Policy Text
Amir El -Farra , CHIEF OF POLICE
Professional Standards Division NUMBER: 2023 -09
ISSUED: August 29 , 2023
COVERT BURGLARY TOOLS
The purposes of this training bulletin is to assist officers with identifying covert burglary tools
while conducting enforcement and investigations involving burglary and prowlin g incidents. Many
tools have become readily available to suspects online and are often overlooked due to their
mundane appearances.
The Garden Grove Police Department has experienced an exponential increase in burglaries
specifically in the resort area. Often these burglaries are achieved without leaving any tool
marks which indicate points of entry. Given the lack of tool marks it is believed that suspects are
making entry into rooms through one of two ways; the use of an under -the-door tool or cloning
device. The under -the-door tool allows the suspect to easily turn the door handle from the
outside by sliding the device through the bottom frame. A cloning device acts as a key card
which emits the same signal used by hotel staff master keys. Cloning devic es are not as
common but are often mistaken for a children’s toy or charging device. Due to how discrete
these tools are an officer could easily overlook them during an investigation.
COMMON LOCATIONS OF OCCURRENCE
- Marriot Suites; 12015 Harbor Blvd.
- Hampton Inn & Suites; 11747 Harbor Blvd.
- Hyatt Regency; 11999 Harbor Blvd.
- Embassy Suites; 11767 Harbor Blvd.
IDENTIFICATION AND ASSOCIATED FACTORS
An under -the-door tool is identical to a vehicle unlock pole commonly used by tow companies.
The bar is configured in a U -shape with the vertical portion being the longest. Often on the ends
of these bars is a nylon or metal wire which is used to grab the door handle. These tools are
easily collapsible and will fit in small bags. These tool’s only purpose is to unlock doors from the
exterior and are unreasonable to possess unless the individual is employed as a locksmith or tow
driver. See attached photo below for further details. TRAINING BULLETIN
A cloning device or “code grabbing device” as referred to in the penal code, is a device which
specifically obtains the transmitted code of a key card or other electric transmitting device and
retains it for access. This device can then be placed against an access point (i.e. electric door
lock) or vehicle and will allow access to th e user. These devices often leave no history for the
access. A cloning device could be used on any electronic transmitter including: master key
cards, vehicle remotes, garage door openers, and keyless vehicles. The United States
Government has attempted to restrict the selling of these devices but many are still being
imported from China and sold on various internet platforms. Currently it is not an offense to be
in possession of these devices unless specific intent is proven to obtain codes without the tru e
owner’s permission. These codes are stored on the device in a small library. It should be noted
that these devices could transmit signals from up to 300 feet away. See attached photo for
reference.
ENFORCEMENT ACTIONS
As noted these tools are used for the specific intent of committing burglary. Associated offenses
such as prowling, debit/credit card fraud, and theft of vehicles are commonly committed through
use of these tools. It is crucial that if an arrest is made for possession of burglary tools th at the
tools or devices are described in detail and photographed. Specific intent for use of these tools
must also be included in the report. Circumstances and area where the arrest occurred will
solidify probable cause. Listed below are penal codes that may apply:
- P.C. 459 – Burglary
- P.C. 647(h) - Prowling
- P.C. 466 – Possession of Burglars’ Tools
- P.C. 466.5 - Possession of Vehicle Master Keys
- P.C. 466.9 - Possession and Use of Code Grabbing Device
- P.C. 484e - Possession of Stolen Access Card
- P.C. 484f - Forge ry of Access Card
- P.C. 484i - Altering of Access Card
- Under the Door Tool (UTDT)
Flipper Zero Coding Device (Most common device in market)
https://youtu.be/D8pugz3B6 -o
Example of device use and capabilities.
Prepared by Officer Frank Avalos