SanDisk Model: Extreme Portable SSDV2 MSRP: $90 URL: shop.westerndigital.com 22. Mini Computer Make: Raspberry Pi Model: 4 Model B URL: raspberrypi.org 23. SoftwareDefinedRadio Make: RTL-SDR URL: rtl-sdr.com Notes: See “AirwaveAutonomy” later in this issue for a detailed explanation of SDR. 24.DeauthDetector Make: MakerFocus Model: ESP8266 WiFiDeauthDetector V3 (Pre-Flashed) MSRP: $16 URL: amazon.com 25.Deauth Instagram Handle: @socal_offgrid Notes:Has the ability to disable Wi-Fi access points in your immediate area. 26. Pwnagotchi Instagram Handle: @socal_offgrid Notes: Designed to test password strength. It can capture crackable WPAkey material to test password vulnerabilities on systems you own or are authorized to test. 27. Truck 2009 Toyota Tacoma built by Tactical Application Vehicles URL: tavllc.com Notes: For a full feature on this truck, pick up a copy of Issue 6 of our sister magazine CARNIVORE (on sale August 24). Special Thanks SuperiorDefense URL: supdef.com 9 3 10 11 22 23 24 25 26 27


KADRE GLOVE $49* WARTORN VENTED GLOVE $35


LEO VENTED DUTY GLOVE $35-39 OPERATUS GLOVE $29 GEAR FOR YOUR DAILY GUNFIGHT


010 ISSUE 45 EDITOR’SLETTER By Tom Marshall Preparedness has traditionally been a physical endeavor, highly focused on concrete tangibles: food, water, ammunition, medical supplies, and so on. But the information age is here to stay, and we feel there still exists a large dead space in current discussions about preparedness, and media representation of it. Communications security, known in military parlance as COMSEC, is a critical part of your individual, family, or organizational preparedness infrastructure. It’s a nebulous concept that can encompass a wide array of different skillsets and best practices — most of which go well beyond the technological savvy of the average person. So, we felt it was important to dedicate some serious effort to the topic and try to help you add some electronic tools to your preparedness tool belt. As part of that effort, we’re happy to bring some new contributors into the fold who possess “a particular set of skills” in this arena. Dean Freeman penned two articles for us — one on Software Defined Radio, which allows you to turn a computer or tablet into a radio receiver/transmitter, and another on steganography, a method of embedding text messages in digital images for discreet communications. Our cover model is an electrical contractor and Instagram content creator who goes by the handle @socal_offgrid; he outlined his tech-oriented EDC in our Bag Drop column for this issue. RECOIL OFFGRID veterans Katheryn Basso and Dennis Santiago return for this issue’s What If… about doxing, a social-media-era phenomenon defined as “searching for and publishing private or identifying information about a particular individual on the internet, typically with malicious intent.” We’ve seen self-proclaimed activists from all angles of the sociopolitical spectrum use this tactic to devastating effect. Occasionally, it nets a positive result for the greater good, but it has also destroyed lives, careers, and reputations on account of a benign misquote or case of mistaken identity. Patrick McCarthy gives us a thorough review of the little black disc known as an NFC tag, an easily concealable >[email protected] Subscriber Customer Services. Domestic/Canadian: 888.681.7064 Foreign: 760.270.9470 [email protected] Advertising. GM/Publisher/ Glen Castle Associate Publisher/ Ryan Farner 760.809.8729 Senior Account Executive/ Alex Ostrowski 920.212.5677 Senior Account Executive/ David Figg 813.418.1060 Senior Account Executive/ Lori McDaniel 715.498.3768 To advertise on this magazine’s website, or any of CMG West, LLC’s other enthusiast sites, please contact us at [email protected]. CMG West, LLC. VP, Group Publisher/ Mark Han Director of Finance/ Jennifer Sexstone Circulation/ NPS Media Group [email protected]


CONFIDENCE IN YOUR CARRY Controlled Performance That Leaves No Room For Doubt Available calibers All copper design ensures controlled performance High velocity and reliable expansion without over-penetration Plated case for more positive feeding and extraction Recommended for everything from pistol caliber carbines to subcompact pistols Norma-Ammunition.com Now it’s up to you.


014 GEARUP 1A/2A: CONGRESS SHALL 2 MAKE & MODEL Vertx Move to ContactGlove COLORS Ranger Green, Urban Grey MSRP $65 URL vertx.com NOTES Wearing gloves in the summer? A reliable pair of paw protection is good to have on hand (pun intended!) all year round. Whether it’s to prevent your fingers from getting shredded while working with rope, tools, or firewood or wearing it on your support hand during a weekend-long carbine shooting course, gloves can make the difference between dexterous digits and blistered booger hooks. The Move to Contact Glove provides protection without taking away mobility, thanks to 100-percent goatskin leather, flexible D3O padding that doesn’t constrict, and a mechanical stretch knit back-of-thehand fabric that’s abrasion resistant. It also features YKK zipper and hook-and-loop wrist closure. Plus, the trigger finger, middle finger, and thumb are touchscreen compatible for added convenience. 4 MAKE & MODEL TetonWatersRanch Dinner Sausages FLAVORS Various, including Cheddar Bratwurst, Italian-Style, and Polish MSRP $55 for 24 URL tetonwatersranch.com NOTES As much as we fancy ourselves survivalists, not all of us are going to take down a buck, field dress it, and haul it back to home base during a weekend camping trip with the family. Sometimes we just like to chill and make s’mores. For low-key outings, easy-toprepare packaged food will probably be your go-to meals. Enter the dinner sausages from Teton Waters Ranch. They’re made from 100-percent grass-fed beef and are free of hormones and antibiotics. While they’re perishable and need to be kept on ice, the wieners are free of added sugars, nitrites, and nitrates … but full of deliciousness. Teton also offers classic bun-length hot dogs, smoked cocktail sausages, and burger patties if you need more variety for your campfire grill. 3 TITLE & AUTHOR NinjaWilderness Survival Guide Hakim Isler PAGES 266 MSRP $17 URL tuttlepublishing.com NOTES Before Hakim Isler ever appeared on TV shows like Naked & Afraid and First Man Out, he was an expert in ninjutsu (among other systems) and a U.S. Army psychological operations sergeant who served in the Middle East. Combining breadth of knowledge and real-world experience, Isler writes a thoroughly entertaining and insightful wilderness survival guide that isn’t just based on concepts from the ancient ninja, but also on his adventures enduring some of earth’s harshest conditions. This softcover manual delves into everything from primal methods (the fire plow) to modern adaptations (turning a discarded soda bottle into a fish trap). And through it all, Isler provides a cerebral, almost spiritual, insight that only a ninja/combat vet/ survival expert/TV star could. 1 MAKE & MODEL DECKED Tool Box COMPATIBILITY Select truck model years, including the Ford F-150 and Toyota Tundra MSRP Starting at $700 URL decked.com NOTES DECKED made a name for itself thanks to its innovative drawer systems, allowing drivers to securely stow tools, firearms, and valuables in their truck beds. Now the company’s revolutionizing vehicle storage once again with a fresh toolbox design that (for an additional $175) can include a telescoping ladder so you can easily reach inside. But even if you don’t get that upgrade, this 73.4-gallon tool box has several brilliant design features. Its seamless construction and EPDM lid gasket ensures waterproof storage. Torsion springs deliver smooth lid opening and closing — no accidentally crushing your fingers. A steel armored locking mechanism is virtually pry bar proof. Plus, a DECKED Blue D-Box comes standard to keep things organized at no extra cost. 1 2 3 5


OFFGRIDWEB.COM 015 ISSUE 45 OFFGRIDWEB.COM 015 8 MAKE & MODEL Danner Jungle 917 Rock Ridge HEIGHT 4.5 inches MSRP $170 URL danner.com NOTES It’s almost as if Danner made these boots specifically for RECOIL OFFGRID editors. The Jungle 917 Rock Ridge was designed for urban use but was based on Danner’s legendary hiking boots, providing extra support and traction if you need to venture into rocky terrain. The Vibram outsole offers solid grip in wet conditions, the Vibram midsole provides cushioning and stability, the OrthoLite footbed delivers comfort and heat dissipation, and the suede-and-nylon upper creates a durable yet snug hold around your foot. Part sneaker, part hiking boot, the comfortable Rock Ridge doesn’t cast unwanted attention on you in casual environments yet allows you to bug out to the backcountry at a moment’s notice without having to change into more rugged footwear. 5 MAKE & MODEL Quake Kare 4 Person UltimateGo Bag – Extended Edition DIMENSIONS 20 by 16 by 5.5 inches MSRP $159 URL quakekare.com NOTES Designed as a vehicle emergency kit for drivers who have to evacuate or might get suddenly stranded, the 4 Person Ultimate Go Bag – Extended Edition contains the essentials for you and a small group to sustain for up to three days: thermal blankets, a tube tent, 2,400-calorie food bars, water pouches, water filtration tablets, a first aid kit, and a NOAA weather-band AM/FM radio. Also included are supplemental items like a multi-tool, a five-in-one survival whistle, and a pocket survival guide. If you’re a seasoned survivalist, you might not give this package a second glance. But this kit is a good entry point if you’re new to the preparedness lifestyle or looking to gift to a friend who needs a kickstart. 6 MAKE & MODEL Rambo ElectricBikes Rebel1000XPC Camo WEIGHT 69 pounds MSRP $5,500 URL rambobikes.com NOTES In a postapocalyptic situation, a dual sport bike might seem like ideal transportation. But how readily available will gasoline be? And how will you evade bandits when your engine can be heard half a mile away? Suddenly, electric bikes like the Rebel seem like a smart alternative, especially when combined with a solar generator. Its Bafang 1,000- watt high-torque mid-drive motor and 11-gear derailleur can give the rider a powerful boost whenever pedal power doesn’t cut it. Meanwhile, the GT860 air forks and Maxxis fat tires deliver both the suspension and the traction needed to negotiate everything from mountainous plateaus to sandy beaches. Decked out in TrueTimber Viper Western Camo, the Rebel has a max distance of 48 miles — nothing to scoff at in a TEOTWAWKI scenario. 7 MAKE & MODEL PNWBushcraft Waxed CanvasGround Cloth/Hammock Chair DIMENSIONS 4 by 2.5 feet MSRP $98 URL pnwbushcraft.com NOTES While this looks like an old-school tarp, it’s actually a pretty handy multi-tool of sorts. As the name denotes, the Waxed Canvas Ground Cloth/Hammock Chair works as a dry spot to sit, kneel, lie, or place your gear on. Made of super durable 10.1-ounce waxed canvas with a 4-inch hem on one end, a 2.5-inch hem on the other, and four grommet holes on each corner, it can be attached to logs to serve as a chair, a table, a shelter, or a tinder gather. If you have cordage, you can transform it into a foraging bag or a haversack. And you can even turn it into a pillow by stuffing it with soft foliage. One smartly designed cloth, many uses. Made in the USA. 4 8 6 7


016 OFFGRIDWEB.COM 1A/2A: MAKE NO LAW 10 MAKE & MODEL Superesse ICERS FORMAT Digital template MSRP $12 URL superessestraps.com NOTES Standing for “In Case of Emergency Response System,” this digital product is a template that you download, modify to your needs, and distribute to your loved ones. It contains sections to fill in blood type, allergies, and emergency contact information, as well as rally points and guidelines for your most likely catastrophic scenarios. That way, if SHTF, everyone in your family can independently determine how to communicate with each other and when to shelter in place or bug out. ICERS also contains categorizations of disasters, tips for action plans, and guidelines for creating a personalized method of communication using tap code and Morse code. Like a modern playbook for preppers, ICERS provides a smartly organized template that anyone can adapt to their disaster planning. 9 MAKE & MODEL LiemkeThermalOptics Keiler-35 Pro WEIGHT 14.8 ounces MSRP $3,332 URL liemke.com/en/ NOTES After the sticker shock fades and you delve into the features of this high-definition monocular, it becomes apparent why you get what you pay for. The Liemke Keiler-35 Pro is a thermal spotter, allowing you to see heat signatures in all light conditions — from daytime to pitch-black zero dark 30. This handheld device has detection capability up to 1,350 yards. Plus, it has a 13mm objective lens, a digital zoom of up to 4x, a rechargeable battery with a seven-hour runtime, and integrated Wi-Fi to transfer live image data to a smartphone 54 yards away. So, whether you’re a hunter looking for big game or a prepper surveilling your bug-out property, this investment could mean the difference between feast or famine. 12 MAKE & MODEL Step22 Tortoise Toiletry Bag DIMENSIONS 10 by 7 by 4.75 inches MSRP $65 URL step22gear.com NOTES It’s pretty crazy to think that we have space-age backpacks, but when it comes to stowing our hygiene products, we’re forced to throw all of our toiletries into a Dopp kit — many of which have just one compartment and one zipper to hold things together. How … antiquated. Fortunately, the Tortoise brings the toiletrybag genre into the 21st century with a futuristic “lunchbox” design, 12 pockets and pouches to help organize your items, and padded exterior panels to protect your travel-sized containers. Moreover, it comes packed with clever features: a hanging hook (for when there’s no sink or counter), a removable zippered hygiene pouch (for more sensitive items), and a detachable mirror (which can double as a signaling device in a SHTF situation). 11 MAKE & MODEL OntarioKnifeCo. Camp Plus Hatchet OAL 12 inches MSRP $90 URL ontarioknife.com NOTES Not everyone has the cargo space or the inclination to haul around a two-handed, two-bit ax. That’s why the Camp Plus Hatchet is a solid choice for a camping trip or your vehicle emergency kit. Clocking in at just 1 pound, 6 ounces and a foot long, this model is the ideal size for portability without sacrificing performance. Made out of high-carbon steel, it has a sharp 2.9-inch cutting edge and a flat poll that’s perfect for batoning wood. Note: Avoid holding the shaft, which has 90-degree corners — great for striking ferro rods, but abrasive on your hands if you’re not careful. Fortunately, the Micarta handle itself is comfy and ergonomic. Overall, the U.S.-made Camp Plus Hatchet is an affordable, reliable ax. 10 11 9 12


THERMAL IMA NEW LINE OF THERMAL MONOCULARS AND WEAPON SIGHTS STARTING FROM $399 STARTING FROM $1,295 STARTING FROM $799 • 160X120 RESOLUTION • ON-BOARD RECORDING • WI-FI HOTSPOT • BUILT-IN RECHARGEABLE LITHIUM BATTERY • WATERPROOF ASP-MICRO • 12 ΜM, HIGH SENSITIVITY DETECTOR • 384X288 RESOLUTION • 15MM, 19MM OR 25MM LENS • ON-BOARD RECORDING • WI-FI HOTSPOT TAIPAN TM-384 • 12 ΜM, HIGH SENSITIVITY DETECTOR • 256X192 RESOLUTION • 10MM OR 15MM LENS • ON-BOARD RECORDING • WI-FI HOTSPOT TAIPAN TM-256


AGING STARTING FROM $1,995 STARTING FROM $2,695 STARTING FROM $2,695 The new line of AGM Global Vision thermal products includes monoculars, riflescopes and clip-on system. All devices are equipped with high sensitivity detectors, onboard recording and Wi-Fi in a compact, rugged and waterproof body. • 1.5X AND 2.14X THERMAL RIFLE SCOPES • 384x288 RESOLUTION • ON-BOARD RECORDING • WI-FI HOTSPOT • WATERPROOF, SHOCKPROOF RATTLER TS • 1.2X, 2.4X AND 3.6X THERMAL RIFLE SCOPES • 384x288 RESOLUTION • 5 ZEROING PROFILES • MULTIPLE RETICLE PATTERNS • WATERPROOF, SHOCKPROOF SECUTOR TS • CLIP-ON SYSTEM • QUICK CONVERSION OF DAYTIME OPTICS INTO THERMAL IMAGING SCOPE • 384x288 RESOLUTION • ON-BOARD RECORDING • WI-FI HOTSPOT RATTLER TC TO SEE OUR COMPLETE LINE OF THERMAL IMAGING AND NIGHT VISION EQUIPMENT GO TO www.agmglobalvision.com


2 DIY Paracord Bracelet Whistle DIMENSIONS 10 by 1 by 0.3 inches WEIGHT 1 ounce MAXIMUM OUTPUT 95 dB MSRP Approx. $15 URL N/A 3 Nitecore NWE30 DIMENSIONS 2.6 by 0.9 inches WEIGHT 1.9 ounces MAXIMUM OUTPUT 80 dB MSRP $30 URL www.nitecore.com 1 Coghlan’s Six Function Whistle DIMENSIONS 3.2 by 1.2 by 0.9 inches WEIGHT 1 ounce MAXIMUM OUTPUT 106 dB MSRP $14 URL www.coghlans.com histles have developed a bad rap among survivalists, so we’d like to set the record straight. Some claim that only wimps carry these devices, since a truly prepared individual will be able to self-rescue in any scenario. Frankly, this is an ignorant viewpoint, and it seems most common among those who naïvely believe they’re infallible. In reality, there’s always a slim chance that Murphy’s Law will kick in and you’ll end up in a situation you can’t get yourself out of. If that happens, you should be able to make your whereabouts known to anyone in the area. Although calling in the cavalry should never be your primary plan for survival, it’s a necessary contingency for times when all else fails. In Issue 37, we covered visual rescue signals such as flares, strobes, reflectors, and smoke. These tools are ideal for signaling over long distances — for example, to a helicopter overhead or a ship on the horizon. They’re also suitable for wide-open spaces. On the other hand, audible signals are most valuable at shorter range, especially when visibility is impaired. You might be stranded in a dense forest, stuck at the bottom of a deep ravine, concealed by darkness, or cloaked in a snowstorm. In any case, it’s a good idea to carry at By Patrick McCarthy 020 G PocketPREPS


4 SABRE Personal Alarm with Key Ring DIMENSIONS 3.3 by 1 by 0.5 inches WEIGHT 0.8 ounce MAXIMUM OUTPUT 92 dB MSRP $10 URL www.sabrered.com 7 Weewooday Loud Sound Emergency Whistles for Camping Hiking Hunting Outdoors Sports DIMENSIONS 1.8 by 0.3 inches WEIGHT 0.1 ounce MAXIMUM OUTPUT 96 dB MSRP $7 for 12-pack URL www.amazon.com 5 TOPS Knives Survival Whistle DIMENSIONS 2.8 by 1.1 by 0.3 inches WEIGHT 0.3 ounce MAXIMUM OUTPUT 110 dB MSRP Free with knife purchase / $15 for 5-pack URL www.topsknives.com 6 WE Knife A-05B DIMENSIONS 2.2 by 0.3 inches WEIGHT 0.3 ounce MAXIMUM OUTPUT 104 dB MSRP $22 URL www.weknife.com least one of each type of signaling device when you venture off the beaten path. Whistles are inexpensive, compact, and weigh next to nothing. They can be tucked into a pocket, attached to a keychain, or integrated into other pieces of gear, only to be used if circumstances get dire. More importantly, they allow you to generate clear and consistent sound that can carry for miles. It sure beats yelling until your vocal cords give out, or attempting to whistle through lips parched by dehydration and exposure. We collected seven rescue whistles and used a decibel meter to compare the maximum decibel output of each (average of three blasts at 10 feet). Read on and consider whether one of these lastditch tools deserves a place in your SHTF kit. 021 ISSUE 45 OFFGRIDWEB.COM


PocketPREPS If things go off the rails, you may not have access to your backpack or even the contents of your pockets. So, we made this paracord bracelet using about 15 feet of 550 cord, a button compass, and a polymer buckle that contains a whistle, ferro rod, and ceramic razor blade/striker. We even slipped two individually wrapped water purification tablets under the compass. All of these items were found in a parts bin, but you can buy the components for a few dollars each on Amazon or eBay. Search “paracord bracelet instructions” online for a DIY weaving guide. Pros: Wearable design makes it virtually impossible to lose Customizable with tools for navigation, fire-starting, water purification, and more Cons: Ordering and assembling the parts requires more patience than off-theshelf options Mini whistle requires more pressure to produce clear sound Of all the whistles in this guide, this has the most dubious premise. Rather than being marketed as a backcountry signaling device, it’s said to “deter an attacker and help you to escape to safety.” SABRE’s product description even uses the cringeworthy line, “Empower yourself with extreme stopping power when you need it most.” Hyperbolic marketing aside, the alarm is activated by pulling it firmly to separate from the attached key ring pin. Replace the pin to silence the alarm. A National Breast Cancer Foundation pink version is also available, indicating this product’s target demographic. Pros: Pull-pin operation doesn’t require fine motor skills, and works one-handed Cons: Perpetuates negative perceptions of rescue whistles. If you want to be truly empowered for self-defense, seek training and lethal/ less-lethal tools. Requires four tiny, specialized LR41 alkaline batteries Yet again, we dove into Amazon’s virtual bargain bin to see what low-budget offerings we could uncover. You can make wee-woo noises all day with this aluminum whistle from Weewooday, available in 12-packs straight from China. Black or red anodized finishes are available. Each whistle consists of a thin aluminum tube, a plastic sound insert, and a key ring. The product description says it’s useful for a wide range of purposes, including “contact partner and confirm location,” “anti-harassment,” and “playing with dogs.” Pros: Low bulk price means you can hand these out like candy on Halloween Cons: Shoddy machining and assembly left us with some whistles that work fine, and others that barely function at all Requires significant pressure to produce a clear tone Many gear companies include promotional swag with their products — stickers, pens, beer coozies, etc. Whoever thought up the idea of including a free whistle with every TOPS survival knife deserves a raise. It’s something we can actually use, rather than toss in the junk drawer or trash can. This simple polymer whistle feels durable, produces a multitonal “train horn”-style sound, and slips into a pocket or knife sheath pouch easily. We were pleased to learn that, just like the company’s knives, these whistles are made in the USA. Pros: Free with any knife purchase; also available in inexpensive fivepacks Made in the USA Cons: Thin rectangular mouthpiece makes it slightly more difficult to produce clear tones This keychain-sized device uses a single CR123A lithium battery to produce audible and visual distress signals for up to 72 hours. To activate it, simply twist to loosen the tailcap. A shrill siren blasts from the omnidirectional emitter once every 10 seconds; if it’s dark, a light sensor will also trigger four white LEDs for a 2,000- lumen flash every 3 seconds. The NWE30 is impact-resistant against 1-meter drops, and IP68 waterproof up to 2 meters of immersion. A battery and key ring clip are included. Pros: Produces continuous signals with no effort from the user. Just set it and forget it. Takes a common battery, so you probably already have spares in your pack. Cons: Didn’t come close to the advertised 120 dB, and was far quieter than other whistles If the battery dies and you don’t have a replacement, it’s useless. If you’re hiking in the backcountry, functionality is much more important than aesthetics, but for everyday-carry tools, we prefer a sleeker appearance. WE Knife nailed it with this slim whistle, which is machined from a solid piece of 6AL-4V titanium. This material makes it light, durable, and reliable. It also looks great, with intricate grooves, a laser-etched logo, and a contoured nozzle. Three flame-anodized colors are available, including purple (model A), blue-bronze (B), and teal (C). Pros: Machined titanium construction is light and very strong Small and stylish enough to remain on your keychain at all times Cons: Nothing noteworthy — it has one job and does it well. Long-time readers may recall that we’re not typically fans of all-in-one survival tools, and this whistle hasn’t changed our minds. The sound is loud and clear, and the liquid-filled compass can help you get your bearings. There’s also a fold-out lens for fire-starting, and the world’s tiniest signal mirror — as last-resort options, they’re better than nothing. A single LED offers weak, bluish light output, and a thermometer indicates ambient temperature. The latter tool is an afterthought; if you’re trying to survive scorching heat or freezing cold, knowing the exact temperature will be near the bottom of your priority list. Pros: The whistle works great. A spare compass is always handy. Cons: Jack of many trades, master of none, and bulky as a result Flashlight is dim, takes obscure SR1121 batteries, and is easy to accidentally activate. DIY Paracord Bracelet Whistle SABRE Personal Alarm with Key Ring Weewooday Loud Sound Emergency Whistles for Camping Hiking Hunting Outdoors Sports TOPS Knives Survival Whistle Nitecore NWE30 WE Knife A-05B Coghlan’s Six Function Whistle 022


STREAMLIGHT.COM/WEDGE Extraordinary Every Day Carry. A compact, rugged high-performance EDC light, the Wedge® is designed for clean pocket carry. The rotating thumb switch provides tactile control over the constant-on and THRO™ (Temporarily Heightened Regulated Output) modes while the USB-C port in the tail offers convenient charging with battery level indicator. THRO MODE: 1,000 LUMENS | CONSTANT ON: 300 LUMENS | USB-C RECHARGEABLE | SWITCHABLE POCKET CLIP


1A/2A: OF RELIGION,


Your Privacy Has Been Compromised by Internet Doxing By RECOIL OFFGRID Staff, Illustrations by Joe Oesterle George Orwell was right — invasion of our private lives is becoming a greater threat with each passing decade. Even if it’s not being used by Big Brother’s totalitarian regime, our sensitive information is increasingly accessible to unscrupulous corporations, cybercriminals, and anonymous strangers who know where to look. According to Wikipedia, “Doxing or doxxing is the act of publicly revealing previously private personal information about an individual or organization, usually through the Internet.” It’s an increasingly common act of intimidation and an exposure meant to enable complete strangers to actively engage in harming you. In 2012, an interactive map was posted online showing the names and addresses of New York handgun permit holders in Westchester and Rockland counties. Was this freedom of the press or potentially endangering people? Whether those gun owners like it or not, their info is now exposed, even if the post is deleted. The list of similar situations goes on. From the dentist who shot Cecil the Lion, the Ashley Madison data breach, or celebrities Tweeting out the home addresses of people they don’t like, one thing is for certain — the more information you have online, the greater the risk of it being used against you. If you were part of a group that’s becoming increasingly stigmatized — and you may already be without knowing it — how can you protect yourself from the prying eyes of the outrage culture zealots who mean to harm you? The Scenario: SITUATION TYPE You’re being doxed YOUR CREW You, your wife, and your children LOCATION Your hometown SEASON Autumn WEATHER Normal The Setup: Imagine you attended a city council meeting to express your concern about the side effects of a growing homeless population in your area. You plan to voice concern for your family’s safety after witnessing an increase in drug sales, sexual assaults, and public defecation. This meeting is packed with people on both sides of the issue. Some activists who attended this meeting did so in an effort to retaliate against residents who were speaking out against the homeless problem. While attending, they photographed attendees, got names and addresses off the sign-in list, and used public social media posts and press photos to identify the key participants in the meeting. Also, an online petition appearing to solicit residents to push for legislation that imposes tougher penalties against homelessness had recently been started. By the time the petition had reached several thousand signatures, including your own, it was determined that everyone who’d signed up had been catfished. The fake petition was actually started by a selfproclaimed social justice blog that published all the names, addresses, phone numbers, and personal info for the world to see. The blogger didn’t openly condone violence, but encouraged his followers to go “have a conversation” with everyone on the list to teach them the error of their ways. The Complication: Now hostile notes are being left in your mailbox, harassing calls and texts from blocked numbers are coming in, and you genuinely fear that the reprisals will become physical. How can you protect yourself against open-source information collection, harden your digital footprint, and mitigate risk without abandoning technology altogether? We asked tactical trainer Katheryn Basso and financial industry expert Dennis Santiago to weigh in with their recommendations on how to stay safe when revenge-driven people are targeting you based on what they can find on the internet.


Tactical Trainer Katheryn Basso’s Approach I used to take a lackadaisical approach to my internet and phone habits. I kept my location services on 24/7, connected Google to everything, and handed out my personal data and contact information to any account that needed it. After all, I had nothing to hide. In fact, I figured if something were to happen to me, maybe it would help the police locate me. Unfortunately, in today’s divisive climate where your beliefs, hobbies, or actions may offend the wrong person, limiting your internet footprint is vital to privacy and safety. As memberships and access to even the most mundane interests become digital, the threat of your information falling into the wrong hands increases. Your hacker could be a 13-year-old boy just testing his latest Kali Linux skills, a highly sophisticated cybercriminal who makes a living off blackmail and extortion, or a violent person looking to harm you. This anonymity makes it difficult to identify and prosecute the perpetrator — you may never know who is committing a crime against you, or why they’re doing it. You may be surprised how much of your information is already available to the public, just waiting to be used against you in some hateful campaign. However, it’s not too late. With some dedicated work, you can increase your privacy and lessen doxing damage before it occurs. Preparation Let’s first call out the biggest issue: I gave my true name and real address to an unverified online petition. Let’s say I wasn’t thinking straight and slipped up. That’s fair; it happens. In this particular situation, I assumed the petition going around was for government purposes: gather enough signatures of actual residents to push for legislation change. Most of these online petitions require personal information (full name and address) they ensure will remain “safe” within their site. In order to properly arm myself from doxing, I need to change my thinking. I need to assume a data breach will occur at some point with every online site. I’m sure you think that’s extreme, but I was in the military during the Office of Personnel Management breach. If 4.2- million current, former, and prospective federal employees’ background information can be stolen, how secure do you think your information is at the local coffee shop? Is that free coffee for joining their mailing list really worth it? One free and easy way to see if your email address and/or phone number were part of a breach is to check them at HaveIBeenPwned.com. Unfortunately, in today’s age of connectedness, digital marketing, and data analytics, most businesses and sites require a name, email address, and/or phone number to access member-only benefits. So, how can I live in today’s age of loyalty points, travel rewards, and grocery shopping discounts while also remaining as safe and secure as possible? I should assume I’ll be exposed, then take a few general security steps to mitigate the breach. 1. Remove my information from data aggregates: Third-party data mining companies have been collecting my publicly accessible information since I got my driver’s license. This includes addresses, phone numbers, email addresses, known associates, etc. The good news is I can request they remove my personal data from these sites. This is a long and tedious task, but I know it’s worth it to gain control over my security. Check


out Michael Bazzell’s IntelTechniques.com for a helpful list of data-removal options. 2. Opt for a credit freeze: Putting a freeze on your credit prevents identity thieves from attempting to open new accounts (i.e. credit cards and loans) in your name. A credit freeze doesn’t prevent you from using your current accounts. You can unfreeze your credit at any time, and it’s absolutely free. Freeze your credit at each of the three main credit bureaus. 3. Use various junk email addresses: I use multiple email addresses for my junk email — those accounts that require an email address for access. I rarely check these accounts since I know they’ll be sold to thirdparty companies for marketing. Since these accounts are usually part of breaches and aren’t tied to important accounts, any followon phishing attempts are easily spotted. 4. Create strong passwords: Most of these breaches include email and passwords. I use a secure password manager that creates strong passwords for my accounts. If you asked me what my password was for any given account, I wouldn’t be able to tell you without going into my password manager. I highly recommend you use unique passwords for each account and update them every 60 to 90 days. 5. Use a VPN: A Virtual Private Network secures your connection by creating an encrypted tunnel between your device and the website you’re visiting. This not only prevents hackers from intercepting your data, but it also masks your Internet Protocol (IP) address so your activities cannot be traced back to you. Compare VPNs before you purchase; they are not all created equal. 6. Use VOIP phone numbers: My phone is constantly talking to cellular base stations that could be used to triangulate my location. While these services are restricted to authorized personnel — like law enforcement and bounty hunters — they aren’t 100-percent safe from the human factor (disgruntled employees, assistants wanting to make extra cash, or hackers). Google numbers or paid Voice-Over-InterWHAT IF? net-Protocol numbers provide an extra layer of security between yourself and nefarious individuals. I hand out a VOIP number when required to provide full contact information. And if one of these numbers gets compromised, I can easily switch VOIP numbers without the hassle of changing my true number. 7. Encourage security habits with family and friends: Those closest to you tend to be your weakest link when it comes to securing your privacy. Again, most people don’t think about their own physical security when they’re safely behind their phone or computer screens. While social media has provided us a way to connect, it’s also a treasure trove of open-source information that can lead people to your location. How much you restrict on social media is a personal choice — I know many people who refuse to have accounts. However, you can’t always control your friends and family. I tend to have a 24- to 72-hour rule with social media; I upload pictures one to three days after an event. My friends or family, however, may upload a picture of us immediately. There’s not much you can do except avoid pictures or ask them politely to wait or remove the image. Encouraging your friends and family to follow your privacy habits may not always be easy, but it’s worth the conversation. 8. Encourage security habits with your neighbors: While the same privacyminded habits can and should be pushed with neighbors, physical security habits are just as important. After a few scary incidents here, an active neighborhood watch, security cameras and trail cams have proliferated through the community. Deterrence is important to maintain physical security, especially if one of our addresses is posted online for nefarious purposes. Crisis Now that I’ve taken certain privacy precautions, let’s return to the scenario. My name and address have been released online. All that work was easily compromised by one single mistake, yet my preparation has prevented a bigger disaster. Yes, they know my address, but my emails, accounts, credit, and passwords should still be safe. So, what are the next steps? 1) Get the police involved. Take a screenshot and report this to the police. Most states have some form of anti-harassment/anti-stalking laws that cover doxing situations. Do note, even if they’re able to take the site down, it doesn’t prevent the wrong people from obtaining my contact information. It’s out there now; it can be continually republished as long as there’s still a will to create harm. Thus, I’d request extra police presence; ask them to drive by my house as part of their rounds. Again, deterrence is important. Due to limited staffing, this may or may not be possible, but I can ask. Since I have security cameras, any physical trespassing will be caught on tape. I can provide this to the police as well to assist in their investigation. 2) Change my number. Luckily, I provided a VOIP number that can easily be changed. If, for some reason, my real number was leaked, I’d cancel that plan, get another phone, and start using a different VOIP number. Get clean first. 3) Become physically secure. Depending on the level of threats, I’d have to decide whether to stay at my residence, leave my house temporarily, or permanently move. This is a huge decision based solely on the danger and my willingness to accept risk. Often with these doxing situations, threats subside once the perpetrators move on to their next cause. I, like most people, have Googled myself. Now that I’m writing in true name and taking part in interviews, I am becoming more exposed in the public sphere. I’ve chosen a level of security that fits my goals and lifestyle: I want to exist, but not necessarily be found. The steps outlined above are a few basic privacy measures that’ll assist you in living safer in a digital age; they are by no means all encompassing, nor will they set you up for extreme privacy.


Financial Industry Expert Dennis Santiago’s Approach You wake up to a nightmare. Out of the blue your privacy has been stripped away. It’s all because you said something, wrote something, or participated in an action that you believed was moral and ethical. You expressed your opinion like a free person in America has the right to do, but an organization of strangers didn’t like it. And now you’re asking yourself three questions: What could I have done to avoid this? How do I make this end? What needs to change so it doesn’t happen to others? We’ll break that down, but first a little insight to let you know what you’re up against. This is vile, asymmetric warfare. For instance, you’re probably aware of the term “Facebook jail,” a sort of purgatory for your residual self-image in the matrix of the internet. Anything you say on social media can result in anonymous complaints being filed against you. Your accounts become increasingly restricted, if not hacked and vandalized. You don’t wind up there by accident. Somewhere out there, strangers are accusing you of being a witch, turning in complaints, and asking the algorithms, moderators, and reviewers of the web to burn you at the proverbial stake. That harassment also follows you to your workplace. The barrage of phone calls and emails affects you there too. Like the complainants on social media, this army of strangers are demanding you be fired. The company you work for goes into a panic because they’re in the headlines for all the wrong reasons. In some cases, your career may tumble out of control or come to an end. Politically outspoken people who exercise their 1st Amendment right to free speech are particular targets of this sort of harassment. Doxing doesn’t care who it hurts. It can be for any cause. In this age of the tiniest thing triggering nuclear retaliation, you could’ve said you didn’t like wearing a mask. On the internet, someone will be angry enough to take offense; and where there’s one, there’ll be many more. And some of them will be vicious. quences of what you say. They can’t expose what’s already in the open. Second, curate who you interact with. Engaging in politics with strangers is a dangerous thing we humans do to each other. Online, remember to trust no one. Do your homework and check out every person who tries to come into your orbit. Did that person actually say they believe that anyone who’s hesitant to be vaccinated should be “compelled” to do so or be banned from participating in any social activity? Did you see that person comment to someone else that they actively report persons they don’t agree with politically to the social media platform’s anonymous complaint utility? Situational awareness is something most people interested in their survival and happiness should practice. Detecting persons with dangerous antisocial traits who act on those impulses is one of those recognizefrom-afar things. It’s OK to mute friends who’ve become hyperactivated by spending time in too many echo chambers. I now do that at the onset of political election cycles. It’s better for preserving friendships based on enjoying what’s common and tolerating what isn’t. When I detect people who are truly dangerous, I just block them. I use the harshest protective tool available on the platform, and make sure I can’t see them and they can’t see me. The technical term for that in electronic warfare is “interrupting the firing solution sequence.” It’s really hard to click on the report-this-post option on a social media platform if that person can’t see the post in the first place. I’m not saying entirely avoid people who have colorful personalities, or those who have differences of opinion. That’s silly. Our ability to live within a culture of independent citizens depends on our ability to tolerate each other. You’re just trying to winnow the psychos, which is a prudent thing to do as far as I’m concerned. Third, take the time to realize that every action you take is self-revealing, like a walk What could I have done to avoid this? The first thing to realize is that doxing is a very personal version of psychological warfare. It’s very much an antisocial and cowardly act by one human against another. If it’s done to you, the people engaging in it are actual enemies. They’re seeking to exploit your vulnerabilities to intimidate you. They’re out to silence you by whatever means they can. What you need to do is minimize your target profile. The second thing to realize is that there’s no such thing as anonymity on the internet. Many people use pseudonyms. Such a practice almost always eventually gets you into trouble. It’s fun to come up with a catchy name for yourself and immerse into a role-playing persona with the anonymity of a pen name. You express thoughts standing on a soapbox from inside what feels like a cocoon of anonymity. This makes people brave, sometimes enough to take extreme edges of the argument. This is all but guaranteed to raise the ire of those who hold opposite views. Before the internet, it was difficult for these opposing parties to find each other in the real world. Conflicts were avoided simply because the pairs of volatile personalities would never meet in real life. With the internet, that barrier to interaction is gone. Billions of people can have access to every musing you express on the medium. And if they don’t like you, they’ll take note of you, not because of who you are, but because of the ideas you represent. Ideas they hate. When doxing perpetrators attack, they’re hoping the revelation of secret identity will be enough to silence the target. Avoiding an attack in the first place requires you manage your vulnerability. First, consider not being anonymous in the first place. Being yourself in the universe of debate means there’s nothing hidden to expose. It’s taking the high ground with your opinions. Revealing who you are when you open your mouth forces you to heighten your awareness of the conse-


WHAT IF? through a minefield. It’s important to know who’s real, who’s a fake personality, and what’s an artificial intelligence robot (those can now emulate humans very well indeed). They’re out there on the internet. You’ll run into them if you actively discuss current events and politics. They aren’t there to discuss things. They’re there to trigger to you discuss things and demonstrate subject matter affinity that they can sell as marketing data to other companies on the internet. It also could be as simple as ad revenue being the motivator — every digital news bureau and all their clickbait-packaged stories are all about making that topline fraction of a penny each time they get someone like you to look. On the internet, the money has always been about the commercials, the ads that get served along with the stories. If you choose to involve yourself publicly in these issues, it’s important to stay aware of this. When you post or repost a story, meme, or article, you’re revealing a piece of research information about yourself. Hundreds of algorithms go to work on that information a microsecond after you click “send.” Fourth, curate yourself responsibly. There’s a concept of how you comport yourself in public and in private that’s important to manage when interacting with the world on subjects that can trigger other people to take offense. My advice here is that what you say in public should always be measured. How you ponder the extreme ends of the spectrum of possibilities should always be private. What position you finally come up with should be a balance between emotion and reason. It’s good to take the time to research your opinion to see where it falls in the spectrum of society. Too many people think the privacy of what they type into a keyboard while alone late at night is profound, and then the sun rises in the East. Don’t be that guy. Fifth, don’t fall into the trap of trying to be the most popular person in the room. There’s a macabre thrill that comes along with seeing what you’ve said explode virally into thousands, or even millions, of likes. It can be addicting to chase popularity. The internet beguiles with tales of riches for people who have turned the corner curating themselves into a money-making operation. But for a person selling nothing but their opinions, it tends to be a chase that ends in anguish. Eventually you’ll fly too close to the sun and your wings will melt. The most important people in a room have an aura that’s easy to spot. They’re just quietly there. They aren’t the ones jumping up and down yelling, “Look at me!” You don’t have to be one of them either. How do I make this end? In this case, whether you did or did not abide by the vulnerability management things listed above, you got doxed anyway. Now what? You’re in crisis mode. First, start limiting the damage. Change all your passwords and screen names. Review all your contacts and cull anyone overtly hostile. You just hit a moment on the internet where it’s better to have a few trusted friends than thousands of acquaintances. In the worst case, suspend your accounts, if there’s an option to do so. Second, if the harassment becomes physical, don’t ignore it. Put up “no trespassing” signs at your property boundary. If it’s bad enough, change your phone number. Get a new email address. Put up multiple high-definition cameras and record everyone that comes to your doorstep. If you can, add additional cameras that record the license plates of cars coming and going. Do this until the hoopla passes. Then, you can consider going back to normality. Third, deal with the consequence effects of being doxed. If you were using


Katheryn Basso is a U.S. Marine Corps veteran trained in identifying sources of instability in foreign countries. Proficient at navigating the complex civil-military terrain of foreign policy, she has advised and advocated for military and civilian leaders from multiple partner nations. She’s currently the coowner of TEAM TORN, a tactical training company based in Nevada that instructs U.S. military, government, and civilian personnel. She specializes in firearms instruction, conflict avoidance, and personal security strategies. www.teamtorn.com About theAuthors WHAT IF? a pseudonym to hide your identity to participate while throwing flaming bombs yourself, you may now have a price to pay in the real world for having done so. That’s a risk you took. That’s a price you must be prepared to pay. I haven’t found anyone who’s done this and never had to face the day it blows up in their face. Karma. It’s real. Back to my advice, “Don’t be that guy.” But if it did happen, I have another piece of advice that’s seen me through many trying times, “Sometimes the only way to win is to lose gracefully.” That may be what you need to do. For your family’s sake, do what you need to do. What needs to change so it doesn’t happen to others? The thing about doxing is that your attackers are also ones hiding in the shadows of anonymity. I believe that’s the beginning from where society needs to mount a counterattack. Current laws and abuse reporting policies tend to protect the anonymity of whistle blowers. The problem is that these protections apply even when the whistle blowers are actually malicious witch hunters. It’s not like the social media companies don’t have records of who made the complaints against you. Users’ emails and IP addresses are retained, and the presumed anonymity of the accusers can be pierced if malice is revealed. Artificial intelligence algorithms to test for maliciousness and abusive reports can be designed. Tech companies can scrub the internet to halt a viral contagion from propagating, or to manage a political war, as we saw in 2020. The problem is that none of these systems are being used to protect the maliciously accused from frivolous attack, particularly when it comes to real-time solutions that follow the principle of innocent until proven guilty. In corporate America, risk management is designed around the exact opposite principle — the accused is in the wrong until cleared. The technologists and the legal departments that advise them should probably be pushed to get those principles into a better balance. It’s not that these detectors are hard to make either. Patterns of abuse tracking are certainly part of determining whether to put a user into virtual “jail.” Why not use patterns of abuse analysis to detect serial abusers of other people’s right to have an opinion? It’s similar to the process of hunting pedophiles online. It’s time to stop enabling abuses by the witch hunters. To be sure, such an abuse-catching system would find bad behavior across the entire spectrum of opinion in America. The internet’s technology and legal framework design enables the problem. But is it so bad that everyone will have to learn to behave and be more civil while exercising the 1st Amendment? Conclusion Anyone can be doxed. Even if you avoid social media, use a VPN, twofactor authentication, firewall, and password manager to hold each unique password for each unique secure email account from a non-attributable computer or phone, you can’t control the human factor. This isn’t just a cyber issue — it’s a life issue. And if you plan on getting involved in your community, your children’s school fundraiser, or your work’s outreach program, there’s a chance your information, such as a picture of your face and contact information, could be released to the public. That’s a part of the world we now live in. However, taking precautionary steps to limit exposure could prevent an event like this from becoming a nightmare. Security isn’t always convenient; it’s not always easy. But considering the alternative, it’s worth it. You choose — the life of an antisocial mountain hermit or existing in the real world with certain inconvenient steps to ensure privacy. Dennis Santiago is a global risk and financial analyst. His national policy expertise includes strategic warfare, asymmetric warfare, and global stability. He’s a financial industry subject matter expert on systemic risks to the U.S. economy and the safety and soundness testing of U.S. banking institutions. www.dennissantiago.com


1A/2A: OR ABRIDGING


OFFGRIDWEB.COM LEAVE NOTHING TO CHANCE For nearly 20 years, Michael Rozin has focused on terrorism prevention and security. As the president and a founding partner at Rozin Security, he’s skilled in proactive protection against terrorists and other highly motivated perpetrators of violence. Rozin began his career in the Israel Defense Forces as a sergeant in the specialized combat unit known as Barkan. After his military service, he completed an advanced security and antiterrorism training program at the Israel Security Academy under the oversight of the Israel Security Agency. He then joined the Israel Airport Authority, where he worked as a security agent for Ben-Gurion International Airport in Tel Aviv. In 2005, he received an award for excellence for his performance at the agency. In 2006, Rozin was hired as the Special Operations Security Captain at the Mall of America in Minnesota. In this role, he developed, implemented, and managed a behavioral detection unit and various programs focused on counterterrorism at this densely populated venue. These initiatives proved to be so effective that they were presented to the U.S. House of Representatives Committee on Homeland Security as a model for security in the private sector. Rozin is a regular guest speaker at law enforcement conferences on counterterrorism and other proactive security methods. He has trained a number of law enforcement and security agencies on counterterrorism and tactical response techniques. In addition, Rozin works as a faculty member at the University of Minnesota’s Master of Science in Security Technology program. In this role, he teaches the principles of security risk assessment and the integration of psychology, behavior threat detection, and technology in a security operation. Rozin is a graduate of the Institute of Counter-Terrorism in the Interdisciplinary Center in Hertzliya, Israel, where he attended a masters level executive counterterrorism studies program. He’s also a certified Krav Maga instructor and fluent in Russian, Bulgarian, Hebrew, and English. RECOIL OFFGRID: Tell us about your service in the IDF. Did you specialize in anything particular? How did that prepare you for work within the Security Services later on? Michael Rozin: I was honored and lucky to be able to serve in the Israel Defense Forces and contribute to the safety and security of the State of Israel. I served in a unit called “Barkan.” Barkan is a small special operations unit equipped with a Stinger anti-aircraft missile and tasked with preventing enemy aircraft from reaching their targets in difficult environments. My service in the IDF helped me learn how to be organized, disciplined, and capable of going beyond what I thought was possible. I enjoy the power of challenge and discomfort. I developed some of the best friendships in my life, as well as a keen interest in serving the State of Israel and protecting it from threat actors who could immediately cause harm to my family and friends. That call to protect, and the impact of effective security, is what directed me toward my career. My dream became to work for the security services in Israel and continue to serve and protect my country and my family while working in the private sector. I was thrilled to be accepted in the Israel Security Agency academy for protective agents. There, I rediscovered the As a Security and Counterterrorism Expert, Michael Rozin is in the Business of Staying One Step Ahead of Modern Threats By Mike Searson, Photos by Samantha Lauraina


Right: Roll call for highly skilled security operators proactively deployed by Rozin Security. importance of discipline, perseverance, and commitment. The ISA training pushed me beyond what I thought I was capable of, and for that, I will be forever thankful. What were some of the biggest challenges you faced when dealing specifically with airport security? MR: The weight of ensuring I don’t miss a terrorist or another threat actor was significant. I was responsible for thousands of lives. I took my job seriously and have always been concerned about the possibility of missing the indicators and failing to identify and stop potential perpetrators proactively. In parallel, I was challenged to balance humans’ desire for convenience and security. What led you to bring your experience and business to the U.S.? MR: I’d never imagined that I’d live and operate a business in the United States. God, however, had this plan in place. I met my life partner, wife, and now a co-owner of our business in Israel. It was love at first sight. She is from the U.S., and several years after our initial meeting, I followed my heart and found myself with her in Minnesota. Once here, I realized how impactful the knowledge and experience the State of Israel taught me could be. Thus, I decided to dedicate my career to help the U.S. prevent mass violence and other nefarious acts, and to be an ambassador of sorts for the Israeli security industry. Michael Rozin providing deployment briefing. How have the advent of COVID-19 and its associated restrictions and social distancing requirements affected your approach to large event security? MR: Simply put, currently, there are not many mass gatherings that occur. Thus, the need for security of large events has presently been put on pause. COVID has also temporarily changed the threat landscape. We believe that next year, as COVID is getting under control, we will see a spike in violence across the United States. We hope organizations take the time now to invest in effective security measures. Much of your methodology focuses on behavioral profiling. But in American law enforcement, “profiling” is


a controversial term that stirs up fears of racism. How would you explain behavioral profiling to people who have these kinds of concerns? MR: The word “profiling” in the context of law enforcement in the U.S., given its history, is associated with racial profiling and discrimination. However, behavioral profiling is precisely the opposite of racial profiling for the following reasons: Behavioral profiling cannot focus on one characteristic like age, gender, or race. If it were going to do that, it would leave the asset exposed to danger and unprotected. The factual reality in the United States is that threat actors vary significantly in their ethnic, cultural, gender, and socioeconomic characteristics. Thus, if a security apparatus is focused on such characteristics, it’s like having a door, but not a wall. Behavioral profiling is a highly effective and systematic manner of identifying individuals with potential intent to cause harm. It’s based on proven, scientifically validated principles, which show that people who intend to conceal their true intentions within a properly designed security environment display common indicators of potential malicious intent. These indicators cover things like actions, behavior and appearance, belongings, abnormality from expected norms, identification, and documents. These groups of indicators don’t correlate with one’s race, ethnicity, gender, or socioeconomic status. At its core, behavioral profiling is designed to allow the security professional to rapidly assess any protected environment populated with a number of people and proactively select those that require additional attention. It’s an intelligent, risk-based approach to security that allows us to allocate proper resources to situations and individuals that require it, rather than waste resources where there’s no need for additional protection. Racial profiling is not only morally and ethically wrong, it’s also operationally ineffective. The history of planned acts of violence in the United States and beyond teaches us that perpetrators of such acts vary based on ethnic, socioeconomic, religious, cultural, and gender characteristics. Therefore, from the operational standpoint, focusing on any one of these characteristics is ineffective and exposes the protected environment to a multitude of threat actors. Our research and methodology are concentrated strictly on proven behavioral, action-based, informational inconsistencies, and other indicators commonly associated with perpetrators of planned acts of violence. These indicators signal the security personnel to act proactively and attempt to refute any identified security concern. Behavioral profiling sometimes gets miscategorized LEAVE NOTHING TO CHANCE Identification and management ofrisk requires significant time behind the desk and on the phone with clients, partners, and the team. as instinct, intuition, or having a hunch. Can you talk a little bit about some of the hard science that goes into reading human behavior, and what makes behavioral profiling effective and repeatable? MR: Behavior profiling is at times mistakenly looked at as an intuition-based security concept. While intuition always plays a role in humans’ ability to survive a dangerous situation, the professional behavior profiling security system is based on: 1) an extensive operational research of common aggressors’ tactics, techniques, and procedures, and 2) scientific research of humans’ brain functionality, response to different forms of danger, and the human body’s cardiovascular activity. Specifically, professional behavioral profiling is based on the extensive research of scientists like the following people: Nobel Prize winner professor Dr. Daniel Kahneman, who understood the significance of two distinct brain functionalities and how they affect deception, response to complex situations, and information U.S. scientist Paul MacLean who discovered an evolutionary triune brain theory Well-known scientist Dr. Paul Ekman who connected the facial expressions to emotions felt by humans Psychologist David Meyers, who interpreted the


036 OFFGRIDWEB.COM 1A/2A: OF SPEECH, tive part of any well-rounded security professional who interacts with multiple cultures and needs to adapt fast to any environment. Knowing multiple languages helped me on several occasions to obtain critical information required to resolve or de-escalate identified threats. On hundreds of occasions, knowing the language helped me establish an immediate rapport vital in solving the security task at hand. I enjoy learning new languages and am currently working on advancing my Greek and Arabic. In your role as Special Operations Security Captain at the Mall of America, what were some of the programs you implemented to enhance emergency preparedness? How can these be applied on a larger scale throughout the U.S.? MR: As a Special Operations Captain in Mall of America, I’ve had the privilege of instituting several programs geared toward protecting it from mass violence. At the core, in partnership with Mall of America senior leadership, I have developed a Risk Assessment and Mitigation program. This innovative behavior threat-detection program allowed Mall of America to prevent several potential planned acts of violence, enhance overall security, and importance of the true responses of our brain to perceived danger Daniel Goleman, who interpreted the authenticity of limbic brain elicited behaviors Amanda Gregory, a behavioral researcher who validated several significant behavioral interpretation principles Mark Knapp, a well-known nonverbal communication researcher There are many other experts from within the security and intelligence agencies community as well. Behavioral profiling has proven to be one of the most effective security tools because it’s one of the only reliable security measures. When appropriately applied, it allows Law enforcement processionals are part of the Rozin Security team. The Rozin Security analyst team is working around the clock to provide invaluable information to clients and teams on the ground. LEAVE NOTHING TO CHANCE for proactive identification of the threat actor before the incident occurs. It’s also easily applicable to open and close operational environments, and could become a central security strategy supported by physical measures and technology. We were impressed to learn that you’re fluent in four languages. Do you consider language proficiency a survival skill? Have there been instances in your career where it helped you recognize a threat? MR: Thank you! I do believe language proficiency is a critical survival skill in modern-day life. Languages are also a window to the local culture and thinking. It’s an impera-


038 1A/2A: OR OF THE PRESS; become valuable sources of actionable intelligence information for the state and federal intelligence services while improving the customer service and overall image of Mall of America. This program was presented in July of 2008 to the United States House of Representatives Committee on Homeland Security as a model, and best practice for securing mass gathering places post Sept. 11. Have you noticed any substantial differences between the Israeli and American approaches to counterterrorism tactics, gear, or mindset? MR: There’s a difference between the Israeli and the U.S. approach to counterterrorism. While the U.S. gear is a bit more sophisticated and is more abundant, I found that the Israeli mindset of proactivity, direct and aggressive engagement runs in contrast to the more reserved and measured U.S approach. How do you feel uniformed versus plain-clothes security affects possible threats? MR: Both uniform and plain-clothes security personnel play an important role in any security operation. Uniformed security can act as a direct and visible deterrent. This can stop a number of small-scale threats. Plain-clothes security has two different types: a) visually undercover; and b) completely undercover. The visually undercover personnel create a sense of unpredictability for any potential perpetrator and significantly contribute to deterrence. The completely undercover plain-clothes security are primarily tactical personnel enabling quick and tactically advantageous response to unfolding security incidents. Thus, the completely undercover officers are primarily enhancing the response function of any security department. What are some steps the average individual can take to improve the safety of their family in a crowded public setting? MR: The biggest and most important step is basic situational awareness. Know where you are and be aware of your surroundings at all times. Whether you’re going to your job, going to the market, or to an event, pay attention to what is going on at all times. What types of problems are typically spontaneous among large crowds, and what types of threats are planned? MR: Large gatherings represent an attractive target for anyone wishing to carry out a mass-violence incident. Therefore, security professionals must consider threats, such as an active assailant, explosive device, vehicle ramming, or a weaponized drone. When it comes to public protests that attract large crowds, there’s an added threat Physical security measures enacted by the City of Minneapolis during a period of increased risk. LEAVE NOTHING TO CHANCE


AVAILABLE WORLDWIDE SELF-PACED EASILY ACCESSIBLE Online Trauma Management Training Use code OFFGRID25 at checkout to get 25% OFF courses.


040 OFFGRIDWEB.COM 1A/2A: OR THE RIGHT MICHAEL’S EDC: - Smith & Wesson M&P Bodyguard 380 - ASP Agent Infinity Concealable Baton - ASP Palm Compact Defender Pepper Spray - Tactical knife (custom made for Krav Maga instructors) with glassbreaker and belt cutter MICHAEL ROZIN HOMETOWN: Minneapolis, MN EDUCATION: Counter-Terrorism Studies, Institute for CounterTerrorism at the Interdisciplinary Center, Herzliya, Israel CHILDHOOD IDOLS: Michael Jordan and Jean-Claude Van Damme RECOMMENDED READING LIST: The Black Swan by Nassim Taleb Thinking, Fast and Slow by Daniel Kahneman Telling Lies by Paul Ekman The Gift of Fear by Gavin de Becker Blink by Malcolm Gladwell FAVORITE MOVIE: Munich (Steven Spielberg version) FAVORITE DRINK: Single malt scotch (Balvenie DoubleWood 17-year-old) FAVORITE QUOTE: “Your attitude, not your aptitude, will determine your altitude.” –Zig Ziglar of spontaneous violence coming from agitators mixed within the crowd. These agitators specialize in inciting violence from inside the group or, most commonly, confrontations between the protestors and law enforcement. Members of the public attending the protests and police forces must be trained on quickly identifying and isolating these agitators to prevent widespread incidents from erupting. How do U.S. self-defense laws differ from self-defense laws in Israel? MR: The self-defense and overall use-of-force laws and methods in Israel are significantly stricter and more effective, I feel, than the ones currently in the United States. The overarching principle in Israel is that for anyone to consider someone a lethal and immediate threat, two factors must be present simultaneously: 1) demonstrated intent to carry an act of violence, and 2) displayed means for the attack. Only when these two factors are present at the same time, it is allowed to deploy lethal measures. In Israel, there’s also a significant training and examination given to security, law enforcement, and even civilians who can carry firearms to ensure they can follow this principle under stress. The laws are simple, and the training is highly effective. Additionally, the Israeli Krav Maga training is mandatory training for security and law-enforcement personnel in Israel. The Krav Maga system is highly effective, as it eliminates other types of ineffective and significantly more damaging force. One of the complicating factors in the United States is that this country is built out of 50 different states with 50 different sets of laws, methods, training requirements, and philosophies for self-defense and use-of-force. Thus, there is no uniformity in laws, training, and philosophy. Additionally, the self-defense concept in the United States is fuzzy, many times with multiple complicated options given to individuals with minimal training. Lack of uniformity and complex laws and guidelines can create unrealistic expectations for individuals to follow the U.S. self-defense laws properly under stress. MILITARY EXPERIENCE: Barkan Unit, The Israel Defense Forces URL: rozinsecurity.com LEAVE NOTHING TO CHANCE


BUILT SMART, BUILT TO LAST PREPARE WITH PURPOSE. The COAST F401 does it all— from basecamp to bunker and beyond. lifetime warranty COASTPORTL AND.COM A CENTURY IN THE MAKING DESIGNED IN PORTL AND, OREGON A COAST LIMITED EDITITION with purchase at: c o a s t p o r tl a n d.c o m / r c o g FL75R RECHARGEABLE HEADLAMP FREE GIFT


Using Software Defined Radio forthe Information Edge: Part1 By W.Dean Freeman Whether you’re on-grid or off, information is king. The data traveling around us via radio and microwaves can provide a wealth of intelligence about what’s going on, be it in our neighborhood or around the world, for anyone who can tap into it and make use of it. Thanks to advances in Software Defined Radio (SDR) receivers, anyone with a couple hundred dollars and some modest skills can turn their computer or tablet into a signals intelligence platform that was once the exclusive, multimillion-dollar domain of governments. In this series, we’ll discuss the basics of SDR, from selecting the right receiver and antennas, to basic setup for gathering both communications intelligence (COMINT; listening to audio transmissions) and signals intelligence (SIGINT; receiving other types of signals such as tracking aircraft or getting weather satellite images). The Setup: What is SDR? While traditional radio receivers are hard-wired to handle only specific bands and modes, software defined radios (SDRs) leverage computer processors and software to perform most of the demodulation. This allows a small package of radio frequency (RF) sensing hardware to support a wide range of frequencies and the ability to listen into all modes of transmission. The receiver itself still has some limitations in terms of the range of frequencies it can support, the receive bandwidth, and so on. However, compared to traditional radio receivers that may support a handful of modes and bands, the limits seem to fade away. The flexibility comes at the price of the tyranny of choice, however. You need to not only choose the right piece of hardware for your purposes, but also learn to leverage various software packages to take full advantage of the capabilities. 042 OFFGRIDWEB.COM AIRWAVE AUTONOMY 1A/2A: OF THE PEOPLE


Choosing the Right SDR Perhaps the most popular SDR devices on the market today are those that rely on the RTL2832 chipset, commonly referred to as the “rtl-sdr.” These come in a number of flavors, such as the NooElec NESDR. Other popular SDR receivers include the SDRPlay, AirSpy series, and the HackRF. Some, such as The Great Scott Gadgets HackRF, can transmit as well, albeit at extremely low levels of RF output. Each of these devices have their own pros and cons. Personally, I have both a NooElec NESDR Smart rtl-sdr as well as a HackRF. For those just getting started, I recommend the NooElec. A great starter bundle can be had on Amazon for $99, which includes the NESDR Smart, the NooElec Ham It Up upconverter, some antennas, and adapters. The bundle allows the reception of signals down to 300Hz and up to 1.7GHz, giving a receive range of all high-frequency communications, including shortwave radio stations, and up into some of the microwave bands used by aircraft and satellites. Choosing the Right Antenna There’s nothing magic about SDRs, so all the usual considerations regarding antennas apply if you want high performance. The better your antenna placement, and the more resonant it is on the bands that you want to receive, the better. For most applications, low-gain whip antennas will be fine. However, for receiving highly polarized, highly directional microwave data from satellites, directional antennas (those that focus the transmission or reception) need to be used. If you already have an established antenna deployment, you can share the antenna with both your traditional radio transceiver and the SDR using a device OFFGRIDWEB.COM 043 ISSUE 45


to their HF transceiver. Personally, I run Linux on my main laptop as well, but with a little research you’ll find something that suits you on whatever platform you choose. Getting Started: The Install Getting set up to listen to analog transmissions on VHF and UHF bands is incredibly easy. The demonstration is based on Gqrx, but the setup will be similar regardless of platform. Installing the application and its supporting libraries is an easy point-and-click operation in modern Linux distributions. Search for “Gqrx” in the software store application on Ubuntu or Fedora Linux and click install. Once it’s installed, it’ll be ready to launch. Before launching the software, connect the antenna to the SMA connector on the RTL dongle and then plug the USB into your computer. When you launch Gqrx for the first time, you’ll be asked to do some initial configuration. At this time, all you need to do is fill in the device string to read rtl=0 and then hit OK. When the main window comes up, hit the Play button and you should begin receiving radio signals. There are a lot of controls and options, but you only need a few to get started. Above left: SDR equipment and antennas can pack small. Often, the largest piece of equipment is going to be the laptop. You may consider an Android tablet or phone as well. Above right: The SuperAntenna MP1C is a portable antenna system utilizing a loaded coil system for tuning the antenna. This same antenna can be used with a standard transcienver such as the popular Yaesu FT-891. such as the MFJ-1708SDR. This gives you the added benefit of a wide-bandwidth panadapter display for your radio, if it doesn’t have one of its own. For COMINT collection, any wire antenna or vertical whip which is resonant on high frequency (HF), very high frequency (VHF), or ultra-high frequency (UHF) bands that you have interest in is all you need. Choosing the Right Software The software that you use for your SDR will come down to a few criteria: • The mission at hand • What’s available for your chosen platform (both the operating system on your computer as well as what supports your chosen SDR receiver) • Cost Free and open-source (FOSS) platforms such as Linux have a plethora of choices available when it comes to SDR software, and they’re generally free. The GNU Radio project provides tools and libraries, which others have built upon to provide easy-to-use frontends for various purposes. On Linux, my favorite choice is Gqrx, which is easily installed through the package manager in any user-friendly Linux distribution such as Ubuntu. Windows users will find SDR# is a popular choice. For mobile operations where weight is a consideration, bringing a full laptop may not be the best option. If you choose to use an Android phone or tablet, you’ll find programs such as RF Analyzer available in the Google Play store. This allows you to use an RTL-SDR for much the same purpose in a smaller package. Many people in the amateur radio community use small computers such as the Raspberry Pi, running Linux, for both SDR purposes as well as running digital modes attached 044 OFFGRIDWEB.COM 1A/2A: PEACEABLY


The main window looks like this: In the main pane, you see it’s split into two. From left to right, you see a spectrum analyzer which shows relative amplitudes in different frequencies within the receive bandwidth. Below that, you see a waterfall display showing the historical record of what was received on any given frequency and is read vertically. To the right, we see that by default the Receiver Options are selected. The main control here you need to be aware of is the “Mode” selection. Different types of communications require a different demodulation mode. In general, just be aware of the following: • Use WFM for commercial FM stations • Use AM for air and marine band VHF/UHF, shortwave broadcasts, and commercial AM radio • Use NFM for 2-way analog VHF/UHF in amateur or public safety bands • For HF amateur radio transmissions, follow convention (USB in 20m and LSB in 40m, for example) Knowing Where to Listen: VHF and UHF You’ll likely know your favorite commercial FM stations in your area off-hand. If you’re a licensed ham radio operator with at least a tech class license (refer to our article “Can Anyone Hear Me?” in Issue 38 for more details on ham radio capabilities and licensing), you probably know the output frequencies of repeaters in your area that you can hit. If you don’t already have that information, there are Above:Gqrx provides a waterfall display to show signal intensity (X-axis) overtime (Y-axis), with colorindicating signal strength. Here, we see the waterfall display for some broadcast FM stations in the Austin, Texas, area. Note that the mode is set to Wide FM. two great sources. First, to find repeaters in your area of operations (AO), The Repeater Book (www.repeaterbook. com) is where you want to look. To find air, public safety, and commercial frequencies in your AO, check out www. radioreference.com. For instance, to find out what frequencies and modes are in use at my nearest airport, Austin-Bergstrom, all I need to do is look it up: Of course, you can always just tune around. One of the major advantages of an SDR versus running the scanning feature on a handheld radio is that you can see the spectrum activity across the entire receive bandwidth, giving you a quick visual indicator of activity that you might want to investigate and listen in on. OFFGRIDWEB.COM 045 ISSUE 45 AIRWAVE AUTONOMY


Above: The Nooelec RTL-SDR bundle is a common, inexpensive way to get into SDR, including the ability to access HF bands with the Ham It Up up-converter. Depending on the antenna you want to use, you may need different cables. Right: Here, the MP1C is set up on a standard, low-profile tripod with a flexible whip on top. The system is modular and can be configured in other ways depending on conditions. Above: If you wantto utilize HF bands,the upconverter must be in line between the SDRand the antenna, with the antenna connected to “RF IN.” Top: The RTLSDR must then be connected via USB to the laptop. If you want to operate only within the range of the RTL-SDR, you can leave the upconverter out of the circuit entirely, leave it unpowered (not connect its own USB power cable to the laptop, as pictured), or use the “Passthrough” switch. The Ham It Up fails open, so it can work unpowered. Shortwave and HF Listening In a truly grid-down situation where the radio is your only tool to find out what’s going on in the world, the ability to listen to shortwave radio broadcasts and 2-way HF communication from hams or other radio operators could be a lifesaver, making an SDR receiver a prime source of intelligence. Just make sure you have a reliable emergency power source for all your electronic equipment, such as a solar backup system or a generator. Unfortunately, we can’t use the RTL-SDR by itself to receive most shortwave or other HF frequencies, such as those used by amateur radio operators, militaries, and the like. This is where the NooElec Ham It Up TXCO Up Converter comes in. This device is put in-line between the antenna and the SDR dongle, and shifts the RF signal into a frequency that’s within the receive range of the RTL-SDR. Once the box is placed in-line with the “RF IN” connected to the antenna and the “RF OUT” connected to the RTL-SDR, power it on and make sure that the switch is set to “UPCONVERT”. The upconverter has a 125Mhz offset, so in order to make use of it, there are two options. The first is to add 125Mhz to every frequency that you want to listen to, but that’s tedious and prone to mistakes. The second option is to configure your SDR software to calculate the offset and allow you to directly input the frequency that you want to listen to. Option two is far better, and is 046 OFFGRIDWEB.COM 1A/2A: TO ASSEMBLE,


Emergency and Tactical Uses of SDRs Step-by-Step SDRSetup Monitoring emergency communications Listening to radio news and NOAA weather broadcasts Pulling down weather satellite images Tracking aircraft 1. Have your SDR gear ready (computer, SDR device, up/down converters, antenna, cables) 2. Install the software of your choice (Gqrx, SDR#, etc.) on the computer 3. If necessary, connect the up/down converter to the SDR 4. Connect the antenna to either the SDR or the up/down converter 5. Connect the SDR system via USB to the computer 6. Start the application 7. Choose your device 8. Start listening ISSUE45 OFFGRIDWEB.COM 047


accomplished by adjusting the setting LNB LO (Low Noise Blank Local Oscillator) setting in the Input Settings: Since we’re using an upconverter, we give a negative offset, so the field should read -125Mhz. Then here, coupled with a Super Antenna MP1C vertical whip antenna slide tuned to 20m, we can see we’re able to receive a shortwave radio station from Latin America on 13.818Mhz. With the I/Q recorder, we can record the broadcast to replay at a later date, transcribe, or translate. Conclusion With a few dollars spent, you now can listen in on analog communications, whether they’re around the world or in your neighborhood, helping to turn the RF spectrum into a source of information to give you the edge when it comes to situational awareness. This just scratches the surface of what SDRs can help you do when it comes to preparedness and intelligence gathering. In a future article, we’ll discuss using SDRs to intercept digital transmissions, such as satellite phone transmissions, aircraft transponders, and weather satellite imagery. 048 OFFGRIDWEB.COM 1A/2A: AND TO PETITION AIRWAVE AUTONOMY


Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.