Techniques and Processes for Rendering Mobile Technology Forensically Irrecoverable

Award Information
Agency: Department of Defense
Branch: Navy
Contract: N00178-06-C-3032
Agency Tracking Number: O053-A07-4110
Amount: $99,999.00
Phase: Phase I
Program: SBIR
Awards Year: 2006
Solitcitation Year: 2005
Solitcitation Topic Code: OSD05-A07
Solitcitation Number: 2005.3
Small Business Information
P. O. 624, 534 Lawrence Street, Moulton, AL, 35650
Duns: 794777847
Hubzone Owned: N
Woman Owned: Y
Socially and Economically Disadvantaged: N
Principal Investigator
 James Lewis
 Principal Engineer
 (256) 905-0775
Business Contact
 Elizabeth Lewis
Title: President
Phone: (256) 905-0775
Research Institution
LIT Recommends: 1. Developing Self-Modifying FPGAs that self-scramble or destroy their own configuration EEPROM. 2. Evaluating Encrypted Memory Controller that encrypts data files. Data can be read back only through controller which may be destroyed if compromised. 3. Retrieval/destruction Initiation techniques which include: (a) Mechanical Actuation (b) External Key Actuation - using a real time clock module and/or miniature GPS module (or other RF key) so that data can only be retrieved at a specific time and location or only in the presence of a predefined serial or RF key. Attempted unauthorized access would then result in initiation of data destruction process. (d) Extended Timing - self destruct auto-initiates if the device is not recovered or accessed within a predetermined time. This technique is similar to item b except that no unauthorized access is required to start self destruct. This technique would be useful in applications such as missiles that should reach maximum range in a predetermined time or data loggers that should be recovered before a specific interval has expired.

* information listed above is at the time of submission.

Agency Micro-sites

US Flag An Official Website of the United States Government