NVCPA Conference - "How Thieves Break In" 10-4-11

102
Northern Virginia Crime Prevention Association Conference 10-4-11 Dale L. Bowman, CML, CJIL, CPP

description

NVCPA Conference in Culpeper, VA - 10-4-11. Instructor: Dale L. Bowman, CML, CJIL, CPP

Transcript of NVCPA Conference - "How Thieves Break In" 10-4-11

Page 1: NVCPA Conference - "How Thieves Break In"   10-4-11

Northern Virginia Crime Prevention Association

Conference10-4-11Dale L. Bowman, CML, CJIL,

CPP

Page 2: NVCPA Conference - "How Thieves Break In"   10-4-11

Content

• Interest stories – to get you thinking• How locks operate• Vulnerabilities of locks, and how they

get compromised• Role of high security locks and key

control• Shameless plug - • Q & A

Page 3: NVCPA Conference - "How Thieves Break In"   10-4-11

#NVCPA

Page 4: NVCPA Conference - "How Thieves Break In"   10-4-11

#CrimePrev

Page 5: NVCPA Conference - "How Thieves Break In"   10-4-11

Copy of this presentation at

www.linkedin.com

Go to my profile page. Scroll down to Slideshare to

access. Connect with me while you’re there.

Page 6: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 7: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 8: NVCPA Conference - "How Thieves Break In"   10-4-11

This is a painting byVincent Von Gogh.“Vase and Flowers”

>$50M

and it was…

STOLEN.

Page 9: NVCPA Conference - "How Thieves Break In"   10-4-11

“Faulty alarms blamed for Van Gogh theft in

Egypt.”-BBC NEWS ENTERTAINMENT

Online – August 2010

“There are 43security cameras but only

7are working. Each painting is protected by an

alarm but again, none

are working.”

Page 10: NVCPA Conference - "How Thieves Break In"   10-4-11

“Faulty alarms blamed for Van Gogh theft in

Egypt.”-BBC NEWS ENTERTAINMENT

Online – August 2010

“Reporters were told on Sunday that security measures at the museum had been

“inadequate,” describing them as a “facade.”

Page 11: NVCPA Conference - "How Thieves Break In"   10-4-11

“Faulty alarms blamed for Van Gogh theft in

Egypt.”-BBC NEWS ENTERTAINMENT

Online – August 2010

“Museum officials had been looking for spare parts to

MEND the security

system, but that they “hadn’t managed to find them.”

Page 12: NVCPA Conference - "How Thieves Break In"   10-4-11

SPRING 2010 – NYC

The NY Daily News reports – April 24th thru April 27th Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue, & Mike Mclaughlin

Subway Key

Page 13: NVCPA Conference - "How Thieves Break In"   10-4-11

These were the headlines:“No such thing as a free ride? Man buys copy of universal subway key for $50.”

“Get the magic key that opens gates at 468 subway stations for $27.”

“Pols, public outraged at’ ‘shocking’ master key security breach in our subways.”

SPRING 2010 – NYC

Page 14: NVCPA Conference - "How Thieves Break In"   10-4-11

SPRING 2010 – NYC

Page 15: NVCPA Conference - "How Thieves Break In"   10-4-11

But, that’s not all.Here’s the last headline…

Page 16: NVCPA Conference - "How Thieves Break In"   10-4-11

SPRING 2010 – NYC

“Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”

Page 17: NVCPA Conference - "How Thieves Break In"   10-4-11

SPRING 2010 – NYC

Page 18: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 19: NVCPA Conference - "How Thieves Break In"   10-4-11

So… what’s the

BIG IDEA

here?

Page 20: NVCPA Conference - "How Thieves Break In"   10-4-11

Your key system is the first line of

defense…

it’s also usually

the weakest link.

Page 21: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 22: NVCPA Conference - "How Thieves Break In"   10-4-11

This is Jacques Plante

He pioneered the goalie mask in the 1960’s

The game of ice hockey was invented in the early-1800’s

Page 23: NVCPA Conference - "How Thieves Break In"   10-4-11

It took someone nearly 150 years to finally realize… Hey, I’m tired of getting HIT in the face with the puck. It hurts! There has to be a

better way.

Page 24: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 25: NVCPA Conference - "How Thieves Break In"   10-4-11

Lesson:There are

solutions to the obvious.

Page 26: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 27: NVCPA Conference - "How Thieves Break In"   10-4-11

This is Linus Yale, Jr

He patented and developed the concept of the pin tumbler lock

in 1865.

Page 28: NVCPA Conference - "How Thieves Break In"   10-4-11

His concept is still used today…

97% of all locks used to protect homes, businesses, institutions still use this design.

Page 29: NVCPA Conference - "How Thieves Break In"   10-4-11

Lesson:There are

solutions to the obvious.

Page 30: NVCPA Conference - "How Thieves Break In"   10-4-11

So… what’s an even

BIGGER IDEA

here?

Page 31: NVCPA Conference - "How Thieves Break In"   10-4-11

A strong mechanical

foundation, with key control and high

security elements, is still crucial to the long term

success of any access control program.

Page 32: NVCPA Conference - "How Thieves Break In"   10-4-11

Shell

PlugHow does a lock work?

Page 33: NVCPA Conference - "How Thieves Break In"   10-4-11

Shell

Plug

How does a lock work?

Page 34: NVCPA Conference - "How Thieves Break In"   10-4-11

BOTTOM PINS

TOP PINS

How does a lock work?

Page 35: NVCPA Conference - "How Thieves Break In"   10-4-11

How does a lock work?

Page 36: NVCPA Conference - "How Thieves Break In"   10-4-11

PLUG

SHELL

How does a lock work?

Page 37: NVCPA Conference - "How Thieves Break In"   10-4-11

How does a lock work?

Page 38: NVCPA Conference - "How Thieves Break In"   10-4-11

How does a lock work?

Page 39: NVCPA Conference - "How Thieves Break In"   10-4-11

Locks:Vulnerabilities and how they get compromised!

Page 40: NVCPA Conference - "How Thieves Break In"   10-4-11

Picking

Page 41: NVCPA Conference - "How Thieves Break In"   10-4-11

Picking

Page 42: NVCPA Conference - "How Thieves Break In"   10-4-11

Picking

Tools

Page 43: NVCPA Conference - "How Thieves Break In"   10-4-11

Picking

Page 44: NVCPA Conference - "How Thieves Break In"   10-4-11

Drilling

Page 45: NVCPA Conference - "How Thieves Break In"   10-4-11

Drilling

Page 46: NVCPA Conference - "How Thieves Break In"   10-4-11

Forced Entry

Page 47: NVCPA Conference - "How Thieves Break In"   10-4-11

Forced Entry

Page 48: NVCPA Conference - "How Thieves Break In"   10-4-11

Surreptitious Entry

Page 49: NVCPA Conference - "How Thieves Break In"   10-4-11

Surreptitious Entry

Page 50: NVCPA Conference - "How Thieves Break In"   10-4-11

Surreptitious Entry

Page 51: NVCPA Conference - "How Thieves Break In"   10-4-11

Surreptitious Entry

Page 52: NVCPA Conference - "How Thieves Break In"   10-4-11

Surreptitious Entry

Page 53: NVCPA Conference - "How Thieves Break In"   10-4-11

Now… for one of the most dangerous lock opening

techniques ever????

LOCK BUMPING

Page 54: NVCPA Conference - "How Thieves Break In"   10-4-11

What is “Lock Bumping?”Exploiting the weaknesses found in

common pin tumbler locksOpening the lock:

With no damage, no evidenceWithin secondsWith little or no trainingWithout expensive or traditional tools

Page 55: NVCPA Conference - "How Thieves Break In"   10-4-11

In the News….Bumping has caught the

attention of the media

Page 56: NVCPA Conference - "How Thieves Break In"   10-4-11

Time for a science lesson.Newton’s Cradle: Impact Energy

Page 57: NVCPA Conference - "How Thieves Break In"   10-4-11

Lock Bumping – How does it work?

Page 58: NVCPA Conference - "How Thieves Break In"   10-4-11

Lock Bumping – Same concept as the pick gun

Page 59: NVCPA Conference - "How Thieves Break In"   10-4-11

Then Comes the Bump Key

• Perfect tool to transfer impact energy• Key cut to deepest possible depth• Key depths

• # 1 depth very high on key• # 9 depth very low on key

• Key and tool to transfer energy into lock

Page 60: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Key vs. Operating Key

#1 Depth = Very High on Key

#9 Depth = Very Low on Key

Page 61: NVCPA Conference - "How Thieves Break In"   10-4-11

How do you make a Bump Key?

• Key Machine• Cut key to deepest possible depth

• All positions• Must have key machine

• Not readily available

• Or• File key

Page 62: NVCPA Conference - "How Thieves Break In"   10-4-11

Transferring the Energy

• Bump key will not work by itself• Nothing will happen – key will not turn

• How do you transfer the energy?• A hammer• A shoe• A piece of wood• A screwdriver handle• What else??? Thieves can be creative!!

Page 63: NVCPA Conference - "How Thieves Break In"   10-4-11

Transferring Energy

Page 64: NVCPA Conference - "How Thieves Break In"   10-4-11

Transferring the Energy

Page 65: NVCPA Conference - "How Thieves Break In"   10-4-11

• Collect old/used keys• Existing keys

• Master key system• Buy locks at hardware store

• Have additional keys cut to code• File keys down

• Buy on the Internet• Choose from selection of keys

Where do Bump Keys come from?

Page 66: NVCPA Conference - "How Thieves Break In"   10-4-11

Where do Bump Keys come from?

The Internet

Page 67: NVCPA Conference - "How Thieves Break In"   10-4-11

Where do Bump Keys come from?

The Internet

Who’s watching?

Concerned consumer or citizen?

Soon to be burglar?

Page 68: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Keys Myths: Myth #1

There are a wide variety of locks. You need keys

for all locks to be effective.

Page 69: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 70: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 71: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 72: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Keys Myths: Myth #2

Bumping is not used often so there is no

problem.

Page 73: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Keys Myths: Myth #2

• How many burglaries have you investigated where ….. • There’s no sign of forced entry?• The lock is left undamaged?• The owner swears that locked the

door?

• How do you know these locks were not bumped?

• There is no way to know

Page 74: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Key Myth: Myth #3

Bumping cannot be easily learned. It

requires practice and a large financial

investment.

Page 75: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Key Myth: Myth #3

• Internet • A quick “google” search on “lock

bumping” will lead you to:• Training Videos • Training tools• Written instructions• Bump keys

• Requires practice – but not that much• 11 of the most popular keyways

• About $35

Page 76: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Key Myths: Myth #4

Burglars need to know what type of lock is in the door before they can break in.

This takes a lot of preparation.

Page 77: NVCPA Conference - "How Thieves Break In"   10-4-11

Bump Key Myths: Myth #4• Not entirely false• But…

• Bump keys are cheap, plentiful and easily made

• Can examine local DIY store to find locks sold in area

• 10 – 15 types of bump keys• You’re set

• Take a stroll through your neighborhood

Page 78: NVCPA Conference - "How Thieves Break In"   10-4-11

Unauthorized Key Duplication

Yes… but for whom??

Page 79: NVCPA Conference - "How Thieves Break In"   10-4-11

To whom do you give your keys?

Maid or Cleaning Service

Parking Lot Attendant or Valett

Plumber or Other Worker

Babysitter or Other Employee

Page 80: NVCPA Conference - "How Thieves Break In"   10-4-11

Unauthorized Key Duplication

• Most keys are:• Not protected• Can be cut by anyone

• Anyone with a key machine• Anyone holding the key

• Keys stamped “Do Not Duplicate”• Are not protected• Create a false sense of security• “Unlawful to Duplicate” - FALSE

Page 81: NVCPA Conference - "How Thieves Break In"   10-4-11

What role does high security, and key control, cylidner play

in providing good

security?

Page 82: NVCPA Conference - "How Thieves Break In"   10-4-11

How can you protect yourself and your community against

these threats? • High Security Locks

• What is a high security lock? • A lock that:

• Offers Pick resistance• Offers Drill resistance• Offers Bump resistance• Offers Control over duplicate keys

• But… it’s not enough to just say you protect against these threats

• It must be proven!!! Independently!!

Page 83: NVCPA Conference - "How Thieves Break In"   10-4-11

UL & ANSI

• UL – Underwriters Laboratory• UL437

• Picking• Drilling• Physical attack

• ANSI - American National Standards Institute • ANSI A156.30

• Same as above, but more…• Theoretical changes• Key control elements

Page 84: NVCPA Conference - "How Thieves Break In"   10-4-11

What is

KEY CONTROL?

Page 85: NVCPA Conference - "How Thieves Break In"   10-4-11

What is meant by Controlled Duplication?

Ask yourself these questions:

Do you give anyone copies of your keys?

Do you mind if they make copies without

your permission?

Page 86: NVCPA Conference - "How Thieves Break In"   10-4-11

What is meant by Controlled Duplication?The only way to fight unauthorized

key duplication is with a patent protected key.

• Utility Patented Keys• Are protected by law• Controlled by manufacturer

• Distribution• Who gets the keyblanks?• Who is allowed to cut keyblanks?

Page 87: NVCPA Conference - "How Thieves Break In"   10-4-11

Where can you get high security and key control

locks?• Professional, Licensed Locksmith• Look for license #

• ALOA Member• Associated Locksmiths of America• Member locator

• www.aloa.org

• CML, CPL, CRL, RL or other certification• Medeco Dealer Locator

• www.medeco.com

Page 88: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 89: NVCPA Conference - "How Thieves Break In"   10-4-11

You can’t get them at a Box Store

Page 90: NVCPA Conference - "How Thieves Break In"   10-4-11

The next generation of lock and key

DESIGN.

Page 91: NVCPA Conference - "How Thieves Break In"   10-4-11

When you hear the phrase “lost key” what one word comes to mind?

Page 92: NVCPA Conference - "How Thieves Break In"   10-4-11

When’s the last time you

bought a roll of film?

Page 93: NVCPA Conference - "How Thieves Break In"   10-4-11

Everyone WANTS

access control.

Everyone HAS mechanical hardware.

Page 94: NVCPA Conference - "How Thieves Break In"   10-4-11

What is eCylinder?Convenience and flexibility of an

access control system with the strength and security of a high security key system design?

wiringdoor modificationsframe modifications

NO

Page 95: NVCPA Conference - "How Thieves Break In"   10-4-11

What is eCylinder?

Convenience and flexibility of an access control system with the strength and security of a high security key system design?

leverage existing hardwareaudit trailsschedulingease of access rights managementone key convenience

YES

Page 96: NVCPA Conference - "How Thieves Break In"   10-4-11

Next StepsComplete “Crime Prevention Kit”

request form• Use kit as a resource for security surveys

or Neighborhood Watch meetings.

Page 97: NVCPA Conference - "How Thieves Break In"   10-4-11
Page 98: NVCPA Conference - "How Thieves Break In"   10-4-11

Next Steps• Partner with a Professional Locksmith

• Medeco Dealer Locator – www.medeco.com

• ALOA – Associated Locksmiths of America• www.aloa.org• www.findalocksmith.com

Call me. I’m available for Neighborhood Watch meetings.

Page 99: NVCPA Conference - "How Thieves Break In"   10-4-11

Q & A

Page 100: NVCPA Conference - "How Thieves Break In"   10-4-11

In Locks We Trust!

Let’s stay connected…

Follow me on Twitter… @lockology

Friend me on Facebook… www.Facebook.com/dalelbowman

Connect on LinkedIn… www.linkedin.com/in/dalebowman

RSS my blog… www.lockologydc.com

Page 101: NVCPA Conference - "How Thieves Break In"   10-4-11

ThankYou!

Page 102: NVCPA Conference - "How Thieves Break In"   10-4-11