Action Library (Paladin Press, Loompanics, Delta, Etc) Book Collection
Total Page:16
File Type:pdf, Size:1020Kb
Carl Hammer * Tactics and Techniques for Bypassing Alarms and Defeating Locks Contents Introduction 1 Tactics rN Illegal Entry Target Reconnaissance and Initial Planning Expedient B & E: Overt Entry Tactics and Techniquesfor Bypassing Alarms and Defeating Locks by Carl Hammer Covert Entry’ Copyright € 1992 by Carl Hammer 2 Locks and Lock picking ISBN 0-87364-688-6 Warded Locks Printed in the United States of America Lever Tumbler Locks Published by Paladin Press, a division of Disc Tumbler Locks Paladin Enterprises, Inc., P.O. Bax 1307, Pin Tumbler Cylinder Locks Boulder, Colorado 80306, USA. Tubular Cylinder Locks 443-7250 (303) Vehicle Locks Magnetic Locks Direct inquiries anchor orders to the above address. Simple Suitcase Locks All rights reserved. Except for use in a review, no Safes and Combination Locks portion of this book may be reproduced in any form Padlocks without the express written permission of the publisher. Master Key Systems Neither the author nor the publisher assumes any responsibility for the use or misuse of 3 Improvising Lock-picking Tools information contained in this book. 4 Ionization Detectors 73 Other Means of Illegal Entry Photoelectric Cells and Invisible Beam Detectors Passive Infrared Detectors Entry 5 Window Microwave Motion Detectors Chains Transom Entry, Doors, and Door Ultrasonic Motion Detectors File Cabinets and Desk Drawers Visible Light Detectors Vehicle Doors, Windows, and Trunks Video Detectors 6 Barrier Sensors and Analyzers Methods of Forced Entry M 8 Other Tyfes of Alarm Systems 177 Doors Windows Deliberately Activated Alarm Systems and Personal Security Bars Attack Alarms SafeCracking Car Alarm Systems Shoplifter Detection Systems Fire Alarm Systems Alarm Systems, Sensors, and Howto Avoid Them 109 Control Units 9 Entry Tricks 197 Warning Devices Remote Signaling Systems and Automatic Dialers Access and Exit Control Systems Lock Switches Built into Standard, Mechanical Mortise Locks Power Supply and Batteries Wiring Wireless Systems 7 Alarm Sensors 141 Magnetic Reed Switches and Wire Contact Systems Window Foil Wmdowpane-Mounted Glass Breakage Detectors Vibration Detectors and Inertia Sensors Infrasound Detectors Field Effect Sensors Sound Detectors and Heat Detectors Pressure Mats, Plunger Switches, and Contact Strips Contents Bit vt Exponent B & E Note Introduction s this book was originally written in Europe, reaking and entering is a fairly common intelli- all measurements follow the international gence technique employed in all types of secret metric system. No measurements are abso- warfare. There have been many successful entry lute, however, as they always must be adapt- operations that have been of vital importance. ed to the measurements of the actual lock or B One such operation, now well documented, took Adevice you are working on. place in Chicago in 1941. A team of operatives led by naval intelligence agent 1 millimeter = 0.039 in. Willis George performed a covert entry into the office of 1 centimeter = 0.39 in. Stephen Ziggly, a German spy who posed as a business- 1 meter = 39.37 in. man. The search of his office produced sufficient evidence 10 meters = 32.81 ft. to break up one German spy ring and put Ziggly in jail. (After the war, Willis George wrote a book about his experi- ences as a government burglar. This book has now been reprinted by Paladin Press under the original title S urreptitious Entry) On the other hand, a failed or, even worse, detected and exposed entry operation could easily be a public humilia- tion for the intelligence service employing the exposed field operatives. This has happened on several occasions, always with serious consequences. For these reasons, every entry operation must be pre- pared and executed efficiently. Although the situation and the target area always will be different from one operation to the next, this volume aims to point out the most com- monly used entry techniques and explain how to employ Expedient B&E 1 them in the most expedient manner, whatever the situation. Although the electronics might be highly advanced and The field operative must himseLf consider which options truly state-of-the-art, the actual application of these sys- would be valid and which ones would be unsuitable. tems is generally easy to defeat. This is most likely the An entry operation necessarily demands that the opera- result of the extremely large number of companies wishing tives somehow manage to enter the premises of the target. to cash in on the security market, each one trying to attract This is usually not easy, as there will be locking devices and attention with the latest gimmick, whether it works under possibly also alarm devices to prevent intruders from actual field conditions or not. In the future, other access entering or sound when an intruder has been detected. The control systems might turn out to be more common than first priority is therefore usually to bypass the alarm sys- the leading ones today. Devices for identifying people by tem, and then to defeat the locking devices. The latter will fingerprints and handprints, as well as voice identification be accomplished either by picking locks or breaking systems, are currently being developed. Some of these sys- through them. tems are already in limited use. Despite this, it is quite cer- This book does not claim to teach everything about lock tain that the present alarm and locking devices will remain picking. That is an extremely specialized subject, demand- in use for a very long time indeed. After all, the present ing a complete knowledge of the mechanism of all locking locking technology for the most part relies on and dates devices as well as a year or more of constant practice. back to the nineteenth century. Consequently, lock picking is best left to the experts, who It is likely that there will be no clear-cut borderline devote all their time to it. This book does, however, give an between alarm devices and locking devices in the future, as overview of the techniques available to the operative who these two groups are approaching each other a little more is called upon to perform an entry operation, including each day. This can be seen clearly in the wide variety of details on how to pick most common types of locks. This electronic locks and card locks available today. T expect that book also details many not so well-known techniques for we will see more of this integration in the future. Chapters clandestinely entering a house. Once a resourceful opera- 2 and 6 include details on these integrated alarm and lock- tive has studied this information, the existence of an alarm ing systems. system or security system will provide no guarantees of keeping him out. Lock picking will be fully described in Chap ters 2 and 3, while other entry methods are described in Chapters 4 and 5. Most of the latter half of the book is devoted to alarm sys- tems and alarm sensors. The text explains how alarm sys- tems can be circumvented (i.e., defeated) by avoiding all sensors and switches and how they can be defeated by other means, such as frustrating them. These two methods, circumvention and counteraction, are detailed for most types of current alarm systems, as well as a few upcoming types, which we will probably see more of in the future. It is remarkable that so many present-day alarm sys- tems, including numerous American do-it-yourself securi- ty systems, are characterized by an unfathomable naivgtd. Expedient 2 B&E Introduction 3 CHAPTER 1 Tactics in Illegal Entry The outcome of an entry operation depends on two important factors: tactics and techniques. The chosen tac- tics determine how to conduct the entry as an operation and how to avoid being detected or caught. The techniques are the actual methods used for bypassing locks, doors, and other obstacles, such as alarm systems. This chapter will concentrate on tactics, while the following chapters will detail the actual techniques in use. The first thing to do when planning an entry operation is to recormoiterthe target (i.e., the actual building or instal- lation to be entered) and the area around it. This is the reconnaissance phase. Target Reconnaissance and Initial Planning First of all, the following factors about the target must be determined. 1) Protection: • number of guards, if any • location of guards at particular times • their equipment and armament • technical details on alarm and controlled-entry sys- tems, if any 5 ) den removal or installation of important machines. Such 2) Layout: work, and also regular maintenance work, is often per- formed outside ordinary office hours so as not to delay the • number and locations of entrances and exits (both regular work. ordinary and emergency exits) and hallways or stairways The vicinity of the taiget building must also be carefully suitable for a quick escape (and possibly window's, reconnoitered. Suitable escape routes must be prepared, rooftops, and sewers—even chutes in an emergency both for use after a successful entry and in the case of fail- • location of important offices or other rooms of impor- ure. If several operatives are available, it is advisable to tance organize an outer security ring around the target during • method of smuggling entry team and equipment into the actual entry’. The members of the outer security ring will the building if ordinary access is denied be positioned some distance away from the actual target. • possibilities of temporarily cutting off the entire build- They will observe access routes and warn of the approach ing from the telephone network and other ways of prevent- of police or enemies, either on foot or in vehicles. Warnings ing communication with the outside, for instance, with cel- are generally passed on by radio, preferably through the lular telephones or radio transmitters use of innocent-sounding code words, so that the transmis- sion cannot be identified if it is monitored.