SlideShare a Scribd company logo
1 of 102
Northern Virginia Crime Prevention Association Conference 10 - 4 - 11 Dale L. Bowman, CML, CJIL, CPP
Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
#NVCPA
#CrimePrev
Copy of this presentation at www.linkedin.com Go to my profile page.  Scroll down to Slideshare to access.  Connect  with me while you’re there.
 
 
This is a painting by Vincent Von Gogh. “ Vase and Flowers” >$50M and it was… STOLEN.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
SPRING 2010 – NYC The NY Daily News reports – April 24 th  thru April 27th  Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue,  & Mike Mclaughlin Subway Key
These were the headlines: “ No such thing as a free ride? Man buys copy of universal subway key for $50.” “ Get the magic key that opens gates at 468  subway stations for $27.” “ Pols, public outraged at’ ‘shocking’ master key security breach in our subways.” SPRING 2010 – NYC
SPRING 2010 – NYC
But, that’s not all. Here’s the last headline…
SPRING 2010 – NYC “ Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
SPRING 2010 – NYC
 
So… what’s the  BIG IDEA   here ?
Your key system is the first line of  defense… it’s also usually the  weakest link .
 
This is  Jacques Plante He pioneered the goalie mask in the 1960’s The game of ice hockey was invented in the  early-1800’s
It took someone nearly  150 years  to finally realize… Hey, I’m tired of getting   HIT   in the face with the puck.  It hurts!  There has to be a better way.
 
Lesson : There are solutions to the   obvious .
 
This is  Linus Yale, Jr He patented and developed the concept of the pin tumbler lock in   1865.
His concept is still used today… 97%  of all locks used to protect homes, businesses, institutions still use this design.
Lesson : There are solutions to the  obvious .
So… what’s an even  BIGGER IDEA   here ?
A strong mechanical foundation, with  key control  and   high security   elements, is still crucial to the long term success of any access control program.
Shell Plug How does a lock work?
Shell Plug How does a lock work?
BOTTOM PINS TOP PINS How does a lock work?
How does a lock work?
PLUG SHELL How does a lock work?
How does a lock work?
How does a lock work?
Locks: Vulnerabilities and how they get compromised !
Picking
Picking
Picking Tools
Picking
Drilling
Drilling
Forced Entry
Forced Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Now …  for one of the most dangerous lock opening techniques ever ???? LOCK BUMPING
What is “Lock Bumping?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In the News…. Bumping has caught the attention of the media
Time for a science lesson. Newton’s Cradle: Impact Energy
Lock Bumping – How does it work?
Lock Bumping – Same concept as the pick gun
Then Comes the Bump Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key vs. Operating Key #1 Depth = Very High on Key #9 Depth = Very Low on Key
How do you make a Bump Key? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring the Energy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring  Energy
Transferring the Energy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Where do Bump Keys come from?
Where do Bump Keys come from? The Internet
Where do Bump Keys come from? The Internet Who’s watching? Concerned consumer or citizen? Soon to be burglar?
Bump Keys Myths: Myth #1 ,[object Object]
 
 
 
Bump Keys Myths: Myth #2 ,[object Object]
Bump Keys Myths: Myth #2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myth: Myth #3 ,[object Object]
Bump Key Myth: Myth #3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myths: Myth #4 ,[object Object]
Bump Key Myths: Myth #4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unauthorized Key Duplication Yes… but for whom??
To whom do you give your keys? Maid or Cleaning Service Parking Lot  Attendant or Valet t Plumber or Other Worker Babysitter or Other Employee
Unauthorized Key Duplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What role does  high security,  and  key control,  cylidner play in providing good security ?
How can you protect yourself and your community against these threats?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UL & ANSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is  KEY CONTROL ?
What is meant by Controlled Duplication?  ,[object Object],[object Object],[object Object]
What is meant by Controlled Duplication? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where can you get high security and key control locks? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
You can’t get them at a Box Store
[object Object]
When you hear the phrase “lost key” what one word comes to mind?
When’s the last time you  bought a roll of film?
Everyone   WANTS   access control. Everyone   HAS   mechanical hardware.
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? wiring door modifications frame modifications NO
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? leverage existing hardware audit trails scheduling ease of access rights management one key convenience  YES
Next Steps ,[object Object],[object Object]
 
Next Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],Call me. I’m available for Neighborhood Watch meetings.
Q  &  A
In Locks We Trust! Let’s stay connected… Follow me on Twitter…  @lockology Friend me on Facebook…  www.Facebook.com/dalelbowman Connect on LinkedIn…  www.linkedin.com/in/dalebowman RSS my blog…  www.lockologydc.com
Thank You !
 

More Related Content

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11

Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113
Louise Brace
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Films
kbamediastudies
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
Mike Saunders
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
Alison Gianotto
 

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11 (20)

Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
locksmiths
locksmithslocksmiths
locksmiths
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113
 
Real Estate Listing Presentation
Real Estate Listing PresentationReal Estate Listing Presentation
Real Estate Listing Presentation
 
Locksmithing
LocksmithingLocksmithing
Locksmithing
 
2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)
 
Home security and safety tips
Home security and safety tipsHome security and safety tips
Home security and safety tips
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Mass bugsweep
Mass bugsweepMass bugsweep
Mass bugsweep
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Films
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Keypad lock
Keypad lockKeypad lock
Keypad lock
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

NVCPA Conference - "How Thieves Break In" 10-4-11