Fact-checked by Grok 2 weeks ago

Safe-cracking

Safe-cracking is the specialized process of opening a locked or without the proper or , typically by exploiting mechanical, electronic, or structural vulnerabilities in the device. This practice, which can be non-destructive—such as through precise of the lock —or destructive, involving tools like drills or thermal lances, is employed both by professional locksmiths to recover access for owners and by criminals in burglaries. The history of safe-cracking parallels the evolution of safe design, dating back to ancient civilizations' rudimentary locked containers and intensifying in the with the advent of advanced mechanical locks. Innovations like Jeremiah Chubb's detector lock in 1818 and Linus Yale Jr.'s pin tumbler cylinder lock in 1861 spurred countermeasures, including Alfred Charles Hobbs' famous 1851 public demonstration of picking supposedly unpickable Chubb and Bramah locks, highlighting the ongoing between security and intrusion techniques. By the , as companies such as Mosler and Diebold introduced drill-resistant alloys and time locks, crackers adapted with methods like explosives—used in early 1900s burglaries—and later electronic bypasses for digital safes, with recent 2025 discoveries of backdoors in electronic locks like the Securam ProLogic continuing the trend. Key techniques in safe-cracking vary by safe type and desired outcome, with non-destructive being the most skilled approach, relying on auditory cues from a or amplified listening device to detect wheel pack movements and deduce the combination through systematic dialing. Destructive methods, often faster but riskier, include or to disable locking bolts, prying or peeling the door with hydraulic tools, and, in extreme cases, using explosives or thermal cutting to breach the body—though modern relockers and hardened materials render these less viable without specialized knowledge. Legitimate safe-cracking emphasizes ethical standards, requiring certification from bodies like the Associated Locksmiths of America, while illicit attempts contribute to significant annual losses, as documented in reports on trends.

History

Early Developments

The of the first modern in the 1830s marked a significant advancement in security, prompting early criminal responses with rudimentary tools. In 1833, Charles Chubb patented a burglar-proof safe in , designed to resist common burglary implements through reinforced construction. Around the same time, in the United States, Silas C. Herring became an agent for Enos Wilder's "Salamander" designs in 1841 and began manufacturing fireproof safes by 1844 using hydrated plaster of Paris for insulation. These innovations, exhibited at events like the Exhibition, protected valuables from both theft and fire but quickly attracted opportunistic thieves who exploited their nascent vulnerabilities using basic hand tools. Nineteenth-century safe-cracking techniques were primarily destructive and relied on physical rather than sophisticated . prying involved using chisels and hammers to exploit seams or rivets on early safe , allowing to force entry without advanced equipment. Early drilling employed hand braces and bits to bore into lock mechanisms or weak points, though this was labor-intensive and often imprecise. For brute , was a common explosive method in , where criminals poured it through keyholes to create a that burst the door's front plate and exposed internal bolts; safemakers countered this with "powderproof" locks featuring tin enclosures to limit powder volume. These approaches, detailed in Allan Pinkerton's 1886 memoir Thirty Years a , highlighted the era's trial-and-error tactics against evolving designs. A prominent figure in this period was George Leonidas Leslie (1840–1878), widely regarded as America's most successful 19th-century safecracker, who elevated cracking from crude violence to calculated artistry using insider knowledge and rudimentary manipulation. Born in , to a brewing family and trained as an , Leslie relocated to in the , where he leveraged blueprints of bank layouts to identify structural weaknesses and practiced on duplicate safes purchased for rehearsal. He avoided , instead inventing tools like the "Little Joker"—a mechanical device for decoding combination locks—and collaborated with experts such as William D. Edson to drill precisely and manipulate tumblers on bank vaults, as seen in the 1869 Ocean National Bank yielding $800,000 and the planned 1878 Manhattan Savings Institution robbery netting $2.7 million. Leslie's methods, blending social infiltration with technical skill, influenced a shift toward in the trade before his murder in 1878. By the late 1800s, safe-cracking evolved from isolated opportunistic thefts to organized efforts by itinerant gangs known as "yeggmen," a term emerging around 1894 initially for beggars but soon denoting skilled safecrackers who traveled by rail targeting rural banks and post offices. Possibly derived from the alias "John Yegg," an early user of for "soup jobs," these groups formed loose unions emphasizing explosives and division of labor, as reported in accounts of coordinated burglaries. This organization reflected growing criminal sophistication amid industrial expansion. As the century closed, techniques began transitioning to more advanced mechanical locks in the early , demanding refined manipulation skills.

20th Century Innovations

The early saw the widespread adoption of combination locks on industrial safes, which prompted the development of manual manipulation techniques by skilled locksmiths who often turned to . These methods relied on auditory cues from a and tactile feedback from to detect gate alignment in the lock's wheels, allowing crackers to deduce the combination without damage. The 1920s and 1930s marked a "golden age" of safe-cracking, characterized by professionalization among criminals and the use of explosives like , known as "soup," for "soup jobs" that involved injecting the liquid through keyholes or seams to blow open doors. Notable figure , a prominent safecracker, employed —stolen from quarries and inserted via improvised devices like condoms with detonators—to target safes, successfully robbing around 40 in before his arrest in 1939. These techniques built on manual manipulation as a precursor to later decoding devices, though early prototypes of mechanical dialers remained rudimentary and labor-intensive. Following , safe-cracking evolved with the introduction of torches for cutting through doors, a method that gained popularity due to its speed on non-resistant safes and was used by organized groups in the late 1940s to mid-1960s. Hydraulic prying tools also emerged, enabling forceful separation of doors or panels on lighter models, often in tandem with drilling for access points. These approaches were epitomized by "Peter Men," slang for professional safecrackers specializing in explosives and cutting, who targeted wage safes in shops and offices during the , as seen in raids yielding thousands in cash across the and . Mid-20th-century innovations included safe bouncing, a brute-force using mallets or sledges to jolt lighter safes and dislodge internal bolts, particularly effective on models without reinforced relocking mechanisms and rising in use from the onward as a rapid alternative to explosives.

Modern Advances

In the early , the widespread adoption of locks in safes marked a significant from mechanical systems, driven by advancements in technology that offered programmable access and enhanced user convenience. By the , manufacturers increasingly integrated keypads and solenoid-based mechanisms into high-security safes, replacing traditional combination dials in many and residential models. This shift facilitated the development of specialized bypass tools, such as those targeting vulnerabilities in popular locks like the Securam ProLogic L02, which was demonstrated to be crackable through exploits in 2025 security research. Advanced autodialers continued to evolve for remaining mechanical Group II locks, incorporating precision motors and wireless controls to automate decoding processes. Devices like the JACK , designed for nondestructive opening of manipulation-resistant safes, exemplify this progress with their ability to handle most three- and four-wheel mechanisms efficiently. Similarly, the Combi QX3 autodialer, a high-speed for Group II locks, achieves an average opening time of under eight hours through optical encoders and operation, significantly reducing manual effort compared to earlier models. Non-invasive digital attacks have emerged as a challenge for safes, exploiting weaknesses without physical damage. For safes relying on solenoids, the "" technique leverages weak return springs to dislodge the locking pin by jarring the unit, allowing unauthorized access in seconds on lower-end models. New tools, such as the specialized device for Century SS series safes introduced in 2025, enable locksmiths to locks rapidly using simple electrical interfaces, highlighting ongoing vulnerabilities in solenoid-driven systems. The application of these modern techniques underscores a divide between legitimate professional use and criminal exploitation, governed by strict ethical codes in the industry. Organizations like the Associated Locksmiths of America (ALOA) emphasize , requiring members to adhere to legal standards that prohibit unauthorized access while promoting on secure practices. Meanwhile, safe-related burglaries, often involving electronic models, have declined amid broader trends; U.S. residential rates dropped 19% in the first half of 2025 compared to 2024, and overall property crimes fell 8% in 2024, though experts note that digital vulnerabilities continue to pose risks for theft.

Non-Destructive Techniques

Mechanical Lock Manipulation

Mechanical lock manipulation is a non-destructive technique used to open mechanical combination safe locks by exploiting manufacturing tolerances and mechanical feedback from the lock's internal components, such as the wheels, , and drive . This method relies on the manipulator's ability to detect subtle changes in resistance and sound as is turned under controlled tension, allowing the deduction of without physical alteration to the safe. Developed primarily in the early , it remains effective against many standard mechanical locks despite advancements in security design. The core process involves identifying "contact points" on the lock wheels, where the lever nose interacts with the wheel gates or the drive cam's notch, creating detectable tactile and auditory cues. To feel these points, the manipulator applies light to —typically by pulling gently on a tension tool or the spindle—while slowly rotating in (often left). This causes the to bind against the wheel edges, producing a slight drag or "click" when a contact occurs, indicating the position where a wheel's aligns partially with the . Readings are taken at regular intervals (e.g., every 2.5 or 5 numbers) to map these points, as the lock's tolerances (often 0.005 to 0.010 inches) allow the wheels to reveal their positions through these interactions. Once contact points are identified, the "graphing" method is employed to plot wheel positions and isolate the true combination numbers. This involves parking the wheels at known offsets (e.g., setting all wheels to 0, then incrementing one by -3 or +3 numbers) and recording contact point data on a graph, where the x-axis represents dial positions and the y-axis shows tension readings or click locations. Convergence of lines on the graph indicates the wheel centers, narrowing the possible combination to a small set of variations (e.g., ±2 numbers per wheel). The technique accounts for wheel pack dynamics, such as the third wheel's fly interfering with readings, requiring multiple graphing passes (e.g., all wheels left, then isolating each). Essential tools for mechanical include a manipulation dial (often customized with a finer index line for accuracy), a to amplify internal clicks and reduce external noise, and tension tools like a or applied to the for consistent pressure. These tools enhance sensitivity without modifying the lock, though skilled manipulators can succeed with the standard dial alone on simpler models. For a standard 3-wheel lock, such as the & Greenleaf 6730, the process begins by determining the contact area (typically around numbers 10-20 on ) through initial tests and counting to confirm three wheels (e.g., three distinct clicks when parking wheels opposite the contact area). Graphing proceeds with three passes: first, all wheels left from a parked position; second and third, isolating wheels by offsetting others. High-low tests follow, dialing permutations like 80 left, 80 left, 70 right to identify the lowest wheel, then testing 6-24 variations around graphed centers (e.g., 20-50-80) until the lock opens, often within 30-60 minutes for experts. In a 4-wheel lock, the steps mirror those for 3 wheels but require additional graphing passes to account for the extra , increasing the number of variations to test (up to 24-48). After confirming four clicks for wheel count, graphing isolates each sequentially, with applied to detect the added complexity from wheel spacing. The process may take 1-2 hours longer due to the higher count (around 100 million possible). Common errors in manipulation include over-tensioning , which can cause the to bind prematurely and create "false gates"—illusory contact points that mislead graphing and lead to incorrect combinations. Inexperienced manipulators may also misinterpret third-wheel fly interference as a true contact or fail to account for dial backlash, resulting in offset readings; these pitfalls emphasize the need for light, consistent tension and multiple verification passes. Automated alternatives, such as autodialers, can accelerate decoding by mechanically testing dial positions but lack the precision of manual manipulation for complex locks.

Combination Decoding Devices

Combination decoding devices, commonly known as autodialers, are automated tools designed to systematically test possible on dial-based safe locks, eliminating the need for tactile feedback during the decoding . These devices attach to the safe's dial and use motorized components to rotate it through programmed sequences, detecting alignment of internal wheels via sensors or feedback. By automating the trial-and-error inherent to combination locks, autodialers enable locksmiths or security professionals to open mechanical safes non-destructively, particularly those with 3- or 4-wheel mechanisms rated for Group II standards. Devices such as the Autodialer Pro and Combi Plus exemplify this technology, employing high-torque stepper motors to precisely control dial rotation and sensors—including accelerometers or encoder-based position trackers—to detect without human intervention. The stepper motors, often NEMA 17 models delivering up to 65 Ncm of , ensure micro-precision movements, while sensorless techniques like StallGuard™ motor changes to identify when wheels "pick up" or align at their gates. These systems build on principles of but automate the feedback loop, allowing the device to iterate through combinations autonomously once calibrated. Setup begins with securely attaching the device to the dial using a universal clamp, magnetic feet, or flexible coupler to ensure stable contact. Users then program parameters such as counts—typically 100 positions per for a standard 3- lock—via a connected , , or interface, defining the search space (e.g., up to combinations). Decoding algorithms, often based on , are initialized by measuring indent widths or contact points during initial rotations; this method subtracts known wheel pack tolerances to narrow potential gates, reducing brute-force attempts from millions to thousands. Knowledge of serves as a prerequisite for accurate of these contact points. Opening times vary by lock complexity and efficiency, averaging 1 to 8 hours for Group II locks like those from Sargent & Greenleaf (S&G). For instance, the Combi Plus achieves openings in about 1 to 1.5 hours on 3- or 4-wheel mechanisms by combining initial manipulation data with automated dialing, while simpler DIY autodialers using controls may take 40 minutes to 2.5 hours on low-security models with reduced sets. In worst-case scenarios without optimization, times can extend to days for high- locks. Despite their effectiveness on standard mechanical locks, autodialers have notable limitations, including ineffectiveness against time-delay mechanisms that enforce waiting periods between attempts or relock features that deploy additional bolts upon detecting repeated dialing patterns. Prolonged can also cause internal wear to the lock's wheel pack, potentially complicating future legitimate access.

Electronic Signal Exploitation

Electronic signal exploitation in safe-cracking involves the interception and analysis of unintended emissions from electronic safe components, such as keypads and processors, to bypass without physical alteration. These passive techniques leverage side-channel information—, acoustic vibrations, or induced electrical disturbances—to extract or override access codes, targeting vulnerabilities in electronic locks from manufacturers like Sargent & Greenleaf (S&G) and LaGard. High-security keypads on safes serve as primary targets for such exploits due to their reliance on digital processing that generates detectable signals. TEMPEST attacks, named after a U.S. government program to mitigate compromising emanations, capture unintentional electromagnetic emissions from electronic safe keypads or lock processors during code entry or validation. Attackers use (SDR) receivers, such as the , to intercept (RF) signals in the 100-500 MHz range emitted by the device's internal wiring and circuits, then apply to reconstruct the entered combination. For instance, keypresses on wired or wireless keypads produce distinct EM patterns corresponding to digit activation, allowing recovery of multi-digit codes from distances up to several meters with off-the-shelf equipment costing under $500. This method was demonstrated on keyboards in , revealing emissions that directly map to key identities, a principle extensible to safe keypads with similar architectures. Spiking techniques exploit electrical vulnerabilities in electronic locks by inducing controlled voltage s to trigger the mechanism, releasing the without entering a valid code. Tools like the Ionic Spike Kit from Taylor Security & Lock employ a small-diameter (3/32 inch) through the hole to access the lock's interior, followed by injection of conductive gel to bridge contacts and deliver a precise electrical from an adjustable . This bypasses the entirely, opening locks from brands including AMSEC, LaGard, and S&G in under a minute, and is particularly effective on battery-powered models where low-voltage allows the to mimic an authenticated signal. The kit's calibrated gels (A, B, C) and depth gauges ensure compatibility across dozens of models, reducing the need for invasive while leaving minimal traces. Acoustic analysis captures sounds or vibrations from keypresses and internal motors to deduce codes through . Microphones or contact sensors record the unique audio signatures—differing in frequency and amplitude—produced by depressing specific keys on electronic safe keypads, which can then be processed using software like or models for classification. For example, algorithms analyze motor noises during code validation to identify correct digits based on timing and intensity variations, achieving up to 90% accuracy on locks with repeated entries. This non-contact method was shown effective on door locks in 2017, where vibration signals from keypresses revealed PINs via transforms, directly applicable to safe keypads with comparable mechanical feedback. Early demonstrations of TEMPEST-like attacks on electronic devices, including locks, occurred around 2005, as detailed in security analyses of electromagnetic emanations from processors and input devices. Modern adaptations incorporate deep learning for enhanced signal reconstruction in noisy environments.

Digital Lock Bypass Methods

Digital lock bypass methods involve physical manipulation of the hardware components in keypad and electronic safe locks, such as solenoids, circuits, and memory interfaces, to override the locking mechanism without entering the correct code or intercepting external signals. These techniques target vulnerabilities in the mechanical and electrical design of the lock, often exploiting weak components in consumer-grade models. Unlike non-physical approaches like signal exploitation, which capture electromagnetic emissions remotely, bypass methods require direct access and specialized tools for precise intervention. One common technique is solenoid bouncing, where controlled impacts are applied to the safe to dislodge the pin that secures the bolt. In many low-cost safes, the solenoid uses a weak that can be jarred loose by tapping or dropping the safe while attempting to turn the handle, allowing the bolt to retract without code entry. This method is particularly effective on consumer digital safes with lightweight bolts and open solenoid designs, though higher-end models incorporate dampening to resist . Keypad shimming entails inserting thin, flexible tools behind or into the assembly to directly bridge electrical contacts or access reset mechanisms. For certain push-button digital locks, specialized shims can be slipped into the seam to short-circuit the solenoid release or bypass the code verification circuitry altogether, avoiding the need to interact with the buttons. This approach is viable on keypads with exposed or poorly sealed interfaces, enabling attackers to manipulate internal wiring or memory chips without disassembly. Recent advancements in bypass tools have targeted specific high-security models, such as those using Securam ProLogic locks. In 2025, security researchers demonstrated a hardware exploit involving battery removal followed by probe insertion into the lock's interface port; a custom Raspberry Pi-based device generates a reset code by exploiting backdoors, shorting circuits to unlock the safe in seconds. Similar probe-based tools apply to Century safe models, where insertion shorts key circuits after accessing the keypad's underbelly, bypassing encryption without full disassembly. These tools highlight ongoing vulnerabilities in even UL-rated electronic locks. Success in lock bypass often hinges on exploiting low states, as depleted power can weaken hold or prevent anti-tamper features from engaging fully. Attackers may induce drain through repeated invalid entries to reduce , then apply shimming or probing while the is compromised. Additionally, avoiding activation of anti-tamper relocks—spring-loaded devices that permanently secure the upon detected —is critical, as these can render the inoperable without professional intervention.

Destructive Techniques

Drilling and Inspection

Drilling represents a targeted semi-destructive approach in safe-cracking, enabling access to the lock's internal components for and precise manipulation without fully compromising the safe's structure. Locksmiths identify vulnerable points, such as the spindle hole or the wheel pack assembly in combination locks, to minimize damage while achieving entry. For instance, in standard mechanical safe locks, a 1/4-inch hole is commonly drilled above or to the side of to reach the wheel pack, allowing visibility of the wheels and fence mechanism. This location exploits the typical alignment of Group 2 combination locks, where the wheel pack sits offset from the dial center. The scoping process follows drilling, involving the insertion of a or fiber-optic camera through the newly created hole to examine the safe's internals. These devices provide a clear view of the wheel pack, levers, and boltwork, enabling the operator to align combination wheels or detect misalignments that prevent opening. , often flexible and equipped with illumination, are essential for navigating tight spaces within the lock case, typically penetrating 6 to 12 inches deep depending on the safe's design. Fiber-optic variants enhance detail in low-light conditions, facilitating non-destructive follow-up steps like manual wheel adjustment. Specialized tools are critical for overcoming protective features like hardplate relockers or carbide-relocker shields. Diamond-tipped or drill bits, ground with precise geometries, are employed to penetrate these hardened barriers efficiently, often requiring low-speed, high-torque to avoid bit breakage. Post-drilling, aids such as flexible levers or hooks can be introduced through the hole to engage and retract bolts or relockers. This technique contrasts with by preserving the safe's integrity for potential reuse. Repairing drilled safes focuses on sealing the access points to restore and appearance. Small holes from scoping or can be filled using tapered pins hammered into place and ground flush, or professionally with compatible filler material to match the safe's . While provides a durable , modern repair offer field-applicable alternatives like plugs for non-structural fixes, ensuring the safe meets original resistance ratings after refinishing. Such methods allow drilled safes to be returned to with minimal evidence of entry, underscoring the technique's preference over more invasive destructive approaches.

Brute Force Attacks

Brute force attacks on safes involve applying physical force to overcome locking mechanisms without the use of tools or techniques, often targeting vulnerabilities in the safe's . These methods, such as prying, , and bouncing, aim to dislodge bolts or deform components to allow access, but they typically result in visible damage to the safe itself. According to security expert Matt Blaze, the primary defense against such attacks relies on the safe's strength to resist prying, cutting, and , with low-end models particularly susceptible to hand tools. One common variation is safe bouncing, where repeated impacts from a rubber or similar are applied to the of lightweight electronic safes to jolt and dislodge the deadbolts. This exploits the in simpler locking systems, often requiring the attacker to simultaneously turn the while striking near the lock area. locksmiths note that bouncing can succeed on undersecured models but does not work consistently, as modern designs incorporate dampening materials like to inhibit the method. Prying and punching represent more aggressive approaches, using hydraulic jacks, crowbars, or sledges to exploit weaknesses in the hinge side or boltwork. Prying involves forcing the door or sides apart, effective on thinner constructions, while targets the door's rear to deform the lock assembly and retract bolts. These tactics were prevalent in mid-20th-century safe breaches before manufacturers introduced reinforced designs with and relockers that trigger additional bolts upon detecting force. Blaze highlights that punching can dislodge locks but is countered by such relockers, limiting its reliability on higher-rated safes. In contemporary contexts, remains viable against budget or lightweight safes weighing under 500 pounds, where construction prioritizes portability over robustness, allowing quicker deformation with basic tools. Locksmith resources indicate these methods are fastest for low-quality units but require minimal skill, contrasting with refined bypass techniques for variants. However, UL and GSA ratings demonstrate varying , with basic safes yielding in minutes to hand tools while advanced models withstand longer assaults. Significant risks accompany attacks, including irreparable damage to the and potential harm to contents from deformation or impact. Forced entry disregards repairability, often leaving obvious evidence like bent frames or shattered components, which can complicate covert operations and increase detection chances. Additionally, the noise and physical exertion involved heighten exposure risks for the attacker, as noted in analyses of safe breaches.

Advanced Destructive Methods

Advanced destructive methods in safe-cracking involve specialized tools and materials designed to rapidly and irreparably compromise integrity, often targeting , hinges, or boltwork for immediate access. These techniques surpass simpler approaches by leveraging high-heat or forces to ensure penetration, though they carry significant risks of activating features like relockers. As of 2025, their use has declined due to advanced designs with composite materials and blast-resistant features, as well as stricter regulations on s. Thermal cutting represents a primary advanced , utilizing intense sources to melt or vaporize components. Oxy-acetylene torches, which generate temperatures of approximately 6,000°F (3,300°C), can bore through standard doors but are limited against thicker plates or heat-sensitive relockers that may engage upon detecting . Plasma cutters offer superior efficiency, reaching 50,000°F to slice through up to 2 inches thick in minutes, though they require a stable power source and can inadvertently trigger protective mechanisms in high-security models. Thermic lances, burning at approximately 8,000°F via oxygen-fed iron rods, provide a faster alternative for piercing reinforced barriers, effectively handling dense materials but producing excessive noise and residue that complicates discreet operations. Explosive entry employs controlled to breach or heavy , with historical and occasional modern applications focusing on precise charge placement to minimize scatter while maximizing force. "," a term for nitroglycerin-based , was commonly poured into safe seams or keyholes in early 20th-century burglaries, exploiting pressure buildup to rupture . Modern adaptations include shaped charges, which direct energy via conical liners to penetrate specific points like hinges or locks, requiring calculations for standoff distance and charge mass to achieve clean breaches without excessive . These methods demand expertise in handling to avoid premature , and their use has declined due to advanced designs incorporating blast-resistant composites. Power tool attacks leverage portable, high-torque devices to grind, drill, or saw through vulnerabilities, enabling rapid entry in under 10 minutes for residential-grade safes. Angle grinders equipped with cutoff wheels effectively sever hinges or bolts on steel up to 1 inch thick, though they consume multiple abrasive discs on composite-filled walls. Cordless drills target lock mechanisms, using hardened bits to compromise dials or electronic interfaces, with professionals employing battery-powered models for mobility during 2024 operations. Battery-powered reciprocating saws (e.g., Sawzalls) excel at cutting thin-gauge steel frames (12-16 gauge), but falter against UL-rated Residential Security Containers (RSC) with 2-4 inch barriers, often requiring 30-60 minutes and frequent blade changes. These tools' cordless evolution has increased their prevalence in opportunistic burglaries, prioritizing speed over subtlety. Employing advanced destructive methods elevates safe-cracking to a serious , with penalties including up to 7 years in prison under statutes like 464 for or safe . The further intensifies consequences, imputing first-degree murder charges—and potential —if a occurs during the , regardless of intent, as seen in jurisdictions applying it to inherently dangerous burglaries. This legal framework, codified in most U.S. states, underscores the high rates associated with these techniques, often resulting in decades-long sentences.

Obsolete and Specialized Methods

Radiological Imaging

Radiological imaging techniques in safe-cracking utilize penetrating to non-destructively visualize internal mechanisms, particularly in combination locks, allowing attackers to identify positions and lever alignments without physical alteration. Portable backscatter X-ray systems, which detect scattered from the target, have been employed by skilled safe-crackers to reveal the configuration of packs, including openings that correspond to the combination numbers. These devices enable the of dense materials like metal components within safes, providing a clear view of alignments that would otherwise require or destruction to discern. Advanced implementations involve computed tomography (CT) scanning, where high-resolution systems generate 3D reconstructions of lock internals. For instance, industrial microfocus CT with a 240 kV tube and 102 μm resolution has been used to examine complex lever mechanisms in historical locks, identifying bolt positions, protective features, and even manufacturing defects like cracks without disassembly. Similarly, ultra-high resolution multi-slice CT (UHR-MSCT) and cone beam CT (CBCT) have demonstrated efficacy in decoding combination locks with up to 42,875 possible settings, achieving successful virtual "picking" by radiologists in under 16 minutes through detailed imaging of tumbler alignments, though metal artifacts can degrade image quality in highly dense structures. Such methods highlight the precision of radiological approaches for targeting wheel packs in safes. Thermal imaging, as a complementary non-ionizing radiological , detects infrared heat signatures from recent mechanical interactions, such as friction-generated warmth on dial contact points or spindle areas in combination safes, potentially revealing usage patterns or weak points for further attack. However, this application remains limited compared to methods for internal visualization. These were historically prominent in the mid-20th century, with standards like UL 768 Group 1R (established to require 20 man-hours of to radiological attacks) and GSA-approved containers reflecting their recognition as viable threats by government and industry from the onward. Limitations include significant radiation hazards to operators from portable emissions, necessitating shielding and monitoring to prevent exposure risks like tissue damage, as well as reduced through thick barriers exceeding several inches, where beam obscures fine details. By the , high costs, safety concerns, and the advent of less hazardous alternatives like scoping through minimal drill holes led to their decline in practical use.

Tunneling and Vault Attacks

Tunneling attacks on vaults involve excavating subterranean passages to the structure from below or adjacent underground access points, allowing robbers to avoid direct confrontation with surface . This method requires specialized tools such as pneumatic jackhammers, hydraulic jacks, drills, and blowtorches for excavation, along with wooden beams or stanchions for to prevent collapse during digging. systems, often consisting of narrow tubes connected to the surface, are essential to supply fresh air and remove dust in confined spaces. Early influences on such techniques can be traced to operations in the early , though detailed records from the remain sparse; by the mid-20th century, tunneling evolved into a hallmark of audacious heists inspired by logistical feats like the 1963 Great Train Robbery, which demonstrated coordinated underground movement of . Prominent historical cases occurred in Europe during the 1970s, showcasing the labor-intensive nature of these operations. In the 1971 Baker Street robbery in London, a gang dug a 40-foot tunnel over several months from the basement of a rented leather goods shop to the Lloyds Bank vault, using a 100-tonne jack, gelignite explosives, and a thermal lance to breach the reinforced concrete floor after initial tools failed; the operation spanned weekends to minimize detection, with robbers communicating via walkie-talkies. Similarly, the 1976 Société Générale heist in Nice, France, involved a gang tunneling nearly 30 feet from a nearby sewer over two months of nightly work, employing jackhammers, axes, crowbars, chisels, hydraulic jacks, and six blowtorches powered by 27 acetylene tanks; the tunnel was shored with stanchions, lined with carpeting for traction, and ventilated via a six-inch tube, enabling the theft of approximately $10 million in cash, gold, and jewels from 317 safe-deposit boxes. These cases highlight the use of urban infrastructure like sewers or adjacent buildings as starting points, with digging often limited to non-business hours and supported by generators for lighting. In the United States, tunneling persisted into the late 1980s but has become rare thereafter due to advancements in vault construction. The 1987 burglary at a Bank of America branch near Beverly Hills saw robbers excavate a 60-foot tunnel from a storm drain using cutting tools and a generator, shoring it with wood planks to reach the vault floor undetected over a single weekend, stealing $91,000 before alarms activated; this was part of a series by the "Hole in the Ground Gang," who targeted multiple Los Angeles banks in the mid-1980s with similar subterranean approaches. More recent isolated U.S. incidents include a 2025 tunneling heist in Marietta, Georgia, where three men dug under a busy street to breach a bank vault floor, and an April 2025 burglary in Los Angeles where thieves tunneled into a jewelry store's safes, stealing $10 million in gold and jewels. Globally, notable later cases include the 2006 Banco Río robbery in Buenos Aires, Argentina, where robbers tunneled from sewers into the vault and held hostages for over a week, and a 2019 attempted tunneling from an adjacent property into a credit union in Hendon, Saskatchewan, Canada. Modern bank vaults feature deep concrete foundations reinforced with steel and high-strength materials to deter undermining, often extending several feet below ground level to complicate excavation. Additionally, seismic sensors buried around perimeters detect ground vibrations from drilling or digging, alerting authorities to potential intrusions well before a breach occurs. Tunneling carries significant risks, including structural collapse if shoring fails under unstable soil or water ingress, which could trap or injure perpetrators, as seen in general underground operations where cave-ins have caused fatalities. Detection via ground vibrations from tools like jackhammers often leads to early intervention, as these disturbances propagate through soil and trigger perimeter alarms; in historical cases, such as , auxiliary risks like toxic fumes from explosives further endangered the crew during prolonged confinement. These hazards, combined with the weeks or months required for digging, have relegated tunneling to rare, high-risk endeavors in contemporary security contexts.

Magnetic and Other Risks

In electronic safe locks that employ solenoids to control the locking mechanism, strong magnets can be used to bypass the system by attracting the solenoid plunger, thereby retracting the bolt without entering the correct combination. This vulnerability arises because the solenoid's , when powered, generates a to hold the lock secure, but an external can overpower or mimic this field to disengage the mechanism. Such attacks have been demonstrated on models like early safes and certain hotel safes, where the magnet is placed near the lock body to influence the internal components. Reed switches, sometimes integrated into safe designs for detecting door status or as part of tamper sensors, present another magnetic risk; these glass-enclosed contacts close or open in response to a , but a strong external can trigger them remotely, potentially disabling alarms or simulating a closed state to avoid detection. This bypass exploits the switch's sensitivity to , allowing unauthorized access without physical alteration, though it requires precise positioning of the magnet. The technique is particularly effective against older or budget electronic safes lacking robust protection. These magnetic methods are limited in effectiveness to specific lock designs vulnerable to field interference, such as those relying on solenoids or unshielded reed switches, and fail against mechanical or advanced electronic systems without such components. Countermeasures include encasing sensitive parts in alloys, which redirect due to their high permeability, preventing external magnets from influencing the internals. Additionally, modern safe locks have largely phased out solenoids in favor of motor-driven gears and non-magnetic actuators since the early , rendering magnetic attacks obsolete for contemporary high-security models.

Cultural and Historical Impact

Media Portrayals

Safe-cracking has long been a staple in cinematic depictions, often serving as a tense climax in narratives where skilled criminals manipulate locks with stethoscopes or explosives for dramatic effect. Early films like the 1915 silent drama Alias Jimmy Valentine portrayed safecracking as a reformed criminal's lingering temptation, showing a using his expertise to open a undetected, emphasizing the allure of the skill over brute force. In the 1970s, movies glamorized destructive methods such as "soup jobs," where is used to blow open safes; (1978), inspired by a real 1950 robbery, dramatizes a crew meticulously preparing and applying the volatile explosive to crack a , highlighting the high-stakes coordination involved. Modern media continues this tradition but shifts toward technological aids. In the TV series White Collar (2009–2014), the character frequently demonstrates safe-cracking in episodes like "Most Wanted" (2012), using mirrors, paintings, and quick manipulation to access combination locks during cons, portraying it as an elegant, intellectual pursuit. Video games in 2024 have incorporated simulated autodialers, devices that systematically test combinations; for instance, Unlock-it: Safe Cracker Puzzle, released that year, challenges players to time inputs and solve puzzles mimicking real autodialer mechanics in a heist-themed format. These portrayals often exaggerate for entertainment, overemphasizing speed and simplicity while ignoring practical realities. Films and shows typically depict cracks in under 30 seconds using just ears or basic tools, whereas professionals note that can take hours and requires specialized like tension tools or decoders, with failures common due to wear or features. Moreover, media rarely shows post-crack repairs, such as realigning tumblers, which can be as complex as the entry itself, leading viewers to underestimate the trade's precision. Such dramatizations have shaped public perception, romanticizing safe-cracking as a glamorous "criminal art" akin to a high-society , influencing views of as inherently shady despite its legitimate applications in and . This cultural lens, seen in expert critiques of movies like and , perpetuates myths that blur ethical lines between theft and craftsmanship.

Famous Safe Crackers and Cases

George Leonidas Leslie, an architect turned criminal in the 1870s, became one of America's most notorious safecrackers through a series of sophisticated heists in . Operating primarily between 1872 and 1878, Leslie masterminded robberies totaling over $2 million (equivalent to tens of millions today), employing safe manipulation techniques with a custom tool known as the "little joker" and tunneling methods to access vaults without detection. Notable among his crimes was the 1878 Savings Institution heist, where his gang stole $3 million in cash, bonds, and securities after Leslie practiced opening the safe multiple times undetected. Leslie evaded capture for years by leveraging his social connections in , but he was murdered in 1878 by associates amid suspicions of betrayal. Eddie Chapman, born in 1914, emerged as a prominent safecracker in before his criminal career intersected with . Specializing in explosives to breach safes during numerous robberies, Chapman was arrested in 1939 but escaped from prison and offered his services to upon reaching the in 1941. Recruited as a spy codenamed "Fritzchen," he was trained in sabotage techniques, including safe-cracking with explosives, ostensibly to target Allied facilities and access funds, but he instead became a for , providing false intelligence that misled the Germans. Chapman's wartime activities, which included simulated bombings and safe breaches to maintain his cover, earned him the from the Nazis while he remained loyal to ; he retired from crime postwar and died in 1997. In contemporary times, Bill Johnson, known as BosnianBill, has gained recognition as a professional locksmith and educator who demonstrates advanced safe manipulation techniques without any criminal history. Through his LockLab platform and YouTube channel, launched in the 2010s, Johnson has produced educational content on methods such as impressioning (often referred to in lockpicking communities as "bitchpicking" for its finesse) and autodialing for electronic safe locks, training thousands in ethical lock manipulation for locksmith certification and security awareness. A Bosnian immigrant to the U.S., Johnson's work emphasizes non-destructive entry and has been praised for demystifying safe security without promoting illegal activity; he maintains a legacy in the locksport community. Among landmark safe-cracking cases, the 1983 in stands out for its scale and use of destructive tools. Six armed intruders, tipped off by an insider, breached the warehouse vault using thermal lances—oxygen-fueled cutting devices that melted through reinforced steel—stealing approximately 6,840 gold bars worth £26 million (about $100 million at the time), along with diamonds and cash. The , initially planned for cash, escalated dramatically upon discovering the gold, leading to convictions of key participants like Anthony Robinson and Mickey McAvoy, though much of the loot remains unrecovered and linked to subsequent . Recent advancements in safe vulnerabilities have highlighted modern risks in corporate settings, as demonstrated in research from 2023 onward. Researchers identified exploitable backdoors in the Securam ProLogic system, used in across eight major brands for securing corporate assets like documents and valuables, allowing unauthorized access in seconds via simple hardware tools without physical damage. While no large-scale corporate thefts were publicly tied to these flaws in 2023, the disclosures prompted warnings from manufacturers and led to patches, underscoring the shift from to safe-cracking threats in environments.

References

  1. [1]
    What is Safe Picking ?| Safe Cracking | Safe Opening | KC Security
    Safe cracking is the process of gaining access to a safe or vault by bypassing its security mechanisms using specialist tools & methods.
  2. [2]
    How Safecracking Works - Home and Garden - HowStuffWorks
    The most popular method of safecracking is to simply steal the entire safe and move it to a location where the safecracker has the time and tools to take the ...Missing: history | Show results with:history
  3. [3]
    The Fascinating History of Safe-Cracking: Mechanisms vs ...
    Feb 15, 2024 · Safe-cracking is the art of unlocking a safe without the combination or key, often associated with burglars and thieves. However, this skill is ...Missing: definition | Show results with:definition
  4. [4]
    Techniques of Safe and Vault Manipulation - Desert Publications
    Mar 28, 2023 · Movies and TV have created many false ideas about safe manipulation. Manipulation is strictly a mechanical procedure. The technique outlined ...
  5. [5]
    SAFE BURGLARY - TRAINING KEY - Office of Justice Programs
    SEVERAL METHODS OF SAFECRACKING USING FORCE ARE DESCRIBED, INCLUDING PUNCH ATTACK, PEEL OR RIP ATTACK, CHOP ATTACK, DRILL ATTACK, TORCH ATTACK, AND CARRY-OFF.Missing: techniques | Show results with:techniques
  6. [6]
    Safes - Early Office Museum
    In fact, none of the safes marketed through the 1830s provided reliable protection against the heat of intense fires.Missing: modern | Show results with:modern
  7. [7]
    The Story of Inventing the Fireproof Safe: From Ashes to Innovation
    Feb 19, 2024 · In this post, we'll explore the evolution of the fireproof safe, tracing its journey from simple iron chests to the advanced designs of today.Missing: invention | Show results with:invention
  8. [8]
    timhunkin/illegal engineering
    An illustrated lecture about the history of Safes and Safe breaking. The lecture is based round a large wooden safe with a video camera inside.Missing: definition | Show results with:definition
  9. [9]
    How to open a 19th century safe - Lock Picking 101
    May 27, 2014 · I'm trying to find information on late 19th century safe-cracking techniques using lock-picking (not explosives although information on that ...Missing: prying | Show results with:prying
  10. [10]
    George Leonidas Leslie, bank robber: How a Civil War “coward” got ...
    Dec 28, 2023 · His father was a brewer in Toledo, Ohio. And while little is known of George Leslie's early life, it's safe to say that he grew up wanting ...Missing: sources | Show results with:sources
  11. [11]
    Scrambled yeggs? - The Grammarphobia Blog
    Jan 24, 2020 · It's uncertain how “yegg” and “yeggman” soon came to mean a burglar or a safecracker. The most common suggestion is that the criminal use ...Missing: history | Show results with:history
  12. [12]
    A Bank Burglars' Union; Story of the "Yeggmen" and Their Expert ...
    "While a band of Yeggmen' was breaking open a safe in Virginia last Spring the citizens of the town, awakened by the explosions, formed themselves into a posse ...Missing: 1800s | Show results with:1800s
  13. [13]
    The History Behind the Mystery: Safecracking 101
    There are multiple ways to go about it, from drilling into the safe's door to using force to pry or “bounce” open safe doors to the use of explosives. The most ...Missing: techniques | Show results with:techniques
  14. [14]
    [PDF] 1920s Slang - Smoky Hill Museum
    • Soup: Nitroglycerine. • Soup job: To crack a safe using nitroglycerine. • Spill: Talk, inform; spill it = tell me. • Spinach: Money. • Spitting: Talking.
  15. [15]
    Muncie's Nitroglycerin Safecrackers of 1905
    Mar 3, 2025 · Early in the 1900s, thieves began stealing small quantities of nitroglycerin from company magazines to blow safes. The bandits, dubbed in the ...<|separator|>
  16. [16]
    Keeping Money From 'Peter Men:' A Look At Safecracking in the 1950s
    The Peter Man was another name for a safe cracker, a man who could handle safe's, and back in the 1950s, the most popular ways for thieves to open saves was to ...
  17. [17]
    It's a Cracker! - Standing Well Back
    Jul 13, 2015 · In the mid 19th century, safe manufacturers became worried about the explosive technique of inserting blackpowder into the lock of a safe and ...Missing: methods sources
  18. [18]
    Safe man - history of safes and safe cracking - Make Magazine
    Oct 2, 2006 · This is a condensed history of the British safe, the development of which came about mainly as the safemaker's response to the Victorian cracksmen.Missing: innovations | Show results with:innovations
  19. [19]
    The History of Lock Mechanisms in Safes: A Journey Through Time
    Jan 31, 2024 · Lock mechanisms in safes have evolved from simple mechanical designs to advanced digital and biometric systems. Significant innovations like ...
  20. [20]
    The Evolution of Safe Locks - Safes International Scotland
    By the late 20th century, electronic locks revolutionized safe security by integrating digital keypads and programmable access codes. These locks used ...
  21. [21]
    Hackers Went Looking for a Backdoor in High-Security Safes—and ...
    Aug 8, 2025 · Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics— ...Missing: modern 2000s
  22. [22]
    JACK Plus Autodialer - The Modern Locksmith
    Autodialers JACK are advanced autodialers that can open most mechanical combination safe locks, including most locks with protection against manipulation. Model ...
  23. [23]
    Combi QX3 Autodialer | QSecurity Products
    In stock Free deliveryCombi QX3 is a high speed, wirelessly – controlled safe lock dialer for opening Group 2 mechanical combination locks. 8 Hour Average Opening TimeMissing: AI | Show results with:AI
  24. [24]
    How to Open a Safe Without a Key - ACME Locksmith
    May 29, 2024 · Because cheap safes have solenoids with weak springs, you can often bounce the pin up and down so that it no longer holds the bolt work. This ...
  25. [25]
    A New Era in Safe Opening | Mr. Locksmith™ - YouTube
    Sep 1, 2025 · I'm going to show you how to open up the newer SS series Century electronic safes with a new tool that we've just put out.Missing: SS | Show results with:SS
  26. [26]
    About ALOA - ALOA.org
    ALOA is dedicated to furthering the industry through education, leadership and promoting professionalism and ethics for security professionals worldwide.Missing: cracking | Show results with:cracking
  27. [27]
    Crime Trends in U.S. Cities: Mid-Year 2025 Update
    Jul 23, 2025 · The number of cities reporting crime data ranged from a high of 36 for larceny and motor vehicle theft to a low of nine for carjacking and ...
  28. [28]
    2025 Crime Rates in U.S. Cities Report - SafeHome.org
    Oct 1, 2025 · Property crime declined 8%, with motor vehicle theft down nearly 20% after several years of increases. Memphis ranked among the top large cities ...
  29. [29]
    Lock Manipulation | HowStuffWorks - Home and Garden
    Lock Manipulation - Lock manipulation represents safecracking in its purest form. Go through each step of lock manipulation with lock manipulation diagrams ...Missing: 1900s | Show results with:1900s
  30. [30]
    [PDF] Safe lock manipulation 101
    Feb 15, 2024 · Dial four times left and stop at 0. – Dial back to 15 and note the contact point. – Dial left to 2.5. – Dial back to 15 and take a reading.Missing: techniques method
  31. [31]
    [PDF] COMBINATION LOCK MANIPULATION
    • Contact points & taking readings. • Working with graph & true center graphs. • Third wheel fly interference. • Manipulation of a variety of combination locks.
  32. [32]
    Lockmasters. Combi Plus Group II Combination Lock Manipulator ...
    The Combi + is a tablet-based Group II lock manipulator for opening 3- and 4-wheel safe locks. The average opening time is approximately 1 to 1 ½ hours.Missing: AI | Show results with:AI
  33. [33]
    Building a Safe Cracking Robot - SparkFun Learn
    The SparkFun Safe Cracker is designed to open very low security combination fire safes. There are high-end, secure, expensive combination safes available.
  34. [34]
    The Intelligent Safe Cracking Autodialer
    €2,199.00The Autodialer Pro is an autonomous safe cracker that combines high-torque power with intelligent, sensorless StallGuard™ detection. Engineered in Germany for ...Missing: Plus | Show results with:Plus<|separator|>
  35. [35]
    Opening A Safe With A Stepper Motor And DIY Auto-Dialer - Hackaday
    Jan 29, 2023 · The main dial on a safe lock turns a pack of 3-4 wheels. Each wheel has one deep notch cut into its side. When all the slots are aligned by ...<|control11|><|separator|>
  36. [36]
    Forgot your safe combination? This Arduino-controlled autodialer ...
    Apr 1, 2025 · This is a device, controlled by an Arduino UNO Rev3, that can attach to a traditional safe that has a dial combination lock and perform a brute-force procedure.<|control11|><|separator|>
  37. [37]
    [PDF] Compromising Electromagnetic Emanations of Wired and Wireless ...
    Since they contain elec- tronic components, keyboards eventually emit electro- magnetic waves. These emanations could reveal sensi- tive information such as ...
  38. [38]
    Spying on Keyboard Presses with a Software Defined Radio
    Jan 31, 2015 · Milos used this fact to create a program that can detect the RF emissions from the target laptop, and show the key presses made from the target ...
  39. [39]
    IONIC Spike Kit - Taylor Technologies Safe Tools
    E-LOCK TOOLS · LIGHT SOURCES · BORESCOPE ACCESSORIES · MANIPULATION AIDS · SAFE PUNCHES · SAFE REPAIR · REFERENCES · SAFE DRILLING · SAFE DEPOSIT LOCKS.
  40. [40]
  41. [41]
    [PDF] TEMPEST And Electromagnetic Emanations Security
    Jan 27, 2005 · © SANS Institute 2005 ... EMSEC professionals are worried about electromagnetic emanations from all electronic devices and electronic surveillance ...
  42. [42]
  43. [43]
  44. [44]
    Safecracking: Open a Safe with Drained Internal Batteries
    May 28, 2022 · The procedure is simple: We'll break through the LED digits, fish out the locking motor wires, power them, and open the safe. Only try this with a safe you own.
  45. [45]
    Fireproof, Waterproof, Tamper-Proof: What to Look for in a Safe Locker
    Jul 11, 2025 · Relocking devices that trigger if someone tampers with the lock; Advanced locking systems, including biometric scanners, digital keypads, or ...
  46. [46]
  47. [47]
    I have a major floor safe and need to figure out the combo
    Jun 26, 2011 · Approximately 80% of homeowners do not change the combination from the original. ... What's going on with your Major floor safe? Need help finding ...Missing: rate | Show results with:rate
  48. [48]
    Safe Manipulation - Cracking a Safe | HowStuffWorks
    Safecrackers use drilling methods like drilling into the lock face, side drilling, or rear drilling to manipulate safes. They also use borescopes to view the ...
  49. [49]
    Different Types of Methods Safe Locksmiths Use - Toronto Safecracker
    Discover the art of safe cracking with our detailed guide, 'Safe Cracking 101'. Explore various professional techniques used by locksmiths to open safes, ...
  50. [50]
    Safe Cracking Methods | Opening a Safe Without a Combination
    The idea is to place a tiny hole that would allow the safe to be opened through the use of a precision instrument though the hole, or so that the hole can be ...Missing: definition | Show results with:definition
  51. [51]
    Lockmasters. 1/2" x 6" StrongArm Drill Bit for Safe Hardplate
    StrongArm drill bit's are designed for drilling safe hardplates. They are made with Titanium Tungsten Carbide tips, diamond ground with unique tip geometry.
  52. [52]
    Lockmasters. Ultimate Safe Repair Kit; LKMRK1
    The Ultimate Safe Repair Kit includes everything you need to quickly and permanently repair a drilled safe in the field without welding.
  53. [53]
    [PDF] Safecracking for the computer scientist - Matt Blaze
    Dec 21, 2004 · The primary defense against brute force is brute strength: heavy and/or hardened materials that resist prying, cutting, and bending.
  54. [54]
    Can Burglars Break into a Safe? - Metro Lock and Safe
    Nov 21, 2023 · Second, they could use a method called 'safe bouncing.' Here, they'd strike the safe while turning the dial, hoping it'll open. A heavier ...Understanding The Basics Of... · Burglary Techniques: How... · Top Tips To Improve Your...
  55. [55]
    Safes 101: An Introduction to Safe Opening | Locksmith Ledger
    Doing your due diligence ahead of time is as important as the techniques you use while on the job.
  56. [56]
    Unlocking Safes: Professional Tips for Access Without Damage
    Jan 17, 2024 · Access without damage! Explore professional tips for unlocking safes. Master the art of safe opening with expert stress-free experience.
  57. [57]
    Methods and Tools for Safecracking | Prestige Locksmith
    Feb 22, 2017 · A safe cracking expert uses various safecracking tools such as torches, saws and drills. With the help of torches, the locksmith can look into the interior ...Manipulating Locks · Autodialers · Drilling The Weak Points Of...
  58. [58]
    How to Break Open a Safe - 7 Effective Methods
    Oct 8, 2024 · Safe manipulation involves listening for subtle changes in the lock's mechanism as you turn the dial. Professionals use stethoscopes or other ...
  59. [59]
    How Locksmiths Open Safes Without Damage
    Oct 21, 2025 · It is a calculated process designed to bypass the lock while minimizing damage to the safe's body and, most importantly, protecting the contents ...
  60. [60]
    Modern Safe Cracking Tools
    ### Summary of Thermal Cutting Methods for Safe Cracking
  61. [61]
  62. [62]
    Dynamite - Greatest Inventions - Edinformatics
    Dynamite has been used in armed conflicts. On occasion, criminals interested in safe-cracking have deliberately extracted nitroglycerin from dynamite by boiling ...
  63. [63]
    Shaped Charges: Harnessing Precision in Explosive Technology
    Jan 20, 2025 · A shaped charge is a carefully engineered explosive device that focuses its energy in a specific direction – think of it as a laser beam of explosive force.
  64. [64]
    Understanding Power Tool Safe Cracking - Antique Sage
    Aug 7, 2017 · One of the most common methods of power tool safe cracking employs the cordless drill. Almost all drill attacks are conducted against the ...
  65. [65]
    Safe Cracking | 1911Forum
    Sep 20, 2024 · Based on the video and marks on the safe, they had a battery operated angle grinder and tried a few different methods, for 10-15 minutes.
  66. [66]
    Burglary of a Safe or Vault - California Criminal Lawyer Group
    If you fit the suspect's description, they will not hesitate to apprehend you for safe burglary, a felony offense. In other cases, they investigate the ...
  67. [67]
    The Felony Murder Rule in Criminal Law - Justia
    Oct 16, 2025 · In most states, felony murder is categorized as a first-degree murder and can result in sentencing from several years to a life imprisonment.
  68. [68]
    felony murder rule | Wex | US Law | LII / Legal Information Institute
    The felony murder rule is a law in most states and under federal law that allows anyone who is accused of committing a violent felony to be charged with murder.
  69. [69]
    Safecracking with Thermal Imaging - Schneier on Security -
    Nov 28, 2005 · For example, the fact is that some real safe crackers really do use portable backscatter X-ray machines to attack combination locks, and ...
  70. [70]
    Non-destructive lock-picking of a historical treasure chest by means ...
    Jul 6, 2020 · The technique is based on a sample scanning using the trans-illuminative X-ray radiation [2], and a 3D model can be obtained as a result [3].Missing: manipulation | Show results with:manipulation
  71. [71]
    Lockpicking using Ultra-High Resolution Multi- Slice and Cone ...
    The median lockpicking time required by radiologist 1 was 10 minutes (Range: 7-15 minutes), and by radiologist 2 was 11 minutes (Range: 6-16 minutes). (4) ...
  72. [72]
    [PDF] High security locking devices: A state-of-the-art report - GovInfo
    WHEEL, X-RAY PROOF -. In a combination lock, the outer area of the wheel, where the gateway is located, is made of Nylon, Lexan or Deiron to prevent X-ray ...
  73. [73]
    Radiation Safety Considerations for X-Ray Equipment Designed for ...
    Sep 18, 2015 · This guidance briefly discusses the hazards unique to hand-held medical x-ray equipment, clarifies applicable requirements, and makes recommendations for safe ...
  74. [74]
    How to Rob a Bank: 7 Major Heists from History - ASIS International
    Sep 16, 2024 · Once tunneled in, the group used explosives to breach an exterior wall of the bank's vault, hiding inside until after police left the scene upon ...<|separator|>
  75. [75]
    Drama, farce, a radio ham and the Baker Street bank heist - BBC
    Nov 16, 2024 · The tunnel started inside the SAC shop and ran underground to the bank. The heist was the inspiration for a 2008 film, The Bank Job. It ...
  76. [76]
    The heist of the century - The New York Times
    Dec 19, 1976 · article on July '76 $10-million robbery of Nice, France, branch by robbers who tunneled themselves into vault via sewer system; illus (L)
  77. [77]
    Burglars Dig Tunnel Into L.A. Bank, Take $91,000 - Los Angeles Times
    Aug 24, 1987 · Burglars made off with $91,000 in cash from a Bank of America branch near Beverly Hills over the weekend after tunneling underground from a ...
  78. [78]
    Boring thieves had tunnel visions - Los Angeles Times
    Dec 27, 2009 · Authorities called the burglary crew the Hole in the Ground Gang. In the mid-1980s, the thieves tunneled under three L.A.-area banks, ...<|separator|>
  79. [79]
    How are bank vaults constructed to prevent break-ins? - Quora
    Jun 17, 2014 · 1) The outer vault "skin" is constructed of conventional mild steel; this is designed to counter the threat of blunt force and prying.
  80. [80]
    Seismic Intrusion Detection - Security Pro USA
    Seismic Intrusion Detection uses seismic sensors installed just below the ground to create an invisible perimeter fence around a secure area.
  81. [81]
    Risk assessment approach for tunnel collapse based on improved ...
    Aug 6, 2025 · Tunnel collapses are common hazards in construction, and they significantly constraint construction progress and safety.Missing: detection | Show results with:detection
  82. [82]
    Safety in Tunnelling: Challenges and Hazards During Construction
    Aug 19, 2024 · A significant risk generated during the operation is the probability of groundfalls and cave-ins. Inherent advanced support systems, unstable ...
  83. [83]
    A new attack on electronic locks: The magnetic ring - Toool's Blackbag
    Jun 16, 2008 · A magnetic ring that is used to open some model of Uhlmann & Zacher lock. By now it is confirmed by the company itself the trick works.Missing: 2005 | Show results with:2005
  84. [84]
    Unsafe Safes - Schneier on Security -
    Aug 3, 2012 · Old safes have their problems mainly because advances in cutting and abrading technology has made them vulnerable. However the design of the ...
  85. [85]
    A Novel Cost‐Efficient Design for Electromagnetic Shielding in IoT ...
    May 7, 2025 · In this paper, we present a modelling approach for the magnetic shielding of a smart lock enclosure and evaluate its shielding effectiveness (SE).
  86. [86]
    Alias Jimmy Valentine (1915) A Silent Film Review
    Aug 18, 2013 · Jimmy Valentine, a safecracker, tries to live honestly after prison, but his old nemesis, a detective, seeks to re-arrest him for an old charge.Missing: classic | Show results with:classic
  87. [87]
    Unlock-it: Safe Cracker Puzzle - App Store - Apple
    Dec 3, 2024 · THREE THRILLING GAME MODES: Arcade - Perfect your safe-cracking skills through increasingly challenging levels Time Attack - Race against the ...
  88. [88]
    Safecracker Rates Safecracking Heists for Realism in Pop Culture
    Aug 9, 2021 · Safe technician Charlie Santore looks at 10 safecracking scenes from popular TV shows and movies and rates them based on realism.Missing: depictions | Show results with:depictions<|control11|><|separator|>
  89. [89]
    Pro Safecracker Fact Checks Safecracking in Movies - Vanity Fair
    Jan 24, 2022 · Professional safecracker Dave McOmie fact checks safecracking scenes from movies and television including 'Army of Thieves,' 'The Italian ...Missing: cultural | Show results with:cultural
  90. [90]
    Separating Hollywood Myths from Real-Life Locksmithing Techniques
    Oct 16, 2023 · Real-life locksmithing techniques require training, practice, and an in-depth understanding of advanced locking mechanisms.
  91. [91]
    A Professional Safecracker Reveals His Craft - The Atlantic
    Dec 13, 2018 · Charlie Santore sees Los Angeles from the inside, by breaking into safes whose owners can no longer unlock them.
  92. [92]
    The architect who became the king of bank robberies - The Hustle
    Ocean National Bank ...Missing: 19th century
  93. [93]
    The Northampton National Bank Heist, the Biggest in U.S. History
    His name was George Leslie, a dapper young architect who moved in New York's high society. ... The bank hired Herring Safe Co. to install the new lock.Missing: 1870s | Show results with:1870s
  94. [94]
    Eddie Chapman, The British Double Agent Who Duped The Nazis
    Feb 9, 2021 · Edward Arnold Chapman was a professional criminal, an expert safecracker, and one of Britain's most valuable double agents in the Second World War.Missing: nitroglycerin soup
  95. [95]
    Eddie Chapman, 83, Safecracker and Spy - The New York Times
    Dec 20, 1997 · Eddie Chapman, a notorious British safecracker who hoodwinked German intelligence in World War II -- winning the Nazis' Iron Cross for bravery while serving as ...Missing: nitroglycerin soup
  96. [96]
    Learn Safecracking Archives - BosnianBill's LockLab
    Tag "Learn Safecracking". (1610) Review: Sparrows Vault Training Safe – BosnianBill's LockLab · High Security And Challenge Locks · (1610) Review: Sparrows ...
  97. [97]
    The 'fast and ruthless' $46M Brink's-Mat gold robbery of 1983 | CBC
    Nov 26, 2024 · The 'fast and ruthless' $46M Brink's-Mat gold robbery of 1983 · High-profile heist saw armed men steal a pile of gold bricks 'about the size of a ...
  98. [98]
    The Brink's-Mat Robbery: A Look into the Infamous 1983 Heist
    Feb 3, 2023 · The Brinks Mat gold bullion robbery was one of the most notorious heists in British history. On November 26, 1983, a gang of robbers stole ...
  99. [99]
    Watch We Digitally Cracked A High Security Safe | Hacklab - WIRED
    Sep 11, 2025 · ... techniques for cracking the Securam ProLogic L02, a digital lock used on 8 popular brands of high security electronic safes sold in the U.S. ...Missing: modern 2000s