BYPASS of LOCKS and SAFES Locks, Safes, and Security LSS+ Multimedia Supplement

BYPASS of LOCKS and SAFES Locks, Safes, and Security LSS+ Multimedia Supplement

BYPASS OF LOCKS AND SAFES Locks, Safes, and Security LSS+ Multimedia Supplement www.securitylaboratories.org 6/9/2020 1 BYPASS: WHY IMPORTANT ♦ Protection of life ♦ Protection of property ♦ Protection of information ♦ Sabotage ♦ Espionage ♦ National security ♦ Terrorism 6/9/2020 2 BYPASS: REQUIRED KNOWLEDGE ♦ Locks ♦ Safes ♦ Security: physical and electronic ♦ Bypass technologies ♦ Bypass tools and techniques ♦ Specific bypass issues ♦ Specific vulnerabilities 6/9/2020 3 REQUIRED SUBJECTS ♦ · Anti-picking features ♦ · Bypass capability and methods of entry ♦ · Bypass techniques ♦ · Code cutting of keys ♦ · Cross-keying ♦ · Databases and reference materials for locks ♦ · Decoding of locks· 6/9/2020 4 REQUIRED SUBJECTS ♦ · Differs and depth coding: theory and reality ♦ · Disassembly of locks ♦ · Evidence of bypass ♦ · Forensic analysis of locks ♦ · Forensic disassembly of locks ♦ · Identification of locks, keys, and components ♦ · Impressioning 6/9/2020 5 REQUIRED SUBJECTS ♦ · Key duplication procedures ♦ · Keying of locks ♦ · Keying systems, including master keying ♦ · Keyways and restrictions ♦ · Locking hardware ♦ · Locks, and theory of operation of each type of mechanism ♦ · Manufacturing specifications for locks and keys ♦ · Metals and Metallurgy 6/9/2020 6 REQUIRED SUBJECTS ♦ · Methods of forced-entry ♦ · Picking ♦ · Safes: construction, locks, and methods of entry ♦ · Security systems and access control ♦ · Specifications for key machines ♦ · Tolerance specifications ♦ · Tools utilized in bypass 6/9/2020 7 WHO IS AFFECTED? ♦ Anyone who has property to protect ♦ Valuable items ♦ Valuable information ♦ Any premises ♦ EVERYONE IS AFFECTED BY LACK OF SECURITY 6/9/2020 8 BYPASS: THE PROBLEM ♦ Lack of knowledge by law enforcement investigators ♦ Lack of training of forensic specialists ♦ Lack of knowledge by tradecraft ♦ Lack of expertise by manufacturer ♦ Lack of data by public about bypass ♦ Potential for bypass: often unknown 6/9/2020 9 PRIMER ON LOCKS ♦ Basic locking mechanisms ♦ Must understand theory of operation ♦ Bypass theories ♦ Security assessment and limitations 6/9/2020 10 BASIC TYPES OF LOCKS ♦ Warded ♦ Lever ♦ Wafer ♦ Pin Tumbler ♦ Hybrid – Magnetic – Sidebar – Rotating Disk ♦ Combination 6/9/2020 11 WARDED LOCK 6/9/2020 12 Warded lock detail 6/9/2020 13 Warded lock for chest 6/9/2020 14 LEVER LOCK 6/9/2020 15 CHUBB Detector, 1827 6/9/2020 16 CHUBB Detector Lock 6/9/2020 17 PRICE Ne Plus Lever Lock 6/9/2020 18 MODERN CHUBB LEVER 6/9/2020 19 EUROPEAN LEVER LOCK 6/9/2020 20 EUROPEAN LEVER KEY 6/9/2020 21 European Lever 6/9/2020 22 TELEPHONE LEVER KEY 6/9/2020 23 Telephone Lock Detail 6/9/2020 24 POST OFFICE LEVER LOCK 6/9/2020 25 Lever Key Detail – Postal 6/9/2020 26 Lever Detail – Postal 6/9/2020 27 POSTAL Registered Mail Key 6/9/2020 28 Registered Mail Padlock 6/9/2020 29 WAFER LOCK – LOCKED 6/9/2020 30 WAFER LOCK – OPEN 6/9/2020 31 WAFER LOCKS – DOUBLE BITTED 6/9/2020 32 CHUBB AVA WAFER 6/9/2020 33 PIN TUMBLER LOCKS ♦ Top pins ♦ Bottom pins ♦ Master pins ♦ Pin stack ♦ Shear line 6/9/2020 34 PIN TUMBLER – EGYPTIAN 6/9/2020 35 EGYPTIAN DETAIL 6/9/2020 36 Bottom Pin Detail 6/9/2020 37 Top Pin Detail 6/9/2020 38 Shear Line 6/9/2020 39 Locked 6/9/2020 40 Pins at Shear Line 6/9/2020 41 Plug Rotated 6/9/2020 42 SECURITY PINS 6/9/2020 43 SECURITY PIN DETAIL 6/9/2020 44 HYBRID LOCKS ♦ Dimple ♦ Magnetic ♦ Rotating disk ♦ Split sidebar ♦ Laser track ♦ Rotating pin and sidebar 6/9/2020 45 DIMPLE LOCK PIN DETAIL 6/9/2020 46 DOM PIN TUMBLER LOCK 6/9/2020 47 DIMPLE LOCK BY DOM 6/9/2020 48 MUL-T-LOCK DIMPLE 6/9/2020 49 MAGNETIC SIDEBAR 6/9/2020 50 IKON Magnetic Detail 6/9/2020 51 LASER TRACK – EVVA 3KS 6/9/2020 52 3KS Sidebar Locking Principle 6/9/2020 53 3KS Locked Cylinder 6/9/2020 54 3KS Unlocked Cylinder 6/9/2020 55 G M SIDEBAR 6/9/2020 56 ABLOY ROTATING DISK 6/9/2020 57 BYPASS OF LOCKS ♦ Many methods ♦ Sophisticated and simple ♦ Often Manufacturers do not know of techniques ♦ Low to high skill ♦ Never say Never! 6/9/2020 58 PRIMARY BYPASS TECHNIQUES ♦ Picking ♦ Decoding ♦ Impressioning 6/9/2020 59 BYPASS TECHNIQUES ♦ Mechanical Bypass ♦ Core Shimming ♦ Pin and Cam ♦ Pick and form – foil ♦ Stack Probing – length of pin stack ♦ Sac probing – break points 6/9/2020 60 More Bypass Techniques ♦ Electronic decoding ♦ Plasticine reading ♦ Auto impressioning using foil ♦ Tryout keys ♦ Shim wire decoding ♦ Radioscopy ♦ Borescope 6/9/2020 61 More Bypass Techniques ♦ Belly Reading ♦ Skeleton keys ♦ Comb pick ♦ Rapping ♦ Scratch reading of levers ♦ Vibration techniques ♦ Auto manipulation of components ♦ Combination of techniques 6/9/2020 62 More Bypass Techniques ♦ Rocking with computer picks ♦ Pick guns ♦ Special pick and decode tools ♦ Cross keys ♦ Electronic signature analysis 6/9/2020 63 PICKING TOOLS ♦ What is Picking? 6/9/2020 64 PICKING A CYLINDER APPLY TENSION 6/9/2020 65 Move Pins with Pick 6/9/2020 66 BASIC PICKS 6/9/2020 67 PICK SET – PROFESSIONAL 6/9/2020 68 COMPUTER PICKS 6/9/2020 69 PICK GUNS 6/9/2020 70 SPECIAL PICKS 6/9/2020 71 More Special Picks – Europe 6/9/2020 72 SPUTNIK PICK 6/9/2020 73 IMPRESSIONING 6/9/2020 74 Marks are Produced 6/9/2020 75 FOIL IMPRESSIONING TOOLS 6/9/2020 76 Foil Blank Key is Inserted 6/9/2020 77 Foil Key is Produced 6/9/2020 78 LEAD COMPOSITE IMPRESSIONING 6/9/2020 79 DECODING OF LOCKS Many techniques Many specialized tools Derive key codes to simulate or generate a key 6/9/2020 80 DECODING OF LOCKS 6/9/2020 81 DECODING OF LOCKS 6/9/2020 82 DECODING OF LOCKS 6/9/2020 83 Variable Key Generation 6/9/2020 84 MANIPULATION OF COMBINATION LOCKS 6/9/2020 85 Soft Drill Output Data 6/9/2020 86 FORENSIC INDICIA OF BYPASS 6/9/2020 87 Pick Marks on Pin 6/9/2020 88 Marks from Pick Gun 6/9/2020 89 Pick Gun Markings 6/9/2020 90 Impact Pick Marks 6/9/2020 91 USE OF S E M 6/9/2020 92 Pick Tracks 6/9/2020 93 SEM Pick Track Comparison 6/9/2020 94 CASE #1: OMEN SAFE ♦ Magnetic Card Lock on Safe 6/9/2020 95 CASE #2: Showa Magnetic Magnetic Domain Lock 6/9/2020 96 Magnetic Domains ♦ Reading location and polarity of magnetic domains 6/9/2020 97 CASE #3: VINGCARD Pin Tumbler Lock used in Hotels 6/9/2020 98 Conductive Ink Decoder for Vingcard Lock 6/9/2020 99 Vingcard keys and lock 6/9/2020 100 Vingcard pin tumblers 6/9/2020 101 Mechanical decoding with wire 6/9/2020 102 Insert carbon paper and wire 6/9/2020 103 Picture of Key in carbon paper 6/9/2020 104 CASE #4: ELSAFE In Room Hotel Safe 6/9/2020 105 ELSAFE ♦ Mechanical bypass using paper clip ♦ Electronic bypass using RF to accelerate the timing lockout 6/9/2020 106 LOCKS, SAFES, AND SECURITY © 2019 Marc Weber Tobias and Tobias Bluzmanis [email protected] 6/9/2020 107.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    107 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us