Section 2.2 Locks and Keys. Legal Notice
|
|
|
- Claire Newman
- 9 years ago
- Views:
Transcription
1 Section 2.2 Locks and Keys Digital security often begins with physical security 1 Legal Notice Laws regarding lock picking vary significantly state-bystate In most states purchase and possession of dedicated lock picking tools is legal Penalties are raised significantly if you get caught using them in the commission of a crime Public domain image from 2
2 What Is Physical Security? Any physical object that creates a barrier to unauthorized access This includes: locks, latches, safes, alarms, guards, guard dogs, doors, windows, walls, ceilings, floors, fences, door strikes, door frames and door closers 3 Is Physical Security An IT Concern? You have been working hard to secure your network from cyber attacks Redundant layers of antivirus programs, firewalls and intrusion detection systems should protect against every possible electronic method of entry But what if an attacker gains access to the server room or network wiring closet... Is you network still safe? 4
3 Destructive vs. Nondestructive Entry Destructive entry Involves using force to defeat physical security Methods involve crowbars, bolt cutters and sledge hammers Negative impact on IT resources is apparent Remediation steps also obvious Nondestructive entry Compromises security without leaving signs of a breach Defeats intrusion detection Greater and long-term threat 5 Compromising Locks For centuries, the lock has been one of the cornerstones of physical security We rely on dozens of them every day to protect people and assets The trust most people place in locks is unwarranted Most locks can be easily compromised with nondestructive methods Sometimes within seconds and with readily available tools Locks keep honest people honest 6
4 Lock Picking Lock picking had been the exclusive art of locksmiths, professional thieves, spies and magicians for hundreds of years However, with the advent of the Internet, information about lock picking methods and tools has become readily available E.g., YouTube has many lock picking videos 7 Lock Picking in Movies Genuine lock picking in movies used to be prohibited Before 1967, the Hays code (Motion Picture Production Code) required censorship of Hollywood movies All detailed (that is, imitable) depiction of crime must be removed, such as lock picking or mixing of chemicals to make explosives Public domain image from 8
5 LOCK TYPES Image from used with permission under Gnu Free Documentation License TSA Lock The U.S. government has established a set of rules for the inspection of baggage without the presence of passengers Special TSA-approved locks allow both inspection and protection against theft An important element is that the inspection must be easily verifiable by the user Public domain government image 10
6 Warded Locks Locks of this type were used in ancient times The key moves the bolt assisted by a support spring Security relies on the fact that not all keys pass through the key hole 11 Skeleton Key Usually in old style doors or desks Different concentric obstructions Easy to lock pick with Skeleton keys They come from ancient Rome Images from used by permission under Gnu free documentation license
7 Pick vs. Bypass Break open a lock in a nondestructive manner can be achieved either through: Pick: acting on the lock mechanism simulating the operation of the key Bypass: manipulation of the bolt without using the lock : Yale Pin Tumbler Lock Modern version of the Egyptian single-pin design Utilizes two pins for locking Double-detainer theory of locking Created shear line Public domain image of Linus Yale, Jr. Image from used with permission under Gnu Free Documentation License
8 How Does a Pin Tumbler Lock Work? 1. When a key is not present, the pin stacks are pushed down by the springs so that the driver (top) pins span the plug and the outer casing, preventing the plug from rotating. 2. When the correct key is inserted, the ridges of the key push up the pin stacks so that the cuts of the pin stacks are aligned with the shear line. 3. The alignment of the cuts with the shear line allows the plug to be rotated. Images from used with permission under Gnu Free Documentation License How Does a Pin Tumbler Lock Work? If an inappropriate key is insered, then the pins do not align along the shear line and the lock does not turn. Image from used with permission under Gnu Free Documentation License
9 Photo by Dan Rosenberg included with permission. LOCK PICKING 17 shell or hull Terminology driver tumbler spring sheer line cylinder or plug keyway top or driver pin bottom or key Image from used with permission under Gnu Free Documentation License
10 Feelers Scrubbers Tension tools Lockpicking Tools Photo by Jennie Rogers included with permission. 19 Apply light tension Lift one pin at a time Identify binding pin Lift binding pin until it reaches the shear line Setting the binding pin will rotate the lock slightly Find next pin and repeat the process Feeler Picking Image from used with permission under Gnu Free Documentation License
11 Scrubbing / Raking Apply light tension Work over pins back to front in a circular motion attempting to pop them into the shear line with the combination of tension Good for beginners Usually employ snake pick or half diamond Photo by Jennie Rogers included with permission. 21 The Math of Lock Picking Suppose we have 40 different kinds of key blanks 7 pin positions 8 different possible pin heights Then the total number of possible locks is 40 x 8 7 = 83,886,080 Not all these are possible, however, as it is difficult to put long teeth next to small teeth. 22
12 Rights Amplification in Master Keyed Systems Reverse engineer master key from change key Each lock has P pins, with D potential cut heights Create D-1 test keys for each pin position p Cut all pin positions except p as known change key Published by Matt Blaze at Penn 23 Rights Amplification (continued) Query the lock until you find each pin position i.e. To determine first key cut depth insert each of the D-1 test keys and determine which one does not bind to the pin Repeat for each pin 24
13 Rights Amplification Statistics Consumes P(D-1) blanks Can reduce to P blanks and file down on the fly But this looks suspicious Search space is practically pruned by manufacturer specs maximum distance limit in legal adjacent cuts Older installations sometimes require MKs to be higher on the pin stack 25 Tubular lock Usually on car alarms or vending machines 6-8 pins Easy to pick with special tool The tool could become a new key Images from used with permission under Gnu Free Documentation License
14 Statistics 4-6 pins, 4-10 levels 10 6 = 1,000,000 possible keys! The angular positions of the cylinders allow to obtain about 180 different positions (18010) 6 = (Un) fortunately there is a need for some tolerance in locks 27 Combination Locks There are locks that do not require a physical key to be opened but a code Number of combinations is Number of digits times Length of combination Images from and used with permission under Gnu Free Documentation License
15 Combination Locks Inexpensive combination padlocks allow attacks based on reducing the space of possible combinations to try The gears have a higher tolerance of the external disk combination Nominal number of combinations is 40 3 = 64,000 Possibilities can be reduced to about 80 by detecting critical gear points Public domain image from E.g., see 29 Bumping A different way of picking locks Virtually all traditional Yale and similar locks can be opened by bumping What lock pickers say about bumping: RELIABLE REPEATABLE SIMPLE TO LEARN Photo by Jennie Rogers included with permission. 30
16 Bump Keys Driver pins jump higher than the cylinder just for an instant If a light rotational force is applied, the cylinder will turn Lock bumping is a very fast method for opening the lock The lock is not damaged in any way Few key-pin locks cannot be bumped Photo by Jennie Rogers included with permission. 31 Pick Gun Manual and electronic pick guns are a popular method for quick and easy ways of opening up doors The pick gun is used in a similar way but usually has a trigger that creates an upward movement that must be repeated rapidly to open the lock Public domain image from 32
17 Side Channel Attacks Rather than attempting to directly bypass security measures, an attacker instead goes around them by exploiting other vulnerabilities not protected by the security mechanisms. Side channel attacks are sometimes surprisingly simple to perform. High security lock Cheap hinges Public domain image by Pearson Scott Foresman from 33
Physical Security: From Locks to Dox
Physical Security: From Locks to Dox Introduction to Red Team Physical Security Penetration Testing Jess Hires Jax Locksport www.hacksonville.com Disclaimer This information is to be used for professional
CSE 127 Computer Security
CSE 127 Computer Security Fall 2012 Lecture #12 Physical Security Stefan Savage Physical security What is physical security about? Controlling access to a physical space or object Examples: Gates/Barriers
MIT Guide to Lock Picking. Ted the Tool
MIT Guide to Lock Picking Ted the Tool September 1, 1991 Distribution Copyright 1987, 1991 Theodore T. Tool. All rights reserved. Permission to reproduce this document on a non-prot basis is granted provided
Techno Security's Guide to Securing SCADA
Techno Security's Guide to Securing SCADA Foreword xxiii Chapter 1 Physical Security: SCADA and the Critical Infrastructure's Biggest Vulnerability 1 Introduction 2 Key Control 3 Check All Locks for Proper
Interchangeable Cores
*00381-000-70* Keying Falcon 00381-000-70 Interchangeable Cores Installation Instructions Preparation Before keying or rekeying an interchangeable core, all pins and springs within the core must be removed.
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE
LOCKS AND HIGH INSECURITY: PROTECTING CRITICAL INFRASTRUCTURE SECURITY VULNERABILITIES FOR MECHANICAL AND ELECTRONIC LOCKING SYSTEMS THAT ARE USED FOR PROTECTING CRITICAL ASSETS CRITICAL FACILITIES TRANSPORTATION
Security in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided
EXCAVATOR SAFETY TRAINING
EXCAVATOR SAFETY TRAINING INSPECTION CHECKLIST INSPECTION AREA INSPECTION RESULTS Sat. Unsat. N/A Comments Carrier & Car Body Rotation system Tracks Rollers Frame, welds, bolts Drive system Upper Structure
V1504 Vertical Platform Lift OWNER S MANUAL
V1504 Vertical Platform Lift OWNER S MANUAL (To Be Retained by Owner After Installation by Authorized Savaria Dealer) Part No. 000692 01-m03-2016 2 IMPORTANT Ensure that only an authorized Savaria Dealer
PANELIZED HOME INSTALLATION GUIDELINE
PANELIZED HOME INSTALLATION GUIDELINE A typical home package will be constructed of Snap-N-Lock Insulated Panels clad with steel skins. 4" panels will be used for the walls, and 6" panels for the roof.
Housing Fact Sheets. Protecting Your Home Against Theft
Protecting Your Home Against Theft Housing Fact Sheets There are a variety of steps which you as a homeowner or renter can take to discourage a thief from entering your home. Many security precautions
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
Troubleshooting: Door Jamming and Door Handing 6. Troubleshooting: Keypad 11. Troubleshooting: Battery 12. Battery FAQ 13
Programming and Troubleshooting Guide 1 2 3 4 5 Mastercode 2 Troubleshooting: Door Jamming and Door Handing 6 Troubleshooting: Keypad 11 Troubleshooting: Battery 12 Battery FAQ 13 1 / 13 1 Mastercode 62543
Make it Difficult for the burglar. Contents. Look at your home through a burglar s eyes: Alarms 4_5. Distraction burglary 6 _ 7.
HOME SECURITY Make it Difficult for the burglar Home security is the best way to reduce your chances of being burgled. A lot of burglaries are spur of the moment, carried out by opportunist thieves who
Strengths and Weaknesses of Access Control Systems. Eric Schmiedl and Mike Spindel
Strengths and Weaknesses of Access Control Systems Eric Schmiedl and Mike Spindel Choosing a System Error rate Environment Cost Physical Vulnerability Additional Constraints Error Rate False Reject Rate
Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1
TABLE OF Contents List of Illustrations................................. IX Preface........................................... XV Why You Should Read This Book Burglars Kill Every Security System Can Be
What locks do I have Timber Doors
What locks do I have Timber Doors Introduction Locking mechanisms on doors are varied and it can be difficult to judge whether what you have is good, bad or indifferent. This information takes you through
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
OPERATING INSTRUCTIONS FOR
OPERATING INSTRUCTIONS FOR MEDECO KEY MACHINES FOR MEDECO ORIGINAL, BIAXIAL, MEDECO 3, KEYMARK CLASSIC & KEYMARK X4 PRODUCTS MEDECO HIGH SECURITY LOCKS ASSUMES NO RESPONSIBILITY FOR INJURY OR PROPERTY
Table of Contents: Safety Rules... 1. Safety Selector... 1. Loading the Magazine... 2. Loading Magazine into Rifle... 2. Chambering a Round...
OWNERS MANUAL Table of Contents: Safety Rules... 1 Safety Selector... 1 Loading the Magazine... 2 Loading Magazine into Rifle... 2 Chambering a Round... 3 Chambering a Round (with Carrier in Battery)...
MINIMUM HOME SECURITY
MINIMUM HOME SECURITY The 3 H's of a Secure Home: Hardware, Habits and Humans INSTALL HOME SECURITY HARDWARE Install & maintain deadbolt locks on all exterior doors, including garage service doors. Locks
V1504 Vertical Platform Lift OWNER S MANUAL
V1504 Vertical Platform Lift OWNER S MANUAL (To Be Retained by Owner After Installation by Authorized Savaria Dealer) Part No. 000692 03-m12-2013 2 IMPORTANT Ensure that only an authorized Savaria Dealer
Palm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.
FIREARMS SECURITY. A Brief Guide
FIREARMS SECURITY A Brief Guide THIS LEAFLET GIVES ADVICE ON THE LEVELS OF SECURITY REQUIRED FOR SECTION 1 FIREARMS, SECTION 1 AMMUNITION AND SHOTGUNS. ( FIREARMS MEANS BOTH SECTION 1 FIREARMS AND SHOTGUNS).
TUTORIAL. REbUILdING. REAR CALIpER O-RING CONVERSION CORVETTE 1965-82. Part #: HT-2
Part #: HT-2 1965-82 CORVETTE O-RING CONVERSION REAR CALIpER REbUILdING TUTORIAL Choosing a Brake Caliper Rebuild Kit Standard Lip Seals vs. O-Ring Seals Lip seal design seals are used on 1965-1982 Corvette
Slide the new steering column shaft through the steering column from the driver compartment.
Slide the new steering column shaft through the steering column from the driver compartment. Push the column shaft through the steering column until the machined end is out past the column lower bushing.
TUTORIAL. REbUILdING. front CALIpER O-RING CONVERSION CORVETTE 1965-82. Part #: HT-1
Part #: HT-1 1965-82 CORVETTE O-RING CONVERSION front CALIpER REbUILdING TUTORIAL Choosing a Brake Caliper Rebuild Kit Standard Lip Seals vs. O-Ring Seals Lip seal design seals are used on 1965-1982 Corvette
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
DIAMOND Gear Company, LTD. an ERIKS Company. Installation, Maintenance, & Operation Manual Declutchable Worm Gear
DIAMOND Gear Company, LTD. an ERIKS Company Installation, Maintenance, & Operation Manual Declutchable Worm Gear 2016 DECLUTCHABLE WORM GEAR INSTRUCTIONS This is an instructional manual which provides
Palm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit
Rebuild Instructions for 70001 and 70010 Transmission
Rebuild Instructions for 70001 and 70010 Transmission Brinn, Incorporated 1615 Tech Drive Bay City, MI 48706 Telephone 989.686.8920 Fax 989.686.6520 www.brinninc.com Notice Read all instructions before
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs Research [email protected], [email protected] PREPRINT 15 Sept 2002 (Revised 2 March 2003).
Solstice/Sky Water Pump Replacement
Solstice/Sky Water Pump Replacement The water pump on the Solstice/Sky is starting to need replacement on some vehicles. This guide will help in replacing the water pump while the engine is still in the
Crime Central Station Burglary Alarm Systems
Page 1 of 10 Scope Crime Central Station Burglary Alarm Systems This criteria is intended to provide Loss Control Representatives with specific guidelines and information for evaluating central station
ROTOR LOADER OWNER S MANUAL
ROTOR LOADER OWNER S MANUAL ROTOR LOADER OWNER S MANUAL WARNING IMPORTANT SAFETY INSTRUCTIONS AND GUIDELINES. Misuse of paintball equipment may cause serious injury or death. QUICK SET-UP GUIDE BATTERY
CAM-03, Camshaft Assembly Oil Seal Replacement
CAM-03, Camshaft Assembly Oil Seal Replacement Tools Jack stands Floor Jack Metric Socket set Metric Wrench set Porsche Timing Belt Tension tool (P9201) Flywheel Lock (P9206) Balance Shaft Pin Spanner
FRONT BUMPER INSTALLATION INSTRUCTIONS 2007-2011 DODGE / MERCEDES SPRINTER
Aluminess Products Inc 9402 Wheatlands Ct. #A Santee, CA 92071 619-449-9930 FRONT BUMPER INSTALLATION INSTRUCTIONS 2007-2011 DODGE / MERCEDES SPRINTER Please read before beginning Stainless steel hardware
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
Protecting your business interests through intelligent IT security services, consultancy and training
Protecting your business interests through intelligent IT security services, consultancy and training The openness and connectivity of the digital economy today provides huge opportunities but also creates
White Paper How are thieves stealing modern vehicles?
SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles
Chapter 1: Information Security Fundamentals. Security+ Guide to Network Security Fundamentals Second Edition
Chapter 1: Information Security Fundamentals Fundamentals Second Edition Objectives Identify the challenges for information security Define information security Explain the importance of information security
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account
FORCIBLE ENTRY. Definition and Basic Objectives. Subject 2
Subject 2 FORCIBLE ENTRY Definition and Basic Objectives Forcible entry is the methods or techniques used by used firefighters to gain access to a structure or area where access is locked, blocked, or
Video Analytics and Security
Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...
1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.
2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must
Example Chapter 08-Number 09: This example demonstrates some simple uses of common canned effects found in popular photo editors to stylize photos.
08 SPSE ch08 2/22/10 11:34 AM Page 156 156 Secrets of ProShow Experts: The Official Guide to Creating Your Best Slide Shows with ProShow Gold and Producer Figure 8.18 Using the same image washed out and
Partners in Protection / C-TPAT Supply Chain Security Questionnaire
Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One
CMPD Home Security Newsletter
CMPD Home Security Newsletter Dear South Division Residents. This security newsletter will help you understand how to make your home safer: Alarm Systems. Make sure that you have the battery-cellular back-up
INSTALLATION AND OPERATING INSTRUCTIONS For Model GL1 Gate Locks
Securitron Magnalock Corp. www.securitron.com ASSA ABLOY, the global leader Tel 800.624.5625 [email protected] in door opening solutions INSTALLATION AND OPERATING INSTRUCTIONS For Model GL1 Gate
STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.
STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media
HIGHER STANDARDS. For Magnetic Contacts Needed As Security Vulnerabilities Are Exposed WHITE PAPER
HIGHER STANDARDS For ic Contacts Needed As Security Vulnerabilities Are Exposed WHITE PAPER HIGHER STANDARDS For ic Contacts Needed As Security Vulnerabilities Are Exposed INTRODUCTION The reed switch
If stepping is required, step at 180mm as seen in this picture.
Cast Foundations to standard building regulations requirements. Foundations must be cast completely level, 600mm wide by 230mm deep for single storey, double storey is not allowed by NHBRC. If stepping
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
GLOSSARY OF LOCK TERMINOLOGY
GLOSSARY OF LOCK TERMINOLOGY The Master Locksmiths Association has created the following glossary of lock terminology to assist you with your security requirements. Don t forget that your first port of
SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT
SECURITY VS. EXITING... Door Locking Hardware in Schools DIVISION OF THE STATE ARCHITECT G U I D E L I N E S DSA Guidelines for Door Locking Hardware in Schools Egress doors shall be readily openable from
INSTRUCTIONS: LocknCharge Laptop Carts
INSTRUCTIONS: LocknCharge Laptop Carts www.lockncharge.com Extra Tools required: Hammer, Philips head screwdriver, medium adjustable spanner. (Allen key supplied) (Panel colours for illustration purposes
Fitting Instructions Garador, Westland & Catnic Garage Door Spring Box Roller Wheels & Wall Bracket & Link Arm
Fitting Instructions for a Garador, Westland & Catnic Garage Door Spring Box Roller Wheels & Wall Bracket & Link Arm These instructions cover, how to replace a Spring Box Assembly to a Garador, Westland
Crime Prevention through Environmental Design (CPTED) - Checklist
Crime Prevention through Environmental Design (CPTED) - Checklist * Where relevant, each item is to be shown on the architectural plans. A description of how the development complies, together with the
Padlocks. 146 Padlocks FEATURES
146 Padlocks Padlocks FEATURES Medeco 3 BiLevel Medeco X4 CLIQ Medeco XT Nexgen Protector II Protector II body accepts 6 pin knob style cylinders Protector II is available as key retaining only System
The purposes of this experiment are to test Faraday's Law qualitatively and to test Lenz's Law.
260 17-1 I. THEORY EXPERIMENT 17 QUALITATIVE STUDY OF INDUCED EMF Along the extended central axis of a bar magnet, the magnetic field vector B r, on the side nearer the North pole, points away from this
M113 VEHICLE FAMILY RUBBER TRACK INSTALLATION INSTRUCTIONS SOUCY TRACK SYSTEM 04-M113-1ENS (SPLIT IDLER) Litho d in Canada 1 04-M113-1ENS
M113 VEHICLE FAMILY RUBBER TRACK INSTALLATION INSTRUCTIONS (SPLIT IDLER) 1 # TABLE OF CONTENTS List of parts and tools................................................3 Installation of complete kit...................................................5
Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam
Ten Things Everyone Should Know About Lockpicking & Physical Security Deviant Ollam Physical security is an oft-overlooked component of data and system security in the technology world. While frequently
MONROE POLICE DEPARTMENT
MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your
INSTALL/REMOVAL INSTRUCTIONS: WINDOW LIFT MOTOR
REMOVAL/INSTALL OF WINDOW LIFT MOTOR (742-273) Ford Expedition 1997 2002, Lincoln Navigator 1998 2002, Ford F-150 Super Crew Cab 2001 General Tech Tips: Use painter s tape rather than duct tape to secure
Policy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
Physical Security Checklist and Inventory
Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.
C-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
Master Code 2. Troubleshooting: Installation 7. Troubleshooting: Door Jamming and Door Handing 8. Troubleshooting: Keypad 12
Programming and Troubleshooting Guide 1 2 3 4 5 6 Master Code 2 Troubleshooting: Installation 7 Troubleshooting: Door Jamming and Door Handing 8 Troubleshooting: Keypad 12 Troubleshooting: Battery 13 Battery
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
National Crime Prevention Council 1000 Connecticut Avenue, NW Thirteenth Floor Washington, DC 20036-5325 202-466-6272 www.ncpc.org
National Crime Prevention Council 1000 Connecticut Avenue, NW Thirteenth Floor Washington, DC 20036-5325 202-466-6272 www.ncpc.org 2005 National Crime Prevention Council Medeco High Security Locks, Inc.
Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template
Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE
TS93 EMR T/PT/TDE. Surface applied door closer
TS EMR T/PT/TDE Surface applied door closer Installation instructions: Pull side track mount door closer with smoke detector (EMR T) Push side track mount door closer with smoke detector (EMR PT) Double
Installation of Rear View Camera in a 1995 Roadtrek 190 Popular
Installation Instructions: 1995 Roadtrek Rear View Camera Page 1 Installation of Rear View Camera in a 1995 Roadtrek 190 Popular Introduction. In the fall of 2010 we investigated rear view cameras for
What is C-TPAT? Customs Trade Partnership Against Terrorism
Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications
A Short Course on Wheel Alignment
A Short Course on Wheel Alignment In its most basic form, a wheel alignment consists of adjusting the angles of the wheels so that they are perpendicular to the ground and parallel to each other. The purpose
Technical Information
Technical Information This section of the catalogue provides technical information that will help specify, install and maintain Surelock McGill devices and components. The topics are listed below: Blast
CHAPTER 2: USING THE CAMERA WITH THE APP
TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:
Changing the C6 Front DRL/Turn signal bulb DIY.
Changing the C6 Front DRL/Turn signal bulb DIY. The Corvette C6 DRL/Turn signal bulb will eventually need to be changed. With the DRL bulbs on most of the time the bulb gets hot and over several hundred
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
2740 Whitten Rd Bldg 103 Memphis, TN 38133 Telephone 901-380-9290 Email [email protected]
Fuel Injection Pump Replacement REMOVAL Diesel Care & Performance Inc 1. Disconnect negative battery terminal. 2. Remove throttle linkage. Fuel Injection Pump Bracket 3. Remove injection pump bracket.
SECTION G2: CABLE PROCESSOR MODULE MAINTENANCE
SECTION G2: CABLE PROCESSOR MODULE MAINTENANCE Cable Processor Module overview WARNING! When tipping the Cable Processor Module back, (after removing the toggle arm pin), use extreme caution not to drop
Cargo Container Vulnerabilities
Cargo Container Vulnerabilities Prepared as an informational tool for organizations such as: International Organization for Standardization (ISO) The World Shipping Council (WSC) & The Organization of
Manual for GlobePharma Mini-Press II Rotary Tablet Press
1 of 13 Preparing the Rotary Press 1. Make sure the rotary press is unplugged. 2. Open the bottom cabinet of the rotary press and take out the grey tool kit, and the beige box of punches and dies. 3. Take
OWNER S MANUAL Table Tennis Table Patent Pending
OWNER S MANUAL Table Tennis Table Patent Pending Be sure to write your model number and serial number here for future reference. You can find these numbers printed on the bottom of the table. MODEL # T8179
3 day Workshop on Cyber Security & Ethical Hacking
3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer What is Cyber Security? What is Ethical hacking? What is Computer Science?
Adult Family Home (AFH) LOCAL BUILDING INSPECTION CHECKLIST Code References: 2012 IRC Section R325 (WAC 51-51) APPLICATION NUMBER:
Adult Family Home (AFH) LOCAL BUILDING INSPECTION CHECKLIST Code References: 2012 IRC Section R325 (WAC 51-51) APPLICATION NUMBER: SECTIONS 1, 2, 3, AND 4 MUST BE COMPLETED BY APPLICANT BEFORE INSPECTION
Garden Security. Redbridge Borough Police Shed, Garage and Garden Security Guide
2 Redbridge Borough Police Shed, Garage and Garden Security Guide Burglary is a crime which causes us all great concern. Recent crime figures show that Redbridge has one of the lowest residential burglary
GEAROLOGY 2-1 SPUR GEARS SPUR GEARS
GEAROLOGY 2-1 2 2-2 GEAROLOGY COMMON APPLICATIONS: Spur gears are used to Now that you ve been introduced to both Boston Gear and some of the basics of our Gearology course which we like to call Power
