Professional Documents
Culture Documents
Personal Security Guide-6-8-05.indd 1 7/7/05 10:30:03 AM
Personal Security Guide-6-8-05.indd 1 7/7/05 10:30:03 AM
Table of Contents
Sections Pages
4: Security of Children . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6. Security in Vehicles . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7. Security on Travel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
h. Be Unpredictable
Defeating Surveillance
Pattern of Activities
Security on Foot
• Take a self-defense
class to learn how to
become more aware of
your surroundings, avoid
confrontations, and recover
self-confidence.
4: SECURITY OF CHILDREN
Threats to children can also
range widely from the merely
unpleasant, such as schoolyard
scuffles, to the tragic, such as
kidnapping or sexual assault. A
unique threat to children, evident
in the NCR as in other major
SECURITY OF CHILDREN
cities, is the rising incidence
of violent gangs in residential
neighborhoods and schools.
Young Children
Security in Schools
Physical Security
Most such calls are hoaxes, but assume they are real until
proven false. A key point is that deranged/illogical callers
will often disclose valuable detail:
6. SECURITY IN VEHICLES
Threats in a vehicle can range from surveillance and
stalking to attempted shootings and other types of assaults.
Because cars can be turned into cash so easily, however,
most threats are essentially of crimes against property. The
usual risk here is thus to your car keys and registration.
Before trips, inspect your vehicle and its fluid levels. If you
think people may really be trying to harm you, alert PFPA
and local police, then get in the habit of checking under
the chassis, hood, dashboard, seats; and in the trunk, wheel
wells, exhaust pipe, and fuel cap before you start. Two
people can do this in about 60 seconds with a little practice.
If you see anything amiss, even a pranksterʼs firecracker,
call 911 and let experts remove it.
7. SECURITY ON TRAVEL
Travel in the United States
In Commercial Lodgings
If, on the other hand, such events occur when you are not
in DoD facilities, you will have to evacuate or shelter your
family in place, a decision that will likely be dictated by
circumstances. As it is not possible to predict which option
may be required, you need to plan for both.
If you sense that any such data has been stolen, report it fast
to your banks and credit card issuers, to the Federal Trade
Commissionʼs Identity Theft Hotline at 1-877-438-4338,
and go to the FTCʼs Web site at www.ftc.gov, to create an
Identity Theft Affidavit to give to all concerned.
at www.Webroot.com,* www.Spybot.com,*
and other sites. Linking Ad-Aware* at www.
lavasoftusa.com/software/adaware/ * with SpyBot*
is particularly useful. See www.us-cert.gov/cas/tips
for a discussion of more recent threats if you are
technically inclined.
Protecting Emails