Personal Security Test

This exercise was created by the United States Marshals Service, Judicial Security Division’s National Center for Judicial Security. Its purpose is to test and raise your security awareness. This is a self-help test, provided to assist you in becoming an active participant in your own security. For privacy reasons, no information will be submitted, stored, or provided to any third party. Click on any question to learn more about it.

7. I own a home security system.

8. I use my home security system.

Additional Information for Each Question

1. I receive security training on an annual basis.

Many states and their court administrators offer security training through law enforcement and security professionals. It is recommended that you attend these sessions personally and with staff. It will assist you, your loved ones and staff in what to look for, report and plan.

2. I report all inappropriate communications and threatening contacts.

Simply put, all threats are inappropriate communications (IC) but not all inappropriate communications are threats. An inappropriate comment (underlined) IC can be defined as something not in keeping with what is correct or proper concerning actions towards another or taking an unusual interest that is out of the ordinary. A threat (underlined) is an indication of danger; an attempt to control another through expression of an intention to inflict pain, injury, evil or punishment. The difference is a defining line for law enforcement. It is vital that you and your staff understand how critical it is to report even the most benign communications to your law enforcement provider so they can begin to mitigate and investigate the potential threat. Do not EVER feel it is something you should not report. Report it. Document it, if possible, using a threat card or other tool. Let law enforcement conduct their due diligence.

3. I know the name and contact information of the person I am to report inappropriate communications.

Understanding #2 is paramount. Equally important is knowing WHO you are supposed to report an inappropriate communication or threat to. Does this entity have investigative authority? If not, after reporting where does this information go?

4. I take different routes when traveling between home and work.

Not being aware of your surroundings is an indicator that you are an easy target. Attack methodology is predicated upon good pre-operational (attack) surveillance of a target. Altering your travel routines suggests that you are not an easy target and have planned for potential threats. If you drive, take a different route to/from work a few times a week. If you walk to work, walk on the well lit side, against traffic.

5. I have located safe havens (i.e., police and/or fire stations) along my travel route in the event of a potential threat.

In concert with #4 you should be aware of some safe havens along your commuting route that you can access in the event you have vehicle problems, feel you are being followed, or if someone is taking aggressive action against you. Look for police and fire departments, hospitals, well lit and/or crowded areas. Keep your cell phone charged, and pre-program the number of your law enforcement provider in your cell phone in the event of emergency. Be prepared to blow your horn to call attention to your vehicle. Do not hesitate to call law enforcement.

6. I converse frequently with my law enforcement providers regarding security issues.

Face to face contact between you and your law enforcement provider has many benefits. Neither party wants to meet for the no-top-margin time at the judge’s residence at 3 a.m. after an emergency phone call. Frequent contact allows for parties to understand what security measures exit and do not and how threats will be mitigated. If you do not have an established relationship with your law enforcement provider, schedule an initial meeting for you and your colleagues with the assistance of your court or agency administrator.

7. I own a home security system.

A home security system serves many purposes. Looking at the security footprint of the home it is the no-top-margin line of defense for you and your loved ones against an attack or a family emergency unrelated to your position. As #4 suggests, prior to an attack or burglary, it is statistically proven that surveillance will be conducted of your home. If you do not own a home security system, weigh its cost against the peace of mind an installed system can provide when used properly.

8. I use my home security system.

Of course having a home security system means nothing if you do not use or properly know how to use it. Many people who have home security systems do not use them because of inconvenience.

9. I have had a professional security assessment performed on my residence.

A home security system is but one layer of a good home security plan for you and your loved ones. A security assessment of your home should consist of, but not be limited to, the security system, lighting, locks, windows, lines of sight, windows, landscaping, environmental factors and how they work in conjunction with one another, as well as a safe room. It should detail your home’s strong and weak points so you and your law enforcement provider/security professional can develop sound security and safety plans for you and your family.

10. I check my credit report annually.

Checking your credit report often will help determine if there is anything unusual about your credit history. It maybe the no-top-margin indicator that your identity has been compromised. Whether your identity has been compromised because of your position or not is insignificant. It needs to be reported immediately to your law enforcement provider BECAUSE of your position. It can be determined at a later time if it was because of your position or not.

11. I contact search engines to opt out of my personal information’s availability online.

The Internet is both a blessing and a curse. Many judicial officers run for election and a common way to get their message out is via the Internet. The balance between public official and private information is all too transparent in the information age. That said, you can minimize the information “out there” regarding you and your family by opting out of search engine information. It is an uphill battle but worth the investment of your time.

Some search engines offer, for a small fee, the ability to opt out and can be found on those sites.

12. I have a plan at home regarding the handling of mail and package deliveries.

Consider using your office as a delivery address. This keeps your private address private, the same can be said for using a PO Box. Using the office address also allows for the package to be x-rayed. If you cannot have the package sent to your office then develop a plan within your family where all family members are aware of the company that will be delivering and the potential date of delivery.

13. Is your Internet connection secure to avoid use by others?

One of the most common ways criminals gain access to your identity is through Internet connections. It is critical that you maintain security software for your computer to protect your personal and credit card information, and that you update the software frequently. Recognize that many Internet connections require you to provide personal information, such as a phone number, last name or social security number as a password. These are clear indicators of who you are and where you live. Use non-descript names and/or numbers instead. If you must maintain a list of passwords and identifiers, do not carry the list with you or maintain it on your computer.