INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from Newswire
Member News
Be sure to follow us on Facebook, Instagram, and LinkedIn where we regularly post highlights of the great work our members are doing every day!
Not a PLA Member? Join us today!
Education & Training
PLA Members and Corporate Partner members have access to resources and 100 webinar recordings offering best practices, cutting-edge topics, and the latest trends in the public lands community.
Learn more about becoming a PLA nonprofit member or corporate partner to access this benefit. Non-members and government employees may contact us to purchase recordings for $35 a webinar.
Visit Our Resource Library
llllllllllllllOpportunities & Resources
Public Lands Alliance Job Board
Check out our Public Lands Careers page for current job listings, currently including positions such as:
· Field Operations Manager
· CEO
· Director of Membership
Visit the webpage to submit your seasonal, part-time, and full-time employment opportunities.
Public Lands Careers
Reposted from CISA/DHS
The Cybersecurity and Infrastructure Security Agency (CISA) is hosting its ninth iteration of the Cyber Storm (CS IX) Cyber Exercise. It’s the nation’s largest cyber exercise designed to improve the cybersecurity posture of our nation’s critical infrastructure. Through extensive planning, this exercise strengthened cybersecurity preparedness and response capabilities through exercising policies, processes, and procedures for identifying and responding to a multi-sector significant cyber incident impacting critical infrastructure. CS IX Cyber Exercise generates lessons learned from previous exercises and real-world incidents and presented participants with a challenging scenario to evaluate their incident response capabilities. CISA is hosting more than 2,000 players from all levels of government, the private sector, and international partners. Participants are using this unique opportunity to work together in their response to a simulated national-level cyber incident, improving coordination mechanisms and relationships. CISA will publish a blog with additional details and results from this Cyber Storm after the event.
See Original Post
The Cybersecurity and Infrastructure Security Agency, in partnership with National Security Agency, Federal Bureau of Investigation and international partners, released a Cybersecurity Information Sheet (CSI) today, “Deploying Artificial intelligence (AI) Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems.” This guide provides best practices to secure the deployment environment, validate and protect the AI system, and secure AI operation and maintenance The three goals of this joint guide are:
1. Improve the confidentiality, integrity, and availability of AI systems;
2. Assure that known cybersecurity vulnerabilities in AI systems are appropriately mitigated; and
3. Provide methodologies and controls to protect, detect and respond to malicious activity against AI systems and related data and services.
The CSI is intended to support organizations that will be deploying and operating AI systems designed and developed by an external entity. It builds upon the previously released joint Guidelines for Secure AI System Development and Engaging with Artificial Intelligence.
This is DHS I&A’s first assessment of Domestic Violent Extremist threats to US fiber optic cable lines. This assessment seeks to provide law enforcement and public safety partners with an overview of how DVEs could adopt tactics used by criminal actors to damage US critical infrastructure to further their ideological goals. Domestic Violent Extremists (DVEs) have increasingly discussed targeting terrestrial fiber optic cables across the United States, raising the threat to fiber-dependent infrastructure sectors. DVEs frequently discuss that fiber optic cables are a preferred target to disrupt critical infrastructure pursuant to their ideological goals of dismantling current societal structures. The spread of the COVID-19 virus prompted increased telework that has persisted, creating dependencies on fiber optic cable networks that were highlighted within information sharing platforms utilized by some Since 2020, DHS and open-source reporting have shown an uptick in DVEs across ideologies sharing simple tactics specifically related to fiber optic cables. In 2024, a blog utilized by some anarchist violent extremists used a military target assessment method to encourage attacking fiber optics as an “easy” target while referencing past attacks. In 2023, a channel frequently used by environmental violent extremists shared five issues of a magazine that critiqued the tactics used in successful previous attacks. In 2022, the Terrorgram Collective publication discussed tactics for targeting fiber cables, including the use of fifirearms, arson, and power tools. Several discussions in recent years among users of an online forum frequented by DVEs describe fiber optic cables as low-cost/high-reward targets to disrupt critical infrastructure. These users indicate a preference for fiber optic cable cuts due to the perceived simplicity and ability to avoid law enforcement interdiction. Fiber optic cable cuts often cause cascading effects on critical infrastructure sectors, such as communications, and delay emergency services from responding to incidents. Across the United States, fiber optic cable cuts have disrupted 911 services and forced police stations to redirect personnel to field emergency calls through non-emergency lines. Individuals from North Carolina, who intentionally cut fiber optic cables in Connecticut, disabled communications and internet-based financial services to thousands of homes and businesses for hours. While DVEs have focused on opportunistic or simple attacks thus far, online narratives about fiber optic vulnerability and increased information sharing could inspire DVEs to engage in larger-scale, pre-planned fiber attacks in the Homeland. Recent attacks in France and Germany that used multiple and coordinated cuts to fiber optics surrounding a target area resulted in blackouts and communications stoppages that strained emergency services’ responses. Information shared online about fiber optic systems and media coverage of attacks could inform DVE attack planning and operations. In February 2024, an online user claiming to be a former cable worker provided a detailed description of how a coordinated group of individuals could disrupt communications for an entire city. In 2023, online discussions, in response to news media coverage of recent attacks, dissected attacks in Sacramento, California, from 2014 and examined the nature of the successful attacks to develop methods for making future attacks more severe, indicating potential pre-planning by actors. DVEs could also draw inspiration from European attacks that disrupted citywide telecommunications and transportation. Violent extremists in France caused massive disruptions to telecommunications by targeting primary fiber optic cables in several regions. In Germany, travelers were left stranded after actors cut fiber optic lines and caused hours-long train stoppages. Possible indicators of pre-operational planning for a large-scale fiber optic attack include unauthorized surveillance around fiber optic sites, particularly connection locations; signs of trespassing or digging around known fiber connection locations; and successful small-scale fiber optic cuts.
Reposted from CISA
Welcome to the first issue of “New and Noteworthy,” an update on the current efforts underway to update the National Cyber Incident Response Plan (NCIRP) 2024. This publication will keep key partners informed on the planning process, plan development, and stakeholder engagement efforts in support of the NCIRP 2024. This “New and Noteworthy” edition provides a brief overview of the NCIRP, information about the NCIRP Core Planning Team (CPT), and related engagement and outreach activities that have happened to ensure the NCIRP 2024 reflects input from relevant stakeholder groups and is more operational and actionable. Through the Joint Cyber Defense Collaborative (JCDC), the Cybersecurity and Infrastructure Security Agency (CISA) is leading the national effort to update the NCIRP. CISA established JCDC to bring together public and private partners to plan for, exercise, and execute joint cyber defense operations and coordinate the response to significant cybersecurity incidents. Updating the NCIRP is foundational to the continued unity of effort that JCDC is advancing. This month’s “New and Noteworthy” provides a brief overview of the NCIRP and the efforts underway to make it more operational and actionable, related engagement and outreach activities, as well as an overview of the broad group of stakeholders who represent the varied elements of national cyber response, and the ongoing joint planning to ensure the new version of the NCIRP reflects input from relevant stakeholder groups. We call this group of stakeholders our Core Planning Team (CPT) which is a diverse and essential group of individuals who play a crucial role in our NCIRP 2024 planning process. NCIRP Background and Overview: The NCIRP was initially developed and written to align with Presidential Policy Directive 41 (PPD-41) on U.S. Cyber Incident Coordination and describes how the federal government, private sector, and SLTT government activities will organize to manage, respond to, and mitigate the consequences of significant cyber incidents. The NCIRP leverages principles from the National Preparedness System (NPS) to articulate how the nation responds to and recovers from significant cyber incidents. Due to the evolving cyber threat landscape—including increasing risks to critical infrastructure and public services—the need to update the NCIRP has never been greater. CISA is working with JCDC participants and other partners to gather input and feedback that will be considered for the NCIRP 2024. The NCIRP 2024 update is one of the JCDC 2024 Priorities, which calls for bringing together government and the private sector to prepare for major cyber incidents. Making the NCIRP More Operationally Actionable: The NCIRP 2024 will incorporate lessons learned since the 2016 release, include contributions from public-private partners who play a critical role in national cyber incident response, and establish a foundation for continued improvement of the nation’s response to significant cyber incidents. The NCIRP 2024 will also address Strategic Objective 1.4 of the 2023 National Cybersecurity Strategy, which calls for updating federal incident response plans and processes.
The Vehicle Incident Prevention and Mitigation Security Guide offers a recommended framework of Plan-Prevent-Protect for critical infrastructure owners and operators, as well as those responsible for pedestrian safety in proximity to those sites, against vehicle threats. Featuring an introductory overview of the vehicle incident threat environment, the Guide outlines options for planning—which includes conducting a risk assessment, creating an emergency operations plan, connecting with professional security subject matter experts, and exploring funding opportunities for mitigations. Recommendations for preventive measures include implementing safe crowd management and traffic management principles, being aware of concerning behaviors in individuals and suspicious vehicle activity, establishing a strong culture of reporting and staff training, and using a layered approach to security. Protection includes implementing appropriate and appropriately installed active and passive barriers and understanding industry standards for perimeter protection devices.
Reposted from UNESCO
In 2024, UNESCO celebrates the 70th anniversary of the adoption of the Convention for the Protection of Cultural Property in the Event of Armed Conflict, the first international legal framework entirely dedicated to the protection of movable and immovable heritage.
UNESCO
13 May 2024 - 15 May 2024
EVENT
UNESCO International Conference “Cultural Heritage and Peace: Building on 70 years of the Hague Convention”
13 May 2024 - 5:00 pm - 15 May 2024 - 1:30 pm
Location
The Hague, Netherlands
Rooms :
The Hague
Type :
Cat IV – International Congress
Arrangement type :
In-Person
Add to calendar
On this occasion, the International Conference “Cultural Heritage and Peace: Building on 70 years of the Hague Convention”, will be organized by UNESCO and hosted by the Kingdom of the Netherlands in The Hague on 13 - 15 May 2024, at the historical location and date of its signature.
This landmark event will gather specialists involved in the protection of cultural property as well as the global community, to collectively reflect on the achievements, challenges and lessons learned in the implementation of this international normative instrument. It will also serve as a unique global platform for UNESCO and its partners to enhance advocacy efforts and work towards universal ratification to build and foster the foundations of respect, diversity and peace.
Protecting cultural property, whether during peacetime or an armed conflict, means safeguarding the memories of peoples and societies, and passing down the diverse fabric of humanity to the generations to come. Instruments such as the 1954 Convention contribute to building and cementing a foundation of peace.
Reposted from NYTimes
The first burglary was in 1999 at Keystone College in Factoryville, Pa. One of the gang, authorities said, sneaked onto the campus, smashed some glass display cases and walked off with memorabilia, including a baseball jersey once worn by Christy Mathewson, the legendary pitcher. The Everhart Museum in Scranton was next, six years later. An Andy Warholsilk screen print and a painting attributed to Jackson Pollockwere taken. Then the pace picked up.
The Space Farms: Zoo & Museum. The Lackawanna Historical Society. RingwoodManor. The Sterling Hill Mining Museum. The United States Golf Association Museum and Library. The list goes on. Over the course of almost two decades, the crew showed up at 12 small,low-profile museums that often lacked elaborate security systems, strippingthem of cherished items, including treasured heirlooms from America’ssporting past, authorities say. Just a partial list includes — from the National Museum of Racing and Hallof Fame — the 1903 Belmont Stakes trophy. From the International Boxing Hall of Fame, middleweight Tony Zale’s from the Yogi Berra Museum & Learning Center, seven of Berra’s championship rings, his 1954 and 1955 M.V.P. plaques, and nine of his 10 World Series rings. The only Berra World Series ring not stolen was the one he wore on his finger. “These kinds of artifacts tell people the story of who we are, and the connect us to the past in a way that really nothing else can,” said Eve Schaenen, executive director of the Berra Museum. “And now they’re gone.” In the fall, four men charged with taking some part in the burglaries arescheduled to go on trial in Pennsylvania, where they live. Another fivepeople have pleaded guilty. All nine, authorities say, avoided arrest forsome portion of 19 years as museum directors across five states woke up tofind smashed glass and things missing.Stolen items included, clockwise from top, “Upper Hudson” by Jasper Cropseytaken from Ringwood Manor; Roger Maris’s Hickok Belt from the Roger MarisMuseum; a gold nugget from the Sterling Hill Mining Museum.Credit...viaRingwood Manor, West Acres Development LLP, and Sterling Hill Mining Museum. With so many heists going unsolved for so many years, one might imagine thethieves as some sort of a world-savvy, blueprint-studying, techno-literate crew so often seen in movies. But in court records and interviews, theycome across as more 7-Eleven than Ocean’s Eleven. Prepared? Yes. Sophisticated? No. Sometimes they just hit houses. One favorite burglary tool was an ax, according to court records. They drove cross country to rob the Roger Maris Museum in North Dakota, rather than take a plane. “These guys were not world-class criminals,” said Michael Wisneski, anofficial with the Everhart museum who described the thieves as schlubby.“They were operating out of the North Pocono School District.” Most upsetting to many people is how little care was shown for the objects that were taken. A Jasper Cropsey painting from 1871 was torched. The crew did not even try to sell some of the high-profile sports memorabilia. Instead, gold and silver items like Berra’s rings, Maris’s M.V.P. plaque and the Belmont Stakes trophy were melted down and hocked as raw metals, according to court papers. One of those arrested is accused of using some of the stolen gems to makehimself a scepter. “They could have done a smash and grab at a strip mall jewelry store andcome away with more gold,” said Lindsay Berra, the granddaughter of Yogi. When the accused crew members were finally named in an indictment lastJune, federal prosecutors laid out the inventory of what had been taken. It included stolen paintings, at least five 19th-century firearms, a Tiffany lamp and sports memorabilia that included more than 30 golf and horseracing trophies. Prosecutors valued the lot at $4 million. Most of theobjects have not been recovered. “This was a group of dishonest people that saw easy marks,” said WilliamKroth, executive director of the Sterling Hill Mining Museum. He called them “low life grifters.”The Yogi Berra Museum & Learning Center suffered the loss of multiple itemsonce owned by Berra, including nine of his 10 World Series rings. They weremelted down for their metal. Credit...Steve Crandall/Getty Images‘A Violation of Trust’ Michael Wisneski of the Everhart Museum remembers the morning in 2005 when he woke up and turned on the local television news. To his surprise, the reporters were in the parking lot of his museum, talking about a break-in. When he arrived at the building, he found the back door smashed in, the Warhol and Pollock gone. “It felt like somebody broke into your house,” he said. “It was a violation of trust or of security.” According to authorities, Thomas Trotta, 48, of Moscow, Pa., had used aladder to smash the door of the museum. Of the nine people later arrested, Trotta was the one relied on to ventureinto the museums to take things, according to court papers. But he was helped in meaningful ways, authorities say, by Nicholas Dombek, 53, who has known Trotta since they were teenagers. After Trotta was arrested, he accused Dombek of being the ringleader, according to court papers. But Dombek’s lawyer, Ernest D. Preate Jr., said in an interview that Trotta was the ringleader, and he described his client as a handyman, not amastermind, who did not even operate a computer. Trotta’s lawyer, Joseph R. D’Andrea, declined to comment.Thomas Trotta, who is identified in court papers as the person whopersonally, entered the museums and stole items. He has pleaded guilty totheft of a major artwork. Credit...via Pennsylvania Department ofCorrections Dombek, who has pleaded not guilty, is from Thornhurst, a rural patch of Pennsylvania, where he lives on a street that carries his family name. His father and his brother were both science teachers, but Dombek nevergraduated from high school, and in a 2019 court hearing testified that hewas in financial straits and was two months behind on his mortgage. Still, he was not without ambition and, according to a search warrantaffidavit, Trotta told investigators that Dombek had constructed something like a chemistry lab in his garage. Dombek himself spoke during the court hearing of hoping to cure cancer by tinkering with the chemical properties of water. Dombek’s garage became an informal headquarters where the group plannedbreak-ins, Trotta told investigators according to court papers. It wasthere that Dombek constructed a collapsible ladder and other tools forTrotta to use at heists, afterward using the space to melt down stolenmemorabilia, according to court papers.Image Nicholas Dombek, who authorities have charged in the museum burglaries. Each museum was studied before a break-in to determine access, security measures and what looked good to steal, investigators said in court papers. During one scouting trip, Dombek tested the thickness of a display case at the golf museum in New Jersey by scratching the glass with a coin, thepapers said. Trotta would sometimes wear a disguise, dressing as a firefighter when the stole from the Roger Maris Museum, and as a Hasidic Jew when they went to break into the Harvard Mineralogical & Geological Museum, the indictment said. (The theft was called off because a particular diamond they hoped to steal was no longer on display.) The other accomplices are accused of playing a variety of roles: sometimes as getaway drivers, sometimes as transporters of stolen materials after theburglary. At the Berra Museum, the thieves cut the glass to gain entry, and were able to elude security cameras during one of the larger hauls, according tomuseum staff. “They knew exactly where to break in,” Schaenen said. “They had a method toit.” The Harness Racing Museum & Hall of Fame in Goshen, N.Y., had a motion sensor but no cameras in place when the thieves arrived in 2012. It lost 14 trophies and afterward, Janet Terhune, the executive director, said shecalled the staff of the National Museum of Racing and Hall of Fame inSaratoga to warn them to increase their security. Both museums upgradedtheir protection. It didn’t matter. The next year, Trotta smashed glass displays in Saratoga with a center-punch tool and grinder and took off with five trophies, according to court records. Brien Bouyea, the communications director for the Saratoga museum, said theinstitution had a solid security system in place at the time of the thefts.“The smash-and-grab style of the robbery, however, narrowly beat the police response time,” he said. The Lackawanna Historical Society in Pennsylvania lost a Tiffany lamp in a 2010 burglary. Credit...via The Lackawanna Historical SocietyA Fateful Traffic Stop Even with the snow blanketing Route 307 outside Scranton early on the morning of March 4, 2019, the maroon Pontiac was swerving too much.
Reposted from ArtForum
Land artist Mary Miss has filed suit against the Des Moines Art Center to stop the institution from tearing down her Greenwood Pond: Double Site, 1989–96, an outdoor installation commissioned by the museum for its permanent collection in 1994. Citing the work—a series of structures adjacent to a lagoon—as a danger to the public and the cost of repairing it as beyond its means, the museum had planned to begin removing it on April 8.
In commissioning the work, the Art Center had contracted with Miss to “reasonably protect and maintain the project against the ravages of time, vandalism and the elements.” However, Greenwood Pond, which is made of treated metal, wood, mesh, and concrete, had deteriorated in recent years under the museum’s stewardship. In her suit, filed on April 4 in US District Court for the Southern District of Iowa’s Central Division, the artist accused the museum of failing to properly care for the work. She asserted that the museum’s dismantling of Greenwood Pond would violate the Visual Artists Rights Act of 1990, which gives artists the right to “prevent any destruction of a work of recognized stature.” The work is thought to be the first urban wetland project in the United States. Miss is seeking a temporary restraining order against the museum until the matter can be resolved in court. A hearing is set for Monday.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us