top of page

Keys and locks, the cornerstone of access control

Nov 4, 2023

The ancient Egyptians, around 4,000 years ago, introduced the earliest known locks and keys. These rudimentary devices have developed significantly, paralleling advancements in Security Technology and Forensic Security methodologies. Today, a standard, non-high security keyway's vulnerability can be a focus for a Security Expert Witnesses in a Premise Liability case. Such standard locks are often easily bypassed—a glaring example of Security Negligence—through techniques like lock picking, which are less challenging than many assume.

Keys and locks, the cornerstone of access control

Keys and locks, the cornerstone of access control and a domain of expertise for security professionals and have a venerable history dating back thousands of years. The ancient Egyptians, around 4,000 years ago, introduced the earliest known locks and keys.


These rudimentary devices have developed significantly, paralleling advancements in Security Technology and Forensic Security methodologies. Today, a standard, non-high security keyway's vulnerability can be a focus for a Security Expert Witnesses in a Premise Liability case.


Such standard locks are often easily bypassed—a glaring example of Security Negligence—through techniques like lock picking, which are less challenging than many assume.

 

Below are some vulnerabilities to locks.

 

  • Lock Picking: Using tools like tension wrenches and pick sets, an individual can manipulate the pins in a standard keyway to align them at the shear line, allowing the lock to turn without the correct key. It's more easy than you think.


  • Bump Keying: A bump key is a specially cut key can align the pins inside a lock with a sharp impact or "bump," effectively opening the lock without the original key. Makes the pins jump over the shear line momentarily, allowing the plug to turn.


  • Key Duplication: Standard keys can often be duplicated easily with no special authorization. If someone has temporary access to a key, they can create unauthorized copies at many hardware stores or using key-copying kiosks or an app (see photos, which will identify the biting.


  • Lock Snapping: Some standard keyways, especially in Euro cylinder locks, are vulnerable to snapping because of a weak point in the lock. Applying force can break the lock allowing the intruder to manipulate the locking mechanism directly. Many locks purchased in stores are of the lowest grade of security.


  • Lock Drilling: Drills can be used to destroy the pin tumblers or other locking mechanisms within the keyway, allowing the lock to be opened with a screwdriver or similar tool.


  • Impressioning: This technique involves inserting a blank key or a special impressioning tool into the lock and manipulating it to create marks where the pins press against it. These marks are then used to file down the blank into a working key.


  • Decoding: Tools can be inserted into the keyway to measure the depth of the cuts in the key, allowing a duplicate key to be created without ever having access to the original key.


  • Wear and Tear: Over time, the mechanical components of a standard keyway (such as the dead-pin) can wear down, making the lock easier to pick or manipulate.


Due to these vulnerabilities, many businesses and individuals opt for high-security locks with features designed to counteract these methods, such as high-security keyways (biaxial) with reinforced materials, and patented key control systems to control keys and prevent manipulation.

 

Does your case involve locking? If so, set up a call so we can discuss how we can help you.



CONTACT
SEAN A. AHRENS

Tel: 1 (833) 247-3677

Follow me on social media

  • Facebook
  • X
  • LinkedIn
  • Instagram
ean Ahrens, a security consultant and expert witness based in Chicago, Illinois.

CONTACT ME TO SUPPORT YOUR LITIGATION CASE

Thanks for submitting!

Expert Witness Security Consulting in Chicago

SEAN A. AHRENS, MA, CPP, CSC, BSCP, FSyl, CHPA

Years in Practice: 23

  • General Specialties: Security Management

  • Contact me to see my CV 

Fields in specialization focus: Workplace violence, armed assailant active shooter, operations alarm, surveillance, crime prevention through environmental design, commercial, retail, and hospitality.

Working as a current security consultant, I have current knowledge regarding current threats, and vulnerabilities for a myriad of building types: parking garages, apartment buildings, warehouses, bars, restaurants, entertainment, office, workplace violence and security technology, operations, and architecture. 

My focus is on premise liability, negligence, wrongful hiring, foreseeability, crime demographic analysis, benchmarking, physical security, and security management.

  • My education: I have a master's in organizational security management from Webster University, graduating with honors–Cum Laude. Before that, I did my bachelor's in criminal justice at Western Illinois University. I continue to obtain certifications that further substantiate my security lineage.

  • If you'd like to get in touch, please say hello through any of the social links above. You can also reach me through my employer AEIeng.com

© Copyright 2021 Ahrens Security LLC | All Rights Reserved | Terms of service | Privacy Policy

bottom of page