3700 lines
173 KiB
Plaintext
3700 lines
173 KiB
Plaintext
+=============================================================================+
|
||
| ## ## ## ###### ###### ###### ### ### ###### ###### ## ## ## |
|
||
| ## ### ## ## ## ## ## ## ## ## ## ## ## ## ## ## ## |
|
||
| ## ## ### ##### ## ## ###### ## ## ###### ## ## #### |
|
||
| ## ## ## ## ###### ## ## ## ## ## ## ## ## ## ## |
|
||
+=============================================##==============================+
|
||
| Oct 31, 1992|
|
||
| [ The Journal of Privileged Information ] |
|
||
| |
|
||
+-----------------------------------------------------------------------------+
|
||
| Issue 05 By: 'Above the Law' |
|
||
+-----------------------------------------------------------------------------+
|
||
| |
|
||
|Informatik--Bringing you all the information you should know... |
|
||
| and a lot you shouldn't... |
|
||
| |
|
||
+=============================================================================+
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
*DISCLAIMER*
|
||
Informatik Journal is printed for informational purposes only. We
|
||
do not recommend or condone any illegal or fraudulent application of
|
||
the information found in this electronic magazine. As such, we
|
||
accept no liability for any criminal or civil disputes arising from
|
||
said information.
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
|
||
===========================================
|
||
============== - CONTENTS - ===============
|
||
================ Issue 05 =================
|
||
======= Release date Oct 31, 1992 ========
|
||
===========================================
|
||
|
||
|
||
01) Issue #5 Introduction
|
||
By: Informatik Staff
|
||
|
||
02) X-Mas Con 1992 Announcement
|
||
By: DrunkFux
|
||
|
||
04) Locks and Physical Security
|
||
By: Sterling
|
||
|
||
05) USSS Frequency Guide
|
||
By: Miles Barkman
|
||
|
||
06) Cellular Update
|
||
By: The US Congress
|
||
|
||
07) The HP3000's 'SECURITY/3000' system (part 3)
|
||
By: Sterling
|
||
|
||
08) Informatik Submission & Subscription Policy
|
||
By: Informatik Staff
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
/* Introduction */
|
||
|
||
|
||
Happy Halloween and welcome to the 5th issue of the Informatik
|
||
Journal. Though still suffering the slings and arrows of higher
|
||
education, we have again managed to crank out an issue. Unfortunately we
|
||
are still having a very poor response to our call for submissions. Come
|
||
on! Contribute it. Even if you aren't an expert, we can all benefit from
|
||
a little research on your part. Just head on out to the local library,
|
||
find something interesting, and research it into a nice, informative
|
||
article. We welcome information on the government, radio, computer
|
||
hacking, preaking, and anything else of interest to the "computer
|
||
underground" crowd. Even if you are not a writer, we welcome any feedback
|
||
you may have concerning informatik. Speaking of which, WE HAVE MOVED
|
||
SHOP! Thanks to our pals in Pittsburgh, we now have a new home:
|
||
(inform@grind.cheme.cmu.edu) All subscription requests, feedback, etc,
|
||
should be sent to that address. The old address is no longer valid, so
|
||
any correspondance to our previous address has long since entered the
|
||
cyber void.
|
||
|
||
The bulk of this issue (135k!!) is devoted to an article on Security
|
||
Devices that is the most complete guide to locks, lockpicking, and
|
||
security systems available to date. It should prove interesting to you
|
||
all. In other news XMAS CON IS COMING! The whole staff of Informatik
|
||
will be there, as will plenty of other interesting characters. Be there,
|
||
its always interesting. Radio scanners need to check out the new
|
||
collection of Secret Services frequencies and information on the latest,
|
||
greatest cellular interception restrictions. And wrapping it up, we have
|
||
the third and final part our series on The HP3000's 'SECURITY/3000' system.
|
||
|
||
We've been asked to pass along that a bbs has been set up on 128.2.55.27
|
||
for those of you with internet access. Simply logon as bbs.
|
||
|
||
Informatik staff currently consists of Sterling, and MackHammer
|
||
(between naps), with additional assistance provided by Live0ne and
|
||
Holistic. If you are interested in working with the staff, drop us a
|
||
line.
|
||
|
||
Enjoy,
|
||
|
||
Informatik Staff
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
[Updated Announcement - October 27, 1992]
|
||
|
||
dFx International Digest and cDc - Cult Of The Dead Cow proudly present :
|
||
|
||
|
||
The Third Annual
|
||
|
||
X M A S C O N
|
||
|
||
AKA
|
||
|
||
H 0 H 0 C O N
|
||
|
||
|
||
"WE KAN'T BE ST0PPED!"
|
||
|
||
|
||
Who: All Hackers, Journalists, Security Personnel, Federal Agents,
|
||
Lawyers, Authors and Other Interested Parties.
|
||
|
||
|
||
Where: Allen Park Inn
|
||
2121 Allen Parkway
|
||
Houston, Texas 77019
|
||
U.S.A.
|
||
Tel: (800) 231-6310
|
||
Hou: (713) 521-9321
|
||
Fax: (713) 521-9321, Ext. 350
|
||
|
||
|
||
When: Friday December 18 through Sunday December 20, 1992
|
||
|
||
|
||
|
||
HoJo's Says NoNo To HoHo
|
||
~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
HAY!^@!*%!$1#&! We beat our own record! This year, thanks to one
|
||
certain person's complete stupidity and ignorance, we managed to get
|
||
kicked out of our first chosen hotel four months in advance. Needless
|
||
to say, this caused some serious confusion for those who called to
|
||
make reservations and were told the conference had been canceled.
|
||
Well ... it hasn't been. The story is long, but if you wish to read
|
||
exactly what happened, check out CuD 4.45.
|
||
|
||
The conference dates are still the same, but the hotel has changed
|
||
since what was originally reported in the first update, which made
|
||
it's way throughout Usenet and numerous other places, including CuD
|
||
4.40. If you haven't heard about the new location, please make a note
|
||
of the information listed above.
|
||
|
||
|
||
What Exactly Is HoHoCon?
|
||
~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
HoHoCon is something you have to experience to truly understand. It is
|
||
the largest annual gathering of those in, related to, or wishing to
|
||
know more about the computer underground (or those just looking for
|
||
another excuse to party). Attendees generally include some of the most
|
||
notable members of the "hacking/telecom" community, journalists,
|
||
authors, security professionals, lawyers, and a host of others. Last
|
||
year's speakers ranged from Bruce Sterling to Chris Goggans and Scot
|
||
Chasin of Comsec/LoD. The conference is also one of the very few that
|
||
is completely open to the public and we encourage anyone who is
|
||
interested to attend.
|
||
|
||
Or, as Jim Thomas put it in CuD 4.45:
|
||
|
||
"For the past few years, a conference called "XmasCon" (or HoHoCon)
|
||
has been held in Texas in December. As reported previously (CuD
|
||
#4.40), it will be held again this year from 18-21 December. For those
|
||
unfamiliar with it, XmasCon is a national meeting of curious computer
|
||
aficionados, journalists, scholars, computer professionals, and
|
||
others, who meet for three days and do what people do at other
|
||
conferences: Discuss common interests and relax."
|
||
|
||
|
||
Hotel Information
|
||
~~~~~~~~~~~~~~~~~
|
||
|
||
The Allen Park Inn is located along Buffalo Bayou and is approximately
|
||
three minutes away from downtown Houston. The HoHoCon group room rates
|
||
are $49.00 plus tax (15%) per night, your choice of either single or
|
||
double. As usual, when making reservations you will need to tell the
|
||
hotel you are with the HoHoCon Conference to receive the group rate.
|
||
|
||
Unlike our previously chosen joke of a hotel, the Allen Park Inn is
|
||
not situated next to an airport and this may cause a small
|
||
inconvenience for those of you who will be flying to the conference.
|
||
The hotel is centrally located so you can fly in to either
|
||
Intercontinental or Hobby airport but we are recommending Hobby as it
|
||
is 15 miles closer and much easier to get to from the hotel. Here's
|
||
where it may get a little confusing:
|
||
|
||
If you arrive at Hobby, you will need to take the Downtown Hyatt
|
||
Airport Shuttle to the Hyatt, which departs every 30 minutes and will
|
||
cost you $6.00. When you get to the Hyatt, get out of the shuttle with
|
||
your luggage (for those who may not of figured that out yet) and use
|
||
any of the nearby payphones to call the Allen Park Inn (521-9321) and
|
||
tell them you need a ride. It's just like calling Mom when you need a
|
||
ride home from glee club! The hotel shuttle will be around shortly to
|
||
pick you up and take you to the aforementioned elite meeting place,
|
||
and that ride is free. If all this is too much for you, you can always
|
||
take a cab directly to the hotel which will run you about $20.
|
||
|
||
If you arrive at Intercontinental, you will need to board the Airport
|
||
Express bus and take it to the Downtown Hyatt ($9). Once there, just
|
||
follow the same instructions listed above.
|
||
|
||
We are in the process of trying to get the hotel to provide constant
|
||
airport transportation during the conference, but they've yet to give
|
||
us a definite answer. It is quite possible that we will have our own
|
||
shuttle to bus people between the airports and hotel, so if you'd
|
||
prefer a faster and more direct method of transportation, it would be
|
||
helpful to mail and let us know what time you'll be arriving and at
|
||
what airport. This will give us a chance to coordinate things more
|
||
efficiently.
|
||
|
||
Check-in is 3:00 p.m. and check-out is 12:00 noon. Earlier check-in is
|
||
available if there are unoccupied rooms ready. Free local calls are
|
||
provided, so bring dem 'puterz. I don't know if cable is free also, so
|
||
those who wish to rekindle the memories of yesteryear may want to
|
||
bring their screwdrivers. The hotel has both 24 hour room service, and
|
||
a 24 hour restaurant, The Nashville Room. Call it a wacky coincidence,
|
||
but the hotel bar is called the ATI room and like most of Houston's
|
||
similar establishments, closes at 2 a.m. Good thing Tony still works
|
||
at Spec's ...
|
||
|
||
This time around, the hotel is placing the conference guests in the
|
||
rooms surrounding the courtyard/pool area. We are once again
|
||
encouraging people to make their reservations as soon as possible for
|
||
two reasons -- first, we were told that if you wait too long and the
|
||
courtyard rooms are all taken, there is a chance that you'll be
|
||
situated at the complete opposite end of the hotel, which isn't so bad
|
||
if you don't mind walking all that way back and forth outside in
|
||
December. Secondly, there is no other hotel exactly next door to this
|
||
one (the closest is about five minutes away or so), so if for some odd
|
||
reason all the rooms get rented, you'll get to do some nifty traveling
|
||
every night.
|
||
|
||
Directions
|
||
~~~~~~~~~~
|
||
|
||
For those of you who will be driving to the conference, the following
|
||
is a list of directions on how to get to the hotel from most of
|
||
Houston's major freeways that bring traffic in from out of town:
|
||
|
||
I-45 North or South: Exit Allen Parkway on the inside (left side) of
|
||
the freeway. Take the Studemont/Montrose exit off Allen Parkway, then
|
||
make a u-turn at the bridge and head back towards downtown. The hotel
|
||
will be on the right hand side.
|
||
|
||
290: Take 290 to 610 South, then take I-10 East towards downtown. Exit
|
||
Studemont. Right on Studemont, left on Allen Parkway. The hotel will
|
||
be on the right hand side.
|
||
|
||
I-10 West: Exit Studemont. Right on Studemont, left on Allen Parkway.
|
||
The hotel will be on the right hand side.
|
||
|
||
I-10 East: Take I-10 East to I-45 South and follow the same directions
|
||
from I-45 listed above.
|
||
|
||
I-59 North or South: Take I-59 to I-45 North and follow the same
|
||
directions from I-45 listed above.
|
||
|
||
Call the hotel if these aren't complete enough or if you need
|
||
additional information.
|
||
|
||
|
||
Conference Details
|
||
~~~~~~~~~~~~~~~~~~
|
||
|
||
HoHoCon will last three days, with the actual conference being held on
|
||
Saturday, December 19 in the Hermitage Room, starting at 11:00 a.m.
|
||
and continuing until 5 p.m. or earlier depending on the number of
|
||
speakers.
|
||
|
||
We are still in the planning stages at the moment, primarily due to
|
||
time lost in finding a new hotel and getting contracts signed. We have
|
||
a number of speakers confirmed (yes, Goggans will be speaking again)
|
||
and will try to finalize the list and include it in the next update.
|
||
We are definitely still looking for people to speak and welcome
|
||
diverse topics (except for "The wonders and joys of ANSI, and how it
|
||
changed my life"). If you're interested in rattling away, please
|
||
contact us as soon as possible and let us know who you are, who you
|
||
represent (if anyone), the topic you wish to speak on, a rough
|
||
estimate of how long you will need, and whether or not you will be
|
||
needing any audio-visual aids.
|
||
|
||
We would like to have people bring interesting items and videos again
|
||
this year. If you have anything you think people would enjoy having
|
||
the chance to see, please let us know ahead of time, and tell us if
|
||
you will need any help getting it to the conference. If all else
|
||
fails, just bring it to the con and give it to us when you arrive. We
|
||
will also include a list of items and videos that will be present in a
|
||
future update.
|
||
|
||
If anyone requires any additional information, needs to ask any
|
||
questions, wants to RSVP, or would like to be added to the mailing
|
||
list to receive the HoHoCon updates, you may mail us at:
|
||
|
||
dfx@nuchat.sccsi.com
|
||
drunkfux@freeside.com
|
||
drunkfux@ashpool.freeside.com
|
||
359@7354 (WWIV Net)
|
||
|
||
or via sluggo mail at:
|
||
|
||
Freeside Data Network
|
||
Attn: HoHoCon/dFx
|
||
11504 Hughes Road
|
||
Suite 124
|
||
Houston, Texas
|
||
77089
|
||
|
||
We also have a VMB which includes all the conference information and
|
||
is probably the fastest way to get updated reports. The number is:
|
||
|
||
713-866-4884
|
||
|
||
You may also download any of the conference announcements and related
|
||
materials by calling 713-492-2783 and using the username "unix", which
|
||
is unpassworded. The files will be in the "hohocon" directory. Type
|
||
"biscuit" if you wish to gain an account on the system. You can find
|
||
us there too.
|
||
|
||
Conference information and updates will most likely also be found in
|
||
most computer underground related publications, including CuD,
|
||
Informatik, NIA, Mondo 2000, 2600, Phrack, World View, etc. We
|
||
completely encourage people to use, reprint, and distribute any
|
||
information in this file.
|
||
|
||
|
||
Stupid Ending Statement To Make Us Look Good
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
HoHoCon '92 will be a priceless learning experience for professionals
|
||
(yeah, right) and gives journalists a chance to gather information and
|
||
ideas direct from the source. It is also one of the very few times
|
||
when all the members of the computer underground can come together for
|
||
a realistic purpose. We urge people not to miss out on an event of
|
||
this caliber, which doesn't happen very often. If you've ever wanted
|
||
to meet some of the most famous people from the hacking community,
|
||
this may be your one and only chance. Don't wait to read about it in
|
||
all the magazines and then wish you had been there, make your plans to
|
||
attend now! Be a part of what we hope to be our largest and greatest
|
||
conference ever.
|
||
|
||
Remember, to make your reservations, call (800) 231-6310 and tell them
|
||
you're with HoHoCon.
|
||
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
*********************************************
|
||
*********************************************
|
||
** **
|
||
* Locks and Physical Security Devices *
|
||
* *
|
||
* by Sterling *
|
||
** **
|
||
*********************************************
|
||
*********************************************
|
||
|
||
|
||
|
||
|
||
Introduction
|
||
------------
|
||
|
||
Ever since man has had something worth keeping, he has devised ways to
|
||
protect it. The Egyptians were the first to develop a working lock of any
|
||
complexity. It was based on a flat, wooden "key" with a series of raised pins
|
||
that enable the user to slide back a wooden bolt that protected the door from
|
||
entry. Advances in metallurgy eventually brought forth locks of iron.
|
||
|
||
As locks became more complex, the great medieval locksmiths' guilds
|
||
carefully guarded their secrets. Restrictions forbid the guild's members from
|
||
discussing the relatively simple inner workings of locks for fear of losing
|
||
their power. By protecting their secrets, the locksmiths were able to exploit
|
||
their unique skills, charging outlandish sums for their services.
|
||
|
||
The same principles apply today. That is why a locksmith can charge you
|
||
$60 to come and unlock the door to your house. Americans spend millions each
|
||
year on security systems to protect their property. Often this money is wasted
|
||
on devices that really provide only limited protection. In this text I would
|
||
like to expose how locks and security systems work, and how you can bypass them
|
||
if needed.
|
||
|
||
It is easy to lose faith in the common door lock once you understand its
|
||
simple operation. It took me less than a week with my lock picks before I
|
||
could open my front door. Any first timer can open a desk or filing cabinet
|
||
after achieving a basic understanding of the principles of modern locks.
|
||
Hopefully this article will expose to more people just how unsecure locks can
|
||
be, and with practice you should be able to pick your way into your house
|
||
should the need arise.
|
||
|
||
The content of the article comes from a wide variety of sources. Personal
|
||
experience, excerpts and summaries from the "alt.locksmithing" newsgroup, and
|
||
from locksmithing and lockpicking books. Special thanks goes out to *Hobbit*
|
||
for his simplex and hotel lock articles.
|
||
|
||
There are several types of locks that you are likely to encounter. These
|
||
locks are easy to spot and identify what you know what to look for. Here I
|
||
will discuss everything from the seldom used "warded lock" to alarm systems.
|
||
|
||
|
||
Table of Contents:
|
||
------------------
|
||
|
||
Key Operated Locks
|
||
Latches
|
||
The Warded Lock
|
||
The Lever Lock
|
||
The Wafer (Disc) Tumbler Lock
|
||
The Pin Tumbler Lock
|
||
Tubular Cylinder Locks
|
||
|
||
Lockpicking Tools
|
||
The Basic Picks
|
||
Making Your Own Picks
|
||
Purchasing Picks
|
||
|
||
Attitude and Tips for Success
|
||
|
||
Other Security Devices
|
||
Combination Locks
|
||
Magnetic Locks
|
||
Simplex Locks
|
||
Automotive Protection Systems
|
||
The Marlock System
|
||
VingCard Locks
|
||
Electronic Hotel Card Locks
|
||
Alarm Systems
|
||
|
||
|
||
|
||
Type of Latches
|
||
~~~~~~~~~~~~~~~
|
||
The latch is a spring bolt that actually holds the door shut. This is in
|
||
contrast to the deadbolt, that had NO spring, and must be manually engaged.
|
||
There are two primary types of latches, the springlatch and the deadlatch.
|
||
|
||
The springlatch is much more convenient, when the door is shut, the
|
||
springlatch springs into place, locking the door shut. This is the type of
|
||
latch found on most key-in-knob type door locks. The problem with the
|
||
springlatch is that it is easily defeated by sliding a plastic card or thin
|
||
knife and forcing it back. To prevent this, a latch guard can be installed.
|
||
This is a device constructed from heavy steel folded lengthwise at a ninety
|
||
degree angle or a T-bar shape. It is usually anywhere from six to twelve
|
||
inches in length and is fastened to the edge of the door by bolts. The latch
|
||
guard hides the latchbolt, and prevents any tampering with it.
|
||
|
||
The deadlatch cannot be shoved open like the unprotected springlatch can.
|
||
When the door is closed, the latch bolt is secure in the lock position and acts
|
||
as a deadbolt (a bolt that is not spring loaded, and resists any end pressure).
|
||
The deadlatch resembles a smaller, beveled bolt projecting from the latchbolt.
|
||
On some designs, the deadlatch takes the shape of an additional bolt, somewhat
|
||
smaller, and usually placed higher up on the lock body. A key or interior
|
||
locking mechanism must be used to engage the deadlatch and lock the door.
|
||
|
||
|
||
|
||
The Warded Lock
|
||
~~~~~~~~~~~~~~~
|
||
The warded lock's basic design was created by the ancient Romans. The
|
||
basic principle behind its operation is a series of "wards" (projecting
|
||
obstructions) that prevent all but the proper cut key from being rotated inside
|
||
the lock. These obstructions have been placed in the path of the turning of
|
||
the bit portion of the key. This type of lock utilizes a key that has been
|
||
notched in a way that it clears all the wards, but is still able to turn the
|
||
bolt. These locks are easy to recognize. They are the "classic" antique lock
|
||
that you may still find in old houses.
|
||
|
||
|
||
_______ blade (stem) ##### handle (bow)
|
||
/ \ ########
|
||
| | ################################# ##
|
||
\ / ################################# ##
|
||
| | #### ### ########
|
||
/ \ #### ### #####
|
||
/ \ ####
|
||
/ \ bit a warded key for a two-ward lock
|
||
/___________\
|
||
|
||
warded key lock entrance
|
||
|
||
|
||
|
||
The number of wards in the lock can vary, but normally two is the minimum.
|
||
When a user inserts a key into the warded lock, the metal obstructions inside
|
||
the lock allow only the proper key to be inserted. The key bittings allow the
|
||
key to turn in a circular motion, opening the lock through one of four
|
||
different mechanisms:
|
||
|
||
1) The key lifts a detent lever while throwing the bolt, providing
|
||
deadbolt action. (Deadbolt action means that the bolt is secure
|
||
against end pressure.)
|
||
|
||
2) The key moves a bolt whose locked or unlocked position is maintained
|
||
by the action of a humped flat spring in two notches on the bolt.
|
||
|
||
3) The key moves directly against the latch tail of a latchbolt, or does
|
||
so through the action of a floating lever.
|
||
|
||
4) The key inserts between two springs and wedges them apart as it is
|
||
turned. (Usually only in warded padlocks)
|
||
|
||
Picking
|
||
|
||
These locks offer only token security to the user. Besides being easy to
|
||
circumvent, the warded locks offers only about fifty alternate keying
|
||
combinations. Picking them is generally regarded as trivial. All that is
|
||
required is to bypass the wards and move the bolt into the unlocked position.
|
||
This can be accomplished by using a pick known as a "buttonhook". To make your
|
||
own buttonhook pick, use a pair of pliers to bend a six inch section of coat
|
||
hanger into a warded key shape as below:
|
||
|
||
########
|
||
### ##
|
||
################################# ##
|
||
# ## ##
|
||
### ## #
|
||
#####
|
||
|
||
The wire should be thin enough to pass into the keyway while avoiding all
|
||
the wards, but stiff enough that it can still manipulate the bolt to open the
|
||
lock. Though you may have to make a "large" and a "small" warded lock pick,
|
||
the same principle applies.
|
||
|
||
|
||
The Lever Lock
|
||
~~~~~~~~~~~~~~
|
||
Robert Barron invented the lever lock in 1778. This constituted a
|
||
considerable improvement over the ancient warded lock. It was based on a
|
||
series of several "levers" that must each be raised to their own set height.
|
||
If a particular lever was lifted to high or not enough, then the lock would not
|
||
open. When the proper key is inserted, the notches on the key raise all the
|
||
lever tumblers the required distance, lining up all the gates, allowing the
|
||
lock to be opened. Not only was this new lock much harder to pick, it offered
|
||
up to ten billion possible keying combinations. (The amount of practical
|
||
combinations is actually around fifty thousand)
|
||
|
||
|
||
#####
|
||
__ #######
|
||
/ \ ## ### #### ## ########### ##
|
||
\ / ###### ####### ########### ##
|
||
| | a lever or "lever tumbler" ########################### ##
|
||
| | lock keyhole #######
|
||
|__| ####
|
||
|
||
a lever tumbler lock key
|
||
|
||
|
||
Since its design the lever tumbler lock has undergone numerous
|
||
improvements. One of the is called the parautopic lock. The parautopic lock
|
||
consisted of two sets of lever tumbler, where the first worked on the second.
|
||
It also proved a plate that turned with the key so that one could not inspect
|
||
the locks interior construction. Lever locks, though limited in use, can still
|
||
be found today in some hospitals, suitcases, cabinets, fine furniture, and
|
||
attache cases. Lever locks are also used on safe-deposit boxes, often with
|
||
fifteen or more levers and sometimes requiring two keys.
|
||
|
||
Picking
|
||
|
||
Lever locks are a little harder to pick then the wafer and pin tumbler
|
||
variety. In fact, the type of lever locks used on safe-deposit boxes are very
|
||
difficult to pick indeed. To pick a lever lock requires that tension be placed
|
||
against the deadbolt throughout the course of lifting one or more levers within
|
||
the lock to the required alignment with the post. This requires the use of a
|
||
"lever lock tension wrench" and a "hook" or "lifter" pick. [Picks are
|
||
discussed later in the Lockpicking Tools section.]
|
||
|
||
Insert the lever lock tension wrench (a bit different than a normal
|
||
tension wrench) into the keyway, and exert torsional pressure. The long bit is
|
||
the part you hold, the next bend runs to the bottom of the lock, and the final
|
||
bend fits into the notch in the bolt. Unlike most other types of locks, the
|
||
lever locks requires you to exert considerable pressure on the tension wrench
|
||
while picking. Usually the lever springs provide enough force to cause the
|
||
levers to drop back down once picked. Because of the greater pressure, lever
|
||
locks may require a slightly thicker tension wrench then normal.
|
||
|
||
Then insert the hook pick all the way into the lock. Locate the back
|
||
lever and raise it gently until you FEEL or HEAR a slight "click". With the
|
||
lever locks, the force required to push against the spring is substantially
|
||
more than in other locks. Once it reaches the correct position, the gate will
|
||
align with the post, and you should notice a slight "give" in the deadbolt, as
|
||
there is now one less lever obstructing the lock from opening. You should note
|
||
that once a lever has been picked, the amount of force required to lift that
|
||
lever will be substantially less.
|
||
|
||
Move on to the next lever by slightly withdrawing the pick and repeat the
|
||
process. Each subsequent lever will require the use of slightly less tension
|
||
then on the previous ones. Otherwise the increased tension could cause the
|
||
lock to bind up.
|
||
|
||
Once you have picked each individual lever, the lock should open. If it
|
||
does not, then reinsert the pick (always maintaining tension with your wrench)
|
||
and jiggle each lever slightly to ensure correct alignment.
|
||
|
||
Each lever does not require very much lift. This is due to the fact that
|
||
the maximum depth of the cut under any tumbler is no more than half the width
|
||
of the key, and never more than two-thirds its width. You should therefore use
|
||
a pick that does not have too much "hook" to it.
|
||
|
||
|
||
The Wafer Tumbler Lock
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
The wafer tumbler lock was developed as a low-cost lock that offered a
|
||
reasonable degree of security to the owner. These locks are make up over
|
||
one-fourth of all the locks in the world. The outside of the lock resembles
|
||
the pin tumbler lock (yet to be discussed), but uses a much simpler mechanism.
|
||
Wafer keyways usually have simple side ward indentions. The key is usually
|
||
shorter than that of other locks, but equally broad. It may be cut on one or
|
||
both sides. A two sided wafer lock is often called a "double wafer." The lock
|
||
consists of four main parts. The plug housing, which contains the wafers and
|
||
springs, the shell, the cam (locking bolt), and the retainer. The wafers are
|
||
sometimes referred to as "discs" because their top and bottom are rounded to
|
||
fit into the cylinder. Here is a diagram:
|
||
|
||
|
||
|
||
5
|
||
___ 7 | ___
|
||
||############## 1-> @| _ |_
|
||
## ||## ## ## ## ## @||2||/
|
||
6##||##4##3##2##1## <-keyway @||_||
|
||
## ||## ## ## ## ## \|___|
|
||
___||############## 3
|
||
|
|
||
\plug/ detail of a wafer tumbler
|
||
|
||
cutaway side view 1) spring
|
||
of a wafer lock 2) key slot
|
||
3) spring wing
|
||
|
||
1-4) spacings #1-4
|
||
5) cam (operates the bolt)
|
||
6) retainer (rear plug)
|
||
7) the shell (body of the lock)
|
||
|
||
|
||
Each lock has a series of chambers in which the wafers rest. These
|
||
spacing closest to the front of the lock is numbered with one, and their
|
||
numbers increase toward the back of the lock. Picture a number of the wafers
|
||
placed face-to-face in the plug's spacing chambers. Each wafer is equal in
|
||
overall size, but the key slots are of varying height. A metal spring exerts
|
||
pressure on the spring wing of each wafer, forcing its lower part into the
|
||
shell's "locking grooves" which lets the lower portion hang about midway into
|
||
the keyway. Looking into the lock, you should be able to see this. These
|
||
wafers act to hold the plug and shell together, preventing the lock from
|
||
turning.
|
||
|
||
When the correct key is inserted, it goes through the key slots on each
|
||
wafer, raising the wafers out of the locking groove. The key must have the
|
||
appropriate depth of cut in each position to raise the wafer the correct
|
||
amount. The depth of the key's cut (and the length of the wafer's key slot) is
|
||
any one of five different depths. The shorter the top edge of the wafer's key
|
||
slot, the lower the key cut depth value. For instance the number 1 slot (the
|
||
slot that is the largest) would require the shallowest cut in the key.
|
||
Normally lock manufacturers place a number four or five wafer near the keyhole
|
||
to block the view of the back wafers. Also note that the same type of wafer
|
||
may appear several times in the same lock.
|
||
|
||
Above some brands of wafer tumbler lock you will see a small hole. When
|
||
the lock has been unlocked, you can remove the entire lock plug by inserting a
|
||
piece of stiff wire into this hole and depressing the retainer. Though nowhere
|
||
near as secure as the pin tumbler lock, the wafer tumbler is a very popular,
|
||
low cost lock. The lock is normally found on cheaper cabinets and desks, some
|
||
padlocks, some automobile locks, locking handles, and trailer doors. Where
|
||
more security is desired, the double wafer type is used, providing wafers on
|
||
the top and bottom of the keyway.
|
||
|
||
Picking
|
||
|
||
Though harder to pick then the warded lock, the wafer lock is still easy
|
||
to circumvent. This is an excellent lock to practice on because the techniques
|
||
required to pick it are applicable to the pin tumbler lock as well. Like the
|
||
lever lock, picking the wafer tumbler lock requires use of a tension wrench and
|
||
a pick. A variety of the different picks can be used including the rake, the
|
||
hook, the half-diamond, and the half-round pick. Selection depends on the size
|
||
of the lock, the distance between each wafer, and personal preference.
|
||
|
||
Raking
|
||
|
||
One of the most common methods of picking the wafer tumbler lock is by
|
||
raking. To rake the lock, insert the tension wrench is inserted just inside
|
||
the keyway, stopping short of the first wafer, and flush with the bottom of the
|
||
keyway. Apply moderate tension to the wrench. If you apply too much tension
|
||
the wafers will bind and not be able to move into alignment. Once you have the
|
||
tension wrench in place, insert either the rake or half-round pick into the
|
||
keyway. Don't worry about feeling the tumblers, instead concentrate on
|
||
applying uniform pressure to them as you move the rake in and out of the keyway
|
||
in a scrubbing motion. This scrubbing motion should cause the wafers to lift
|
||
into alignment as they are thrown up and down in their spacings. This method
|
||
is usually quite effective on most wafer locks, and should always be tried
|
||
first.
|
||
|
||
Manipulating Individual Wafers
|
||
|
||
If the lock does not respond to raking, you can try using the half-diamond
|
||
pick to each wafer into alignment one-by-one. While maintaining light but
|
||
consistent pressure with the tension wrench, use the pick to lift each wafer
|
||
into alignment at the shear line, starting from the backmost tumbler. Once it
|
||
reaches the proper alignment, you should feel or hear a slight "click" and the
|
||
plug will turn ever so slightly, relieving a bit of pressure on the wrench.
|
||
Continue one-by-one, working outward, until each tumbler has been aligned and
|
||
the lock opens.
|
||
|
||
Vibration Picking
|
||
|
||
Often you can use a technique called vibration picking to open a wafer
|
||
tumbler lock. This uses a tool known as a "snapper" pick or a "lockpick gun".
|
||
[These are described in the Lockpicking Tools section of this article] To use
|
||
the snapper pick maintain a light tension with the wrench and insert the tip of
|
||
the pick into the keyway, just touching the bottom of the tumblers. Then use
|
||
the thumb, which rests along the top edge of the pick to depress the top loop.
|
||
Let the thumb slide off the compressed part of the pick, permitting it to snap
|
||
back. It will then strike a light blow to the tumblers, popping them up until
|
||
they are held in place at the shear line. Repeated snaps, while maintaining
|
||
tension with the wrench, usually results in aligning all the tumblers, and thus
|
||
opening the lock. The lockpick gun works automatically, with a trigger device
|
||
that "snaps" its wire pick up in the keyway.
|
||
|
||
Picking Double Wafer Locks
|
||
|
||
Double Wafer locks are picked the same way as single wafer locks, but
|
||
there two sides to the story. Not only must you align all the top wafers, but
|
||
the bottom ones as well. You can purchase special designed tension wrenches
|
||
with will let you then use a ball pick to pick both sets of wafers.
|
||
Alternatively you can use a standard tension wrench in the center of the
|
||
keyway, using a half diamond pick. Once you have picked one set, simply
|
||
reverse the pick and pick the other. It may take a few tries before you are
|
||
able to hold all the wafers in place.
|
||
|
||
|
||
|
||
The Pin Tumbler Lock
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
Pin tumbler locks are by far the most popular lock today. Over half of
|
||
the locks in use are of the pin tumbler type. They look similar to the wafer
|
||
tumbler lock, but can easy be distinguished by their round pins, visible in the
|
||
keyhole. There operation is also similar to the wafer type, but is more costly
|
||
and requires much stricter machining tolerances. Here are some diagrams:
|
||
|
||
|
||
|
|
||
|
|
||
|
|
||
|________________________________________
|
||
| | @ | | @ | | @ | | @ | | @ |
|
||
| | @ | | @ | | @ | | @ | | @ | Tumbler springs
|
||
| | @ | | @ | | @ | | @ | | @ |
|
||
| | @ | 4 | @ | | @ | | @ | | @ |
|
||
| | @ | ||~|| | @ | ||~|| ||~||
|
||
|___||~||___|| ||___||~||___|| ||___|| ||__ _ _ _ _ _ _Shearline
|
||
\_ ||1|| 3 || || || || || || || | |
|
||
\_|| ||___||~||___|| ||___||~||___||~| |
|
||
|~| | | |~| | | | | |
|
||
keyway |2| | | | | | | | | | Plug
|
||
|_| |_| |_| |_| |_| |
|
||
+-----------------------------------------+
|
||
|
|
||
|
|
||
|
|
||
|
|
||
The pin tumbler lock, cutaway side view (locked)
|
||
1) top pin
|
||
2) bottom pin
|
||
3) cylinder (top of plug)
|
||
4) shell
|
||
|
||
|
||
|
||
|
|
||
|
|
||
|
|
||
|________________________________________
|
||
| | @ | | @ | | @ | | @ | | @ |
|
||
| | @ | | @ | | @ | | @ | | @ | Tumbler springs
|
||
| | @ | | @ | | @ | | @ | | @ |
|
||
| || || 4 || || || || || || || ||
|
||
| ||1|| || || || || || || || ||
|
||
|___|| ||_ _|| ||___|| ||___|| ||___|| ||__ _ _ _ _ _ _Shearline
|
||
\_ ||~|| 3 ||~|| ||~|| ||~|| ||~| |
|
||
\_||2||___|| ||___|| ||___|| ||___|| | |
|
||
| | |_| | | | | |
|
||
keyway |_| |_| |_| | Plug
|
||
|
|
||
+-----------------------------------------+
|
||
|
|
||
|
|
||
|
|
||
|
|
||
The pin tumbler lock, cutaway side view (unlocked)
|
||
|
||
1) top pin (drivers)
|
||
2) bottom pin (key pins)
|
||
3) cylinder (top of plug)
|
||
4) shell
|
||
|
||
|
||
|
||
___________________ ___________________
|
||
_/ @ \_ _/ @ \_
|
||
/ @ 3 \ / @ 3 \
|
||
| @ | | | | |
|
||
| | | | | |2| |
|
||
| ____|2|____ | | ____|_|____ |
|
||
| / |_| \ | | / | | \ |
|
||
| | _| |_ 4 | | | | _|1|_ 4 | |
|
||
| | / |1| \ | | | | / |_| \ | |
|
||
| | | |_| | | | | | | | | |
|
||
| | | | | | | | | | | |
|
||
| | | 5 | | | | | | 5 | | |
|
||
| | \_____/ | | | | \_____/ | |
|
||
| | 6 | | | | 6 | |
|
||
| \___________/ | | \___________/ |
|
||
| 7 | | 7 |
|
||
\_ _/ \_ _/
|
||
\___________________/ \___________________/
|
||
|
||
Locked Unlocked
|
||
|
||
Pin Tumbler Lock (front) Pin Tumbler Lock (front)
|
||
|
||
1) bottom pin (key pins)
|
||
2) top pin (drivers)
|
||
3) tumbler spring
|
||
4) shear line
|
||
5) keyway
|
||
6) plug (cylinder)
|
||
7) shell
|
||
|
||
OK, I will explain how the pin tumbler lock works, but you really should
|
||
consider going to K-Mart and buying a cheap lock to take apart and study. In
|
||
the lock's shell (main body) there is the keyway and three to eight (usually
|
||
five) spacings drilled from the top of the lock into the keyway. This is
|
||
similar in principle to the wafer lock. In each of theses spacings are two
|
||
pins and a spring. The top pins are always the same length, while each bottom
|
||
pins can each be any of ten different sizes (0-9). Note that the bottom pins
|
||
have a rounded bottom, allowing for them to ride up the key easier. The spring
|
||
forces the pin stack down so that the lower pin protrudes into the keyway.
|
||
(The wedge slot keeps them from falling all the way to the bottom of the
|
||
keyway) When the correct key is inserted, each pin stack is lifted according to
|
||
how deep or shallow the key is cut in that corresponding location. To open the
|
||
lock, the top of bottom pin (the point where the top and bottom pin meet) must
|
||
line up with the lock plug and the shell (the shearline). When in this
|
||
position, the lock is unlocked and the plug can rotate around, taking the
|
||
bottom pin around with it. If any pin is raised too high, or not high enough,
|
||
then that pin keeps the plug from turning inside the lock shell. Of course in
|
||
the locked position, all the pins stop the plug from turning.
|
||
|
||
These locks are used almost everywhere. The provide over a million
|
||
possible combinations for a five pin lock, and billions for the eight pin.
|
||
These are the standard door locks in most residential and commercial buildings.
|
||
Often you will find pin tumbler locks with only three pins on cheap desks, some
|
||
copy machines, and storage lockers. They offer a reasonable degree of
|
||
security, but are far from tamper proof.
|
||
|
||
Picking
|
||
|
||
Picking the pin tumbler lock is based on the principle that slight
|
||
imperfections exist in every lock. Every lock is machined to certain sets of
|
||
tolerances, such as plus or minus .0002 inches. The closer the tolerance, the
|
||
harder the lock is to pick, but the more expensive the machining costs. That
|
||
is what makes one pin tumbler lock harder to pick than another. This variation
|
||
in the lock's components means that in attempting to turn the plug in the lock
|
||
without the proper key, one tumbler will be caught up and become tight before
|
||
subsequent tumblers are. Therefore, when turning tension is applied to the
|
||
plug with a tension wrench, and the tight tumbler is lifted with a pick, there
|
||
will be either a clicking feel or a sudden relief in the tension the tumbler
|
||
exerts on the pick. This relief of tension occurs when the pin is brought up
|
||
even with the shear line. At this time, lifting can be stopped.
|
||
|
||
Use a hook pick to lift each pin to its breaking point, starting with the
|
||
pin that is bound (resisting) the tightest. Gently pry the pin up against the
|
||
spring pressure until it breaks at the shear line. Care must be taken not to
|
||
lift the pin too high, or it may become jammed in the upper chamber. It is
|
||
often impossible to get this pin back down without releasing tension on the
|
||
plug.
|
||
|
||
A common problem is applying too much tension. A light touch should be
|
||
used because too much pressure on the wrench not only makes it hard to feel any
|
||
change in torsional pressure, but tends to bind all the pins, making picking
|
||
order difficult to determine. The tension wrench needs only to provide a
|
||
little torque so that the pins stay up once picked.
|
||
|
||
Raking and Vibration picking
|
||
|
||
You can also use the raking and vibration picking methods described in the
|
||
section on wafer tumbler locks to pick pin tumblers. You can even use a
|
||
combination of raking and pin picking. Simply rake the pins a few times, and
|
||
then go back and pick any pins that the rake missed. You can use the hook pick
|
||
to probe each pin. If the pin feels "springy" then it has not yet broke at the
|
||
shear line.
|
||
|
||
Another technique: Start picking at the back pin, the one furthest away
|
||
from you as you face the keyway. The reason for this is relatively simple.
|
||
The rear pin will be the last worn, and when you break it, the lock's plug will
|
||
move the most it ever will for just one pin breaking. This will make it easier
|
||
to pick the other pins, as the break between the inner and outer cylinders will
|
||
be progressively held tight against the pin you are working, as you work the
|
||
lock from rear to front. The reason the rear pin is least worn is that
|
||
inserting a key "rakes" the pins up and down, wearing down their sides. The
|
||
rear pin is raked only once per time the key is inserted, the pin in front of
|
||
it is raked twice, and so on. Its not uncommon to see locks in which the front
|
||
pin can not be picked before the rear ones. The reason was that it was worn
|
||
down to the point that no amount of torsion would cause the inner plug to put
|
||
any force against it. Consequently, it won't break.
|
||
|
||
Rapping
|
||
|
||
Sometimes you can use a form of vibration picking known as rapping to open
|
||
a pin tumbler lock. A tension wrench is inserted into the keyway, and light to
|
||
moderate tension is applied. At the same time, the face of the plug is struck
|
||
sharply with a plastic mallet or hammer handle. The rapping forces the springs
|
||
and pins to gravitate toward the force of the blows. Hopefully this vibrates
|
||
the picks into their breaking positions. DO NOT HIT TOO HARD! Approach this
|
||
method with caution.
|
||
|
||
Practicing
|
||
|
||
To learn how to pick pin tumbler locks, it is best to go to the store and
|
||
buy a "practice" lock. Try to find either a KwikSet brand or a cheap Ilco lock
|
||
cylinder. On top of the lock shell is a little sliding strip that covers the
|
||
pin spacings. Carefully slide it out. you can then take out the spring, the
|
||
top pin, and the bottom pin. Remove all but one the assemblies and replace the
|
||
cover. Now you can practice on picking the lock with only one pin. When you
|
||
become good at that, insert another stack of pins, and so on until you can pick
|
||
the lock with all five pins in place.
|
||
|
||
Spool Pins
|
||
|
||
It is possible that in the course of picking a high security pin tumbler
|
||
locks, the plug will turn a bit as if it were going to unlock, then stop. I
|
||
will turn no more than 2 or 3 degrees around. This means you have encountered
|
||
a spool pin. These are simply drivers, or key pins, or both that have had
|
||
their center portions cut down to a smaller diameter.
|
||
|
||
______
|
||
|_ _|
|
||
| | | | Lock body Note that any torsion applied to the
|
||
___| | | |____ cylinder will tend to catch the spooled
|
||
||____|| pins at their waists instead of at the
|
||
| ____ | Cylinder break between the pins. This will
|
||
||_ _|| either prevent the pick from pushing
|
||
| | | | the pin up if the top spool is caught,
|
||
| | | | or it will prevent the pin from falling
|
||
___|| ||____ down, if the bottom spool is caught.
|
||
| |
|
||
\__/ Keyway
|
||
|
||
spool pins
|
||
|
||
|
||
With a hook pick, you'll be able to press up on each pin and feel the
|
||
difference. When you have a spool pin caught across the shear line, gentle
|
||
upward pressure will result in force in the opposite direction of the way
|
||
you're turning. Determine which pins are spool pins and push up until the
|
||
bottom of the pin (assuming it's a top pin) crosses the shear line. You might
|
||
lose some previously picked pins, but just pick them again.
|
||
|
||
Interlocking Pins
|
||
|
||
Several manufacturers have designed high security locks involving angled
|
||
and interlocking pins. Emhart makes a cylinder using angled cuts on the keys
|
||
where the top and bottom pins actually interlock:
|
||
|
||
|
||
+--------------+
|
||
| |
|
||
| Top |
|
||
| Pin |
|
||
| |
|
||
| | Interlocking Pins
|
||
+-----+ +-----+
|
||
+---+ | | +---+
|
||
| | | | | |
|
||
| +-+ | | +-+ |
|
||
| | +-+ +-+ | |
|
||
| | | | | |
|
||
| | +------+ | |
|
||
| +----------+ |
|
||
| |
|
||
| Bottom |
|
||
| Pin |
|
||
|
||
|
||
So the pins have to be turned to the correct angle in order for the pins
|
||
to slide apart when you turn the plug. This also means that the cylinder has
|
||
to be grooved to allow for the portion of the top pin sticking down, and the
|
||
bottom of each key has notches in it so that it can turn more than 180 degrees.
|
||
|
||
|
||
Tubular Cylinder Locks
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
Tubular cylinder locks are widely accepted as the most secure locks you
|
||
can get for a reasonable price. Tubular cylinder locks are the round type
|
||
locks you find on most vending machines, ATMs, and the like. They are
|
||
basically a pin tumbler lock where the pins are arranged on a circular plane.
|
||
The key is a cylinder with cuts around its perimeter. When the key is
|
||
inserted, each pin (whose faces are visible) is pushed in the corresponding
|
||
depth and the plug can be turned.
|
||
|
||
Picking
|
||
|
||
Your best bet for picking these locks is to purchase a specially designed
|
||
tubular cylinder pick. While it can be picked with conventional tools, it
|
||
takes forever because you have to pick it three or four times to turn the plug
|
||
the 120 to 180 degrees needed to unlock it. And what's worse is that the
|
||
cylinder locks after each time you pick it -- every one-seventh of a turn! If
|
||
you want to try it, here's how.
|
||
|
||
If you don't have a tubular cylinder pick you will require a wrench that
|
||
is .062 inches square on its end. Fit this into the groove of the tubular
|
||
cylinder plug. Apply tension in a clockwise direction, then use a straight pin
|
||
to push each pin down until it clicks into place. Proceed to the next pin,
|
||
until all are picked and the plug turns a few degrees. You will have to repeat
|
||
this until it unlocks. Do not leave the locks halfway picked. If you do, even
|
||
the original key will not be able to open the lock until it has been picked
|
||
back into its original position. Good Luck!
|
||
|
||
|
||
|
||
Lock Picking Tools
|
||
~~~~~~~~~~~~~~~~~~
|
||
|
||
The Basic Picks
|
||
|
||
|
||
|
|
||
_______________________________________|
|
||
tension wrench
|
||
|
||
|
||
This is the standard tool for pin and wafer tumbler
|
||
locks. It is inserted in the bottom of the keyway
|
||
to provide a torsional force to the lock cylinder.
|
||
|
||
|
||
|
||
|
||
______________________________________/|
|
||
half-diamond pick
|
||
|
||
|
||
The half-diamond pick can be used for raking or
|
||
picking wafer tumbler locks, or picking pin tumbler
|
||
locks where the distance between pins is small.
|
||
|
||
|
||
|
||
---------------------------------\/\/\/\
|
||
rake
|
||
|
||
|
||
Not surprisingly, the rake (sometimes called a snake
|
||
pick) is used to rake wafer and pin tumbler locks.
|
||
|
||
|
||
|
||
|
||
.
|
||
______________________________________/
|
||
hook
|
||
|
||
|
||
The hook (also known as the feeler or lifter pick)
|
||
is normally used for picking pin and lever tumbler
|
||
locks, but can be used on larger wafer locks.
|
||
|
||
|
||
|
||
|
||
______________________________________O
|
||
O ball
|
||
|
||
|
||
_____________________________________OO
|
||
OO double ball
|
||
|
||
|
||
The ball type picks are actually not as pronounced
|
||
as they look here in the ascii diagram. Imagine a
|
||
"ball" of a little less height, a bit more width.
|
||
Though not essential, the ball picks can be used
|
||
when attempting to rake a wafer-tumbler lock.
|
||
|
||
|
||
|
||
Lever Tumbler Tension Wrench
|
||
|
||
The big difference with a lever tumbler is in the method of applying
|
||
torque. The cylinder, in models where it's visible, rotates freely--it does
|
||
not operate the bolt. Rather, the end of the key goes into a notch in the
|
||
bolt, directly operating it, just as in a warded lock. This means you need a
|
||
different torsion wrench, that looks like this:
|
||
|
||
|
||
_______
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|__________________
|
||
|
||
|
||
|
||
Obtaining Lockpicks
|
||
|
||
Now I'm sure that you are ready to start practicing. Unfortunately,
|
||
locksmiths and the public in general seem reluctant to make picks an easy item
|
||
to obtain. Therefore you can either make your own, (not that difficult) or
|
||
obtain them from a commercial supplier (also not that difficult.)
|
||
|
||
|
||
Making Your Own Picks
|
||
|
||
You can file or grind picks out of spring steel. It is best to use spring
|
||
steel - sources include hacksaw blades, piano (music) wire, clock springs,
|
||
streetsweeper bristles (which can be found along the street after the sweeper
|
||
has passed), etc. Or, go down to the auto parts store and buy a few stock
|
||
lengths of .022 in. automobile feeler gauge. You can cut each one in thirds
|
||
and make a pick from each piece. In a pinch safety pin steel, or even a bobby
|
||
pin (much worse) can be used. Also try the metal band that holds a set of
|
||
walkman type earphones together. It is already the perfect width and all you
|
||
have to do is grind the indentations on it. It makes a really great heavy duty
|
||
wrench also.
|
||
|
||
You will need an electric grinder, or a grinding wheel mounted on a drill,
|
||
to shape the picks. When grinding, keep the steel from getting so hot as to
|
||
anneal (soften) it. You may have to re-harden or re-temper it.
|
||
|
||
Temper the steel by repeatedly getting it red-hot against the grinder,
|
||
then quenching it. What you get won't be feeler gauge and it won't be spring
|
||
steel, but something in between that has some give to it and won't shatter.
|
||
|
||
For a tension wrench, while you're at the grinder, take a medium-sized
|
||
Allen wrench and grind its hexagonal head into a flat blade. Alternatively,
|
||
you can use a small screwdriver, bent at the end. (Bending a screwdriver with
|
||
any precision is pretty tough). Bobby pins also make an alright tension
|
||
wrench, especially the larger ones. They work best if you cut them off and
|
||
flame to red hot with a burner. Then while it's still hot twist it 180 deg
|
||
with a pair of vicegrips or needle nose pliers, and bend down the end so it
|
||
looks like the professional ones, this gives it more 'spring'. The flaming
|
||
should be done, maybe 3/4ths of an inch from the end. Finally file and sand
|
||
rough spots from where you cut it.
|
||
|
||
If you take the finest or next to finest crochet hook they make and file
|
||
down the sides of the business end of it so it will fit in the lock, you can
|
||
make an excellent feeler pick.
|
||
|
||
|
||
Picks from Paper Clips
|
||
|
||
To open a lock with two paper clips, unbend one like this:
|
||
____________
|
||
/ \ This shape is your lockpick, you
|
||
\__________________________/ put the end with the little hook
|
||
in the lock and use it to fiddle
|
||
with the pins.
|
||
|
||
Unbend and re-bend the other paperclip like this:
|
||
____________
|
||
/ \ This shape is your torsion
|
||
\______________________ wrench. You use it to put
|
||
| torque on the lock cylinder.
|
||
_| When the hook is in the cylinder
|
||
the handle should hand off to
|
||
the side and the final bend on
|
||
the hook should be short enough
|
||
that there is room to get the
|
||
pick into the keyhole.
|
||
|
||
Warning: Filing cabinets and desks are pretty easy to do with these, but
|
||
it's not easy to do a door lock with them. Better materials really do help
|
||
when you're dealing with more than 4 pins in a lock.
|
||
|
||
|
||
|
||
Making a Pick Gun
|
||
|
||
Get yourself a piece of music wire from the local hobby shop. Find wire
|
||
that seems just a bit big for an average keyway. This will be ground down
|
||
later so that it can be inserted. Wire of this diameter is so stiff you may
|
||
doubt that you have the right size. But you need this stiffness for the device
|
||
to work. Don't use wire that is too light.
|
||
|
||
You want to bend a circle in the wire about 5 inches back from the end.
|
||
You want enough length in the first straight part to go all the way into the
|
||
keyway and leave enough to comfortably fit in your hand. Call this straight
|
||
part Side A. Try bending the wire around the body of a Magic Marker; this
|
||
seems to make a nice sized loop. The loop should be 360 + 180 degrees so that
|
||
the long end of your wire is now parallel to side A. Let's be original and
|
||
call this Side B.
|
||
|
||
Use pliers to make a 90 degree bend in side B so that the end of it
|
||
crosses side A. This bend should be located so that the part of side A which
|
||
extends past the bent part of the wire is long enough to go all the way into
|
||
the keyway. Hey, why don't we call this cross-piece Side C? Bend this
|
||
cross-piece 180 degrees around side A so that it forms a slot for side A to
|
||
slide up and down in. Call the wire segment which goes from A to B and is
|
||
parallel to C, Side D. Snip off the end of side D which extends beyond side B.
|
||
|
||
We now have an object which resembles a safety pin (hence the name) which
|
||
has one side (side A) which slides up and down in a slot made by sides C and D
|
||
and which is held in the bottom of this slot by the spring tension in the loop
|
||
between sides A and B.
|
||
|
||
Grind the sides of the piece which is to go in the keyway so it will fit.
|
||
Grind the top of this piece flat. The Top is the side toward side B. This is
|
||
the part which will be against the tumblers. Bevel the end so it will slide
|
||
under the tumblers more easily.
|
||
|
||
To use the gun, insert the end into the keyway with side B up. Press down
|
||
on side B with your thumb to slide the slot C-D down. Let your thumb slip off
|
||
the wire and the spring will pull side B back up. When the bottom of the C-D
|
||
channel hits the bottom of side A, it delivers a sharp blow to the bottoms of
|
||
the pins. Use VERY light pressure on the tension wrench and snap the gun a few
|
||
times to knock the pins up to the shear line. See the section on wafer locks
|
||
for a more information.
|
||
|
||
|
||
Electric Vibration Picks
|
||
|
||
The motor/base casing from a electric toothbrush, or vibrator makes a
|
||
decent vibrator pick (pick gun) when you superglue a straight pick to it. Alot
|
||
cheaper than the pro models, and generally smaller too.
|
||
|
||
|
||
Purchasing Your Picks
|
||
|
||
Generally picks are not sold over the counter. Your best bet is to order
|
||
them from a mail order firm. Most firms will inquire as to your profession
|
||
when making a purchase. They may not wish to sell them to you unless you are
|
||
some sort of pubic safety personnel such as an EMT or a fireman. They are
|
||
available from a variety of sources. Here are some of the most popular:
|
||
|
||
----------
|
||
|
||
Gall's Inc.
|
||
(800)-477-7766
|
||
Catalog #BA
|
||
|
||
----------
|
||
|
||
Item # : ALS15B
|
||
Price : $19.99
|
||
Name : 10-Piece Locksmith Pick Set
|
||
|
||
"Be prepared for any lock-out. Nine picks and wrenches are grouped in a handy
|
||
foldover carrying case that is small enough to carry in your pocket. Order you
|
||
lock pick set and keep it handy for easy entry to any lock-out situation.
|
||
Black."
|
||
|
||
|
||
Item # : PG1B
|
||
Price : $59.99
|
||
Name : Lock Pick Gun
|
||
|
||
"Our trigger action lock pick gun opens doors easily. Just use it with the
|
||
included picks and instructions -- with a little practice, you can smoothly
|
||
open any locked house or apartment."
|
||
|
||
----------
|
||
|
||
Delta Press Ltd.
|
||
(800)-852-4445
|
||
|
||
----------
|
||
|
||
Item # : LPS-002
|
||
Price : $24.95
|
||
Name : The 8 Piece Tool Set
|
||
|
||
"These high quality picks feature new lighter non-breakable plastic color coded
|
||
handles. Picks are of .022 blue spring steel - hardened to perfection Eight
|
||
piece set comes with handy see-through case."
|
||
|
||
|
||
Item # : LPS-003
|
||
Price : $39.95
|
||
Name : The 11 Piece Tool Set
|
||
|
||
"This deluxe 11 piece kit features all metal handles and comes in a discrete
|
||
carrying case for undercover operatives. All picks are .022 blue spring steel
|
||
and hardened to perfection."
|
||
|
||
|
||
Item # : LPS-005
|
||
Price : $119.95
|
||
Name : The 60 Piece Tool Set
|
||
|
||
"Here it is. The finest lockpick set we've stocked. It includes 60 picks,
|
||
tension wrenches, and a broken key extractor plus a zippered top grain cowhide
|
||
case and warded master keys."
|
||
|
||
|
||
Item # : LPS-004
|
||
Price : $59.95
|
||
Name : Professional Locksmithing Tool
|
||
|
||
"The famous lockaid Tool was designed for law enforcement agencies to quickly
|
||
pick pin tumbler locks. The american-made product is the only superior "lock
|
||
gun" available. Unlike conventional hand picks that activate only one or two
|
||
cylinder pins, this tool is designed to span all the pins at once. The needle,
|
||
powered by trigger action, strikes all t the cylinder bottom pins
|
||
simultaneously. As the force is transferred to the upper pins, they
|
||
momentarily rise in the chambers. Comes complete with 3 stainless steel
|
||
needles and tension wrench."
|
||
|
||
----------
|
||
|
||
Phoenix Systems Inc.
|
||
(303)-277-0305
|
||
|
||
----------
|
||
|
||
"OUR LOCK PICKS ARE THE FINEST QUALITY PROFESSIONAL TOOLS AVAILABLE. Each pick
|
||
is made of hard-finished clock-spring steel, tempered to the correct degree of
|
||
hardness. Whether the subject is wafer tumbler locks or 6 & 7 pin tumbler
|
||
locks, our picks are the best available, and the standard of the industry.
|
||
With a few minutes of practice, even a beginner can open most padlocks, door
|
||
locks and deadbolts. NOTE: BE SURE TO CHECK YOUR LOCAL, AND STATE ORDINANCES
|
||
GOVERNING POSSESSION OF THESE TOOLS."
|
||
|
||
Item # : 604
|
||
Price : $75.00
|
||
Name : Superior Pick Set
|
||
|
||
"Hip pocket size in top grain leather case. Our most complete set. 32 picks,
|
||
tension tools & extractors."
|
||
|
||
|
||
Item # : 606
|
||
Price : $34.95
|
||
Name : Tyro Pick Set.
|
||
|
||
"An excellent choice for the beginner. Cowhide leather case contains 9 picks,
|
||
tension wrenches & key extractor."
|
||
|
||
|
||
Item # : 607
|
||
Price : 9.95
|
||
Name : Warded Padlock Pick Set
|
||
|
||
"This 5 piece padlock pick set is made of the finest blue tempered spring
|
||
steel. This set will pick open most every warded padlock made today."
|
||
|
||
|
||
Item # : 610
|
||
Price : $24.95
|
||
Name : Double Sided Tumbler Lock Picks
|
||
|
||
"Set of 4 picks for use with double-sided, disc tumbler, showcase, cam and
|
||
PADLOCKS. An excellent addition to your other pick sets."
|
||
|
||
|
||
Item # : 617
|
||
Price : $39.95
|
||
Name : Padlock Shim Picks
|
||
|
||
"Open padlocks in seconds! Our new Padlock Shim pick's unique design makes
|
||
them so successful that it is frightening! Simply slide the shim down between
|
||
the shackle and the lock housing, twist and the lock is open. Works best on
|
||
laminated type padlocks (the most popular type) but will open ALMOST ANY TYPE
|
||
OF PADLOCK -- INCLUDING THE POPULAR 3 NUMBER COMBINATION TYPE. Include 20
|
||
shims -- 5 each of the 4 most common shackle diameters for perfect fit every
|
||
time. Comes with complete instructions."
|
||
|
||
|
||
Item # : 618
|
||
Price : $34.95
|
||
Name : Schlage Wafer Pick Set
|
||
|
||
"There are two types of Schlage wafer locks, each needing a different base key
|
||
to pick with. This set comes with both types of base keys and the pick. With
|
||
the proper base key the lock is already half picked. Very quick and easy to
|
||
use. Comes with complete instructions.
|
||
|
||
|
||
Item # : 620
|
||
Price : $59.95
|
||
Name : Pick Gun
|
||
|
||
"Picks locks FAST. Open locks in less than 5 seconds. Specifically designed
|
||
for tumbler locks. Insert pick into key slot, then just pull trigger. Throws
|
||
all pins into position at one time. Lock is then turned with tension bar.
|
||
Used extensively by police and other government agencies. Gun is spring
|
||
loaded, with tension adjustment knob. Comes with 3 needle picks and tension
|
||
bar. No batteries necessary. Life-time guarantee.
|
||
|
||
|
||
Item # : 612
|
||
Price : $16.00
|
||
Name : The Slim Jim
|
||
|
||
"Car door opener. The tool does not enter inside the car. Opens a car door by
|
||
"feel" rather then sight. With a little practice, car opening will be no
|
||
problem. For GM, Ford and Chrysler cars. Made of clock-spring steel and is
|
||
hand finished."
|
||
|
||
|
||
Item # : 613
|
||
Price : $16.00
|
||
Name : The Super Jim
|
||
|
||
"This tool will open most GM, Ford and AMC car doors. Opener does not enter
|
||
vehicle. Made wider and thicker, and is bright nickel plated. Faster openings
|
||
on most domestic automobiles. With illustrated instructions."
|
||
|
||
Item # : 614
|
||
Price : $19.95
|
||
Name : Houdini Car Door Opener
|
||
|
||
"The latest and best innovations on car door openers. It works the same as
|
||
your old Slim Jim, except it now folds neatly to fit in pocket or toolbox
|
||
without getting in the way. ONLY 6 1/2 INCHES LONG WHEN FOLDED. Open up and
|
||
snaps into place like a fold-up ruler, excellent stainless steel constructions
|
||
with vinyl handle for comfort."
|
||
|
||
|
||
Item # : 615
|
||
Price : $39.95
|
||
Name : Pro-Lok "Car Killer" Kit
|
||
|
||
"Over the years we have had thousands of requests for a multi-vehicle opening
|
||
kit. We are now able to offer the most complete kit that we have ever seen.
|
||
This kit of tools will open over 135 automobiles, both domestic and foreign, on
|
||
the road today. The opening procedure for each vehicle is diagrammed and
|
||
explained in the instruction manual. Kit comes with complete instruction
|
||
manual and gas cap pick tool."
|
||
|
||
|
||
Item # : 600
|
||
Price : $129.95
|
||
Name : Tubular Lock Pick
|
||
|
||
"This tool is an easy and reliable method for picking tubular locks, as found
|
||
on commercial vending machines, washers, dryers, etc. This newest high tech
|
||
design is much faster and easier to use than the old type that used rubber
|
||
bands to hold the feeler picks. Internal neoprene "O" rings together with
|
||
knurled collar provide a very simple and easy tension adjustment. Sturdy
|
||
stainless steel construction provides for long-lasting service. This tool
|
||
will, with a little practice, easily and quickly open any regular center-spaced
|
||
tubular lock -- the most popular type of tubular lock on the market. Comes
|
||
with complete instructions and leather carrying case."
|
||
|
||
|
||
Tips for Success
|
||
~~~~~~~~~~~~~~~~
|
||
Following is information that will help you become more adept at
|
||
manipulating locks. Solutions to common problems and general miscellaneous
|
||
information that could prove useful is included.
|
||
|
||
Determining the Direction of Rotation
|
||
|
||
Before you can pick a tumbler type lock, you must determine the correct
|
||
direction of rotation. It may sound like a trivial point, but who wants to
|
||
waste hours trying to pick a lock the wrong direction. Though there will of
|
||
course be exceptions, there are some general guidelines. Cylindrical locks,
|
||
padlocks, file cabinet locks almost always turn in a clockwise direction or
|
||
either direction to open. When confronted with a door lock, turn the plug so
|
||
that the top of the keyhole turns toward the edge of the door. There is a
|
||
notable exception here, Corbin and Russwin locks turn AWAY from the door edge.
|
||
|
||
|
||
Tight or Dirty Locks
|
||
|
||
If a lock seems exceptionally tight or dirty, it will be hard to break the
|
||
pins. It may help to lubricate the lock. NEVER use a liquid type lubrication
|
||
such as WD40, 3-in-1 oil, etc... Use powdered graphite, available in most
|
||
hardware stores. It comes in a little tube, allowing a light squeeze to blow a
|
||
puff of graphite into the keyway. If lubrication does not help, you may need
|
||
to apply a little firmer hand on the tension wrench.
|
||
|
||
|
||
Proper Attitude
|
||
|
||
It is very important to maintain a confident attitude while you are
|
||
learning to pick locks. If you feel nervous or stressed, it will only
|
||
make things harder. You will not be able to pick every lock you come to,
|
||
but with practice and patience, you may be surprised. Visualise what is
|
||
happening inside the lock, this is the key. If you don't fully
|
||
understand how a lock works and exactly what you are doing to it, you will
|
||
not experience a high degree of success.
|
||
|
||
|
||
|
||
Combination Locks
|
||
~~~~~~~~~~~~~~~~~
|
||
Combination locks work on a series of flat, round disks that have notches
|
||
and pegs (one of each, one set per disk) along their circumference. Notches
|
||
are referred to as "gates". The first tumbler determines the last digit of the
|
||
combination, and is actually attached to the dial directly. As the dial is
|
||
turned, the peg of the first tumbler catches on the middle tumbler's peg,
|
||
dragging it along. As the dial is turned further, the middle tumbler latches
|
||
on to the peg of the last tumbler, all three turning together. Turning all the
|
||
tumblers is known as "clearing" the lock, and must be done before attempting to
|
||
operate the lock. For the lock to open, the gate on each disk must align up
|
||
with the pawl (breaking arm) of the bolt.
|
||
|
||
Dialing the first digit of the combination aligns the last tumbler's gate
|
||
to the pawl. Before dialing the second digit, the dial must be turned one
|
||
complete turn in the opposite direction (assuming a three tumbler lock, twice
|
||
for a four digit one). Rotating in the original direction to the last digit
|
||
will align the first tumbler's gate, and the lock can open. Modern safe
|
||
combination locks are impossible to crack (literally). Many innovations have
|
||
given high quality locks this degree of security. Burglars learned to feel the
|
||
gates and pegs rotate about the lock, allowing them to manipulate the tumblers
|
||
into their proper position. To combat this, a searted front tumbler was
|
||
designed to create shallow "false gates". The false gates are difficult to
|
||
distinguish from the actual gates. To combat this problem, safe crackers would
|
||
hook up a high speed drill to the dial. This would wear the tumblers edges
|
||
smooth, eliminating the bothersome shallow gates. Still, despite their
|
||
security, cheap combination locks are far from foolproof.
|
||
|
||
Determining an Unknown Combination
|
||
|
||
The most common and difficult to open of these small disk tumbler locks
|
||
are the Master combination padlocks, and they are quite popular. With
|
||
practice, they CAN be opened. The newer the lock is, though, the more
|
||
difficult it will be to open at first. If the lock has had a lot of use, such
|
||
as that on a locker-room door where the shackle gets pulled down and encounters
|
||
the tumblers while the combination is being dialed, the serrated front tumblers
|
||
will become smoothed down, allowing easier sensing of the tumblers. So, until
|
||
you have become good at opening these locks, practice extensively on an old
|
||
one. Here's how.
|
||
|
||
Step One
|
||
|
||
First, clear the tumblers by engaging all of them. This is done by
|
||
turning the dial clockwise (sometimes these locks open more easily starting in
|
||
the opposite direction) three to four times. Now bring your ear close to the
|
||
lock and gently press the bottom back edge to the bony area just forward of
|
||
your ear canal opening so that vibrations can be heard and felt. Slowly turn
|
||
the dial in the opposite direction. As you turn, you will hear a very light
|
||
click as each tumbler is picked up by the previous tumbler. This is the sound
|
||
of the pickup pegs on each disk as they engage each other. Clear the tumblers
|
||
again in a clockwise manner and proceed to step two.
|
||
|
||
Step Two
|
||
|
||
After you have cleared the tumblers, apply an upward pressure on the
|
||
shackle of the padlock. Keeping your ear on the lock, try to hear the tumblers
|
||
as they rub across the pawl; keep the dial rotating in a clockwise direction.
|
||
|
||
You will hear two types of clicks, each with a subtle difference in pitch.
|
||
The shallow, higher pitched clicks are the sound of the false gates on the
|
||
first disk tumbler. Do not let them fool you-the real gates sound hollow and
|
||
empty, almost nonexistent.
|
||
|
||
When you feel a greater than normal relief in the shackle once every full
|
||
turn, this is the gate of the first tumbler (last number dialed). This tumbler
|
||
is connected directly to the dial as mentioned earlier. Ignore that sound for
|
||
now. When you have aligned the other two tumblers, the last tumbler's sound
|
||
will be drowned out by the sound of the shackle popping open.
|
||
|
||
Step Three
|
||
|
||
While continuing in a clockwise direction with the dial, listen carefully
|
||
for the slight hollow sound of either one of the first two tumblers. Note on
|
||
the dial face where these sounds are by either memorizing them or writing them
|
||
down. Make certain that you do not take note of the driving tumbler (last
|
||
number dialed). If you hear and feel only one hollow click (sounds like
|
||
"dumpf"), chances are that the first number could be the same as the last one.
|
||
|
||
You should have two numbers now. Let us say one of them is 12 and the
|
||
other is 26. Clear the tumblers again just to be safe and stop at the number
|
||
12. Go counterclockwise one complete turn from 12. Continue until there is
|
||
another "dumpf" sound. After the complete turn pass 12, if you feel and hear a
|
||
louder than normal sound of a tumbler rubbing on the pawl, the first tumbler is
|
||
properly aligned and the second tumbler is taking the brunt of the force from
|
||
the shackle-you are on the right track. When the second tumbler has aligned in
|
||
this case, you will feel a definite resistance with the last turn of the dial
|
||
going clockwise. The final turn will automatically open the shackle of the
|
||
lock. If none of these symptoms are evident, try starting with the number of
|
||
the combination, 26, in the same way.
|
||
|
||
Step Four
|
||
|
||
If the lock still does not open, don't give up. Try searching for a
|
||
different first number. Give it a good thirty or forty minute try. If you
|
||
play with it long enough, it will eventually open. The more practice you have
|
||
under your belt, the quicker you will be able to open these padlocks in the
|
||
future.
|
||
|
||
Using a stethoscope to increase audibility of the clicks is not out of the
|
||
question when working on disk tumbler locks, though usually not needed for
|
||
padlocks. A miniature wide-audio-range electronic stethoscope with a magnetic
|
||
base for coupling a piezoelectric-type microphone is ideal for getting to know
|
||
the tumblers better.
|
||
|
||
Sesame Locks
|
||
|
||
Another type of disk tumbler padlock is the Sesame lock made by the Corbin
|
||
Lock Co. Its unique design makes it more difficult to open than Master
|
||
padlocks, but it can be opened. Let's take one of the three or four wheel
|
||
mechanisms, look at a cross section, and see how it works. The wheel has
|
||
numbers from zero to nine. Attached to the wheel is a small cam. Both the
|
||
wheel and cam turn on the shaft. Each wheel in this lock operates indepen-
|
||
dently with its own cam and shaft. The locking dog is locked to the shackle.
|
||
In this position the shackle cannot be opened. The locking dog operates with
|
||
all three or four wheels. The locking dog is riding on the round edge of the
|
||
cam. The spring is pushing up on the cam. The locking dog cannot move up
|
||
because it is resting on the round part of the cam. When the wheel is turned
|
||
to the proper combination number, the locking dog rests on the flat of the cam.
|
||
The spring can then raise the locking dog to release the shackle, and this
|
||
opens the lock.
|
||
|
||
|
||
|
||
Magnetic Locks
|
||
~~~~~~~~~~~~~~
|
||
Magnetic locks are a recent innovation to the security world. Their basic
|
||
operation involves the principle that like poles of a magnetic repel each
|
||
other, while opposite poles repel. A magnetic lock then does not have pins,
|
||
but magnets (which are often behind a plastic "roof" on the keyway). When all
|
||
these magnets are in the "repelled" position, meaning a similar magnetic pole
|
||
is below them, a lever arm releases the lock. A key then would have a magnet
|
||
arrangement identical to that of the lock. These locks may be activated either
|
||
by a flat, notchless key, or by use of a magnetic card, where in the lock
|
||
actually uses a two dimensional arrangement of magnets. These are not too
|
||
common, but can be found in some installations.
|
||
|
||
Opening Magnetic Locks
|
||
|
||
By using a pulsating electromagnetic field, you can cause the magnets in
|
||
the lock to vibrate at thirty vibrations per second, thereby allowing it to
|
||
open by applying constant tension to the bolt. You should be able to purchase
|
||
one of these "picks" from a locksmith supply company. Unfortunately, this
|
||
method usually ruins the properties of the lock's magnets, so use it in
|
||
emergencies only. The magnetic pick can be used in padlocks by stroking it
|
||
across the place where the key is placed. It is also designed to fit into a
|
||
doorknob and is then used by stroking one pole in and out.
|
||
|
||
|
||
|
||
Simplex 5-button combination locks
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
(*Hobbit*'s in-depth evaluation)
|
||
|
||
This deals with the Simplex or Unican 5-button all-mechanical combination
|
||
locks. They are usually used in a variety of secure but high-traffic
|
||
applications, and come in a number of flavors: dead bolt, slam latch, lock
|
||
switches for alarms, buttons in a circle or a vertical line, etc. The internal
|
||
locking works are the same across all of these. Herein will be described the
|
||
mechanical workings and a method of defeating the lock that falls out by
|
||
logical inference and observations from playing with it.
|
||
|
||
The internals
|
||
|
||
Caveat: If this seems unclear at first, it is because the absolutely best
|
||
way to understand the inner mysteries is to take a Simplex lock apart and study
|
||
it. It is highly recommended that the reader obtain and disassemble one of the
|
||
units while studying this; otherwise the following may be confusing. The
|
||
locking mechanism box is swaged together at each end, but it is trivial to open
|
||
up without destroying it. To set a lock up for study, remove the back, leaving
|
||
the front plate held on by its Jesus clip. Put a spare thumb turn down over
|
||
the shaft so you have something to grab. Take care not to lose the button
|
||
connecting pins; they drop out.
|
||
|
||
In the round configuration, the buttons talk via bent bars in the
|
||
faceplate to the same vertical column as the straight ones. Thus all buttons
|
||
henceforth shall be referred to as if they were in a straight vertical row,
|
||
numbered 1 to 5 reading downward. The actual locking mechanism inside is a
|
||
small metal box, about 3 inches high and .75 x .75 inch across the base. It
|
||
contains five tumblers, one corresponding to each button, a common shift bar,
|
||
and a couple of cams to handle reset and unlocking. The user dials the
|
||
combination and turns the handle to the right to open the lock, or to the left
|
||
to reset any dialed digits if he made a typo. If the proper combination has
|
||
not been dialed yet, the shaft will not turn to the right. Setting a
|
||
combination shall be described later. Some of the linear-style locks are
|
||
actually made by Unican, but have the Simplex box inside. For these, a
|
||
clockwise twist serves as both open and reset. There is a detent plate and a
|
||
screwy lever system; if the lock is not open yet, the lever cannot turn to the
|
||
*box*'s right. The detent slips, allows the levers to shift the other way, and
|
||
the box arm is then turned to the left. If the detent does not slip, it's
|
||
open, and the plate locks to the latch shaft and pulls it back.
|
||
|
||
Each of the five tumblers has six possible positions. Each button does
|
||
nothing but push its corresponding tumbler from the 0 position to the 1
|
||
position. Therefore, each button can only be used once, since once the tumbler
|
||
has moved, the button has no further effect. The trick comes when *subsequent*
|
||
buttons are pushed. Each button press not only shoves its tumbler from 0 to 1,
|
||
it also advances any "enabled" tumblers one more step. When a tumbler is
|
||
enabled, its corresponding gear has engaged the common bar and pushed it around
|
||
one position, so the next button press will do this again, thus taking
|
||
previously enabled tumblers around one more notch. This way, the further-in
|
||
tumbler positions can be reached. It can be seen that there are undialable
|
||
combinations; for instance, only *one* tumbler can reach position 5 for a valid
|
||
combination [Positions labeled 0 thru 5, totalling six]. If one sits down and
|
||
figures out possible places for the tumblers to go, many combinations are
|
||
eliminated right away, so the number of possibilities is *not* 6^5 as one might
|
||
expect. Two-at-once pushes are also valid, and are *not* the same as pushing
|
||
the given two in some other order. Pushing two [or three or ...] at once
|
||
simply enables two tumblers at once and shoves them to position 1 at the same
|
||
time. [This of course leaves less buttons unused to push them in farther!] The
|
||
tumblers themselves are small round chunks of metal, with gear teeth around the
|
||
top half and a notch cut into the bottom edge. When all these notches line up
|
||
with the locking bar, the lock is open. The tumblers are mounted on a vertical
|
||
shaft so they can spin, with the locking bar fingers resting against the bottom
|
||
of each one. The locking bar is prevented from rising if any notch is turned
|
||
away from it. Juxtaposed to the tumblers is another shaft containing idler
|
||
gears, which in turn talk to the common bar in the back. The intermediate
|
||
shaft slides up and down and makes combination changes possible. Note: The
|
||
buttons actually talk to the idler gears and not the tumblers themselves. This
|
||
is necessary since during a combo change, the tumblers cannot move because the
|
||
locking bar teeth are sitting in the notches.
|
||
|
||
[Editor's note: Simplex locks are set at the factory with a default code of
|
||
(2-4), 3. This is often not even changed.]
|
||
|
||
Combination change, other random facts
|
||
|
||
Once you know the current combination, you might want to change it.
|
||
Instructions for doing this undoubtedly come with the lock; but it's real easy.
|
||
There is a screw in the top with a hex hole; remove this from the lock body.
|
||
Dial the proper combination, but don't move the handle. Press straight down
|
||
through the hole with a small screwdriver, until you feel something go "thunk"
|
||
downward. The lock is now in change mode. Reset the tumblers [leftward
|
||
twist], enter your new combination, twist the handle as though opening the
|
||
lock, and your change is now in effect. Re-insert the screw. This does the
|
||
following: The thing you hit with the screwdriver pushes the tumblers down onto
|
||
the locking bar [which is why the proper combination must be entered], and
|
||
disengages them from their idler gears. Button presses turn the *idler*
|
||
*gears* around, and then the opening action shoves the tumblers back up to mesh
|
||
with these gears in their new positions. A subsequent reset mixes the tumblers
|
||
up again to follow the new combination. This description is admittedly
|
||
somewhat inadequate; the right thing to do is take one of the locks apart and
|
||
see for one's self what exactly happens inside.
|
||
|
||
The Unican model has a disk-locked screw on the rear side. Removing this
|
||
reveals a round piece with a flat side. Twist this clockwise to enable change
|
||
mode as in the above. This lock, of course, would be a little more secure
|
||
against random people changing the combination for fun since you ostensibly
|
||
need a key to get at it. Keep in mind that "reset" on these is done by turning
|
||
the knob all the way *clockwise* instead. There is a linkage that ensures that
|
||
the shaft inside goes counterclockwise for the time that change mode is
|
||
enabled.
|
||
|
||
It is amusing to hear local locksmiths call the Simplex internals a
|
||
"computer". It would seem that none of them have taken one apart to see what
|
||
is really inside; the box is painted black as far as they are concerned and
|
||
non-openable. Obtaining one is the unquestionably best way to learn what's in
|
||
there. Unfortunately they cost on the order of $120, a price which clearly
|
||
takes advantage of the public's ignorance. These locks are *not* pick-proof
|
||
after all, and anyone who maintains that they are is defrauding the customer.
|
||
There are a variety of ways to increase the picking difficulty, to be discussed
|
||
elsewhere. Your best bet is to borrow one from somewhere for an evening and
|
||
spend the time learning its innards.
|
||
|
||
Determining an unknown combination
|
||
|
||
Contrary to what the marketing reps would have you believe, the locks can
|
||
be opened fairly quickly without knowing the set combination and without
|
||
damaging the lock. Through a blend of a soft touch, a little hard logic, and
|
||
an implicit understanding of how the locking mechanism works, they generally
|
||
yield within five minutes or so. [There are *always* exceptions...]
|
||
|
||
This method requires that one does not think in terms of a sequence of
|
||
button presses. One must think in terms of tumbler positions, and simply use
|
||
the buttons to place tumblers where desired. For practical description
|
||
purposes, it will be assumed that the buttons connect right to the tumblers,
|
||
rather than the idler gears that they really do. The idler gears are a
|
||
necessary part only during combination changes. Unless you are doing a change,
|
||
considering it this way is pretty close to the facts. Remember that a 0
|
||
position means the button was never pushed, and 5 is enabled and shifted as far
|
||
as possible.
|
||
|
||
Turning the thumb handle to the right [clockwise] raises the locking bar
|
||
against the tumblers. Since the lock is never machined perfectly, one or more
|
||
tumblers will have more pressure on it than other ones, and this shows up as
|
||
friction against it when it is turned via the button. This friction is felt in
|
||
the short distance between fully-extended and the detent on the button [the
|
||
first 2 or 3 mm of travel]. Some will travel easily to the detent, and others
|
||
will resist efforts to push them in. Suppose you are twisting the handle, and
|
||
tumbler 1 has lots of pressure on it [you can feel this when you try to push
|
||
button 1 in]. When you back off the tension on the handle a little bit, the
|
||
button can be pushed in against the resistance. The fact that the button has
|
||
resistance at position 0 tells you that tumbler 1's proper position is *not* 0,
|
||
or there would be no pressure if the notch was there! Upon pushing button 1
|
||
in, you find that no pressure has appeared at any other button. This
|
||
eliminates position 1 for tumbler 1, also. Now, how do you get tumbler 1 to
|
||
different positions so you can test for pressure against other ones? Push
|
||
subsequent buttons. Push any other button, and tumbler 1 advances to position
|
||
2. Ignore what the other tumblers are doing for the moment. Now, perhaps
|
||
another button has some resistance now. This means that tumbler 1 is either at
|
||
the right position, or getting close. Basically you are using other tumblers
|
||
to find out things about the one in question. [Keep in mind that the first one
|
||
with friction won't *always* be tumbler 1! Any tumbler[s] could have the first
|
||
pressure on them.] Continuing, push another "don't care" button. A "don't
|
||
care" button is one that is not the one you're trying to evaluate, and not the
|
||
one that recently showed some friction. What you want to do is advance tumbler
|
||
1 again without disturbing anything else. Did the pressure against your test
|
||
tumbler get stronger, or disappear? If it got stronger, that points to an even
|
||
higher probability that tumbler 1 is supposed to be at 3, rather than 2. If
|
||
the pressure vanished or became less, 1 has gone too far, and you were safer
|
||
with it at position 2. Let's assume that the pressure against your test
|
||
tumbler increased slightly when tumbler 1 was at 2, increased even more when
|
||
tumbler 1 was at 3 and vanished when you pushed it onward to 4. Reset the
|
||
lock. You now know the proper position of tumbler 1 [that is, whatever tumbler
|
||
first had pressure on it]. You've already drastically reduced the number of
|
||
possible combinations, but you aren't finished yet.
|
||
|
||
You can now eliminate positions for the next one or two tumblers the same
|
||
way -- but to set things up so you can feel the pressure against these, you
|
||
must ensure that your newly-known tumbler [1 in this case] is in its proper
|
||
position. It is useful to make a little chart of the tumbler positions, and
|
||
indicate the probabilities of correct positions.
|
||
|
||
Positions
|
||
|
||
0 1 2 3 4 5
|
||
----------------
|
||
1 : L L + T L | <-- Indicates that tumbler 1 is not
|
||
0, not 1, maybe 2, more likely 3.
|
||
Tumbler 2 : | | | | | |
|
||
number
|
||
3 : | | | | | |
|
||
|
||
4 : L | | | | | <-- Indicates that tumbler 4 is not 0.
|
||
|
||
5 : | | | | | |
|
||
|
||
This chart is simply a bunch of little vertical lines that you have drawn
|
||
in a 5x6 matrix; the topmost row corresponds to button 1 and the lowest to 5.
|
||
Mark the probabilities as little hash marks at the appropriate height. The
|
||
leftmost bar indicates position 0, rightmost 5; a high mark on the left side
|
||
indicates that the tumbler is 0, or is never used. The relative heights of
|
||
your tick marks indicate the likelihood of the notch on the respective tumbler
|
||
being there. If you don't know about a position, don't mark it yet. This
|
||
chart serves as a useful mnemonic while learning this trick; as you gain
|
||
experience you probably won't need it anymore if you can remember tumbler
|
||
positions.
|
||
|
||
A tumbler at the 0 position is already lined up before any buttons are
|
||
pressed. This will feel like a lot of loose play with a little bit of pressure
|
||
at the end of the travel, just before the enable detent. Be aware of this;
|
||
often enough the first button with pressure can be a 0, and if you aren't
|
||
watching for 0 positions you can easily assume it's a don't care, push it, and
|
||
screw your chances of feeling others. Make sure your "don't care" test buttons
|
||
aren't supposed to be at 0 either. It's a good idea to run through and try to
|
||
find all the zeros first thing.
|
||
|
||
Let us continue from the above. You have found that tumbler 1 is most
|
||
likely to bet at position 3, with a slim chance of position 2. This is marked
|
||
in the above chart. The reason this can happen is that the tops of the locking
|
||
bar teeth are slightly rounded. When the tumbler is one away from its opening
|
||
position, the locking bar can actually rise higher, since the notch is halfway
|
||
over it already. So don't assume that the first increase in pressure on other
|
||
buttons is the right position for the one you're finding out about. Let's
|
||
assume that the next pressure showed up on button 4. You can feel this when
|
||
tumbler 1 is at position 3; to get tumbler 1 out there, let's say you used the
|
||
sequence 1,2,3. 2 and 3 were your "don't care" buttons used only to push 1
|
||
around. Therefore now, tumbler 1 is at position 3, 2 is at 2, and 3 is at 1.
|
||
5 and 4 are at 0, and can therefore be felt for pressure.
|
||
|
||
The next step is to find the proper position for the next button with
|
||
pressure against its tumbler. Many times you'll get more than one that exhibit
|
||
pressure at the same time. Figure out which button has more pressure on it now
|
||
with your first tumbler in the right position. In this example, only 4
|
||
applies. You now want to advance tumbler 4 to different places, *while*
|
||
keeping 1 at its proper place. 1 must always advance to 3 to free the locking
|
||
bar enough to press on other tumblers. To place tumbler 1 at position 3 and 4
|
||
at position 1, you would do something like 1,2,4 and check 3 and 5. To place
|
||
tumbler 1 at position 3 and 4 at 2, you would do something like 1,4,2. To
|
||
place 1 at 3 and 4 at 3, you have to press 1 and 4 at the same time, and then
|
||
advance that mess by two positions. If you use 2 and 3 for this, the notation
|
||
is (14),2,3, which means 1-with-4, then 2, then 3. You can also do 4,1,2,5 to
|
||
put 4 at 4 and check 3. If all these tests fail, that is, no pressure appears
|
||
at any other button, you can start assuming that 4 is supposed to be way out
|
||
there at position 5. For the example, let's say you did 1,4,2 and pressure
|
||
showed up on button 3. To double-check this, you did (14),2,5, and the
|
||
pressure on 3 went away. So tumbler 4 must have gone too far that time. Place
|
||
a fairly high tick mark on the chart at tumbler 4, position 2 to indicate the
|
||
probability.
|
||
|
||
Note: A better way to do that last test, to avoid ambiguity, is to do
|
||
1,(42),5 and check 3, then do (14),2,5 and check 3. This ensures that the only
|
||
change you have made is to move tumbler 4 from 2 to 3 an avoids the possibility
|
||
of movement of tumbler 2 giving bogus results. Through the entire process, you
|
||
want to try to change one thing at a time at every point. Sometimes one of
|
||
this sort of possible test setup won't tell you anything and you have to try
|
||
another one [in this case, perhaps 1,(45),2 and then (14),5,2 while checking 3.
|
||
This has simply swapped the positions of 2 and 5 during your testing].
|
||
|
||
You now know two tumbler positions, with a high degree of confidence, and
|
||
have further reduced the possible combinations. From here, you could mix
|
||
tumblers 2,3 and 5 into the sequence with various permutations, as long as you
|
||
place 1 and 4 correctly every time. This would still take some time and brain
|
||
work ... let's try to find out something about some other buttons. Place 1
|
||
and 4 where they're supposed to go ... the sequence 1,4,2 will do it, and see
|
||
what's up with the other buttons. 1,4,3 will leave 2 and 5 available. You
|
||
find eventually that 2 and 3 have the next bit of pressure distributed between
|
||
them [and are nonzero], and 5 feels like a 0, as described above. To confirm
|
||
this, advance 5 along with some other button and check 3. Bingo: There is no
|
||
pressure on 2 when 5 is enabled [and you have not changed anything else besides
|
||
5's position], so you can firmly decide that 5 is 0 after all. So leave it
|
||
there. [You did this by advancing 1 to 3 and 4 to 2, as usual, so you can feel
|
||
2's pressure in the first place.]
|
||
|
||
By now you should know the proper positions of three of the tumblers, and
|
||
have eliminated any other zeros by feeling their initial pressure. Now, since
|
||
2 and 3 have the next pressure on them, try and find out more about them. You
|
||
know they aren't zero; suppose we try 1? To do this you must get one of them
|
||
to 1, 1 to 3 as usual, 4 to 2, and leave 5 alone. How? Use hitherto unknown
|
||
buttons as dummies to position the tumblers right. For instance, the sequence
|
||
1,4,3 will do what you want here; you then check pressure on 2. Or 1,4,2 and
|
||
check 3. Here you may notice that the pressure on the leftover is a *little*
|
||
stronger than before, but not enough to make any sure judgement. Well, now you
|
||
want to advance an unknown to position 2 - but you suddenly notice that if you
|
||
do [by doing something like 1,(42),3] there are no free buttons left to test
|
||
for pressure! 'Tis time to try possibilities. Your only unknowns are 2 and 3
|
||
now. You must now advance 1 and 4 to their proper positions, leaving 5 alone,
|
||
while sprinkling the unknowns around in the sequence in different permutations.
|
||
Use your chart to remember where the known tumblers must go. Sometimes you get
|
||
two possibilities for a tumbler; you must work this into the permutations also.
|
||
In this particular example, you know that either 2 or 3 [or both!] must be the
|
||
last button[s] pressed, since *something* has to get pressed after 4 to advance
|
||
4 to position 2. An obvious thing to try is putting both the unknowns at
|
||
position 1 by doing 1,4,(23). Try the handle to see if it's open. No? Okay,
|
||
now leave one of the unknowns down at 1 and mix the other one around. For
|
||
instance, for 2 at 1 and 3 at 2, you do 1,(34),2 -- nope. Advance 3 one more;
|
||
(13),4,2 *click* -- huh?? Oh, hey, it's *open*!!
|
||
|
||
Well, when you are quite through dancing around the room, you should know that
|
||
your further possibilities here ran as follows:
|
||
|
||
3,1,4,2 ; to end the permutations with 2 at 1
|
||
1,(24),3 ; and permutations involving 3 at 1.
|
||
(12),4,3
|
||
2,1,4,3
|
||
|
||
One may see how things like 2,1,(34),x are eliminated by the fact that 1
|
||
must get to 3, and 5 must stay still. Since only 4 buttons could be used, no
|
||
tumbler can get to position 5 in this particular combination. Note also that
|
||
the farther *in* a tumbler has to go, the earlier its button was pressed.
|
||
|
||
If all this seems confusing at first, go over it carefully and try to
|
||
visualize what is happening inside the box and how you can feel that through
|
||
the buttons. It is not very likely that you can set up your lock exactly as
|
||
the example, since they are all slightly different. Substitute your first-
|
||
pressure button for the 1 in this example. You may even have one that exhibits
|
||
pressure against two or more tumblers initially. Just apply the
|
||
differential-pressure idea the same way to find their most likely positions.
|
||
The example is just that, to demonstrate how the method works. To really
|
||
understand it, you'll have to set your lock up with some kind of combination,
|
||
and apply the method to opening it while watching the works. Do this a few
|
||
times until you understand what's going on in there, and then you'll be able to
|
||
do it with the lock assembled, and then in your sleep, and then by just waving
|
||
your hands and mumbling....
|
||
|
||
A 5-press combination makes life a little tougher, in that you lose
|
||
versatility in your freedom of test positions, especially if your first-
|
||
pressure tumbler is at position 5. Here you can use the "almost" feature to
|
||
your advantage, and advance the errant tumbler to one before its proper spot,
|
||
and hope to see increased pressure on other tumblers. When a tumbler is one
|
||
away from right, the locking bar tab is hanging a large section of itself into
|
||
the tumbler notch, and the tab's top is slightly rounded. So it can rise a
|
||
little higher than before. If you twist the handle fairly hard, you can
|
||
distort the locking bar slightly and make it rise higher [but don't twist it
|
||
hard enough to break away the safety clutch in the shaft!] The chances of
|
||
someone setting this sort of combination without prior knowledge about the
|
||
*specific* lock are almost nonexistent.
|
||
|
||
As if that wasn't enough, the next thing to deal with is the so-called
|
||
"high-security" combinations involving half-pushes of buttons. The long
|
||
initial travel of the tumbler permits this. If you look at your open mechanism
|
||
and slowly push in a button, you'll see that the tumbler actually travels *two*
|
||
positions before landing in the detent, and further motion is over one position
|
||
per press. There is no inherently higher security in this kind of combination;
|
||
it's just a trick used against the average person who wouldn't think of holding
|
||
a button down while twisting the latch release. It's quite possible to defeat
|
||
these also. When you are testing for pressure against a tumbler set at
|
||
"one-half", you'll feel a kind of "drop-off" in which there is pressure
|
||
initially, and then it disappears just before the detent. Before testing
|
||
further buttons, you'll have to "half-enable" the appropriate "one-half"
|
||
tumblers so the locking bar can rise past them. Set your lock up with a couple
|
||
of combinations of this type and see how it works. Note that you must hold
|
||
down the "half" buttons just before the detent click while setting or opening.
|
||
This makes an effective 7 positions for each tumbler, but in a standard [no
|
||
"halfs"] setup, it's effectively 6. This is Simplex's "high-security" trick
|
||
that they normally only tell their high-dollar military customers about. After
|
||
working the lock over for a while, it's intuitively obvious.
|
||
|
||
The Unican type has no direct pressure direction of twist; if you turn too
|
||
far to the right you only reset the tumblers. What you must do is hold the
|
||
knob against the detent release just tight enough to press the locking bar
|
||
against the tumblers inside the box but not hard enough to slip the detent.
|
||
There is a fairly large torque margin to work with, so this is not difficult to
|
||
do. Unicans do not twist to the left at all, so ignore that direction and work
|
||
clockwise only.
|
||
|
||
Possible fixes
|
||
|
||
The obvious things improvements to make are to cut notches of some kind
|
||
into the locking bar teeth and the tumblers, so that the pressure can't be as
|
||
easily felt. Another way might be to have a slip joint on the locking bar that
|
||
would release before a certain amount of pressure was developed against it, and
|
||
thus never let the tumblers have enough pressure against them to feel. The
|
||
future may see an improved design from Simplex, but the likelihood does not
|
||
seem high. They did not seem interested in addressing the "problem".
|
||
|
||
|
||
Automotive Protection Systems
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
There are several types of locking devices found on cars today. Standard
|
||
window locks, exterior locks, ignition locks, and the famous third party "club"
|
||
type steering wheel locks.
|
||
|
||
Wing or vent windows have several types of locking devices. The most
|
||
common is simply a lever that turns to prevent the window from opening.
|
||
Another type of wing window lock has a lever latch equipped with a plunger at
|
||
the pivot of the latch. The plunger deadlocks the latch against rotation,
|
||
unless the plunger is first pushed in and held until the initial stage of
|
||
rotation has been accomplished. Naturally, these are a bit more secure.
|
||
|
||
The most popular auto locks for the exterior and ignition are a derivative
|
||
of the wafer tumbler locks called the "side-bar wafer lock." Side-bar wafer
|
||
locks offer more protection then either the wafer tumbler or pin tumbler (of
|
||
course they cost more.) When all of the tumblers have aligned to their breaking
|
||
points, a spring-loaded bar falls into place, allowing the cylinder to turn.
|
||
Ford auto locks are an exception, as they have pin tumbler locks.
|
||
|
||
Club Type Locks
|
||
|
||
One of the "club" type auto locks is an extensible bar that has opposing
|
||
hooks that nominally wedge between spokes on the steering wheel. The bar
|
||
itself is notched at 1" intervals or so. The key on these is rather
|
||
impressive; it's a brass tube with at least three sets of chamfers drilled into
|
||
their sides.
|
||
|
||
Defeating Club Type Locks
|
||
|
||
The weak part of these locks is not the keyway; it's the extensible bar.
|
||
The notches provide built-in weak spots. The lock can be forced in about three
|
||
seconds. Do as follows (it helps to be relatively strong):
|
||
|
||
1) Put on weightlifting gloves.
|
||
|
||
2) slide driver's seat all the way back.
|
||
|
||
3) tilt driver's seat all the way down.
|
||
|
||
4) tilt steering wheel all the way down.
|
||
|
||
5) put your feet on ends of "club" (past the rim of the steering wheel)
|
||
|
||
6) grasp center of the notched extension bar. Don't interlace fingers,
|
||
just grab with your dominant hand and then grab over that hand in the other
|
||
direction with the other hand.
|
||
|
||
7) Take a deep breath
|
||
|
||
8) While smoothly exhaling, hold on tight with your hands and straighten
|
||
your legs. (classic leg press -- even Joe Average can exert twice his body
|
||
weight in this mode.)
|
||
|
||
9) "Club" will conveniently bend into a horseshoe or shatter at a convenient
|
||
notch, depending on the mood of the guy running the tempering furnace.
|
||
This is why you wear weightlifting gloves while doing this trick- it keeps
|
||
the steel fragments from cutting you.
|
||
|
||
There is another "club" that has a collar that wraps around a segment of
|
||
the steering wheel; these cost more, are much less common, and the above
|
||
technique does not work for them. However, you can hacksaw the wheel in one
|
||
place and "spring" the wheel enough to allow the collar to pop off the wheel.
|
||
Bend the wheel back, add some tinted epoxy, and you're clean.
|
||
|
||
Auto Alarms
|
||
|
||
More and more, people are using auto alarms to try to protect their
|
||
vehicles. Unfortunately, if somebody wants to steal your car, they will. No
|
||
amount of protection will prevent this. The strategy behind an auto alarm is
|
||
to make your car more of a pain to steal then somebody elses. Here are the
|
||
basics of car alarms.
|
||
|
||
The Brain
|
||
|
||
The main alarm unit, sometimes called the "brain", is mounted in the most
|
||
secure place that can be found. Up inside the dashboard for instance. They
|
||
basically took the whole dash apart, install the alarm, and then put the whole
|
||
dash together around it. Some places install the brain under a seat or even up
|
||
under the carpet on the passenger side ("so they can adjust it easier"). This
|
||
is incredibly stupid.
|
||
|
||
Starter Kill
|
||
|
||
Basically, when the alarm is armed, the starter is electronically
|
||
disconnected so the car cannot be started or even hot wired. Most alarms have
|
||
this as a standard feature.
|
||
|
||
Valet switches
|
||
|
||
This is a toggle switch that can be set to keep the alarm from going off
|
||
if the owner has to leave it with a valet or for car repairs. Most of the
|
||
systems have this feature.
|
||
|
||
Passive vs Active Arming
|
||
|
||
With passive arming, the alarm becomes armed after a given time period
|
||
after the last car door has closed. To disarm, you can either get in to the
|
||
car and place the key in the ignition within a certain time period or press a
|
||
button on a remote transmitter to disarm the alarm.
|
||
|
||
With active arming, you have to press a button on a transmitter to arm the
|
||
alarm. To disarm, you press the transmitter button again.
|
||
|
||
Arming and Disarming beeps
|
||
|
||
Most alarms give you an audible alert when the alarm is armed or disarmed.
|
||
This serves two purposes. One is to let you know the alarm is working and on
|
||
the job. The other is to let others know the car has an alarm.
|
||
|
||
Motion Sensors
|
||
|
||
Some alarms like the UNGO box and others have a motion sensor. In the
|
||
UNGO Box's case, it is a tube filled with mercury surrounded by a wire coil.
|
||
When the car moves, the mercury moves within the tube causing current to flow
|
||
in the coil. This is what sets the alarm off. Other have some type of spring
|
||
with a weight on it so when the car moves, the weight bobbles back and forth
|
||
and makes contact with the casing causing the circuit to be completed. The
|
||
former method has a patent, the latter has no patent because it is worthless.
|
||
If you have ever heard a parking lot full of alarms going off at an airport or
|
||
a parking deck, it is because of this type of sensor. These are prone to false
|
||
alarms from passing trucks, thunder, airplanes, etc.
|
||
|
||
The UNGO Box's sensor is highly adjustable, however, if you adjust it to
|
||
eliminate all false alarms, then you have basically disabled its usefulness for
|
||
triggering real alarms.
|
||
|
||
Shock Sensor
|
||
|
||
This is what comes standard on most alarms. It basically senses motion
|
||
like a motion sensor but scans a very short period of time. You can rock the
|
||
car and push up and down on it and the shock sensor will not go off. If you
|
||
kick a tire or hit the window or door with your fist, the alarm goes off.
|
||
|
||
Glass Breakage Sensor
|
||
|
||
What this is supposed to do is pick up on the particular high frequencies
|
||
of glass being broken or cut and to trigger the alarm. It is basically a
|
||
microphone placed somewhere inside the car.
|
||
|
||
Field Motion Sensor (Perimeter Guard)
|
||
|
||
Basically this is the type of sensor which sets up some type of field
|
||
around the car and inside the car to detect masses coming close to the car. It
|
||
is a must for convertible owners. These aren't as common as most other types
|
||
because of the extremely high cost. There are many cheap ones available to add
|
||
to any alarm, but they have nothing but problems with them (i.e. false
|
||
alarms). Some Alpine systems are designed especially for this type of sensor
|
||
and have a price tag to match.
|
||
|
||
They are basically useless on hard top cars. Some cheap units are set off
|
||
by anything. There is a car parked right outside of my classroom which is
|
||
always being set off by falling rain and passers by. Very annoying. There are
|
||
other fancy alarms which have a pre- recorded message like "Please step away
|
||
from the car ...". These are really stupid and a waste of money. I heard of a
|
||
new BMW being tortured by a group of kids throwing rocks at it just to hear the
|
||
little voice go off.
|
||
|
||
Current sensor
|
||
|
||
This basically monitors the current drain on the battery. If it changes,
|
||
i.e. a door is opened causing a light to come on, the alarm is triggered.
|
||
This is how many cheap alarms are triggered. They just monitor the current.
|
||
The doors and trunk are all protected because they have lights which will come
|
||
on when opened.
|
||
|
||
The problem is, most newer cars have a fan inside the engine compartment
|
||
which comes on even after the car is turned off. The resulting drain on the
|
||
battery will trigger a current sensor.
|
||
|
||
Seat pressure sensor
|
||
|
||
If someone sits in the seat, the alarm is triggered. Not very practical
|
||
unless on a convertible. By the time the thief is in your seat, your car or
|
||
your stereo is history anyway.
|
||
|
||
Backup Battery
|
||
|
||
This is an emergency backup battery for the car alarm. It charges off of
|
||
the car alternator just like the car's battery. If the car's battery goes dead
|
||
or if the power cables are cut, the battery can still run the alarm and the
|
||
siren. The alarm will remain armed.
|
||
|
||
With cheaper alarms and/or poor installations, some systems might end up
|
||
wired into the car in a haphazard way. Most alarms flash the car's parking
|
||
lights when activated. All a thief has to do is short out a parking light, set
|
||
your alarm off and whammo, your car and the alarm goes dead. Thief gets in,
|
||
replaces the right fuses and off he goes.
|
||
|
||
Automatic Door locks/Unlocks
|
||
|
||
Another neat feature is automatic door locking. This is an option on most
|
||
alarms. It uses what they call an "output" from the alarm which can be
|
||
programmed to do various things. Most installers set this up so that when the
|
||
alarm is armed, all doors lock and when the alarm is disarmed, all doors
|
||
unlock.
|
||
|
||
Pagers
|
||
|
||
A pager (sometimes called Autopage) is used to page the owner's beeper
|
||
when the car alarm goes off. This way they can run to the parking lot and
|
||
chase a potential car thief away or catch the person who just rammed in to your
|
||
car before they speed away. Pagers may also use up an "output" on the alarm
|
||
unit. Some hook on to the siren and are triggered off of the vibration when
|
||
the alarm goes off.
|
||
|
||
Transmitters
|
||
|
||
These of course are used to remotely turn the alarm on and off. It seems
|
||
that with cheaper and/or older alarms, it is possible to transmit all of the
|
||
codes in rapid fire sequence to a car alarm. Eventually, you will hit upon the
|
||
right code combination to disarm the alarm. The average alarm has around 2 to
|
||
the 29th codes which is not very many. Newer (and probably more expensive)
|
||
alarms can sense this and lock out any further attempts for a given time
|
||
period.
|
||
|
||
|
||
|
||
The Marlock System
|
||
~~~~~~~~~~~~~~~~~~
|
||
The Marlock System uses a key consisting of a piece of metal with holes
|
||
bored in it, and then covered up with strips of IR-invisible plastic. Thus,
|
||
you can't see anything in the plastic, but IR in the keyhole reader can see
|
||
thru just fine. It decodes this, sends it to a controller interface box, which
|
||
sends it to a controller PC, which says "cool or uncool", and if cool, then the
|
||
interface box sends power to the strike on the door, and turns the LED on the
|
||
reader green.
|
||
|
||
Each area that is to be accessed via Marlock must have some sort of reader
|
||
device. This can be either a "keyhole" in the knob, a plate on the wall with
|
||
the keyhole in it, or whatever. The reader is hooked up to a controller
|
||
interface box. this box is locked with a really poor lock (like you'd have on
|
||
your diskette box) and is located close to the area being secured, often in the
|
||
ceiling. The controller interface box simply provides power for the reader,
|
||
the little LED over the top of the reader, and the electric strike locking the
|
||
door. The whole thing is controlled by an IBM PC with a reader keyhole mounted
|
||
on the front of the PC which runs to an interface card inside the PC.
|
||
|
||
To program a key into the system, one simply inserts it into the keyhole
|
||
on the front of the PC, and then tells the program when and where this key can
|
||
work. This is stored in its database, and recalled by the reader as needed.
|
||
Also the PC keeps logs of when and where a key was used -- whether or not it
|
||
worked! There are audit trails all over the place.
|
||
|
||
If the power goes out, then whether or not the door opens is dependent
|
||
upon the strike which was installed. IT can be either fail-safe (i.e. no
|
||
power -- open!) or fail-secure (i.e. no power- lock!). However, for fire
|
||
safety code requirements, companies often install it on the side of the door
|
||
which allowed entry to a restricted area -- not exit.
|
||
|
||
Some of the Marlock cylinders have a small brass spot in the middle of the
|
||
LED. This is an emergency override. One would insert a marlock key, and use a
|
||
9V battery between the key and the pin to provide a signal to the interface
|
||
controller to pop the strike. This may not still be the case however.
|
||
|
||
Defeating the Marlock System
|
||
|
||
Since there's an electric strike all you have to do is provide power to
|
||
the strike so it'll release. This is usually 12-24 volts DC, and is easily
|
||
obtained from some lantern batteries. The activation wires for the strike
|
||
usually run down inside the door jamb from the controller interface box. And
|
||
if you have access to the controller interface box, then just pick the lock on
|
||
the front of it. The heavier wires are for the electric strike (the thin wires
|
||
are from the reader). Then just apply power to the thing -- use jumper wires
|
||
to get the power from the controller interface box...
|
||
|
||
|
||
VingCards
|
||
~~~~~~~~~
|
||
These cards are used primarily by hotels, and our quite unique. The lock
|
||
is a matrix of 32 pins which have two possible positions each [sort of like a
|
||
vax...]. Two of these are special and aren't really used in the keying. The
|
||
remaining 30 are constructed out of standard pin and driver parts, except that
|
||
all the drivers are the same length and all the pins are the same length. The
|
||
pin-driver combinations sit pointing upward [the springs are underneath] in a
|
||
sort of matrix about 1.5 inches on a side. Above each pin-driver combination
|
||
sits a steel ball. The entire matrix is enclosed in a *plastic* assembly, part
|
||
of which can slide "forward" [i.e. away from the user]. Some of you may be
|
||
familiar with the keys: white plastic cards about 3 inches long with a bunch of
|
||
holes in one end. Pushing this into the slot until it "clicks" forward opens
|
||
the locking mechanism.
|
||
|
||
The lock combination is set by inserting a similar card, only half as
|
||
long, into the *back* of the lock. This card is the same thickness as the
|
||
opening card and has part of the hole matrix cut out. A juxtaposition of this
|
||
combination card from the back and the key card from the front closes the
|
||
matrix: i.e. if you overlay the combination and key cards in their opening
|
||
configuration, there are no open holes left, *exclusively*: i.e. where there
|
||
is a hole on the combination card there is solid on the key card, and vice
|
||
versa. Thus the complement of the proper key card is the combination card.
|
||
This is enforced by the placement of the ballbearings and pins in relation to
|
||
the sliders and top plate, so a workaround like a card with all holes cut out
|
||
or a solid card does not open the thing.
|
||
|
||
The combination card slides in between the conical pin ends and the steel
|
||
ballbearings [and is thus harder to push in than the key card]. The key card
|
||
comes in over the balls, and its thickness pushes the balls under its solid
|
||
regions downward. So each pin assembly is pushed down, when the lock is open,
|
||
the same amount, be it by the key card hitting the ballbearing or the
|
||
combination card wedging the actual pin downward. Clarification: Let us define
|
||
a "1" pin as a hole in the opening card. Thus a "0" pin sits under a solid
|
||
portion of the opening card and a hole in the combination card. A 0 pin opens
|
||
as follows: Since the combination card lets the pin rise up against the steel
|
||
ball, the keycard pushes the ball [and its pin] down to the bottom of the
|
||
keycard slot. This brings that pin to its shear line. Simple. Here's the
|
||
magic -- a 1 pin opens in the following fashion: Since the combination card is
|
||
solid there, the steel ball is sitting directly on the combination card, and
|
||
the pin underneath is *already* at its shear line. If a solid keycard portion
|
||
arrives over this ball, the ball is pushed down against the combination card
|
||
and *pushes the entire area of the combination card down under it*, lousing up
|
||
not only that pin's shear line but probably a few around it. Although a clever
|
||
mechanism, this depends on the elasticity of the combination card to work.
|
||
Note that as the key card is inserted and removed, the combination card will be
|
||
flexed up and down randomly until the keycard comes to rest at its opening
|
||
position. [Correction to above: each pin really has *three* possible
|
||
positions. Hmm.]
|
||
|
||
All this happens within the confines of the sliding *plastic* frame; this
|
||
part carries the two cards, the balls, and the top halves of the pins. The
|
||
stationary part underneath this contains the drivers and springs. A metal
|
||
plate bolts down on top of the sliding piece, leaving a gap just big enough for
|
||
the key card. If the screws holding this plate were to become loose, the plate
|
||
would rise up, the key card would sit too high up, and the lock would not open.
|
||
All the positioning is done by the thickness of the keys while they rest
|
||
against the surfaces of their slots. Therefore a piece of thin cardboard will
|
||
not serve as a duplicate key. We found that two pieces of plastic "do not
|
||
disturb" sign, cut identically and used together, were thick enough to position
|
||
things correctly and open the lock.
|
||
|
||
A rough top view: Pin mechanism:
|
||
|
||
Back _ = top plate Front Back
|
||
o o o o <> = balls ________________________________
|
||
o o o H = keycard HHHHHHHHHHHHH<>HHHHHHHHHH<>HHHHHH ## QQ
|
||
o o o o O = comb. card --> QQ OOOOOOOO<>OOOOOOOOOOOOOOOOOOOOOO
|
||
o o o # = slider QQ# [] [] [] ## QQ
|
||
@ o o @ [] = pins QQ###[]####[]####[]#################
|
||
o o o || = driver/ QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
||
o o o o spring asm QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
||
o o o Q = stationary QQQQQ||QQQQ||QQQQ||QQQQQQQQQQQQQ
|
||
o o o o housing QQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
|
||
Front
|
||
|
||
It is hoped that the diagram on the right, with its three example pins,
|
||
will show sufficiently that if two holes coincide the pin will rise too far,
|
||
and if two solid places coincide, the entire combination card would be pushed
|
||
down by the ballbearings. There is sufficient space underneath the combination
|
||
card for it to sag down and foul the shear line; it is normally held upward by
|
||
the pins' spring tension against the underside. This diagram may be misleading
|
||
if it is not understood that the balls are actually larger than shown; i.e.
|
||
the height of approximately three cards stacked up equals the diameter of the
|
||
ballbearing. There is a thin layer of slider plastic between the keycard and
|
||
the combination card, which separates them and retains the ballbearings.
|
||
|
||
The @'s in the top view are the two magic pins. These prevent the lock
|
||
from working at all unless a combination card is inserted. They are a bit
|
||
thicker than the other pins and do not have ballbearing parts. The slider
|
||
above the combination card slot here is solid, so these pins have nothing to do
|
||
with the keycard. They simply hold the lock shut if no combination card is
|
||
installed, regardless of what is done with a keycard. Therefore if one were to
|
||
make a combination card that only pushed down these pins, a solid keycard would
|
||
work. And if one inserts a solid combination card, the lock is already open
|
||
before you insert anything. [This is a useful hack that will allow anyone to
|
||
open the door with just about any tool, in case you are crashing lots of people
|
||
in a room, don't have enough keys, and don't feel like making more. Naturally
|
||
your security is compromised, but only those who know what's going on will be
|
||
able to get in.]
|
||
|
||
The slider has a bracket bolted on to it, which reaches down toward the
|
||
doorknob and pushes a moveable sleeve with a square hole through it. This
|
||
joins two sections of a three-section split shaft together, which allows the
|
||
outside knob to retract the bolt. The inside knob is "hardwired" to the bolt
|
||
action and always opens the door. The extra split in the shaft is so that with
|
||
the card in place, the lock will still behave like a regular split-shaft
|
||
knobset [and disable opening if the deadbolt is shot].
|
||
|
||
There is a hinged plastic door on the back [inside] of the lock, which is
|
||
held shut with a screwdriver tab inside a slot. This is where the combination
|
||
card goes, although this door exposes enough to see the entire slider mechanism
|
||
[except for its inner works; the entire back must be taken off to get the
|
||
slider out].
|
||
|
||
Now, the security evaluation: I see no clear way to "pick" it. The rear
|
||
pins are hard to get at without touching the frontmost ones. However, this
|
||
lock would be *very* easy to defeat, in the following fashion: A thin tool
|
||
about the thickness of a keycard and about .2 inch wide can cover one column of
|
||
ballbearings. If this tool is slowly slid straight into the slot along each
|
||
column in turn, the resistance encountered as it contacts each ball indicates
|
||
whether there is a hole or not underneath it in the combination card. The
|
||
combination card presses upward against the ball more strongly than the pin's
|
||
spring does, so this would allow one to map the combination card and then
|
||
construct the keycard complement. This process wouldn't take very long. I
|
||
therefore recommend that these locks be considered less than high-security.
|
||
Furthermore, come to think of it, a small hole drilled in the front plate
|
||
[which I doubt is hardened] would make it easy to frob the slider or split
|
||
shaft.
|
||
|
||
|
||
Electronic Hotel Card Locks
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
These are wonderful little microcomputer projects masquerading as door
|
||
locks. Inside there's a processor running a program, with I/O leads going to
|
||
things like the magnetic strip reader, or the infrared LEDs, and the solenoid,
|
||
and the lights on the outside. They are powered entirely by a battery pack,
|
||
and the circuitry is designed such that it draws almost nil power while idle.
|
||
The cards are usually magnetic-strip or infrared. The former uses an oxide
|
||
strip like a bank card, while the infrared card has a lot of holes punched in
|
||
it. Since IR light passes through most kinds of paper, there is usually a thin
|
||
layer of aluminum inside these cards. The nice thing about these systems is
|
||
that the cards are generally expendable; the guest doesn't have to return them
|
||
or worry about lost-key charges, the hotel can make them in quantity on the
|
||
fly, and the combination changes for each new guest in a given room. The hotel
|
||
therefore doesn't need a fulltime key shop, just a large supply of blank cards.
|
||
Duplication isn't a problem either since the keys are invalidated so quickly.
|
||
|
||
The controlling program basically reads your card, validates the number it
|
||
contains against some memory, and optionally pulls a solenoid inside the lock
|
||
mechanism allowing you to enter. The neat thing about them is that card
|
||
changes are done automatically and unknowingly by the new incoming guest. The
|
||
processor generates new card numbers using a pseudorandom sequence, so it is
|
||
able to know the current valid combination, and the *next* one. A newly
|
||
registered guest is given the *new* card, and when the lock sees that card
|
||
instead of the current [i.e. old guest's] card, it chucks the current
|
||
combination, moves the next one into the current one, and generates the new
|
||
next. In addition there is a housekeeping combination that is common to all
|
||
the locks on what's usually a floor, or other management-defined unit.
|
||
|
||
There is no wire or radio connection to the hotel desk. The desk and the
|
||
lock are kept in sync by the assumption that the lock won't ever see the "next"
|
||
card until a new guest shows up. However if you go to the desk and claim to
|
||
have lost your card, the new one they give you is often the "next" card
|
||
instead. If you never use it and continue using your old card, the guest after
|
||
you will have the wrong "next". In cases like this when the hotel's computer
|
||
and the lock get out of sync, the management has to go up and reset the lock.
|
||
This is probably done with a magic card that the lock always knows about [like
|
||
in ROM], and tells it something akin to "use this next card I'm going to insert
|
||
as the current combination". The pseudorandom sequence simply resumes from
|
||
there and everything's fixed. If the lock loses power for some reason, its
|
||
current memory will be lost but the magic "reset" card will work.
|
||
|
||
Rumor has it that these locks always have a back-door means of defeating
|
||
them, in case the logic fails. Needless to say, a given manufacturer's method
|
||
is highly proprietary information. In theory the security of these things is
|
||
very high against a "random guess" card since there are usually many bits
|
||
involved in the combination, and of course there is no mechanical lock to be
|
||
manipulated or picked. The robustness of the locking hardware itself sometimes
|
||
leaves something to be desired, but of course a lock designed for a hotel door
|
||
probably isn't the kind of thing you'd mount on your house.
|
||
|
||
|
||
Security Alarm Systems
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
Security alarm systems are becoming more and more common in the home and
|
||
small business. They will become more and more popular in coming years as
|
||
their prices continue to fall. There are basically two types of systems, the
|
||
open circuit and closed circuit system.
|
||
|
||
The Open Circuit System
|
||
|
||
An open circuit system is composed of magnetic detectors or contacts that
|
||
are "normally closed." That means that their contacts are separated when the
|
||
door or window is in the normally closed position.When the door or window is
|
||
opened, the contacts are released, causing them to close. This allows current
|
||
to flow through the wires, and the alarm sounds. All the contacts and
|
||
detectors are wired in parallel. This means that current flows ONLY when any
|
||
contact or detector switch makes contact. Let me illustrate:
|
||
|
||
|
||
switch is open switch is closed
|
||
|
||
wire
|
||
----#############1############# ----#############1#############
|
||
#############2#############---
|
||
|
||
#############2#############----
|
||
########## wire
|
||
==========================
|
||
| MAGNET | (Magnet has been removed)
|
||
==========================
|
||
|
||
|
||
A Normally Closed Switch Assembly
|
||
|
||
|
||
|
||
In the first figure, the "normally closed" switch assembly, which would be
|
||
mounted about the door, is help open as the lower portion (#2) is pulled to the
|
||
magnet which would be mounted on top of the door. The magnet has an attractive
|
||
force greater than the force of a spring which normally holds the two parts of
|
||
the switch closed. In this position, no current flows through the switch. In
|
||
the second figure, the door would be open, and thus the magnet not aligned
|
||
under the switch. Both halves of the switch have been returned to their
|
||
"normal" position, closed, by the spring.
|
||
|
||
The obvious disadvantage of an open circuit system is that it become
|
||
inoperative if a transmission wire is cut, a contact or terminal wire becomes
|
||
loose, or some similar condition. For this reason, circuit wiring for this
|
||
type is often concealed. The vulnerability of the system is minimized by a
|
||
test switch or key position which sends current through the main circuit wiring
|
||
and reveals any line breaks. This test lights a small warning lamp on the main
|
||
panel, bypassing the main alarm. This will only test the integrity of the
|
||
circuit, not individual detectors.
|
||
|
||
When the open circuit system is engaged, an alarm will occur immediately
|
||
if any doors are windows have been left open. Of course the alarm will also
|
||
sound anytime a door is used while the alarm is in operation. Many times a
|
||
bypass switch will be placed next to frequently used access ways. This can be
|
||
dangerous because someone can break a door or window pain, activate the bypass
|
||
switch, and have free access to the entrance.
|
||
|
||
|
||
The Closed Circuit System
|
||
|
||
In a closed circuit security system, low amperage current continuously
|
||
flows from the power source, throughout the detector switches, to the
|
||
supervising relay (a type of switch) in the control panel. The detector
|
||
switches are of the normally open type. This is the opposite of the normally
|
||
closed type. The magnet holds the normally open switch assembly together, so
|
||
current flows through the switch. When the magnet is removed, the switch
|
||
springs open, and current ceases to flow throughout the circuit. The
|
||
supervising relay monitors the current in the circuit, and should it be
|
||
interrupted (by a door opening and causing a detector switch to open), it will
|
||
activate the alarm buzzer, telephone dialer, siren, or whatever.
|
||
|
||
Note that in the closed circuit system, any attempt to cut the wires would
|
||
have the same effect as opening a detector switch. The current would be
|
||
interrupted and the alarm would sound. This makes the closed circuit a much
|
||
more secure system than the open circuit type.
|
||
|
||
The closed circuit system requires more sophisticated equipment and the
|
||
circuit installation must be precisely wired. Closed systems are also prone to
|
||
more frequent false alarms.
|
||
|
||
|
||
Security Alarm System Power Sources
|
||
|
||
The current for most systems comes from battery, transformer, or a
|
||
recharging pack. The recharging pack is a complete power supply providing 6-12
|
||
volts of power. This is enough to run several separate alarm circuits and even
|
||
a six volt telephone dialer. It is usually equipped with nicad backup
|
||
batteries in case of power failure.
|
||
|
||
|
||
Magnetic Detectors
|
||
|
||
I used the "Magnetic Detector" when explaining the closed and open circuit
|
||
types of security systems. These are by far the most common type of detectors
|
||
used. As discussed before, they are a two part assembly consisting of a magnet
|
||
and a switch. Both are encased in a weatherproof plastic case.
|
||
|
||
|
||
Tamper Switch or Plunger Contact
|
||
|
||
Another popular type of detector is the tamper switch. It may be used on
|
||
windows, alarm boxes, or control panels. It consists of a switch assembly with
|
||
a spring loaded "plunger" protruding from one end. It is available in both the
|
||
normally open and normally closed configurations.
|
||
|
||
|
||
All-Purpose (Bullet) Detector
|
||
|
||
This is a beveled button used primarily on doors or double-hung windows.
|
||
The button is installed in the hinged side of the door frame, recessed into the
|
||
frame. When the door is closed, the button is depressed. When opened, it of
|
||
course pops out.
|
||
|
||
|
||
Floor Mats
|
||
|
||
Pressure sensitive mats wired with open or closed circuits to make or
|
||
break contact when stepped upon are used as backup to perimeter security
|
||
systems such as rear entrance doors. They can be placed under regular
|
||
carpeting or loose rugs.
|
||
|
||
|
||
Door and Window Traps
|
||
|
||
These are basically "trip-wires" and aren't used too often. They do work
|
||
well in areas where conventional detectors would not work, and are
|
||
substantially cheaper than infrared. They can be placed in either a horizontal
|
||
or vertical configuration. For open circuit systems, an insulated plug is
|
||
placed between the contacts of the detector. When it is tripped, the plug is
|
||
pulled out, causing the detector's switch to close. For a closed circuit
|
||
system, one end of the trip wire is attached to one end of the switch, and the
|
||
other end of the trip wire to the other half of the switch. This way current
|
||
still flows in the circuit. When the wire is tripped, the circuit breaks.
|
||
|
||
|
||
Photoelectric Systems
|
||
|
||
Photoelectric systems transmit invisible pulse modulated beams from
|
||
projector/transmitter to receiver. Interruption of the beam sets off the
|
||
alarm. Although the system is designed primarily for interior used, military
|
||
systems have been developed for use on the exterior, even in dense fog.
|
||
|
||
|
||
Emergency Panic Button
|
||
|
||
This permits an alarm to be activated by use of a pushbutton located near
|
||
a front door, in a bedroom, or hidden under a counter. In a business, such a
|
||
button could be used as a "holdup" button, silently summoning the police or
|
||
activating the normal store alarm system.
|
||
|
||
|
||
Automatic Telephone Dialer
|
||
|
||
This is a device that will automatically call the appropriate telephone
|
||
number and relay a prerecorded message. These devices are often used to
|
||
contact the police, private security, or store officials. Of course, the
|
||
system is at risk if the exterior phone wires are accessible. For this reason
|
||
the phone wiring will be either incased in a steel sheath or wired for alarm.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
|
||
----------------------------------------------------
|
||
--- US Secret Service Radio Frequencies ---
|
||
-- --
|
||
- [From information gathered from Miles Barkman] -
|
||
----------------------------------------------------
|
||
|
||
|
||
President, Vice President, or other notable coming to town? Like to
|
||
know whats going on? Here is a handy reference guide to some of the known
|
||
frequencies used by the Secret Service. Should provide some interesting
|
||
scanning for you radio jocks out there.
|
||
|
||
|
||
Note: USSS=US Secret Service
|
||
WHCA=White House Communications Agency
|
||
|
||
Designation Frequency Primary Usage
|
||
------------------------------------------------------------------------------
|
||
Alpha 032.2300 MHz WHCA-Transportation
|
||
166.5125 MHz WHCA-Transportation
|
||
Able 032.2300 MHz ???????????
|
||
032.3200 MHz ???????????
|
||
Baker 165.7875 MHz USSS-Field Offices
|
||
Charlie 165.3750 MHz USSS-Field Offices/Protection
|
||
Delta 169.9250 MHz WHCA-Marine Security Detachment
|
||
Echo 407.8500 MHz WHCA-SAM Uplink
|
||
Foxtrot 415.7000 MHz WHCA-SAM Downlink
|
||
Golf 166.4000 MHz USSS-Field Offices
|
||
Hotel 167.9000 MHz WHCA-V.P. Staff/White House Garage
|
||
165.6875 MHz WHCA-V.P. Staff/White House Garage
|
||
166.2125 MHz WHCA-V.P. Staff/White House Garage
|
||
India 407.9250 MHz USSS-Headquarters
|
||
166.2000 MHz USSS-Headquarters
|
||
Juliett 170.0000 MHz USSS-Paging/Camp David
|
||
Kilo 167.8250 MHz Duplex Phone-Pres Res/LBJ
|
||
Lima 168.7875 MHz Duplex Phone-Pres Res/LBJ
|
||
Lavender 418.1250 MHz WHCA-Transportation
|
||
Mike 165.2125 MHz USSS-Dignitary/Former Pres Protection
|
||
November 166.7000 MHz WHCA-White House Staff
|
||
Oscar 164.8875 MHz USSS-Presidential Protection
|
||
Papa 164.4000 MHz USSS-Field Offices/Protection
|
||
Quebec ???.???? MHz ???????????
|
||
Romeo 166.4000 MHz USSS-Repeater Output
|
||
164.4000 MHz USSS-Repeater Output
|
||
Sierra 166.5125 MHz WHCA-White House Staff
|
||
Tango 164.6500 MHz USSS-Field Offices/Protection
|
||
Uniform 361.6000 MHz AF-1 Communications
|
||
165.0875 MHz AF-1 Communications
|
||
Victor 164.1000 MHz WHCA VP Protection
|
||
Whiskey 167.0250 MHz WHCA-Paging
|
||
X-ray 166.4625 MHz Treasury Common
|
||
Yankee 162.6875 MHz WHCA-Presidential phone uplink or downlink
|
||
Zulu 171.2875 MHz WHCA-Presidential phone downlink or uplink
|
||
|
||
|
||
|
||
Pres Nighthawk Aircraft Fleet (HMX)
|
||
-----------------------------------
|
||
Frequency Primary Usage
|
||
-----------------------------------
|
||
046.7500 MHz Transport
|
||
375.0000 MHz Transport
|
||
034.3500 MHz VIP Transport Net
|
||
142.7500 MHz Command Post
|
||
265.8000 MHz Squadron Common
|
||
|
||
|
||
Other Phone Patches
|
||
------------------------------------------------
|
||
Frequency Type Primary Usage
|
||
------------------------------------------------
|
||
407.4750 MHz (uplink) Nationwide-2
|
||
415.8000 MHz (downlink) Nationwide-2
|
||
407.4500 MHz (duplex) Limousines (Local/DC)
|
||
408.2000 MHz (duplex) Limousines (Local/DC)
|
||
|
||
|
||
USSS Uniform Division
|
||
---------------------------------
|
||
Designation Output / Input Freq
|
||
---------------------------------
|
||
Gray 418.350/407.750 MHz
|
||
Orange 418.775/414.950 MHz
|
||
Brown 414.850/418.800 MHz
|
||
Red 415.975/419.725 MHz
|
||
Silver 415.650/419.100 MHz
|
||
Yellow 414.675/418.150 MHz
|
||
|
||
|
||
Training Division: Beltsville, MD
|
||
---------------------------------
|
||
Designation Output / Input Freq
|
||
---------------------------------
|
||
Green 415.750/407.875 MHz
|
||
Black 415.100/418.325 MHz
|
||
Blue 414.800 MHz
|
||
Violet 415.800 MHz
|
||
|
||
|
||
Communications Division
|
||
---------------------------------
|
||
Designation Output / Input Freq
|
||
---------------------------------
|
||
Gold 415.675/419.075 MHz
|
||
|
||
|
||
Technical Security Division
|
||
---------------------------
|
||
Designation Frequency
|
||
---------------------------
|
||
F-1 408.000 MHz
|
||
F-2 411.000 MHz
|
||
F-3 408.500 MHz
|
||
F-4 408.975 MHz
|
||
|
||
|
||
Other Reported USSS Frequencies
|
||
---------------------------------------
|
||
Frequency Primary Usage
|
||
---------------------------------------
|
||
163.7375 MHz
|
||
164.6500 MHz
|
||
165.2250 MHz
|
||
165.6875 MHz Washington Field Office
|
||
166.2000 MHz Washington Field Office
|
||
406.2625 MHz
|
||
407.8000 MHz
|
||
407.8250 MHz Suit Radios
|
||
407.8750 MHz Suit Radios
|
||
407.9750 MHz
|
||
408.9750 MHz
|
||
|
||
|
||
Hints for monitoring
|
||
--------------------
|
||
|
||
Most of the interesting frequencies are USUALLY scrambled during actual
|
||
operations. However, 407.850 and 415.700 are never scrambled.
|
||
|
||
Sometimes, the best info on plane landings and limo locations and such can be
|
||
obtained through regular airport communications and local police.
|
||
|
||
The Secret Service has been known to occasionally use cellular communications.
|
||
|
||
The PL used extensively by USSS is 103.5 Hz.
|
||
|
||
Hearing the callsign "Air Force 1" means the President is on the plane. "Air
|
||
Force 2" is the Vice President's plane.
|
||
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
|
||
Cellular Update
|
||
|
||
|
||
Well, they've done it again. The high paying special interest groups have
|
||
gotten yet another law passed. Now it is not only illegal to listen to
|
||
cellular communications, but illegal to even MAKE a tuner capable of tuning
|
||
them in! Never mind thats its just EMR floating through space, your body, your
|
||
house. It is ILLEGAL to tune a crystal to such and such frequency converting
|
||
the energy to audio. Ridiculous. People who broadcast their conversation
|
||
across the country side should have no expectation of privacy. Does everyone
|
||
have to cover their ears when I yell out the window to my friend? No, of
|
||
course not. The question of it being immoral or not should not be confused
|
||
with legality. Heres the new law.
|
||
|
||
|
||
SEC. 408. INTERCEPTION OF CELLULAR COMMUNICATIONS.
|
||
|
||
(a) AMENDMENT -- Section 302 of the Communications Act of 1934
|
||
(47 USC 302) is amended by adding at the end the following new
|
||
subsection:
|
||
|
||
(d)(1) Within 180 days after the date of enactment of this
|
||
subsection, the Commission shall prescribe and make effective
|
||
regulations denying equipment authorization (under part 15
|
||
if title 47, Code of Federal Regulations, or any other part
|
||
of that title) any scanning receiver that is capable of --
|
||
|
||
(A) receiving transmissions in the frequencies allocated to the
|
||
domestic cellular radio telecommunications service,
|
||
(B) being readily altered by the user to receive transmissions
|
||
in such frequencies, or
|
||
(C) being equiped with decoders that covert digital cellular
|
||
transmissions to analog voice audio.
|
||
|
||
(2) Beginning 1 year after the effective date of the regulations
|
||
adopted pursuant to paragraph (1), no receiver having the
|
||
capabilities described in subparagraph (A), (B), or (C) of
|
||
paragraph (1), as such capabilities are defined in such
|
||
regulations, shall be manufactured in the United States or
|
||
imported for use in the United States.
|
||
|
||
|
||
|
||
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
||
|
||
|
||
The HP3000's 'SECURITY/3000' system (part 3)
|
||
|
||
by Sterling
|
||
|
||
|
||
|
||
The third and final part of our series on HP3000 Security.
|
||
|
||
STREAMX/SLEEPER -- LINKS STREAMX WITH SLEEPER
|
||
*********************************************
|
||
|
||
INTRODUCTION
|
||
~~~~~~~~~~~~
|
||
A very popular program from the Contributed Software Library (CSL) is SLEEPER,
|
||
which can stream a job, run a program, or execute a command or any combination
|
||
of these at any specified time and repeat this action at specified intervals.
|
||
Many HP3000 sites use SLEEPER to launch job streams at specified times during
|
||
the day or night, and at regular intervals (for instance it might run a report
|
||
program each night at 12:00 and stream a job which does a sysdump at 7:00 a.m.
|
||
each Friday).
|
||
|
||
But to stream a job using SLEEPER, the MPE passwords must be embedded in the
|
||
job stream. A better solution would be to use STREAMX in conjunction with
|
||
SLEEPER and have STREAMX generate the passwords.
|
||
|
||
|
||
|
||
SLEEPER INSTRUCTIONS
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
Those familiar with SLEEPER know that the file 'SLEEPCOM' must first be built
|
||
as follows:
|
||
|
||
:BUILD SLEEPCOM;REC=-72,4,F,ASCII;DISC=20,1,1
|
||
|
||
and then SLEEPERC (the SLEEPER communications program) is run to add entries to
|
||
the SLEEPER file. SLEEPERC will ask the date, hour, and minute when the
|
||
activity is to start. It will then ask if the activity is to run a program,
|
||
stream a job, or execute a command. The name of the proper disc file is asked
|
||
for next; then the repetition time in days, hours, and minutes (or 'none') is
|
||
requested.
|
||
|
||
The SLEEPER communication program may be used at any time to add, delete, or
|
||
list the current SLEEPER entries; even when the SLEEPER program is running.
|
||
(If you are having trouble adding entries, make sure the SLEEPCOM file is not
|
||
full.)
|
||
|
||
After the SLEEPER communication file is set up you may run the SLEEPER program
|
||
(either type ':RUN SLEEPER', or let OVERLORD [also from the CSL] run the
|
||
SLEEPER program automatically). SLEEPER will then determine the earliest time
|
||
that any activity must be executed, then "go to sleep" (via the PAUSE
|
||
intrinsic) until it is time to schedule that activity. In this way the SLEEPER
|
||
program is little load upon the system, as it is sleeping most of the time.
|
||
|
||
If a repetition time is specified for an activity then SLEEPER will update the
|
||
time to schedule that activity after it has been scheduled by adding the
|
||
repetition interval to the scheduling time. If no repetition interval is
|
||
specified then that activity is deleted from the communications file after it
|
||
is executed.
|
||
|
||
SLEEPERC is a program used to communicate with the SLEEPER program as it runs.
|
||
The OVERLORD program may be used to run SLEEPER or SLEEPER may be run alone
|
||
(usually as a batch job).
|
||
|
||
|
||
HOW STREAMX/SLEEPER WORKS
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
As you know, STREAMX gets passwords for job streams by prompting for them at
|
||
:STREAM time; but because SLEEPER is streaming the job, there is no one to
|
||
answer the passwords. Fortunately, SLEEPER is generally run by MANAGER.SYS (or
|
||
a user with SM capability), so STREAMX will automatically generate the
|
||
passwords for all job streams streamed by SLEEPER, since STREAMX's logic
|
||
dictates that an SM user never needs to answer any passwords because he can
|
||
retrieve them anyway.
|
||
|
||
To link STREAMX with SLEEPER, we need to run STREAMX in immediate mode,
|
||
equating the file we want to stream with STRMFILE and invoking STREAMX with
|
||
PARM=1.
|
||
|
||
Unfortunately, SLEEPER cannot run programs with parms, so instead of running
|
||
STREAMX, we run STRMSLEP, which simply invokes STREAMX with PARM=1.
|
||
|
||
|
||
LOGOFF -- LOGS OFF INACTIVE SESSIONS
|
||
************************************
|
||
|
||
INTRODUCTION
|
||
~~~~~~~~~~~~
|
||
Users often log on to the system, do some work, and then leave the terminal
|
||
unattended (coffee break?, lunch?) without logging off. Sometimes users even
|
||
go home for the day without logging off.
|
||
|
||
* SECURITY THREAT:
|
||
|
||
WALK UP TO TERMINAL
|
||
TAKE ADVANTAGE OF CAPABILITIES
|
||
DISCOVER MPE PASSWORDS TO SENSITIVE ACCOUNTS
|
||
|
||
This can be a security problem because this means that anyone can come up to a
|
||
terminal and use it without having to go through any security system. This can
|
||
be an even greater problem if the logged-on user is an Account Manager or the
|
||
System Manager because the would-be thief could take advantage of the extra
|
||
capabilities and gain access to sensitive information. (It's fortunate,
|
||
though, that you are using SECURITY/3000 because the personal profile answers
|
||
which must be known to gain access to the system are one-way
|
||
encrypted--otherwise, the would-be thief could do a :LISTUSER, :LISTGROUP, and
|
||
:LISTACCT, retrieve all the MPE passwords, erase all evidence that he did so by
|
||
clearing the screen, and then log on as that user at some later date.
|
||
|
||
* SYSTEM RESOURCE WASTE:
|
||
|
||
SYSTEM TABLES
|
||
MORE TERMINALS THAN PORTS
|
||
|
||
Another problem posed by having an idle terminal is that certain system
|
||
resources are being used unnecessarily. This can be of particular concern if
|
||
you are short on CST and DST entries, and especially if you have several users
|
||
contending for a limited number of ports through data switches or port
|
||
selectors. Why should an inactive session consume valuable resources?
|
||
Logged-on sessions at the end of the day also prevent you from doing your
|
||
backup.
|
||
|
||
LOGOFF remedies these problems. It permits the System Manager to ensure that
|
||
any terminal which is logged on but has not been actively used for a certain
|
||
length of time is automatically logged off.
|
||
|
||
|
||
HOW LOGOFF WORKS
|
||
~~~~~~~~~~~~~~~~
|
||
LOGOFF will log off qualifying sessions that have exceeded the acceptable
|
||
period of inactivity. You specify how much inactivity is acceptable and which
|
||
sessions are to be monitored for inactivity.
|
||
|
||
* REMOVES INACTIVE/UNWANTED SESSIONS FROM SYSTEM
|
||
* INACTIVE = READ PENDING AND NO CPU USAGE RECENTLY
|
||
* uses MPE :ABORTJOB #Snnnn
|
||
|
||
LOGOFF decides that a session is inactive if it's had a terminal read pending
|
||
for a long time (at least as long as the configured timeout period). For
|
||
example, if the timeout period is 20 minutes (1200 seconds) and some program
|
||
prompted the user for input 20 minutes ago and he still hasn't responded,
|
||
LOGOFF will abort that user. On the other hand, if the program's been working
|
||
for 20 minutes, or even been suspended waiting for a :REPLY (or anything else
|
||
that doesn't involve a terminal read), the program won't be aborted.
|
||
|
||
After you configure LOGOFF (see CONFIGURING LOGOFF in this section) you stream
|
||
a job which runs the LOGOFF program--the program will run "in the background"
|
||
all the time and monitor the system using a minimal amount of resources.
|
||
|
||
LOGOFF will perform an :ABORTJOB on inactive sessions--MPE will take care of
|
||
file closures, buffer posting, etc.
|
||
|
||
When a session is aborted by LOGOFF,
|
||
|
||
* a message saying that the session is being aborted due to lack
|
||
of activity is sent to that session's terminal (the text of
|
||
this message will default, but you may define your own)
|
||
|
||
* if the terminal is in BLOCK MODE (e.g. VPLUS screen),
|
||
LOGOFF will take the terminal out of this mode and display
|
||
its message below the screen.
|
||
|
||
* a message describing the logoff and identifying the LDEV of
|
||
the logged-off session is sent to the system console
|
||
|
||
* an entry is written to LOGOFF job stream's output
|
||
spool file indicating the session number aborted and the time
|
||
and date it was aborted
|
||
|
||
|
||
CONFIGURING LOGOFF
|
||
~~~~~~~~~~~~~~~~~~
|
||
You may configure logoff in a number of ways.
|
||
|
||
* ACCEPTABLE PERIOD OF INACTIVITY
|
||
* WHICH SESSIONS TO MONITOR (BY LDEV)
|
||
* SESSIONS CURRENTLY RUNNING PROGRAM
|
||
* BLOCK MODE HANDLING
|
||
* DS SESSION HANDLING
|
||
* ABORT MESSAGE TO BE SENT
|
||
|
||
First, you must specify the acceptable period of inactivity. This is done with
|
||
the $TIMEOUT keyword.
|
||
|
||
Next, you may optionally configure which sessions will have their activity
|
||
monitored by using the $TERMINALS keyword. This is done by defining the
|
||
"ldev-pool" of logical devices to be monitored.
|
||
|
||
Also, you may specify additional criteria to be checked by LOGOFF before the
|
||
inactive terminal is aborted (e.g. that sessions running a particular program
|
||
should not be aborted).
|
||
|
||
Furthermore, you may configure how LOGOFF will deal with sessions which have
|
||
qualified to be logged off. This includes BLOCK MODE handling, DS SESSION
|
||
exclusion, and the MESSAGE to be sent to the user.
|
||
|
||
If you specify only the $TIMEOUT period, logoff will by default:
|
||
* monitor sessions on any logical device
|
||
* exit a terminal from block mode and then display message
|
||
* not abort sessions with a DS session
|
||
* display the default logoff message
|
||
* abort sessions running any program
|
||
|
||
If you have already configured LOGOFF and wish to change something in the
|
||
configuration while LOGOFF is running, you need not abort the LOGOFF job and
|
||
re-start it--just make the changes to the configuration file and they will take
|
||
effect right away (or, rather, the next time the LOGOFF program reads the
|
||
LOGOFF data file).
|
||
|
||
The configuration information for LOGOFF is kept in the file
|
||
LOGOFF.DATA.SECURITY and each time you make a change to it by KEEPing the file
|
||
from the :EDITOR you must:
|
||
|
||
:ALTSEC LOGOFF.DATA.SECURITY;(R,X,A,L,W:CR)
|
||
|
||
|
||
SPECIFYING WHICH LOGICAL DEVICES ARE TO BE MONITORED
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
You may specify which logical devices are to be monitored by LOGOFF. The LDEVs
|
||
to be monitored are referred to as the "ldev-pool". This "ldev-pool" is
|
||
defined by adding a keyword and a list of LDEVs to the LOGOFF.DATA.SECURITY
|
||
file. If you specify to INCLUDE a list of LDEVs, the "ldev-pool" will be that
|
||
list of LDEVs. If you specify to EXCLUDE a list of LDEVs, the "ldev-pool" will
|
||
be all the LDEVs configured as terminals which are not in your EXCLUDE list.
|
||
|
||
Either add a line to INCLUDE certain terminals:
|
||
|
||
$TERMINALS INCLUDE ldev ldev ldev ldev ldev ...
|
||
|
||
or to EXCLUDE certain terminals:
|
||
|
||
$TERMINALS EXCLUDE ldev ldev ldev ldev ldev ...
|
||
|
||
where 'ldev' is any logical device number (e.g. '21 38 40 47') which are
|
||
included in or excluded from the logoff "ldev-pool".
|
||
|
||
LOGOFF will monitor only the sessions logged on to the LDEVs in the logoff
|
||
"ldev-pool". The LDEV which is the system console is always excluded from the
|
||
"ldev-pool" (even if it is switched from LDEV 20).
|
||
|
||
If all the LDEVs you need to specify do not fit on a 72-character line, you may
|
||
put them on several lines as follows:
|
||
|
||
$TERMINALS INCLUDE 22 23 24 25 27 29 30 31 32 33 35 37
|
||
38 39 47 48 55 56 57 58
|
||
|
||
If neither a $TERMINALS INCLUDE or $TERMINALS EXCLUDE line is contained in the
|
||
file, all LDEVs (except the console and all DS sessions) will be included in
|
||
the "ldev-pool". Regardless of what you specify, LOGOFF will only monitor
|
||
LDEVs which are configured as type = 16 (terminals).
|
||
|
||
|
||
NOT LOGGING OFF SESSIONS RUNNING A SPECIFIED PROGRAM
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
After LOGOFF has qualified a session by LDEV and inactivity, you may
|
||
additionally specify that sessions running a particular program not be aborted.
|
||
This means that programs such as FORMSPEC.PUB.SYS which often have long periods
|
||
of inactivity (due to screen design) may be specified to logoff as being
|
||
special and that regardless of inactivity this session should not be logged off
|
||
while running this program. To configure LOGOFF to EXCLUDE logging off
|
||
sessions running a particular program add a line to LOGOFF.DATA.SECURITY:
|
||
|
||
$PROGRAMS EXCLUDE program program program ...
|
||
|
||
where 'program's are fully qualified program names (e.g. ENTRY.PUB.SYS
|
||
FORMSPEC.PUB.SYS).
|
||
|
||
If no $PROGRAMS is specified, this check is not performed.
|
||
|
||
|
||
RESTRICTING LOGOFF BY USERS
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
With $TERMINALS INCLUDE and EXCLUDE, you can have LOGOFF abort only those
|
||
inactive sessions which are running on certain terminals (or, for EXCLUDE,
|
||
running on any terminals EXCEPT the ones given). With $PROGRAMS INCLUDE and
|
||
EXCLUDE, you can restrict LOGOFF to only look at terminals that are running (or
|
||
not running) certain programs. Similarly, with $USERS INCLUDE and EXCLUDE, you
|
||
can specify which users should or should not be aborted due to inactivity.
|
||
|
||
Say, for instance, that you don't mind people walking away from their terminals
|
||
whenever they're signed on to non-sensitive accounts. The only accounts that
|
||
you really want LOGOFF to work on are AP, GL, and SYS. You can just add the
|
||
following line to your LOGOFF.DATA.SECURITY file:
|
||
|
||
$USERS INCLUDE @.AP @.GL @.SYS
|
||
|
||
Whenever LOGOFF sees an inactive session, it will check to see if it's logged
|
||
on to one of those three accounts; if it isn't, LOGOFF won't touch it.
|
||
|
||
Similarly, there might be some specific users that you don't want to abort.
|
||
BIG.CHEESE, for instance -- your boss -- gets very aggravated when he gets
|
||
kicked off the system, and the fact that he shouldn't leave his terminal
|
||
inactive doesn't sway him. Rank has its privileges, after all, and you can
|
||
just say
|
||
|
||
$USERS EXCLUDE BIG.CHEESE
|
||
|
||
Actually, you can be very specific in who you include or exclude. As the first
|
||
example above showed, you can specify user identifiers with wildcards (@.AP,
|
||
CLERK@.GL, JOE.@, etc.); also, you can select by session name and group name as
|
||
well as user name and account name, so you can say
|
||
|
||
$USERS EXCLUDE JOE,@.DEV,SOURCE
|
||
|
||
which will exclude sessions signed on with session name "JOE" into the "SOURCE"
|
||
group of the "DEV" account.
|
||
|
||
If you have neither a $USERS INCLUDE nor a $USERS EXCLUDE line in the
|
||
LOGOFF.DATA.SECURITY file, LOGOFF will abort inactive sessions regardless of
|
||
their user id (although the $TERMINALS and $PROGRAMS restrictions still apply).
|
||
This is a pretty good default, since usually any inactive session is not a good
|
||
thing to have around.
|
||
|
||
|
||
DS SESSIONS - TO ABORT OR NOT TO ABORT (THAT IS THE OPTION)
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
LOGOFF may be configured to abort sessions regardless of whether they are a
|
||
local or remote DS-session. By default, LOGOFF will not abort any DS-session.
|
||
You may perform the abort by configuring the LOGOFF.DATA.SECURITY file with the
|
||
keyword:
|
||
|
||
$DSABORT
|
||
|
||
This will cause DS-sessions to be aborted.
|
||
|
||
|
||
SAMPLE CONFIGURATION
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
EXAMPLE1: If the LOGOFF.DATA.SECURITY file contained the following:
|
||
|
||
$TIMEOUT 900
|
||
$TERMINALS EXCLUDE 33 36 38 39 45
|
||
$PROGRAMS EXCLUDE FORMSPEC.PUB.SYS ENTRY.PUB.SYS
|
||
|
||
then LOGOFF would abort all sessions that were all of the following:
|
||
|
||
Inactive for more than 900 seconds (15 minutes)
|
||
AND logged on to an LDEV other than 33,36,38,39 or 45
|
||
AND running a program other than FORMSPEC.PUB.SYS and ENTRY.PUB.SYS
|
||
|
||
EXAMPLE2: If the LOGOFF.DATA.SECURITY file contained the following:
|
||
|
||
$TIMEOUT 1200
|
||
$TERMINALS INCLUDE 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
|
||
48 49 50 51 52 53 54 55 56 57 58 59 60
|
||
|
||
then LOGOFF would abort all sessions that were:
|
||
|
||
Inactive for more than 1200 seconds (20 minutes)
|
||
AND logged on to an LDEV from 33 to 60 inclusive.
|
||
|
||
|
||
ACTIVATING LOGOFF
|
||
~~~~~~~~~~~~~~~~~
|
||
To have LOGOFF continually monitor the system and abort idle sessions (using
|
||
the parameters you have configured in LOGOFF.DATA.SECURITY) you need to stream
|
||
a job which runs the LOGOFF.PUB.SECURITY program, which wakes up every so often
|
||
(using a minimal amount of system resources) and aborts all sessions which
|
||
should be aborted, according to your configuration in LOGOFF.DATA.SECURITY.
|
||
|
||
The logoff job stream is stored in the file
|
||
|
||
LOGOFF.JOB.SECURITY
|
||
|
||
which does not contain any passwords on the job card, so STREAMX should be used
|
||
to stream the job (see the "STREAMX" section of this manual for information
|
||
about eliminating passwords in job streams). Just do this:
|
||
|
||
:FILE STRMFILE=LOGOFF.JOB.SECURITY
|
||
:RUN STREAMX.PUB.SECURITY;PARM=1
|
||
|
||
|
||
STOPPING LOGOFF
|
||
~~~~~~~~~~~~~~~
|
||
"A car needs to be able to do only two things -- to go and to stop."
|
||
|
||
A LOGOFF job stream is just a 'plain vanilla' MPE job. If you want to abort
|
||
it, you can just do an :ABORTJOB, just like you would for any job of your own.
|
||
|
||
On the other hand, MPE's :ABORTJOB is sometimes rather temperamental. Surely
|
||
you, as a system manager, have often encountered sessions that just won't go
|
||
away -- no matter how many :ABORTJOBs are done, they're still there; sometimes
|
||
you even have to re-start the system if you want them removed.
|
||
|
||
This is why it's a good idea for all background tasks, like LOGOFF, to have
|
||
some normal shutdown procedure, which can let somebody stop them without having
|
||
to do an :ABORTJOB. To do this, you just
|
||
|
||
:RUN LOGOFF.PUB.SECURITY,STOP
|
||
|
||
This will send a message to the LOGOFF job stream using a message file; LOGOFF
|
||
will catch this message and perform an orderly shutdown of itself. Of course,
|
||
you can still do an :ABORTJOB of the job stream if you want to, but we think
|
||
that the ":RUN LOGOFF.PUB.SECURITY,STOP" is a cleaner solution.
|
||
|
||
Note that there's no reason why you have to abort the LOGOFF job stream when
|
||
you do a system backup. Just keep it running.
|
||
|
||
|
||
|
||
PASCHG-changing MPE passwords
|
||
*****************************
|
||
|
||
INTRODUCTION
|
||
~~~~~~~~~~~~
|
||
To protect the security of their systems, many installations encourage (or
|
||
require) MPE passwords to be changed periodically. That way, by the time a
|
||
password gets out over the "grapevine," it will have been changed.
|
||
|
||
Unfortunately, MPE's security system makes changing user passwords rather
|
||
difficult. Since only an Account Manager--not the user himself!--can change a
|
||
user password, changing passwords is actually discouraged. A user may feel
|
||
reluctant to spend time getting in touch with his Account Manager about
|
||
changing a password (even if he, the user, suspects it has been compromised);
|
||
an Account Manager is very likely to put off changing passwords if it means
|
||
changing them for 100 users in his account.
|
||
|
||
A very good solution to this problem--in fact, one implemented on most other
|
||
computer systems--is to allow a user to change his own password. Since the
|
||
user is allowed to change only his own password (not other users'), this poses
|
||
no security threat; in fact, it actually improves security by making it easier
|
||
for a user to get his own password changed.
|
||
|
||
|
||
HOW PASCHG WORKS
|
||
~~~~~~~~~~~~~~~~
|
||
A user may run the PASCHG program, which first prompts him for his current MPE
|
||
user password (if he has one). The user must enter the correct password in
|
||
order to change it--this protects against somebody walking up to a logged-on
|
||
terminal while its real user is away and changing the password (although
|
||
SECURITY/3000's LOGOFF program is a better solution to this problem.
|
||
|
||
After the user has correctly entered his current password, he is asked for a
|
||
new password. After he enters the new password, he is asked to enter the same
|
||
password again, to make sure that he did not enter it incorrectly the first
|
||
time. If he enters a different password the second time, PASCHG assumes that
|
||
he has made a typo and repeats the new password sequence.
|
||
|
||
Once the user has entered a new password (and entered the same password again,
|
||
guaranteeing that it's the one he really wants), his password is changed.
|
||
|
||
A user is not allowed to use PASCHG to remove his own password, since the
|
||
Account Manager might often want to require his users to have passwords;
|
||
therefore, if the user hits <return> when asked for the new password, an error
|
||
message will be printed and the password will remain unchanged.
|
||
|
||
PASCHG also forbids a user from changing his password to the same value, as
|
||
that would defeat the purpose of changing the password.
|
||
|
||
|
||
HOW TO SET UP PASCHG
|
||
~~~~~~~~~~~~~~~~~~~~
|
||
The PASCHG program is
|
||
|
||
PASCHG.PUB.SECURITY
|
||
|
||
Any user may :RUN it, and the easiest way to do this is to set up the UDC
|
||
"PASCHG" so that a user may type just one word to invoke the program.
|
||
|
||
We recommend that you set the PASCHG UDC at the system level so that all users
|
||
may run it:
|
||
|
||
:SETCATALOG CHGUDC.PUB.SECURITY, YOURUDCS.PUB.SYS; SYSTEM
|
||
|
||
That way, a user need merely type
|
||
|
||
:PASCHG
|
||
|
||
and the PASCHG system will be invoked.
|
||
|
||
Certainly, there are some HP3000 installations whose security systems operate
|
||
in such a way that they don't want users changing their own passwords. A good
|
||
example of this is when several people share a single user ID, and you don't
|
||
want one of them to change their joint password (although for this kind of
|
||
application, SECURITY/3000's security-by-session-name should be used.
|
||
|
||
If you don't want your people running PASCHG.PUB.SECURITY, simply put a
|
||
lockword on this file or remove it entirely from the system. No other part of
|
||
SECURITY/3000 depends on it, so all the other components of SECURITY/3000 --
|
||
the Logon Security System, LOGOFF, OBSOL, TERMPASS, STREAMX, etc. -- will
|
||
still function as well as always.
|
||
|
||
|
||
EXAMPLE OF A PASCHG SESSION
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
A typical session with PASCHG might look like:
|
||
|
||
:PASCHG << a UDC that runs PASCHG.PUB.SECURITY >>
|
||
|
||
SECURITY/PASCHG Version 0.2 (VESOFT, Inc. (C) 1985)
|
||
|
||
Please enter your current user password: << user enters it >>
|
||
|
||
Please enter your new user password: << user enters 'FOO' >>
|
||
Please enter the same password again: << 'FOO' again >>
|
||
|
||
Password changed.
|
||
|
||
Note that none of the password inputs are echoed; furthermore, if the user
|
||
wanted to abort the change any time until he entered the new password the
|
||
second time, he could do so by hitting <control-Y>.
|
||
|
||
|
||
PASCHG/OBSOL INTERFACE
|
||
~~~~~~~~~~~~~~~~~~~~~~
|
||
PASCHG works well with OBSOL, SECURITY/3000's MPE Password Obsolescence System
|
||
since with PASCHG the Account Manager isn't burdened with having to change
|
||
dozens of passwords at the end of every month. However, in order for OBSOL to
|
||
"know" that a password has been changed with PASCHG, PASCHG has to be told to
|
||
tell OBSOL that a change is being made.
|
||
|
||
If you run PASCHG.PUB.SECURITY with ;PARM=1, it will invoke OBSOL and tell it
|
||
that the password is being changed.
|
||
|
||
So if you use OBSOL, your :PASCHG UDC ought to look like:
|
||
|
||
PASCHG
|
||
RUN PASCHG.PUB.SECURITY;PARM=1
|
||
|
||
(whereas if you don't use OBSOL, the ';PARM=1' should be omitted). In fact,
|
||
the OBSUDC.PUB.SECURITY UDC file, which contains all the UDCs relevant to
|
||
OBSOL, contains this PASCHG UDC as well.
|
||
|
||
Note that when a user changes his own password, he is not allowed to change the
|
||
obsolescence period and warning period (as is normally the case when an Account
|
||
Manager changes a user's password). This is done because the Account Manager
|
||
might not want users altering the obsolescence period, perhaps lengthening it
|
||
to the point where passwords no longer have to be changed frequently.
|
||
|
||
Note: you may configure OBSOL to run PASCHG automatically when the user
|
||
password is within its warning period (see OBSOL).
|
||
|
||
In addition, PASCHG may be invoked automatically from OBSOL so that if a user
|
||
logs on and is warned that his password will expire, PASCHG will be run
|
||
automatically to permit the user to change his password at that time. This can
|
||
further automate the process of password maintenance because a user does not
|
||
have to know what program to run, what UDC name to type, or whom to contact to
|
||
get his password changed.
|
||
|
||
The following UDC may be used instead of OBSOLUDC to invoke the OBSOL system.
|
||
As you can see, OBSOL will set a JCW which the UDC recognizes to run the PASCHG
|
||
program. This UDC is stored as the file OBCHGUDC.PUB.SECURITY.
|
||
|
||
OBSLOGON
|
||
OPTION LOGON, NOBREAK
|
||
RUN OBSLOG.PUB.SECURITY
|
||
IF SECURITYANSWER = 1 THEN
|
||
BYE
|
||
ELSE
|
||
IF CHGUSERPASS = 1 THEN
|
||
RUN PASCHG.PUB.SECURITY;PARM=1
|
||
ENDIF
|
||
ENDIF
|
||
|
||
|
||
ENFORCING PASSWORD STANDARDS
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
You may configure PASCHG to edit passwords that your users specify for
|
||
themselves. This editing may be used to enforce minimum password length in
|
||
addition to specific alpha, alphanumeric and numeric character patterns. The
|
||
edit characters used are similar to COBOL's. The 'edit pattern' is specified
|
||
by adding a line to the file SECURMGR.PUB.SECURITY in the format:
|
||
|
||
PASCHG-EDIT=<edit pattern>
|
||
|
||
Where the <edit pattern> conforms to the following rules:
|
||
|
||
'X' is any alphabetic [a..z] or numeric [0..9]
|
||
'A' is any alphabetic character
|
||
'9' is any numeric character
|
||
|
||
For example:
|
||
|
||
PASCHG-EDIT=AXXX enforces 4 character minimum password length
|
||
PASCHG-EDIT=AXXX9 enforces 5 character minimum password length
|
||
one alpha, three alphanumeric, one numeric
|
||
PASCHG-EDIT=AAAAAAAA enforces 8 character minimum password length
|
||
all alpha
|
||
|
||
Regardless of what is specified by PASCHG-EDIT, as per valid MPE password
|
||
format, the first character of the edit pattern will be assumed to be an 'A'
|
||
(alpha) when editing the password input. If the new password is longer than
|
||
the edit pattern specified in SECURMGR.PUB.SECURITY, those characters are not
|
||
edited.
|
||
|
||
If no PASCHG-EDIT keyword is found in the SECURMGR.PUB.SECURITY
|
||
file, PASCHG will use the default edit
|
||
pattern of 'AXXX' indicating a
|
||
minimum four character password.
|
||
|
||
|
||
GETPASS: A PROCEDURE TO GET ONE'S OWN PASSWORD
|
||
**********************************************
|
||
|
||
INTRODUCTION
|
||
~~~~~~~~~~~~
|
||
There is an unfortunate deficiency in MPE which forbids a user from retrieving
|
||
his own passwords; this necessitates programmers who are building and
|
||
:STREAMing streams from inside their programs to embed passwords into those
|
||
programs, which makes the necessary (mandatory?) operation of changing
|
||
passwords once in a while simply unfeasible. The user-callable procedure
|
||
GETPASS is designed to remedy this state with it, any user is allowed to
|
||
retrieve his own passwords (which is certainly not a security threat, as he
|
||
needed to know them to sign on; also, for convenience, the system manager is
|
||
allowed to retrieve the passwords of ANYBODY (for he is god anyway), and the
|
||
account manager may retrieve the passwords of anybody in his account. Thus,
|
||
with GETPASS a programmer can call WHO, find out his user, group, and account
|
||
names, call GETPASS, and retrieve his passwords; then, it is easy to insert
|
||
these passwords into the job card. Thus,a hard-to-maintain embedded passwords
|
||
can be avoided.
|
||
|
||
GETPASS has the following parameters:
|
||
|
||
PARAMETER 1: USER - The user to get passwords for.
|
||
2: ACCOUNT - The account to get passwords for.
|
||
3: GROUP - The group to get passwords for.
|
||
4: PASS-USER - The user password.
|
||
5: PASS-ACCT - The account password.
|
||
6: PASS-GROUP- The group password.
|
||
7: ERR - FALSE = everything went OK; TRUE = security
|
||
violation or nonexistent user, account,
|
||
or group.
|
||
|
||
GETPASS needs to use privileged mode (PM) capability for its execution;
|
||
however, it uses it in a safe fashion and has NEVER caused a system failure
|
||
yet! Note that programs calling GETPASS need not be PREPed with PM capability;
|
||
it must reside in an SL in a group and account containing PM capability (like
|
||
SL.PUB.SYS). To add GETPASS to the system SL, you need merely do a CP\INDEX
|
||
|
||
GETPASS.PUB.SECURITY
|
||
:HELLO MANAGER.SYS
|
||
:SEGMENTER VX
|
||
-SL SL Z@
|
||
-USL GETPASS.PUB.SECURITY
|
||
-ADDSL GETPASS
|
||
-EXIT
|
||
|
||
GETPASS can be called from COBOL in the following way:
|
||
USER PIC X(8).
|
||
ACCOUNT PIC X(8).
|
||
GROUP PIC X(8).
|
||
PASS-USER PIC X(8).
|
||
PASS-ACCOUNT PIC X(8).
|
||
PASS-GROUP PIC X(8).
|
||
ERROR PIC S9(4) COMP.
|
||
.
|
||
..
|
||
|
||
CALL "GETPASS" USING USER, ACCOUNT, GROUP, PASS-USER, PASS-ACCOUNT,
|
||
PASS-GROUP,ERROR.
|
||
IF ERROR IS NOT EQUAL TO 0 THEN << An error occurred >>
|
||
DISPLAY "SECURITY VIOLATION OR BAD USER, ACCOUNT, OR GROUP"
|
||
STOP RUN.
|
||
|
||
A real live example of a FORTRAN program calling GETPASS:
|
||
$CONTROL NOSOURCE, USLINIT
|
||
PROGRAM TEST GETPASS
|
||
INTEGER USER(4), ACCT(4), GRUP(4), UPAS(4), APAS(4), GPAS(4)
|
||
CHARACTER *8 BUSER, BACCT, BGRUP, BUPAS, BAPAS, BGPAS
|
||
EQUIVALENCE (BUSER,USER),(BACCT,ACCT),(BGRUP,GRUP), (BUPAS,UPAS),(BAPAS,
|
||
APAS),(BGPAS,GPAS)LOGICAL ERR
|
||
DISPLAY "ENTER USER: "
|
||
ACCEPT BUSER
|
||
DISPLAY "ENTER ACCOUNT: "
|
||
ACCEPT BACCT
|
||
DISPLAY "ENTER GROUP: "
|
||
ACCEPT BGRUP
|
||
CALL GETPASS (USER, ACCT, GRUP, UPAS, APAS, GPAS, ERR)
|
||
IF (ERR) DISPLAY "ERROR: SECURITY VIOLATION/BAD PARAMETER"
|
||
IF (ERR) GOTO 10
|
||
DISPLAY "USER PASSWORD=",BUPAS
|
||
DISPLAY "ACCOUNT PASSWORD=",BAPA
|
||
DISPLAY "GROUP PASSWORD=",BGPAS
|
||
10 STOP
|
||
END
|
||
|
||
|
||
FILES IN THE SECURITY ACCOUNT
|
||
*****************************
|
||
|
||
INTRODUCTION
|
||
~~~~~~~~~~~~
|
||
Lastly, I want to list some things you may see in your explorations. There are
|
||
many interesting files to be found withing the SECURITY account. Here is a
|
||
list and description of the common file you may find there:
|
||
|
||
|
||
DATA group: Data files
|
||
~~~~~~~~~~~~~~~~~~~~~~~
|
||
ANSSCHEM - Schema of the database ANSWER (might be used to increase
|
||
database capacity; default is 500 records).
|
||
ANSWER - IMAGE database which contains information about PERSONAL
|
||
PROFILE LOGON IDs (one-way encrypted passwords, access
|
||
restrictions, menu file names, etc.).
|
||
LOG - Circular disc file to which all attempted security
|
||
violations and security configuration changes are logged.
|
||
LOGOFF - Specifies logical devices to be monitored and the length
|
||
of inactivity required prior to a session being aborted.
|
||
MEMOFORM - Memo format for attempted violation listings which may be
|
||
customized to provide more or less detail.
|
||
OBSSCHEM - Dbschema input file for the image database OBSOL.
|
||
OBSOL - IMAGE database specifying the date by which MPE GROUP, USER
|
||
and ACCOUNT passwords must be changed (warning period, too).
|
||
QUESTION - During SECURITY/3000 logon the user must answer a question
|
||
randomly selected from this file (built by user; personal
|
||
profile questions are recommended).
|
||
TERMPASS - Specifies logical devices which will be protected with
|
||
passwords. Protection for dial-ups, DS lines, etc.
|
||
|
||
|
||
DOC group: Documentation files
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
ANORDER - Contains the DOC file names in the order in which they
|
||
should be printed.
|
||
CONTENTS - Table of contents for the SECURITY/3000 manual.
|
||
FILES - Describes the files in the SECURITY account.
|
||
GETPASS - Explains how to build job stream file in application
|
||
programs without jeopardizing system security.
|
||
HOW2LIST - Describes how to print the documentation files provided
|
||
in the DOC group with the MPEX 'USER' command.
|
||
INTRO - Overview of SECURITY/3000 package.
|
||
LOGOFF - Explains why idle sessions are a security threat. Step
|
||
by step instructions of how to configure logoff.
|
||
NEWFEATR - New features in SECURITY/3000.
|
||
OBSOL - Describes how the password obsolescence subsystem insures
|
||
the frequent changing of MPE passwords.
|
||
ONLINE - Describes the Logon Security System which protects against
|
||
online logon access.
|
||
PASCHG - User (not account manager) changeable passwords.
|
||
REFS - List of SECURITY/3000 published references.
|
||
STREAMX - Manual for STREAMX/3000 which provides batch access
|
||
security and parameter passing to job streams.
|
||
TERMPASS - Documentation of TERMPASS, which allows protection of
|
||
logical devices (DS line, dial-in lines, console, etc).
|
||
|
||
|
||
HELP group
|
||
~~~~~~~~~~
|
||
HELPMAKE - The stream to modify USER.HELP.SECURITY file.
|
||
USER - The HELP file for SECURITY/3000.
|
||
|
||
|
||
JOB group: Job streams
|
||
~~~~~~~~~~~~~~~~~~~~~~~~
|
||
LOGOFF - Job stream which runs the program LOGOFF.PUB to monitor
|
||
sessions' CPU usage and logoff idle terminals by LDEV.
|
||
|
||
|
||
PAPERS group: Security-related papers
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
ANAHEIM - "BURN BEFORE READING - HP 3000 SECURITY AND YOU",
|
||
HPIUG 1983, Anaheim, CA USA.
|
||
COPNHAGN - "SECURITY/3000: A new approach to logon security",
|
||
HPIUG 1982, Copenhagen, DENMARK.
|
||
PROFILE - "PRODUCT PROFILE: SECURITY/3000",
|
||
SUPERGROUP Association Newsletter, July 1982.
|
||
|
||
|
||
PUB group: Program files, USLs, UDCs, etc.
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
FINDCAP - A program to list dangerously capabilitied users and show
|
||
if they have an MPE password. QUITE handy...
|
||
LOGOFF - Program which logs off idle sessions.
|
||
OBSCHG - Password OBSOLescence database update program.
|
||
OBSFILL - OBSOLescence data base initialization program.
|
||
OBSLOG - MPE passwords obsolescence program.
|
||
OBSOLUDC - Log-on UDC file for MPE passwords obsolescence subsystem.
|
||
OBSUDC - UDC file for MPE passwords obsolescence subsystem.
|
||
PASCHG - The program which lets users change their own password.
|
||
QGALLEY - Program to format and print DOC files.
|
||
SECURMGR - Control file containing SECURITY/3000 global parameters.
|
||
SECURUDC - Log-on UDC file for users protected by SECURITY/3000.
|
||
SECURUSL - USL file for the callable SECURITY procedure.
|
||
SESSION - USL file for GETSESSION procedure.
|
||
STREAMX - STREAMX/3000 program which provides batch access
|
||
security and parameter passing to job streams.
|
||
STRMSLEP - The SLEEPER/STREAMX interface program (see STREAMX.DOC).
|
||
STRMUDC - UDC file containing a UDC to invoke STREAMX.
|
||
TERMPASS - Program which verifies terminal (LDEV) passwords and/or
|
||
interfaces with USER program for positive user identification
|
||
TERMUDC - Log-on UDC file for users using TERMPASS.
|
||
USER - The main SECURITY/3000 program.
|
||
|
||
|
||
|
||
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
|
||
|
||
|
||
|
||
|
||
Informatik Submission & Subscription Policy
|
||
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
||
|
||
|
||
Informatik is an ongoing electronic journal, and thus we are faced with
|
||
the ever present need for a steady influx of new material. If you have an
|
||
area of interest or expertise that you would like to write about, please do
|
||
not hesitate to contribute! We depend on reader submissions!! We do ask that
|
||
any submissions fit the following guidelines...
|
||
|
||
General Content
|
||
~~~~~~~~~~~~~~
|
||
Material for Informatik should concern information of interest to the
|
||
computer underground community. Examples of this include, but are by no
|
||
means limited to hacking and phreaking, governmental agencies, fraud,
|
||
clandestine activity, abuse of technology, recent advances in computing
|
||
or telecommunications technology, and other of information not readily
|
||
available to the public. Please include a title and author name.
|
||
|
||
Text Format
|
||
~~~~~~~~~~
|
||
* standard ASCII test
|
||
* 79 characters per line
|
||
* no TAB codes
|
||
* no special or system specific characters
|
||
* mixed case type
|
||
* single spaced, double space between paragraphs
|
||
* no pagination
|
||
|
||
News submissions
|
||
~~~~~~~~~~~~~~~
|
||
* Submit only recent news items
|
||
* Include the headline or title of the article
|
||
the author's name (if given)
|
||
the publication of origin
|
||
the date of publication
|
||
* Don't submit news that has appeared in other e-text journals
|
||
|
||
Subscription policy
|
||
~~~~~~~~~~~~~~~~~~
|
||
We are happy to provide an Internet based subscription service to our
|
||
readers. To be on our mailout list, send mail to our Internet address,
|
||
"inform@grind.cheme.cmu.edu" and include the word subscription in the
|
||
subject of your message. If you requested a subscription before, you need
|
||
to reply again, because the old subscription list was deleted by MH.
|
||
|
||
Back Issues
|
||
~~~~~~~~~~
|
||
Back issues of Informatik are available via ftp at ftp.eff.org in the
|
||
/pub/cud/inform directory. The site also contains a plethora of other
|
||
electronic texts of interest to the "computer underground" community including
|
||
Phrack, NIA, PHUN, and the LOD tech journals.
|