Medeco Residential Hardware

Download Report

Transcript Medeco Residential Hardware

What Homeowners Need to Learn
About Lock Security
Joseph Kingma
Medeco Security Locks
Agenda
 Common Perceptions
 Common Vulnerabilities
 High Security Locks
 Available Resources
Where Thieves Break In:
9% of all residential break-ins occur
through the garage…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
12% occur through open or
unlocked entrances, basements
or second floor windows or
doors…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
23% of all residential break-ins occur
through a window…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
58% of all residential break-ins occur
through a first floor door…
(Research by: Simon Hakim, Temple University, 215-204-7476)
Where Thieves Break In:
62% of Completed Residential Burglaries
show no sign of forced entry
Doors Unlocked
Entry through open window
Lock Manipulation
Duplicate keys used
(2005 FBI Uniform Crime Report)
Do Alarms Help?
 Yes, But…
Would you ever buy a car that had an airbag, but no
brakes?
 A house with a alarm but poor quality locks is identical…
– Just as brakes stop you from hitting something and the
airbag is there ‘just in case’ you still do, Good locks prevent
the break-in, the alarm is used ‘just in case’ the burglar still
gets in.
 Nearly half of homes with alarms
burglarized didn’t have alarm turned on…
Average Perception of a Lock
 All locks are roughly the same
– Some offer better strength
– All are generally secure when locked
 Expensive locks are generally better looking
– Assumed to be more secure
Keys… Keys… Keys…
 Hidden for convenience
 Given to Neighbors and Friends
 Temporarily given to others
– Mechanic
– Babysitter
– Housekeeper
– Valet Parking Attendant
 1-in-50 chance your key
works a neighbors lock
Overview of a Typical Lock System
Negative Influences on Security
Access not
limited by
schedule
Process
Repeats
Keys
Duplicated
Level of Security
System
Instigated
Keys
Distributed
Help is Fired
or Quits
Keys Lost or
Misplaced
Rekey or
replace
system
CRISIS!!
Time
What is needed?
 Doors are the #1 point of entry:
– Keys need protection from duplication.
– Locks provide protection from manipulation
– Locks must be stronger
– System must offer more
flexibility where appropriate
 We want thieves to make
a mess of things before
they can gain entry.
Overview of Common Lock Technology
 Used on 98% of all residential locks
– Inexpensive, often imported
– No extraordinary materials used
– Loose tolerances
– Few code variations (many similar keys)
– Keys can be duplicated by anyone without “proper”
authorization.
– Assumed to be secure
How does it work?
Pin tumbler lock basics
No key inserted
How does it work?
Pin tumbler lock basics
Operating key inserted
Risks Associated with Common Lock Technology
 Easy to manipulate lock
– Bump
– Pick
– Drill
– Pull
 Inferior quality- lock doesn’t last
 Keys can be copied by anyone
– Blanks not protected
– Many keys unaccounted for
Methods of Key Duplication
2 4 5 3 6
Have key duplicated
Obtain code from key
Carbon Paper Rubbing
Wax Impression
Methods of Physical Attack
Drill Shear line
Top Pin Drilling Attack
Shim Attack
Methods of Lock By-Pass
Picking
Impressioning
Comb Attack
And What About Lock Bumping?
And What About Lock Bumping?
Spot the Burglary Tool
Spot the Burglary Tool
How does it work?
Using the Bump Key
 Pull key out one position
The key is cut deep enough to allow the bottom pins to remain contained within
the plug and not be forced into the shell and block the shearline.
Using the Bump Key
UL Listed Locks:
 UL 437 Locks
– Pick and bump resistant
– Drill resistant
– Patented Keys for protection from duplication
– Medeco keys work in neighbors lock? 1 in 50 million chance
– Better chance of being struck by lightning in your lifetime…
High Security Technology
Mushroom Drivers
Hardened Inserts
Triple Locking Mechanism
1. Chiseled Pins (rotate)
2. Sidebar
3. Slider
Hardened Backplate
Digital e-Cylinder Technology
Digital Masterkeying
Time Scheduling
Audit Records in Key and Cylinder
Access easily changed
Available Tools and Programs
 McGruff/Freedom Education Resource Kit:
– Literature
– Technology
– Home
– Business
– Presentations on CD
– Sample Lock
– Display Board
Available Tools and Programs
 McGruff/Freedom Education Resource Kit
Available Tools and Programs
 McGruff/Freedom Dealer Network
– Hundreds of Medeco Dealers Nationwide
– Can assist with training
– Can provide current threats from lock perspective
– Can often provide meeting space
Available Tools and Programs
 Resource Materials
– Web Sites:
– www.ncpc.org
– www.medeco.com
– Literature:
– Either of the above sites
– Key control policies handbook – Medeco
 McGruff Freedom Educational Kit – call
Medeco at:
1-800-839-3157
Summary
 Doors are #1 vulnerability
 Threats are real
 Locks make a difference…
 Resources are readily available