Sunday, September 29, 2024

NYPD OFFICER CHARGED IN TWO INDICTMENTS: FOR ASSAULTING A SUSPECT, AND FOR LYING ABOUT PATROL CAR STRIKING MOTORCYCLIST

 

Bronx District Attorney Darcel D. Clark announced that an NYPD Police Officer has been charged in two separate indictments, for assaulting a suspect with a police radio and for lying about a patrol car striking and injuring a motorcyclist. 

District Attorney Clark said, “The defendant allegedly lied about police car accident that injured a motorist to cover up for the officer who was driving, and four months later the defendant allegedly struck a suspect on the head with his radio. His alleged actions are a betrayal of public trust and tarnish the shield.” 

District Attorney Clark said Kenny Victoria, 34, who was assigned to the 44th Precinct, was arraigned today on both indictments before Bronx Supreme Court Justice Brenda Rivera. The defendant is due back in court on December 3, 2024.

The defendant was charged in one indictment with Attempted Offering a False Instrument in the first degree, second-degree Offering a False Instrument for Filing, second-degree Falsifying Business Records, and Official Misconduct.

According to the investigation, on December 16, 2023, at approximately 2:24 p.m., near Monroe Avenue and East 173rd Street, the defendant was a passenger in a NYPD patrol car that crashed into a motorcyclist, fracturing his leg, and forcing him over the car’s hood. The biker was arrested and charged with Reckless Engagement and Criminal Mischief. An investigation revealed Victoria allegedly filed a collision report stating the motorcyclist was doing a wheelie and drove into the police vehicle; however, video surveillance showed that the police car accelerated and turned into the motorcyclist as he was entering an intersection.

In the second indictment, the defendant was charged with second-degree Assault, thirddegree Assault, and Official Misconduct. According to the investigation, on April 30, 2024, at approximately 3:41 p.m., near 311 East 170th Street, the defendant responded to calls of a person with a firearm. When he arrived, he identified the man with the gun, and chased him. The suspect tossed the gun and was eventually pulled to the ground by another officer. Victoria allegedly struck the suspect on the head with his police radio. The suspect received staples at a hospital to stop the bleeding from the back of his head. 

District Attorney Clark thanked Sergeant Thomas Little and Sergeant Jonathan Yan of the Internal Affairs Bureau and Lieutenant Hugo Batista of PSA 7 (formally of the Internal Affairs Bureau).

An indictment is an accusatory instrument and not proof of a defendant’ 

Former FAA Contractor Indicted for Illegally Acting as an Agent of the Iranian Government

 

Former Federal Aviation Administration contractor, Abouzar Rahmati, 42, a naturalized U.S. citizen and resident of Great Falls, Virginia, was indicted for acting and conspiring to act as an agent of the Iranian government in the United States without prior notice to the Attorney General. He made his initial appearance in the District of Columbia today this afternoon.

According to the indictment, from at least December 2017 through June 2024, Rahmati conspired with Iranian government officials and intelligence operatives to act on their behalf in the United States, including by meeting with Iranian intelligence officers in Iran, communicating with coconspirators using a cover story to hide his conduct, obtaining employment with an FAA contractor with access to sensitive non-public information, and obtaining open-source and non-public materials about the U.S. solar energy industry and providing it to Iranian intelligence.  

“As alleged, the defendant conspired with Iranian officials and intelligence operatives, even lying to obtain employment as a U.S. government contractor only to then share sensitive government materials with Iran,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “When undisclosed agents of Iran or any other foreign government seek to infiltrate American companies or government agencies, the Justice Department will use every available tool to identify them and bring them to justice.”  

“This defendant is charged with infiltrating a U.S. agency with the intent of providing Iran with sensitive information vital to our national security,” said U.S. Attorney Matthew M. Graves for the District of Columbia. “Thanks to the great work of the FBI and the FAA’s investigators, this defendant was stopped in his tracks and a known adversary’s plot was exposed.”

“This indictment describes the reprehensible actions of an individual who allegedly betrayed his country by transferring sensitive U.S. information to a foreign power. This alleged betrayal not only undermines our national security but also puts U.S. jobs and livelihoods at risk,” said Executive Assistant Director Robert Wells of the FBI’s National Security Branch. “We will not tolerate any actions that compromise U.S.-based sensitive information and are committed to ensuring that justice is served swiftly and decisively.”

According to the indictment, from June 2009 to May 2010, Rahmati served as a First Lieutenant in the Islamic Revolutionary Guard Corps (IRGC) — an Iranian military and counterintelligence organization under the authority of the Supreme Leader of Iran. After being discharged from the IRGC, Rahmati lied to the United States government regarding his military service with the IRGC in order to, among other things, gain employment as a U.S. government contractor.

In August 2017, Rahmati offered his services to the Iranian government through a senior Iranian government official who previously worked in Iran’s Ministry of Intelligence and Security and with whom Rahmati had previously attended university. Four months later, in December 2017, Rahmati traveled to Iran, where he met with Iranian intelligence operatives and government officials and agreed to obtain information about the U.S. solar energy industry, to provide that information to Iranian officials, and to conduct future communications under a cover story based on purported discussions about research with fellow academics.

After Rahmati returned to the United States in December 2017, he obtained various non-public and open-source materials related to the U.S. solar energy industry and provided them to an Iranian government official. Rahmati also applied for multiple positions with private companies and U.S. government entities that would provide him with access to sensitive information, eventually obtaining a position with U.S. Company 1 supporting the FAA on a contract related to the power and electrical architecture of the FAA’s National Airspace System (NAS). After Rahmati obtained the position, he informed an Iranian intelligence officer that he was “in the process of moving to and joining a new company” and that they could “work more effectively if it is finalized.”

In response to tasking from Iranian officials, and in furtherance of his agency relationship with the Government of Iran, Rahmati exploited his employment with U.S. Company 1 by downloading sensitive non-public U.S. Company 1 documents related to the FAA, storing them on removable media, and taking them to Iran, where he provided the documents to the Government of Iran in April 2022. These included documents related to the NAS that would give a person unfamiliar with NAS facility engineering a reasonable understanding of how the NAS power and electrical architecture is configured.

After he returned to the United States in April 2022, in response to tasking from Iranian government officials, Rahmati sent additional information relating to solar energy, solar panels, the FAA, U.S. airports, and U.S. air traffic control towers to his brother, a co-conspirator, so that he would provide those files to Iranian intelligence on behalf of Rahmati.

The FBI Washington Field Office is investigating the case. FAA’s Office of Counterintelligence and Technical Operations provided significant assistance. 

Husband And Wife Found Guilty Of Murder And Car-Jacking

 

Jamie and Nicholas Orsini Murdered Jamie Orsini’s Ex-husband 

Damian Williams, the United States Attorney for the Southern District of New York, announced that, on Friday, September 27, 2024, a jury found JAMIE ORSINI and NICHOLAS ORSINI guilty of carjacking resulting in death and conspiracy to commit carjacking. The ORSINIs were found guilty following a two-week trial before U.S. District Judge Philip M. Halpern. 

U.S. Attorney Damian Williams said: “Over four years ago, in Beacon, New York, Jamie and Nicholas Orsini killed Jamie’s ex-husband, Steven Kraft, and engaged in a sophisticated scheme to hide their crime. Indeed, Kraft’s body still has not been foundFor more than four years, Kraft’s family has waited for justiceTheir wait is now over. With its verdict, the jury has now held Kraft’s ex-wife—Jamie Orsini—and her husband—Nicholas Orsini—responsible for that murder and subsequent cover-upThis should serve as a lesson: if you commit a crime—if you commit a murder—it does not matter how well you cover your tracks, or how successfully you think you destroyed the evidence, law enforcement will not give up, and the career prosecutors of this Office and our law enforcement partners will never stop investigating and prosecuting these righteous cases.  If any member of the public has information that they wish to share with us about any unsolved murder, then we encourage you to come forward.” 

According to the Indictment, public court filings, and the evidence presented at trial:

In 2020, JAMIE and NICHOLAS ORSINI plotted the murder of JAMIE ORSINI’s ex-husband, Steven Kraft. As part of that murder, they planned a sophisticated cover-up, involving the use of burner phones, the movement of Kraft’s car to a different city, and the destruction and disposal of all physical evidence.  Among other things, they purchased items—such as a 1,000-square-foot tarp and a full-body coverall—to allow them to commit the murder and dispose of evidence, they repeatedly practiced “dry runs” for how they would move Kraft’s car, and they purchased a “burner phone” to use without law enforcement being able to trace the phone to them.  On April 28, 2020, in Beacon, New York, after Kraft dropped his daughters off with the ORSINIs, who had custody of their children, the ORSINIs killed Kraft and took his car and cellphone.  NICHOLAS ORSINI then drove the car into Newburgh, New York, leaving it in a high-crime neighborhood, got rid of Kraft’s cellphone, and used the burner phone to call a taxi to bring him back to Beacon, throwing the burner phone out before getting into the taxi.

After the murder, the ORSINIs managed to destroy or dispose of evidence—including Steven Kraft’s body—buying a new burner phone to use when they repeatedly drove to and from upstate New York, and creating large homemade incinerators.  JAMIE ORSINI sent multiple text messages to make it look like she believed that Kraft was still alive, and, having dumped Kraft’s car in Newburgh, when speaking with the police, professed ignorance, but kept hinting that, maybe if Kraft went to Newburgh after leaving her home, something might have happened to him there.

If you believe you have information related to the ORSINIs, or the location of Steven Kraft’s body, please consider reporting using the following link: https://www.justice.gov/usao-sdny/report-crime.

JAMIE ORSINI, 38, and NICHOLAS ORSINI, 36, both of Amsterdam, New York, were each convicted of: carjacking resulting in death; and participating in a conspiracy to commit carjacking.  The carjacking count carries a maximum sentence of life in prison, and the conspiracy count carries a maximum sentence of five years in prison.

The maximum potential sentences in this case are prescribed by Congress and provided here for informational purposes only, as any sentencing of the defendant will be determined by a judge.

Mr. Williams praised the outstanding work of the Federal Bureau of Investigation and the New York State Police, which also supported the prosecution through trial.  He also thanked the Dutchess County District Attorney’s Office, the Ulster County District Attorney’s Office, the City of Beacon Police Department, the Town of Marlborough Police Department, and the City of Newburgh Police Department.

Saturday, September 28, 2024

Governor Hochul Announces Landmarks to be Illuminated in Gold Light for Gold Star Mothers and Families Day

gold stars

Governor Issues Proclamation Honoring Gold Star Families

Final Sunday of September Designated as Day of Honor and Remembrance for Families Who Made the Ultimate Sacrifice in Military Service 


Governor Kathy Hochul announced that 15 landmarks across New York State will be illuminated in gold light on Sunday, September 29, in honor of Gold Star Mothers and Families Day, remembering all families who have lost a loved one in military service to our state and nation.

"On this Gold Star Mothers and Families Day, we illuminate our iconic landmarks in golden light, a symbol of our unwavering gratitude and remembrance for those who have made the ultimate sacrifice,” Governor Hochul said. “These courageous families embody resilience and strength, and as a state, we honor their profound loss with our commitment to support them. Together, we stand united, ensuring that their loved ones’ legacies shine brightly in our hearts and all across New York. Let us reflect on their bravery, and may our tribute inspire us to continue serving those who have given so much for our freedom."

Landmarks to be lit in tribute include:

  • One World Trade Center
  • Niagara Falls
  • Governor Mario M. Cuomo Bridge
  • Kosciusko Bridge Kosciuszko Bridge
  • The H. Carl McCall SUNY Building
  • New York State Education Building
  • Alfred E. Smith State Office Building
  • Empire State Plaza
  • New York State Fairgrounds – Main Gate & Expo Center
  • The “Franklin D. Roosevelt” Mid-Hudson Bridge
  • Albany International Airport Gateway
  • East End Gateway at Penn Station
  • Fairport Lift Bridge over the Erie Canal
  • Moynihan Train Hall
  • Walkway Over the Hudson State Historic Park

Every year since 1936, the final Sunday in September is set aside as a solemn day of remembrance for all who have borne the most difficult cost of freedom. New York State joins a grateful nation in honoring the resilience of these courageous families on this day and all days, standing ready, willing, and able at all times to serve all Gold Star Families in every way possible.

New York State is proud to have a longstanding commitment to serving the families who have sacrificed so much in defense of our nation’s liberty, including through initiatives like the Gold Star Parent Annuity program and the Military Enhanced Recognition Incentive and Tribute (MERIT) Scholarship which stand as pillars of assistance for those who have lost loved ones in military service, ensuring that the memories and legacies of their service endures forever.

Three IRGC Cyber Actors Indicted for ‘Hack-and-Leak’ Operation Designed to Influence the 2024 U.S. Presidential Election

 

Indictment Alleges the Activity Was a More Recent Phase of a Wide-Ranging Hacking Conspiracy in Support of IRGC Targeting of Current and Former U.S. Officials

The Justice Department announced the unsealing of an indictment charging Iranian nationals, and Islamic Revolutionary Guard Corps (IRGC) employees, Masoud Jalili, 36,  also known as, مسعود جلیلی, Seyyed Ali Aghamiri, 34, also known as, سید علی آقامیری, and Yaser Balaghi, 37, also known as, یاسر بلاغی (the Conspirators), with a conspiracy with others known and unknown to hack into accounts of current and former U.S. officials, members of the media, nongovernmental organizations, and individuals associated with U.S. political campaigns. The activity was part of Iran’s continuing efforts to stoke discord, erode confidence in the U.S. electoral process, and unlawfully acquire information relating to current and former U.S. officials that could be used to advance the malign activities of the IRGC, including ongoing efforts to avenge the death of Qasem Soleimani, the former commander of the IRGC – Qods Force (IRGC-QF).

As alleged, in or around May, after several years of focusing on compromising the accounts of former U.S. government officials, the conspirators used some of the same hacking infrastructure from earlier in the conspiracy to begin targeting and successfully gaining unauthorized access to personal accounts belonging to persons associated with an identified U.S. Presidential campaign (U.S. Presidential Campaign 1), including campaign officials. The conspirators used their access to those accounts to steal, among other information, non-public campaign documents and emails (campaign material). The activity broadened in late June, when the conspirators engaged in a “hack-and-leak” operation, in which they sought to weaponize campaign material stolen from U.S. Presidential Campaign 1 by leaking such materials to members of the media and individuals associated with what was then another identified U.S. Presidential campaign (U.S. Presidential Campaign 2), in a deliberate effort to, as reflected in the conspirators’ own words and actions, undermine U.S. Presidential Campaign 1 in advance of the 2024 U.S. presidential election.

“The Justice Department is working relentlessly to uncover and counter Iran’s cyberattacks aimed at stoking discord, undermining confidence in our democratic institutions, and influencing our elections,” said Attorney General Merrick B. Garland. “The American people – not Iran, or any other foreign power – will decide the outcome of our country’s elections.”

“These charges represent the culmination of a thorough and long-running FBI investigation that has resulted in the indictment of three Iranian nationals for their roles in a wide-ranging hacking campaign sponsored by the Government of Iran,” said FBI Director Christopher Wray. “The conduct laid out in the indictment is just the latest example of Iran’s brazen behavior. So today the FBI would like to send a message to the Government of Iran – you and your hackers can’t hide behind your keyboards.”

“These hack-and-leak efforts by Iran are a direct assault on the integrity of our democratic processes,” said Assistant Attorney General Matthew G. Olsen of the Justice Department’s National Security Division. “Iranian government actors have long sought to use cyber-enabled means to harm U.S. interests. This case demonstrates our commitment to expose attempts by the Iranian regime or any other foreign actor to interfere with our free and open society.”

“This indictment alleges a serious and sustained effort by a state-sponsored terrorist organization to gather intelligence through hacking personal accounts so they can use the hacked materials to harm Americans and corruptly influence our election,” said U.S. Attorney Matthew Graves for the District of Columbia. “The detailed allegations in the indictment should make clear to anyone who might attempt to do the same that the Justice Department has the ability to gather evidence of such crimes from around the globe, will charge those who commit such crimes, and will do whatever we can to bring those charged to justice.”

As alleged in the indictment, beginning in or around January 2020, Jalili, Aghamiri, and Balaghi, working on behalf of the IRGC, commenced a wide-ranging hacking campaign that used spearphishing and social engineering techniques to target and compromise victims computers and accounts. Among the conspirators’ techniques were: using virtual private networks and virtual private servers to obscure their true location; creating fraudulent email accounts in the names of prominent U.S. persons and international institutions; creating spoofed login pages to harvest account credentials; sending spearphishing emails using compromised victim accounts; and using social engineering to obtain victims’ login information and multi-factor recovery/authentication codes. Some of the conspirators’ efforts were successful, while others were not.

In April 2019, the Department of State designated the IRGC as a foreign terrorist organization. Among the purposes of the conspiracy were for the conspirators to: (i) steal victims’ data, such as information related to U.S. government and foreign policy information concerning the Middle East; (ii) steal information relating to current and former U.S. officials that could be used to advance the IRGC’s malign activities; (iii) disrupt U.S. foreign policy in the Middle East; (iv) stoke discord and erode confidence in the U.S. electoral process; (v) steal personal and private information from persons who had access to information relating to U.S. Presidential Campaign 1, including non-public campaign material and information; and (vi) undermine U.S. Presidential Campaign 1 in advance of the 2024 U.S. presidential election by leaking stolen campaign material and information.

As reflected in the Sept. 18 joint statement released by the Office of the Director of National Intelligence, FBI, and Cybersecurity and Infrastructure Security Agency: “Iranian malicious cyber actors in late June and early July sent unsolicited emails to individuals then associated with President Biden’s campaign that contained an excerpt taken from stolen, non-public material from former Trump’s campaign as text in the emails. There is currently no information indicating those recipients replied. Furthermore, Iranian malicious cyber actors have continued their efforts since June to send stolen, non-public material associated with former President Trump’s campaign to U.S. media organizations.”

As alleged in further detail in the indictment, the conspirators’ hack-and-leak efforts involved the conspirators emailing stolen campaign material to individuals that the conspirators believed were associated with what was then U.S. Presidential Campaign 2 and members of the media.

First, between on or about June 27 and July 3, the conspirators sent or forwarded an unsolicited email message to personal accounts of three persons that the conspirators believed were associated with U.S. Presidential Campaign 2. The June 27 email was sent to two recipients, and then forwarded the same day to another account for one of those recipients (due to the earlier email being sent to an invalid account for that recipient). This email chain contained campaign material stolen from an official for U.S. Presidential Campaign 1 (U.S. Victim 11). Neither of the recipients replied to the conspirators’ email. In addition, the conspirators sent a follow up email on July 3rd to a third recipient’s account, and the recipient similarly did not reply to the Conspirators.

Second, between on or about July 22 and on or about Aug. 31, the conspirators distributed other campaign material stolen from U.S. Victim 11 regarding U.S. Presidential Campaign 1’s potential vice-presidential candidates to multiple members of the news media, in an attempt to induce the news media to publish the material. In one instance, for example, the conspirators’ message stated “I think this information is worth a good [U.S. news publication] piece with your narration. Let me know your thoughts.”

As alleged, these defendants also sought to promote the IRGC’s goals and mission by compromising and maintaining unauthorized access to the email accounts of a number of former government officials, including U.S. Victim 1, who had served in a position with responsibility over U.S. Middle East policy at the time of Qasam Soleimani’s death. Using this access, the defendants obtained information to assist the IRGC’s efforts to target U.S. Victim 1 and others, including their means of identification, correspondence, travel information, lodging information and other information regarding their whereabouts and policy positions.   

Jalili, Aghamiri, and Balaghi are charged with: conspiracy to commit identity theft, aggravated identity theft, access device fraud, unauthorized access to computers to obtain information from a protected computer, unauthorized access to computers to defraud and obtain a thing of value, and wire fraud, all while knowingly falsely registering domain names, which carries a maximum penalty of 12 years in prison; conspiracy to provide material support to a designated foreign terrorist organization, which carries a maximum penalty of 20 years in prison; eight counts of wire fraud while falsely registering domain names, each of which carries a maximum penalty of 27 years in prison; and eight counts of aggravated identity theft, each of which carries a mandatory minimum penalty of two years in prison. If convicted, a federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

Concurrent with today’s announcement, the Department of State, through the Rewards for Justice Program, issued a reward 0f up to $10 million for information on Jalili, Aghamiri, and Balaghi, the IRGC’s interference in U.S. elections, or associated individuals and entities. Also, concurrent with today’s announcement, the Department of the Treasury, Office of Foreign Asset Control (OFAC), pursuant to Executive Order (E.O.) 13694, as amended, and E.O. 13848 designated Jalili for being responsible for or complicit in, or having engaged in, directly or indirectly, a cyber-enabled activity originating from, or directed by persons located, in whole or in substantial part, outside the United States that is reasonably likely to result in, or has materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States and that has the purpose or effect of causing a significant misappropriation of funds or economic resources, trade secrets, personal identifiers, or financial information for commercial or competitive advantage or private financial gain.

The FBI Washington Field Office is investigating this case. The FBI Cyber Division and Springfield and Minneapolis Field Offices provided substantial assistance in this matter. For more information on threat activity as well as mitigation guidance, the FBI has released a Joint Cyber Security Advisory titled “Iranian Cyber Actors Targeting Personal Accounts to Support Operations.”

The Justice Department would like to thank the following private sector partners for their assistance with this case: Google, Microsoft, Yahoo, and Meta.

Assistant U.S. Attorneys Tejpal Chawla and Christopher Tortorice for the District of Columbia and Trial Attorney Greg Nicosia of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Paralegal Specialists Mariela Andrade and Kate Abrey. Joshua Champagne of the National Security Division’s Counterterrorism Section also provided valuable assistance.

An indictment is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Van Cortlandt Park Alliance - See Why You Should Be In VCP in October!

 

Youth Run Farm Stand
Wednesdays through October 30 - 2pm to 7pm
Shop at our Youth Run Farm Stand for fresh, local produce and local goodies at affordable prices! We accept WIC, FMNP Checks, EBT, Snap, Fresh Connect Checks, Cash and Credit/Debit.

Located at Gale Place and Orloff Avenue


Super Seedlings
Saturdays, October 5, 19 + 26 - 10am to 12pm

Super Seedlings is a FREE, drop-in gardening program for kids ages 2-7 and their caregivers. Each session will have a fun seasonal theme to explore, nature crafts, garden produce to harvest, soil digging, and more!

VCPA Garden & Compost Site


NYRR Youth Rising Run
Sunday, October 6 - at 10am
Kids of all ages and abilities can experience the joys of cross country running in Van Cortlandt Park! Registration for this event is FREE and open to participants ages 2 to 18 of all abilities. Every finisher will receive a New Balance souvenir.

Hosted by VCPA supporter, New York Road Runners.

Van Cortlandt Park Parade Ground/Cross Country Course


Caribeando II
Tuesday, October 8 - 5pm to 6:30pm
This interactive performance with Juan Usera and the Sambuco Tribe will feature Bomba, Plena, Nengón, and Changuí. Participants will learn stories, songs, dance steps, rhythmic movements, improvisations, and drum rhythm patterns.

RSVP Now

Van Cortlandt House Museum


Birding with NYC Bird Alliance (formerly NYC Audubon)
Saturdays, October 12 + 26 - 1pm to 4pm
Explore Van Cortlandt Park’s ecologically diverse grounds and celebrate a long tradition of birding in the park. Each walk will be led by a NYC Bird Alliance guide.

RSVP Required

Van Cortlandt Nature Center.


Hike-toberfest

Saturday, October 19 - Hikes start at 1:30pm; Oktoberfest 4pm to 6pm
Hike in the park followed by a classic Oktoberfest celebration, complete with local beer, German food, live music, lawn games, and more.

Tickets on Sale!

Van Cortlandt House Museum Lawn


Halloween: From Wags to Witches
Sunday, October 27 - 12pm to 4pm
Van Cortlandt Park Alliance and Van Cortlandt House Museum invite you to a FREE fang-tastic afternoon of family and doggy fun. Get ready for creepy crafts, face painting, spine-chilling stories and more!
Join us at 2pm for our Second Annual Canine Costume Contest. $20 pre-registration; $25 day-of to enter the Canine Costume Contest for a chance to win fun prizes. 

RSVP Now
Van Cortlandt House Museum Lawn

Support Our Work in Van Cortlandt Park

 

Make a Donation
The park is really big. Our staff is really small. Only with your help can we grow our capacity, hire more staff, and take on projects to improve Van Cortlandt Park… for YOU!  Please consider a gift to Van Cortlandt Park Alliance today.

VCPA Merch Shop!
Show your love for Van Cortlandt Park while supporting the Alliance!

Become a Member
Members get VCPA merch and invitations to member only hikes while supporting their favorite park!


                                       


Our Contact InformatioVan Cortlandt Park Alliance
80 Van Cortlandt Park South, Ste. E1  
Bronx, NY 10463
718-601-1460
http://vancortlandt.org