Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementIdentity ManagementPhysical SecurityVideo SurveillanceGovernment: Federal, State and Local

Cells and the City: A Conversation with the Deputy Director for Intelligence Analysis, NYPD

By Daniil Davydoff
Ravi Satkalmi
Ravi Satkalmi
April 29, 2019

For much of the past decade, Ravi Satkalmi has helped lead the New York City Police Department’s (NYPD) Intelligence Analysis Unit, a team within the NYPD’s Intelligence Bureau that provides critical support on counterterrorism investigations, analyzes foreign and domestic terrorist threats to the city, offers input on policies pertaining to counterterrorism, and liaises with law enforcement and private sector partners. The bureau was retooled in the years following the September 11 attacks, and has served a unique role within the U.S. law enforcement community during the War on Terror. There are few experts as knowledgeable as Satkalmi on the terrorism trends that are most relevant to U.S. metropolitan areas and the following interview seeks to understand some recent dynamics, as he sees them:

Since you started your career with the NYPD, there has been much talk in intelligence and counterterrorism circles about the shift from cells and networks to lone wolves, or self-radicalized individuals. Unless you believe this trend to be overblown, what would you say are some key challenges when it comes to identifying or analyzing these kinds of actors?

We are definitely seeing “lone wolves” as a trend. In terms of numbers, NYPD counts one lone wolf plot targeting the city from 2001-2009; since 2009, we’ve seen 15.  And the trend is not limited to just the Jihadi extremism or the radical Islam framework, but spans across ideologies and drivers. We’ve been seeing lone actors among extreme rightwing individuals and white supremacists as well, for example. The reason it is common across the board is because it is so easy to replicate. The challenges of identifying these kinds of threats early are also similar. Lone wolves are often looking to connect with just one individual who can validate their worldview; they don’t need to connect to a network anymore to operationalize. That means we potentially have fewer leads. The move toward bespoke chat platforms and encrypted apps is also a challenge. And then there’s the timeline to action. Many of the big attacks took months or years of preparation and logistics. With the lone wolf mentality, all they need to do is act on a grievance by turning everyday items into weapons. A week or two of planning is sometimes all it takes, giving us less time for interdiction.

Whether we are talking about networks or individual threat actors, how is the process of radicalization changing? Have you seen a “v. 2.0” in the role that social media plays in the process?

In the last few years, social media has fostered a “choose your own adventure” mentality for those exploring radical ideas. An individual with grievances can find ISIS propaganda but also any number of other ideological justifications that can be cherry-picked and woven into their own narrative. Zale Thompson, perpetrator of the hatchet attack against four NYPD officers in 2014, is a case in point. He expressed anti-law enforcement sentiment and was upset about treatment of minorities in the U.S., but immediately prior to the attack he was also researching ISIS and other jihadist groups. This approach to picking and choosing validation is an evolution of the conventional understanding of radicalization that existed at the beginning of the decade. Social media has also offered virtual direction to threat actors. An individual mobilizing towards violence can be guided in the execution of that violence by an agent of a terrorist group located half way around the world. One example involved a group of three individuals in Massachusetts who were directed by a prominent ISIS propagandist to behead a high profile NY-based conservative commentator. They were successfully interdicted.

Recent discussions on acts of mass violence in the U.S. note a rise in politically-motivated extremism. Have you seen an increase in the influence of what could be called domestic ideologies? If so, has this altered the way you approach identifying or analyzing threats?

There’s certainly been an increase, no dispute there. But I caution against the urge to assess the relative threat posed by different violent ideologies by counting the casualties inflicted by their followers: the numbers can be used to tell different stories. We can say that the extreme rightwing ideologies are increasingly concerning and that followers are copying tactics from the ISIS playbook—slick propaganda and low-tech attacks. At the end of the day, they are facing a similar challenge in trying to balance the needs of being public and getting propaganda out while maintaining enough privacy to allow for planning. A key difference with the extreme right threat is that it is missing a large, well-funded, organized, and global flag bearer like ISIS or al-Qaeda. There aren’t targets that lend themselves to overseas military action and so this becomes almost exclusively a law enforcement challenge. Also, we know that allegiances in this world are fluid with new groups and labels appearing frequently. The Christchurch, New Zealand mosque shooter’s self-identification as an “eco-fascist” is one such case. Learning to navigate that ecosystem is a challenge, but not an insurmountable one.

When it comes to terrorist tactics, attacks on so-called “soft targets” and the weaponization of crude objects such as vehicles has been in the news in the U.S. and Europe the last couple years. Anything more you can add on tactical trends for the operational and executive protection (EP) professionals out there?

The crux of it is anything you can get your hands on is legitimate and should be used. We haven’t seen it locally yet, but we are expecting an increased threat from weaponized hobby drones and we’re thinking about how to counter that tactic. There’s also the increasingly likely use of easily available cyber tools and malware available on the dark web. Another low-effort, high-impact tactic is doxing – essentially repackaging easily available open-source personal information as a “kill list.” We’ve seen that several times in New York. Even though we’ve assessed there to be no actual threat, the emotional impact to the victims can be real and massive. Having said that, at least in NY, there are still lots of plots involving explosives. Though there are many more opportunities to get caught in such a plot, some extremists are still interested in that kind of high-visibility impact, so that’s not going away as a concern.

Behavioral threat assessment constitutes another set of tools that are gaining ground among security professionals concerned with preventing mass violence and targeted attacks. Can you share a little bit about how your organization has adopted or adapted some of these methodologies?

As a team, we are focusing on identifying mobilization to action rather than radicalization. Our biggest concern is not people who have sympathies for radical causes, but rather those who are likely to channel those sympathies into criminal or lethal activities.  Assessing an individual’s behavior helps us better understand the severity of any potential threat posed by that person. As part of our work in this area, we’re examining factors that demonstrate a willingness to act violently, such as a history of domestic violence, combined with indications that a subject is consuming propaganda that encourages violence toward some ideological end. We’re continuing to refine our approach, taking into account gaps in the collection or availability of key information while working with other stakeholders and experts with experience in this field.

 

 

KEYWORDS: law enforcement private sector Terrorism threat assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan davydoff   pic1

Daniil Davydoff, CPP, is Director, Research Management and Operations at Eurasia Group and director of social media for the World Affairs Council of Palm Beach. He has been published by ASIS International/Security Management, Risk Management Magazine, The National Interest, The Carnegie Council for Ethics in International Affairs, Foreign Policy and RealClearWorld, among other outlets. His views do not reflect those of his company.

Daniil Davydoff can be contacted on LinkedIn or at davydoff@eurasiagroup.net

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Benefits of Integrating Intelligence and Investigative Analysis - Security Magazine

    The Benefits of Integrating Intelligence and Investigative Analysis

    See More
  • SEC0718-edu-feat-slide1_900px

    How Intelligence Analysis Can Drive Corporate ROI

    See More
  • data intelligence

    The cult of the search in open-source intelligence

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!