More about locks and ways to low tech hack them

The availability of information regarding locks, keys, and bypass methods has changed enormously over the past 40 + years. Websites such as YouTube—and the Internet in general—have provided everyone with a lot more information about lock threats and vulnerabilities than was available just 10 years ago. Although such information abounds today, there is a dearth of information on countermeasures for these vulnerabilities. With that in mind, this chapter explores the risks, threats, vulnerabilities, and countermeasures people should consider when looking at the locks in their homes as well as at work. The chapter begins with a discussion of what types of locks are most popular and the various vulnerabilities they are exposed to. To drive home that point, the author explains how easy it can be to gain access to a room secured by a high security lock. Information on keys and key control concludes this chapter's contents.