lockpicking forensics
play

Lockpicking Forensics datagram datagram.layerone@gmail.com Black - PowerPoint PPT Presentation

Lockpicking Forensics datagram datagram.layerone@gmail.com Black Hat USA Briefings, 2009 Agenda How locks/picks work Normal wear Lock Analysis Key Analysis Investigative process Destructive entry still #1! How Locks Work


  1. Lockpicking Forensics datagram datagram.layerone@gmail.com Black Hat USA Briefings, 2009

  2. Agenda  How locks/picks work  Normal wear  Lock Analysis  Key Analysis  Investigative process

  3. Destructive entry still #1!

  4. How Locks Work

  5. How Locks Work

  6. How Locks Work

  7. How Locks Work

  8. Pin Binding

  9. Pin Binding

  10. Picking a Lock  Apply tension  Find binding pin  Raise to shear line  Repeat

  11. Picking a Lock

  12. Forensic Locksmithing  1976 - Art Paholke, Chicago PD  Locks, Safes, Security (Tobias)  Werkzeugspur (Goth)  Impressioning (Diederichsen)  Determine method of entry  Identify evidence, tool marks, techniques  Provide expert testimony

  13. Pins – New

  14. Pins – New

  15. Key - New

  16. Plug - New

  17. Pins – 100 uses

  18. Pins – 100 uses

  19. Plug – 100 uses

  20. Key – 100 Uses

  21. Pins – 1,500 uses (pin 1)

  22. Pins – 1,500 uses (pin 5)

  23. Key – 1,500 uses

  24. Plug – 1,500 uses

  25. Pins - 5,000 uses (pin 1)

  26. Pins - 5,000 uses (pin 5)

  27. Plug – 5,000 uses

  28. Plug – 5,000 uses

  29. Plug – 5,000 uses

  30. Key - 5,000 uses

  31. Forensic Analysis  Components (pins, springs, etc)  Plug  Cylinder  Cam/Actuator  Keys  Bolt  Door, window, wall, etc

  32. Lockpicking

  33. Lockpicking - Pins

  34. Lockpicking - Pins

  35. Lockpicking - Pins

  36. Lockpicking - Pins

  37. Lockpicking - Pins

  38. Lockpicking - Pins

  39. Lockpicking - Pins

  40. Lockpicking - Pins

  41. Lockpicking - Pins

  42. Lockpicking - Pins

  43. Lockpicking - Pins

  44. Lockpicking - Plug

  45. Lockpicking - Plug

  46. Lockpicking - Plug

  47. Lockpicking - Plug

  48. Lockpicking - Plug

  49. Lockpicking - Plug

  50. Lockpicking - Tension

  51. Lockpicking - Tension

  52. Lockpicking - Tension

  53. Lockpicking - Cam

  54. Lockpicking - Cam

  55. Lockpicking - Medecoder

  56. Pick Guns

  57. Pick Guns - Pins

  58. Pick Guns - Pins

  59. Pick Guns - Cam

  60. Pick Guns - Cam

  61. Key Bumping

  62. Key Bumping

  63. Key Bumping - Pins

  64. Key Bumping - Pins

  65. Key Bumping - Pins

  66. Key Bumping - Pins

  67. Key Bumping - Pins

  68. Key Bumping - Pins

  69. Key Bumping - Plug

  70. Key Bumping - Face

  71. Key Bumping - Face

  72. Key Bumping - Plug

  73. Impressioning

  74. Impressioning - Manipulation

  75. Impressioning - Manipulation

  76. Impressioning - Plug

  77. Impressioning – UV residue

  78. Impressioning – UV Residue

  79. Decoding  Depends on technique  Covert vs. surreptitious  Decoder “pick”  Manipulation  Visual/Optical  Thermal  Radiological  Disassembly

  80. Decoding - Visual

  81. Decoding - Visual

  82. Bypass

  83. Bypass

  84. Bypass

  85. Key Analysis  Material, keyway, cuts, codes  Original or duplicate  Hand cut or machined  Recent cutting, copying  Material transfer

  86. Keys - Plating

  87. Keys – Original vs Copied

  88. Keys – Original vs Copied

  89. Keys – Stylus striae

  90. Keys – Hand made

  91. Keys – Filed

  92. Keys – Filed

  93. Keys - Dremel

  94. Keys – Cutting Wheels

  95. Keys - Comparison

  96. Key - Bumping

  97. Keys – Bumping

  98. Keys – Tool Marks

  99. Keys – Tool Marks

  100. Keys – Tool Marks

Recommend


More recommend