Jackson Township Police Department

Phone: (814) 749-0051
Fax: (814) 749-7306
Emergency - CALL 911
Email: police@jacksontwppa.com
Police Department Staff
Officer in Charge of Investigations
Shaun Gregory

Phone: (814) 749-0051
Fax: (814) 749-7306
Emergency - CALL 911
Email: police@jacksontwppa.com
Officer in Charge of Investigations
Shaun Gregory
Officer in Charge of Administration
Philip Vaught
Sergeant
Michael Szewczyk
Officer
Austin Thomas
The Jackson Township Supervisors approved a Crime Watch Program Initiative started by the Mumau & Harris families in a neighborhood near Mundys Corner area as an outreach of the Jackson Township Police Department. It is hoped that other groups of neighbors may also form such groups within the Township. The Township will support groups that organize as a Crime Watch Neighborhoods by providing signs and training from the Jackson Township Police Department led by Philip Vaught, Officer In Charge. Training provides instructions on what participants can and can not do and where they can report information that may act in the prevention of a crime.
Who Are They?
Here's What We Know Of Them, So Far:
These high risk drivers climb into the anonymity of an automobile and take out their frustrations on anybody at any time.
For them, frustration levels are high, and level of concern for fellow motorists is low.
They run stop signs and red lights, speed, tailgate, weave in and out of traffic, pass on the right, make improper and unsafe lane changes, make hand and facial gestures, scream, honk, and flash their lights.
They drive at speeds far in excess of the norm which causes them to: follow too closely, change lanes frequently and abruptly without notice (signals), pass on the shoulder or unpaved portions of the roadway, and leer at and/or threaten - verbally or through gestures - motorists who are thoughtless enough to be in front of them.
When Confronted By Aggressive Drivers:
First and foremost make every attempt to get out of their way.
Put your pride in the back seat. Do not challenge them by speeding up or attempting to hold-your-own in your travel lane.
Wear your seat belt. It will hold you in your seat and behind the wheel in case you need to make an abrupt driving maneuver and it will protect you in a crash.
Avoid eye contact.
Ignore gestures and refuse to return them.
Report aggressive drivers to the appropriate authorities by providing a vehicle description, license number, location, and, if possible, direction of travel.
If you have a "Cell" phone, and can do it safely, call the police - - many have special numbers (e.g. 9-1-1 or #77).
If an aggressive driver is involved in a crash farther down the road, stop a safe distance from the crash scene, wait for the police to arrive, and report the driving behavior that you witnessed.
Avoid the challenges or confrontations of an aggressive driver and support law enforcement's efforts to rid the streets and highways of this menace.
ATM Machines have become the target of criminal opportunities such as robberies, purse thefts, and other personal crimes. The following is a list of suggestions to help reduce your vulnerabilities and criminal opportunities.
Here Are Some General Rules And Suggestions To Keep In Mind When Using An ATM:
When At An ATM Machine:
Don't Make It Easy for a Thief To Steal Your Wheels
One vehicle is stolen every 20 seconds in the United States. Stolen cars, vans, trucks, and motorcycles cost victims time and money - and increase everyone's insurance premiums. They're also often used to commit other crimes. Don't become a victim of this serious crime.
The Basic Prevention Policy
Be Prepared To Get Away
Domestic Violence Links:
Police Procedure When Responding To Domestic Violence
Notification Of Rights By A Police Officer To A Victim Of Domestic Violence
If you were locked out of your house, would you still be able to get in? Maybe you keep an unlocked window in the back, or a hidden key in your mailbox or on top of a window ledge? You may think this is a good idea, but guess what? If you can break in, so can a burglar!
One out of ten homes will be burglarized this year. For a small amount of time and money you can make your home more secure and reduce your chances of being a victim.
Many burglars will spend no longer than 60 seconds trying to break into a home. Good locks - and good neighbors who watch out for each other - can be big deterrents to burglars.
Check The Locks
Did you know that in almost half of all completed residential burglaries, thieves simply breezed in through unlocked doors or crawled through unlocked windows?
Check The Doors
If you were locked out of your house, would you still be able to get in? Maybe you keep an unlocked window in the back, or a hidden key in your mailbox or on top of a window ledge? You may think this is a good idea, but guess what? If you can break in, so can a burglar!
One out of ten homes will be burglarized this year. For a small amount of time and money you can make your home more secure and reduce your chances of being a victim.
Many burglars will spend no longer than 60 seconds trying to break into a home. Good locks - and good neighbors who watch out for each other - can be big deterrents to burglars.
Check The Outside
Look at your house from the outside. Make sure you know the following tips.
Consider An Alarm
Alarms can be a good investment, especially if you have many valuables in your home, or live in an isolated area or one with a history of break-ins.
Burglars Do More Than Steal
Burglars can commit rape, robbery, and assault if they are surprised by someone coming home or pick a home that is occupied.
There's More You Can Do
Work with neighbors and local government to organize community clean-ups. The cleaner your neighborhood, the less attractive it is to crime.
Computer consultant Ray Brannon has compiled a list of 10 Identify Commandments to help residents protect themselves from identity theft:
To opt out of pre-screened credit card offers call 1-888-5-OPTOUT.
To opt out of direct mail log on to www.the-dma.org/consumers/offmailinglist.html
To opt out of email: www.dmaconsumers.org/offemaillist.html
Other resources for identity theft issues include: National Fraud Information Center (1-800-876-7060 or www.fraud.org); Federal Trade Commission's Identity theft hotline is (1-877-IDTHEFT).
The Internet is an opportunity for you to interact with people. It provides a communication link to businesses, entertainment, and education. Through the Internet you can interact with people from other towns, cities, and countries. You can learn about other cultures, customs and lifestyles. It is an opportunity to make new friends and learn more about the world in which we live.
However, the Internet by design is an anonymous media. This aspect can make it easy for someone to use the Internet for criminal means. Because you are 'speaking' with someone via your computer, it is nearly impossible to verify many things about that person. These may include:
The Person's Identity - The Person with whom you are speaking may not be using their real name. It is possible with some Internet Service Providers (ISP's) to check the account information of someone you've had contact with. However, that person may have been using someone else's account or may have provided false information to the ISP.
The Person's Description - We often take for granted the ability to see the person we are speaking with. However, on the Internet nothing can be verified. You can not use your eyes to verify the person's age, race, or even gender.
The Person's Location - On the Internet it is very easy for someone to say they are one place, when in reality they could be around the corner or across the country.
The Person's Intentions - Most people use the internet for honest and honorable intentions. However, someone who exploits the Internet, especially criminals and con artists, can seem very straightforward at first, but they are experts at manipulation. They use confidence-scams, or even just friendly conversation, to make you believe what they want you to believe. Then they have you act on that belief.
Connection Security - Internet security is very important and new technologies are being developed everyday to ensure your protection. However, there are persons out there who know how to intercept communications. Your communication with a known friend or acquaintance could be seen by others. There is also no guarantee that the person you are 'speaking' with is acting alone or uses good security with your information.
Common sense tempered with caution is still your best protection. Listed below are some safety tips you should use when communicating on-line:
- Meet in a public place that is well lighted and busy.
- Meet during busy business hours and not close to closing or after dark.
- Arrange your own transportation to and from the meeting.
- Bring a friend; Double-date. Do not meet the person alone!
Remember:
A stranger you meet on the Internet is just like a stranger you meet in a bar, restaurant, or on the street!! Use the same precautions you use in these situations, when meeting people on the Internet!!
If you do have suspicions about someone you may have spoken with on the Internet, or if you have in someway been offended or threatened, contact your service provider immediately. Give them as much information about the situation as possible. This should include any contact information, such as on-screen name, account information (name, address, phone, account number) and/or e-mail address. You should also be straight-forward as to how you were offended or threatened. Most ISP's provide on-line information on reporting such incidents. Be familiar with your provider's procedures.
The Internet has opened up a virtual world of information for anyone with a computer and an on-line connection. Children not only learn about computers, but are able to access more information from more sources more quickly than from any other medium. However, children need to learn the rules of the road, and learn how to protect themselves from the pedophiles, abusers, and con artists that may be lurking behind their screen. With a little bit of planning and appropriate adult supervision, children can explore and learn while minimizing, or eliminating the dangers of being abused or exploited.
If you or your child comes across material that you find pornographic, threatening, or otherwise offensive, it might well be a violation of law. Save the material, and contact your local law enforcement agency.
Another resource is the National Center for Missing or Exploited Children. They function as a national clearinghouse for tips and leads regarding the sexual exploitation of children. You can call the 24-hour Child Pornography Tipline at 1-800-843-5678, or make your reports on-line at their website, www.missingkids.com/cybertip. They will compile and forward the information to the appropriate state, federal, or local law enforcement agency for action.
It's not always easy to spot con artists. They're smart, extremely persuasive, and aggressive. They invade your home by telephone and mail, advertise in well-known newspapers and magazines, and come to your door. Most people think they're too smart to fall for a scam. But con artists rob all kinds of people - from investment counselors and doctors to teenagers and elderly widows - of billions of dollars every year. Just remember... if it sounds too good to be true, it probably is.
You Can Protect Yourself:
Never give a caller your credit card, phone card, Social Security, or bank account number over the phone. It's illegal for telemarketers to ask for these numbers to verify a prize or gift.
Beware of 900 numbers. People who call 900 numbers to request instant credit often end up with a booklet on how to establish credit or a list of banks offering low-interest credit cards. Such calls can end up costing $50 or more, but consumers rarely end up obtaining credit.
Listen carefully to the name of a charity requesting money. Fraudulent charities often use names that sound like a reputable, well-known organization such as the American Cancer Association (instead of the American Cancer Society).
Ask for a financial report before you donate; a reputable charity will always send you one.
Investigate before you invest. Never make an investment with a stranger over the phone. Beware of promises that include the terms "get rich quick," or "a once in a lifetime opportunity."
Be A Wise Consumer
Some Classic Cons
Although con artists come up with new scams as times change, some classic scams never go out of style.
The Bank Examiner
Someone posing as a bank official or government agent asks for your help (in person or via the telephone) to catch a dishonest teller. You are to withdraw money from your account and turn it over to him or her so the serial numbers can be checked or the money marked. You do, and never see your money again.
The Pigeon Drop
A couple of strangers tell you they've found a large sum of money or other valuables. They say they'll split their good fortune with you if everyone involved will put up some "good faith" money. You turn over your cash, and you never see your money or the strangers again.
The Pyramid Scheme
Someone offers you a chance to invest in a up-and-coming company with a guaranteed high return. The idea is that you invest and ask others to do the same. You get a share of each investment you recruit. They recruit others, and so on. When the pyramid collapses (either the pool of new investors dries up or the swindler is caught), everyone loses - except the person at the top.
Protect Yourself From Telemarketing Fraud
Your best protection is to just hang up the phone. If you think that is rude, tell these callers politely that you are not interested, don't want to waste their time, and please don't call back - and then hang up. If you find yourself caught up in a sales pitch, remember the federal government's Telemarketing Sales Rule.
And remember, don't give telemarketers your credit card number, your bank account number, Social Security number - or authorize bank drafts - ever.
If Someone Rips You Off. . .
CLICK IT OR TICKET (2 tickets = 2 fines)
Pennsylvania's Occupant Protection Laws
Restraint Systems: Section 4581 A(1), (1.1), (2), (3)
(1) All drivers are responsible to secure children from birth to age four in an approved child passenger restraint system. The fine is waived if driver shows proof of a car seat. (primary law)
(1.1) All drivers are responsible to secure children four years of age or older but under eight years of age in a seat belt system and an approved child booster seat. The fine is waived if driver shows proof of a car seat. (secondary law)
(2) All drivers are responsible to secure children eight years of age or older but under eighteen years of age anywhere in the vehicle in a seat belt system. Drivers and front seat occupants are required to wear a property adjusted and fastened safety seat belt. (secondary law)
(3) Drivers under 18 years of age may not operate a motor vehicle in which the number of passengers exceeds the number of seat belts. (primary law)
Offense
Failure to comply with the provisions in (1) or (1.1) shall be guilty of a summary offense with a maximum fine of $100. Failure to comply with provisions in (2) and (3) shall be guilty of a summary offense with a fine of $10.
The Importance of Posting an Address Number for 911
Cambria County 911 Address Enforcement Ordinance