Decoding: Difference between revisions
mNo edit summary |
m (Fix broken link) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 9: | Line 9: | ||
== History == | == History == | ||
Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800's: | |||
Rogues are very keen on their profession and know already much more than we can teach them to respect their several kinds of roguery. Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves... | |||
Professional and recreational lock picking also has a long history. King Louis XVI of France (1754–1793) was a keen designer, picker, and manipulator of locks, and physicist Richard Feynman picked locks for fun in the 1940's while employed on the Manhattan Project. The tradition of student roof and tunnel hacking at MIT included lock picking, and their guide to this was made widely available in 1991. | |||
Beginning in 1997 more organized recreational lock picking has now grown and developed a competitive aspect in "locksport", along with its own governing body, Locksport International. | |||
== Manipulation == | == Manipulation == | ||
Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, | Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, lock picking or impressioning is a prerequisite to the decoding process. | ||
* In [[pin-tumbler]] locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever. | * In [[pin-tumbler]] locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever. | ||
* Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material. | * Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material. | ||
* Tools to count or identify | * Tools to count or identify characteristics of components to identify their code. | ||
* Some | * Some lock picking tools, namely [[Axial|axial/tubular]] picks and the [[Sputnik]] tool, automatically decode or impression the lock while it is being picked. | ||
* [[Impressioning]], in a general sense, is a form of manipulation-based decoding that directly produces a working key. | * [[Impressioning]], in a general sense, is a form of manipulation-based decoding that directly produces a working key. | ||
* In [[combination]] locks, manipulation of the dial(s), handle, and [[Bolt|shackle]] can be used to determine the correct combination. | * In [[combination]] locks, manipulation of the dial(s), handle, and [[Bolt|shackle]] can be used to determine the correct combination. | ||
Line 28: | Line 34: | ||
== Measurement == | == Measurement == | ||
The key is measured to decode the values of the bitting cuts and the | The key is measured to decode the values of the bitting cuts and the key-way profile. Various tools exist for specific locks, such as [[key gauge]]s, but a ruler or micrometer is equally effective in most cases. | ||
== Optical, Photographic, and Visual == | == Optical, Photographic, and Visual == | ||
[[File:Wafer_lock_reading.jpg|thumb|100px|right|text-top|"Wafer Lock Reading" by Robert Sieveking]] | |||
Visual observation of a key or lock allows for various forms of decoding. | Visual observation of a key or lock allows for various forms of decoding. | ||
* Key bitting pattern. This process is known as "sight-reading" a key. | * Key bitting pattern. This process is known as "sight-reading" a key. | ||
* Key codes on the bow. Can also be used to identify the | * Key codes on the bow. Can also be used to identify the key-way of a lock. | ||
* Presence and position of secondary locking mechanisms such as [[sidebar]]s. | * Presence and position of secondary locking mechanisms such as [[sidebar]]s. | ||
In the case of colored lock components, a | In the case of colored lock components, a bore scope or similar tool may be used to look inside the lock and determine component positions. Many [[pin-tumbler]] re-keying kits use colors to symbolize different bottom pin sizes. | ||
In [[wafer]] locks, a | In [[wafer]] locks, a bore scope or similar tool can be used to look at the position of each wafer as it rests in the lock. | ||
In [[lever]] locks, a | In [[lever]] locks, a bore scope or similar tool can be used to look at the shape of each lever, but requires that a secondary tool (called a "setup key") be used to move other levers out of the way. | ||
== Radiological == | == Radiological == | ||
Line 52: | Line 58: | ||
== See also == | == See also == | ||
* [[ | * [[Lock picking]] | ||
* [[Impressioning]] | * [[Impressioning]] | ||
* [[Key]] | * [[Key]] |
Latest revision as of 23:56, 2 September 2024
Decoding
Decoding is the process of determining the correct position of components in a lock through manipulation, disassembly, measurement, and observation of keys or lock components. While it does not necessarily open the lock, decoding provides the information necessary to create a working key. In this respect, decoding is the middle ground between lockpicking and impressioning techniques.
Decoding techniques are quite varied and leave a wide range of forensic evidence. Most lock-centric decoding techniques are considered covert because of the invasive manipulation required. In contrast, most key-centric techniques are forms of surreptitious entry because they focus on observation and measurement.
History
Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800's:
Rogues are very keen on their profession and know already much more than we can teach them to respect their several kinds of roguery. Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves...
Professional and recreational lock picking also has a long history. King Louis XVI of France (1754–1793) was a keen designer, picker, and manipulator of locks, and physicist Richard Feynman picked locks for fun in the 1940's while employed on the Manhattan Project. The tradition of student roof and tunnel hacking at MIT included lock picking, and their guide to this was made widely available in 1991.
Beginning in 1997 more organized recreational lock picking has now grown and developed a competitive aspect in "locksport", along with its own governing body, Locksport International.
Manipulation
Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, lock picking or impressioning is a prerequisite to the decoding process.
- In pin-tumbler locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever.
- Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material.
- Tools to count or identify characteristics of components to identify their code.
- Some lock picking tools, namely axial/tubular picks and the Sputnik tool, automatically decode or impression the lock while it is being picked.
- Impressioning, in a general sense, is a form of manipulation-based decoding that directly produces a working key.
- In combination locks, manipulation of the dial(s), handle, and shackle can be used to determine the correct combination.
Disassembly
Disassembly of the lock will allow direct counts and measurements of internal components. These can be compared with manufacturing data to produce a working key. In some cases, disassembled components are imprinted with their sizes or codes, simplifying the process.
Measurement
The key is measured to decode the values of the bitting cuts and the key-way profile. Various tools exist for specific locks, such as key gauges, but a ruler or micrometer is equally effective in most cases.
Optical, Photographic, and Visual
Visual observation of a key or lock allows for various forms of decoding.
- Key bitting pattern. This process is known as "sight-reading" a key.
- Key codes on the bow. Can also be used to identify the key-way of a lock.
- Presence and position of secondary locking mechanisms such as sidebars.
In the case of colored lock components, a bore scope or similar tool may be used to look inside the lock and determine component positions. Many pin-tumbler re-keying kits use colors to symbolize different bottom pin sizes.
In wafer locks, a bore scope or similar tool can be used to look at the position of each wafer as it rests in the lock.
In lever locks, a bore scope or similar tool can be used to look at the shape of each lever, but requires that a secondary tool (called a "setup key") be used to move other levers out of the way.
Radiological
Radiological imaging uses penetrating radiation (X, beta, and gamma rays) to see inside the lock or safe, revealing the proper positions of components. This is most often used against combination locks to determine the position of each gate in the wheel pack. This is a surreptitious entry technique unless the use of such a device can be detected. In many cases, even if the ability to detect this form of entry is available it may be considerably expensive.
The use of low-density wheel materials (such as Delrin) combats this attack. Group 1R safe locks are specifically designed to defeat various radiological attacks as well as provide manipulation protection.