Digital Evidence

Faraday Bag

Faraday Bags Protect Information!

Faraday Bags Protect Information, what are they and how do they work? Faraday Bags Protect Information.  Faraday Bags are bags/pouches fabricated of Metalized Conductive Textiles.  When closed, these pouches do not allow electromagnetic fields or waves to cross their boundaries, based on the research of Michael Faraday in 1836.  Our electronic devices transfer information wirelessly using RF radiation.  When the devices are placed in  Faraday Bags/Pouches, RF transmission is blocked by the Faraday Effect.  This includes both incoming information and...

Forensic Evidence (Faraday) Bags-Keeping Electronic Evidence Secure inside a Faraday Cage

We are all aware of the proliferation of electronic devices that we use in our daily lives,  in fact, most of us have several electronic devices that we use regularly.  These devices can be our cell phones, which have essentially become miniature computers that keep track of our appointments, finances, email, phone calls, and text messages.  Additionally, we have our computers, tablets, and PDA's.  All of these devices help us to keep our lives in order by making our...

What can Metalized Textiles do for You? Your Imagination is the only Limit!

Since the founding of V Technical Textiles, Inc., it has been the world's single largest distributor of electrically conductive fabrics and notions.  Many people have no idea what metalized textiles are used for.  When they first came out, metalized textiles were used largely in electrical manufacturing in the aerospace, automotive, electronics industries as ESD carpeting, EMI shielded gaskets and quickly evolved into shielding materials in electronic devices to stop RF Interference from affecting the proper function of these sensitive...

RF Shielded Faraday Bags and Pouches, use Military Grade Technology to Protect Sensitive Digital Information Stored on your Electronic Devices!!

For years, the Military, the Police, and the Government agencies have been aware of the need to secure sensitive information and communication equipment such as phones and computers, that can be accessed by WiFi or other wireless means.  Whether it was done by use of a specialized room called a Sensitive Compartmented Information Facility (SCIF, pronounced "skiff"), or by placing the devices in Faraday Bags and Pouches.  In the legal system, it is commonplace for computers, phones, and other...

Digital Criminal Evidence-There is Proper Security Protocol for Keeping Digital Evidence Admissible in Court, Let Us Help You Handle Your Evidence Securely!

Despite the amazing amount of great evidentiary material that Forensic Sciences can provide, the care and treatment of evidence seized while in Law Enforcement custody can affect whether this persuasive information gathered through investigation will ever be presented in court or will be tossed out as "inadmissible in court".  We all remember the O. J. Simpson trial, where "gold standard DNA evidence" was not allowed to be used as evidence in the trial due to a break in the...