A presentation from the FDNY analyzing the June 12, 2016 terror attack on a nightclub in Orlando, Florida.
Over the last week there have been three attacks – one in Canada and two in the United States – in which law enforcement officers were targeted, leading to the death of five officers and one civilian. Based upon reporting it appears all the suspects in these incidents were motivated by elements of a far right anti-government ideology with a particular fixation on law enforcement. While it is unknown whether this spike is indicative of a long term increasing trend, it is significant from a near term perspective due to the short time frame and purposeful targeting of law enforcement.
Superstorm Sandy, a late-season post-tropical cyclone and the tenth storm of the 2012 Atlantic hurricane season, swept through the Caribbean and up the East Coast of the United States in late October 2012. The storm left 42 dead in New York State (NYS), thousands homeless and millions without power. Superstorm Sandy began as a tropical wave in the Caribbean on October 19, 2012. It quickly developed into a tropical depression and then a tropical storm in six hours. It quickly moved north, then turned northwest within the next week, making landfall on October 29, 2012 striking near Atlantic City, New Jersey with winds of 80 miles per hour. At one point, Superstorm Sandy’s hurricane force winds (74 mph) extended up to 175 miles from its center and tropical storm force winds (39 mph) out to 485 miles. A full moon made high tides 20 percent higher than normal, amplifying Superstorm Sandy’s storm surge.
Data contained within social network sites may assist law enforcement in gathering timely information in furtherance of crime prevention, preservation of public order, and the investigation of criminal activity, including suspected terrorist activity. These guidelines are promulgated, in part, to instill the proper balance between the investigative potential of social network sites and privacy expectations.
This product analyzes major terror attacks on hotels and provides a strategic-level assessment of the groups, tactics, and frequency of global terror attacks against hotels from 2002 – 2011. Additionally, the product identifies the deadliest types of attacks, comparing casualty counts and attack methods. The product was derived from media reporting and unclassified, for official use only sources.
A September 2012 presentation from the Fire Department of the City of New York describing the “transient threat” posed by by gourmet food trucks around the city.
Criminal complaint in the matter of United States of America against Quazi Mohammad Rezwanul Ahsan Nafis who is accused of attempting to detonate an explosive device in front of the Federal Reserve Bank of New York on October 16, 2012.
In light of the upcoming 2012 US presidential election, NYSIC is providing a snapshot of four historical cases where terrorists conducted attacks in conjunction with upcoming local or national elections, including the tactics, techniques, and procedures (TTP) used and how the attacks met or failed to meet the terrorists’ goals of altering the outcome of the election.
In order to help ensure public safety and security and to detect, deter, and prevent potential terrorist activities, the New York City Police Department (NYPD) has developed a networked Domain Awareness System. The Domain Awareness System not only supplies critical supplemental assistance to officers’ ongoing security and public safety efforts, but also enhances the collaborative nature of those efforts by leveraging the resources of the private sector and other City agencies. Given the ongoing threat of terrorist attack, the Domain Awareness System is an important part of the NYPD’s integrated approach to providing protection for those who work in, live in, and visit New York City.
(U//FOUO) New York Fusion Center Bulletin: Use of Cloned Vehicles in Terrorist or Criminal Operations
Criminals and terrorists have long used official vehicles, “cloned” vehicles (those painted/decorated to appear official), or seemingly legitimate vehicles (e.g. livery, maintenance or delivery) to circumvent security measures at targets of interest. There have been numerous terrorist attacks overseas wherein operatives used police vehicles or ambulances (or vehicles painted to resemble same) to conceal improvised explosive devices. Within the US Homeland, the most common use of cloned official vehicles by criminals is for drug smuggling; however, at least one terrorist targeting New York envisioned misusing vehicles that would appear to be legitimate, in order to conduct an attack. Dhiren Barot, an al Qaeda operative involved in the 2004 Financial Centers Plot, allegedly plotted to detonate three limousines packed with explosives and gas cylinders in underground parking lots in Manhattan. While the limousines would not have masqueraded as “official vehicles” per se they would have appeared to be legitimately entering those parking structures.
California, Colorado, Department of Homeland Security, Intelligence Fusion Centers, Nevada, New York
International terrorist groups and violent extremists have long shown interest in using fire as a weapon due to the low cost and limited technical expertise required, the potential for causing large-scale damage, and the low risk of apprehension. Recent encouragement of use of this tactic by terrorist groups and violent extremists in propaganda materials and extremist Web forums is directed at Western audiences and supports Homeland attacks.
Occupy Wall Street (OWS) protesters are calling for a “General Strike” on Tuesday, May 1, urging workers not to go to work and students to boycott classes in protest of what organizers characterize as society’s economic inequality. No unions are expected to participate in the strike, and some have talked to reporters about the fact that they weren’t consulted in OWS’s decision to announce a General Strike. Nonetheless, some elements of organized labor are expected to participate in their own customary May Day rally (which has occurred since 2004), marching from Union Square to Foley Square to Bowling Green, with speeches at either end beginning at about 4:00pm and ending by 7:00pm. The union organizers involved in that march have sought a permit for it. Details are being worked out.
The indictment of the Swiss bank Wegelin & Co. and several affiliated persons for conspiring to aid wealthy U.S. clients evade taxes, February 2012.
This brief report was put together by the NYPD Citizen Complaint Review Board in 2002 in response to citizen complaints about officers failing to identify themselves. The report includes a 2003 update to the NYPD Patrol Guide that clearly states that officers are required to “courteously” state their rank, name, badge number and command when asked by any citizen while giving them sufficient time to write down this information.
Decision by the New York Supreme Court to deny extension of a temporary restraining order and maintain previous eviction order from November 15, 2011.
As you know, for over three weeks, Zuccotti Park (the “Park”) has been used by “Occupy Wall Street” and other protesters as their home base. The Park is owned by a Brookfield affiliate and was recently renovated at Brookfield’s considerable expense as an amenity for the general public. It is intended to be a relaxing tree-filled oasis in the midst of the hustle and bustle of Lower Manhattan. We fully support the rights of free speech and assembly, but the manner in which the protesters are occupying the Park violates the law, violates the rules of the Park, deprives the community of its rights of quiet enjoyment to the Park, and creates health and public safety issues that need to be addressed immediately. Within the Park, the protesters have set up living spaces with tarpaulins, mattresses, sleeping bags, tables, bookshelves, gasoline-powered generators and other items that arc inconsistent with the rules and normal public use of the Park. At all hours of the day and night, protesters arc sleeping on benches and walkways, blocking normal pedestrian access to the general public and preventing cleaning and maintenance workers from performing necessary upkeep. When not blocked by protesters, the walkways throughout the Park are blocked by the various items and equipment brought to the Park by the protesters.
FBI New York case information indicates that Bloods gang members in the Bronx, NY are utilizing PlayStation Network (PSN) to communicate each other while on house arrest. Identified Bloods will post their “PSN tag name”, a self-generated ID used to identify individual users, on social networking web-sites and invite others to connect with them using their PlayStation 3 gaming system. These individuals have been observed sharing “tag names” with each other and discussing intentions to communicate through PSN.
As authorities have clamped down on traditional financing pipelines, such as charitable front groups, and as terrorist networks have grown increasingly decentralized, terrorists have turned to criminal activities to finance their operations locally. Throughout the world, Al Qaeda, Hamas, and Hezbollah operatives have involved themselves in an array of criminal enterprises, including counterfeiting, drug dealing, cigarette smuggling, credit card fraud, auto theft, kidnapping, extortion, and artifact trafficking. Although criminality is outlawed under Islamic law, the Al Qaeda manual advises that “necessity permits the forbidden.” Reflecting this theory, when Jemaah Islamiyah (JI) operatives questioned whether hacking into foreigners’ bank accounts was acceptable in Islam, JI leader Abu Bakr Bashir reportedly responded, “[if] you can take their blood; then why not take their property?” “Terrorist groups are particularly interested in raising funds through crime because as Lieutenant Colonel David LaRivee, Associate Professor of Economics at the United States Air Force Academy, stated, “many of the agencies responsible for enforcement in these areas do not traditionally focus on counterterrorism nor do they have strong ties with counterterrorist agencies. This means that many indictable criminal activities that support terrorism are overlooked because they seem insignificant when evaluated locally, but are in fact very significant when considered from a broader perspective.” In order to disrupt these financing efforts, “local law enforcement officials will be key,” as the FBI assessed in a May 25, 2005 Intelligence Bulletin.
New York State Intelligence Center Concealment Smartbook from April 2009.
The defendant engaged in oral sexual conduct and anal sexual conduct with another person by forcible compulsion; the defendant attempted to engage in sexual intercourse with another person by forcible compulsion; the defendant subjected another person to sexual contact by forcible compulsion; the defendant restrained another person; the defendant subjected another person to sexual contact without the latter’s consent; and in that the defendant intentionally, and for no legitimate purpose, forcibly touched the sexual and other intimate parts of another person for the purpose of degrading and abusing such person, and for the purpose of gratifying the defendant’s sexual desire.
Eighty-five percent of the critical infrastructure in the United States belongs to private enterprise and corporations. Thus, security guards are literally one of the nation’s first groups of defenders and play an integral role in prevention and deterrence efforts. Success in prevention and deterrence of both general crime, and terrorist acts as well, begins with the establishment of a baseline and maintenance of a robust all-hazards and all-crimes management infrastructure. The professional security guard industry in New York State with an excess of 140,000 certified security guards inhabit that baseline. This program will provide security guards with the basic awareness of terrorism issues that can potentially affect responsibilities within the purview of their employment. It will improve observation, detection and reporting capabilities while enhancing coordination capability with other emergency response professionals. Additionally, this program will elaborate on previously provided instruction, thereby elevating participants’ familiarity with access control issues and security technology.