Suspicious Mail or Packages Guidance
Protect yourself, your organization, and your mail room in the event that you receive a suspicious letter or package.
- High Holidays
- Incident Response
Best-practice guidance documents, training materials, security protocols and checklists, and templates, and more– all developed by leading experts in communal security.
DISCLAIMER: These guidelines are for informational purposes only. Secure Community Network advises seeking professional security advice tailored to your situation. SCN makes no representation, guarantee, or warranty that adopting any recommendation presented here will ensure that your facility or users will be invulnerable to attack or crime. SCN shall not have any liability because of any decision by you to adopt or not adopt any part of these guidelines. These guidelines are copyrighted property of SCN and may not be copied, reproduced, republished, posted, transmitted, distributed, or changed without the prior written permission of SCN.
We are a team of intelligence, law enforcement, homeland security, and military professionals, recognized as the community’s official liaison to federal law enforcement, and the only faith-based nonprofit with a direct line to the FBI.
Across America, Jewish communities are on heightened alert and are wondering what role armed security should play in their security plans.
Does hiring a private security firm make your Jewish organization safer?
Search
Filter By
Protect yourself, your organization, and your mail room in the event that you receive a suspicious letter or package.
Safety and security remain a shared responsibility and a key priority for community institutions across the United States. From schools to houses of worship, our nation has seen increased levels of targeted violence occurring at these facilities. The Jewish community, in particular, faces a complex and dynamic set of threats. Increased numbers of anti-Semitic incidents and hate crimes directed at the community after the tragic loss of life and injury inflicted at Tree of Life synagogue in Pittsburgh require a consistent, comprehensive and standardized approach to the security of our whole community. The below guidelines constitute a component of a layered security plan and may assist in providing an increased level of safety while also raising community situational awareness.
This quick reference checklist is designed to help employees, volunteers and decision makers of facilities, institutions, etc. in responding to harassing or threatening calls. It is critical that relevant information be documented and recorded to provide to law enforcement and other relevant parties.
Simply saying “Hello” can prompt a casual conversation with a new person, providing an opportunity to observe and establish a connection. The OHNO approach–Observe, Initiate a Hello, Navigate the Risk, and Obtain Help–enables staff to observe and evaluate suspicious behaviors, empowering them to lower risk and obtain help when necessary
This document represents a compilation of existing best practices, considerations, and information intended to assist individuals and organizations with general financial preparedness planning guidance and basic considerations. It is not intended to provide comprehensive, organization-specific advice or policy guidance on financial matters nor is it meant to replace the advice of a financial professional or legal counsel. For comprehensive individual or organization-specific financial advice and recommendations, a financial professional should be consulted. SCN specifically disclaims any and all responsibility for and is not responsible for any loss or damage arising out of the use, nonuse, or misuse of this information.
In 2023, The Secure Community Network identified 927 bomb threats, an increase of 1,016.8%from 2022. Following the Hamas terrorist attacks of October 7th, SCN identified…
What is Cyber Security? A set of principles and practices designed to safeguard your computing assets and online information against threats. Why is Cyber Security important? Studies consistently show that 85-95% of cyber security incidents/data breaches are attributable to "end users" or human error. As individuals and organizations, we have a critical role to play in the security of our data, personal information and systems.
Decode common acronyms as they apply to the Nonprofit Security Grant Program (NSGP).
"This quick reference checklist is designed to help employees and decision makers respond to a threat or harassment in an orderly and controlled manner with the first responders and other stakeholders. Threats may be received by phone, email, social media, in person, or by vandalism/graffiti. Act quickly but remain calm and obtain information with the checklist on this sheet, if possible. In case of emergency, call 9-1-1."