Books and Multimedia

“Locks, Safes, and Security” DAME, LSS+, “Open in Thirty Seconds” Overview

See a detailed description for all books and multimedia by Marc Tobias and Tobias Bluzmanis.

Marc Tobias has authored the First and Second Edition of LOCKS, SAFES, AND SECURITY: An International Police Reference, published by Charles Thomas Publishers, Springfield, Illinois, United States.  The first edition of this book was originally published in 1970, and was one of the original references about locks utilized by forensic laboratories and law enforcement agencies throughout the world.

The revised textbook contains CHAPTER CC THOMAS, with  over 1400 pages of detailed information about locks and safes: their construction, design, and bypass, as well as an in-depth analysis of physical security.. There are over  550 illustrations, photographs, and diagrams to supplement the text, in extraordinary detail. The book may be ordered directly from the publisher, or from Amazon.

LOCKS, SAFES, and SECURITY provides the first in-depth work on the subject since 1856 when George Price wrote his famous treatise in England. This book has been written specifically for criminalists, investigators, security specialists, and government agencies involved in covert operations. The theory of each locking mechanism is presented, as well as the latest bypass tools and techniques for locks and safes.

An electronic infobase edition, LSS+ was  first released in July, 2002 and has been updated three times. It provides expanded text, graphics, images, audio and video and updates to the hardbound edition. The author has also re-written two famous treatises on locks and safes, originally published by Alfred C. Hobbs, and George Price during the 1850’s. In addition, the famous manual “The Art of Manipulation” has been edited and included within LSS+. Version 5.1 of LSS+ was released in May, 2004, and contains five new volumes, for a total of up to seventeen disks (for Government edition).  The latest  release was in 2013.

LSS+ is the multimedia supplement to LOCKS, SAFES, AND SECURITY.  Depending upon security level, information is provided that details sophisticated methods for covert bypass of most locking systems. Forced entry, forensics, burglary investigation, physical security, and alarm systems are also presented in far greater detail than within the bound edition of the book.

Extensive audio and video, as well as expanded graphics are contained within the electronic Infobase edition. Up to one-hundred hours (depending upon security level) of media provides expert insight into lock picking, decoding, forced entry techniques, investigation involving locks and safes, and many other topics. Some of the recognized world experts appear on your desktop to aid in your understanding of this complex and diverse subject.

LSS+ is available in two security levels:  LOCKSMITH, and GOVERNMENT. and integrates two books that were written over one hundred and fifty years ago about locks and safes. All information contained within the Infobase is instantly accessible through the sophisticated search engine.

The electronic supplement required almost three years to produce, and contains more than 4000 new graphics and images, 300 full-text patents, along with significant additions to the original text in the bound edition. You may order your copy from Wendt in Germany, LockPicks.com, or from this site (Products) for Sale).

Defenses Against Methods of Entry (DAME) is a supplement to LSS+ and contains 100 video segments that detail the analysis and bypass of locks and safes by Harry Sher and Marc Tobias.

Medeco High Security Supplement (Locksmith and Government) is the multimedia edition of Open in Thirty Seconds, which details the analysis and defeat of Medeco high security locks.

Open in Thirty Seconds: Cracking one of the most secure locks in America” examines new techniques to compromise Medeco BiAxial and M3 cylinders by methods of forced and covert entry. it was published in 2008. It is available from this site, or from Amazon. Read the forewords by Harry Sher (Master Locksmith and ALOA instructor), Professor Ross Anderson at University of Cambridge, and Barry Wels, one of the founders of TOOL (The Open Organization of Lock Pickers).

See the reviews  in The National Locksmith magazine, ASIS, The Daily Beast, and Amazon for a detailed review of  “Locks, Safes, and Security,” “LSS+ Multimedia Edition,” and “Open in Thirty Seconds.”

THE AUTHOR has been involved in the analysis and bypass of locks for the past forty-five years, and has consulted with many lock manufacturers, government agencies and private corporations regarding the design, bypass, and security of locks. He is an investigative attorney who conducts security analysis,  technical fraud investigations and related cases.

Marc Weber Tobias received his Bachelor’s Degree with a major in law enforcement, and a Juris Doctor Degree in law.  He has written seven police textbooks and has been granted thirteen U.S. and foreign patents involving the design and bypass of locks. During his career, he has worked both in the government and private sectors, involved in conducting and directing civil and criminal investigations and prosecutions. Marc Tobias is also a licensed polygraph examiner.

Marc Tobias and Tobias Bluzmanis direct the operations of Security Laboratories, which work for many of the largest lock manufacturers in the world. Their mission is to analyze security hardware for bypass capabilities and then work with design engineers to assess and fix such problems. Marc has testified as an expert witness in civil and criminal trials involving the design and bypass of locks.

Marc Weber Tobias is the principal attorney of Investigative Law Offices, and is a  member of the following professional organizations: FBI InfraGard; American Bar Association (ABA); American Polygraph Association (APA); American Association of Police Polygraphists (AAPP); American Society for Industrial Security (ASIS); Associated Locksmiths of America (ALOA); Safe and Vault Technicians Association (SAVTA);  and Association of Firearms and Tool marks Examiners (AFTE).

For additional information regarding this book, you may contact the author at mwtobias@securitylaboratories.org.

Locks, Safes, and Security (First Edition) 1970

Open in Thirty Seconds: Cracking one of the most secure locks in America, 2008

Police Communications, 1974

Pre-Trial Criminal Procedure, 1972

A Field Manual of Criminal Law and Police Procedure, 1975

TECHNO-SECURITY GUIDE TO SECURING SCADA, 1st Edition (Contributor, chapter on physical security)

“Security Engineering” By Ross Anderson: Chapter 11 On Physical Security and Locks

Security Engineering is in its third edition, by Professor Ross Anderson at the University of Cambridge. it is the Must Read book for all security engineers that are tasked with designing and analyzing hardware networks and software.

Security Engineering 2nd Edition

SECURITY-ENGINEERING-2ED-478-600

Read Chapter 11 in the Second Edition about Medeco and other high security locks.

SECURITY-ENGINEERING-CH11

Security Engineering 3thd Edition By Ross Anderson

Security Engineering 3thd Edition: By Ross Anderson

SECURITY-ENGINEERING-3ED-600-499

Read the First, Second, and Third Edition online. See the complete listing of chapters.

Security Engineering – A Guide to Building Dependable Distributed Systems

High Security Mechanical Locks: Treatise By Graham Pulford

High-Security Mechanical Locks

Graham Pulford is a lock expert in England who wrote an incredible treatise and encyclopedic reference on high security locks and their design. It is highly recommended for anyone interested in the subject, including design engineers working for lock manufacturers.

High Security Mechanical Locks: First Edition

PULFORD-IMAGE

Handbook of Intrusion Detection Sensors: DARPA Document 4968

DARPA 4968_v2_Handbook of Intrusion Detection Sensors

This is a comprehensive document produced by the Defense Advanced Research Project Agency DARPA regarding alarm sensors and intrusion detection. It is an excellent resource, and can be used in conjunction with the LSS+ Multimedia edition Alarms section.

Lock Picking 101 Interview With Marc Tobias About The Medeco Book

Marc Tobias was interviewed by Josh Nekrep for the Lock Picking 101 web site about Open in Thirty Seconds, the book about Medeco.

Lock Picking 101 Forum • How to Pick Locks, Locksport, Locksmithing, Locks, Lock Picks_

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

No-Tech Hacking

No Tech Hacking: A guide to social engineering, dumpster diving and shoulder surfing  is a wonderful guide to common design problems in security hardware that can be exploited easily.  There is a chapter on physical security that was contributed to by Marc Tobias.

The book can be ordered from Amazon.

hacking

DAME: Defenses Against Methods of Entry

INSTALL_2010-2013  A tutorial

DAME; An introduction

The Defenses Against Methods of Entry) supplement  files LSS 501 and LSS 502 in conjunction with the DAME course taught by Harry Sher, was originally released in July, 2005 and has been updated in three different editions. The 2010 release now contains 79 video segments detailing many forms of bypass and related issues, including opening, repair, and service of safes and GSA containers, use of special optical devices, various mechanical bypass techniques, picking, impressioning, bumping, decoding of locks, and different techniques for opening locks and safes.

The 2013 release added another 20 files to the course, for a total of 100 video segments. An updated version, on a USB storage device, will be released in 2020. DAME is an excellent reference for locksmiths, crime labs, law enforcement agencies, and security professionals.

DAME is part of the LSS+ multimedia supplement to Locks, Safes, and Security: An International Police Reference. LSS+ contains more than one- hundred hours of audio and video, graphics and other reference materials relating to locks, safes, and alarm systems.

INSTALLATION INFORMATION

Depending upon which version of DAME you purchased, there may be different installation procedures. All versions of DAME will run on Windows 7-10. Also please not that DAME was also issued on a USB drive. The instructions were somewhat similar. 

DAME 2010 is compatible with all Windows programs, including Windows 7 and Vista. It will also run on a MAC in Windows mode. Please follow the installation instructions contained in the setup files on the disk, and check the boxes for the files that are to be installed on your hard drive. The program will be installed in the users\public sub-directory. Note this is different than previous versions of DAME and LSS, which were installed under the Program Files sub-directory. Please also note that if you have a previous version of DAME and you have upgraded your operating system to Vista or Windows 7, you must name the path users\public during installation. You cannot install any LSS program under the Program Files sub-directory with Windows 7.

The video files require Windows Media player to be the default media program. The files will not properly run with any other software.

Until the 2020 release, the video files were split into two separate directories and disks: 501 and 502. These have now been combined in 2020, so the procedure to unlock the disks has been simplified.

OBTAINING AN UNLOCK CODE

You must obtain an unlock code for DAME and all other LSS+ programs before you can open the Folio Infobases. This procedure is straightforward. For DAME 2010, you must generate a challenge key for the DAME license. Please see the PDF included on disk for generating a challenge key and unlock code, or you can go to www.security.org/lss-tour.htm for detailed instructions. Please note that if you purchased more than one multimedia title, you can enable all licenses at the same time by selecting the license, either locksmith or government level, that contains each LSS title that you are installing.

Please send the challenge key by email to mwtobias@securitylaboratories.org, or you may contact Harry Sher. IMPORTANT: Once you send the challenge key, BE CERTAIN TO LEAVE THE PROGRAM OPEN until you receive an unlock code, otherwise the code will not work and you will need to generate a new challenge key.

DAME 2010 TABLE OF CONTENTS

© 2004-2020 Marc Weber Tobias

See the Table of Contents PDF included on disk for a listing of all video files contained in DAME,  You must have Adobe Acrobat installed to view the file.

DAME is a supplement to LSS+, the multimedia edition of Locks, Safes, and Security: An International Police Reference. It is available to locksmiths, government agencies, and security professionals.

Originally, DAME was issued in 2004 and produced on CD ROM in two volumes, LSS 501 and LSS 502.

The 2007 and 2010 editions were released on DVD but retained the original file structure. Please note that if you purchased DAME separately from LSS+ prior to 2007, then you will require a separate license and unlock code. Please refer to the tutorial on the DAME disk for detailed instructions.

The 2010 edition contains 79 video segments, with 20 having been added to this release.

DAME TABLE OF CONTENTS: VIDEO FILES

LSS 501

Bypass by rapping

Bypass by retainer attack

Scoping the change key hole

Manipulating Simplex and other push button locks

Bypass using a straight knife

Tryout keys and their use

Axial lock picks

Decoding of master keys

Introduction to covert entry

Drilling the Adams-Rite for wire insertion

Opening the American padlock series 2000

Harry Sher on computers for locksmiths

Discussion regarding pick sets-II

The Peterson Mfg. plug spinner

The Ben-Jim opening tool

Lock bumping

Adjustable drill template

Under-door open tool to access door knob

Picking the Mul-t-Lock with the H&M Pick tool

Mul-t-Lock analysis for pick resistance

European profile breaking tool

European profile cylinders

Disassembling profile cylinders

High security car opening tools

Fiber optic light source

Bypass of mortise cylinders

Understanding Ratchet mechanisms

Opening the Schlage F-Line

Thumb-turn tool for opening doors

Garage door bypass

LSS 502

Introduction to Defenses Against Methods of Entry

Interchangeable Core -1

Interchangeable Core -2

Picking the Chrysler eight wafer lock

Determinator for vehicle locks

Discussion regarding pick sets, the Wafer Breaker and tension wrenches

Security for vehicle locks

S&G M6730MP manipulation-proof lock

Bypass of the Adams-Rite lock set

Locksmiths use specialized tools from other professions

Opening the American Padlock

A discussion regarding borescopes

Removing a mortise cylinder by shearing the set screw

Drill and pick technique for opening lever locks

Drill and pick technique for a Milner safe

Bypassing a lock with a magnetic field

Bypassing the Schlage Everest

Decoding a lever lock by measuring lever height

Picking a Diebold 175-70 lever lock

Retainer pin attacks on key-in-knob locks using the lever pull technique

Manipulation aid: Mike Madden electronic sensor

Manipulation aids, general discussion

Theory of manipulation of a combination lock

Mechanical bypass of locks

Opening a lock by nose pulling

Methods of obtaining a key or its code

Bypassing the Presto lock

Opening the “Club” wafer lock

Opening the Weslock

HPC Cylinder Eater 2009

HPC Cylinder Eater 2010 update

HPC hockey puck padlock jig

HPC round-knob puller

HPC adjustable padlock jig

Schlage F-Line opening tool

Bumping of Medeco locks

Adjustable drill templates

Repairing GSA containers, requirements

Drilling of GSA container, demonstration

Drill templates

Impressioning aid, microprocessor-controlled

Keydex emergency dial

Kwikset Smart Key cylinder bypass

Magnetic bypass of mechanical components in locks

Major manufacturing lever pull

Manipulation aid and demonstration

Ophthalmoscope optical viewing aid

LSS 206 Impressioning introduction

LSS 205 Safe servicing

DAME 2013 UPDATE

The following video files were added to the 2013 edition of DAME:

Auto 10 pin tumbler tray
Better Resetter tool
Defeat of Kaba Simplex 1000 with a rare earth magnet
Flexible articulating video scope
Generation Two video scope 12″
Generation two scope with 90 degree camera
HPC lever puller, updated design
KEYDEX scope camera
KEYDEX wafer reader
LED light source
Master keying and access control system considerations
Master keying software by Rabbitsoft
Master keying theory
Moon light
Pen microscope
Rigid articulating scope
Scope holders
Small diameter video scope
Video scope accessories
Video scope 5.5 mm rigid Time Master scope

LSS+ High Security Supplement: Government

LSS+ HIGH SECURITY SUPPLEMENT

THE COMPROMISE OF MEDECO® HIGH SECURITY LOCKS:

New Techniques of Forced, Covert, and Surreptitious Entry

ELECTRONIC INFOBASE EDITION

LSS 701 GOVERNMENT DISK

Marc Weber Tobias, J.D. and Tobias Bluzmanis

© 2008 Marc Weber Tobias

® Medeco is a registered trademark of Medeco Security Locks, Inc.

LSS+ is the High Security Supplement to LSS+, the Multimedia edition of Locks, Safes, and Security (second edition), published by Charles C. Thomas in Springfield, Illinois. This electronic Infobase, which is to be utilized in conjunction with LSS+ Government, examines new techniques to compromise Medeco Biaxial and m3 high security locks. Within the fourteen chapters of this book are extremely detailed and comprehensive images, graphics, charts, spread sheets, tables, diagrams, and video segments that explain and document each method of compromise.

The book is divided into three parts in which the underlying theory and practical application of the advanced bypass techniques that have been developed by the authors are thoroughly examined. Included is an analysis of the design of conventional pin tumbler locks, UL and BHMA/ANSI high security standards, a comparison of four high security locks, the design theory and security of Medeco cylinders, and techniques of forced and covert methods of entry.

Medeco for the past forty years has been the predominant high security lock manufacturer in the United States. They protect high value targets and critical infrastructure throughout the world that include such venues as the White House, Pentagon, and the Royal Family in England. Covert entry specialists have attempted to develop reliable methods to bypass these cylinders since 1970 when the original Medeco lock was first introduced. Their resistance to all forms of entry is due to the development and implementation by Medeco of the rotating pin tumbler design in combination with a sidebar. These inventions have set the standard in the high security lock industry and until now have been virtually impervious to reliable techniques of attack.

New and unique methods to compromise one of the most secure locks in America by forced, covert, and surreptitious entry were developed by the authors during an eighteen month research project that has resulted in the filing of multiple patents and the ability to pick, bump, and mechanically bypass Medeco cylinders, sometimes in seconds. This Infobase contains the required information to train special ops, military, law enforcement, locksmith specialists and security personnel as to the different methods of compromise of the Biaxial and m3 cylinders by forced entry, picking, bumping, extrapolation of the top level master key, and complete circumvention of key control, even for those locks that utilized the most proprietary and restricted keyways.

Information is presented that will allow security officers to assess the potential risks and vulnerabilities that may flow from the use of Medeco locks within their facility. This is especially important regarding information, assets, and infrastructure that may be regulated by federal or state statute because of the liability that can flow from the failure to properly secure data and property from attack and compromise.

This CD ROM is password protected. You must obtain an unlock code to allow access to its contents. Please see the tutorial on this disk or on www.securitylaboratories.org for detailed installation instructions. You may contact the author at 1-877-228-9577 or by email at mwtobias@securitylaboratories.org for further information. You must have the required version of LSS+ to purchase and utilize the contents of this High Security Supplement.

UPDATE FROM THE ORIGINAL 2008 BOOK

Medeco has made significant changes in the design of their lock and changed the number of available codes that are specified in their codebook. As a result, the four code-setting keys that are described may or may not work. Please note that since the original printing of the boo, four U.S. patents have been granted to Marc Tobias and Tobias Bluzmanis for high security pins and code-setting keys. Please see Patents link on this site.

NOTE: The Government and Locksmith versions are essentially the same material except that the Government edition contains the actual codes for producing code-setting keys.

LSS+ High Security Supplement: Locksmith

LSS+ HIGH SECURITY SUPPLEMENT

THE COMPROMISE OF MEDECO® HIGH SECURITY LOCKS:

New Techniques of Forced, Covert, and Surreptitious Entry

ELECTRONIC INFOBASE EDITION

LSS 701 LOCKSMITH DISK

Marc Weber Tobias, J.D. and Tobias Bluzmanis

© 2008 Marc Weber Tobias

® Medeco is a registered trademark of Medeco Security Locks, Inc.

LSS+ is the High Security Supplement to LSS+, the Multimedia edition of Locks, Safes, and Security (second edition), published by Charles C. Thomas in Springfield, Illinois. This electronic Infobase, which is to be utilized in conjunction with LSS+ Government, examines new techniques to compromise Medeco Biaxial and m3 high security locks. Within the fourteen chapters of this book are extremely detailed and comprehensive images, graphics, charts, spread sheets, tables, diagrams, and video segments that explain and document each method of compromise.

The book is divided into three parts in which the underlying theory and practical application of the advanced bypass techniques that have been developed by the authors are thoroughly examined. Included is an analysis of the design of conventional pin tumbler locks, UL and BHMA/ANSI high security standards, a comparison of four high security locks, the design theory and security of Medeco cylinders, and techniques of forced and covert methods of entry.

Medeco for the past forty years has been the predominant high security lock manufacturer in the United States. They protect high value targets and critical infrastructure throughout the world that include such venues as the White House, Pentagon, and the Royal Family in England. Covert entry specialists have attempted to develop reliable methods to bypass these cylinders since 1970 when the original Medeco lock was first introduced. Their resistance to all forms of entry is due to the development and implementation by Medeco of the rotating pin tumbler design in combination with a sidebar. These inventions have set the standard in the high security lock industry and until now have been virtually impervious to reliable techniques of attack.

New and unique methods to compromise one of the most secure locks in America by forced, covert, and surreptitious entry were developed by the authors during an eighteen month research project that has resulted in the filing of multiple patents and the ability to pick, bump, and mechanically bypass Medeco cylinders, sometimes in seconds. This Infobase contains the required information to train special ops, military, law enforcement, locksmith specialists and security personnel as to the different methods of compromise of the Biaxial and m3 cylinders by forced entry, picking, bumping, extrapolation of the top level master key, and complete circumvention of key control, even for those locks that utilized the most proprietary and restricted keyways.

Information is presented that will allow security officers to assess the potential risks and vulnerabilities that may flow from the use of Medeco locks within their facility. This is especially important regarding information, assets, and infrastructure that may be regulated by federal or state statute because of the liability that can flow from the failure to properly secure data and property from attack and compromise.

This CD ROM is password protected. You must obtain an unlock code to allow access to its contents. Please see the tutorial on this disk or on www.securitylaboratories.org for detailed installation instructions. You may contact the author at 1-877-228-9577 or by email at mwtobias@securitylaboratories.org for further information. You must have the required version of LSS+ to purchase and utilize the contents of this High Security Supplement.

UPDATE FROM THE ORIGINAL 2008 BOOK

Medeco has made significant changes in the design of their lock and changed the number of available codes that are specified in their codebook. As a result, the four code-setting keys that are described may or may not work. Please note that since the original printing of the boo, four U.S. patents have been granted to Marc Tobias and Tobias Bluzmanis for high security pins and code-setting keys. Please see Patents link on this site.

NOTE: The Government and Locksmith versions are essentially the same material except that the Government edition contains the actual codes for producing code-setting keys.

LSS+ Multimedia Edition: Government

The LSS+ Government edition contains the following files: LSS 101-102 201-205, 301-305, 401, 402, 403.  The difference between the Government and Locksmith edition are the Government files 301-305 and 401-403. These files provide detailed information on government-only covert entry tools, and alarms. You must be an employee of a law enforcement agency, government facility, or have responsibilities with regard to covert entry of locks and safes.

LSS+ TUTORIAL

Welcome to the on-line tour of the LSS+ Electronic Infobase edition of LOCKS, SAFES, AND SECURITY (Second Edition). The hardbound treatise is available from Charles C. Thomas Publishers, Springfield, Illinois. It may be ordered at ccthomas.com or from this site. See a description of this 1400 page treatise and review from the National Locksmith Magazine.

This tour will provide you with comprehensive information regarding the LSS+ CD ROM series. The Electronic multimedia supplement to the book provides enhanced graphics, many new and updated sections, and almost forty hours of audio and video that is integrated into the text. The tour has been organized by topical outline appearing below. There are also extensive help files within LSS+ that may be accessed by entering [F1] from within the Infobase. This will provide a Query dialog box for you to enter search terms.

LSS+ is an extremely sophisticated but easy to use search engine that allows you to find information on any topic instantly. The tutorial will explain the many different screens and components within the Infobase, what they mean, and how to use them. Many readers are not experienced computer users. LSS+ will be easy for you to use, and does not require any extensive knowledge. If you have and suggestions for additional help topics to make your use of LSS+ easier, please send them to us.

If you are a locksmith who is interested in obtaining detailed information on the very complex and diverse components of the profession, then you will find LSS+ an interesting and valuable reference. This is especially true if you are pursuing a career in forensic locksmithing. Some of the best experts in the world provide detailed audio and video information within LSS+. There are extensive graphics regarding the analysis of locks and safes for evidence of both covert and forced entry, as well as discussions relating to insurance fraud.If you are interested in the history of locks and safes since their initial development, then you will find equally interesting the edited versions of two of the world’s most comprehensive works on the subject. These were written by George Price and Alfred C. Hobbs more than one hundred and fifty years ago. They have been rewritten and edited by the author.

Also rewritten is the small handbook entitled The Art of Manipulation. This classic manual was perhaps the first to describe the method of opening a combination lock by manipulation, and was written in 1955.


If you work for a government agency, are an investigator, or criminalist, you will find LSS+ to be a rich source of information regarding locks and safes, and their bypass. Detailed information, complemented by extensive audio and video, detail many of the tools that are available for covertly bypassing high security locking mechanisms. Equally comprehensive information is provided regarding the tools and techniques of forced entry. The government version of LSS+ will only be sold to government agencies. A network license may be obtained from the author.

LSS+ Multimedia Edition: Locksmith

LSS+ Locksmith edition contains the following files: LSS 101-102 201-205 .  The difference between the Government and Locksmith edition are the Government files 301-305 and 401-403. These files provide detailed information on government-only covert entry tools, and alarms. You must be an employee of a law enforcement agency, government facility, or have responsibilities with regard to covert entry of locks and safes. The Locksmith edition contains hundreds of video and audio clips, graphics, charts, and thousands of photographs in forty chapters. The hardbound book, and two other famous works are also included within the Infobase, both for Government and Locksmith.

LSS TUTORIAL

Welcome to the on-line tour of the LSS+ Electronic Infobase edition of LOCKS, SAFES, AND SECURITY (Second Edition). The hardbound treatise is available from Charles C. Thomas Publishers, Springfield, Illinois. It may be ordered at ccthomas.com or from this site. See a description of this 1400 page treatise and review from the National Locksmith Magazine.

This tour will provide you with comprehensive information regarding the LSS+ CD ROM series. The Electronic multimedia supplement to the book provides enhanced graphics, many new and updated sections, and almost forty hours of audio and video that is integrated into the text. The tour has been organized by topical outline appearing below. There are also extensive help files within LSS+ that may be accessed by entering [F1] from within the Infobase. This will provide a Query dialog box for you to enter search terms.

LSS+ is an extremely sophisticated but easy to use search engine that allows you to find information on any topic instantly. The tutorial will explain the many different screens and components within the Infobase, what they mean, and how to use them. Many readers are not experienced computer users. LSS+ will be easy for you to use, and does not require any extensive knowledge. If you have and suggestions for additional help topics to make your use of LSS+ easier, please send them to us.

If you are a locksmith who is interested in obtaining detailed information on the very complex and diverse components of the profession, then you will find LSS+ an interesting and valuable reference. This is especially true if you are pursuing a career in forensic locksmithing. Some of the best experts in the world provide detailed audio and video information within LSS+. There are extensive graphics regarding the analysis of locks and safes for evidence of both covert and forced entry, as well as discussions relating to insurance fraud.If you are interested in the history of locks and safes since their initial development, then you will find equally interesting the edited versions of two of the world’s most comprehensive works on the subject. These were written by George Price and Alfred C. Hobbs more than one hundred and fifty years ago. They have been rewritten and edited by the author.

Also rewritten is the small handbook entitled The Art of Manipulation. This classic manual was perhaps the first to describe the method of opening a combination lock by manipulation, and was written in 1955.

LSS+ CD ROM Tutorial

If you are a locksmith who is interested in obtaining detailed information on the very complex and diverse components of the profession, then you will find LSS+ an interesting and valuable reference. This is especially true if you are pursuing a career in forensic locksmithing. Some of the best experts in the world provide detailed audio and video information within LSS+. There are extensive graphics regarding the analysis of locks and safes for evidence of both covert and forced entry, as well as discussions relating to insurance fraud.

If you are interested in the history of locks and safes since their initial development, then you will find equally interesting the edited versions of two of the world’s most comprehensive works on the subject. These were written by George Price and Alfred C. Hobbs more than one hundred and fifty years ago. They have been rewritten and edited by the author.

Also rewritten is the small handbook entitled The Art of Manipulation. This classic manual was perhaps the first to describe the method of opening a combination lock by manipulation, and was written in 1955.


If you work for a government agency, are an investigator, or criminalist, you will find LSS+ to be a rich source of information regarding locks and safes, and their bypass. Detailed information, complemented by extensive audio and video, detail many of the tools that are available for covertly bypassing high security locking mechanisms. Equally comprehensive information is provided regarding the tools and techniques of forced entry. The government version of LSS+ will only be sold to government agencies. A network license may be obtained from the author.

Open In Thirty Seconds: Cracking One Of The Most Secure Locks In America

OPEN IN THIRTY SECONDS: Cracking One of the Most Secure Locks in America is the printed edition of High Security Supplement (the multimedia edition on CD for Government agencies, locksmiths, and security professionals). This book examines new techniques to compromise Medeco® Biaxial® and m3 high security locks by methods of forced, covert, and surreptitious entry. It is the result of an eighteen month research project by the authors and other security experts. It has resulted in the filing of multiple patents and the ability to pick, bump, and mechanically bypass Medeco cylinders, sometimes in seconds. As of 2019, four patents have been issued to the authors for the code-setting keys, process to decode the locks, and certain protective measures.

Medeco, for the past fifty years, has been the predominant high security lock manufacturer in the United States. They protect high value targets and critical infrastructure throughout the world. Their venues include the White House, Pentagon, embassies, palaces, and the Royal Family in England, as well as hundreds of thousands of residences, businesses, hospitals, banks, government facilities, and critical infrastructure. Their locks are found in virtually every application where the highest level of quality and security is expected.

Covert entry specialists have attempted to develop reliable methods to bypass these cylinders since 1970, when the original Medeco lock was first introduced. Their resistance to all forms of entry is due to the development and implementation by Medeco of the rotating pin tumbler concept, in combination with a sidebar. These inventions have set the standard in the high security lock industry, and until now have been virtually impervious to reliable techniques of attack.

In its fourteen chapters, this book provides detailed information to protection professionals that rely upon Medeco or other high security locks about security vulnerabilities. Perhaps as important, it offers an insight into the world of locks for the average consumer or risk administrator. They often lack the requisite knowledge to understand what may or may not be secure for their particular environment. It allows them to distinguish between hyperbole and reality, especially as it relates to lock bumping and picking, as well as which locks are secure.

The book is divided into three parts in which the underlying theory and practical application of advanced bypass techniques are thoroughly examined. Included is an analysis of the design of conventional pin tumbler locks, UL and BHMA/ANSI security standards, a comparison of four high security locks, and the design theory and security of Medeco cylinders. We examine the different methods of compromise that were developed for the Biaxial and m3 cylinders by forced entry, picking, bumping, and extrapolation of the top level master key. The complete circumvention of key control, even for those locks that utilize the most proprietary and restricted keyways, is detailed because of its critical importance to the protection of locks against certain methods of bypass.

Information is presented that will allow security officers to assess the potential advantages, as well as risks and vulnerabilities that may flow from the use of Medeco locks within their facility. This is especially important with regard to data, assets, and infrastructure that may be regulated by federal or state statutes because of the liability that can flow from the failure to properly secure data and property from attack and compromise.

The development of methods to bypass Medeco locks required the solution to many interrelated and complex problems and may be the modern equivalent of the Enigma code machine during World War II. Security in Medeco cylinders is that good.

The process to compromise all levels of Medeco security required technical expertise, the connection of many unrelated pieces of information, and perhaps most importantly, imagination. The chronology of how Medeco security was cracked is a good story, especially if you enjoy technical-based intellectual challenges that have serious security implications in the real world.

See Reviews of “Open in Thirty Seconds,” LSS+, and “Locks, Safes, and Security” in the ASIS Security Management Magazine, The National Locksmith, on Amazon, and on Internet sites.

****

On October 10, 1977, a senior Medeco technical support representative stated, in part, as a response to a question from a caller about bumping and picking, that “…the biggest prize in this industry would be for someone to be able to come out and say they could pick a Medeco lock, because we’ve never been proven, in the 40 years of our existence, that someone can do that…

“… the same with bumping…” 

“…the accolades that would come to that person within the industry would be as big as anything that this industry has ever seen…”

Medeco has consistently denied there is any vulnerability in their locks against the techniques developed by the authors, either from forced or covert methods of entry. As of April 25, 2008, they have refused to make any public comment about the information in this book.

® Medeco and Biaxial are registered trademarks of Medeco Security Locks, Inc.

Locks, Safes, and Security: Second Edition

Marc Weber Tobias has authored the Second Edition of LOCKS, SAFES, AND SECURITY: An International Police Reference, published by Charles Thomas Publishers, Springfield, Illinois, United States. This first edition of this book was originally published in 1970, and was one of the original references about locks utilized by forensic laboratories and law enforcement agencies throughout the world.

The revised textbook contains forty chapters, with over 1400 pages of detailed information about locks and safes: their construction, design, and bypass, as well as an in-depth analysis of physical security.. There are over 550 illustrations, photographs, and diagrams to supplement the text, in extraordinary detail. The book may be ordered directly from the publisher.

An electronic infobase edition, LSS+ CD/ROM was released in July, 2002, and provides expanded text and graphics, and updates to the hardbound edition. The author has also re-written two famous treatises on locks and safes, originally published by Alfred C. Hobbs, and George Price during the 1850s. In addition, the famous manual “The Art of Manipulation” has been edited and included within LSS+. Version 5.0 of LSS+ was released in May, 2004. The latest version is G2, which was released in 2010. An update is scheduled to be released in 2020.

LOCKS, SAFES, and SECURITY provides the first in-depth treatise on the subject since 1856 when George Price wrote his famous treatise in England. This book has been written specifically for criminalists, investigators, security specialists, and government agencies involved in covert operations. The book contains forty chapters that examine the subjects of locks, safes, and security in detail. The theory of each locking mechanism is presented, as well as the latest bypass tools and techniques for locks and safes.

The hardbound edition is only available from the publisher, Charles C. Thomas.

Devil’s Dictionary of Security Terms: Roger G. Johnston

Roger Johnston was the head of the Vulnerability Assessment Team at two of the United States National Labs (Los Alamos and Argonne) for many years. He has a PhD in Physics and has written and lectured extensively on security.

Why go through your entire security, law enforcement, or intelligence career being confused? Here, at last, is an 850+ word dictionary to clarify all that confusing security jargon, by giving you the TRUE meaning of various terms, never mind what the experts think!  This book can be ordered from Amazon.

Vulnerability Assessment: The Missing Manual for the Missing Link: Roger Johnston

Security usually fails because vulnerabilities and attack scenarios were not envisioned. This is often the weak link in the chain of security. A Vulnerability Assessment (VA) can help to fix the problem, but VAs are often missing or else get confused with other kinds of assessments and security “testing” that are not VAs, and are not very good at finding vulnerabilities.

This book is the missing, comprehensive guide for how to actually do quality VAs and find security problems. Along the way, tips for better security are offered. The book is based on the author’s 30+ years of experience as a Vulnerability Assessor.Topics covered include the purpose of Vulnerability Assessments (VAs), what they are and what are they not, how and who should do them, brainstorming & creativity in VAs, the VA report, cognitive dissonance & intellectual humility, sham rigor in security, the fear of VAs, Security Culture, Security Theater, metrics and the Fallacy of Precision, Marginal Analysis, insider threat mitigation, security reasoning errors, attacks on security hardware, and miscellaneous security tips.

This book can be ordered from Amazon.

Security Sound Bites: Roger G. Johnston

This is the revised and expanded 2nd edition of a book that Security Magazine called “fascinating” and “full of thought triggers.” Security Sound Bites offers quotes, observations, and anecdotes about security that’ll make you think and make you laugh. We hear from the likes of Britney Spears and Albert Einstein, B movie dialog through ancient Greek dead guys, John Locke to Dan Quayle. 

This book can be ordered from Amazon.

Skype