• Office Hours - Mon - Fri 7:30am to 4pm

Allegheny Township

Police Department

Police Department



The Allegheny Township Police Department is under the supervision of Chief Leo Berg. Currently, the Allegheny Township Police force has 8 full-time officers and one full-time administrative staff member, Terri Walter.
The Police Department has grown to a 24-hour service to the 39± square miles that make up the township.


Contact Information:

Leo Berg, Police Chief
3131 Colonial Drive
Duncansville, PA 16635

Michael Robison, Assistant Police Chief
Email: MRobison@AlleghenyTownship.us
3131 Colonial Drive
Duncansville, PA 16635


Police Business Office:
Ph: 814-940-5910 (Non-Emergency)


Terri Walter, Administrative Staff
Email: TWalter@AlleghenyTownship.us


General Police Department Email: ATPD@AlleghenyTownship.us

If you wish to speak to one of our officers, please call 814-695-3333

Allegheny Township Because We Care


The Allegheny Township Police Department was formed in the late 1940's and early 1950’s to provide police and protective services to the residents of Allegheny Township.  
The department had one patrol car during that time, and radio communications consisted of citizens band radios in the car and at the home of Supervisor Ralph Hoover; when Mr. Hoover was not available, the Police were on their own.  
The department then graduated to mobile phones in the patrol car, and in 1976, the Blair Base Network was formed, which provided two-way radio and dispatching from the Hollidaysburg State Police Barracks.  
The first police officer, Harold Eckard served until his retirement in 1974.  There were a few men who worked part-time off and on during this period.  In 1968, a second officer, Donald W. Fowkes Jr., was hired, and upon Chief Eckard's retirement, Officer Fowkes became the Police Chief.  
Throughout the following years, Allegheny Township added more police officers to fill the rolls and needs of the Township. Currently, the police force has eight full-time officers and one full-time administrative staff member, Terri Walter.
Today, the police department has grown to include 24-hour service to the 39± square miles that make up the township.

Full-Time Police Officers:

Police Chief, Leo Berg 

Assistant Police Chief,  Michael Robison

John Reeder - Email: JReeder@AlleghenyTownship.us

C.D. Gunnett - Email: CGunnett@AlleghenyTownship.us

Paul Nagle - Email: PNagle@AlleghenyTownship.us

Bryan Ketner - Email: BKetner@AlleghenyTownship.us

H.T. Fownes - Email: HFownes @AlleghenyTownship.us

Richard Brant - Email: RBrant@AlleghenyTownship.us

Part-time Police Officers:

Traci Winters - Email: TWinters@AlleghenyTownship.us

Shea Stayer - Email: SStayer@AlleghenyTownship.us

The Pennsylvania State Police can be reached at 814-696-6100.

The Pittsburgh office of the Federal Bureau of Investigation can be contacted at:

3311 East Carson Street
Pittsburgh, PA  15203

Physical Security: Some Things To Consider

View the security of your office/facility in a ‘community’ setting. Develop relationships with surrounding businesses so that their ‘eyes and ears’ become yours  and vice versa. The fact is his problem could become yours and yours could become his. This is application of the ‘combat multiplier’ approach; the more eyes and ears involved the safer and more secure we can be by ‘extending our perimeters’ at no cost beyond establishing a basis for coordination, cooperation and communication. This will also facilitate deconflicting evacuation plans or mutual support for ‘stay where you are’ plans.

Develop and maintain a good working relationship with local law enforcers through your security personnel, if you have them, or management.

Support local First Responders with encouragement and, if possible, financial support. The fact is local police, fire and emergency medical personnel will ALWAYS be the first to respond; the first to help you.

Develop and test internal security and emergency response plans, to include, if possible, training of a building or office response team. Make sure employees are aware of and understand the plan.

Have alternate evacuation and rally point plans and routes.

Review your continuity of business plan for recordkeeping and communications    in the event of any disaster, natural or man-made.

If you have video surveillance equipment, make sure tapes are reviewed for ‘patterns’.

To the extent possible, encourage, recognize and support employees who are members of the National Guard, Reserve or local volunteer units.

Establish procedures for knowing your visitors and vendors.

Vary security patterns; change barriers without forewarning; use different doors, gates.

It is crucial you keep employees aware and informed of what you are doing for their benefit and protection. Encourage their vigilance and thank them for putting up with any inconveniences necessary to keep them safe.

The following tips were prepared by the Commonwealth Technology Center, John Kanovich Director at the request of the Pennsylvania Office of Homeland Security to assist business, industry, institutions and organizations in assessing and improving their cyber security plans and procedures.

Cyber Security

The topic of Cyber Security covers many actions that together help to deter against hackers, viruses and other potential risks to the networked enterprise. Everyone has a role to play including:

• Management
• Information technical staff
• End users



The key to effectively managing Cyber Security is to demonstrate top-level executive support. Some of the key management activities include:

• Create security policies to match the size and culture of your business. Policies must be written, enforced, and kept updated.
• Establish a computer software and hardware asset inventory list and create a lifecycle plan for each device.
• Classify data by its usage and sensitivity. Establish owners of all data assets. Identify data covered by specific regulations and requirements. (Federal laws, credit card information)
• Prepare comprehensive budget. Ensure that security is a specific budget line item.


Information Technical Staff

Information technology staff members are on the front line when it comes to cyber security. Some key activities include:

• Maintain configuration management through Security policy implementation and systems hardening.
• Maintain patch management on all systems. Follow a regular schedule for applying patches for operating systems, software, and anti-virus updates; subscribe to security mailing lists.
• Maintain operational management through the reviewing of all log files, ensuring system backups with periodic data restores, and report any known issues or risks.
• Perform security testing through annual security audits and penetration scanning.
• Ensure physical security of systems and facilities. Limit access to key personnel.


End Users

End users must ensure that security is addressed in detail. Some of these key activities are:

• Ensure anti-virus software is loaded and active on systems.
• Delete without opening email from unknown sources.
• Back up data on a regular basis.
• Utilize strong, hard-to-guess passwords.
• Use personal firewalls.
• Download and apply security patches.
• Disconnect from the Internet when not in use.
• Check security on a regular basis.
• Restrict access to systems to authorized users.
• Ensure users know what to do when a system become infected.


Business Continuity

In order to ensure continuity of business, proactive security measures must be taken and be part of daily operations. Routine security testing and regularly scheduled self risk assessments and third party security audits must be performed. These are example questions to be addressed:

• Does your team know how to respond to emergency alarms?
If you could not re-enter the workplace, do you have a pre-determined location to meet to coordinate recovery operations?
• Do you maintain a current list of employees, customers, and suppliers off site?
• If you lost a critical system, do you have a pre-determined plan to recover or at least a workaround?
• Have you have met with local emergency response groups (i.e. Facilities, Security, Environmental, Health, and Safety) to discuss their role in recovering the business?
• Do you have an established business resumption team?
• Have you systematically evaluated all of the potential sources of disruption to your business and have an active program to reduce the likelihood of a disruption?
• Do you have a business resumption plan this is securely stored remotely?
Do you periodically test your business resumption plan along with your site emergency response plan?