logo
China's "CEO Monk" Of Famous Shaolin Temple Under Probe For Embezzling Funds

China's "CEO Monk" Of Famous Shaolin Temple Under Probe For Embezzling Funds

NDTV19 hours ago
Beijing:
China's famous Shaolin Temple announced on Sunday that its abbot is under investigation on suspicion of misappropriation and embezzlement of project funds and temple assets.
Shi Yongxin is alleged to have committed criminal offenses and violated Buddhist precepts by maintaining relationships with multiple women over a long period and fathering at least one child, according to a notice from the temple's authority on its WeChat account.
The notice said a joint investigation was being carried out by multiple departments and its findings would be announced in due course.
The fame of the Shaolin Temple, based in the central Chinese province of Henan, has gone beyond a religious institution. It is also renowned for its martial arts culture, or kung fu, which has been referenced in many movies and TV dramas, including the 1982 film "The Shaolin Temple," starring martial arts superstar Jet Li.
Local media reported that Shi Yongxin, whose original name is Liu Yingcheng, had faced accusations in the past, including claims that he fathered several children and embezzled money. Provincial investigation reports exonerated him of all charges in 2016, according to the Caixin Global news outlet.
Shi Yongxin entered the Shaolin Temple in 1981 and became its abbot in 1999, according to the temple's website.
China's state news agency Xinhua reported in 2015 that he was known as a "CEO monk," attracting criticism for developing commercial operations to promote kung fu shows and merchandise.
Earlier on Sunday, Chinese local media outlets reported that authorities had dismissed as fake an online notice claiming Shi Yongxin was intercepted by authorities while trying to flee to the U.S. with a number of mistresses and some 20 children.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Terrorist who led Pahalgam attack killed in J&K gunfight
Terrorist who led Pahalgam attack killed in J&K gunfight

Time of India

time2 hours ago

  • Time of India

Terrorist who led Pahalgam attack killed in J&K gunfight

Terrorist who led Pahalgam attack killed in J&K gunfight NEW DELHI : Over three months after Pakistani terrorists gunned down 26 civilians, including 25 tourists, at Pahalgam, the Army's para commandos have killed Suleiman, believed to be the lead killer of the gang, in Dachigam forest area on the outskirts of Srinagar. Two other terrorists were also killed in a joint operation involving the Army, CRPF and JK police, though there was no clarity yet on their involvement in the Pahalgam massacre. All the three terrorists killed on Monday in 'Operation Mahadev' were Pakistani nationals and linked to Lashkar-e-Taiba and its offshoot The Resistance Front, as per sources. A source indicated that the two terrorists killed with Suleiman could be Abu Hamza and Yasir, but officials would run more checks before confirming their identity. There was no official statement on Operation Mahadev. However, sources told TOI that Pahalgam has been avenged with the killing of Suleiman - a former Pakistani special forces commando who had trained at LeT Muridke hub in Pakistan's Punjab province before crossing the LoC in 2022 to enter Jammu region with his M-4 weapon - in the operation. Pak squad behind Pahalgam killings, ISI-LeT plotted it A manhunt for the three-member Pahalgam attack squad that included Suleiman has been on since the day they rounded up tourists and killed them in front of their horror-struck families at Pahalgam. Sources said latest technical intelligence - based on tracking of activity on the encrypted Chinese app Ultra - had found three Pakistani terrorists hiding in Mahadev hill - from which Operation Mahadev got its name - in Dachigam. Suleiman had been on the move after the Pahalgam attack, traversing the forest dotting the Tral-Kulgam-Pahalgam tri-junction. Recoveries from the terrorists' hideout included an M4 carbine, two AK rifles and grenades. As per the standard procedure, the neutralised terrorists will be laid to rest in unmarked graves in a designated burial ground. As exclusively reported by TOI on July 15, the Pahalgam attack resulted from a closely guarded conspiracy hatched by Pakistan spy agency ISI and LeT on the directions of the country's political and military brass. It was executed by Pakistani terrorists. In what sources described as an LeT-ISI joint project akin to the 26/11 Mumbai attacks, ISI gave specific directives to Pakistan-based Lashkar commander Sajid Jutt to deploy only foreign terrorists for the targeted killings at Pahalgam. To ensure secrecy, no Kashmiri terrorists were included in the attack squad; local involvement for logistics too was 'minimal' and on a "need-to-know" basis. Satellite phone analysis revealed Suleiman's location in Tral forest on April 15, indicating he was in the vicinity of Baisaran for almost a week before the attack. Suleiman was also involved in the April 2023 attack on an Army truck in Poonch, in which five soldiers were killed. However, he laid low for two years after the incident. Even though the J&K Police had earlier suspected the role of Pakistani terrorists Hashim Musa and Ali Bhai in the Pahalgam massacre, the probe so far has only confirmed Suleiman's involvement. This Suleiman is different from Hashim Musa, whose nom de guerre is Sulaiman. "No local terrorist had participated in the Pahalgam attack, nor was in the loop on the terror plot," a senior official told TOI. Even the role of the two locals arrested by NIA was limited to providing the armed Pakistani terrorists food, shelter and other logistics, for a few thousand rupees.

Rise Of Deepfakes: Realistic AI Impersonations Threaten Governments, Businesses, And Trust
Rise Of Deepfakes: Realistic AI Impersonations Threaten Governments, Businesses, And Trust

NDTV

time6 hours ago

  • NDTV

Rise Of Deepfakes: Realistic AI Impersonations Threaten Governments, Businesses, And Trust

WASHINGTON: The phone rings. It's the secretary of state calling. Or is it? For Washington insiders, seeing and hearing is no longer believing, thanks to a spate of recent incidents involving deepfakes impersonating top officials in President Donald Trump's administration. Digital fakes are coming for corporate America, too, as criminal gangs and hackers associated with adversaries, including North Korea, use synthetic video and audio to impersonate CEOs and low-level job candidates to gain access to critical systems or business secrets. Thanks to advances in artificial intelligence, creating realistic deepfakes is easier than ever, causing security problems for governments, businesses and private individuals and making trust the most valuable currency of the digital age. Responding to the challenge will require laws, better digital literacy and technical solutions that fight AI with more AI. "As humans, we are remarkably susceptible to deception," said Vijay Balasubramaniyan, CEO and founder of the tech firm Pindrop Security. But he believes solutions to the challenge of deepfakes may be within reach: "We are going to fight back." This summer, someone used AI to create a deepfake of Secretary of State Marco Rubio in an attempt to reach out to foreign ministers, a US senator and a governor over text, voice mail and the Signal messaging app. In May, someone impersonated Trump's chief of staff, Susie Wiles. Another phoney Rubio had popped up in a deepfake earlier this year, saying he wanted to cut off Ukraine's access to Elon Musk's Starlink internet service. Ukraine's government later rebutted the false claim. The national security implications are huge: People who think they're chatting with Rubio or Wiles, for instance, might discuss sensitive information about diplomatic negotiations or military strategy. "You're either trying to extract sensitive secrets or competitive information, or you're going after access to an email server or other sensitive network," Kinny Chan, CEO of the cybersecurity firm QiD, said of the possible motivations. Synthetic media can also aim to alter behavior. Last year, Democratic voters in New Hampshire received a robocall urging them not to vote in the state's upcoming primary. The voice on the call sounded suspiciously like then-President Joe Biden but was actually created using AI. Their ability to deceive makes AI deepfakes a potent weapon for foreign actors. Both Russia and China have used disinformation and propaganda directed at Americans as a way of undermining trust in democratic alliances and institutions. Steven Kramer, the political consultant who admitted sending the fake Biden robocalls, said he wanted to send a message about the dangers deepfakes pose to the American political system. Kramer was acquitted last month of charges of voter suppression and impersonating a candidate. "I did what I did for $500," Kramer said. "Can you imagine what would happen if the Chinese government decided to do this?" The greater availability and sophistication of the programs mean deepfakes are increasingly used for corporate espionage and garden variety fraud. "The financial industry is right in the crosshairs," said Jennifer Ewbank, a former deputy director of the CIA who worked on cybersecurity and digital threats. "Even individuals who know each other have been convinced to transfer vast sums of money." In the context of corporate espionage, they can be used to impersonate CEOs asking employees to hand over passwords or routing numbers. Deepfakes can also allow scammers to apply for jobs - and even do them - under an assumed or fake identity. For some, this is a way to access sensitive networks, to steal secrets or to install ransomware. Others just want the work and may be working a few similar jobs at different companies at the same time. Authorities in the US have said that thousands of North Koreans with information technology skills have been dispatched to live abroad, using stolen identities to obtain jobs at tech firms in the US and elsewhere. The workers get access to company networks as well as a paycheck. In some cases, the workers install ransomware that can be later used to extort even more money. The schemes have generated billions of dollars for the North Korean government. Within three years, as many as 1 in 4 job applications are expected to be fake, according to research from Adaptive Security, a cybersecurity company. "We've entered an era where anyone with a laptop and access to an open-source model can convincingly impersonate a real person," said Brian Long, Adaptive's CEO. "It's no longer about hacking systems - it's about hacking trust." Researchers, public policy experts and technology companies are now investigating the best ways of addressing the economic, political and social challenges posed by deepfakes. New regulations could require tech companies to do more to identify, label and potentially remove deepfakes on their platforms. Lawmakers could also impose greater penalties on those who use digital technology to deceive others, if they can be caught. Greater investments in digital literacy could also boost people's immunity to online deception by teaching them ways to spot fake media and avoid falling prey to scammers. The best tool for catching AI may be another AI program, one trained to sniff out the tiny flaws in deepfakes that would go unnoticed by a person. Systems like Pindrop's analyze millions of datapoints in any person's speech to quickly identify irregularities. The system can be used during job interviews or other video conferences to detect if the person is using voice cloning software, for instance. Similar programs may one day be commonplace, running in the background as people chat with colleagues and loved ones online. Someday, deepfakes may go the way of email spam, a technological challenge that once threatened to upend the usefulness of email, said Balasubramaniyan, Pindrop's CEO. "You can take the defeatist view and say we're going to be subservient to disinformation," he said. "But that's not going to happen." (Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.)

Cadence nears deal to pay over $100 million to US for China sales, sources say
Cadence nears deal to pay over $100 million to US for China sales, sources say

Mint

time6 hours ago

  • Mint

Cadence nears deal to pay over $100 million to US for China sales, sources say

Cadence accused of selling chip design tools to Chinese military university Settlement discussions between Cadence and US began in December Resolution nears as US and China engage in new trade talks July 28 - Cadence Design is expected to pay over $100 million to the U.S. government as part of a deal to resolve an investigation into sales of its chip design products to a Chinese military university believed to be involved in simulating nuclear explosions, according to two people familiar with the matter. Cadence is accused of illegally selling chip design technology to front companies representing China's National University of Defense Technology, the sources said. NUDT's supercomputers are thought to support nuclear explosive simulation and military simulation activities, according to U.S. Commerce Department notices restricting shipments to the university. San Jose, California-based Cadence, which said earlier this year it began settlement discussions with the U.S. over sales to China in December, did not immediately respond to a request for comment, nor did NUDT. The Justice Department declined immediate comment. The Commerce Department did not immediately respond to a request for comment. The potential deal, which comes as the U.S. and China meet for new trade talks, shows the U.S. is still willing to enforce U.S. export controls on China, even as it relaxes some of the restrictions as part of negotiations. The sources said the deal is not finalized. NUDT was put on the Commerce Department's restricted trade list in 2015 to keep it from using U.S. technology to power its supercomputers, according to department postings. Other aliases and locations were added to the university's listing in 2019 and 2022, including Hunan Guofang Keji University, Central South CAD Center, and CSCC. The U.S. investigation into Cadence, which began more than four years ago, involves 'historical sales by Cadence to customers in China,' according to a company filing. Cadence received a subpoena from the U.S. Commerce Department in February 2021, demanding records related to certain customers in China. A related November 2023 subpoena followed from the Justice Department over the company's business activity in China. Cadence sold its EDA technology to NUDT through the CSCC or Central South CAD Center alias about 50 times between 2015 and 2020, according to one source familiar with the probe. Chip developer Tianjin Phytium Information Technology, which traces its roots to NUDT, also has been tied to Cadence sales for the university, another source said. Phytium was added to the restricted trade list in 2021. It did not immediately respond to a request for comment. Several employees at a Chinese subsidiary of Cadence were terminated over the sales, one of the sources said. Entities are placed on the restricted trade list, formally known as the entity list, for activities deemed contrary to U.S. national security or foreign policy interests. U.S. companies are not allowed to ship goods and technology to them without licenses from the Commerce Department, which are generally denied. Cadence will hold a call about its second-quarter financial results at 2 p.m. Pacific Time on Monday. Cadence, whose customers include major semiconductor manufacturers and companies such as Nvidia and Qualcomm, is known for its electronic computer-aided design software. Electronic design automation tools are key to designing chips and verifying that they are bug-free. NUDT has developed chips to power university supercomputers, including Tianhe-2, once touted as the world's best supercomputer, which the U.S. believes has been used in research on or the development of nuclear explosive devices. Twelve percent of Cadence's revenue came from China last year, down from 17% in 2023, amid regulatory developments and geopolitical tensions. This article was generated from an automated news agency feed without modifications to text.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store