Skip to main content

Terrorism

        Attorney General John Ashcroft directed each United States Attorney's Office to establish an Anti-Terrorism Task Force (ATTF) for the purpose of investigating the terrorist attacks of September 11th and to hopefully prevent future attacks. The ATTF is now known as the Anti-terrorism Advisory Council (ATAC).

        The United States Attorney has established the ATAC-EDKY and has designated Assistant United States Attorney E. J. Walbourn to serve as the Coordinator for the District. He is available to answer any questions and can be reached at 859-655-3200. Allen Love, Law Enforcement Coordinator, has been designated to serve as the Chief Information Officer for the ATAC and he can be reached at 859-685-4805. He will communicate to you information relative to meetings, counter-training resources, and any other non-case specific information of value concerning the ATAC.

        The Anti-Terrorism Advisory Council is comprised of representatives of the federal, state, and local law enforcement communities. The Task Force meets on a bi-monthly basis and is charged with carrying out the directives of the Attorney General in communicating information between law enforcement agencies and investigating and preventing acts of terrorism. If you have information you believe relates to the ongoing investigation of terrorism, contact the FBI at 1-800-292-9487.

        If you see anything of a suspicious nature, please report it by calling the terrorism toll-free number 877-GUARDSD, FBI at 1-800-292-9487, or www.fbi.gov or in case of emergency call 911.

Homeland Security

"Pre-Incident Indicators"

- The first step is knowing what to look for.

Surveillance
Someone recording or monitoring activities, including the use of cameras (both still and video), note taking, drawing diagrams, writing on maps, or using binoculars or any other vision-enhancing device.

Elicitation
Anyone or any organization attempting to gain information by mail, fax, telephone,or in person about military operations or people

Tests of Security
Any attempts to measure reaction times to security breaches or to penetrate physical security barriers or procedures

Acquiring Supplies
Purchasing or stealing explosives, weapons, ammunition, uniforms, decals, flight manuals, passes or badges (or the equipment to manufacture them), or any other controlled items

Suspicious Persons
Out of Place

People who don't seem to belong in the workplace, neighborhood, business establishment, or anywhere else. This also includes suspicious border crossings, stowaways aboard ship, or people jumping ship in port.

Dry Run
Putting people into position and moving them about without actually committing a terrorist act such as a kidnapping or bombing. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

Deploying Assets
People and supplies getting into position to commit the act. This is the last opportunity to alert authorities before the terrorism occurs.

Updated April 13, 2015