Medeco Residential Hardware
Download
Report
Transcript Medeco Residential Hardware
What Homeowners Need to Learn
About Lock Security
Joseph Kingma
Medeco Security Locks
Agenda
Common Perceptions
Common Vulnerabilities
High Security Locks
Available Resources
Where Thieves Break In:
9% of all residential break-ins occur
through the garage…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
12% occur through open or
unlocked entrances, basements
or second floor windows or
doors…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
23% of all residential break-ins occur
through a window…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
58% of all residential break-ins occur
through a first floor door…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
62% of Completed Residential Burglaries
show no sign of forced entry
Doors Unlocked
Entry through open window
Lock Manipulation
Duplicate keys used
(2005 FBI Uniform Crime Report)
Do Alarms Help?
Yes, But…
Would you ever buy a car that had an airbag, but no
brakes?
A house with a alarm but poor quality locks is identical…
– Just as brakes stop you from hitting something and the
airbag is there ‘just in case’ you still do, Good locks prevent
the break-in, the alarm is used ‘just in case’ the burglar still
gets in.
Nearly half of homes with alarms
burglarized didn’t have alarm turned on…
Average Perception of a Lock
All locks are roughly the same
– Some offer better strength
– All are generally secure when locked
Expensive locks are generally better looking
– Assumed to be more secure
Keys… Keys… Keys…
Hidden for convenience
Given to Neighbors and Friends
Temporarily given to others
– Mechanic
– Babysitter
– Housekeeper
– Valet Parking Attendant
1-in-50 chance your key
works a neighbors lock
Overview of a Typical Lock System
Negative Influences on Security
Access not
limited by
schedule
Process
Repeats
Keys
Duplicated
Level of Security
System
Instigated
Keys
Distributed
Help is Fired
or Quits
Keys Lost or
Misplaced
Rekey or
replace
system
CRISIS!!
Time
What is needed?
Doors are the #1 point of entry:
– Keys need protection from duplication.
– Locks provide protection from manipulation
– Locks must be stronger
– System must offer more
flexibility where appropriate
We want thieves to make
a mess of things before
they can gain entry.
Overview of Common Lock Technology
Used on 98% of all residential locks
– Inexpensive, often imported
– No extraordinary materials used
– Loose tolerances
– Few code variations (many similar keys)
– Keys can be duplicated by anyone without “proper”
authorization.
– Assumed to be secure
How does it work?
Pin tumbler lock basics
No key inserted
How does it work?
Pin tumbler lock basics
Operating key inserted
Risks Associated with Common Lock Technology
Easy to manipulate lock
– Bump
– Pick
– Drill
– Pull
Inferior quality- lock doesn’t last
Keys can be copied by anyone
– Blanks not protected
– Many keys unaccounted for
Methods of Key Duplication
2 4 5 3 6
Have key duplicated
Obtain code from key
Carbon Paper Rubbing
Wax Impression
Methods of Physical Attack
Drill Shear line
Top Pin Drilling Attack
Shim Attack
Methods of Lock By-Pass
Picking
Impressioning
Comb Attack
And What About Lock Bumping?
And What About Lock Bumping?
Spot the Burglary Tool
Spot the Burglary Tool
How does it work?
Using the Bump Key
Pull key out one position
The key is cut deep enough to allow the bottom pins to remain contained within
the plug and not be forced into the shell and block the shearline.
Using the Bump Key
UL Listed Locks:
UL 437 Locks
– Pick and bump resistant
– Drill resistant
– Patented Keys for protection from duplication
– Medeco keys work in neighbors lock? 1 in 50 million chance
– Better chance of being struck by lightning in your lifetime…
High Security Technology
Mushroom Drivers
Hardened Inserts
Triple Locking Mechanism
1. Chiseled Pins (rotate)
2. Sidebar
3. Slider
Hardened Backplate
Digital e-Cylinder Technology
Digital Masterkeying
Time Scheduling
Audit Records in Key and Cylinder
Access easily changed
Available Tools and Programs
McGruff/Freedom Education Resource Kit:
– Literature
– Technology
– Home
– Business
– Presentations on CD
– Sample Lock
– Display Board
Available Tools and Programs
McGruff/Freedom Education Resource Kit
Available Tools and Programs
McGruff/Freedom Dealer Network
– Hundreds of Medeco Dealers Nationwide
– Can assist with training
– Can provide current threats from lock perspective
– Can often provide meeting space
Available Tools and Programs
Resource Materials
– Web Sites:
– www.ncpc.org
– www.medeco.com
– Literature:
– Either of the above sites
– Key control policies handbook – Medeco
McGruff Freedom Educational Kit – call
Medeco at:
1-800-839-3157
Summary
Doors are #1 vulnerability
Threats are real
Locks make a difference…
Resources are readily available