What Homeowners Need to Learn About Lock Security Joseph Kingma Medeco Security Locks

Preview:

Citation preview

What Homeowners Need to Learn About Lock Security

Joseph Kingma

Medeco Security Locks

Agenda

Common Perceptions

Common Vulnerabilities

High Security Locks

Available Resources

9% of all residential break-ins occur through the garage…

Where Thieves Break In:

(Research by: Simon Hakim, Temple University, 215-204-7476)

12% occur through open or unlocked entrances, basements or second floor windows or doors…

Where Thieves Break In:

(Research by: Simon Hakim, Temple University, 215-204-7476)

23% of all residential break-ins occur through a window…

Where Thieves Break In:

(Research by: Simon Hakim, Temple University, 215-204-7476)

Where Thieves Break In:

58% of all residential break-ins occur through a first floor door…

(Research by: Simon Hakim, Temple University, 215-204-7476)

Where Thieves Break In:

62% of Completed Residential Burglaries

show no sign of forced entryDoors UnlockedEntry through open windowLock ManipulationDuplicate keys used

(2005 FBI Uniform Crime Report)

Do Alarms Help?

Yes, But…Would you ever buy a car that had an airbag, but no brakes?

A house with a alarm but poor quality locks is identical…– Just as brakes stop you from hitting something and

the airbag is there ‘just in case’ you still do, Good locks prevent the break-in, the alarm is used ‘just in case’ the burglar still gets in.

Nearly half of homes with alarms burglarized didn’t have alarm turned on…

Average Perception of a Lock

All locks are roughly the same – Some offer better strength

– All are generally secure when locked

Expensive locks are generally better looking– Assumed to be more secure

Keys… Keys… Keys…

Hidden for convenience

Given to Neighbors and Friends

Temporarily given to others– Mechanic

– Babysitter

– Housekeeper

– Valet Parking Attendant

1-in-50 chance your key works a neighbors lock

Overview of a Typical Lock SystemNegative Influences on Security

System Instigated

Keys Distributed

Leve

l of

Sec

urity

Time

Process Repeats

CRISIS!!

Keys Duplicated

Help is Fired or Quits

Keys Lost or Misplaced

Rekey or replace system

Access not limited by schedule

What is needed?

Doors are the #1 point of entry:– Keys need protection from duplication.

– Locks provide protection from manipulation

– Locks must be stronger

– System must offer more flexibility where appropriate

We want thieves to make a mess of things before they can gain entry.

Overview of Common Lock Technology

Used on 98% of all residential locks– Inexpensive, often imported

– No extraordinary materials used

– Loose tolerances

– Few code variations (many similar keys)

– Keys can be duplicated by anyone without “proper” authorization.

– Assumed to be secure

How does it work?

Pin tumbler lock basics

No key inserted

How does it work?

Pin tumbler lock basics

Operating key inserted

Risks Associated with Common Lock Technology

Easy to manipulate lock– Bump

– Pick

– Drill

– Pull

Inferior quality- lock doesn’t last

Keys can be copied by anyone– Blanks not protected

– Many keys unaccounted for

Methods of Key Duplication

Have key duplicated Obtain code from key

2 4 5 3 6

Carbon Paper Rubbing Wax Impression

No Sign of Entry

Methods of Physical AttackDrill Shear line

Shim Attack

Top Pin Drilling Attack

Methods of Lock By-Pass

Comb AttackImpressioning

Picking

No Sign of Entry

And What About Lock Bumping?

And What About Lock Bumping?

Spot the Burglary Tool

Spot the Burglary Tool

How does it work?

Using the Bump Key

Pull key out one position

The key is cut deep enough to allow the bottom pins to remain contained within the plug and not be forced into the shell and block the

shearline.

Using the Bump Key

UL Listed Locks:

UL 437 Locks– Pick and bump resistant

– Drill resistant

– Patented Keys for protection from duplication

– Medeco keys work in neighbors lock? 1 in 50 million chance

– Better chance of being struck by lightning in your lifetime…

High Security Technology

Hardened InsertsTriple Locking Mechanism1. Chiseled Pins (rotate)2. Sidebar3. Slider

Hardened Backplate

Mushroom Drivers

Digital e-Cylinder Technology

Digital MasterkeyingTime SchedulingAudit Records in Key and CylinderAccess easily changed

Available Tools and Programs

McGruff/Freedom Education Resource Kit:– Literature

– Technology

– Home

– Business

– Presentations on CD

– Sample Lock

– Display Board

Available Tools and Programs

McGruff/Freedom Education Resource Kit

Available Tools and Programs

McGruff/Freedom Dealer Network– Hundreds of Medeco Dealers Nationwide

– Can assist with training

– Can provide current threats from lock perspective

– Can often provide meeting space

Available Tools and Programs

Resource Materials– Web Sites:

– www.ncpc.org

– www.medeco.com

– Literature:

– Either of the above sites

– Key control policies handbook – Medeco

McGruff Freedom Educational Kit – call Medeco at:1-800-839-3157

Summary

Doors are #1 vulnerability

Threats are real

Locks make a difference…

Resources are readily available

Recommended