In Naples, the operation led by investigating judge Dario Berrino led to the arrest of 38 members of seven serial burglar gangs, revealing a sophisticated intrusion method using universal keys and specialized equipment, raising a security alert for homes in the city.
The precautionary measure signed by investigating judge Dario Berrino of the Naples court, which the other day sent to prison 38 people belonging to seven distinct groups of serial burglars, paints a picture of organized groups that do not improvise.
The thieves' "toolbox" is described in such detail that, in the order, it serves to demonstrate method, repetition, and technical skill. Not only generic tools (screwdrivers, pliers, crowbars, hammers), but also tools typical of "clean" home intrusions: altered and universal keys, devices designed for Euro cylinders, and even equipment for working with safes.
The most striking point is the centrality of so-called special keys: brands (Cisa, Mottura, Securemme, CR, Campisa) appear recurring in the complaints, precisely because they are among the most widely used on gates and armored doors. The "T-key" for European cylinders and the reference to the "Bulgarian lock pick" suggest a qualitative leap: the goal is not to break in, but to open and close while reducing noise, time, and, above all, traces.
The “Mickey Mouse” universal key
This framework also includes the “mice”, referred to as a universal key (in one passage associated with Securemme): not a simple lock pick, but a specialist tool, requested and prepared on request, as if it were part of a standard action kit.
Alongside the keys, the order describes the equipment needed for more "heavy" attacks: flex and flex disks for attacking safes or supports, and a decoder "to create access keys" for armored doors. This is an important step because it shifts the focus from traditional break-ins to manipulation/replication: from an investigative perspective, such a device reinforces the idea of structured groups, capable of adapting to different locks and selecting targets based on their locking systems.
The wiretaps, then, provide the soundtrack to the modus operandi. On the one hand, there's the "observation" work: spotting elderly residents and neighbors, monitoring their movements in the building, ordering them to leave and return "as a precaution," asking them to reverse their car to speed up their escape, and managing the stolen goods.
On the other hand, there's the technical jargon of the field: looking at what type of key a person is holding ("Mottura"), checking whether a defender is on a door ("the ball"), determining whether the access is compatible with the tool provided. Essentially, the conversations reveal not only the criminal action, but also the procedure: lookout outside, raiders inside, car ready, constant communication.
In one episode, the call remains open while the two are inside the apartment: they discuss the burglar alarm's photocells, discuss the search for jewelry and boxes, and distinguish between gold and fake items, until the heist is finally concluded: "We're leaving," and the order is given to open the trunk and put everything away. It's the script of a well-oiled team, with distributed tasks and almost "live" risk control: those outside report suspicious entries and arrivals, those inside work on a timely basis, and the driver manages the extraction.
Another element the ordinance seems to emphasize is the repetition of phrases and behaviors: "Get the Topolino ready for me," "people are coming up," "we're inside," "open the hood." These phrases, when read in detail, outline a chain of command and operational trust that extends beyond the individual theft.
This is why the list of tools is not a "folkloristic" detail, but a piece of evidence: it serves to connect subjects, roles, and robberies, as well as demonstrating the availability of tools compatible with opening armored doors and removing safes.
On a narrative and investigative level, the message is clear: these are not occasional thieves, but serial gangs who select their victims, study the locks, enter when the opportunity is most favorable (often following the movements of elderly people and condominium owners), and try to move quietly.
The combination of "special keys," disguises (gloves, hoods, tights), and real-time communications reveal a repeatable, exportable, and therefore particularly dangerous criminal pattern between Campania and Lazio.
“Mickey Mouse” key (decoder)
-
What: a universal “decoder”/key used to open and decode European profile cylinders, born as a professional locksmith tool but also ended up in criminal use.
-
How it's made (in general): central body with metal slats; works on European cylinders.
-
Operational feature: it is described as fast and potentially not very “visible” (with the risk of leaving few signs), which is why it has become so frequently mentioned in the news.
-
Note on trademarks: there are versions/decoders designed for specific cylinder models (e.g. kits indicated for Securemme K2), so it is not necessarily a “one size fits all” rule.
T-key for European cylinders
-
What is it (in a technical sense): in the documents it is indicated as a “T” key/tool used for forcing European cylinders.
-
Main feature: the “T” shape recalls a handle that allows grip and torque when maneuvering the lock/cylinder.
Altered keys
-
What are: keys modified/adapted to fit specific locks/cylinder settings without being the original key.
-
Investigative feature: they are often highlighted in ordinances because they indicate preparation and availability of "dedicated tools" for targets and locks.
Universal keys (for popular brands)
-
What are: keys/tools declared suitable for opening "locks of all types", with recurring brands widely installed on doors and gates (in your excerpts: Cisa, Mottura, CR, Campisa, Securemme).
-
Practical feature: the idea is to reduce time and uncertainty by choosing tools compatible with frequent cylinders/locks.
“Bulgarian lockpick” / “Bulgarian key”
-
What: a lock pick associated with the so-called “Bulgarian key”; in various technical explanations it is described as a system composed of multiple elements (e.g. tension wrench + “soft key” with blades) designed to replicate/reconstruct a key profile.
-
Important feature (distinction): many sources link it above all to the double-bit locks old generation, not European cylinders.
“Key decoder” (for armored doors)
-
What: in industry reports, the “decoder” is described as a device capable of “decoding” a cylinder, that is, obtaining a combination useful for opening (or replicating), rather than as a traditional key.
-
Feature: it is presented as a tool created for professional interventions but also exploited illegally.
Source EDITORIAL TEAM






Comments (1)
The article discusses a police operation in Naples that led to the arrest of 38 thieves. The special keys and tools used appear highly sophisticated and demonstrate meticulous preparation, which is concerning for home security.