Travel advisory! : how to avoid thefts, cons, and street scams while traveling /
Bewaard in:
| Hoofdauteur: | |
|---|---|
| Andere auteurs: | |
| Formaat: | Boek |
| Taal: | English |
| Gepubliceerd in: |
Chicago :
Bonus Books,
c2003.
|
| Onderwerpen: | |
| Online toegang: | Table of contents |
Inhoudsopgave:
- Machine derived contents note: Contents
- Acknowledgments
- Preface
- One High and Dry on the Streets of Elsewhere
- What we do, how, and why; Pickpockets defined, politics and
- technique overview; Our mission to teach awareness and share
- knowledge; Holiday headspace; Thieves' reaction to us.
- Two Research Before You Go
- "It couldn't happen to me"; Educate yourself: the Internet and the
- fabulous free information from the U.S. Department of State; "I
- thought I'd feel it"; Don't be self-ripped: know about currency, credit
- card strategy, money matters; Anatomy of a victim.
- Three Getting There; With All Your Marbles
- At the airport: diversion tactics, security checkpoint scams, roving
- gangs; Luggage considerations; Train travel and
- stations; Overnighters: scams, knockout gas, food- and drink-
- drugging; Trust; Driving foreign issues; Good samaritan
- scams; Smash-and-grab.
- Four Hotels: Have a Nice Stay
- Lobby lifts; Breakfast thieves, Hotel rooms and security; In-room
- safes; Luggage as safe; Door pushers; Lobby luggage storage.
- Five Rip-offs: Introducing...The Opportunist
- Giving it away; Opportunist techniques: speed, seizure, stealth,
- motion, impedence, impact, assumption,
- pretense; Finesse; Tools; Travel safety products.
- Six Public Transportation: Talk about RiskyÉ
- Subway, buses, trams, and trains; The lure of credit cards as
- plunder; Seedy stations; Taxi hazards, taxi joys; Risks in real life.
- Seven Scams; by the Devious Strategist
- Flower gift lift; CafÄ set-up; Postcard pick; Pile-up pick; Pseudo
- cops; Pigeon poop practitioner; Gender exploiters; Shoulder
- surfers; Protect your sphere; Gentlemen thieves.
- Eight Con Artists and their Games of No Chance
- Bait-and-switch; Touts on the take; Pavement wagers: three-shell
- game, three-card monte; Pigeon drop; Nigerian scam.
- Nine Identity Theft: You've Got a Criminal Clone
- Definitions and statistics; How thieves get private information:
- document theft, mail diversion, shoulder surfing, Dumpster diving,
- scamming, skimming, exchanging, check-writing, obtaining credit reports,
- via e-mail, false merchant Web sites, Internet searches; Making and
- using false ID documents: account takeover, fraudulent accounts, credit
- card fraud, criminal identity theft; Victim consequences; Personal
- information: availability, trafficking, sharing, abuse, theft, protection
- of; Responsibilities of businesses, credit issuers, credit
- bureaus; Biometric technology; Self help: guard documents, shred,
- withhold personal data, opt out, Internet precautions, credit card risks,
- check-writing risks; Victim assistance; Contacts and resources.
- Afterword
- Theft First Aid
- Glossary.