tech-surveillance.com

tech-surveillance.comtech-surveillance.comtech-surveillance.com

tech-surveillance.com

tech-surveillance.comtech-surveillance.comtech-surveillance.com
  • Home
  • Physical Surveillance
  • Technical Surveillance
  • Training
  • Digital Photography
  • Covert Entry
  • Testimonials
  • Contact Us
  • More
    • Home
    • Physical Surveillance
    • Technical Surveillance
    • Training
    • Digital Photography
    • Covert Entry
    • Testimonials
    • Contact Us
  • Home
  • Physical Surveillance
  • Technical Surveillance
  • Training
  • Digital Photography
  • Covert Entry
  • Testimonials
  • Contact Us

Basic pin tumbler operation

methods of entry

COVERT METHODS OF ENTRY

This basic lock course in an intense entry level 40 plus hour POI of formal classroom instruction and structured practical exercises (PRACTEX) relating to the majority of key operated locks likely to be encountered by an officer or operator ordered to conduct or supervise a legally sanctioned surreptitious entry on behalf of his or her agency.  Upon successful completion of this course, each student will be able to identify and covertly neutralize through picking or other approved covert by-pass techniques, the majority of key operated locks which are used to secure interior and exterior doors, gates, padlocked containers, and other "things" where a key operated cylinder lock, mortise lock, or padlock is used to deny, or restrict access.

image364

BASIC LOCK ENTRY

This POI will consist of basic pin tumbler operations and the level of security in various door knobs, deadbolts and various padlocks susceptible to picking, raking or other bypass techniques. A close examination of the use of modified pins for added security.  Each student will receive a basic lock picking kit which will become theirs to keep.

image365

PIN TUMBLER FORENSICS

This will cover Pin Tumbler operations and the effects on the pins, plug and the cylinder by using the correct key as well as a close examination of the pin tumbler components being exploited by various picking techniques and the use of a bump key.

image366

KEY IMPRESSIONS

This will provide the ability to create a working key without having the original key.  Techniques such as the wiggling, tapping and/or pulling to mark the key identifying where individual cuts would be located.  Working from an impression, outline or tracing of the original key.  Hand filing a key from the code of the properly cut key.

image367

ADVANCED COVERT METHODS OF ENTRY

This is a 40 plus hour course which will provide the Technical Surveillance Specialist, officer, or operator who has successfully completed the basic CCE entry course, or possesses equivalent lock training, with expert skills in several new covert entry areas.  Emphasis is placed on refining and enhancing the student's key manufacturing abilities through various methods of key impressions in order to repeatedly gain entry by having a properly cut key, as well as learning how to neutralize locks and locking devices by using new lock picking and lock by-pass techniques and tools.  This level 2 course will be implemented and reinforced with several "real world" training exercises that will incorporate the actual planning and conduct of covert entries.

image368

tech-surveillance.com

Copyright © 2020 tech-surveillance.com - All Rights Reserved.

Powered by GoDaddy Website Builder