top of page

Keys and locks, the cornerstone of access control

Nov 4, 2023

The ancient Egyptians, around 4,000 years ago, introduced the earliest known locks and keys. These rudimentary devices have developed significantly, paralleling advancements in Security Technology and Forensic Security methodologies. Today, a standard, non-high security keyway's vulnerability can be a focus for a Security Expert Witnesses in a Premise Liability case. Such standard locks are often easily bypassed—a glaring example of Security Negligence—through techniques like lock picking, which are less challenging than many assume.

Keys and locks, the cornerstone of access control

Keys and locks, the cornerstone of access control and a domain of expertise for security professionals and have a venerable history dating back thousands of years. The ancient Egyptians, around 4,000 years ago, introduced the earliest known locks and keys.


These rudimentary devices have developed significantly, paralleling advancements in Security Technology and Forensic Security methodologies. Today, a standard, non-high security keyway's vulnerability can be a focus for a Security Expert Witnesses in a Premise Liability case.


Such standard locks are often easily bypassed—a glaring example of Security Negligence—through techniques like lock picking, which are less challenging than many assume.

 

Below are some vulnerabilities to locks.

 

  • Lock Picking: Using tools like tension wrenches and pick sets, an individual can manipulate the pins in a standard keyway to align them at the shear line, allowing the lock to turn without the correct key. It's more easy than you think.


  • Bump Keying: A bump key is a specially cut key can align the pins inside a lock with a sharp impact or "bump," effectively opening the lock without the original key. Makes the pins jump over the shear line momentarily, allowing the plug to turn.


  • Key Duplication: Standard keys can often be duplicated easily with no special authorization. If someone has temporary access to a key, they can create unauthorized copies at many hardware stores or using key-copying kiosks or an app (see photos, which will identify the biting.


  • Lock Snapping: Some standard keyways, especially in Euro cylinder locks, are vulnerable to snapping because of a weak point in the lock. Applying force can break the lock allowing the intruder to manipulate the locking mechanism directly. Many locks purchased in stores are of the lowest grade of security.


  • Lock Drilling: Drills can be used to destroy the pin tumblers or other locking mechanisms within the keyway, allowing the lock to be opened with a screwdriver or similar tool.


  • Impressioning: This technique involves inserting a blank key or a special impressioning tool into the lock and manipulating it to create marks where the pins press against it. These marks are then used to file down the blank into a working key.


  • Decoding: Tools can be inserted into the keyway to measure the depth of the cuts in the key, allowing a duplicate key to be created without ever having access to the original key.


  • Wear and Tear: Over time, the mechanical components of a standard keyway (such as the dead-pin) can wear down, making the lock easier to pick or manipulate.


Due to these vulnerabilities, many businesses and individuals opt for high-security locks with features designed to counteract these methods, such as high-security keyways (biaxial) with reinforced materials, and patented key control systems to control keys and prevent manipulation.

 

Does your case involve locking? If so, set up a call so we can discuss how we can help you.



bottom of page