INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from Dezeen
A visitor to the Serralves museum in Porto, Portugal, has been hospitalized after falling in an art installation designed by Anish Kapoor.
British artist Kapoor's 1992 piece, Descent into Limbo, features a cube-shaped building with a 2.5-metre hole set into its floor, which is painted black to give the impression of an infinite drop.
An Italian man in his 60s fell over inside the installation at the Serralves, reported local newspaper Público. It is unclear if he fell into the hole or within the general vicinity.
"The visitor has already left the hospital and he is recovering well," a spokesperson from the museum told Dezeen.
The area of the exhibition where the work is displayed has been closed off for repairs.
The museum said all security measures had been followed, including warning signs and a member of gallery staff positioned inside the installation. When the Descent into Limbo reopens the museum plans to add additional warning signs.
Anish Kapoor: Works, Thoughts, Experiments is the first major show for the artist in Portugal, and Descent into Limbo is the oldest of his 56 work's on display in the museum's parklands.
The Serrevales museum, which opened in 1999, was designed by Portuguese architect Álvaro Siza Vieira. Also in the grounds is the Casa de Serralves, an art deco villa and museum designed by architects Charles Siclis with José Marques da Silva in the Streamline Moderne style.
Turner Prize-winning artist Kapoor often plays with optical illusions that create the impression of infinite depths in his work, such as the seemingly bottomless whirlpool he installed in a park in New York in 2017.
The artist, who has been outspoken about opposing Donald Trump, said the piece stood as "obvious" comment on American politics.
In 2016 he acquired exclusive rights to a the blackest black, a pigment developed by British company NanoSystems that absorbs 99.96 per cent of light. Kapoor's attempt to monopolize the color started a feud with fellow British artist Stuart Semple, who has attempted to bar Kapoor from using the "world's pinkest pink" and a color-changing pigment.
See Original Post
Reposted from BW People
A security and safety policy is a must in modern times for every organization. A good security system works like a series of deterrents which are connected to block all possible points of intrusion.
Workplace thrives on trust and often having a transparent policy on security helps people to understand not only the importance of securing workplace but also the critical role each employee plays in its implementation.
Therefore, while it is important to have a robust network of security solutions in place, it is equally important to have a comprehensive policy that outlines how employees can access the premises, the identification procedures for them, and even the process for visitors entering the area.
To create an effective security system an organisation should outline all these security features and detail out the equipment list that is needed while preparing to upgrade the security at the premises.
To give you a broad understanding, the security solution can be categorized into two broad segments of solutions –Premises Security Solutions (PSS) and Physical Security Products (PSP).
In the first category, consultants conduct a threat and risk assessments for clients and recommend solutions. The assessment report spells out specific security measures that can be implemented to ensure better safety. These include monitoring and surveillance systems, which are basically CCTVs, and perimeter intrusion detection systems covering the external walls. Access control is another system we offer for car parks and entrances. It also includes baggage scanners and attendance systems.
Increasingly, many organisations (including SMEs) are deploying security cameras across their establishments to ensure workplace control. They deploy CCTV cameras to prevent unauthorized access, burglaries and theft, and ensure peace of mind during operational hours – and even beyond.
A large number of organisations still have hard copies of important documents. In the wake of recent fire tragedies, the importance of fire and document protection has gained a lot of traction. In a city like Mumbai, where space is a constraint, a fire-resistant record cabinet can be an effective document-securing solution.
Another aspect of security is access to systems, electronic devices, and other sensitive equipment. Organisations following best practices, frame adequate guidelines about this and sets up necessary restrictions on access to sensitive files and information.
State-of-the-Art Systems
Organisations are increasingly realizing the need for a modern security system since a secure work environment makes for a productive one. Employees also demand safety that is seamless and, importantly, non-obtrusive.
Our experts are often asked if installing a camera tantamount to privacy violation. It is legal in most cases to use camera surveillance in public areas. Of course, if a company opts to deploy both video and audio surveillance, in the interest of transparency, it is expected to also put up signs indicating where audio is being recorded and make a mention of these in the security policy.
As security threats evolve, it is important that security systems in place are upgraded to ensure a high sense of security in the workplace environment. In the last few years, security systems have become sophisticated and innovative. Organisations now use an ecosystem of security solutions comprising fire alarm and detection solutions, monitoring and surveillance systems (including cameras and video recorders), and perimeter intrusion detection systems.
An interesting aspect about security these days is that even though it was once thought to be ‘a dead investment’, organisations have realized that it imperative to build trust and reputation, which is impossible without providing a safe and secure working environment.
Ensuring Peace of mMind
A key aspect for a company like Godrej Security Solutions (GSS) is that we constantly use technology at the core of our security solutions. These state-of-the-art systems are continuously optimized and upgraded to suit the needs of consumers while also being receptive to softer aspects such as employee sensibility and safety.
‘Neutronics’ is a new concept which uses a combination of analytics and intelligence. In case of a gun attack, the safe allows access to the unit, while simultaneously sending out silent alert messages to the authorities and owners. This feature ensures that the life of a human is not put at undue risk by raising loud caution.
In summary, comprehensive workplace security has several direct and indirect benefits, not just limited to employees. A secure work environment is one of the key aspects of better employee efficiency, which directly affects customer satisfaction and retention.
The other aspect of having robust workplace security means a reduction in liabilities, insurance, etc. to be paid to stakeholders. It comes as no surprise then that organisations are increasingly paying attention to workplace safety and security.
Reposted from CSO
ESG recently completed a research survey of 400 cybersecurity and IT professionals working at small organizations (i.e. 50 to 499 employees) in North America. As you can imagine, these firms tend to have a small staff responsible for cybersecurity and IT, reporting to business management rather than CIOs or CISOs. (Note: I am an employee of ESG.)
How are these firms doing with cybersecurity? Not so good.
Two-thirds of the organizations surveyed experienced at least one cybersecurity incident (i.e. system compromise, malware incident, DDoS, targeted phishing attack, data breach, etc.) over the past two years.
Nearly half (46%) of survey respondents said security incidents resulted in lost productivity, 37% said disruption of business applications or IT system availability, and 37% said disruption of a business process or processes (note: multiple responses were accepted).
So, small organizations are being targeted and compromised, and security incidents tend to result in a measurable financial impact.
ESG also asked survey respondents to identify the issues that represented the biggest contributors to these security incidents. The data reveals that:
In my humble opinion, it’s time SMB executives realize that small businesses represent an easy mark for cyber adversaries. Criminals target SMBs to extort money or steal valuable data, while nation states use small businesses as a beachhead for attacking connected partners. Hopefully, this ESG research will help small businesses wake up to the dangers they face every second of every day.
Reposted from Atlas Obscura
In the summer of 1980, Robert Kindred was a 35-year-old high school dropout with no plans of going to college. Despite that, scattered in the backseat of his newly leased Cadillac Fleetwood Brougham were half a dozen guides to American college and university locations, each representing a region of the United States. He also had a single volume covering the entire country in his briefcase. A former Boy Scout, he liked to be prepared.
No major American crime requires as much travelling as that of stealing rare books from libraries, a fact Kindred knew from experience. Thanks to wealthy Americans, poor Europeans, two hot wars, and one cold one, the fruits of 500 years of printing came to be scattered across the United States in the second half of the 20th century. And almost all of it could be found on the shelves of some college or university library.
Of course, by the late 1970s, the most precious books and manuscripts in American collections had been put behind locked doors, libraries having learned that lesson the hard way. So Kindred, an antique print dealer, was not in the market for big ticket items, such as a Gutenberg Bible or Shakespeare First Folio. He was interested in the low hanging fruit of the rare book field: 19th-century scientific illustrations. In publications like Ibis and Ferns of North America and Proceedings of the Zoological Society of London, the greatest natural history artists of the 19th century—including J.G. Keulemans and Joseph Wolf—had done their best work, contributing hand-colored lithographs and engravings of the world’s flora and fauna for the sake of science. Even after more than a century between the pages, the illustrations were as bright and vivid as the day they were created.
Kindred knew these books and journals were nearly impossible to find for sale, and prohibitively expensive even when they could be found. So for the sake of his business he turned to the open shelves of academic libraries. The irony is that the easy access granted him by libraries that summer was heir to the spirit of scientific inquiry in which these magnificent prints were created in the first place.
In addition to the college guides, Robert Kindred had a second important reference source in his car: a road atlas. On its largest map, he had circled a series of towns starting just south of Dallas, where he had a storefront. Linked by the Interstate Highway System, the circles went across the south, up the East Coast, and back through the Midwest. It looked like an oblong chain of pearls, clasped in north Texas.
The first circle on that map was College Station, home to Texas A&M University. The Evans Library there housed a world-class collection of 19th-century prints—but not for very much longer. Kindred and his partner Richard Green spent half a day and a handful of razors there, destroying one publication after another for the sake of their illustrations. In one afternoon they destroyed what had taken decades to gather and a century to create. The only thing left behind were the ghostly impressions on the pieces of tissue paper put between pages to preserve the illustrations—and the razors the two men dropped on the floor, dulled from use. The rest went into the hot trunk of the Cadillac, which they then pointed toward Houston, and Rice University.
At Rice their destruction was even worse. That school’s collection of 19th-century scientific illustration was more robust, for one, and the stacks more secluded. From Proceedings of the Zoological Society of London alone they cut out 1,300 prints. But quite beyond their favorites, the Rice collection was so impressive Kindred managed to find dozens of publications he had never seen before. Once he took them, no one at Rice would ever see them again.
After only two days, Kindred and Green had several thousand prints in their possession—enough inventory for several years, if Kindred wanted to turn back to Dallas. But their plan was to be on the road for several weeks, and open a new store in Washington, D.C. Plus, Kindred had already made those circles on the map. So the next day, the two men headed east, toward New Orleans, and Loyola University.
In fits and starts, the pair eventually made it to the nation’s capital. They lingered there for several days, while Kindred looked for a new storefront location, hitting the illustration collections of several local libraries along the way, most notably the University of Maryland, where the pair’s focus took a turn toward the strength of the collection, 19th-century news periodicals such as Harper’s Weekly and Illustrated London News. These were a nice change from natural history, offering a host of other types of illustrations, from ballerinas to baseball to battles of the Civil War. Then they pointed their big car west, toward what they thought was home, but was actually the end of their crime spree.
The third reference source Kindred kept with him was the Union List of Serials, a monumental work detailing the periodical holdings of more than a thousand U.S. libraries. It was the Union List that was most indispensable for the trip, as it was responsible for which towns got circled on his map. Kindred would look up his favorite publications and make a list of which universities owned them. If a certain university had enough of his favorites that it warranted a stop, he found its location in a college guide, called the library to find out its summer hours, and then circled it on the map. And that’s how the two men, weathered by weeks of travel and with a trunk full of stolen prints, decided to spend several days at the end of June in Champaign-Urbana, Illinois.
They would have stopped at the twin cities anyway—Kindred was from nearby, and had family in the area—but they would not have lingered. The prairie of east central Illinois has little scenic appeal in high summer, unless you’re into humidity and vistas of cash crops. But according to the Union List of Serials, the enormous University of Illinois library had nearly everything Kindred desired and a great deal more. What it did not have, however, was open stacks.
So instead of loitering in the library all day, cutting at their leisure as they had done everywhere else, Kindred and Green devised a different plan. Departing from a theretofore successful criminal formula would seem to most thieves to be a bad idea, especially if they were driving a car bursting with evidence of their prior success. But the theft of rare books from libraries has traditionally been so easy that it instills in even the least talented thief the idea that he is a criminal mastermind. So Kindred thought his plan was flawless. He broke in late at night, found a spot in the stacks with the largest concentration of books with prints, picked out his favorites, and then lowered them by rope out a window to Green below.
Unfortunately for him, the books he wanted were enormous, and located on the eighth floor. So gathering them in groups of four and lowering them down the side of the building was more heavy industry than cat burglary. Still, they made the plan work the first night and obtained some $10,000 in books. They were halfway through their second night when bad luck, for the first time in their trip, reared its head.
Once every five nights a university employee came to the large, deserted library in the middle of campus to check the air conditioning unit. Kindred had one packet of four books on the ground and another halfway down the side of the building when that employee swung his car into the parking lot, unaware he was about to put to an end the greatest theft spree of its kind in American history.
Kindred’s capture, and his subsequent prosecution, led to the creation of one more reference source, this one unique: a catalog of the stolen items he kept in the car trunk. Two librarians from the University of Illinois spent the rest of the summer of 1980 in a cramped room in the campus police station trying to make sense of the thousands of loose prints piled and packed in bags and boxes. Before web browsers and online catalogs—and without even access to a telephone to call other libraries—the two men mostly used their bibliographic instincts and a few reference sources to reverse engineer Kindred’s trip and identify the owners of some of the pieces.
Alas, all of their work amounted to nearly nothing. It aided the return of some of the prints to their rightful owners, but the state’s attorney did not use it at all. Kindred pleaded guilty to a single charge in Champaign County, and was sentenced to probation. Green was not prosecuted in Illinois at all, and neither man was prosecuted by any other state, including Texas, where they did the most damage.
Reposted from ASSA ABLOY
Power supply selection is often one of the last decisions made when designing an electrified access control solution. However, selecting the right power supply is as important as choosing the right locking devices and accessories that may be connected to it.
Securitron power supplies offer clean, efficient and reliable power solutions for any application, including options for high efficiency sustainable locking solutions. Available in configurations to support the smallest single door systems to the largest enterprise access control systems.
Click here to learn more and for links to brochures.
Reposted from Genetec
The increase in the amount of evidence gathered from surveillance systems, body cameras, and civilians can help solve crimes. However, it also presents new challenges for the investigation process. With a digital evidence management system that facilitates collaboration between security departments, outside agencies, and the public, you can overcome these issues and speed up investigations in a cost efficient manner.
Click here for a Video and 45-Day Trial
Reposted from FBI.gov
The FBI Art Crime Team is seeking help from the public locating more than 30 items stolen from the home of Gregory Perillo in July, 1983. The pieces are sculptures and painted pictures, featuring southwestern motifs and scenes, and at the time of the theft were valued at up to $700,000.
An anonymous citizen found a piece thrown away in a dumpster several years ago on Staten Island, and called the FBI. Agents believe more of the stolen pieces may be in the New York City area, and the owner may not know they were stolen. Two other pieces were discovered at an art gallery in Manhattan in 1985.
Anyone with information about the theft, or the missing pieces of art, is asked to call the FBI New York Office at 212-384-1000, email NYArtCrime@fbi.gov, or go to tips.fbi.gov. Tipsters may remain anonymous.
Special agents on FBI New York’s Major Theft Squad are investigating this case, serving on the national FBI Art Crime Team. Since its inception in 2004, the FBI’s Art Crime Team has recovered more than 14,850 items nationwide, valued at more than $165 million. Art buyers can review other items on the FBI’s Stolen Art Database at www.fbi.gov.
Reposted from Scoop Culture
The motives, methods and mysteries of art crime will be explored by two of the country’s foremost experts during an eye-opening talk at Waikato Museum this week.
Art historian Penelope Jackson and District Court Judge Arthur Tompkins will share the fascinating stories they’ve uncovered as researchers, writers and teachers of the history of art crime.
Jackson specializes in New Zealand examples of art theft, vandalism and forgery, which are captured in her book, Art Thieves, Fakes and Fraudsters: The New Zealand Story, published in 2016.
“It's not illegal to produce a copy of a painting, but it is a crime to try to sell it as the original,” she says.
“We’ll be revealing the whodunnits of art crime, but also asking, ‘what can we do to stop it’.”
One of Jackson’s favorite cases is the theft of a Solomon J Solomon painting, Psyche, from a Christchurch gallery in 1942, leaving its elegant gold frame behind.
Research for her book, which included Jackson re-enacting the supposed trail of the offender over a wall of the gallery, led to new information about the getaway.
“There is a sense of hope the exquisite gold frame will one day be reunited with the stolen painting, although it is highly improbable now.”
Mr Tompkins’ interest is art crime during war, which he travels to Italy to teach the history of each New Zealand winter.
In 2013, he was alerted that some of his research had been referenced by fiction writer Dan Brown in his novel Inferno, a sequel of The Da Vinci Code.
“It's a small feeling of personal satisfaction that some work you've done has been read by someone else and then turned up in a place that I never would have expected to see it,” he told the Sunday Star Times after the citation was discovered.
Tompkins’ own book, Plundering Beauty: A History of Art Crime during War, was published earlier this year.
Waikato Museum Director Cherie Meecham says Hamilton is privileged to have two of the world’s leading authorities on art crime share their knowledge.
“Penelope and Arthur have traveled extensively in their pursuit of these stories,” she says.
“But the audience will be shocked to find out that Hamilton and the Waikato have art crime skeletons of their own in the closet.”
Reposted from Security Magazine
Almost one in 10 U.S. security professionals has admitted to having considered participating in Black Hat activity, according to the report, "White Hat, Black Hat and the Emergence of the Gray Hat: The True Costs of Cybercrime" conducted by Osterman Research. The study polled 900 senior IT decision-makers and IT security professionals in Australia, Germany, the U.S., U.K., and Singapore about the impact of cybercrime on their bottom line, and also looked at all sides of IT security costs from budget and remediation, to hiring, recruiting and retention.
The study also found that Black/Gray Hats aren't hard to find in today's SOCs. More than half of all U.S. security professionals surveyed (50.5 percent) know or have known someone that has participated in Black Hat activity. This was the highest rate of all countries surveyed. The global average was 41 percent.
"The current skills shortage combined with a steady stream of attacks against antiquated endpoint protection methods continues to drive up costs for today's businesses, with a seemingly larger hit to security departments of mid-market enterprises," said Marcin Kleczynski, Malwarebytes CEO. "On top of this, we are seeing more instances of the malicious insider causing damage to company productivity, revenue, IP and reputation. We need to up-level the need for proper security financing to the executive and board level. This also means updating endpoint security solutions and hiring and rewarding the best and brightest security professionals who manage endpoint protection, detection and remediation solutions."
According to the study, cybercrime incidents are escalating, security budgets are exploding and security remediation costs are skyrocketing:
In addition, midsize companies (500-999 employees) are getting squeezed with massive increases in security incidents and exploding security budgets, but have fewer employees and smaller budgets:
Reposted from NJ.com
Authorities on Tuesday said vandals flooded a World War II-era submarine moored at the New Jersey Naval Museum and stole four memorial plaques from the property.
Intruders intentionally opened hatches throughout the 312-foot U.S.S. Ling, causing the entire inside of the 2,500-ton craft to flood with water from the Hackensack River, according to city police Capt. Brian Corcoran.
The damage reported Tuesday came after officers responded to the Naval Museum in Hackensack a day before, police said. A caretaker found plaques valued at more than $10,000 that honored sailors and the 52 U.S. submarines lost during World War II were pried from a cement casing and stolen.
"The Hackensack Police Department Detective Bureau is investigating this disgraceful incident further, with hopes to locate and prosecute those responsible," Corcoran said in a statement.
The Ling was an exhibit off the Naval Museum located at the former River Street site of North Jersey Media Group, which published The Record newspaper before it was sold to Gannett.
Developers plan to demolish the former Record building to make way for luxury apartments at the 20-acre site, and museum staff were working to relocate. Navy officials collected artifacts from the museum, but the fate of the Ling has been unclear.
Though vandals didn't manage to sink the Ling, the submarine is mired in mud, heavily rusted and in a shallow area of the river, according to NorthJersey.com. The Ling is not included in any redevelopment plan for the property.
The Ling was forced to close after Hurricane Sandy damaged a connecting pier in 2012.
Berthed at the Hackensack site since the mid-1970s, the Balao class submarine never saw combat and was used for training.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us