Feeds

China sacks officials over faked big cat snaps

South China tiger makes surprise appearance

SANS - Survey on application security programs

China has given more than a dozen government officials their marching orders over faked photographs of the highly-endangered South China tiger, Xinhua reports.

The faked tiger photoLast October, forestry officials in Zhenping county, northern Shaanxi province, published the photos citing them as evidence of the tiger's survival. The animal had not been seen in the wild since 1964, but suddenly posed for local farmer Zhou Zhenglong's digital camera (see pic), earning the photographer a reward of 20,000 yuan (£1,450).

The beast subsequently appeared on promotional posters designed to back officals' plan to establish a South China tiger natural reserve. However, the wheels came off the scam when police discovered the original picture of the tiger which Zhou had borrowed from a local in another village and suitably doctored.

Zhou was arrested on suspicion of fraud, while up to 13 officals were sacked, including deputy head of the province's forestry bureau Zhu Julong and top wildlife official Wang Wanyun.

The current status of the South China tiger (Panthera tigris amoyensis) is possibly around 20 individuals in the wild, and a captive population of 48 (1995 official figures, according to the Save the Tiger Fund). Some believe it is in fact now extinct in the wild. ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.