- Last Updated on Thursday, 03 May 2012 18:09 03 May 2012
- Published on Thursday, 03 May 2012 18:09 03 May 2012
10. Keeping your Valuables safe while you Travel
The following information on laptop computer security is also applicable for other items of value such as briefcases and carry-on bags while you are in domestic or international travel status:
Items left unattended for even a very brief period have become a premium target for theft. Every traveler should remain on constant alert as they traverse through all airports. Here are some common examples of methods used by thieves to separate you from your belongings.
One method involved the use of security x-ray machines. The first thief precedes the traveler through the security check point and then loiters around the area where the carry-on luggage had already been examined. When the traveler places his laptop computer or bag onto the conveyer belt of the x-ray machine, the second thief steps in front of the traveler and sets off the metal detector.
While the traveler is being delayed, the first thief removes the traveler's laptop computer or bag from the conveyor belt just after it has gone through the x-ray machine and quickly disappears.
Another method of theft can occur while the traveler is walking through a crowd of people in the airport terminal. The traveler, who may have a laptop computer or small bag on top of his or her roll bag, is preceded by the first thief. Just as the traveler gets around the crowd of people, the first thief stops abruptly, causing the traveler to stop abruptly. When they stop momentarily, a second thief, who had been following just behind them, quickly removes the traveler's laptop computer or small bag from the roll bag and disappears into the crowd.
All travelers, both international and domestic, are urged to be alert to the above methods used in stealing valuable items and always be mindful of any abrupt diversions during your travels. Report any losses immediately to the authorities. Keep serial numbers, make, and model information of your laptop computers, or of any items of value, separate from the item so you can give precise information to authorities if the items are stolen.