Thorough and Complete Background checks

NYS Lic:11000095379
Certified CII: M887

We provide background checks domestically for a fee of: $250.00 which includes Global Watch, & credit reports!!! Copy of a driver’s license and Social Security number will be required.

International fees are quoted based on the country of origin.

Individuals, Companies, and Corporations. ICI’s consent form will be provided once approved prior to proceeding. Form must be legible and completed.

Contact numbers: 212-582-3115 NY – 866-977-3700 Intl. 917-609-1026 Mobil.

ICI accepts payment via PayPal noted on our website,

200 Park Avenue Suite 1700 New York, NY 10166-Phone: 212-582-3115 – Fax: 212-582-0028

ATM Users – Beware!

ATM Users – Beware!

ATM users be advised, this counterfeit $20.00 bill, seen below, is one of 100 inserted into an ATM machine in one stack; this is what placed it out of order.  The perpetrators planned to recover an advance fee from the bank of $200.00 utilizing a bank account opened with a stolen identity. This is just one scam involving the ATM machines of major financial institutions as well as the smaller regional banks.


First main concern:  bad guys will intentionally place a machine out of order utilizing a jamming device to set up an armed robbery while a technician is repairing the system.  The bank customer may also be forced at gunpoint to withdraw money by an armed robber who will remove the “jam”.  This, unfortunately is more common than most expect, especially at night in remote locations.  Remember,   each ATM machine contains substantial amounts money and is, therefor, a popular target for thieves.

Second main concern: there are mutable capabilities provided bad guys via high tech to obtain your personal data including your account information even as you use the machine.  Avoid using machines not owned by financial institutions such as those found in bodegas, convenience stores, etc.

In the past, a criminal could steal the whole ATM machine.   Mega structures containing these machines have made it very difficult if not impossible to succeed at that.  More reason, therefor, for you to be concerned that you are the “soft” target.

You must be always alert, avoid late night visits to ATM’s in areas of large shopping malls; especially stand alone island machines.  Make sure you observe the surrounding area looking for individuals standing around, often under the influence of alcohol or drugs.  At drive-up machines, as you approach the kiosk, be aware of occupied cars in an overlook position within the area of the ATM.

While utilizing an ATM system: 1) maintain due diligence, make sure you’re not being watched and/or someones has not sidled up to you, 2) If you drove up to a system, once again keep your eyes open for approaching individuals during or persons loitering in a automobile or being a column, 3) avoid machines not operated by financial institutions and 4) If possible avoid late night visits to utilize the ATM system.

Emerging Cyber Security Threats, 2021 and Beyond – Part 3

Internet of Things – The internet of things is exploding. Everything around us is becoming “intelligent” and connected. From the refrigerator that tells us when we need to buy more food, to the connected thermostats and light bulbs in our homes, everything is getting a chip inside. This means that hackers have new ways to get into our homes. There have been many reports of a hacker taking control of a baby monitor and was talking to the child through the internet. Home camera systems allow for hackers to watch our every move. They know when we are home, and when we are not.

One of the major areas of concern for IoT security is with medical devices. There have been numerous recent cases of vulnerabilities with connected medical devices that lacked security to keep hackers from making changes to medication dosages.

With the internet of things, we must begin to have a standard of security before allowing these technologies in our home. We are constantly researching new “IoT” items and looking for the vulnerabilities. We work with manufacturers to plug these security holes.

Mobile vulnerabilities – There are now malware and ransomware specifically designed for mobile devices that can lock your device or steal data from it. Hackers are using smart phone vulnerabilities to track people with GPS. We have found many cases where people were surveilled by criminals after having their phone infected. Hackers are also using ransomware to lock your smartphone and ask for money to unlock it. In some cases, this malware allows the criminals to steal valuable banking data from your device which can give them access to your bank account.

With many businesses having Bring Your Own Device (BYOD) policies, enterprises must be aware of the risks of mobile devices being active on business networks. With the lines between business and personal usage of mobile devices being blurred, there is an increase for the business that allows personal devices to be used for business purposes.

Careers in cyber security – There is a tremendous shortage of qualified candidates with cyber security skills. There is an estimated 1 million unfilled cyber security jobs across the globe. By 2025, it is expected that there will be over 1.5 million vacancies unfilled.

In the US, not a single one of the top 10 computer science universities require a cyber-security course in order to graduate. Higher education needs to begin to start cyber security education programs in order to give the workforce of the future the skills they need to succeed.

As the world becomes more connected and reliant on technology, the need for cyber security will only grow. Now is the time to start getting involved, start educating, and start securing the future.

Emerging Cyber Security Threats, 2021 and Beyond – Part 2

There is no denying that the world of cybercrime has changed the way businesses think about security. Not only do you need to consider physical security but also your digital security. Everything in your business is at risk if the business has an internet connection. Intellectual property, trade secrets, personal data, financial data are just a few of the things that hackers will try to steal.  This essay continues our discussion on Cyber Security threats, 2021 and beyond:

Ransomware – Ransomware is becoming a household name. Ransomware is a computer infection that encrypts the data on your computer and asks for money for the decryption keys. While ransomware is becoming much more of a mainstream cybercrime today, believe it or not, it has existed since 1989 when the first version was mailed out to the participants of a World Health Organization conference on a 5 ¼ inch disks and the victims had to mail the ransom to a Post Office Box in Panama.

The use of digital currencies like Bitcoin have replaced the old ways of collecting funds. Due to the anonymity of Bitcoin and other digital currencies,  tracking down perpetrators of ransomware is more difficult. While Bitcoin does have an indelible ledger of transactions where you can track the flow of the money, there are no names associated with the accounts in the ledger.

The newest versions of ransomware steal your files before locking them. We have seen a large number of attacks that have stolen critical data out of the businesses, schools or hospitals.

Ransomware has seen a 165% increase during 2020: the UK reports that Britons are seeing more than 2000 attacks per day. The makers of Emotet and Trickbot are rumored to have made over $325 million in ransom since the first version.

Denial of Service attacks – Political statements seem to be the main motivator for Distributed Denial of Service (DDoS) attacks and countries like Turkey have seen incidents increase to over 30,000 occurrences each day. The US has overtaken all other countries as the main target for attackers and cyber criminals have attacked news agencies, corporations and governments around the world in an effort to take their computer systems and websites offline.

A common misconception about DDoS attacks is that they only affect a business with a website which is inaccurate. A DDoS attack aimed at a business can shut down its outgoing internet access by flooding the connection with so much incoming traffic that nothing goes out. This means that all cloud services will be inaccessible and email will not be delivered,

Email phishing schemes – Phishing schemes are used to target individuals with online access to bank accounts, credit cards, etc. and they have become a major source of information and money for cyber criminals. The new term “whaling” has been coined for large attacks. In the US, we have seen emails appearing to come from a company CEO requesting wire transfers from the accounting departments to pay urgent invoices which have resulted in the money being remitted to fake vendors. Other attacks have targeted the Human Resources Department asking for information about employees. These attacks have led to leaks of social security numbers and other sensitive employee data. Mattel lost $3 million in a phishing scheme that appeared to be a legitimate invoice for goods that turned out to be fake. Luckily for Mattel, they were able to recover the funds with the assistance of the Chinese authorities. Most companies are not as fortunate.

Known Vulnerabilities – Most firewalls require a reboot following patching so most companies schedule quarterly, bi-annual, or annual updates. This regularity in scheduling leaves enterprises open to attack.

The Panama Papers leak, for example, has been attributed to outdated, unpatched software running customer portal and email servers.

The list of known vulnerabilities is growing each day and information about these vulnerabilities has become public knowledge.  Microsoft reported cyber criminals targeting so-called “zero-day vulnerabilities” impacting Microsoft Internet Explorer and HP’s 2019 Cyber Risk Report found that 44% of breaches in 2019 came from vulnerabilities that are two to four years old. This indicates that enterprises are not taking updating the hardware and software on a regular basis seriously – even the “big boys” are vulnerable.

Emerging Cyber Security Threats and Trends, 2021 and Beyond – Part 1

There is no denying that the world of cybercrime has changed the way businesses think about security. Not only do we need to consider physical security but also digital security. Everything in business is at risk if the business has an internet connection. Intellectual property, trade secrets, personal data and financial data are just a few of the things that hackers will try to steal from your business.

So let’s talk about cybercrime and the top cybercrime trends we have seen in 2020 – Part 1

Cybercrime – as-a-service – Cybercrime has gone mainstream and, like software, cloud, and infrastructure technologies, it is now being offered as a service. With the rise in computing power and the decrease in cost, cyber criminals have seized the chance to make money by offering their cybercrime skills to others who have the money to pay for their services with no technical experience required. Denial of service attacks can be launched for less than US $10 and email accounts on popular sites like Gmail, Yahoo, and Hotmail cost around $130.

State sponsored cyber-attacks – Hacking is no longer performed by the stereotypical teenage hacker in a basement accessing your systems. State sponsored hacking is now performed by sophisticated organized groups using every tool available to steal valuable intellectual property & critical data as well as to damage or shut down core infrastructure.

Think of the Sony Pictures or Office of Personnel Management data breaches in the US for examples of how state sponsored hackers have stolen valuable or damaging information from companies. These hackers are targeting companies and information that can provide economic or political advantages.

Recently publicized cases in the US show that state-sponsored hackers from Iran accessed critical infrastructure systems at a dam in upper New York state. In late December, alleged Russian hackers took down the power grid in Western Ukraine. Hackers have turned the fantasies of Die Hard into reality by accessing the core infrastructure of nations with direct penetration attempts. The state sponsored hackers are trying to get control of everything from oil fields, power stations, water stations, and nuclear facilities.

Hackivism – One of the emerging cybercrime threats to the world is what is termed “hactivism” or politically motivated hacking to destroy reputation, steal data, or affect critical infrastructure. Hackers such as Anonymous use their skills to forward their own political agenda. This trend began to gain traction during the US elections where people from around the world enlisted hacking as a form of speech. Businesses must have protections in place that can address the threat of hacktivism. From defacing your website to bringing down your network with a denial of service, hacktivism must be defended against.

Next: Ransomware

Fraud in the Time of Corona -19

Fraud in the Time of Corona -19

During this time of uncertainty due to the Corona-19 virus, we all need to protect ourselves and our loved ones and friends from unscrupulous people.  These bad actors will take advantage of any situation in order to defraud those vulnerable or unaware.

International Consultants and Investigations, Inc. (ICI) recommends the following guidelines in order to avoid falling prey to scammers:

  1. Don’t give out a healthcare insurance number or Medicare number to anyone other than a trusted health care provider.
  2. Do not provide a social security number, bank account or checking account number over the phone to anyone, even if they claim to be from the Social Security Administration or your financial institutions. A follow-up call to the Agency or your bank can confirm if there is an issue to be addressed.
  3. The Census taker will not require any personal information such as an employee ID, Social Security number, etc.
  4. The IRS will not call to inform you that you are under threat of arrest unless you remit immediately by providing banking information to the caller. The IRS does not make these calls.
  5. The World Health Organization, the Centers for Disease Control and Prevention or other health agencies will not call to ask for donations. Stick to charities you know and trust.
  6. Beware of any stranger or recent acquaintance that offers to take your money and go to the supermarket or drug store for you; your money and your new friend will not be back.
  7. If you don’t recognize a number on your caller ID don’t answer. If it’s a “real” call a voice mail will be left.  If you don’t have caller ID and you answer the phone to “dead space” hang up; chances are it’s a “robo” call.
  8. Work from home offers are often scams requiring the victim to “buy” materials necessary to earn money for representing the “firm”. Check any such offering of work-at-home home with your local Better Business Bureau or the police.
  9. No one from Nigeria or a Baltic country has millions of dollars they need you to help move to the United States. In all cases remember, if it sounds too good to be true it is probably fraud.

Scammers are friendly people.  In this time of social isolation a friendly voice on the phone is a scammer’s primary tool used to cheat you. Being aware is your best defense.


What Is Financial Fraud?

What Is Financial Fraud?

International criminals entice their victims by offering convincing documents, generally fraudulent, promising substantial sums of money for participating in their scheme. At some point the victim will be asked or directed to provide up front fees to proceed with the transaction.

Financial Instruments generally offered in fraudulent transactions are:
Cryptocurrency Ransom-ware, ICO Theft, Zero Coupon Bonds, Prime Bank Notes, Bank Guarantees, Money Loans or Transfers, Bearer Stock, Precious Metals, Mining Stock, Crude Oil and Major Construction Projects.

The players are unsuspecting businessmen, brokers, bank officers, government agents, notar’s, attorneys, accountants and financial consultants. The perpetrators will associate their activities with trust companies, officers of banks, non-registered banks domiciled in offshore tax havens, and governments agents.

International criminal financial transactions are offered via the Internet, fax and telex. The current choice of delivery is the Internet.(see News Alert). If you or one of your clients are approached or have been caught up in one of these transactions, we suggest that you contact your local FBI office or Interpol. However if you are currently facing criminal prosecution or you are not sure what you are involved in, contact our ICI office as soon as possible.

Why these international criminals are so successful: Legitimate financial transactions are conducted every moment of every day in the world, international trading uses Crypto Currency (Bitcoin), prime bank notes, bonds, stock, bearer stock, letters of credit, government guarantees, insurance policies, euro bonds/currency, trust instruments, interests and currency swaps, commodities and oil. There are over 400 major banks in every tax haven in the world. Many major corporations maintain a presence in these markets for tax deferments, ease of commerce and trading.

Knowledge is paramount: ICI will assist with investigative due-diligence prior to making an investment or financing a project. The international market offers many opportunities for investment. ICI has the ability to investigate and bring to light the total picture. We will develop intelligence on the local business climate, government cover-ups, questionable partners, potential labor problems and development authorities that have been known to be less informative than they should be. ICI operatives are trained to obtain the answers to your questions and provide the information required for the right decisions to be made, prior to a costly venture. Planning for the unknown is always sound advice.

ICI operatives have recovered substantial financial returns for the investors of funds managed by large Capital companies in Europe the United States and other countries, including one of the largest NASD arbitration awards.

Maritime Threats – Knowledge Equates To Safety

Maritime Threats – Knowledge Equates To Safety

Today’s maritime threats are rarely the reef or weather shore. Instead, maritime operators now face a broad range of concerns from the unknown and difficult to predict specter of terrorism to the routine and burdensome imposition of new and changing local, state, and federal regulations.

ICI Investigations offers innovative and cost conscious solutions. Captain Earl Johnson, 200 ton Master USCG and ICI Investigators can provide in depth investigations, security and Maritime protocols to meet your needs.

  • Marine Accident Investigation
  • Maritime VIP Protection
  • Ship appraisals
  • Insurance accident investigations
  • VIP vessel security on board and on patrol
  • 3D Animation and photography for re-enactment of vessel accidents Worldwide service:

ICI provides Investigations and vessel appraisals.

ICI Investigations Appraised the S.S. United States


Sinking barges:

ICI’s Maritime Investigation & Expert Witness Testimony Florida — International Consultants & Investigations (ICI) announces today the favorable conclusion of a complex maritime hull claim where ICI was contracted to provide investigative and expert testimony.

As the lead maritime investigator on the claim, Captain Earl R. Johnson explains that while litigation outcomes are always uncertain, the thoroughness of ICI’s maritime investigation and its learned testimony create a measure of confidence in those having to predict litigation outcomes. “It’s what we do,” Captain Johnson explains. “We’re not surveyors and we bring a different set of skills to the table.

We have a lot of experience unfolding complex maritime incidents and that’s where we shine and where we can help lawyers shine too.”

With offices in New York and Florida and with experience working throughout the world ICI is fully capable of providing discrete investigative services and Expert Witness Testimony for Maritime incidents.


The purpose of this investigation is to conduct Forensic review and analysis of supplied documents, photos, and statements provided and additional information gathered from subsequent Forensic Research.

Case Related to:

Maritime casualty and subsequent sinking of barges DAR 1 and DAR 2 of the coast of Cape Vidal on October 21, 2008.

The scope of work includes:

1) Forensic review of all photos and documented observations

2) Forensic review and analysis of provided documents with investigators notes.

3) Supporting documents discovered from Internet research

4) Investigators detailed report

Earl R. Johnson, DM, Cll Certified International Investigator 200 ton Masters License, USCG.


Analysis of sustainability and useful Economic Life Conducted by International Consultants & Investigations. The following is a preliminary report which examines the sustainability and useful (economic) life of Pier A, the historic iconic landmark located on the waterfront in the vicinity of Battery Park; lower Manhattan, New York City.

A review was undertaken to: (a). understand the historical context of Pier A and its place within the New York City landscape, (b). what has been done to renovate, rebuild and conserve this national historic landmark, (c). interview knowledgeable parties associated with the renovations over the last 10-15 years based upon their knowledge, expertise, and experience in the engineering and architectural concept of the Pier A renovation, and (d). attempt to determine a reasonable “useful use value” of Pier A going forward through the next 50 years.

This report discusses the components of the renovations and improvements which will assist in predicting a reasonable duration of time that the owners, operators, and investors of Pier A might expect this asset to be usable, with normal repairs and maintenance. A realistic useful use economic service life prediction depends on assembling information which is inherently challenging due to the existence of several successive layers of parties including architects, engineers and project managers who have labored over the various renovations that began, stopped , restarted, stopped and finally is near completion as of this writing. If information isn’t available or found in available records, then it became necessary to locate knowledgeable people who participated in the renovation at an earlier time. The report’s reliability depends on the quality of this input. The future sustainability of Pier A largely depends on the dynamic of the tenant developer and Battery Park City Authority’s ability to manage, maintain and be responsive to the public’s enjoyment of the renovated facility. Without question Pier A will reinvigorate the area known as Battery Park. Since 1992, the City of New York recognized that it owned a strategically situated landmark that was in danger of extinction.

At that moment, the existing Pier A, had been allowed to reach the end of its useful life. Pier A dated back to 1884-1886, when it was built by George Sears Greene, Jr., same engineer who had just completed the Brooklyn Bridge. Either the pier had to be replaced, renovated, or sold to a developer. Various alternatives were studied and contemplated. Pier A had been declared a “national historic landmark” in 1976 so incentives and restrictions played a significant role in the available options.

Pier A sits on a special piece of property that lays on the southwest tip of Manhattan, literally the closest landmass to the Statue of Liberty and Ellis Island .The challenges presented by the environment; hostile weather, including but not limited to: salt water, salt air, currents and wind are natural factors that a developer, engineer, and architect must contend. The condition of the pier, above and below the surface needed to be assessed in order to evaluate deterioration and aging. This assessment would assist in determining what improvements would be necessary. Ultimately Pier A’s fate depended on city planners, public opinion and the creativity of developers.

More recently in the 1980’s, Pier A had been a tie up for police patrol boats. Prior to that, Pier A was a fireboat station. For fireboats which stemmed from the days that the FDNY shared the facility with the old Department of Docks. In the early days Pier A served as a place to quarantine arriving immigrants for processing. Pier A was used as a place to welcome visiting dignitaries to the United States. Surviving century old photographs depict a bustling area with Pier A hosting numerous vessels including steam ships, sail boats and ferries. Pier A was always in the midst of New York City nautical history. Pier A’s historical context is the driving impetus, perhaps, to decide over five years ago to utilize the existing iconic structure. This decision provides a seamless historic connection to the City of New York. The oldest surviving pier in New York City would therefore have a future; a useful use for the next 40 years, for the following reasons:

Pier A is being transformed into New York City’s largest restaurant. The unique location of the iconic Pier A and its distinctive iconic clock tower sits at the convergence of the Hudson River, East River, and New York Harbor. The transformation carefully preserved the Victorian architecture with three planned restaurants including an outside plaza for eating and sightseeing, superior space for catering events and an historical information center. This is a destination second to none offered to locals and tourists. The “pier” is adjacent to the Battery Fort, Jewish Holocaust Museum and American Indian Museum which attracts visitors in the shadow of the “new” Freedom Tower. Brand new retail venues including restaurants, schools and residences along an amazing esplanade surround the renovated pier. The embarkation slips for ferries traveling to Staten Island, the Statue of Liberty and the Ellis Island complex provide year round throngs of pedestrian traffic and constantly arriving tourists being dropped off by buses and taxis.

Pier A and Renovation

Pier A was originally built in 1884-1886 as a building which housed the Department Of Docks and New York Harbor Police. There were once over 150 docks and piers in New York City. Pier A is the oldest surviving pier. The original structure is a three level rectangle shaped building extending 300 feet out into the water. It is located at Liberty Place at the southwest tip of Manhattan, just north of the old battery fort with water slips extending the length of both the north and south side of the pier.

The pier deck is now completely renovated with reinforced concrete, pavers, and wooden timbers. All new metal barriers adorn the perimeter of the pier with a surrounding promenade that extends around the whole perimeter of the north, west and south sides of the pier. The building has been completely restored inside and out. Rotted wood has been removed inside and out with new supporting beams replacing rotting wood or supporting old weakened wood.

New fittings and joints have been installed wherever necessary. The whole building is clad in 20,000 square feet of structural steel, galvanized copper, lead metal siding and wood. An earlier siding was installed during a previous partial renovation in 1989.

Pier A engineers have utilized a paint formula which would last and be more impervious to the weather, water and salt environment. The Richter Group formulated a hybrid system of fluoro polymer and flexible acrylic technology that should prove durable in the Pier A environment for 15-20 years. A similar building which used the same paint formula has already demonstrated 13 years of durability and is still going strong.

Improvements below the building on the deck and below the surface of Pier A resulted from assessments and suggestions made by Langan Engineering in 2003 and 2007-8. These suggestions included refilling mortar between stone blocks and restoring several pilings or reinforcing pilings that had been chemically altered by brackish chloride levels through the years. The building utilizes the deck of the concrete and timbers constructed in the late 1800 ’s.

The pier and building on top of it was constructed contemporaneously. Most pier foundations are built to last approximately 50 years. This particular foundation was constructed in a similar fashion to the Brooklyn Bridge just to the East of Pier A. The builders utilized the same machinery, crew and civil engineer. They employed similar technology in constructing the pier foundations.

This report has incorporated information furnished by the engineers who made recommendations and suggestions which were purportedly incorporated into renovation. Renovation and installation of new load bearing pilings and restoration of reinforced concrete at minimum 50 years to the Pier’s service life can be estimated on similar structures cited by engineers that were interviewed for this report.

One engineer who worked on Pier A indicated that typical marine structures are designed for a 50 year useful service life.

The variables depend on the environment where the pier is located and general maintenance. Predictable abnormal weather conditions are a factor that has been built into the pier improvements within the experience of the last 100 years. Structural repairs have been performed at Pier A on the superstructure over time. Presuming the renovations have followed the suggestions set out in the more recent Langan Engineering Report, the serviceable useful life of Pier A below the surface is expected to last until 2065.

Maintenance tests are normally recommended to continually diagnose the condition of the structure including chloride penetration tests and concrete compressive strength tests of mass concrete. Today, Pier A’s concrete no longer suffers from the spoiling. The concrete, cement, and stone have been repaired during renovations over the last 4 years. Observation of some metal structural deterioration due to corrosion of the metal cladding on the deck surface was seen recently. Despite repairs, superstructure elements continue to deteriorate due to the hostile environment. The currents are especially treacherous. Hurricane Sandy apparently did little or no damage below the surface of Pier A.

It is worth repeating that the useful use of Pier A structure will always depend on continuous maintenance and repair.

Pier A Building

Pier A consists approximately 36,900 Square feet, with 35,800 square feet of leasable space. The first floor is being fitted for a huge restaurant featuring an oyster bar with spectacular views of the Hudson River, Statue of Liberty, Ellis Island and the expansive waterfront. The inner walls are covered in some places by ornamental decorative tin type metal cladding of another age. The machines imprinted these impressions no longer exist. Glass throughout the first floor is double pane. Large double pane glass panels line the outside walls and permit inhibited spectacular views. Sliding glass doors are placed to encourage an open air experience during warm days and nights.

Pier A Deck

The Pier A Deck consists of the structure below the building and an outer promenade that surrounds Pier A except for the street approach.

Pier A Approach

The Pier A approach provides vehicular and pedestrian linkage between Battery Place and the Pier A entrance. Under construction presently is a park just to the south of Pier A.

A. South

A water slip abuts Pier A to the south as well as an attached reinforced cement dock which remains from the early part of the 20th century. The WW II American Merchant Mariners Memorial rises out of the water about 40 yards from Pier A and a new promenade which has been built to house an outdoor plaza. This plaza will host outdoor dining and sightseeing. To the south, in close proximity, is the red-bricked circular Battery Fort. West of that landmark, ferries are coming and going with their passengers heading to the Statue of Liberty, Ellis Island and Manhattan day cruises.

C. North

A narrow water slip is situated against the north side of Pier A and its north side promenade. The view north from the Pier A is of a more modern Museum of Jewish Heritage and Holocaust Memorial. Also meandering towards Pier A is The Battery Park Esplanade which approaches Pier A, as another convenient access to Pier A for pedestrians and bikers. One can enjoy spectacular views of the Hudson River waterfront while walking from the new Freedom Tower to Pier A.

Promenade Surrounding the Pier A first floor on the north, west and south is a wide promenade which is similar to a cruise ship walkway. Pedestrians on the promenade are protected by metal and wire railings that feature glass inserts.

These railings are also installed on the inside of the promenade to keep visitors safe from a narrow mote of water below exposing the side of Pier A and the bulwark which was built in the late part of the 19th century. The promenade is new and built to withstand the rigors of New York’s harsher winters for the next 30-40 years. The railings are galvanized to make them impervious to the salt air and poor weather.

Clock Tower

Photographs of Pier A’s clock tower are readily recognizable to visitors, whether locals or tourists. The clock and bell with its’ four faces was a gift of the president of U.S. Steel to New York City in 1919, It was installed as the first memorial to WW I veterans.

Today the clock is and its renovated mechanics remain in the tower awaiting visitors who will learn its history at Pier A’s information center. The old winding staircase that leads to a fourth level clock tower is under renovation and the stanchion where the bell rests is being prepared for many more years of service.

First Floor

The flooring is fitted with durable wood floorboards. A complete renovation of the interior was performed over the last four years including extensive structural repairs including replacement of rotted wood and weakened beams. New steel elements were replaced and off site Dutch repairs to all the windows were performed. Since Hurricane Sandy it was necessary to replace wiring and flooring that was damaged. Security cameras and an expansive sprinkler system have been installed. Weather impervious wiring was installed after the hurricane. All renovations considered preservation of the historical nature of Pier A. Throughout the building is evidence of wooden veneer, plaster cornice work and original molding restoration.

Second Floor The second floor will house an upscale 100 seat restaurant with a newly installed fire place. The second floor will host special events.

Third Floor

A bar is being built on the third floor with offices.


The roof has been replaced at least three times during the last 127 years. In the recent renovation a copper tin roof was installed utilizing a more modern gutter system designed to last well over thirty years. A new geothermal HVAC system has been submerged in the Hudson River underneath the pier on the south side. A cage was constructed along with new piles to support the underwater cooling unit.

Preliminary Conclusions

The information gathered for this report has reviewed all components of the present renovations. Each phase of the renovation has been geared to sustainability. The final phase which has been underway over the past year ought to be completed in 90 days. The developers are fitting the new space for three restaurants and a convenient historical information center. The restaurateur has a solid track record of owning and operating over twenty top flight restaurants that have demonstrated a remarkable success story in lower Manhattan. Plans are to install various eateries including a unique oyster bar and upscale 100 seat restaurant and bar. The public will have easy access to the outside promenade where sightseeing will be available as well as food and beverage service. The public will also find the first floor inviting to gain historical information about Pier A and other local attractions.

At the moment restaurants are springing up along The Hudson River Esplanade that follows along the western edge of lower Manhattan. Retail shops and restaurants are being built in and around One World Trade Center a.k.a. the Freedom Tower. This adds up to a unique center of activity drawing visitors like a magnet to the lower end of Manhattan. All information available indicates that the restaurateur is determined to build out a destination that will be a lasting memory for visitors whether they are tourists or locals. The concept has a great potential to contend for the New York City food and entertainment dollar for many years to come.

Pier A has a sustainable useful use for the next 35-40 years. Sustainability depends on continuous maintenance, a visitor’s sense of security and adjustments to market trends by the restaurant owner. The engineers and architects selected by the Battery Park City Authority have handed over Pier A to the restaurant developer and Dermot Company to steward this unique property through the next 35- 40 years.