Top Banner
OPENING LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? Bumping as a method of covert entry ©2007 Marc Weber Tobias
56

OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

May 26, 2018

Download

Documents

votram
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

OPENING LOCKS IN TEN

SECONDS OR LESS:

Is it a real threat to security?

Bumping as a method of covert entry©2007 Marc Weber Tobias

Page 2: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

ATTACK ON LOCKS: TWO

THREATS TO SECURITY

♦ MECHANICAL LOCKS ARE SUBJECT

TO BYPASS

♦ ACCESS CONTROL SYSTEMS UTILIZE

MECHANICAL LOCKS

♦ THREE PRIMARY ISSUES FOR I-T:

– Bumping

– Master key extrapolation

– Ability to replicate keys

Page 3: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

A THREAT TO THE I-T

ENVIRONMENT

♦ NON-SOPHISTICATED ATTACKS

♦ EASY TO ACCOMPLISH

♦ NO FORENSIC TRACES

♦ LOW RISK OF DETECTION

♦ 3T-2R RULE

♦ CAN COMPROMISE AN ENTIRE

FACILITY OR CRITICAL LOCKS

Page 4: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

LOCKS PROVIDE SECURITY

♦ Protect doors, safes and barriers from being

opened

♦ They control movement of barriers to entry

♦ Relied upon as first level of security

♦ Most popular: pin tumbler designs

Page 5: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

TYPES OF LOCKS

♦ WARDED

♦ LEVER

♦ WAFER AND DISK TUMBLER

♦ PIN TUMBLER

♦ HYBRID: COMBINED TECHNOLOGIES

♦ COMBINATION

Page 6: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

PIN TUMBLER LOCK

♦ 4000 year old Egyptian design

♦ Re-invented by Linus Yale in 1860

♦ Modern pin tumbler: split pins

♦ 95% of locks

♦ Low to high security applications

♦ All based upon Yale design

– Billions of locks

– Many different configurations

Page 7: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

OPENING LOCKS:

Covert Methods of Entry

♦ PICKING

♦ IMPRESSIONING

♦ DECODING

♦ EXTRAPOLATION OF TMK

♦ BUMPING

– Move all pins to shear line together or

separately

– Allow plug to turn without obstruction

Page 8: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

CMOE AND SECURITY RATING

♦ SPECIAL TOOLS

♦ TRAINING AND EXPERTISE

♦ TIME REQUIRED

♦ RELIABILITY AND REPEATABILITY

OF RESULTS

♦ DAMAGE TO LOCKS

♦ FORENSIC TRACE

Page 9: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

WHAT IS SECURITY IN A LOCK

♦ Perfect world: cannot open without correct

key or code;

♦ Reality: Levels of difficulty or resistance to

forced and covert entry techniques

– Type of mechanism

– Secondary locking systems

– Security enhancements

Page 10: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: A NEW OLD THREAT

♦ KNOWN SINCE 1925

♦ WAS NOT SIGNIFICANT METHOD OF

BYPASS

♦ NEW THREAT RAISED IN 2004

♦ TOOOL, BARRY WELS, OTHERS

♦ NOT POPULAR IN U.S. UNTIL 2006

Page 11: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

NETHERLANDS TESTS

♦ CONSUMER REPORTS AND DUTCH

LAW ENFORCEMENT AND TOOOL

♦ VALID AND COMPREHENSIVE

♦ MARCH, 2006 TEST OF ABOUT 70

MANUFACTURERS

♦ LARGE SAMPLE

♦ RELEVANT TO THE U.S. MARKET

Page 12: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

NETHERLANDS TEST RESULTS

♦ MOST LOCKS COULD BE OPENED

WITHOUT DIFFICULTY

♦ CONVENTIONAL AND HIGH

SECURITY CYLINDERS OPENED

♦ MOST LOCKS NOT SECURE

Page 13: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

THE THREAT FROM BUMP KEYS

♦ IF CAN OBTAIN A KEY THAT FITS

THE LOCK THAT HAS ALREADY

BEEN CUT

– EASY TO LEARN BUMPING

– ANYONE CAN OPEN A LOCK

Page 14: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING POSES A SERIOUS

THREAT TO SECURITY

♦ AFFECTS MILLIONS OF LOCKS

♦ CRITICAL INFRASTRUCTURE OFTEN

PROTECTED BY POOR LOCKS

♦ PROTECT PRIMARY PRIVACY AND

COMMUNICATIONS

♦ FEDERAL REQUIREMENTS FOR

INFORMATION SECURITY

Page 15: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: CRITICAL ISSUES

♦ 95% OF LOCKS VULNERABLE

♦ EVERYONE WHO RELIES ON LOCKS

MUST UNDERSTAND RISK SO CAN

MAKE OWN JUDGMENT

♦ LEGAL ISSUES OF LIABILITY

♦ SECURITY ISSUES

Page 16: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

WHY IS BUMPING A THREAT

♦ SIMPLEST FORM OF BYPASS

♦ 3T-2R RULE TO ASSESS SECURITY AGAINST COVERT ENTRY

–TRAINING

–TIME

–TOOLS

•REPEATABILITY

•RELIABILITY

Page 17: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

USPS LOCKS: 5 SECONDS TO

IDENTITY THEFT

Page 18: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

PRIMARY THREAT LEVELS

♦ SYSTEM INTELLIGENCE

♦ AVAILABILITY OF KEYS

– SECURITY RISKS CHANGE

SIGNIFICANTLY IF PRE-CUT

• ONLY REQUIRES SLIGHT TRAINING

Page 19: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

THREAT LEVEL 1:

SYSTEM INTELLIGENCE

♦ NO INTELLIGENCE

– STANDARD PIN TUMBLER LOCK

♦ PRIOR INTELLIGENCE

– SECONDARY LOCKING SYSTEM

– MEDECO, ASSA

Page 20: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

THREAT LEVEL 2: KEYS

♦ PRODUCING A BUMP KEY

– FROM BLANKS

– FROM CUT KEYS

♦ BUYING A PRE-CUT BUMP KEY

Page 21: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

CMOE AND SECURITY

RATINGS

♦ SPECIAL TOOLS

♦ TRAINING AND EXPERTISE

♦ TIME REQUIRED

♦ RELIABILITY AND REPEATABILITY

OF RESULTS

♦ DAMAGE TO LOCKS

♦ FORENSIC TRACE

Page 22: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: A METHOD OF

COVERT ENTRY – METHOD TO OPEN LOCKS IN SECONDS

– FASTEST AND EASIEST WAY TO OPEN

– VIRTUALLY NO SKILL REQUIRED

– EASY TO LEARN

– NO SPECIAL TOOLS

– 95% OF LOCKS CAN BE BYPASSED

– OPEN SOME HIGH SECURITY LOCKS

– USUALLY NO TRACE OR DAMAGE

– RELIABILITY OF RESULTS

– REPEATABILITY OF THE PROCESS

Page 23: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

YALE + NEWTON = BUMPING

♦ VIRTUALLY ALL TRADITIONAL

YALE LOCKS CAN BE OPENED BY

BUMPING

♦ RELIABLE

♦ REPEATABLE

♦ SIMPLE TO LEARN

Page 24: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

THE PHYSICS OF BUMPING:

SIR ISAAC NEWTON: 1650

♦ THE FATHER OF

BUMPING OF

LOCKS

♦ THIRD LAW OF

MOTION:

– “For every action,

there is an equal and

opposite reaction”

Page 25: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

1860: YALE PIN TUMBLER

LOCK

♦ Modernized the

Egyptian single pin

design

♦ Utilized two pins for

locking

♦ Double-detainer

theory of locking

♦ Created shear line

Page 26: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MODERN PIN TUMBLER LOCK

Page 27: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: BACKGROUND

♦ ENGLAND: 1925, GEORGE BARON

♦ 999, CODE 12, PERCUSSION KEY

♦ DENMARK, 25 YEARS AGO

♦ DEVELOPED BY LOCKSMITHS TO

RAP OPEN A CYLINDER

♦ ORIGINAL TECHNIQUE HAS BEEN

IMPROVED UPON TO MAKE

BUMPING A SIGNIFICANT THREAT

Page 28: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: SIX CRITICAL

ELEMENTS

1. KEY WITH CORRECT KEYWAY

2. CUT TO ALL “9” DEPTHS

3. BUMPING TECHNIQUE

4. METHOD TO APPLY ENERGY TO

PINS

5. TORQUE AND TIMING

6. TRAINING

Page 29: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

1: KEY WITH CORRECT

KEYWAY

♦ SOURCES

– COMMERCIAL STORES

– LOCKSMITHS

– INTERNET

– KEY TO ANY LOCK IN A FACILITY

– MODIFIED KEY: MILLED BLANK

Page 30: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

2: CUT TO ALL “9” DEPTHS

♦ HAND-CUT WITH FILE

♦ CODE CUT WITH PUNCH OR MACHINE

♦ INTERNET SITES

– ALL KEYS OF SAME KEYWAY CAN BE

MADE TO WORK

Page 31: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

NEGATIVE SHOULDER

Page 32: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMP KEYS

Page 33: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

3: BUMPING TECHNIQUE

♦ TWO TECHNIQUES FOR BUMPING

– WITHDRAW KEY ONE POSITION

• NO MODIFICATION REQUIRED

– NEGATIVE SHOULDER METHOD

• REDUCE SHOULDER BY .25 mm

♦ DESIGN OF KEY DEPENDS UPON

TECHNIQUE OF BUMPING

Page 34: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: INSERT THE KEY

Page 35: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING: APPLY ENERGY

Page 36: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

HOW BUMPING WORKS

♦ DOLEV MODEL

Page 37: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

4: METHOD TO APPLY ENERGY

♦ STRIKE HEAD OF

KEY

– “TOMAHAWK”

– SCREWDRIVER

HANDLE

– WOODEN OR

PLASTIC MALLET

– WOODEN STICK

– OTHER TOOLS

Page 38: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

5: TORQUE + TIMING

♦ TWO METHODS TO APPLY TORQUE

♦ REQUIRED TO TURN THE PLUG AT

THE RIGHT MOMENT

– TORQUE + ENERGY TO KEY

– ENERGY TO KEY THEN TORQUE

Page 39: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

6: TRAINING

♦ EASY TO LEARN

♦ LESS THAN ONE HOUR

♦ NETHERLANDS TESTS

♦ KELO-TV REPORTER, TEN SECONDS

Page 40: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

BUMPING DEMONSTRATION

♦ INSERT BUMP KEY

– TWO METHODS OF BUMPING

• Withdraw one position and strike

• Negative shoulder method

♦ APPLY TORQUE

♦ APPLY ENERGY TO HEAD OF KEY

♦ BOUNCE PINS

♦ TURN THE PLUG

Page 41: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MBE SECURITY: 5 SECONDS

Page 42: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

HIGH SECURITY MANUFACTURERS:

OUR LOCKS ARE “BUMP-PROOF” !

♦ Manufacturer’s Claims:

– Bumping does not work

– Our locks are bump-proof

♦ Sidebar Locks that are Secure: Maybe

– Medeco Biaxial and M3

– Assa

– Mul-T-Lock: Classic, 7x7, Interactive

– Other Sidebar designs

Page 43: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

HIGH SECURITY LOCK

DESIGNS

Page 44: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

SIDEBAR LOCKS - ASSA

Page 45: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

ASSA HIGH SECURITY?

Page 46: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MUL-T-LOCK HIGH SECURITY?

Page 47: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MUL-T-LOCK INTERACTIVE

Page 48: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MUL-T-LOCK MT5

Page 49: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

GENERIC LOCKS THAT

CANNOT BE BUMPED OPEN

♦ WARDED

♦ LEVER

♦ WAFER AND DISK WAFER

♦ COMBINATION

Page 50: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

EVVA 3KS SLIDER

Page 51: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

COMPLICATING FACTORS

♦ SECONDARY LOCKING MECHANISM

– SIDEBARS

– INTERACTIVE COMPONENTS

♦ DIRT AND DEBRIS

♦ SPECIAL PINS

♦ BROKEN SPRINGS

♦ PIN STACK LENGTH

♦ RESTRICTED BLANKS

♦ REQUIRES MORE THAN ONE MINUTE

Page 52: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

U.S. LAWS

♦ 60 YEAR OLD FEDERAL STATUTE

CONTROLS “NON-MAILABLE

MATTER”

♦ SOME JURISDICTIONS: NO LAWS

♦ BUMP KEYS EXEMPTED

♦ INTERNET SITES SELLING PRE-CUT

BUMP KEYS AND “TOMAHAWK”

Page 53: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

PREVENTING BUMPING

♦ SPECIAL PINS AND MECHANISMS

♦ SECONDARY SECURITY: SIDEBARS

♦ SPRING BIAS DIFFERENCE

♦ SHORTER BORES

♦ EMPLOY CERTAIN HIGH SECURITY

LOCKIS

Page 54: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

NEEDED LEGISLATION

♦ PREVENT TRAFFICKING IN PRE-CUT

BUMP KEYS

♦ CHANGE POSTAL REGULATIONS

Page 55: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

MK SYSTEM DESIGN

♦ Most are easy to compromise

♦ Extrapolation: What is it?

♦ 3T-2R Rule

♦ Types of locks

♦ Restricted keyways

♦ Advanced protection

Page 56: OPENING LOCKS IN TEN SECONDS OR LESS: Is it a … LOCKS IN TEN SECONDS OR LESS: Is it a real threat to security? ... ♦IMPRESSIONING

© 2007 Marc Weber Tobias

[email protected] REFERENCE MATERIAL

www.security.org– OPENING LOCKS BY BUMPING IN FIVE SECONDS OR

LESS: IS IT REALLY A THREAT TO PHYSICAL SECURITY?

• www.security.org/bumping_040206.pdf

– BUMPING OF LOCKS: LEGAL ISSUES IN THE U.S.

• www.security.org/bumping_legal_mwt.pdf

♦ Locks, Safes and Security: An International Police Reference, Marc Weber Tobias, 2001

♦ LSS+ The Multimedia Edition, 2006

www.toool.nl