29.01.2013 Views

The whole publication in PDF - Culture in Development

The whole publication in PDF - Culture in Development

The whole publication in PDF - Culture in Development

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

historic build<strong>in</strong>gs (Peic et al., 19 99). In warfare the paper heritage is rep eatedly reduced as available sources for fire,<br />

l<strong>in</strong><strong>in</strong>gs for damp floors, wrapp<strong>in</strong>gs for market goods and even toilet paper (Rhys-Lewis, 1999).<br />

<strong>The</strong>ft is not only a big problem for archives and libraries. Every day museum curators are offered stolen art and<br />

the illicit trade <strong>in</strong> non-western art especially is <strong>in</strong>creas<strong>in</strong>g hand over fist. As long as there is a ready market for illegal<br />

art <strong>in</strong> Europ e and No rth America it is difficult for the develop<strong>in</strong>g countries to stop the theft of objects. In western<br />

countries a lot of mone y is spent on technical measures to protect the collection. But even if the government of a<br />

develop<strong>in</strong>g country can afford the most advanced security measures to prevent art from be<strong>in</strong>g taken out of the<br />

country, the attraction of easy money is likely to corrupt law enforcement agencies anyw ay. Only if public<br />

<strong>in</strong>stitutions refuse to buy illegal art will it be possible to stop illegal art deal<strong>in</strong>g (Eyo, 1986).<br />

S<strong>in</strong>ce 1997 the Object ID project has enabled museums and art-dealers to check whether an object is stolen or<br />

not before purchase. <strong>The</strong> goal of the programme is to realise an <strong>in</strong>ternationally accessible and efficient <strong>in</strong>formation<br />

system. An effective control system <strong>in</strong>cludes accurate documentation, identification and registration of stolen art.<br />

At the same time it is an <strong>in</strong>ternational standard for describ<strong>in</strong>g cultural objects. It is promoted by major law<br />

enforcement agencies (FBI, Scotland Yard, Interpol), museums, cultural heritage <strong>in</strong>stitutions, art trade and art<br />

appraisal organisations, and <strong>in</strong>surance companies. In 1999 the Object ID project found a new ho me at the Co uncil<br />

for the Prevention of Art <strong>The</strong>ft (CoPAT) (see Object ID website).<br />

KIT <strong>Culture</strong> (Kon<strong>in</strong>klijk Instituut voor de Tropen), <strong>in</strong> the Netherlands runs a program me to <strong>in</strong>troduce a digital<br />

registration system <strong>in</strong> museums <strong>in</strong> develop<strong>in</strong>g countries. <strong>The</strong> aim is to curb illegal trade <strong>in</strong> cultural heritage. It has<br />

developed a museum documentation system for use <strong>in</strong> museum s <strong>in</strong> fourteen co untries <strong>in</strong> Africa, A sia and Lat<strong>in</strong><br />

America. In each museum a computer is <strong>in</strong>stalled with specially developed Object Identification (ID) software and<br />

a digital camera, the so-called KIT Object ID kit. One press of a button can <strong>in</strong>form Interpol and custom authorities<br />

that an object is miss<strong>in</strong>g. In this way, <strong>in</strong>formation travels faster than the stolen object (KIT <strong>Culture</strong> website).<br />

<strong>The</strong>re are a number of databases published on the <strong>in</strong>ternet that register stolen art and books, like the private Art<br />

Loss Register (ARL), the Red List of ICOM that concentrates on the loot<strong>in</strong>g of archaeological objects of Africa, and<br />

Interpol (see Portes, 1996 and UNESCO, 1995). Most of these can also be reached through the websites of Object-<br />

ID and Museum-Security Network.<br />

<strong>The</strong> precautions to curb theft are often called security measures. Security measures can be high-tech like<br />

surveillance cameras and electronic locks, or low-tech like limited access to stack areas, bars on w<strong>in</strong>dows, traditional<br />

locks and gates, human guards and staff surveillance (Bellardo, 1995). Controlled access for current users ensures<br />

the availability of records for future generations (Read, 1994). A weak po<strong>in</strong>t <strong>in</strong> ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g any security system is<br />

the malcontents who may seek retribution through theft, destruction, or wilful mishandl<strong>in</strong>g of collections<br />

(Anonymous, 1999).<br />

In addition to technical methods of protection archives should issue security regulations. To enforce the rules,<br />

read<strong>in</strong>g rooms and the entrance should be supervised. A registration procedure for visitors and general rules of<br />

conduct should be part of the security regulations. W arn<strong>in</strong>g signs might help too and are usually a good rem<strong>in</strong>der<br />

of the rules. Experience teaches that storage rooms should not be accessible for all staff and strict adherence to<br />

procedures on key sign-out and sign-<strong>in</strong> for locked areas is necessary for proper security (Duche<strong>in</strong>, 1988; L<strong>in</strong>g, 1998;<br />

Storey et al., 1989; Thomas, 1987; Tr<strong>in</strong>kaus-Randall, 1995).<br />

<strong>The</strong>re are also rules on how an archivist should handle the case of patron theft (Totka, 1993). Guards play an<br />

important role <strong>in</strong> ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the security of archives, libraries and museums but guards are not fully tra<strong>in</strong>ed <strong>in</strong><br />

security duties <strong>in</strong> all countries. If they are semi-literate it is possible that they are unable to identify passes and<br />

identity cards (Baxi, 1974a). <strong>The</strong> presence of tra<strong>in</strong>ed security personnel on-site has made a real difference <strong>in</strong> a<br />

number of libraries – it has even saved lives (Soete, 1999).<br />

<strong>The</strong> design of the build<strong>in</strong>g can help to reduce the danger of crime. <strong>The</strong> read<strong>in</strong>g rooms should be designed <strong>in</strong> such<br />

a way that it is possible for the staff to supervise the public (L<strong>in</strong>g, 1998; Duche<strong>in</strong>, 1988). It should be remembered<br />

that all security measures <strong>in</strong> the build<strong>in</strong>g design are only as secure as the quality of the materials and build<strong>in</strong>g<br />

techniques. For example a lock is worthless when the materials used to construct the door, cab<strong>in</strong>et or w<strong>in</strong>dow to<br />

which they are attached, are of <strong>in</strong>ferior quality (Dixon, 1999).<br />

Though published quite some time ago, it might still be <strong>in</strong>terest<strong>in</strong>g to read the issue of the UNESCO journal<br />

Museum, 1974 26(1), entirely dedicated to theft. A selected bibliography on art theft is available on the Museum<br />

Security website. On the same website you will f<strong>in</strong>d an electronic bibliograp hy of URL ’s on Archaeology,<br />

Antiquities, <strong>The</strong>ft, and Loot<strong>in</strong>g, and <strong>The</strong> Loot<strong>in</strong>g Question Bibliography: Web and Literary Resources on the<br />

Archaeological Politics of Private Collect<strong>in</strong>g, Commercial Treasure Hunt<strong>in</strong>g, Loot<strong>in</strong>g, and Professional<br />

Archaeo logy.<br />

For security manuals see Tr<strong>in</strong>kaus-Randall, 1995 and Fennelly, 1983 (technically out-dated). For more on all<br />

possible locks see Dixon, 1999. For further read<strong>in</strong>g see Allen, 1990 and 1994; Jackanicz, 1990; Lemmon, 1991;<br />

Moffet, 1988; Okotore, 1990; Okoye-Ikonta et al., 1981; Onadiran, 1988; Schmidt et al., 1996; Sozanski, 1999.<br />

6.4.4 Neglect and vandalism<br />

Neglect is mostly caused by carelessness or a shortage of money but it can also be done on purpose. It covers several<br />

topics: the ma<strong>in</strong>tenance of the build<strong>in</strong>g, the handl<strong>in</strong>g of the objects by staff and patrons, and the pursu<strong>in</strong>g of rules<br />

by staff (see also sections on Build<strong>in</strong>g and Storage). Other forms of neglect concern objects related to m<strong>in</strong>orities,<br />

collections that have been removed by occupy<strong>in</strong>g forces as trophies or collections that have been removed to safer<br />

storage (Hoeven et al., 1996). <strong>The</strong>se objects should be returned to their rightful custodians (see also section on<br />

Preservation and Conservation – Preservation <strong>in</strong> Develop<strong>in</strong>g Countries – Artefacts From the Tropics). In the<br />

meantime they must receive the same treatment <strong>in</strong> the storage room as the other objects <strong>in</strong> the collection (Nieç,<br />

1998).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!