Techniques and Processes for Rendering Mobile Technology Forensically Irrecoverable
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
LEWIS INNOVATIVE TECHNOLOGIES, INC.
P. O. 624, 534 Lawrence Street, Moulton, AL, 35650
Socially and Economically Disadvantaged:
AbstractLIT Recommends: 1. Developing Self-Modifying FPGAs that self-scramble or destroy their own configuration EEPROM. 2. Evaluating Encrypted Memory Controller that encrypts data files. Data can be read back only through controller which may be destroyed if compromised. 3. Retrieval/destruction Initiation techniques which include: (a) Mechanical Actuation (b) External Key Actuation - using a real time clock module and/or miniature GPS module (or other RF key) so that data can only be retrieved at a specific time and location or only in the presence of a predefined serial or RF key. Attempted unauthorized access would then result in initiation of data destruction process. (d) Extended Timing - self destruct auto-initiates if the device is not recovered or accessed within a predetermined time. This technique is similar to item b except that no unauthorized access is required to start self destruct. This technique would be useful in applications such as missiles that should reach maximum range in a predetermined time or data loggers that should be recovered before a specific interval has expired.
* information listed above is at the time of submission.