Personal Security

Motor vehicles get stolen every few minutes and every day. Here are some tips to slow and prevent would be thief.  

1 Never leave keys in the ignition when you leave the vehicle unattended. It just screams out steal me.

2. Before going away from your vehicle and leaving it unattended make sure all windows and all doors are locked. Sounds simple but many people don't do it.

3. When paying for fuel lock your car, this stops theft not only stealing your car as well as any personal items from the vehicle such as your new iphone.

4 Never leave valuables with view, such as a laptop, iphones, coins, take them with you or lock them in the boot.

5 Never leave tage on your car keys which have your home address attached to it. This gives the thief another chance to rob you.

6 Never hide a spare key around or on your car at home or the beach. Use a safe key storage box to secure your car keys.

Theft from your vehicle needs to be reported to your nearest Police Station or call the Police Assistance Line (Pal)

Products which helps in the prevention of car theft

1 Starter ignition fuel systems.

2 Immobilisers

3. Door Locks

4. Bonnet Locks

5. Alarm System

6 Ignition Shields

7 Parking Barriers

8. Steering Wheel Locks

9. Transmission Locks

10 GPS trackers, vehicle monitoring services and devices.

If all the above fails get your mother in law to stand guard :-)


Securing your Garage.
A few tips to keep your garage secure:
It is important to cover or frost over your garage window, the reason behind this is that burglars will not be able to see if your car is at home or not. If the window can be open install a window lock.

Important to have your garage door closed and locked. This prevents an opportunist thief or burglar from entering your garage and home.
A good idea is to have a peephole installed in the door that separates the garage from the house and have this door locked at all times as well. In the event of suspicious sound heard in the garage you can check through the peephole without entering the garage.

Secure your garage and home with an alarm system. Install a PIR Sensor in the garage and activate the unit during the night to give you peace of mind. If some enters the garage area the PIR will pick up the person and activating the alarm system. If you have Pets that live in the garage install a Pet Sensor.

Home Keys Tip
Years ago people would leave the spare house key under the front door mat, in a pot plant or even under a fake rock in your front garden.

This might have worked well back 10-20 years ago but it's not good enough in today's environment.Your home insurance policy might be voided by your action of hiding your keys close to your home. Always check your home insurance policy before taken this type of action. We do not recommend this at all.

A good place for a spare is key to home should be kept at a trustworthy friend or neighbour. If you are the type of person that locks themselves out all the time, it might be a good idea and time to invest in a keypad or fingerprint door lock. This will save you on call out fees from the locksmith.

Cybersecurity Tips
Always use secure passwords and never share them with anyone. Avoid using common words, phrases or personal information such as such as nicknames, date of birth and regularly update and change your password.

Your operating system needs to be updated all the time as well as any anti-virus and other important software. Your security patches and upgrades are available and free from major companies and vendors that supplied your software .

If you are being asked to provide information (personal) via email contact the company that if requesting such information directly to ensure its authenticity.

Always pay attention to a website URLs. Malicious sites sometimes use a variation in common spelling or a different domain (for example, .com instead of net), this is intended to deceive unsuspecting computer users.

While travel in your vehicle keep your windows up always keep the doors locked. Any time you drive through areas containing stop signs, traffic lights or anything that significantly reduces vehicular speed.

You must leave plenty of manoeuvring space between the vehicles in front you and your own. If you are approached by suspicious persons while you are stopped, do not roll down windows; drive away quickly.

If another vehicle tries force you to pull over or to cut you off, keep driving and try to get away. Try to obtain note the license plate number of the car and a description of the car and driver. If this effort places you in danger, don't do it. The information is not as important as your safety.

If you being followed never drive back to your residence or stop and get out of the vehicle. Drive to the nearest police station or public facility.

If you are traveling alone and a car "bumps" into you, don't stop to exchange accident information. Go to the nearest service station or other public place to call the police.

Never, ever pick up hitchhikers.

Internet Scams 
We all know about the Nigerian Scam whereby you receive an email from the Finance Minister from Nigeria stating that they need to transfer million's off dollars out of their country to a safe place and in return you received a great some off money.

What they require from you is your bank account details, address and your name; once you send that off, at that stage you have lost your identity.

With the advancement of the internet the scams have become more sophisticated and more complex and it will go along the lines of:

You open up your email account and notice an email from your financial institution. This email looks authentic, having all the logos, advertisement and your full name They include a link for you to log into your account.

This should be your warning queue that something is wrong. Rule number one is never ever log into an email that you receive from your financial institution, your bank will never send an email with a log in section ,delete the email and bring up another browser and type in the website location yourself.

Once you are at your own financial institutional web site, at the top off the screen in the address bar you will notice that the letters you type in for example and you want to log in to your account it changes

The https indicates that the site is now secure access. Furthermore you will notice that a lock symbol on the top right side of the address bar is in the lock position and this indicates that it's a secure site.

What is CPTED ?
Commonly known as CPTED, (pronounced "septed") it is a pro-active crime prevention strategy utilized by law enforcement agencies, planners, architects, security professionals and everyday citizens.

CPTED operates on the belief that the proper design and effective use of the built environment that can lead to a reduction in the fear and incidence of crime, and an improvement of the quality of life.

The goal of CPTED is to reduce opportunities for crime that may be inherent in the design of structures or in the design of neighbourhoods.

Applying CPTED starts by asking what the designated purposes of the space are, how is the space defined and how well does the physical design support the intended function? Only then, can effective design or problem solving begin.

CPTED is common sense. There are four underlying
CPTED concepts:
1. Natural Surveillance
2. Natural Access Control
3. Territorial Reinforcement
4. Maintenance
1. Natural Surveillance

Natural surveillance is a design strategy that is directed at keeping intruders under observation. Designing for natural surveillance involves providing ample opportunity for legitimate users, engaged in their normal activities to observe the space around them. Natural surveillance is the placement of physical features and/or activities, and people that maximizes natural visibility or observation. Glazing and proper placement, selection, and maintenance of plant materials should be considered to maximize natural surveillance opportunities.

2. Natural Access Control
Natural access control is a design strategy that is directed at decreasing crime opportunity. The primary goal of an access control strategy is to deny access to a crime target and to create a perception of risk to the offender. It does this by using design features to deny offenders access to targets, reduce escape opportunities and guide legitimate users through the environment.

3. Territorial Reinforcement
Territorial reinforcement is a design strategy that realizes that physical design can create or extend a sphere of influence over a property. Territoriality is a concept intended to clearly delineate a space as public, semi-public, or private space and to create appropriate ownership of that space.

This sense of ownership, fosters a behaviour that challenges any abuse or unwanted acts that may occur in that space. It further creates an environment where strangers or intruders stand out and are more easily identified. Territoriality often embodies natural surveillance and natural access control strategies. Maintenance is an important part of territoriality.

4. Maintenance
Maintenance allows for the continued use of a space for its intended purpose. It also serves as an additional expression of ownership. A well maintained home, building or community creates a sense of ownership, which helps to deter criminals. A good maintenance strategy directly impacts the fear of crime in a community due to residents' perceptions of responsibility and caring in the neighbourhood.

Good lighting is one of the most effective crime deterrents. When used properly, light discourages criminal activity, enhances natural surveillance opportunities, and reduces fear.

The type and quantity of light required will vary from application to application. To the degree possible, a constant level of light providing reasonably good visibility should be maintained at night. The object is to light up the criminal without spotlighting the victim. Lighting also has the ability to influence an individual's feelings about his environment from an aesthetic as well as a safety standpoint.

Your Neighbourhood and Crime.

If you reside in an area with high crime activity, consider installing bars on any ground windows which are accessible by a person, bars are a visual deterrent and signs of physical security in place. Also consider installing CCTV cameras around your home and place warning notice that your home is under CCTV surveillance.

I have never met a criminal that wants to be identified. Secure your CCTV recorder (hard drive) in a place or room which is hard to gain access to and which is hard to locate. This is in case a criminal manages to break and enter into your premises they cannot locate and remove this unit.

A Safe home is having a safe neighbourhood, get involved in your community that looks after each other, your neighbour looks after your property when you go away and vice versa, a strong community has a better chance of repealing any criminal element. Working together with the Police, Council Law Enforcement Officer, Hired Security Service and Neighbourhood watch programs will reduce common crime in the neighbourhoods.

Furthermore your home should have a fire-proof rated and water proof safe to protect your higher end valuable such as passport, title deeds, bonds, precious photo's, jewellery, cash or irreplaceable items.

A good idea is take pictures with your digital camera or mobile phone of your entire item within your home. In the event of a home fire and your home is destroyed you have proof that you purchased have the items that you going to claim.

It might seem, as a long process of taking pictures of very thing but it will we worth it. The insurance companies will not pay for anything that you have not included and pictures tell a thousand words. Also take pictures of invoices to for additional proof and keep a copy in your safe, on your free secure digital cloud storage and a spare copy at a friend's place.

Internet Browsing 
Microsoft's Internet Explorer, Goggle Chrome, and Apple Safari all collect information on virtually everything you do. Mozilla Firefox is somewhat better, but still not safe enough for us.

Therefore, we have switched to Tor (

Speed is sacrificed, as the Tor browser is nowhere near as fast as the mainstream browsers. The trade-off is you surf the Internet, shop online, and do your online banking securely and anonymously.

You are not tracked. The fact is that it's so secure that it's the first choice among journalist that work around the world. It uses a network of virtual tunnels that allows you access to the Internet without compromising your privacy and whereabouts.

Personal Security - What you can do to protect yourself when you are on the Internet.

As you might be aware that the recent exposure by Edward Snowden who is a former technical contractor for the United States National Security Agency (NSA) and former employee of the Central Intelligence Agency who leaked details of several top secret-secret U.S. and British government mass surveillance programs to the press.

These included the interception of US and European telephone metadata and the PRISM and Tempora Internet surveillance programs. I receive dozens of emails from concerned readers a day as to how to protect their privacy online. So in today column, we will talk about what steps you can take to protect your privacy from prying eyes of all kinds of entities when you surf the Internet, send emails or when your on the mobile phone.

1st - Digital Storage.
We no longer keep storage local on our computer or local network. You ask Why? Local Storage is not secure. Anyone person can hack into your computer or local network.

So now all our digital records are off shore, encrypted and in the cloud.

We use Wuala
The servers are maintained in Germany, Switzerland and France, none of them will cave in to a subpoena. Everything you store is encrypted by the company and you are the only person who can access your own data as you have the password. So you better not loose your password they will not send you one back.

Wuala offers 5 gigabytes of free online storage. Easy to use software and interface. Download, store your files and encrypt. A Mobile app for smart phones can also be downloaded. Wuala uses the strongest encryption an SSL secure communication channel for receiving and transmitting, and AES-256 encryption for all your storage and AES-256 is military grade encryption. You can access your files from anywhere in the world and on the go.

2nd- Email
We have not moved our email over yet, the reason is offshore email service providers are very few and far between. As we get more than 50 emails a day on average and we keep our calendar on email as well, we want to me sure we switch to the right system.

The two preferred candidates are Neobox ( there servers are in the Netherlands and Swiss Mail ( and again in Switzerland.

Internet Browsing
If you want to search the internet with out having your data stored and your search results recorded we recommend the search engine DuckDuckGO.

DuckDuckGo provides zero tracking, it doesn't use cookies or store data about its users IP addresses, does not offer user logins.

Personal Security - Self Defence
Every day in the media we hear and see that assaults and attacks upon person are increasing, not only here in Australia but also around the world. Don't be the next statistic we recommend that everyone undertake a self-defence course.
We at Jacksonville Sydney Security Service (JSS) recommend Krav Maga.

What is Krav Maga?

Hungarian-Israeli marital artist Imi Lichtenfeld developed Krav Maga, it is a non-competitive tactical self-defence system further developed in Israel that uses a combination of martial arts techniques such as Judo, Jiu-Jitsu, Wing Chun, Muay Thai as well as boxing, wresting and grappling.

Krav Maga is known for its focus on real world situations and extremely efficient and effective counter attacks.
Krav Maga has a philosophy emphasizing threat neutralization, simultaneous defensive and offensive manoeuvres and aggression.

Krav Maga is used by Israeli Defence Forces both regular and special forces and several closely related style has been developed and adopted by Law Enforcement and intelligence organization such as Mossad and Shin Bet.

Click here for Krav Maga Training Location in Sydney
Click here to watch a Demo Video for Krav Maga

Personnel Security Tips

When going out at night always go with someone or in a group, if this is not an option and you have to travel by yourself, use a taxi to get to your destination.

Walking alone always use well-lit and high traffic area, never use back street or areas that are known to be trouble spot.

Identity Theft

Identity theft is obtaining someone's personal details e.g. name, address, birthday and other personal details pertaining to that person and using those details for fraudulent criminal activity in pursuit of financial gain or benefit.

What can you do to protect yourself from identity theft? Identity theft occurs when a thief walks past and removes your letter such as master card statement or utility bills from your letter box that have been poorly designed, for example the mail box is too small and your mail exposed.

If your mail box is too small you can rent a PO Box from Australia Post and have your mail re-directed to that PO Box. Secure your letter box with a pad lock. Any utility bills or any mail that contains your name, date of birth and accounts numbers that you intend to throw into the garbage needs to be put through a shredder first, we recommend a Micro Shredder as any paper work going through this unit comes out as tinny snowflakes like paper, the cost is approx. 450 dollars but it worth the money.