29Nov
19Oct
Digital Device Security-RF Shielded Pouches!
Digital Device Security-RF Shielded Pouches! Our digital devices are wonderful, they allow us easy access to our private information all the time! We don't leave home without them, and always have them nearby. Unfortunately, this private information is also accessible by nefarious others. In today's world, there are people who make a living by illegally wirelessly accessing personal digital devices. They access the information using unsecure Wi-Fi connections such as internet cafes or guest connections in restaurants and hotels. It...
12Oct
Metalized Textiles-What are their Uses?
Metalized Textiles-What are their Uses? Metalized textiles were first used in various Shielding Applications. I can remember when an automobile FM radio mainly played static! Metalized textiles played a major role in protecting the radio from RFI from the other electronic components in the vehicle. The antenna brought in shielded clean signals to the RF shielded radio which were sent out to the speakers, allowing the music to be heard as it was meant to be heard. ...
05Oct
Conductive Fabrics-Great Shielding Material!
Conductive Fabrics-Great Shielding Material! Shielding materials are usually needed in electronic devices to protect the devices from EMI/RFI which can adversely affect their performance. The more conductive the Fabric is, the better its shielding characteristics are. Obviously, fabric is typically lightweight and flexible, making it great for shielding in tight quarters. Engineers also love the lightweight, as products today are smaller and more portable than ever before. Lightweight is also important in the automotive, aerospace, military, and law enforcement markets,...
27Sep
SCIF Construction-are Standards Meetable?
SCIF Construction-are Standards Meetable? Sensitive Compartmented Information Facilities (SCIFs) must be built to very strict standards! SCIF security requirements and construction specs are based on many factors. Included in the list are facility purpose, surveillance risk, and physical location of the SCIF. Sensitive information exchanges, sound damping, and Personnel security are also important parts of the equation. The final assessment will be made by Accrediting Officer (AO) and Site Security Manager (SSM), determining technical measures for each SCIF application. The...
20Sep
RF Shielding Curtains-Separation and Isolation!
RF Shielding Curtains-Separation and Isolation! RF Shielding Curtains are relocatable shields designed for isolating or separating areas from RF waves. Curtains can be made to the customer's specification of size, Shielding Effectiveness, and suspension method. The conductive metalized textiles and number of layers used in their manufacture determine the RF shielding properties of the curtain. RF Shielding Curtains can even be made to withstand weather, UV, and rough treatment with a "ruggedized finish"! RF Isolation...
06Sep
Rugged Conditions Require Ruggedized Textiles!
Rugged Conditions Require Ruggedized Textiles! RF Shielded Enclosures are usually located indoors, protecting them from the elements. The thin conductive textiles used to manufacture enclosures can't stand up well unprotected in extreme conditions. Wind, rain, and ocean spray can damage or destroy the enclosures very quickly. The military and law enforcement often need command centers for their activities to be portable and able to stand up to tough conditions. Lives are at stake in these harsh environments as well as...
08Aug
Computer/Digital Forensics-Analysis of Digital Evidence!
Computer/Digital Forensics-Analysis of Digital Evidence! The terms Computer Forensics and Digital Forensics are often used interchangeably. Technically, computer forensics refers to the investigation of computers. Digital Forensics refers to the investigation of ALL digital devices. In the real world, Digital Forensics is probably the more accurate name. Digital data storage is a component of almost all criminal activities investigations. Evidence is often hidden in computers, cell phones, flash drives, and even in cameras! Criminals are often painstaking in their data...
17May
Digital Privacy-How do we Achieve it?
Digital Privacy-How do we Achieve it? Undoubtably, today's hackers are becoming more sophisticated. The news brings stories daily about ransomware, security breaches, and identity theft. How can we protect ourselves from these personal attacks? Many of these crimes can be prevented logically. Protecting electronic devices with updated antivirus programs is mandatory. Common sense data security measures are important in daily situations. These include not leaving a computer open when you leave the workspace, and not opening emails and links that...
03May