Every contact leaves a trace." The basic principle of forensic investigation extends from trace evidence to network intrusion, and yes, to lockpicking, too.
This talk will provide a primer on the forensic detection and analysis of various methods of lockpicking and non-destructive entry, including bumping and impressioning. The main body of the talk summarizes the excellent work of Datagram, Deviant, Scuyler Towne, and others, as well as providing scientific and legal context for the task of detecting covert entry