Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

News


  • April 30, 2018 12:24 PM | Anonymous

    Reposted from the Art Newspaper

    A museum in southern France has handed more than half the works in its collection over to police investigators after experts said they are fakes. The Musée Terrus in the village of Elne, near Perpignan, which is dedicated to the local painter Étienne Terrus, who was friends with Henri Matisse and the sculptor Aristide Maillol, reopened after renovation on 27 April. But around 80 of the 140 works owned by the municipal museum are now believed to be falsely attributed to Terrus or outright forgeries, the mayor of Elne, Yves Barniol, revealed at the opening. The discovery represents “a catastrophe for the municipality”, he told local press.

    An art historian charged with revamping the displays to incorporate the museum’s recent acquisitions, Eric Forcada, raised the alarm last August after examining photographs of the works. The local authorities sought a second opinion from a committee of experts, who judged that 82 works acquired over a 20-year period—a mixture of gifts from the museum’s friends associations and a private collector and purchases by the administration—are fake. The specialists noted glaring inconsistencies, such as views of buildings that did not exist before Terrus’s death in 1922 and supports that the artist did not use. The damages are estimated at €160,000.

    Elne town council filed an official complaint for forgery, fraud and possession of stolen goods against “X”—persons unknown—in early April. Perpignan police have seized the works in question and opened an investigation into their provenance. “We will not give up,” the mayor said, pledging to uncover all the documents that “will allow us to trace the forgers”. Denouncing regional art dealers and auction houses as “corrupt”, Forcada told L’Indépendant newspaper that the case “will, at least, raise a greater awareness to protect the work of [local] artists”.

    See Original Post

  • April 30, 2018 12:22 PM | Anonymous

    Reposted from the Art Newspaper

    Scotland Yard is working with the British Museum and the governments of Egypt and Sudan to tackle the looting of pharaonic antiquities. The plan is to create a publicly available database of 80,000 objects that have been identified as having passed through the trade or have been in private collections since 1970, the year of the Unesco convention on cultural property. The scheme is being funded with a £1m grant from the British government’s Cultural Protection Fund, administered by the British Council.

    Although the presence of antiquities on the database will not mean that they are either clean or tainted, it will assist enforcement officers and police in tracking down provenance. The database will also include some objects that are known to have gone missing from Egypt or Sudan but still remain untraced. However, the fuller records of losses held by the antiquities authorities in Egypt and Sudan are treated as confidential; the two governments only release details selectively.

    The project is being overseen by Neal Spencer, the British Museum’s keeper of Ancient Egypt and Sudan, who has seen “a serious increase in the illicit trade in pharaonic antiquities in recent years”. He says the new database should “help flag up objects where there are issues”. It will also be possible to identify suspicious patterns: “One might notice an increase in funerary material of the 25th dynasty from a particular site, and enforcement agencies would be very interested in that.”

    While Scotland Yard—the headquarters of London’s Metropolitan Police—is not directly involved in creating the database, it is giving advice and is one of the three key partners, along with Egypt’s ministry of antiquities and Sudan’s National Corporation for Antiquities and Museums.

    At present, the available documentation is widely dispersed and not readily accessible or searchable. Many of the most important objects have passed through auction houses but their catalogues are only available online from the late 1990s. No libraries in Cairo or Khartoum have comprehensive collections of earlier paper catalogues. The major auctioneers—Sotheby’s, Christie’s and Bonhams—have agreed to provide data for the initiative. Antiquities dealers are also being approached to supply catalogues and possibly unpublished inventory material. Exhibition catalogues recording objects in private hands will be used as well.

    The first tranche of data is due to go online at the end of this year, with the remainder expected to follow in 2019. Very minor objects, such as a single scarab or bead, will not be included. Eventually it is hoped to expand the database to include pre-1970 information.

    Marcel Marée, the British Museum curator running the project, stresses that they “will not be proactively chasing criminals, which is the role of law enforcement agencies, but we will make the market more transparent”.

    The scheme will also help train Egyptian and Sudanese antiquities staff to deal with the international market and track down illicitly exported items. A dozen trainees are due to come to the British Museum, with the first group arriving in July. If the project proves a success, it could be used as a model for other parts of the world suffering from looting.

    The “circulating artifacts” database, as it is known, will be searchable on the web without charge. Although its primary purpose is to help law enforcement, it should also prove to be an invaluable resource for scholars.

    See Original Post

  • April 30, 2018 12:18 PM | Anonymous

    Reposted from CIO Dive

    Users resist change.

    Despite increasing requirements for more complex and secure passwords, "123456," "password," "letmein" and "trustno1" continue to take home the trophies for most-used passwords year after year.

    Even with clever tactics, such as replacing an "o" with "0" or a "s" with a "$," security practices need a makeover for users to avoid having one of the billions of passwords that will be compromised this year.

    Since password hygiene can always use improvement, take a leaf or two from the books of seven security pros:

    1. Russell Schrader, executive director at the National Cyber Security Alliance:

    Schrader has been in the privacy and cybersecurity space for more than two decades and sticks to a password manager, VPN and passphrases to make the process easier and more secure.

    Passphrases, such as "Mary had a little lamb," can make passwords easy to remember across accounts and add length, though Schrader said he does not actually use nursery rhymes as a pass phrase.

    In most cases hackers are going for the easily compromised targets, so "you don't have to outrun the bear, you just have to outrun the other guy," he said. Putting loads of sensitive information on Facebook, such as a favorite ice cream flavor, school mascot or first car, can all make you an easy target.

    2. Michelle Dennedy​​, chief privacy officer at Cisco: 

    "I would love to tell you that I am always well behaved," Dennedy said. But mantras can help with password management: Keep your passwords "exotic, keep them to yourself — do not share — and change them from time to time."

    Requiring too frequent of changes adds complexity, which stops people from introducing more secure passwords.

    "There are ways of doing memorable, good password management," Dennedy said. "It's not the end all be all, but it's what we go right now, so have good ones."

    3. Chris Babel, chief executive officer at TrustArc:

    When it comes to the internet, you can't trust anything, and Babel makes sure he uses a different password for every single site, though there is a method to the madness.

    Babel uses a password management tool, but for times when its not working or not available on a device he uses a personal nomenclature that combines a "crazy, complex thing" standard across sites with something unique to each site based on a mental algorithm.

    "I'm a password nerd," said Babel. "I was a security guy for 11 years."

    4. Tammy Moskites, managing director at Accenture Security:

    Former CISO of The Home Depot and Time Warner Cable, Moskites has had an extensive career in security, starting out in the actuarial trenches and moving up through the security organization.

    For her passwords, Moskites uses a "weird algorithm," which uses multiple languages. "Each word is a different language, even though half the time I don't what it says and I have to go to Google to figure out what those words are," Moskites said.

    But the days of the passwords are going to change, said Moskites. "Eventually down the road it will go into a persona, where [a system] will learn a little bit more about me specifically and my habits and be able to identity me that way."

    5. Andrew Jones, lead solutions engineer at Shape Security:

    To maintain consistency across platforms, Jones relies on a password manager set to 15 character, alphanumeric passwords with plenty of special characters. The password manager can autogenerate a new one for each site, though problems can arise for users of such tools if they don't have mobile app integration.

    But no matter the amount of security that is injected, even the most savvy professionals can still be vulnerable.

    "If you're doing something on the fly really quick, even for me it's really hard to not fall back to a standard password just as a short-term fix to log in to the create the account," said Jones. Avoiding doing this altogether is the best case scenario, but if not, at least remembering to go back and change the password to something more secure is vital.

    6. Adam Bacchus, director of program operations at HackerOne:

    Bacchus admits that for some sites of low importance without significant PII, shorter, easier passwords can be fine. The problem arises, however, when users carry these practices to other platforms.

    Email is the "keys to the kingdom" — the platform used to reset passwords for every other account, so Bacchus makes sure to keep his locked down with a long password and two-factor authentication. 

    7. Jenny Menna, SVP of Security Intelligence, Engagement and Awareness at U.S. Bank:

    After switching from a career in government to the private sector, Menna has advised customers and clients to not use the same passwords across multiple systems in case one is compromised, which is considered a best practice in cybersecurity.

    While the industry is hoping to move beyond passwords — "because they're inherently a pain in the butt and insecure" — users simply have to employ complex, unique passwords.

    Password hygiene is all about "doing your best because so many people aren't," Menna said. Malicious actors are "going to go after the easiest target because there are so many easy targets, whether it's a company or individuals, unless you are particularly juicy."

    See Original Post

  • April 30, 2018 12:13 PM | Anonymous

    Reposted from Campus Safety Magazine

    The latest string of school shootings, most notably the Feb. 14 shooting at Marjory Stoneman Douglas High School in Parkland, Fla., have reignited national conversation on gun access and gun violence. Such incidents on any campus — K-12 or higher education — raise questions for all institutions as to how they prepare for the unexpected and work to prevent incidents.

    Thankfully, some of the most familiar aspects of Clery Act requirements create structures for campus crime response, including alerting members of the campus community if there are any immediate or ongoing threats. Think about the update on your institution’s homepage warning of a string of robberies or the emails informing community members that a suspect for an aggravated assault on campus has been identified but not yet apprehended. Without the Clery Act, messages like these might not be sent at all. The Clery Act requires institutions to alert their campuses by issuing a timely warning if a Clery-specific crime occurring within Clery-specific geography poses a serious or ongoing threat to the campus community. Clery crimes include homicide, aggravated assault and weapons law violations, among other things.

    The act also requires institutions to issue emergency notifications when an emergency threatening the health and safety of the campus community occurs on campus. Emergencies can range from a chemical spill in the science lab to an unexpected tornado to an active shooter.

    As commonplace as they might seem now, emergency notifications were not a Clery Act requirement until 2008. The deadly shooting at Virginia Tech in April 2007 forced a conversation on whether or not the Clery Act timely warning requirement provided enough of a mechanism to warn the campus about immediate emergencies like an active shooter incident. Today, U.S. colleges and universities are required to assess whether or not there is a significant emergency or dangerous situation that warrants a notification to the campus community.

    Campuses sometimes struggle with communicating the intention of timely warnings and emergency notifications and the distinctions between their uses. Many campuses do not want to water down the significance of such warnings by over-issuing them but also want to make sure their campus is aware of any potential risk that might impact their overall well-being.

    Because national incidents often lead to questions and concerns from your own campus community, consider revisiting or publicizing your own timely warning or emergency notification policies. Here are some suggestions for Clery team tasks:

    1. Review your timely warning and emergency notification policies for compliance. 
    2. Create a one-page document that describes the function of timely warnings and emergency notifications and how campus community members will receive necessary information in an emergency.
    3. Film a short video or launch an awareness campaign explaining the difference between timely warnings and emergency notifications and how to sign up for your institution’s alerts (if you have an opt-in system).
    4. Organize a working group to examine current timely warning practices (method of issuing alerts, language in alerts) to determine possible policy or practice changes, if needed.
    5. Organize a test (drill or exercise) of your emergency response and evacuation procedures as required by the Clery Act. Coordinate with local first responders.

    Clery alerting measures are a crucial tool in promoting a culture of transparency and support on a college campus. Without them, community members would not know about patterns of crime, situations to avoid or be aware of, or how to be a vigilant community member working to ensure the safety and well-being of fellow community members. Alerting requirements under the Clery Act create an assurance that we often forget was not always part of the college experience.

    Colleges and universities will best serve their campus communities through utilizing these types of alerts, when appropriate, and through direct education as to when and why each alert is employed. Engaging in such action ensures a balance between protecting the rights of students and honoring transparency as well as promoting the importance of the overall well-being of the campus community.

    See Original Post

  • April 24, 2018 4:50 PM | Anonymous
    Reposted from ArtNet

    Each year, art thefts account for around four to six billion dollars of losses worldwide. Due to the magnitude of the problem, the International Criminal Police Organization, commonly known as Interpol, continually collects data about the many art thefts and recoveries. With 192 member countries, the international police organization catalogs around 50,000 stolen works of art.

    Using Interpol’s wealth of data, a recent analysis by Element Paints has taken up five major questions surrounding the global crisis surrounding where art is stolen from, what is stolen, and where the work most often ends up.

    It is perhaps not totally surprising that the countries that most often fall victim to art thefts are war-torn countries like Iraq and Syria. But right behind them, the seven largest hubs for art thievery are all in Europe. Most shockingly of all, the vast majority of stolen artworks from all around the world end up in Europe as well, with paintings, sculptures, and religious items being the most sought after.

    According to Interpol’s data, artworks are most often recovered in Paris, but the second most common city of retrieval is a little known Serbian city called Arandelovac, which slightly exceeds the recoveries of artworks in London. The Serbian city’s geography makes it a convenient hub on the trail between the Middle East and Europe.

    Interestingly, the vast majority of stolen works date from the 20th century, and are not taken from museums or places of worship as often as from private homes by breaking and entering.

    The data from Interpol, which has been working on countering cultural property theft since 1947, considers all artworks including archaeological pieces, antiquarian books, antique furniture, coins, weapons and firearms, and ancient gold and silverware. Element Paints’s analysis considered 4612 unique records of art theft dated from 1991 to 2017 and excluded firearms in their methodology. Below are graphic breakdowns for five of Element Paints’s findings. To see the full art theft report, visit their website.

    See Original Post

  • April 24, 2018 4:43 PM | Anonymous

    Reposted from FBI.gov

    Nearly 30 years after an elderly New York couple’s 1911 painting by Marc Chagall was stolen from their Manhattan home, the modernist oil-on-canvas work is being returned to the family’s estate.

    The painting, entitled Othello and Desdemona, was recovered last year after a Maryland man contacted the FBI’s Washington Field Office. The man’s repeated efforts to consign the painting had been rebuffed by a Washington, D.C., gallery owner who was suspicious about the lack of paperwork supporting the painting’s authenticity and provenance. The gallery owner suggested the man call law enforcement, which is how it became an FBI investigation.

    “We took the case from there,” said Special Agent Marc Hess, one of a handful of FBI investigators on the Bureau’s specialized Art Crime Team. Hess said the investigation led to the man’s home in Maryland, where he had stored the painting in his attic for years in a custom box he crafted out of a door jamb and plywood. Hand-scrawled on the top of box were the words “Misc. High School artwork.”

    According to court documents, the Maryland man had obtained the painting in the late 1980s or early 1990s from the man who stole the Chagall in New York in 1988. The thief, it turned out, was a worker in the Upper East Side building where Ernest and Rose Heller lived in an apartment surrounded by paintings and sculptures by renowned artists like Renoir, Picasso, Hopper, and Chagall. Several other works of art also disappeared in the heist.

    “It was an inside job,” Hess said. “A person who had regular access to the building was stealing from apartments while the tenants were away.”

    Shortly afterward, the thief met with the Maryland man in Virginia to try to sell the painting, court documents show. The Maryland man found a potential buyer, but the deal collapsed when he learned he wasn’t going to receive a cut of the proceeds. The Maryland man kept possession of the painting and stashed it in his attic for years. He brought it out in 2011—and again in January 2017—in his fruitless appeals to the D.C. gallery owner to exhibit and try to sell the stolen art.

    “Well documented and known art is very hard to move once it has been stolen,” said Supervisory Special Agent Tim Carpenter of the FBI’s Art Crime Team. “Gallery owners are our first line of defense in identifying pieces of art that do not have the appropriate documentation and should be brought to the attention of law enforcement.”

    The Hellers, who bought the painting in the 1920s, have both passed away. The artwork, which shows Shakespeare’s titular Othello holding a sword and looking at his bride, Desdemona, lying on a bed, was painted by Chagall when the Belarusian painter lived in Paris. In 1967, the Hellers’ painting was on exhibit at the Kunsthaus Zurich in Geneva, Switzerland.

    “They went on vacation back in 1988,” Hess said. “They returned, and this work of art—along with several others—was missing.”

    The statute of limitations for the theft has expired, so no charges are pending against the individual who initially stole the painting, nor the individual who kept it. The Maryland man is not named in court filings. The suspected thief in the case was convicted in federal court and served time on charges related to selling stolen property, including art from other apartment buildings.

    “The investigation into the other missing paintings continues,” Hess said. The Chagall painting, which until recently was still stored in the makeshift wooden box, will be returned to the Hellers’ estate, which plans to place it on auction. Proceeds will reimburse the insurance company that paid the theft claim years ago and be directed to several non-profit organizations supported by the estate, including an artists’ colony in New Hampshire.

    “As the FBI returns this painting to the estate of its proper owners, we do so with the purpose of preserving history,” said Washington Field Office Assistant Director in Charge Nancy McNamara. “This piece of artwork is of significance not just for its monetary value, but for its place in the world of art and culture. The FBI continues to commit investigative resources to recover cultural property.”

    See Original Post

  • April 24, 2018 4:37 PM | Anonymous

    Reposted from aus.com

    The first cellphone was developed in 1973 by Motorola Researcher, Martin Cooper. Heavy and clunky, that first device was a far cry from the sleek, versatile mobile phones of today. Since Cooper’s invention, companies have competed to produce more portable technology and offer better connectivity. And they have largely succeeded. In fact, as a result, worldwide today, 2.53 billion people own smartphones. According to a Pew Research study, 95 percent of Americans own a cellphone of some kind, with 77 percent of the devices qualifying as "smart." With smartphone use at an all-time high, it’s time to examine the myriad ways the device can aid disaster preparation, survival and recovery.

    Smartphones in Disaster Preparation

    • Outfit your smartphone for disaster. Before an emergency hits, prepare your phone by investing in a waterproof case, backup batteries, a portable charger, a signal booster and a backup cellphone that uses AA or long-lasting batteries. Try not to let your smartphone battery dip below half a charge. Several firms are developing solar and hand-crank cellphone chargers, which could come in handy. Research options before you need them.
    • Store useful information. In the likely event a disaster affects cell service, you may not have access to the internet during an emergency. That’s why it’s important to make sure your contact information is up to date. Check emergency numbers. Save contact information for your local police and fire departments, as well as utility companies. This could come in handy if you need to report service or power outages following an emergency.
    • Create a private group-list of emergency contacts. Assuming phone service is available and your smartphone is sufficiently charged, you should be able to create a single text message to a group to let them know your status following a disaster.
    • Consider downloading Twitter, even if you do not have an account. Assuming cell towers are providing power to your region following an emergency, downloading the Twitter app will enable you to stay up to date, as the social network is an important vehicle for sharing information before, during and after a disaster. You do not need to set up a profile to receive Twitter updates.
    • Bookmark useful mobile sites and download relevant apps. While internet access is available, take advantage of mobile websites such as the National Oceanic & Atmospheric Administration (NOAA), Centers for Disease Control & Prevention (CDC), and Department of Homeland Security/ FEMA. Bookmarking the sites and downloading associated apps will give you access to data that was on your screen the last time you had internet access. So, in the event of an emergency that disables Wi-Fi and data service, you will be able to review cached (stored) information if your cellphone has power. Also, make sure you have downloaded apps that provide wireless emergency alerts. Great examples include American Red Cross, Emergency Alerts, FEMA, and Disaster Alert.
    • Load Your Health Care App, ICE. In an emergency, you may need medical assistance. So, long before you have need of it, load medications’ list, blood type and allergies onto your smartphone for first responders to access. The ICE app is available on iTunes as well as Google Play.

    How Smartphones Can Help You During a Disaster

    If you follow the handy hints above, you should have access to your cellphone’s cached pages once a disaster occurs. Remember, the rule of thumb during emergencies is to rely on mobile phones only for emergencies. In other words, call family and friends to check in. But leave channels open for first responders. This is also important since it could take time for power to be restored.

    We hope you have assembled a Go Bag. But if you didn’t put together an emergency kit prior to the disaster, you can use several of your phone’s tools in place of common supplies:

    • Flashlight
    • Compass (GPS) to help locate family members
    • Radio (if your phone is charged and cell service is available)
    • Images of important documents
    • Contact lists of family and close friends, who may need to be notified
    • Maps of the area can be cached on your phone
    • Screenshots of survival guide, tips and first aid instructions for access, even if data and Wi-Fi are down.

    Use Your Smartphone for Disaster Recovery

    Incorporating the latest technology into your disaster preparedness plans will help mobilize recovery efforts. The most obvious benefit of mobile devices is in providing the ability to communicate from most locations around the country and around the world. As mentioned in a recent blog on "Scientific American", even when a clear phone signal is not available, texting could be a viable option for communicating with family and friends or emergency personnel.

    About Our Training System

    Another way to make sure you are ready to handle disasters of any kind is through the Allied Universal Fire Life Safety Services Training System. Our interactive, building-specific e-learning program helps commercial, residential, educational, institutional, government, retail and industrial buildings with compliance to fire life safety codes and rewards building occupants instantly! It’s a convenient and affordable solution to the training needs of your facility.

    See Original Post

  • April 24, 2018 4:33 PM | Anonymous

    Reposted from St.GeorgeNews.com

    After a child threw a ball at a fire sprinkler in the St. George Children’s Museum, water rained from the ceiling and caused thousands of dollars in damage Monday.

    The “very zealous young guest” knocked the cage off the sprinkler head, which caused water to flood the basketball room in the lower floor of the St. George Children’s Museum on Main Street, Executive Director Marnie Workman said. The fire alarms were also triggered throughout the building and other guests in the building were evacuated.

    The St. George Fire Department arrived, switched off the valves and reset the alarms as workers removed benches and other exhibit items from the room.

    “And now cleanup begins, which will be quite a feat” Workman said. “We’ve got a lot of water to suck up, and all the floor tiles to remove and carpets to dry and everything to reassemble.”

    It will take a lot of time to repair, she said.

    “This hasn’t happened for a couple of years, so we’re ready for another adventure,” Workman said.

    See Original Post

  • April 24, 2018 4:28 PM | Anonymous

    Reposted from the Washington Post

    A former volunteer at a small Missouri museum has been charged with stealing thousands of dollars’ worth of Civil War and World War I artifacts.

    A warrant was issued Monday for the arrest of 38-year-old Terry Cockrell, a 2010 Sedalia mayoral candidate who volunteered for eight years at the Pettis County Museum before moving last fall to Coffeyville, Kansas. He’s charged with two felony counts of stealing $750 or more. No attorney is listed for him in online court records.

    Police say some of the items missing from the museum, including a surgical kit, firearms and a sword, were tracked to a Tennessee collector, who bought them last summer without realizing they were stolen. Museum co-curator Charles Wise says display cases had been rearranged to conceal the thefts, which weren’t reported until last month, The Sedalia Democrat reports.

    Sedalia police Det. Jill Green said in the probable cause statement that Cockrell falsely told the collector that he received the items as a gift from a neighbor who gave them in return for a favor. Green said Cockrell was tied to the theft by a form he signed that stated he was the true owner of the sword and had obtained it legitimately.

    Green said Cockrell initially said he had been given the artifacts by someone who died 20 years ago but later admitted to removing them from display case. The collector is helping to return as many of the items as possible after re-selling some of the antiques to buyers in other states. A revolver and a World War I era flare pistol also were reported stolen but weren’t sold to the collector.

    The Pettis County Historical Society, which operates the museum, is now considering new measures to prevent future thefts. Wise said that the museum didn’t regularly check its inventory in the past and fully trusted its volunteers.

    See Original Post

  • April 24, 2018 4:20 PM | Anonymous

    Security and management practitioner, advisor and educator Dennis Shepp, MBA, CPP, CFE, PCI, CPOI has been elected as the Chairman of the Board of Directors.

    The International Foundation for Protection Officers today announced that Mr. Dennis Shepp has been elected as Chairman of the Board of Directors. He replaces Mr. Rick Daniels, MA (Criminology), CPP, CFE who has stepped down from the position of Chairman but has agreed to continue to serve as an IFPO Board Member.

    Mr. Shepp has extensive experience with large training organizations, colleges and universities with the implementation of accredited training, a corporate university concept and professional development programs with professional certifications. He recently was the professional development advisor for a major international energy company based in the Middle East, managing a complete curriculum re-engineering project. Dennis has been a member of teaching faculty for colleges and universities, working with internationally recognized accreditation programs and security training curriculum development. Dennis joined ASIS International in 1983 as a pioneering member of the first chapter in Canada, Edmonton 156. He has been an avid volunteer at the chapter, regional and international levels and represented ASIS HQ as faculty on various educational programs.

    Dennis has over 35-years’ experience as a security management practitioner in the Middle East and North America. Dennis has an MBA from Royal Roads University, is a Life Member CPP and CFE. Former Chairman Mr. Rick Daniels comments, “It has been a privilege to serve as IFPO Chairman for so many years. Now, as we move forward with new growth initiatives and revisions/expansions to our texts and training materials, fresh new leadership at the top is more important than ever. I can think of few people in our industry as qualified as Dennis Shepp to take on the IFPO Chairman role. Dennis has been my friend for close to three decades. He is a thoughtful, energetic and dynamic personality. I look forward to working with Dennis, Sandi, the Board and IFPO Supporters around the globe in the coming years. These will be exciting times.”


  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved