This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.
This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.
This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.
This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.
Figure LSS+3236 Rim locks must be mounted properly to increase their
resistance to attack.
Figure LSS+3237 Cylinders can be pried loose if not mounted properly.
Figure LSS+3238 The cylinder was pounded through the mounting.
Figure LSS+3239 A pipe wrench can be utilized to twist loose a
key-in-knob or cylinder lock.
Figure LSS+3240 The ease by which a cylinder can be removed by shearing
the setscrew.
Cylinders can be forcibly removed by applying torque and destroying
internal setscrews. The setscrews can also be removed during business hours to allow the cylinder to be unscrewed at a later time. Courtesy of Don Shiles.
A wrench attack on cylinders can be very effective. Courtesy of Don
Shiles.
Figure LSS+3241 A diagram showing the principle of jamb spreading.
Figure LSS+3242, examples of burglary tools found at the scene of a safe
job.
Cylinders can be forcibly removed by applying torque and destroying
internal setscrews. The setscrews can also be removed during business hours to allow the cylinder to be unscrewed at a later time. Courtesy of Don Shiles. Figure LSS+3243, a special drill bit for removing plugs, called a rotary pick. Figure LSS+3244 A lock can be drilled by raising all drivers above shear line. Figure LSS+3245 A lock can be drilled to create a new shear line. Figure LSS+3246 A lock can be drilled and then shimmed with a fine wire. Figure LSS+3247 Peterson Manufacturing IC removal tool Figure LSS+3248 The Stealth Lock Systems tool to open Medeco cam locks
Sigma analysis of the Kibb interlocking strike plate, with Ian Bauchop.
Demonstration of different forced entry techniques on doors utilizing
the Kibb interlocking strike plate design.
A wrench attack on cylinders can be very effective. Courtesy of Don
Shiles.
Forensic evidence of forced entry. Courtesy of Hans Mejlshede.
Opening a padlock by bouncing the locking dog. Courtesy of Don Shiles.
39 29/09/2006 2:51:44 PM (c) 1999-2004 Marc Weber Tobias