1 / 34

What Homeowners Need to Learn About Lock Security

What Homeowners Need to Learn About Lock Security. Joseph Kingma Medeco Security Locks. Agenda. Common Perceptions Common Vulnerabilities High Security Locks Available Resources. Where Thieves Break In:. 9% of all residential break-ins occur through the garage….

valmai
Download Presentation

What Homeowners Need to Learn About Lock Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What Homeowners Need to Learn About Lock Security Joseph Kingma Medeco Security Locks

  2. Agenda • Common Perceptions • Common Vulnerabilities • High Security Locks • Available Resources

  3. Where Thieves Break In: 9% of all residential break-ins occur through the garage… (Research by: Simon Hakim, Temple University, 215-204-7476)

  4. Where Thieves Break In: 12% occur through open or unlocked entrances, basements or second floor windows or doors… (Research by: Simon Hakim, Temple University, 215-204-7476)

  5. Where Thieves Break In: 23% of all residential break-ins occur through a window… (Research by: Simon Hakim, Temple University, 215-204-7476)

  6. Where Thieves Break In: 58% of all residential break-ins occur through a first floor door… (Research by: Simon Hakim, Temple University, 215-204-7476)

  7. Where Thieves Break In: • 62% of Completed Residential Burglaries show no sign of forced entry • Doors Unlocked • Entry through open window • Lock Manipulation • Duplicate keys used (2005 FBI Uniform Crime Report)

  8. Do Alarms Help? • Yes, But…Would you ever buy a car that had an airbag, but no brakes? • A house with a alarm but poor quality locks is identical… • Just as brakes stop you from hitting something and the airbag is there ‘just in case’ you still do, Good locks prevent the break-in, the alarm is used ‘just in case’ the burglar still gets in. • Nearly half of homes with alarms burglarized didn’t have alarm turned on…

  9. Average Perception of a Lock • All locks are roughly the same • Some offer better strength • All are generally secure when locked • Expensive locks are generally better looking • Assumed to be more secure

  10. Keys… Keys… Keys… • Hidden for convenience • Given to Neighbors and Friends • Temporarily given to others • Mechanic • Babysitter • Housekeeper • Valet Parking Attendant • 1-in-50 chance your key works a neighbors lock

  11. Access not limited by schedule Keys Duplicated Help is Fired or Quits Keys Lost or Misplaced Rekey or replace system Overview of a Typical Lock SystemNegative Influences on Security Keys Distributed Process Repeats System Instigated Level of Security CRISIS!! Time

  12. What is needed? • Doors are the #1 point of entry: • Keys need protection from duplication. • Locks provide protection from manipulation • Locks must be stronger • System must offer more flexibility where appropriate • We want thieves to make a mess of things before they can gain entry.

  13. Overview of Common Lock Technology • Used on 98% of all residential locks • Inexpensive, often imported • No extraordinary materials used • Loose tolerances • Few code variations (many similar keys) • Keys can be duplicated by anyone without “proper” authorization. • Assumed to be secure

  14. How does it work? Pin tumbler lock basics No key inserted

  15. How does it work? Pin tumbler lock basics Operating key inserted

  16. Risks Associated with Common Lock Technology • Easy to manipulate lock • Bump • Pick • Drill • Pull • Inferior quality- lock doesn’t last • Keys can be copied by anyone • Blanks not protected • Many keys unaccounted for

  17. 2 4 5 3 6 Have key duplicated Obtain code from key Wax Impression Carbon Paper Rubbing Methods of Key Duplication No Sign of Entry

  18. Drill Shear line Top Pin Drilling Attack Methods of Physical Attack Shim Attack

  19. Picking Impressioning Methods of Lock By-Pass No Sign of Entry Comb Attack

  20. And What About Lock Bumping?

  21. And What About Lock Bumping?

  22. Spot the Burglary Tool

  23. Spot the Burglary Tool

  24. How does it work?

  25. Using the Bump Key • Pull key out one position The key is cut deep enough to allow the bottom pins to remain contained within the plug and not be forced into the shell and block the shearline.

  26. Using the Bump Key

  27. UL Listed Locks: • UL 437 Locks • Pick and bump resistant • Drill resistant • Patented Keys for protection from duplication • Medeco keys work in neighbors lock? 1 in 50 million chance • Better chance of being struck by lightning in your lifetime…

  28. High Security Technology Mushroom Drivers Hardened Inserts • Triple Locking Mechanism • Chiseled Pins (rotate) • Sidebar • Slider Hardened Backplate

  29. Digital e-Cylinder Technology Digital Masterkeying Time Scheduling Audit Records in Key and Cylinder Access easily changed

  30. Available Tools and Programs • McGruff/Freedom Education Resource Kit: • Literature • Technology • Home • Business • Presentations on CD • Sample Lock • Display Board

  31. Available Tools and Programs • McGruff/Freedom Education Resource Kit

  32. Available Tools and Programs • McGruff/Freedom Dealer Network • Hundreds of Medeco Dealers Nationwide • Can assist with training • Can provide current threats from lock perspective • Can often provide meeting space

  33. Available Tools and Programs • Resource Materials • Web Sites: • www.ncpc.org • www.medeco.com • Literature: • Either of the above sites • Key control policies handbook – Medeco • McGruff Freedom Educational Kit – call Medeco at:1-800-839-3157

  34. Summary • Doors are #1 vulnerability • Threats are real • Locks make a difference… • Resources are readily available

More Related