INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from EHS Today
On April 3, 2018, 38-year-old Nasim Najafi Aghdam entered YouTube’s headquarters with a semi-automatic pistol and began shooting company employees. The act of workplace violence at the video sharing company’s San Bruno, Calif., office was only one of many incidents that have caused widespread media attention and discussions about what companies can do to protect their workers from active shooting situations.
“Given the current landscape of the workforce, a company’s ability to focus on an active shooter or workplace violence incident is absolutely paramount,” says Juliette Kayyem, CEO of Zemcar. “Moving forward, leading organizations need to ensure the safety of employees by bringing these policies into the workplace and putting them into practice, much like how fire drills are already a regular event for employees.”
While workplace violence statistics often are underreported, the numbers that are available only demonstrate that it is far more prevalent. The most recent data available estimates that more than 2 million people are victims of a workplace violence incident each year. The FBI states that 80 percent of all active shooting incidents happen on the job. However, many employers still remain unprepared. EHS professionals and employers can create a secure workplace through training workers to recognize the signs of a disgruntled employee as well as having a solid emergency response plan in place should an act of violence occur.
The most common types of workplace violence vary by industry, but can be broken down into four parts (See “Types of Workplace Violence”). The FBI provides detailed information about the different occurrences on its website and published resources.
The U.S. workforce spends on average about one-third of their life in the workplace, according to numerous studies. So, knowing your coworkers and surroundings is crucial to preventing a workplace violence incident.
“Employees typically know when something is ‘off’,” says Vic Merjanian, founder and CEO of Titan HST. “Common warning signs in individuals are increased aggression, harassment towards customers or employees, concealment of a weapon and interpersonal conduct that doesn’t fit the setting.” It is also important to be wary of biases an individual may possess and to ensure that the perceived threat is based on objective criteria, he adds. Workplace safety is ever evolving, and communicating threats as well active situations is key to sending workers home safe every day.
A survey conducted by Rave Mobile Safety shows the need for effective communication in workplace violence incidents. More than half of Millennial respondents (53%) said they were unaware of their company’s emergency plans or that their employer had no plan in place. Only 34% of respondents aged 45 and older indicated the same.
In addition, the survey discovered that only half of those 45 and older were “very likely” to report an issue when it comes to worker safety, and just 8% of Millennials surveyed said the same. Facilitating the right communications methods is an essential step.
“Initiating quick, direct and informative communication is essential,” Merjanian says. “Being able to share what the threat looks like, where the threat is located and any other pertinent details is always helpful to emergency responders.”
When it comes to technology, employers should ensure workers have proper cellular access and Wi-Fi connection to facilitate calls should an emergency occur. Emergency applications can be downloaded on smartphones to communicate more directly across the employee network, notify emergency responders and download lifesaving resources such as CPR and first aid instructions.
When it comes to protecting both the workplace and employees, installing security cameras in vulnerable building access points such as loading docks, shipping and receiving entrances, parking garages, or main entrances can deter criminal activity, says Amy Harper, senior director of workplace strategy and consulting operations at the National Safety Council (NSC). Harper adds that employers have recognized the need to address workplace violence and set up policies to address this through employee training, conducting mock training exercises, adopting a zero-tolerance policy toward workplace violence and creating an emergency action plan.
Emergency response plans should be clear and direct with how workers should react or handle a situation. These plans should include proper procedures for assessing, documenting and acting on potential threats, Merjanian says.
“Unfortunately, we find that many workplaces do not have any plans in place, or have plans that are very outdated and do not address the threats that employees may encounter in today’s workplace,” he says.
When it comes to documentation, companies should have written protocols for terminations and demotions/job changes of workers that identify potential security and employee safety concerns in order to mitigate those, Harper says.
Security badges as well as badge-based permissions should be made available to ensure only approved workers are able to access the facility or any restricted areas.
“Contractor management programs help account for any non-employee presence onsite and having protocols for contractors to “check in” upon arrival ensures they are expected and have approval to provide services,” Harper says. When a threat or incident occurs, a structured response needs to take place in order to keep workers safe.
“Once a threat is identified, the question becomes — do we contain the threat, assuming we can, or do we advise employees and customers to initiate a lockdown?” Merjanian says. The first step workers should take is to immediately contact security or law enforcement. Then, employees can move coworkers, themselves, and any potential customers in to a safer place if they are able to, he says.
“It is generally not advisable to approach the threat,” Merjanian says. “If you do see a weapon and decide the only option is to approach the threat, the employee must make sure to commit to their actions and not hesitate.”
In an active situation, the best advice is to stay calm and exercise one of three options: run, hide or fight, Harper says (See “Run, Hide, Fight”).
“Some people commit violence because of revenge, robbery or ideology – with or without a component of mental illness,” Harper says. “There is no way of knowing when an attack is imminent. So it’s important to be vigilant and alert, and to have prepared ahead of time, being sure to train employees on appropriate responses.”
_____________________________
TYPE 1: Violent acts by criminals who have no other connection with the workplace other than to enter to commit robbery or another crime.
Type 1 violence by criminals otherwise unconnected to the workplace accounts for the vast majority—nearly 80% —of workplace homicides. In these incidents, the motive is usually theft, and in a great many cases, the criminal is carrying a gun or other weapon, increasing the likelihood that the victim will be killed or seriously wounded. This type of violence falls heavily in industries where workers’ jobs make them vulnerable: taxi drivers such as late-night retail or gas station clerks, and others who are on duty at night, who work in isolation.
TYPE 2: Violence directed at employees by customers, clients, patients, students, inmates, or any others for whom an organization provides services.
Type 2 cases typically involve assaults on a worker by a customer, patient or someone else receiving a service. In general, the violent acts occur as workers are performing their normal tasks. In some occupations, dealing with dangerous people is inherent in the job, as in the case of a police officer, correctional officer, security guard, or mental health worker. For other occupations, violent reactions by a customer or client are unpredictable, triggered by an argument, anger at the quality of service or denial of service, delays, or some other precipitating event.
TYPE 3: Violence against coworkers, supervisors, or managers by a present or former worker.
TYPE 4: Violence committed in the workplace by someone who doesn’t work there, but has a personal relationship with an employee—an abusive spouse or domestic partner.
Type 3 and Type 4 violence comprise of incidents involving violence by past or present employees and acts committed by domestic abusers or arising from other personal relationships that follow a worker into their place of employment. Violence in these categories is no less or more dangerous or damaging than any other violent act. When the violence comes from a worker or someone close to that worker, there is a much greater chance that some warning sign will have reached the employer in the form of observable behavior.
Source: U.S. Department of Justice, Federal Bureau of Investigation
RUN—If there is an accessible escape path, attempt to evacuate the premises. Be sure to: • Have an escape route and plan in mind • Evacuate regardless of whether others agree to follow • Leave your belongings behind • Help others escape, if possible • Prevent individuals from entering an area where the active shooter may be • Keep your hands visible • Follow the instructions of any police officers • Do not attempt to move wounded people • Call 911 when you are safe
HIDE—If evacuation is not possible, find a place to hide where the active shooter is less likely to find you. Your hiding place should: • Be out of the active shooter’s view • Provide protection if shots are fired in your direction (i.e., an office with a closed and locked door) • Not trap you or restrict your options for movement
To prevent an active shooter from entering your hiding place: • Lock the door • Blockade the door with heavy furniture is nearby: • Silence your cell phone and/or pager • Turn off any source of noise (i.e., radios, televisions) • Hide behind large items (i.e., cabinets, desks) • Remain quiet
If evacuation and hiding out are not possible: • Remain calm • Dial 911, if possible, to alert police to the active shooter’s location • If you cannot speak, leave the line open and allow the dispatcher to listen
FIGHT—As a last resort, and only when your life is in imminent danger, attempt to disrupt and/or incapacitate the active shooter by: • Acting as aggressively as possible against him/her • Throwing items and improvising weapons • Yelling • Committing to your actions
Source: National Safety Council
See Original Post
Reposted from Washington's Top News
Plans to increase security at Smithsonian’s National Zoo are on hold for now.
The National Capital Planning Commission voted Thursday to defer action on proposed plans until it gets more information.
“There’s this big mystery about ‘what is the threat?'” Commissioner Mina Wright said. “We don’t have an explanation for what the threat is.”
The zoo’s security changes were to be considered in phases. The first phase plans to secure the perimeter with vehicle-resistant fencing and reduce the number of entry points from 13 to three.
The intention for the second phase is to construct security pavilions for visitor screening.
“Seeing that there will be screening facilities and gates coming, from a holistic perspective, why not look at how the whole system works together,” Commissioner Beth White said.
The vote on phase one plans were deferred until the Smithsonian gives the commission a security assessment for the zoo and conducts comprehensive community outreach.
“There seems to me to be a variety of legitimate concerns,” Wright said, noting that she has read all the community comments submitted to the commission on the subject.
Wright told Albert G. Horvath, Smithsonian chief operating officer and undersecretary for finance and administration, that the community disagrees with his assessment that reducing entry points and adding fencing would have little impact on visitor experience or on the zoo’s parklike setting.
Horvath said there’s no desire to change “the feel” of the National Zoo — it’s one of the gems of the city.
“I would urge you also to consider the challenge that our zoo police officers have,” Horvath said. “And, [consider] our desire to create a situation for them where they can be more effective and more successful in what they do.”
Commissioner Evan Cash wondered whether consolidating entry points is less about security and more about defining access as a means to perhaps start charging admission at some time in the future.
“It can be a slippery slope, I think, under the guise of security,” Cash said. “That could be an easy next step, because now we could just take your tickets and you can buy them at these, eventually four, entrances.”
The $1.5 million to pay for new fencing is already in the Smithsonian’s 2019 budget. Horvath said concept studies for potential screening pavilions estimate they might cost about $2.5 million.
The commission’s next meeting is Sept. 6.
Reposted from The Guardian
A collection of unpublished letters written by WB Yeats that was stolen in the 1970s and returned “anonymously” has been identified at Princeton University.
John Kelly, who has spent decades tracking down thousands of Yeats’s letters, discovered the collection as he was concluding research for the latest volume of his work on the Irish poet and dramatist.
Kelly was browsing the catalogue of Princeton University Library, where he had pored over Yeats’s holdings some years earlier, when he spotted a file of 17 letters to the poet’s publisher he had not seen before.
He discovered from the librarian it had been stolen in the 1970s, disappearing without trace until it turned up recently, delivered anonymously in a brown package.
Libraries often list donors of books or manuscripts. The Princeton file said: “A gift of anonymous, return of a 1970s theft.”
Kelly, the general editor of the Collected Letters of WB Yeats, recalled feeling disconcerted that he could have missed an entire collection of significant letters. “Upon inquiry, it turned out that the letters, then in a binder, had been stolen … and only recently and anonymously returned,” he said.
“It is not known whether the anonymous restorer was the original thief. That would seem plausible, but the Princeton catalogue ambiguously and perhaps magnanimously lists the letters as ‘a gift of anonymous’.”
His latest volume of letters cover the years 1908 to 1910, a period of uncertainty in the life of one of the greatest English-language poets of the 20th century, who received the Nobel prize in literature in 1923 “for his always inspired poetry”.
The letters were previously unpublished and recovered “in the nick of time”, Kelly said, for inclusion in the fifth of a 12-volume publication for Oxford University Press.
The 17 letters were written to his publisher, Arthur Bullen, and publishing assistant, Edith Lister, when they were working on Yeats’s collected works. Yeats hoped it would establish his reputation as a major poet, “justifiably, as it turned out”, Kelly said.
Despite their mutual admiration, Yeats was angered by Bullen’s lax approach to business, Kelly said: “There were a number of eruptions … The first came when Bullen disclosed that he was going to print at twice the speed Yeats was expecting, so leaving him insufficient time for all the revisions and rewritings he wanted to do … One of the reasons the quarrels between poet and publisher did not lead to a permanent breach was the tact and intelligence of … Lister.”
He added: “A number of the letters in the stolen Princeton collection were to her and show how much Yeats relied on her quiet efficiency. She, like Bullen, was an admiring and sensitive reader of Yeats.”
The Princeton letters date from 1903 to 1913. Passages reflect his desperate pleas to be paid for his work. “I am desperately hard up and owe about £20,” one said.
Another letter refers to a dispute over whether four portraits of Yeats should be grouped together in the collected works, as Yeats thought they had agreed, before discovering Bullen wanted them scattered throughout the edition.
Yeats wrote to Lister: “I am sorry I wrote so harshly to Mr Bullen. But his own letter to me was provocation enough. He arranges things with me (as he did the length of time the printing was to take), we get everything quite precise, and then he writes to me accusing me … who am simply doing what we agreed upon, of springing something upon him, or of breaking some arrangement.
“He forgets things and I see now that when he and I make any plan, we must set it down in writing … I am so busy now with every moment of my time marked out that a little thing, even a small change of plans, puts all astray.”
Asked what Yeats would have thought of the letters’ theft and recovery, Kelly said: “He would have been perhaps irritated at first, and then quite amused.
“Yeats never made much money as a poet until quite late, so he used to sell off occasionally some manuscript. One young man came round and said ‘the cheque’s in the post, I’ll just take the things now’. He slipped off with them and never paid. Yeats was cross, but kind of amused at the same time.”
Reposted from Europol
Two weeks ago, at 04:00 in the morning, more than 250 police officers searched simultaneously 40 houses in the Italian regions of Sicily, Calabria, Piedmont, Apulia as well as in Ehningen (Germany), London (UK) and Barcelona (Spain).
On the basis of European arrest warrants, 23 suspects were detained. Over 25 000 archaeological items were seized as part of this investigation, worth a total of EUR 40 million.
The investigation, initiated 4 years ago by the unit specialized in the trafficking of cultural goods of the Italian Carabinieri and supported by its counterparts at the Spanish Guardia Civil, the British Metropolitan Police and the German LKA of Baden-Württemberg, revealed that the organised crime group behind the illegal excavation and trafficking of cultural goods was very well organised, operating from several EU Member States.
In the district of Caltanisetta, in the center of Sicily, which is rich in archaeological sites from the Greek and Roman epochs, local members of the organised crime group illegally excavated artifacts which were then brought out of Italy, equipped with false provenances and sold via German auction houses. Key facilitators were also acting from Barcelona and London, coordinating the supply chain and providing technical support.
Prior to the action day, some 3 000 archaeological goods and 1 200 fake archaeological items were already seized by the Italian Carabinieri, worth at least EUR 40 million. Additionally, some 1 500 tools such as metal detectors used by the illegal diggers were confiscated.
The case, which is considered as one of the biggest in this crime area in Italian history; was actively supported by Europol which hosted and financed operational meetings, as well as the action day itself, thereby facilitating international information exchange. Europol also deployed a team of experts on the spot in Sicily on the action day to facilitate the immediate cross-checking of data.
This investigation once more shows that international cooperation is key to the success of such investigations in the field of trafficking of cultural goods, in which artifacts are moved through several EU countries and levels before they are brought to the legal market. Europol, with its unique analytical capacity, once again proved its key role as criminal information hub and facilitator of international Law Enforcement cooperation. Eurojust’s assistance has been crucial to coordinate the execution of the arrests and searches in the four Member States on the action day.
Reposted from JTA
A bomb threat was called into the National Museum of American Jewish Military History in Washington, D.C., on Thursday.
The museum has been cleared by police and operations have returned to normal after it received the threatening call at around 12:30 p.m.
During the call, a male voice with a foreign accent said that there would be a bomb in the building on Thursday and Friday.
“It was shocking. I was stuck for a minute,” said Vincent Edwards, the museum’s communications center assistant.
Police searched the building, but no bomb was found. Operations returned to normal around 3 p.m.
Doron Horowitz, senior national security adviser at the Secure Community Network, said his organization was not aware of any other Jewish sites targeted on Thursday. SCN is an affiliate of the Jewish Federations of North America and advises Jewish groups and institutions on security.
The museum’s program and public relations coordinator, Anna Selman, told JTA that the situation was “stressful.”
“A lot of people in this building are military, so it’s something some of us have dealt with, but it’s definitely not normal,” Selman said.
The museum, founded in 1958, aims to preserve “the contributions of Jewish Americans to the peace and freedom of the United States … [and to educate] the public concerning the courage, heroism and sacrifices made by Jewish Americans who served in the armed forces.”
In the beginning of 2017, Jewish institutions in North America were targeted with hundreds of bomb threats, although the military history museum was not one of the targeted sites. Two men were convicted of making those threats.
In December 2017, a former journalist from St. Louis was sentenced to five years in prison for charges connected to eight of the threats as part of a revenge plot against a former girlfriend. In June, a 19-year old American-Israeli was convicted of making hundreds of the threats; his parents and lawyer have said he has a low IQ and a brain tumor.
Reposted from The Bulletin
Librarians researching the history of the Deschutes Public Library recently discovered a forgotten, unsolved crime — the theft of a collection of rare artifacts stolen from the library’s basement 50 years ago.
The lost collection of weapons, books and mementos belonged to early Bend resident James Anthony Mitchell, a Civil War veteran and pastor in the Presbyterian church.
Nate Pedersen and Erin Weaver were compiling historic newspaper articles about the library for exhibits when they came across a Jan. 29, 1969, article describing the brazen burglary into the locked basement. Other than the basement door, there was only one way in.
“Leading into this room from the outside was a small window, hardly big enough for a slim youngster,” the article read. “There is a possibility some small person was lowered into the room.”
The Mitchell collection included guns, such as an 1866 Winchester, muzzle loaders from the frontier days and several antique bayonets and swords. The collection contained old books, some dating to 1620. The items in the collection were meant to be part of the city’s first museum.
The librarians’ discovery raised questions about the life of Mitchell, who is unfamiliar to local historians.
“I didn’t know of him at all,” said Pedersen, a member of the Deschutes Historical Society.
But Pedersen and Weaver learned a lot about Mitchell by reading the old newspaper clippings from The Bulletin.
Mitchell grew up in Illinois and enlisted at 17 to fight in the Civil War. He fought in Sherman’s March to the Sea, a famous battle in Georgia in 1864. Mitchell later became a missionary and traveled across Europe for more than a year. During his travels, Mitchell collected souvenirs from places all over the globe.
A Bulletin article from July 19, 1923, described Mitchell’s collection as “a wealth in war implements of every civilized nation.” His collection contained swords, firearms, maps, tapestries, Native American relics, stones, hides, flags and books.
The collection included Civil War relics, such as a letter a soldier wrote to his son in April 1863, a poster celebrating the fall of Vicksburg, Mississippi, and a National Union Party ticket for the 1864 presidential election when Abraham Lincoln was a candidate.
Mitchell moved from Los Angeles to Bend in 1905. He reportedly divorced his wife and left her and their five children in California.
As a worldly person, Mitchell brought rich culture to the Central Oregon frontier town. He put on and starred in Shakespearean plays, including “The Merchant of Venice” and “Macbeth.”
He hosted lectures, similar to modern day TED talks or History Pub talks at Bend’s McMenamins Old St. Francis School. He gave lectures on the catacombs in Italy and one talk in 1910 titled, “What is the trouble with Portugal?”
Having such a cultured person in the isolated High Desert community must have been a treat for the local residents, Pedersen said. Many people at that time could not afford to travel the world by train and transatlantic ships, he said.
“It was probably really attractive to Bend residents to hear about places in the world they would never get a chance to visit,” Pedersen said.
Mitchell, who served as the Presbyterian Church pastor in Bend without pay, died of heart failure at 64 in 1911. He was found kneeling at his bedside. He appeared to be praying. Newspaper headlines at the time read, “Pastor Dies in Prayer,” and “Dies on Knees.”
The city purchased Mitchell’s collection from his estate for $187 in 1912. The collection changed hands over the years from the Ladies Library Club to the American Legion, and pieces were lost along the way. In 1922, the city formally gave the collection to the library, where many pieces sat in storage in the basement until the burglary in 1969.
No pieces of the collection remain today.
“It’s totally gone,” Pedersen said. “The burglary was the last straw.”
If any longtime Bend residents remember the burglary or know where the stolen items are being kept, the Deschutes Historical Museum wants to hear from them, Pedersen said.
“It would be really interesting if anyone had anything,” Pedersen said. “ My guess is whoever stole it, sold it underground to a collector, and it disappeared into someone’s private collection.”
A part of the collection was Mitchell’s scrapbooks that would have contained souvenirs and pictures of his travels as a missionary and his life in Bend. Such photos would be treasured by local historians, more than the weapons and books, Pedersen said.
“From the historical perspective,” Pedersen said, “that’s a goldmine.”
But despite everything the two librarians learned about Mitchell, one big question remained: What did Mitchell look like? So far, no one has found a photograph.
Reposted from Observer.com
Caravaggio’s Nativity, stolen from the church of San Lorenzo in Palermo in 1969 and still missing, may be one step closer to recovery. Taken by members of Cosa Nostra, the Sicilian mafia, during a time when Italy was cracking down on organized crime, its theft prompted the establishment of the world’s first dedicated art police unit, the Italian Carabinieri Division for the Protection of Cultural Heritage. But despite that effort, the painting has not been seen since.
Investigators rarely consider that a famous work of art has been stolen for display at some super villain’s lair. That far-fetched idea is largely a myth promoted in film and fiction (including one of my own books, I’m afraid, The Art Thief). The motive behind most cases of high-profile stolen art is more complicated, but also, in many ways, more interesting.
Simply selling ill-gotten art is supremely difficult. Much stolen art is believed to enter a closed black market, used as barter or collateral in deals with other organized crime groups for other illicit goods. But there are some prominent exceptions to this rule, proving that sometimes life is really a lot like fiction. New evidence suggests the fate of this Caravaggio could be one such movie-esque example.
The most noted recovery attempt of the Caravaggio to date took place in 1979 when journalist Peter Watson went undercover for the Carabinieri, pretending to be a shifty art collector happy to deal in stolen art (he wrote of this adventure in The Caravaggio Conspiracy). When police are able to discover who was behind a theft it’s often through a paid network of criminal informants. The Carabinieri had learned that Cosa Nostra members were boasting possession of the painting, and Watson was recruited to lure them into offering it to him. He concluded that Cosa Nostra was indeed very likely in possession of the Caravaggio, but he was not offered it for sale—instead he was offered a Bronzino and an Andrea del Sarto, which were recovered through this sting operation.
In 1996, a mafia penitento (an informant) claimed that he had stolen the Caravaggio on the request of a high-ranking boss. In 2009, another penitento asked about the Caravaggio and said that he’d heard, back in 1999, that the painting had been ruined during an earthquake while in storage in Sicily, and had subsequently been eaten by rats and pigs rooting through the rubble. The work still hovers at the top of the FBI’s Most Wanted Stolen Works of Art list, but it has since been labelled “missing, presumed destroyed.”
But new hope recently dawned. Yet another penitento has claimed to the Carabinieri that the Caravaggio remained intact and was acquired by mafia boss Gaetano Badalamenti, who was in touch with an art dealer in Switzerland prior to his arrest in 1984. The head of Italy’s anti-mafia unit announced last week that there was “enough evidence to launch a new investigation,” with a focus on Switzerland. So it is entirely possible that the painting has survived its kidnap by Cosa Nostra and can be found again.
As I noted in Art Crime: Terrorists, Tomb Raiders, Forgers and Thieves, art police say that most art crime since the 1960s has involved organized crime at some point in the life of the crime (either through theft, smuggling, laundering or fencing). This definition includes both smaller groups working together in criminal enterprises for collective, long-term goals (as opposed to quick cash crimes) and large criminal syndicates, or “mafias.”
Major syndicates have been involved in innumerable high-profile art crimes. The Corsican mafia was responsible for a string of thefts along the French Riviera in the 1960s and ’70s; the Balkan mafia has certainly played role in art thefts in Zurich, such as the 2008 heist from the Buehrle Collection; there’s reason to believe the Russian mafia was involved in several thefts of Edvard Munch paintings; and of course there’s Cosa Nostra and our missing Carravagio. But law enforcement the world over is pretty bad at prosecuting art crime. As I showed in The Museum of Lost Art, as little as 1.5 percent of art theft cases end with the recovery of the object and successful prosecution of the criminals. Police learn who is, or which groups are, behind art heists through criminal informants, but such information must be taken with a grain of salt. For example, how do they know which mafia penitento is telling the truth about the Caravaggio Nativity theft? All they do know is that the group was somehow involved.
Peter Watson’s experience trying to recover the Nativity shows how murky the task of assigning motive can be when it comes to an art heist. After all, art syndicates are almost always involved in such instances of high-profile theft, yet their viable options for what to do with the work are slim. Watson wasn’t offered the Carravagio but he was offered other work they had acquired, suggesting that resale is at least the reason some works of art have been snatched. The Carabinieri helped build an identity and history for Peter Watson that suggested that he was a legitimate art dealer who was not afraid to buy questionable pieces. Known art dealers and art world personalities contributed to this subterfuge, providing documents, letters, contracts, etc. which would give the impression that Watson’s character had a long career as a dealer.
They must have done the job well. The representatives of Cosa Nostra failed to detect his undercover status. And criminals are clearly under the impression that there’s a market out there for stolen art. But did they get this impression from experience or assumption? Connecting with such individuals can be difficult, even for groups with an elaborate international network at their disposal. Watson’s experience speaks to this difficulty, too, because if said criminal collectors were easy to find, the stolen art would have already been sold, or Watson would have been asked to bid against other potential buyers in the closed black market of stolen art. Criminals seem to believe that they can find Dr. No or Thomas Crown criminal art collector types as seen in films. Some certainly must exist, otherwise the Cosa Nostra wouldn’t have fallen for Watson’s disguise, but there have been precious few such figures in confirmed historical case studies.
So in general, it’s understood that the major reason the mafia has been involved in art theft is to conduct closed deals among a circle of criminal groups. As in the case of a 1986 heist carried out by Martin Cahill (head of an Irish organized crime group) of 18 artworks from Russborough House, stolen art is used as collateral on loans and in a barter system for other illicit goods. As I outlined in Art Crime: Terrorists, Tomb Raiders, Forgers and Thieves, a Vermeer taken by Cahill was smuggled to Antwerp where it was used as collateral on a loan, the cash from which bought wholesale drugs to sell on the street. This became clear when several criminals involved were arrested. A Gabriel Metsu painting also taken then was recovered in Turkey being swapped for a shipment of heroin. Thus, art stolen from extant collections can provide a variety of benefits for major organized crime groups.
But then there are the surprises that add fuel to the misconception that most stolen artworks end up at the homes of Dr. No-like figures. The 2002 theft of two Van Gogh paintings, View of the Sea at Scheveningen and Congregation Leaving the Reformed Church in Nuenen, from Amsterdam’s Van Gogh Museum on 7 December 2002 remained a mystery for more than a decade, with no promising leads on recovering the works. It came as a surprise when, in September 2016, Italian police involved in an unrelated raid on the holiday home of a member of the Camorra, the Campanian mafia, spotted the two Van Goghs proudly on display.
It’s cases like this that give life to the idea of the criminal art collector, even though such verified examples are few and far between. And yet they also serve to provide hope that perhaps some of our lost masterpieces (or even some of the tens of thousands reported stolen each year to Interpol) have been carefully preserved somewhere, hanging on a crime boss’s wall. For the world’s sake, we can only hope that Carravagio has met such a fate.
Reposted from Campus Life Security
High Point University participates in Protect-in-Place drill following incidents on campuses across the country
It happened at 11:46 a.m. on a Friday, just three weeks before the Parkland shooting. A southeastern university issued a campus-wide emergency notification advising a gunman was on or near campus, and that individuals should seek protective shelter immediately.
The incident was scary, but no gunman existed. This scenario was only an exercise where High Point University members, including students (for the first time), participated in the “Protect-in-Place” response strategy. (This campus chose not to use the “Lock-down” term as it is a misnomer for a Higher Ed campus.)
Evaluators moved quickly through academic buildings checking door handles and peering through door windows. Acting from the perspective of an armed assailant, these evaluators noted any opportunities that would have made them more capable of hurting their intended targets. At the end of the drill, an all-clear message was announced and activities resumed as normal.
During the exercise “hotwash” or debriefing, the drill’s evaluators assessed how well the university responded, what deficiencies were noted as well and what can be improved. Each shared their observations from their respective buildings, including who didn’t participate in the drill or if any environmental obstacles created challenges.
Following the hotwash, emergency management and security staff drafted an After Action Report (AAR) and Improvement Plan for senior administration, outlining the strengths and areas of weakness that the drill exposed. An AAR and improvement plan is created following any exercise or real-world emergency and the recommendations are prioritized and implemented, allowing for a process of continuous improvement.
EXERCISE DESIGN AND GOAL SETTING
The first step for conducting a successful exercise is to outline the scope of the exercise by identifying intended goals. Target a particular response procedure and/or systems. A common pitfall in exercise design is that either goals are not clearly established or the exercise has too many unfocused goals.
Reposted from the Allied Universal Blog
From welcoming guests with a warm friendly smile to giving directions to the nearest ATM to recommending the best local restaurant, the role that security personnel play in a building has changed dramatically over the past few years and is still evolving.
Property professionals wear many hats, and that’s true for security personnel as well. A security team may perform a wide variety of tasks as a concierge or lobby ambassador for a property. Security professionals may go the extra mile, escorting visitors and tenants to their vehicles after hours, putting out umbrellas during inclement weather and even delivering critical medical services. Many commercial building owners and managers view these traits as crucial elements of an outstanding security program, necessary to add a special touch for a positive tenant, employee and visitor experience.
Security personnel’s uniforms make them easily recognizable, so that people can quickly seek them out for assistance—and not just in an emergency. Their commanding presence acts as a crime deterrent and gives customers peace of mind.
As property teams become more and more customer-service oriented and office workers work longer hours, the role of the security team has expanded to include the following roles:
Caretaker: Assisting everyone who enters the building requires a high level of customer care. Security personal can take ownership of lobby and visitor management services and technologies to make every visit enjoyable and productive.
Greeter: Security professionals build relationships and welcome staff and tenants by name, offering a personalized level of service.
Custodian: As important custodians of the building and its tenants, security professionals know who should and should not have building access, allowing them to quickly make important security decisions.
First Responder: Trained security professionals can even save lives by delivering first aid, CPR and emergency medical services.
A security professional is often the first representative people see upon entering the building, whether they are a regular occupant or a one-time visitor. This role has the potential to make a big impact on meeting tenant and visitor expectations.
For building owners, a balanced, integrated approach of employing the right mix of security professionals, services and technology can provide the best possible tenant experience. The future of building security means being there for building tenants and their needs—no matter what or when.
Reposted from OHS Online
A June 4 afternoon session at #Safety2018, "The Fatal Flaws in Your Active Shooter Protocol," addressed the unfortunately highly relevant issue of active shooters from a workplace violence perspective. Speaker Bo Mitchell, President of 911 Consulting and a retired police commissioner, laid out the statistics on workplace violence and how employers should prepare.
According to the Department of Justice, the average workplace is 18 times more likely to experience an incident of workplace violence than a fire. Mitchell cited FBI statistics that measured one or more active shooters once a month on average for the five years previous to the Sandy Hook shooting; now these incidents are averaging once a week.
Almost all active shooter situations are over in 4-5 minutes, which means it's difficult for police to deploy in time. Because officials can't arrive instantaneously, Mitchell said, the true first responders in a workplace violence incident are the employer and employees, and training them to call the police is not enough.
In active shooter situations, the Department of Homeland Security says to Run, Hide, and Fight. According to Mitchell, this protocol's fatal flaw is that the first step should be Alert. He stressed that in a chaotic workplace violence situation, employers must have multiple methods to alert employees as to what is happening and what areas to avoid. He listed options such as a PA system, two-way radios, panic alarms, or alerts via cell phones, text messages, or locked computer screens. He emphasized that redundancy and multiple alarms are best.
Appropriate response and protocol in an active shooter situation is complex and not intuitive, Mitchell said, so there are many points that are vital to include when training employees. "We don't rise to our occasion, we sink to the level of our training," he explained.
He underscored that the main duty of police when entering an active shooter situation is to find the shooter, and that employees should be trained to understand that police officers cannot help them emotionally or medically in this instance. Employees also should be prepared to put their hands in the air and be treated as suspects and searched, he said.
Generalities in emergency action plans are dangerous, Mitchell said, adding that employers must prepare a protocol for workplace violence and active shooters that is specific for employees at each work site. He said that OSHA does not have regulations on workplace violence, but preparations would fall under the standards for emergency action plans and the General Duty Clause. Mitchell recommended creating an emergency action plan based not only on each specific work environment, but the emergency action/management standards set by OSHA and NFPA and the workplace violence standards set by the security organization ASIS International.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us