They made the entrance to the establishments through butron or fracture of the locks and access doors and, later, they violated and sabotaged the security and alarm systems in order to proceed to the opening of the safes
One of the detainees was posing as a technician from a well-known telephone company and, equipped with uniforms and accreditation that seemed real, he obtained information about the alarm systems, the location of volumetric devices and the location of safes.



Source of post