Personal Safety

Some personal security measures you may consider implementing for you, your family and your tenants.

Improving your local security measures is an ongoing effort. Careful budgeting of household expenses can over time allow for the purchase of additional security installations.

Contents

  • Cellular Phones
  • Live location sharing on cellular phones.
  • Google Timeline
  • Tracking cellular phones (Phone location services without SAPS engagement)
  • Phone location services using SAPS (SAPS POCIM). Requires cellular number, IMEI or MSIDN numbers.
  • I.C.E app (In case of emergency)
  • Real time location on WhatsApp
  • Share your real-time location with others: Children and Domestics or employees
  • Motor vehicles
  • Machinery and equipment
  • Perimeter Security Measures
  • Locks
  • Walls
  • Fencing
  • Gates
  • Lighting
  • Alerts and Notification
  • Documentation
  • Natural Barriers
  • Aesthetics
  • Access Control
  • Animals and livestock security measures
  • See Farm Security Measures
  • Basic security precautions when you live in a remote area – SAPS
  • Home Safety Tips – SAPS
  • Fences/Walls
  • Alarm Systems
  • Security lights
  • Safety Precautions
  • Access and Key Control
  • Communication
  • Safety in a vehicle/ Safety Awareness when parking / Aggressive driving behaviour

Cellular Phones

If you can afford to do so, have a charged backup cellular phone secure on the premises.

  • Ensure phone charged.
  • Ensure spare phone linked to Security Channel WhatsApp group(s)
  • Ensure spare phone has emergency numbers stored and SOS facility enabled
  • Ensure spare phone is hidden from intruders

Enable SOS emergency call on cellular phones (power button x3)

  • Even in an extreme emergency it is still possible to press the power button x3
  • Enable an admin contact on WA Security channel to test cellular phone SOS functionality. Once call verified, participants replace the contacts with their preferred security contact.
  • Messages are sent by Text along with 2 automated phone calls, 2 pictures from cell phone, a short voice note and Google location pin (depending on cellular phone model).
  • Enable the SOS emergency call on your children’s phones as well your domestic workers and other employees.

Live location sharing on cellular phones.

  • Enable live location in cellular phone settings.
  • YouTube or Google will provide instructive material for your cellular phone model.

Google Timeline

  • Register and enable Google Timeline.
  • Allows you to retrieve movements of cellular phone (traces vehicle movements if cellular phone in vehicle).
  • See https://timeline.google.com/

Tracking cellular phones (Phone location services without SAPS engagement)

Importance of cellular phones in tracking suspects or thefts or victims (if the victim is with the cellular phone).

  • Record you IMEI and MSIDN (Cellular Phone Number) of your handset and sim card and store securely for emergencies.
  • Google, Samsung or Cellular Phone manufacturer: “Find my phone” functionality using a web browser from any computer. Learn to enable this functionality and test it on an internet browser. Save your username and password on paper and place somewhere accessible.

Tracking cellular phones and location-based service (LBS) with SAPS engagement

Phone location services using SAPS (SAPS POCIM). Requires cellular number, IMEI or MSIDN numbers.

  • Where reasonable grounds exist to believe that a serious offence has been, or is being or, will probably be committed, SAPS and Cellular Companies (with the necessary subpoena from SAPS) are able to determine the following using cellular information:
  • Using location-based services (LBS), they are able to determine the location of the cellular phone (i.e., the cellular tower and site location from which the cellular phone has connected).
  • Able to determine whether either the handset (IMEI number) or the cellular number (MSDIDN number) or both are active and what SIM card (MSIDN number /cellular number) has been linked to the handset (every handset has a unique IMEI number).
  • A SAPS official conducting an investigation may make an application to obtain a directive through the relevant SAPS Provincial Office for the Control of Interception and Monitoring (POCIM) to obtain an urgent subpoena in terms of section 205 of the Criminal Procedure Act, 57 of 1977. Section 205 allows a Judge or a Magistrate, upon the request of a Director of Public Prosecutions or a public prosecutor authorized thereto in writing by the DPP, to issue a subpoena requiring any person (e.g., cellular company) who is likely to give material or relevant information as to any alleged offence, whether or not it is known by whom the offence was committed, to produce such information.
  • Such SAPS subpoenas can be obtained on an urgent basis. There are various safeguards in place to ensure that information obtained is authorised and validated. Where a victim is missing, the first 48 hours are critical.

I.C.E app (In case of emergency)

  • Enable and populate I.C.E app on cellular phone
  • Record family and medical contacts and next of kin
  • Record medical circumstances, diseases, medication, allergies
  • Allows for alarm calls

Real time location on WhatsApp

Share your real-time location with others


Children

  • Share your real-time location with family members when out.
  • Using the online cellular phone tracking facility, verify whereabouts of minors and family members

Domestics or employees

  • Share your real-time location with your employer when returning to residence or arriving for work
  • Using the online cellular phone tracking facility, verify whereabouts of domestics (with consent)

Motor vehicles

  • Photograph motor vehicles / motorbikes and bicycles.
  • Photograph motor vehicles / motorbikes and bicycles from all angles (incl. registration plates) for easy identification if stolen or hijacked. Store photos in the cloud or a device which cannot be stolen.

Machinery and equipment

  • Photograph machinery and equipment e.g. generators, solar panels, etc.
  • Photograph machinery and equipment from all angles (incl. identification numbers) for easy identification if stolen or being sold elsewhere. Store photos in the cloud or a device which cannot be stolen.

Perimeter Security Measures

What is perimeter security?

The perimeter of a building is the area around a structure or property. Sometimes the term perimeter security is used to describe all the security that prevents entry into a building itself. Most commonly, perimeter security means boundaries besides the exterior of a structure, such as walls and other fortifications.

1. Locks

One of the most important considerations, in terms of perimeter security, are the locks you are using. We will get a little more into this in the gate section, but right now I want to talk about what to look for in a lock-in general. The biggest concern for the locks you will be using with your perimeter security is often destructive entry. The most likely breach that a property is likely to experience will be forced entry, which simply destroys the lock to allow a criminal to pass the perimeter security systems. The solution to this threat is hardened metal alloys that are as thick as possible. You want the strongest materials and as much of those materials as possible.

In the case of perimeter security, what you are hoping to prevent by investing in locks that make use of hardened metal alloys are mainly cutting attacks. The widespread and historic use of padlocks on gates is part of the reason why they are a concern. Cutting the shackles of these locks is often the most effective method of entry. You must also consider the hasp or chain being secured by the padlock, as these may also be targeted by cutting attacks. If they are weaker than the lock, the strength of the lock will be inconsequential.

In terms of covert entry, many people worry that their perimeter security systems will be overcome by some form of lock picking. Every lock can be picked, but that is not usually the best place to spend time and resources on prevention. It is extremely unlikely that anyone will attempt to undermine your perimeter security via lock picking. It is exceedingly more common that bump keys will be used. For that reason, you should look into ways to protect against bump keys. These methods will also help to prevent lock picking, but again, that is a less pressing concern. Internal complexity for locks will help your perimeter security in general and help to stop unauthorized key duplication (but we will talk more about that in the access control section).

Key Takeaways:

  • A lock should use strong metal and be as thick as possible where possible.
  • Criminals will most likely to break a lock or whatever is weakest on a gate or door.
  • Lock bumping is more or a covert entry concern than lock picking.

2. Walls

Unlike a fence, a wall has a certain innate restrictive relationship between visibility and height. The higher the walls, the less visible the interior will be from outside the perimeter, and the less visible the outside of the perimeter will be from the interior. The height allows for privacy and creates a greater obstacle to illegal entry, but a limitation on visibility means greater cover for anyone approaching the property. Both visibility and height have something to offer to perimeter security, but you must determine which works better to achieve your goals.

One of the largest goals you are looking to achieve with perimeter security, and security in general, is to come in “at” or “under” budget. With a high wall, visibility concerns can be tackled with security cameras or other forms of documentation, such as security guards. Documentation is a key consideration regardless, but it is also one of the most costly, complicated, and time-consuming. In the case of residential perimeter security, these additional steps may not be feasible.

It all comes down to the intention of your perimeter security. Ideally, a wall is offering you a sturdier barrier than a gate, which will force people to go over it if they mean to enter illegally. This type of controlled vulnerability allows for more fine-tuned perimeter security planning. You are experiencing greater privacy as a result of the solid boundary and concentrating the focus of forced entry onto the gate.

Key Takeaways:

  • With walls visibility is sacrificed for height and vice versa.
  • The way around low visibility is better documentation and monitoring.
  • Walls offer greater resistance to force than many gates.

3. Fencing

There is extreme flexibility in having the forefront of your perimeter security be a fence. The price, look, and functionality of a fence have an almost unparalleled range. The perforations and openings between slats, links, planks, etc., can offer extreme visibility or a wall-like appearance. You can grow ivy, or other plants, to change the level of visibility of pre-existing fence without having to undergo full replacement. In extreme cases where you need to increase perimeter security, the most common fences are easier to electrify (but this will vary on the material of the fence).

It is likely that a fence will be weaker than a wall, but if you are not concerned with automotive ramming threats, this may not be a factor you care about. This type of protection will vary, but often a fence can be compromised at certain points (either by vandalism or wear), and create unintended entryways that defeat all of the existing perimeter security measures. Even if these openings are not wide enough for a human being, your perimeter security could be vulnerable to animal infestation, or pet escape.

A fence is similar to a wall, but it uses a post based system that commonly has material lined along the posts to shape the appearance of the fence. Wood fences and chain link are the most common fence types. Often a fence is intended to denote that people should go not father, or are simply intended to denote a property line. They provide little security on their own, but with electrification or barbed wire, they become somewhat formidable. A fence alone is very rarely high-security.

Key Takeaways:

  • Fences have many options in terms of both security and privacy.
  • A fence can break down easier than a wall due to wear, neglect, or vandalism.
  • Fences without additional security are mainly a suggestion of protection.

4. Gates

I have written an entire piece about gate security, but there are certain factors that should be highlighted more precisely in terms of the role gates play in perimeter security. Your gate is the chance to make a moving boundary in your perimeter security. Simply put, a gate is a moving section on a gate or wall that allows entry past a building’s perimeter security systems. Without a gate, there would be no exit or entry past the perimeter of a building.

The gate will need a locking mechanism. In the locks section, we have already talked about the considerations for the locks themselves, but it is still good to know when each type of lock can be used. If you are planning on taking vehicles past the perimeter security, it may be ideal to use a motorized track and electronic lock. For gates that will not have heavy traffic, or only have foot traffic, choosing a high-security padlock may be what you need. There may also be a gate setup that allows you to use a deadbolt and/or keyed handle/knob.

Building effective perimeter security systems means focusing on security and not convenience, so a keyed handle/knob is not ideal to secure a gate. A deadbolt provides more security based on the way the locking mechanism prevents simple bypass techniques. However, you need to consider the strength of the deadbolt you are using. All of these lock-based gate considerations will give you more insight on what you need for the gate, in terms of height and defence. If your lock is too strong, the gate itself will be the most likely target for forced entry, even if that forced entry is simple climbing over the gate.

Key Takeaways:

  • A gate is the boundary that moves to or stays secure to deny and allow access past a perimeter.
  • Gates will likely use electronic locks, padlocks, or repurposed door locks depending on the type of traffic that will pass through the gate.
  • If the gate is secured to well, the material of the gate may be attacked or moved over.

5. Lighting

An often overlooked aspect of perimeter security is the type of lighting being used. If you have not considered what your perimeter security system is offering the property in terms of lighting, the first aspect to assess is shadows. When the perimeter has trees, pillars, and other tall obstructions, even the strongest lights can leave exceedingly dark shadows. Lighting provides the opportunity to see an intruder approaching or attempting to overcome your perimeter security.

If you do not have someone constantly monitoring the perimeter, motion sensor lights are effective in focusing attention. This is the choice of many residential buildings without any security patrols. When residents need to notice and deal with threats, a light suddenly turning on does a good job of gathering some attention. If this light is in front of a perimeter wall, or obstructing fence, inhabitants within the business may not be able to see the light. In cases like this, you will be looking to gather the attention of neighbours or pedestrians.

The further removed a person from caring about you is, who sees something suspicious illuminated by the lighting of your perimeter security system, the less likely they are to intervene. Everyone has some interest in preventing a crime from occurring, but when a neighbour does not know about the threats, inhabitants, and goals of your perimeter security, people make excuses for doing nothing. By and large, people are looking to avoid confrontation. If they do not know you, or even like you, help with these perimeter alerts is doubtful.

Key Takeaways:

  • Even the best lights can create shadows, which allow criminals to hide.
  • Motion-activated lights are effective in getting attention if their light is not obscured by a wall or obstruction.
  • If you cannot notice what is happening in the light, you need neighbours and pedestrians to be concerned about you.

6. Alerts and Notification

You have to be informed about breaches or attempted breaches to your perimeter security system. A common question is, “Should I get a dog or an alarm system?” You can get both, but the answer to that question is going to ultimately come down more to your ability to take care of an animal than it will the security offered by either. In terms of alarms for your perimeter security system, the best option is something that offers monitored security. Services with monitoring capabilities allow the authorities to be notified in times of emergency.

Contacting a private security company or the local police automatically are effective only if their response times are within the average time it takes to commit a break-in. They must also be prepared to face a confrontation with the criminal(s). If you are planning to respond to personal alerts given by your perimeter security system, you must be able to meet these standards. Without this type of response, notifications are rather unnecessary. An alarm that is loud may be preferred to alert anyone who is around to the illegality taking place.

In terms of a perimeter security system that has notification capabilities, you can choose to go with something more discrete such as a smart lock. There are several features that you should look for when choosing a smart lock, but one that can offer greater perimeter security is access notification. This allows owners to know when a lock has been opened. This data log is perfect if you are concerned with internal threats.

Key Takeaways:

  • You need to have a way of being alerted to a crime or breach of security.
  • Whoever is alerted must be able to respond in a timely and effective fashion.
  • Smart locks can log who accesses a lock and when.

7. Documentation

In this current age, the most likely perimeter security systems are going to rely on security cameras. This is largely due to the increased access to these products, which simple DIY surveillance cameras have created. These products have a level of quality that makes them very effective in capturing footage of threats to your perimeter security. But for how popular this proposed solution is, it is not enough to simply have recordings of your property. For instance, installing an outdoor security camera does not necessarily mean burglars will be deterred from committing any crime.

Knowing the basics of what you can film with a camera will provide a good foundation. You need to stay on the right side of the law with all of your documentation efforts, or you will risk losing any type of effectiveness for this type of perimeter security system. It is also important to know the intentions of your documentation efforts. If you are hoping to use this information to prosecute or find criminals or trespassers, this can be exceedingly difficult. Using the footage to achieve a conviction or even an arrest, has many issues.

Besides your evidence being on trial and the difficulty of solving property crimes, setting yourself up for clear usable footage is no easy task. You need to get the right type of camera that has the capability to record in the environment it is in. Issues with glare during the day and visibility during the night (or the transition of perimeter lights turning on) are very common in making footage unusable. And in terms of placement, you must have a location in mind that is most likely to be targeted, or you will need a lot of cameras.

Key Takeaways:

  • Recording the boundaries of your property is not enough on its own to constitute security.
  • You must know what you can do, cannot do, and intend to do with your footage.
  • Camera placement effects what is captured in terms of usability of footage and the actual documentation of a crime.

8. Natural Barriers

There are many natural elements that can affect your perimeter security system positively and negatively. A positive natural barrier is something that offers another level of perimeter security to the property. In the days of castles, this would be things like having an ocean or cliff face behind a structure, severely limit options for an approach. In the current age, these natural protections can be things like proximity to a police station or a single long road that leads to your home. Anything additional your location offers your perimeter security creates a positive natural barrier to criminals.

There are also natural barriers to your security, that prevent you from being able to take full advantage of your possible perimeter security system. There may be a treeline on a side of your property that allows criminals to cover their approach with no real way of detection if the area in question is too large. Heavy foot traffic may make light sensors and motion-based cameras alert you to so many false alarms that this becomes a hassle without offering any security.

You need to know what is working for you and what is working against you. Capitalize on the positive barriers and try to compensate for what you cannot change in terms of negative barriers. Do not use a method of perimeter security just to use it. Unhelpful investments that are undercut by natural barriers often lead to perimeter security system fatigue. When you use something without considering if it is the right choice for your property, it can make you feel like nothing you do is good enough. Do not discourage yourself from taking the necessary steps in perimeter security.

Key Takeaways:

  • If the location of your building offers you greater security, it has a positive natural barrier.
  • Negative natural barriers prevent the effectiveness of certain types of security precautions.
  • Be aware of how negative natural barriers may affect your security, and make sure you do not invest in technology that will be made ineffective.

9. Aesthetics

As great as it would be for aesthetics not to matter with your perimeter security system, it is likely not the case. What is practical is rarely pretty. Visually pleasing practical security often comes at a much higher cost. The consideration for aesthetics is to find a balance. Leaning towards something that is pleasing on the eye, and considering perimeter security as an afterthought, is dangerous. A good test you can give yourself is answering the question, “Am I doing this so the property will look good, and then looking for a way to incorporate security? Or am I trying to make the security I need look good?”

The ideal answers are “No” to the former and “Yes” to the latter. There are of course exceptions, and never doing something because it looks good, for the sake of aesthetics, is near impossible. But when something is being done for appearances it is important to look at how it affects your perimeter security. You would never want to wear clothing that raised the chances of being set on fire just because they looked good. So why would you risk the safety of your property simply for appearances? If you do something just to look good, make sure it is neutral and not a detriment to your perimeter security systems.

Key Takeaways:

  • Practical security often sacrifices a pleasing appearance.
  • If you do something purely because it looks good to you, make sure it only has a neutral effect on your security, or even try to achieve a positive effect.

10. Access Control

Who has been given access to the property is a very important part of making your perimeter security systems work to your benefit. Key control is a good starting point. In the case of perimeter security systems, keys could be numeric codes, RFID remotes, physical keys, etc. If you are using codes or even biometric locks, your access control management software may make it quite simple to know who is entering the property and when. If there are any issues, it may also be rather simple to revoke the privileges of troublesome individuals.

The first thing you need to consider for who you chose to give access to is trust. Not just trust that they will not take advantage of your property, but also trust that they will be smart, and take the right precautions to protect their key from being stolen or misused. Every person with access to property has the potential to undermine any of the perimeter security systems. And the property owner is not immune to creating that potential harm.

Key control for physical keys can be taken care of by investing in locks with patented keyways. This will improve your protection against most forms of covert entry, but mostly it will prevent unauthorized key duplication. Patented keys cannot be made at your local hardware store’s lock isle. The key blanks and key cutting machines that can make these keys are disrupted to only certain vendors. And those vendors need to go through the lock manufacturer to make a key. This is much better than keys with “DO NOT DUPLICATE” markings, which do not reliably prevent unauthorized key duplication.

Key Takeaways:

  • Who has the keys to your security must be vetted to find if they are endangering your property’s safety.
  • People with access must also be selected for how they will protect their access from being stolen or hijacked.
  • Patented keys better prevent unauthorized key duplication and assist in keeping access in the hands of the right people.

Conclusion

Now that you know some of the things you must consider with your perimeter security systems, you can make your building a formidable fortress against break-ins and unlawful entry. Stand up to the threats facing your building by taking the steps towards better perimeter security. Once you are protected, you can rest easy knowing that the things that could harm you, your possessions, and the people in your life are being held at bay. If you need help creating your own security plan, or implementing any security measures, never hesitate to reach out to a locksmith or security professional.

Sourcewww.unitedlocksmith.net

See also

 Animals and livestock security measures


Basic security precautions when you live in a remote area – SAPS

see also various posts at Farm Security Measures

Do the following to ensure safety and security in remote areas:

  • Know your neighbours and maintain good relations with them.
  • Know which security services and community-based crime prevention initiatives are available in your area, and know how to reach them in case of an emergency.
  • Have the contact details of the security companies, community-based watches, emergency services and the police station, readily available.
  • Have alternative means of communication in case the telephone lines and cellular phones are not working.
  • Become part of the crime prevention programmes initiated by the South African Police Service, and the community.
  • Have sound relationships with all role players involved, and know who to contact in case of an emergency.
  • Consider establishing a neighbourhood watch in your area, or become involved in the existing neighbourhood watch.
  • Participate in simulation exercises with the South African Police Service to test the effectiveness of the response to incidents.
  • Maintain sound safety measures and habits at home, and inform your neighbours, the South African Police Service and the community-based watches of any suspicious behaviour and activities in your area.
  • Ensure that all doors (including security and garage doors), are locked at all times, and that windows are closed when you are inside or not at home.
  • Keep a register with the details of all persons on the premises, including workers, and do not allow unnecessary access to the premises.
  • Regularly clear the area around your house of bushes and clean the premises and all possible hiding places. Lock away all tools and implements.
  • Be vigilant and ensure that all persons on the premises, including workers and visitors, are also vigilant and know what to do in case of suspicious behaviour and/or an emergency.
  • Do not react blindly to any suspicious activities, especially not at night.
  • Do not keep a large sum of cash and/or valuables on the premises.
  • Ensure that additional safety measures have been implemented if you are selling any products from the premises.

Home Safety Tips – SAPS 

Fences/Walls

  • A high fence around the house with lockable gates, is much safer than a high wall due to the advantage of the improved visibility it provides.
  • The primary aim of the fence is to make access/intrusion difficult and to allow dogs to move freely around the house.
  • Ensure that your gates are locked at all times and that the keys cannot be reached easily and are not lying around uncontrolled.
  • Security gates with sturdy locks in front of each outer door as well as burglar proofing covering all windows, are recommended.

The following devices prevent easy access:

  • Window bars
  • Security doors
  • Security gates
  • Razor wire
  • Additional locking devices on doors
  • Strengthening of doors
  • Peepholes in the doors
  • Safety chains to doors
  • Intercom system between the home and gate, front door or garage

Alarm Systems

  • An alarm system, preferably connected to an armed response company, can act as an effective deterrent.
  • In the rural environment a siren/alarm on the roof that can be heard over a long distance and that can be activated by means of a switch/panic button in the house, is recommended.
  • A few switches/panic buttons in different rooms of the house should preferably be installed.
  • An alarm must also have the capability to warn the occupants of any intrusion into the house.

Examples of alarm systems:

  • Mechanical and/or electrical (purchased types)
  • Improvised systems
  • Threaded tins
  • Threaded pieces of iron
  • Gravel on window pains, pathways or around the home
  • Obstacles that can make a noise when moved
  • Biological Systems:
    • Dogs
    • Geese
    • Ostriches

Security lights

  • Security lights on the outside of the house improve the physical protection of a house, farm or smallholding.
  • The lights must be directed away from the house and must allow the occupants to use the windows without being observed from outside.
  • Be aware of possible shadows and blind spots.

Safety Precautions

  • Ensure that all doors are locked at all times, and that windows are closed when you are not at home.
  • Large dogs serve as a deterrent. At least one dog should be trained to sleep inside the house.
  • If you leave your residence, inform your family/ neighbours of your intended destination, time you expect to return and the route you will be driving, especially if you reside in a rural area.
  • Ensure that tools such as axes, spades, picks, ladders, etc that can be used in an attack, are locked away when you do not use them.
  • Vary your daily routine.
  • Get into the habit of not immediately falling asleep after switching off the lights.
  • Remain awake for a while.
  • You should not be visible in the bedroom from the outside when you are asleep.
  • Always keep a torch nearby at night and when you use it, ensure that you do not give away your position.
  • If you are unsure about the security status of your home after returning from work/a visit, eg your dogs do not come to the gate, do not enter your home.
  • Contact your neighbour to assist you in securing your home.
  • Identify relatively safe places of refuge, ie: bathroom, toilet or storeroom.
  • The fewer windows and doors these rooms have, the better.
  • Involve employees as they are part of the family/team.
  • Employees must be involved in maintaining security on an equal footing.
  • Report suspicious behaviour and information to the South African Police Service.
  • Clear the areas around the gates of bushes and other hiding places.
  • Take photographs of all employees.
  • It could be to your advantage to identify them, if required.
  • Remunerate your employees when useful information is provided that contribute to the prevention of crime.
  • Do not employ casual workers without a reference.
  • Keep copies of all your employees – Identity Documents (ID’s).
  • Ensure that you have a good relationship with your neighbours so that you will be in a good position to support and help each other.

Access and Key Control

  • Do not allow strangers on your premises or in your house without having properly identifying the person, especially at night.
  • Implement proper key control measures.
  • Identify keys by means of codes instead of indicating in writing on labels to which gate/door access can be gained.
  • Keys to the safe must be kept on the person.
  • Never hide any keys in traditional places, such as in pot plants or under doormats.
  • Keys in the keyhole on the inside of the front or back door should be turned to avoid easy removal.
  • Never allow strangers to handle keys or look at key numbers.
  • Change locks when keys are lost.
  • Insert barring devices in door locks.
  • Remove keys from doors when leaving.

Communication

There should be two systems for alternative back up:

  • Telephone
  • Cellular phone

Have the telephone installed where it is easily accessible from anywhere in the house.

Inform your children not to give an indication that adult supervision is not available when they answer the phone.


Safety Awareness Vehicle – SAPS

Crime Prevention : Safety Tips Safety Awareness in a Vehicle

  • Ensure that your vehicle is in a good condition when you plan to go on a journey.
  • Ensure that the fuel tank of your vehicle always has sufficient fuel.
  • Always lock your vehicles doors and keep the windows closed.
  • Do not leave your vehicle unlocked, even if you think you will be away for only a minute.
  • Avoid to stop at remote places.
  • Park your vehicle in places that are well lit.
  • If a stranger wants to talk to you while in your vehicle, do not open the window wide -only 5 cm is enough to have a discussion.
  • If something seems suspicious, do not talk to strangers, rather be rude and drive away.
  • Limit your trips at night or at least take someone along with you.
  • Vary the route you travel to work and back, if this is possible.
  • If approached by a stranger while in your car, drive off if possible or press your hooter to attract attention.
  • If strangers loiter near or at your driveway, rather drive past. If they loiter for a long time, report it to your nearest police station.
  • Car jackers may stage a minor accident so they can approach your car.
  • If your car is bumped from behind and you do not feel comfortable with the individual(s) involved in the situation, drive to the nearest police station for help.
  • Do not reach for your purse or valuables. Leave everything behind if forced from the car.
  • Your life is more valuable than your possessions.
  • Do not resist, especially if the thief has a weapon.
  • Give up your vehicle with no questions asked and move away.
  • A lift club limits the risk of becoming a victim of crime.
  • Do not give strangers a lift.
  • A gear lock is an affordable and a very effective anti-theft device.
  • If possible, put up a mirror against the front wall of your garage to see if someone is following you into the garage.
  • Do not open your garage doors before your gates are closed.

Safety Awareness when Parking/Driving your Vehicle

  • Avoid parking your motor vehicle where there are no security officers guarding other cars.
  • Do not leave your firearm in the motor vehicles glove compartment (cubbyhole) or anywhere in the vehicle when you park the vehicle (this is against the law!).
  • Make sure that all the doors and windows are properly locked when you park your car.
  • Valuable items like a laptop and camera should be put in the boot of your car.
  • Be aware of people coming to you and informing you that you have a flat tire, the intention can be to steal items that they see inside the car or rob your car.
  • Always close your windows when driving in the city centre.
  • Do not open your windows for hawkers along the road and at the robots.
  • Keep the doors locked and windows closed at all times.
  • Do not use a cellular phone unless you have a hands-free kit.
  • Lock your valuables in the cars boot before departure.
  • At night, park in well-lit areas.
  • If in doubt about the safety of an area, phone a police station for advice.
  • Practice the same prevention skills you apply in parking lots or garages at home.
  • Become familiar with your route before you start the trip.
  • Get a map of the route and study it.
  • Store luggage in the cars boot where it is out of sight.
  • Do not leave your goods/valuable items visible in the car.
  • Do not leave your handbag/briefcase visible in the car.
  • Do not leave your keys in the ignition.
  • Always lock the doors and close the windows when getting out of the car.
  • Remove detachable radios and the radio=s face when getting out of the car.
  • Try to fit an alarm and/or anti-theft device in your car.
  • Have your keys ready in your hand as you approach your car, especially if they are difficult to find in your handbag.
  • Parking lots with a parking attendant or supervision/ someone patrolling are best, otherwise try to park in locations that are well lit and/or well populated and not crowded by bushes or buildings where offenders might hide.

Additional Precautions when driving

When approaching any of the intersections surrounding Laezonia / Doornrandje (Summit & R511 / William Nicol Dr at Diepsloot; R511 & R114 N14 offramp by Lighthouse Settlement; R511 & R114 by Engen; T511 and M26) and any others leave at least two vehicle spaces between you and the next vehicle and also approach the intersection while slowly driving forward in gear).

Follow these precautions: (from Fidelity Security – https://rekord.co.za/428070/security-company-reiterates-warnings-of-being-vigilant-when-in-traffic )

  • Lock all your doors and close the windows when driving.
  • Keep your valuables in your boot and remember to lock it. Remember suspects can steal your valuables from under your nose if you are standing still in traffic.
  • Never open vehicle windows or doors for strangers.
  • Avoid opening your windows or getting involved in discussions with street vendors or anyone handing out flyers.
  • Be constantly on the lookout for suspicious activity and trust your instinct.
  • Always be conscious of your surroundings and remain alerted when coming to an intersection or stopping your vehicle.
  • A useful tip is to leave your window open about 3cm while in heavy traffic. This allows the window to absorb most of the impact by being less rigid while not leaving enough room for the criminal to stick his hand through. Alternatively, most safety organisations suggest motorists fit their windows with a polycarb film. These can be tinted so that no one can see into the car, while also preventing the windows from shattering.
  • Be wary of people standing at intersections. They may be innocent, but perpetrators mix with these people while waiting for an opportunity to pounce.
  • If you encounter obstacles such as rocks or tyres, do not get out of your vehicle to remove them. Reverse and drive off in the opposite direction.
  • If it is late at night, slow down well in advance so that the light changes to green by the time you reach the intersection.
  • Leave a gap between you and the car in front of you to give you room to escape if anything should happen.
  • Do not have bags, cellphones, briefcases or other valuables visible inside the vehicle. Valuables only attract thieves who may break your car window.

Road Safety: Aggressive Driving Behaviour

The followings aspects might trigger aggressive behaviour:

  • Following too close to the vehicle in front.
  • Passing vehicles on the left.
  • Cutting in and out of traffic and failing to signal while engaging in multiple lane changes.
  • Crossing safety markings while merging onto ramps.
  • Failing to yield at ramps and intersections.
  • Violating railroad crossings.
  • Displaying or using a weapon.
  • Displaying aggressive or obscene gestures.
  • Slow moving traffic in fast lanes, etc

The following hints are applicable:

  • Do not react to provocation.
  • Stay away from erratic drivers.
  • Avoid eye contact with an aggressive driver.
  • Use your hooter sparingly.
  • Do not flash your headlights.
  • Do not make obscene gestures.
  • Do not change lanes without using your indicator.
  • Do not drive too close to the vehicle in front of you.
  • Do not block lanes

See also:

https://www.saps.gov.za/alert/index.php

Views: 237

Newsletters

Mayor Cilliers Brink and the TMPD

Social Services

Older Persons – Elder Care

Newsletters

Ongoing security risk posed by derelict building, a resident takes action

Newsletters

Illegal fuel depot operation placing residents at risk, action taken

Newsletters

Vigilant residents take action against illegal LP Gas depot in Scheepers Street, Laezonia

Crime Reported in Press

Hijacking and Kidnapping

Bylaw Infringements

Fireworks – Tshwane Office for Community Safety

Security Suppliers

Solar PIR Alarms

Newsletters

Community Camera Update

Newsletters

Camera Status Update

Vetinarians

Dog Poisoning is a criminal offence

Newsletters

UPDATE – COMMUNITY CAMERA INITIATIVE

Newsletters

What to do when pulled over by SAPS or Metro

Newsletters

Erasmia CPF elected

Newsletters

Appeal to all Residents