3700 lines
173 KiB
Plaintext
3700 lines
173 KiB
Plaintext
![]() |
+=============================================================================+
|
|||
|
| ## ## ## ###### ###### ###### ### ### ###### ###### ## ## ## |
|
|||
|
| ## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## |
|
|||
|
| ## ## ### ##### ## ## ###### ## ## ###### ## ## #### |
|
|||
|
| ## ## ## ## ###### ## ## ## ## ## ## ## ## ## ## |
|
|||
|
+=============================================##==============================+
|
|||
|
| Oct 31, 1992|
|
|||
|
| [ The Journal of Privileged Information ] |
|
|||
|
| |
|
|||
|
+-----------------------------------------------------------------------------+
|
|||
|
| Issue 05 By: 'Above the Law' |
|
|||
|
+-----------------------------------------------------------------------------+
|
|||
|
| |
|
|||
|
|Informatik--Bringing you all the information you should know... |
|
|||
|
| and a lot you shouldn't... |
|
|||
|
| |
|
|||
|
+=============================================================================+
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
*DISCLAIMER*
|
|||
|
Informatik Journal is printed for informational purposes only. We
|
|||
|
do not recommend or condone any illegal or fraudulent application of
|
|||
|
the information found in this electronic magazine. As such, we
|
|||
|
accept no liability for any criminal or civil disputes arising from
|
|||
|
said information.
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
===========================================
|
|||
|
============== - CONTENTS - ===============
|
|||
|
================ Issue 05 =================
|
|||
|
======= Release date Oct 31, 1992 ========
|
|||
|
===========================================
|
|||
|
|
|||
|
|
|||
|
01) Issue #5 Introduction
|
|||
|
By: Informatik Staff
|
|||
|
|
|||
|
02) X-Mas Con 1992 Announcement
|
|||
|
By: DrunkFux
|
|||
|
|
|||
|
04) Locks and Physical Security
|
|||
|
By: Sterling
|
|||
|
|
|||
|
05) USSS Frequency Guide
|
|||
|
By: Miles Barkman
|
|||
|
|
|||
|
06) Cellular Update
|
|||
|
By: The US Congress
|
|||
|
|
|||
|
07) The HP3000's 'SECURITY/3000' system (part 3)
|
|||
|
By: Sterling
|
|||
|
|
|||
|
08) Informatik Submission & Subscription Policy
|
|||
|
By: Informatik Staff
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
/* Introduction */
|
|||
|
|
|||
|
|
|||
|
Happy Halloween and welcome to the 5th issue of the Informatik
|
|||
|
Journal. Though still suffering the slings and arrows of higher
|
|||
|
education, we have again managed to crank out an issue. Unfortunately we
|
|||
|
are still having a very poor response to our call for submissions. Come
|
|||
|
on! Contribute it. Even if you aren't an expert, we can all benefit from
|
|||
|
a little research on your part. Just head on out to the local library,
|
|||
|
find something interesting, and research it into a nice, informative
|
|||
|
article. We welcome information on the government, radio, computer
|
|||
|
hacking, preaking, and anything else of interest to the "computer
|
|||
|
underground" crowd. Even if you are not a writer, we welcome any feedback
|
|||
|
you may have concerning informatik. Speaking of which, WE HAVE MOVED
|
|||
|
SHOP! Thanks to our pals in Pittsburgh, we now have a new home:
|
|||
|
(inform@grind.cheme.cmu.edu) All subscription requests, feedback, etc,
|
|||
|
should be sent to that address. The old address is no longer valid, so
|
|||
|
any correspondance to our previous address has long since entered the
|
|||
|
cyber void.
|
|||
|
|
|||
|
The bulk of this issue (135k!!) is devoted to an article on Security
|
|||
|
Devices that is the most complete guide to locks, lockpicking, and
|
|||
|
security systems available to date. It should prove interesting to you
|
|||
|
all. In other news XMAS CON IS COMING! The whole staff of Informatik
|
|||
|
will be there, as will plenty of other interesting characters. Be there,
|
|||
|
its always interesting. Radio scanners need to check out the new
|
|||
|
collection of Secret Services frequencies and information on the latest,
|
|||
|
greatest cellular interception restrictions. And wrapping it up, we have
|
|||
|
the third and final part our series on The HP3000's 'SECURITY/3000' system.
|
|||
|
|
|||
|
We've been asked to pass along that a bbs has been set up on 128.2.55.27
|
|||
|
for those of you with internet access. Simply logon as bbs.
|
|||
|
|
|||
|
Informatik staff currently consists of Sterling, and MackHammer
|
|||
|
(between naps), with additional assistance provided by Live0ne and
|
|||
|
Holistic. If you are interested in working with the staff, drop us a
|
|||
|
line.
|
|||
|
|
|||
|
Enjoy,
|
|||
|
|
|||
|
Informatik Staff
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
[Updated Announcement - October 27, 1992]
|
|||
|
|
|||
|
dFx International Digest and cDc - Cult Of The Dead Cow proudly present :
|
|||
|
|
|||
|
|
|||
|
The Third Annual
|
|||
|
|
|||
|
X M A S C O N
|
|||
|
|
|||
|
AKA
|
|||
|
|
|||
|
H 0 H 0 C O N
|
|||
|
|
|||
|
|
|||
|
"WE KAN'T BE ST0PPED!"
|
|||
|
|
|||
|
|
|||
|
Who: All Hackers, Journalists, Security Personnel, Federal Agents,
|
|||
|
Lawyers, Authors and Other Interested Parties.
|
|||
|
|
|||
|
|
|||
|
Where: Allen Park Inn
|
|||
|
2121 Allen Parkway
|
|||
|
Houston, Texas 77019
|
|||
|
U.S.A.
|
|||
|
Tel: (800) 231-6310
|
|||
|
Hou: (713) 521-9321
|
|||
|
Fax: (713) 521-9321, Ext. 350
|
|||
|
|
|||
|
|
|||
|
When: Friday December 18 through Sunday December 20, 1992
|
|||
|
|
|||
|
|
|||
|
|
|||
|
HoJo's Says NoNo To HoHo
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
HAY!^@!*%!$1#&! We beat our own record! This year, thanks to one
|
|||
|
certain person's complete stupidity and ignorance, we managed to get
|
|||
|
kicked out of our first chosen hotel four months in advance. Needless
|
|||
|
to say, this caused some serious confusion for those who called to
|
|||
|
make reservations and were told the conference had been canceled.
|
|||
|
Well ... it hasn't been. The story is long, but if you wish to read
|
|||
|
exactly what happened, check out CuD 4.45.
|
|||
|
|
|||
|
The conference dates are still the same, but the hotel has changed
|
|||
|
since what was originally reported in the first update, which made
|
|||
|
it's way throughout Usenet and numerous other places, including CuD
|
|||
|
4.40. If you haven't heard about the new location, please make a note
|
|||
|
of the information listed above.
|
|||
|
|
|||
|
|
|||
|
What Exactly Is HoHoCon?
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
HoHoCon is something you have to experience to truly understand. It is
|
|||
|
the largest annual gathering of those in, related to, or wishing to
|
|||
|
know more about the computer underground (or those just looking for
|
|||
|
another excuse to party). Attendees generally include some of the most
|
|||
|
notable members of the "hacking/telecom" community, journalists,
|
|||
|
authors, security professionals, lawyers, and a host of others. Last
|
|||
|
year's speakers ranged from Bruce Sterling to Chris Goggans and Scot
|
|||
|
Chasin of Comsec/LoD. The conference is also one of the very few that
|
|||
|
is completely open to the public and we encourage anyone who is
|
|||
|
interested to attend.
|
|||
|
|
|||
|
Or, as Jim Thomas put it in CuD 4.45:
|
|||
|
|
|||
|
"For the past few years, a conference called "XmasCon" (or HoHoCon)
|
|||
|
has been held in Texas in December. As reported previously (CuD
|
|||
|
#4.40), it will be held again this year from 18-21 December. For those
|
|||
|
unfamiliar with it, XmasCon is a national meeting of curious computer
|
|||
|
aficionados, journalists, scholars, computer professionals, and
|
|||
|
others, who meet for three days and do what people do at other
|
|||
|
conferences: Discuss common interests and relax."
|
|||
|
|
|||
|
|
|||
|
Hotel Information
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
The Allen Park Inn is located along Buffalo Bayou and is approximately
|
|||
|
three minutes away from downtown Houston. The HoHoCon group room rates
|
|||
|
are $49.00 plus tax (15%) per night, your choice of either single or
|
|||
|
double. As usual, when making reservations you will need to tell the
|
|||
|
hotel you are with the HoHoCon Conference to receive the group rate.
|
|||
|
|
|||
|
Unlike our previously chosen joke of a hotel, the Allen Park Inn is
|
|||
|
not situated next to an airport and this may cause a small
|
|||
|
inconvenience for those of you who will be flying to the conference.
|
|||
|
The hotel is centrally located so you can fly in to either
|
|||
|
Intercontinental or Hobby airport but we are recommending Hobby as it
|
|||
|
is 15 miles closer and much easier to get to from the hotel. Here's
|
|||
|
where it may get a little confusing:
|
|||
|
|
|||
|
If you arrive at Hobby, you will need to take the Downtown Hyatt
|
|||
|
Airport Shuttle to the Hyatt, which departs every 30 minutes and will
|
|||
|
cost you $6.00. When you get to the Hyatt, get out of the shuttle with
|
|||
|
your luggage (for those who may not of figured that out yet) and use
|
|||
|
any of the nearby payphones to call the Allen Park Inn (521-9321) and
|
|||
|
tell them you need a ride. It's just like calling Mom when you need a
|
|||
|
ride home from glee club! The hotel shuttle will be around shortly to
|
|||
|
pick you up and take you to the aforementioned elite meeting place,
|
|||
|
and that ride is free. If all this is too much for you, you can always
|
|||
|
take a cab directly to the hotel which will run you about $20.
|
|||
|
|
|||
|
If you arrive at Intercontinental, you will need to board the Airport
|
|||
|
Express bus and take it to the Downtown Hyatt ($9). Once there, just
|
|||
|
follow the same instructions listed above.
|
|||
|
|
|||
|
We are in the process of trying to get the hotel to provide constant
|
|||
|
airport transportation during the conference, but they've yet to give
|
|||
|
us a definite answer. It is quite possible that we will have our own
|
|||
|
shuttle to bus people between the airports and hotel, so if you'd
|
|||
|
prefer a faster and more direct method of transportation, it would be
|
|||
|
helpful to mail and let us know what time you'll be arriving and at
|
|||
|
what airport. This will give us a chance to coordinate things more
|
|||
|
efficiently.
|
|||
|
|
|||
|
Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
|
|||
|
available if there are unoccupied rooms ready. Free local calls are
|
|||
|
provided, so bring dem 'puterz. I don't know if cable is free also, so
|
|||
|
those who wish to rekindle the memories of yesteryear may want to
|
|||
|
bring their screwdrivers. The hotel has both 24 hour room service, and
|
|||
|
a 24 hour restaurant, The Nashville Room. Call it a wacky coincidence,
|
|||
|
but the hotel bar is called the ATI room and like most of Houston's
|
|||
|
similar establishments, closes at 2 a.m. Good thing Tony still works
|
|||
|
at Spec's ...
|
|||
|
|
|||
|
This time around, the hotel is placing the conference guests in the
|
|||
|
rooms surrounding the courtyard/pool area. We are once again
|
|||
|
encouraging people to make their reservations as soon as possible for
|
|||
|
two reasons -- first, we were told that if you wait too long and the
|
|||
|
courtyard rooms are all taken, there is a chance that you'll be
|
|||
|
situated at the complete opposite end of the hotel, which isn't so bad
|
|||
|
if you don't mind walking all that way back and forth outside in
|
|||
|
December. Secondly, there is no other hotel exactly next door to this
|
|||
|
one (the closest is about five minutes away or so), so if for some odd
|
|||
|
reason all the rooms get rented, you'll get to do some nifty traveling
|
|||
|
every night.
|
|||
|
|
|||
|
Directions
|
|||
|
~~~~~~~~~~
|
|||
|
|
|||
|
For those of you who will be driving to the conference, the following
|
|||
|
is a list of directions on how to get to the hotel from most of
|
|||
|
Houston's major freeways that bring traffic in from out of town:
|
|||
|
|
|||
|
I-45 North or South: Exit Allen Parkway on the inside (left side) of
|
|||
|
the freeway. Take the Studemont/Montrose exit off Allen Parkway, then
|
|||
|
make a u-turn at the bridge and head back towards downtown. The hotel
|
|||
|
will be on the right hand side.
|
|||
|
|
|||
|
290: Take 290 to 610 South, then take I-10 East towards downtown. Exit
|
|||
|
Studemont. Right on Studemont, left on Allen Parkway. The hotel will
|
|||
|
be on the right hand side.
|
|||
|
|
|||
|
I-10 West: Exit Studemont. Right on Studemont, left on Allen Parkway.
|
|||
|
The hotel will be on the right hand side.
|
|||
|
|
|||
|
I-10 East: Take I-10 East to I-45 South and follow the same directions
|
|||
|
from I-45 listed above.
|
|||
|
|
|||
|
I-59 North or South: Take I-59 to I-45 North and follow the same
|
|||
|
directions from I-45 listed above.
|
|||
|
|
|||
|
Call the hotel if these aren't complete enough or if you need
|
|||
|
additional information.
|
|||
|
|
|||
|
|
|||
|
Conference Details
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
HoHoCon will last three days, with the actual conference being held on
|
|||
|
Saturday, December 19 in the Hermitage Room, starting at 11:00 a.m.
|
|||
|
and continuing until 5 p.m. or earlier depending on the number of
|
|||
|
speakers.
|
|||
|
|
|||
|
We are still in the planning stages at the moment, primarily due to
|
|||
|
time lost in finding a new hotel and getting contracts signed. We have
|
|||
|
a number of speakers confirmed (yes, Goggans will be speaking again)
|
|||
|
and will try to finalize the list and include it in the next update.
|
|||
|
We are definitely still looking for people to speak and welcome
|
|||
|
diverse topics (except for "The wonders and joys of ANSI, and how it
|
|||
|
changed my life"). If you're interested in rattling away, please
|
|||
|
contact us as soon as possible and let us know who you are, who you
|
|||
|
represent (if anyone), the topic you wish to speak on, a rough
|
|||
|
estimate of how long you will need, and whether or not you will be
|
|||
|
needing any audio-visual aids.
|
|||
|
|
|||
|
We would like to have people bring interesting items and videos again
|
|||
|
this year. If you have anything you think people would enjoy having
|
|||
|
the chance to see, please let us know ahead of time, and tell us if
|
|||
|
you will need any help getting it to the conference. If all else
|
|||
|
fails, just bring it to the con and give it to us when you arrive. We
|
|||
|
will also include a list of items and videos that will be present in a
|
|||
|
future update.
|
|||
|
|
|||
|
If anyone requires any additional information, needs to ask any
|
|||
|
questions, wants to RSVP, or would like to be added to the mailing
|
|||
|
list to receive the HoHoCon updates, you may mail us at:
|
|||
|
|
|||
|
dfx@nuchat.sccsi.com
|
|||
|
drunkfux@freeside.com
|
|||
|
drunkfux@ashpool.freeside.com
|
|||
|
359@7354 (WWIV Net)
|
|||
|
|
|||
|
or via sluggo mail at:
|
|||
|
|
|||
|
Freeside Data Network
|
|||
|
Attn: HoHoCon/dFx
|
|||
|
11504 Hughes Road
|
|||
|
Suite 124
|
|||
|
Houston, Texas
|
|||
|
77089
|
|||
|
|
|||
|
We also have a VMB which includes all the conference information and
|
|||
|
is probably the fastest way to get updated reports. The number is:
|
|||
|
|
|||
|
713-866-4884
|
|||
|
|
|||
|
You may also download any of the conference announcements and related
|
|||
|
materials by calling 713-492-2783 and using the username "unix", which
|
|||
|
is unpassworded. The files will be in the "hohocon" directory. Type
|
|||
|
"biscuit" if you wish to gain an account on the system. You can find
|
|||
|
us there too.
|
|||
|
|
|||
|
Conference information and updates will most likely also be found in
|
|||
|
most computer underground related publications, including CuD,
|
|||
|
Informatik, NIA, Mondo 2000, 2600, Phrack, World View, etc. We
|
|||
|
completely encourage people to use, reprint, and distribute any
|
|||
|
information in this file.
|
|||
|
|
|||
|
|
|||
|
Stupid Ending Statement To Make Us Look Good
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
HoHoCon '92 will be a priceless learning experience for professionals
|
|||
|
(yeah, right) and gives journalists a chance to gather information and
|
|||
|
ideas direct from the source. It is also one of the very few times
|
|||
|
when all the members of the computer underground can come together for
|
|||
|
a realistic purpose. We urge people not to miss out on an event of
|
|||
|
this caliber, which doesn't happen very often. If you've ever wanted
|
|||
|
to meet some of the most famous people from the hacking community,
|
|||
|
this may be your one and only chance. Don't wait to read about it in
|
|||
|
all the magazines and then wish you had been there, make your plans to
|
|||
|
attend now! Be a part of what we hope to be our largest and greatest
|
|||
|
conference ever.
|
|||
|
|
|||
|
Remember, to make your reservations, call (800) 231-6310 and tell them
|
|||
|
you're with HoHoCon.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
*********************************************
|
|||
|
*********************************************
|
|||
|
** **
|
|||
|
* Locks and Physical Security Devices *
|
|||
|
* *
|
|||
|
* by Sterling *
|
|||
|
** **
|
|||
|
*********************************************
|
|||
|
*********************************************
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Introduction
|
|||
|
------------
|
|||
|
|
|||
|
Ever since man has had something worth keeping, he has devised ways to
|
|||
|
protect it. The Egyptians were the first to develop a working lock of any
|
|||
|
complexity. It was based on a flat, wooden "key" with a series of raised pins
|
|||
|
that enable the user to slide back a wooden bolt that protected the door from
|
|||
|
entry. Advances in metallurgy eventually brought forth locks of iron.
|
|||
|
|
|||
|
As locks became more complex, the great medieval locksmiths' guilds
|
|||
|
carefully guarded their secrets. Restrictions forbid the guild's members from
|
|||
|
discussing the relatively simple inner workings of locks for fear of losing
|
|||
|
their power. By protecting their secrets, the locksmiths were able to exploit
|
|||
|
their unique skills, charging outlandish sums for their services.
|
|||
|
|
|||
|
The same principles apply today. That is why a locksmith can charge you
|
|||
|
$60 to come and unlock the door to your house. Americans spend millions each
|
|||
|
year on security systems to protect their property. Often this money is wasted
|
|||
|
on devices that really provide only limited protection. In this text I would
|
|||
|
like to expose how locks and security systems work, and how you can bypass them
|
|||
|
if needed.
|
|||
|
|
|||
|
It is easy to lose faith in the common door lock once you understand its
|
|||
|
simple operation. It took me less than a week with my lock picks before I
|
|||
|
could open my front door. Any first timer can open a desk or filing cabinet
|
|||
|
after achieving a basic understanding of the principles of modern locks.
|
|||
|
Hopefully this article will expose to more people just how unsecure locks can
|
|||
|
be, and with practice you should be able to pick your way into your house
|
|||
|
should the need arise.
|
|||
|
|
|||
|
The content of the article comes from a wide variety of sources. Personal
|
|||
|
experience, excerpts and summaries from the "alt.locksmithing" newsgroup, and
|
|||
|
from locksmithing and lockpicking books. Special thanks goes out to *Hobbit*
|
|||
|
for his simplex and hotel lock articles.
|
|||
|
|
|||
|
There are several types of locks that you are likely to encounter. These
|
|||
|
locks are easy to spot and identify what you know what to look for. Here I
|
|||
|
will discuss everything from the seldom used "warded lock" to alarm systems.
|
|||
|
|
|||
|
|
|||
|
Table of Contents:
|
|||
|
------------------
|
|||
|
|
|||
|
Key Operated Locks
|
|||
|
Latches
|
|||
|
The Warded Lock
|
|||
|
The Lever Lock
|
|||
|
The Wafer (Disc) Tumbler Lock
|
|||
|
The Pin Tumbler Lock
|
|||
|
Tubular Cylinder Locks
|
|||
|
|
|||
|
Lockpicking Tools
|
|||
|
The Basic Picks
|
|||
|
Making Your Own Picks
|
|||
|
Purchasing Picks
|
|||
|
|
|||
|
Attitude and Tips for Success
|
|||
|
|
|||
|
Other Security Devices
|
|||
|
Combination Locks
|
|||
|
Magnetic Locks
|
|||
|
Simplex Locks
|
|||
|
Automotive Protection Systems
|
|||
|
The Marlock System
|
|||
|
VingCard Locks
|
|||
|
Electronic Hotel Card Locks
|
|||
|
Alarm Systems
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Type of Latches
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
The latch is a spring bolt that actually holds the door shut. This is in
|
|||
|
contrast to the deadbolt, that had NO spring, and must be manually engaged.
|
|||
|
There are two primary types of latches, the springlatch and the deadlatch.
|
|||
|
|
|||
|
The springlatch is much more convenient, when the door is shut, the
|
|||
|
springlatch springs into place, locking the door shut. This is the type of
|
|||
|
latch found on most key-in-knob type door locks. The problem with the
|
|||
|
springlatch is that it is easily defeated by sliding a plastic card or thin
|
|||
|
knife and forcing it back. To prevent this, a latch guard can be installed.
|
|||
|
This is a device constructed from heavy steel folded lengthwise at a ninety
|
|||
|
degree angle or a T-bar shape. It is usually anywhere from six to twelve
|
|||
|
inches in length and is fastened to the edge of the door by bolts. The latch
|
|||
|
guard hides the latchbolt, and prevents any tampering with it.
|
|||
|
|
|||
|
The deadlatch cannot be shoved open like the unprotected springlatch can.
|
|||
|
When the door is closed, the latch bolt is secure in the lock position and acts
|
|||
|
as a deadbolt (a bolt that is not spring loaded, and resists any end pressure).
|
|||
|
The deadlatch resembles a smaller, beveled bolt projecting from the latchbolt.
|
|||
|
On some designs, the deadlatch takes the shape of an additional bolt, somewhat
|
|||
|
smaller, and usually placed higher up on the lock body. A key or interior
|
|||
|
locking mechanism must be used to engage the deadlatch and lock the door.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Warded Lock
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
The warded lock's basic design was created by the ancient Romans. The
|
|||
|
basic principle behind its operation is a series of "wards" (projecting
|
|||
|
obstructions) that prevent all but the proper cut key from being rotated inside
|
|||
|
the lock. These obstructions have been placed in the path of the turning of
|
|||
|
the bit portion of the key. This type of lock utilizes a key that has been
|
|||
|
notched in a way that it clears all the wards, but is still able to turn the
|
|||
|
bolt. These locks are easy to recognize. They are the "classic" antique lock
|
|||
|
that you may still find in old houses.
|
|||
|
|
|||
|
|
|||
|
_______ blade (stem) ##### handle (bow)
|
|||
|
/ \ ########
|
|||
|
| | ################################# ##
|
|||
|
\ / ################################# ##
|
|||
|
| | #### ### ########
|
|||
|
/ \ #### ### #####
|
|||
|
/ \ ####
|
|||
|
/ \ bit a warded key for a two-ward lock
|
|||
|
/___________\
|
|||
|
|
|||
|
warded key lock entrance
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The number of wards in the lock can vary, but normally two is the minimum.
|
|||
|
When a user inserts a key into the warded lock, the metal obstructions inside
|
|||
|
the lock allow only the proper key to be inserted. The key bittings allow the
|
|||
|
key to turn in a circular motion, opening the lock through one of four
|
|||
|
different mechanisms:
|
|||
|
|
|||
|
1) The key lifts a detent lever while throwing the bolt, providing
|
|||
|
deadbolt action. (Deadbolt action means that the bolt is secure
|
|||
|
against end pressure.)
|
|||
|
|
|||
|
2) The key moves a bolt whose locked or unlocked position is maintained
|
|||
|
by the action of a humped flat spring in two notches on the bolt.
|
|||
|
|
|||
|
3) The key moves directly against the latch tail of a latchbolt, or does
|
|||
|
so through the action of a floating lever.
|
|||
|
|
|||
|
4) The key inserts between two springs and wedges them apart as it is
|
|||
|
turned. (Usually only in warded padlocks)
|
|||
|
|
|||
|
Picking
|
|||
|
|
|||
|
These locks offer only token security to the user. Besides being easy to
|
|||
|
circumvent, the warded locks offers only about fifty alternate keying
|
|||
|
combinations. Picking them is generally regarded as trivial. All that is
|
|||
|
required is to bypass the wards and move the bolt into the unlocked position.
|
|||
|
This can be accomplished by using a pick known as a "buttonhook". To make your
|
|||
|
own buttonhook pick, use a pair of pliers to bend a six inch section of coat
|
|||
|
hanger into a warded key shape as below:
|
|||
|
|
|||
|
########
|
|||
|
### ##
|
|||
|
################################# ##
|
|||
|
# ## ##
|
|||
|
### ## #
|
|||
|
#####
|
|||
|
|
|||
|
The wire should be thin enough to pass into the keyway while avoiding all
|
|||
|
the wards, but stiff enough that it can still manipulate the bolt to open the
|
|||
|
lock. Though you may have to make a "large" and a "small" warded lock pick,
|
|||
|
the same principle applies.
|
|||
|
|
|||
|
|
|||
|
The Lever Lock
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
Robert Barron invented the lever lock in 1778. This constituted a
|
|||
|
considerable improvement over the ancient warded lock. It was based on a
|
|||
|
series of several "levers" that must each be raised to their own set height.
|
|||
|
If a particular lever was lifted to high or not enough, then the lock would not
|
|||
|
open. When the proper key is inserted, the notches on the key raise all the
|
|||
|
lever tumblers the required distance, lining up all the gates, allowing the
|
|||
|
lock to be opened. Not only was this new lock much harder to pick, it offered
|
|||
|
up to ten billion possible keying combinations. (The amount of practical
|
|||
|
combinations is actually around fifty thousand)
|
|||
|
|
|||
|
|
|||
|
#####
|
|||
|
__ #######
|
|||
|
/ \ ## ### #### ## ########### ##
|
|||
|
\ / ###### ####### ########### ##
|
|||
|
| | a lever or "lever tumbler" ########################### ##
|
|||
|
| | lock keyhole #######
|
|||
|
|__| ####
|
|||
|
|
|||
|
a lever tumbler lock key
|
|||
|
|
|||
|
|
|||
|
Since its design the lever tumbler lock has undergone numerous
|
|||
|
improvements. One of the is called the parautopic lock. The parautopic lock
|
|||
|
consisted of two sets of lever tumbler, where the first worked on the second.
|
|||
|
It also proved a plate that turned with the key so that one could not inspect
|
|||
|
the locks interior construction. Lever locks, though limited in use, can still
|
|||
|
be found today in some hospitals, suitcases, cabinets, fine furniture, and
|
|||
|
attache cases. Lever locks are also used on safe-deposit boxes, often with
|
|||
|
fifteen or more levers and sometimes requiring two keys.
|
|||
|
|
|||
|
Picking
|
|||
|
|
|||
|
Lever locks are a little harder to pick then the wafer and pin tumbler
|
|||
|
variety. In fact, the type of lever locks used on safe-deposit boxes are very
|
|||
|
difficult to pick indeed. To pick a lever lock requires that tension be placed
|
|||
|
against the deadbolt throughout the course of lifting one or more levers within
|
|||
|
the lock to the required alignment with the post. This requires the use of a
|
|||
|
"lever lock tension wrench" and a "hook" or "lifter" pick. [Picks are
|
|||
|
discussed later in the Lockpicking Tools section.]
|
|||
|
|
|||
|
Insert the lever lock tension wrench (a bit different than a normal
|
|||
|
tension wrench) into the keyway, and exert torsional pressure. The long bit is
|
|||
|
the part you hold, the next bend runs to the bottom of the lock, and the final
|
|||
|
bend fits into the notch in the bolt. Unlike most other types of locks, the
|
|||
|
lever locks requires you to exert considerable pressure on the tension wrench
|
|||
|
while picking. Usually the lever springs provide enough force to cause the
|
|||
|
levers to drop back down once picked. Because of the greater pressure, lever
|
|||
|
locks may require a slightly thicker tension wrench then normal.
|
|||
|
|
|||
|
Then insert the hook pick all the way into the lock. Locate the back
|
|||
|
lever and raise it gently until you FEEL or HEAR a slight "click". With the
|
|||
|
lever locks, the force required to push against the spring is substantially
|
|||
|
more than in other locks. Once it reaches the correct position, the gate will
|
|||
|
align with the post, and you should notice a slight "give" in the deadbolt, as
|
|||
|
there is now one less lever obstructing the lock from opening. You should note
|
|||
|
that once a lever has been picked, the amount of force required to lift that
|
|||
|
lever will be substantially less.
|
|||
|
|
|||
|
Move on to the next lever by slightly withdrawing the pick and repeat the
|
|||
|
process. Each subsequent lever will require the use of slightly less tension
|
|||
|
then on the previous ones. Otherwise the increased tension could cause the
|
|||
|
lock to bind up.
|
|||
|
|
|||
|
Once you have picked each individual lever, the lock should open. If it
|
|||
|
does not, then reinsert the pick (always maintaining tension with your wrench)
|
|||
|
and jiggle each lever slightly to ensure correct alignment.
|
|||
|
|
|||
|
Each lever does not require very much lift. This is due to the fact that
|
|||
|
the maximum depth of the cut under any tumbler is no more than half the width
|
|||
|
of the key, and never more than two-thirds its width. You should therefore use
|
|||
|
a pick that does not have too much "hook" to it.
|
|||
|
|
|||
|
|
|||
|
The Wafer Tumbler Lock
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
The wafer tumbler lock was developed as a low-cost lock that offered a
|
|||
|
reasonable degree of security to the owner. These locks are make up over
|
|||
|
one-fourth of all the locks in the world. The outside of the lock resembles
|
|||
|
the pin tumbler lock (yet to be discussed), but uses a much simpler mechanism.
|
|||
|
Wafer keyways usually have simple side ward indentions. The key is usually
|
|||
|
shorter than that of other locks, but equally broad. It may be cut on one or
|
|||
|
both sides. A two sided wafer lock is often called a "double wafer." The lock
|
|||
|
consists of four main parts. The plug housing, which contains the wafers and
|
|||
|
springs, the shell, the cam (locking bolt), and the retainer. The wafers are
|
|||
|
sometimes referred to as "discs" because their top and bottom are rounded to
|
|||
|
fit into the cylinder. Here is a diagram:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5
|
|||
|
___ 7 | ___
|
|||
|
||############## 1-> @| _ |_
|
|||
|
## ||## ## ## ## ## @||2||/
|
|||
|
6##||##4##3##2##1## <-keyway @||_||
|
|||
|
## ||## ## ## ## ## \|___|
|
|||
|
___||############## 3
|
|||
|
|
|
|||
|
\plug/ detail of a wafer tumbler
|
|||
|
|
|||
|
cutaway side view 1) spring
|
|||
|
of a wafer lock 2) key slot
|
|||
|
3) spring wing
|
|||
|
|
|||
|
1-4) spacings #1-4
|
|||
|
5) cam (operates the bolt)
|
|||
|
6) retainer (rear plug)
|
|||
|
7) the shell (body of the lock)
|
|||
|
|
|||
|
|
|||
|
Each lock has a series of chambers in which the wafers rest. These
|
|||
|
spacing closest to the front of the lock is numbered with one, and their
|
|||
|
numbers increase toward the back of the lock. Picture a number of the wafers
|
|||
|
placed face-to-face in the plug's spacing chambers. Each wafer is equal in
|
|||
|
overall size, but the key slots are of varying height. A metal spring exerts
|
|||
|
pressure on the spring wing of each wafer, forcing its lower part into the
|
|||
|
shell's "locking grooves" which lets the lower portion hang about midway into
|
|||
|
the keyway. Looking into the lock, you should be able to see this. These
|
|||
|
wafers act to hold the plug and shell together, preventing the lock from
|
|||
|
turning.
|
|||
|
|
|||
|
When the correct key is inserted, it goes through the key slots on each
|
|||
|
wafer, raising the wafers out of the locking groove. The key must have the
|
|||
|
appropriate depth of cut in each position to raise the wafer the correct
|
|||
|
amount. The depth of the key's cut (and the length of the wafer's key slot) is
|
|||
|
any one of five different depths. The shorter the top edge of the wafer's key
|
|||
|
slot, the lower the key cut depth value. For instance the number 1 slot (the
|
|||
|
slot that is the largest) would require the shallowest cut in the key.
|
|||
|
Normally lock manufacturers place a number four or five wafer near the keyhole
|
|||
|
to block the view of the back wafers. Also note that the same type of wafer
|
|||
|
may appear several times in the same lock.
|
|||
|
|
|||
|
Above some brands of wafer tumbler lock you will see a small hole. When
|
|||
|
the lock has been unlocked, you can remove the entire lock plug by inserting a
|
|||
|
piece of stiff wire into this hole and depressing the retainer. Though nowhere
|
|||
|
near as secure as the pin tumbler lock, the wafer tumbler is a very popular,
|
|||
|
low cost lock. The lock is normally found on cheaper cabinets and desks, some
|
|||
|
padlocks, some automobile locks, locking handles, and trailer doors. Where
|
|||
|
more security is desired, the double wafer type is used, providing wafers on
|
|||
|
the top and bottom of the keyway.
|
|||
|
|
|||
|
Picking
|
|||
|
|
|||
|
Though harder to pick then the warded lock, the wafer lock is still easy
|
|||
|
to circumvent. This is an excellent lock to practice on because the techniques
|
|||
|
required to pick it are applicable to the pin tumbler lock as well. Like the
|
|||
|
lever lock, picking the wafer tumbler lock requires use of a tension wrench and
|
|||
|
a pick. A variety of the different picks can be used including the rake, the
|
|||
|
hook, the half-diamond, and the half-round pick. Selection depends on the size
|
|||
|
of the lock, the distance between each wafer, and personal preference.
|
|||
|
|
|||
|
Raking
|
|||
|
|
|||
|
One of the most common methods of picking the wafer tumbler lock is by
|
|||
|
raking. To rake the lock, insert the tension wrench is inserted just inside
|
|||
|
the keyway, stopping short of the first wafer, and flush with the bottom of the
|
|||
|
keyway. Apply moderate tension to the wrench. If you apply too much tension
|
|||
|
the wafers will bind and not be able to move into alignment. Once you have the
|
|||
|
tension wrench in place, insert either the rake or half-round pick into the
|
|||
|
keyway. Don't worry about feeling the tumblers, instead concentrate on
|
|||
|
applying uniform pressure to them as you move the rake in and out of the keyway
|
|||
|
in a scrubbing motion. This scrubbing motion should cause the wafers to lift
|
|||
|
into alignment as they are thrown up and down in their spacings. This method
|
|||
|
is usually quite effective on most wafer locks, and should always be tried
|
|||
|
first.
|
|||
|
|
|||
|
Manipulating Individual Wafers
|
|||
|
|
|||
|
If the lock does not respond to raking, you can try using the half-diamond
|
|||
|
pick to each wafer into alignment one-by-one. While maintaining light but
|
|||
|
consistent pressure with the tension wrench, use the pick to lift each wafer
|
|||
|
into alignment at the shear line, starting from the backmost tumbler. Once it
|
|||
|
reaches the proper alignment, you should feel or hear a slight "click" and the
|
|||
|
plug will turn ever so slightly, relieving a bit of pressure on the wrench.
|
|||
|
Continue one-by-one, working outward, until each tumbler has been aligned and
|
|||
|
the lock opens.
|
|||
|
|
|||
|
Vibration Picking
|
|||
|
|
|||
|
Often you can use a technique called vibration picking to open a wafer
|
|||
|
tumbler lock. This uses a tool known as a "snapper" pick or a "lockpick gun".
|
|||
|
[These are described in the Lockpicking Tools section of this article] To use
|
|||
|
the snapper pick maintain a light tension with the wrench and insert the tip of
|
|||
|
the pick into the keyway, just touching the bottom of the tumblers. Then use
|
|||
|
the thumb, which rests along the top edge of the pick to depress the top loop.
|
|||
|
Let the thumb slide off the compressed part of the pick, permitting it to snap
|
|||
|
back. It will then strike a light blow to the tumblers, popping them up until
|
|||
|
they are held in place at the shear line. Repeated snaps, while maintaining
|
|||
|
tension with the wrench, usually results in aligning all the tumblers, and thus
|
|||
|
opening the lock. The lockpick gun works automatically, with a trigger device
|
|||
|
that "snaps" its wire pick up in the keyway.
|
|||
|
|
|||
|
Picking Double Wafer Locks
|
|||
|
|
|||
|
Double Wafer locks are picked the same way as single wafer locks, but
|
|||
|
there two sides to the story. Not only must you align all the top wafers, but
|
|||
|
the bottom ones as well. You can purchase special designed tension wrenches
|
|||
|
with will let you then use a ball pick to pick both sets of wafers.
|
|||
|
Alternatively you can use a standard tension wrench in the center of the
|
|||
|
keyway, using a half diamond pick. Once you have picked one set, simply
|
|||
|
reverse the pick and pick the other. It may take a few tries before you are
|
|||
|
able to hold all the wafers in place.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Pin Tumbler Lock
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
Pin tumbler locks are by far the most popular lock today. Over half of
|
|||
|
the locks in use are of the pin tumbler type. They look similar to the wafer
|
|||
|
tumbler lock, but can easy be distinguished by their round pins, visible in the
|
|||
|
keyhole. There operation is also similar to the wafer type, but is more costly
|
|||
|
and requires much stricter machining tolerances. Here are some diagrams:
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|________________________________________
|
|||
|
| | @ | | @ | | @ | | @ | | @ |
|
|||
|
| | @ | | @ | | @ | | @ | | @ | Tumbler springs
|
|||
|
| | @ | | @ | | @ | | @ | | @ |
|
|||
|
| | @ | 4 | @ | | @ | | @ | | @ |
|
|||
|
| | @ | ||~|| | @ | ||~|| ||~||
|
|||
|
|___||~||___|| ||___||~||___|| ||___|| ||__ _ _ _ _ _ _Shearline
|
|||
|
\_ ||1|| 3 || || || || || || || | |
|
|||
|
\_|| ||___||~||___|| ||___||~||___||~| |
|
|||
|
|~| | | |~| | | | | |
|
|||
|
keyway |2| | | | | | | | | | Plug
|
|||
|
|_| |_| |_| |_| |_| |
|
|||
|
+-----------------------------------------+
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
The pin tumbler lock, cutaway side view (locked)
|
|||
|
1) top pin
|
|||
|
2) bottom pin
|
|||
|
3) cylinder (top of plug)
|
|||
|
4) shell
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|________________________________________
|
|||
|
| | @ | | @ | | @ | | @ | | @ |
|
|||
|
| | @ | | @ | | @ | | @ | | @ | Tumbler springs
|
|||
|
| | @ | | @ | | @ | | @ | | @ |
|
|||
|
| || || 4 || || || || || || || ||
|
|||
|
| ||1|| || || || || || || || ||
|
|||
|
|___|| ||_ _|| ||___|| ||___|| ||___|| ||__ _ _ _ _ _ _Shearline
|
|||
|
\_ ||~|| 3 ||~|| ||~|| ||~|| ||~| |
|
|||
|
\_||2||___|| ||___|| ||___|| ||___|| | |
|
|||
|
| | |_| | | | | |
|
|||
|
keyway |_| |_| |_| | Plug
|
|||
|
|
|
|||
|
+-----------------------------------------+
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
The pin tumbler lock, cutaway side view (unlocked)
|
|||
|
|
|||
|
1) top pin (drivers)
|
|||
|
2) bottom pin (key pins)
|
|||
|
3) cylinder (top of plug)
|
|||
|
4) shell
|
|||
|
|
|||
|
|
|||
|
|
|||
|
___________________ ___________________
|
|||
|
_/ @ \_ _/ @ \_
|
|||
|
/ @ 3 \ / @ 3 \
|
|||
|
| @ | | | | |
|
|||
|
| | | | | |2| |
|
|||
|
| ____|2|____ | | ____|_|____ |
|
|||
|
| / |_| \ | | / | | \ |
|
|||
|
| | _| |_ 4 | | | | _|1|_ 4 | |
|
|||
|
| | / |1| \ | | | | / |_| \ | |
|
|||
|
| | | |_| | | | | | | | | |
|
|||
|
| | | | | | | | | | | |
|
|||
|
| | | 5 | | | | | | 5 | | |
|
|||
|
| | \_____/ | | | | \_____/ | |
|
|||
|
| | 6 | | | | 6 | |
|
|||
|
| \___________/ | | \___________/ |
|
|||
|
| 7 | | 7 |
|
|||
|
\_ _/ \_ _/
|
|||
|
\___________________/ \___________________/
|
|||
|
|
|||
|
Locked Unlocked
|
|||
|
|
|||
|
Pin Tumbler Lock (front) Pin Tumbler Lock (front)
|
|||
|
|
|||
|
1) bottom pin (key pins)
|
|||
|
2) top pin (drivers)
|
|||
|
3) tumbler spring
|
|||
|
4) shear line
|
|||
|
5) keyway
|
|||
|
6) plug (cylinder)
|
|||
|
7) shell
|
|||
|
|
|||
|
OK, I will explain how the pin tumbler lock works, but you really should
|
|||
|
consider going to K-Mart and buying a cheap lock to take apart and study. In
|
|||
|
the lock's shell (main body) there is the keyway and three to eight (usually
|
|||
|
five) spacings drilled from the top of the lock into the keyway. This is
|
|||
|
similar in principle to the wafer lock. In each of theses spacings are two
|
|||
|
pins and a spring. The top pins are always the same length, while each bottom
|
|||
|
pins can each be any of ten different sizes (0-9). Note that the bottom pins
|
|||
|
have a rounded bottom, allowing for them to ride up the key easier. The spring
|
|||
|
forces the pin stack down so that the lower pin protrudes into the keyway.
|
|||
|
(The wedge slot keeps them from falling all the way to the bottom of the
|
|||
|
keyway) When the correct key is inserted, each pin stack is lifted according to
|
|||
|
how deep or shallow the key is cut in that corresponding location. To open the
|
|||
|
lock, the top of bottom pin (the point where the top and bottom pin meet) must
|
|||
|
line up with the lock plug and the shell (the shearline). When in this
|
|||
|
position, the lock is unlocked and the plug can rotate around, taking the
|
|||
|
bottom pin around with it. If any pin is raised too high, or not high enough,
|
|||
|
then that pin keeps the plug from turning inside the lock shell. Of course in
|
|||
|
the locked position, all the pins stop the plug from turning.
|
|||
|
|
|||
|
These locks are used almost everywhere. The provide over a million
|
|||
|
possible combinations for a five pin lock, and billions for the eight pin.
|
|||
|
These are the standard door locks in most residential and commercial buildings.
|
|||
|
Often you will find pin tumbler locks with only three pins on cheap desks, some
|
|||
|
copy machines, and storage lockers. They offer a reasonable degree of
|
|||
|
security, but are far from tamper proof.
|
|||
|
|
|||
|
Picking
|
|||
|
|
|||
|
Picking the pin tumbler lock is based on the principle that slight
|
|||
|
imperfections exist in every lock. Every lock is machined to certain sets of
|
|||
|
tolerances, such as plus or minus .0002 inches. The closer the tolerance, the
|
|||
|
harder the lock is to pick, but the more expensive the machining costs. That
|
|||
|
is what makes one pin tumbler lock harder to pick than another. This variation
|
|||
|
in the lock's components means that in attempting to turn the plug in the lock
|
|||
|
without the proper key, one tumbler will be caught up and become tight before
|
|||
|
subsequent tumblers are. Therefore, when turning tension is applied to the
|
|||
|
plug with a tension wrench, and the tight tumbler is lifted with a pick, there
|
|||
|
will be either a clicking feel or a sudden relief in the tension the tumbler
|
|||
|
exerts on the pick. This relief of tension occurs when the pin is brought up
|
|||
|
even with the shear line. At this time, lifting can be stopped.
|
|||
|
|
|||
|
Use a hook pick to lift each pin to its breaking point, starting with the
|
|||
|
pin that is bound (resisting) the tightest. Gently pry the pin up against the
|
|||
|
spring pressure until it breaks at the shear line. Care must be taken not to
|
|||
|
lift the pin too high, or it may become jammed in the upper chamber. It is
|
|||
|
often impossible to get this pin back down without releasing tension on the
|
|||
|
plug.
|
|||
|
|
|||
|
A common problem is applying too much tension. A light touch should be
|
|||
|
used because too much pressure on the wrench not only makes it hard to feel any
|
|||
|
change in torsional pressure, but tends to bind all the pins, making picking
|
|||
|
order difficult to determine. The tension wrench needs only to provide a
|
|||
|
little torque so that the pins stay up once picked.
|
|||
|
|
|||
|
Raking and Vibration picking
|
|||
|
|
|||
|
You can also use the raking and vibration picking methods described in the
|
|||
|
section on wafer tumbler locks to pick pin tumblers. You can even use a
|
|||
|
combination of raking and pin picking. Simply rake the pins a few times, and
|
|||
|
then go back and pick any pins that the rake missed. You can use the hook pick
|
|||
|
to probe each pin. If the pin feels "springy" then it has not yet broke at the
|
|||
|
shear line.
|
|||
|
|
|||
|
Another technique: Start picking at the back pin, the one furthest away
|
|||
|
from you as you face the keyway. The reason for this is relatively simple.
|
|||
|
The rear pin will be the last worn, and when you break it, the lock's plug will
|
|||
|
move the most it ever will for just one pin breaking. This will make it easier
|
|||
|
to pick the other pins, as the break between the inner and outer cylinders will
|
|||
|
be progressively held tight against the pin you are working, as you work the
|
|||
|
lock from rear to front. The reason the rear pin is least worn is that
|
|||
|
inserting a key "rakes" the pins up and down, wearing down their sides. The
|
|||
|
rear pin is raked only once per time the key is inserted, the pin in front of
|
|||
|
it is raked twice, and so on. Its not uncommon to see locks in which the front
|
|||
|
pin can not be picked before the rear ones. The reason was that it was worn
|
|||
|
down to the point that no amount of torsion would cause the inner plug to put
|
|||
|
any force against it. Consequently, it won't break.
|
|||
|
|
|||
|
Rapping
|
|||
|
|
|||
|
Sometimes you can use a form of vibration picking known as rapping to open
|
|||
|
a pin tumbler lock. A tension wrench is inserted into the keyway, and light to
|
|||
|
moderate tension is applied. At the same time, the face of the plug is struck
|
|||
|
sharply with a plastic mallet or hammer handle. The rapping forces the springs
|
|||
|
and pins to gravitate toward the force of the blows. Hopefully this vibrates
|
|||
|
the picks into their breaking positions. DO NOT HIT TOO HARD! Approach this
|
|||
|
method with caution.
|
|||
|
|
|||
|
Practicing
|
|||
|
|
|||
|
To learn how to pick pin tumbler locks, it is best to go to the store and
|
|||
|
buy a "practice" lock. Try to find either a KwikSet brand or a cheap Ilco lock
|
|||
|
cylinder. On top of the lock shell is a little sliding strip that covers the
|
|||
|
pin spacings. Carefully slide it out. you can then take out the spring, the
|
|||
|
top pin, and the bottom pin. Remove all but one the assemblies and replace the
|
|||
|
cover. Now you can practice on picking the lock with only one pin. When you
|
|||
|
become good at that, insert another stack of pins, and so on until you can pick
|
|||
|
the lock with all five pins in place.
|
|||
|
|
|||
|
Spool Pins
|
|||
|
|
|||
|
It is possible that in the course of picking a high security pin tumbler
|
|||
|
locks, the plug will turn a bit as if it were going to unlock, then stop. I
|
|||
|
will turn no more than 2 or 3 degrees around. This means you have encountered
|
|||
|
a spool pin. These are simply drivers, or key pins, or both that have had
|
|||
|
their center portions cut down to a smaller diameter.
|
|||
|
|
|||
|
______
|
|||
|
|_ _|
|
|||
|
| | | | Lock body Note that any torsion applied to the
|
|||
|
___| | | |____ cylinder will tend to catch the spooled
|
|||
|
||____|| pins at their waists instead of at the
|
|||
|
| ____ | Cylinder break between the pins. This will
|
|||
|
||_ _|| either prevent the pick from pushing
|
|||
|
| | | | the pin up if the top spool is caught,
|
|||
|
| | | | or it will prevent the pin from falling
|
|||
|
___|| ||____ down, if the bottom spool is caught.
|
|||
|
| |
|
|||
|
\__/ Keyway
|
|||
|
|
|||
|
spool pins
|
|||
|
|
|||
|
|
|||
|
With a hook pick, you'll be able to press up on each pin and feel the
|
|||
|
difference. When you have a spool pin caught across the shear line, gentle
|
|||
|
upward pressure will result in force in the opposite direction of the way
|
|||
|
you're turning. Determine which pins are spool pins and push up until the
|
|||
|
bottom of the pin (assuming it's a top pin) crosses the shear line. You might
|
|||
|
lose some previously picked pins, but just pick them again.
|
|||
|
|
|||
|
Interlocking Pins
|
|||
|
|
|||
|
Several manufacturers have designed high security locks involving angled
|
|||
|
and interlocking pins. Emhart makes a cylinder using angled cuts on the keys
|
|||
|
where the top and bottom pins actually interlock:
|
|||
|
|
|||
|
|
|||
|
+--------------+
|
|||
|
| |
|
|||
|
| Top |
|
|||
|
| Pin |
|
|||
|
| |
|
|||
|
| | Interlocking Pins
|
|||
|
+-----+ +-----+
|
|||
|
+---+ | | +---+
|
|||
|
| | | | | |
|
|||
|
| +-+ | | +-+ |
|
|||
|
| | +-+ +-+ | |
|
|||
|
| | | | | |
|
|||
|
| | +------+ | |
|
|||
|
| +----------+ |
|
|||
|
| |
|
|||
|
| Bottom |
|
|||
|
| Pin |
|
|||
|
|
|||
|
|
|||
|
So the pins have to be turned to the correct angle in order for the pins
|
|||
|
to slide apart when you turn the plug. This also means that the cylinder has
|
|||
|
to be grooved to allow for the portion of the top pin sticking down, and the
|
|||
|
bottom of each key has notches in it so that it can turn more than 180 degrees.
|
|||
|
|
|||
|
|
|||
|
Tubular Cylinder Locks
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Tubular cylinder locks are widely accepted as the most secure locks you
|
|||
|
can get for a reasonable price. Tubular cylinder locks are the round type
|
|||
|
locks you find on most vending machines, ATMs, and the like. They are
|
|||
|
basically a pin tumbler lock where the pins are arranged on a circular plane.
|
|||
|
The key is a cylinder with cuts around its perimeter. When the key is
|
|||
|
inserted, each pin (whose faces are visible) is pushed in the corresponding
|
|||
|
depth and the plug can be turned.
|
|||
|
|
|||
|
Picking
|
|||
|
|
|||
|
Your best bet for picking these locks is to purchase a specially designed
|
|||
|
tubular cylinder pick. While it can be picked with conventional tools, it
|
|||
|
takes forever because you have to pick it three or four times to turn the plug
|
|||
|
the 120 to 180 degrees needed to unlock it. And what's worse is that the
|
|||
|
cylinder locks after each time you pick it -- every one-seventh of a turn! If
|
|||
|
you want to try it, here's how.
|
|||
|
|
|||
|
If you don't have a tubular cylinder pick you will require a wrench that
|
|||
|
is .062 inches square on its end. Fit this into the groove of the tubular
|
|||
|
cylinder plug. Apply tension in a clockwise direction, then use a straight pin
|
|||
|
to push each pin down until it clicks into place. Proceed to the next pin,
|
|||
|
until all are picked and the plug turns a few degrees. You will have to repeat
|
|||
|
this until it unlocks. Do not leave the locks halfway picked. If you do, even
|
|||
|
the original key will not be able to open the lock until it has been picked
|
|||
|
back into its original position. Good Luck!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Lock Picking Tools
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
The Basic Picks
|
|||
|
|
|||
|
|
|||
|
|
|
|||
|
_______________________________________|
|
|||
|
tension wrench
|
|||
|
|
|||
|
|
|||
|
This is the standard tool for pin and wafer tumbler
|
|||
|
locks. It is inserted in the bottom of the keyway
|
|||
|
to provide a torsional force to the lock cylinder.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
______________________________________/|
|
|||
|
half-diamond pick
|
|||
|
|
|||
|
|
|||
|
The half-diamond pick can be used for raking or
|
|||
|
picking wafer tumbler locks, or picking pin tumbler
|
|||
|
locks where the distance between pins is small.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
---------------------------------\/\/\/\
|
|||
|
rake
|
|||
|
|
|||
|
|
|||
|
Not surprisingly, the rake (sometimes called a snake
|
|||
|
pick) is used to rake wafer and pin tumbler locks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
.
|
|||
|
______________________________________/
|
|||
|
hook
|
|||
|
|
|||
|
|
|||
|
The hook (also known as the feeler or lifter pick)
|
|||
|
is normally used for picking pin and lever tumbler
|
|||
|
locks, but can be used on larger wafer locks.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
______________________________________O
|
|||
|
O ball
|
|||
|
|
|||
|
|
|||
|
_____________________________________OO
|
|||
|
OO double ball
|
|||
|
|
|||
|
|
|||
|
The ball type picks are actually not as pronounced
|
|||
|
as they look here in the ascii diagram. Imagine a
|
|||
|
"ball" of a little less height, a bit more width.
|
|||
|
Though not essential, the ball picks can be used
|
|||
|
when attempting to rake a wafer-tumbler lock.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Lever Tumbler Tension Wrench
|
|||
|
|
|||
|
The big difference with a lever tumbler is in the method of applying
|
|||
|
torque. The cylinder, in models where it's visible, rotates freely--it does
|
|||
|
not operate the bolt. Rather, the end of the key goes into a notch in the
|
|||
|
bolt, directly operating it, just as in a warded lock. This means you need a
|
|||
|
different torsion wrench, that looks like this:
|
|||
|
|
|||
|
|
|||
|
_______
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|__________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Obtaining Lockpicks
|
|||
|
|
|||
|
Now I'm sure that you are ready to start practicing. Unfortunately,
|
|||
|
locksmiths and the public in general seem reluctant to make picks an easy item
|
|||
|
to obtain. Therefore you can either make your own, (not that difficult) or
|
|||
|
obtain them from a commercial supplier (also not that difficult.)
|
|||
|
|
|||
|
|
|||
|
Making Your Own Picks
|
|||
|
|
|||
|
You can file or grind picks out of spring steel. It is best to use spring
|
|||
|
steel - sources include hacksaw blades, piano (music) wire, clock springs,
|
|||
|
streetsweeper bristles (which can be found along the street after the sweeper
|
|||
|
has passed), etc. Or, go down to the auto parts store and buy a few stock
|
|||
|
lengths of .022 in. automobile feeler gauge. You can cut each one in thirds
|
|||
|
and make a pick from each piece. In a pinch safety pin steel, or even a bobby
|
|||
|
pin (much worse) can be used. Also try the metal band that holds a set of
|
|||
|
walkman type earphones together. It is already the perfect width and all you
|
|||
|
have to do is grind the indentations on it. It makes a really great heavy duty
|
|||
|
wrench also.
|
|||
|
|
|||
|
You will need an electric grinder, or a grinding wheel mounted on a drill,
|
|||
|
to shape the picks. When grinding, keep the steel from getting so hot as to
|
|||
|
anneal (soften) it. You may have to re-harden or re-temper it.
|
|||
|
|
|||
|
Temper the steel by repeatedly getting it red-hot against the grinder,
|
|||
|
then quenching it. What you get won't be feeler gauge and it won't be spring
|
|||
|
steel, but something in between that has some give to it and won't shatter.
|
|||
|
|
|||
|
For a tension wrench, while you're at the grinder, take a medium-sized
|
|||
|
Allen wrench and grind its hexagonal head into a flat blade. Alternatively,
|
|||
|
you can use a small screwdriver, bent at the end. (Bending a screwdriver with
|
|||
|
any precision is pretty tough). Bobby pins also make an alright tension
|
|||
|
wrench, especially the larger ones. They work best if you cut them off and
|
|||
|
flame to red hot with a burner. Then while it's still hot twist it 180 deg
|
|||
|
with a pair of vicegrips or needle nose pliers, and bend down the end so it
|
|||
|
looks like the professional ones, this gives it more 'spring'. The flaming
|
|||
|
should be done, maybe 3/4ths of an inch from the end. Finally file and sand
|
|||
|
rough spots from where you cut it.
|
|||
|
|
|||
|
If you take the finest or next to finest crochet hook they make and file
|
|||
|
down the sides of the business end of it so it will fit in the lock, you can
|
|||
|
make an excellent feeler pick.
|
|||
|
|
|||
|
|
|||
|
Picks from Paper Clips
|
|||
|
|
|||
|
To open a lock with two paper clips, unbend one like this:
|
|||
|
____________
|
|||
|
/ \ This shape is your lockpick, you
|
|||
|
\__________________________/ put the end with the little hook
|
|||
|
in the lock and use it to fiddle
|
|||
|
with the pins.
|
|||
|
|
|||
|
Unbend and re-bend the other paperclip like this:
|
|||
|
____________
|
|||
|
/ \ This shape is your torsion
|
|||
|
\______________________ wrench. You use it to put
|
|||
|
| torque on the lock cylinder.
|
|||
|
_| When the hook is in the cylinder
|
|||
|
the handle should hand off to
|
|||
|
the side and the final bend on
|
|||
|
the hook should be short enough
|
|||
|
that there is room to get the
|
|||
|
pick into the keyhole.
|
|||
|
|
|||
|
Warning: Filing cabinets and desks are pretty easy to do with these, but
|
|||
|
it's not easy to do a door lock with them. Better materials really do help
|
|||
|
when you're dealing with more than 4 pins in a lock.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Making a Pick Gun
|
|||
|
|
|||
|
Get yourself a piece of music wire from the local hobby shop. Find wire
|
|||
|
that seems just a bit big for an average keyway. This will be ground down
|
|||
|
later so that it can be inserted. Wire of this diameter is so stiff you may
|
|||
|
doubt that you have the right size. But you need this stiffness for the device
|
|||
|
to work. Don't use wire that is too light.
|
|||
|
|
|||
|
You want to bend a circle in the wire about 5 inches back from the end.
|
|||
|
You want enough length in the first straight part to go all the way into the
|
|||
|
keyway and leave enough to comfortably fit in your hand. Call this straight
|
|||
|
part Side A. Try bending the wire around the body of a Magic Marker; this
|
|||
|
seems to make a nice sized loop. The loop should be 360 + 180 degrees so that
|
|||
|
the long end of your wire is now parallel to side A. Let's be original and
|
|||
|
call this Side B.
|
|||
|
|
|||
|
Use pliers to make a 90 degree bend in side B so that the end of it
|
|||
|
crosses side A. This bend should be located so that the part of side A which
|
|||
|
extends past the bent part of the wire is long enough to go all the way into
|
|||
|
the keyway. Hey, why don't we call this cross-piece Side C? Bend this
|
|||
|
cross-piece 180 degrees around side A so that it forms a slot for side A to
|
|||
|
slide up and down in. Call the wire segment which goes from A to B and is
|
|||
|
parallel to C, Side D. Snip off the end of side D which extends beyond side B.
|
|||
|
|
|||
|
We now have an object which resembles a safety pin (hence the name) which
|
|||
|
has one side (side A) which slides up and down in a slot made by sides C and D
|
|||
|
and which is held in the bottom of this slot by the spring tension in the loop
|
|||
|
between sides A and B.
|
|||
|
|
|||
|
Grind the sides of the piece which is to go in the keyway so it will fit.
|
|||
|
Grind the top of this piece flat. The Top is the side toward side B. This is
|
|||
|
the part which will be against the tumblers. Bevel the end so it will slide
|
|||
|
under the tumblers more easily.
|
|||
|
|
|||
|
To use the gun, insert the end into the keyway with side B up. Press down
|
|||
|
on side B with your thumb to slide the slot C-D down. Let your thumb slip off
|
|||
|
the wire and the spring will pull side B back up. When the bottom of the C-D
|
|||
|
channel hits the bottom of side A, it delivers a sharp blow to the bottoms of
|
|||
|
the pins. Use VERY light pressure on the tension wrench and snap the gun a few
|
|||
|
times to knock the pins up to the shear line. See the section on wafer locks
|
|||
|
for a more information.
|
|||
|
|
|||
|
|
|||
|
Electric Vibration Picks
|
|||
|
|
|||
|
The motor/base casing from a electric toothbrush, or vibrator makes a
|
|||
|
decent vibrator pick (pick gun) when you superglue a straight pick to it. Alot
|
|||
|
cheaper than the pro models, and generally smaller too.
|
|||
|
|
|||
|
|
|||
|
Purchasing Your Picks
|
|||
|
|
|||
|
Generally picks are not sold over the counter. Your best bet is to order
|
|||
|
them from a mail order firm. Most firms will inquire as to your profession
|
|||
|
when making a purchase. They may not wish to sell them to you unless you are
|
|||
|
some sort of pubic safety personnel such as an EMT or a fireman. They are
|
|||
|
available from a variety of sources. Here are some of the most popular:
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
Gall's Inc.
|
|||
|
(800)-477-7766
|
|||
|
Catalog #BA
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
Item # : ALS15B
|
|||
|
Price : $19.99
|
|||
|
Name : 10-Piece Locksmith Pick Set
|
|||
|
|
|||
|
"Be prepared for any lock-out. Nine picks and wrenches are grouped in a handy
|
|||
|
foldover carrying case that is small enough to carry in your pocket. Order you
|
|||
|
lock pick set and keep it handy for easy entry to any lock-out situation.
|
|||
|
Black."
|
|||
|
|
|||
|
|
|||
|
Item # : PG1B
|
|||
|
Price : $59.99
|
|||
|
Name : Lock Pick Gun
|
|||
|
|
|||
|
"Our trigger action lock pick gun opens doors easily. Just use it with the
|
|||
|
included picks and instructions -- with a little practice, you can smoothly
|
|||
|
open any locked house or apartment."
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
Delta Press Ltd.
|
|||
|
(800)-852-4445
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
Item # : LPS-002
|
|||
|
Price : $24.95
|
|||
|
Name : The 8 Piece Tool Set
|
|||
|
|
|||
|
"These high quality picks feature new lighter non-breakable plastic color coded
|
|||
|
handles. Picks are of .022 blue spring steel - hardened to perfection Eight
|
|||
|
piece set comes with handy see-through case."
|
|||
|
|
|||
|
|
|||
|
Item # : LPS-003
|
|||
|
Price : $39.95
|
|||
|
Name : The 11 Piece Tool Set
|
|||
|
|
|||
|
"This deluxe 11 piece kit features all metal handles and comes in a discrete
|
|||
|
carrying case for undercover operatives. All picks are .022 blue spring steel
|
|||
|
and hardened to perfection."
|
|||
|
|
|||
|
|
|||
|
Item # : LPS-005
|
|||
|
Price : $119.95
|
|||
|
Name : The 60 Piece Tool Set
|
|||
|
|
|||
|
"Here it is. The finest lockpick set we've stocked. It includes 60 picks,
|
|||
|
tension wrenches, and a broken key extractor plus a zippered top grain cowhide
|
|||
|
case and warded master keys."
|
|||
|
|
|||
|
|
|||
|
Item # : LPS-004
|
|||
|
Price : $59.95
|
|||
|
Name : Professional Locksmithing Tool
|
|||
|
|
|||
|
"The famous lockaid Tool was designed for law enforcement agencies to quickly
|
|||
|
pick pin tumbler locks. The american-made product is the only superior "lock
|
|||
|
gun" available. Unlike conventional hand picks that activate only one or two
|
|||
|
cylinder pins, this tool is designed to span all the pins at once. The needle,
|
|||
|
powered by trigger action, strikes all t the cylinder bottom pins
|
|||
|
simultaneously. As the force is transferred to the upper pins, they
|
|||
|
momentarily rise in the chambers. Comes complete with 3 stainless steel
|
|||
|
needles and tension wrench."
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
Phoenix Systems Inc.
|
|||
|
(303)-277-0305
|
|||
|
|
|||
|
----------
|
|||
|
|
|||
|
"OUR LOCK PICKS ARE THE FINEST QUALITY PROFESSIONAL TOOLS AVAILABLE. Each pick
|
|||
|
is made of hard-finished clock-spring steel, tempered to the correct degree of
|
|||
|
hardness. Whether the subject is wafer tumbler locks or 6 & 7 pin tumbler
|
|||
|
locks, our picks are the best available, and the standard of the industry.
|
|||
|
With a few minutes of practice, even a beginner can open most padlocks, door
|
|||
|
locks and deadbolts. NOTE: BE SURE TO CHECK YOUR LOCAL, AND STATE ORDINANCES
|
|||
|
GOVERNING POSSESSION OF THESE TOOLS."
|
|||
|
|
|||
|
Item # : 604
|
|||
|
Price : $75.00
|
|||
|
Name : Superior Pick Set
|
|||
|
|
|||
|
"Hip pocket size in top grain leather case. Our most complete set. 32 picks,
|
|||
|
tension tools & extractors."
|
|||
|
|
|||
|
|
|||
|
Item # : 606
|
|||
|
Price : $34.95
|
|||
|
Name : Tyro Pick Set.
|
|||
|
|
|||
|
"An excellent choice for the beginner. Cowhide leather case contains 9 picks,
|
|||
|
tension wrenches & key extractor."
|
|||
|
|
|||
|
|
|||
|
Item # : 607
|
|||
|
Price : 9.95
|
|||
|
Name : Warded Padlock Pick Set
|
|||
|
|
|||
|
"This 5 piece padlock pick set is made of the finest blue tempered spring
|
|||
|
steel. This set will pick open most every warded padlock made today."
|
|||
|
|
|||
|
|
|||
|
Item # : 610
|
|||
|
Price : $24.95
|
|||
|
Name : Double Sided Tumbler Lock Picks
|
|||
|
|
|||
|
"Set of 4 picks for use with double-sided, disc tumbler, showcase, cam and
|
|||
|
PADLOCKS. An excellent addition to your other pick sets."
|
|||
|
|
|||
|
|
|||
|
Item # : 617
|
|||
|
Price : $39.95
|
|||
|
Name : Padlock Shim Picks
|
|||
|
|
|||
|
"Open padlocks in seconds! Our new Padlock Shim pick's unique design makes
|
|||
|
them so successful that it is frightening! Simply slide the shim down between
|
|||
|
the shackle and the lock housing, twist and the lock is open. Works best on
|
|||
|
laminated type padlocks (the most popular type) but will open ALMOST ANY TYPE
|
|||
|
OF PADLOCK -- INCLUDING THE POPULAR 3 NUMBER COMBINATION TYPE. Include 20
|
|||
|
shims -- 5 each of the 4 most common shackle diameters for perfect fit every
|
|||
|
time. Comes with complete instructions."
|
|||
|
|
|||
|
|
|||
|
Item # : 618
|
|||
|
Price : $34.95
|
|||
|
Name : Schlage Wafer Pick Set
|
|||
|
|
|||
|
"There are two types of Schlage wafer locks, each needing a different base key
|
|||
|
to pick with. This set comes with both types of base keys and the pick. With
|
|||
|
the proper base key the lock is already half picked. Very quick and easy to
|
|||
|
use. Comes with complete instructions.
|
|||
|
|
|||
|
|
|||
|
Item # : 620
|
|||
|
Price : $59.95
|
|||
|
Name : Pick Gun
|
|||
|
|
|||
|
"Picks locks FAST. Open locks in less than 5 seconds. Specifically designed
|
|||
|
for tumbler locks. Insert pick into key slot, then just pull trigger. Throws
|
|||
|
all pins into position at one time. Lock is then turned with tension bar.
|
|||
|
Used extensively by police and other government agencies. Gun is spring
|
|||
|
loaded, with tension adjustment knob. Comes with 3 needle picks and tension
|
|||
|
bar. No batteries necessary. Life-time guarantee.
|
|||
|
|
|||
|
|
|||
|
Item # : 612
|
|||
|
Price : $16.00
|
|||
|
Name : The Slim Jim
|
|||
|
|
|||
|
"Car door opener. The tool does not enter inside the car. Opens a car door by
|
|||
|
"feel" rather then sight. With a little practice, car opening will be no
|
|||
|
problem. For GM, Ford and Chrysler cars. Made of clock-spring steel and is
|
|||
|
hand finished."
|
|||
|
|
|||
|
|
|||
|
Item # : 613
|
|||
|
Price : $16.00
|
|||
|
Name : The Super Jim
|
|||
|
|
|||
|
"This tool will open most GM, Ford and AMC car doors. Opener does not enter
|
|||
|
vehicle. Made wider and thicker, and is bright nickel plated. Faster openings
|
|||
|
on most domestic automobiles. With illustrated instructions."
|
|||
|
|
|||
|
Item # : 614
|
|||
|
Price : $19.95
|
|||
|
Name : Houdini Car Door Opener
|
|||
|
|
|||
|
"The latest and best innovations on car door openers. It works the same as
|
|||
|
your old Slim Jim, except it now folds neatly to fit in pocket or toolbox
|
|||
|
without getting in the way. ONLY 6 1/2 INCHES LONG WHEN FOLDED. Open up and
|
|||
|
snaps into place like a fold-up ruler, excellent stainless steel constructions
|
|||
|
with vinyl handle for comfort."
|
|||
|
|
|||
|
|
|||
|
Item # : 615
|
|||
|
Price : $39.95
|
|||
|
Name : Pro-Lok "Car Killer" Kit
|
|||
|
|
|||
|
"Over the years we have had thousands of requests for a multi-vehicle opening
|
|||
|
kit. We are now able to offer the most complete kit that we have ever seen.
|
|||
|
This kit of tools will open over 135 automobiles, both domestic and foreign, on
|
|||
|
the road today. The opening procedure for each vehicle is diagrammed and
|
|||
|
explained in the instruction manual. Kit comes with complete instruction
|
|||
|
manual and gas cap pick tool."
|
|||
|
|
|||
|
|
|||
|
Item # : 600
|
|||
|
Price : $129.95
|
|||
|
Name : Tubular Lock Pick
|
|||
|
|
|||
|
"This tool is an easy and reliable method for picking tubular locks, as found
|
|||
|
on commercial vending machines, washers, dryers, etc. This newest high tech
|
|||
|
design is much faster and easier to use than the old type that used rubber
|
|||
|
bands to hold the feeler picks. Internal neoprene "O" rings together with
|
|||
|
knurled collar provide a very simple and easy tension adjustment. Sturdy
|
|||
|
stainless steel construction provides for long-lasting service. This tool
|
|||
|
will, with a little practice, easily and quickly open any regular center-spaced
|
|||
|
tubular lock -- the most popular type of tubular lock on the market. Comes
|
|||
|
with complete instructions and leather carrying case."
|
|||
|
|
|||
|
|
|||
|
Tips for Success
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
Following is information that will help you become more adept at
|
|||
|
manipulating locks. Solutions to common problems and general miscellaneous
|
|||
|
information that could prove useful is included.
|
|||
|
|
|||
|
Determining the Direction of Rotation
|
|||
|
|
|||
|
Before you can pick a tumbler type lock, you must determine the correct
|
|||
|
direction of rotation. It may sound like a trivial point, but who wants to
|
|||
|
waste hours trying to pick a lock the wrong direction. Though there will of
|
|||
|
course be exceptions, there are some general guidelines. Cylindrical locks,
|
|||
|
padlocks, file cabinet locks almost always turn in a clockwise direction or
|
|||
|
either direction to open. When confronted with a door lock, turn the plug so
|
|||
|
that the top of the keyhole turns toward the edge of the door. There is a
|
|||
|
notable exception here, Corbin and Russwin locks turn AWAY from the door edge.
|
|||
|
|
|||
|
|
|||
|
Tight or Dirty Locks
|
|||
|
|
|||
|
If a lock seems exceptionally tight or dirty, it will be hard to break the
|
|||
|
pins. It may help to lubricate the lock. NEVER use a liquid type lubrication
|
|||
|
such as WD40, 3-in-1 oil, etc... Use powdered graphite, available in most
|
|||
|
hardware stores. It comes in a little tube, allowing a light squeeze to blow a
|
|||
|
puff of graphite into the keyway. If lubrication does not help, you may need
|
|||
|
to apply a little firmer hand on the tension wrench.
|
|||
|
|
|||
|
|
|||
|
Proper Attitude
|
|||
|
|
|||
|
It is very important to maintain a confident attitude while you are
|
|||
|
learning to pick locks. If you feel nervous or stressed, it will only
|
|||
|
make things harder. You will not be able to pick every lock you come to,
|
|||
|
but with practice and patience, you may be surprised. Visualise what is
|
|||
|
happening inside the lock, this is the key. If you don't fully
|
|||
|
understand how a lock works and exactly what you are doing to it, you will
|
|||
|
not experience a high degree of success.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Combination Locks
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
Combination locks work on a series of flat, round disks that have notches
|
|||
|
and pegs (one of each, one set per disk) along their circumference. Notches
|
|||
|
are referred to as "gates". The first tumbler determines the last digit of the
|
|||
|
combination, and is actually attached to the dial directly. As the dial is
|
|||
|
turned, the peg of the first tumbler catches on the middle tumbler's peg,
|
|||
|
dragging it along. As the dial is turned further, the middle tumbler latches
|
|||
|
on to the peg of the last tumbler, all three turning together. Turning all the
|
|||
|
tumblers is known as "clearing" the lock, and must be done before attempting to
|
|||
|
operate the lock. For the lock to open, the gate on each disk must align up
|
|||
|
with the pawl (breaking arm) of the bolt.
|
|||
|
|
|||
|
Dialing the first digit of the combination aligns the last tumbler's gate
|
|||
|
to the pawl. Before dialing the second digit, the dial must be turned one
|
|||
|
complete turn in the opposite direction (assuming a three tumbler lock, twice
|
|||
|
for a four digit one). Rotating in the original direction to the last digit
|
|||
|
will align the first tumbler's gate, and the lock can open. Modern safe
|
|||
|
combination locks are impossible to crack (literally). Many innovations have
|
|||
|
given high quality locks this degree of security. Burglars learned to feel the
|
|||
|
gates and pegs rotate about the lock, allowing them to manipulate the tumblers
|
|||
|
into their proper position. To combat this, a searted front tumbler was
|
|||
|
designed to create shallow "false gates". The false gates are difficult to
|
|||
|
distinguish from the actual gates. To combat this problem, safe crackers would
|
|||
|
hook up a high speed drill to the dial. This would wear the tumblers edges
|
|||
|
smooth, eliminating the bothersome shallow gates. Still, despite their
|
|||
|
security, cheap combination locks are far from foolproof.
|
|||
|
|
|||
|
Determining an Unknown Combination
|
|||
|
|
|||
|
The most common and difficult to open of these small disk tumbler locks
|
|||
|
are the Master combination padlocks, and they are quite popular. With
|
|||
|
practice, they CAN be opened. The newer the lock is, though, the more
|
|||
|
difficult it will be to open at first. If the lock has had a lot of use, such
|
|||
|
as that on a locker-room door where the shackle gets pulled down and encounters
|
|||
|
the tumblers while the combination is being dialed, the serrated front tumblers
|
|||
|
will become smoothed down, allowing easier sensing of the tumblers. So, until
|
|||
|
you have become good at opening these locks, practice extensively on an old
|
|||
|
one. Here's how.
|
|||
|
|
|||
|
Step One
|
|||
|
|
|||
|
First, clear the tumblers by engaging all of them. This is done by
|
|||
|
turning the dial clockwise (sometimes these locks open more easily starting in
|
|||
|
the opposite direction) three to four times. Now bring your ear close to the
|
|||
|
lock and gently press the bottom back edge to the bony area just forward of
|
|||
|
your ear canal opening so that vibrations can be heard and felt. Slowly turn
|
|||
|
the dial in the opposite direction. As you turn, you will hear a very light
|
|||
|
click as each tumbler is picked up by the previous tumbler. This is the sound
|
|||
|
of the pickup pegs on each disk as they engage each other. Clear the tumblers
|
|||
|
again in a clockwise manner and proceed to step two.
|
|||
|
|
|||
|
Step Two
|
|||
|
|
|||
|
After you have cleared the tumblers, apply an upward pressure on the
|
|||
|
shackle of the padlock. Keeping your ear on the lock, try to hear the tumblers
|
|||
|
as they rub across the pawl; keep the dial rotating in a clockwise direction.
|
|||
|
|
|||
|
You will hear two types of clicks, each with a subtle difference in pitch.
|
|||
|
The shallow, higher pitched clicks are the sound of the false gates on the
|
|||
|
first disk tumbler. Do not let them fool you-the real gates sound hollow and
|
|||
|
empty, almost nonexistent.
|
|||
|
|
|||
|
When you feel a greater than normal relief in the shackle once every full
|
|||
|
turn, this is the gate of the first tumbler (last number dialed). This tumbler
|
|||
|
is connected directly to the dial as mentioned earlier. Ignore that sound for
|
|||
|
now. When you have aligned the other two tumblers, the last tumbler's sound
|
|||
|
will be drowned out by the sound of the shackle popping open.
|
|||
|
|
|||
|
Step Three
|
|||
|
|
|||
|
While continuing in a clockwise direction with the dial, listen carefully
|
|||
|
for the slight hollow sound of either one of the first two tumblers. Note on
|
|||
|
the dial face where these sounds are by either memorizing them or writing them
|
|||
|
down. Make certain that you do not take note of the driving tumbler (last
|
|||
|
number dialed). If you hear and feel only one hollow click (sounds like
|
|||
|
"dumpf"), chances are that the first number could be the same as the last one.
|
|||
|
|
|||
|
You should have two numbers now. Let us say one of them is 12 and the
|
|||
|
other is 26. Clear the tumblers again just to be safe and stop at the number
|
|||
|
12. Go counterclockwise one complete turn from 12. Continue until there is
|
|||
|
another "dumpf" sound. After the complete turn pass 12, if you feel and hear a
|
|||
|
louder than normal sound of a tumbler rubbing on the pawl, the first tumbler is
|
|||
|
properly aligned and the second tumbler is taking the brunt of the force from
|
|||
|
the shackle-you are on the right track. When the second tumbler has aligned in
|
|||
|
this case, you will feel a definite resistance with the last turn of the dial
|
|||
|
going clockwise. The final turn will automatically open the shackle of the
|
|||
|
lock. If none of these symptoms are evident, try starting with the number of
|
|||
|
the combination, 26, in the same way.
|
|||
|
|
|||
|
Step Four
|
|||
|
|
|||
|
If the lock still does not open, don't give up. Try searching for a
|
|||
|
different first number. Give it a good thirty or forty minute try. If you
|
|||
|
play with it long enough, it will eventually open. The more practice you have
|
|||
|
under your belt, the quicker you will be able to open these padlocks in the
|
|||
|
future.
|
|||
|
|
|||
|
Using a stethoscope to increase audibility of the clicks is not out of the
|
|||
|
question when working on disk tumbler locks, though usually not needed for
|
|||
|
padlocks. A miniature wide-audio-range electronic stethoscope with a magnetic
|
|||
|
base for coupling a piezoelectric-type microphone is ideal for getting to know
|
|||
|
the tumblers better.
|
|||
|
|
|||
|
Sesame Locks
|
|||
|
|
|||
|
Another type of disk tumbler padlock is the Sesame lock made by the Corbin
|
|||
|
Lock Co. Its unique design makes it more difficult to open than Master
|
|||
|
padlocks, but it can be opened. Let's take one of the three or four wheel
|
|||
|
mechanisms, look at a cross section, and see how it works. The wheel has
|
|||
|
numbers from zero to nine. Attached to the wheel is a small cam. Both the
|
|||
|
wheel and cam turn on the shaft. Each wheel in this lock operates indepen-
|
|||
|
dently with its own cam and shaft. The locking dog is locked to the shackle.
|
|||
|
In this position the shackle cannot be opened. The locking dog operates with
|
|||
|
all three or four wheels. The locking dog is riding on the round edge of the
|
|||
|
cam. The spring is pushing up on the cam. The locking dog cannot move up
|
|||
|
because it is resting on the round part of the cam. When the wheel is turned
|
|||
|
to the proper combination number, the locking dog rests on the flat of the cam.
|
|||
|
The spring can then raise the locking dog to release the shackle, and this
|
|||
|
opens the lock.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Magnetic Locks
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
Magnetic locks are a recent innovation to the security world. Their basic
|
|||
|
operation involves the principle that like poles of a magnetic repel each
|
|||
|
other, while opposite poles repel. A magnetic lock then does not have pins,
|
|||
|
but magnets (which are often behind a plastic "roof" on the keyway). When all
|
|||
|
these magnets are in the "repelled" position, meaning a similar magnetic pole
|
|||
|
is below them, a lever arm releases the lock. A key then would have a magnet
|
|||
|
arrangement identical to that of the lock. These locks may be activated either
|
|||
|
by a flat, notchless key, or by use of a magnetic card, where in the lock
|
|||
|
actually uses a two dimensional arrangement of magnets. These are not too
|
|||
|
common, but can be found in some installations.
|
|||
|
|
|||
|
Opening Magnetic Locks
|
|||
|
|
|||
|
By using a pulsating electromagnetic field, you can cause the magnets in
|
|||
|
the lock to vibrate at thirty vibrations per second, thereby allowing it to
|
|||
|
open by applying constant tension to the bolt. You should be able to purchase
|
|||
|
one of these "picks" from a locksmith supply company. Unfortunately, this
|
|||
|
method usually ruins the properties of the lock's magnets, so use it in
|
|||
|
emergencies only. The magnetic pick can be used in padlocks by stroking it
|
|||
|
across the place where the key is placed. It is also designed to fit into a
|
|||
|
doorknob and is then used by stroking one pole in and out.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Simplex 5-button combination locks
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
(*Hobbit*'s in-depth evaluation)
|
|||
|
|
|||
|
This deals with the Simplex or Unican 5-button all-mechanical combination
|
|||
|
locks. They are usually used in a variety of secure but high-traffic
|
|||
|
applications, and come in a number of flavors: dead bolt, slam latch, lock
|
|||
|
switches for alarms, buttons in a circle or a vertical line, etc. The internal
|
|||
|
locking works are the same across all of these. Herein will be described the
|
|||
|
mechanical workings and a method of defeating the lock that falls out by
|
|||
|
logical inference and observations from playing with it.
|
|||
|
|
|||
|
The internals
|
|||
|
|
|||
|
Caveat: If this seems unclear at first, it is because the absolutely best
|
|||
|
way to understand the inner mysteries is to take a Simplex lock apart and study
|
|||
|
it. It is highly recommended that the reader obtain and disassemble one of the
|
|||
|
units while studying this; otherwise the following may be confusing. The
|
|||
|
locking mechanism box is swaged together at each end, but it is trivial to open
|
|||
|
up without destroying it. To set a lock up for study, remove the back, leaving
|
|||
|
the front plate held on by its Jesus clip. Put a spare thumb turn down over
|
|||
|
the shaft so you have something to grab. Take care not to lose the button
|
|||
|
connecting pins; they drop out.
|
|||
|
|
|||
|
In the round configuration, the buttons talk via bent bars in the
|
|||
|
faceplate to the same vertical column as the straight ones. Thus all buttons
|
|||
|
henceforth shall be referred to as if they were in a straight vertical row,
|
|||
|
numbered 1 to 5 reading downward. The actual locking mechanism inside is a
|
|||
|
small metal box, about 3 inches high and .75 x .75 inch across the base. It
|
|||
|
contains five tumblers, one corresponding to each button, a common shift bar,
|
|||
|
and a couple of cams to handle reset and unlocking. The user dials the
|
|||
|
combination and turns the handle to the right to open the lock, or to the left
|
|||
|
to reset any dialed digits if he made a typo. If the proper combination has
|
|||
|
not been dialed yet, the shaft will not turn to the right. Setting a
|
|||
|
combination shall be described later. Some of the linear-style locks are
|
|||
|
actually made by Unican, but have the Simplex box inside. For these, a
|
|||
|
clockwise twist serves as both open and reset. There is a detent plate and a
|
|||
|
screwy lever system; if the lock is not open yet, the lever cannot turn to the
|
|||
|
*box*'s right. The detent slips, allows the levers to shift the other way, and
|
|||
|
the box arm is then turned to the left. If the detent does not slip, it's
|
|||
|
open, and the plate locks to the latch shaft and pulls it back.
|
|||
|
|
|||
|
Each of the five tumblers has six possible positions. Each button does
|
|||
|
nothing but push its corresponding tumbler from the 0 position to the 1
|
|||
|
position. Therefore, each button can only be used once, since once the tumbler
|
|||
|
has moved, the button has no further effect. The trick comes when *subsequent*
|
|||
|
buttons are pushed. Each button press not only shoves its tumbler from 0 to 1,
|
|||
|
it also advances any "enabled" tumblers one more step. When a tumbler is
|
|||
|
enabled, its corresponding gear has engaged the common bar and pushed it around
|
|||
|
one position, so the next button press will do this again, thus taking
|
|||
|
previously enabled tumblers around one more notch. This way, the further-in
|
|||
|
tumbler positions can be reached. It can be seen that there are undialable
|
|||
|
combinations; for instance, only *one* tumbler can reach position 5 for a valid
|
|||
|
combination [Positions labeled 0 thru 5, totalling six]. If one sits down and
|
|||
|
figures out possible places for the tumblers to go, many combinations are
|
|||
|
eliminated right away, so the number of possibilities is *not* 6^5 as one might
|
|||
|
expect. Two-at-once pushes are also valid, and are *not* the same as pushing
|
|||
|
the given two in some other order. Pushing two [or three or ...] at once
|
|||
|
simply enables two tumblers at once and shoves them to position 1 at the same
|
|||
|
time. [This of course leaves less buttons unused to push them in farther!] The
|
|||
|
tumblers themselves are small round chunks of metal, with gear teeth around the
|
|||
|
top half and a notch cut into the bottom edge. When all these notches line up
|
|||
|
with the locking bar, the lock is open. The tumblers are mounted on a vertical
|
|||
|
shaft so they can spin, with the locking bar fingers resting against the bottom
|
|||
|
of each one. The locking bar is prevented from rising if any notch is turned
|
|||
|
away from it. Juxtaposed to the tumblers is another shaft containing idler
|
|||
|
gears, which in turn talk to the common bar in the back. The intermediate
|
|||
|
shaft slides up and down and makes combination changes possible. Note: The
|
|||
|
buttons actually talk to the idler gears and not the tumblers themselves. This
|
|||
|
is necessary since during a combo change, the tumblers cannot move because the
|
|||
|
locking bar teeth are sitting in the notches.
|
|||
|
|
|||
|
[Editor's note: Simplex locks are set at the factory with a default code of
|
|||
|
(2-4), 3. This is often not even changed.]
|
|||
|
|
|||
|
Combination change, other random facts
|
|||
|
|
|||
|
Once you know the current combination, you might want to change it.
|
|||
|
Instructions for doing this undoubtedly come with the lock; but it's real easy.
|
|||
|
There is a screw in the top with a hex hole; remove this from the lock body.
|
|||
|
Dial the proper combination, but don't move the handle. Press straight down
|
|||
|
through the hole with a small screwdriver, until you feel something go "thunk"
|
|||
|
downward. The lock is now in change mode. Reset the tumblers [leftward
|
|||
|
twist], enter your new combination, twist the handle as though opening the
|
|||
|
lock, and your change is now in effect. Re-insert the screw. This does the
|
|||
|
following: The thing you hit with the screwdriver pushes the tumblers down onto
|
|||
|
the locking bar [which is why the proper combination must be entered], and
|
|||
|
disengages them from their idler gears. Button presses turn the *idler*
|
|||
|
*gears* around, and then the opening action shoves the tumblers back up to mesh
|
|||
|
with these gears in their new positions. A subsequent reset mixes the tumblers
|
|||
|
up again to follow the new combination. This description is admittedly
|
|||
|
somewhat inadequate; the right thing to do is take one of the locks apart and
|
|||
|
see for one's self what exactly happens inside.
|
|||
|
|
|||
|
The Unican model has a disk-locked screw on the rear side. Removing this
|
|||
|
reveals a round piece with a flat side. Twist this clockwise to enable change
|
|||
|
mode as in the above. This lock, of course, would be a little more secure
|
|||
|
against random people changing the combination for fun since you ostensibly
|
|||
|
need a key to get at it. Keep in mind that "reset" on these is done by turning
|
|||
|
the knob all the way *clockwise* instead. There is a linkage that ensures that
|
|||
|
the shaft inside goes counterclockwise for the time that change mode is
|
|||
|
enabled.
|
|||
|
|
|||
|
It is amusing to hear local locksmiths call the Simplex internals a
|
|||
|
"computer". It would seem that none of them have taken one apart to see what
|
|||
|
is really inside; the box is painted black as far as they are concerned and
|
|||
|
non-openable. Obtaining one is the unquestionably best way to learn what's in
|
|||
|
there. Unfortunately they cost on the order of $120, a price which clearly
|
|||
|
takes advantage of the public's ignorance. These locks are *not* pick-proof
|
|||
|
after all, and anyone who maintains that they are is defrauding the customer.
|
|||
|
There are a variety of ways to increase the picking difficulty, to be discussed
|
|||
|
elsewhere. Your best bet is to borrow one from somewhere for an evening and
|
|||
|
spend the time learning its innards.
|
|||
|
|
|||
|
Determining an unknown combination
|
|||
|
|
|||
|
Contrary to what the marketing reps would have you believe, the locks can
|
|||
|
be opened fairly quickly without knowing the set combination and without
|
|||
|
damaging the lock. Through a blend of a soft touch, a little hard logic, and
|
|||
|
an implicit understanding of how the locking mechanism works, they generally
|
|||
|
yield within five minutes or so. [There are *always* exceptions...]
|
|||
|
|
|||
|
This method requires that one does not think in terms of a sequence of
|
|||
|
button presses. One must think in terms of tumbler positions, and simply use
|
|||
|
the buttons to place tumblers where desired. For practical description
|
|||
|
purposes, it will be assumed that the buttons connect right to the tumblers,
|
|||
|
rather than the idler gears that they really do. The idler gears are a
|
|||
|
necessary part only during combination changes. Unless you are doing a change,
|
|||
|
considering it this way is pretty close to the facts. Remember that a 0
|
|||
|
position means the button was never pushed, and 5 is enabled and shifted as far
|
|||
|
as possible.
|
|||
|
|
|||
|
Turning the thumb handle to the right [clockwise] raises the locking bar
|
|||
|
against the tumblers. Since the lock is never machined perfectly, one or more
|
|||
|
tumblers will have more pressure on it than other ones, and this shows up as
|
|||
|
friction against it when it is turned via the button. This friction is felt in
|
|||
|
the short distance between fully-extended and the detent on the button [the
|
|||
|
first 2 or 3 mm of travel]. Some will travel easily to the detent, and others
|
|||
|
will resist efforts to push them in. Suppose you are twisting the handle, and
|
|||
|
tumbler 1 has lots of pressure on it [you can feel this when you try to push
|
|||
|
button 1 in]. When you back off the tension on the handle a little bit, the
|
|||
|
button can be pushed in against the resistance. The fact that the button has
|
|||
|
resistance at position 0 tells you that tumbler 1's proper position is *not* 0,
|
|||
|
or there would be no pressure if the notch was there! Upon pushing button 1
|
|||
|
in, you find that no pressure has appeared at any other button. This
|
|||
|
eliminates position 1 for tumbler 1, also. Now, how do you get tumbler 1 to
|
|||
|
different positions so you can test for pressure against other ones? Push
|
|||
|
subsequent buttons. Push any other button, and tumbler 1 advances to position
|
|||
|
2. Ignore what the other tumblers are doing for the moment. Now, perhaps
|
|||
|
another button has some resistance now. This means that tumbler 1 is either at
|
|||
|
the right position, or getting close. Basically you are using other tumblers
|
|||
|
to find out things about the one in question. [Keep in mind that the first one
|
|||
|
with friction won't *always* be tumbler 1! Any tumbler[s] could have the first
|
|||
|
pressure on them.] Continuing, push another "don't care" button. A "don't
|
|||
|
care" button is one that is not the one you're trying to evaluate, and not the
|
|||
|
one that recently showed some friction. What you want to do is advance tumbler
|
|||
|
1 again without disturbing anything else. Did the pressure against your test
|
|||
|
tumbler get stronger, or disappear? If it got stronger, that points to an even
|
|||
|
higher probability that tumbler 1 is supposed to be at 3, rather than 2. If
|
|||
|
the pressure vanished or became less, 1 has gone too far, and you were safer
|
|||
|
with it at position 2. Let's assume that the pressure against your test
|
|||
|
tumbler increased slightly when tumbler 1 was at 2, increased even more when
|
|||
|
tumbler 1 was at 3 and vanished when you pushed it onward to 4. Reset the
|
|||
|
lock. You now know the proper position of tumbler 1 [that is, whatever tumbler
|
|||
|
first had pressure on it]. You've already drastically reduced the number of
|
|||
|
possible combinations, but you aren't finished yet.
|
|||
|
|
|||
|
You can now eliminate positions for the next one or two tumblers the same
|
|||
|
way -- but to set things up so you can feel the pressure against these, you
|
|||
|
must ensure that your newly-known tumbler [1 in this case] is in its proper
|
|||
|
position. It is useful to make a little chart of the tumbler positions, and
|
|||
|
indicate the probabilities of correct positions.
|
|||
|
|
|||
|
Positions
|
|||
|
|
|||
|
0 1 2 3 4 5
|
|||
|
----------------
|
|||
|
1 : L L + T L | <-- Indicates that tumbler 1 is not
|
|||
|
0, not 1, maybe 2, more likely 3.
|
|||
|
Tumbler 2 : | | | | | |
|
|||
|
number
|
|||
|
3 : | | | | | |
|
|||
|
|
|||
|
4 : L | | | | | <-- Indicates that tumbler 4 is not 0.
|
|||
|
|
|||
|
5 : | | | | | |
|
|||
|
|
|||
|
This chart is simply a bunch of little vertical lines that you have drawn
|
|||
|
in a 5x6 matrix; the topmost row corresponds to button 1 and the lowest to 5.
|
|||
|
Mark the probabilities as little hash marks at the appropriate height. The
|
|||
|
leftmost bar indicates position 0, rightmost 5; a high mark on the left side
|
|||
|
indicates that the tumbler is 0, or is never used. The relative heights of
|
|||
|
your tick marks indicate the likelihood of the notch on the respective tumbler
|
|||
|
being there. If you don't know about a position, don't mark it yet. This
|
|||
|
chart serves as a useful mnemonic while learning this trick; as you gain
|
|||
|
experience you probably won't need it anymore if you can remember tumbler
|
|||
|
positions.
|
|||
|
|
|||
|
A tumbler at the 0 position is already lined up before any buttons are
|
|||
|
pressed. This will feel like a lot of loose play with a little bit of pressure
|
|||
|
at the end of the travel, just before the enable detent. Be aware of this;
|
|||
|
often enough the first button with pressure can be a 0, and if you aren't
|
|||
|
watching for 0 positions you can easily assume it's a don't care, push it, and
|
|||
|
screw your chances of feeling others. Make sure your "don't care" test buttons
|
|||
|
aren't supposed to be at 0 either. It's a good idea to run through and try to
|
|||
|
find all the zeros first thing.
|
|||
|
|
|||
|
Let us continue from the above. You have found that tumbler 1 is most
|
|||
|
likely to bet at position 3, with a slim chance of position 2. This is marked
|
|||
|
in the above chart. The reason this can happen is that the tops of the locking
|
|||
|
bar teeth are slightly rounded. When the tumbler is one away from its opening
|
|||
|
position, the locking bar can actually rise higher, since the notch is halfway
|
|||
|
over it already. So don't assume that the first increase in pressure on other
|
|||
|
buttons is the right position for the one you're finding out about. Let's
|
|||
|
assume that the next pressure showed up on button 4. You can feel this when
|
|||
|
tumbler 1 is at position 3; to get tumbler 1 out there, let's say you used the
|
|||
|
sequence 1,2,3. 2 and 3 were your "don't care" buttons used only to push 1
|
|||
|
around. Therefore now, tumbler 1 is at position 3, 2 is at 2, and 3 is at 1.
|
|||
|
5 and 4 are at 0, and can therefore be felt for pressure.
|
|||
|
|
|||
|
The next step is to find the proper position for the next button with
|
|||
|
pressure against its tumbler. Many times you'll get more than one that exhibit
|
|||
|
pressure at the same time. Figure out which button has more pressure on it now
|
|||
|
with your first tumbler in the right position. In this example, only 4
|
|||
|
applies. You now want to advance tumbler 4 to different places, *while*
|
|||
|
keeping 1 at its proper place. 1 must always advance to 3 to free the locking
|
|||
|
bar enough to press on other tumblers. To place tumbler 1 at position 3 and 4
|
|||
|
at position 1, you would do something like 1,2,4 and check 3 and 5. To place
|
|||
|
tumbler 1 at position 3 and 4 at 2, you would do something like 1,4,2. To
|
|||
|
place 1 at 3 and 4 at 3, you have to press 1 and 4 at the same time, and then
|
|||
|
advance that mess by two positions. If you use 2 and 3 for this, the notation
|
|||
|
is (14),2,3, which means 1-with-4, then 2, then 3. You can also do 4,1,2,5 to
|
|||
|
put 4 at 4 and check 3. If all these tests fail, that is, no pressure appears
|
|||
|
at any other button, you can start assuming that 4 is supposed to be way out
|
|||
|
there at position 5. For the example, let's say you did 1,4,2 and pressure
|
|||
|
showed up on button 3. To double-check this, you did (14),2,5, and the
|
|||
|
pressure on 3 went away. So tumbler 4 must have gone too far that time. Place
|
|||
|
a fairly high tick mark on the chart at tumbler 4, position 2 to indicate the
|
|||
|
probability.
|
|||
|
|
|||
|
Note: A better way to do that last test, to avoid ambiguity, is to do
|
|||
|
1,(42),5 and check 3, then do (14),2,5 and check 3. This ensures that the only
|
|||
|
change you have made is to move tumbler 4 from 2 to 3 an avoids the possibility
|
|||
|
of movement of tumbler 2 giving bogus results. Through the entire process, you
|
|||
|
want to try to change one thing at a time at every point. Sometimes one of
|
|||
|
this sort of possible test setup won't tell you anything and you have to try
|
|||
|
another one [in this case, perhaps 1,(45),2 and then (14),5,2 while checking 3.
|
|||
|
This has simply swapped the positions of 2 and 5 during your testing].
|
|||
|
|
|||
|
You now know two tumbler positions, with a high degree of confidence, and
|
|||
|
have further reduced the possible combinations. From here, you could mix
|
|||
|
tumblers 2,3 and 5 into the sequence with various permutations, as long as you
|
|||
|
place 1 and 4 correctly every time. This would still take some time and brain
|
|||
|
work ... let's try to find out something about some other buttons. Place 1
|
|||
|
and 4 where they're supposed to go ... the sequence 1,4,2 will do it, and see
|
|||
|
what's up with the other buttons. 1,4,3 will leave 2 and 5 available. You
|
|||
|
find eventually that 2 and 3 have the next bit of pressure distributed between
|
|||
|
them [and are nonzero], and 5 feels like a 0, as described above. To confirm
|
|||
|
this, advance 5 along with some other button and check 3. Bingo: There is no
|
|||
|
pressure on 2 when 5 is enabled [and you have not changed anything else besides
|
|||
|
5's position], so you can firmly decide that 5 is 0 after all. So leave it
|
|||
|
there. [You did this by advancing 1 to 3 and 4 to 2, as usual, so you can feel
|
|||
|
2's pressure in the first place.]
|
|||
|
|
|||
|
By now you should know the proper positions of three of the tumblers, and
|
|||
|
have eliminated any other zeros by feeling their initial pressure. Now, since
|
|||
|
2 and 3 have the next pressure on them, try and find out more about them. You
|
|||
|
know they aren't zero; suppose we try 1? To do this you must get one of them
|
|||
|
to 1, 1 to 3 as usual, 4 to 2, and leave 5 alone. How? Use hitherto unknown
|
|||
|
buttons as dummies to position the tumblers right. For instance, the sequence
|
|||
|
1,4,3 will do what you want here; you then check pressure on 2. Or 1,4,2 and
|
|||
|
check 3. Here you may notice that the pressure on the leftover is a *little*
|
|||
|
stronger than before, but not enough to make any sure judgement. Well, now you
|
|||
|
want to advance an unknown to position 2 - but you suddenly notice that if you
|
|||
|
do [by doing something like 1,(42),3] there are no free buttons left to test
|
|||
|
for pressure! 'Tis time to try possibilities. Your only unknowns are 2 and 3
|
|||
|
now. You must now advance 1 and 4 to their proper positions, leaving 5 alone,
|
|||
|
while sprinkling the unknowns around in the sequence in different permutations.
|
|||
|
Use your chart to remember where the known tumblers must go. Sometimes you get
|
|||
|
two possibilities for a tumbler; you must work this into the permutations also.
|
|||
|
In this particular example, you know that either 2 or 3 [or both!] must be the
|
|||
|
last button[s] pressed, since *something* has to get pressed after 4 to advance
|
|||
|
4 to position 2. An obvious thing to try is putting both the unknowns at
|
|||
|
position 1 by doing 1,4,(23). Try the handle to see if it's open. No? Okay,
|
|||
|
now leave one of the unknowns down at 1 and mix the other one around. For
|
|||
|
instance, for 2 at 1 and 3 at 2, you do 1,(34),2 -- nope. Advance 3 one more;
|
|||
|
(13),4,2 *click* -- huh?? Oh, hey, it's *open*!!
|
|||
|
|
|||
|
Well, when you are quite through dancing around the room, you should know that
|
|||
|
your further possibilities here ran as follows:
|
|||
|
|
|||
|
3,1,4,2 ; to end the permutations with 2 at 1
|
|||
|
1,(24),3 ; and permutations involving 3 at 1.
|
|||
|
(12),4,3
|
|||
|
2,1,4,3
|
|||
|
|
|||
|
One may see how things like 2,1,(34),x are eliminated by the fact that 1
|
|||
|
must get to 3, and 5 must stay still. Since only 4 buttons could be used, no
|
|||
|
tumbler can get to position 5 in this particular combination. Note also that
|
|||
|
the farther *in* a tumbler has to go, the earlier its button was pressed.
|
|||
|
|
|||
|
If all this seems confusing at first, go over it carefully and try to
|
|||
|
visualize what is happening inside the box and how you can feel that through
|
|||
|
the buttons. It is not very likely that you can set up your lock exactly as
|
|||
|
the example, since they are all slightly different. Substitute your first-
|
|||
|
pressure button for the 1 in this example. You may even have one that exhibits
|
|||
|
pressure against two or more tumblers initially. Just apply the
|
|||
|
differential-pressure idea the same way to find their most likely positions.
|
|||
|
The example is just that, to demonstrate how the method works. To really
|
|||
|
understand it, you'll have to set your lock up with some kind of combination,
|
|||
|
and apply the method to opening it while watching the works. Do this a few
|
|||
|
times until you understand what's going on in there, and then you'll be able to
|
|||
|
do it with the lock assembled, and then in your sleep, and then by just waving
|
|||
|
your hands and mumbling....
|
|||
|
|
|||
|
A 5-press combination makes life a little tougher, in that you lose
|
|||
|
versatility in your freedom of test positions, especially if your first-
|
|||
|
pressure tumbler is at position 5. Here you can use the "almost" feature to
|
|||
|
your advantage, and advance the errant tumbler to one before its proper spot,
|
|||
|
and hope to see increased pressure on other tumblers. When a tumbler is one
|
|||
|
away from right, the locking bar tab is hanging a large section of itself into
|
|||
|
the tumbler notch, and the tab's top is slightly rounded. So it can rise a
|
|||
|
little higher than before. If you twist the handle fairly hard, you can
|
|||
|
distort the locking bar slightly and make it rise higher [but don't twist it
|
|||
|
hard enough to break away the safety clutch in the shaft!] The chances of
|
|||
|
someone setting this sort of combination without prior knowledge about the
|
|||
|
*specific* lock are almost nonexistent.
|
|||
|
|
|||
|
As if that wasn't enough, the next thing to deal with is the so-called
|
|||
|
"high-security" combinations involving half-pushes of buttons. The long
|
|||
|
initial travel of the tumbler permits this. If you look at your open mechanism
|
|||
|
and slowly push in a button, you'll see that the tumbler actually travels *two*
|
|||
|
positions before landing in the detent, and further motion is over one position
|
|||
|
per press. There is no inherently higher security in this kind of combination;
|
|||
|
it's just a trick used against the average person who wouldn't think of holding
|
|||
|
a button down while twisting the latch release. It's quite possible to defeat
|
|||
|
these also. When you are testing for pressure against a tumbler set at
|
|||
|
"one-half", you'll feel a kind of "drop-off" in which there is pressure
|
|||
|
initially, and then it disappears just before the detent. Before testing
|
|||
|
further buttons, you'll have to "half-enable" the appropriate "one-half"
|
|||
|
tumblers so the locking bar can rise past them. Set your lock up with a couple
|
|||
|
of combinations of this type and see how it works. Note that you must hold
|
|||
|
down the "half" buttons just before the detent click while setting or opening.
|
|||
|
This makes an effective 7 positions for each tumbler, but in a standard [no
|
|||
|
"halfs"] setup, it's effectively 6. This is Simplex's "high-security" trick
|
|||
|
that they normally only tell their high-dollar military customers about. After
|
|||
|
working the lock over for a while, it's intuitively obvious.
|
|||
|
|
|||
|
The Unican type has no direct pressure direction of twist; if you turn too
|
|||
|
far to the right you only reset the tumblers. What you must do is hold the
|
|||
|
knob against the detent release just tight enough to press the locking bar
|
|||
|
against the tumblers inside the box but not hard enough to slip the detent.
|
|||
|
There is a fairly large torque margin to work with, so this is not difficult to
|
|||
|
do. Unicans do not twist to the left at all, so ignore that direction and work
|
|||
|
clockwise only.
|
|||
|
|
|||
|
Possible fixes
|
|||
|
|
|||
|
The obvious things improvements to make are to cut notches of some kind
|
|||
|
into the locking bar teeth and the tumblers, so that the pressure can't be as
|
|||
|
easily felt. Another way might be to have a slip joint on the locking bar that
|
|||
|
would release before a certain amount of pressure was developed against it, and
|
|||
|
thus never let the tumblers have enough pressure against them to feel. The
|
|||
|
future may see an improved design from Simplex, but the likelihood does not
|
|||
|
seem high. They did not seem interested in addressing the "problem".
|
|||
|
|
|||
|
|
|||
|
Automotive Protection Systems
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
There are several types of locking devices found on cars today. Standard
|
|||
|
window locks, exterior locks, ignition locks, and the famous third party "club"
|
|||
|
type steering wheel locks.
|
|||
|
|
|||
|
Wing or vent windows have several types of locking devices. The most
|
|||
|
common is simply a lever that turns to prevent the window from opening.
|
|||
|
Another type of wing window lock has a lever latch equipped with a plunger at
|
|||
|
the pivot of the latch. The plunger deadlocks the latch against rotation,
|
|||
|
unless the plunger is first pushed in and held until the initial stage of
|
|||
|
rotation has been accomplished. Naturally, these are a bit more secure.
|
|||
|
|
|||
|
The most popular auto locks for the exterior and ignition are a derivative
|
|||
|
of the wafer tumbler locks called the "side-bar wafer lock." Side-bar wafer
|
|||
|
locks offer more protection then either the wafer tumbler or pin tumbler (of
|
|||
|
course they cost more.) When all of the tumblers have aligned to their breaking
|
|||
|
points, a spring-loaded bar falls into place, allowing the cylinder to turn.
|
|||
|
Ford auto locks are an exception, as they have pin tumbler locks.
|
|||
|
|
|||
|
Club Type Locks
|
|||
|
|
|||
|
One of the "club" type auto locks is an extensible bar that has opposing
|
|||
|
hooks that nominally wedge between spokes on the steering wheel. The bar
|
|||
|
itself is notched at 1" intervals or so. The key on these is rather
|
|||
|
impressive; it's a brass tube with at least three sets of chamfers drilled into
|
|||
|
their sides.
|
|||
|
|
|||
|
Defeating Club Type Locks
|
|||
|
|
|||
|
The weak part of these locks is not the keyway; it's the extensible bar.
|
|||
|
The notches provide built-in weak spots. The lock can be forced in about three
|
|||
|
seconds. Do as follows (it helps to be relatively strong):
|
|||
|
|
|||
|
1) Put on weightlifting gloves.
|
|||
|
|
|||
|
2) slide driver's seat all the way back.
|
|||
|
|
|||
|
3) tilt driver's seat all the way down.
|
|||
|
|
|||
|
4) tilt steering wheel all the way down.
|
|||
|
|
|||
|
5) put your feet on ends of "club" (past the rim of the steering wheel)
|
|||
|
|
|||
|
6) grasp center of the notched extension bar. Don't interlace fingers,
|
|||
|
just grab with your dominant hand and then grab over that hand in the other
|
|||
|
direction with the other hand.
|
|||
|
|
|||
|
7) Take a deep breath
|
|||
|
|
|||
|
8) While smoothly exhaling, hold on tight with your hands and straighten
|
|||
|
your legs. (classic leg press -- even Joe Average can exert twice his body
|
|||
|
weight in this mode.)
|
|||
|
|
|||
|
9) "Club" will conveniently bend into a horseshoe or shatter at a convenient
|
|||
|
notch, depending on the mood of the guy running the tempering furnace.
|
|||
|
This is why you wear weightlifting gloves while doing this trick- it keeps
|
|||
|
the steel fragments from cutting you.
|
|||
|
|
|||
|
There is another "club" that has a collar that wraps around a segment of
|
|||
|
the steering wheel; these cost more, are much less common, and the above
|
|||
|
technique does not work for them. However, you can hacksaw the wheel in one
|
|||
|
place and "spring" the wheel enough to allow the collar to pop off the wheel.
|
|||
|
Bend the wheel back, add some tinted epoxy, and you're clean.
|
|||
|
|
|||
|
Auto Alarms
|
|||
|
|
|||
|
More and more, people are using auto alarms to try to protect their
|
|||
|
vehicles. Unfortunately, if somebody wants to steal your car, they will. No
|
|||
|
amount of protection will prevent this. The strategy behind an auto alarm is
|
|||
|
to make your car more of a pain to steal then somebody elses. Here are the
|
|||
|
basics of car alarms.
|
|||
|
|
|||
|
The Brain
|
|||
|
|
|||
|
The main alarm unit, sometimes called the "brain", is mounted in the most
|
|||
|
secure place that can be found. Up inside the dashboard for instance. They
|
|||
|
basically took the whole dash apart, install the alarm, and then put the whole
|
|||
|
dash together around it. Some places install the brain under a seat or even up
|
|||
|
under the carpet on the passenger side ("so they can adjust it easier"). This
|
|||
|
is incredibly stupid.
|
|||
|
|
|||
|
Starter Kill
|
|||
|
|
|||
|
Basically, when the alarm is armed, the starter is electronically
|
|||
|
disconnected so the car cannot be started or even hot wired. Most alarms have
|
|||
|
this as a standard feature.
|
|||
|
|
|||
|
Valet switches
|
|||
|
|
|||
|
This is a toggle switch that can be set to keep the alarm from going off
|
|||
|
if the owner has to leave it with a valet or for car repairs. Most of the
|
|||
|
systems have this feature.
|
|||
|
|
|||
|
Passive vs Active Arming
|
|||
|
|
|||
|
With passive arming, the alarm becomes armed after a given time period
|
|||
|
after the last car door has closed. To disarm, you can either get in to the
|
|||
|
car and place the key in the ignition within a certain time period or press a
|
|||
|
button on a remote transmitter to disarm the alarm.
|
|||
|
|
|||
|
With active arming, you have to press a button on a transmitter to arm the
|
|||
|
alarm. To disarm, you press the transmitter button again.
|
|||
|
|
|||
|
Arming and Disarming beeps
|
|||
|
|
|||
|
Most alarms give you an audible alert when the alarm is armed or disarmed.
|
|||
|
This serves two purposes. One is to let you know the alarm is working and on
|
|||
|
the job. The other is to let others know the car has an alarm.
|
|||
|
|
|||
|
Motion Sensors
|
|||
|
|
|||
|
Some alarms like the UNGO box and others have a motion sensor. In the
|
|||
|
UNGO Box's case, it is a tube filled with mercury surrounded by a wire coil.
|
|||
|
When the car moves, the mercury moves within the tube causing current to flow
|
|||
|
in the coil. This is what sets the alarm off. Other have some type of spring
|
|||
|
with a weight on it so when the car moves, the weight bobbles back and forth
|
|||
|
and makes contact with the casing causing the circuit to be completed. The
|
|||
|
former method has a patent, the latter has no patent because it is worthless.
|
|||
|
If you have ever heard a parking lot full of alarms going off at an airport or
|
|||
|
a parking deck, it is because of this type of sensor. These are prone to false
|
|||
|
alarms from passing trucks, thunder, airplanes, etc.
|
|||
|
|
|||
|
The UNGO Box's sensor is highly adjustable, however, if you adjust it to
|
|||
|
eliminate all false alarms, then you have basically disabled its usefulness for
|
|||
|
triggering real alarms.
|
|||
|
|
|||
|
Shock Sensor
|
|||
|
|
|||
|
This is what comes standard on most alarms. It basically senses motion
|
|||
|
like a motion sensor but scans a very short period of time. You can rock the
|
|||
|
car and push up and down on it and the shock sensor will not go off. If you
|
|||
|
kick a tire or hit the window or door with your fist, the alarm goes off.
|
|||
|
|
|||
|
Glass Breakage Sensor
|
|||
|
|
|||
|
What this is supposed to do is pick up on the particular high frequencies
|
|||
|
of glass being broken or cut and to trigger the alarm. It is basically a
|
|||
|
microphone placed somewhere inside the car.
|
|||
|
|
|||
|
Field Motion Sensor (Perimeter Guard)
|
|||
|
|
|||
|
Basically this is the type of sensor which sets up some type of field
|
|||
|
around the car and inside the car to detect masses coming close to the car. It
|
|||
|
is a must for convertible owners. These aren't as common as most other types
|
|||
|
because of the extremely high cost. There are many cheap ones available to add
|
|||
|
to any alarm, but they have nothing but problems with them (i.e. false
|
|||
|
alarms). Some Alpine systems are designed especially for this type of sensor
|
|||
|
and have a price tag to match.
|
|||
|
|
|||
|
They are basically useless on hard top cars. Some cheap units are set off
|
|||
|
by anything. There is a car parked right outside of my classroom which is
|
|||
|
always being set off by falling rain and passers by. Very annoying. There are
|
|||
|
other fancy alarms which have a pre- recorded message like "Please step away
|
|||
|
from the car ...". These are really stupid and a waste of money. I heard of a
|
|||
|
new BMW being tortured by a group of kids throwing rocks at it just to hear the
|
|||
|
little voice go off.
|
|||
|
|
|||
|
Current sensor
|
|||
|
|
|||
|
This basically monitors the current drain on the battery. If it changes,
|
|||
|
i.e. a door is opened causing a light to come on, the alarm is triggered.
|
|||
|
This is how many cheap alarms are triggered. They just monitor the current.
|
|||
|
The doors and trunk are all protected because they have lights which will come
|
|||
|
on when opened.
|
|||
|
|
|||
|
The problem is, most newer cars have a fan inside the engine compartment
|
|||
|
which comes on even after the car is turned off. The resulting drain on the
|
|||
|
battery will trigger a current sensor.
|
|||
|
|
|||
|
Seat pressure sensor
|
|||
|
|
|||
|
If someone sits in the seat, the alarm is triggered. Not very practical
|
|||
|
unless on a convertible. By the time the thief is in your seat, your car or
|
|||
|
your stereo is history anyway.
|
|||
|
|
|||
|
Backup Battery
|
|||
|
|
|||
|
This is an emergency backup battery for the car alarm. It charges off of
|
|||
|
the car alternator just like the car's battery. If the car's battery goes dead
|
|||
|
or if the power cables are cut, the battery can still run the alarm and the
|
|||
|
siren. The alarm will remain armed.
|
|||
|
|
|||
|
With cheaper alarms and/or poor installations, some systems might end up
|
|||
|
wired into the car in a haphazard way. Most alarms flash the car's parking
|
|||
|
lights when activated. All a thief has to do is short out a parking light, set
|
|||
|
your alarm off and whammo, your car and the alarm goes dead. Thief gets in,
|
|||
|
replaces the right fuses and off he goes.
|
|||
|
|
|||
|
Automatic Door locks/Unlocks
|
|||
|
|
|||
|
Another neat feature is automatic door locking. This is an option on most
|
|||
|
alarms. It uses what they call an "output" from the alarm which can be
|
|||
|
programmed to do various things. Most installers set this up so that when the
|
|||
|
alarm is armed, all doors lock and when the alarm is disarmed, all doors
|
|||
|
unlock.
|
|||
|
|
|||
|
Pagers
|
|||
|
|
|||
|
A pager (sometimes called Autopage) is used to page the owner's beeper
|
|||
|
when the car alarm goes off. This way they can run to the parking lot and
|
|||
|
chase a potential car thief away or catch the person who just rammed in to your
|
|||
|
car before they speed away. Pagers may also use up an "output" on the alarm
|
|||
|
unit. Some hook on to the siren and are triggered off of the vibration when
|
|||
|
the alarm goes off.
|
|||
|
|
|||
|
Transmitters
|
|||
|
|
|||
|
These of course are used to remotely turn the alarm on and off. It seems
|
|||
|
that with cheaper and/or older alarms, it is possible to transmit all of the
|
|||
|
codes in rapid fire sequence to a car alarm. Eventually, you will hit upon the
|
|||
|
right code combination to disarm the alarm. The average alarm has around 2 to
|
|||
|
the 29th codes which is not very many. Newer (and probably more expensive)
|
|||
|
alarms can sense this and lock out any further attempts for a given time
|
|||
|
period.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The Marlock System
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
The Marlock System uses a key consisting of a piece of metal with holes
|
|||
|
bored in it, and then covered up with strips of IR-invisible plastic. Thus,
|
|||
|
you can't see anything in the plastic, but IR in the keyhole reader can see
|
|||
|
thru just fine. It decodes this, sends it to a controller interface box, which
|
|||
|
sends it to a controller PC, which says "cool or uncool", and if cool, then the
|
|||
|
interface box sends power to the strike on the door, and turns the LED on the
|
|||
|
reader green.
|
|||
|
|
|||
|
Each area that is to be accessed via Marlock must have some sort of reader
|
|||
|
device. This can be either a "keyhole" in the knob, a plate on the wall with
|
|||
|
the keyhole in it, or whatever. The reader is hooked up to a controller
|
|||
|
interface box. this box is locked with a really poor lock (like you'd have on
|
|||
|
your diskette box) and is located close to the area being secured, often in the
|
|||
|
ceiling. The controller interface box simply provides power for the reader,
|
|||
|
the little LED over the top of the reader, and the electric strike locking the
|
|||
|
door. The whole thing is controlled by an IBM PC with a reader keyhole mounted
|
|||
|
on the front of the PC which runs to an interface card inside the PC.
|
|||
|
|
|||
|
To program a key into the system, one simply inserts it into the keyhole
|
|||
|
on the front of the PC, and then tells the program when and where this key can
|
|||
|
work. This is stored in its database, and recalled by the reader as needed.
|
|||
|
Also the PC keeps logs of when and where a key was used -- whether or not it
|
|||
|
worked! There are audit trails all over the place.
|
|||
|
|
|||
|
If the power goes out, then whether or not the door opens is dependent
|
|||
|
upon the strike which was installed. IT can be either fail-safe (i.e. no
|
|||
|
power -- open!) or fail-secure (i.e. no power- lock!). However, for fire
|
|||
|
safety code requirements, companies often install it on the side of the door
|
|||
|
which allowed entry to a restricted area -- not exit.
|
|||
|
|
|||
|
Some of the Marlock cylinders have a small brass spot in the middle of the
|
|||
|
LED. This is an emergency override. One would insert a marlock key, and use a
|
|||
|
9V battery between the key and the pin to provide a signal to the interface
|
|||
|
controller to pop the strike. This may not still be the case however.
|
|||
|
|
|||
|
Defeating the Marlock System
|
|||
|
|
|||
|
Since there's an electric strike all you have to do is provide power to
|
|||
|
the strike so it'll release. This is usually 12-24 volts DC, and is easily
|
|||
|
obtained from some lantern batteries. The activation wires for the strike
|
|||
|
usually run down inside the door jamb from the controller interface box. And
|
|||
|
if you have access to the controller interface box, then just pick the lock on
|
|||
|
the front of it. The heavier wires are for the electric strike (the thin wires
|
|||
|
are from the reader). Then just apply power to the thing -- use jumper wires
|
|||
|
to get the power from the controller interface box...
|
|||
|
|
|||
|
|
|||
|
VingCards
|
|||
|
~~~~~~~~~
|
|||
|
These cards are used primarily by hotels, and our quite unique. The lock
|
|||
|
is a matrix of 32 pins which have two possible positions each [sort of like a
|
|||
|
vax...]. Two of these are special and aren't really used in the keying. The
|
|||
|
remaining 30 are constructed out of standard pin and driver parts, except that
|
|||
|
all the drivers are the same length and all the pins are the same length. The
|
|||
|
pin-driver combinations sit pointing upward [the springs are underneath] in a
|
|||
|
sort of matrix about 1.5 inches on a side. Above each pin-driver combination
|
|||
|
sits a steel ball. The entire matrix is enclosed in a *plastic* assembly, part
|
|||
|
of which can slide "forward" [i.e. away from the user]. Some of you may be
|
|||
|
familiar with the keys: white plastic cards about 3 inches long with a bunch of
|
|||
|
holes in one end. Pushing this into the slot until it "clicks" forward opens
|
|||
|
the locking mechanism.
|
|||
|
|
|||
|
The lock combination is set by inserting a similar card, only half as
|
|||
|
long, into the *back* of the lock. This card is the same thickness as the
|
|||
|
opening card and has part of the hole matrix cut out. A juxtaposition of this
|
|||
|
combination card from the back and the key card from the front closes the
|
|||
|
matrix: i.e. if you overlay the combination and key cards in their opening
|
|||
|
configuration, there are no open holes left, *exclusively*: i.e. where there
|
|||
|
is a hole on the combination card there is solid on the key card, and vice
|
|||
|
versa. Thus the complement of the proper key card is the combination card.
|
|||
|
This is enforced by the placement of the ballbearings and pins in relation to
|
|||
|
the sliders and top plate, so a workaround like a card with all holes cut out
|
|||
|
or a solid card does not open the thing.
|
|||
|
|
|||
|
The combination card slides in between the conical pin ends and the steel
|
|||
|
ballbearings [and is thus harder to push in than the key card]. The key card
|
|||
|
comes in over the balls, and its thickness pushes the balls under its solid
|
|||
|
regions downward. So each pin assembly is pushed down, when the lock is open,
|
|||
|
the same amount, be it by the key card hitting the ballbearing or the
|
|||
|
combination card wedging the actual pin downward. Clarification: Let us define
|
|||
|
a "1" pin as a hole in the opening card. Thus a "0" pin sits under a solid
|
|||
|
portion of the opening card and a hole in the combination card. A 0 pin opens
|
|||
|
as follows: Since the combination card lets the pin rise up against the steel
|
|||
|
ball, the keycard pushes the ball [and its pin] down to the bottom of the
|
|||
|
keycard slot. This brings that pin to its shear line. Simple. Here's the
|
|||
|
magic -- a 1 pin opens in the following fashion: Since the combination card is
|
|||
|
solid there, the steel ball is sitting directly on the combination card, and
|
|||
|
the pin underneath is *already* at its shear line. If a solid keycard portion
|
|||
|
arrives over this ball, the ball is pushed down against the combination card
|
|||
|
and *pushes the entire area of the combination card down under it*, lousing up
|
|||
|
not only that pin's shear line but probably a few around it. Although a clever
|
|||
|
mechanism, this depends on the elasticity of the combination card to work.
|
|||
|
Note that as the key card is inserted and removed, the combination card will be
|
|||
|
flexed up and down randomly until the keycard comes to rest at its opening
|
|||
|
position. [Correction to above: each pin really has *three* possible
|
|||
|
positions. Hmm.]
|
|||
|
|
|||
|
All this happens within the confines of the sliding *plastic* frame; this
|
|||
|
part carries the two cards, the balls, and the top halves of the pins. The
|
|||
|
stationary part underneath this contains the drivers and springs. A metal
|
|||
|
plate bolts down on top of the sliding piece, leaving a gap just big enough for
|
|||
|
the key card. If the screws holding this plate were to become loose, the plate
|
|||
|
would rise up, the key card would sit too high up, and the lock would not open.
|
|||
|
All the positioning is done by the thickness of the keys while they rest
|
|||
|
against the surfaces of their slots. Therefore a piece of thin cardboard will
|
|||
|
not serve as a duplicate key. We found that two pieces of plastic "do not
|
|||
|
disturb" sign, cut identically and used together, were thick enough to position
|
|||
|
things correctly and open the lock.
|
|||
|
|
|||
|
A rough top view: Pin mechanism:
|
|||
|
|
|||
|
Back _ = top plate Front Back
|
|||
|
o o o o <> = balls ________________________________
|
|||
|
o o o H = keycard HHHHHHHHHHHHH<>HHHHHHHHHH<>HHHHHH ## QQ
|
|||
|
o o o o O = comb. card --> QQ OOOOOOOO<>OOOOOOOOOOOOOOOOOOOOOO
|
|||
|
o o o # = slider QQ# [] [] [] ## QQ
|
|||
|
@ o o @ [] = pins QQ###[]####[]####[]#################
|
|||
|
o o o || = driver/ QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
|||
|
o o o o spring asm QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
|||
|
o o o Q = stationary QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
|||
|
o o o o housing QQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
|
|||
|
Front
|
|||
|
|
|||
|
It is hoped that the diagram on the right, with its three example pins,
|
|||
|
will show sufficiently that if two holes coincide the pin will rise too far,
|
|||
|
and if two solid places coincide, the entire combination card would be pushed
|
|||
|
down by the ballbearings. There is sufficient space underneath the combination
|
|||
|
card for it to sag down and foul the shear line; it is normally held upward by
|
|||
|
the pins' spring tension against the underside. This diagram may be misleading
|
|||
|
if it is not understood that the balls are actually larger than shown; i.e.
|
|||
|
the height of approximately three cards stacked up equals the diameter of the
|
|||
|
ballbearing. There is a thin layer of slider plastic between the keycard and
|
|||
|
the combination card, which separates them and retains the ballbearings.
|
|||
|
|
|||
|
The @'s in the top view are the two magic pins. These prevent the lock
|
|||
|
from working at all unless a combination card is inserted. They are a bit
|
|||
|
thicker than the other pins and do not have ballbearing parts. The slider
|
|||
|
above the combination card slot here is solid, so these pins have nothing to do
|
|||
|
with the keycard. They simply hold the lock shut if no combination card is
|
|||
|
installed, regardless of what is done with a keycard. Therefore if one were to
|
|||
|
make a combination card that only pushed down these pins, a solid keycard would
|
|||
|
work. And if one inserts a solid combination card, the lock is already open
|
|||
|
before you insert anything. [This is a useful hack that will allow anyone to
|
|||
|
open the door with just about any tool, in case you are crashing lots of people
|
|||
|
in a room, don't have enough keys, and don't feel like making more. Naturally
|
|||
|
your security is compromised, but only those who know what's going on will be
|
|||
|
able to get in.]
|
|||
|
|
|||
|
The slider has a bracket bolted on to it, which reaches down toward the
|
|||
|
doorknob and pushes a moveable sleeve with a square hole through it. This
|
|||
|
joins two sections of a three-section split shaft together, which allows the
|
|||
|
outside knob to retract the bolt. The inside knob is "hardwired" to the bolt
|
|||
|
action and always opens the door. The extra split in the shaft is so that with
|
|||
|
the card in place, the lock will still behave like a regular split-shaft
|
|||
|
knobset [and disable opening if the deadbolt is shot].
|
|||
|
|
|||
|
There is a hinged plastic door on the back [inside] of the lock, which is
|
|||
|
held shut with a screwdriver tab inside a slot. This is where the combination
|
|||
|
card goes, although this door exposes enough to see the entire slider mechanism
|
|||
|
[except for its inner works; the entire back must be taken off to get the
|
|||
|
slider out].
|
|||
|
|
|||
|
Now, the security evaluation: I see no clear way to "pick" it. The rear
|
|||
|
pins are hard to get at without touching the frontmost ones. However, this
|
|||
|
lock would be *very* easy to defeat, in the following fashion: A thin tool
|
|||
|
about the thickness of a keycard and about .2 inch wide can cover one column of
|
|||
|
ballbearings. If this tool is slowly slid straight into the slot along each
|
|||
|
column in turn, the resistance encountered as it contacts each ball indicates
|
|||
|
whether there is a hole or not underneath it in the combination card. The
|
|||
|
combination card presses upward against the ball more strongly than the pin's
|
|||
|
spring does, so this would allow one to map the combination card and then
|
|||
|
construct the keycard complement. This process wouldn't take very long. I
|
|||
|
therefore recommend that these locks be considered less than high-security.
|
|||
|
Furthermore, come to think of it, a small hole drilled in the front plate
|
|||
|
[which I doubt is hardened] would make it easy to frob the slider or split
|
|||
|
shaft.
|
|||
|
|
|||
|
|
|||
|
Electronic Hotel Card Locks
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
These are wonderful little microcomputer projects masquerading as door
|
|||
|
locks. Inside there's a processor running a program, with I/O leads going to
|
|||
|
things like the magnetic strip reader, or the infrared LEDs, and the solenoid,
|
|||
|
and the lights on the outside. They are powered entirely by a battery pack,
|
|||
|
and the circuitry is designed such that it draws almost nil power while idle.
|
|||
|
The cards are usually magnetic-strip or infrared. The former uses an oxide
|
|||
|
strip like a bank card, while the infrared card has a lot of holes punched in
|
|||
|
it. Since IR light passes through most kinds of paper, there is usually a thin
|
|||
|
layer of aluminum inside these cards. The nice thing about these systems is
|
|||
|
that the cards are generally expendable; the guest doesn't have to return them
|
|||
|
or worry about lost-key charges, the hotel can make them in quantity on the
|
|||
|
fly, and the combination changes for each new guest in a given room. The hotel
|
|||
|
therefore doesn't need a fulltime key shop, just a large supply of blank cards.
|
|||
|
Duplication isn't a problem either since the keys are invalidated so quickly.
|
|||
|
|
|||
|
The controlling program basically reads your card, validates the number it
|
|||
|
contains against some memory, and optionally pulls a solenoid inside the lock
|
|||
|
mechanism allowing you to enter. The neat thing about them is that card
|
|||
|
changes are done automatically and unknowingly by the new incoming guest. The
|
|||
|
processor generates new card numbers using a pseudorandom sequence, so it is
|
|||
|
able to know the current valid combination, and the *next* one. A newly
|
|||
|
registered guest is given the *new* card, and when the lock sees that card
|
|||
|
instead of the current [i.e. old guest's] card, it chucks the current
|
|||
|
combination, moves the next one into the current one, and generates the new
|
|||
|
next. In addition there is a housekeeping combination that is common to all
|
|||
|
the locks on what's usually a floor, or other management-defined unit.
|
|||
|
|
|||
|
There is no wire or radio connection to the hotel desk. The desk and the
|
|||
|
lock are kept in sync by the assumption that the lock won't ever see the "next"
|
|||
|
card until a new guest shows up. However if you go to the desk and claim to
|
|||
|
have lost your card, the new one they give you is often the "next" card
|
|||
|
instead. If you never use it and continue using your old card, the guest after
|
|||
|
you will have the wrong "next". In cases like this when the hotel's computer
|
|||
|
and the lock get out of sync, the management has to go up and reset the lock.
|
|||
|
This is probably done with a magic card that the lock always knows about [like
|
|||
|
in ROM], and tells it something akin to "use this next card I'm going to insert
|
|||
|
as the current combination". The pseudorandom sequence simply resumes from
|
|||
|
there and everything's fixed. If the lock loses power for some reason, its
|
|||
|
current memory will be lost but the magic "reset" card will work.
|
|||
|
|
|||
|
Rumor has it that these locks always have a back-door means of defeating
|
|||
|
them, in case the logic fails. Needless to say, a given manufacturer's method
|
|||
|
is highly proprietary information. In theory the security of these things is
|
|||
|
very high against a "random guess" card since there are usually many bits
|
|||
|
involved in the combination, and of course there is no mechanical lock to be
|
|||
|
manipulated or picked. The robustness of the locking hardware itself sometimes
|
|||
|
leaves something to be desired, but of course a lock designed for a hotel door
|
|||
|
probably isn't the kind of thing you'd mount on your house.
|
|||
|
|
|||
|
|
|||
|
Security Alarm Systems
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
Security alarm systems are becoming more and more common in the home and
|
|||
|
small business. They will become more and more popular in coming years as
|
|||
|
their prices continue to fall. There are basically two types of systems, the
|
|||
|
open circuit and closed circuit system.
|
|||
|
|
|||
|
The Open Circuit System
|
|||
|
|
|||
|
An open circuit system is composed of magnetic detectors or contacts that
|
|||
|
are "normally closed." That means that their contacts are separated when the
|
|||
|
door or window is in the normally closed position.When the door or window is
|
|||
|
opened, the contacts are released, causing them to close. This allows current
|
|||
|
to flow through the wires, and the alarm sounds. All the contacts and
|
|||
|
detectors are wired in parallel. This means that current flows ONLY when any
|
|||
|
contact or detector switch makes contact. Let me illustrate:
|
|||
|
|
|||
|
|
|||
|
switch is open switch is closed
|
|||
|
|
|||
|
wire
|
|||
|
----#############1############# ----#############1#############
|
|||
|
#############2#############---
|
|||
|
|
|||
|
#############2#############----
|
|||
|
########## wire
|
|||
|
==========================
|
|||
|
| MAGNET | (Magnet has been removed)
|
|||
|
==========================
|
|||
|
|
|||
|
|
|||
|
A Normally Closed Switch Assembly
|
|||
|
|
|||
|
|
|||
|
|
|||
|
In the first figure, the "normally closed" switch assembly, which would be
|
|||
|
mounted about the door, is help open as the lower portion (#2) is pulled to the
|
|||
|
magnet which would be mounted on top of the door. The magnet has an attractive
|
|||
|
force greater than the force of a spring which normally holds the two parts of
|
|||
|
the switch closed. In this position, no current flows through the switch. In
|
|||
|
the second figure, the door would be open, and thus the magnet not aligned
|
|||
|
under the switch. Both halves of the switch have been returned to their
|
|||
|
"normal" position, closed, by the spring.
|
|||
|
|
|||
|
The obvious disadvantage of an open circuit system is that it become
|
|||
|
inoperative if a transmission wire is cut, a contact or terminal wire becomes
|
|||
|
loose, or some similar condition. For this reason, circuit wiring for this
|
|||
|
type is often concealed. The vulnerability of the system is minimized by a
|
|||
|
test switch or key position which sends current through the main circuit wiring
|
|||
|
and reveals any line breaks. This test lights a small warning lamp on the main
|
|||
|
panel, bypassing the main alarm. This will only test the integrity of the
|
|||
|
circuit, not individual detectors.
|
|||
|
|
|||
|
When the open circuit system is engaged, an alarm will occur immediately
|
|||
|
if any doors are windows have been left open. Of course the alarm will also
|
|||
|
sound anytime a door is used while the alarm is in operation. Many times a
|
|||
|
bypass switch will be placed next to frequently used access ways. This can be
|
|||
|
dangerous because someone can break a door or window pain, activate the bypass
|
|||
|
switch, and have free access to the entrance.
|
|||
|
|
|||
|
|
|||
|
The Closed Circuit System
|
|||
|
|
|||
|
In a closed circuit security system, low amperage current continuously
|
|||
|
flows from the power source, throughout the detector switches, to the
|
|||
|
supervising relay (a type of switch) in the control panel. The detector
|
|||
|
switches are of the normally open type. This is the opposite of the normally
|
|||
|
closed type. The magnet holds the normally open switch assembly together, so
|
|||
|
current flows through the switch. When the magnet is removed, the switch
|
|||
|
springs open, and current ceases to flow throughout the circuit. The
|
|||
|
supervising relay monitors the current in the circuit, and should it be
|
|||
|
interrupted (by a door opening and causing a detector switch to open), it will
|
|||
|
activate the alarm buzzer, telephone dialer, siren, or whatever.
|
|||
|
|
|||
|
Note that in the closed circuit system, any attempt to cut the wires would
|
|||
|
have the same effect as opening a detector switch. The current would be
|
|||
|
interrupted and the alarm would sound. This makes the closed circuit a much
|
|||
|
more secure system than the open circuit type.
|
|||
|
|
|||
|
The closed circuit system requires more sophisticated equipment and the
|
|||
|
circuit installation must be precisely wired. Closed systems are also prone to
|
|||
|
more frequent false alarms.
|
|||
|
|
|||
|
|
|||
|
Security Alarm System Power Sources
|
|||
|
|
|||
|
The current for most systems comes from battery, transformer, or a
|
|||
|
recharging pack. The recharging pack is a complete power supply providing 6-12
|
|||
|
volts of power. This is enough to run several separate alarm circuits and even
|
|||
|
a six volt telephone dialer. It is usually equipped with nicad backup
|
|||
|
batteries in case of power failure.
|
|||
|
|
|||
|
|
|||
|
Magnetic Detectors
|
|||
|
|
|||
|
I used the "Magnetic Detector" when explaining the closed and open circuit
|
|||
|
types of security systems. These are by far the most common type of detectors
|
|||
|
used. As discussed before, they are a two part assembly consisting of a magnet
|
|||
|
and a switch. Both are encased in a weatherproof plastic case.
|
|||
|
|
|||
|
|
|||
|
Tamper Switch or Plunger Contact
|
|||
|
|
|||
|
Another popular type of detector is the tamper switch. It may be used on
|
|||
|
windows, alarm boxes, or control panels. It consists of a switch assembly with
|
|||
|
a spring loaded "plunger" protruding from one end. It is available in both the
|
|||
|
normally open and normally closed configurations.
|
|||
|
|
|||
|
|
|||
|
All-Purpose (Bullet) Detector
|
|||
|
|
|||
|
This is a beveled button used primarily on doors or double-hung windows.
|
|||
|
The button is installed in the hinged side of the door frame, recessed into the
|
|||
|
frame. When the door is closed, the button is depressed. When opened, it of
|
|||
|
course pops out.
|
|||
|
|
|||
|
|
|||
|
Floor Mats
|
|||
|
|
|||
|
Pressure sensitive mats wired with open or closed circuits to make or
|
|||
|
break contact when stepped upon are used as backup to perimeter security
|
|||
|
systems such as rear entrance doors. They can be placed under regular
|
|||
|
carpeting or loose rugs.
|
|||
|
|
|||
|
|
|||
|
Door and Window Traps
|
|||
|
|
|||
|
These are basically "trip-wires" and aren't used too often. They do work
|
|||
|
well in areas where conventional detectors would not work, and are
|
|||
|
substantially cheaper than infrared. They can be placed in either a horizontal
|
|||
|
or vertical configuration. For open circuit systems, an insulated plug is
|
|||
|
placed between the contacts of the detector. When it is tripped, the plug is
|
|||
|
pulled out, causing the detector's switch to close. For a closed circuit
|
|||
|
system, one end of the trip wire is attached to one end of the switch, and the
|
|||
|
other end of the trip wire to the other half of the switch. This way current
|
|||
|
still flows in the circuit. When the wire is tripped, the circuit breaks.
|
|||
|
|
|||
|
|
|||
|
Photoelectric Systems
|
|||
|
|
|||
|
Photoelectric systems transmit invisible pulse modulated beams from
|
|||
|
projector/transmitter to receiver. Interruption of the beam sets off the
|
|||
|
alarm. Although the system is designed primarily for interior used, military
|
|||
|
systems have been developed for use on the exterior, even in dense fog.
|
|||
|
|
|||
|
|
|||
|
Emergency Panic Button
|
|||
|
|
|||
|
This permits an alarm to be activated by use of a pushbutton located near
|
|||
|
a front door, in a bedroom, or hidden under a counter. In a business, such a
|
|||
|
button could be used as a "holdup" button, silently summoning the police or
|
|||
|
activating the normal store alarm system.
|
|||
|
|
|||
|
|
|||
|
Automatic Telephone Dialer
|
|||
|
|
|||
|
This is a device that will automatically call the appropriate telephone
|
|||
|
number and relay a prerecorded message. These devices are often used to
|
|||
|
contact the police, private security, or store officials. Of course, the
|
|||
|
system is at risk if the exterior phone wires are accessible. For this reason
|
|||
|
the phone wiring will be either incased in a steel sheath or wired for alarm.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------
|
|||
|
--- US Secret Service Radio Frequencies ---
|
|||
|
-- --
|
|||
|
- [From information gathered from Miles Barkman] -
|
|||
|
----------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
President, Vice President, or other notable coming to town? Like to
|
|||
|
know whats going on? Here is a handy reference guide to some of the known
|
|||
|
frequencies used by the Secret Service. Should provide some interesting
|
|||
|
scanning for you radio jocks out there.
|
|||
|
|
|||
|
|
|||
|
Note: USSS=US Secret Service
|
|||
|
WHCA=White House Communications Agency
|
|||
|
|
|||
|
Designation Frequency Primary Usage
|
|||
|
------------------------------------------------------------------------------
|
|||
|
Alpha 032.2300 MHz WHCA-Transportation
|
|||
|
166.5125 MHz WHCA-Transportation
|
|||
|
Able 032.2300 MHz ???????????
|
|||
|
032.3200 MHz ???????????
|
|||
|
Baker 165.7875 MHz USSS-Field Offices
|
|||
|
Charlie 165.3750 MHz USSS-Field Offices/Protection
|
|||
|
Delta 169.9250 MHz WHCA-Marine Security Detachment
|
|||
|
Echo 407.8500 MHz WHCA-SAM Uplink
|
|||
|
Foxtrot 415.7000 MHz WHCA-SAM Downlink
|
|||
|
Golf 166.4000 MHz USSS-Field Offices
|
|||
|
Hotel 167.9000 MHz WHCA-V.P. Staff/White House Garage
|
|||
|
165.6875 MHz WHCA-V.P. Staff/White House Garage
|
|||
|
166.2125 MHz WHCA-V.P. Staff/White House Garage
|
|||
|
India 407.9250 MHz USSS-Headquarters
|
|||
|
166.2000 MHz USSS-Headquarters
|
|||
|
Juliett 170.0000 MHz USSS-Paging/Camp David
|
|||
|
Kilo 167.8250 MHz Duplex Phone-Pres Res/LBJ
|
|||
|
Lima 168.7875 MHz Duplex Phone-Pres Res/LBJ
|
|||
|
Lavender 418.1250 MHz WHCA-Transportation
|
|||
|
Mike 165.2125 MHz USSS-Dignitary/Former Pres Protection
|
|||
|
November 166.7000 MHz WHCA-White House Staff
|
|||
|
Oscar 164.8875 MHz USSS-Presidential Protection
|
|||
|
Papa 164.4000 MHz USSS-Field Offices/Protection
|
|||
|
Quebec ???.???? MHz ???????????
|
|||
|
Romeo 166.4000 MHz USSS-Repeater Output
|
|||
|
164.4000 MHz USSS-Repeater Output
|
|||
|
Sierra 166.5125 MHz WHCA-White House Staff
|
|||
|
Tango 164.6500 MHz USSS-Field Offices/Protection
|
|||
|
Uniform 361.6000 MHz AF-1 Communications
|
|||
|
165.0875 MHz AF-1 Communications
|
|||
|
Victor 164.1000 MHz WHCA VP Protection
|
|||
|
Whiskey 167.0250 MHz WHCA-Paging
|
|||
|
X-ray 166.4625 MHz Treasury Common
|
|||
|
Yankee 162.6875 MHz WHCA-Presidential phone uplink or downlink
|
|||
|
Zulu 171.2875 MHz WHCA-Presidential phone downlink or uplink
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Pres Nighthawk Aircraft Fleet (HMX)
|
|||
|
-----------------------------------
|
|||
|
Frequency Primary Usage
|
|||
|
-----------------------------------
|
|||
|
046.7500 MHz Transport
|
|||
|
375.0000 MHz Transport
|
|||
|
034.3500 MHz VIP Transport Net
|
|||
|
142.7500 MHz Command Post
|
|||
|
265.8000 MHz Squadron Common
|
|||
|
|
|||
|
|
|||
|
Other Phone Patches
|
|||
|
------------------------------------------------
|
|||
|
Frequency Type Primary Usage
|
|||
|
------------------------------------------------
|
|||
|
407.4750 MHz (uplink) Nationwide-2
|
|||
|
415.8000 MHz (downlink) Nationwide-2
|
|||
|
407.4500 MHz (duplex) Limousines (Local/DC)
|
|||
|
408.2000 MHz (duplex) Limousines (Local/DC)
|
|||
|
|
|||
|
|
|||
|
USSS Uniform Division
|
|||
|
---------------------------------
|
|||
|
Designation Output / Input Freq
|
|||
|
---------------------------------
|
|||
|
Gray 418.350/407.750 MHz
|
|||
|
Orange 418.775/414.950 MHz
|
|||
|
Brown 414.850/418.800 MHz
|
|||
|
Red 415.975/419.725 MHz
|
|||
|
Silver 415.650/419.100 MHz
|
|||
|
Yellow 414.675/418.150 MHz
|
|||
|
|
|||
|
|
|||
|
Training Division: Beltsville, MD
|
|||
|
---------------------------------
|
|||
|
Designation Output / Input Freq
|
|||
|
---------------------------------
|
|||
|
Green 415.750/407.875 MHz
|
|||
|
Black 415.100/418.325 MHz
|
|||
|
Blue 414.800 MHz
|
|||
|
Violet 415.800 MHz
|
|||
|
|
|||
|
|
|||
|
Communications Division
|
|||
|
---------------------------------
|
|||
|
Designation Output / Input Freq
|
|||
|
---------------------------------
|
|||
|
Gold 415.675/419.075 MHz
|
|||
|
|
|||
|
|
|||
|
Technical Security Division
|
|||
|
---------------------------
|
|||
|
Designation Frequency
|
|||
|
---------------------------
|
|||
|
F-1 408.000 MHz
|
|||
|
F-2 411.000 MHz
|
|||
|
F-3 408.500 MHz
|
|||
|
F-4 408.975 MHz
|
|||
|
|
|||
|
|
|||
|
Other Reported USSS Frequencies
|
|||
|
---------------------------------------
|
|||
|
Frequency Primary Usage
|
|||
|
---------------------------------------
|
|||
|
163.7375 MHz
|
|||
|
164.6500 MHz
|
|||
|
165.2250 MHz
|
|||
|
165.6875 MHz Washington Field Office
|
|||
|
166.2000 MHz Washington Field Office
|
|||
|
406.2625 MHz
|
|||
|
407.8000 MHz
|
|||
|
407.8250 MHz Suit Radios
|
|||
|
407.8750 MHz Suit Radios
|
|||
|
407.9750 MHz
|
|||
|
408.9750 MHz
|
|||
|
|
|||
|
|
|||
|
Hints for monitoring
|
|||
|
--------------------
|
|||
|
|
|||
|
Most of the interesting frequencies are USUALLY scrambled during actual
|
|||
|
operations. However, 407.850 and 415.700 are never scrambled.
|
|||
|
|
|||
|
Sometimes, the best info on plane landings and limo locations and such can be
|
|||
|
obtained through regular airport communications and local police.
|
|||
|
|
|||
|
The Secret Service has been known to occasionally use cellular communications.
|
|||
|
|
|||
|
The PL used extensively by USSS is 103.5 Hz.
|
|||
|
|
|||
|
Hearing the callsign "Air Force 1" means the President is on the plane. "Air
|
|||
|
Force 2" is the Vice President's plane.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Cellular Update
|
|||
|
|
|||
|
|
|||
|
Well, they've done it again. The high paying special interest groups have
|
|||
|
gotten yet another law passed. Now it is not only illegal to listen to
|
|||
|
cellular communications, but illegal to even MAKE a tuner capable of tuning
|
|||
|
them in! Never mind thats its just EMR floating through space, your body, your
|
|||
|
house. It is ILLEGAL to tune a crystal to such and such frequency converting
|
|||
|
the energy to audio. Ridiculous. People who broadcast their conversation
|
|||
|
across the country side should have no expectation of privacy. Does everyone
|
|||
|
have to cover their ears when I yell out the window to my friend? No, of
|
|||
|
course not. The question of it being immoral or not should not be confused
|
|||
|
with legality. Heres the new law.
|
|||
|
|
|||
|
|
|||
|
SEC. 408. INTERCEPTION OF CELLULAR COMMUNICATIONS.
|
|||
|
|
|||
|
(a) AMENDMENT -- Section 302 of the Communications Act of 1934
|
|||
|
(47 USC 302) is amended by adding at the end the following new
|
|||
|
subsection:
|
|||
|
|
|||
|
(d)(1) Within 180 days after the date of enactment of this
|
|||
|
subsection, the Commission shall prescribe and make effective
|
|||
|
regulations denying equipment authorization (under part 15
|
|||
|
if title 47, Code of Federal Regulations, or any other part
|
|||
|
of that title) any scanning receiver that is capable of --
|
|||
|
|
|||
|
(A) receiving transmissions in the frequencies allocated to the
|
|||
|
domestic cellular radio telecommunications service,
|
|||
|
(B) being readily altered by the user to receive transmissions
|
|||
|
in such frequencies, or
|
|||
|
(C) being equiped with decoders that covert digital cellular
|
|||
|
transmissions to analog voice audio.
|
|||
|
|
|||
|
(2) Beginning 1 year after the effective date of the regulations
|
|||
|
adopted pursuant to paragraph (1), no receiver having the
|
|||
|
capabilities described in subparagraph (A), (B), or (C) of
|
|||
|
paragraph (1), as such capabilities are defined in such
|
|||
|
regulations, shall be manufactured in the United States or
|
|||
|
imported for use in the United States.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The HP3000's 'SECURITY/3000' system (part 3)
|
|||
|
|
|||
|
by Sterling
|
|||
|
|
|||
|
|
|||
|
|
|||
|
The third and final part of our series on HP3000 Security.
|
|||
|
|
|||
|
STREAMX/SLEEPER -- LINKS STREAMX WITH SLEEPER
|
|||
|
*********************************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
~~~~~~~~~~~~
|
|||
|
A very popular program from the Contributed Software Library (CSL) is SLEEPER,
|
|||
|
which can stream a job, run a program, or execute a command or any combination
|
|||
|
of these at any specified time and repeat this action at specified intervals.
|
|||
|
Many HP3000 sites use SLEEPER to launch job streams at specified times during
|
|||
|
the day or night, and at regular intervals (for instance it might run a report
|
|||
|
program each night at 12:00 and stream a job which does a sysdump at 7:00 a.m.
|
|||
|
each Friday).
|
|||
|
|
|||
|
But to stream a job using SLEEPER, the MPE passwords must be embedded in the
|
|||
|
job stream. A better solution would be to use STREAMX in conjunction with
|
|||
|
SLEEPER and have STREAMX generate the passwords.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SLEEPER INSTRUCTIONS
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
Those familiar with SLEEPER know that the file 'SLEEPCOM' must first be built
|
|||
|
as follows:
|
|||
|
|
|||
|
:BUILD SLEEPCOM;REC=-72,4,F,ASCII;DISC=20,1,1
|
|||
|
|
|||
|
and then SLEEPERC (the SLEEPER communications program) is run to add entries to
|
|||
|
the SLEEPER file. SLEEPERC will ask the date, hour, and minute when the
|
|||
|
activity is to start. It will then ask if the activity is to run a program,
|
|||
|
stream a job, or execute a command. The name of the proper disc file is asked
|
|||
|
for next; then the repetition time in days, hours, and minutes (or 'none') is
|
|||
|
requested.
|
|||
|
|
|||
|
The SLEEPER communication program may be used at any time to add, delete, or
|
|||
|
list the current SLEEPER entries; even when the SLEEPER program is running.
|
|||
|
(If you are having trouble adding entries, make sure the SLEEPCOM file is not
|
|||
|
full.)
|
|||
|
|
|||
|
After the SLEEPER communication file is set up you may run the SLEEPER program
|
|||
|
(either type ':RUN SLEEPER', or let OVERLORD [also from the CSL] run the
|
|||
|
SLEEPER program automatically). SLEEPER will then determine the earliest time
|
|||
|
that any activity must be executed, then "go to sleep" (via the PAUSE
|
|||
|
intrinsic) until it is time to schedule that activity. In this way the SLEEPER
|
|||
|
program is little load upon the system, as it is sleeping most of the time.
|
|||
|
|
|||
|
If a repetition time is specified for an activity then SLEEPER will update the
|
|||
|
time to schedule that activity after it has been scheduled by adding the
|
|||
|
repetition interval to the scheduling time. If no repetition interval is
|
|||
|
specified then that activity is deleted from the communications file after it
|
|||
|
is executed.
|
|||
|
|
|||
|
SLEEPERC is a program used to communicate with the SLEEPER program as it runs.
|
|||
|
The OVERLORD program may be used to run SLEEPER or SLEEPER may be run alone
|
|||
|
(usually as a batch job).
|
|||
|
|
|||
|
|
|||
|
HOW STREAMX/SLEEPER WORKS
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
As you know, STREAMX gets passwords for job streams by prompting for them at
|
|||
|
:STREAM time; but because SLEEPER is streaming the job, there is no one to
|
|||
|
answer the passwords. Fortunately, SLEEPER is generally run by MANAGER.SYS (or
|
|||
|
a user with SM capability), so STREAMX will automatically generate the
|
|||
|
passwords for all job streams streamed by SLEEPER, since STREAMX's logic
|
|||
|
dictates that an SM user never needs to answer any passwords because he can
|
|||
|
retrieve them anyway.
|
|||
|
|
|||
|
To link STREAMX with SLEEPER, we need to run STREAMX in immediate mode,
|
|||
|
equating the file we want to stream with STRMFILE and invoking STREAMX with
|
|||
|
PARM=1.
|
|||
|
|
|||
|
Unfortunately, SLEEPER cannot run programs with parms, so instead of running
|
|||
|
STREAMX, we run STRMSLEP, which simply invokes STREAMX with PARM=1.
|
|||
|
|
|||
|
|
|||
|
LOGOFF -- LOGS OFF INACTIVE SESSIONS
|
|||
|
************************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
~~~~~~~~~~~~
|
|||
|
Users often log on to the system, do some work, and then leave the terminal
|
|||
|
unattended (coffee break?, lunch?) without logging off. Sometimes users even
|
|||
|
go home for the day without logging off.
|
|||
|
|
|||
|
* SECURITY THREAT:
|
|||
|
|
|||
|
WALK UP TO TERMINAL
|
|||
|
TAKE ADVANTAGE OF CAPABILITIES
|
|||
|
DISCOVER MPE PASSWORDS TO SENSITIVE ACCOUNTS
|
|||
|
|
|||
|
This can be a security problem because this means that anyone can come up to a
|
|||
|
terminal and use it without having to go through any security system. This can
|
|||
|
be an even greater problem if the logged-on user is an Account Manager or the
|
|||
|
System Manager because the would-be thief could take advantage of the extra
|
|||
|
capabilities and gain access to sensitive information. (It's fortunate,
|
|||
|
though, that you are using SECURITY/3000 because the personal profile answers
|
|||
|
which must be known to gain access to the system are one-way
|
|||
|
encrypted--otherwise, the would-be thief could do a :LISTUSER, :LISTGROUP, and
|
|||
|
:LISTACCT, retrieve all the MPE passwords, erase all evidence that he did so by
|
|||
|
clearing the screen, and then log on as that user at some later date.
|
|||
|
|
|||
|
* SYSTEM RESOURCE WASTE:
|
|||
|
|
|||
|
SYSTEM TABLES
|
|||
|
MORE TERMINALS THAN PORTS
|
|||
|
|
|||
|
Another problem posed by having an idle terminal is that certain system
|
|||
|
resources are being used unnecessarily. This can be of particular concern if
|
|||
|
you are short on CST and DST entries, and especially if you have several users
|
|||
|
contending for a limited number of ports through data switches or port
|
|||
|
selectors. Why should an inactive session consume valuable resources?
|
|||
|
Logged-on sessions at the end of the day also prevent you from doing your
|
|||
|
backup.
|
|||
|
|
|||
|
LOGOFF remedies these problems. It permits the System Manager to ensure that
|
|||
|
any terminal which is logged on but has not been actively used for a certain
|
|||
|
length of time is automatically logged off.
|
|||
|
|
|||
|
|
|||
|
HOW LOGOFF WORKS
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
LOGOFF will log off qualifying sessions that have exceeded the acceptable
|
|||
|
period of inactivity. You specify how much inactivity is acceptable and which
|
|||
|
sessions are to be monitored for inactivity.
|
|||
|
|
|||
|
* REMOVES INACTIVE/UNWANTED SESSIONS FROM SYSTEM
|
|||
|
* INACTIVE = READ PENDING AND NO CPU USAGE RECENTLY
|
|||
|
* uses MPE :ABORTJOB #Snnnn
|
|||
|
|
|||
|
LOGOFF decides that a session is inactive if it's had a terminal read pending
|
|||
|
for a long time (at least as long as the configured timeout period). For
|
|||
|
example, if the timeout period is 20 minutes (1200 seconds) and some program
|
|||
|
prompted the user for input 20 minutes ago and he still hasn't responded,
|
|||
|
LOGOFF will abort that user. On the other hand, if the program's been working
|
|||
|
for 20 minutes, or even been suspended waiting for a :REPLY (or anything else
|
|||
|
that doesn't involve a terminal read), the program won't be aborted.
|
|||
|
|
|||
|
After you configure LOGOFF (see CONFIGURING LOGOFF in this section) you stream
|
|||
|
a job which runs the LOGOFF program--the program will run "in the background"
|
|||
|
all the time and monitor the system using a minimal amount of resources.
|
|||
|
|
|||
|
LOGOFF will perform an :ABORTJOB on inactive sessions--MPE will take care of
|
|||
|
file closures, buffer posting, etc.
|
|||
|
|
|||
|
When a session is aborted by LOGOFF,
|
|||
|
|
|||
|
* a message saying that the session is being aborted due to lack
|
|||
|
of activity is sent to that session's terminal (the text of
|
|||
|
this message will default, but you may define your own)
|
|||
|
|
|||
|
* if the terminal is in BLOCK MODE (e.g. VPLUS screen),
|
|||
|
LOGOFF will take the terminal out of this mode and display
|
|||
|
its message below the screen.
|
|||
|
|
|||
|
* a message describing the logoff and identifying the LDEV of
|
|||
|
the logged-off session is sent to the system console
|
|||
|
|
|||
|
* an entry is written to LOGOFF job stream's output
|
|||
|
spool file indicating the session number aborted and the time
|
|||
|
and date it was aborted
|
|||
|
|
|||
|
|
|||
|
CONFIGURING LOGOFF
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
You may configure logoff in a number of ways.
|
|||
|
|
|||
|
* ACCEPTABLE PERIOD OF INACTIVITY
|
|||
|
* WHICH SESSIONS TO MONITOR (BY LDEV)
|
|||
|
* SESSIONS CURRENTLY RUNNING PROGRAM
|
|||
|
* BLOCK MODE HANDLING
|
|||
|
* DS SESSION HANDLING
|
|||
|
* ABORT MESSAGE TO BE SENT
|
|||
|
|
|||
|
First, you must specify the acceptable period of inactivity. This is done with
|
|||
|
the $TIMEOUT keyword.
|
|||
|
|
|||
|
Next, you may optionally configure which sessions will have their activity
|
|||
|
monitored by using the $TERMINALS keyword. This is done by defining the
|
|||
|
"ldev-pool" of logical devices to be monitored.
|
|||
|
|
|||
|
Also, you may specify additional criteria to be checked by LOGOFF before the
|
|||
|
inactive terminal is aborted (e.g. that sessions running a particular program
|
|||
|
should not be aborted).
|
|||
|
|
|||
|
Furthermore, you may configure how LOGOFF will deal with sessions which have
|
|||
|
qualified to be logged off. This includes BLOCK MODE handling, DS SESSION
|
|||
|
exclusion, and the MESSAGE to be sent to the user.
|
|||
|
|
|||
|
If you specify only the $TIMEOUT period, logoff will by default:
|
|||
|
* monitor sessions on any logical device
|
|||
|
* exit a terminal from block mode and then display message
|
|||
|
* not abort sessions with a DS session
|
|||
|
* display the default logoff message
|
|||
|
* abort sessions running any program
|
|||
|
|
|||
|
If you have already configured LOGOFF and wish to change something in the
|
|||
|
configuration while LOGOFF is running, you need not abort the LOGOFF job and
|
|||
|
re-start it--just make the changes to the configuration file and they will take
|
|||
|
effect right away (or, rather, the next time the LOGOFF program reads the
|
|||
|
LOGOFF data file).
|
|||
|
|
|||
|
The configuration information for LOGOFF is kept in the file
|
|||
|
LOGOFF.DATA.SECURITY and each time you make a change to it by KEEPing the file
|
|||
|
from the :EDITOR you must:
|
|||
|
|
|||
|
:ALTSEC LOGOFF.DATA.SECURITY;(R,X,A,L,W:CR)
|
|||
|
|
|||
|
|
|||
|
SPECIFYING WHICH LOGICAL DEVICES ARE TO BE MONITORED
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
You may specify which logical devices are to be monitored by LOGOFF. The LDEVs
|
|||
|
to be monitored are referred to as the "ldev-pool". This "ldev-pool" is
|
|||
|
defined by adding a keyword and a list of LDEVs to the LOGOFF.DATA.SECURITY
|
|||
|
file. If you specify to INCLUDE a list of LDEVs, the "ldev-pool" will be that
|
|||
|
list of LDEVs. If you specify to EXCLUDE a list of LDEVs, the "ldev-pool" will
|
|||
|
be all the LDEVs configured as terminals which are not in your EXCLUDE list.
|
|||
|
|
|||
|
Either add a line to INCLUDE certain terminals:
|
|||
|
|
|||
|
$TERMINALS INCLUDE ldev ldev ldev ldev ldev ...
|
|||
|
|
|||
|
or to EXCLUDE certain terminals:
|
|||
|
|
|||
|
$TERMINALS EXCLUDE ldev ldev ldev ldev ldev ...
|
|||
|
|
|||
|
where 'ldev' is any logical device number (e.g. '21 38 40 47') which are
|
|||
|
included in or excluded from the logoff "ldev-pool".
|
|||
|
|
|||
|
LOGOFF will monitor only the sessions logged on to the LDEVs in the logoff
|
|||
|
"ldev-pool". The LDEV which is the system console is always excluded from the
|
|||
|
"ldev-pool" (even if it is switched from LDEV 20).
|
|||
|
|
|||
|
If all the LDEVs you need to specify do not fit on a 72-character line, you may
|
|||
|
put them on several lines as follows:
|
|||
|
|
|||
|
$TERMINALS INCLUDE 22 23 24 25 27 29 30 31 32 33 35 37
|
|||
|
38 39 47 48 55 56 57 58
|
|||
|
|
|||
|
If neither a $TERMINALS INCLUDE or $TERMINALS EXCLUDE line is contained in the
|
|||
|
file, all LDEVs (except the console and all DS sessions) will be included in
|
|||
|
the "ldev-pool". Regardless of what you specify, LOGOFF will only monitor
|
|||
|
LDEVs which are configured as type = 16 (terminals).
|
|||
|
|
|||
|
|
|||
|
NOT LOGGING OFF SESSIONS RUNNING A SPECIFIED PROGRAM
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
After LOGOFF has qualified a session by LDEV and inactivity, you may
|
|||
|
additionally specify that sessions running a particular program not be aborted.
|
|||
|
This means that programs such as FORMSPEC.PUB.SYS which often have long periods
|
|||
|
of inactivity (due to screen design) may be specified to logoff as being
|
|||
|
special and that regardless of inactivity this session should not be logged off
|
|||
|
while running this program. To configure LOGOFF to EXCLUDE logging off
|
|||
|
sessions running a particular program add a line to LOGOFF.DATA.SECURITY:
|
|||
|
|
|||
|
$PROGRAMS EXCLUDE program program program ...
|
|||
|
|
|||
|
where 'program's are fully qualified program names (e.g. ENTRY.PUB.SYS
|
|||
|
FORMSPEC.PUB.SYS).
|
|||
|
|
|||
|
If no $PROGRAMS is specified, this check is not performed.
|
|||
|
|
|||
|
|
|||
|
RESTRICTING LOGOFF BY USERS
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
With $TERMINALS INCLUDE and EXCLUDE, you can have LOGOFF abort only those
|
|||
|
inactive sessions which are running on certain terminals (or, for EXCLUDE,
|
|||
|
running on any terminals EXCEPT the ones given). With $PROGRAMS INCLUDE and
|
|||
|
EXCLUDE, you can restrict LOGOFF to only look at terminals that are running (or
|
|||
|
not running) certain programs. Similarly, with $USERS INCLUDE and EXCLUDE, you
|
|||
|
can specify which users should or should not be aborted due to inactivity.
|
|||
|
|
|||
|
Say, for instance, that you don't mind people walking away from their terminals
|
|||
|
whenever they're signed on to non-sensitive accounts. The only accounts that
|
|||
|
you really want LOGOFF to work on are AP, GL, and SYS. You can just add the
|
|||
|
following line to your LOGOFF.DATA.SECURITY file:
|
|||
|
|
|||
|
$USERS INCLUDE @.AP @.GL @.SYS
|
|||
|
|
|||
|
Whenever LOGOFF sees an inactive session, it will check to see if it's logged
|
|||
|
on to one of those three accounts; if it isn't, LOGOFF won't touch it.
|
|||
|
|
|||
|
Similarly, there might be some specific users that you don't want to abort.
|
|||
|
BIG.CHEESE, for instance -- your boss -- gets very aggravated when he gets
|
|||
|
kicked off the system, and the fact that he shouldn't leave his terminal
|
|||
|
inactive doesn't sway him. Rank has its privileges, after all, and you can
|
|||
|
just say
|
|||
|
|
|||
|
$USERS EXCLUDE BIG.CHEESE
|
|||
|
|
|||
|
Actually, you can be very specific in who you include or exclude. As the first
|
|||
|
example above showed, you can specify user identifiers with wildcards (@.AP,
|
|||
|
CLERK@.GL, JOE.@, etc.); also, you can select by session name and group name as
|
|||
|
well as user name and account name, so you can say
|
|||
|
|
|||
|
$USERS EXCLUDE JOE,@.DEV,SOURCE
|
|||
|
|
|||
|
which will exclude sessions signed on with session name "JOE" into the "SOURCE"
|
|||
|
group of the "DEV" account.
|
|||
|
|
|||
|
If you have neither a $USERS INCLUDE nor a $USERS EXCLUDE line in the
|
|||
|
LOGOFF.DATA.SECURITY file, LOGOFF will abort inactive sessions regardless of
|
|||
|
their user id (although the $TERMINALS and $PROGRAMS restrictions still apply).
|
|||
|
This is a pretty good default, since usually any inactive session is not a good
|
|||
|
thing to have around.
|
|||
|
|
|||
|
|
|||
|
DS SESSIONS - TO ABORT OR NOT TO ABORT (THAT IS THE OPTION)
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
LOGOFF may be configured to abort sessions regardless of whether they are a
|
|||
|
local or remote DS-session. By default, LOGOFF will not abort any DS-session.
|
|||
|
You may perform the abort by configuring the LOGOFF.DATA.SECURITY file with the
|
|||
|
keyword:
|
|||
|
|
|||
|
$DSABORT
|
|||
|
|
|||
|
This will cause DS-sessions to be aborted.
|
|||
|
|
|||
|
|
|||
|
SAMPLE CONFIGURATION
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
EXAMPLE1: If the LOGOFF.DATA.SECURITY file contained the following:
|
|||
|
|
|||
|
$TIMEOUT 900
|
|||
|
$TERMINALS EXCLUDE 33 36 38 39 45
|
|||
|
$PROGRAMS EXCLUDE FORMSPEC.PUB.SYS ENTRY.PUB.SYS
|
|||
|
|
|||
|
then LOGOFF would abort all sessions that were all of the following:
|
|||
|
|
|||
|
Inactive for more than 900 seconds (15 minutes)
|
|||
|
AND logged on to an LDEV other than 33,36,38,39 or 45
|
|||
|
AND running a program other than FORMSPEC.PUB.SYS and ENTRY.PUB.SYS
|
|||
|
|
|||
|
EXAMPLE2: If the LOGOFF.DATA.SECURITY file contained the following:
|
|||
|
|
|||
|
$TIMEOUT 1200
|
|||
|
$TERMINALS INCLUDE 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
|
|||
|
48 49 50 51 52 53 54 55 56 57 58 59 60
|
|||
|
|
|||
|
then LOGOFF would abort all sessions that were:
|
|||
|
|
|||
|
Inactive for more than 1200 seconds (20 minutes)
|
|||
|
AND logged on to an LDEV from 33 to 60 inclusive.
|
|||
|
|
|||
|
|
|||
|
ACTIVATING LOGOFF
|
|||
|
~~~~~~~~~~~~~~~~~
|
|||
|
To have LOGOFF continually monitor the system and abort idle sessions (using
|
|||
|
the parameters you have configured in LOGOFF.DATA.SECURITY) you need to stream
|
|||
|
a job which runs the LOGOFF.PUB.SECURITY program, which wakes up every so often
|
|||
|
(using a minimal amount of system resources) and aborts all sessions which
|
|||
|
should be aborted, according to your configuration in LOGOFF.DATA.SECURITY.
|
|||
|
|
|||
|
The logoff job stream is stored in the file
|
|||
|
|
|||
|
LOGOFF.JOB.SECURITY
|
|||
|
|
|||
|
which does not contain any passwords on the job card, so STREAMX should be used
|
|||
|
to stream the job (see the "STREAMX" section of this manual for information
|
|||
|
about eliminating passwords in job streams). Just do this:
|
|||
|
|
|||
|
:FILE STRMFILE=LOGOFF.JOB.SECURITY
|
|||
|
:RUN STREAMX.PUB.SECURITY;PARM=1
|
|||
|
|
|||
|
|
|||
|
STOPPING LOGOFF
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
"A car needs to be able to do only two things -- to go and to stop."
|
|||
|
|
|||
|
A LOGOFF job stream is just a 'plain vanilla' MPE job. If you want to abort
|
|||
|
it, you can just do an :ABORTJOB, just like you would for any job of your own.
|
|||
|
|
|||
|
On the other hand, MPE's :ABORTJOB is sometimes rather temperamental. Surely
|
|||
|
you, as a system manager, have often encountered sessions that just won't go
|
|||
|
away -- no matter how many :ABORTJOBs are done, they're still there; sometimes
|
|||
|
you even have to re-start the system if you want them removed.
|
|||
|
|
|||
|
This is why it's a good idea for all background tasks, like LOGOFF, to have
|
|||
|
some normal shutdown procedure, which can let somebody stop them without having
|
|||
|
to do an :ABORTJOB. To do this, you just
|
|||
|
|
|||
|
:RUN LOGOFF.PUB.SECURITY,STOP
|
|||
|
|
|||
|
This will send a message to the LOGOFF job stream using a message file; LOGOFF
|
|||
|
will catch this message and perform an orderly shutdown of itself. Of course,
|
|||
|
you can still do an :ABORTJOB of the job stream if you want to, but we think
|
|||
|
that the ":RUN LOGOFF.PUB.SECURITY,STOP" is a cleaner solution.
|
|||
|
|
|||
|
Note that there's no reason why you have to abort the LOGOFF job stream when
|
|||
|
you do a system backup. Just keep it running.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PASCHG-changing MPE passwords
|
|||
|
*****************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
~~~~~~~~~~~~
|
|||
|
To protect the security of their systems, many installations encourage (or
|
|||
|
require) MPE passwords to be changed periodically. That way, by the time a
|
|||
|
password gets out over the "grapevine," it will have been changed.
|
|||
|
|
|||
|
Unfortunately, MPE's security system makes changing user passwords rather
|
|||
|
difficult. Since only an Account Manager--not the user himself!--can change a
|
|||
|
user password, changing passwords is actually discouraged. A user may feel
|
|||
|
reluctant to spend time getting in touch with his Account Manager about
|
|||
|
changing a password (even if he, the user, suspects it has been compromised);
|
|||
|
an Account Manager is very likely to put off changing passwords if it means
|
|||
|
changing them for 100 users in his account.
|
|||
|
|
|||
|
A very good solution to this problem--in fact, one implemented on most other
|
|||
|
computer systems--is to allow a user to change his own password. Since the
|
|||
|
user is allowed to change only his own password (not other users'), this poses
|
|||
|
no security threat; in fact, it actually improves security by making it easier
|
|||
|
for a user to get his own password changed.
|
|||
|
|
|||
|
|
|||
|
HOW PASCHG WORKS
|
|||
|
~~~~~~~~~~~~~~~~
|
|||
|
A user may run the PASCHG program, which first prompts him for his current MPE
|
|||
|
user password (if he has one). The user must enter the correct password in
|
|||
|
order to change it--this protects against somebody walking up to a logged-on
|
|||
|
terminal while its real user is away and changing the password (although
|
|||
|
SECURITY/3000's LOGOFF program is a better solution to this problem.
|
|||
|
|
|||
|
After the user has correctly entered his current password, he is asked for a
|
|||
|
new password. After he enters the new password, he is asked to enter the same
|
|||
|
password again, to make sure that he did not enter it incorrectly the first
|
|||
|
time. If he enters a different password the second time, PASCHG assumes that
|
|||
|
he has made a typo and repeats the new password sequence.
|
|||
|
|
|||
|
Once the user has entered a new password (and entered the same password again,
|
|||
|
guaranteeing that it's the one he really wants), his password is changed.
|
|||
|
|
|||
|
A user is not allowed to use PASCHG to remove his own password, since the
|
|||
|
Account Manager might often want to require his users to have passwords;
|
|||
|
therefore, if the user hits <return> when asked for the new password, an error
|
|||
|
message will be printed and the password will remain unchanged.
|
|||
|
|
|||
|
PASCHG also forbids a user from changing his password to the same value, as
|
|||
|
that would defeat the purpose of changing the password.
|
|||
|
|
|||
|
|
|||
|
HOW TO SET UP PASCHG
|
|||
|
~~~~~~~~~~~~~~~~~~~~
|
|||
|
The PASCHG program is
|
|||
|
|
|||
|
PASCHG.PUB.SECURITY
|
|||
|
|
|||
|
Any user may :RUN it, and the easiest way to do this is to set up the UDC
|
|||
|
"PASCHG" so that a user may type just one word to invoke the program.
|
|||
|
|
|||
|
We recommend that you set the PASCHG UDC at the system level so that all users
|
|||
|
may run it:
|
|||
|
|
|||
|
:SETCATALOG CHGUDC.PUB.SECURITY, YOURUDCS.PUB.SYS; SYSTEM
|
|||
|
|
|||
|
That way, a user need merely type
|
|||
|
|
|||
|
:PASCHG
|
|||
|
|
|||
|
and the PASCHG system will be invoked.
|
|||
|
|
|||
|
Certainly, there are some HP3000 installations whose security systems operate
|
|||
|
in such a way that they don't want users changing their own passwords. A good
|
|||
|
example of this is when several people share a single user ID, and you don't
|
|||
|
want one of them to change their joint password (although for this kind of
|
|||
|
application, SECURITY/3000's security-by-session-name should be used.
|
|||
|
|
|||
|
If you don't want your people running PASCHG.PUB.SECURITY, simply put a
|
|||
|
lockword on this file or remove it entirely from the system. No other part of
|
|||
|
SECURITY/3000 depends on it, so all the other components of SECURITY/3000 --
|
|||
|
the Logon Security System, LOGOFF, OBSOL, TERMPASS, STREAMX, etc. -- will
|
|||
|
still function as well as always.
|
|||
|
|
|||
|
|
|||
|
EXAMPLE OF A PASCHG SESSION
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
A typical session with PASCHG might look like:
|
|||
|
|
|||
|
:PASCHG << a UDC that runs PASCHG.PUB.SECURITY >>
|
|||
|
|
|||
|
SECURITY/PASCHG Version 0.2 (VESOFT, Inc. (C) 1985)
|
|||
|
|
|||
|
Please enter your current user password: << user enters it >>
|
|||
|
|
|||
|
Please enter your new user password: << user enters 'FOO' >>
|
|||
|
Please enter the same password again: << 'FOO' again >>
|
|||
|
|
|||
|
Password changed.
|
|||
|
|
|||
|
Note that none of the password inputs are echoed; furthermore, if the user
|
|||
|
wanted to abort the change any time until he entered the new password the
|
|||
|
second time, he could do so by hitting <control-Y>.
|
|||
|
|
|||
|
|
|||
|
PASCHG/OBSOL INTERFACE
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
PASCHG works well with OBSOL, SECURITY/3000's MPE Password Obsolescence System
|
|||
|
since with PASCHG the Account Manager isn't burdened with having to change
|
|||
|
dozens of passwords at the end of every month. However, in order for OBSOL to
|
|||
|
"know" that a password has been changed with PASCHG, PASCHG has to be told to
|
|||
|
tell OBSOL that a change is being made.
|
|||
|
|
|||
|
If you run PASCHG.PUB.SECURITY with ;PARM=1, it will invoke OBSOL and tell it
|
|||
|
that the password is being changed.
|
|||
|
|
|||
|
So if you use OBSOL, your :PASCHG UDC ought to look like:
|
|||
|
|
|||
|
PASCHG
|
|||
|
RUN PASCHG.PUB.SECURITY;PARM=1
|
|||
|
|
|||
|
(whereas if you don't use OBSOL, the ';PARM=1' should be omitted). In fact,
|
|||
|
the OBSUDC.PUB.SECURITY UDC file, which contains all the UDCs relevant to
|
|||
|
OBSOL, contains this PASCHG UDC as well.
|
|||
|
|
|||
|
Note that when a user changes his own password, he is not allowed to change the
|
|||
|
obsolescence period and warning period (as is normally the case when an Account
|
|||
|
Manager changes a user's password). This is done because the Account Manager
|
|||
|
might not want users altering the obsolescence period, perhaps lengthening it
|
|||
|
to the point where passwords no longer have to be changed frequently.
|
|||
|
|
|||
|
Note: you may configure OBSOL to run PASCHG automatically when the user
|
|||
|
password is within its warning period (see OBSOL).
|
|||
|
|
|||
|
In addition, PASCHG may be invoked automatically from OBSOL so that if a user
|
|||
|
logs on and is warned that his password will expire, PASCHG will be run
|
|||
|
automatically to permit the user to change his password at that time. This can
|
|||
|
further automate the process of password maintenance because a user does not
|
|||
|
have to know what program to run, what UDC name to type, or whom to contact to
|
|||
|
get his password changed.
|
|||
|
|
|||
|
The following UDC may be used instead of OBSOLUDC to invoke the OBSOL system.
|
|||
|
As you can see, OBSOL will set a JCW which the UDC recognizes to run the PASCHG
|
|||
|
program. This UDC is stored as the file OBCHGUDC.PUB.SECURITY.
|
|||
|
|
|||
|
OBSLOGON
|
|||
|
OPTION LOGON, NOBREAK
|
|||
|
RUN OBSLOG.PUB.SECURITY
|
|||
|
IF SECURITYANSWER = 1 THEN
|
|||
|
BYE
|
|||
|
ELSE
|
|||
|
IF CHGUSERPASS = 1 THEN
|
|||
|
RUN PASCHG.PUB.SECURITY;PARM=1
|
|||
|
ENDIF
|
|||
|
ENDIF
|
|||
|
|
|||
|
|
|||
|
ENFORCING PASSWORD STANDARDS
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
You may configure PASCHG to edit passwords that your users specify for
|
|||
|
themselves. This editing may be used to enforce minimum password length in
|
|||
|
addition to specific alpha, alphanumeric and numeric character patterns. The
|
|||
|
edit characters used are similar to COBOL's. The 'edit pattern' is specified
|
|||
|
by adding a line to the file SECURMGR.PUB.SECURITY in the format:
|
|||
|
|
|||
|
PASCHG-EDIT=<edit pattern>
|
|||
|
|
|||
|
Where the <edit pattern> conforms to the following rules:
|
|||
|
|
|||
|
'X' is any alphabetic [a..z] or numeric [0..9]
|
|||
|
'A' is any alphabetic character
|
|||
|
'9' is any numeric character
|
|||
|
|
|||
|
For example:
|
|||
|
|
|||
|
PASCHG-EDIT=AXXX enforces 4 character minimum password length
|
|||
|
PASCHG-EDIT=AXXX9 enforces 5 character minimum password length
|
|||
|
one alpha, three alphanumeric, one numeric
|
|||
|
PASCHG-EDIT=AAAAAAAA enforces 8 character minimum password length
|
|||
|
all alpha
|
|||
|
|
|||
|
Regardless of what is specified by PASCHG-EDIT, as per valid MPE password
|
|||
|
format, the first character of the edit pattern will be assumed to be an 'A'
|
|||
|
(alpha) when editing the password input. If the new password is longer than
|
|||
|
the edit pattern specified in SECURMGR.PUB.SECURITY, those characters are not
|
|||
|
edited.
|
|||
|
|
|||
|
If no PASCHG-EDIT keyword is found in the SECURMGR.PUB.SECURITY
|
|||
|
file, PASCHG will use the default edit
|
|||
|
pattern of 'AXXX' indicating a
|
|||
|
minimum four character password.
|
|||
|
|
|||
|
|
|||
|
GETPASS: A PROCEDURE TO GET ONE'S OWN PASSWORD
|
|||
|
**********************************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
~~~~~~~~~~~~
|
|||
|
There is an unfortunate deficiency in MPE which forbids a user from retrieving
|
|||
|
his own passwords; this necessitates programmers who are building and
|
|||
|
:STREAMing streams from inside their programs to embed passwords into those
|
|||
|
programs, which makes the necessary (mandatory?) operation of changing
|
|||
|
passwords once in a while simply unfeasible. The user-callable procedure
|
|||
|
GETPASS is designed to remedy this state with it, any user is allowed to
|
|||
|
retrieve his own passwords (which is certainly not a security threat, as he
|
|||
|
needed to know them to sign on; also, for convenience, the system manager is
|
|||
|
allowed to retrieve the passwords of ANYBODY (for he is god anyway), and the
|
|||
|
account manager may retrieve the passwords of anybody in his account. Thus,
|
|||
|
with GETPASS a programmer can call WHO, find out his user, group, and account
|
|||
|
names, call GETPASS, and retrieve his passwords; then, it is easy to insert
|
|||
|
these passwords into the job card. Thus,a hard-to-maintain embedded passwords
|
|||
|
can be avoided.
|
|||
|
|
|||
|
GETPASS has the following parameters:
|
|||
|
|
|||
|
PARAMETER 1: USER - The user to get passwords for.
|
|||
|
2: ACCOUNT - The account to get passwords for.
|
|||
|
3: GROUP - The group to get passwords for.
|
|||
|
4: PASS-USER - The user password.
|
|||
|
5: PASS-ACCT - The account password.
|
|||
|
6: PASS-GROUP- The group password.
|
|||
|
7: ERR - FALSE = everything went OK; TRUE = security
|
|||
|
violation or nonexistent user, account,
|
|||
|
or group.
|
|||
|
|
|||
|
GETPASS needs to use privileged mode (PM) capability for its execution;
|
|||
|
however, it uses it in a safe fashion and has NEVER caused a system failure
|
|||
|
yet! Note that programs calling GETPASS need not be PREPed with PM capability;
|
|||
|
it must reside in an SL in a group and account containing PM capability (like
|
|||
|
SL.PUB.SYS). To add GETPASS to the system SL, you need merely do a CP\INDEX
|
|||
|
|
|||
|
GETPASS.PUB.SECURITY
|
|||
|
:HELLO MANAGER.SYS
|
|||
|
:SEGMENTER VX
|
|||
|
-SL SL Z@
|
|||
|
-USL GETPASS.PUB.SECURITY
|
|||
|
-ADDSL GETPASS
|
|||
|
-EXIT
|
|||
|
|
|||
|
GETPASS can be called from COBOL in the following way:
|
|||
|
USER PIC X(8).
|
|||
|
ACCOUNT PIC X(8).
|
|||
|
GROUP PIC X(8).
|
|||
|
PASS-USER PIC X(8).
|
|||
|
PASS-ACCOUNT PIC X(8).
|
|||
|
PASS-GROUP PIC X(8).
|
|||
|
ERROR PIC S9(4) COMP.
|
|||
|
.
|
|||
|
..
|
|||
|
|
|||
|
CALL "GETPASS" USING USER, ACCOUNT, GROUP, PASS-USER, PASS-ACCOUNT,
|
|||
|
PASS-GROUP,ERROR.
|
|||
|
IF ERROR IS NOT EQUAL TO 0 THEN << An error occurred >>
|
|||
|
DISPLAY "SECURITY VIOLATION OR BAD USER, ACCOUNT, OR GROUP"
|
|||
|
STOP RUN.
|
|||
|
|
|||
|
A real live example of a FORTRAN program calling GETPASS:
|
|||
|
$CONTROL NOSOURCE, USLINIT
|
|||
|
PROGRAM TEST GETPASS
|
|||
|
INTEGER USER(4), ACCT(4), GRUP(4), UPAS(4), APAS(4), GPAS(4)
|
|||
|
CHARACTER *8 BUSER, BACCT, BGRUP, BUPAS, BAPAS, BGPAS
|
|||
|
EQUIVALENCE (BUSER,USER),(BACCT,ACCT),(BGRUP,GRUP), (BUPAS,UPAS),(BAPAS,
|
|||
|
APAS),(BGPAS,GPAS)LOGICAL ERR
|
|||
|
DISPLAY "ENTER USER: "
|
|||
|
ACCEPT BUSER
|
|||
|
DISPLAY "ENTER ACCOUNT: "
|
|||
|
ACCEPT BACCT
|
|||
|
DISPLAY "ENTER GROUP: "
|
|||
|
ACCEPT BGRUP
|
|||
|
CALL GETPASS (USER, ACCT, GRUP, UPAS, APAS, GPAS, ERR)
|
|||
|
IF (ERR) DISPLAY "ERROR: SECURITY VIOLATION/BAD PARAMETER"
|
|||
|
IF (ERR) GOTO 10
|
|||
|
DISPLAY "USER PASSWORD=",BUPAS
|
|||
|
DISPLAY "ACCOUNT PASSWORD=",BAPA
|
|||
|
DISPLAY "GROUP PASSWORD=",BGPAS
|
|||
|
10 STOP
|
|||
|
END
|
|||
|
|
|||
|
|
|||
|
FILES IN THE SECURITY ACCOUNT
|
|||
|
*****************************
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
~~~~~~~~~~~~
|
|||
|
Lastly, I want to list some things you may see in your explorations. There are
|
|||
|
many interesting files to be found withing the SECURITY account. Here is a
|
|||
|
list and description of the common file you may find there:
|
|||
|
|
|||
|
|
|||
|
DATA group: Data files
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ANSSCHEM - Schema of the database ANSWER (might be used to increase
|
|||
|
database capacity; default is 500 records).
|
|||
|
ANSWER - IMAGE database which contains information about PERSONAL
|
|||
|
PROFILE LOGON IDs (one-way encrypted passwords, access
|
|||
|
restrictions, menu file names, etc.).
|
|||
|
LOG - Circular disc file to which all attempted security
|
|||
|
violations and security configuration changes are logged.
|
|||
|
LOGOFF - Specifies logical devices to be monitored and the length
|
|||
|
of inactivity required prior to a session being aborted.
|
|||
|
MEMOFORM - Memo format for attempted violation listings which may be
|
|||
|
customized to provide more or less detail.
|
|||
|
OBSSCHEM - Dbschema input file for the image database OBSOL.
|
|||
|
OBSOL - IMAGE database specifying the date by which MPE GROUP, USER
|
|||
|
and ACCOUNT passwords must be changed (warning period, too).
|
|||
|
QUESTION - During SECURITY/3000 logon the user must answer a question
|
|||
|
randomly selected from this file (built by user; personal
|
|||
|
profile questions are recommended).
|
|||
|
TERMPASS - Specifies logical devices which will be protected with
|
|||
|
passwords. Protection for dial-ups, DS lines, etc.
|
|||
|
|
|||
|
|
|||
|
DOC group: Documentation files
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ANORDER - Contains the DOC file names in the order in which they
|
|||
|
should be printed.
|
|||
|
CONTENTS - Table of contents for the SECURITY/3000 manual.
|
|||
|
FILES - Describes the files in the SECURITY account.
|
|||
|
GETPASS - Explains how to build job stream file in application
|
|||
|
programs without jeopardizing system security.
|
|||
|
HOW2LIST - Describes how to print the documentation files provided
|
|||
|
in the DOC group with the MPEX 'USER' command.
|
|||
|
INTRO - Overview of SECURITY/3000 package.
|
|||
|
LOGOFF - Explains why idle sessions are a security threat. Step
|
|||
|
by step instructions of how to configure logoff.
|
|||
|
NEWFEATR - New features in SECURITY/3000.
|
|||
|
OBSOL - Describes how the password obsolescence subsystem insures
|
|||
|
the frequent changing of MPE passwords.
|
|||
|
ONLINE - Describes the Logon Security System which protects against
|
|||
|
online logon access.
|
|||
|
PASCHG - User (not account manager) changeable passwords.
|
|||
|
REFS - List of SECURITY/3000 published references.
|
|||
|
STREAMX - Manual for STREAMX/3000 which provides batch access
|
|||
|
security and parameter passing to job streams.
|
|||
|
TERMPASS - Documentation of TERMPASS, which allows protection of
|
|||
|
logical devices (DS line, dial-in lines, console, etc).
|
|||
|
|
|||
|
|
|||
|
HELP group
|
|||
|
~~~~~~~~~~
|
|||
|
HELPMAKE - The stream to modify USER.HELP.SECURITY file.
|
|||
|
USER - The HELP file for SECURITY/3000.
|
|||
|
|
|||
|
|
|||
|
JOB group: Job streams
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
LOGOFF - Job stream which runs the program LOGOFF.PUB to monitor
|
|||
|
sessions' CPU usage and logoff idle terminals by LDEV.
|
|||
|
|
|||
|
|
|||
|
PAPERS group: Security-related papers
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
ANAHEIM - "BURN BEFORE READING - HP 3000 SECURITY AND YOU",
|
|||
|
HPIUG 1983, Anaheim, CA USA.
|
|||
|
COPNHAGN - "SECURITY/3000: A new approach to logon security",
|
|||
|
HPIUG 1982, Copenhagen, DENMARK.
|
|||
|
PROFILE - "PRODUCT PROFILE: SECURITY/3000",
|
|||
|
SUPERGROUP Association Newsletter, July 1982.
|
|||
|
|
|||
|
|
|||
|
PUB group: Program files, USLs, UDCs, etc.
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
FINDCAP - A program to list dangerously capabilitied users and show
|
|||
|
if they have an MPE password. QUITE handy...
|
|||
|
LOGOFF - Program which logs off idle sessions.
|
|||
|
OBSCHG - Password OBSOLescence database update program.
|
|||
|
OBSFILL - OBSOLescence data base initialization program.
|
|||
|
OBSLOG - MPE passwords obsolescence program.
|
|||
|
OBSOLUDC - Log-on UDC file for MPE passwords obsolescence subsystem.
|
|||
|
OBSUDC - UDC file for MPE passwords obsolescence subsystem.
|
|||
|
PASCHG - The program which lets users change their own password.
|
|||
|
QGALLEY - Program to format and print DOC files.
|
|||
|
SECURMGR - Control file containing SECURITY/3000 global parameters.
|
|||
|
SECURUDC - Log-on UDC file for users protected by SECURITY/3000.
|
|||
|
SECURUSL - USL file for the callable SECURITY procedure.
|
|||
|
SESSION - USL file for GETSESSION procedure.
|
|||
|
STREAMX - STREAMX/3000 program which provides batch access
|
|||
|
security and parameter passing to job streams.
|
|||
|
STRMSLEP - The SLEEPER/STREAMX interface program (see STREAMX.DOC).
|
|||
|
STRMUDC - UDC file containing a UDC to invoke STREAMX.
|
|||
|
TERMPASS - Program which verifies terminal (LDEV) passwords and/or
|
|||
|
interfaces with USER program for positive user identification
|
|||
|
TERMUDC - Log-on UDC file for users using TERMPASS.
|
|||
|
USER - The main SECURITY/3000 program.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Informatik Submission & Subscription Policy
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Informatik is an ongoing electronic journal, and thus we are faced with
|
|||
|
the ever present need for a steady influx of new material. If you have an
|
|||
|
area of interest or expertise that you would like to write about, please do
|
|||
|
not hesitate to contribute! We depend on reader submissions!! We do ask that
|
|||
|
any submissions fit the following guidelines...
|
|||
|
|
|||
|
General Content
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
Material for Informatik should concern information of interest to the
|
|||
|
computer underground community. Examples of this include, but are by no
|
|||
|
means limited to hacking and phreaking, governmental agencies, fraud,
|
|||
|
clandestine activity, abuse of technology, recent advances in computing
|
|||
|
or telecommunications technology, and other of information not readily
|
|||
|
available to the public. Please include a title and author name.
|
|||
|
|
|||
|
Text Format
|
|||
|
~~~~~~~~~~
|
|||
|
* standard ASCII test
|
|||
|
* 79 characters per line
|
|||
|
* no TAB codes
|
|||
|
* no special or system specific characters
|
|||
|
* mixed case type
|
|||
|
* single spaced, double space between paragraphs
|
|||
|
* no pagination
|
|||
|
|
|||
|
News submissions
|
|||
|
~~~~~~~~~~~~~~~
|
|||
|
* Submit only recent news items
|
|||
|
* Include the headline or title of the article
|
|||
|
the author's name (if given)
|
|||
|
the publication of origin
|
|||
|
the date of publication
|
|||
|
* Don't submit news that has appeared in other e-text journals
|
|||
|
|
|||
|
Subscription policy
|
|||
|
~~~~~~~~~~~~~~~~~~
|
|||
|
We are happy to provide an Internet based subscription service to our
|
|||
|
readers. To be on our mailout list, send mail to our Internet address,
|
|||
|
"inform@grind.cheme.cmu.edu" and include the word subscription in the
|
|||
|
subject of your message. If you requested a subscription before, you need
|
|||
|
to reply again, because the old subscription list was deleted by MH.
|
|||
|
|
|||
|
Back Issues
|
|||
|
~~~~~~~~~~
|
|||
|
Back issues of Informatik are available via ftp at ftp.eff.org in the
|
|||
|
/pub/cud/inform directory. The site also contains a plethora of other
|
|||
|
electronic texts of interest to the "computer underground" community including
|
|||
|
Phrack, NIA, PHUN, and the LOD tech journals.
|