Law Enforcement

Conductive Metalized Textiles-Great Shielding!

Garments, Pouches, Shielding,-Conductive Textiles!

Garments, Pouches, and Shielding-Conductive Textiles!  The uses of conductive fabrics are many and varied.  Originally, the primary use of conductive metalized textiles was RF Shielding, allowing electronic devices to work together smoothly a shared electromagnetic environment.  All electronic devices emit electromagnetic radiation.  Depending on the frequency of the EMI/RFI, electronic devices can work together smoothly.  RF Shielding uses conductive textiles to block the offending frequencies that disturb normal function of a device.  Engineers love the flexibility of...
Faraday Bags-Security in a Wireless World!

RF Shielded Pouches protect your Privacy!

RF Shielded Pouches protect your Privacy!  We live in a digital world where we can access our information easily from our electronic devices.  The problem with that is that there are "digital criminals" out there trying to hack your devices for nefarious reasons.   Identity theft, fraudulent emails asking for you to give your private information for any number of reasons.  Credit Card numbers, bank account numbers, and even your identity information are what they're after.  Identity theft can be devastating...
Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!

Digital Forensic Evidence-Handle with Care!   Digital Evidence is evidence that is present on devices in binary code that is "of interest" to the legal system.  This evidence is found on computer hard drives, mobile phones, security cameras, email and other digital media including text messages and social media.  Binary evidence is relevant to many events of interest to the legal system, including traffic violations, accidents, white collar crime, up to terrorism and murder. Digital Forensic Evidence-Handle with Care.  Binary evidence requires...
Conductive Textiles are used Everywhere!

Conductive Textiles are used Everywhere!

Conductive Textiles are used Everywhere!  The medical field has many uses for conductive textiles.  Conductive metalized textiles act as sensors, measuring vital functions such as brain waves, and temperature.  Hospital beds become smart, sensing a patient leaving the bed.   Pressure sensing buttons summon nurses to the patient's room when necessary.  These even detect wetness of the bedding!  Metalized textiles are useful in physical therapy as electrodes applying current to stimulate muscles or nerves as...
RF Shielded Garments-what are their Applications?

Who uses Conductive Metalized Textiles-Everyone!

Who uses Conductive Metalized Textiles-Everyone!  Until I came to work at V Technical Textiles, Inc., I didn't know anything about them.  Today, I am amazed at the number of ways metalized textiles are involved in our lives.  One of the first uses of them made it possible for me to listen to an FM radio in my car!  I recall FM radios seemed particularly sensitive to RFI (Radio Frequency Interference) and were not easy to listen to.  This due to...
Faraday Bags-Security in a Wireless World!

RF Shielded Pouches-Privacy Bags!

RF Shielded Pouches-Privacy Bags!  Security of private digital information is important today.  The number of forms of passwords and levels of verification are ever increasing.  Obviously, there are more nefarious attempts than ever before to access digitally stored information.  Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts.  Though it is time consuming, these levels add protection to your important information.  Many of us carry electrical devices on which...
Metalized Textiles-Perfect Shielding for small Devices!

Metalized Textiles-What are their Uses?

Metalized Textiles-What are their Uses?  Metalized textiles were first used in various Shielding Applications.  I can remember when an automobile FM radio mainly played static!  Metalized textiles played a major role in protecting the radio from RFI from the other electronic components in the vehicle.  The antenna brought in shielded clean signals to the RF shielded radio which were sent out to the speakers, allowing the music to be heard as it was meant to be heard. ...
Integrity of Digital Evidence-Necessary!

Computer/Digital Forensics-Analysis of Digital Evidence!

Computer/Digital Forensics-Analysis of Digital Evidence!  The terms Computer Forensics and Digital Forensics are often used interchangeably. Technically, computer forensics refers to the investigation of computers.  Digital Forensics refers to the investigation of ALL digital devices.  In the real world, Digital Forensics is probably the more accurate name.  Digital data storage is a component of almost all criminal activities investigations.  Evidence is often hidden in computers, cell phones, flash drives, and even in cameras!  Criminals are often painstaking in their data...
Corrosion

Rough Conditions Require Rugged Textiles!

Rough Conditions Require Rugged Textiles!  Conductive textiles are thin and lightweight.  Normally, these are excellent characteristics for many of their uses.  Metalized textiles are used in many electronic devices for shielding.  Electronic technology is becoming smaller all the time.  Shielding solutions must be flexible and adaptable to fit in tight spaces.  However, there are times that rugged characteristics are important.  Due to their fine structure, conductive textiles are usually not particularly durable.  The delicate nature of these shielding giants...
Digital Forensic Evidence-Handle with Care!

Digital Privacy-How do we Achieve it?

Digital Privacy-How do we Achieve it?  Undoubtably, today's hackers are becoming more sophisticated.  The news brings stories daily about ransomware, security breaches, and identity theft.  How can we protect ourselves from these personal attacks?  Many of these crimes can be prevented logically.  Protecting electronic devices with updated antivirus programs is mandatory.  Common sense data security measures are important in daily situations.  These include not leaving a computer open when you leave the workspace, and not opening emails and links that...