This security vulnerability is an access control lock trick. The master key is AIR. We can say it stands for Anti Infra-Red, but it really is just air. Guess what, it can open card-key protected doors in many commercial buildings.
Security is important to any business or government organization. Even though an organization has taken all the security measures possible, corporate spies know how to bypass many of them.
The first line of defense for any secure building or office is the door. Many of these are controlled by card-key access controlled locks. Exiting is often automated using an IR or infrared door lock release sensor. Unfortunately, this is one of the security measures that is simple for spies to circumvent. All it takes is one blast of compressed air on the sensor – the door opens and they are in.
When it come to corporate espionage, many tricks are available for getting around your security measures. We can alert you to them. Our counterespionage survey can identify the weak spots in your organization’s physical and information security efforts and make recommendations to remediate them. Below is a video that illustrates one example of a weak spot you may not have been aware of. It is only one spy technique, we can make you aware of many more.
Plus… A Compilation of Physical Security’s 15 Greatest Hits
When it comes to corporate espionage many tricks are available for getting around your security measures. Here are 15 examples of lock bypasses that you may not have been aware of.
The following video demonstrates bypass techniques from physical security professionals Brent White at WeHackPeople.com, and Deviant Ollam, and Rob Pingor of RedTeam Alliance.
A good security consultant will make you aware of these and many other information security vulnerabilities.
Have a Question About TSCM?
If you have any questions about the TSCM services provided by Murray Associates, simply fill out the form below, or call us from a safe area and phone.
If you think you are under active electronic surveillance, or believe you have discovered a bug or covert video camera, go to our Emergency TSCM page. The procedural checklist there will tell you exactly what you need to do next.