Faraday 101 · Education Hub · April 2026

What is a Faraday bag? The definitive 2026 guide.

The complete reference: how Faraday cages work, what they block, how to test them, and which one is right for which use case. Updated quarterly with current frequency, standards, and threat-vector data. No marketing claims — just the operational facts.

Published April 2026 Last reviewed April 30, 2026 Reading time 14 min References NIST · IEEE · EFF
Contents
Definition

What is a Faraday bag?

A Faraday bag is a flexible, portable enclosure lined with conductive shielding fabric that blocks all wireless signals from entering or leaving its interior. Named after the 19th-century physicist Michael Faraday, it applies a 200-year-old principle to modern threat surfaces — phones, GPS, WiFi, Bluetooth, RFID, key fobs, AirTags. A device inside the bag cannot transmit and cannot be reached. The threat surface for that device collapses to zero for the duration the device is in the bag.

The category includes a wide range of products at different price points and quality levels. A $5 RFID-blocking sleeve for a single credit card is technically a Faraday product. A $300 EMP-rated procurement-grade case is also a Faraday product. The difference is in frequency coverage, attenuation depth, chamber count, and form factor. Most buyers benefit from products that cover the full mobile-radio spectrum (30 MHz – 10 GHz) at 70+ dB attenuation, with multiple independent chambers and a form factor matched to the carry context.

The REVIS-1 Executive Guard sits at the executive-briefcase end of this category — three independent chambers, 76–85 dB across 30 MHz – 10 GHz, structured form factor designed for boardroom and travel use. See the full Executive Faraday Briefcase brief.

Physics

How does a Faraday cage actually work?

A Faraday cage works because conductive materials (metals, conductive fabrics) redistribute their internal electrical charges to cancel out external electrical fields. When a radio wave hits the conductor, the wave's energy induces opposing currents in the conductor that interfere with and cancel most of the original signal. The result is mathematically described in decibels: 60 dB attenuation is a 1,000,000-fold reduction in signal strength; 80 dB is 100,000,000-fold; 100 dB is 10,000,000,000-fold.

Three things determine real-world performance:

The conductive material

Modern Faraday bags use woven copper, nickel-coated polyester, silver-plated nylon, or multi-layer combinations of these. Each material has a frequency-dependent attenuation profile — copper performs differently at 1 GHz than at 5 GHz than at 10 GHz. Industrial-grade products use multi-layer constructions to achieve flat attenuation curves across the full spectrum.

The seam and seal integrity

A pinhole leak in the conductive layer is mathematically equivalent to no Faraday cage at all on the leaked frequency. The bag's seams, zippers, and closures are where 90% of failures happen. Quality Faraday bags use overlapping conductive seams (no pinhole gaps) and continuous-conductor closures (not slot-style zippers). The REVIS-1 uses overlapping seal seams sewn through the shielding fabric, which is why per-unit shielding-test verification matters.

The frequency range tested

"Faraday-rated" without a specified frequency range is a marketing claim, not a specification. The relevant test envelope for consumer threats is 30 MHz – 10 GHz, which covers all mobile cellular bands (including 5G mmWave within reasonable bounds), all WiFi standards including WiFi 7, all Bluetooth and BLE, all GPS bands, and all RFID/NFC variants. Products tested only at specific frequencies (e.g., RFID 13.56 MHz only) are appropriate for narrow use cases, not for general signal isolation.

History

Where the Faraday cage came from.

Michael Faraday, 1836. The English physicist was investigating the behavior of static electrical charges on conductive surfaces. He built a 12-foot wooden cube, lined it with metal foil, electrified the exterior, and stepped inside with an electroscope to measure the interior field. The interior was field-free. He concluded that an external static electrical field causes the electric charges within a conductor to redistribute and cancel the field's effect on the interior — a principle now universally known as the Faraday cage.

The principle was theoretical for almost a century. Its practical applications emerged with radio communication in the early 20th century: shielded rooms for sensitive electronic measurements, anechoic chambers for radar and antenna testing, and from the 1940s onward, shielded enclosures for industrial, military, and intelligence-community electronics. The first consumer-facing Faraday products — RFID-blocking wallets — appeared in the early 2000s as RFID-chipped credit cards and biometric passports were rolled out.

The modern Faraday-bag category is largely post-2015. The combination of widespread smartphone deployment, growing awareness of mobile-tracking surveillance, the AirTag-stalking news cycle (2022+), and increasing relay-attack vehicle theft has turned Faraday isolation from an industrial niche into a consumer-and-executive product category. The market today spans roughly $30 single-purpose pouches to $700+ industrial procurement cases.

Reference

Every consumer wireless frequency in one table.

This is the operational reference. A Faraday bag that blocks a specific frequency range blocks every signal in that range, regardless of protocol or vendor. The table below maps the 30 MHz – 10 GHz envelope to the protocols actually deployed in 2026 consumer and enterprise hardware.

Protocol Frequency Range Role / Threat Surface
Cellular 2G / GSM800 / 900 / 1,800 / 1,900 MHzLegacy IMSI catchers
Cellular 3G / UMTS800 – 2,100 MHzStingray Gen-1 surveillance
Cellular LTE / 4G600 MHz – 2.6 GHzHailstorm / Triggerfish
Cellular 5G sub-6600 MHz – 6 GHzModern IMSI variants, NR-mode Stingrays
5G mmWave24 – 40 GHz (10 GHz tested envelope)Localized urban surveillance
WiFi 2.4 GHz (802.11 b/g/n)2.400 – 2.484 GHzCaptive-portal MITM, evil-twin
WiFi 5 GHz (802.11 a/n/ac/ax)5.150 – 5.825 GHzSame as 2.4 GHz, faster surface
WiFi 6E / WiFi 76.0 – 7.125 GHzNewer hotel/enterprise networks
Bluetooth Classic + LE2.402 – 2.480 GHzAirDrop discovery, AirTag tracking, BLE proximity exploits
GPS L11.575 GHzCivil location signal
GPS L21.227 GHzEncrypted/military signal
GPS L51.176 GHzModern civil location signal
NFC13.56 MHzApple Pay, Google Pay, transit cards
RFID LF125 kHzLegacy access cards, livestock tags
RFID HF13.56 MHzContactless credit cards, biometric passports
RFID UHF860 – 960 MHzInventory, retail, asset tracking
Key-fob LF / Smart Key315 / 433 / 868 / 915 MHzRelay attack on luxury vehicles
UWB (Apple U1, Samsung)6.5 – 8.0 GHzPrecision ranging, AirTag location
Standards

How shielding is actually measured.

Two standards documents matter for procurement-grade Faraday products:

IEEE-299

"IEEE Standard Method for Measuring the Effectiveness of Electromagnetic Shielding Enclosures." Defines the test methodology for measuring shielding effectiveness in dB across a swept frequency range. Used by procurement officers, forensic labs, and corporate security teams to verify Faraday-product specifications. The REVIS-1 is tested using IEEE-299 methodology.

MIL-STD-188-125

"High-Altitude Electromagnetic Pulse (HEMP) Protection for Ground-Based C4I Facilities Performing Critical, Time-Urgent Missions." Defines U.S. military requirements for EMP-protected facilities. The relevant frequency bands and attenuation thresholds are referenced for industrial-grade procurement contexts. The REVIS-1 documentation references MIL-STD-188-125 for the alignment of its tested 30 MHz – 10 GHz envelope with the most damaging consumer-electronics EMP frequencies.

What the dB number actually means

Decibels are logarithmic. Each 10 dB doubles the attenuation in halving terms — 10 dB is 10× reduction, 20 dB is 100×, 30 dB is 1,000×, and so on up. 76 dB is roughly 40 million times reduction in signal strength. 85 dB is roughly 320 million times. A signal that started at full strength of a typical mobile transmitter is reduced to a level below the noise floor of any receiver. That is why 76–85 dB is operationally sufficient for every consumer threat — additional dB above 85 provide diminishing real-world benefit because the practical attack distances are already non-feasible.

Modern Threat Surface · 2026

The 8 wireless threat vectors a Faraday bag actually defeats.

This is the operational threat list as of April 2026. Each links to the dedicated REVIS-1 brief covering that threat in depth.

VECTOR 01

IMSI catchers & Stingray surveillance

Cell-site simulators that force phones onto fake towers and harvest call metadata, SMS content, and location. Used by federal/state law enforcement legally and by foreign intelligence near hotels, conferences, and embassies.

Privacy & Anti-Tracking brief →
VECTOR 02

Relay attacks on smart car keys

Two-person theft technique that extends the radio signal between parked car and key fob. Range Rover, BMW, Mercedes, Tesla, Lexus, Audi, Porsche all vulnerable. Insurance industry data shows relay theft is the fastest-growing luxury-vehicle theft vector since 2023.

Key-Fob Protection brief →
VECTOR 03

AirTag & covert BLE trackers

$29 Apple AirTag dropped in a coat pocket, briefcase lining, or vehicle wheel-well reports location every time it passes a Find My device. Same applies to Tile, Samsung SmartTags, Chinese white-label trackers used in stalking and espionage.

Privacy & Anti-Tracking brief →
VECTOR 04

Hotel & airport WiFi attacks

Captive-portal MITM, evil-twin SSIDs, and Bluetooth proximity exploits are routine on business-class hotel networks. The MacBook left "asleep" beacons constantly — discovery, pairing, AirDrop. Faraday isolation removes the attack window.

MacBook Multi-Device brief →
VECTOR 05

RFID skimming & credential theft

Corporate access cards, biometric passports, contactless credit cards, hotel keycards. Cheap RFID readers harvest credentials from up to 3 feet through a wallet. Faraday-shielded chambers block every relevant frequency simultaneously.

Executive Briefcase brief →
VECTOR 06

Stalkerware & covert surveillance apps

mSpy, Cocospy, FlexiSpy, and similar products silently report location, calls, messages, microphone audio. Domestic-abuse advocacy groups now recommend Faraday bags as a baseline defensive measure.

Privacy & Anti-Tracking brief →
VECTOR 07

Forensic chain-of-custody / remote wipe

Modern smartphones support remote-wipe commands triggered from manufacturer cloud or MDM platforms. The wipe command requires a network connection. Faraday isolation prevents the wipe and preserves the on-scene state for forensic examination.

Forensic / LEA brief →
VECTOR 08

EMP & high-energy electromagnetic events

EMP weapons or solar coronal mass ejection events generate broadband high-energy pulses that destroy unprotected consumer electronics. A continuous-conductor Faraday enclosure protects daily-carry electronics during the event window.

Privacy / EMP brief →
Testing

How to test if your Faraday bag actually works.

Three practical tests, in increasing rigor. The first two take 60 seconds each and catch obviously-failed bags. The third produces the documentation that procurement audits require.

01

Phone call test

Put your phone inside the bag. Close it. Call the phone from another phone. If the inside phone rings, the bag is leaking on the cellular and ringtone-trigger frequencies. Quick and free; 60 seconds. Works only if both phones have signal.

02

Find My / Find My Device test

Put a device inside the bag. From another device, query the location via Find My (iOS) or Find My Device (Android). Wait 5 minutes. If a current location appears, the bag is leaking on the cellular and BLE relay frequencies. Catches subtle failures the call test misses.

03

RF spectrum analyzer test

For procurement-grade verification: a calibrated RF spectrum analyzer (Rohde & Schwarz, Keysight, Anritsu) sweeps the 30 MHz – 10 GHz envelope outside and inside the bag. The difference in measured signal strength is the dB attenuation. Produces letterhead test reports for procurement files. The REVIS-1 documentation references this methodology (IEEE-299).

Which One to Buy

Match the product to the use case.

For executive daily carry

Boardroom, business travel, daily principal use. Form factor and optics matter as much as the dB number. REVIS-1 Executive Faraday Briefcase ($129) is the only product designed first as an executive briefcase rather than a tactical pouch wearing a leather skin. Three independent chambers, 76–85 dB, removable identity patch, made in the U.S.

For HNW principals and family offices

Custom-branded patches across principal, family, and core staff. Discreet provenance. Same product, B2B procurement path. Luxury Faraday Briefcase brief details the four definitions of luxury and the family-office procurement workflow.

For executive protection & off-duty carry

EP professionals, law enforcement, licensed carriers. The optional $10 Tactical add-on turns the same briefcase into a discreet EDC carry system with holster compatibility for Glock 19/17, SIG P320, S&W M&P. REVIS-1 does not sell, ship, or transfer firearms.

For digital forensics & LEA procurement

Chain-of-custody documentation, IEEE-299 methodology, agency-bulk pricing with custom-branded patches. Forensic Faraday Bag brief covers procurement-grade specifications, NDA workflow, and federal-contract vehicles.

For a brand-by-brand cross-comparison

Independent buyer's guide ranking the 5 best Faraday briefcases on the U.S. market with weighted methodology and side-by-side specifications. Best Faraday Briefcases 2026 →

Glossary

The terms that come up.

Attenuation

The reduction in signal strength expressed in decibels (dB). Higher numbers mean more reduction. 60 dB = 1,000,000× reduction.

BLE (Bluetooth Low Energy)

Short-range wireless protocol at 2.4 GHz used by AirTags, fitness trackers, AirDrop discovery, and proximity exploits.

Captive-portal MITM

Hotel-WiFi attack where the network's login portal is compromised to intercept TLS sessions and steal credentials.

Chain of custody

Forensic procedure documenting the handling of evidence from seizure through analysis. Faraday bags preserve the on-scene state.

Decibel (dB)

Logarithmic unit of measurement. In Faraday context, dB describes how much an enclosure reduces signal strength.

EMP (Electromagnetic Pulse)

High-energy electromagnetic event from nuclear detonation, EMP weapon, or solar coronal mass ejection. Damages unshielded electronics.

Evil-twin SSID

A WiFi access point broadcasting the same name as a legitimate network to trick devices into connecting and leaking traffic.

Faraday cage / Faraday bag

Conductive enclosure that blocks external static and radio-frequency electromagnetic fields from entering its interior.

IEEE-299

"IEEE Standard Method for Measuring the Effectiveness of Electromagnetic Shielding Enclosures." The reference test methodology.

IMSI catcher / Stingray

Cell-site simulator that mimics a real cellular tower to harvest call metadata, SMS, and device-location data.

MIL-STD-188-125

U.S. military standard for HEMP-protected facilities. Referenced for industrial-grade Faraday procurement.

NFC (Near Field Communication)

13.56 MHz short-range communication used by Apple Pay, Google Pay, transit cards, and contactless authentication.

Relay attack

Two-person theft technique that extends the radio signal between car and key fob to unlock and start the vehicle.

RFID (Radio-Frequency Identification)

Wireless identification protocol at 125 kHz, 13.56 MHz, or UHF. Used in access cards, passports, contactless credit cards.

Stalkerware

Covert surveillance apps installed on a phone to silently report location, calls, messages, and microphone audio.

UWB (Ultra-Wideband)

Short-range high-precision ranging protocol at 6.5–8.0 GHz. Used in modern AirTags and Apple U1 chip.

FAQ

Twelve questions, definitive answers.

What is a Faraday bag?
A Faraday bag is a flexible, portable enclosure lined with conductive shielding fabric that blocks all wireless signals from entering or leaving its interior. It is named after Michael Faraday, the 19th-century physicist who discovered that an external static electrical field causes the electric charges within a conductor to redistribute and cancel out the field's effect on the interior. Modern Faraday bags apply the same principle to radio-frequency signals — phones, GPS, WiFi, Bluetooth, RFID, key fobs, AirTags. A device inside cannot transmit and cannot be reached.
How does a Faraday bag work?
The bag's lining is a conductive material — woven copper, nickel-coated polyester, silver-plated nylon, or a multi-layer combination. When a radio wave hits the conductive layer, the wave's energy induces opposing currents in the conductor that cancel out most of the original signal. The result is mathematically described in decibels of attenuation: 60 dB is a 1,000,000-fold reduction in signal strength, 80 dB is 100,000,000-fold. Modern executive Faraday briefcases like the REVIS-1 achieve 76–85 dB across 30 MHz – 10 GHz, which covers every consumer wireless protocol in use today.
Do Faraday bags actually work?
Yes — Faraday cages are well-established physics from the 1830s and have been deployed in industrial, military, and consumer contexts for over 150 years. Quality Faraday bags routinely achieve 60–100+ dB of attenuation, which is sufficient to defeat any consumer wireless threat. The variable is product quality: a worn-out pouch with frayed seams will not perform like a new well-constructed briefcase. The REVIS-1 is shielding-tested per unit before shipping, so the documented 76–85 dB performance is the per-unit guarantee, not a marketing aspiration.
What does a Faraday bag block?
A modern executive Faraday bag like the REVIS-1 (76–85 dB across 30 MHz – 10 GHz) blocks: cellular 2G, 3G, LTE, 5G sub-6, and 5G mmWave (within tested envelope); WiFi 2.4 GHz, 5 GHz, 6 GHz, 6E, and WiFi 7; Bluetooth Classic and Low Energy (including AirDrop discovery and AirTag tracking); GPS L1, L2, L5; NFC at 13.56 MHz; RFID at 125 kHz LF, 13.56 MHz HF, and UHF; key-fob LF at 315/433/868/915 MHz; satellite communications within the tested envelope. Cheaper single-purpose Faraday products may block only one or two of these — for example, an RFID-blocking sleeve only addresses 13.56 MHz.
How much attenuation is enough?
60 dB defeats most consumer threats; 70 dB defeats nearly all professional threats; 80 dB+ provides industrial-grade isolation. Above 70 dB, additional attenuation provides diminishing real-world benefit because the practical attack distances are already non-feasible. The relevant question is not "highest dB" but "sufficient dB across all relevant frequencies, in the right form factor, at the right price". The REVIS-1 sits at 76–85 dB, which is comfortably above the threshold for every consumer threat including state-actor IMSI catchers and BLE-based AirTag stalking.
Will a Faraday bag damage my phone or laptop?
No. The device inside the bag does not know it is in a bag. The radios continue searching for signals (which extends battery drain modestly) but no firmware, software, or hardware impact occurs. When the device leaves the bag, wireless reconnects automatically — same WiFi, same Bluetooth peripherals, same cellular network. Many users report putting devices in the bag actually improves battery life on long stretches because the radios stop the constant search for nearby networks.
Can the TSA see what's in a Faraday bag?
Yes — Faraday bags block radio, not X-rays. The bag's contents are visible to standard airport X-ray screening exactly like any other briefcase. The MacBook is removed for X-ray exactly as with any laptop bag. TSA, customs, and international border agencies have no objection to Faraday-shielded cases — they are widely used by attorneys, journalists, and corporate security teams. The only context-dependent issue is the device itself: if a customs officer demands the device be powered on, the user can power it on outside the bag exactly as with any case.
How do I test if my Faraday bag is working?
Three practical tests, in increasing rigor. First — call your phone from another phone while it is inside the bag; if the phone rings, the bag is leaking. Second — leave a device inside the bag and try to ping it via Find My / Find My Device; if the device responds, the bag is leaking. Third — for forensic-grade verification, use a calibrated RF spectrum analyzer to measure dB attenuation at the relevant frequencies. The first two tests catch obviously-failed bags; the third produces the documentation that procurement audits require.
What is the difference between a Faraday bag and an RFID-blocking sleeve?
An RFID-blocking sleeve is a single-purpose product that blocks the 13.56 MHz HF band used by contactless credit cards, biometric passports, and corporate access badges. It does not block cellular, WiFi, Bluetooth, GPS, or key-fob frequencies. A Faraday bag is full-spectrum: it blocks 30 MHz – 10 GHz, which covers RFID, NFC, all cellular bands, all WiFi standards, Bluetooth, GPS, and key-fob LF/UHF. RFID sleeves are appropriate for wallet-only protection at $5–$20; Faraday bags address every threat for $50–$300.
Are Faraday bags legal?
Yes — Faraday bags are legal in every U.S. state, the U.K., the EU, Canada, Australia, and most other jurisdictions. They are routinely used by law enforcement, attorneys, journalists, corporate security teams, executive protection professionals, and private citizens. There is no licensing requirement, no registration, no restriction on import or sale. The one operational note: when a court or regulator orders a device to be available, that order applies to the device — it does not matter whether the device is in a bag or on a desk; the bag is not a legal evidence container.
How long can a phone stay in a Faraday bag?
Indefinitely. There is no time limit. The device runs cached work, the battery drains naturally as the radios search for networks, and when the bag is opened the phone reconnects exactly as it would after coming out of an underground parking garage. Most executive users keep devices in the bag for periods of 1–24 hours during travel, sleep, meetings, or evening downtime. Forensic chain-of-custody storage often holds devices in Faraday bags for days or weeks pending laboratory examination.
What is the best Faraday bag to buy in 2026?
For executive carry — boardroom, business travel, daily principal use — the REVIS-1 Executive Guard is the best Faraday briefcase of 2026. For tactical / forensic deployment, Mission Darkness and EDEC OFFGRID are stronger picks. For pure peak attenuation in a price-no-object procurement context, Faraday Defense NX3 documents the highest dB numbers. See the Best Faraday Briefcases 2026 buyer's guide for the cross-brand ranking with weighted methodology and side-by-side comparison.
All Briefs

Every REVIS-1 reference document.

Pillar P1

Executive Faraday Briefcase

The definitive brief: three chambers, every threat surface, who carries it, technical specs.

Pillar P3 · Highest Volume

Key-Fob & Relay-Attack Protection

Stop relay-attack theft on Range Rover, BMW, Mercedes, Tesla, Lexus. Verified frequency coverage.

Pillar P2

MacBook & Multi-Device Protection

Hotel-WiFi MITM, evil-twin SSIDs, AirDrop discovery — all silenced when the laptop is in the bag.

Pillar P5

Privacy & Anti-Tracking

AirTag stalking, IMSI catchers, Stingray surveillance, EMP, 5G tracking, stalkerware exfiltration.

Pillar P4

Forensic / LEA Procurement

Procurement-grade Faraday isolation for digital forensics, federal agency device-isolation, EP details.

Premium Wedge

Luxury Faraday Briefcase

For HNW principals and family offices: four definitions of luxury, restraint argument, B2B procurement.

Listicle · BOFU

Best Faraday Briefcases 2026

Independent buyer's guide ranking the 5 best Faraday briefcases on the U.S. market with weighted methodology.

Pillar P7 · Tactical EDC

Tactical EDC System

$10 add-on holster module for executive protection professionals, law enforcement, and licensed carriers.

B2B

Custom Branding & B2B

Bulk pricing from 10 units. Custom-branded Velcro patches. NDA workflow. Family-office and EP-detail procurement.

Acquire

Now you know how it works. Carry the one that does.

Three independently shielded chambers. 76–85 dB across 30 MHz – 10 GHz. Made in the United States. $129 with free U.S. shipping and a 30-day money-back guarantee.

Acquire Your Executive Guard — $129