Foreword xvIntroduction xviiChapter 1: What Is Social Engineering? 1Chapter 2: 330 Cameras 4Chapter 3: Expensive Doesn't Mean Secure 7Chapter 4: The Trolley Problem 12Chapter 5: High (Street) Security 17Chapter 6: The Psychology of Stairs 19Chapter 7: The Broken Arm Ruse 21Chapter 8: Crown Jewels Are Not Always Shiny 24Chapter 9: This Is My Office Now 27Chapter 10: How to Use a Pen to Hack Any Door 31Chapter 11: My First Kidnapping 34Chapter 12: I Needed a New Computer 40Chapter 13: Building My Own Office 43Chapter 14: Letter of Authority 47Chapter 15: Astute Manager 49Chapter 16: I Can't Fly a Helicopter 51Chapter 17: Doppelgangers Exist 54Chapter 18: Stealing the Keychain 56Chapter 19: It's Dangerous to Go Alone. Take This! 59Chapter 20: The Gold Bar 63Chapter 21: Plush Carpets 68Chapter 22: Clean(er) Access 71Chapter 23: What We Do in the Shadows 73Chapter 24: What Do I Know about Diamonds? 77Chapter 25: How to Crack a Safe 80Chapter 26: Find a Safe Space 88Chapter 27: Well, That Was Unexpected 92Chapter 28: Opening a Door on Security 95Chapter 29: How to Tailgate an Opaque Door 98Chapter 30: The Guard Who Was Too Polite 100Chapter 31: The Swan Effect 102Chapter 32: What's in the Box? 105Chapter 33: How to Bypass an Elevator Security System 107Chapter 34: The Loading Bay 109Chapter 35: The Escort 111Chapter 36: The Staircase 114Chapter 37: How to Bypass PIR Detectors 116Chapter 38: ATMs 121Chapter 39: Open Windows 124Chapter 40: Security on a String Budget 127Chapter 41: How to Bypass Padlocks 131Chapter 42: Padlocked Gates 134Chapter 43: The Security of Glass 138Chapter 44: Trading Places 142Chapter 45: How to Bypass Keypads 145Chapter 46: E- Waste 148Chapter 47: Fourteen Desktop PCs 151Chapter 48: Spy Gadgets 155Chapter 49: How to Steal Fingerprints 158Chapter 50: Five Banks a Week 162Chapter 51: Finding Out Too Much 165Chapter 52: Needle in a Haystack 168Chapter 53: Stealing a Purse and Keys 172Chapter 54: How to Pick Locks 174Chapter 55: The Porn Cupboard 179Chapter 56: The Apartment Across the Way 182Chapter 57: Magazine Shoot 186Chapter 58: Double Trouble 189Chapter 59: Fake ID 191Chapter 60: Impersonation 195Chapter 61: How Maglocks Work 199Chapter 62: Personal Escort 202Chapter 63: My Favorite Door 205Chapter 64: Microwave Fences 208Chapter 65: Discarded Passes 211Chapter 66: Bypassing Speed Lanes 214Chapter 67: The Case of the Angry Man 217Chapter 68: Let's Play Doctors 220Chapter 69: That's for Me! 225Chapter 70: How to Use a Snickers Bar 231Chapter 71: Taking the Bus to Work 233
FC is a renowned ethical hacker and social engineer with over 20 years' experience working in the field of information security. He has worked for major high street banks in the UK and Europe, FTSE100 companies, several government agencies, and security forces. He's a frequent speaker at corporate events, security conferences, universities, and schools around the world.