SAFE Washington‎ > ‎


Teach your staff to:
A) Stop and Look, Assess the Situation.
B) Then, Do Something.
Teach Your Staff: First Aid, and Teach Psychological First Aid.

Teach Respect, Tolerance, and Understanding.

In the end, it’s a sense of hope and optimism that people acknowledge, and which brings resilience.

Jewish Community Outreach - US Department of Homeland Security - Pacific NorthWest

posted Feb 26, 2015, 1:34 PM by Andrew Chadick

U.S. Department of Homeland Security / Secure Community Network

Jewish Community Outreach

Jewish Federation of Greater Seattle / SAFE Washington


DATE: March 1st 2015


LOCATION: (Will be announced with RSVP Confirmation)

This session will also be Broadcast on the SAFE Washington Network using GotoMeeting for those that cannot attend in person.


BACKGROUND:  In the past year, there have been multiple attacks against the Jewish community to include the January 2015 raid on a kosher food market in Porte de Vincennes, France where 19 Jewish patrons were held hostage and four of the patrons eventually murdered; the December 2014 stabbing attack at the Chabad-Lubavitch Headquarters in Brooklyn, NY; and the fatal shootings at the Kansas Jewish Centers in April 2014. 


In an effort to enhance security within the Jewish Community, the Department of Homeland Security Deputy Secretary conducted an initial call with senior Jewish community leaders on December 11, 2014, to coordinate heightened outreach. This Jewish Community Outreach will continue previous collaborative efforts.  

Who should attend? Leaders of an agency, synagogue, or those responsible for the safety and welfare of their constituents & staff members.

In order to attend in person, or attend via webinar, you must RSVP to: by no later than Friday, February 27th at 5pmAn RSVP response will go out with special instructions for attendance and confirmation.

When you RSVP for this Community Outreach, please include your name, the agency you represent, your title, and contact information including phone number.

Note: Only those on the visitor list will be allowed to enter the building, and webinar attendance will be limited to those that RSVP (there are some limits to the number of attendees that can sign in via the web, so please RSVP for webinar early if you cannot attend in person.

Wireless Emergency Alerts

posted Feb 26, 2015, 1:24 PM by Andrew Chadick

Have you noticed a unique sound and vibration coming from your cell phone?  You may have received a Wireless Emergency Alert (WEA) - a nationwide emergency alert system notifying you of a pending emergency in your area. These messages provide information about extreme weather warnings, local emergencies, AMBER Alerts™, and Presidential Alerts during a national emergency.

WEAs look like a text message and show the type and time of the alert, any action you should take, and the agency issuing the alert. If you receive a WEA, follow any directions advised by the message and seek additional information from local media or authorities.

WEAs are sent by authorized government agencies through your mobile carrier. Government partners include local and state public safety agencies, FEMA, the Federal Communications Commission, the Department of Homeland Security, and the National Weather Service.

WEA messages can save lives! To learn more check, out FEMA’s WEA Public Service Announcements and the Be Smart. Know Your Alerts and Warnings guide from America’s PrepareAthon!

Food Safety During Blackouts

posted Feb 26, 2015, 1:20 PM by Andrew Chadick

Loss of power can jeopardize the safety of the food stored in your home refrigerator or freezer. In the event of a blackout, do you know how to determine if your food is safe to eat? The U.S. Department of Agriculture(USDA) offers tips to minimize the potential loss of food and lower the risk of foodborne illness.

Before a blackout:

  • Gather an emergency supply of shelf-stable food, packaged foods, boxed or canned milk, bottle water, and canned goods;
  • Have coolers and frozen gel packs on hand to keep refrigerated food cold if the power goes out longer than four hours; and
  • Keep freezer items close together—this helps the food stay cold longer.

Bacteria in food grow rapidly at temperatures between 40 and 140 degrees Fahrenheit. The USDA instructs setting your refrigerator at or below 40 degrees Fahrenheit. If the power is out for less than four hours and the refrigerator door is kept closed, your food should be safe.

Following a blackout:

  • Discard any perishable food items such as meat, poultry, fish, eggs, and leftovers that have been exposed to temperatures above 40 degrees Fahrenheit for two hours or more;
  • Use a food thermometer to test the temperature of food – never taste it!  You can’t rely on appearance and odor to determine whether food is safe; and
  • Discard any items in the refrigerator that have come into contact with raw meat, seafood, or poultry juices.

Power outages can occur anywhere at any time of the year. Make sure you and your family are prepared and know what to do to avoid getting sick.

CPR and First Aid Training Opportunity

posted Mar 18, 2014, 7:50 AM by Andrew Chadick

How to Protect the Information on Your SmartPhone

posted Mar 18, 2013, 10:31 AM by Andrew Chadick

We've come to depend on our smartphones so heavily it is hard to remember what we did before we had them.
If you have a smartphone, you now carry a fully functional computer in your pocket or purse.
That's a tremendous amount of information at your fingertips. Therefore, it is paramount that you safeguard your smartphone.

Common Risks for Smartphones

Take a moment to consider each of these areas:

• Loss of device and information theft. Smartphones are small and can easily be lost or stolen.
Unauthorized users may access your accounts, address lists, photos, and more to scam, harm or
Embarrass you or your friends; they may leverage stored passwords to access your bank and credit card
Accounts, steal your money or make credit card charges; gain access to sensitive material, and more.

• Social Engineering. A common mobile threat is social engineering. Whether via text message, image, or
Application to download, an incoming communication may be an attempt to gain access to your information.
A current example consists of a text message that comes from an unknown number, telling you that if you
Click on the link provided, you'll have access to thousands of free ringtones. If this sounds too good to be
True, that's because it is. The link is in fact a malicious link. Clicking on it will compromise the security of
Your smartphone.

• TMI (Too Much Information). Guidelines for protecting privacy, safety, and reputation when sharing via
Computers also apply when sharing via smartphones. Mobile devices enable instantaneous capturing,
Posting and distribution of images, videos, and information. They may also broadcast location information.

• Public Wi-Fi. Smartphones are susceptible to malware and hacking when leveraging unsecured public

• Bluetooth and Near Field Communications (NFC). Bluetooth is a wireless network technology that uses
Short-wave radio transmissions to transmit voice and data. NFC allows for smartphones to communicate
With each other by simply touching another smartphone, or being in proximity to another smartphone with
NFC capabilities or a NFC device. Risks with using NFC and Bluetooth include eavesdropping, through
Which the cyber-criminal can intercept data transmission, such as credit card numbers. NFC also has the
Risk of transferring viruses or other malware from one NFC-enabled device to another.

Simple Steps to Protect Your Smartphone:

1. Update the operating system. Smartphones are computing devices that need to be updated. Updates
Often provide you with enhanced functionality and enriched features, as well as fixes to critical security
Vulnerabilities. Your smartphone manufacturer should notify you whenever an update is available.

2. Use of security software is a must. As the smartphone market is increasing, so too is the amount of
Malware designed to attack smartphones. The software security solutions that are available for desktops
And laptops are not as widely available for smartphones. A key protection is to use mobile security software
And keep it up-to-date. Many of these programs can also locate a missing or stolen phone, will back up
Your data, and even remotely wipe all data from the phone if it is reported stolen.

3. Password-protect your device. Enable strong password protection on your device and include a timeout
Requiring authentication after a period of inactivity. Secure the smartphone with a unique password - not the
Default one it came with. Do not share your password with others.

4. Think before you click, download, forward, or open. Before responding, registering, downloading or
Providing information, get the facts. No matter how tempting the text, image, or application is, if the
Download isn't from a legitimate app store or the site of a trusted company, don't engage with the message.

5. Understand the terms of use. Some applications claim extensive rights to accessing and leveraging your
Personal information. If the app requires more access to your account and/or device than is needed to run
The service, do not continue. In addition, be aware that terms can change over time. Review your terms of
Use often.

6. Be cautious with public Wi-Fi. Many smartphone users use free Wi-Fi hotspots to access data (and keep
Their phone plan costs down). There are numerous threats associated with Wi-Fi hotspots. To be safe, avoid
Logging into accounts, especially financial accounts, when using public wireless networks.

7. Disable Bluetooth and Near Field Communication (NFC) capabilities when not in use. Capabilities
Such as Bluetooth and NFC can provide ease and convenience in using your smartphone. They can also
Provide an easy way for a nearby, unauthorized user to gain access to your data. Tum these features off
When they are not required.

8. Enable encryption. Enabling encryption on your smartphone is one of the best ways to safeguard
Information stored on the device, thwarting unauthorized access.

9. Securely dispose of your device. With the constant changes and upgrades in the smartphone market,
Many are upgrading their devices on a regular basis. It is important that you wipe the information from your
Smartphone before disposal. Additionally, make sure any SD cards are removed and erased. If you are not
Redeploying the SIM card to another device, then make sure your personal information stored on the SIM
Card is erased or destroyed.

Public Information in a Terrorism Incident

posted Oct 3, 2012, 11:53 AM by Andrew Chadick

January 29th & 30th.  This two day course examines the role of public information in managing a terrorism incident and provides practical training in crisis communication techniques.

In such an incident, it is imperative that community leaders, incident managers, and public information officers are prepared to communicate with the public through the news media. The course focuses on the role of public information in incident management, the information needs of the public in a crisis, and the various means of effectively communicating through the news media. Upon completion of the course, participants will understand the role of public information in a terrorism incident, and be prepared to plan and execute public information actions in the event of such an incident.

Target Audience: 
Agency partners that will have public information officer responsibilities during such an event.
Recommended Prerequisites: 
ICS-100, ICS-200, IS-700, and IS-800.  It is also recommended that participants take the IS-29 (PIO Awareness Training). Courses can be found here:

Due to Safety and Security, you must register for this event by January 15th, 2013 or you will not be permitted to enter.  

You must have a confirmation email of successful registration with you in order to attend.  

Please contact SAFE Washington with your name, agency name, and title when inquiring about this event.

Cyber Event Workshop & Cyber Event Tabletop Exercise

posted Jun 28, 2012, 9:56 AM by Andrew Chadick   [ updated Jun 28, 2012, 9:58 AM ]

Save the Date - Sept 5, 2012 Cyber Event Workshop    &     Sept 6, 2012 Cyber Event Tabletop Exercise

Emerald Down 2 - All are welcome to participate.

The workshop on 9/5 will be aimed at executive level personnel and will feature speakers who will describe and ennumerate the likely consequences of a large cyber event on organizations in our region.

During the tabletop exercise on 9/6 participant organizations will consider several scenarios and discuss interdependencies, response, recovery and collaboration.

Please see the attached flyer for details and registration.
Sent at: 12:08p PST
Please see the attached document: emerald_down_2_invite.pdf


Microsoft: Remote Desktop Protocol Vulnerability Should be Patched Immediately

posted Mar 14, 2012, 7:14 AM by Andrew Chadick   [ updated Mar 14, 2012, 7:17 AM ]

Microsoft is urging organizations to apply the sole critical update in this month’s Patch Tuesday release as soon as possible.

The critical bulletin – one of six security bulletins issued as part of today’s release – addresses two vulnerabilities in the Remote Desktop Protocol (RDP).

Microsoft Patch Tuesday March 2012“A little about MS12-020…this bulletin addresses one Critical-class issue and one Moderate-class issue in Remote Desktop Protocol (RDP),” Angela Gunn, security response communications manager for Microsoft’s Trustworthy Computing Group, explained in a blog post. “Both issues were cooperatively disclosed to Microsoft and we know of no active exploitation in the wild. The Critical-class issue applies to a fairly specific subset of systems – those running RDP – and is less problematic for those systems with Network Level Authentication (NLA) enabled.”

“That said, we strongly recommend that customers examine and prepare to apply this bulletin as soon as possible,” she added. “The Critical-class issue could allow a would-be attacker to achieve remote code execution on a machine running RDP (a non-default configuration); if the machine does not have NLA enabled, the attacker would not require authentication for RCE access.”

Ben Greenbaum, senior principal software engineer for Symantec’s Security Intelligence Group, agreed users should pay close attention to the RDP vulnerability.

“RDP’s purpose is to enable remote access from the Internet, but preferably to an authenticated user,” he said. “In this case, a malicious attacker can potentially take complete control of the computer. Failed exploit attempts of this issue will likely result in the user being confronted with the blue screen of death. If an attacker can bypass standard memory protection measures, however, they will have access at the kernel level.”

Microsoft Security Bulletin Summary for March 2012

Published: Tuesday, March 13, 2012

Version: 1.0

This bulletin summary lists security bulletins released for March 2012.

With the release of the security bulletins for March 2012, this bulletin summary replaces the bulletin advance notification originally issued March 8, 2012. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.

For information about how to receive automatic notifications whenever Microsoft security bulletins are issued, visit Microsoft Technical Security Notifications.

Microsoft is hosting a webcast to address customer questions on these bulletins on March 14, 2012, at 11:00 AM Pacific Time (US & Canada). Register now for the March Security Bulletin Webcast. After this date, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.

National Disaster Recovery Framework Released (Living Document)

posted Mar 9, 2012, 11:15 AM by Andrew Chadick   [ updated Mar 14, 2012, 7:18 AM ]

Stakeholder Engagement

As a result of the release of the National Disaster Recovery Framework (NDRF), there will be various, multi-city Stakeholder Forums held throughout the country starting in December 2011. Please join the stakeholder engagement sessions to learn more about the key concepts of the NDRF, the implementation of the NDRF in the state and local communities and its engagement with the Whole Community, and how these concepts can be used to drive recovery efforts after a disaster.

This meeting is a next step in providing participants with an understanding of how they can apply NDRF principles and concepts. Additionally, participant comments will be used to further develop and refine NDRF guidance documents, tools, and implementation strategies.

Our first stakeholder engagement session will occur on December 1, 2011 in New Orleans, Louisiana.

For more information on these events or if you would like to attend, please click on the Stakeholder Engagement link.


NDRF Graphic - National Disaster Recovery Framework - Recovery Support Functions and Coordinating Agencies

The National Disaster Recovery Framework is a guide that enables effective recovery support to disaster-impacted States, Tribes, Territorial and local jurisdictions. It provides a flexible structure that enables disaster recovery managers to operate in a unified and collaborative manner. It also focuses on how best to restore, redevelop and revitalize the health, social, economic, natural and environmental fabric of the community and build a more resilient Nation.

The National Disaster Recovery Framework is consistent with the vision set forth in the Presidential Policy Directive (PPD)-8, National Preparedness, which directs FEMA to work with interagency partners to publish a recovery framework. It is the first framework published under the Presidential Policy Directive reflecting the core recovery capabilities by supporting operational plans as an integral element of a National Preparedness System. It is a first step toward the PPD-8 objective to achieve a shared understanding and a common, integrated perspective across all mission areas—Prevention, Protection, Mitigation, Response, and Recovery—in order to achieve unity of effort and make the most effective use of the Nation’s limited resources.

For the first time, the National Disaster Recovery Framework defines:

  • core recovery principles,
  • roles and responsibilities of recovery coordinators and other stakeholders,
  • coordinating structure that facilitates communication and collaboration among all stakeholders, guidance for pre- and post-disaster recovery planning and;
  • the overall process by which communities can capitalize on opportunities to rebuild stronger, smarter and safer.

The National Disaster Recovery Framework introduces six new Recovery Support Functions that provide a structure to facilitate problem solving, improve access to resources, and foster coordination among State and Federal agencies, nongovernmental partners and stakeholders. Each Recovery Support Function has coordinating and primary Federal agencies and supporting organizations that operate together with local, State and Tribal government officials, nongovernmental organizations (NGOs) and private sector partners.

The National Disaster Recovery Framework presents three positions that provide focal points for incorporating recovery considerations into the decision making process and monitoring the need for adjustments in assistance where necessary and feasible throughout the recovery process. Those positions are Federal Disaster Recovery Coordinator (FDRC), State or Tribal Disaster Recovery Coordinators (SDRC or TDRC) and Local Disaster Recovery Managers (LDRM).

Last Modified: Friday, 16-Dec-2011 10:34:58 EST

Report: extremists on rise in WA

posted Mar 9, 2012, 7:34 AM by Andrew Chadick

Western Washington was home to 16 hate groups in 2011, three more than in 2010, the Southern Poverty Law Center said in a report released Thursday documenting the rise of extremist groups across the country. The 16 groups identified by SPLC represent the full spectrum of ideologies -- from neo-Nazis and skinheads to black separatists and militant animal rights groups. Four hate groups are based in Seattle: a skinhead group called Crew 38, a white nationalist group called the Northwest Front, and a black separatist group called the National Black Foot Soldier Network. SPLC also characterizes Seattle's Nation of Islam chapter as a hate group. Across Lake Washington, SPLC said the anti-Muslim group Faith Freedom is based in Bellevue. Faith Freedom contends it isn't a hate group. Its members say they are "anti-Islam," not anti-Muslim. The distinction, they say, is that the group opposes Islam the ideology but does not hate individual Muslims. Tacoma, meanwhile, is home to Aryan Nations 88, a neo-Nazi group. Nationally, the SPLC said the number of hate groups grew to a record 1,018 in 2011, up from 1,002 the year before. The report's author said he started seeing the rapid growth of extremist groups four years ago.
Most of the groups are only visible through a websites or flyers, but it takes just one determined individual to make them a threat. Hate groups in Western Washington:

Nation of Islam (Black Separatist)
National Black Foot Soldier Network (Black Separatist)
Crew 38 (Racist Skinhead)
Northwest Front (White Nationalist)

Aryan Nations 88 (Neo-Nazi)

Faith Freedom (Anti-Muslim)

Crusaders for Yahweh (Christian Identity)

National Socialist Movement (Neo-Nazi)

Crusaders for Yahweh (Christian Identity)


1-10 of 24