Law Enforcement

RF Shielded Pouches-Privacy Bags

RF Shielded Pouches-Privacy Bags!

RF Shielded Pouches-Privacy Bags!  Security of private digital information is important today.  The number of forms of passwords and levels of verification are ever increasing.  Obviously, there are more nefarious attempts than ever before to access digitally stored information.  Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts.  Though it is time consuming, these levels add protection to your important information.  Many of us carry electrical devices on which...
Metallized Textiles

Metalized Textiles-What are their Uses?

Metalized Textiles-What are their Uses?  Metalized textiles were first used in various Shielding Applications.  I can remember when an automobile FM radio mainly played static!  Metalized textiles played a major role in protecting the radio from RFI from the other electronic components in the vehicle.  The antenna brought in shielded clean signals to the RF shielded radio which were sent out to the speakers, allowing the music to be heard as it was meant to be heard.  The RF shielding...
Computer/Digital Forensics

Computer/Digital Forensics-Analysis of Digital Evidence!

Computer/Digital Forensics-Analysis of Digital Evidence!  The terms Computer Forensics and Digital Forensics are often used interchangeably. Technically, computer forensics refers to the investigation of computers.  Digital Forensics refers to the investigation of ALL digital devices.  In the real world, Digital Forensics is probably the more accurate name.  Digital data storage is a component of almost all criminal activities investigations.  Evidence is often hidden in computers, cell phones, flash drives, and even in cameras!  Criminals are often painstaking in their data...
Corrosion

Rough Conditions Require Rugged Textiles!

Rough Conditions Require Rugged Textiles!  Conductive textiles are thin and lightweight.  Normally, these are excellent characteristics for many of their uses.  Metalized textiles are used in many electronic devices for shielding.  Electronic technology is becoming smaller all the time.  Shielding solutions must be flexible and adaptable to fit in tight spaces.  However, there are times that rugged characteristics are important.  Due to their fine structure, conductive textiles are usually not particularly durable.  The delicate nature of these shielding giants limits...
Digital Privacy

Digital Privacy-How do we Achieve it?

Digital Privacy-How do we Achieve it?  Undoubtably, today's hackers are becoming more sophisticated.  The news brings stories daily about ransomware, security breaches, and identity theft.  How can we protect ourselves from these personal attacks?  Many of these crimes can be prevented logically.  Protecting electronic devices with updated antivirus programs is mandatory.  Common sense data security measures are important in daily situations.  These include not leaving a computer open when you leave the workspace, and not opening emails and links that...
RF Shielded Pouches-Privacy Bags!

Electronic Data Protection-Buy or DYI!

Electronic Data Protection-Buy or DYI!  I've talked about Faraday pouches that protect digital data hacks before.  They are security pouches used by government, police, and big business.  These pouches prevent data tampering or theft by wireless access.  Phones, laptops, and PDAs are protected from wireless access while inside the pouch.  These pouches work using the "Faraday Cage Effect" created by metalized textiles.  The metalized textiles block passage of electromagnetic fields through pouch walls.  This same technology is now available to...
RF Shielded Pouches

RF Shielded Pouches, stop the Hacks!

RF Shielded Pouches, stop the Hacks!  RF Shielded pouches have been used to secure data for years.  Police, Diplomatic, and Military agencies use them routinely to securely transport electronic devices.  The pouches prevent RF access to the devices by creating a "Faraday Cage" around the device.  A Faraday Cage is a metal cage that will block an electromagnetic field from entering the boundaries of the cage. These pouches will block entry of WiFi, 5G, and electromagnetic pulses.  Wireless devices utilize electromagnetic...
Conductive Velcro

What is Conductive Velcro? What is Conductive Velcro used for?

What is Conductive Velcro? What is Conductive Velcro and How is it used?  Conductive Hook and Loop is the same product that we all know as Velcro, the only difference being is that it is made electrically conductive by coating the small hooks and loops that make it up with a conductive metal.  The conductive metal used in Shieldex® Conductive Hook and Loop is 99% pure Silver.  Silver is the best metal conductor of electricity. What is Conductive Hook and Loop used...
EMC-Electronic Devices working Optimally together!

Conductive Textiles, What are they and what are their Uses?

Conductive Textiles, What are they and What are their Uses? A conductive textile is a fabric, thread, or fastener that conducts electricity.  Conductive textiles consist of a less conductive fiber or fabric that is made conductive by being coated with electrically conductive elements.  These elements are often Silver, Copper, Nickel, and titanium.  These elements are plated, embedded, or coated onto the less conductive substrate.  These substrates typically include polyester and Nylon.  These fabrics, threads, and yarns are highly conductive and sensitive. ...
Digital Privacy Pouch

Faraday Bags Protect Information!

Faraday Bags Protect Information, what are they and how do they work? Faraday Bags Protect Information.  Faraday Bags are bags/pouches fabricated of Metalized Conductive Textiles.  When closed, these pouches do not allow electromagnetic fields or waves to cross their boundaries, based on the research of Michael Faraday in 1836.  Our electronic devices transfer information wirelessly using RF radiation.  When the devices are placed in  Faraday Bags/Pouches, RF transmission is blocked by the Faraday Effect.  This includes both incoming information and outgoing...