Lockpicking: Exploits for Mechanical Locks

Presented at HOPE Number Six (2006), July 21, 2006, 2 p.m. (120 minutes)

Every mechanical lock, no matter how sophisticated, can be bypassed. And here you will learn how. A wide variety of opening techniques will be demonstrated. Ranging from "lock decoders" that are in use by the intelligence community to till tools and techniques that allow a layman to open a wide variety of locks with little training and using only inexpensive tools. Even the opening of some state of the art electronic locks will be demonstrated on stage. If you're willing to learn then simply join one of the training sessions during the conference (in the lockpick village) to have Barry and his friends teach you how to pick and bypass locks yourself. You are invited to bring your own locks and find out if they are any good.

Presenters:

  • Marc Weber Tobias
    Marc Weber Tobias is an investigative attorney and physical security specialist in the United States. He has written five law enforcement textbooks dealing with criminal law, security, and communications. Marc was employed for several years by the Office of the Attorney General in South Dakota as the chief of the organized crime unit. He has lectured throughout the world to law enforcement agencies and consulted with clients and lock manufacturers in many countries. His law firm handles internal affairs investigations for certain government agencies, as well as civil investigations for private clients. He is also employed by both private and public clients to analyze high security locks and security systems for bypass capability and has been involved in the design of security hardware to prevent bypass. Through www.security.org, Marc has issued many security alerts regarding product defects in security hardware. He authored Locks, Safes, and Security, the primary reference for law enforcement agencies throughout the world and the companion LSS+, the multimedia edition.
  • Barry Wels / The Key as Barry "The Key" Wels

Links:

Tags:

Similar Presentations: