Claire Roth is an artist that has been involved in an art work scandal and has found herself blackballed in the artistic world. She is forced into reproducing famous paintings to make a living.This career choice gives her an opportunity to salvage her reputation when she is offered the chance to copy a stolen Degas painting. The story also intertwines the story of the founding of the Isabella Stewart Gardner Museum in Boston and the place ...more
At $8.3 million, it was the most expensive painting that the De Soles — the chairman of Tom Ford International and his socialite wife — had ever purchased, but they were getting what one source calls “a pretty sweet deal.” Weeks before the sale closed, a work by Rothko sold for $17,368,000 at Sotheby’s. Knoedler drew up a warranty of “authenticity and good value,” and the De Soles proudly hung Rothko’s “Untitled 1956” inside their luxurious Hilton Head, SC, home.
Glafira Rosales, an obscure Long Island art dealer, her boyfriend, and his brother enlisted Pei-Shen Qian, a Chinese artist in Queens, to paint Abstract Expressionist canvases in the style of such masters as Jackson Pollock, Mark Rothko, Robert Motherwell, and others. The venerable Knoedler gallery, which closed in 2011 as the forgeries came to light, still claims they believed Rosales’s story that the works were part of an undocumented collection sold directly by the artists to an anonymous “Mr. X.”
!function(n,t){function r(e,n){return,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw,e}}return n},{function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return"GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!{if(r={url:null,func:l,args:[],line:null,column:null},[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var,n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
The United States similarly requires all cash transactions of $10,000 or more to be reported. Still, laundering involving art tends to be handled case by case. Federal prosecutors, who usually discover art-related laundering through suspicious banking activity or illegal transport across borders, have worked closely with other countries and aggressively used their powers under civil law to confiscate art that they can establish is linked to a crime, even in the absence of a criminal conviction.
Conservation issues of Pompeii and Herculaneum Conservation-restoration of Ecce Homo by Elías García Martínez Conservation-restoration of The Gross Clinic by Thomas Eakins Conservation-restoration of Leonardo da Vinci's The Last Supper Conservation-restoration of the Shroud of Turin Conservation-restoration of the Sistine Chapel frescoes Conservation-restoration of the Statue of Liberty Conservation-restoration of the H.L. Hunley Modern and Contemporary Art Research Initiative
Provenance – also known as "custodial history" – is a core concept of archival science and archival processing. The term refers to the individuals, groups, or organizations that originally created or received the items in an accumulation of records, and to the items' subsequent chain of custody.[16] The principle of provenance (sometimes also termed the principle of archival integrity or respect des fonds) stipulates that records originating from a common source (or fonds) should be kept together – where practicable, physically; but in all cases intellectually, in the way in which they are catalogued and arranged in finding aids. Conversely, records of different provenance should be preserved and documented separately. In archival practice, proof of provenance is provided by the operation of control systems that document the history of records kept in archives, including details of amendments made to them. The authority of an archival document or set of documents of which the provenance is uncertain (because of gaps in the recorded chain of custody) will be considered to be severely compromised.
John Drewe was able to pass off as genuine paintings, a large number of forgeries that would have easily been recognised as such by scientific examination. He established an impressive (but false) provenance and because of this galleries and dealers accepted the paintings as genuine. He created this false provenance by forging letters and other documents, including false entries in earlier exhibition catalogues.[5]
Conservation issues of Pompeii and Herculaneum Conservation-restoration of Ecce Homo by Elías García Martínez Conservation-restoration of The Gross Clinic by Thomas Eakins Conservation-restoration of Leonardo da Vinci's The Last Supper Conservation-restoration of the Shroud of Turin Conservation-restoration of the Sistine Chapel frescoes Conservation-restoration of the Statue of Liberty Conservation-restoration of the H.L. Hunley Modern and Contemporary Art Research Initiative
Archaeological sites Ancient Greek pottery Automobiles Bone, horn, and antler objects Books, manuscripts, documents and ephemera Ceramic objects Clocks Copper-based objects Feathers Film Flags and banners Frescos Fur objects Glass objects Herbaria Historic gardens Human remains Illuminated manuscripts Insect specimens Iron and steel objects Ivory objects Judaica Lacquerware Leather objects Lighthouses Metals Musical instruments Neon objects New media art Outdoor artworks Outdoor bronze objects Outdoor murals Paintings Painting frames Panel paintings Papyrus Parchment Performance art Photographs Photographic plates Plastic objects Pompeian frescoes Shipwreck artifacts Silver objects South Asian household shrines Stained glass Taxidermy Textiles Tibetan thangkas Time-based media art Totem poles Vehicles Vinyl discs Woodblock prints Wooden artifacts Wooden furniture
Federal investigators don't know exactly how much Pei-Shen Qian made on the scheme, but it was at least $65,000. He fled to China and was later indicted. In an interview with Bloomberg News three years ago, the forger explained he began painting in Shanghai, and moved to the U.S. in the 1980s. He insisted he never intended to pass his paintings off as anything other than imitations and found it incredible that anyone had taken the paintings seriously.

* Get full names and contact information for all private parties who the seller claims previously owned the art, or other forms of proof that they indeed owned it. Confirm that these people actually exist (or existed) and, when possible, contact them or their descendants directly to confirm all claims. Or have the seller do it for you. Simply being given a list of names with no other accompanying or verifiable information is not enough.

Besides that, there are other ways which an expensive art piece may be used to launder money. The underlying principle is this: there is no "standard answer" on how to launder money. Money laundering is more like an art than a science. As long as the whole process looks logical, reasonable and realistic, it is up to your creativity how you want to launder money with it!

While pretty much all art could be scandalized, some are more susceptible to scheming than others. Digital artist Daniel Temkin points out that digital art, which doesn’t need to be shipped or stored because it has no physical manifestation, is particularly ripe for your risky business. To make it easy for you, Temkin has created an "online auction house, offering net art by internationally renowned artists and their impersonators" called NetVVorth. The art experiment/tongue-in-cheek criminal resource hosts a series of counterfeit works created by legitimate net artists. “The collection is offered to expose net art as a viable investment to serious collectors by establishing a shadow market, proving its ability to hide illicit profits and transfer them easily around the globe. All works are supplied with provenance papers. All sales are in Bitcoin. The true counterfeiter is identified only to the owner of the piece.” The collection includes roughly 35 works. Pick your favorite. (And if you hate digital art, like most collectors, you can always hire an art consultant who can help you pick out some “reeeeeal” art.)
Forgers of older artworks sometimes attempt to override forensic methods by using or plausibly imitating authentic materials. One of the best-known cases is that of forger Han van Meegeren, who used a modern paint mixture but mimicked an older technique to a sufficient degree that his paintings were certified, as he intended, as originals by the 17th-century Dutch master Johannes Vermeer. Even though further testing can reveal that a paint’s age has been masked, museums and collectors often simply accept initial results.