Techniques and Processes for Rendering Mobile Technology Forensically Irrecoverable

Period of Performance: 05/12/2006 - 05/12/2007


Phase 1 SBIR

Recipient Firm

Lewis Innovative Technologies, Inc.
110 Johnston St, SE
Decatur, AL 35601
Principal Investigator


LIT Recommends: 1. Developing Self-Modifying FPGAs that self-scramble or destroy their own configuration EEPROM. 2. Evaluating Encrypted Memory Controller that encrypts data files. Data can be read back only through controller which may be destroyed if compromised. 3. Retrieval/destruction Initiation techniques which include: (a) Mechanical Actuation (b) External Key Actuation - using a real time clock module and/or miniature GPS module (or other RF key) so that data can only be retrieved at a specific time and location or only in the presence of a predefined serial or RF key. Attempted unauthorized access would then result in initiation of data destruction process. (d) Extended Timing - self destruct auto-initiates if the device is not recovered or accessed within a predetermined time. This technique is similar to item b except that no unauthorized access is required to start self destruct. This technique would be useful in applications such as missiles that should reach maximum range in a predetermined time or data loggers that should be recovered before a specific interval has expired.