Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

News


  • May 08, 2018 2:44 PM | Anonymous

    Reposted from The Washington Post

    Italy’s art police say they’ve recovered three paintings stolen in recent months from three small Bologna-area museums after identifying the thief from surveillance videos.

    The most well-known piece was a 1363 portrait of St. Ambrose attributed to Giusto de’ Menabuoi that was stolen in March from the National Pinacoteca of Bologna while it was open to the public.

    In a statement Friday, the carabinieri art squad said investigators were able to zero in on the thief using surveillance videos from the museums, and tracked him down when he acted “suspiciously” near another Bologna museum.

    They then searched his apartment and found the looted works.

    See Original Post


  • May 08, 2018 2:39 PM | Anonymous

    Reposted from Money Magazine

    Another day, another online security scandal — it now just seems like a natural part of life in 2018. But this time, you really need to take immediate action.

    Twitter’s chief technology officer, Parag Agrawal, revealed in a Thursday blog post that a bug in its system caused people’s passwords to be kept unmasked in an internal log. And though the social media company swears it has “no reason to believe password information ever left Twitter’s systems or was misused by anyone,” it’s recommending that all 336 million users change their passwords immediately.

    But here’s the kicker: Twitter isn’t just saying you should update your password on Twitter. It’s suggesting you also change your password on all sites where you used your Twitter password.

    As soon as possible, you should to go Twitter.com and mouse over to your avatar in the upper right-hand corner. Click it, navigate to “Settings and privacy” on the drop-down menu, and click “Password” on the left. Then change your information. Make sure you pick a good password — one that’s hard to guess, longer than eight characters, relatively random, has upper and lowercase letters, and contains numbers and symbols, according to USA Today.

    Now, repeat this process on the other sites where you used your old Twitter password. This should be obvious, but don’t reuse the new password you just created — invent a new one entirely, or at least throw in a variation.

    As soon as possible, you should to go Twitter.com and mouse over to your avatar in the upper right-hand corner. Click it, navigate to “Settings and privacy” on the drop-down menu, and click “Password” on the left. Then change your information. Make sure you pick a good password — one that’s hard to guess, longer than eight characters, relatively random, has upper and lowercase letters, and contains numbers and symbols, according to USA Today.

    Now, repeat this process on the other sites where you used your old Twitter password. This should be obvious, but don’t reuse the new password you just created — invent a new one entirely, or at least throw in a variation.

    If you want to take your security to the next level — and you probably should — you may want to look into enabling two-factor authentication for your sensitive accounts. Also called two-step authentication, it is what is sounds like: A system that uses multiple methods, like texting you a log-in code, to confirm your identity before allowing you access to your account.

    Perhaps the best way to protect your info, though, is to start relying on a password manager. It’s a type of software that generates ultra-secure passwords and keeps track of them for you in one safe place. The Verge says the best brands are LastPass, Dashlane and 1Password, all of which you can try for free. Once you find one you like, you can upgrade to a paid subscription. Those will run you less than $5 a month, which is a a small price to pay for privacy.

    Then all you have to do is make sure your password manager password is really good. Ah, the circle of (modern) life.

    See Original Post

  • May 08, 2018 2:37 PM | Anonymous

    Reposted from Ahram Online

    Egyptian Minister of Antiquities Khaled El-Enany escorted members of the media on a tour of the Grand Egyptian Museum (GEM) in Giza to show that the fire that broke out at the museum last week did little damage to the museum.

    The visit included a tour of the museum buildings as well as the display of the King Ramses II colossus and artefacts at the GEM’s conservation centre.

    Last Sunday, a minor fire broke out on the wooden scaffolding on the museum’s rear façade.

    No one was harmed and no artefacts were damaged in the fire.

    One hour after the fire broke out, the museum’s fire station, with aid from Civilian Security fire trucks, succeeded in extinguishing the flames, Mostafa Waziri Secretary General of the Supreme Council of Antiquities said at the time.

    An investigation has been launched to determine the cause of the blaze. The GEM is currently under construction, with scaffolding positioned outside several buildings.

    The museum is being built to house antiquities from ancient Egypt, including many items currently held at the Egyptian Museum in Cairo's Tahrir Square. A partial opening is planned for later this year.

    See Original Post

  • May 08, 2018 2:34 PM | Anonymous

    Reposted from Somersetlive

    The Museum of East Asian Art's 25th anniversary celebrations are back on track after 'priceless' artefacts were stolen by masked thieves. The Bath museum was shut for more than two weeks after the break-in and is now due to reopen on Thursday (May 3).

    Police have yet to make an arrest in connection with the heist, which saw 'beautiful pieces with historical and cultural value' stolen. The crime, believed to have been planned, was even more devastating due to it coinciding with the Bennett Street museum's quarter centennary.

    However, celebrations can now go ahead with the opening of A Quest for Wellness, the first UK exhibition by the artist Zhang Yanzi of Hong Kong-based Galerie Ora-Ora, at the museum in Bennett Street.

    Wellness as a theme will tie in with Bath's origins as a Roman spa town, organisers said: "In this exhibition, the artist explores common frailties and shared humanity, investigating the nature and meaning of wellness in China: its history, and its modern counterpoints from a Chinese perspective."

    Works on display will include:

    • Excess, a silk robe covered in pill capsules which portrays pills as a kind of physical and psychological armor in the modern world
    • Inhalation, a Chinese painting on analgesic plasters that explores the ability of beautiful objects to provide humans psychological comfort
    • and Pure Land, an ink painting of Buddha’s portrait in the ancient Chinese Buddhist mural style that alludes to the concept of well-being from a spiritual angle.


  • May 08, 2018 2:30 PM | Anonymous

    Reposted from the New York Times

    The line of people snaked around the blue tablecloth, as government officials and archaeology scholars paused to admire the ancient clay tablets and seals lined in rows.

    Here, in the backyard of the Iraqi ambassador’s home on Wednesday, was closure for these artifacts: a ceremonial transfer back to Iraq, where they had been looted from archaeological sites. Their coming return there will complete a long, circuitous voyage through Israel and the United Arab Emirates to Hobby Lobby, the arts and crafts chain, and eventually into the hands of the United States government.

    The samples carefully lined on the table were just a small fraction of the thousands of smuggled artifacts that Immigration and Customs Enforcement formally returned on Wednesday.

    “To have them in my residence is to underline that they’re coming home,” said Fareed Yasseen, the Iraqi ambassador to the United States, speaking after he and Thomas D. Homan, the acting director of ICE, signed the ceremonial transfer. “We really have a sense of kinship to these artifacts.”

    The artifacts, which are from the second and third millennium B.C., will eventually be taken to the National Museum of Iraq in Baghdad to be studied and displayed. Several tablets are from the ancient city of Irisagrig and date to between 2100 and 1600 B.C.

    Hobby Lobby, which is owned by evangelical Christians known for their interest in the biblical Middle East, originally bought the collection from an unnamed dealer for $1.6 million in December 2010. The purchase, prosecutors later said, was completed despite being “fraught with red flags,” including warnings from an expert on cultural property law hired by the company that the artifacts were possibly taken from archaeological sites in Iraq.

    “Stealing a nation’s cultural property and antiquities is one of the oldest forms of organized transnational crime,” said Mr. Homan, who will soon retire from the agency. He said more than 1,200 items had been returned to Iraq since 2008.

    The collection included cuneiform tablets, ancient clay tablets that probably served as administrative and legal documentation in ancient Mesopotamia, and clay bullae, seal impressions about the size of a coin that served as signatures and proof that an item had not been tampered with. More than a dozen packages were shipped from Israel and the United Arab Emirates in early 2011 under the guise of tile samples to Hobby Lobby and two corporate affiliates. Customs and Border Protection intercepted a few of them.

    In July, the federal government brought a civil complaint against Hobby Lobby, which agreed to forfeit the items. The company also agreed to a $3 million fine, to hire qualified outside customs counsel and to submit quarterly reports on any cultural property acquisitions for 18 months.

    “These artifacts are part of Iraq’s illustrious heritage and history,” said Richard P. Donoghue, the United States attorney for the Eastern District of New York, “and we’re proud of our role in removing them from the black market in antiquities and returning them to their rightful owners.”

    Hobby Lobby is known for its efforts to cultivate evangelical Christianity, including its owners’ heavy financial investment in the Museum of the Bible, which opened in Washington late last year. In 2014, it was involved in the landmark Supreme Court case that found that family-owned corporations could claim religious exemptions to the Affordable Care Act’s mandate to pay for contraception coverage.

    Hobby Lobby did not respond to requests for comment about the return of the artifacts. But at the time of the forfeiture in July, Steve Green, the company’s president, said the company was “new to the world of acquiring these items, and did not fully appreciate the complexities of the acquisitions process.”

    Many of the officials mingling in the ambassador’s backyard with glasses of apple cider and hors d’oeuvres had been involved in the seizure and the return of the artifacts. Others were archaeologists and Middle East scholars who had come forward in support of the items’ return, collectively admiring the condition and the intricacy of the designs on the seals. They pointed to favorites: the seal with the dancing animals, the etching of what appeared to be a god or a king on a throne.

    “Stunning,” one woman whispered, her hands clasped over her chest as she leaned over to get a closer look at the clay cylinders resting in indigo velvet. An archaeologist reached out to carefully straighten one small tablet in line with the others.

    “This is a piece of you,” said Safaa Yaseen, the third secretary for the embassy, who helped unpack the artifacts in the ambassador’s residence. “It’s an indescribable feeling.”

    The demand for stolen antiquities “always seems to be there,” said Katharyn Hanson, the executive director of the Academic Research Institute in Iraq. “It’s really nice to have these moments.”

    See Original Post

  • April 30, 2018 12:24 PM | Anonymous

    Reposted from the Art Newspaper

    A museum in southern France has handed more than half the works in its collection over to police investigators after experts said they are fakes. The Musée Terrus in the village of Elne, near Perpignan, which is dedicated to the local painter Étienne Terrus, who was friends with Henri Matisse and the sculptor Aristide Maillol, reopened after renovation on 27 April. But around 80 of the 140 works owned by the municipal museum are now believed to be falsely attributed to Terrus or outright forgeries, the mayor of Elne, Yves Barniol, revealed at the opening. The discovery represents “a catastrophe for the municipality”, he told local press.

    An art historian charged with revamping the displays to incorporate the museum’s recent acquisitions, Eric Forcada, raised the alarm last August after examining photographs of the works. The local authorities sought a second opinion from a committee of experts, who judged that 82 works acquired over a 20-year period—a mixture of gifts from the museum’s friends associations and a private collector and purchases by the administration—are fake. The specialists noted glaring inconsistencies, such as views of buildings that did not exist before Terrus’s death in 1922 and supports that the artist did not use. The damages are estimated at €160,000.

    Elne town council filed an official complaint for forgery, fraud and possession of stolen goods against “X”—persons unknown—in early April. Perpignan police have seized the works in question and opened an investigation into their provenance. “We will not give up,” the mayor said, pledging to uncover all the documents that “will allow us to trace the forgers”. Denouncing regional art dealers and auction houses as “corrupt”, Forcada told L’Indépendant newspaper that the case “will, at least, raise a greater awareness to protect the work of [local] artists”.

    See Original Post

  • April 30, 2018 12:22 PM | Anonymous

    Reposted from the Art Newspaper

    Scotland Yard is working with the British Museum and the governments of Egypt and Sudan to tackle the looting of pharaonic antiquities. The plan is to create a publicly available database of 80,000 objects that have been identified as having passed through the trade or have been in private collections since 1970, the year of the Unesco convention on cultural property. The scheme is being funded with a £1m grant from the British government’s Cultural Protection Fund, administered by the British Council.

    Although the presence of antiquities on the database will not mean that they are either clean or tainted, it will assist enforcement officers and police in tracking down provenance. The database will also include some objects that are known to have gone missing from Egypt or Sudan but still remain untraced. However, the fuller records of losses held by the antiquities authorities in Egypt and Sudan are treated as confidential; the two governments only release details selectively.

    The project is being overseen by Neal Spencer, the British Museum’s keeper of Ancient Egypt and Sudan, who has seen “a serious increase in the illicit trade in pharaonic antiquities in recent years”. He says the new database should “help flag up objects where there are issues”. It will also be possible to identify suspicious patterns: “One might notice an increase in funerary material of the 25th dynasty from a particular site, and enforcement agencies would be very interested in that.”

    While Scotland Yard—the headquarters of London’s Metropolitan Police—is not directly involved in creating the database, it is giving advice and is one of the three key partners, along with Egypt’s ministry of antiquities and Sudan’s National Corporation for Antiquities and Museums.

    At present, the available documentation is widely dispersed and not readily accessible or searchable. Many of the most important objects have passed through auction houses but their catalogues are only available online from the late 1990s. No libraries in Cairo or Khartoum have comprehensive collections of earlier paper catalogues. The major auctioneers—Sotheby’s, Christie’s and Bonhams—have agreed to provide data for the initiative. Antiquities dealers are also being approached to supply catalogues and possibly unpublished inventory material. Exhibition catalogues recording objects in private hands will be used as well.

    The first tranche of data is due to go online at the end of this year, with the remainder expected to follow in 2019. Very minor objects, such as a single scarab or bead, will not be included. Eventually it is hoped to expand the database to include pre-1970 information.

    Marcel Marée, the British Museum curator running the project, stresses that they “will not be proactively chasing criminals, which is the role of law enforcement agencies, but we will make the market more transparent”.

    The scheme will also help train Egyptian and Sudanese antiquities staff to deal with the international market and track down illicitly exported items. A dozen trainees are due to come to the British Museum, with the first group arriving in July. If the project proves a success, it could be used as a model for other parts of the world suffering from looting.

    The “circulating artifacts” database, as it is known, will be searchable on the web without charge. Although its primary purpose is to help law enforcement, it should also prove to be an invaluable resource for scholars.

    See Original Post

  • April 30, 2018 12:18 PM | Anonymous

    Reposted from CIO Dive

    Users resist change.

    Despite increasing requirements for more complex and secure passwords, "123456," "password," "letmein" and "trustno1" continue to take home the trophies for most-used passwords year after year.

    Even with clever tactics, such as replacing an "o" with "0" or a "s" with a "$," security practices need a makeover for users to avoid having one of the billions of passwords that will be compromised this year.

    Since password hygiene can always use improvement, take a leaf or two from the books of seven security pros:

    1. Russell Schrader, executive director at the National Cyber Security Alliance:

    Schrader has been in the privacy and cybersecurity space for more than two decades and sticks to a password manager, VPN and passphrases to make the process easier and more secure.

    Passphrases, such as "Mary had a little lamb," can make passwords easy to remember across accounts and add length, though Schrader said he does not actually use nursery rhymes as a pass phrase.

    In most cases hackers are going for the easily compromised targets, so "you don't have to outrun the bear, you just have to outrun the other guy," he said. Putting loads of sensitive information on Facebook, such as a favorite ice cream flavor, school mascot or first car, can all make you an easy target.

    2. Michelle Dennedy​​, chief privacy officer at Cisco: 

    "I would love to tell you that I am always well behaved," Dennedy said. But mantras can help with password management: Keep your passwords "exotic, keep them to yourself — do not share — and change them from time to time."

    Requiring too frequent of changes adds complexity, which stops people from introducing more secure passwords.

    "There are ways of doing memorable, good password management," Dennedy said. "It's not the end all be all, but it's what we go right now, so have good ones."

    3. Chris Babel, chief executive officer at TrustArc:

    When it comes to the internet, you can't trust anything, and Babel makes sure he uses a different password for every single site, though there is a method to the madness.

    Babel uses a password management tool, but for times when its not working or not available on a device he uses a personal nomenclature that combines a "crazy, complex thing" standard across sites with something unique to each site based on a mental algorithm.

    "I'm a password nerd," said Babel. "I was a security guy for 11 years."

    4. Tammy Moskites, managing director at Accenture Security:

    Former CISO of The Home Depot and Time Warner Cable, Moskites has had an extensive career in security, starting out in the actuarial trenches and moving up through the security organization.

    For her passwords, Moskites uses a "weird algorithm," which uses multiple languages. "Each word is a different language, even though half the time I don't what it says and I have to go to Google to figure out what those words are," Moskites said.

    But the days of the passwords are going to change, said Moskites. "Eventually down the road it will go into a persona, where [a system] will learn a little bit more about me specifically and my habits and be able to identity me that way."

    5. Andrew Jones, lead solutions engineer at Shape Security:

    To maintain consistency across platforms, Jones relies on a password manager set to 15 character, alphanumeric passwords with plenty of special characters. The password manager can autogenerate a new one for each site, though problems can arise for users of such tools if they don't have mobile app integration.

    But no matter the amount of security that is injected, even the most savvy professionals can still be vulnerable.

    "If you're doing something on the fly really quick, even for me it's really hard to not fall back to a standard password just as a short-term fix to log in to the create the account," said Jones. Avoiding doing this altogether is the best case scenario, but if not, at least remembering to go back and change the password to something more secure is vital.

    6. Adam Bacchus, director of program operations at HackerOne:

    Bacchus admits that for some sites of low importance without significant PII, shorter, easier passwords can be fine. The problem arises, however, when users carry these practices to other platforms.

    Email is the "keys to the kingdom" — the platform used to reset passwords for every other account, so Bacchus makes sure to keep his locked down with a long password and two-factor authentication. 

    7. Jenny Menna, SVP of Security Intelligence, Engagement and Awareness at U.S. Bank:

    After switching from a career in government to the private sector, Menna has advised customers and clients to not use the same passwords across multiple systems in case one is compromised, which is considered a best practice in cybersecurity.

    While the industry is hoping to move beyond passwords — "because they're inherently a pain in the butt and insecure" — users simply have to employ complex, unique passwords.

    Password hygiene is all about "doing your best because so many people aren't," Menna said. Malicious actors are "going to go after the easiest target because there are so many easy targets, whether it's a company or individuals, unless you are particularly juicy."

    See Original Post

  • April 30, 2018 12:13 PM | Anonymous

    Reposted from Campus Safety Magazine

    The latest string of school shootings, most notably the Feb. 14 shooting at Marjory Stoneman Douglas High School in Parkland, Fla., have reignited national conversation on gun access and gun violence. Such incidents on any campus — K-12 or higher education — raise questions for all institutions as to how they prepare for the unexpected and work to prevent incidents.

    Thankfully, some of the most familiar aspects of Clery Act requirements create structures for campus crime response, including alerting members of the campus community if there are any immediate or ongoing threats. Think about the update on your institution’s homepage warning of a string of robberies or the emails informing community members that a suspect for an aggravated assault on campus has been identified but not yet apprehended. Without the Clery Act, messages like these might not be sent at all. The Clery Act requires institutions to alert their campuses by issuing a timely warning if a Clery-specific crime occurring within Clery-specific geography poses a serious or ongoing threat to the campus community. Clery crimes include homicide, aggravated assault and weapons law violations, among other things.

    The act also requires institutions to issue emergency notifications when an emergency threatening the health and safety of the campus community occurs on campus. Emergencies can range from a chemical spill in the science lab to an unexpected tornado to an active shooter.

    As commonplace as they might seem now, emergency notifications were not a Clery Act requirement until 2008. The deadly shooting at Virginia Tech in April 2007 forced a conversation on whether or not the Clery Act timely warning requirement provided enough of a mechanism to warn the campus about immediate emergencies like an active shooter incident. Today, U.S. colleges and universities are required to assess whether or not there is a significant emergency or dangerous situation that warrants a notification to the campus community.

    Campuses sometimes struggle with communicating the intention of timely warnings and emergency notifications and the distinctions between their uses. Many campuses do not want to water down the significance of such warnings by over-issuing them but also want to make sure their campus is aware of any potential risk that might impact their overall well-being.

    Because national incidents often lead to questions and concerns from your own campus community, consider revisiting or publicizing your own timely warning or emergency notification policies. Here are some suggestions for Clery team tasks:

    1. Review your timely warning and emergency notification policies for compliance. 
    2. Create a one-page document that describes the function of timely warnings and emergency notifications and how campus community members will receive necessary information in an emergency.
    3. Film a short video or launch an awareness campaign explaining the difference between timely warnings and emergency notifications and how to sign up for your institution’s alerts (if you have an opt-in system).
    4. Organize a working group to examine current timely warning practices (method of issuing alerts, language in alerts) to determine possible policy or practice changes, if needed.
    5. Organize a test (drill or exercise) of your emergency response and evacuation procedures as required by the Clery Act. Coordinate with local first responders.

    Clery alerting measures are a crucial tool in promoting a culture of transparency and support on a college campus. Without them, community members would not know about patterns of crime, situations to avoid or be aware of, or how to be a vigilant community member working to ensure the safety and well-being of fellow community members. Alerting requirements under the Clery Act create an assurance that we often forget was not always part of the college experience.

    Colleges and universities will best serve their campus communities through utilizing these types of alerts, when appropriate, and through direct education as to when and why each alert is employed. Engaging in such action ensures a balance between protecting the rights of students and honoring transparency as well as promoting the importance of the overall well-being of the campus community.

    See Original Post

  • April 24, 2018 4:50 PM | Anonymous
    Reposted from ArtNet

    Each year, art thefts account for around four to six billion dollars of losses worldwide. Due to the magnitude of the problem, the International Criminal Police Organization, commonly known as Interpol, continually collects data about the many art thefts and recoveries. With 192 member countries, the international police organization catalogs around 50,000 stolen works of art.

    Using Interpol’s wealth of data, a recent analysis by Element Paints has taken up five major questions surrounding the global crisis surrounding where art is stolen from, what is stolen, and where the work most often ends up.

    It is perhaps not totally surprising that the countries that most often fall victim to art thefts are war-torn countries like Iraq and Syria. But right behind them, the seven largest hubs for art thievery are all in Europe. Most shockingly of all, the vast majority of stolen artworks from all around the world end up in Europe as well, with paintings, sculptures, and religious items being the most sought after.

    According to Interpol’s data, artworks are most often recovered in Paris, but the second most common city of retrieval is a little known Serbian city called Arandelovac, which slightly exceeds the recoveries of artworks in London. The Serbian city’s geography makes it a convenient hub on the trail between the Middle East and Europe.

    Interestingly, the vast majority of stolen works date from the 20th century, and are not taken from museums or places of worship as often as from private homes by breaking and entering.

    The data from Interpol, which has been working on countering cultural property theft since 1947, considers all artworks including archaeological pieces, antiquarian books, antique furniture, coins, weapons and firearms, and ancient gold and silverware. Element Paints’s analysis considered 4612 unique records of art theft dated from 1991 to 2017 and excluded firearms in their methodology. Below are graphic breakdowns for five of Element Paints’s findings. To see the full art theft report, visit their website.

    See Original Post

  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection.  All Rights Reserved