A different perspective on Matt Blaze

I'm not posting this from my usual account, so some introduction is in order. I've been a professional locksmith for 14 years now, owned my own business (with a partner and 2 FT employees plus some PTers ) here in N. California for the last 8. I'm a CPL (started out with F-B, boy did I learn a lot since then but it was a good start). For the last

4-5 years I've shifted the business from a pure locksmith shop to a full service "security" business. We do alarms, CCTV, security surveys, etc, mostly for residential (this is a rich area) as well as traditional lock work. That made the all the difference. I now spend at least as much time stringing cat 5 cable, etc. as I do pinning cylinders and doing lockouts. That's just the direction the business is going for us, can't fight it, and lately I feel like I can finally say we're ``successful'' at building what we set out to accomplish. What I mean to say is that although I've not been in the business as long as some I'm not a newbee either and I've got a lot invested in the security industry.

I've been following the whole master keying / Matt Blaze mess here and in TNL. My first reaction, like many locksmiths I guess, was shock that someone would publish this sort of thing in the press for all to see. I have to admit that I didn't know the technique he wrote up, but that's my poor education, I guess (I don't do much MK work). A lot of my customers called and asked me what's up with this, are they secure, etc.

I've been doing some more reading about this and following the threads here. I know what I'm going to say is unpopular, but I think Mr. (Dr?) Blaze may have some valid points. I don't know that I'd do exactly what he did, but I don't think we can ignore him, either.

The thing is that many of the folks here are acting as if Matt Blaze owes us some kind of explanation for his behavior and as if he has to convince us that what he did was OK, ethical or whatever. The problem is, and it took me a while to realize this, is that it's more like the other way around. Let me explain.

I've been doing some research of my own on this. Blaze is, to tell the truth, an important guy in the security field. More than you might think, actually. He runs the security research department at AT&T (Bell Labs). He's also a Professor somewhere. He's done high level security consulting for the government, including the FBI and/or the US Justice Dept. He's TESTIFIED IN CONGRESS, for Christ's sake. A lot of people knew who he was well before his master keying article came out. We have to give him his due, he's a very smart and accomplished and respected guy in the security field.

Does this mean that he's an expert locksmith? No, of course not but that's not the point. The point is that the opinions of him and people like him carry a lot of weight with the general public and leaders. They tend to greatly influence the direction of our industry. We should be careful about ignoring him even if we don't like the message or the way it was sent.

I think Mr. Blaze is 100% right, actually, when he said that direction that the world is going makes it harder for the security industry to depend on closed secrets. Do an internet search

formatting link
with the right words and you'll find most of our socalled sensitive info right there for anyone to see. You can't depend on this any of this stuff staying secret, not any more. Blaze is right when he says we have to adapt. We do it anyway. How many of us are still running the same kind of business we ran 10 years ago? Transponders, competition from Lowes, the Internet, it's all new and it will all be replaced by something else in 10 years.

I think it's possible to have good, solid security that doesn't have ``tricks'' that defeat it. Try to pick a Medeco! You can't! We open them by drilling or by bypassing something else. No need to keep that secret. You just get what you pay for in a lock like everything else in life. The customers know that. The question is time to defeat. Better locks take longer. No need to keep that secret. Honestly, no real need to keep secret how we do it, as long as there aren't ``tricks''. If there are tricks, I think that IS a defect and I don't think we can complain if someone else discovers them if we knew about them and sold them anyway.

I don't think I agree with the people who say that Mr. Blaze has caused damage with his article. Most of the smart criminals knew it before and the dumb ones still don't know it. The difference is that now the general public knows it or has access to it. They'll demand better security FROM US. That's good for us, and it's good for them too.

Also, open security is the NORM for software, and guess what? Locks are becoming more like software! What do you think is inside a card access system? We'd better get used to it folks.

We would be a lot better off reaching out to Mr. Blaze, explaining some of our concerns, but also listening to what he has to say. A lot of the nonsense here and elsewhere, such as posting his home address or even just accusing him of not knowing anything about the real world, is an embarassment to our industry. Makes us look like a bunch of thugs. Who would go to a thug to have a security system installed?

I know this will be unpopular, but we'll all be better off if we can just keep an open mind for new ideas and not assume the worst of those we disagree with.

Whew! Sorry for going on so long, but I think this is important.

Just call me: snipped-for-privacy@hotmail.com, somewhere in Northern California

Reply to
CA Locksmith
Loading thread data ...

The bottom line is that 90% of low to medium security locks can be quickly compromised in one way or another. The vast majority of those that want and can afford high security locks have them already. Many of those that don't will NEVER upgrade them for a variety of reasons. Upgrading locks is more time consuming and costly than going to a software vendor website and downloading the latest security patch. The result of the Blaze paper is that a relative few systems will be upgraded to something more secure and the vast majority will not be and will be left open to a now much more well known attack.

Reply to
Putyourspamhere

I like that! Great security, just hide it and hope it goes away. Matt Blaze is a well-known expert in his field. He may actually be right.

Reply to
Herb Stein

Very well put!

Reply to
Bob DeWeese, CML

Matt Blaze is an expert in computer security. There is little similarity in patching holes in computer security and patching holes in physical security. I notice you carefully avoid taking issue with any of the points I made.

Reply to
Putyourspamhere

Excellent post calocksmith!

Virtually all of the criticism dumped on Dr. Matt Blaze so far is totally based on conjecture. It's all alarmist suppositional reasoning totally unsupported by any facts or events. No evidence in the form of crime methodology statistics is offered to show that any correlation exists to support a claim that any prior disclosures of esoteric security information ever caused an increase in crime. On the contrary, security is usually improved as a natural consequence of any security assessment that exposes vulnerabilities. However, the truth will never satisfy those unable to recognize it or respect it.

Is there any credible evidence that any previous disclosures of lock or security system vulnerabilities directly attributed to the increase in crimes specifically applying that information?

If so, let's see the critics present right here, right now!

Reply to
NOSPAMZAPPER

Since you're making the challenge here I can't help but find it a bit strange that you support none of the documentation you seek to back up your statement with regard to improved sucurity.

There was a foul mouthed self admitted felon who posted techniques for compromising security on this very forum. Here's a first person account of somone using his information obtained on this forum for criminal purpose:

formatting link

Reply to
Putyourspamhere

Should have said:

Since you're making the challenge here I can't help but find it a bit strange that you provide none of the documentation you seek to back up your statement with regard to improved sucurity.

Reply to
Putyourspamhere

Well of course the successful duplication and use of a master key doesn't necesarily leave any evidence of a crime. Concievably a sophisticated burglar could perpetrate a series of thefts in a given premises. The evidence would be missing property - without obvious damage these tend to fall into the realm of "mysterious disappearnces". In facilities like large office buildings the number of potential suspects can easily reach into the hundreds. It woudl become apparent that something was amiss when the number of similar incidences became to large to explain away. Common thieves are the least of our worries in this kind of attack. Of more concern is the more sophisticated thief who is seeking sensitive information; or to compromise data communication systems or perhaps plant listening devices to name a few exposures. of course criminals at this level (or terrorists) probably have been aware of the weakenesses in MK systems for decades. Perhaps one solution is for the industry to avoid making MK systems overly grand - e.g. separate systems for perimeter doors, and sensitive areas for example.

Reply to
Jim Gaynor

I have to agree with nospamzapper on this one. The critics have not proven their case. You need to carefully read what nospamzapper asked. The burden of proof is on the critics who focused their criticism on Matt Blaze, and their case needs documentation, not conjecture. Any judge would laugh you out of court if your "evidence" was a "newsgroup entry" from a boastful "self-admitted felon" and one of his friends. The word is "credible" evidence.

Certa (snip)

Reply to
TexSecure

I notice you aren't as eager to comment on the articles regarding computer hacking. I also noticed nospamzapper posted no "credible" evidence, or any evidence at all for that matter, to back up his/her assertion that release of security information is in any way beneficial either. I notice that unsurprisingly you have also failed to do so.

Um gee you don't think that the fact that there is little documentation that this has occurred in the physical security area is because those of us concerned with physical security aren't in the habbit of making the information publicly available in the first place do you? No that couldn't be it.

On the other hand where computer security is concerned there is plenty of evidence that the general openess with regard to security holes has made it possible for every wannabe cracker in existence out there to go out and break into at least some systems that they would never have been able to access if the vulnerbilities had not been handed to them on a silver platter. I'm sure if most people involved in physical security were to take the same approach as our computer security counterparts you would see the same thing occur with regard to physcial security, which is much harder to patch after the damage has been done. THAT'S WHY WE DON'T DO IT.

Reply to
Putyourspamhere

I posted the CERT policy a few days ago. They generally delay in releasing news of vulnerabilities to allow the vendors to react before making the news generally available.

Why would they go to this trouble unless they felt that immediate release of a vulnerability would cause in increase in crime?

Is CERT enough of an authority for you?

Reply to
Henry E Schaffer

PolyTech Forum website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.