Faraday Bags

Browse our range of original, custom made, bespoke faraday bags for phones, laptops and more.

Designed for security-conscious car owners, who want to ensure that their car keys are not scanned or cloned and for mechanics – to enable them to determine whether or not the key or the car has a problem.

Specifically designed at the request of an Air Force squadron to protect an iPad Mini from interfering with other digital equipment when undertaking training. It also prevents any unauthorised access from other military or government agencies.

Specifically designed to protect a ‘standard’ iPad from unauthorised remote access. This product was commissioned by a national police authority for when they sent out new iPads to their staff. It ensured that the confidential data on their iPads remained secure from criminals that they were investigating.

A RF shielded wallet hand-crafted in Birmingham, UK, manufactured by hand, using genuine leather. Lined with RF Shielding material to ensure your credit cards and ID Cards are kept safe from criminals.

For holding ID cards and passes whilst discreetly shielding mobile phone/passport.

All ID cards will still be able to use RFID and NFC, which will be on display in a small, see-through sleeve. ID Shield will isolate one mobile phone and passport, GPS or other similar-sized device. Soft Back.

A large, flat holdall (XXL laptop bag type) with carry straps. The HoldallShield will isolate multiple devices including laptops, tablets and other devices. These are mainly used for carrying large amounts of items that require shielding from RF.

A tablet sized shielded windowless bag that provides RF Shielding for iPads and tablets, inhibiting connection from WiFi, Bluetooth, 2G, 3G, 4G, LTE.

A laptop sized (will comfortably hold a 15inch laptop) shielded bag designed to isolate all types of laptop from RF connectivity, (WiFi, 2G, 3G, 4G, Bluetooth).

A small, windowless bag that will isolate one mobile phone, GPS or other similar-sized device. It is used to ensure that mobile phones cannot be connected to remotely, preventing remote hacking, remote wiping of data/evidence and remote surveillance.