SlideShare a Scribd company logo
1 of 102
Northern Virginia Crime Prevention Association Conference 10 - 4 - 11 Dale L. Bowman, CML, CJIL, CPP
Content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
#NVCPA
#CrimePrev
Copy of this presentation at www.linkedin.com Go to my profile page.  Scroll down to Slideshare to access.  Connect  with me while you’re there.
 
 
This is a painting by Vincent Von Gogh. “ Vase and Flowers” >$50M and it was… STOLEN.
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
SPRING 2010 – NYC The NY Daily News reports – April 24 th  thru April 27th  Daily News Writers: Erin Einhorn, Kevin Deutsch, Peter Donohue,  & Mike Mclaughlin Subway Key
These were the headlines: “ No such thing as a free ride? Man buys copy of universal subway key for $50.” “ Get the magic key that opens gates at 468  subway stations for $27.” “ Pols, public outraged at’ ‘shocking’ master key security breach in our subways.” SPRING 2010 – NYC
SPRING 2010 – NYC
But, that’s not all. Here’s the last headline…
SPRING 2010 – NYC “ Miracle key we bought for $27 controls every elevator NYC elevator, plus subways.”
SPRING 2010 – NYC
 
So… what’s the  BIG IDEA   here ?
Your key system is the first line of  defense… it’s also usually the  weakest link .
 
This is  Jacques Plante He pioneered the goalie mask in the 1960’s The game of ice hockey was invented in the  early-1800’s
It took someone nearly  150 years  to finally realize… Hey, I’m tired of getting   HIT   in the face with the puck.  It hurts!  There has to be a better way.
 
Lesson : There are solutions to the   obvious .
 
This is  Linus Yale, Jr He patented and developed the concept of the pin tumbler lock in   1865.
His concept is still used today… 97%  of all locks used to protect homes, businesses, institutions still use this design.
Lesson : There are solutions to the  obvious .
So… what’s an even  BIGGER IDEA   here ?
A strong mechanical foundation, with  key control  and   high security   elements, is still crucial to the long term success of any access control program.
Shell Plug How does a lock work?
Shell Plug How does a lock work?
BOTTOM PINS TOP PINS How does a lock work?
How does a lock work?
PLUG SHELL How does a lock work?
How does a lock work?
How does a lock work?
Locks: Vulnerabilities and how they get compromised !
Picking
Picking
Picking Tools
Picking
Drilling
Drilling
Forced Entry
Forced Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Surreptitious Entry
Now …  for one of the most dangerous lock opening techniques ever ???? LOCK BUMPING
What is “Lock Bumping?” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In the News…. Bumping has caught the attention of the media
Time for a science lesson. Newton’s Cradle: Impact Energy
Lock Bumping – How does it work?
Lock Bumping – Same concept as the pick gun
Then Comes the Bump Key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key vs. Operating Key #1 Depth = Very High on Key #9 Depth = Very Low on Key
How do you make a Bump Key? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring the Energy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transferring  Energy
Transferring the Energy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Where do Bump Keys come from?
Where do Bump Keys come from? The Internet
Where do Bump Keys come from? The Internet Who’s watching? Concerned consumer or citizen? Soon to be burglar?
Bump Keys Myths: Myth #1 ,[object Object]
 
 
 
Bump Keys Myths: Myth #2 ,[object Object]
Bump Keys Myths: Myth #2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myth: Myth #3 ,[object Object]
Bump Key Myth: Myth #3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bump Key Myths: Myth #4 ,[object Object]
Bump Key Myths: Myth #4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unauthorized Key Duplication Yes… but for whom??
To whom do you give your keys? Maid or Cleaning Service Parking Lot  Attendant or Valet t Plumber or Other Worker Babysitter or Other Employee
Unauthorized Key Duplication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What role does  high security,  and  key control,  cylidner play in providing good security ?
How can you protect yourself and your community against these threats?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UL & ANSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is  KEY CONTROL ?
What is meant by Controlled Duplication?  ,[object Object],[object Object],[object Object]
What is meant by Controlled Duplication? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where can you get high security and key control locks? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
You can’t get them at a Box Store
[object Object]
When you hear the phrase “lost key” what one word comes to mind?
When’s the last time you  bought a roll of film?
Everyone   WANTS   access control. Everyone   HAS   mechanical hardware.
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? wiring door modifications frame modifications NO
What is eCylinder ? Convenience and flexibility of an access control system with the strength and security of a high security key system design? leverage existing hardware audit trails scheduling ease of access rights management one key convenience  YES
Next Steps ,[object Object],[object Object]
 
Next Steps ,[object Object],[object Object],[object Object],[object Object],[object Object],Call me. I’m available for Neighborhood Watch meetings.
Q  &  A
In Locks We Trust! Let’s stay connected… Follow me on Twitter…  @lockology Friend me on Facebook…  www.Facebook.com/dalelbowman Connect on LinkedIn…  www.linkedin.com/in/dalebowman RSS my blog…  www.lockologydc.com
Thank You !
 

More Related Content

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11

Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Mike Saunders
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113Louise Brace
 
2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)Felipe Prado
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Filmskbamediastudies
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptxnandusharma10
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Justin Bull
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecurityMichael Rushanan
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationMike Saunders
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 

Similar to NVCPA Conference - "How Thieves Break In" 10-4-11 (20)

Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?Is Your Data Literally Walking Out the Door?
Is Your Data Literally Walking Out the Door?
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
locksmiths
locksmithslocksmiths
locksmiths
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Tresesse real edited_070113
Tresesse real edited_070113Tresesse real edited_070113
Tresesse real edited_070113
 
Real Estate Listing Presentation
Real Estate Listing PresentationReal Estate Listing Presentation
Real Estate Listing Presentation
 
Locksmithing
LocksmithingLocksmithing
Locksmithing
 
2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)2600 v08 n3 (autumn 1991)
2600 v08 n3 (autumn 1991)
 
Home security and safety tips
Home security and safety tipsHome security and safety tips
Home security and safety tips
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Mass bugsweep
Mass bugsweepMass bugsweep
Mass bugsweep
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Codes and conventions in Horror Films
Codes and conventions in Horror FilmsCodes and conventions in Horror Films
Codes and conventions in Horror Films
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on CybersecuritySpecial Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
 
Keypad lock
Keypad lockKeypad lock
Keypad lock
 
Is Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentationIs Your Data Literally Walking Out the Door-presentation
Is Your Data Literally Walking Out the Door-presentation
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

NVCPA Conference - "How Thieves Break In" 10-4-11