Threat, yes. Is it credible?

January 27, 2014

Today, Jewish organizations were made aware of an email threat sent to a national Jewish organization threatening violence.  It is unknown at this time if the threat is credible and no specific locations were named.

Given the nature of the email and threat of violence, law enforcement officials are actively investigating the threat. In light of the number of shootings at universities, schools, malls and other public places over the past several weeks (none of which had any Jewish connection), we are sharing this information out of an abundance of caution. We encourage Jewish organizations to increase security awareness and vigilance at your facilities, review security plans and ensure appropriate security measures are in place.

Action Steps

  • Connect with local law enforcement to discuss security. If you have not established personal relationships with key police personnel, set up a meeting to do so.
  • Ensure that your institution’s rules and procedures dealing with who gets into your facility and events are sufficient and are functioning (access control). See JCRC-NY’s Sample Building Access Policies & Procedures (PDF).
  • A facility should have as few entry points as possible (ideally one), so that no one is able to enter your facility without being greeted and observed. Be sure to obey all fire codes and ensure adequate routes for exiting the building.
  • Suspicious behavior should be promptly reported to the police or security personnel. See ADL’s Guide to Detecting Surveillance of Jewish Institutions.
  • Suspicious packages and strange devices should be promptly reported to the police or security personnel. See US Postal Inspection Service Guide to Mail Center Security (PDF).
  • Ensure that your staff members, including newly hired personnel, know their role in security and what to do in the event of an emergency.
  • Ensure that existing safety devices (video cameras, lights, walkie talkies, etc.) are in good working condition.
  • Trust your instincts. If something strikes you as being out of place or problematic, call the police immediately.

Jewish organizations should work to create a “culture of security” that balances keeping everyone and everything safe, with an organization’s need to be warm and welcoming. If your organization has a culture of security you will have a plan to implement when there is a threat.

Are you ready to start? The resources on JCRC-NY’s Security Info WebpageJCRC-NY’s Security Resources WebpageADL’s Security Website, ADL’s security manual Protecting Your Jewish Institution and Emergency Planning Manual: Disaster and Crisis Response Systems for Jewish Organizations, published by United Jewish Communities and written by John Jay College of Criminal Justice and JCRC-NY are great places to start.

Syria: potential repercussions

September 01, 2013

The escalating drumbeat for military action naturally leads to questions about possible terrorism here in New York. Note: as of today there are no specific, credible threats against New York or the Jewish community. Nevertheless, all Jewish organizations should review their security and emergency preparedness plans to ensure that they are up-to-date and that they can be readily implemented. Some specifics:

High Holidays

If you are an organizations hosting High Holiday services and/or programs you should:

  1. Notify your local police about all planned services and programs. Discuss the number of people expected at each service and ask them for any suggestions that could improve your security and emergency preparedness plans.
  2. Review your security and emergency preparedness measures, especially access control, evacuation and lockdowns. Meet with your staff and volunteers and make sure that everyone is on the same page and knows what to do. Check the “High Holidays” category for more suggestions..

Potential for Cyberattacks

Last week the Syrian Electronic Army compromised the New York Times website and others. Western financial institutions are also targetted by others. We all should review our own cybersecurity because, in the past, anti-Israel hackers have attacked Jewish-related sites. See JCRC’s Cybersecurity Resources.

This week the FBI distributed the following:

  • The Syrian Electronic Army (SEA), a pro-regime hacker group that emerged during Syrian antigovernment protests in 2011, has been compromising high-profile media outlets in an effort to spread proregime propaganda. The SEA’s primary capabilities include spearphishing, Web defacements, and hijacking social media accounts to spread propaganda. Over the past several months, the SEA has been highly effective in compromising multiple high-profile media outlets.
  • The SEA has recently compromised high profile media Web sites through a new tactic of hacking third party networks – including a Domain Name System (DNS) registrar and a content recommendation website.
  • In April 2013, the SEA compromised the Twitter feed of the Associated Press, posting a false story that President Obama was injured, causing in a brief drop in the stock market.
  • In addition to Syrian hackers, groups or individuals sympathetic to the SEA may also be observed participating in CNO efforts against US Web sites and networks.
  • Please maintain heightened awareness of your network traffic and take appropriate steps to maintain your network security. If you detect anomalous or malicious traffic or network behavior, please contact your local FBI Cyber Task Force or the FBI CyWatch (855) 292-3937 immediately.

Defending Against Hacktivism

In general, hacktivism cyber attacks may result in denial of service, Web site defacements, and the compromise of sensitive information which may lead to harassment and identify theft. Although the specific OpUSA claims referenced above speak specifically to DDoS attacks, precautionary measures to mitigate a range of potential hacktivism threats include:

  • Implement a data back-up and recovery plan to maintain copies of sensitive or proprietary data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks. 
  • Have a DDoS mitigation strategy ready ahead of time and keep logs of any potential attacks.
  • Scrutinize links contained in e-mail attachments.
  • Regularly mirror and maintain an image of critical system files.
  • Encrypt and secure sensitive information.
  • Use strong passwords, implement a schedule for changing passwords frequently and do not reuse passwords for multiple accounts.
  • Enable network monitoring and logging where feasible.
  • Be aware of social engineering tactics aimed at obtaining sensitive information.
  • Securely eliminate sensitive files and data from hard drives when no longer needed or required.
  • Establish a relationship with local law enforcement and participate in IT information sharing groups for early warnings of threats.

Terrorism’s Threat to Cities Large and Small | Ray Kelly

May 29, 2013

Raymond W. Kelly | Commissioner, NYPD

FBI-NEIA Major Cities Chiefs Conference
Grapevine, Texas
May 29, 2013.

Thank you for that introduction Charlie. I want to commend you, the FBI National Executive Institute and the Major City Chiefs for bringing us together and organizing such an excellent conference. A few months ago, as part of the group’s constant efforts to stay ahead of the curve and plan for this conference, I was asked to touch on the subject of technological-driven policing in my presentation. In light of recent events in Boston and the United Kingdom, I believe a more appropriate title would be: “Terrorism’s Threat to Cities Large and Small.” That is what I’d like to talk to you about today.

In the wake of the bombings at the Boston marathon last month and the savage killing of a British soldier at a military barracks in Woolwich, southeast of London a week ago, much has been written and said in the media about the so-called “new normal,” the underlying threat we face from homegrown, smaller-scale, yet still very lethal terrorist attacks. From the standpoint of New York City there’s not much new about the “new normal” at all. We’ve been contending with it for some time and so have others.

In June 2009, Abdul-Hakim Mujahid Mohammed, formerly known as Carlos Bledsoe, carried out a drive-by shooting on an army recruiting station in Little Rock, Arkansas killing two soldiers. He told police that he had intended to kill as many army personnel as possible. Later that same year, U.S. Army Major Nidal Hissan opened fire at the Fort Hood, Texas Soldier Readiness Processing Center, killing 12 soldiers and one civilian and wounding more than 30 other people. In the past year-and-a-half alone, 38 people have been arrested on terrorism-related charges in the United States and Canada, from New York; to Chicago; Tampa; Mobile, Alabama; Aurora, Illinois; Toronto; Broward County, Florida; and Southern California to name a few.

A big reason for the increase in the tempo of arrests is the outstanding work of the FBI to identify would-be terrorists and apprehend them. In New York, we’ve benefited tremendously from our partnership with the FBI through the Joint Terrorism Task Force.

We’ve been the subject of 16 terrorist plots since nine-eleven targeting everything from subways, to synagogues, to airports and iconic locations like Times Square, Wall Street, and the World Trade Center. They’ve been defeated thanks to good work by the NYPD, our federal partners, some combination of the two or just plain luck. However, we are concerned that the success, from a terrorist point of view, of the latest attacks in Boston and London, coupled with the notoriety they’ve received, could inspire even more attempts in venues beyond major cities. Indeed this is already happening, as we saw in the case of a French soldier stabbed outside of Paris last weekend.

With that in mind, there are three main points I’d like to make today. First, the terrorist threat to the U.S. homeland remains severe, complex and unrelenting. Second, medium sized cities such as Boston are now in play for terrorism events. Third, the crude and simplistic attacks Al Qaeda has been encouraging its followers to carry out are now being realized. As we’ve seen, they’re capable of doing tremendous damage.

Let’s start with the enduring threat, which we see emanating from three distinct but intertwined sources. One, Al Qaeda central, which is based primarily in the tribal areas of Pakistan. Though diminished greatly by the U.S. military, it still has a functioning leadership as well as an ability to communicate and spread the core ideology that fuels radical islamists worldwide. Al Qaeda central still burns with an intense and unrelenting hostility toward America. Its leaders believe they are at war with the United States and that time is on their side. There’s no doubt that key leaders, foremost among them Ayman al-Zawahiri, have not and will not give up on the hope of executing another nine-eleven scale attack. Their ability to accomplish this at the moment is severely constrained, maybe even negligible, as many in the U.S. intelligence community believe. But it would be a mistake to assume their desire to carry out a mass attack on American soil does not persist to this day. The group’s resilience – indeed, its continued existence in the face of the pounding it has absorbed from the U.S. and our allies for more than a decade — means we cannot assume they will abandon their goal to incur mass casualties.

Next is the spread of Al Qaeda allies and affiliates throughout Africa and the Middle East. The list of these groups continues to grow. They include: Al Qaeda of the Arabian Peninsula, based in Yemen and the source of numerous plots against the United States; Al Qaeda of the Islamic Maghreb, based in Algeria with a growing capacity to act beyond its base; Al Shabbab, Al Qaeda’s Somalian affiliate which continues to attract followers from the Somali diaspora here and abroad; Ansar al Sharia in Libya, responsible for the Benghazi attack; and Ansar al Dine, the Al Qaeda affiliate fueled by weapons and personnel coming from post-Qadaffi Libya. Then there are Al Qaeda networks in Egypt’s Sinai desert, something rarely seen before the Arab spring.

Two other Al Qaeda-linked terrorist organizations stand out in importance today. The first is Al Qaeda of Iraq, considered defunct as recently as 2008. Its powerful re-emergence is a measure of the resilience of such groups. The second is the Al Nusra front in Syria, an Al Qaeda organization spawned by Al Qaeda in Iraq. It leads the rebellion against the Assad regime and is fueling the global jihad by attracting personnel from around the world, including North America.

So how do these affiliates overseas pose a threat to us in the United States? For one thing, they send Americans back home to attack us here.

In 2009, one of the highest-ranking members of Al Qaeda central recruited Najibullah Zazi, a native of Queens and a resident of the Denver-Aurora area, to carry out attacks on New York City. Zazi and two associates had travelled to Pakistan hoping to fight U.S. troops in Afghanistan. Instead, they were given training in explosives and sent back to the United States armed with the knowledge to build a bomb. Their plot was subsequently defeated through a joint investigation between the NYPD and the FBI.

In 2010, authorities in Chicago arrested Pakistani-American David Headley. Headley had met with leaders of Lashkar-E-Taiba in Pakistan, an Al Qaeda like-minded group, and conducted surveillance for its November 2008 commando assault on Mumbai.

At least 20 young men from Minneapolis, all of Somali descent, joined Al Shabbab in Somalia over the past few years. Our concern is: what happens if those who survive return to the U.S.?

In 2009, Al Qaeda of the Arabian Peninsula dispatched Umar Abdulmuttallab, the underwear bomber, to blow up an airliner over Detroit. One year later, the same group dropped off two “printer bombs” at UPS and FedEx offices in Yemen addressed to the United States. The aim was to blow up the deadly cargo in planes over the eastern seaboard of the United States. Fortunately, the packages were intercepted in England and Dubai.

In 2011, Samir Khan, the intellectual father of Al Qaeda’s on-line magazine “inspire,” was killed in a U.S. drone strike. Khan was a resident of Charlotte, North Carolina.

Of late, we’ve seen how the Al Nusra front in Syria is attracting individuals from places such as Illinois to the battlefield there.

Beyond Al Qaeda core, its affiliates, allies and like-minded groups, the danger from homegrown terrorists is a growing feature of the threat landscape we face in the United States and elsewhere. Inspire magazine and propaganda like it provide an easy road map for getting involved. The most infamous example of that is the 2010 Inspire article entitled, “Make a Bomb in the Kitchen of your Mom,” a how-to guide for using readily available household materials to build a bomb. It has now become the go-to manual for terrorists bent on destruction, as was the case in Boston and a number of the plots against New York.

Travel to training camps abroad simply isn’t necessary and increasingly, it’s not part of the profile we uncover when a homegrown terrorist is revealed. The daunting, almost invisible nature of those pursuing “individual jihad” transforms the threat in an important way. Most importantly, it places mid-sized and even smaller urban centers in the United States in the crosshairs of terrorism. For the individual jihadist, size matters less. You can’t get much less complicated then running someone down with a car and then hacking him to death with a meat cleaver and long knives. If terrorism is theater, New York and London will always be in the spotlight. But I think we learned with the Boston marathon that all the world is becoming a stage.

While the world was horrified by these events, Internet chatter among the jihadi forums we check regularly shows that many think of the perpetrators in Boston and Woolwich as heroes. In both cases, we saw that the terrorists were prepared to confront police and die for their cause. Officers in Watertown and Woolwich did heroic jobs, but you can see what we’re up against. Unfortunately, you don’t need much more than a crude explosive device to kill, maim, and capture the world’s attention all at once. This means each of us has to be more vigilant than ever.

The challenge with big, complicated terrorism plots is the potential for catastrophic consequences. But they are easier to spot. The challenge with the attacks we saw in Boston and Woolwich and the several that have failed in New York are that they’re small and hard to detect. Faisal Shahzad was on no one’s radar when he drove his SUV filled with explosives into Times Square in May 2010. We just got lucky in that he elected to use less potent ingredients in the hopes of avoiding detection during his acquisition of them.

The ease with which terrorists can travel within the United States and beyond also makes inter-agency cooperation a must. For this reason the NYPD created Operation Sentry. This is a dynamic, intelligence-driven partnership among 140 police and law enforcement agencies throughout the northeast and other parts of the country. Its premise is built on real world events. For example, the plot to bomb the World Trade Center in 1993 was hatched across the Hudson River, in New Jersey. It was there that the chemicals were mixed, that the truck bomb was assembled and laced with cyanide. The staging area was well outside New York City. In 2005 when suicide bombers struck the London transit system, they did so using explosive-filled backpacks assembled in the city of Leeds, 180 miles north of the target. And Faisal Shahzad constructed his car bomb in Connecticut.

Our partners in Operation Sentry include the Boston Police Department. Immediately after the bombings in Boston, we assigned a lieutenant and two sergeants to the Boston Regional Intelligence Center to gather information. Last week we hosted a group of 20 members of Massachusetts law enforcement to discuss policing major events including July 4th.

In the aftermath of the attacks, we also dispatched a lieutenant from our intelligence division to Youngstown, Ohio to meet with executives from Phantom Fireworks. This is the company that unwittingly sold the fireworks to both the Tsarnayev brothers and Faisal Shahzad that they used to construct their bombs. We want Phantom to spread the word to its employees working at 1,200 locations nationwide to be aware that individuals seeking to build explosive devices could exploit their products. We’re asking them to deny or flag suspicious purchases and to alert us if they believe there are possible links to terrorism. This is part and parcel of our Operation Nexus program, in which we partner with thousands of business owners in New York, Connecticut and New Jersey to heighten their awareness of potential terrorist activity. We’ve also established a program with 11,000 members of the region’s private security industry, sharing information and training through an initiative called NYPD shield.

To defend ourselves we must also maintain a good working relationship with the FBI and other federal partners through the Joint Terrorism Task Force. Despite the disagreements you’ve heard about from time to time, the NYPD and the FBI have a strong and essential partnership. Having said that, elected officials and their police chiefs have an obligation to do all they can to protect their citizens. In order to do that, they need to know the severity of the threat. Local police departments must insist on receiving as much information as soon as possible.

The only way to catch a lone wolf is through shared intelligence gathering. That’s why our efforts to defend against terrorism must be proactive, so that we can find those who are in the earliest stages of planning violent acts and stop them. Often times, the use of undercover police officers may be the only effective way to identify homegrown terrorists who are often living here legally and operating alone or with just one or two accomplices. Ideally, through strong partnerships, good intelligence and expert analysis, we’ll identify plots in their earliest stages.

In New York, we’re also installing an expanded network of smart cameras and license plate readers which, when tied together, greatly enhance investigations. Smart cameras have the capacity to alert us to the presence of suspicious packages before they detonate, should one be an actual explosive device. Cameras are a very powerful tool for law enforcement. In my opinion, you can’t have enough of them. We should all be encouraged by the fact that the public is overwhelmingly supportive of their use. Recent polls show 80% approve. Although excellent in helping to apprehend suspects after the fact, this technology still amounts to “just in time” prevention. The vast number of targets available to terrorists make it virtually impossible in all instances to intercept a device after its been planted. Ideally, we need to disrupt plots long before the backpack is left on the sidewalk.

To sum up: good intelligence remains the key to prevention. The threat of terrorism has not diminished. It is here to stay and we have to face that reality. Intelligence gathering is essential, including the use of undercover officers, to meet the continuing threat of terrorism lawfully and effectively. Technology is a powerful tool but it has its limitations. Finally, partnership and information sharing have never been more important in keeping our cities safe.

The fight against terrorism is a long haul, one that all of us are in together. Even with combat thousands of miles away, the front can return to our own backyards at any time. We all have to be prepared for that eventuality. The good news is that U.S. law enforcement is better prepared than ever before to meet the threat. And we will only become more so as a result of this conference and our continued collaboration. Thank you again for this opportunity to speak and let’s keep up the outstanding work together.

Updated: Nonprofit Grants Announcement

May 21, 2013

FY 2013 Urban Areas Security Initiative (UASI) Nonprofit Security Grant Program (NSGP)

Key Dates and Time 

This is why we suggested that you start your work. The application window will be very short. Download the preliminary PDF version by clicking FY 2013 NSGP Investment Justification Template and get going now! N.B. It’s a PDF document, you will have to copy your answers into the official Excel spreadsheet which will be available on the NY DHSES website when they post the application package no later than Tuesday, 05/28/2013.

  • Application Start Date: In New York the NY DHSES needs to obtain certain clearances as required by the NY State contracting process before posting the application packet. It will be available no later than 05/28/2013. Click here to look at the NY DHSES website to see if the application package is posted.)
  • Application Submission Deadline Date: In New York,  the deadline will be June 10th.
  • E-Grants registration. New York  applicants must submit their grants through the E-Grants system. If you have a E-Grants account and remember your information you need not do anything else. If you need to be reminded of your account name and/or password, send a note to grants@dhses.ny.gov.  New applicants must fill out an E-Grants Registration  available in two formats: doc pdf
  • Mission statement. We are in the process of reviewing the guidance. Thus far, we’ve noticed one change: a requirement that applicants submit their “mission statements.” If your organization does not have a mission statement we will post some samples by next week at www.jcrcny.org/securitygrants.
  • Eligibility. You must be a 501(c)(3) organization located in an eligible area. New York City, Nassau, Suffolk and Westchester are eligible. No other counties in New York are eligible. For other states click here.
  • Anticipated Funding Selection Date: 08/02/2013
  • Anticipated Award Date: 09/30/2013

Total Funding Available in FY 2013: $10,000,000

Purpose: The FY 2013 NSGP provides support for target hardening and other physical security enhancements and activities to nonprofit organizations that are at high risk of terrorist attack and located within one of the specific UASI-eligible Urban Areas.  While this funding is provided specifically to high-risk nonprofit organizations under The Department of Homeland Security Appropriations Act, 2013 (Public Law 113-6), the program seeks to integrate nonprofit preparedness activities with broader State and local preparedness efforts.  It is also designed to promote coordination and collaboration in emergency preparedness activities among public and private community representatives, as well as State and local government agencies.

The FY 2013 NSGP plays an important role in the implementation of the National Preparedness System (NPS) as detailed in Presidential Policy Directive 8 (PPD-8) by supporting the development and sustainment of core capabilities.  Core capabilities are essential for the execution of each of the five mission areas outlined in the National Preparedness Goal (NPG).  The development and sustainment of these core capabilities are not exclusive to any single level of government or organization, but rather require the combined effort of the whole community.  The FY 2013 NSGP supports all core capabilities in the Prevention, Protection, Mitigation, Response, and Recovery mission areas based on allowable costs.

Eligible Applicants: The State Administrative Agency (SAA) is the only entity eligible to apply to FEMA for NSGP funds on behalf of eligible nonprofit organizations (as described under section 501(c)(3) of the Internal Revenue Code of 1986).  Eligible nonprofit organizations determined to be at high risk of a terrorist attack due to their ideology, beliefs or mission and located within one of the designated FY 2013 UASI-eligible Urban Areas must apply for funding through their SAA.

Program Awards: FY 2013 NSGP funds will be allocated based on risk analysis, effectiveness, and integration with broader state and local preparedness efforts.  Each nonprofit organization may apply through their SAA for up to a $75,000 grant award.

Additional Information

  • FY 2013 NSGP Funding Opportunity Announcement
  • FY 2013 NSGP Fact Sheet
  • FY 2013 NSGP Investment Justification Template
  • FY 2013 NSGP Scoring Worksheet (to be completed by the SAA only)
Last Updated:
05/21/2013 – 10:48

Pres. Obama, Mayor Bloomberg, NYPD and Jewish community response to Boston Marathon explosions

April 15, 2013

Combined Jewish Philanthropies and Jewish Community Relations Council express our sincere sympathy to the families and friends of the victims of this tragedy. Our thoughts and prayers go out to the Greater Boston community, courageous runners, family, friends and those visiting from the United States and abroad.

  • Statement of Mayor Michael Bloomberg

As law enforcement authorities investigate today’s explosions in Boston, I ask all New Yorkers to keep the victims and their families in your thoughts and prayers. I have spoken with Police Commissioner Ray Kelly, and the NYPD has stepped up security at strategic locations and critical infrastructure, including our subways. Some of the security steps we are taking may be noticeable, including deployment of Critical Response Vehicles and additional police personnel, and others will not be. We have 1,000 members of the NYPD assigned to counter-terrorism duties, and they – along with the entire NYPD and the investments we have made in counter-terrorism infrastructure – are being fully mobilized to protect our city.

  • As per the Deputy Commissioner of Public Information of the NYPD:

We’re stepping up security at hotels and other prominent locations in the city through deployment of the NYPD’s critical response vehicles (CRVs) until more about the explosion is learned.

Remembering Ari

March 01, 2013

Ari Halberstam Memorial Ramp

On the anniversary of the 1994 Brooklyn Bridge terrorist shootings, Devorah Halberstam speaks out about gun violence in the NY Daily NewsI know too well what guns can do and on NY1 Online: Ari Halberstam’s Mother Speaks Out On Gun Rights.

NY1 Online: Mother of Teen Murdered on Brooklyn Bridge Discusses Efforts to Honor Son’s Legacy. Twenty years after her son was murdered on the Brooklyn Bridge, Devorah Halberstam, the mother of Ari Halberstam, told Inside City Hall what she is doing to honor her son’s legacy and continue the fight against terrorism. (03/03/2014 09:55 PM)

Kudos to Manhattan DA and NYPD on synagogue bomb plot conviction

December 05, 2012
Mayor Bloomberg, DA Cy Vance and Police Commissioner Kelly announce the arrests of two plotting to blow up Manhattan synagogues.

NYPD gives “special attention” to synagogues; ADL says embassy violence demands increased vigilence

September 12, 2012

Description: Description: cid:image001.jpg@01CD709E.3BE80EE0

Office of the Chief of Community Affairs

Informational: The High Holy Days of Rosh Hashanah

Rosh Hashanah is translated as “head of the year” and is the beginning of the Jewish New Year. This is considered to be a time of devotion and prayer to the Almighty to decree a long, spiritually enriching life, as well as good health and prosperity to all. Rosh Hashanah will be observed this year from sunset, Sunday, September 16th through sundown, Tuesday, September 18th. During this time period, the Jewish religion strictly prohibits many common day activities such as going to work, writing, turning lights on or off, riding in a car, carrying a cell phone and other items such as a driver’s license and credit cards and touching money.

There will be an increase of foot traffic in Jewish neighborhoods during these days as family and friends are commonly invited to others to participate in festive meals. The manner of dress for males during Rosh Hashanah may include a black hat, a long black coat (even in hot weather), and a white prayer shawl with strings attached to the corners. Females may wear expensive jewelry and will be traditionally dressed in clothing of a modest nature.

Synagogues will have prayer services three times each day. Special attention should be given to every synagogue, especially during times of prayer service. Because prayer service times vary with each different congregation, it is important to be in contact with clergy liaisons and other community leaders in order to determine prayer service times for each individual synagogue.

 


Anti-Defamation League

SECURITY ADVISORY

September 12, 2012

Today’s headlines from Libya and Egypt, where American embassies were attacked, suggest a need for increased vigilance in advance of and during the High Holidays. The murder of the American Ambassador to Libya and three of his colleagues in Benghazi may have been planned as revenge for the recent killing of a high-ranking al-Qaeda leader and timed to coincide with the anniversary of the September 11th terrorist attacks. There have also been reports of protests in both Benghazi and Cairo responding to a virulently anti-Muslim video, “Innocence of Muslims,” being promoted on YouTube. The trailer for this video portrays the Prophet Muhammad as a child-molester, and homosexual and a philanderer, and some stories are linking the video to an Israeli-American. Regardless of what triggered the anti-American violence in Libya and Egypt, and who produced the highly offensive video (about which questions are still circulating), the timing of these events and the possibility that they may incite others to violence prompts us to recommend extra precautions.

It is important to emphasize that ADL does not currently have any information regarding a specific threat to any Jewish institution. Nevertheless, we recommend the following action steps – including specific priorities for the high holidays.

Action Steps:

  • Keep your eyes and ears open for anything unusual or suspicious and call law enforcement immediately if you come across something. Unusual behavior, unwarranted interest in your facility (including unusual traffic patterns), suspicious or unattended packages and strange devices should be promptly reported to the police or security personnel. Advise staff and volunteers to do the same. See ADL’s Guide to Detecting Surveillance of Jewish Institutions.
  • Ensure that staff members, including newly hired personnel, and all volunteers know what to do in the event of an emergency.
  • Review and practice security procedures. In particular, review with all personnel their role in security. Ensure that your institution’s rules and procedures dealing with who gets into your facility are sufficient and enforced (access control).
  • Make sure to use the security devices you have in place and that access controls are being used properly. For example, ensure that communications equipment and video cameras are working and properly used.
  • Renew/establish relationships with local law enforcement and discuss security. If you have not established personal relationships with key police personnel, set up a meeting to do so.
  • Trust your instincts. If something strikes you as being out of place or problematic, call law enforcement immediately.

For the High Holidays:

  • Advise local law enforcement of High Holy Day schedules and special events. In particular, communicate with the police commander of the jurisdiction in which your institution is located.
  • Ensure that ushers understand that they play a critical role in security matters (even where there is security staff), as they are often used to control access to the sanctuary and are in a position to spot trouble early.
  • Ensure that ushers are familiar with suspicious activity indicators, and encourage them to promptly report anything suspicious to the police or security personnel. Review ADL’s Guide to Detecting Surveillance of Jewish Institutions.
  • Establish procedures for keeping people out of your institution who do not belong. It is important to establish policies and procedures well ahead of time so that ushers and others who are reacting to developing situations know how to respond according to pre-determined rules.
  • If your institution has hired a police officer or security guard, provide them with specific instructions and identify someone to be their primary contact if they have questions (such as an usher captain).
  • Encourage staff, leadership, and constituents to trust their instincts if they come across someone or something suspicious.
  • Pre-event publicity for upcoming events should be reviewed in light of security. Potential gains in audience numbers must be weighed against the security concerns created through different types of publicity.

You may refer to ADL’s security manual, Protecting Your Institution, for additional information at ADL’s security website: www.adl.org/security.

Please do not hesitate to contact this office with questions or for further assistance.

Again, active shooters

July 20, 2012

Our thoughts and prayers are with the victims of the shootings in Colorado. The greatest horror is the realization that such incidents are all-too-easy to commit. How should organizations plan to protect their students, staff, congregants and others?

Recommendations (scroll down for resources)

There are no perfect solutions, but planning and training can mitigate active shooter incidents. The first step is maintaining good access control. Keeping someone who wants to do harm outside is the best way of protecting those inside.

  • Evacuate: Building occupants should evacuate the facility if safe to do so; evacuees should leave behind their belongings, visualize their entire escape route before beginning to move, and avoid using elevators or escalators.
  • Hide: If evacuating the facility is not possible, building occupants should hide in a secure area (preferably a designated shelter location), lock the door, blockade the door with heavy furniture, cover all windows, turn off all lights, silence any electronic devices, lie on the floor, and remain silent.
  • Take Action: If neither evacuating the facility nor seeking shelter is possible, building occupants should attempt to disrupt and/or incapacitate the active shooter by throwing objects, using aggressive force, and yelling.
  • Other considerations?
    • Train building occupants to call 911 as soon as it is safe to do so.
    • Train building occupants on how to respond when law enforcement arrives on scene.
    • follow all official instructions, remain calm, keep hands empty and visible at all times, and avoid making sudden or alarming movements.

Summer camps

Summer camps bring special challenges, especially when the campers are young. Planning and training may be even more critical, but the general guidance remains:

  • Evacuate. Staff should know your plan and be able to evacuate to a safer area, if possible. It will be difficult to run with groups of young children.
  • Hide. Summer camp structures are rarely constructed in a way to withstand an attack by a determined intruder and they rarely have heavy furniture that might be used to blockade a door. If no secure structure is available, consider designating scattered, but assigned, assembly points for each small camper group. By making an intruder search for victims (over many acres of campgrounds)  this tactic buys some of the  time necessary for help to respond. Staff should be prepared with “quiet activities” alternatives. This is a situation when good communication can be the difference between life and death.
  • Take action. The actions available in summer camps are dependent on the ages and abilities of the groups involved.

Resources

NYPD Pre-Passover Intelligence Analysis

April 17, 2012

Mitchell D. Silber (Director, Intelligence Analysis, NYPD Intelligence Division)  reviewed recent New York-based plots by Al Qaeda-inspired and self-radicalized individuals, such as the May 2011 plot by Ahmed Ferhani and Mohamed Mamdouh to detonate bombs at Manhattan synagogues and the case of Jose Pimentel, AKA Muhammad Yusuf, who was arrested last November as he constructed bombs that he intended to use against post offices and police cars in New York. Silber also discussed the roles of Hezbollah and Iran in attacks on Israeli targets overseas and provided information about a plot last month targeting synagogues in Milan, and the recent attack on a Jewish school in Toulouse, France in which four were killed.. View his presentation here.