It’s a daunting task, but you can reconstruct shredded pages of paper.

After Iranian students seized the US embassy in Tehran in 1979, they spent years painstakingly reassembling the intelligence reports and operational accounts shredded by the CIA officers who were the last workers captured.

The security forces later published the reconstructed documents in book form and sold copies all over Tehran. Agents used the intelligence they gathered to identify and kill CIA collaborators.

Fast forward to 2011 and the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s research arm, offered $50,000 (£31,961) to the first team to reassemble five shredded hand-written documents and answer the puzzles contained in each of them.

A team of computer programmers from California developed software they say shows that computers can, in theory, do most of the hard work.

After many more years of research and development there are now commercial document reconstruction tools and services available. The shredded pieces of paper can be put back together in a fraction of the time it would take to do manually.

The PMT-A7 is the second generation writing slate originally developed in 2017 for Special Operations Forces to provide a safe, secure and sterile device for taking notes, recording information and sketching in adverse weather conditions, low light and hostile environments.

The PMT-A7 ensures you always leave a clean slate. Once the note has been erased it is gone for good…

Categorized as tradecraft


Yes, you can be spied upon through the camera of your smartphone. There are several applications that can be found online that assist in spying on someone through their cell phone camera.

The LTX1 comes as standard with a natural rubber band. Simply stretch it over your smartphone to hold the LTX1 over the camera.


EDC of lock bypass tools and other small items made easy with the addition of the optional cavity tray for the Ridge Wallet.

LTX1 retains the small items inside the tray for loading and unloading into the wallet.


There is more to the LTX1 than meets the eye…

The primary function depends on your requirements. It is on the covert entry page of as it can be used for lock bypassing ‘carding’ a door; however, there are other technical uses…

The card is frosted allowing for you to place the card over printed text with the cut-out slot over the sensitive or private information. Using a black marker pen you then cover the text in black to redact the information from a document in preparation for publication. Ideally you should then photocopy the document and destroy the first copy to prevent recovery of the redacted text.

The LTX1 can also be used as a privacy screen for video calls on a mobile device. Simply place over the front camera to ‘blur’ your face/location. Light will still enter the sensor so the screen will remain on.

The LTX1 can also be used with Cavity Tray for The Ridge RFID Blocking Wallet, so you can easily load/unload the tray.

Audio Jammer

The Noise Audio Recorders Won’t Like…

Audio jammers are popular tools used during confidential meetings. They produce a unique sound for masking and protecting conversations from external listening devices, such as a smartphone running an audio recording app, hidden in one of your guests’ pocket.

The sound of a jammer should be very difficult to filter out or remove when present in an audio recording. While commercial audio jammers often rely on white noise, this generator, however, uses a more efficient sound with articulation similar to speech. It is also buried under severe distortion, which makes recovery algorithms have a hard time producing exploitable results.

For further privacy, increase the generator’s volume to play louder than your voice. Then, if you are holding a conversation in person, speak quietly, and very close to your partner so they hear you over the sound.

JAB-D (Micro)


When it comes to special products for covert carry and concealment smaller is often better!

The JAB-D (Micro) is an existing product, made smaller whilst retaining its original function.

It is just like the bigger brother but smaller…

Available via