0% found this document useful (0 votes)
21 views1 page

Page 39

This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.

Uploaded by

junior jr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views1 page

Page 39

This document discusses various methods of attacking locks and gaining forced entry. It includes diagrams and descriptions of techniques like prying cylinders loose if not mounted properly, using a pipe wrench to twist off cylinder locks, drilling out lock cores, and removing set screws to allow later removal of cylinders. Methods like jamb spreading and the use of specialized tools for drilling out plugs or creating new shear lines in locks are also examined.

Uploaded by

junior jr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

LSS+ Electronic Infobase Edition Version 5.

exterior doors.

Figure LSS+3236 Rim locks must be mounted properly to increase their


resistance to attack.

Figure LSS+3237 Cylinders can be pried loose if not mounted properly.

Figure LSS+3238 The cylinder was pounded through the mounting.

Figure LSS+3239 A pipe wrench can be utilized to twist loose a


key-in-knob or cylinder lock.

Figure LSS+3240 The ease by which a cylinder can be removed by shearing


the setscrew.

Cylinders can be forcibly removed by applying torque and destroying


internal setscrews. The setscrews can also be removed during business hours to
allow the cylinder to be unscrewed at a later time. Courtesy of Don Shiles.

A wrench attack on cylinders can be very effective. Courtesy of Don


Shiles.

Figure LSS+3241 A diagram showing the principle of jamb spreading.

Figure LSS+3242, examples of burglary tools found at the scene of a safe


job.

Cylinders can be forcibly removed by applying torque and destroying


internal setscrews. The setscrews can also be removed during business hours to
allow the cylinder to be unscrewed at a later time. Courtesy of Don Shiles.
Figure LSS+3243, a special drill bit for removing plugs, called a rotary pick.
Figure LSS+3244 A lock can be drilled by raising all drivers above shear line.
Figure LSS+3245 A lock can be drilled to create a new shear line.
Figure LSS+3246 A lock can be drilled and then shimmed with a fine wire.
Figure LSS+3247 Peterson Manufacturing IC removal tool
Figure LSS+3248 The Stealth Lock Systems tool to open Medeco cam locks

Sigma analysis of the Kibb interlocking strike plate, with Ian Bauchop.

Demonstration of different forced entry techniques on doors utilizing


the Kibb interlocking strike plate design.

A wrench attack on cylinders can be very effective. Courtesy of Don


Shiles.

Forensic evidence of forced entry. Courtesy of Hans Mejlshede.

Opening a padlock by bouncing the locking dog. Courtesy of Don Shiles.

39 29/09/2006 2:51:44 PM
(c) 1999-2004 Marc Weber Tobias

You might also like