Mr. Ellis serves as Director of Business Development and Marketing of AML RightSource. He has over 15 years of experience in business development, marketing, and professional consulting within the healthcare and financial services industries. Mr. Ellis earned his undergraduate degree from Bowling Green State University and obtained his juris doctor from Cleveland State University – Cleveland-Marshall College of Law.
In order to fool inexperienced buyers, unscrupulous sellers often say they have provenance or documented ownership histories that they claim confirms the authenticity of bogus art. In some cases, this concocted provenance appears to date all the way back to the original artists themselves. Before bidding on or buying any art, your job is to make sure any such provenance offered by sellers is correct, legitimate, verifiable and does in fact attest to the authorship of the art. (Problem art may also be accompanied by questionable Certificates of Authenticity. To evaluate a Certificate of Authenticity or COA, read Is Your Certificate of Authenticity Worth the Paper It's Printed On?)
   The laws of supply and demand dictate that there will be no end to the growing commercial value for a limited number of great works of art; and as long as those who deal in the commercial aspects of art — galleries, art dealers, auction houses and the media — are involved as the arbiters of criteria in judging art, market prices will continue to rise and art forgery will proliferate.
The United States passed the Banking Secrecy Act in 1970, requiring financial institutions to report certain transactions to the Department of the Treasury, such as cash transactions above $10,000 or any others they deem suspicious, on a suspicious activity report (SAR). The information the banks provide to the Treasury Department is used by the Financial Crimes Enforcement Network (FinCEN), which can share it with domestic criminal investigators, international bodies or foreign financial intelligence units.
The indictment says that Sack and Katzen promoted themselves as fine art dealers who were "capable of selling various works of art to be paid for in cash, as a way to launder money earned through illegal drug trafficking. The pair "offered to resell overseas any works of art first sold by them," the indictment says. One of the acts alleged as part of the conspiracy was the purchase of a cash-counting machine to sort out any counterfeit bills from the millions the pair expected to receive, the indictment says. The conspiracy took place in New York, Connecticut and Massachusetts, the U.S. says.
Data provenance covers the provenance of computerized data. There are two main aspects of data provenance: ownership of the data and data usage. Ownership will tell the user who is responsible for the source of the data, ideally including information on the originator of the data. Data usage gives details regarding how the data has been used and modified and often includes information on how to cite the data source or sources. Data provenance is of particular concern with electronic data, as data sets are often modified and copied without proper citation or acknowledgement of the originating data set. Databases make it easy to select specific information from data sets and merge this data with other data sources without any documentation of how the data was obtained or how it was modified from the original data set or sets.[31] The automated analysis of data provenance graphs has been described as a mean to verify compliance with regulations regarding data usage such as introduced by the EU GDPR.[69]
!function(n,t){function r(e,n){return,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw,e}}return n},{function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return"GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!{if(r={url:null,func:l,args:[],line:null,column:null},[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var,n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
Some states have laws and ethical rules regarding solicitation and advertisement practices by attorneys and/or other professionals. The National Law Review is not a law firm nor is  intended to be  a referral service for attorneys and/or other professionals. The NLR does not wish, nor does it intend, to solicit the business of anyone or to refer anyone to an attorney or other professional.  NLR does not answer legal questions nor will we refer you to an attorney or other professional if you request such information from us. 
In the end, maybe this guide was never intended for amoral businessmen in the first place (unless we’ve sorely misjudged our readership!) Maybe this it's more useful to the emerging artists who look for validation (read: dollar signs) in a competitive market. Maybe the artist’s secret to success is appealing to the corrupt and becoming an accomplice to white collar crime (but hopefully not). Are economic criminals the driving force of the art economy? Probably not, but what we do know for certain is that art isn’t only valuable as the evidence of creative genius. It is, to many, a vault.

Often a thorough examination (sometimes referred to as Morellian Analysis)[14] of the piece is enough to determine authenticity. For example, a sculpture may have been created obviously with modern methods and tools. Some forgers have used artistic methods inconsistent with those of the original artists, such as incorrect characteristic brushwork, perspective, preferred themes or techniques, or have used colors that were not available during the artist's lifetime to create the painting. Some forgers have dipped pieces in chemicals to "age" them and some have even tried to imitate worm marks by drilling holes into objects (see image, right).

Many works of art acknowledged to be authentic carry some risk that in the future questions of authenticity may arise. After all, experts sometimes change their minds, new experts may disagree with the old consensus, and new facts or technologies may emerge. An impeccable provenance that can be verified serves to mitigate that investment risk. On the other hand, we have seen that a dubious provenance may itself be used as circumstantial evidence that the work is a fake. Thus, even where authenticity is not currently an issue, an inaccurate or incomplete provenance still could give rise to a claim in the future.

Checked it out? Good, isn't it? Historical fiction based on the largest unsolved art heist in history? An artist agreeing to forge a famous painting from the original? And the original might actually *already* be a forgery? Seriously, how can I not read this book? The back text here is a great example of what back text should be: enough to really p ...more

Mr. Ellis serves as Director of Business Development and Marketing of AML RightSource. He has over 15 years of experience in business development, marketing, and professional consulting within the healthcare and financial services industries. Mr. Ellis earned his undergraduate degree from Bowling Green State University and obtained his juris doctor from Cleveland State University – Cleveland-Marshall College of Law.
Within computer science, informatics uses the term "provenance"[33] to mean the lineage of data, as per data provenance, with research in the last decade extending the conceptual model of causality and relation to include processes that act on data and agents that are responsible for those processes. See, for example, the proceedings of the International Provenance Annotation Workshop (IPAW)[34] and Theory and Practice of Provenance (TaPP).[35] Semantic web standards bodies, including the World Wide Web Consortium in 2014, have ratified a standard data model for provenance representation known as PROV[36] which draws from many of the better-known provenance representation systems that preceded it, such as the Proof Markup Language and the Open Provenance Model.[37]

Even as far back as ancient Rome, Mr. Nagel shows, it was considered utterly normal to copy the Greek statues of Praxiteles or Polyclitus, even while altering them. Patrons wanted access to the larger aesthetic ideas and ideals of their artistic geniuses; they didn’t think of works of art “as singularities, as unrepeatable performances by an author,” as Mr. Nagel puts it.
Forgers of older artworks sometimes attempt to override forensic methods by using or plausibly imitating authentic materials. One of the best-known cases is that of forger Han van Meegeren, who used a modern paint mixture but mimicked an older technique to a sufficient degree that his paintings were certified, as he intended, as originals by the 17th-century Dutch master Johannes Vermeer. Even though further testing can reveal that a paint’s age has been masked, museums and collectors often simply accept initial results.