Выбрать главу

The “keys to the city” described in this chapter are documented in “Key Set Available for $150 on eBay Provides an All-Access Pass to NYC” (Brad Hamilton, New York Post, September 2012) and “Lock Away These NYC Keys!” (Susan Edelman, New York Post, October 2012). Schuyler Towne discussed how to duplicate keys using high-resolution photographs in a Quora post in November 2013 called “If You Took a Picture of a Car or House Key, Could You Use That Picture to Get a Copy Made?” Since that time, companies such as KeyMe (“a secure and convenient way to copy, share and personalize keys”) and Keys Duplicated (“Copy keys online using your phone”) have been launched, turning a similar method into a business model.

For more on Marc Weber Tobias, see “The Ultimate Lock Picker Hacks Pentagon, Beats Corporate Security for Fun and Profit” (Charles Graeber, Wired, May 2009), as well as Tobias’s own two-volume set, Locks, Safes, and Security: An International Police Reference, 2nd ed. (Springfield, IL: Charles C. Thomas Publisher, 2000).

I met ATF special agent Kenneth Crotty as part of a workshop organized by the Writers Guild of America East in May 2014. Tactical Energetic Entry Systems can be found online (energeticentry.com), as well as breaching-tool firms such as Broco-Rankin (broco-rankin.com/tactical) and Gerber Tactical (gerbergear.com/tactical). Many retail stores sell these products, as well, including Atlantic Tactical (atlantictactical.com).

As this book goes to press, Karl Alizade is considering a move to Nevada with his firm, CitySafe; for now, CitySafe can be visited online (citysafe.com and modulxstrongroom.com), where many videos and diagrams are available for view. U.S. Patent No. 6,848,372 B2 (Modular Security Safe with Offset Security Bolt Box Having Expandable Characteristics and Method of Manufacturing Same), filed by Alizade, is also worth viewing. Alizade was interviewed in The New York Times for an article called “Secret Hideouts for the Rich and Scared; in Homes and Apartments, Safe Rooms Can Withstand Small Rockets” (Hope Reeves, April 2002). See also “New Ways to Fight Crime” (Miles Z. Epstein, JCK, June 1999) and “Barbarians at the Gate” (Patricia Leigh Brown, Chicago Tribune, October 1997). I also covered Alizade’s work in the September 2015 issue of Dwell magazine (dwell.com). All quotations from Alizade come from various conversations from 2012 to 2015.

For more on artist Gordon Matta-Clark, see Gordon Matta-Clark by Corinne Diserens (London: Phaidon, 2006).

5: Inside Job

My telling of the story of Jeffery Manchester, aka Roofman, is based on an interview in December 2014 with his arresting officer, Sergeant Katherine Scheimreif of the Charlotte-Mecklenburg Police Department. Additional references came from the following articles: “‘Roofman’ Gets the Blame for 38 Robberies in 9 States” (John M. Glionna, Los Angeles Times, April 2000), “Escaped Convict Lived Inside a Wall” (Shawn Flynn, News 14 Carolina, January 2005), “Escapee Attended Church, Gave Toys” (Associated Press, January 2005), and “Escaped Robber Returns to Annals of Weird Crime / Cops Say ‘Roofman’ Lived Large in Store” (Demian Bulwa and Charles Burress, San Francisco Chronicle, January 2005). Thanks to Anthony Carfello for first introducing me to Roofman’s story.

Bernard Tschumi and I spoke in August 2013. The Manhattan Transcripts and many other important early texts can be found in Tschumi’s monograph Architecture Concepts: Red Is Not a Color (New York: Rizzoli, 2012).

The story of the Kunsthal heist was widely covered in the global media at the time. For more on the alleged vulnerabilities presented by the museum’s architectural design, see “OMA’s Gallery Design Blamed for Rotterdam Art Heist” (Dezeen, October 2012) and “The Art of Stealing: The Tragic Fate of the Masterpieces Stolen from Rotterdam” (Lex Boon, NRC.nl). The Museum Security Network can be found online at museum-security.org.

Alphaville by Michael Codella with Bruce Bennett (New York: Thomas Dunne Books, 2010) is an interesting introduction to the genre of the urban police memoir. Although I do not refer to them in this book, I also read and recommend Blue Blood by Edward Conlon (New York: Riverhead Books, 2004), the excellent Homicide Speciaclass="underline" A Year with the L.A.P.D.’s Elite Detective Unit by Miles Corwin (New York: Owl Books, 2003), and Vice: One Cop’s Story of Patrolling America’s Most Dangerous City by Sergeant John R. Baker with Stephen J. Rivele (New York: St. Martin’s Griffin, 2011).

Jason England spoke to me from his home in Las Vegas in June and July of 2013. My conversation with Darrell Clifton from Circus Circus in Reno took place in July 2013. Jes Stewart from the Nevada Museum of Art spoke to me in May 2013 by phone, then gave me a security tour of the museum in June 2013. For more on trifoliate orange, see “Marine Corps Using Living Fence to Boost Security” (Associated Press, September 1988) and “No-Tech Terrorist Controclass="underline" ‘Rambo Bush’ Defends Its Turf with Foliage, Vicious Thorns” (Mike Klingaman, Milwaukee Journal, February 1989).

I spoke with Janice Kerbel in September 2013. Thank you to Tim Maly for lending me his copy of 15 Lombard St. (London: Book Works, 1998) while I worked on this book.

Randy Smith spoke to me in August 2013 from his home in Texas. Andy Schatz spoke to me in June 2013 from his home in San Diego.

The phrase voluntary prisoners of architecture refers to a project called Exodus, or the Voluntary Prisoners of Architecture by Rem Koolhaas, Elia Zenghelis, Madelon Vriesendorp, and Zoe Zenghelis (1972). It is in the permanent collection of the Museum of Modern Art.

“Lethal Theory” by Eyal Weizman was originally published in Log 7 (Winter/Spring 2006) and can be found online. The paper was expanded and partially rewritten for his later book Hollow Land: Israel’s Architecture of Occupation (London: Verso Books, 2007).

The story of my wife’s great-aunt, archaeologist Joan Harding, and the practice of deliberately omitting certain key architectural details from publicly available British estate floor plans, comes from conversations with my in-laws.

6: A Crime Is Nothing If You Can’t Get Away

Franz Kafka’s “A Message from the Emperor” was originally published in 1919; a new translation by Mark Harman was published in July 2011 by The New York Review of Books and is available online.

For more about the teenager in Łodz, Poland, see “Hacking Polish Trams” (Bruce Schneier, Schneier on Security, January 2008) and “Polish Teen Derails Tram After Hacking Train Network” (John Leyden, Register, January 2008). Cesar Cerrudo’s traffic-hacking work is documented in “Hacking U.S. (and UK, Australia, France, etc.) Traffic Control Systems” (Cesar Cerrudo, IOActive, April 2014) and “Traffic Light Hackers Could Cause Jams Across the U.S.” (Hal Hodson, New Scientist, August 2014). The example of faking gridlock on Waze was first reported in “Waze Under Attack: Israeli Students Fake Traffic Jam on Popular Map App” (Ido Efrati, Haaretz, March 2014). These stories also appear in Marc Goodman’s excellent book, Future Crimes (New York: Doubleday, 2015), which I refer to here for its discussion of GPS spoofing. For more about GPS jamming and spoofing, see “Car Thieves Using GPS ‘Jammers’” (Charles Arthur, Guardian, February 2010), “Organised Crime ‘Routinely Jamming GPS’” (Matt Warman, Telegraph, February 2012), “The Threat of GPS Jamming: The Risk to an Information Utility” (Jeff Coffed, white paper for Exelis, February 2014), and, of course, Marc Goodman’s Future Crimes.