Faraday Bag

Have a Product Idea-We'll help!

Have a Product Idea-We’ll help!

Have a Product Idea-We'll help!  Our metalized conductive textiles are useful in many ways!  We have the world's largest standing inventory of conductive textiles.  If you have a new idea on how to use them, our Research and Development team will help turn your idea into reality!  Our team can help you find the ideal textile for your project.  The help doesn't stop there, we will assist you in producing a prototype of your project.  V Technical Textiles, Inc. is...
Need a RF Shielded Enclosure? See VTT!

RF Shielded Enclosures-Made for You!

RF Shielded Enclosures-Made for You!  RF Shielded Enclosures are used for testing electronic devices, mainly for EMC Compliance testing.  EMC testing requires a low-ambient RF environment.  Portable RF Shielded Enclosures provide this unique environment using the Faraday Principle.  The Faraday Principle states that the fields within a conductive material cancel out  any external fields, making the electric field inside the conductive material enclosure zero.  The walls of a soft sided RF Shielded consist of conductive fabric, satisfying the requirements of...
Non-Woven Conductive Textiles-Very Useful!

Garments, Pouches, Shielding,-Conductive Textiles!

Garments, Pouches, and Shielding-Conductive Textiles!  The uses of conductive fabrics are many and varied.  Originally, the primary use of conductive metalized textiles was RF Shielding, allowing electronic devices to work together smoothly a shared electromagnetic environment.  All electronic devices emit electromagnetic radiation.  Depending on the frequency of the EMI/RFI, electronic devices can work together smoothly.  RF Shielding uses conductive textiles to block the offending frequencies that disturb normal function of a device.  Engineers love the flexibility of conductive textiles in...
Faraday Pouches-Safeguarding your Data in a Wireless World!

RF Shielded Pouches protect your Privacy!

RF Shielded Pouches protect your Privacy!  We live in a digital world where we can access our information easily from our electronic devices.  The problem with that is that there are "digital criminals" out there trying to hack your devices for nefarious reasons.   Identity theft, fraudulent emails asking for you to give your private information for any number of reasons.  Credit Card numbers, bank account numbers, and even your identity information are what they're after.  Identity theft can be devastating...
Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!   Digital Evidence is evidence that is present on devices in binary code that is "of interest" to the legal system.  This evidence is found on computer hard drives, mobile phones, security cameras, email and other digital media including text messages and social media.  Binary evidence is relevant to many events of interest to the legal system, including traffic violations, accidents, white collar crime, up to terrorism and murder. Digital Forensic Evidence-Handle with Care.  Binary evidence requires...
Faraday Pouches-Safeguarding your Data in a Wireless World!

Protect Digital Data-use a Pouch!

Protect Digital Data-use a Pouch!  Many of us have our private digital data with us at any given moment on a portable wireless device.  That device can be a cell phone, a PDA, a tablet, or a laptop computer.  We take it for granted that the private data is safe in the device.  The truth is that there are people out there who's mission in life is to steal that data for nefarious purposes.  They could be stealing your identity...

Digital Evidence must be Secure and Preserved in order to be Admissible!

Digital Evidence must be Secure!  The wireless digital world has created a whole new landscape for criminals.  Inadvertently, criminals accidentally keep detailed records of their criminal activity in their electronic devices.  GPS keeps an accurate track of where the device or phone has been.  Oddly, Criminals feel that if their data is safe in these devices and that no one can get at it.  We are all aware that people can wirelessly access to sensitive information. That's how hackers make...
Faraday Pouches-Safeguarding your Data in a Wireless World!

RF Shielded Pouches-Privacy Bags!

RF Shielded Pouches-Privacy Bags!  Security of private digital information is important today.  The number of forms of passwords and levels of verification are ever increasing.  Obviously, there are more nefarious attempts than ever before to access digitally stored information.  Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts.  Though it is time consuming, these levels add protection to your important information.  Many of us carry electrical devices on which...
Personal/Home Shielding reduces EMI Exposure!

Personal/Home Shielding reduces EMI Exposure!

Personal/Home Shielding reduces EMI Exposure!  In today's wireless world, we endure constant exposure to RF waves.  Though there is no absolute proof of health risks due to RF wave exposure, there is certainly concern regarding exposure.  EHS (Electromagnetic HyperSensitivity), the name given to EMI sensitivity, involves nervous system symptoms.   Symptoms include headaches, fatigue, stress, sleep disturbances, and skin irritation among many others.   Many sufferers of EHS claim that their symptoms decline when they shield themselves from RF/EMI exposure.  Personal Shielding...
RF Shielded Bags-Protection and Security!

Digital Device Security-RF Shielded Pouches!

Digital Device Security-RF Shielded Pouches!  Our digital devices are wonderful, they allow us easy access to our private information all the time!  We don't leave home without them, and always have them nearby.  Unfortunately, this private information is also accessible by nefarious others.  In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices.  They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels.  It...