Stealing Culture to Support Terrorism

Stealing Culture to Support Terrorism

We’ve all read the headlines. Someone’s arrested for attempting to sell ancient coins, a thousand year-old sword, or a piece of pottery made by an ancient civilization. It is a form of organized crime few people understand. The stealing of cultural artifacts. Cultural artifacts are defined as anything made by people that provide valuable information about a society’s culture. 

As well as being a form of organized crime, the theft and sale of cultural artifacts is used to fund terrorism.  For example, the Islamic State of Iraq and Syria (ISIS) has been looting archeological sites in Iraq and Syria. In areas under ISIS control the group has allowed inhabitants to loot historical sites as long as they provide ISIS with a portion of the their profits. While profiting from cultural artifacts has enabled ISIS to diversify its income, it has devastated Syria’s cultural heritage.  

Homeland Security Investigations, a part of U.S. Immigration and Customs Enforcement, plays a major role within the Department of Homeland Security for the investigation, seizure, and prosecution of people attempting to import, export, and sell cultural artifacts in violation of law. HSI’s Cultural Property, Art and Antiquities Program is unique within its broad investigative portfolio. HSI has specially trained agents that have learned the latest techniques and methods for conducting investigations into cultural heritage crimes. Federal importation laws give HSI and Customs and Border Protection the legal authority to investigate cultural heritage crimes and seize those artifacts if they have been imported or exported in violation of law.   

The methods for selling cultural artifacts vary. Many cultural artifacts have been found on eBay and Craigslist by HSI agents. Undercover agents have posed as potential buyers and subsequently arrested people attempting to sell these items. Reputable auction houses have also been used as a vehicle to sell cultural artifacts stolen from countries by professional thieves who then pose as legitimate sellers to auction houses.  

Seized cultural artifacts are returned to their home countries and restored to museums, where people can appreciate their cultural heritage for generations to come.

Contributors

Steve Farquharson | Steve is a Senior Associate currently supporting information sharing solutions to improve intergovernmental communications, special event management, and operational support among homeland security and law enforcement agencies. At Arc Aspicio, Steve contributes to strategic initiatives, recruiting, and external communications and comes from long federal government career specializing in homeland security, border security, immigration, and law enforcement operations. He worked for the former Immigration and Naturalization Service and the US Department of Homeland Security and retired from public service as a senior executive for US Customs and Border Protection. Steve is a graduate of the University of Massachusetts.

Reinventing Strategy

Reinventing Strategy

Since the GPRA Modernization Act in 2010, agencies across the Federal Government have raced to establish new Strategic Plans in response to incoming Presidential Administrations and agency leaders. Developing a new Strategic Plan is incredibly exciting for an agency. Leaders can redefine priorities, frontline managers can improve mission performance, and employees can better engage with the mission. Strategy, however, is so much more than just a Strategic Plan.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Effect Action

Behavioral Science – Using Behavioral Science to Effect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.