logo
China's Shaolin Temple head removed over embezzlement claims

China's Shaolin Temple head removed over embezzlement claims

HKFPa day ago
The head of the Chinese temple known as the birthplace of kung fu will be disrobed for 'extremely' bad behaviour, Beijing's top Buddhist authority said Monday, after allegations of embezzlement saw him placed under investigation.
The Shaolin Temple said on Sunday that Abbot Shi Yongxin, known as the 'CEO monk' for establishing dozens of companies abroad, was suspected of 'embezzling project funds and temple assets'.
The monastery said Shi had 'seriously violated Buddhist precepts', including by allegedly engaging in 'improper relationships' with multiple women.
'Multiple departments' were conducting a joint investigation, it said in a statement on WeChat.
In response, the Buddhist Association of China, overseen by the ruling Communist Party, said Monday it would cancel Shi's certificate of ordination.
'Shi Yongxin's actions are of an extremely bad nature, seriously undermining the reputation of the Buddhist community, hurting the image of monks,' the association said in an online statement.
The association 'firmly supports the decision to deal with Shi Yongxin in accordance with the law'.
Shi had previously been accused by former monks of embezzling money from a temple-run company, maintaining a fleet of luxury cars and fathering children with multiple women.
China's government exercises authority over the appointment of religious leaders, and 'improper' conduct is often grounds for removal from office.
A hashtag related to the temple scandal had been viewed more than 560 million times on social media platform Weibo as of Monday morning.
The last post to the abbot's personal account on Weibo declared: 'when one's own nature is pure, the pure land is here in the present'.
Shi faced similar allegations in 2015 which the temple called 'vicious libel'.
Shi, 59, took office as abbot in 1999 and in the following decades expanded Shaolin studies and cultural knowledge overseas.
He helped the temple establish dozens of companies — but received backlash for commercialising Buddhism.
The temple, established in AD 495, is known as the birthplace of Zen Buddhism and Chinese kung fu.
Shi was first elected vice-chairman of the Buddhist Association of China in 2002 and has served as a representative to the National People's Congress, the country's top lawmaking body.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft used China-based support for multiple US agencies
Microsoft used China-based support for multiple US agencies

AllAfrica

timean hour ago

  • AllAfrica

Microsoft used China-based support for multiple US agencies

This article was first published by ProPublica, a Pulitzer Prize-winning investigative newsroom. Sign up for The Big Story newsletter to receive stories like this one in your inbox . Last week, Microsoft announced that it would no longer use China-based engineering teams to support the Defense Department's cloud computing systems, following ProPublica's investigation of the practice, which cybersecurity experts said could expose the government to hacking and espionage. But it turns out the Pentagon was not the only part of the government facing such a threat. For years, Microsoft has also used its global workforce, including China-based personnel, to maintain the cloud systems of other federal departments, including parts of Justice, Treasury and Commerce, ProPublica has found. This work has taken place in what's known as the Government Community Cloud, which is intended for information that is not classified but is nonetheless sensitive. The Federal Risk and Authorization Management Program, the US government's cloud accreditation organization, has approved GCC to handle 'moderate' impact information 'where the loss of confidentiality, integrity, and availability would result in serious adverse effect on an agency's operations, assets, or individuals.' The Justice Department's Antitrust Division has used GCC to support its criminal and civil investigation and litigation functions, according to a 2022 report. Parts of the Environmental Protection Agency and the Department of Education have also used GCC. Microsoft says its foreign engineers working in GCC have been overseen by U.S.-based personnel known as 'digital escorts,' similar to the system it had in place at the Defense Department. Nevertheless, cybersecurity experts told ProPublica that foreign support for GCC presents an opportunity for spying and sabotage. 'There's a misconception that, if government data isn't classified, no harm can come of its distribution,' said Rex Booth, a former federal cybersecurity official who now is chief information security officer of the tech company SailPoint. 'With so much data stored in cloud services — and the power of AI to analyze it quickly — even unclassified data can reveal insights that could harm US interests,' he said. Harry Coker, who was a senior executive at the CIA and the National Security Agency, said foreign intelligence agencies could leverage information gleaned from GCC systems to 'swim upstream' to more sensitive or even classified ones. 'It is an opportunity that I can't imagine an intelligence service not pursuing,' he said. The Office of the Director of National Intelligence has deemed China the 'most active and persistent cyber threat to U.S. Government, private-sector, and critical infrastructure networks.' Laws there grant the country's officials broad authority to collect data, and experts say it is difficult for any Chinese citizen or company to meaningfully resist a direct request from security forces or law enforcement. Microsoft declined interview requests for this story. In response to questions, the tech giant issued a statement that suggested it would be discontinuing its use of China-based support for GCC, as it recently did for the Defense Department's cloud systems. 'Microsoft took steps last week to enhance the security of our DoD Government cloud offerings. Going forward, we are taking similar steps for all our government customers who use Government Community Cloud to further ensure the security of their data,' the statement said. A spokesperson declined to elaborate on what those steps are. The company also said that over the next month it 'will conduct a review to assess whether additional measures are needed.' The federal departments and agencies that ProPublica found to be using GCC did not respond to requests for comment. The latest revelations about Microsoft's use of its Chinese workforce to service the U.S. government — and the company's swift response — are likely to fuel a rapidly developing firestorm in Washington, where federal lawmakers and the Trump administration are questioning the tech giant's cybersecurity practices and trying to contain any potential national security fallout. 'Foreign engineers — from any country, including of course China — should NEVER be allowed to maintain or access DoD systems,' Defense Secretary Pete Hegseth wrote in a post on X last Friday. Last week, ProPublica revealed that Microsoft has for a decade relied on foreign workers — including those based in China — to maintain the Defense Department's computer systems, with oversight coming from US-based digital escorts. But those escorts, we found, often don't have the advanced technical expertise to police foreign counterparts with far more advanced skills, leaving highly sensitive information vulnerable. In response to the reporting, Hegseth launched a review of the practice. ProPublica found that Microsoft developed the escort arrangement to satisfy Defense Department officials who were concerned about the company's foreign employees, given the department's citizenship requirements for people handling sensitive data. Microsoft went on to win federal cloud computing business and has said in earnings reports that it receives 'substantial revenue from government contracts.' While Microsoft has said it will stop using China-based tech support for the Defense Department, it declined to answer questions about what would replace it, including whether cloud support would come from engineers based outside the U.S. The company also declined to say whether it would continue to use digital escorts. Microsoft confirmed to ProPublica this week that a similar escorting arrangement had been used in GCC — a dynamic that surprised some former government officials and cybersecurity experts. 'In an increasingly complex digital world, consumers of cloud products deserve to know how their data is handled and by whom,' Booth said. 'The cybersecurity industry depends on clarity.' Microsoft said it disclosed details of the GCC escort arrangement in documentation submitted to the federal government as part of the FedRAMP cloud accreditation process. The company declined to provide the documents to ProPublica, citing the potential security risk of publicly disclosing them, and also declined to say whether the China-based location of its support personnel was specifically mentioned in them. ProPublica contacted other major cloud services providers to the federal government to ask whether they use China-based support. A spokesperson for Amazon Web Services said in a statement that 'AWS does not use personnel in China to support federal contracts.' A Google spokesperson said in a statement that 'Google Public Sector does not have a Digital Escort program. Instead, its sensitive systems are supported by fully trained personnel who meet the U.S. government's location, citizenship and security clearance requirements.' Oracle said it 'does not use any Chinese support for US federal customers.' Renee Dudley is a ProPublica reporter focused on technology, cybersecurity and business. Doris Burke, who covers corporate wrongdoing, contributed reporting.

Trump's weaker export controls risk security to please China
Trump's weaker export controls risk security to please China

AllAfrica

timean hour ago

  • AllAfrica

Trump's weaker export controls risk security to please China

Recent US export control decisions imperil national security and threaten not only US artificial intelligence 'dominance' but potentially many other emerging technologies critical to military programs. While legal US exports of AI-related semiconductors were blocked, China got at least US$1 billion worth of Nvidia-made chips illegally, mostly in 'packages' of data-center-ready racks. The packages being sold in China are labeled as Supermicro, Dell and Asus. The chip packages, which include software, were sold at a 50% markup over US prices. Meanwhile, the Financial Times reports that the Trump administration has decided to lift 'aggressive' strategic export controls and has directed the Commerce Department's Bureau of Industry and Security to implement the new directive. Under the US export control system, commercial exports, also known as dual-use exports, are controlled by the Department of Commerce. However, the Commerce Department is supposed to coordinate with the Department of State, Department of Defense, Department of Energy, Department of Homeland Security and US intelligence. By law, US export controls support national security, lim supply and US foreign policy. These are broad categories. The US is also supposed to coordinate its export controls multilaterally, but since the dissolution of COCOM in 1994 and the weak substitute Wassenaar arrangement, very often the US resorts to unilateral export controls. It is not clear what 'aggressive' strategic export controls are, nor is it clear how they impact the interagency deliberative process. One presumes that the Commerce Department's Bureau of Export Controls will try to come up with some sort of export licensing guidelines to cover the White House directive. Neither the Commerce Department nor the other involved agencies apparently played any role in the White House directive. Prior to the White House decision, Trump previously told Nvidia it could restart chip exports to China, an apparent quid pro quo in which China released rare earth exports to the United States. Twenty former US officials say allowing Nvidia to export chips to China was a strategic misstep. The latest White House move, lifting 'aggressive' strategic export controls, is designed to facilitate trade negotiations between Trump and Chinese President Xi Jinping. Looked at objectively, Chinese export restrictions trumped Trump (pun intended). Some expected that Trump would go to China in September when Russian President Vladimir Putin is also expected. However, it appears that the idea has been nixed, and Trump won't meet with Xi and Putin together and will go to China later in the Fall, probably after the APEC meeting in South Korea. News reports say that China and the US are working on an agenda and a date for a high-level meeting. The immediate impact of removing 'aggressive' export controls will be on AI-relevant technology. The Trump administration has released an AI Action Plan. The plan calls for removing 'red tape' that delays AI investments and initiatives, investing more in AI and boosting government investment, especially by the Defense Department. It also describes the US effort in AI as a 'race' like the 'space race' in the past and seeks 'American dominance' in AI. The latest decisions on export controls, and specifically on Nvidia, compromise the AI Action Plan. They are totally incompatible. The lifting of export controls on Nvidia, which is the premier component in AI data centers, and the subsequent order to lift 'aggressive' export controls, not only subverts the billions of investment already made in AI but also leaves uncertain what other critical US technologies will be sold off to China. There is little doubt China is aggressively pursuing AI and is investing billions in the effort. According to investment bank Morgan Stanley, China is a sleeping giant that is now awakened and seeking global AI dominance by 2030. It is important to note that US companies like Nvidia will now directly assist China by sharing know-how and technology. There are many sensitive emerging technologies that are quite important and in many cases sensitive to US national security. The chart below illustrates some of them: ​The immediate question is whether the latest policy guidance from the White House includes any or all of the emerging technologies? The above chart was published to highlight what the Trump administration originally wanted to curtail using export controls. It is normal whenever new US export controls or guidance is proposed for the Commerce Department to publish the policy for comment before it is approved. In the comment period, the public (most often industry) comments on the proposed rule. It is far from clear if the Commerce Department will publish guidance for the latest policy change, but it should do so. Moreover, it should explain the national security implications as it understands them. There is also the question of interagency coordination, a non-trivial part of the US export control process. Will the Defense Department and other agencies (especially the intelligence community) be consulted, or will the Commerce Department ignore the other agencies? Typically, the Defense Department concerns itself with the impact of approving export licenses that might undermine national security and the military mission. Beyond that, many of the emerging technologies are critical to US defense systems and represent areas where the Defense Department has invested billions of dollars. The latest decisions contradict the AI Action Plan and potentially compromise export control protection of critical emerging technologies. In turn, the decisions damage US national security as defined, in part, by the administration itself. Stephen Bryen is a special correspondent to Asia Times and former US deputy undersecretary of defense for policy. This article, which originally appeared on his Substack newsletter Weapons and Strategy, is republished with permission.

S&P 500 and Nasdaq close at record highs
S&P 500 and Nasdaq close at record highs

RTHK

time6 hours ago

  • RTHK

S&P 500 and Nasdaq close at record highs

S&P 500 and Nasdaq close at record highs Most US indexes managed to finish in positive territory. File photo: AFP The S&P 500 edged up higher to finish at a record high for a sixth straight session on Monday, while the Nasdaq also advanced to a closing record in choppy trade as investors took stock of the US-EU trade pact and prepared for a week of major market movers. US President Donald Trump and European Commission President Ursula von der Leyen unveiled a trade framework on Sunday, slashing EU import tariffs to 15 percent - half the previously threatened rate that was scheduled to take effect on August 1. Still, France denounced the deal as a "submission." The deal is the latest announcement in recent days on US trade agreements with countries such as Japan and Indonesia. Top American and Chinese officials resumed talks in Stockholm to resolve a trade dispute between the world's two largest economies. The S&P 500 gained 1.17 points, or 0.02 percent, to end at 6,389 points, while the Nasdaq gained 69 points, or 0.33 percent, to finish at 21,177. The Dow Jones Industrial Average fell 62 points, or 0.14 percent, to 44,839. (Reuters)

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store