Protecting Against Security Threats of Today and Tomorrow: Unmanned Kiosks
Recent years have seen a trend towards removing the human aspect of service interactions, including key cutting services. On the surface, these technologies seem like harmless advancements. But the actual impact could be a little more sinister.
Duplicating phantom keys sounds like a threat of the distant future. But the reality of technological advances and the de-personalization of key cutting brings the threat of traceless keys closer and closer every day.
This blog is the second and final installment of a two-part series on the emerging threats to commercial building security, including advancements in 3D printing technologies and the rise of unmanned key machines. To learn about how 3D printing is an ever-growing threat to physical key security, click here.
Emerging Threats to Security
When it comes to commercial, federal, and industrial buildings, the traditional door security threats are the usual suspects—drilling or picking locks and key duplication. These threats, while still around today, are thought to be easily mitigated with key cutting patent protections and durable, high-security locksets with drill, pick, and bump resistance.
But what’s on the horizon?
Recent years have seen a trend towards removing the human aspect of service interactions. These days, most everyday services—including key cutting services—are requested, scheduled, and carried out via a pre-programmed tool.
On the surface, these technologies seem like harmless advancements, developed to make the process of manufacturing and cutting keys easier and quicker. But the actual impact could be a little more sinister.
Unmanned key machines remove the personal authorization process
In the past, going to a big box store and getting a key copied was primarily for homeowners. But recent years have seen an uptick in big box stores promoting the fact that they can duplicate commercial and office keys by using a kiosk, rather than a locksmith or even a person at the big box store who could cut keys. In years coming, unattended kiosks will likely become more ubiquitous.
Rather than a locksmith who could verify a person’s identity and permissions, most unattended key-cutting kiosks just require the original key to copy. Even more threatening are the kiosks that can print a duplicate key with only a picture of the key from a mobile device or app.
Think about it: you leave your keys unattended on your desk for a few moments. In that time, someone can quickly scan a photo of your key, take it to an unmanned kiosk, and have a duplicate of that key made within moments. Without the barrier of an authorized key machine, duplication is easier than ever.
The rise of phantom keys
These technologies are creating an unprecedented amount of phantom keys, making key inventory and secure access control increasingly difficult. Since the duplication of these keys isn’t traceable, neither are the keys that become circulated in use, making it more and more difficult to manage the people and parties who have access to physical spaces. And as the technologies continue to grow, so will the problem of unauthorized key duplication, and the investment required to protect your properties.
The bottom line? The increasing implementation of automated, unmanned kiosks removes the personal interaction and vetting process that has previously verified that a person is authorized to duplicate a key. These kiosks not only put your customers and their assets at risk, but take money out of your pocket.
Intelligent keys provide electronic access control in the event of mechanical duplication
Another way to ensure secured facilities in the event of unauthorized duplication is to use intelligent key systems rather than a typical mechanical key blade.
Intelligent keys provide controlled access, accountability, physical security, and system management. They integrate smart technology typically associated with smart locks and complete electronic access control systems with the convenience and easy installation of mechanical key and lock systems. Intelligent keys work by requiring that both the physical attributes of the key and the permissions associated with the electronic attributes in both the key and the cylinders are compatible.
While kiosks and digital scanners can clone the physical features of a key, they are not able to copy the electronic attributes of intelligent keys and locks. With intelligent keys, even if a threat actor is able to reprint the mechanical portion of the key, you need both the mechanical and electrical attributes and credentials to open the lock. And as of today, electronic attributes can only be replicated with well-protected and encrypted communications from the original manufacturer.
Learn more about our intelligent key offerings here.
New security threats are on the horizon. Prepare your facilities with proactive solutions.
The presence of automated kiosks is increasingly growing. As these tools become more accessible to those with bad intentions, they will become a more commonplace issue.
Make sure you’re protecting against the threats of today and future-proofing against the threats of tomorrow with strategic key systems for your commercial, federal, and industrial buildings. And locksmiths – it’s up to you to educate and inform your customers about the emerging threats and the right key systems for their threat landscape. These systems will not only protect and add to your customers’ bottom line, but yours as well.
If you're interested in learning about how intelligent keys better protect your commercial spaces, fill out the form below to get in touch.