ဝန္ဒာမိ

If you accept guardianship of a sacred object, you accept a duty of truthful record-keeping about its fate.

Total Pageviews

ဝန္ဒာမိ

Namo Buddhassa. Namo Dhammassa. Namo Sanghassa. Namo Matapitussa. Namo Acariyassa.

ဝန္ဒာမိ စေတိယံ

ဝန္ဒာမိ စေတိယံ သဗ္ဗံ၊ သဗ္ဗဋ္ဌာနေသု ပတိဋ္ဌိတံ။ ယေ စ ဒန္တာ အတီတာ စ၊ ယေ စ ဒန္တာ အနာဂတာ၊ ပစ္စုပ္ပန္နာ စ ယေ ဒန္တာ၊ သဗ္ဗေ ဝန္ဒာမိ တေ အဟံ။

Sunday, December 07, 2025

Template T68 – Suspicious Chat / Screenshot & Custodian Well-Being – Case Management & Verification Dossier

OFFICE OF SIRIDANTAMAHĀPĀLAKA / HSWAGATA BUDDHA TOOTH RELICS PRESERVATION MUSEUM – INTERNAL USE


Template No.: T68
Related Research Case IDs: F68 – Suspicious Chat / Screenshot Case
Linked Templates / Cases: [e.g. T53–T56 (verification tools), T66–T67, F69, H96–H100]
Cluster: F – HGT Conflicts (Cases 66–85)

Date of form: ____ / ____ / ______
Case file code (office): _____________________________________________

Completed by / Role: ________________________________________________
Office / Unit: ______________________________________________________
Country: ____________________________________________________________

Confidentiality Level:
[ ] Internal only [ ] Restricted (leadership / ethics) [ ] Sacred-Restricted


1. BASIC CASE INFORMATION


1.1 Case title & type

Short case title:
(e.g. “Suspicious Viber Screenshot Referring to Ministry Decision”)



Case category (tick all that apply):

[ ] Documentation / forgery / misinformation issue
[ ] Misuse of state / official authority in chat / screenshot
[ ] Personal / ethical conflict
[ ] Faith / reputation risk
[ ] Safety / welfare / duty-of-care issue
[ ] Digital communication / social media risk
[ ] Other: _____________________________


1.2 People and institutions at the centre

Main individuals (use codes if needed):

Sender / forwarder of chat / screenshot:


Key recipient(s) (especially custodians under pressure):


Any named official / leader in the screenshot (real or impersonated):


Other key people (e.g. HGT leaders, monastics, donors, IT support):

Name / role: _________________________________________________________
Name / role: _________________________________________________________
Name / role: _________________________________________________________

Institutional setting (tick all that apply):

[ ] Hswagata / HGT museum environment
[ ] Temple / monastery / Saṅgha institution: _________________________
[ ] Government / ministry / public agency (alleged): _________________
[ ] Foreign institution (palace, embassy, etc.) (alleged): ___________
[ ] Messaging / social media platform (Viber / WhatsApp / other): ____
[ ] Other: ___________________________________________________________


1.3 Timeframe & status

Approximate date when the suspicious chat / screenshot first appeared:
____ / ____ / ______

Key turning points (sharing, escalation, verification, clarification):


Current status:

[ ] Ongoing (screenshot still circulating / causing harm)
[ ] Partially resolved (some clarification, some confusion)
[ ] Largely resolved but with long-term impacts / mistrust / trauma
[ ] Closed (archival and training only)

Short current-status note:




2. BACKGROUND – NEUTRAL CASE SUMMARY


2.1 Short narrative of events (facts as far as known)

Describe what happened in neutral language, including:

  • What the chat / screenshot showed and claimed;

  • Who sent it, who received it, and through which channel / group;

  • How recipients understood the message (threat, order, advice, etc.);

  • Immediate effects (fear, decisions, changes in relic custody or roles);

  • Later steps (verification, denial, apology, or silence).

(10–20 lines max – no blaming language.)








2.2 Multiple perspectives

Sender / forwarder’s view (short summary):



Recipient / targeted custodian(s)’ view:



Institution / official body allegedly represented in the chat (after clarification, if any):



Other key stakeholder views (e.g. Saṅgha, donors, community, IT / legal advisors):




3. STAKEHOLDER & POWER MAPPING


3.1 Stakeholder list

(Use codes if needed to protect privacy.)

Code / Name Role (monk / lay / official / donor / staff / other) Power level (H/M/L) Main interest / fear

3.2 Power, vulnerability & digital context

Tick if present:

[ ] Imbalance of power between sender and recipient.
[ ] Fear of state / ministry / “national property” language.
[ ] Use of official photos / logos in chat to create pressure.
[ ] Group-chat dynamics (many observers, public shaming risk).
[ ] Health / welfare vulnerabilities (stress, hospitalisation, burnout).
[ ] Limited digital literacy (recipients unsure how to verify screenshot).

Short note on power, vulnerability and digital context:




4. ISSUE MAPPING – “CAB” (CONTRADICTIONS, ATTITUDES, BEHAVIOURS)


4.1 Contradictions (C)

Key issues / contradictions at the heart of this case (tick & expand):

[ ] Authentic vs manipulated / out-of-context screenshot.
[ ] Private chat vs official decision-making channels.
[ ] Fear-based “order” vs formal trusteeship and due process.
[ ] Digital rumour vs verified, written statements.
[ ] Who may speak “in the name of” an institution via chat / social media.
[ ] Other core contradiction(s): _______________________________

List main contradictions:





4.2 Attitudes (A)

Emotions and mind-states:

[ ] Fear (of state power, losing relics, losing role).
[ ] Distrust / betrayal towards sender or institutions.
[ ] Shame or guilt about having believed or forwarded the screenshot.
[ ] Anger, defensiveness, desire to expose or conceal the truth.
[ ] Anxiety, sleep disturbance, loss of confidence, health impacts.
[ ] Relief / gratitude when truth is clarified.

Notes:




4.3 Behaviours (B)

Concrete behaviours recorded:

[ ] Forwarding screenshot without verification.
[ ] Using screenshot to pressure decisions about relics / roles.
[ ] Silent fear and obedience (no questions asked).
[ ] Proactive verification (contacting ministry / office / advisors).
[ ] Apology / correction sent in the same chat / group.
[ ] Blocking / exiting group, or cutting communication.

Describe key behaviours and turning points:





5. BUDDHIST DOCTRINAL–ETHICAL LENS


5.1 Relevant teachings

Tick what applies:

[ ] sacca – truthfulness, careful with what is claimed or forwarded.
[ ] sammā-vācā – right speech in digital form (true, beneficial, timely, gentle).
[ ] musāvāda – concern about false or misleading speech / images.
[ ] dāna – decisions about relics must be free, not manipulated by fear.
[ ] Dhammadāyāda – heir to the Dhamma, not to status or fear-based control.
[ ] hiri-ottappa – wise shame / fear of wrongdoing in sharing doubtful content.
[ ] mettā / karuṇā – compassion for stressed custodians and confused devotees.
[ ] anicca / anattā – letting go of ego-driven need to control others.
[ ] Other relevant concepts: __________________________________________


5.2 Ethical self-check

Tick and comment:

[ ] Was a chat / screenshot used to pressure custodians or donors?
Notes: ___________________________________________________________

[ ] Did anyone send or forward content they had not verified?
Notes: ___________________________________________________________

[ ] Once doubts arose, were steps taken quickly to clarify / apologise?
Notes: ___________________________________________________________

[ ] Did custodians remember they are trustees, not political agents or enforcers?
Notes: ___________________________________________________________

Short doctrinal reflection (3–6 sentences – no personal attacks):





6. PEACE STUDIES LENS – CONFLICT, HARM & WELL-BEING


6.1 Galtung’s triangle

How does the situation show:

  • Contradictions (C) – see Section 4.1

  • Attitudes (A) – fear, betrayal, shame, etc. (Section 4.2)

  • Behaviours (B) – forwarding, pressuring, verifying, etc. (Section 4.3)

Short integrated note (3–6 sentences):





6.2 Types of violence

Tick if present:

[ ] Direct verbal violence (in the chat – insults, shaming).
[ ] Structural violence (using perceived institutional power in chat).
[ ] Cultural violence (using religious / national symbols in screenshot to justify pressure).
[ ] Self-directed harm risk (extreme stress, breakdown, desire to withdraw).

Concrete examples:




6.3 Peace & well-being opportunities

Opportunities in this case:

[ ] Clarify digital communication and verification policies.
[ ] Offer pastoral / psychological support to affected custodians.
[ ] Repair relationships using transparent communication and mediation.
[ ] Use the case in training for digital literacy and peace communication.
[ ] Develop “safe chat” guidelines for relic-related messages.

Short peace and well-being note:




7. GOVERNANCE & SDG LENS


7.1 Governance gaps revealed

Tick and comment:

[ ] No policy on official use of messaging apps / screenshots.
Notes: ___________________________________________________________

[ ] No protocol for verifying digital content that claims official authority.
Notes: ___________________________________________________________

[ ] No guidance on how relic / heritage decisions must not be made by chat.
Notes: ___________________________________________________________

[ ] Weak record-keeping of decisions influenced by digital messages.
Notes: ___________________________________________________________

[ ] No clear duty-of-care or support system for digitally pressured custodians.
Notes: ___________________________________________________________


7.2 SDG links

SDG 11.4 – Heritage protection
(impact of the screenshot on relic safety, donation, movement)



SDG 16 – Peace, justice & strong institutions
(transparency, accountable communication, anti-corruption, verification)



SDG 17 – Partnerships
(relations with ministries, monasteries, digital platforms, NGOs)



Other SDGs (if any): _________________________________________________


8. CHRONOLOGY OF KEY EVENTS


(Short, factual timeline – use additional sheets if needed.)

Date: ____ / ____ / ______
Event: _______________________________________________________________
Place / people / chat group: _________________________________________

Date: ____ / ____ / ______
Event: _______________________________________________________________
Place / people / chat group: _________________________________________

Date: ____ / ____ / ______
Event: _______________________________________________________________
Place / people / chat group: _________________________________________

Date: ____ / ____ / ______
Event: _______________________________________________________________
Place / people / chat group: _________________________________________

Chronology attachment file code (if any): ____________________________


9. DIGITAL EVIDENCE & VERIFICATION INDEX


9.1 Key digital items

(List screenshots, chat exports, voice notes, etc.)

Code Date Platform (Viber / WhatsApp / other) Type (screenshot / export / audio) Status (original / edited / unclear)
 |      |                                      |                                    |                                      
 |      |                                      |                                    |                                      
 |      |                                      |                                    |                                      

9.2 Verification status

Tick relevant tools / methods used:

[ ] Direct confirmation from named institution / person.
[ ] IT / digital forensics check (metadata, editing signs).
[ ] T53 – External Institution Clarification.
[ ] T54 – Forged Letters & Fact-Check Sheet (adapted for screenshots).
[ ] Legal / platform policy consultation (if needed).
[ ] Other verification method: _______________________________

Short note on verification outcomes:




10. OPTIONS, DECISIONS & FOLLOW-UP


10.1 Options considered

Possible options (tick those discussed):

[ ] Quiet internal clarification only.
[ ] Written correction / apology in the same chat / group.
[ ] Wider correction (public post, sermon, meeting).
[ ] Formal complaint to relevant authorities or platform (if serious misuse).
[ ] Mediation / facilitated dialogue between sender and recipient(s).
[ ] Introducing digital communication SOPs and training.
[ ] Providing well-being / counselling support to affected custodians.
[ ] Other: _____________________________

Short description of main options and their pros/cons:





10.2 Decisions taken

Final or current decision(s):



Date(s) of decisions: ____ / ____ / ______ and ____ / ____ / ______

Who decided? (names or roles):




10.3 Follow-up actions

  1. Action: ___________________________________________________________
    Purpose: __________________________________________________________
    Responsible: __________________ Deadline: ____ / ____ / ______

  2. Action: ___________________________________________________________
    Purpose: __________________________________________________________
    Responsible: __________________ Deadline: ____ / ____ / ______

  3. Action: ___________________________________________________________
    Purpose: __________________________________________________________
    Responsible: __________________ Deadline: ____ / ____ / ______

  4. Action: ___________________________________________________________
    Purpose: __________________________________________________________
    Responsible: __________________ Deadline: ____ / ____ / ______


11. H96 REFLECTION & RISK RATING


H96 guiding question:

“If a peace-oriented H96 custodian studied this digital case and our response, would they see humble trusteeship, truthfulness, and care for well-being – or ego, fear, and misuse of digital tools?”


11.1 Reflection notes

Wholesome elements (what was done well, or where improvement started):



Risky elements (ego, nationalism, humiliation, pressure, weak verification, digital carelessness):




11.2 Risk rating (current situation)

A. Doctrinal / ethical risk:
[ ] LOW [ ] MEDIUM [ ] HIGH
Notes: _______________________________________________________________

B. Peace / conflict risk (local, national, cross-border):
[ ] LOW [ ] MEDIUM [ ] HIGH
Notes: _______________________________________________________________

C. Heritage / physical risk to relics / heritage items:
[ ] LOW [ ] MEDIUM [ ] HIGH
Notes: _______________________________________________________________

D. Reputational risk (temple, HGT, Saṅgha, partners):
[ ] LOW [ ] MEDIUM [ ] HIGH
Notes: _______________________________________________________________

E. Well-being / mental health risk (custodians, staff, community):
[ ] LOW [ ] MEDIUM [ ] HIGH
Notes: _______________________________________________________________


12. SIGN-OFF & ARCHIVE


12.1 Sign-off

Prepared by:

Name: _______________________________ Role: _________________________
Signature: __________________________ Date: ____ / ____ / ______

Reviewed / Approved by (abbot / chief custodian / ethics / peace / digital governance):

Name: _______________________________ Role: _________________________
Signature: __________________________ Date: ____ / ____ / ______


12.2 Archive details

Case / file code: _________________________________________________

Physical location (cabinet / box / folder): _________________________

Digital location (drive / folder path): _____________________________

Access level:
[ ] General internal [ ] Restricted [ ] Sacred-Restricted

Notes for future custodians:
(What should future leaders remember about this digital screenshot case and how we tried to protect truth, relics, faith, relationships, and well-being?)






သာဓိကာရ ပဋိဝေဒနာ

သာဓိကာရ ပဋိဝေဒနာ © ၂၀၂၁ ဘိက္ခု ဓမ္မသမိ (ဣန္ဒသောမ) သိရိဒန္တမဟာပါလက-ကာယာလယ. သဗ္ဗေ အဓိကာရာ ရက္ခိတာ. ဣဒံ သာသနံ တဿ အတ္ထဉ္စ အာယသ္မတော ဓမ္မသာမိဿ ဉာဏသမ္ပတ္တိ ဟောန္တိ၊ ယေန ကေနစိ ပုဗ္ဗာနုညာတံ လိခိတ-အနုမတိံ ဝိနာ န ပုန-ပ္ပကာသေတဗ္ဗံ န ဝိတ္ထာရေတဗ္ဗံ ဝါ.

Content Source Declaration

All content published on this website, www.siridantamahapalaka.com, including but not limited to articles, Dharma talks, research findings, and educational resources, is intended solely for the purpose of Dhamma dissemination, study, and public benefit. Some images and visual content used throughout this website are sourced from public domains, Google searches, and social media platforms. These are used in good faith for non-commercial and educational purposes. If any copyright holder has concerns regarding the usage of their content, please feel free to contact us for proper acknowledgment or removal. A portion of the Dharma talks, especially those categorized under "Dharma Talk" and "Dependent Origination – Questions and Answers", have been translated from the teachings of respected Venerable Sayadaws. Proper reverence is maintained in delivering these teachings with accuracy and sincerity for the benefit of Dhamma practitioners. We deeply respect the intellectual and spiritual contributions of all teachers and content creators. Our aim is to preserve, promote, and respectfully share the teachings of the Buddha.

©️ Copyright Notice

© 2021 Sao Dhammasami( Siridantamahapalaka) . All rights reserved. This articles and its contents are the intellectual property of Venerable Ashin Dhammasami and may not be reproduced or distributed without prior written permission.

🔸 Disclaimer on Translations and Content Accuracy

While great care has been taken in translating Dhamma talks and related materials, any errors, inaccuracies, or interpretative issues that may be found within this blog are solely the responsibility of the author. This website and its content are not affiliated with or officially represent any individual, group, institution, or monastery/temple or Musuem. All translations, interpretations, and editorial decisions have been made independently by the author with sincere intention for Dhamma sharing. We humbly request the understanding and forgiveness of readers and the venerable teachers, should any shortcomings or misinterpretations arise.