
Man irked by Japan go-karting noise arrested for attempted arson
Go-karting is a popular sight in Japan - the birthplace of Super Mario - with tourists, dressed up as the video game icon and other characters, allowed to manoeuvre their way through Tokyo streets.
The 28-year-old Japanese man was arrested on charges of attempted arson, Tokyo police told AFP.
Police said the man was suspected of setting fire last month to waste on the premises of a Tokyo company that operates go-karting tours, with flames spreading to its parked go-karts.
Nearby walls were also burned, but the fire was quickly extinguished, police said.
Public broadcaster NHK quoted the suspect as telling investigators that he was "stressed out by the engine noise of the go-karts".
His workplace was reportedly located adjacent to the scene of the fire.
The go-karting operator received a letter in May threatening to "set karts aflame if engines are turned on after tomorrow", NHK reported, adding that police were probing a link to the arson attack.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNA
2 hours ago
- CNA
Adam Peckman and Ken Soh on cybersecurity threats
Coordinating Minister for National Security and Home Affairs Minister K Shanmugam says Singapore is under cyber attack. The sophisticated group behind the attack is known as UNC3886. In light of the current attack, Mr Shanmugam has called for Singapore to strengthen its cyber defences, adding that authorities will be updating the Cybersecurity Act to get more powers in order to deal with such threats. Adam Peckman, global head of cyber consulting and head of cyber solutions in Asia Pacific at Aon, and Ken Soh, Chair of SGTech's Cyber Security Chapter, discuss the foreign cyber threats that Singapore is facing and how businesses and individuals can safeguard against them.


CNA
6 hours ago
- CNA
Singapore actively dealing with ongoing cyberattack on critical infrastructure: Shanmugam
SINGAPORE: Singapore is actively dealing with UNC3886, a "highly sophisticated threat actor" that is attacking critical infrastructure, Coordinating Minister for National Security K Shanmugam said on Friday (Jul 18). Mandiant, a cybersecurity firm owned by Google, describes UNC3886 as a "China-nexus espionage group" that has targeted prominent strategic organisations on a global scale. The threat actor poses a serious danger to Singapore and could undermine the country's national security, said Mr Shanmugam, who is also Home Affairs Minister. He added that it was not in Singapore's security interests to disclose further details of the attack at this point in time. Elaborating on "advanced persistent threats" (APTs), of which UNC3886 is one, Mr Shanmugam said these were highly sophisticated and well-resourced threat actors. Between 2021 and 2024, suspected APT attacks on Singapore increased more than four-fold, he said. The minister was speaking at a dinner to mark 10 years since the Cyber Security Agency of Singapore (CSA) was established in 2015. In a separate statement, CSA said it was leading investigations into UNC3886 and supporting affected organisations with relevant agencies and partners. "We have been investigating UNC3886's activities since it was detected in parts of our critical infrastructure," the agency said. CSA said it was also monitoring all critical sectors and sharing threat intelligence so that they can take preventive measures. The critical sectors are energy, water, banking and finance, healthcare, transport, government, information and communications, media, and security and emergency services. "These attacks are often protracted campaigns and CSA will need to preserve operational security by not disclosing further information at this stage," it added. Mr Shanmugam said that APTs typically act on state objectives to steal sensitive information and disrupt essential services, attacking critical infrastructure like healthcare, telcos, water, transport and power. He said that UNC3886 deploys advanced tools to compromise systems, and is able to evade detection and maintain persistent access in "victim networks". "Industry has associated UNC3886 with cyberattacks against critical areas including defence, telcos, technology organisations in the United States and in Asia," he said. "The intent of this threat actor in attacking Singapore is quite clear. It is going after high value strategic threat targets, vital infrastructure that deliver essential services. "If it succeeds, it can conduct espionage and it can cause major disruption to Singapore and Singaporeans." MORE DANGEROUS WORLD Mr Shanmugam said that the world faced more dangers in cyberspace now than it did 10 years ago. "It is no longer enough only to guard our most critical systems. Potential targets have increased. They include external vendors, suppliers, service providers along the entire supply chain. Even residential devices like home routers, IP cameras are now being exploited by cyber attackers," he said. He noted that physical conflicts have also spilled over into the digital world, with actors launching cyberattacks to bring down critical infrastructure. "Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world. And people want to get into our systems, to both influence us and threaten us," he said. In Singapore, nearly 80 per cent of organisations have experienced a cyberattack, most committed by cyber criminals. "'Hacktivists' and foreign actors have also used cyber to promote their agendas. Both political and ideological agendas," said Mr Shanmugam. He noted that in October 2024, the government blocked 10 websites set up by foreign actors that were masquerading as Singapore websites. These had the potential to be used for hostile information campaigns against Singapore, he said. He also recalled last year's cyberattack involving over 2,700 devices in Singapore, including baby monitors and routers. These devices were part of a global "botnet" comprising hundreds of everyday devices that could have been used to disrupt critical services. Mr Shanmugam illlustrated how a cyberattack could destabilise national security. "Say there is a cyberattack on our power systems. They can disrupt our electricity supply. And the knock-on implications: other essential services, like water supply, transport, medical services – in fact, everything that depends on power, everything will be affected. "There are economic implications. Banks, airport, industries would not be able to operate. Our economy can be substantially impacted." Attacks on telco systems and payment systems can also have serious consequences and impact how Singapore does business, he added. Singapore will have to reexamine its vendors and supply chains. "And if we decide that we cannot trust them, then we may choose not to use them," he said. "At the same time, trust and confidence in Singapore as a whole can also be affected. Businesses may shy away if they are unsure about our systems, and whether the systems are clean, resilient, safe." Mr Shanmugam said the government must be "realistic" about what it is up against. "We are up against very sophisticated actors, some backed by countries with vast resources." These resources in manpower and technology are almost unlimited and can be deployed at a "formidable scale", he said. "Even countries at the frontier of technology have not been able to prevent APT attacks on their systems. "So realistically, we will have to accept that some attacks, at least, will get through," he said. In the face of such threats, the government will have to continue to strengthen Singapore's cyberdefences and focus on preventing and containing threats, he said.


CNA
7 hours ago
- CNA
NTU upholds zero mark for student initially accused of using AI
SINGAPORE: Nanyang Technological University (NTU) has upheld the zero mark awarded to a student who was accused of using generative artificial intelligence (AI) in her work. The case emerged after the student posted on Reddit on Jun 19 about being penalised for using AI in a final essay for a module because she made citation errors and used a reference organiser. After that, NTU convened a panel with AI experts to assess her appeal. She was one of three university students penalised for using the technology. NTU said on Friday (Jul 18) that the panel identified 14 instances of false citations or data in the submitted essay, noting that non-existent sources were cited and they were not 'mere typos'. 'The panel stipulated that citing non-existent sources is a serious form of academic misconduct as the accurate citation of sources is the foundation of academic research and writing. False citations of this nature are often due to factual inaccuracies generated by generative AI,' said NTU in its statement. All cases of academic misconduct are documented in the internal records of the students, the university said. 'The outcome of the appeal panel is final. We urge everyone to respect the integrity of the appeals process and refrain from making personal attacks against any individual involved.' Responding to questions from CNA about the outcome of her appeal, the student, who requested to remain anonymous, said the school confirmed to her that she was given a zero mark because of the mistakes in her essay, rather than for the use of AI. 'Their entire talk with me during the meeting was on how I can avoid making essay mistakes in the future, didn't tackle AI usage at all,' she told CNA. According to the student, the zero mark was upheld because of the professor's standards around writing. While she was reassured that there will be no permanent record, she still felt the situation was unfair. 'I'm just upset that there's no AI found so the goalpost shifted from AI to my writing standard,' she said. The student had admitted to using a reference organiser, which is a tool that collects and organises references and citations. She found the alphabetical order sorter online when she searched 'citation sorter A-Z'. 'They didn't bring up my citation sorter at all, which was initially one of the things I was penalised for,' she told CNA. As part of her appeal, she provided proof of her writing process. She paid for Draftback, a Google Chrome extension that records keystrokes, to retroactively show that she typed her essay out by hand instead of copying and pasting it from ChatGPT. When asked about the mistakes and why the school may have said they were not 'mere typos', the student declined to share a full list of the 14 mistakes because she was not sure if the document is confidential. Addressing the non-existent sources, she added: 'It's only non-existent because of the typos. And frankly writing citations wrongly is quite common amongst undergraduates. I just got unlucky.' She shared some examples of her mistakes – misspelling an author's last name as Lee instead of Li and two instances of getting the citation date wrong. 'Frankly speaking I'm too tired to fight any further and exhausted all my avenues. So I think I'll just move on, at least I know in my heart I didn't use AI and they couldn't prove it,' she said.