Techniques and Processes for Rendering Mobile Technology Forensically Irrecoverable

Award Information
Agency:
Department of Defense
Branch
Navy
Amount:
$99,999.00
Award Year:
2006
Program:
SBIR
Phase:
Phase I
Contract:
N00178-06-C-3032
Agency Tracking Number:
O053-A07-4110
Solicitation Year:
2005
Solicitation Topic Code:
OSD05-A07
Solicitation Number:
2005.3
Small Business Information
LEWIS INNOVATIVE TECHNOLOGIES, INC.
P. O. 624, 534 Lawrence Street, Moulton, AL, 35650
Hubzone Owned:
N
Socially and Economically Disadvantaged:
N
Woman Owned:
Y
Duns:
794777847
Principal Investigator:
James Lewis
Principal Engineer
(256) 905-0775
james.lewis@lewisinnovative.com
Business Contact:
Elizabeth Lewis
President
(256) 905-0775
elizabeth.lewis@lewisinnovative.com
Research Institution:
n/a
Abstract
LIT Recommends: 1. Developing Self-Modifying FPGAs that self-scramble or destroy their own configuration EEPROM. 2. Evaluating Encrypted Memory Controller that encrypts data files. Data can be read back only through controller which may be destroyed if compromised. 3. Retrieval/destruction Initiation techniques which include: (a) Mechanical Actuation (b) External Key Actuation - using a real time clock module and/or miniature GPS module (or other RF key) so that data can only be retrieved at a specific time and location or only in the presence of a predefined serial or RF key. Attempted unauthorized access would then result in initiation of data destruction process. (d) Extended Timing - self destruct auto-initiates if the device is not recovered or accessed within a predetermined time. This technique is similar to item b except that no unauthorized access is required to start self destruct. This technique would be useful in applications such as missiles that should reach maximum range in a predetermined time or data loggers that should be recovered before a specific interval has expired.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government