Police Approved: Secured by Design.

Blog

Mobile About Slide
Phone Vulnerability and Security - Faraday Bag Shielding

Top Reasons & Benefits For Choosing a Disklabs Faraday Bag

12.07.19

Disklabs Faraday Bags ensure the security of evidence, protect important files and safeguard key information.  Whether it is on a mobile phone, tablet, laptop or digital device. We are the number one provider of RF shielding into military, law enforcement and government agencies globally.

Benefits of choosing Disklabs Faraday bags 

  • Proven track record – Over 250,000 units in service, in 80 countries.
  • Quality and performance – Designed and manufactured in the UK by Disklabs, The Digital Forensic Experts.
  • Short lead times – Disklabs maintain stock levels that enable most orders to be dispatched on the same day and a supply chain without risk of changing tariffs.
  • Testing – Disklabs Faraday bags are independently tested and accredited by UK Police, Secured by Design.
  • Value for money –Disklabs Faraday bags are the most cost-effective and best environmental shielding solution, especially when compared to disposable bags. 
  • Ease of use – Disklabs soft bags incorporate easy to use hook and loop sealing method.
  • Reliability – Disklabs faraday bags are manufactured from Military Grade water-resistant outer material, double layered RF shielding and Velcro fastening
  • Range of products – Disklabs offer a range of products from key shields to large holdalls to meet every potential application. 

Shielding performance criteria for all Disklabs Faraday bags.

  • Disklabs Faraday bags are designed to isolate a device from a wide spectrum of RF signals with the highest possible dBm attenuation* margin to prevent connection to wireless networks.
  • Independent assessment has determined that attenuation in excess 50dBm* across all wireless frequencies offers the necessary protection to prevent wireless-enabled digital devices connecting to networks when isolated in a faraday bag. Anything less will not counter the risk of unwanted connection, especially when in close proximity to a cell site or wireless access point.
  • Working in conjunction with independent experts and industry stakeholders to establish a key set of performance criteria, Disklabs have set the standard in faraday bag testing procedures which have been undertaken by De Montfort University Leicester and oversite and auditing of the results by UK Police, Secured by Design.

ADDITIONAL RESOURCES

Disklabs Limited, Galena Close, Tamworth, Staffordshire, B77 4AS https://www.disklabs.com/

Professor Alistair Duffy BEng(Hons), MEng, MBA, PhD, CEng, FIET, IEEE Fellow, FRSA. De Montfort University

https://faradaybag.com/faraday-testing/

*Attenuation is an important consideration in the modern world of wireless communication. Attenuation limits the range of radio signals and is affected by the material it must pass through.

 

Stack of Unbranded Faraday Bags by Disklabs

Countering tracking applications and securing digital evidence

16.01.18

The seizure of mobile phones and other digital devices by Law Enforcement Organisations is increasing.

Failing to isolate a wireless capable device increases the risk that critical evidence will be lost and introduces the potential for criminals to track the location of law enforcement officers, vehicles and sensitive sites.

The data contained in these seized digital devices is now one of the most important factors in capturing the critical evidence that ultimately secures a conviction.

Evidence handling procedures for seized digital devices advise that this is best carried out by a forensic specialist however in most cases investigators and police officers are required to secure phones and computers without this support.

This white paper will show that there is a compelling case for all investigators and police officers to have immediate access to faraday bags whilst on duty to ensure the security of digital evidence and prevent transmission of a device location.

Contents of the White Paper

  • Definitions used in this white paper
  • Potential pitfalls when securing a digital device
  • The benefits of using Faraday bags for digital device seizure.
  • Faraday bag design considerations for securing evidence in the field.
  • Detailed design characteristics
  • Testing/Certification
  • Special features and branding
  • Conclusion
  • Additional resources

Definitions used in this white paper

Digital device

Any device that is capable of wireless connectivity e.g. Mobile Phones, Tablets, GPS, Computers, Digital Cameras and e-Readers.

Faraday bag

Designed for law enforcement applications, an enclosure of conductive material that effectively shields a digital device from the radio frequencies used by Wi-Fi, Bluetooth, GPS, Mobile Phones and active RFID.

Attenuation

This is a reduction in radio signal strength, measured in dB. This is affected by the material it must pass through.

Volatile Memory

Is computer storage that only maintains its data while a device is powered on e.g. most RAM (Random Access Memory) is volatile.

Nonvolatile Memory:

Is memory or storage that is saved regardless of a device being powered on or off e.g. hard drives, flash memory and read-only memory.

Tracking Application

Overt or covert software that transmits the location of a digital device via a wireless network that can be monitored by third parties.

Evidence Handling Procedures

Documents published by Governments and Law Enforcement Organisations (usually in the public domain) which give guidance on the seizure, acquisition, extraction and presentation of digital evidence.

Potential pitfalls when securing digital devices

Evidence handling procedures for a seized digital device vary between countries and jurisdictions. This white paper assumes that a Law Enforcement Officer with appropriate authority has decided to seize a digital device as it is likely to hold evidence in relation to an offence that has been committed.

If a seizure is part of a planned operation, a forensic specialist may be on hand to secure the evidence in digital devices (especially computers) however it is more usual that Law Enforcement Officers are required to undertake the seizure of computers and mobile phones without this forensic support.

Evidence handling procedures will typically advise that the examination of original digital data must be carried out by a person who is competent to do so. Unless a law enforcement officer is trained in the handling a multitude of digital devices the process of accessing a phone, tablet or computer to switch it off, isolate wireless connectivity or extract evidence may be called into question later.

For this reason, some evidence handling procedures advise that a digital device is always best left untouched until appropriate team members, trained in the securing of digital forensic evidence, are available. This delay increases the risk that critical evidence may be remotely modified or wiped.

Physically securing a crime scene will NOT prevent remote access to wireless devices that are still powered up and applications such as ‘find my phone’ may enable the remote wiping of critical data. Many criminals are aware of this and will have furnished collaborators with account access details and passwords in case of arrest. Also, there is a risk that deletion of data on the web (e.g. incriminating data in emails and other online messaging services) may also be automatically deleted or overwritten in the seized device before it can be forensically examined.

Even if a device seems to be switched off this is not always the case. Screensavers and apps can give this impression, whereas in reality they are still powered up, connected to wireless networks and transmitting their location.

Some evidence handling procedures will advise officers to switch a device off, which will require them access to the device and will not preserve volatile memory, which may hold useful data that is lost when powered down.

It is generally considered that the best practice is for the first contact with a digital device is undertaken and documented by a forensic specialist. Generally, the forensic process for the examination and acquisition of digital evidence is well documented and regulated but the handling of these devices prior to this formal forensic examination is often undocumented and inconsistent.

The benefits of using a Faraday bag when seizing a digital device

Considering all the variables it is important for law enforcement organisations to have a simple evidence handling procedure for seized digital devices that ensures that no data is lost and ratifies the legitimacy of the evidence this potentially provides.

This procedure needs to be consistent, require the minimum training, have a very high probability of preserving critical evidence and isolate tracking applications.

The wider deployment of Faraday bags is an essential tool in achieving this goal.

    • Placing a device in a faraday bag will isolate wireless connectivity without the requirement to manipulate (use) buttons, touch screens and keyboards.
    • This process also maintains the device in a powered on state maintaining volatile memory*
    • In some seizures, it is acceptable to allow a battery to discharge over time (preserving the non-volatile memory) and the faraday bag will isolate the device from potential wireless connectivity until this is completed.
    • Prevents automatic updates to data subsequently modified on the web. It also prevents the device bringing in new data that may overwrite evidence.
    • Isolates tracking software that could identify a device location during transit and after delivery to a secure storage facility.
    • Ensures that the first physical contact with the device keys and buttons is always undertaken by a digital forensic specialist.
    • Allows the prosecution to show that the evidence produced is no more and no less now than when it was first taken e.g. Maintaining the image of the data on the device at the time of seizure.

*The process of isolating a device may increase the battery discharge rate and reduce standby time. To ensure the volatile memory has preserved the introduction of an additional power supply will mitigate the risk of a device powering down before it can be forensically examined.

Faraday bag design considerations for securing evidence in the field.

There are many ‘off the shelf’ and ad hoc products that offer faraday environment characteristics. These include specialist forensic examination boxes, anti-static bags and consumer products. Ad hoc faraday environment suggestions can range from a microwave oven, biscuit tin or aluminium foil. All these solutions have disadvantages as they are not designed for this specific application and will not be ‘fit for purpose’.

Essential Requirement.

    • The faraday bag must provide RF shielding for all the relevant Wi-Fi, GPS, Bluetooth, Active RFID and Mobile phone frequencies e.g. 400MHz to 6000MHz with attenuation >50dB across all of the range.
    • Be of robust construction, use a woven exterior material to protect the multiple layer internal metallised lining.
    • Be of small form factor when not in use for easy storage and/or inclusion in the equipment carried on the person or in a vehicle
    • Be reusable and have a simple, repeatable and reliable sealing method
    • Independently tested to confirm the required attenuation standard is met
    • Instructions for use printed on the exterior of the bag. ( Non branded option for covert operations)
    • Available in a range of sizes to accommodate a wide variety of digital devices
    • Training material available in the use of Faraday bags and the handling of seized digital devices.
    • Cost effective (To ensure maximum deployment of faraday bags in the organisation they need to be affordable).

Detailed design characteristics

Closure Method    

Traditionally faraday bags have used a rolled-up top to fold over the metalized surfaces to ensure effective shielding, however, this is unsightly and inconvenient. A bag that closes with a single flap design, (Fig 1) like an envelope, is certainly more convenient as long as the design meets the shielding requirement.

Fig 1 Single flap design closure.

Material Layers

Faraday bags made with a single layer of faraday fabric are unlikely to shield all wireless signals in all situations (specifically 4G and Wi-Fi). It’s important to achieve a high level of shielding with multiple layers of fabric on each side.  Flat bags will typically have four layers in total.

Faraday Fabric Material

Not only is it important to have dual stitched seams, but the types of materials are also imperative to the effectiveness of any faraday bag. The best-metallised fabric is made of highly conductive metals such as silver and copper (Fig 2)

Some materials use alternative metals such as tin or nickel to reduce cost, however, these are less conductive. Fewer conductivity results in less effective signal attenuation (Reduced shielding).

It should also be noted that inserts or liners that use anti-static bags (or metal-coated plastic bags) will not offer high shielding and are not robust enough for this application.

Fig 2 Metalized fabric enables the manufacture of lightweight faraday shielding.

Typical product configurations

Once it has been confirmed that the manufacturing materials will deliver the right levels of attenuation and shielding designs can then be configured at different sizes to support the most popular wireless products e.g. phones, tablets and laptops.

Laptop bag

These come in a variety of sizes and configurations. Typically, the main shielded enclosure is designed to fit laptops commonly used and include handles, carry straps and additional pockets for power supplies (Fig 3).

Fig 3. Standard design configured for the Dell Latitude 5280 or Microsoft Surface Pro (Version 2, 3 and 4)

Laptop sleeve

Alternatively, the Faraday Shield can be configured as a sleeve (Fig 4).

Fig 4 Storage sleeve designed to accommodate the the Microsoft Surface Pro (Version 2,3 and 4)

Storage sleeves can be designed to protect all phones, tablets and laptops. Additional features such as carry straps, battery packs and webbing attachment points can be added (Fig 5).

Fig 5 Different sizes sleeves are available depending on the device being shielded

Testing/Certification

What criteria should be used to ensure an effective level of shielding? Assessment by independent authorities has established that attenuation of 50dBm across all wireless frequencies will give the necessary protection with a margin of safety and anything less may offer some level of protection but doesn’t counter the risk of close proximity to a cell site or a modified wireless system with boosted power designed solely to defeat shielding solutions. The power output and receive sensitivity of standard wireless systems is mandated by international regulation, however, developing radios that work outside of these parameters is well within the capability of the hacker with limited understanding of RF device design.

The faraday bag must cover all the current generation of wireless frequencies. Testing to confirm the signal attenuation across this range of frequencies and supporting this with an independent design verification is an essential requirement that should be included in any procurement specification.

It is a common misconception that a Faraday cage will block all radio signals however it will, in reality, have a varied attenuation depending on the waveform. It is important to check that the bag will shield a device from all wireless frequencies.

Other manufacturing standards such as ISO 9001  and ISO17025 should be required of the supplier to ensure consistent quality and shielding verification should be carried out on every bag prior to delivery. Cheaper products may use random sample testing. This should not be accepted.

Maintenance and Support

If a high quality metalized lining material is used this will ensure reliable long-term resistance to general wear and tear. If the lining material has an obvious rip or tears in the metalized fabric it should be repaired as soon as possible. Using a double layer of metalized material mitigates the risk that the shielding will be less effective if damaged.

It is also recommended that the Faraday shield is periodically checked to confirm shielding performance. Reverifying the performance is a relatively simple procedure. For phones and other 3G or 4G devices simply connect to a network, place the device in the shield leave for 20 to 30 seconds and then try to connect to it. (Call it). The phone should have no service.

The same procedure can be applied to tablets and computers on Wi-Fi or Bluetooth networks. Connect the device to a trusted network, then place the device in the shield for 30 seconds and then remove. A review of the connectivity logs will confirm the device was isolated when placed in the bag.

Special features and branding

There may be a requirement to add special features and Disklabs will be able to advise on the design feasibility. Customers may also require the organisation name, serial numbers and barcodes to be added to meet their specific requirements.

Conclusion

Faraday Bags ensure the security of digital evidence and safeguard officers from there location being tracked by criminals.

For these reasons, there is a compelling argument for law enforcement organisation to make faraday bags standard equipment for all investigators and officers who may be required to secure digital devices.

Phone Vulnerability and Security - Faraday Bag Shielding

Faraday shielding helping to secure the mobile workforce

19.01.18

Do your mobile workforce use laptops and mobile phones?

Think about the information accessible from these devices and how it could damage your organisation if it got into the wrong hands.

It is not possible for IT Managers to guarantee that security discipline is always maintained by the mobile workforce when away from a principal site.

This is presenting a growing risk to government and business organisations that deploy a mobile workforce.

The simple substitution of a conventional laptop bag with a Faraday shield variant will help to significantly reduce the risk of malicious attacks and unauthorized access to data via wireless connectivity.  

Contents

  • MAKING THE MOBILE WORKFORCE MORE SECURE
  • WIRELESS NETWORK SECURITY RISKS
  • FARADAY SHIELD DESIGN CRITERIA AND BEST PRACTICE
  • CONCLUSION
  • ADDITIONAL RESOURCES

MAKING THE MOBILE WORKFORCE MORE SECURE

We have entered the age where mobile devices provide all the tools and technology to enable employees to work away from an organisation’s principal location. Workplace flexibility is increasing year on year with significant benefits in efficiency and convenience, however, this change in culture is also introducing new and growing risk to networks and data.

Not many of us would leave a device unattended or unlocked in an unsecured environment, however physically be carrying or be using a computer or phone is no guarantee that the device is secure and not at risk from unauthorised intrusion.

Most employees will understand the importance of keeping the organisation’s data secure. Strict but workable IT policies will gain the buy-in from employees and ensure they are more open to approaching the organisation with security concerns.

So how do we ensure that the mobile workforce buys into and support the security requirements of the organisation? The best way is the supply of appropriate training and equipment relevant to their mobile working environment. A policy that has empathy with the challenges of the person working in the field is more likely to be accepted. That will still leave a risk that wireless security policy may not always be adhered to. Although not a panacea for all security issues a Faraday shield for the digital devices used by mobile workforce is an important addition to the IT Managers toolbox of preventive measures employed to keep an organisations data safe.

This whitepaper will highlight the risk of data theft from any device that has the potential to connect to a wireless data network and how the new bag and sleeve designs that incorporate shielding will be beneficial in significantly reducing this risk.

WIRELESS NETWORK SECURITY RISKS

Restricting the use of all third-party Wi-Fi networks is usually impracticable and defeats many of the benefits of the mobile workforce so IT Managers will mitigate this risk through training of staff on the type of networks that should be used. Additional security protocols required during login (e.g. VPN, two-factor authentication and encryption) are essential in preventing attacks however a Faraday shield offers the first line of defence.

Simple precautions on third-party networks such as avoiding sites that do not use passwords, ask you to re-enter your password or have invalid security certificates is simple for the mobile workforce to assess and follow.

The Faraday shield will not prevent the risks to the device when Wi-Fi or Bluetooth is enabled by the user however it will protect the device from malicious attack assuming it is not switched off or put into ‘airplane mode’ after use.

The following scenario is just one way that your computer could be at risk and shows how an isolated device is protected.

One common way that hackers will gain entry to a device is by use of what is commonly called ‘the evil twin’. This is a fraudulent Wi-Fi access point that appears to be legitimate. A good example would be an airport lounge network and although the hacker may struggle to override the legitimate Wi-Fi security protocols in the lounge itself there would be nothing to stop a hacker setting up elsewhere in the airport or even in the aircraft. A targeted computer could still be at risk if it was in standby mode and not powered down as it may recognize and reconnect to what it thinks is this network.

Phones can be even more susceptible and will automatically connect to what it thinks are trusted Wi-Fi networks. The security protocol of many phone apps is poor and they will leave a back door into the device.  

This is a typical scenario where the faraday shield may prevent such an attack because even with device in standby and the Wi-Fi left on, the bag would isolate the device from wireless connectivity.

Also, if Wi-Fi is left on whilst passing through a transportation hub the firewalls and encryption may prevent access to a computer however there is still useful data that can be gained from capturing an IP address, at a specific time and location (pattern of life surveillance) so isolating wireless connectivity in a device at all times when not in use is advisable. Pattern of life data can provide useful data to the hacker to support a subsequent targeted attack on an individual device and then subsequently to the home network it connects to.

Wi-Fi is not the only wireless security issue. Bluetooth has been adapted to make remote devices more easily connected. This has been adopted to make it easier for accessories (and in particular handsfree headphones) to be connected but leaves an unsecured gateway into many devices. This is a more prevalent problem for phones but most computers are susceptible to the same risks.

Everybody who uses a digital device is susceptible to this risk however sophisticated hackers would normally target an individual or organisation for gain. This could be sponsored by a sovereign state or criminal gangs and the ultimate goal is likely to be to gain covert access to an organisations network rather than the individually targeted computer.

The state-sponsored threat is clearly higher for international business travellers and diplomats. Restricting wireless connectivity directly to a 3G or 4G data network can add a layer of security, however, this will not defend against state-sponsored hacking and in this scenario, devices should always be shielded whenever they are not in use at a secure location. If it necessary to connect to a phone network, restricting this to 4G will also give additional protection as it has more security features than the GSM, 3G, CDMA and GPRS.

It should also be noted that a hacker targeting a specific organization is likely to attack a senior officer or official as they will have access to more security layers in their organisation if the network is breached.

It is the challenge for the IT and Security teams to make the life of hacker as difficult as possible and a Faraday shield for every digital device used by the mobile workforce will be a simple but effective addition to the arsenal of protective measures.

FARADAY SHIELD DESIGN CRITERIA AND BEST PRACTICE

Having assessed the threat and decided to introduce a wireless shielding solution for your mobile workforce what type of faraday bag do you need?

Clearly, the key criteria is an enclosure that will restrict all types of wireless intrusion to a device, however, there are other factors to be considered including robustness, reliability, longevity, ease of use, cost, aesthetics and physical protection of the device.

To ensure the mobile workforce use the shield effectively the solution will benefit from all the best features of a laptop bag or sleeve but with the additional benefit of isolating the device from the wireless frequencies covering Bluetooth, Wi-Fi, GPS and all mobile phone networks.

An example of why the aesthetics are important can be supported by the recent media coverage of the Brexit Secretary carrying a large aluminium faraday briefcase. This highlighted the fact that there is sensitive data on the device contained within it and would attract the attention of potential hackers. A bag that does not outwardly exhibit any special features is therefore desirable.

Design considerations

Faraday bags are designed to isolate a device from a wide spectrum range of RF signals with the highest possible dBm attenuation* margin. Having made the investment in a shielding enclosure the user will want to ensure it is fit for the purpose.

Products aimed at consumers are typically countering RFID connectivity only and will not offer adequate shielding from all wireless technologies. Also, the product needs to look the part which in most cases is robust construction using a black woven exterior material. This traditional style and material will meet most user expectations though manufacturers should be prepared to tailor a bag or sleeve to meet specific customer requested features and branding.

*Attenuation is an important consideration in the modern world of wireless communication. Attenuation limits the range of radio signals and is affected by the material it must pass through.

Product design

Having established that the design needs to look like a commercial product the specific design configuration to ensure effective shielding can then be considered.

Closure Method

Traditionally faraday bags have used a rolled-up top to fold over the metalized surfaces to ensure effective shielding, however, this is unsightly and inconvenient. A bag that closes with a single flap design, (Fig 1) like an envelope, is certainly more convenient as long as the design meets the shielding requirement.

Fig 1 Single flap design closure.

Material Layers

Faraday bags made with a single layer of faraday fabric are unlikely to shield all wireless signals in all situations (specifically 4G and Wi-Fi). It’s important to achieve a high level of shielding with multiple layers of fabric on each side.  Flat bags will typically have four layers in total.

Faraday Fabric Material

Not only is it important to have dual stitched seams, but the types of materials are also imperative to the effectiveness of any faraday bag. The best-metallised fabric is made of highly conductive metals such as silver and copper (Fig 2) These metals are not cheap, so a high-quality faraday fabric is not either.

Some materials use alternative metals such as tin or nickel, however, these are less conductive. Fewer conductivity results in less effective signal attenuation (Reduced shielding).

It should also be noted that inserts or liners that use anti-static bags (or metal-coated plastic bags) will not offer high shielding and are not robust enough for this application.

Fig 2 Metalized fabric enables the manufacture of lightweight faraday shielding.

Typical product configurations

Once it has been confirmed that the manufacturing materials will deliver the right levels of attenuation and shielding designs can then be configured to support the most popular wireless products e.g. phones, tablets and laptops.

Laptop bag

These come in a variety of sizes and configurations. Typically, the main shielded enclosure is designed to fit laptops commonly used by the mobile workforce including handles, carry straps and additional pockets for power supplies (Fig 3).

Fig 3. Standard design configured for the Dell Latitude 5280 or Microsoft Surface Pro (Version 2,3 and 4)

Laptop sleeve

Alternatively, the Faraday Shield can be configured as a sleeve that then fits in any commercial bag (Fig 4).

Fig 4 Storage sleeve designed to exact dimensions of the Microsoft Surface Pro (Version 2,3 and 4)

Storage sleeves can be designed to protect all phones, tablets and laptops. Additional features such as carry straps and belt or webbing attachment points can be added (Fig 5).

Fig 5 Different sizes sleeves are available depending on the device being shielded

Testing/Certification

What criteria should be used to ensure an effective level of shielding? Assessment by independent authorities has established that attenuation of 50dBm* across all wireless frequencies will give the necessary protection with a margin of safety and anything less may offer some level of protection but doesn’t counter the risk of close proximity to a cell site or a modified wireless system with boosted power designed solely to defeat shielding solutions. The power output and receive sensitivity of standard wireless systems is mandated by international regulation, however, developing radios that work outside of these parameters is well within the capability of the hacker with limited understanding of RF device design.

A professional forensic faraday bag will cover all the current generation of wireless frequencies. Testing to confirm the signal attenuation across this range of frequencies and supporting this with an independent design verification is an essential requirement that should be included in any procurement specification.

Typical professional faraday bag test results showing the 50dBm criteria met across a range of wireless frequencies

Other generic standards such as ISO 9001 should be required of the supplier to ensure consistent quality and shielding verification should be carried out on every bag prior to delivery. Cheaper products may use random sample testing. This should not be accepted.

Maintenance and Support

If a high quality metalized lining material is used this will ensure reliable long-term resistance to general wear and tear. If the lining material has an obvious rip or tears in the metalized fabric it should be repaired as soon as possible. Using a double layer of metalized material mitigates the risk that the shielding will be less effective if damaged.

It is also recommended that the Faraday shield is periodically checked to confirm shielding performance. Reverifying the performance is a relatively simple procedure. For phones and other 3G or 4G devices simply connect to a network, place the device in the shield leave for 20 to 30 seconds and then try to connect to it. (Call it). The phone should have no service.

The same procedure can be applied to tablets and computers on Wi-Fi or Bluetooth networks. Connect the device to a trusted network, then place the device in the shield for 30 seconds and then remove. A review of the connectivity logs will confirm the device was isolated when placed in the bag.

Special features and branding

There may be a requirement to add special features and Disklabs will be able to advise on the design feasibility. Many organisations issue branded products to their staff and customers. This can be incorporated into all designs.

CONCLUSION

Public wireless networks are increasingly widespread and as a result, the use of these to gain unauthorised access to computers and networks in the mobile workforce is becoming more prevalent.

By isolating a computer or tablet from wireless RF signals when not in use will significantly reduce the risk of an illegal attack.

Until recently the incorporation of Faraday shields into enclosures used to carry wireless-enabled devices has been mainly adopted by Digital Forensic Specialists, Military and Intelligence users. The development of cost-effective shielding solutions that mimic the style and usability of commercial bags and sleeves will overtime they become the standard for the mobile workforce.

ADDITIONAL RESOURCES

Disklabs Limited, Galena Close, Tamworth, Staffordshire, B77 4AS http://www.disklabs.com/

Professor Alistair Duffy BEng(Hons), MEng, MBA, PhD, CEng, FIET, IEEE Fellow, FRSA. De Montfort University

https://faradaybag.com/faraday-testing/

Find a Distributor

Find our closest distributors near you. Alternatively you can see a list of all our distributors here.

Enter your country

Distributors in

Disklabs Faraday Bags

Disklabs House, Galena Close, Tamworth, B774AS

Visit Website
Close

Apply to be a distributor

We are always on the look out for forward thinking companies and individuals to join our global network of distributors

We are always on the look out for forward thinking companies and individuals to join our global network of distributors.

 

Our requirements from you:

  1. Be forward thinking in your approach to business.
  2. To be a supplier to either law enforcement, intelligence, military or government agencies.
  3. To purchase a distributor pack*
  4. Supply us with a high resolution logo and full contact details.

What we do for  you:

  1. You gain an exclusive sales territory for all our faraday products.
  2. You will receive an exclusive generous distributor discount on all products.
  3. You get advanced notice of any new products being devleloped.
  4. You receive high resolution images of all our products for your website.
  5. You receive constantly updated ebrochures, (which can be translated and appended with your own logo).
  6. You will be able to receive marketing assistance – if exhibiting, if it is viable, we can assist your team with additional staffing and sample products.
  7. You will be able to work directly with the development team to help in the development of new products.
  8. You will be listed on the dedicated www.faradaybag.com website, (top of all major search engines).
  9. All sales leads through to Disklabs will be sent to the appropriate global distribution partner.

Apply





    Close