Knot of the Week: DIY Boleadora Throwing Weapon using Monkey’s Fists

On today’s Knot of the Week, we’re going to go over instructions for creating your own Bola or Boleadora from natural fiber rope and a few golf balls for weighted cores. While we’ve gone over the Monkey’s Fist Knot in a previous KOTW, we’ve never show in quite like this.

Bolas throwing weapons were primarily used by South American Gauchos to capture/hobble running cattle or game, by utilizing an over-the-head swinging motion and releasing it on target. While I’m sure our readers could come up with a multitude of uses for these, one could come in handy in case of Zombies! Continue reading

Posted in Misc. | Tagged , , , , , , , , , | 20 Comments

Communicate Covertly and Hide Secret Messages in Plain Sight with Steganography

Secret MessageThe advent of the Internet, including web-based banking, shopping, and all things financial, have created a popular culture that is at least trivially informed about cryptography. Most of us know to look for https:// or a lock icon in our browser before engaging in a sensitive transaction.

One major disadvantage of cryptography is that an encrypted channel sticks out like a sore thumb to an experienced digital sleuth. Enter the world of steganography, the art of hiding messages in plain sight and the advances in covert communication channels.

Using Photographs

The most rudimentary and widely known definition of steganography is hiding textual messages inside of photographs. If you think about today’s digital cameras, it isn’t uncommon for the average photographer to have inexpensive access to a 10, 12, or even 14 megapixel camera. An iPhone 4 uses a 5.0 megapixel camera that yields a .jpg measuring 2592 x 1936.

What if every 31,363 pixels were replaced with the byte equivalent of a character? That would yield a message about the same length of an SMS message, 160 characters. How many people would be able to visually detect the degradation of the photograph if 160 pixels out of 5 million were changed?

1s and 0s

Consider this: a bit is either a 0 or a 1 in the digital realm. A collection of just 6 bits provides 64 different combinations–enough space to include the upper-case English alphabet, numerals 0 through 10, and 28 open spots for punctuation; including a comma, period, colon, space, and carriage return.

Now consider an innocuous twitter account, where the posting includes an extra space after the last period to represent a 1, and no space to represent a 0. Every six tweets can effectively be mapped to a character. Sure, message delivery is slow in this arbitrary example, but the point remains. Even tweets and Facebook posts can carry secret messages!

Steganography Applications

Both the iPhone and Android offer users low cost steganography applications. For example, Spy Pix and Hide It In are two applications that each allows the user to hide one photograph inside of another. Personally, I’m skeptical that a $0.99 app implements a sophisticated enough algorithm to remain undetected from a nation state, but it is probably good enough to fool a run-of-the-mill PI if used judiciously.

If you’re interested in something along the lines of free, that doesn’t require an app, check out Mozaiq to encrypt any image on your hard drive and even assign it a password. To decrypt an image, simply visit this link.

The reality is that modern steganography techniques are far more superior to replacing every n bytes with a character, or ending a sentence with or without an extra space. Each pixel is comprised of RGB values, or red-green-blue. In graphics circles, we describe them as bit planes. In effect, every picture can be reduced to its red plane, green plane, and blue plane–and there are other ways distill a photograph beyond this rudimentary example.

Imagine bouncing around, seemingly randomly, across the bit planes, changing a bit here and a bit there when encoding a secret message into a photograph. Detecting bit plane manipulation in an automated fashion is more difficult than detecting outlying pixel values–but steganalysis is possible.

Steganalysis

Steganalysis is the practice of inspecting a medium to determine if it carries secret content. The Steganography Analysis and Research Center (SARC) focuses exclusively on steganography research and the development of advanced steganalysis products and services. According to their website, their clients range from the US Department of Defense, the CIA and metropolitan police departments. Suffice to say, as steganography advances, so do steganalytic techniques for detecting the use of steganography.

Consider this ultra-simplified example of steganalysis. Histograms are two-dimensional graphs that show how many pixels in an image contain a certain value. Knowing that the range of a byte is 0 to 254, inclusive, a histogram iterates over every pixel in the image and looks at pixel brightness.

The resulting bar graph is typically used by photographers to determine the distribution of tones inside of the photograph, from the darkest on the right to the lightest on the left. Randomly changing n pixels to a character value could (theoretically) stand out in a histogram.

Steganography and Terrorism

Right about now, you’re probably wondering if terrorists have considered using steganography to communicate among disparate cells. If you’re itching to read more about how terrorists might be using steganography, Wikipedia provides an interesting review of Alleged use by Terrorists.

While irrefutable proof of modern terrorists using steganography is hard to come by, the reality is steganography isn’t new. In his excellent book The Codebreakers, David Kahn describes how German spies in World War II used steganography on a wide basis.

So, the next time you see a photo on Flickr–maybe, just maybe, the photograph isn’t really a photograph!

Editor-in-Chief’s Note: Be sure to check out our article main images from here on out on itstactical.com. We won’t be using passwords, but you’ll definitely want to give decrypting them a shot with Mozaiq. I’ve already said too much!

Posted in Tradecraft | Tagged , , , , , , , , , , , | 5 Comments

Honey Stove: The Bees Knees of Backpacking Stoves

About a year ago, I heard about an interesting modular backpacking stove from the UK that could not only burn wood, but utilize alcohol stoves and serve as a windscreen as well.

The immediate benefits I noticed with The Honey Stove were that it could be packed flat and would hardly take up any room. The modularity of The Honey Stove also allows for different configurations based on need. For instance, by simply using four of the nine pieces the kit comes with, you’d have everything you need to still get the job done.

There’s certainly more benefits that The Honey Stove provides and I’ll attempt to show them all to you in this detailed written and video review. Continue reading

Posted in Gear | Tagged , , , , , , , , , , , , , , , , , , , , | 11 Comments

215 Gear Operators Hat, ELW (Extremely Light Weight)

I know some people will wonder why we’re doing another gear review of a hat, they simply sit on your head and keep the sun and rain out of your eyes. I also know certain people cringe when they see Velcro sewn on a hat.  They say whats next, PALS sewn onto the sides for your IFAK?

To be honest, that’s what I thought of “tactical hats” when they started becoming popular. I figured that I could just wear my Local Motion Surf Co. hat and no one would pay any attention. It’s a different story when you have a MultiCam hat full of Pork Eating Crusader and Jolly Roger  patches. Continue reading

Posted in Apparel | Tagged , , , , | 8 Comments

Update on our Server Move and What the Gremlins are Doing!

Just a quick update to let everyone know what’s been happening on ITS Tactical in the last 72 hours. (If you’re reading this via RSS and can’t access new articles on ITS Tactical, please read this update on Tumblr) We’ve been forced to not only change servers, but hosting companies entirely.

Our traffic went through the roof on Sunday, when an article was shared on Reddit. The dedicated server we’d just moved to was unable to keep up with the traffic demands and continuously crashed throughout the day. Continue reading

Posted in ITS Information | Tagged , , | 11 Comments

ITS Tactical 2nd Anniversary Giveaway Winners Announced!

We know the hundreds of you that entered our 2nd Anniversary Giveaways have been patiently waiting for the results, but before we announce the winners we’d like to quickly thank everyone for entering!

There were some fantastic comments left in response to our question about naming “one of your favorite articles is that you’ve read on ITS; something that you’ve been able to benefit from with our content.”

It’s truly humbling to read the ways that ITS Tactical has helped everyone out there! When I founded ITS Tactical, that was my first and only goal (and still is), to provide information that could one day mean the difference in someone’s life; whatever that may be.

Looking back at these last two years is surreal; ITS has grown so much and I’ve met so many great people, forging lifelong relationships. Again, I just want to thank everyone for all that we’ve become with your continued support! PREVAIL!! Continue reading

Posted in ITS Information | Tagged | 7 Comments

ITS Tactical 2nd Anniversary Giveaway Numero Cinco

Today is the last day of our week of giveaways we’re running as a thank you to everyone for two awesome years here at ITS Tactical!

In our fifth giveaway this week, we’re giving you something that you’ll hopefully never have to use; An ETA Kit and a SOFTT-W Tourniquet! This is one of our new compact ETA Kits that includes the upgraded MojoDart!

Here’s how you can get your entry in and the rest of the details of our 2nd Anniversary Giveaways.

2nd Anniversary Giveaway Details

2nd Anniversary Giveaway Numero CincoEach giveaway this week will run until 11:59 p.m (Central Time) Saturday April 9th, 2011. We’ll be announcing the winners from each of the five giveaways on Monday, April 11th 2011. Any entries after the cutoff time will not be counted (and your reply probably won’t appear either). This means that you’ll only have less than 48 hours to enter the giveaway that appears on Friday.

To enter, we’re going to require something a little different. Instead of leaving a comment here, we’re going to create a topic in our Forum for each day’s giveaway and that topic will be linked in each day’s giveaway. You must make your own reply into that particular day’s topic to get your entry in. For your entry to be counted, reply with what one of your favorite articles is that you’ve read on ITS; something that you’ve been able to benefit from with our content.

If you enter each of the five giveaways (you’re definitely going to want to), we’d like you to come up with five different answers. Please read over the instructions thoroughly so you know exactly how to make your entry count!

Today’s Giveaway, Giveaway Numero Cinco, is posted here in the Forums. Head on over to read everything that’s included and get your entry in!!

Thanks for all the support you’ve given us in making these last two years awesome; we can’t wait for the next two!!

Posted in ITS Information | Tagged , , , , , | 3 Comments

Create a Mechanical Advantage Using the Poldo Tackle in a Rescue Situation

On this week’s Knot of the Week, we’re going to look at an interesting knot called the Poldo Tackle. Using two simple fixed loops, the Poldo Tackle affords you multiple options for anything that requires a tensioning device.

The most applicable use we’ve considered is in a rescue situation, where you might need the mechanical advantage to lift a buddy to safety. There are far better methods to lower someone in a rescue situation, but the Poldo Tackle would work well to aid in lifting. Just remember that it’s not the same type of application for lifting that pulleys would provide.

You could also use this knot for a clothesline, guyline or anywhere you may need to release or provide tension periodically to a line under load. Continue reading

Posted in Hitches | Tagged , , , , , | 6 Comments

Here’s Proof that Illegal Restraint with Zip Ties Happens and What You Can Do About It

I was recently passed an article from the Atlanta Journal that highlighted a northwest Atlanta couple tied up during home invasion. According to the article, two men kicked in the back door early in the morning and zip tied the man and woman.

The man was apparently a plumber or an electrician and had zip ties lying around that were used to restrain the couple. The invasion occurred around 4:30 a.m. and they weren’t able to free themselves to call 911 until 6:30 a.m. Luckily they were unharmed.

It seems that the intruders were looking for drugs, which doesn’t exactly make this situation fall under “common.”   It does however, illustrate the need for not only fortifying your doors with a device like the Door Devil, but learning how to escape illegal restraint from zip ties.

This is a great opportunity to not only review our article on escaping zip ties, but to share it with your friends, family and loved ones. This is literally information that could one day save their lives!

 

Posted in News | Tagged , , , , , , , | 7 Comments

ITS Tactical 2nd Anniversary Giveaway Numero Cuatro

Today we’re continuing our week of giveaways as a thank you to everyone for two awesome years here at ITS Tactical! We’re going to be running a giveaway each day from now until Friday so be sure to keep checking back all week!

In our fourth giveaway this week, we’re giving you something every household needs, a DIY Fatmax Breaching Tool! You may remember this from a recent article that Eric wrote up and demonstrated how to make yourself. This one is hand-grinded by Eric just for a lucky ITS Tactical Reader! We’ll also throw in some ITS Swag with today’s giveaway.

Here’s how you can get your entry in and the rest of the details of our 2nd Anniversary Giveaways.

2nd Anniversary Giveaway Details

2nd Anniversary Giveaway Numero QuatroEach giveaway this week will run until 11:59 p.m (Central Time) Saturday April 9th, 2011. We’ll be announcing the winners from each of the five giveaways on Monday, April 11th 2011. Any entries after the cutoff time will not be counted (and your reply probably won’t appear either). This means that you’ll only have less than 48 hours to enter the giveaway that appears on Friday.

To enter, we’re going to require something a little different. Instead of leaving a comment here, we’re going to create a topic in our Forum for each day’s giveaway and that topic will be linked in each day’s giveaway. You must make your own reply into that particular day’s topic to get your entry in. For your entry to be counted, reply with what one of your favorite articles is that you’ve read on ITS; something that you’ve been able to benefit from with our content.

If you enter each of the five giveaways (you’re definitely going to want to), we’d like you to come up with five different answers. Please read over the instructions thoroughly so you know exactly how to make your entry count!

Today’s Giveaway, Giveaway Numero Cuatro, is posted here in the Forums. Head on over to read everything that’s included and get your entry in!!

Thanks for all the support you’ve given us in making these last two years awesome; we can’t wait for the next two!!

Posted in ITS Information | Tagged , , | 4 Comments