Be Safe Think Security Think ADL

advertisement
Be Safe
Think Security
Think ADL
Created by: Adina Bodenstein
Intern Summer 2007
1
Do Not Frighten.
Educate.
2
No one expected what
happened
On April 19th, 1995, the residents
of Oklahoma City did not expect…
Who would
have thought
that on
August 10th
1999,
innocent lives
would be
violently
affected by a
white
supremacist?
3
ADL’s Security Mission
Statement
 Enhance the security of the Jewish
community and its institutions through
security education and training.
 Understand the need for community
security
 Assist in developing and achieving
security goals.
 Provide guidance on security issues.
 Provide assistance during crises.
4
ADL’s Security History
 Fights: Hate, Anti-Semitism, Bigotry
 Serving the U.S. and Overseas since
1913
 1999- First Regional Office Security
Committee (IASSL)
 2007- First National Security
Committee
 Conducts a minimum of one security
conference per year.
5
What We Need From You
 Make Security a top community priority.
 Make ADL your security partner.
6
Myth: Increased Security Makes
People Nervous
Increased security:
 Fosters
a feeling of protection
 Reduces tension
 Reassures the community
7
Nature of Security
 NOT a program, event, or evacuation drill.
 NOT only fancy locks, cameras, alarms or walls.




SECURITY IS:
A reflection of the Care, Respect, Responsibility we
exhibit towards the institution and its
members/congregants.
A conceptual mindset
The application principles and procedures we’ve
been taught since childhood
An investment in education, training and the
creation of institutional discipline
8
A Human Process
 Security is not mechanically driven.
 There has never been a physical barrier
that humans cannot go around, under,
over or through.
9
Vigilance, Vigilance, Vigilance
 Every employee must assume responsibility
for security
 Ongoing, Constant Training & Attention
 Security Devices are not enough.
 Every mechanical system will break down,
every human will make a mistake. Security is
designed to mitigate these realities.
Perseverance * Consistency
Commitment * Responsibility
We are relying on your personal commitment.
10
If Only We
Were Always This
Lucky…
11
Wouldn’t That Be Nice!
12
Security Chain of Command
13
We Are Only Human
“Morris, I think I’m alone in the office.”




Do not underestimate criminals
Be prepared to mitigate and learn from your
mistakes.
Security Company Contact List for ADL
sometimes situations seem totally under
control until…
14
Cat got your….
15
What Do We Learn From
Pinky?
 WHEN IN DOUBT ALWAYS PRESUME
DANGER
 WHEN SECURITY IS A TOP PRIORITY:
 FEWER ISSUES ARISE
 WHEN THEY DO, THEY CAN BE PROMPTLY
DEALT WITH.
 IN EMERGENCIES PEOPLE REVERT BACK
TO THEIR TRAINING.
16
Distance from Detonation
…If You Can See the Bomb, The Bomb Can See You. If
you HOLD the Bomb…The Bomb Can See You Even
Better….
17
Distance From Detonation
 All
Bombs
Are
Dangerous
 Act
Accordingly
18
Distance From Detonation
Cont.
19
•
20
Physical Security
 Only purchase security devices you can:
Afford it.
Maintain it.
Replace it.
Does your staff know how to utilize the devices?
Remember the device alone will not keep the
bad guys out.
PERSEVERANCE!
21
A Process Not a Destination
 Year Round, Constant Training
 Focus on the Issues and the Challenges
 Discipline to Maintain in the Face of
Skeptics
 All Threats Must Be Taken Seriously
 Never have to say “Had we Begun
Earlier…”
22
Security Tool Box
 1) Planning:



Risk Assessment
Include all constituents in planning
Break down plan
23
Security Tool Box: Continued
 2) Training


Constant, Ongoing
Keep all materials and information up to
date
3) Execution


Ensure clear lines of communication
Build in redundancy
24
Already Read it! Shred It!
 Never dispose of
documents in unsecured
wastebaskets.
 Shred confidential
documents:



Containing names of
staff
Fund-raising
Correspondence
 Use a cross-cut
shredder.
 Consider an on-site
shredding service.
25
The Great Communicator
Be Clear
In Your Need!
Security is a managerial
position for all!

Make sure all incidents
are reported.


Make sure a reporting system
is in place.
Stress the duty and responsibility
of all.
26
Key Elements for a Successful
Security Conference
 Consider a lay person as emcee
 Keynote describing the nature of security
 Presentation by ADL Investigative Researcher





assessing threats
Presentation of micro issues within the
community
Speaker relating information from Federal
agencies
Effective Educational Methods
Closure
Q&A
27
What is a “Micro” Issue?
 Community Policing
 Intelligence Units
 Bomb Squad
 Crime Prevention Specialists
 Institution specific or employment specific
issues



How to utilize security guards.
Summer camp security procedures.
Security role of receptionists.
28
Life After Security
Conferences
 Create Boutique Security Programs
e.g. a special security conference for synagogue
leaders on protecting Torah scrolls.
 Develop Law Enforcement Contacts
 Constant Training
VIGILANCE, VIGILANCE, VIGILANCE
29
Model Security Conference
 Do’s

 Don'ts
use section materials

- DVD, manual, cut out
sheets

Discuss planning,
procedures, and training

Ensure audience
participation
 Scenarios,
 break out sessions
 role playing
 Micro Issues specific to
the community:
-




Over program
Go after law
enforcement stars
unless they can speak
to the needs of the
audience.
Deal with macro issues
Make your audience
observers
Community policing
Intelligence
Bomb threats
Securing your
institution
30
More Engaged. More
Retained.






Scenarios
Breakout Sessions
Stories
Visuals: photographs, video
Q&A
SOCRATIC METHOD
 Do not tell people what to do. Ask Questions.
The more the audience participates, the more
they will remember.
31
Utilize Scenarios
32
Know and Utilize Your
Resources
 Home Office
 www.homeoffice.gov.uk
 Homeland Security
 www.dhs.gov
 London Prepared
 www.londonprepared.gov.uk
 Metropolitan Police Anti Terrorist Branch
 www.met.police.uk
 National Infrastructure Security Coordination Center (NISCC)
 www.niscc.gov.uk
 Keep Schools Safe
 www.keepschoolssafe.org
 SCAN
 www.scnus.org
33
Know and Utilize Your
Resources
 Ready
 www.ready.gov
 Bomb Threat Response
 www.threatplan.org






FEMA
www.fema.com
Secure Community Network
www.scnus.org
ASIS International
www.asisonline.org
34
Know Your Resources:
Threatplan.org
35
Know Your Resources: MI5
36
Know Your Resources:
London First
37
Know Your Resources:
London Prepared
38
Words to Live By
Program  Evaluate  Improve
39
Q&A
40
Download