Police Approved: Secured by Design.

Blog

Mobile About Slide
British Manufacturing of Faraday Bags

Buying Bespoke Faraday Bags – Finding the Perfect Fit

17.05.18

Can’t find the correct Faraday Bag or would like it in a different colour?

If you are unable to find exactly what you are looking for or have a project that requires customisation please do not hesitate to contact the development team at faraday@disklabs.com.

One of the benefits of Disklabs manufacturing in the UK is that we have the capability to develop rapid prototypes and special enclosures to meet urgent or special requirements.

The most economical solution will almost certainly be to use a standard product. Our in-house team or network of distributors are on hand to help you choose the right shielding solution from the standard product range.

It should be noted that special or bespoke projects will usually require moderate to large volumes ordered to be cost-effective.

Typical bespoke or special projects are:

  • Minor dimensional adjustments or design changes
  • Label changes to accommodate different languages or branding
  • Special packaging for retail display
  • Different colour options
  • Increased layers of shielding material.
  • Large area shielding enclosures for vehicles and rooms.

Give us a ring on +44 (0) 1827 55555 or mail us at farday@disklabs.com to find out more.

Stack of Unbranded Faraday Bags by Disklabs

Countering tracking applications and securing digital evidence

16.01.18

The seizure of mobile phones and other digital devices by Law Enforcement Organisations is increasing.

Failing to isolate a wireless capable device increases the risk that critical evidence will be lost and introduces the potential for criminals to track the location of law enforcement officers, vehicles and sensitive sites.

The data contained in these seized digital devices is now one of the most important factors in capturing the critical evidence that ultimately secures a conviction.

Evidence handling procedures for seized digital devices advise that this is best carried out by a forensic specialist however in most cases investigators and police officers are required to secure phones and computers without this support.

This white paper will show that there is a compelling case for all investigators and police officers to have immediate access to faraday bags whilst on duty to ensure the security of digital evidence and prevent transmission of a device location.

Contents of the White Paper

  • Definitions used in this white paper
  • Potential pitfalls when securing a digital device
  • The benefits of using Faraday bags for digital device seizure.
  • Faraday bag design considerations for securing evidence in the field.
  • Detailed design characteristics
  • Testing/Certification
  • Special features and branding
  • Conclusion
  • Additional resources

Definitions used in this white paper

Digital device

Any device that is capable of wireless connectivity e.g. Mobile Phones, Tablets, GPS, Computers, Digital Cameras and e-Readers.

Faraday bag

Designed for law enforcement applications, an enclosure of conductive material that effectively shields a digital device from the radio frequencies used by Wi-Fi, Bluetooth, GPS, Mobile Phones and active RFID.

Attenuation

This is a reduction in radio signal strength, measured in dB. This is affected by the material it must pass through.

Volatile Memory

Is computer storage that only maintains its data while a device is powered on e.g. most RAM (Random Access Memory) is volatile.

Nonvolatile Memory:

Is memory or storage that is saved regardless of a device being powered on or off e.g. hard drives, flash memory and read-only memory.

Tracking Application

Overt or covert software that transmits the location of a digital device via a wireless network that can be monitored by third parties.

Evidence Handling Procedures

Documents published by Governments and Law Enforcement Organisations (usually in the public domain) which give guidance on the seizure, acquisition, extraction and presentation of digital evidence.

Potential pitfalls when securing digital devices

Evidence handling procedures for a seized digital device vary between countries and jurisdictions. This white paper assumes that a Law Enforcement Officer with appropriate authority has decided to seize a digital device as it is likely to hold evidence in relation to an offence that has been committed.

If a seizure is part of a planned operation, a forensic specialist may be on hand to secure the evidence in digital devices (especially computers) however it is more usual that Law Enforcement Officers are required to undertake the seizure of computers and mobile phones without this forensic support.

Evidence handling procedures will typically advise that the examination of original digital data must be carried out by a person who is competent to do so. Unless a law enforcement officer is trained in the handling a multitude of digital devices the process of accessing a phone, tablet or computer to switch it off, isolate wireless connectivity or extract evidence may be called into question later.

For this reason, some evidence handling procedures advise that a digital device is always best left untouched until appropriate team members, trained in the securing of digital forensic evidence, are available. This delay increases the risk that critical evidence may be remotely modified or wiped.

Physically securing a crime scene will NOT prevent remote access to wireless devices that are still powered up and applications such as ‘find my phone’ may enable the remote wiping of critical data. Many criminals are aware of this and will have furnished collaborators with account access details and passwords in case of arrest. Also, there is a risk that deletion of data on the web (e.g. incriminating data in emails and other online messaging services) may also be automatically deleted or overwritten in the seized device before it can be forensically examined.

Even if a device seems to be switched off this is not always the case. Screensavers and apps can give this impression, whereas in reality they are still powered up, connected to wireless networks and transmitting their location.

Some evidence handling procedures will advise officers to switch a device off, which will require them access to the device and will not preserve volatile memory, which may hold useful data that is lost when powered down.

It is generally considered that the best practice is for the first contact with a digital device is undertaken and documented by a forensic specialist. Generally, the forensic process for the examination and acquisition of digital evidence is well documented and regulated but the handling of these devices prior to this formal forensic examination is often undocumented and inconsistent.

The benefits of using a Faraday bag when seizing a digital device

Considering all the variables it is important for law enforcement organisations to have a simple evidence handling procedure for seized digital devices that ensures that no data is lost and ratifies the legitimacy of the evidence this potentially provides.

This procedure needs to be consistent, require the minimum training, have a very high probability of preserving critical evidence and isolate tracking applications.

The wider deployment of Faraday bags is an essential tool in achieving this goal.

    • Placing a device in a faraday bag will isolate wireless connectivity without the requirement to manipulate (use) buttons, touch screens and keyboards.
    • This process also maintains the device in a powered on state maintaining volatile memory*
    • In some seizures, it is acceptable to allow a battery to discharge over time (preserving the non-volatile memory) and the faraday bag will isolate the device from potential wireless connectivity until this is completed.
    • Prevents automatic updates to data subsequently modified on the web. It also prevents the device bringing in new data that may overwrite evidence.
    • Isolates tracking software that could identify a device location during transit and after delivery to a secure storage facility.
    • Ensures that the first physical contact with the device keys and buttons is always undertaken by a digital forensic specialist.
    • Allows the prosecution to show that the evidence produced is no more and no less now than when it was first taken e.g. Maintaining the image of the data on the device at the time of seizure.

*The process of isolating a device may increase the battery discharge rate and reduce standby time. To ensure the volatile memory has preserved the introduction of an additional power supply will mitigate the risk of a device powering down before it can be forensically examined.

Faraday bag design considerations for securing evidence in the field.

There are many ‘off the shelf’ and ad hoc products that offer faraday environment characteristics. These include specialist forensic examination boxes, anti-static bags and consumer products. Ad hoc faraday environment suggestions can range from a microwave oven, biscuit tin or aluminium foil. All these solutions have disadvantages as they are not designed for this specific application and will not be ‘fit for purpose’.

Essential Requirement.

    • The faraday bag must provide RF shielding for all the relevant Wi-Fi, GPS, Bluetooth, Active RFID and Mobile phone frequencies e.g. 400MHz to 6000MHz with attenuation >50dB across all of the range.
    • Be of robust construction, use a woven exterior material to protect the multiple layer internal metallised lining.
    • Be of small form factor when not in use for easy storage and/or inclusion in the equipment carried on the person or in a vehicle
    • Be reusable and have a simple, repeatable and reliable sealing method
    • Independently tested to confirm the required attenuation standard is met
    • Instructions for use printed on the exterior of the bag. ( Non branded option for covert operations)
    • Available in a range of sizes to accommodate a wide variety of digital devices
    • Training material available in the use of Faraday bags and the handling of seized digital devices.
    • Cost effective (To ensure maximum deployment of faraday bags in the organisation they need to be affordable).

Detailed design characteristics

Closure Method    

Traditionally faraday bags have used a rolled-up top to fold over the metalized surfaces to ensure effective shielding, however, this is unsightly and inconvenient. A bag that closes with a single flap design, (Fig 1) like an envelope, is certainly more convenient as long as the design meets the shielding requirement.

Fig 1 Single flap design closure.

Material Layers

Faraday bags made with a single layer of faraday fabric are unlikely to shield all wireless signals in all situations (specifically 4G and Wi-Fi). It’s important to achieve a high level of shielding with multiple layers of fabric on each side.  Flat bags will typically have four layers in total.

Faraday Fabric Material

Not only is it important to have dual stitched seams, but the types of materials are also imperative to the effectiveness of any faraday bag. The best-metallised fabric is made of highly conductive metals such as silver and copper (Fig 2)

Some materials use alternative metals such as tin or nickel to reduce cost, however, these are less conductive. Fewer conductivity results in less effective signal attenuation (Reduced shielding).

It should also be noted that inserts or liners that use anti-static bags (or metal-coated plastic bags) will not offer high shielding and are not robust enough for this application.

Fig 2 Metalized fabric enables the manufacture of lightweight faraday shielding.

Typical product configurations

Once it has been confirmed that the manufacturing materials will deliver the right levels of attenuation and shielding designs can then be configured at different sizes to support the most popular wireless products e.g. phones, tablets and laptops.

Laptop bag

These come in a variety of sizes and configurations. Typically, the main shielded enclosure is designed to fit laptops commonly used and include handles, carry straps and additional pockets for power supplies (Fig 3).

Fig 3. Standard design configured for the Dell Latitude 5280 or Microsoft Surface Pro (Version 2, 3 and 4)

Laptop sleeve

Alternatively, the Faraday Shield can be configured as a sleeve (Fig 4).

Fig 4 Storage sleeve designed to accommodate the the Microsoft Surface Pro (Version 2,3 and 4)

Storage sleeves can be designed to protect all phones, tablets and laptops. Additional features such as carry straps, battery packs and webbing attachment points can be added (Fig 5).

Fig 5 Different sizes sleeves are available depending on the device being shielded

Testing/Certification

What criteria should be used to ensure an effective level of shielding? Assessment by independent authorities has established that attenuation of 50dBm across all wireless frequencies will give the necessary protection with a margin of safety and anything less may offer some level of protection but doesn’t counter the risk of close proximity to a cell site or a modified wireless system with boosted power designed solely to defeat shielding solutions. The power output and receive sensitivity of standard wireless systems is mandated by international regulation, however, developing radios that work outside of these parameters is well within the capability of the hacker with limited understanding of RF device design.

The faraday bag must cover all the current generation of wireless frequencies. Testing to confirm the signal attenuation across this range of frequencies and supporting this with an independent design verification is an essential requirement that should be included in any procurement specification.

It is a common misconception that a Faraday cage will block all radio signals however it will, in reality, have a varied attenuation depending on the waveform. It is important to check that the bag will shield a device from all wireless frequencies.

Other manufacturing standards such as ISO 9001  and ISO17025 should be required of the supplier to ensure consistent quality and shielding verification should be carried out on every bag prior to delivery. Cheaper products may use random sample testing. This should not be accepted.

Maintenance and Support

If a high quality metalized lining material is used this will ensure reliable long-term resistance to general wear and tear. If the lining material has an obvious rip or tears in the metalized fabric it should be repaired as soon as possible. Using a double layer of metalized material mitigates the risk that the shielding will be less effective if damaged.

It is also recommended that the Faraday shield is periodically checked to confirm shielding performance. Reverifying the performance is a relatively simple procedure. For phones and other 3G or 4G devices simply connect to a network, place the device in the shield leave for 20 to 30 seconds and then try to connect to it. (Call it). The phone should have no service.

The same procedure can be applied to tablets and computers on Wi-Fi or Bluetooth networks. Connect the device to a trusted network, then place the device in the shield for 30 seconds and then remove. A review of the connectivity logs will confirm the device was isolated when placed in the bag.

Special features and branding

There may be a requirement to add special features and Disklabs will be able to advise on the design feasibility. Customers may also require the organisation name, serial numbers and barcodes to be added to meet their specific requirements.

Conclusion

Faraday Bags ensure the security of digital evidence and safeguard officers from there location being tracked by criminals.

For these reasons, there is a compelling argument for law enforcement organisation to make faraday bags standard equipment for all investigators and officers who may be required to secure digital devices.

Army RF Shielding - Faraday Bag

What is a Faraday Wallet and Should I buy one?

31.01.18

Debit and credit cards are important in the modern world and we would never look to give out our financial information. With the rise of contactless payments though, credit and debit card theft is easier than ever before. Faraday wallets were designed to protect your information being stolen without your knowledge.

Before a would-be thief would have to employ tactics such as skimming numbers from credit card machines or cash machines involving a lot of work. Nowadays, however, the smarter criminal can take your details just by standing next to you.

The RFID chip inside your card that lets you make payments by swiping them on top of the machine for you convenience makes them easy targets to be scanned by someone else. What if your wallet is in your back pocket and someone walks up to you with a scanner? Theoretically, they could take sensitive information and allow them to use that information without your consent.

What is a RFID Faraday Wallet and how does it work?

RFID chips have been implemented into a wide variety of things from passports, a microchip for pets and your underground pass to get onto the train. They work by communicating via an RFID reader which uses radio waves to read the information on the chip which contains small electromagnetic fields.

Due to it working in proximity, there is nothing stopping someone from being just close by enough to read those little electromagnetic fields and it has happened before. This is where the RFID blocking Faraday wallet comes into play as the chips are quite easy to block with the correct material. If you encase your wallet to be a Faraday Cage, it will block the electromagnetic signals between a chip and reader.

Put simply, the Faraday cage for a wallet would be a mesh material with small wires of conductive material such as copper, nickel or silver. This would be the makings of the wallet creating the Faraday cage effect. As external electronic fields cause charges around the exterior of the mesh and distribute it, it cancels out the charge or radiation within the meshes interior.

This makes the Faraday wallet able to block external signals, stopping any attacker being able to scan your cards which contain the RFID chips. These are perfect for people who are security conscious, hold sensitive information in their wallet or work within security services, police or government.

You can find out where to buy your own RFID Faraday Wallet from our range of Faraday products.

Phone Vulnerability and Security - Faraday Bag Shielding

Faraday shielding helping to secure the mobile workforce

19.01.18

Do your mobile workforce use laptops and mobile phones?

Think about the information accessible from these devices and how it could damage your organisation if it got into the wrong hands.

It is not possible for IT Managers to guarantee that security discipline is always maintained by the mobile workforce when away from a principal site.

This is presenting a growing risk to government and business organisations that deploy a mobile workforce.

The simple substitution of a conventional laptop bag with a Faraday shield variant will help to significantly reduce the risk of malicious attacks and unauthorized access to data via wireless connectivity.  

Contents

  • MAKING THE MOBILE WORKFORCE MORE SECURE
  • WIRELESS NETWORK SECURITY RISKS
  • FARADAY SHIELD DESIGN CRITERIA AND BEST PRACTICE
  • CONCLUSION
  • ADDITIONAL RESOURCES

MAKING THE MOBILE WORKFORCE MORE SECURE

We have entered the age where mobile devices provide all the tools and technology to enable employees to work away from an organisation’s principal location. Workplace flexibility is increasing year on year with significant benefits in efficiency and convenience, however, this change in culture is also introducing new and growing risk to networks and data.

Not many of us would leave a device unattended or unlocked in an unsecured environment, however physically be carrying or be using a computer or phone is no guarantee that the device is secure and not at risk from unauthorised intrusion.

Most employees will understand the importance of keeping the organisation’s data secure. Strict but workable IT policies will gain the buy-in from employees and ensure they are more open to approaching the organisation with security concerns.

So how do we ensure that the mobile workforce buys into and support the security requirements of the organisation? The best way is the supply of appropriate training and equipment relevant to their mobile working environment. A policy that has empathy with the challenges of the person working in the field is more likely to be accepted. That will still leave a risk that wireless security policy may not always be adhered to. Although not a panacea for all security issues a Faraday shield for the digital devices used by mobile workforce is an important addition to the IT Managers toolbox of preventive measures employed to keep an organisations data safe.

This whitepaper will highlight the risk of data theft from any device that has the potential to connect to a wireless data network and how the new bag and sleeve designs that incorporate shielding will be beneficial in significantly reducing this risk.

WIRELESS NETWORK SECURITY RISKS

Restricting the use of all third-party Wi-Fi networks is usually impracticable and defeats many of the benefits of the mobile workforce so IT Managers will mitigate this risk through training of staff on the type of networks that should be used. Additional security protocols required during login (e.g. VPN, two-factor authentication and encryption) are essential in preventing attacks however a Faraday shield offers the first line of defence.

Simple precautions on third-party networks such as avoiding sites that do not use passwords, ask you to re-enter your password or have invalid security certificates is simple for the mobile workforce to assess and follow.

The Faraday shield will not prevent the risks to the device when Wi-Fi or Bluetooth is enabled by the user however it will protect the device from malicious attack assuming it is not switched off or put into ‘airplane mode’ after use.

The following scenario is just one way that your computer could be at risk and shows how an isolated device is protected.

One common way that hackers will gain entry to a device is by use of what is commonly called ‘the evil twin’. This is a fraudulent Wi-Fi access point that appears to be legitimate. A good example would be an airport lounge network and although the hacker may struggle to override the legitimate Wi-Fi security protocols in the lounge itself there would be nothing to stop a hacker setting up elsewhere in the airport or even in the aircraft. A targeted computer could still be at risk if it was in standby mode and not powered down as it may recognize and reconnect to what it thinks is this network.

Phones can be even more susceptible and will automatically connect to what it thinks are trusted Wi-Fi networks. The security protocol of many phone apps is poor and they will leave a back door into the device.  

This is a typical scenario where the faraday shield may prevent such an attack because even with device in standby and the Wi-Fi left on, the bag would isolate the device from wireless connectivity.

Also, if Wi-Fi is left on whilst passing through a transportation hub the firewalls and encryption may prevent access to a computer however there is still useful data that can be gained from capturing an IP address, at a specific time and location (pattern of life surveillance) so isolating wireless connectivity in a device at all times when not in use is advisable. Pattern of life data can provide useful data to the hacker to support a subsequent targeted attack on an individual device and then subsequently to the home network it connects to.

Wi-Fi is not the only wireless security issue. Bluetooth has been adapted to make remote devices more easily connected. This has been adopted to make it easier for accessories (and in particular handsfree headphones) to be connected but leaves an unsecured gateway into many devices. This is a more prevalent problem for phones but most computers are susceptible to the same risks.

Everybody who uses a digital device is susceptible to this risk however sophisticated hackers would normally target an individual or organisation for gain. This could be sponsored by a sovereign state or criminal gangs and the ultimate goal is likely to be to gain covert access to an organisations network rather than the individually targeted computer.

The state-sponsored threat is clearly higher for international business travellers and diplomats. Restricting wireless connectivity directly to a 3G or 4G data network can add a layer of security, however, this will not defend against state-sponsored hacking and in this scenario, devices should always be shielded whenever they are not in use at a secure location. If it necessary to connect to a phone network, restricting this to 4G will also give additional protection as it has more security features than the GSM, 3G, CDMA and GPRS.

It should also be noted that a hacker targeting a specific organization is likely to attack a senior officer or official as they will have access to more security layers in their organisation if the network is breached.

It is the challenge for the IT and Security teams to make the life of hacker as difficult as possible and a Faraday shield for every digital device used by the mobile workforce will be a simple but effective addition to the arsenal of protective measures.

FARADAY SHIELD DESIGN CRITERIA AND BEST PRACTICE

Having assessed the threat and decided to introduce a wireless shielding solution for your mobile workforce what type of faraday bag do you need?

Clearly, the key criteria is an enclosure that will restrict all types of wireless intrusion to a device, however, there are other factors to be considered including robustness, reliability, longevity, ease of use, cost, aesthetics and physical protection of the device.

To ensure the mobile workforce use the shield effectively the solution will benefit from all the best features of a laptop bag or sleeve but with the additional benefit of isolating the device from the wireless frequencies covering Bluetooth, Wi-Fi, GPS and all mobile phone networks.

An example of why the aesthetics are important can be supported by the recent media coverage of the Brexit Secretary carrying a large aluminium faraday briefcase. This highlighted the fact that there is sensitive data on the device contained within it and would attract the attention of potential hackers. A bag that does not outwardly exhibit any special features is therefore desirable.

Design considerations

Faraday bags are designed to isolate a device from a wide spectrum range of RF signals with the highest possible dBm attenuation* margin. Having made the investment in a shielding enclosure the user will want to ensure it is fit for the purpose.

Products aimed at consumers are typically countering RFID connectivity only and will not offer adequate shielding from all wireless technologies. Also, the product needs to look the part which in most cases is robust construction using a black woven exterior material. This traditional style and material will meet most user expectations though manufacturers should be prepared to tailor a bag or sleeve to meet specific customer requested features and branding.

*Attenuation is an important consideration in the modern world of wireless communication. Attenuation limits the range of radio signals and is affected by the material it must pass through.

Product design

Having established that the design needs to look like a commercial product the specific design configuration to ensure effective shielding can then be considered.

Closure Method

Traditionally faraday bags have used a rolled-up top to fold over the metalized surfaces to ensure effective shielding, however, this is unsightly and inconvenient. A bag that closes with a single flap design, (Fig 1) like an envelope, is certainly more convenient as long as the design meets the shielding requirement.

Fig 1 Single flap design closure.

Material Layers

Faraday bags made with a single layer of faraday fabric are unlikely to shield all wireless signals in all situations (specifically 4G and Wi-Fi). It’s important to achieve a high level of shielding with multiple layers of fabric on each side.  Flat bags will typically have four layers in total.

Faraday Fabric Material

Not only is it important to have dual stitched seams, but the types of materials are also imperative to the effectiveness of any faraday bag. The best-metallised fabric is made of highly conductive metals such as silver and copper (Fig 2) These metals are not cheap, so a high-quality faraday fabric is not either.

Some materials use alternative metals such as tin or nickel, however, these are less conductive. Fewer conductivity results in less effective signal attenuation (Reduced shielding).

It should also be noted that inserts or liners that use anti-static bags (or metal-coated plastic bags) will not offer high shielding and are not robust enough for this application.

Fig 2 Metalized fabric enables the manufacture of lightweight faraday shielding.

Typical product configurations

Once it has been confirmed that the manufacturing materials will deliver the right levels of attenuation and shielding designs can then be configured to support the most popular wireless products e.g. phones, tablets and laptops.

Laptop bag

These come in a variety of sizes and configurations. Typically, the main shielded enclosure is designed to fit laptops commonly used by the mobile workforce including handles, carry straps and additional pockets for power supplies (Fig 3).

Fig 3. Standard design configured for the Dell Latitude 5280 or Microsoft Surface Pro (Version 2,3 and 4)

Laptop sleeve

Alternatively, the Faraday Shield can be configured as a sleeve that then fits in any commercial bag (Fig 4).

Fig 4 Storage sleeve designed to exact dimensions of the Microsoft Surface Pro (Version 2,3 and 4)

Storage sleeves can be designed to protect all phones, tablets and laptops. Additional features such as carry straps and belt or webbing attachment points can be added (Fig 5).

Fig 5 Different sizes sleeves are available depending on the device being shielded

Testing/Certification

What criteria should be used to ensure an effective level of shielding? Assessment by independent authorities has established that attenuation of 50dBm* across all wireless frequencies will give the necessary protection with a margin of safety and anything less may offer some level of protection but doesn’t counter the risk of close proximity to a cell site or a modified wireless system with boosted power designed solely to defeat shielding solutions. The power output and receive sensitivity of standard wireless systems is mandated by international regulation, however, developing radios that work outside of these parameters is well within the capability of the hacker with limited understanding of RF device design.

A professional forensic faraday bag will cover all the current generation of wireless frequencies. Testing to confirm the signal attenuation across this range of frequencies and supporting this with an independent design verification is an essential requirement that should be included in any procurement specification.

Typical professional faraday bag test results showing the 50dBm criteria met across a range of wireless frequencies

Other generic standards such as ISO 9001 should be required of the supplier to ensure consistent quality and shielding verification should be carried out on every bag prior to delivery. Cheaper products may use random sample testing. This should not be accepted.

Maintenance and Support

If a high quality metalized lining material is used this will ensure reliable long-term resistance to general wear and tear. If the lining material has an obvious rip or tears in the metalized fabric it should be repaired as soon as possible. Using a double layer of metalized material mitigates the risk that the shielding will be less effective if damaged.

It is also recommended that the Faraday shield is periodically checked to confirm shielding performance. Reverifying the performance is a relatively simple procedure. For phones and other 3G or 4G devices simply connect to a network, place the device in the shield leave for 20 to 30 seconds and then try to connect to it. (Call it). The phone should have no service.

The same procedure can be applied to tablets and computers on Wi-Fi or Bluetooth networks. Connect the device to a trusted network, then place the device in the shield for 30 seconds and then remove. A review of the connectivity logs will confirm the device was isolated when placed in the bag.

Special features and branding

There may be a requirement to add special features and Disklabs will be able to advise on the design feasibility. Many organisations issue branded products to their staff and customers. This can be incorporated into all designs.

CONCLUSION

Public wireless networks are increasingly widespread and as a result, the use of these to gain unauthorised access to computers and networks in the mobile workforce is becoming more prevalent.

By isolating a computer or tablet from wireless RF signals when not in use will significantly reduce the risk of an illegal attack.

Until recently the incorporation of Faraday shields into enclosures used to carry wireless-enabled devices has been mainly adopted by Digital Forensic Specialists, Military and Intelligence users. The development of cost-effective shielding solutions that mimic the style and usability of commercial bags and sleeves will overtime they become the standard for the mobile workforce.

ADDITIONAL RESOURCES

Disklabs Limited, Galena Close, Tamworth, Staffordshire, B77 4AS http://www.disklabs.com/

Professor Alistair Duffy BEng(Hons), MEng, MBA, PhD, CEng, FIET, IEEE Fellow, FRSA. De Montfort University

https://faradaybag.com/faraday-testing/

The Disklabs Faraday Bag Story

16.02.18

Disklabs have been designing and manufacturing faraday bags for over 14 years but where did the original idea come from in relation to Digital Forensics?

In 1843 Michael Faraday performed a simple experiment with a pewter ice pail, which for the first time demonstrated the principles behind electrostatic and electromagnetic shielding. The same principles are still used today in a wide range of enclosures which isolate devices and sometimes whole buildings from RF.

Traditionally faraday cages utilise solid metal enclosures making them a cumbersome solution for many shielding applications. The introduction of metallised fabric made possible new types of Faraday enclosure.

With a background in hard drive repair and data recovery, in 2004, Disklabs became one of the first companies to develop the capability to forensically analyse mobile phones and computers. It quickly became apparent to the Disklabs team that a simple method of isolating these devices from wireless networks was essential to prevent data being wiped or over written. Moreover, it became clear that a cost-effective, field deployable solution that allowed the user to view screens and manipulate controls whilst in this safe environment would be required to facilitate a forensic examination.

A simple sleeve was thought to be the most practical solution however many of the materials that the Disklabs team tested exhibited inconsistent shielding performance across the range of wireless frequencies. The Disklabs team was looking for material that offered a consistent shielding performance at all frequencies and was robust enough to be used in the construction of a reusable Faraday bag.

After working with the manufacturers a suitable higher specification shielding material combined with a water resistant out cover was developed. The team still had solved the problem of maintaining the Faraday characteristics in the assembled product as the sewing process could degrade the shielding performance. Special threads, sewing technics and repeatable sealing method had to be developed to maintain the required properties once assembled into a bag or pouch.

After many manufacturing trials, a reliable process was developed and the Disklabs team then worked with DeMonfort University to develop test procedures which could be applied to confirm the performance of each new product.

The Disklabs Faraday bag where soon in great demand by Police and Forensic organisations who realised the advantages over hard case Faraday enclosures. Over the last 14 years, demand for bags to shield a multitude of digitals devices has resulted in the comprehensive range of faraday bags Disklabs offers today, helping to solve and prevent crime around the world.

Stealing a car should not be that easy! Disklabs has the key to successful prevention

03.04.18

Tamworth United Kingdom. 6th March 2018: Developed to prevent ‘relay theft’, Disklabs Keyshield is the first RF blocking product to gain the Secured by Design ‘Police Preferred Specification’ accreditation.

Stealing a car should not be easy, but as recent video footage has shown, for cars fitted with keyless entry systems this is not necessarily the case. Luckily prevention is fairly straightforward with the Disklabs Keyshield.

‘Relay Theft’ is a technique adopted by criminals of using a receiver to pick up the signal from a key (which we all typically leave near the front door) and relay this signal back to a second unit adjacent to the vehicle, tricking it into thinking the key is being held next to it. The vehicle can then be opened and driven away.

Simon Steggles, Founder of Disklabs said ‘None of us would knowingly leave our vehicle in an unsecure environment. However, for the owners of vehicles fitted with keyless entry systems a private driveway or carpark may be just such an environment. There has been a recent spate of publicity about criminals using sophisticated technology to enable a car to be stolen from almost any location using a technique called ‘relay theft’. The Disklabs Keyshield was developed as a simple and effective way to prevent this. Following development of this new product we are delighted it has now been accredited with ‘Police Preferred Specification’ by SBD.

Features of the Keyshield:

  • Blocks all RF wireless signals
  • Easy to use
  • Independently tested
  • Functional and stylish design
  • Two Sizes available
  • Uses military grade waterproof resistant material
  • Accredited SBD ‘Police Preferred Specification’
  • Designed and manufactured in the UK

Disklabs is a member of Secured by design, the flagship UK police initiative to help ‘design out’ crime through the use of high-quality innovative products and processes.

Disklabs products are designed to both solve and prevent crime. The UK’s ‘original Disklabs faraday bags’ are used to shield digital devices from the battlefield to the boardroom in over 80 countries. Whether it’s on a mobile phone, tablet, laptop or key fob, we’re the UK’s number one provider of active RF shielding.

To see the full range of Disklabs shielding solutions for all of your digital devices visit us at www.faradaybag.com

Press Contact

Andrew Tilbury
Disklabs Limited
+44 (0)1827 50000
at@disklabs.com
www.faradaybag.com

Multiple Faraday Bags from Disklabs - Covert RF Shielding

Disklabs Faraday Bags gain Secured By Design (SBD) ‘Police Preferred Specification’.

03.04.18

Not many of us would leave a device unattended or unlocked in an unsecured environment, however physically carrying or using a computer, tablet or phone is no guarantee that the device is secure and not at risk from unauthorised intrusion.

Any digital device can be at risk simply by connecting to an unsecured wireless network during your daily commute or in public places and the Disklabs Faraday bag will stop this in its tracks.
The simple substitution of a conventional briefcase or protective sleeve with a faraday shield variant will block connectivity to unsecured networks and malicious tracking applications.

Features of the Disklabs range of faraday products-

  • Blocks all RF wireless signals
  • Easy to use
  • Independently tested
  • Functional and stylish design
  • Uses military grade water resistant material
  • Accredited SBD ‘Police Preferred Specification’
  • Designed and manufactured in the UK

Disklabs is a member of Secured by Design, the flagship UK police initiative to help ‘design out’ crime through the use of high-quality innovative products and processes. Disklabs independently tested range of Faraday Bags are the first to have gained the Secured By Design ‘Police Preferred Specification’.

Disklabs products are designed to both solve and prevent crime. The UK’s ‘original Disklabs faraday bags’ are used to shield digital devices from the battlefield to the boardroom in over 80 countries. For mobile phones, tablets, laptops or key fobs, Disklabs is the UK’s number one provider of active RF shielding.

To see the full range of Disklabs shielding solutions for all of your digital devices visit us at www.faradaybag.com

Press Contact:

Andrew Tilbury
Disklabs Limited
+44 (0)1827 50000
at@disklabs.com
www.faradaybag.com

Disklabs New Notebook Shield has ‘a trick up its sleeve’

03.04.18

Tamworth United Kingdom. 6th March 2018: The primary purpose of a conventional Notebook sleeve is to protect the device from physical damage, so wouldn’t it be great if it could also protect your data at the same time. The NEW Notebook sleeve from Disklabs does just that.

Not many of us would leave our notebook or laptop unattended in an unsecured environment but in reality, many of us do just this. Physically carrying a device during the daily commute or in public spaces still leaves the risk of connectivity to unsecured wireless networks which can be exploited by hackers.

As a digital forensic specialist company, Disklabs is very aware of these risks and has spent over 20 years helping law enforcement, businesses, government agencies and individuals recover lost and corrupted data, culminating in the development of the new Notebook Shield. Simon Steggles, Disklabs founder said ‘The team at Disklabs have long been aware that prevention is better than cure, and the new Notebook Shield has been developed to block all wireless signals, frustrating the hacker’.

The main features of the NEW Disklabs Notebook Shield

  • Blocks all RF wireless signals
  • Protects the device from physical damage.
  • Functional and stylish design
  • Dimensioned for mainstream brands, Apple, Dell and Microsoft etc.
  • Discreet branding
  • Independently tested
  • Uses military grade water resistant material
  • Designed and manufactured in the UK

At Disklabs, data is our business. Our products and services help our clients both solve and prevent crime. The UK’s ‘original Disklabs faraday bags’ are used to shield digital devices from the battlefield to the boardroom in over 80 countries. Whether it’s on a mobile phone, tablet, laptop or key fob, we’re the UK’s number one provider of active RF shielding. Operating from a state of the art facility Disklabs has over 20 years’ experience in data recovery, digital forensics and certified data erasure.

Disklabs is a member of Secured By Design, the flagship UK police initiative to help design out crime through the use of high quality, innovative, products’.

To see the full range of Disklabs shielding solutions for all your digital devices visit us at www.faradaybag.com

Press Contact

Andrew Tilbury
Disklabs Limited
+44 (0)1827 50000
at@disklabs.com
www.faradaybag.com

Find a Distributor

Find our closest distributors near you. Alternatively you can see a list of all our distributors here.

Enter your country

Distributors in

Disklabs Faraday Bags

Disklabs House, Galena Close, Tamworth, B774AS

Visit Website
Close

Apply to be a distributor

We are always on the look out for forward thinking companies and individuals to join our global network of distributors

We are always on the look out for forward thinking companies and individuals to join our global network of distributors.

 

Our requirements from you:

  1. Be forward thinking in your approach to business.
  2. To be a supplier to either law enforcement, intelligence, military or government agencies.
  3. To purchase a distributor pack*
  4. Supply us with a high resolution logo and full contact details.

What we do for  you:

  1. You gain an exclusive sales territory for all our faraday products.
  2. You will receive an exclusive generous distributor discount on all products.
  3. You get advanced notice of any new products being devleloped.
  4. You receive high resolution images of all our products for your website.
  5. You receive constantly updated ebrochures, (which can be translated and appended with your own logo).
  6. You will be able to receive marketing assistance – if exhibiting, if it is viable, we can assist your team with additional staffing and sample products.
  7. You will be able to work directly with the development team to help in the development of new products.
  8. You will be listed on the dedicated www.faradaybag.com website, (top of all major search engines).
  9. All sales leads through to Disklabs will be sent to the appropriate global distribution partner.

Apply





    Close