Log in


  • September 24, 2019 12:16 PM | Office IFCPP (Administrator)

    Reposted from KWTX

    A Waco psychologist says there are red flags that could signal a potential for violence in the workplace, but most training on how to respond to active-shooter situations doesn’t include them.

    “There are red flags you can identify and look for,” said Dr. William Lee Carter, a Waco psychologist who routinely works with courts, prosecutors and police on cases that might involve a suspect with a mental or behavioral disability.

    For the most part police have systems in place to teach people how to survive a mass casualty event when one happens, “but that only after the shooting has started,” Lacy Lakeview police Chief John Truehitt said.

    McLennan County Sheriff Parnell McNamara said his deputies will hold seminars and classes for businesses to train employees how to respond to an active shooting situation, how to hide and what to do, but they don’t include training on how to spot a potentially violent person.

    “We probably should have training like that, but we don’t have any right now,” he said.

    “We (police) are trained to spot tendencies, that’s our world,” Waco police Sgt. W. Patrick Swanton said.

    But he said that training doesn’t or at least hasn’t, extended to the public.

    Robinson police Chief Bernie Prasifka said while he’s not aware of any specific training on spotting workplace violence potential, “It would seem to come down to some common sense.

    Such training, he said, likely would be beneficial: “I think that’s a big discussion we ought to have.”

    The man who attacked both civilians and police in Midland/Odessa was denied the legal purchase of a weapon, investigation has shown, but the background check he failed “isn’t really a background check at all,” Truehitt said.

    “What it amounts to is a simple criminal case history and has no detail about that person’s background or mental stability,” Truehitt said.

    Carter said there are definite red flags.

    “Things that always concern me are imperative thinking, like holding very strong opinions about something, an unwillingness to listen to others’ viewpoints and always insisting that, regardless of the situation, they are right and everyone else is wrong,” Carter said.

    Also: “a lack of empathy for others. Those simple can’t display any empathy or concern for others and are overly self-focused.

    Carter went on to say anyone with anger issues, whether rooted in the workplace or somewhere else, especially if that person has a history of encounters with law enforcement, especially if aggression was a problem.

    Carter said interaction between employees can defuse such a situation, but those with such issues can be hard to reach.

    The expression in the workplace can be very different from the one shown at home, Carter said.

    “It’s important to defuse a situation before it escalates,” Carter said.

    “Sometimes it’s as simple as making that person feel like you truly care about them and are willing to listen to them.

    “Don’t judge, it won’t help,” Carter said.

    Carter deals frequently with individuals who display such behavior.

    “I see about 100 a year in the county jail to determine if that person is competent to stand trial or needs additional mental intervention,” Carter said.

    If potential can be recognized and intervention can take place, “it can prevent an explosive event from happening,” but left unchecked it can become what Carter called “malignant narcissism and that’s always trouble.

    Carter said if you see something that troubles you, “rather than sit around and gossip about, share it with someone.

    See Original Post

  • September 24, 2019 12:11 PM | Office IFCPP (Administrator)

    Reposted from ZDNet

    There is plenty of evidence to suggest that ransomware attacks are getting bigger and more sophisticated. In the space of just a few years ransomware has gone from a minor irritation for PC users to being a significant threat to large corporations and even nations. Major cybercrime gangs are looking to cash in on attacks, and state-backed attackers have realised the potential for creating both chaos and profit.

    A few examples of the scale of the ransomware problem:

    • WannaCry, the biggest cyber incident of 2017, with than 300,000 victims in over 150 countries, was a form of ransomware most likely unleashed by North Korea (it was rapidly followed by NotPetya, an attempt by the Russian authorities to cause havoc in Ukraine with ransomware which rapidly spread beyond those borders).
    • Earlier this year the authors of one ransomware strain announced they were retiring because they had already earned $2 billion.  "We have proved that by doing evil deeds, retribution does not come," they said at the time.
    • The past summer of ransomware that has seen dozens of small towns and cities across the US hit by ransomware; many have been forced to pay out tens or hundreds of thousands of dollars in ransom to get their systems up and running again.

    Ransomware is now the defining internet crime of our current age. It's the inevitable consequence of the corporate world's obsession with hoarding as much data as possible, about anything and anyone, and its relaxed attitude towards keeping that data safe. 

    Businesses have been urged to gather up every bit of data about every customer engagement, every supplier interaction, in the hope that it can be trawled by artificial intelligence and big data technologies to provide insight and direction. But for many organisations the security of that data remains an afterthought at best. That leaves many in the situation of having vast piles of sensitive information but no guidelines for keeping it safe. If organisations aren't sure why they're collecting data they won't be clear about why they need to protect it, either.

    In another twist, ransomware uses encryption, one of the key technologies we use to do business and communicate online, as a tool to lock away data from its rightful owner. 

    In some respects, the solution to the ransomware crisis is relatively simple. Basic internet security hygiene will prevent the vast majority of attacks before they have a chance to gain a foothold. A few of the most obvious steps to take:

    • Train staff to recognise suspicious emails
    • Apply software patches to keep systems up to date
    • Change default passwords across all access points
    • Use two-factor authentication
    • Understand what your most important data is and create an effective backup strategy
    • Have a plan for how to respond to a ransomware attack – and test it

    Sadly, there will still be organisations large and small that fall victim to ransomware, as gangs become more sophisticated in how they work. Managed service providers and network attached storage are among the recent additions to the ransomware gangs' targets; they won't be the last.

    There's every sign that this is an epidemic that will get worse, not better. The willingness for victims and their insurers to pay out means more crooks will be tempted to try their hand. Ransomware-as-a-service kits mean even wannabes with limited skills can try their hand at a running a scam. While some law enforcement agencies have done a good job of providing the tools to let victims decrypt their systems few ransomware gangs have faced justice. 

    Already there are fears that ransomware could be used against voter databases in the run up to the 2020 US presidential election. A ransomeware attack which makes it impossible for some people to cast their vote would have huge consequences. And it's hardly implausible to see criminals and state-backed hacking groups trying to expand the use of ransomware across more devices and scenarios in the near future. As we get more reliant on everything from smart cities to driverless cars the risks get greater.

    Ransomware offers crooks a vast number of potential victims, who they can target with a cheap-to-deploy scam with a big payday and very little chance of getting caught. Perhaps the real surprise is not that there are so many ransomware attacks, but that there are not many, many more.

    See Original Post

  • September 24, 2019 11:57 AM | Office IFCPP (Administrator)

    Reposted from Inovonics

    LOUISVILLE, Colo., September 17, 2019 – Inovonics, an industry leader in high-performance wireless sensor networks, announces the retirement of Dan Spark, Inovonics Northwest Regional Sales Manager, on October 1, 2019.

    Dan Spark has been an integral part of the Inovonics sales team for the last 22 years. His development and growth of northwestern regional sales pipeline fulfillment process, in addition to the creation of numerous sales presentations, are just a couple of the many contributions he will be remembered for.

    Eric Banghart, Manager of Global Sales at Inovonics, had the following to say: “Dan has been a hardworking and esteemed member of the Inovonics sales team. Although he’ll be greatly missed, we wish him well in his upcoming retirement”.

    Following his retirement, Dan plans to relax at home in Ogden, Utah, enjoy trips to Cuba, enroll in surf camp in Mexico, and of course to ski Snowbasin all winter long.

    Although Dan is an important member of the team, Inovonics wants to assure current customers that they will continue to be in the best of hands moving forward. Customers will be contacted with their newly assigned Inovonics regional sales manager prior to October 1, 2019.

    We are confident that our team can and will effectively continue to serve our valued Inovonics customers in the Northwest territory.

    If you have any questions regarding this transition, please contact Eric Banghart, Manager of Global Sales, at or 303-209-7298.

    See Original Post

  • September 10, 2019 3:37 PM | Office IFCPP (Administrator)

    Reposted from Securitas Security Services, USA, Inc.

    The Federal Emergency Management Agency (FEMA) defines civil unrest as an activity such as a demonstration, riot, or strike that disrupts a community and requires intervention to maintain public safety. During such events, employees and employers have a critical role and shared responsibility to take appropriate actions to protect themselves, their coworkers and organizations, and their properties.

    Have a Plan

    As with any potential emergency situation, it is best to have a plan of what you will do if something happens. By thinking ahead, you can save yourself valuable time in an emergency. All organizations should develop a workplace safety strategy and conduct practice drills. Make sure your workplace has a plan in place so that every employee knows what to do. A civil unrest preparedness plan can fit into your organization’s larger security plan that may already include plans for fire evacuation, severe weather, bomb threats, and other emergency events.

    Depending on the situation, your workplace may need to be secured in case of civil unrest. Remember that your personal safety is the most important goal before securing the workplace. Know your role in your workplace safety plan for civil unrest. Always listen to the instructions of emergency personnel if applicable. Listen for instructions about whether your workplace is in “lockdown,” if you should move to shelter or shelter-in-place, or if you should evacuate the premises. Just as for fire safety, know the emergency exit routes out of the building and out of the area ahead of time. Know the locations of safe havens such as hospitals, public buildings, etc. Have a plan to account for all personnel and guests and set up pre-designated meeting points for yourself and your coworkers. Have a transportation plan for yourself in case you are separated from your car. If possible, always carry a small amount of cash on you. Employees should also consider their family’s emergency plan in tandem with their workplace security plan so they can ensure communication with their families.

    If Civil Unrest Occurs

    Emergency personnel, such as local, state and federal law enforcement, may not be available if civil unrest is occurring. Refer to your company’s security plan for guidance. Alert other employees and your supervisor. If you are responsible for securing your area, do so, and then follow your company’s plan of action, which may include emergency evacuation. Your safety is a priority so make sure you have taken all precautions to keep yourself safe. Make your way to your pre-designated meeting point, and if necessary, try to blend in while working your way towards a safe location. Do not draw attention to yourself and work your way out of the area.

    Keep Calm and Act Quickly

    As in any emergency, one of the keys to your safety is to remain calm. There may be a lot of confusion, and news and social media may give inaccurate or contradictory information. Remain observant and adaptable to the developing situation.

    Be Prepared

    Your workplace safety strategy and emergency plan should always be kept up to date and include communication with local, state and federal law enforcement. Your workplace should conduct regular safety drills and conduct both threat analyses and security audits regularly.

    Make sure your workplace has an Emergency Plan and ensure everyone knows what they would do if confronted with a situation that involves civil unrest.

    • Develop a notification system. Look for the two nearest exits anywhere you go.
    • Have an escape path in mind and identify places you could hide.
    • Understand the plans for individuals with disabilities or other access and functional needs.
    • Account for personnel and guests.
    • Coordinate preparation with existing plans.
    • Train employees to recognize and report concerns.

    Be Informed

    • If you see something, say something to a supervisor or the authorities right away.
    • Sign up to receive local emergency alerts and register your work and personal contact information with any work sponsored alert system.
    • Be aware of your environment and any possible dangers.
    • Learn and practice first aid skills and use of tourniquets.

    Property Conservation

    • Identify preparations before an emergency situation occurs.
    • Identify how you will assess damage; salvage undamaged goods; and cleanup the building following an incident.
    • Identify the contractors, equipment, and materials that would be needed.

    For more information on this and other security related topics, visit the Securitas Safety Awareness Knowledge Center at:

  • September 10, 2019 3:19 PM | Office IFCPP (Administrator)

    Reposted from The Hill

    Acting Homeland Security Secretary Kevin McAleenan said on Sunday that mass shootings "absolutely are a homeland security threat" after seven people were killed and more than 20 wounded in West Texas one day earlier.

    McAleenan told ABC's "This Week" that his office is monitoring the situation, saying "it's extraordinarily concerning to have that level, that length of an event, to have that many people injured and five killed at this point, it's devastating and, you know, 300 miles from El Paso, a region that's really felt the impact of mass attacks in recent weeks and we're very concerned and we'll be following up aggressively."

    He added: "They absolutely are a homeland security threat. In our counterterrorism strategy and approach domestic terrorism has taken a frontline focus for us. Since April when I became acting secretary we set up a new office targeting violence and terrorism prevention, with an explicit focus on domestic terrorism including racially-motivated violent extremism, which we've seen too much of in the recent weeks and months."

    Host Martha Raddatz also asked McAleenan if more resources should be devoted to fighting this form of domestic terrorism.

    "That's a conversation we're having as an interagency team with the FBI, with the Office of Management and Budget, to see what the right resource level is going forward, to make sure we can continue our very strong focus on the international terrorism threat and prevention level we've achieved but also make sure we're balancing that out with effective efforts on domestic terrorism as well," McAleenan said.

    Twenty-two people were also killed in a separate mass shooting last month at a Walmart in El Paso, Texas.

    See Original Post

  • September 10, 2019 2:52 PM | Office IFCPP (Administrator)

    Reposted from Bothell-Kenmore Reporter

    They’re most known for their appearances on PBS Television’s “Antiques Roadshow.” Russell Pritchard III and George Juno were experts on the show, giving bad and sometimes good news to people who brought their treasures and junk in for appraising.

    But they used this reputation off-camera to gain the trust of unsuspecting owners of Civil War military-related artifacts. They defrauded people of their valuables by undervaluing their items, reselling them for higher prices and pocketing the profits. The scheme landed them in prison.

    This was just one story shared by Lynne McKee, former manager of the FBI Art Theft Program, on Aug. 27. The Haynes’ Hall at McMenamins Anderson School in Bothell was filled to the brim and standing room only for those who wanted to hear McKee talk about her dealings in recovering stolen pieces. McKee coordinated the investigations into illicit trafficking and recovered more than $300 million in art and antiquities during her eight years as manager.

    The talk was part of Pub Night Talks, a free monthly lecture series cosponsored by the University of Washington Bothell and McMenamins.

    Based on McKee’s presentation, it’s easy to see that art theft comes in many shapes and forms. And the thieves of fine art are of all backgrounds.

    Stéphane Breitwieser managed to steal 239 artworks from 172 museums around Europe, from 1995-2001. His most valuable stolen piece would fetch more than $6 million at auction.

    He was also a waiter who lived with his mother.

    Breitwieser and his girlfriend, in tandem, worked to take the artworks he was enamored with — that was until they got caught.

    While Breitwieser was arrested, his girlfriend called his mother, alerting her that the police had detained the art thief. In response the mother began to destroy the fine works. Some of the art was recovered while some never was.

    In the United States, it’s not typically waiters committing theft from museums, McKee said. Most museum theft in the country is not committed by hardened criminal, but rather internal people who take advantage of storage units where works are stored for years before being put on display.

    McKee also spoke on the many fakes and forgeries she comes across. They’re often offered on the market as being “stolen from a museum in France,” McKee said. “It’s always the same story.” 

    See Original Post

  • September 10, 2019 2:32 PM | Office IFCPP (Administrator)

    Reposted from Buildings

    Internet of Things (IoT)-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking into.

    Since it’s likely less protected, attackers might use any vulnerabilities in your HVAC system’s network to infiltrate your building’s larger network, therefore potentially affecting or disrupting physical operations. This hypothetical situation demonstrates how physical security and cybersecurity can overlap.

    Many companies today still treat their physical security and cybersecurity departments as separate entities. But as more building systems become digitized—from HVAC to access controls—experts agree that it’s time to consider converging on a departmental level to keep up with the technical level.

    “People have been talking about [converging departments] for at least 10 years—having one person responsible for the whole thing,” says Michael Gips, chief global knowledge officer for ASIS International. “The advantages there, they say, are cost savings; more efficiency having one department, one leader, one common mission; and you have cross-training, so physical security personnel is learning about cybersecurity and vice versa.”

    What Is Physical Security vs. Cybersecurity?

    Understanding the difference and what it means is important.

    Physical Security:

    When experts say physical security, they are referring to protecting occupants, equipment, infrastructure, etc., from physical harm. This could include fires, theft or a physical attack such as an active shooter event.


    Also referred to as logical security, cybersecurity refers to preventing unauthorized access to your building or company’s network and data.

    Physical security and cybersecurity have long been treated as separate systems.

    “It used to be years ago that corporate IT departments didn’t want security departments hogging bandwidth—like with alarms and [closed-circuit television] footage,” says Gips. “It would slow everything down. Now with cyber being so vast and storage being much cheaper, it’s not that big of a deal anymore.”

    But what’s more addressed these days, Gips adds, is the convergence of security departments, processes and cultures.

    “The decision-making process within an enterprise has moved away from the traditional facilities or real estate team to IT and the [chief security officer] position—they’re thinking about physical and logical security and combining those with a comprehensive strategy,” says James Segil, co-founder and president of Openpath, a mobile access control system.

    Gips says there are many reasons why many companies today aren’t interested in converging their physical security and cybersecurity departments, including:

    • Perceived cost
    • Not trusting of the other department
    • Fear over lost jobs

    “We’ve found when [companies] do converge, there are far more positives than negatives,” Gips says. “It’s just getting over that hurdle.”

    Where to Begin

    Matthew Bohne, vice president and chief product security officer at Honeywell, reiterates the idea that a departmental convergence revolves around changing the workplace culture.

    “There is culture that we all need to drive, which is inclusivity versus exclusivity,” he says. “Over the years, [physical security and cybersecurity] have been independent of each other. You have to be open minded and drive that inclusive behavior to bring those communities together and share information.”

    Bohne explains that convergence doesn’t have to mean one department, one leader—but rather more effective communication.

    “The answer oftentimes is: Are you allowing good communication? Are you effectively sharing information between those two communities so that things happen correctly? Because there are good reasons why you have a physical team and why you have a cyber team. Sometimes there are challenges with saying, ‘Let’s make them all report to one person.’ That may not work in every case.”

    Bohne recommends these steps when starting the process of convergence.

    1. Know who the players are.

    Does the physical security team have awareness of who the members of the cybersecurity team are, and vice versa? You might find key players don’t want to share information because they don’t know the other team well enough.

    2. Physically bring the two teams together.

    Have a kick-off meeting where the two teams are physically together. They might see they have similar credentials and be more willing to accept security confidence. This can form a sense of trust between the two.

    3. Work through how to communicate better.

    After the initial kick-off meeting, make sure the two teams are meeting regularly to work through how they prefer to better communicate.

    “What I’ve seen happen is that they may start off with an informal meeting, but then will leave it at that and never go back to having those interactions or conversations,” Bohne says. Keep teams accountable.

    4. Offer more cross-training.

    With an ever-evolving digital world, Bohne says companies have an obligation to help teams with training and education. Help physical security personnel better understand cybersecurity best practices and the digital components of your building. Or have cybersecurity personnel do rounds with a physical security team member to see a different perspective.

    “You can get some really exceptional talent out of that,” Bohne says, adding: “That helps glue the communities much closer together.”

    Why Converge Physical Security and Cybersecurity?

    Imagine that one of your security guards is patrolling the corridors at night, and he or she sees a door open that shouldn’t be. And the doors are controlled digitally.

    If the security guard is in tune with that digital access control system, then “if they see something unusual, they can act accordingly,” Bohne says.

    Benefits of converging the two realms include streamlining processes for potential cost savings. Streamlined processes, as well as symbiotic relationships between physical security and cybersecurity leaders, can also cover any vulnerabilities that were there before convergence.

    It can also lead to happier occupants. Building IoT devices and systems bring convenience, and knowing they’re safe and their data is protected brings peace of mind.

    Convergence “improves the user experience, which I think is what we all want at the end of the day when we go to work,” Segil says.

    A Changed World

    As buildings become smarter and more digitized, it’s important that security personnel and procedures keep up with the technological changes.

    “We need to understand that the world is changed,” Bohne says. “There is a changing workforce, which sometimes can make one group or another hesitant to grow this knowledge or expand into that area.”

    People are key. A culture of inclusivity is vital to successfully converging your physical security and cybersecurity sectors, or to just foster more efficient communication between the two. Bohne describes it as a team sport.

    Honeywell took that to heart as it joined the Global Cybersecurity Alliance, created by the International Society of Automation. The goal is to “build awareness, provide education, share best practices and accelerate the development and adoption of cybersecurity standards,” according to a press release.

    At the Global Security Exchange 2019 conference and expo, Gips plans to share with attendees a survey conducted by ASIS International that polled 1,000 chief information security offices, chief security officers and business continuity professionals in the U.S., Europe and India.

    The survey asked, among other questions, if their companies had converged, and if not, why not? If they had, what were the results?

    Gips will reveal the survey results in more detail at the conference, but tells BUILDINGS that the data shows most companies aren’t converged—though many have worked together collaboratively but have not formally converged.

    He adds that it depends on the building or company’s circumstances—the two sectors might be so different that it doesn’t make sense to converge. But effective communication can still bolster security measures and bring a holistic perspective to protecting a building and its occupants and data.

    See Original Post

  • September 10, 2019 2:28 PM | Office IFCPP (Administrator)

    Reposted from Allied Universal

    Clients often ask, how much is enough and how much is too much to spend when designing a security program?

    My usual, tongue-in-cheek short answer is, depends on your tolerance for risk.

    Without question there is always a pressure on reducing the cost of security spend. More and more frequently, enterprises are looking to technology to provide cost-saving solutions for risk mitigation. It is prudent to be cautious when implementing technology because the science is far from exact.

    By the time you realize you’ve underspent it is often post incident.

    Out Factoring Ourselves

    In the span of just over a decade we have gone from the novelty of smart phones to smart houses to now depending on smarter than us virtual assistants named Alexa and Siri to make our lives easier. And, as of July 1, 2019, Florida joined the handful of states that allow self-driving cars on their roads. In the midst of this rapid, ever-evolving tech, we are still nowhere close to approaching the apex of the digital age.

    As AI and adaptive processes streamline our busy lives and revolutionize every industry by enabling businesses to do more with less, it is also, at the same time, eliminating the need for a person to do it. Most of the tech solutions we encounter today fall under the category of the Internet of Things (IoT), but just around the corner is the “Internet of the Body and Mind.” The merging of human and machine is evidenced in recent announcements that 3D printing will soon print artificial hearts and, as Elon Musk hinted in April of this year, a brain-machine interface that hooks human brains to computers is “coming soon.”

    No longer is it so far-fetched to wonder if by creating machines that can learn, are we making humans irrelevant? Competing with machines for jobs is more than pause-worthy. AI combined with machine learning and 5G will unlock data at warp speeds, generating analytics that will overwhelm humans, but not machines.

    Balancing the Products

    While technical solutions can certainly be less costly than employing people, most industries still prefer the thinking human over the well-oiled teaching-thinking machine. Considerations of compatibility, knowledge and skills necessary to help to optimize deployment of new technologies must be prioritized.

    The ideal approach, in this middle stage (possibly golden age) of the digital evolution, especially for corporate security programs, is striking the right balance between technology and people. Understanding the limitations and strengths of each is key. For example, integrated systems help to reduce the delay between data collection, automate analysis and make recommendations that help humans make better decisions. This is technology that serves to improve productivity and enable security professionals to be more responsive and accurate in emergency situations. In another scenario, using mobile robots for monotonous patrols and leverage security personal for engagement and personal customer service delivery is a married solution that capitalizes on what each does best.

    How Much Technology is Enough? How Much is too Much?

    As these new technologies develop there arises a concurrent need for governance that must be consistently, even globally applied. If not humans, who will enforce that? Bill Gates posed an interesting perspective on the notion of robots taking over humans’ jobs: When we work, we pay taxes and generate revenue to support infrastructure and our governments. How will machines replace this revenue source?

    At some point, we may reach the boundary where technology is too invasive and the pendulum will undoubtedly swing back and humans will resist machines. For now, the trick is in finding the equilibrium of people and technology.

    See Original Post

  • September 10, 2019 2:22 PM | Office IFCPP (Administrator)

    Reposted from Toronto Life

    The film adaptation of The Goldfinch, a Pulitzer Prize-winning novel, releases in theatres on September 13. Anyone lucky enough to have been wrapped up in the odyssey of the book will be understandably jazzed: the epic tale follows the journey of Theo Decker, a 13-year-old boy who visited the Metropolitan Museum with his mother the day it was bombed. His mother was killed, and Theo abandoned the building with a painting of a tiny goldfinch. The tragic incident altered the course of his life and sent him on a winding path of guilt, grief, reinvention and, ultimately, redemption. It’s both a touching coming-of-age story and an enthralling drama.

    The film was directed by BAFTA winner John Crawley (who also directed Brooklyn) and stars Ansel Elgort and Nicole Kidman. To celebrate the film’s opening across Canada this fall, and the fact that it will have its world premiere here in Toronto during TIFF, we thought we’d share a handful of nearly-as-riveting stories of real-life works of art that have gone missing.

    Johannes Vermeer, The Concert
    The largest unsolved art heist in modern history occurred in 1990 at the Isabella Stewart Gardner Museum in Boston. Two thieves disguised as police officers tied up a few guards and walked out with 13 pieces of art valued at over $500 million. One of them, Vermeer’s masterpiece The Concert, which they cut out of its frame, remains the most expensive painting ever stolen—it’s valued at $200 million. Painted in the 1600s, the moody piece depicts three figures playing music around a piano. To this day, the FBI is offering a $10-million reward to anyone who has information about the theft.

    Leonardo Da Vinci, Mona Lisa
    In 1911, Italian handyman Vincenzo Peruggia and his two helpers were hired to craft some glass casings for the Louvre. They hid in a closet overnight and strolled out the door with the Mona Lisa. The painting was found two years later, after Peruggia attempted to sell it to an art dealer in Florence. The suspicious dealer turned him in, though Peruggia claimed he was merely trying to return the painting to Italy, the land of its birth, and only served eight months in prison. The media attention from the search for the painting is part of what catapulted it to its iconic present-day status—before the theft, it wasn’t even the most famous painting in the museum. Visitors can still see the Mona Lisa at the Louvre, though probably only over the tops of many heads and iPhones.

    Rembrandt Van Rijn, Landscape With Cottages
    Another huge unsolved art heist, one of the largest in Canadian history, happened in 1972 at the Montreal Museum of Fine Arts. The scheme was like something from an Ocean’s movie: around midnight, thieves clad in ski masks and hoods crept onto the roof of the museum, cut a hole in a skylight and shimmied down a rope. They threatened the guards, tied them up and made off with about $2 million worth of art. The whole thing took about 30 minutes, and they managed to snag a Rembrandt drawing worth about $1 million. It has yet to be recovered, and the thieves were never caught.

    Paul Cézanne, View of Auvers-sur-Oise
    Whoever stole this Cézanne had a flair for the dramatic: the painting was taken moments after the world rang in the new millennium in 2000. It all went down at Oxford’s Ashmolean Museum just after 1 a.m. While the rest of the city was distracted by fireworks and revelry, someone hopped roof to roof before landing above the museum, then lowered themselves down through a skylight (a popular move, apparently) and set off a smoke bomb to obscure camera footage before triggering a fire alarm. The only piece stolen was the Cézanne, and the thief climbed back up the rope and escaped off the roof while the fire department was still en route.

    Vincent van Gogh, Poppy Flowers
    Van Gogh’s paintings are some of the most frequently stolen—at least 13 of them have been taken and recovered, and another 85 remain missing. One of the most famous is Poppy Flowers, which was stolen from the Mohamed Mahmoud Khalil Museum in Cairo in 2010. That was actually the second time the painting had been stolen from the same museum: the first was in 1977, and it was found two years later in an undisclosed location in Kuwait. The Egyptian government released very few details on the theft and the subsequent recovery, although the culprits are said to be a trio of Egyptian bandits. Since 2010, police have been unable to locate the masterpiece, which is currently worth at least $50 million.

    On September 13, we highly recommend hitting up your local theatre to be enchanted by the haunting world of The Goldfinch, which could have been inspired by any of the actual events in this article.

    See Original Post

  • September 10, 2019 1:14 PM | Office IFCPP (Administrator)

    Reposted from Emergency Management and Response - Information Sharing and Analysis Center (EMR-ISAC)

    Organizations, agencies and businesses are at risk from insider threats, employees who may use their position within the workplace to cause the organization or other employees harm through negligence or malicious intent. Examples can include workplace violence, sabotage, theft or unintentionally clicking on an email containing a phishing or ransomware attack. September has been deemed “Insider Threat Awareness Month” by a partnership of federal agencies. The goal of this campaign is to raise awareness of insider threat risks and educate people on how to recognize indicators and report suspicious activities. While many federal agencies and the military may need to focus on espionage, emergency responder agencies could focus more on cybersecurity phishing and ransomware education and employee morale. Unhappy or disenfranchised employees are more likely to commit acts consistent with what is considered an insider threat, including violence. The Office of the Director of National Intelligence (ODNI) offers free insider threat training through its National Insider Threat Task Force. The free training could be incorporated into a staff briefing or internal company training program. ODNI also offers a host of other guides, multi-media and links to other federal resourcesDuring this month, emphasize the importance of safeguarding our workplaces, fellow employees and our nation from the risks posed by insider threats and continue to work diligently to mitigate these risks.

    See Original Post



  • No upcoming events

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection.  All Rights Reserved