![]() |
MTDC Home Contact |
---|
![]() |
Physical Security Basics |
Threat & Vulnerability Assessment |
Facility Planning |
Deterrents | Alarm Systems & Sensors |
Video
&
Access Control Systems |
![]() |
![]() |
Lock Vulnerabilities and Their Solutions
A primary or alternate key custodian will:
Keys must be signed out to authorized personnel, as needed, on a key control register. The key control register and inventory can be on paper or computerized. It must contain at least the following information:
Cores must also be accounted for in a core inventory. The core inventory must contain at least the following information:
Employees must understand just how grave a threat lost keys and cores represent to facility security. Supervisors must understand that after a certain number of keys have been lost (the exact number depends on the level of access granted by each key), the entire lock and key system must be replaced. Doing so will be very costly. Key control procedures should include a requirement that any employee who loses a key must submit a written explanation of the circumstances of loss. The written explanation should be retained in a file that is subject to review by agency inspectors. Keys should grant no more access than necessary to any particular employee. A properly designed master key system makes it easy to produce keys that provide just the access required. The loss of a key that grants limited access represents less of a security risk.
Impressioning is less well known as a method of compromising a key-operated lock surreptitiously. Impressioning involves inserting a specially prepared key blank (no cuts) into the target lock and turning it, removing the blank and observing it, then making gradual cuts in the key. This process is repeated until the lock opens. The attacker who impressioned the key now has a duplicate key that will open that lock. It also may open other locks if the system has been master keyed. Impressioning requires considerable practice and skill. The attacker need not necessarily remain on target for more than the second or two needed to insert the key blank, turn it, and remove it. He can make his trial cuts at another location, then return to the target and repeat the operation. A person using an authorized key to operate a lock behaves in a certain way, a way that is familiar to most of us. If you receive a report that someone was behaving unusually around a Forest Service lock or seemed to be “fiddling” with the lock, contact Forest Service law enforcement. The lock and the ground around it may have evidence of value (metal filings the size of dust particles, footwear impressions or prints, fingerprints, and so forth). The area and the lock should be processed carefully as a crime scene. The lock should be removed carefully by a qualified professional locksmith under the immediate guidance of a forensic evidence recovery technician. Once removed, the lock should be taken to an indoor site, such as a forensic laboratory, where the locksmith can disassemble it under the immediate guidance of the evidence recovery technician. The lock must be removed and disassembled without making any additional marks or scratches on the lock and its components. Once the lock has been disassembled, the locksmith familiar with picking and impressioning can guide the evidence technician to search for evidence of someone trying to pick or impression the lock.
Federal regulations have detailed specifications for combination locks used for high-security applications, such as storage of classified information. If these locks are to retain their security features, they must be installed by a qualified installer and maintained properly. For less secure applications (such as locking the gate on the road to a radio site), disc combination padlocks may be used. The best known seems to be the Sesame padlock with four wheels on the bottom. Each wheel has digits 0–9. The combination can be set by anyone who can open the lock. Aside from the obvious bolt cutter attack on the shackle, the lock’s combination can be read surreptitiously by someone with knowledge of the lock’s internal operation and a tool easily made at home. Disc combination padlocks should never be used for moderate to high-security applications. Their use of a numeric combination is a convenience, not a security feature. Consult a certified professional or master locksmith for appropriate combination locks when they are not specified by Government regulation. |
Top Back | Next Physical Security Toolbox Home T&D Home |
USDA Forest Service, Technology and Development Last Modified: 03/30/2013 03:28:07 |