SlideShare a Scribd company logo
1 of 102
Northern Virginia Crime Prevention Association Conference 10 - 4 - 11 Dale L. Bowman, CML, CJIL, CPP
Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
#NVCPA
#CrimePrev
Copy of this presentation at www.linkedin.com Go to my profile page.  Scroll down to Slideshare to access.  Connect  with me while you’re there.
 
 
This is a painting by Vincent Von Gogh. “ Vase and Flowers” >$50M and it was… STOLEN.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
SPRING 2010 – NYC The NY Daily News reports – April 24 th  thru April 27th  Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue,  & Mike Mclaughlin Subway Key
These were the headlines: “ No such thing as a free ride? Man buys copy of universal subway key for $50.” “ Get the magic key that opens gates at 468  subway stations for $27.” “ Pols, public outraged at’ ‘shocking’ master key security breach in our subways.” SPRING 2010 – NYC
SPRING 2010 – NYC
But, that’s not all. Here’s the last headline…
SPRING 2010 – NYC “ Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
SPRING 2010 – NYC
 
So… what’s the  BIG IDEA   here ?
Your key system is the first line of  defense… it’s also usually the  weakest link .
 
This is  Jacques Plante He pioneered the goalie mask in the 1960’s The game of ice hockey was invented in the  early-1800’s
It took someone nearly  150 years  to finally realize… Hey, I’m tired of getting   HIT   in the face with the puck.  It hurts!  There has to be a better way.
 
Lesson : There are solutions to the   obvious .
 
This is  Linus Yale, Jr He patented and developed the concept of the pin tumbler lock in   1865.
His concept is still used today… 97%  of all locks used to protect homes, businesses, institutions still use this design.
Lesson : There are solutions to the  obvious .
So… what’s an even  BIGGER IDEA   here ?
A strong mechanical foundation, with  key control  and   high security   elements, is still crucial to the long term success of any access control program.
Shell Plug How does a lock work?
Shell Plug How does a lock work?
BOTTOM PINS TOP PINS How does a lock work?
How does a lock work?
PLUG SHELL How does a lock work?
How does a lock work?
How does a lock work?
Locks: Vulnerabilities and how they get compromised !
Picking
Picking
Picking Tools
Picking
Drilling
Drilling
Forced Entry
Forced Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Now …  for one of the most dangerous lock opening techniques ever ???? LOCK BUMPING
What is “Lock Bumping?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In the News…. Bumping has caught the attention of the media
Time for a science lesson. Newton’s Cradle: Impact Energy
Lock Bumping – How does it work?
Lock Bumping – Same concept as the pick gun
Then Comes the Bump Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key vs. Operating Key #1 Depth = Very High on Key #9 Depth = Very Low on Key
How do you make a Bump Key? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring the Energy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring  Energy
Transferring the Energy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Where do Bump Keys come from?
Where do Bump Keys come from? The Internet
Where do Bump Keys come from? The Internet Who’s watching? Concerned consumer or citizen? Soon to be burglar?
Bump Keys Myths: Myth #1 ,[object Object]
 
 
 
Bump Keys Myths: Myth #2 ,[object Object]
Bump Keys Myths: Myth #2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myth: Myth #3 ,[object Object]
Bump Key Myth: Myth #3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myths: Myth #4 ,[object Object]
Bump Key Myths: Myth #4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unauthorized Key Duplication Yes… but for whom??
To whom do you give your keys? Maid or Cleaning Service Parking Lot  Attendant or Valet t Plumber or Other Worker Babysitter or Other Employee
Unauthorized Key Duplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What role does  high security,  and  key control,  cylidner play in providing good security ?
How can you protect yourself and your community against these threats?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UL & ANSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is  KEY CONTROL ?
What is meant by Controlled Duplication?  ,[object Object],[object Object],[object Object]
What is meant by Controlled Duplication? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where can you get high security and key control locks? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
You can’t get them at a Box Store
[object Object]
When you hear the phrase “lost key” what one word comes to mind?
When’s the last time you  bought a roll of film?
Everyone   WANTS   access control. Everyone   HAS   mechanical hardware.
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? wiring door modifications frame modifications NO
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? leverage existing hardware audit trails scheduling ease of access rights management one key convenience  YES
Next Steps ,[object Object],[object Object]
 
Next Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],Call me. I’m available for Neighborhood Watch meetings.
Q  &  A
In Locks We Trust! Let’s stay connected… Follow me on Twitter…  @lockology Friend me on Facebook…  www.Facebook.com/dalelbowman Connect on LinkedIn…  www.linkedin.com/in/dalebowman RSS my blog…  www.lockologydc.com
Thank You !
 

More Related Content

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11

Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113Louise Brace
 
2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)Felipe Prado
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Filmskbamediastudies
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptxnandusharma10
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11 (20)

Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
locksmiths
locksmithslocksmiths
locksmiths
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113
 
Real Estate Listing Presentation
Real Estate Listing PresentationReal Estate Listing Presentation
Real Estate Listing Presentation
 
Locksmithing
LocksmithingLocksmithing
Locksmithing
 
2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)
 
Home security and safety tips
Home security and safety tipsHome security and safety tips
Home security and safety tips
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Mass bugsweep
Mass bugsweepMass bugsweep
Mass bugsweep
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Films
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Keypad lock
Keypad lockKeypad lock
Keypad lock
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 

Recently uploaded

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 

Recently uploaded (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 

NVCPA Conference - "How Thieves Break In" 10-4-11