Download presentation
Presentation is loading. Please wait.
Published byYahir Galley Modified over 10 years ago
1
What Homeowners Need to Learn About Lock Security Joseph Kingma Medeco Security Locks
2
Agenda Common Perceptions Common Vulnerabilities High Security Locks Available Resources
3
9% of all residential break-ins occur through the garage… Where Thieves Break In: (Research by: Simon Hakim, Temple University, 215-204-7476)
4
12% occur through open or unlocked entrances, basements or second floor windows or doors… Where Thieves Break In: (Research by: Simon Hakim, Temple University, 215-204-7476)
5
23% of all residential break-ins occur through a window… Where Thieves Break In: (Research by: Simon Hakim, Temple University, 215-204-7476)
6
Where Thieves Break In: 58% of all residential break-ins occur through a first floor door… (Research by: Simon Hakim, Temple University, 215-204-7476)
7
Where Thieves Break In: 62% of Completed Residential Burglaries show no sign of forced entry Doors Unlocked Entry through open window Lock Manipulation Duplicate keys used (2005 FBI Uniform Crime Report)
8
Do Alarms Help? Yes, But… Would you ever buy a car that had an airbag, but no brakes? A house with a alarm but poor quality locks is identical… – Just as brakes stop you from hitting something and the airbag is there just in case you still do, Good locks prevent the break-in, the alarm is used just in case the burglar still gets in. Nearly half of homes with alarms burglarized didnt have alarm turned on…
9
Average Perception of a Lock All locks are roughly the same –Some offer better strength –All are generally secure when locked Expensive locks are generally better looking –Assumed to be more secure
10
Keys… Keys… Keys… Hidden for convenience Given to Neighbors and Friends Temporarily given to others –Mechanic –Babysitter –Housekeeper –Valet Parking Attendant 1-in-50 chance your key works a neighbors lock
11
Overview of a Typical Lock System Negative Influences on Security System Instigated Keys Distributed Level of Security Time Process Repeats CRISIS!! Keys Duplicated Help is Fired or Quits Keys Lost or Misplaced Rekey or replace system Access not limited by schedule
12
What is needed? Doors are the #1 point of entry: –Keys need protection from duplication. –Locks provide protection from manipulation –Locks must be stronger –System must offer more flexibility where appropriate We want thieves to make a mess of things before they can gain entry.
13
Overview of Common Lock Technology Used on 98% of all residential locks –Inexpensive, often imported –No extraordinary materials used –Loose tolerances –Few code variations (many similar keys) –Keys can be duplicated by anyone without proper authorization. –Assumed to be secure
14
How does it work? Pin tumbler lock basics No key inserted
15
How does it work? Pin tumbler lock basics Operating key inserted
16
Risks Associated with Common Lock Technology Easy to manipulate lock –Bump –Pick –Drill –Pull Inferior quality- lock doesnt last Keys can be copied by anyone –Blanks not protected –Many keys unaccounted for
17
Methods of Key Duplication Have key duplicated Obtain code from key 2 4 5 3 6 Carbon Paper Rubbing Wax Impression No Sign of Entry
18
Methods of Physical Attack Drill Shear line Shim Attack Top Pin Drilling Attack
19
Methods of Lock By-Pass Comb Attack Impressioning Picking No Sign of Entry
20
And What About Lock Bumping?
22
Spot the Burglary Tool
24
How does it work?
25
Using the Bump Key Pull key out one position The key is cut deep enough to allow the bottom pins to remain contained within the plug and not be forced into the shell and block the shearline.
26
Using the Bump Key
27
UL Listed Locks: UL 437 Locks –Pick and bump resistant –Drill resistant –Patented Keys for protection from duplication –Medeco keys work in neighbors lock? 1 in 50 million chance –Better chance of being struck by lightning in your lifetime…
28
High Security Technology Hardened Inserts Triple Locking Mechanism 1.Chiseled Pins (rotate) 2.Sidebar 3.Slider Hardened Backplate Mushroom Drivers
29
Digital e-Cylinder Technology Digital Masterkeying Time Scheduling Audit Records in Key and Cylinder Access easily changed
30
Available Tools and Programs McGruff/Freedom Education Resource Kit: –Literature –Technology –Home –Business –Presentations on CD –Sample Lock –Display Board
31
Available Tools and Programs McGruff/Freedom Education Resource Kit
32
Available Tools and Programs McGruff/Freedom Dealer Network –Hundreds of Medeco Dealers Nationwide –Can assist with training –Can provide current threats from lock perspective –Can often provide meeting space
33
Available Tools and Programs Resource Materials –Web Sites: –www.ncpc.orgwww.ncpc.org –www.medeco.comwww.medeco.com –Literature: –Either of the above sites –Key control policies handbook – Medeco McGruff Freedom Educational Kit – call Medeco at: 1-800-839-3157
34
Summary Doors are #1 vulnerability Threats are real Locks make a difference… Resources are readily available
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.