Honoring Marc Lee: America’s Mighty Warriors and What We’ve Done With Your Help

Today marks the fourth year I’ve been able to remember Marc Lee here on ITS Tactical. Marc Lee was the first Navy SEAL killed in Iraq on August 2nd, 2006 and I had the honor of serving with him in the Navy while I was at BUD/s.

Marc was awarded the Silver Star posthumously for his brave and unselfish actions on a Ramadi rooftop. As stated in his award citation, he was conducting clearance operations in south-central Ramadi with members of a Naval Special Warfare Combat Advisory element.

[flickr id=”5764853419″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

This is also the second year we’ve been able to raise money for Marc’s mother’s charity, America’s Mighty Warriors, thanks to your help in purchasing  5.1.11 Morale Patches.  It was designed to commemorate May 1st, 2011 and the fantastic operation that Marc’s teammates from DevGru executed in killing Osama Bin Laden.   Continue reading

Posted in Memorial | Tagged , , , , , , | 2 Comments

ITS Tactical Introduces the Skeletonized Bottle Holder for Liberty Bottles

We’re proud to announce a new collaborative project between ITS Tactical, Zulu Nylon Gear and Liberty Bottleworks called the Skeletonized Bottle Holder.

Designed and manufactured by ITS Tactical and Zulu Nylon Gear right here in America, the Skeletonized Bottle Holder represents a fresh new approach to a bottle carrier. We wanted to break the mold of current bottle carrier designs that utilize a pouch-like design, adding unnecessary weight and bulk.

[flickr id=”7698048194″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7698048288″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

Featuring a lightweight skeletonized design made from HDPE stiffened double-layer webbing, textured pull-tab for a non-slip grip and shock cord retention to allow one-handed container deployment, the Skeletonized Bottle Holder is fully adjustable to fit multiple container styles and diameters. It can also be mounted via MOLLE/PALS and adapted to accommodate any belt size.

[flickr id=”7698048436″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7698048586″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7698048506″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

The Skeletonized Bottle Holder prototypes are debuting today at Outdoor Retailer in Salt Lake City and will be for sale right here in the ITS Tactical Store when released.  Stay tuned for the launch date and more information!

Update: If you’ll be at OR this week, you can stop by Liberty Bottleworks’ booth (#56008) and check these out for yourself! Here’s some photos below right from the floor of OR at the Liberty Bottleworks booth!

[flickr id=”7699043078″ thumbnail=”original” overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7699042956″ thumbnail=”original” overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7699043162″ thumbnail=”original” overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7699042846″ thumbnail=”original” overlay=”false” size=”medium” group=”” align=”center”]

 

Posted in ITS Information | Tagged , , , , , , , , , , , , , | 30 Comments

The Gift of Fear and other Survival Signals that Protect us from Violence

Gift of Fear Book

I’ve recently finished reading a book by Gavin De Becker called The Gift of Fear. While book reviews are something we don’t often cover on ITS, this is a book that I not only feel each of you should read immediately, but that every member of your family should read as well.

This is hands down, one of the best books I’ve ever read and the most applicable to any of the skill-sets we advocate here on ITS. Primarily, what we all encounter on a daily basis, fear of the unknown.

De Becker describes this fear of the unknown as unwarranted and a curse, while advocating true fear as a gift. This book explains how to tell the difference between the two and teaches us how to trust and act on our gut instincts. This book could truly save your life!

Gavin De Becker

I’d like to take a paragraph to introduce De Becker and what makes him an authority on the subject at hand, because like you, I was skeptical until I started reading the book, which has become a bible for me personally.

Gavin De Becker is a three-time presidential appointee whose pioneering work has changed the way our government evaluates threats to our nation’s highest officials. His firm advises many of the world’s most prominent media figures, corporations and law enforcement agencies on predicting violence and it also serves regular citizens who are victims of domestic abuse and stalking.

De Becker has advised the prosecution on major cases, including the O.J. Simpson murder trial. He has testified before many legislative bodies and has successfully proposed new laws to help manage violence.

His biography might read well, but I’m here to tell you that this doesn’t even scratch the surface of what information he brings to the public with The Gift of Fear or what his organization, Gavin De Becker, Inc., has done to help through their vast resources and organizations they support.

The Gift of Fear

Around two years ago I wrote an article titled Dealing With Violent Confrontations and have even recently shared my experience with a fear inducing incident of my own. What I have always and will always advocate, is trusting your gut (i.e. listening to your instinct.)

I picked The Gift of Fear up after the recent incident I mentioned, because I wanted to learn more about what I experienced and how I handled the situation. While I had a lot of supportive comments and people sharing stories of their own fear inducing experiences, there were also many that wrote it off as nothing more than American paranoia.

Through reading The Gift of Fear, I’ve found an authoritative voice stating that I did exactly what I should have in that incident. Put manners aside, quieted my mind and listened to my instinct. While it’s hard to address feelings and emotions, let alone instinct, in the article I described my response to an unidentified man who quickly and feverishly approached my personal space. I’ll let you read the article for yourself if you haven’t yet.

De Becker describes listening to your instinct as law and that if you’re constantly living in a state of fear and paranoia, you won’t be able to hear your instinct in the situations where it’s warranted and trying to save your life.

There’s a fantastic comparison in the beginning of The Gift of Fear that really brought things into perspective for me. De Becker relates the intuition of humans to animals. Our intuitive abilities are superior to that of animals and that we’re in top form because we add to our experiences every day. The thing about animals is that we as humans have something extra that they don’t; judgement.

It’s also that thing called judgement that gets in the way of our perception and intuition. It causes us to disregard our intuition unless we can explain it logically, rather than honor it. No animal in the wild would suddenly be overcome with fear and spend their mental energy thinking that it’s probably nothing.

Unfortunately, De Becker describes our initial response as writing off the feeling of someone’s unusual behavior being sinister as being paranoid instead of appreciating the powerful internal resource. We rush to ridicule the impulse, especially in others, as witnessed by the comments in my article.

We, in contrast to to every creature in nature, choose not to explore – and even to ignore – survival signals.

Violence for All

Something that I also sat up and took notice of is that De Becker states that people who commit terrible violence choose their acts from among many options that we’re all capable of imagining.

Just the fact that we’re all capable of being able to conceive terrible violence is evidence that anyone can do the same, even those willing to act on it. The real lesson from De Becker in this situation is that to work towards prediction and prevention, we have to accept that these acts are done by the “we” of humanity not by interlopers who somehow sneaked in.

Something we’ve also been seeing first hand in the news reports from the Aurora tragedy, are interviews from people who knew James Holmes as a quiet guy, or someone who kept to himself. De Becker talks about this too as a hackneyed myth and that a more accurate statement should be “neighbors didn’t know anything relevant,” but instead news reporters present non-information as if it’s information.

De Becker states that by the frequency of this cliché, you could almost believe that normalcy is a pre-incident indicator for aberrant crime. It isn’t. However, one of the most common pre-incident indicators, is violence in one’s childhood.

Predicting Violence

Predicting stranger-to-stranger crimes is based on a few details, as De Becker describes, but even the simplest form of street crime is preceded by a victim selection process. These can include being the right appearance or “type” and generally outside the victim’s influence. I would add though that being a harder target will also cut down on allowing yourself to appear to be the right type.

De Becker breaks this down too into conditions that make someone available to a criminal and that are completely within our control. For example, accessibility, setting and circumstance. “Will you engage in conversation with a stranger when you’d rather not? Can you be manipulated by guilt or the feeling that you owe something to a person just because he offered assistance? Will you yield to someone’s will simply because he wants you to, or will your resolve be strengthened when someone seeks to control your conduct? Most importantly, will you honor your intuition?”

Intuition falls right back into predicting violence and it’s always learning. De Becker states that some signals it sends may occasionally be less urgent, everything is meaningful and unlike worry, it won’t waste your time.

Living in Fear

De Becker explains that fear is something that surrounds us always, but walking around in a constant state of vigilance can misinform your intuition about what really posses danger. This is something I digested very carefully, as I take situational awareness very seriously and still do after reading this book. I don’t consider my situational awareness as being hyper vigilant either, I feel it’s balanced well and that I’ve refined it even more after De Becker’s advice.

Honoring accurate intuitive signals and evaluating them without denial (believing that either favorable or unfavorable outcome is possible,) you need not be wary according to De Becker, for you will come to trust that you’ll be notified if there’s something worthy of your attention. Fear will gain credibility because it won’t be applied wastefully.

“When you accept the survival signal as a welcome message and quickly evaluate the environment or situation, fear stops in an instant. Thus, trusting intuition is the exact opposite of living in fear…While few would argue that extended, unanswered fear is destructive, millions choose to stay there. They may have forgotten or never learned that fear is not an emotion like sadness or happiness, either of which might last a long while. It is not a state, like anxiety. True fear is a survival signal that sounds only in the presence of danger, yet unwarranted fear has assumed a power over us that it holds over no other creature on earth.”

De Becker lists two rules about fear and that if you accept them, they can improve your use of fear, reduce its frequency and transform your experience of life.

  • Rule #1. The very fact you fear something is solid evidence that it is not happening.
  • Rule #2. What you fear is rarely what you think you fear, it is what you link to fear.

Rule #1 couldn’t be any more true. How many times have you lied there in bed thinking about what would happen if someone was standing over your bed right now with a gun. Guess what, the thought is precisely all the evidence you need to know that very thing you fear is NOT happening.

The second rule is one that needs a little explanation from De Becker. His example is the fear of getting up and addressing five hundred people at an annual convention. The fear is not just the fear of embarrassment, it’s linked to the fear of being perceived as incompetent, which is linked to the fear of loss of employment, loss of home, loss of family, your ability to contribute to society, your value, in short, your identity and your life.

When you truly analyze what it is you fear and it’s chain of causality, it can help alleviate that fear or let you know exactly what you need to change to alleviate it.

Other Topics

Some of the other great topics De Becker address in The Gift of Fear are workplace violence and the pre-incident indicators surrounding it and help in predicting it. There’s also fantastic help-giving resources near the end of the book, such as questions you should be asking your child’s school.

For example, are background investigations performed on all staff? Are acts of violence or criminality at the school documented? Are the statistics maintained? May I review the statistics?

There is one part in the book’s appendices that talks about gun safety and this is the only part of the book that I don’t completely agree with. Rather than discuss it here, I’ll leave it up to you to review it yourself.

Again, I can’t suggest enough that you and your loved ones read this book. Even if your spouse doesn’t share the mindset you do, The Gift of Fear does an excellent job of speaking directly to everyone, regardless of their mindset, preconceived notions or beliefs. I implore you to find the time to purchase and read The Gift of Fear, I can’t think of a better way that a few hours and ten bucks could transform your life and potentially save it.

Posted in Mindset | Tagged , , , , , , , , , , , , , , , , | 21 Comments

Inside Red Team Operations, Part 1: Planning, Recon and Equipment

1 of 3 in the series Inside Red Team Operations

RedTeamsMainIn this three part series we’re going to go through what it takes to perform a security vulnerability assessment that would ultimately end in the penetration of the target.

In part 1 we’ll talk about planning the operation, digital & physical recon and some of the kit we might need. In part 2, we’ll analyze the information gathered during the recon, plan and rehearse the operation and perform a dry run. This will test what we’ve learned and polish our plan. In part 3 we’ll execute the operation and plan for contingencies when things don’t go as planned.

What is a Red Team?

In the world of computer and information security, a red team is a group of highly skilled experts hired to provide adversarial services, i.e. to act like attackers. The goal of red team operations is to continuously challenge the plans, defensive measures and concepts of the organization.

These exercises result in a better understanding of possible adversaries and help to improve counter measures against future threats. Red teams are also tasked with probing physical security measures, sometimes as part of an overall digital/physical assessment and sometimes as a project of its own.

This series will focus on a combination of both physical and digital vulnerability assessments, as well as penetration of the target. This way you can see the techniques needed for both.

It is important to mention that each project/operation is different and the techniques described here will have to be adapted, changed or completely dropped based on the target. It is also important to mention that I will keep the technical details to a minimum. I’m doing this for two reasons; one, because not everyone reading this has a background in computers and two, because I don’t want to show the bad guys any technique they can use.

With all this in mind, let’s begin.

The Project

We’re tasked with penetrating the internal network of a fortune 100 company. If successful, we are also tasked with acquiring highly sensitive marketing documents.

There are many ways to try to penetrate their network and systems but we are going to focus on two. We will try a purely digital approach first, if it fails, we’ll try a physical approach that might give us a way into their network.

The digital approach usually entails scanning their public facing systems in search for a vulnerability to exploit, or a more direct approach that includes social engineering (hacking people into providing information) and a well placed weaponized document or attack code. A physical approach is just that. Physically penetrating the premises, trying to either get to a computer inside or connecting your laptop to their network and trying to find the documents. More often there’s a backdoor to access the network remotely from the convenience of your office/TOC.

Planning and Initial Recon

The initial recon and planning phase is critical. Some operations fail because of lack of information about the target, others are highly successful because the recon was carefully performed and all the possible weak points were identified.

Digital Recon

Let’s start with information in the public domain. Open source intelligence (OSINT) gathering is our first priority. You’d be surprised how much information about companies, their employees and the technology they use in their networks is really out there.

We can start using Google, Yahoo, DuckDuckGo and other search engines, however it would be good to use a search engine aggregator that can search across all search engines at once. It’s also useful sometimes to use the local search engines if we’re targeting a company or organization in another country.

There are services that provide a list of local search engines, or you can try local Google or Yahoo versions. For example, for russia try google.ru and ru.yahoo.com, for Argentina google.com.ar or for France google.fr. You get the picture.

We begin by searching for the company’s web sites, domains, press releases that might indicate the use of a certain technology, names of employees, high level executives, etc.

Press releases are a great resource, for example, they usually detail new products with names of technology, executives and other snippets of information that we can use for a social engineering approach.

Next we search for emails. We can type “@companydomain” and usually you’ll get a list of sites where people used their company email address for various tasks. This is a great source of information about employees (possible targets for social engineering) but more importantly, a lot of times IT people go to technical forums to request help about the technology they are using. It’s a great way to start mapping their operating systems, web servers, databases, firewalls, routers, etc. without having started the mapping part of the recon.

OSINT will usually take a few weeks. We want to gather as much information as we can and built a logical map of what we now know: people, systems, products and connections between all these.

Another great way to gather information is to call the company phone number off hours and if you get a voice mail probe for default passwords. Chances are you’ll get several hits. You can get a lot of good intel via this method. Getting the company’s different phone numbers is relatively easy.

The next phase of the digital recon is mapping the public facing digital assets. We want to know their digital footprint: IP address ranges, domains, websites and security devices if possible. This should be done very carefully, we don’t want to tip their security devices that we are mapping them.

We start searching the different “whois” databases for their different IP ranges. Since our target is a fortune 100 organization, chances are they have acquired a set of IP addresses that is static to that company. Knowing the IP ranges will allow us to also map those servers that might be connected to the internet but do not necessarily provide services (like a company website or e-commerce site do). You would be amazed at what you can find sometimes. In one project I found a server that had a Telnet service up and running, needless to say it was my way in. A developer enabled this for a project and forgot to disable it later. Humans… They are always the weakest link.

We want to map the ports open, the services behind those ports, operating systems, web server software, database software, versions of the software, email servers, file transfer services, etc. Once we have this information we can perform a very simple and fast vulnerability assessment and see what is exploitable right then and there. Sometimes this is all it takes, but most of the time it’s more complicated than this.

There are countless tools to do this, some open source, some commercial. Check online for more information.

Physical Recon

Now for the physical part. If we’re considering the possibility of a physical penetration we need to recon the target.

I usually divide the recon into two different methods: covert and overt. In a covert recon you’re usually either away from the target, using binos or scopes to surveil the target, or you are performing recon at night completely hidden. An overt recon usually means walking into the target’s premisses and pretending to be someone you’re not, while trying to collect as much information as you can by either observing or taking to people (social engineering).

During a physical recon I would also perform a scan of the premisses for any wireless, bluetooth or other RF that I can find. Many times during projects I found open wireless access points and routers. I logged right into them and used them as a channel in. As part of the kit, it’s useful to not only have a lightweight laptop during a physical recon, but also a wireless signal finder/scanner, wifi antenna booster, a good set of stumblers and other software to map all the signals you might find.

I found it very useful to perform a physical recon with a team of 2 or 3 members. You can send one around the premises to check any possible ways in (in case we need a covert entry), while the others maintain a tight surveillance. Key items to map are dress code of employees, badges or IDs they have, working hours, guards and their schedule, different access points to the building, daily activities (day & night) and also paying attention to trash collection, product delivery, etc.

Equipment

A good camera, scopes and other observation gear is needed here. Usually hunting stores have great gear you can get.  All this will provide a clear picture of what’s going on around the building, but not inside. Like I mentioned, sometimes you have to perform an overt recon.

For these, I find it very useful to have a small voice recorder and have it on as soon as you walk in. It will record any information people might give you, while also recording atmospherics: a loudspeaker announcing company news or the name of an employee, normal working noise, etc.

Also carry a USB or a small wireless card with you, sometimes during the recon you’ll find yourself in the position of having a brief access to a computer inside the company. Plug that wireless router/card (pre-configured to a certain name/password) and try connecting to it later when you leave. Carry a set of lock picking tools, I like the Bogota Entry Toolset. It’s small, easy to conceal and in most cases work like a charm.

Also, I like to carry a small LED light, which is useful to check inside server racks and other tight spots, a small knife, a pen and a notepad.

Pen and paper might seem a bit outdated but it’s a great way to create a sketch of the site: doors, elevators, access points, guard and camera locations, etc. It’s is an invaluable tool for a physical recon.

Summary

We’ve just gone through the initial information gathering and recon phase. This is a critical phase and can make or break our operation.

You need knowledge to perform the technical part, but overall you have to be creative. Think outside the box, think like an attacker, try to figure out what they would do to gather information. For example, large corporations usually have a cafeteria or restaurant inside their building. This is a weak spot during lunch time, with a lot of activity. You could sneak in dressed as a cook, or even a server and you’re inside.

Bend the rules.

Stay tuned for part 2 where we’ll talk about analyzing the data gathered during our recon, as well as the planning and execution of a dry run!

Posted in Security, Tradecraft | Tagged , , , , , , , , , | 20 Comments

Improve your Helmet’s Utility with the War Bungee from War Sport Industries

War Sport Industries War Bungee

While ballistic helmets are certainly necessary in some situations, more-so for Law Enforcement and the Military, the FAST Base Jump Helmet from Ops-Core has recently become my go-to brain bucket.

It affords me the protection I need when things get retarded, including myself. To complement the versatility of the FAST Base Jump Helmet, which is already full of features, War Sport Industries has come up with an interesting way of utilizing shock cord to create a retention system they’ve dubbed the War Bungee.

The primary feature of the War Bungee is to provide the end-user with a method for retaining NVG counter weights, IR devices, lights, communication cables and even indigenous foliage. I’ve also found a few other items that the War Bungee is great for securing, as shown below in this video.

I really feel like the War Bungee adds utility to an otherwise unusable space on the top of a helmet. Previously you were limited to either using tape or hook and loop to secure items. While the War Bungee is limited to helmets with holes in the top, which excludes any ballistically rated helmets, it’s definitely a unique approach to helmet retention.

War Sport Industries War Bungee

War Sport Industries War Bungee

You can find instructions on how War Sport recommends routing the War Bungee here, but as mentioned in the video, I was able to figure it out without using instructions. The most important part in the installation is ensuring that the shock cord does not route over the Occ-Dial components, which control the fit of the helmet.

War Sport Industries War Bungee

War Sport Industries War Bungee

The War Bungee is US made and comes with shock cord, webbing loops (which are stitched with Kevlar thread), ITW Cordloc and ITW Web Dominator. They’re available in Coyote, OD & MultiCam and can be purchased direct from War Sport here.

Posted in Headwear | Tagged , , , , , , , , , , | 8 Comments

Go-Go-Gadget Ear Plugs: Mil-Spec Monkey Retracto-Plugs

Our good friend Mil-Spec Monkey has introduced a new product based on the integrated ear-pro featured in the CoolGuy-Hat DLUX, called Retracto-Plugs.

If you remember our review of the CG Hat DLUX, it has retractable ear plugs built right into the hat, so you’ve always got hearing protection at the ready. These also retract right back into their housing with a simple press of a button.

Utilizing this same principle, the MSM Retracto-Plugs offer the same retractable lanyard ear-pro with the addition of hook and loop, so you can mount them in any helmet you wish. You can even hot-swap them between helmets, as each set comes with two sets of hook and loop adhesive dots. Continue reading

Posted in GEARCOM | Tagged , , , , | 2 Comments

Deconstructing the Aurora Colorado Shooting and What We as Responsible Citizens Could Have Done to Help

In one of the deadliest U.S. shootings since Fort Hood, where Army psychiatrist Nidal Hasan fired into a group of soldiers preparing for deployment, James Holmes killed 12 innocent movie-goers Friday, when he began shooting into a crowded theater in Aurora, Colorado.

Leaving more than 50 injured, those killed included a U.S. Navy Sailor and a U.S. Air Force reservist. Our thoughts and prayers go out to all those involved in the tragedy, the victims, their families and those who lived through the terrifying ordeal.

My goal in this article is to deconstruct the shooting from the news I’ve been able to gather and discuss what we as responsible citizens could have done in a similar situation. Continue reading

Posted in News | Tagged , , , , , , | 74 Comments

ITS Store Updates: ORAL I.V. Now in Stock and ETA Trauma Kit Pouches Back in Stock!

We’re stoked to announce a new product to the ITS Store that compliments our offering of Trauma Kits, ORAL I.V. We’ve also restocked all colorways of our ETA Trauma Kit Pouches (MultiCam, Coyote and Black.)

ORAL I.V. is a product we’ve been testing for a few months now and we were so impressed by the results that we made the decision to carry them in the store. Before ORAL I.V., our trauma bags had other products for rehydration, like rehydration salts.

Used primarily to replace fluids and electrolytes that can be lost during heat illnesses, vomiting, heavy exercise and even the common hangover. A means for rapid rehydration is extremely important in any aid bag.

ORAL I.V.

What ORAL I.V. brings to the table is  a proprietary Crystalloid Electrolyte Rapid Hydration Fluid comprised of a complex of 11 pure minerals in a base of purified water. This concentrated formula assists in adding electrolytes and minerals to your body’s blood cells to keep you hydrated and energized.

[flickr id=”7605442674″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

Benefits

  • [flickr id=”7605443104″ thumbnail=”small” overlay=”false” size=”medium” group=”” align=”right”] Promotes faster recovery from injury stress or strenuous exercise
  • Quickly heightens concentration and alertness
  • Supports neurotransmitter function in the brain
  • Increases oxygen uptake at the cellular level
  • Dramatically boosts energy levels and strengthens the immune system
  • Raises osmotic pressure level of cells to keep them strong
  • Increases body enzyme production
  • Helps keep the body’s homeostasis balance
  • Aids in efficient removal of toxic body acids
  • Enhances uptake of vitamins, macro minerals, proteins and other essential nutrients from natural food sources or dietary supplements
  • Helps to reestablish healthy pH levels
  • 4 individual ampules per pack
  • Easily stored in a cargo pocket and features a reclosable poly bag
  • 5 year shelf life

Pick up your pack of ORAL I.V. from the ITS Store today!

ITS ETA Trauma Kit Pouches

Back in stock after heavy demand, our ETA Trauma Kit Pouches were  born out of the necessity in developing both a pouch that could hold our Vacuum Sealed  ETA Trauma Kit, as well as the contents of the kit if the end user needed to break the seal, or wanted faster access to individual components.

We worked with Zulu Nylon Gear for nearly a year to design what we feel is one of the best medical  pouches  on the market today. With a simple pull on the red handle, the  pouch  quickly filets open to provide immediate access to your medical components without delay.

[flickr id=”7142780577″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

[flickr id=”7142780649″ thumbnail=”medium_640″ overlay=”false” size=”medium” group=”” align=”center”]

Click  here  to get your ETA Trauma Kit Pouch today!

 

Posted in ITS Information | Tagged , , , , , , , | 7 Comments

The Instinctive Drowning Response: Drowning Doesn’t Look Like Drowning

I was forwarded a great article in the Coast Guard’s On Scene Magazine a few weeks ago by a friend, which went into drowning and the Instinctive Drowning Response. With Summer in full effect, I thought it appropriate to share with everyone here on ITS.

While we’ll look at the signs of drowning below, it’s important to note that it’s not like the movies where people are screaming for help and violently splashing the water. It’s often an undramatic event that doesn’t resemble drowning at all.

My only encounters with drowning victims were during pool evolutions at BUD/s. These examples aren’t really what you’d often see in a public setting, as these were men who were “red lining” (the instructor’s terminology for someone passing out underwater) rather than giving on the evolution. Their signs were motionless and void of any struggling or screaming. They just simply passed out.

Being a Lifeguard for my son’s Boy Scout Troop, I’m always staying up to date on my Lifeguard Certifications and CPR/First Aid through the Red Cross, but I’ve never been exposed to anything on the Instinctive Drowning Response and the specific signs associated with it.

Continue reading

Posted in Medical | Tagged , , , , | 13 Comments

Swim like a Fish with Darkfin Webbed Gloves

Darkfin GlovesWhen I first saw the Darkfin Gloves featured on the members-only discount website, Huckberry, I knew I had to try them out. As an avid swimmer and all around water enthusiast, I wanted to see if the increased surface area would translate into faster speed in the water.

I try to swim in open water whenever possible, but lately many of my swim days are limited to swimming laps. That being said, I headed to the pool to see how the Darkfin Gloves would perform.

Darkfin Gloves

Made in the USA from natural latex rubber, the seamless design of the Darkfin Gloves utilizes no adhesives, so bonding is permanent. They also feature cotton-flocked surfaces for enhanced grip and form fitting cuffs. I haven’t found any “stretching out” of the cuff thus far in the ten or so times I’ve used them for hour-long swim sessions.

Darkfin GlovesThe first thing I did when putting on the gloves was to get the gloves and my hands wet. They come dusted with food-grade corn starch for easy donning in a non-water environment such as sky diving, but for water, they recommend submerging the glove to don them.

After jumping into the deep end of the pool at my gym, I treaded water for about 10 minutes and found that I was treading with decreased effort and able to keep myself further out of the water if I wanted. I wish I could have used these for The Tread during 2nd Phase at BUD/s while I was in the Navy, it was an evolution where you were required to tread water for 5 minutes with twin 80 SCUBA tanks on your back and your hands out of the water. Although, just using hands would have made that more enjoyable. I didn’t pass it until my third try out of four possible attempts.

Something mentioned in the Darkfin instructions and literature is that the gloves will NOT make you a better swimmer and that they’ll cause muscle fatigue in people who do not possess the necessary upper body strength to support the additional resistance created.

While I found the first statement to be true, I somewhat disagree with the last one. I certainly didn’t expect them to make me a better swimmer, but the muscle fatigue will come for anyone that isn’t already integrating resistance training into their swim routine, i.e., me.

I felt the use of the Darkfin Gloves in my shoulders after swimming laps with them, but it wasn’t a lasting soreness. Not using paddles or any resistance in lap swimming for a long time, contributed to the soreness, yet it wasn’t for a lack of upper body strength.

Time and Stroke Decrease

Here’s a look at the typical difference I’m seeing in my stroke count and lap time moving at a moderate pace through the water on a 25 yard lap.

  • Without Darkfin Gloves – 00:57:93 / 21 strokes / 25 yds.
  • With Darkfin Gloves – 00:54:91 / 17 strokes / 25 yds.

I’m anxious to try the Darkfin Gloves out with other activities such as open water swimming, sky diving and scuba diving. Although, since there’s not much in the way of paddling done while scuba diving other than treading water, they may be more of a hinderance than a help. More to follow!

You can pick up the Darkfin Gloves directly from http://www.darkfingloves.com/

Posted in Swimming | Tagged , , , , , , , , | 11 Comments