Bomb threats/hoaxes: are you ready?

February 24, 2020

As reported in the JTA Daily Briefing, 19 Jewish organizations (mostly JCC’s) received an email threat yesterday (Sunday) morning. The threat alleged that the writer was concerned about an immigration issue and threatened to remotely detonate bombs if a certain demand was not met. The Community Security Initiative (a joint program of UJA-Federation and JCRC-NY) immediately communicated with our local and federal partners. The consensus was that the threat was not credible.

Do you have a threat procedure? Do you regularly review your procedures and/or drill? Should we be worried?

At this time the experts conclude that incidents referencing threats against schools, Jewish facilities and businesses are not likely t0 represent a credible terrorist threat for two reasons:

  1. terrorists’ rarely provide operational insight into their planning, and
  2. the fact that nearly all hoaxes in the United States are conducted by criminal actors or those instigating a nuisance prank.

Consider yesterday’s incidents to be a drill

Now is a good time to review your threat protocols. Of course you call 911, but are the right people authorized to do so. Who else needs to be notified? Should you evacuate? Who makes the decision? Learn more about bomb threats and more on our dedicated webpage: www.jcrcny.org/bomb

Evacuations can be tricky. Review our post, To evacuate or not to evacuate? That is the question. Triggering an evacuation could be an effective part of an active threat plan, with an attacker waiting outside to shoot, stab, bomb or ram those fleeing the building.

Bottom line. Consider identifying a relatively safe haven within your building (e.g., a gym or auditorium). Create a protocol to ensure that the safe haven in inspected every day to confirm that there are no suspicious objects present. If a threat is delivered, the safe haven can be quickly checked and the building occupants can temporarily be moved into that room. After the police arrive, they should check the immediate surroundings for possible threats before the people are allowed to exit.

Of course, there’s an old Army saying (sometimes attributed to Gen. Eisenhower) that, “Plans are worthless, but planning is essential.” May we never need to implement those plans.

 

Recent Propaganda Releases by ISIS and Al-Qa’ida Promote Intensified Attacks by Supporters in the West

February 11, 2020

This assessment from NYPD has information that can be used to support both the federal and New York State grant applications. We highlighted issues concerning the Jewish community.


Open Source Assessment/February 10, 2020

Two recent extremist propaganda releases disseminated by ISIS’s al-Furqan Media and al-Qa’ida in the Arabian Peninsula’s (AQAP) Al-Malahem Media called on Salafi-jihadist supporters to intensify attacks as part of a retaliatory campaign of violence against the West, which may resonate with homegrown violent extremists (HVEs) based in the U.S. Both media campaigns referenced a broad variety of tactics, with ISIS’s statement promoting the use of conventional and chemical weapons, and AQAP’s message promoting simple, low-tech methods, as well as cyberwarfare campaigns.

  • While both propaganda statements called for an escalation in attack efforts, ISIS’s propaganda release notably emphasized a “new phase” geared specifically towards targeting Israeli and Jewish interests. ISIS previously referenced chemical weapons tactics in numerous propaganda graphics, demonstrating the group’s persistent support and interest in this attack method.  While the NYPD is not aware of any credible, active, or specific threats at this time, this statement, coupled with an already heightened threat environment, may serve as a catalyst for increased violence against Jewish communities.
  • Additionally, AQAP’s latest propaganda release may potentially have a stronger resonance with al-Qa’ida-aligned HVEs in the West following the recently confirmed death of Qasim al-Rimi, the leader of AQAP, who was killed in a targeted U.S. counterterrorism operation in Yemen.
  • On January 27, 2020, ISIS’s official media apparatus published a 37-minute Arabic-language audio statement attributed to its new spokesperson, Abu Hamza al-Qurayshi, marking his second speech since the death of ISIS leader Abu Bakr al-Baghdadi and spokesperson Abu al-Hassan al-Muhajir in separate U.S. counterterrorism operations. While much of the statement—titled “God Destroyed Them and a Similar Fate Awaits the Disbelievers”—revisited ISIS’s narrative of survivability and endurance despite strategic setbacks, al-Qurayshi notably declared war on Israel, and called for ISIS supporters to broadly intensify their attack efforts worldwide.
  •  Throughout the speech, al-Qurayshi claimed that U.S. narratives about ISIS’s defeat in the Middle East are false and that the U.S. has historically been unable to defeat its adversaries, specifically referring to the U.S. withdrawal from Iraq in 2011. He asserted that ISIS will persist despite al-Baghdadi’s death. The statement appears to have been recorded in recent weeks, as it also referenced the death of Iranian Islamic Revolutionary Guard Corps Quds Force (IRGC-QF) Major General Qassem Soleimani, who was killed in early January 2020.
  • After congratulating ISIS militants for waging a retaliatory campaign of violence in response to the deaths of al-Baghdadi and al-Muhajir, al-Qurayshi encouraged supporters to continue the revenge efforts by increasing the frequency of attacks. This specific statement could potentially resonate with lone offenders as a call to arms from core ISIS leadership.
  • Al-Qurayshi announced the beginning of a new stage for ISIS aimed at reclaiming Jerusalem. He specifically urged ISIS affiliates in the Sinai Peninsula and Syria to turn Israeli “settlements and markets into a proving ground for your rockets and chemical weapons.” He also ordered Muslims to thwart the U.S. peace plan referred to as the “Deal of the Century,” and implored Palestinians and Muslims worldwide to target Jews. While previous ISIS messaging also emphasized the targeting of Jewish and Israeli interests in an effort to inspire attacks by established ISIS affiliates and lone offender supporters, the emphasis on these targets in this audio message likely coincides with the latest proposed U.S. peace plan for the Middle East.
  • On February 6, U.S. President Donald Trump announced that Qasim al-Rimi, the emir of AQAP and potential heir to al-Qa’ida leader Ayman al-Zawahiri, was killed in a U.S. military counterterrorism operation. Al-Rimi was previously featured in a propaganda video disseminated by AQAP on February 2 that claimed responsibility for the December 2019 shooting at Naval Air Station Pensacola, praised global al-Qa’ida-affiliated operations, and emphasized the importance of continued retaliatory attacks against U.S. interests. Given al-Rimi’s death, his latest message urging lone offender attacks against the U.S. may also catalyze HVEs to conduct retaliatory attacks.
  • AQAP’s propaganda video featured Qasim al-Rimi, often pairing his image with other al-Qa’ida ideologues. He declared that AQAP was responsible for the December 2019 shooting at Naval Air Station Pensacola which was conducted by Saudi aviation student Mohammed Saeed al-Shamrani, who he claimed was a sleeper agent for AQAP. Similar to the retaliatory narrative in past AQAP propaganda messages, he stated that the shooting was in revenge for crimes committed by the U.S. across Africa, Asia, and the Middle East. Additionally, on February 4, the al-Qa’ida-affiliated al-Shabaab echoed this narrative by congratulating AQAP for its role in the Pensacola attack and encouraged continued lone offender operations in the West.
  • Al-Rimi connected the Pensacola shooting to other al-Qa’ida-affiliated operations, stating that it was part of a series of global attacks. He compared al-Shamrani to the group’s other perceived “heroes,” such as Nidal Malik Hassan, the November 2019 Fort Hood shooter, and Tamerlan Tsarnaev, one of the brothers who orchestrated the 2013 Boston Marathon bombings, in a likely attempt to encourage similar operations by HVEs in the West.
  • Most significantly, al-Rimi explicitly called for lone offender attacks in the U.S and told supporters to make sure their “chief concern” is “America.” He urged students, journalists, doctors, engineers, merchants, workers, Arab and non-Arabs to use low-tech, simple tactics, including vehicle ramming, firearms, and explosives. He also encourages viewers to consult AQAP’s Inspire magazine for tactical guidance.

IMPLICATIONS FOR NEW YORK CITY

There is currently no direct, credible or specific threat to New York City following these recent propaganda releases by ISIS and AQAP media entities; however, ISIS’s calls for attacks against Jewish communities highlights the importance of vigilance for suspicious activity indicators at similar locations, houses of worship, and Jewish faith community gatherings throughout the five boroughs. In recent months, authorities have disrupted numerous plots by malicious actors from across the violent extremist ideological spectrum who espoused anti-Semitic views and targeted the Jewish community.

Security personnel are advised to be on alert for suspicious behavior that could indicate pre-operational surveillance for an attack. Such behavior could include individuals taking photographs of security procedures in place, and asking probing questions of security/law enforcement officers stationed outside such locations.

Information sharing and prompt reporting of suspicious behavior indicators between the public, private-sector security personnel, faith community leaders, and law enforcement authorities remains vital to the deterrence, detection, and disruption of terrorist activity and the prevention of attacks.

If You See Something, Say Something – 1-888-NYC-SAFE (1-888-692-7233)

New DHS resource guide and mail screening poster

June 04, 2019

New resource guide. Take a look at DHS’ new resource guide, Security of Soft Targets and Crowded Places. It’s essentially a one-stop table of contents for DHS’s free materials, including links for help on identifying suspicious activity, access control and screening, active assailants (they’re not just shooters anymore) and bomb threats. Follow the supplied links for an introduction to facility security that can serve as a good first step for houses of worship, schools and other soft targets. Resources include fact sheets, guidance, and online training and education courses.


Mail screening poster. Thanks to the world’s leading geopolitical intelligence platform, Stratfor, for its timely reminder about mail and package screening after an attempted bombing.

  • While many questions remain in the case of a parcel bomb sent to a Mexican senator, the largest is why the mail of such a high-level official was not screened.
  • While politicians and large corporations clearly must take significant measures to screen their mail, even ordinary people (and Jewish organizations) should open their mail cautiously.
  • Simple steps can help everyone from the largest entities to the average citizen.

Note that Cesar Sayoc, 57, admitted in court to having mailed 16 explosive devices to a variety of officials and to CNN’s offices in October 2018. He allegedly said he would “eradicate the Jews” if he had the power to, along with lesbians, black people and Hispanic people.

We urge you to download the tips found on the Stratfor graphic and share it with your staff and others.

May 5779 be a year of peace and security; what you can do to help

August 09, 2018

Rosh Chodesh Elul includes clarion calls indicating that the High Holidays are coming soon. So, now is a good time to check out a recent presentation on synagogue security or to take a deeper dive into the library of documents available on the JCRC-NY Security Resources pages. Here are some relevant selections:

High Holiday Security and Emergency Preparedness Planning Library

Topical guidance

Vulnerability, Risk and Safety Assessments and Planning

Update: Suspicious Package Indicators and Recommended Response Procedures

March 28, 2018

The National Explosives Task Force (NETF) coordinates rapid integration of explosives expertise with intelligence and law enforcement information to support operational activities. Products are peer-reviewed by explosives experts from participating agencies.

National Explosives Task Force
Suspicious Package Indicators and Recommended Response Procedures

Package bombs, which include letters, parcels, and anything delivered by postal or courier service, are not a new technique and have been used by terrorists and anarchist groups. Many of these bombs are triggered when victims handle or open the packages, although they can be initiated in other ways.

Package bombs come in a variety of shapes and sizes, and they may look harmless. There are a number of characteristics that may lead you to become suspicious of a letter or package.

If you believe a letter or package is suspicious:

  • Stop. Do not handle or open.
    Click on the image to download a copy of this poster.
  • Do not use cell phones, pagers, or two-way radios near suspected devices.
  • Be aware of secondary devices.
  • Evacuate and isolate the immediate area.
  • If applicable, activate the facility’s emergency plan.
  • Make note of the characteristics that caused suspicion.
  • Call 911.

Formal Screening Procedures
Commercial or government entities with mail screening procedures are advised to review existing procedures for screening packages, identifying suspicious items, and instituting the appropriate safety protocols.

If no current procedures are in place, guidance should be sought from local, state, and/or federal resources. Planning considerations should include (but not be limited to) recurring training for screeners, an understanding of the standards and limitations for operating times, and regularly scheduled maintenance of screening equipment, such as calibration, updates, and testing.

Response Procedures
The NETF prepared this document to raise awareness of package bombs and the need for diligence and safety procedures in evaluating suspected improvised explosive devices. If a suspicious package is found, call 911.  Any diagnostic or render safe actions should be performed only by the appropriate experts.

The U.S. government has resources on mail security available to citizens and businesses. More
information can be found at http://about.usps.com/securing-the-mail/mail-security-center.htm. Click here to download a PDF copy of this notice.

The National Explosives Task Force (NETF) coordinates rapid integration of explosives expertise with intelligence and law enforcement information to support operational activities. Products are peer-reviewed by explosives experts from participating agencies.

Are you prepared? 5 steps to make your facility safer and more secure

August 30, 2017

(Click here to download a PDF of this webpage)

Organizational leaders should work to strike a balance: to offer a warm and welcoming facility, while at the same time ensuring that their members, students, staffs, clients and building are safe and secure. Leaders concerned with everybody’s safety and security should prepare to deal with emergencies, because “on the fly” reflexes might not be as effective as a pre-determined and rehearsed plan. While your “to-do” list at the beginning of the academic and program year is long, consider these tips to help you prepare for emergencies and ensure you can protect your constituencies.

1.  Control access to your facility

No unauthorized person should be allowed to enter your facility. Every person entering your facility should be screened by security (or other) staff.

  • Limit entrances and exits. Limit access to your facility to monitored entrances.
  • Don’t slow down regular users. Create a system to identify regulars (e.g., staff, members).
  • Screen irregular visitors. g., people with appointments, contractors, etc. See more at Sample Building Access Policies & Procedures.
  • Divide your building into sectors. Should people authorized to use one part of the building be able to wander into another? If you have an access control system, take advantage of its capabilities to allow specific access. Alternatively, use color-coded badges, wristbands or ID cards as a low-tech solution.

2. Plan your emergency response

Stuff happens. Emergencies are not events that you can handle on the fly. Consider having plans, procedures and designated teams empowered to make decisions during emergencies, and trained and prepared to respond to events.

  • Develop and train an emergency response team. Designate someone to be in charge during an emergency and someone else as backup. Build a support team. Have the team work together on your response plans.
  • Build a relationship with your local police.Work with your local police throughout the year and give them the opportunity to get to know your programs, your rhythms, your people and your building. Ask them for suggestions as to how to make your people safer.
  • Know what to do if you receive a threat. Get some ideas about preparing for phone, email or social media threats and evacuations and sheltering at: https://jcrcny2022.wpengine.com/2017/02/to-evacuate-or-not-to-evacuate-that-is-the-question/.
  • Have an “active shooter” Do the people in your facility know what to do if a person with a gun or sharp-edged weapon shows up? Find more information at: www.jcrcny.org/activeshooter.
  • Be ready to tell people what’s happening. Don’t let your stakeholders learn about an emergency at your facility from the media. Be prepared to communicate. Have some pre-written messages: be first; be right; be credible. Consider options including hardware and web-based emergency notification systems that will simultaneously email, text and phone pre-prepared lists, dedicated social media groups or free apps such as WhatsApp or GroupMe that will send texts (including a link to your website with more info and updates). Now is the time to collect the cell numbers of your stakeholders.
  • Involve your board in the security and preparedness process.

3. Develop a routine

Security, done well, must be done daily and involve everybody.

  • Create a culture of security. Everyone should feel responsible to report suspicious activity. “If you see something, say something” should be part of your culture of security.
  • Be aware of hostile surveillance. If you see something, say something. If it is not an emergency, call the NYPD at (888) NYC-SAFE, outside NYC (866) SAFE-NYS. For more information download Indicators of Terrorist Activity from the NYPD, Guide to Detecting Surveillance of Jewish Institutions from the ADL at adl.org/security and Security Awarenessby Paul DeMatties at Global Security Risk Management,  LLC.
  • Schedule regular walkarounds. Designate an employee to complete a “walkaround” of your building and your perimeter on a daily basis, if not more often. They should be looking for suspicious objects, items blocking evacuation routes and anything else that “Just Doesn’t Look Right.”
  • Make sure you’re getting the right information. Sign up for alerts to learn when the local and/or global security threats conditions change. Sources: JCRC-NY Security Alerts at jcrcny.org/security, https://www.nypdshield.org/public/signup.aspx, emergency alerts from Notify NYC or your local emergency management office and have a weather app on your smartphone to warn you about severe weather.
  • Work with your security provider and your staff to write, “post orders”. Your guards should not merely decorate your entrance. They should know what you expect them to do daily and in emergencies.

4. Don’t forget to train

Major leaguers take batting practice before every game. True, they started batting in the Little Leagues, but drills help people to know, instinctively, what to do. Emergencies that turn to chaos become crises. People know what to do during a fire drill, because they have participated in fire drills since grade school.

Use tabletop exercises involving a wide swath of stakeholders to help you to determine policies and procedures. Once you have determined your plans and procedures, schedule evacuation and lockdown drills. And remember … once is not enough.

5. Explore your security hardware options

Your security hardware should support your security procedures. There are federal and New York State grants available for many organizations (see: www.jcrcny.org/securitygrants for more details). Consider obtaining the funding for:

  • Your main and secondary doors should lock securely and be able to withstand an attack by a determined intruder.
  • Do your windows lock securely? Reduce the risk of break-ins, vandalism and even mitigate the extent of injuries from bomb blasts by properly installing security/blast-mitigation film on your current windows or replacing them with windows with those properties built-in.
  • Access control systems. The electronic possibilities are endless: access cards, biometrics, alarms and more. Get professional advice (see JCRC-NY’s guidance on Security vendors), figure out a hardware plan that is expandable and adaptable.
  • Video monitoring. Deploy CCTV systems in various ways. First, as part of a video intercom system to identify people seeking to enter your facility. Second, to monitor secondary entrances (you can add alarms that warn you that a door was opened, alerting someone to check the monitor), and finally, to help to detect hostile surveillance.
 David Pollock and Paul DeMatteis
security@jcrcny.org | August 30, 2017

Israeli-American Teen Arrested for Bomb Threats

March 23, 2017

See the links below for information about today’s arrest of a suspect believed to be responsible for the majority of the bomb threats over the past months. Remember, another individual was already arrested and law enforcement authorities believe that there are other copycats.

It is important that we stay vigilant and continue to hone our response plans. We greatly appreciate the work of the FBI, NYPD and the Israeli National Police for their work.

 

 

To evacuate or not to evacuate? That is the question.

February 01, 2017

With over 150 hoax bomb threats reported, you should have already have a plan. However, the ongoing threats should serve as a reminder to review our ongoing guidance, make use of the resources and implement the recommendations, as appropriate.

Should we be worried? At this time the experts conclude that the series of
incidents referencing threats against schools, Jewish facilities and businesses likely do not represent a credible terrorist threat for two reasons:

  1. terrorists’ rarely provide operational insight into their planning, and
  2. the fact that nearly all hoaxes in the United States are conducted by criminal actors or those instigating a nuisance prank.
From “Bomb Threat Guidance” from US DHS and the FBI. Click on the image to download the brochure.

What are my options? Many security experts question the wisdom of the policy of evacuation. After all, a terrorist could trigger an evacuation of a facility with a simple phone call and then attack the evacuees in multiple ways. On the other hand, someone could place 100 hoax bomb threat calls, but actually plant a bomb on the 101st. (In rebuttal, why make a warning phone call when simply planting the bomb works).

The bottom line is that there is no perfect solution, so all institutions should think about their options and consult with local law enforcement in the absence of the pressure of an actual emergency.

Think about options

Your response should be tailored to the nature of the threat. Don’t expect people to gather information, to analyze the situation and to identify the best option in the wake of a threat. Understand the risk (use the chart to the left) and define actions that can be taken under various circumstances.

Some other ideas:

  • Set up a meeting with your local police to review and discuss your options.
  • There is no perfect solution. This is an issue that should be raised at a security committee or board meeting. Remember, your reputation is at stake and your decision may create liability issues.
  • Identify possible options leading to a sheltered evacuation, i.e., one that minimizes the dangers of an attack on evacuees:
  • Is your parking lot a relatively safe area? Could you evacuate there and stand an appropriate distance from your facility? Is there a sheltered path to an adjoining building? Can the local police establish a perimeter to protect the evacuees?
  • Develop appropriate protective measures based on your facility’s characteristics. For example, some facility managers have identified areas (e.g., a pool or gym) that are not cluttered and therefore, easy to check for bombs. If the architecture of the building is engineered so that the building would not likely collapse on those inside, one option is to evacuate people to these safe (or more accurately, safer) places (HT to Steve Levy of ISA).
  • Communicate, early and often. If you decide not to evacuate, some stakeholders will question your judgement and try to second-guess you. A well-planned sheltered evacuation option is easy to explain and to show that your highest priority is the safety of your stakeholders. Whatever you choose, have pre-written messages ready to go should you become a target.

No one can give you a perfect answer. Identify your options, consult with the best people possible and keep your people safe.