Feeds

eBay driving world's tomb raiders out of business, says prof

Online fools' lust for forged tat stymies looters

Beginner's guide to SSL certificates

'As long as fools will buy crap on eBay, the world's treasures will be safe for posterity'

According to Stanish:

Because the eBay phenomenon has substantially reduced total costs by eliminating middlemen, brick-and-mortar stores, high-priced dealers, and other marginal expenses, the local eBayers and craftsmen can make more money cranking out cheap fakes than they can by spending days or weeks digging around looking for the real thing. It is true that many former and potential looters lack the skills to make their own artifacts. But the value of their illicit digging decreases every time someone buys a "genuine" Moche pot for $35, plus shipping and handling. In other words, because the low-end antiquities market has been flooded with fakes that people buy for a fraction of what a genuine object would cost, the value of the real artifacts has gone down as well, making old-fashioned looting less lucrative. The value of real antiquities is also impacted by the increased risk that the object for sale is a fake. The likelihood of reselling an authentic artifact for more money is diminished each year as more fakes are produced.

Even better, you can't be jailed for handling fakes the way you could for dealing in genuine antiquities. Both for buyer and seller, the market is thus much safer and cheaper, due to the very fact that everything in it is faked.

Stanish says that not only has the eBay phenomenon removed most of the actual tomb-raiders from the crooked antiquities business - so cutting off the supply of looted valuables at the source - it has also funnelled money and effort into the production of better and better fakes. Thus the traditional high-priced market for stolen treasures, among the dodgy millionaires, is also affected:

The wealthier collector who up to now has been laughing about the naive folks who buy on eBay is in for a surprise, too: those dealers that provide private sales are some of the forgers' best customers, knowingly or otherwise. In fact, the workshops reserve their "finest" pieces for collectors using the same backdoor channels as before, but now with a much higher profit margin because they are selling fakes. As a former curator myself, I know that an embarrassingly high percentage of objects in our museums are forgeries. What fools the curator also fools the collector.

When a forger can use grass from ancient middens to temper his pottery, as apparently one of Stanish's acquaintances does, even carbon-dating can be fooled. He says that it's fairly routine to include bits of genuinely old pottery in a high-end forgery, too, which means that thermoluminescence testing becomes very expensive as multiple samples are required.

So even at the top end the looters are being driven out of business by the forgers. That's why archaeologists like Stanish - and those who consider their work important - should be pleased, he says. With the destruction of the tomb-raiders' business model, the genuine artifacts will wind up adding to the sum of human knowledge in museums rather than being privately fondled by rich degenerates.

And we owe it all, according to Professor Stanish, to the innate gullibility and greed of eBay users:

What drives this new dynamic is the small fraction of people who actually believe that someone will sell you a real Moche Fineline pot for $200 (actual price: about $15,000) and have it shipped from Peru by mail without any risk. It is this money that provides the capital for the cottage industries to keep producing and fuelling the cycle of ever-increasing quality and quantity of forgeries ... I suppose if people stopped believing that they can buy a pill that will help them lose weight without dieting or exercise, then it is possible that people will stop buying fakes online, and we will return to old-fashioned looting. We just have to wait and see what surprises the Internet brings us in the future.

The prof and his colleagues would certainly seem to be pretty safe for now. You can read his whole article online here. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.