An independently operated, military-grade slicing rig, with which a skilled user can hack through most computerized security systems and locking mechanisms. Placed in close proximity to a com-linked locking device, or plugged directly into a security-related computer socket, the device begins a hack by automatically cycling through the most common corporate and criminal algorithms. It can then be manually operated by the slicer to detect and attempt to hack more sophisticated government cyphers. The process is time-consuming, even in the hands of a talented codebreaker, and many security systems are designed to sense the hack and even attempt to burn the device. For this reason, combat models are built to be disposable and are well insulated to protect the slicer from harm. Solutions are saved to the pad, enabling the slicer to pass encrypted instructions directly to the mainframe and even gain control of hacked entities. For this reason, the ownership of electronic lock breakers is outlawed in many systems.