Please explain the "cloaking" as I truly am curious.
The phone hides its location? If so, how does the network know where to route the calls?
If the network can find you, well, so can "they". If you're invisible to the network (cloaked) then "your call cannot be completed as dialed. Please hang up and try again."
The point is that phones and RFID can be used for other means, hijacked, etc.
Let's put it this way: Until my GPS and GPS tagging was disabled, my phone tagged every goddamn picture I took, with the location I took the picture. That was a DEFAULT ON setting. That, in itself, is information associated and attached to photographs that I do not care to have attached. Even when GPS is off, it will correlate data for triangulation of the location of my phone. Proof shown in the location it starts up with as to "where" I am, prior to engaging GPS for mapping purposes. It's close, but not close enough and is always somewhere I haven't actually been, but is close enough for 'government work' quite literally.
We'll just ignore the whole cellphone security issue beyond that.
Now, let's look at RFID. As already shown earlier by dame, RFID attached documents and cards will answer, by design and default, any interrogation that they recieve. They pick up power from the RF sent to them, and burst back data. Your Visa RFID fob: bam, there's your credit card. Your Passport card: bam, there's your passport data.
I mean, you don't smile for your passport picture so the facial recognition software has a good baseline to be able to pick you up... so theoretically IF that shit is employed, and someone cloned your RFID for entry at an "enhanced" border crossing in a forged passport, it'd be a massive red flag when oh say, LibraryLady tried to cross the border with my passport RFID... but if it's RFID capable and they're not using facial recognition to corrolate and/or not inspecting?
Congrats, Muhammed DerpaDurka Habib just rolled through checkpoint alpha.
Not to mention the other previously mentioned RFID bomb. I'm a good guy and I can think of all sorts of ways I could "red team" the SHIT out of that with a minimal amount of assets.
Example:
I want Boon to go boom.
I know Boon travels alot and has a passport.
I aim a high gain RFID capture antenna and system at Boon's house, BeBeep bam I have his passport shit.
I program that into my handy dandy AllahAkbar™ targeted VBIED starter kit
Buy a $500 beater off Craigslist that still has good tags but the title was lost. "don't worry bro, I'll get with the DMV and make it happen"
load beater up with some MujMaster™ DitY explosives
park on the route to the airport
Call taxi to airport myself for the flight I have to catch.
Hands free targeted munition deployment, with no MartyrTech™ brand dumbass required to press any button to make it go boom.
Other uses for the belt mounted faraday cage would be in a recording or RF sensitive environment, everyone's had cellphone "buzz" from it transmitting on speakers and so on, causing interference. You pocket that cellphone while you're working, and you don't have to worry about it making that expensive studio time last longer, or it screwing something up.
Leaving your shit at home sometimes isn't an option, or the best option.