Digital Evidence

Have a Product Idea-We'll help!

Have a Product Idea-We’ll help!

Have a Product Idea-We'll help!  Our metalized conductive textiles are useful in many ways!  We have the world's largest standing inventory of conductive textiles.  If you have a new idea on how to use them, our Research and Development team will help turn your idea into reality!  Our team can help you find the ideal textile for your project.  The help doesn't stop there, we will assist you in producing a prototype of your project.  V Technical Textiles, Inc. is...
Garments, Pouches, Shielding-Conductive Textiles!

Garments, Pouches, Shielding,-Conductive Textiles!

Garments, Pouches, and Shielding-Conductive Textiles!  The uses of conductive fabrics are many and varied.  Originally, the primary use of conductive metalized textiles was RF Shielding, allowing electronic devices to work together smoothly a shared electromagnetic environment.  All electronic devices emit electromagnetic radiation.  Depending on the frequency of the EMI/RFI, electronic devices can work together smoothly.  RF Shielding uses conductive textiles to block the offending frequencies that disturb normal function of a device.  Engineers love the flexibility of conductive textiles in...
Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!   Digital Evidence is evidence that is present on devices in binary code that is "of interest" to the legal system.  This evidence is found on computer hard drives, mobile phones, security cameras, email and other digital media including text messages and social media.  Binary evidence is relevant to many events of interest to the legal system, including traffic violations, accidents, white collar crime, up to terrorism and murder. Digital Forensic Evidence-Handle with Care.  Binary evidence requires...

Digital Evidence must be Secure and Preserved in order to be Admissible!

Digital Evidence must be Secure!  The wireless digital world has created a whole new landscape for criminals.  Inadvertently, criminals accidentally keep detailed records of their criminal activity in their electronic devices.  GPS keeps an accurate track of where the device or phone has been.  Oddly, Criminals feel that if their data is safe in these devices and that no one can get at it.  We are all aware that people can wirelessly access to sensitive information. That's how hackers make...
Protect Digital Information-use a Pouch!

Digital Device Security-RF Shielded Pouches!

Digital Device Security-RF Shielded Pouches!  Our digital devices are wonderful, they allow us easy access to our private information all the time!  We don't leave home without them, and always have them nearby.  Unfortunately, this private information is also accessible by nefarious others.  In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices.  They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels.  It...
Computer/Digital Forensics

Computer/Digital Forensics-Analysis of Digital Evidence!

Computer/Digital Forensics-Analysis of Digital Evidence!  The terms Computer Forensics and Digital Forensics are often used interchangeably. Technically, computer forensics refers to the investigation of computers.  Digital Forensics refers to the investigation of ALL digital devices.  In the real world, Digital Forensics is probably the more accurate name.  Digital data storage is a component of almost all criminal activities investigations.  Evidence is often hidden in computers, cell phones, flash drives, and even in cameras!  Criminals are often painstaking in their data...
Protect Digital Data-use a Pouch!

RF Shielded Pouches, stop the Hacks!

RF Shielded Pouches, stop the Hacks!  RF Shielded pouches have been used to secure data for years.  Police, Diplomatic, and Military agencies use them routinely to securely transport electronic devices.  The pouches prevent RF access to the devices by creating a "Faraday Cage" around the device.  A Faraday Cage is a metal cage that will block an electromagnetic field from entering the boundaries of the cage. These pouches will block entry of WiFi, 5G, and electromagnetic pulses.  Wireless devices utilize electromagnetic...
Conductive Velcro

What is Conductive Velcro? What is Conductive Velcro used for?

What is Conductive Velcro? What is Conductive Velcro and How is it used?  Conductive Hook and Loop is the same product that we all know as Velcro, the only difference being is that it is made electrically conductive by coating the small hooks and loops that make it up with a conductive metal.  The conductive metal used in Shieldex® Conductive Hook and Loop is 99% pure Silver.  Silver is the best metal conductor of electricity. What is Conductive Hook and Loop used...
Faraday Bags Secure Information

Faraday Bags Secure Information, Protect your Privacy Now!

Faraday Bags Secure Information, Protect your Privacy Now! Faraday Bags secure information, by blocking electronic access to it.  Today, much Digital information is transferred wirelessly between electronic devices by electromagnetic waves.  We love to have the quick, easy access to our information.   The problem is that thieves can also access this information.  The digital information that we are talking about is stored on the various electronic devices that are part of our lives in today's world.  It can consist of bank...
Digital Privacy Pouch

Faraday Bags Protect Information!

Faraday Bags Protect Information, what are they and how do they work? Faraday Bags Protect Information.  Faraday Bags are bags/pouches fabricated of Metalized Conductive Textiles.  When closed, these pouches do not allow electromagnetic fields or waves to cross their boundaries, based on the research of Michael Faraday in 1836.  Our electronic devices transfer information wirelessly using RF radiation.  When the devices are placed in  Faraday Bags/Pouches, RF transmission is blocked by the Faraday Effect.  This includes both incoming information and outgoing...