海角大神

Modern field guide to security and privacy

Why hackers are so obsessed with picking locks

It's the physical manifestation of what they often try and accomplish in the digital world, say lock-picking enthusiasts. 

|
Ann Hermes/海角大神
At a hackathon earlier this year at the Massachusetts Institute of Technology in Cambridge, Mass., participants practiced picking locks.

At a recent computer security conference here, Ash Riley attempted to hack something that didn't contain any code or circuitry: a lock.听

The college student from Westchester, N.Y., worked at it for 15 minutes, patiently trying a metal pick to move the lock's internal pins. As she was about to give up, Ms.听Riley angled her tool just the right direction and the lock opened.

"I did it, I did it!" Riley told her boyfriend, Adil Sadik, who also picked his first lock the day before. "It was so exciting."

So-called "lock-picking villages" like the one that Riley and Mr. Sadik visited at the 聽(HOPE) cybersecurity conference in July have become mainstays at cybersecurity conferences and college coding competitions.

In many ways, physical locking picking聽gets to the heart of what it means to be a computer hacker, say cybersecurity experts and lock-picking enthusiasts. They say it聽mimics what hackers do in the virtual world 鈥 working to figure out vulnerabilities in systems with the goal of patching flaws and improving overall security.听

"It's the only way you're going to understand something, is if you pick it apart and look at the insides," said聽Eric Gordon Corley,聽the founder of HOPE and publisher of the hacker magazine 2600.听鈥淓verything else is in a black box, and that's not healthy.鈥

After seeing a lock-picking village at a German hacker conference more than a decade ago, Mr.听Corley invited members of聽The Open Organization Of Lockpickers (TOOOL), a nonprofit dedicated to publicizing information about locks and (legal) lock picking, to stage a similar event at his聽New York conference in 2004. Within a few years, TOOOL branched out into the US and lock-picking villages began springing up at tech gatherings across the country.听

"Almost invariably, on someone's very first time learning, awe is the reaction 鈥 awe at how easily they can do something that most people think they can't do,鈥澛爏aid a hacker known as聽Deviant Ollam,聽a TOOOL board member.听

Now, the US chapter of TOOOL runs most of the lock-picking villages at hacker and cybersecurity gatherings in the US.听At the recent DEF CON security conference in Las Vegas, the group ran a 鈥渢eaching village鈥 where attendees could receive聽. More advanced pickers competed in a .听

The goal, says Ollam, is to "learn as much as you can about how something works, stress and push at the edges of the system to make it work the way it wasn't suppose to work and then experiment and see what unexpected things you can make it do 鈥 that's the same mantra, the same ethos, whether you're talking about ones and zeros or little pieces of metal."

Ollam says TOOOL has two cardinal rules that it lays聽out at the beginning of every training session: Don鈥檛 pick a lock you don鈥檛 have permission to pick, and don鈥檛 pick a lock you rely on (in case you break it).

Still, as is often the case with computer hacking, lock picking has an edgy allure. It's all about learning to聽beat systems that are designed to keep people out.

"That's definitely, definitely one of the reasons that keeps hackers engaging in that sort of activity," says Gabriella Coleman, an anthropologist at McGill University who studies hacker culture. "Then, of course, doing it in the context of hacker cons and stuff like that reminds people that you should be responsible."

The basics of lock picking are fairly simple.

Picking the most common type of lock, called a pin-and-tumbler, requires two tools: A pick and a turning tool. The turning tool keeps constant, gentle pressure on the lock so that it will turn once the pins are in place. The pick feels for when each pin catches in place, like the teeth on a key. With minimal instruction, most people can pick a simple one- or two-pin lock in minutes. But the intricacies of locks and lock picking can take years to master.

To be sure, lock picking has been a hacker pastime for decades. In 1987, the pseudonymous Ted the Tool authored 鈥 a how-to manual named for the Massachusetts Institute of Technology where students have long been rumored to use lock picking in their .

But as the hobby spreads, newcomers seem to get the message that longtime lock-picking聽adherents are trying to convey: in order to fix something, you first need to know how to break it.

"Especially in computers, you can't really see or feel what's going on," said Sadik, who attended HOPE with his girlfriend and works in technology. 鈥淚t's cool to be able to do that with a lock, which is a system that's designed to secure something but may still be broken into."

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines 鈥 with humanity. Listening to sources 鈥 with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That鈥檚 Monitor reporting 鈥 news that changes how you see the world.
QR Code to Why hackers are so obsessed with picking locks
Read this article in
/World/Passcode/Security-culture/2016/0815/Why-hackers-are-so-obsessed-with-picking-locks
QR Code to Subscription page
Start your subscription today
/subscribe