Presented at The Fifth HOPE (2004)
July 10, 2004, 11 a.m.
Lockpicking is becoming popular as a sport/hobby among hackers throughout the world. In a special two-hour session the joy of lockpicking will be explained and demonstrated, from basic techniques to the state of the art. A whole range of new tools and tricks will be covered. Many stories will be told including that of Matt discovering a vulnerability in MasterKey systems as well as the members of Toool (The Open Organization of Lockpickers - http://www.toool.nl) discovering a severe vulnerability in a European lock. This forced a major European lock manufacturer to shut down the factory for a few days and collect a lot of locks from shops.
In addition to this panel, a lockpicking workshop will be ongoing throughout the conference. And at the end of it all, a lockpicking championship will take place.
Barry Wels / The Key
as Barry "The Key" Wels
Barry "The Key" Wels has many passions. Lockpicking, safecracking, voice encryption, radio monitoring, and bug sweeping (TSCM) are a few of them. He spends most of his time on the Cryptophone project (http://www.cryptophone.de/) and on Toool, the Dutch lockpick sportgroup he is chairman of (http://www.toool.nl/).
Marc Weber Tobias
as Marc Tobias
Marc Tobias is an investigative attorney from Sioux Falls, South Dakota. He has a bachelor's degree with a major in law enforcement and a Juris Doctor from Creighton Law School in Omaha. He was admitted to the Nebraska and South Dakota bars as well as federal courts. He has specialized in technical fraud investigations for 30 years, is a polygraph examiner, has written five police textbooks (including the treatise on locks and safes entitled Locks, Safes, and Security). Marc has worked around the world in investigations involving security issues and the bypass of high security locks.
Matt Blaze has been involved in all sorts of stuff, from evaluating Carnivore and Key Escrow for the government to writing the crypto file system to writing dozens of papers on crypto. He was the codesigner of swIPe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. In 1994, he discovered a serious flaw in the U.S. government's "Clipper" encryption system, which had been proposed as a mechanism for the public to encrypt their data in a way that would still allow law enforcement to have access to it.