Law enforcement use

The X-BAG product line presents ultra-high RFI screening performance bags.

Their innovative, state of the art, strong and lightweight design, portability, ease of use thanks to magnetic locks and unique shielding features based on the principles of Faraday cage are unmatched by the competition and makes them the first choice for not only law enforcement but individuals as well.

No matter if you are an individual or a professional, the X-BAG Law Enforcement product line is the best choice.

Read Case studies

For example, the X-BAG can prevent a remote operator or attacker to log in during the transport of the evidence into the crime lab, and thus protect the evidence from being destroyed.

The X-BAG product line is designed for professionals, but is very useful and popular with individuals as well. They are optimal for shielding applications in Law Enforcement – Federal, State and Local, Military, Correctional facilities, Intelligence Agencies, Crime Scene Investigators, quick response units etc. A suspicious object can be placed into a frequency free space of an X-BAG, which can prohibit the activation of explosives detonators. The bags can prohibit remote users from deleting the data from secured technologies and they can be utilized for secure transport for analysis.

At courts, prisons and other state institutions with special regime, the visitors can place their mobile devices into the X-BAG so that not only the GSM, but also other frequencies are eliminated. For example, the X-BAG can prevent a communication or transfer of data, pictures or recordings through Bluetooth or WiFi network.

X-BAG would be the elegant, definitely higher security level and of course stress free solution.

No matter if you are an individual or a professional, the X-BAG Law Enforcement product line is the best choice.

A new feature is the so called REC killer. In the past, a smartphone was placed into safe space or a GSM jammer was used and all signals were blocked. However the smartphone could have been used as a recording device and the records could have been sent afterwards when the smartphone reaches GSM, Bluetooth or WiFi network. Now, the X-BAG offers a new solution for this, in which a buzzer element is placed next to the smartphone, which will corrupt the recording through vibrations.

X-Bag prevents the different cases

SIM card location tracking

SIM card location tracking

This is tracking without any signs of activity on your phone, without excessive battery consumption.

Cell phone or tablet location and content tracking

Cell phone or tablet location and content tracking

This is tracking without any signs of activity on your phone, without excessive battery consumption.

Using a mobile phone to eavesdropping

Using a mobile phone to eavesdropping

"Dead" cell phone that records sound and sent via GSM, Bluetooth or WiFi network.

Laptop content tracking

Laptop content tracking

It is a modified laptop, when user is not aware about this activity.


Scanning the RFID technologies

Scanning the RFID technologies

Scanning and copying of contactless identification technologies (RFID card/tag/sticker, ...) such as garage entry, buildings, offices access, bulgar alarm deactivation, older models of electronic car keys, ...

Store technologies that cannot be deactivated

Store technologies that cannot be deactivated

Safe storage of the technologies, when after turn off is not possible to isolate them from the power source (example - battery - iPhone).

Temporary storage of various items

Temporary storage of various items

Storing objects and interrupting their communications. For example pens, watches, USB flash, controls, ...

Example of selected Technologies

and their used frequencies
TECHNOLOGY 120 - 150 kHz
13 / 433 / 865 MHz
3,1 - 10 GHz
GSM / voice + data (3G, 4G **) Bluetooth / Wi-Fi GPS
900 - 1800 MHz 2100 MHz 2500 MHz 2400 MHz 1500 MHz < 30 GHz
Cellphone *** **
Tablet * / Laptop * *** * **
RFID ***
Monitoring *** **
  • * tablet / laptop with a SIM card
  • ** 4G technology
  • *** RFID technology