NVCPA Conference - "How Thieves Break In" 10-4-11
-
Upload
dale-bowman -
Category
Education
-
view
775 -
download
0
description
Transcript of NVCPA Conference - "How Thieves Break In" 10-4-11
Northern Virginia Crime Prevention Association
Conference10-4-11Dale L. Bowman, CML, CJIL,
CPP
Content
• Interest stories – to get you thinking• How locks operate• Vulnerabilities of locks, and how they
get compromised• Role of high security locks and key
control• Shameless plug - • Q & A
#NVCPA
#CrimePrev
Copy of this presentation at
www.linkedin.com
Go to my profile page. Scroll down to Slideshare to
access. Connect with me while you’re there.
This is a painting byVincent Von Gogh.“Vase and Flowers”
>$50M
and it was…
STOLEN.
“Faulty alarms blamed for Van Gogh theft in
Egypt.”-BBC NEWS ENTERTAINMENT
Online – August 2010
“There are 43security cameras but only
7are working. Each painting is protected by an
alarm but again, none
are working.”
“Faulty alarms blamed for Van Gogh theft in
Egypt.”-BBC NEWS ENTERTAINMENT
Online – August 2010
“Reporters were told on Sunday that security measures at the museum had been
“inadequate,” describing them as a “facade.”
“Faulty alarms blamed for Van Gogh theft in
Egypt.”-BBC NEWS ENTERTAINMENT
Online – August 2010
“Museum officials had been looking for spare parts to
MEND the security
system, but that they “hadn’t managed to find them.”
SPRING 2010 – NYC
The NY Daily News reports – April 24th thru April 27th Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue, & Mike Mclaughlin
Subway Key
These were the headlines:“No such thing as a free ride? Man buys copy of universal subway key for $50.”
“Get the magic key that opens gates at 468 subway stations for $27.”
“Pols, public outraged at’ ‘shocking’ master key security breach in our subways.”
SPRING 2010 – NYC
SPRING 2010 – NYC
But, that’s not all.Here’s the last headline…
SPRING 2010 – NYC
“Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
SPRING 2010 – NYC
So… what’s the
BIG IDEA
here?
Your key system is the first line of
defense…
it’s also usually
the weakest link.
This is Jacques Plante
He pioneered the goalie mask in the 1960’s
The game of ice hockey was invented in the early-1800’s
It took someone nearly 150 years to finally realize… Hey, I’m tired of getting HIT in the face with the puck. It hurts! There has to be a
better way.
Lesson:There are
solutions to the obvious.
This is Linus Yale, Jr
He patented and developed the concept of the pin tumbler lock
in 1865.
His concept is still used today…
97% of all locks used to protect homes, businesses, institutions still use this design.
Lesson:There are
solutions to the obvious.
So… what’s an even
BIGGER IDEA
here?
A strong mechanical
foundation, with key control and high
security elements, is still crucial to the long term
success of any access control program.
Shell
PlugHow does a lock work?
Shell
Plug
How does a lock work?
BOTTOM PINS
TOP PINS
How does a lock work?
How does a lock work?
PLUG
SHELL
How does a lock work?
How does a lock work?
How does a lock work?
Locks:Vulnerabilities and how they get compromised!
Picking
Picking
Picking
Tools
Picking
Drilling
Drilling
Forced Entry
Forced Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Now… for one of the most dangerous lock opening
techniques ever????
LOCK BUMPING
What is “Lock Bumping?”Exploiting the weaknesses found in
common pin tumbler locksOpening the lock:
With no damage, no evidenceWithin secondsWith little or no trainingWithout expensive or traditional tools
In the News….Bumping has caught the
attention of the media
Time for a science lesson.Newton’s Cradle: Impact Energy
Lock Bumping – How does it work?
Lock Bumping – Same concept as the pick gun
Then Comes the Bump Key
• Perfect tool to transfer impact energy• Key cut to deepest possible depth• Key depths
• # 1 depth very high on key• # 9 depth very low on key
• Key and tool to transfer energy into lock
Bump Key vs. Operating Key
#1 Depth = Very High on Key
#9 Depth = Very Low on Key
How do you make a Bump Key?
• Key Machine• Cut key to deepest possible depth
• All positions• Must have key machine
• Not readily available
• Or• File key
Transferring the Energy
• Bump key will not work by itself• Nothing will happen – key will not turn
• How do you transfer the energy?• A hammer• A shoe• A piece of wood• A screwdriver handle• What else??? Thieves can be creative!!
Transferring Energy
Transferring the Energy
• Collect old/used keys• Existing keys
• Master key system• Buy locks at hardware store
• Have additional keys cut to code• File keys down
• Buy on the Internet• Choose from selection of keys
Where do Bump Keys come from?
Where do Bump Keys come from?
The Internet
Where do Bump Keys come from?
The Internet
Who’s watching?
Concerned consumer or citizen?
Soon to be burglar?
Bump Keys Myths: Myth #1
There are a wide variety of locks. You need keys
for all locks to be effective.
Bump Keys Myths: Myth #2
Bumping is not used often so there is no
problem.
Bump Keys Myths: Myth #2
• How many burglaries have you investigated where ….. • There’s no sign of forced entry?• The lock is left undamaged?• The owner swears that locked the
door?
• How do you know these locks were not bumped?
• There is no way to know
Bump Key Myth: Myth #3
Bumping cannot be easily learned. It
requires practice and a large financial
investment.
Bump Key Myth: Myth #3
• Internet • A quick “google” search on “lock
bumping” will lead you to:• Training Videos • Training tools• Written instructions• Bump keys
• Requires practice – but not that much• 11 of the most popular keyways
• About $35
Bump Key Myths: Myth #4
Burglars need to know what type of lock is in the door before they can break in.
This takes a lot of preparation.
Bump Key Myths: Myth #4• Not entirely false• But…
• Bump keys are cheap, plentiful and easily made
• Can examine local DIY store to find locks sold in area
• 10 – 15 types of bump keys• You’re set
• Take a stroll through your neighborhood
Unauthorized Key Duplication
Yes… but for whom??
To whom do you give your keys?
Maid or Cleaning Service
Parking Lot Attendant or Valett
Plumber or Other Worker
Babysitter or Other Employee
Unauthorized Key Duplication
• Most keys are:• Not protected• Can be cut by anyone
• Anyone with a key machine• Anyone holding the key
• Keys stamped “Do Not Duplicate”• Are not protected• Create a false sense of security• “Unlawful to Duplicate” - FALSE
What role does high security, and key control, cylidner play
in providing good
security?
How can you protect yourself and your community against
these threats? • High Security Locks
• What is a high security lock? • A lock that:
• Offers Pick resistance• Offers Drill resistance• Offers Bump resistance• Offers Control over duplicate keys
• But… it’s not enough to just say you protect against these threats
• It must be proven!!! Independently!!
UL & ANSI
• UL – Underwriters Laboratory• UL437
• Picking• Drilling• Physical attack
• ANSI - American National Standards Institute • ANSI A156.30
• Same as above, but more…• Theoretical changes• Key control elements
What is
KEY CONTROL?
What is meant by Controlled Duplication?
Ask yourself these questions:
Do you give anyone copies of your keys?
Do you mind if they make copies without
your permission?
What is meant by Controlled Duplication?The only way to fight unauthorized
key duplication is with a patent protected key.
• Utility Patented Keys• Are protected by law• Controlled by manufacturer
• Distribution• Who gets the keyblanks?• Who is allowed to cut keyblanks?
Where can you get high security and key control
locks?• Professional, Licensed Locksmith• Look for license #
• ALOA Member• Associated Locksmiths of America• Member locator
• www.aloa.org
• CML, CPL, CRL, RL or other certification• Medeco Dealer Locator
• www.medeco.com
You can’t get them at a Box Store
The next generation of lock and key
DESIGN.
When you hear the phrase “lost key” what one word comes to mind?
When’s the last time you
bought a roll of film?
Everyone WANTS
access control.
Everyone HAS mechanical hardware.
What is eCylinder?Convenience and flexibility of an
access control system with the strength and security of a high security key system design?
wiringdoor modificationsframe modifications
NO
What is eCylinder?
Convenience and flexibility of an access control system with the strength and security of a high security key system design?
leverage existing hardwareaudit trailsschedulingease of access rights managementone key convenience
YES
Next StepsComplete “Crime Prevention Kit”
request form• Use kit as a resource for security surveys
or Neighborhood Watch meetings.
Next Steps• Partner with a Professional Locksmith
• Medeco Dealer Locator – www.medeco.com
• ALOA – Associated Locksmiths of America• www.aloa.org• www.findalocksmith.com
Call me. I’m available for Neighborhood Watch meetings.
Q & A
In Locks We Trust!
Let’s stay connected…
Follow me on Twitter… @lockology
Friend me on Facebook… www.Facebook.com/dalelbowman
Connect on LinkedIn… www.linkedin.com/in/dalebowman
RSS my blog… www.lockologydc.com
ThankYou!