Vulnerabilities in Maximum Security