INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
Reposted from The Washington Post
The gunman who killed more than two dozen people inside a Texas church this month lied when he registered as a security guard earlier this year, according to records released this week.
Authorities have said the gunman, 26-year-old Devin Patrick Kelley, was able to buy firearms because the Air Force failed to tell the FBI that he was convicted of domestic violence at court-martial. Because the Air Force never notified the FBI, Kelley was able to pass background checks needed to purchase weapons, which should have been prevented by his conviction.
Records released Monday show that Kelley also bypassed an application process that involved asking him to be forthright about his personal history, showing that in some cases involving people who seek firearms or employment, the systems rely in part on their honesty — and that lies are not always easy to catch.
Kelley’s life was full of red flags in the years before he attacked the First Baptist Church in Sutherland Springs, using a semiautomatic assault-style rifle to kill 26 people gathered for Sunday morning services on Nov. 5. According to law enforcement officials and police and military documents, Kelley had threatened military superiors and relatives, escaped from a mental health facility, and had been accused of animal cruelty and domestic assault.
After the attack, Kelley exchanged fire with a local man who responded to the gunfire, then climbed into his car and fled, fatally shooting himself before police arrived.
In June, Kelley applied for an unarmed registration to be a noncommissioned security officer, according to his application. He was seeking work as a night security guard at a Schlitterbahn water park in New Braunfels, Tex., the company said. Kelley passed a Texas Department of Public Safety criminal background check before he was hired, a spokeswoman said.
His employment there was short-lived. Kelley was fired after a little more than five weeks — as the summer season was nearing its peak — because he was “not a good fit,” a spokeswoman said.
The Texas Department of Public Safety, which released the application, has described Kelley’s job as similar to a security guard at a concert. The duties included patrolling on foot and on a bicycle as well as providing security by standing at a post. The application released Monday shows that Kelley passed his background check, as Schlitterbahn said.
As part of the application, Kelley also was asked several questions about his personal history. Kelley wrote that he was not discharged from the military, which is untrue.
In 2012, Kelley faced an Air Force court-martial after he was charged with abusing his wife and her son, giving the toddler a serious head injury. He was convicted on two charges of domestic assault and served his time at a Navy brig in San Diego. (The Air Force does not operate prisons.) In May 2014, Kelley was given a “bad conduct” discharge with the duty title of “prisoner,” the Air Force said.
Kelley also wrote in his security officer application that he had not been convicted of a felony level offense or a Class A or Class B misdemeanor or equivalent offense. While military law does not classify crimes as felonies or misdemeanors, Kelley’s domestic-assault sentence was functionally a felony conviction, according to Geoffrey Corn, a former Army lawyer and professor at the South Texas College of Law in Houston.
Kelley’s case has highlighted a problem with the FBI background-check system, which is missing millions of records of convictions and mental-health diagnoses that would keep guns out of potentially dangerous hands. As the security guard application also shows, these systems are fallible, asking people to submit honest information and then hoping any lies can be discovered. In Kelley’s application, he pledged that his information was accurate and agreed that he understood “any false statement made on this document or any other supplement . . . may result in criminal prosecution.”
As is the case with many teenagers, Kelley first encountered law enforcement officers through traffic stops. He received two tickets at age 17 for speeding and failing to stop at a stop sign, Comal County records show.
In August, John Donahue, a Comal County deputy constable, noticed an expired registration sticker on Kelley’s white Ford Expedition and pulled him over.
“The sticker had been expired for eight months, and then I found out he was uninsured,” Donahue told The Washington Post. “I towed his vehicle. He wasn’t happy about it, but he was just passive about it. It was kind of unremarkable.”
Donahue said Kelley used his cellphone to call a relative for a ride and declined to wait in the back of the patrol car, despite it being a “hot day in August,” Donahue said. He didn’t recall who picked Kelley up, nor does he know the family, though he lives nearby.
“He was not a happy camper,” Donahue said, “but he didn’t give me any cause for concern — no furtive movements, no verbiage, no threats.”
Donahue said the constable’s office doesn’t have in-car computers, so he would not have been able to see the county’s record that flagged Kelley for having psychiatric issues. Kelley cleared his tickets by bringing in proof of insurance and registration in September.
That Ford Expedition appears to be the same vehicle Kelley used to travel to the church and then flee after the massacre. According to court documents filed last week, after the church attack and the shootout that followed, law enforcement officials found the Expedition off the roadway.
Kelley had apparently toppled over after shooting himself, his head lying on the dirt outside his door while his legs remained on the floorboard inside the car. A pistol was found under his feet, while his iPhone was sitting nearby. Authorities have been unable to unlock the phone, but officials said this week that the FBI appears unlikelyto try to make a federal case out of forcing Apple to unlock the device.
See Original Post
Reposted from Niagara Gazette
From a student with an apparent obsession for his professor's Stradivarius to an art restorer with some very sticky fingers, members of an elite FBI squad scour the U.S., and even the world, to hunt down missing treasures.
Formed in 2004, the FBI's Art Crime Team, based in its New York City field office, has scored some incredible successes in the past dozen years.
"It's a very small percentage of what the FBI does," Special Agent Christopher McKeogh, told a gathering at the Castellani Art Museum at Niagara University this past week. "But we have the support (of the bureau) to do what we have to do."
The FBI estimates that the losses from theft, fraud, looting and trafficking in art and cultural objects can reach billions of dollars annually. And those losses can range from hundreds or thousands of dollars for unsuspecting consumers looking to find a good deal on a painting or print online to millions of dollars for the victims of sophisticated thieves.
McKeogh recounted his involvement in the investigation of Robert Lui, who worked as a painter and art restorer for a large art wholesaler.
"So Lui retired (from working for the art wholesaler) and moved to Texas," McKeogh told his audience. "And shortly after that, (his former employer) found missing art work (from the wholesaler's collection) on Lui's eBay page."
The wholesaler estimated that he was missing about 150 pieces of art.
With evidence from Lui's web page showing that he may have taken the art, FBI agents prepared to raid his Texas home. McKeogh said his team went to execute a search warrant expecting to, probably, find more than 150 items.
"We brought enough supplies (to collect and seize) 300 items," McKeogh said.
Once inside Luiu's home, the FBI agents discovered 2,315 paintings, sculptures and other works of art taken from the wholesaler. The value of the stolen items reached close to a million dollars.
"Victims frequently have no idea of the scope of the thefts," McKeogh said. "Sometimes they don't keep good records or up-to-date inventories."
He suggested that folks who have a passion for collecting art, even if it's not of the multi-million dollar variety, use caution in their buying and maintain meticulous records.
"Here's a tip," he said. "When you hear 31 pieces of undiscovered art have suddenly shown up on the market, that means they're not real."
He said the art of modern painters, like Jackson Pollack, is more likely to be copied than that of Van Gogh or da Vinci.
"The old masters are rarely copied,"McKeogh said.
However, if your tastes run to older art works, McKeogh suggests you resist the urge to rely on forensic testing to determine authenticity.
"It tends to be very expensive and we've found that, if you spend enough, you can get someone to authenticate (the work)," he said. "Use the (paper records of the art work's origins and sales or transfers) instead. And beware anything you buy online. Don't buy (fine) art on eBay."
McKeogh said his team has had great success in recovering and returning plundered art work from World War II. Part of the reason for that, he said, was that the Nazi's kept lots of detailed paperwork on the art they stole.
Sometimes, McKeogh, said stolen treasures are recovered when the thieves die and relatives go looking for an appraisal of their ill-gotten goods. That was the case when agents found a missing 1734 Ames Stradivarius.
The violin had been swiped from violinist and educator Roman Totenberg, the father of National Public Radio's Supeme Court reporter Nina Totenberg, after a 1980 concert. It remained missing for 35 years.
That was when the ex-wife of former Totenberg student, Philip S. Johnson, discovered the instrument among his possessions following his death. She took the violin to be appraised and it was instantly identified as the Totenberg Stradivartius.
McKeogh and his team stepped-in and returned the violin, estimated to be worth $5 million, to the Totenberg family.
It's been restored and has even been played again, in concert by another former Totenberg student.
During a question and answer period, the audience peppered McKoegh with questions about the still unsolved and infamous theft from the Stewart Gardner Museum in Boston. The four-hour theft of 13 works of art, valued at around $500 million, is not being handled by the Art Crime Team.
Agents from the FBI's Boston field office are continuing to hunt for the two suspects who committed the crime.
None of the art taken from the Stewart Gardner Museum has been seen, or offered for sale, in the last 27 years. That led to a final question for McKeogh — Why take stuff you can't sell?
"That's the $64 thousand dollar question," he said with a smile. "You have these valuable items but what do you do with them? You can't sell them and they're so well known, you can't just hang them on your wall. I hope some day they'll be recovered."
Reposted from Defense Web
The United Nations Security Council this week focused its attention on global efforts to stop the traffic in and destruction of cultural property, with the head of the UN Educational, Scientific and Cultural Organization (UNESCO) setting out steps to protect cultural heritage and ensure it serves “as a source of belonging and peace for all people in times of conflict.”
In her briefing, recently appointed UNESCO Director-General Audrey Azoulay, highlighted the Secretary-General’s first report on the adoption by the Council of resolution 2347 (2017), which, among others, condemns destruction of cultural heritage and the looting of cultural property.
The resolution also encourages Member States to take preventive measures to safeguard cultural property in the context of armed conflict and “take appropriate steps to prevent and counter the illicit trade and trafficking in cultural property and other items of archaeological, historical, cultural, rare scientific and religious importance originating from armed conflict areas, notably from terrorist groups.”
“The adoption of 2347 of 2017 is a breakthrough and testifies to a new awareness of the importance of culture to respond to conflicts, to prevent radicalisation and fight violent extremism,” Azoulay said adding she is encouraged by Member States’ strong actions to implement it and other Council measures that together provide key aspects in the response against terror and hatred.
“In a short time span, 29 Member States shared information on new actions to protect cultural heritage, strengthen tools and training of specialised personnel, reinforced international co-operation and information sharing,” she said.
Calling these “positive signals of deep change,” Azoulay noted that more needs to be done.
The UN cultural agency chief pointed out of 82 UNESCO World Heritage sites in the Arab region, 17 are on the list of World Heritage in Danger due to armed conflict.
“Over 100 cultural heritage sites across Iraq have been damaged. All six Syrian World Heritage sites have been severely affected, including Palmyra and Aleppo, one of the oldest cities in the world, now reduced to rubble.”
“In all this, I pledge again UNESCO’s determination to support Member States with the necessary tools and policy advice,” she said.
Vladimir Voronkov, Under-Secretary-General of the UN Counter-Terrorism Office, explained how terrorists, particularly in armed conflict situations, destroy not only lives and property but in targeting World Heritage Sites, they attack historical roots and cultural diversity.
“The goal is obvious – to undermine national identity and international law, Heritage constitutes a source of identity and cohesion not only for particular communities but the world community.”
He linked looting and illicit trafficking of cultural objects with financing of terrorism, noting a number of resolutions and legal frameworks to address these crimes.
“Protecting our cultural heritage requires us to make every effort to implement this international legal and normative framework by strengthening international co-operation,” he said, suggesting an “All of UN” approach as key for effective action.
He advocated stronger focus on investigation, cross-border co-operation and exchange of information as well as including private and public-sector partners to promote supply chain integrity and stop the illicit sale of cultural property.
“We must take the opportunity to strengthen efforts to better safeguard vulnerable cultural property in conflict areas, as well as pursue longer-term measures to prevent terrorists and criminals profiting from trafficking,” he said.
There was a need to help countries detect stolen cultural property and improve international co-operation in investigation, prosecution and adjudication of trafficking in cultural property cases.
“Only in this way can we protect precious cultural heritage from being lost forever,” he said.
Reposted from Wales Online News
War museum volunteers displayed the true “blitz spirit” when vandals targeted their premises for a third time.
Staff and helpers at Barry War Museum refused to the latest break in stop their fifth anniversary celebrations and they continued with a 1940s singalong and afternoon tea despite “mindless” criminals having earlier attempted a break-in.
But organisers branded the vandals’ actions “despicable”, and warned they were disrupting the future plans of the museum.
As they prepared for their landmark celebration at Barry Island Station on Saturday, they found someone had tried to prise a door open at a nearby building which they hope to take over.
The attack took place at the Plymouth Road Exhibition Building, which has been earmarked for an extension of the museum.
Two previous incidents have already put the group’s plans on hold.
John Buxton, managing director of British Tourist Railway. said: “We noticed the damage on Saturday.
“Someone could see that someone had tried to prise the door open. We have had two vandal attacks there. It used to be used to store railway vehicles. There were more things there but we moved them following the other incidents.
“The people who did this would have been disappointed this time as there wasn’t much there.”
John, 65, explained the group felt “huge disappointment” at the news but, in true wartime spirit, they were determined not to let the “despicable event” dampen their mood. Members of the group continued to sing along to 1940s songs.
Even though the event went ahead John said the group really wants justice to be served.
He said: “In the past, thousands of pounds worth of damage has been caused.
“Things have been broken and graffiti has been left. People have put so much effort into our project – telling the history of Barry in terms of the community, the docks, the railway and the two world wars.
“The town has a great history, but few people know it’s rich and interesting story.
“While we have been working to this end, there are others who have been seriously undermining our efforts but we shall overcome. It’s such a shame that these mindless vandals are delaying our plans.
“These people must be caught or the whole community will be the loser.”
South Wales Police confirmed the unit was targeted by vandals. The door was forced open and the interior vandalized with graffiti. Anyone with information is urged to contact 101 quoting reference number 463447.
Reposted from Security Info Watch
A Manhattan mile transformed into a killing field yesterday afternoon when a man rented a pickup truck and carried out his jihad. “Rent me starting at $19” read the sign on the grotesquely bent truck, a painful testament to the disproportionate economies-of-scale of asymmetric warfare. In the city where law enforcement, intelligence, and anti-terrorism capabilities have been constant since 9/11, bent bicycle frames littered the streets like post-carnival decorations. Eight innocents died before the pickup hit a school bus and came to a halt.
Reporters and anchors are asking, “what could law enforcement have done to prevent this attack?” The important thing to know is that law enforcement and intelligence personnel have been and continue to do everything they reasonably can within their scope of authority. This attack was not due to any failure on their part.
The three required elements of a crime in U.S. law are motive, means, and opportunity. The motive is wide-ranging but for consideration herein, we assume that motivation exists and is sufficient to embolden a deadly-force attack on others. Law enforcement and intelligence efforts (combined with coordinated preventative/defensive security measures) have ramped-up nationwide since 9/11, to the point that meansand opportunity requirements for significant terrorism exceed the capabilities of most adversary groups. While no locations can be secured against all threats; protective money, time and effort have been allocated in a prioritized, methodical, and deliberate manner nationwide.
Tuesday’s attack is an unfortunate but poignant side-effect of responsible government resource prioritization; increasing means requirements and reducing opportunity at larger targets has shifted the available target opportunities to softer, smaller targets like the Manhattan bicycle path. As larger targets were hardened, smaller and “softer” targets became more attractive to adversaries.
This attack was enabled by minimal means requirements; a common vehicle with everyday operational skills was all that was needed. Minimal complexity, planning, logistics, communications, timing, secrecy, or funding thresholds stood in the way of success. Even a police traffic-stop 100 feet from the attack starting point would have been almost irrelevant. As the perpetrator was unassuming and law-abiding up to the moment of attack, police and intelligence personnel did everything in advance that could be asked of them.
The real chance to increase public safety in this and in many similar soft-target scenarios lies with the security designer and civil engineer. Engineering and traffic controls combined with architectural and security elements will reduce opportunity and increase means requirements. These classic force protection principles are neither cost-free nor 100 percent effective but are wisely employed in a distributed fashion providing reasonable protection at a reasonable cost. When optimized for each municipality (or town, park or business), they will increase security and safety while limiting cost and potential liability.
Urban planning and public safety concerns are converging; hardening critical infrastructure has left smaller, softer targets (including pedestrian and bicycle paths) as low-hanging fruit for opportunistic perpetrators. Terrorist organizations have actively spread these targeting suggestions to their followers, and the threat will persist for the foreseeable future.
This iteration of public security enhancement is in the hands of the planners, designers, architects, engineers, and law enforcement liaison personnel. Soft targets need not remain vulnerable, nor do they have to be transformed into unusable, unwelcoming space in order to provide safety.
See Original Post
Reposted from SHRM.org
Even the best workplace security plan is ineffective if no one knows about it. That doesn't mean employers need to walk their staff through a security plan in detail. Rather, it means they should make sure that employees are trained on their roles in the plan and that they understand what to do in an emergency.
All employers should have their employees watch the FBI's video "Run. Hide. Fight." This video details what the FBI now recommends when a shooter enters the workplace. The video instructs employees to try to get away if they can.
If they can't escape, they should hide and use barriers to prevent the shooter from getting to them. As a last resort, they may have to fight the shooter.
It's a powerful and alarming video, but it's a great way to get employees thinking about how to react in a nightmare scenario.
After I watched the video for the first time, I decided to figure out where I would go should there be an emergency at my workplace. I recommend that employers train their workers how to evacuate the building after watching the video. Businesses also need a contingency plan for employees with disabilities who have difficulty using stairs.
[SHRM members-only toolkit: Developing Effective Safety Management Programs]
Have a Written Plan
If employers don't have strong written policies prohibiting threatening behavior and weapons in the workplace, they are vulnerable.
Workers need to have confidence that their reports will be taken seriously, that their identities won't be divulged unnecessarily and that leaders will take appropriate action, even if workers don't always hear what that action is.
So if employees lack confidence in their manager to handle a threatening situation or to report such incidents, employers may want to appoint a more senior person or an HR representative to field concerns.
Further, employers might want to set up a hotline where employees can anonymously report concerns. Whatever method they choose, businesses must make sure that employees understand that they must respond immediately and diligently if they perceive a threat.
Employers must make sure that the plan is disseminated to all workers through multiple means, including printing the plan in the employee handbook, posting it on workplace bulletin boards and giving it to employees on a card they can carry in their wallets.
Explain Employee Resources
If an employer contracts with an outside hotline service, it should make sure employees understand that the service is provided by a third party, that it is anonymous and that there will be no retaliation against employees who report to the hotline. Employees should know where to find the hotline number and should be told that the company's senior managers have sanctioned the hotline or other reporting method.
It's a good idea during training to review scenarios that employees might want to report and to explain that they should err on the side of over-reporting.
Finally, I recommend additional training for managers, particularly with regard to employee terminations. Firing an employee can be an emotionally charged experience, and managers need to know how to handle terminations to reduce the risk of violence.
Such training can also explore how to handle firings in a way that reduces the risk of an employment lawsuit.
See Orginial Post
Reposted from Fifth Domain
Some 25 percent of emails claiming to be from the federal government are either unauthenticated or malicious, according to a new report from cybersecurity firm Agari.
In the report, Agari notes federal agencies will continue to suffer from excessive malicious emails without the usage of proper Domain-based Message Authentication (DMARC) monitoring policies. The company concluded that 90 percent of the 400 federal domains are vulnerable to these types of threats.
Agari believes that this is because 82 percent of federal domains do not use DMARC email authentication standards. This factor increasingly leaves constituents vulnerable to phishing and general email-based cyberattacks that can involve the theft of passwords, installation of ransomware, or the conning of users to send money.
DMARC is an email authentication system that discovers and potentially rejects unauthorized emails that appear from organization controlled domains before reaching the intended recipients. The U.S. Department of Homeland Security issued a binding operational directive this week that ordered DMARC usage as a part of a greater mandate to increase federal agency email and web security.
Agari showcases how even the few federal domains that do have DMARC programs are still vulnerable to virulent email activity, as they do not have a strict “reject” policy.
About 9.3 percent of federal DMARC domains have policies that only “monitor” authentication abuses and not block them. Furthermore, less than 1 percent of DMARC domains have a “quarantine” (spam folder) policy, and only 8.9 percent have the “reject” policy. Agari emphasizes how DMARC cannot be effectively used in a federal domain without having “quarantine” or “reject” policies.
Reposted from IFSEC Global
Marking the one-year anniversary of a fire that destroyed the UK’s oldest hotel – the Royal Clarence Hotel – the FRS is emphasizing the importance of conducting regular fire-risk assessments.
(In the wake of the Royal Clarence Hotel blaze, fire safety consultant Alan Cox posed a series of questions that need answering if lessons are to be learned.)
Built with long-abandoned methods and materials, heritage architecture poses unique challenges and risks in the built landscape when it comes to fire engineering.
Things become more complicated still as structures are reinforced and adapted for modern use over time.
And the cost of damage caused by fires extends beyond financial costs to the loss of priceless architecture and artefacts of enormous cultural import.
“Older buildings have unique features such as hidden voids and cavities supported by dry timber construction,” said Paul Bray, community safety protection manager at Devon & Somerset FRS. “Fire can easily travel undetected within these voids.
“The challenges of fighting a fire in a terrace of ‘heritage’ or buildings of substantial age are substantial. The fact that the fire is hidden also makes it almost impossible to tackle internally and externally without a major dismantling of the building fabric.
“Heritage is all that has been passed to us by previous generations. The term has become synonymous with the places, objects, knowledge and skills we inherit that are valued for reasons beyond their mere utility.” Historic England
While responsible persons are limited in what they can do to protect buildings that were built with little consideration for fire safety, there are still measures they can take to reduce the risk and impact of fire, suggests Bray.
“Even with the most attentive fire prevention and protection measures (such as fire alarms and fire separation), it cannot always be guaranteed that a fire will be contained and prevented from causing destruction. It can be significantly reduced through by the development of a comprehensive pre-survey of the impact on surrounding buildings during the construction phase.
“We therefore advise that a full set of records, drawings, photos and other information is stored and is made available to us for use in any heritage building in the event of a fire. This would contribute to forming the basis of how the service will deal with each building in the event of a fire.”
Devon & Somerset FRS notes that there is no standardized format for recording or presenting the findings of a fire risk assessment. However, those responsible for protecting heritage buildings should always produce and regularly review clear and comprehensive documentation. Once the risks are identified and assessed, they can then set out to reduce them.
Fire risks in heritage buildings
Devon & Somerset FRS has set out the following risks to consider relating to heritage buildings:
Sometimes seen as disruptive to the building’s original fabric, protective measures taken are not always welcomed in the heritage sector, admits Devon & Somerset FRS. Physical installation of systems can also be seen as challenging.
However, you can take suitable protective measures that are sympathetic to the building’s historic fabric of the building.
The fire safety management plan should incorporate a business continuity plan, Devon & Somerset FRS advises. Should a fire occur, restoration work can then proceed promptly.
Being prepared for the worst-case scenario will vastly improve your chances of recovering quicker recovery rate.
Devon & Somerset FRS offers further guidance on heritage buildings here.
Reposted from NSCC November 15, 2017 e-newsletter
The October 15, 2017 Collections Caretaker Newsletter had an item titled Museum Boards -- Leadership Wish List. It echoed many of the issues explored in my PhD research on museum leadership (1994-98) published as Leading With Passion: Change Management in the 21st Century Museum(2004 - Alta Mira Press).
Chapter 5 in Leading With Passion focuses specifically on trust and the director-trustee leadership interface. It's a fraught interface. Two levels cooperating, colliding, and colluding. It's important to nurture relationships of trust. Accept there will always be conflict, especially during periods of change. There will also be predictable role confusion - who does what, when, and where. Effective conflict resolution skills and practicing principles of restorative justice can help repair damaged relationships. Clarify governance. What does this actually mean? What does it look like when it is working well? Sort out who does what re: policy development, financial planning, and legal responsibility so there are no surprises described in the press.
Finally, get a handle on succession planning for both levels of leadership-- museum directors and trustees. I had a meeting in September 2017 with a mentor from the Emerging Leaders Program funded by the Australia Council for the Arts. The mentor shared issues from the 2017 program compared to issues identified in my research for Leading with Passion (1998 - 2002). There is still a shallow pool of potential leaders for both museum director and trustee roles. Twenty years ago, I offered advice that every director and trustee needs to mentor at least six (6) people to 'take their place' over the next ten years. Whether these people applied for and landed the jobs was not the point. This is what the Australia Council for the Arts has to say about their program: 
Over the years Australia Council programs such as the Emerging Leaders Development Program (ELDP) have made a positive impact on the sector and individual careers. As with many capacity building investments, the full extent of the impact of these programs will be realized over the long term. The Australia Council is now working in a different funding environment and has reinforced commitment to supporting the sustainability and capacity of the sector. To ensure our investment is focused, a new strategic approach has been adopted to deliver leadership development. In 2015, the Australia Council completed detailed needs analysis by consulting with various arts leaders including alumni from existing programs. These arts leaders identified the need for a bespoke program to develop their leadership capabilities. We are continuing from an existing base of capacity building programs and will draw on the expertise as well as address the needs of past alumni in future program developments. Participants of the program will have access to a wide variety of internal subject experts with deep sector knowledge and expertise.
Twenty years ago, we needed to create a pool of potential leaders for director and trustee roles. It is a perennial challenge!
Reposted from WBFO.org
Authorities say Daniel Witek, 54, was a volunteer at the museum in the spring of 2013, when he stole historical writings addressed to Anson Conger Goodyear. Witek then offered to sell the stolen documents to autograph dealers in New York City and New Jersey.
Born in Buffalo, Goodyear was a businessman, military officer, postwar European relief executive and humanitarian, author, founder of the Museum of Modern Art and collector of modern paintings, rare books and historical manuscripts. The Goodyear family in America is traced back to Stephen Goodyear, a founder of New Haven, CT and deputy governor of Connecticut from 1643 to 1658.
His historical documents include family correspondence, diary and scrapbooks, speeches and writings, business papers and military-related correspondence.
Witek was convicted of mail fraud, sentenced to six months time served and ordered to pay $2,100 in restitution.
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667
Copyright © 2015 - 2018 International Foundation for Cultural Property Protection. All Rights Reserved