Lateral with Tom Scott cover image

66: The lock-breaking pencil

Lateral with Tom Scott

CHAPTER

Security Breaches and Activist Raids

In this chapter, they discuss security breaches and activist raids, exploring how social engineering can be used to breach security. They delve into examples of using pens as tools for security breaches and recount a famous raid on an FBI office orchestrated by William Davidon. The chapter also mentions a break-in with interesting consequences and raises speculation about two individuals drawing curves in the dirt.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner