Northern Virginia Crime Prevention Association Conference 10 - 4 - 11 Dale L. Bowman, CML, CJIL, CPP
Content <ul><li>Interest stories – to get you thinking </li></ul><ul><li>How locks operate </li></ul><ul><li>Vulnerabiliti...
#NVCPA
#CrimePrev
Copy of this presentation at www.linkedin.com Go to my profile page.  Scroll down to Slideshare to access.  Connect  with ...
 
 
This is a painting by Vincent Von Gogh. “ Vase and Flowers” >$50M and it was… STOLEN.
<ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>On...
<ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>On...
<ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>On...
SPRING 2010 – NYC The NY Daily News reports – April 24 th  thru April 27th  Daily News Writers: Erin Einhorn, Kevin Deutsc...
These were the headlines: “ No such thing as a free ride? Man buys copy of universal subway key for $50.” “ Get the magic ...
SPRING 2010 – NYC
But, that’s not all. Here’s the last headline…
SPRING 2010 – NYC “ Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
SPRING 2010 – NYC
 
So… what’s the  BIG IDEA   here ?
Your key system is the first line of  defense… it’s also usually the  weakest link .
 
This is  Jacques Plante He pioneered the goalie mask in the 1960’s The game of ice hockey was invented in the  early-1800’s
It took someone nearly  150 years  to finally realize… Hey, I’m tired of getting   HIT   in the face with the puck.  It hu...
 
Lesson : There are solutions to the   obvious .
 
This is  Linus Yale, Jr He patented and developed the concept of the pin tumbler lock in   1865.
His concept is still used today… 97%  of all locks used to protect homes, businesses, institutions still use this design.
Lesson : There are solutions to the  obvious .
So… what’s an even  BIGGER IDEA   here ?
A strong mechanical foundation, with  key control  and   high security   elements, is still crucial to the long term succe...
Shell Plug How does a lock work?
Shell Plug How does a lock work?
BOTTOM PINS TOP PINS How does a lock work?
How does a lock work?
PLUG SHELL How does a lock work?
How does a lock work?
How does a lock work?
Locks: Vulnerabilities and how they get compromised !
Picking
Picking
Picking Tools
Picking
Drilling
Drilling
Forced Entry
Forced Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Now …  for one of the most dangerous lock opening techniques ever ???? LOCK BUMPING
What is “Lock Bumping?” <ul><li>Exploiting the weaknesses found in common pin tumbler locks </li></ul><ul><li>Opening the ...
In the News…. Bumping has caught the attention of the media
Time for a science lesson. Newton’s Cradle: Impact Energy
Lock Bumping – How does it work?
Lock Bumping – Same concept as the pick gun
Then Comes the Bump Key <ul><li>Perfect tool to transfer impact energy </li></ul><ul><li>Key cut to deepest possible depth...
Bump Key vs. Operating Key #1 Depth = Very High on Key #9 Depth = Very Low on Key
How do you make a Bump Key? <ul><li>Key Machine </li></ul><ul><ul><li>Cut key to deepest possible depth </li></ul></ul><ul...
Transferring the Energy <ul><li>Bump key will not work by itself </li></ul><ul><ul><li>Nothing will happen – key will not ...
Transferring  Energy
Transferring the Energy
<ul><li>Collect old/used keys </li></ul><ul><li>Existing keys </li></ul><ul><ul><li>Master key system </li></ul></ul><ul><...
Where do Bump Keys come from? The Internet
Where do Bump Keys come from? The Internet Who’s watching? Concerned consumer or citizen? Soon to be burglar?
Bump Keys Myths: Myth #1 <ul><li>There are a wide variety of locks. You need keys for all locks to be effective.   </li></ul>
 
 
 
Bump Keys Myths: Myth #2 <ul><li>Bumping is not used often so there is no problem.   </li></ul>
Bump Keys Myths: Myth #2 <ul><li>How many burglaries have you investigated where …..  </li></ul><ul><ul><li>There’s no sig...
Bump Key Myth: Myth #3 <ul><li>Bumping cannot be easily learned. It requires practice and a large financial investment . <...
Bump Key Myth: Myth #3 <ul><li>Internet  </li></ul><ul><ul><li>A quick “google” search on “lock bumping” will lead you to:...
Bump Key Myths: Myth #4 <ul><li>Burglars need to know what type of lock is in the door before they can break in. This take...
Bump Key Myths: Myth #4 <ul><li>Not entirely false </li></ul><ul><li>But… </li></ul><ul><ul><li>Bump keys are cheap, plent...
Unauthorized Key Duplication Yes… but for whom??
To whom do you give your keys? Maid or Cleaning Service Parking Lot  Attendant or Valet t Plumber or Other Worker Babysitt...
Unauthorized Key Duplication <ul><li>Most keys are: </li></ul><ul><ul><li>Not protected </li></ul></ul><ul><ul><li>Can be ...
What role does  high security,  and  key control,  cylidner play in providing good security ?
How can you protect yourself and your community against these threats?  <ul><li>High Security Locks </li></ul><ul><li>What...
UL & ANSI <ul><li>UL  – Underwriters Laboratory </li></ul><ul><ul><li>UL437 </li></ul></ul><ul><ul><ul><li>Picking </li></...
What is  KEY CONTROL ?
What is meant by Controlled Duplication?  <ul><li>Ask yourself these questions: </li></ul><ul><li>Do you give anyone copie...
What is meant by Controlled Duplication? <ul><li>The only way to fight unauthorized key duplication is with a patent prote...
Where can you get high security and key control locks? <ul><li>Professional, Licensed Locksmith </li></ul><ul><ul><li>Look...
 
You can’t get them at a Box Store
<ul><li>The next generation of lock and key  DESIGN . </li></ul>
When you hear the phrase “lost key” what one word comes to mind?
When’s the last time you  bought a roll of film?
Everyone   WANTS   access control. Everyone   HAS   mechanical hardware.
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high secur...
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high secur...
Next Steps <ul><li>Complete “Crime Prevention Kit” request form </li></ul><ul><ul><li>Use kit as a resource for security s...
 
Next Steps <ul><li>Partner with a Professional Locksmith </li></ul><ul><ul><li>Medeco Dealer Locator –  www.medeco.com </l...
Q  &  A
In Locks We Trust! Let’s stay connected… Follow me on Twitter…  @lockology Friend me on Facebook…  www.Facebook.com/dalelb...
Thank You !
 
Upcoming SlideShare
Loading in...5
×

NVCPA Conference - "How Thieves Break In" 10-4-11

654

Published on

NVCPA Conference in Culpeper, VA - 10-4-11. Instructor: Dale L. Bowman, CML, CJIL, CPP

Published in: Education, Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
654
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

NVCPA Conference - "How Thieves Break In" 10-4-11

  1. 1. Northern Virginia Crime Prevention Association Conference 10 - 4 - 11 Dale L. Bowman, CML, CJIL, CPP
  2. 2. Content <ul><li>Interest stories – to get you thinking </li></ul><ul><li>How locks operate </li></ul><ul><li>Vulnerabilities of locks, and how they get compromised </li></ul><ul><li>Role of high security locks and key control </li></ul><ul><li>Shameless plug -  </li></ul><ul><li>Q & A </li></ul>
  3. 3. #NVCPA
  4. 4. #CrimePrev
  5. 5. Copy of this presentation at www.linkedin.com Go to my profile page. Scroll down to Slideshare to access. Connect with me while you’re there.
  6. 8. This is a painting by Vincent Von Gogh. “ Vase and Flowers” >$50M and it was… STOLEN.
  7. 9. <ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>Online – August 2010 </li></ul><ul><li>“ There are 43 security cameras but only 7 are working. Each painting is protected by an alarm but again, none </li></ul><ul><li>are working.” </li></ul>
  8. 10. <ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>Online – August 2010 </li></ul><ul><li>“ Reporters were told on Sunday that security measures at the museum had been “inadequate,” describing them as a “facade.” </li></ul>
  9. 11. <ul><li>“ Faulty alarms blamed for Van Gogh theft in Egypt.” </li></ul><ul><li>BBC NEWS ENTERTAINMENT </li></ul><ul><li>Online – August 2010 </li></ul><ul><li>“ Museum officials had been looking for spare parts to MEND the security system, but that they “hadn’t managed to find them.” </li></ul>
  10. 12. SPRING 2010 – NYC The NY Daily News reports – April 24 th thru April 27th Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue, & Mike Mclaughlin Subway Key
  11. 13. These were the headlines: “ No such thing as a free ride? Man buys copy of universal subway key for $50.” “ Get the magic key that opens gates at 468 subway stations for $27.” “ Pols, public outraged at’ ‘shocking’ master key security breach in our subways.” SPRING 2010 – NYC
  12. 14. SPRING 2010 – NYC
  13. 15. But, that’s not all. Here’s the last headline…
  14. 16. SPRING 2010 – NYC “ Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
  15. 17. SPRING 2010 – NYC
  16. 19. So… what’s the BIG IDEA here ?
  17. 20. Your key system is the first line of defense… it’s also usually the weakest link .
  18. 22. This is Jacques Plante He pioneered the goalie mask in the 1960’s The game of ice hockey was invented in the early-1800’s
  19. 23. It took someone nearly 150 years to finally realize… Hey, I’m tired of getting HIT in the face with the puck. It hurts! There has to be a better way.
  20. 25. Lesson : There are solutions to the obvious .
  21. 27. This is Linus Yale, Jr He patented and developed the concept of the pin tumbler lock in 1865.
  22. 28. His concept is still used today… 97% of all locks used to protect homes, businesses, institutions still use this design.
  23. 29. Lesson : There are solutions to the obvious .
  24. 30. So… what’s an even BIGGER IDEA here ?
  25. 31. A strong mechanical foundation, with key control and high security elements, is still crucial to the long term success of any access control program.
  26. 32. Shell Plug How does a lock work?
  27. 33. Shell Plug How does a lock work?
  28. 34. BOTTOM PINS TOP PINS How does a lock work?
  29. 35. How does a lock work?
  30. 36. PLUG SHELL How does a lock work?
  31. 37. How does a lock work?
  32. 38. How does a lock work?
  33. 39. Locks: Vulnerabilities and how they get compromised !
  34. 40. Picking
  35. 41. Picking
  36. 42. Picking Tools
  37. 43. Picking
  38. 44. Drilling
  39. 45. Drilling
  40. 46. Forced Entry
  41. 47. Forced Entry
  42. 48. Surreptitious Entry
  43. 49. Surreptitious Entry
  44. 50. Surreptitious Entry
  45. 51. Surreptitious Entry
  46. 52. Surreptitious Entry
  47. 53. Now … for one of the most dangerous lock opening techniques ever ???? LOCK BUMPING
  48. 54. What is “Lock Bumping?” <ul><li>Exploiting the weaknesses found in common pin tumbler locks </li></ul><ul><li>Opening the lock: </li></ul><ul><ul><li>With no damage, no evidence </li></ul></ul><ul><ul><li>Within seconds </li></ul></ul><ul><ul><li>With little or no training </li></ul></ul><ul><ul><li>Without expensive or traditional tools </li></ul></ul>
  49. 55. In the News…. Bumping has caught the attention of the media
  50. 56. Time for a science lesson. Newton’s Cradle: Impact Energy
  51. 57. Lock Bumping – How does it work?
  52. 58. Lock Bumping – Same concept as the pick gun
  53. 59. Then Comes the Bump Key <ul><li>Perfect tool to transfer impact energy </li></ul><ul><li>Key cut to deepest possible depth </li></ul><ul><li>Key depths </li></ul><ul><ul><li># 1 depth very high on key </li></ul></ul><ul><ul><li># 9 depth very low on key </li></ul></ul><ul><li>Key and tool to transfer energy into lock </li></ul>
  54. 60. Bump Key vs. Operating Key #1 Depth = Very High on Key #9 Depth = Very Low on Key
  55. 61. How do you make a Bump Key? <ul><li>Key Machine </li></ul><ul><ul><li>Cut key to deepest possible depth </li></ul></ul><ul><ul><ul><li>All positions </li></ul></ul></ul><ul><ul><ul><li>Must have key machine </li></ul></ul></ul><ul><ul><ul><ul><li>Not readily available </li></ul></ul></ul></ul><ul><li>Or </li></ul><ul><ul><li>File key </li></ul></ul>
  56. 62. Transferring the Energy <ul><li>Bump key will not work by itself </li></ul><ul><ul><li>Nothing will happen – key will not turn </li></ul></ul><ul><li>How do you transfer the energy? </li></ul><ul><ul><li>A hammer </li></ul></ul><ul><ul><li>A shoe </li></ul></ul><ul><ul><li>A piece of wood </li></ul></ul><ul><ul><li>A screwdriver handle </li></ul></ul><ul><ul><li>What else??? Thieves can be creative!! </li></ul></ul>
  57. 63. Transferring Energy
  58. 64. Transferring the Energy
  59. 65. <ul><li>Collect old/used keys </li></ul><ul><li>Existing keys </li></ul><ul><ul><li>Master key system </li></ul></ul><ul><li>Buy locks at hardware store </li></ul><ul><ul><li>Have additional keys cut to code </li></ul></ul><ul><ul><li>File keys down </li></ul></ul><ul><li>Buy on the Internet </li></ul><ul><ul><li>Choose from selection of keys </li></ul></ul>Where do Bump Keys come from?
  60. 66. Where do Bump Keys come from? The Internet
  61. 67. Where do Bump Keys come from? The Internet Who’s watching? Concerned consumer or citizen? Soon to be burglar?
  62. 68. Bump Keys Myths: Myth #1 <ul><li>There are a wide variety of locks. You need keys for all locks to be effective. </li></ul>
  63. 72. Bump Keys Myths: Myth #2 <ul><li>Bumping is not used often so there is no problem. </li></ul>
  64. 73. Bump Keys Myths: Myth #2 <ul><li>How many burglaries have you investigated where ….. </li></ul><ul><ul><li>There’s no sign of forced entry? </li></ul></ul><ul><ul><li>The lock is left undamaged? </li></ul></ul><ul><ul><li>The owner swears that locked the door? </li></ul></ul><ul><li>How do you know these locks were not bumped? </li></ul><ul><ul><ul><li>There is no way to know </li></ul></ul></ul>
  65. 74. Bump Key Myth: Myth #3 <ul><li>Bumping cannot be easily learned. It requires practice and a large financial investment . </li></ul>
  66. 75. Bump Key Myth: Myth #3 <ul><li>Internet </li></ul><ul><ul><li>A quick “google” search on “lock bumping” will lead you to: </li></ul></ul><ul><ul><ul><li>Training Videos </li></ul></ul></ul><ul><ul><ul><li>Training tools </li></ul></ul></ul><ul><ul><ul><li>Written instructions </li></ul></ul></ul><ul><ul><ul><li>Bump keys </li></ul></ul></ul><ul><li>Requires practice – but not that much </li></ul><ul><li>11 of the most popular keyways </li></ul><ul><ul><li>About $35 </li></ul></ul>
  67. 76. Bump Key Myths: Myth #4 <ul><li>Burglars need to know what type of lock is in the door before they can break in. This takes a lot of preparation. </li></ul>
  68. 77. Bump Key Myths: Myth #4 <ul><li>Not entirely false </li></ul><ul><li>But… </li></ul><ul><ul><li>Bump keys are cheap, plentiful and easily made </li></ul></ul><ul><li>Can examine local DIY store to find locks sold in area </li></ul><ul><li>10 – 15 types of bump keys </li></ul><ul><ul><li>You’re set </li></ul></ul><ul><li>Take a stroll through your neighborhood </li></ul>
  69. 78. Unauthorized Key Duplication Yes… but for whom??
  70. 79. To whom do you give your keys? Maid or Cleaning Service Parking Lot Attendant or Valet t Plumber or Other Worker Babysitter or Other Employee
  71. 80. Unauthorized Key Duplication <ul><li>Most keys are: </li></ul><ul><ul><li>Not protected </li></ul></ul><ul><ul><li>Can be cut by anyone </li></ul></ul><ul><ul><ul><li>Anyone with a key machine </li></ul></ul></ul><ul><ul><ul><li>Anyone holding the key </li></ul></ul></ul><ul><li>Keys stamped “Do Not Duplicate” </li></ul><ul><ul><li>Are not protected </li></ul></ul><ul><ul><li>Create a false sense of security </li></ul></ul><ul><ul><li>“ Unlawful to Duplicate” - FALSE </li></ul></ul>
  72. 81. What role does high security, and key control, cylidner play in providing good security ?
  73. 82. How can you protect yourself and your community against these threats? <ul><li>High Security Locks </li></ul><ul><li>What is a high security lock? </li></ul><ul><ul><li>A lock that: </li></ul></ul><ul><ul><ul><li>Offers Pick resistance </li></ul></ul></ul><ul><ul><ul><li>Offers Drill resistance </li></ul></ul></ul><ul><ul><ul><li>Offers Bump resistance </li></ul></ul></ul><ul><ul><ul><li>Offers Control over duplicate keys </li></ul></ul></ul><ul><ul><li>But… it’s not enough to just say you protect against these threats </li></ul></ul><ul><ul><li>It must be proven!!! Independently!! </li></ul></ul>
  74. 83. UL & ANSI <ul><li>UL – Underwriters Laboratory </li></ul><ul><ul><li>UL437 </li></ul></ul><ul><ul><ul><li>Picking </li></ul></ul></ul><ul><ul><ul><li>Drilling </li></ul></ul></ul><ul><ul><ul><li>Physical attack </li></ul></ul></ul><ul><li>ANSI - American National Standards Institute </li></ul><ul><ul><li>ANSI A156.30 </li></ul></ul><ul><ul><ul><li>Same as above, but more… </li></ul></ul></ul><ul><ul><ul><ul><li>Theoretical changes </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Key control elements </li></ul></ul></ul></ul>
  75. 84. What is KEY CONTROL ?
  76. 85. What is meant by Controlled Duplication? <ul><li>Ask yourself these questions: </li></ul><ul><li>Do you give anyone copies of your keys? </li></ul><ul><li>Do you mind if they make copies without your permission? </li></ul>
  77. 86. What is meant by Controlled Duplication? <ul><li>The only way to fight unauthorized key duplication is with a patent protected key. </li></ul><ul><li>Utility Patented Keys </li></ul><ul><ul><li>Are protected by law </li></ul></ul><ul><ul><li>Controlled by manufacturer </li></ul></ul><ul><ul><ul><li>Distribution </li></ul></ul></ul><ul><ul><ul><ul><li>Who gets the keyblanks? </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Who is allowed to cut keyblanks? </li></ul></ul></ul></ul>
  78. 87. Where can you get high security and key control locks? <ul><li>Professional, Licensed Locksmith </li></ul><ul><ul><li>Look for license # </li></ul></ul><ul><li>ALOA Member </li></ul><ul><ul><li>Associated Locksmiths of America </li></ul></ul><ul><ul><li>Member locator </li></ul></ul><ul><ul><ul><li>www.aloa.org </li></ul></ul></ul><ul><li>CML, CPL, CRL, RL or other certification </li></ul><ul><li>Medeco Dealer Locator </li></ul><ul><ul><li>www.medeco.com </li></ul></ul>
  79. 89. You can’t get them at a Box Store
  80. 90. <ul><li>The next generation of lock and key DESIGN . </li></ul>
  81. 91. When you hear the phrase “lost key” what one word comes to mind?
  82. 92. When’s the last time you bought a roll of film?
  83. 93. Everyone WANTS access control. Everyone HAS mechanical hardware.
  84. 94. What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? wiring door modifications frame modifications NO
  85. 95. What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? leverage existing hardware audit trails scheduling ease of access rights management one key convenience YES
  86. 96. Next Steps <ul><li>Complete “Crime Prevention Kit” request form </li></ul><ul><ul><li>Use kit as a resource for security surveys or Neighborhood Watch meetings. </li></ul></ul>
  87. 98. Next Steps <ul><li>Partner with a Professional Locksmith </li></ul><ul><ul><li>Medeco Dealer Locator – www.medeco.com </li></ul></ul><ul><li>ALOA – Associated Locksmiths of America </li></ul><ul><ul><li>www.aloa.org </li></ul></ul><ul><ul><li>www.findalocksmith.com </li></ul></ul>Call me. I’m available for Neighborhood Watch meetings.
  88. 99. Q & A
  89. 100. In Locks We Trust! Let’s stay connected… Follow me on Twitter… @lockology Friend me on Facebook… www.Facebook.com/dalelbowman Connect on LinkedIn… www.linkedin.com/in/dalebowman RSS my blog… www.lockologydc.com
  90. 101. Thank You !
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×