Security

Coatings Enhance Metalized Textiles in many ways!

Military uses for Conductive Textiles!

Military uses for Conductive Textiles!  The Department of Defense has many uses for Conductive Textiles.  Obviously, the military has many sophisticated electronic devices in their vehicles, whether planes, tanks, or boats.  The lives of the soldiers depend on these devices working smoothly without any interference from RFI or EMI.  Proper RF Shielding allows these devices to work together efficiently in a shared electromagnetic environment.  Conductive textiles are the best shielding materials for vehicles due to their light weight and flexibility....
Navigating EMC Testing

RF Shielded Curtain or Enclosure?

This may seem like a difficult question, in some cases the correct answer is BOTH!  One of the beautiful things about an RF Shielded Curtain is that it can multitask!  An RF Shielded curtain can isolate an area from RF radiation.  This comes in handy in repairing or testing an electronic device's performance "in situ" when the "Device Under Testing" (DUT) won't fit into a RF Shielded Enclosure or can't get to one. An RF Shielded Curtain is made out of...
Conductive Velcro-Static Management and Switches!

VTT Hook and Loop now Buy American Act and Berry Amendment Compliant!

VTT Hook and Loop now Buy American Act and Berry Amendment Compliant!  VTT is now able to offer Hook and Loop/Velcro® that meets the requirements of the Buy American Act and the Berry Amendment!  These laws apply to purchases by Federal Government purchases for public use in the United States and for Department of Defense spending respectively. The Berry Amendment is very specific and requires that the product must have of 100% domestic content with NO EXCEPTIONS.  On the other...

Digital Evidence must be Secure and Preserved in order to be Admissible!

Digital Evidence must be Secure!  The wireless digital world has created a whole new landscape for criminals.  Inadvertently, criminals accidentally keep detailed records of their criminal activity in their electronic devices.  GPS keeps an accurate track of where the device or phone has been.  Oddly, Criminals feel that if their data is safe in these devices and that no one can get at it.  We are all aware that people can wirelessly access to sensitive information. That's how hackers make...
Faraday Pouches-Safeguarding your Data in a Wireless World!

RF Shielded Pouches-Privacy Bags!

RF Shielded Pouches-Privacy Bags!  Security of private digital information is important today.  The number of forms of passwords and levels of verification are ever increasing.  Obviously, there are more nefarious attempts than ever before to access digitally stored information.  Banks, email accounts, credit cards, and medical records require several levels of proof of identity before allowing access to accounts.  Though it is time consuming, these levels add protection to your important information.  Many of us carry electrical devices on which...
RF Shielded Curtains create Security and Isolation

RF Shielded Curtains create Security and Isolation!

RF Shielded Curtains create Security and Isolation!  Today's electronic world relies heavily on wireless transmission of  information.  Wireless access to information makes transactions and transmission easy.  Unfortunately, wireless access sometimes allows access to private or important information when it shouldn't be!  Examples of data security include credit card information, passwords stored on wireless devices, even vital signs in a telemetry unit in a hospital to make sure that this private information is secure and directed to the proper location.  Practical...
RF Shielded Bags-Protection and Security!

Digital Device Security-RF Shielded Pouches!

Digital Device Security-RF Shielded Pouches!  Our digital devices are wonderful, they allow us easy access to our private information all the time!  We don't leave home without them, and always have them nearby.  Unfortunately, this private information is also accessible by nefarious others.  In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices.  They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels.  It...
Non-Woven Conductive Fabrics-Diverse Applications

Metalized Textiles-What are their Uses?

Metalized Textiles-What are their Uses?  Metalized textiles were first used in various Shielding Applications.  I can remember when an automobile FM radio mainly played static!  Metalized textiles played a major role in protecting the radio from RFI from the other electronic components in the vehicle.  The antenna brought in shielded clean signals to the RF shielded radio which were sent out to the speakers, allowing the music to be heard as it was meant to be heard.  The RF shielding...
The role of Conductive Textiles in Modern PPE!

Conductive Fabrics-Great Shielding Material!

Conductive Fabrics-Great Shielding Material!  Shielding materials are usually needed in electronic devices to protect the devices from EMI/RFI which can adversely affect their performance.  The more conductive the Fabric is, the better its shielding characteristics are.  Obviously, fabric is typically lightweight and flexible, making it great for shielding in tight quarters.  Engineers also love the lightweight, as products today are smaller and more portable than ever before.  Lightweight is also important in the automotive, aerospace, military, and law enforcement markets,...
SCIF Construction-are Standards Meetable?

SCIF Construction-are Standards Meetable?

SCIF Construction-are Standards Meetable?  Sensitive Compartmented Information Facilities (SCIFs) must be built to very strict standards!  SCIF security requirements and construction specs are based on many factors.  Included in the list are facility purpose, surveillance risk, and physical location of the SCIF.  Sensitive information exchanges, sound damping, and Personnel security are also important parts of the equation.  The final assessment will be made by Accrediting Officer (AO) and Site Security Manager (SSM), determining technical measures for each SCIF application.  The...