The X-BAG product line is designed for professionals, but is very useful and popular with individuals as well.

The X-BAG product line presents ultra-high RFI screening performance bags. Their innovative, state of the art, strong and lightweight design, portability, ease of use thanks to magnetic locks and unique shielding features based on the principles of Faraday cage are unmatched by the competition and makes them the first choice for not only law enforcement but individuals as well.

No matter if you are an individual or a professional, the X-BAG Law Enforcement product line is the best choice.

Read case studies

Compared to GSM jammers, the X-BAG is the best choice, since it is passive, lawful and creates a frequency free environment, which covers a wide spectrum. Proof is also the never ending development and implementation of new technologies, which use other frequency spectrums. It suffices to look back a couple of years and realize how quickly the GSM network developed into 3G and 4G technologies.

The X-BAG can also be used for personal use by lawyers, politicians, high level management to protect personal data, plans and strategies or their know-how or manufacturing secrets.

In some factories for example, the visitor’s mobile devices have their lens taped over so that they can’t take pictures of the production. The company already has complaints, that someone scratched or damaged the lens during the removal of security stickers. X-BAG would be the elegant, definitely higher security level and of course stress free solution.

No matter if you are an individual or a professional, the X-BAG Law Enforcement product line is the best choice.

A new feature is the so called REC killer. In the past, a smartphone was placed into safe space or a GSM jammer was used and all signals were blocked. However the smartphone could have been used as a recording device and the records could have been sent afterwards when the smartphone reaches GSM, Bluetooth or WiFi network. Now, the X-BAG offers a new solution for this, in which a buzzer element is placed next to the smartphone, which will corrupt the recording through vibrations.

X-Bag prevents the different cases

SIM card location tracking

SIM card location tracking

This is tracking without any signs of activity on your phone, without excessive battery consumption.

Cell phone or tablet location and content tracking

Cell phone or tablet location and content tracking

This is tracking without any signs of activity on your phone, without excessive battery consumption.

Using a mobile phone to eavesdropping

Using a mobile phone to eavesdropping

"Dead" cell phone that records sound and sent via GSM, Bluetooth or WiFi network.

Laptop content tracking

Laptop content tracking

It is a modified laptop, when user is not aware about this activity.


Scanning the RFID technologies

Scanning the RFID technologies

Scanning and copying of contactless identification technologies (RFID card/tag/sticker, ...) such as garage entry, buildings, offices access, bulgar alarm deactivation, older models of electronic car keys, ...

Store technologies that cannot be deactivated

Store technologies that cannot be deactivated

Safe storage of the technologies, when after turn off is not possible to isolate them from the power source (example - battery - iPhone).

Temporary storage of various items

Temporary storage of various items

Storing objects and interrupting their communications. For example pens, watches, USB flash, controls, ...

Example of selected Technologies

and their used frequencies
TECHNOLOGY 120 - 150 kHz
13 / 433 / 865 MHz
3,1 - 10 GHz
GSM / voice + data (3G, 4G **) Bluetooth / Wi-Fi GPS
900 - 1800 MHz 2100 MHz 2500 MHz 2400 MHz 1500 MHz < 30 GHz
Cellphone *** **
Tablet * / Laptop * *** * **
RFID ***
Monitoring *** **
  • * tablet / laptop with a SIM card
  • ** 4G technology
  • *** RFID technology