INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from Campus Safety Magazine
The active shooter phenomenon is one that is here to stay for the foreseeable future. Active shooter incidents have become all too frequent in our society, especially in our schools. What was once unthinkable is now today’s reality. While the root causes of the uptick in these incidents are debatable, the fact that armed response must be rapid and overwhelming is not.
To ensure a rapid response aimed at quickly neutralizing the threat, first responders, both armed security and law enforcement personnel, must engage in dynamic training so that that they are prepared to respond appropriately and effectively. When preventive and predictive measures to deter a shooting have failed, armed responders must be prepared to act quickly and decisively.
Conducting dynamic active shooter scenario training for armed responders will ensure a rapid response that minimizes casualties. Training must be realistic to provide responders with the skill-set needed to quickly neutralize an active shooter threat. A good training program starts with a number of musts:
Armed response training is truly effective when it “feels real.” Trainers must find a way to simulate the extreme stress of an active shooter incident in training scenarios. This will help responders function at a higher level during an actual active shooter incident, because training has taught them to cope with stress. There are a number of ways that you can add realism to training scenarios, including:
Active shooter situations are stressful and chaotic. You must do your best to anticipate potential issues and problems and address them in training before an incident occurs. These issues include:
A quality training program for armed response to an active shooter must ensure that security and law enforcement officers are equipped to rapidly and effectively neutralize the threat. Training must be as realistic as possible to allow officers to learn to function through the overwhelming stress of an active shooter situation. Officers will respond as they are trained, so you must make that training count.
See Original Post
Reposted from StaySafeOnline
TED Talks are excellent resources if you want to learn from an expert and spark your curiosity. Although they’re available on almost any subject imaginable, these speakers and their talks are among the best concerning cybersecurity.
1. Keren Elazari: Hackers: The Internet’s Immune System
Keren Elazari is an Israel-born independent cybersecurity researcher who has had work featured on CNN, Wired and more.
In addition to the nearly two decades of insights she’s given to security firms, organizations and Fortune 500 companies, Elazari has authored books related to her knowledge.
In her TED Talk, Elazari opens by saying she thinks the internet needs hackers, because without the ethical ones who find vulnerabilities and make them public — a practice known in the hacker community as “full disclosure” — people wouldn’t be sufficiently motivated to fix those identified issues.
She continues by clarifying that hackers have significant power because of the capabilities at their fingertips and should use it responsibly.
Another point Elazari raises is that hackers can bring people together to raise collective awareness about issues. She uses Anonymous as an example in the talk for that first point, then brings up how even major companies have a complex relationship with hackers and sometimes don’t appreciate them, even when they bring flaws to light.
She ends by emphasizing how hackers have positively impacted innovation, civil liberties and internet freedoms because they can’t ignore the problems they find — they must either fix them or exploit them.
This TED Talk may make you think a little differently about hackers than you have in the past.
Watch Now
2. Chris Domas: The 1s and 0s Behind Cyberwarfare
As a cybersecurity researcher specializing in embedded systems reverse engineering, the manipulation of electronic devices and vulnerability analysis, Chris Domas works at the Battelle Memorial Institute in Columbus, OH.
Domas graduated from Ohio State University with a degree in computer science and joined the Battelle team soon afterward. Due to the high quality of his work in 2013, he received the organization’s Emerging Scientist Award and Technical Achievement Award.
In his TED Talk, Domas provides the audience with details about how pattern recognition and reverse engineering help cybersecurity researchers discover things about pieces of binary code. He opens by explaining what binary code is, how it relates to computers and why it broadened his understanding of cybersecurity.
He points out we’re in an age of cyberwarfare and that requires not only defending things in the online realm but, sometimes, knowing how to attack the world’s evildoers. To emphasize his point, Domas uses the example of a terrorist who wants to use their mobile phone as a remote detonator.
The talk continues by addressing the painstaking but worthwhile task of figuring out how to translate binary information into visual representations so our brains can understand them. Then, it becomes significantly simpler to recognize patterns within binary information.
Beyond the analysis of visual representations of binary code, the next step is to look for similar pieces of information. By using elimination, it becomes possible to find the desired pieces of code, then finally understand how they work with each other. This entire process can happen in a matter of hours, when it would have previously taken months.
This talk fills you in on the often complicated ways cybersecurity experts work to achieve their goals, so it deserves less than 20 minutes of your time.
3. James Lyne: Everyday Cybercrime and What You Can Do About It
One thing cybersecurity researcher James Lyne is passionate about is making the topics in the field accessible. He’s the founder of cybersecurity research firm Helical Levity, head of research and development at SANS Institute and a global research adviser at Sophos.
His TED Talk reminds people of the typical online activities they perform without second thought, often putting them at risk for attacks by cybercriminals.
He warns that, in addition to the hundreds of thousands of new individual computer viruses that emerge by the day, cybercriminals have made business enterprises out of their dirty deeds, such as by offering services that allow a client to take down a competitor’s site.
Lyne demonstrates how easy it is for criminals to insert malware code on a website and sometimes even make it look like something innocent and supposedly helpful, such as anti-virus software. He talks about the creation of fake public Wi-Fi networks and goes over some other ways cybercriminals can quickly take advantage of people.
Lyne concludes by saying we need to keep adding to the cybersecurity talent pool by ensuring graduates have the information they need to understand new types of malware. He also urges everyone to learn best practices against cybercrime and implement them for self-protection purposes.
His easy-to-understand content reveals the specifics on an essential topic in today’s heavily connected world.
Reposted from The Sydney Morning Herald
Thieves have made off with priceless Swedish crown jewels, in a daring heist reminiscent of a Hollywood movie.
According to Swedish radio the offenders took two crowns and a royal orb known as a ‘riksapple’ from the ancient cathedral in Strangnas, west of Stockholm, around lunchtime on Tuesday.
They were the funeral crowns of Karl IX and his wife Queen Kristina, who died in the early 17th century.
Two men were seen to jump into a motor boat moored just below the church.
Police quickly mobilised and pursued the thieves by sea, on land, in helicopters and planes.
“We are on land, in the water and in the air,” a police spokesman said.
But the pair somehow evaded pursuit and vanished.
The spokesman said they could have left the motorboat and jumped in a getaway car heading west into the hinterlands, or east to Stockholm.
“We are spreading out in all directions.”
Police chief spokesman Thomas Agnevik told Swedish TV the lost objects were “invaluable objects of national interest”.
By 9:30pm there had still been no arrest.
The royal regalia were originally buried with the couple but were later exhumed and put on display.
At the time of the theft the church was open and staff were on duty. A spokesman said no-one had been injured “physically or mentally”, but they had decided to keep the church closed for the rest of the day.
Business leaders’ and organizations’ interaction with digital technology is growing exponentially. Its adoption and integration will continue to climb in the security industry and rapidly evolve around solutions that were impossible to comprehend just a few short years ago.
With that being said, there are many issues and challenges that arise when integrating this technology, and perhaps no better illustration than the convergence of building automation systems (BAS) and physical security systems.
The core functionalities of BAS are to keep the indoor climate within a specific range; address lighting needs based on a schedule or occupancy; adjust monitoring when devices within the system are malfunctioning; and, provide customized alarm reporting.
Controlling mechanical, electrical, energy management, climate control and plumbing from one dashboard or platform has led to breakthrough technology while delivering the promise of convenience and customization.
Here’s a typical scenario: It’s 6 a.m. on Monday morning and the building’s automated scheduling activates the HVAC system, turns on lighting in specific areas, runs several systems checks to ensure comfort during business hours.
Then, at 6 p.m., the BAS programming ensures the building runs efficiently during nontraditional hours. At any given time, the various systems can be audited and addressed via the BAS dashboard. The IT department and budget has slowly absorbed this aspect.
The physical security space has had its own version of convergence for many years. Here’s a typical security system scenario: It’s 7 a.m. and the building front doors automatically unlock; the intrusion system is automatically set to a “disarmed “state; the video surveillance continues to run, providing recorded events upon specific alerts, while the fire alarm system continues to monitor the entire building in the background.
At 7 p.m., the building perimeter locks down, the intrusion system sets to an “armed” state, and the surveillance system becomes more active using video analytics and perimeter detection.
The internal facilities department, the security department, and the security integrator have all been key in addressing this convergence. These days security integrators are successfully tying together BAS and physical security systems in project applications.
No longer is there a “wait and see” mentality with respect to these two worlds meeting. Efficient operation of building systems, reduction in energy consumption, lower operating costs, and improved life-cycle of utilities are now being written into project specifications.
A few proactive measures will help address some common integration missteps.
There are new and unique costs when deploying physical devices that enable this solution, as well as cost savings from integrating the various disparate entities.
Total systems convergence is easiest when designed into new construction projects. ROI from properly installed IoT sensors, switches, and rule-based analytics can occur in as little as six months.
Additional benefits related to fewer service tickets and truck rolls, sustainability, and environmental stewardship can also be realized, with detailed data to support them.
A second factor for a successful deployment is end-to-end ownership from a usability perspective, as well as yearly budget ownership. This solution is never “complete” once it is installed; in fact ROI is enhanced with each integration.
The largest challenge in deploying integrated security and BAS is understanding the various existing and/or modern technologies. Transitioning to newer technology is never easy, but today’s solutions are well tested and can significantly simplify the adoption process.
Looking for those that are “open source” in nature help interoperability. Open standards have enabled end-user convenience, efficiencies in services, lower utility costs, employee adoption and greater scalability.
In the building automation industry, the two major standard protocols — BACnet and LONWorks — allow for real-time, remote interface between systems and controls.
The security industry is notably slow to adopt open architecture, but most leading security equipment manufacturers are developing or have on their short-term roadmap an open architecture design.
With innovative technology and new system implementations, many are resistant to change. A good example is the IT director may not be aware of the functionality of the security system and will have legitimate concerns about placing specific data or processes on the network.
When there is a critical failure on the HVAC system, it may not be fully understood how that failure affects the security system. Creating a systematic and step-by-step approach to implementation and how each system works as a standalone unit will enable greater knowledge across the organization.
With all its benefits, it’s easy to see why building automation is the way of the future. And, it can be customized to meet clients’ specific needs, allowing efficient running of a business and property.
Building owners, facility managers, security directors and IT professionals see the value of converging potentially dozens of systems onto one network with a single control point. Security integrators and their customers both stand to capitalize.
Reposted from The ABC (Australia)
In a video posted by tourism organisation VisitFlanders, two "social media inspectors" wearing uniforms emblazoned with something like the Facebook logo approach people in the gallery to ask if they have social media accounts.
If they answer yes, the bemused tourists are steered away to non-nude paintings.
"It's for your own protection," the actors tell visitors as they block their view of a painting of Adam and Eve at the Rubens House Museum in Antwerp.
Most of the art lovers take the ban on paintings "focused on individual body parts such as abs, buttocks or cleavage" in good spirits, but one woman ushered away from the gallery protests by lifting up her shirt to show the security guard her own chest.
Rubens, famed for his paintings of voluptuous female nudes, is one of the most acclaimed painters of the baroque tradition.
But Facebook's policy of blocking advertisements that depict nudity meant that VisitFlanders' ads for the Rubens House Museum were treated in the same way as pornography.
The policy only applies to adverts, and the paintings are allowed to be uploaded as normal posts.
"Advertisers follow more extensive rules than regular users, because these messages are proactively pushed instead of you, as a user, for example, deliberately decide to follow the Facebook page of the Rubens House," a Facebook spokeswoman said.
VisitFlanders said it was in touch with the platform to seek to resolve the issue.
In 2016, Facebook reversed its decision to remove a famous Vietnam War photograph of a naked girl, Phan Thi Kim Phuc, running away after a napalm attack.
Reposted from CNN
What began with a quick grab-and-go theft Saturday at the San Antonio Aquarium -- the suspect leaving a trail of water drops as he hurried away with his dripping prize of a small but very much alive shark -- ended Monday with the safe return of "Miss Helen" to her tank at the aquarium.
The 16-inch female horn shark was taken during a heist that aquarium officials said was no spur-of-the-moment, let's-steal-a-shark thing.
"The suspects staked out the pool for more than an hour" to wait for the right moment, the aquarium said in a statement.
The search for the young female shark, known to aquarium staff as Miss Helen, led police Monday to the home of a man who maintains an extensive collection of marine life, according to the police chief of the San Antonio suburb where the aquarium is located.
"When we got into the garage and into the house it looked like almost a mock up of (the San Antonio Aquarium)," said Leon Valley Police Chief Joseph Salvaggio. "He knew very much what he was doing and kept that animal alive."
Surveillance video, which the aquarium posted on its Facebook page, caught the heist as it happened. Two men and a woman with a infant wandered through the facility with a baby stroller in tow. The trio is seen on the video hanging around the tank where visitors can feed the fish and reach in the water and pet various sea life.
One of the men quickly bends over and pulls something from the tank, using a net that aquarium officials said he'd brought with him. The man then disappears out of camera range with his male companion following him as the woman walks around with the baby.
"After grabbing the shark they entered into one of our filter rooms where they poured (a) bucket of bleach solution that employees used for the disinfection of tools into our cold water exhibit filtration system, causing harm to other wildlife," the aquarium statement said. The men put the shark in the bucket and stashed it on the stroller to make their getaway.
Fast-acting staff, realizing what had happened, were able to prevent the bleach from doing more damage.
And from there, the shark hunt was on.
"When we first got the call, we thought it was kind of a hoax, being that it was Shark Week last week," Police Chief Salvaggio, referring to the Discovery Channel's week of shark-related programming, told CNN affiliate KSAT.
On Monday night, police successfully rescued the shark and returned her to the aquarium. Staff applauded and cheered as Miss Helen made her homecoming.
Police don't believe the shark was taken to sell but to be added to the suspect's collection.
"It was something he wanted, he had one of these in the past," said Salvaggio. "He had one that passed away."
One man has been charged with theft and charges for two other individuals are pending, according to Salvaggio.
Miss Helen is now being held in quarantine as staff tests the water she was held in and acclimates her back into the aquarium environment.
"I'm so so happy that we got her back and she appears very healthy," Jamie Shank with the San Antonio Aquarium told KSAT as the shark arrived. "I can't believe what she's been through, she's a little fighter. She's a survivor."
Reposted from CTV News
Police are searching for a “bold” thief who stole an oil painting from a Calgary art gallery in the middle of the day.
Yves Trepanier, co-owner of the Trepanier Baer Gallery, said a well-dressed man came in and toured the gallery at around noon on Wednesday. He said the suspect spoke with several staff members who explained the exhibit to him and showed him around.
“It’s very bold,” Trepanier told CTV Calgary on Friday. “I mean this is broad daylight, this is over the lunch hour, this is three people talking to the person – the suspect – and he somehow managed to fool us.”
The gallery owner said they believe the suspect took the painting from the wall between 11:30 a.m. and 1:15 p.m. that day.
The small oil painting by Kingston, Ont. artist Mike Bayne was titled “TP, Headphones, Laptop, Brushes” and portrayed the artist’s workspace. Trepanier said the piece is worth $12,000.
“It was a small little intimate painting measuring four by six inches in black and white,” he said. “[It was an] absolutely wonderful little thing.”
Trepanier said he is shocked and disappointed they didn’t see the theft and intervene. He said staff called police as soon as they noticed the painting was missing.
The gallery also notified the Art Dealers Association of Canada so the organization could alert the art community, which includes sellers, appraisers, and auction houses.
“We're hoping it will be harder for this person to sell the painting if that’s the intent,” Trepanier said. “Selling artwork, stolen artwork, is not an easy thing to do.”
Trepanier said he gave the gallery’s surveillance video to police to help the investigation.
The gallery had insurance on the stolen painting and the artist has also been informed of the theft, Trepanier said.
Reposted from WLRN Miami - South Florida
The two men responsible for stealing a gold bar from a Key West treasure museum were sentenced Monday at the federal courthouse in Key West.
Richard Johnson received five years and three months in federal prison, while Jarred Goldman was ordered to serve three years and four months.
The two drove to Key West from Palm Beach County in August of 2010. Security video from the Mel Fisher Maritime Museum shows them both hanging around the museum near closing time and returning repeatedly to the museum's most popular exhibit — a gold bar in a clear case with a hole in front. Museum visitors were encouraged to reach in to touch and lift the gold bar, which came from the Santa Margarita, a Spanish treasure galleon that wrecked off the Keys in 1622.
Johnson and Goldman got away with the theft for more than seven years, until the FBI received an anonymous tip. They were indicted in January. Johnson pled guilty, while Goldman went to trial and was convicted in May.
Both men apologized in court Monday, to the museum and to the Key West community.
The pair was also ordered to pay $580,195.43 in restitution to the museum, which displays treasure and other historical artifacts from the days of sailing trade between Europe and the Americas.
The museum was founded by treasure hunter Mel Fisher, who was famous for discovering the mother lode of Nuestra Señora de Atocha, the treasure galleon that also sank in the 1622 hurricane.
While the insurance company paid the museum about $100,000 for the loss of the gold bar, the museum's executive director insisted in court Monday that it was worth far more — if not priceless.
Melissa Kendrick said establishing a fair market value for the bar by comparing it to sales of other shipwreck gold wasn't fair.
"Those bars do not have a pedigree that the bar stolen from the museum had. Those bars were ordinary shipwreck bars," she said. "This bar was iconic."
The "lift-a-gold-bar" exhibit was the museum's centerpiece, and featured heavily in their marketing.
"Probably about 3 to 4 million people lifted that bar," Kendrick said. "Even if you have the insurance money for it, you can't replace it. There's not another."
The defense attorneys argued that the bar's historic value was included in the comparable sales and insurance payout.
But Kendrick said the bar was worth more than the value of the gold.
"The cultural community doesn't value a Rembrandt for the cost of the canvas and the paint," she said.
U.S. District Court Judge Jose E. Martinez appeared to agree, setting the value at $556,000 and ordering the restitution — even as he doubted whether it would ever be paid.
"That's a bad crime. It's not like they stole a tank full of gasoline," he said. "It resulted in the destruction of an artifact that was priceless — I really believe it was priceless."
Martinez compared the value of the stolen and destroyed gold bar to Magna Carta, the document from 1215 that established rights of different parts of English society.
"It's worth, what, 12 cents in scrap paper?" Martinez said. "But it's not."
Reposted from CBC Radio
When London bookseller Pom Harrington bought a rare edition of Issac Newton's Principia from a Pittsburgh dealer, he assumed everything was on the up-and-up.
Then he learned the copy of Philosophiae Naturalis Principia Mathematica — valued at $900,000 US — was one of hundreds of items allegedly stolen from the Carnegie Library of Pittsburgh as part of what police say was a 20-year, $8-million heist.
"To be honest, I still don't really believe it," Harrington, who runs the Peter Harrington rare bookshop in London, told As It Happens guest host Laura Lynch. "It really is a complete shock."
John Schulman, 54, the antique bookseller who sold Harrington the book, and Gregory Priore, 61, an archivist at Carnegie Library, have been charged with theft, conspiracy, forgery and receiving stolen property in connection with hundreds of missing books, photographs, illustrations and maps.
Harrington said he's had a long and fruitful business relationship with Schulman, who he described as a trusted and well-known seller.
"He's been trading books for many years. We've been going to American books shows and buying books from him, as we all do," Harrington said.
"You know, he's a very good book dealer."
Lawyers for Schulman and Priore did not return messages from the Associated Press seeking comment.
Robert G. Del Greco Jr., who represents Schulman, told the Washington Post in an emailed statement: "The complaint sets forth serious allegations, and we are treating them as such."
Police allege Priore spent years snatching valuable items from the library and dropping them off down the street at Schulman's Caliban Book Store, one block away.
The alleged scheme started unraveling last year when appraisers began a routine audit commissioned by the library and discovered that items were missing or damaged since the last audit in 1991.
Researchers found more than 300 items damaged or missing, a loss estimated at $8 million US.
The library locked down the room, and appraisers quickly began finding missing items for sale online, as well as items that had been sold or advertised by Caliban Book Store.
In June 2017, library officials contacted authorities and fired Priore.
In a statement, library officials said they were "deeply disappointed that at the center of this case are two people who had close, long-standing relationships with the library."
Detectives say efforts to recover the items have netted books, plates and maps estimated at a value of $1.1 million US.
Some were found during a search last year of Schulman's book warehouse, detectives said.
By the time Harrington learned the copy of Principia was allegedly ill-gotten, he'd already sold to a third party.
"Fortunately, the book was not far away," he said.
"We obviously got the book back from the collector and refunded them, and we managed to repatriate the book back to the library."
Ellen Dunlap, president of the American Antiquarian Society, said institutions, booksellers and collectors likely are going through their records to determine whether they bought or resold anything from Caliban Book Store.
"I can assure you if anybody bought anything from Caliban, they're seeing these headlines and saying, 'Uh oh, I'm looking at my books right now,"' Dunlap said.
That said, Harrington said theft in the rare book world is extremely uncommon.
Any time a book is flagged as stolen, it's recorded in a database run by the International League of Antiquarian Booksellers.
"It's almost impossible to sell stolen books once they're known to be stolen, so it's not actually a huge problem, fortunately," he said.
"But every now and again, things will go wrong."
Reposted from The Art Loss Register
Following the success of The Watch Register, we are delighted to announce the launch of The Gun Loss Register. This newly-developed due diligence service is to support the gun trade, insurers and police by providing a centralized international database of stolen guns to increase chances of their recovery, and to deter theft.
For over 25 years, the Art Loss Register has recorded more than 5,000 stolen guns, from Purdey’s, Holland & Holland and Westley Richards rifles, to flintlock pistols and 17th century antique firearms.
Simon West OBE, incoming director of the UK-based Gun Trade Association, said: “The GTA strongly endorses The Gun Loss Register. We see it as a vital contribution to the international battle against the trade in stolen guns. It will provide significant deterrence against theft itself and allow the trade and private purchasers to check the Register and buy with confidence".
Learn More
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us