#FactCheck : AI Video Falsely Shows Iran Destroying Israeli Military Base
Executive Summary
Amid the ongoing conflict involving the US-Israel and Iran in West Asia, a video showing destroyed aircraft at an airport is going viral on social media. The clip is being shared with the claim that it shows an Israeli military base destroyed in an Iranian attack. However, an research by the CyberPeacen found that the viral video is not real but AI-generated.
Claim:
An Instagram user “sakirali8064” shared the video on March 22, 2026, claiming that Iran had demonstrated its military strength by deploying advanced missiles capable of long-range precision strikes.The video also carries a “Breaking News” overlay stating:“Iran attack Israel military base… the entire base destroyed.
Post link and archive link:

Fact Check:
To verify the claim, we extracted keyframes from the viral clip and conducted a reverse image search using Google Lens. We found a longer version of the same video posted on March 5, 2026, by a Facebook user named “With INC,” where it was also falsely linked to an Iranian attack on Israel’s Ben Gurion Airport.

Upon closely examining the video, we observed inconsistencies such as fire changing positions unnaturally, which raised suspicion of AI manipulation. We then analyzed the video using Hive Moderation, which indicated a probability of over 99% that the content is AI-generated.

Additionally, analysis using Tencent’s “Zhuque AI” detection tool suggested more than 78% likelihood of the video being AI-generated.

Conclusion:
The viral video claiming that an Iranian attack destroyed an Israeli military base is AI-generated and misleading. While Iran has claimed to have targeted Israel’s Ben Gurion International Airport using drones, the viral footage does not depict a real event.
Related Blogs
.webp)
Introduction
Cybersecurity remains a crucial component in the modern digital era, considering the growing threat landscape caused by our increased reliance on technology and the internet. The Karnataka Government introduced a new ‘Cyber Security Policy 2024’ to address increasing cybercrimes and enhance protection measures for the State's digital infrastructure through awareness, skill development, public-private collaborations, and technology integration. Officials stated that the policy highlights various important aspects including raising awareness and providing education, developing skills, supporting the industry and start-ups, as well as forming partnerships and collaborations for enhancing capacity.
Key Highlights
- The policy consists of two components. The initial segment emphasizes creating a robust cyber security environment involving various sectors such as the public, academia, industry, start-ups, and government. The second aspect of the policy aims to enhance the cybersecurity status of the State's IT resources. Although the initial section will be accessible to the public, the second portion will be restricted to the state's IT teams and departments for their IT implementation.
- The Department of Electronics, IT, BT and S&T, the Department of Personnel and Administrative Reforms (e-Governance),and the Home Department, in collaboration with stakeholders from government and private sectors, have collectively formulated this policy. The Indian Institute of Science, the main institute for the state's K-tech Centre of Excellence for Cyber Security (CySecK), also examined the policy.
- The Department of Electronics, IT, BT and S&T, the Department of Personnel and Administrative Reforms (e-Governance),and the Home Department, in collaboration with stakeholders from government and private sectors, have collectively formulated this policy. The Indian Institute of Science, the main institute for the state's K-tech Centre of Excellence for Cyber Security (CySecK), also examined the policy.
- Approximately ₹103.87 crore will be spent over five years to implement the policy, which would be fulfilled from the budget allocated to the Department of Information Technology and Biotechnology and Science & Technology. A total of ₹23.74 crore would be allocated for offering incentives and concessions.
- The policy focuses on key pillars of building awareness and skills, promoting research and innovation, promoting industry and start-ups, partnerships and collaborations for capacity building.
- Karnataka-based undergraduate and postgraduate interns will receive a monthly stipend of INR 10,000- Rs15,000 fora maximum duration of three months under the internship program. The goal is to support 600 interns at the undergraduate level and 120 interns at the post-graduate level within the policy timeframe.
- Karnataka-based start-ups collaborating with academic institutes can receive matching grants of up to 50% of the total R&D cost for cybersecurity projects, or a maximum of ₹50 lakh.
- Reimbursement will be provided for expenses up to a maximum of INR 1 Lakh for start-ups registered with Karnataka Start-up Cell who engage CERT-In empanelled service providers from Karnataka for cyber security audit.
- The Karnataka government has partnered with Meta to raise awareness on cyber security. By reaching out to educational institutions, schools and colleges, it is piloted to provide training to 1 lakh teachers and educate 1 million children on online safety.
CyberPeace Policy Wing Outlook
The Cyber Security Policy, 2024 launched by the Karnataka government is a testament to the state government's commitment to strengthening the cyber security posture and establishing cyber resilience. By promoting and supporting research and development projects, supporting startups, and providing skill training internships, and capacity building at a larger scale, the policy will serve asa positive step in countering the growing cyber threats and establishing a peaceful digital environment for all. The partnership and collaboration with tech companies will be instrumental in implementing the capacity-building initiatives aimed at building cognitive and skill defenses while navigating the digital world. The policy will inspire other state governments in their policy initiatives for building safe and secure cyber-infrastructure in the states by implementing strategies tailored to the specific needs and demands of each state in building safe digital infrastructure and environment.
References:
- https://www.hindustantimes.com/cities/bengaluru-news/karnataka-govt-launches-new-cyber-security-policy-amid-frequent-scams-101722598078117.html
- https://ciso.economictimes.indiatimes.com/amp/news/grc/karnataka-govt-launches-new-cyber-security-policy/112214121
- https://cybermithra.in/2024/08/09/karnataka-cyber-security-policy/

Introduction
India officially became part of the US-led Pax Silica project on February 20, 2026, at the India AI Impact Summit in New Delhi. This was a significant milestone in India’s involvement in global technology and supply chain cooperation. India joined a coalition of advanced economies by signing the Pax Silica Declaration in a move aimed at strengthening coordination over technology supply chains on which artificial intelligence, semiconductors, critical minerals and advanced manufacturing rely. The entry of India into the global technology landscape is indicative of India’s growing role in the global technology order and reflects broader shifts in how countries are responding to the geopolitics of silicon and AI infrastructure.
What Is Pax Silica and Why It Matters
The United States Department of State introduced Pax Silica as a strategic program launched in December 2025. It seeks to establish safe, resilient and innovation-driven supply chains for emerging technologies that are the foundations of the AI era. This encompasses activities ranging from mining and refining of rare earths, gallium and germanium to semiconductor manufacturing, the creation of advanced computing hardware and energy infrastructure. The project describes cooperation as a method of reducing what are termed as coercive dependencies on any one supplier or economy, thereby supporting sustained access to building blocks of state-of-the-art technology.
Pax Silica derives its name from the Latin terms for 'peace' and the substrate material of 'silicon', meaning that the coalition aims at achieving stability and prosperity by working together in supply chains of technology. Early signatories were the United States, Japan, South Korea, Australia, the United Kingdom, Israel, Singapore, the Netherlands, Greece, Qatar and the United Arab Emirates. India was the twelfth member to sign the declaration.
India’s Strategic Interests in Pax Silica
The move to join Pax Silica is both a diplomatic and economic decision. The incorporation of India into a network led ostensibly by the Western bloc and containing developed economy players in the technological supply chain creates the messaging that it wants to be more deeply integrated into the global high-tech ecosystems.
India currently relies on importing a large proportion of the chips for its electronics production sector, while its domestic manufacturing capacity remains limited. Pax Silica membership could provide Indian firms with advanced manufacturing equipment, process expertise and joint ventures with their partners, who have already developed the fabrication capabilities.
The signing of the declaration was done by the current Union Minister of Electronics and Information Technology (MeitY) , the Union Minister, who noted that India is expanding its technological capabilities and future ambitions. He observed that the Indian engineers already play a role in designing advanced semiconductor chips and that the increase in semiconductor capacity will demand a professional workforce. He also emphasised that the availability of international tools and alliances would help accelerate India’s growth in this sector.
Another strategic area is the critical minerals. India is estimated to have significant rare earth reserves, but the resources remain largely underdeveloped. The diversification strategy of Pax Silica in terms of supply and processing routes provides India with an opportunity to have joint ventures and infrastructure projects that could help unlock domestic mineral potential within the country.
Supply Chains, AI, and Geopolitical Context
Pax Silica has emerged within a broader geopolitical and supply chain context rather than as a purely economic initiative. The last few years have placed a strain on global technology supply chains with disruptions caused by pandemics, trade tensions, export controls, and the concentrated control of some components of the value chain. China currently dominates in the refinement of rare earths as well as in a variety of legacy semiconductor manufacturing. The concentration has raised concerns about resilience and strategic autonomy among the technology-producing democracies.
This initiative is based on the premise that a diversified and trusted supply chain will make the economic security of countries participating in Pax Silica more secure in case of a trade embargo or as a tool of political leverage. The voluntary and non-binding framework by the coalition only provides a guide to cooperation instead of a binding commitment, though it highlights an acknowledgement of risk and opportunity in global technology markets.
Such concerns as strategic autonomy and the extent of India’s involvement in the initiative have been expressed by those who criticise it, particularly because the coalition is perceived to be partially designed to respond to Chinese dominance in the most important technological sectors. Some analysts have also suggested that India will have to balance its participation in Pax Silica by taking special care of its own interests and alliances outside this coalition.
Economic and Industrial Implications for India
Joining Pax Silica offers India potential benefits on multiple fronts.
Strengthening Innovation and Manufacturing Ecosystems
India's membership will allow cooperation in semiconductor production, development of advanced computing infrastructure and implementation of AI. The government and industry players could attract investments through partnerships, technology transfer and joint R&D. India’s emerging design and fabrication projects could use a greater international integration in this venture.
Talent and Skills Development
A recurring theme among Indian policymakers is the issue of a skilled workforce. As the world semiconductor and AI sector is expected to need millions of specialists in the next 10 years, India’s large talent pool presents an opportunity to produce local talent that is capable of catering to local demands as well as international supply needs. Initiatives linked to Pax Silica have the potential to establish training pathways and institutional bridges that facilitate workforce preparedness.
Diversification of Supply Partnerships
In the case of India, the diversification of suppliers and partners goes beyond the availability of materials and technologies. It also implies reducing exposure to supply shocks and enhancing resilience in important industries such as consumer electronics, automotive manufacturing, defence systems and digital infrastructure, all of which rely on semiconductors and advanced computing hardware.
Broader Industrial Readiness and Domestic Challenges
India’s participation in Pax Silica highlights the domestic conditions required to support advanced technology manufacturing. A conducive environment will depend on reliable infrastructure, regulatory stability, specialised industrial clusters and sustained policy coordination across government and industry. Semiconductor and AI hardware production are resource-intensive, requiring significant energy, water and chemical management, making environmental safeguards and sustainable industrial planning essential to prevent long-term ecological strain.
At the same time, India faces gaps in its human resource development ecosystem. While engineering talent is abundant, specialised training in semiconductor fabrication, materials science and advanced manufacturing remains limited. Additionally, the relative lack of applied research and development initiatives aimed at reducing technological and financial risks may constrain large-scale industrial expansion, underscoring the need for stronger industry–academia collaboration and targeted innovation support.
Conclusion: A Strategic Step into the AI Era
India’s formal entry into the Pax Silica initiative at the 2026 India AI Impact Summit reflects a thoughtful recalibration of its global technology engagement. By aligning with a coalition aimed at securing the supply chains that make modern digital economies possible, India has signalled its intent to be more than just a consumer of technology. It seeks to help shape the infrastructure, partnerships and norms that will define the next generation of AI, semiconductors and critical technologies.
While questions around strategic autonomy and long-term dependencies remain important considerations, Pax Silica offers India access to networks, capabilities and collaborative frameworks that can accelerate its semiconductor ambitions and broaden its role in the global tech order. The move underscores how technology cooperation today increasingly interacts with geopolitics, economic strategy and national aspirations for growth and innovation.
Sources
- https://timesofindia.indiatimes.com/technology/tech-news/what-is-pax-silica-and-why-does-india-joining-the-ai-supply-chain-alliance-matter/articleshow/128594775.cms
- https://paxsilica.org/f/pax-silica-securing-the-foundations-of-the-ai-era
- https://www.businesstoday.in/india/story/ai-impact-summit-2026-india-set-to-join-us-led-pax-silica-today-517167-2026-02-20
- https://www.business-standard.com/india-news/pax-silica-india-joins-us-supply-chain-initiative-ai-impact-summit-2026-126022000339_1.html

Introduction
Emerging technologies in the digital era have made their inroads in manifold domains and locations, including the “Aviation industry”. A 2022 Cranfield University and Inmarsat report has made the point for digitalization powering a reviving age for the aviation industry. Several airport authorities are presently mobilizing power of emerging technologies such as Artificial Intelligence (AI) across the airport bedrock to provide travelers with a plain sailing and expeditious air travel experience.
The Perils of Juice-Jacking
Today, Universal Serial Bus (USB) charging ports are ubiquitous and a convenient way for travelers to keep their devices powered up. In their busy, mundane lives, people use the public charging facility while travelling. However, cybersecurity experts have warned that charging in public areas could wipe off data from an electronic device or install malware, and they have urged people to stay away from USB charging ports at airports and other public areas. This leads to the possibility that fraudsters may manipulate susceptible users via juice jacking.
Investigative journalist Brian Krebs in 2011 coined the term "Juice Jacking". It isa form of cyber attack where a public USB charging port is fiddled with and infected using hardware and software changes to pocket data or install malware on devices connected to it. The term “juice jacking” is a slang representation for electric power or energy, and “hijacking” indicates an unauthorized key toa device.
While the preliminary purpose of juice jacking is usually to pilfer sensitive information from corresponding devices, such as passwords and payment card details, attackers can exploit this stolen information to attain unauthorized to your financial accounts. If the adversary attacker installs malware in the electronic device during the juice jacking strategy, the attacker may further observe the individual's movements even after one has disconnected the device from the USB port. However, the hazards of Juice Jacking include malware infection, data heist, economic loss and damage to the reputation of an individual.
RedFlags from Agencies
In2023, the Federal Bureau of Investigation (FBI) forewarned travelers against using charging stations in public zones such as hotels, airports, and shopping malls due to malicious actors attempting to use the public USB to introduce monitoring software and malware into devices. The U.S. Federal Communications Commission (FCC) has also administered a new advisory regarding “juice jacking "and its possibility of launching a hushed cyber attack against a mobile gadget while one is charging the phone with a USB cord. Similarly, according to new research from International Business Machines (IBM) Security, many nation-state hackers are currently training their eyes on travelers.
RBI Advisory
Recently in 2024, The Reserve Bank of India (RBI) has likewise administered a warning statement to mobile phone users urging them against charging their devices using public ports. RBI has additionally accentuated the importance of safeguarding private and financial data while using mobile devices. Juice jacking is further cited as one of the scams in the RBI booklet on the modus operandi of financial fraudsters in the financial space.
Preventing juice jacking attacks
The routes to avoid Juice Jacking are to keep a tab on the USB devices, not use the public charging ports, update the phone software regularly, enable and utilize the software security measures of the device, use a USB pass-through device, a wall outlet, or a backup battery; never use unknown charging cables and use only the trusted security apps. It is further important to avoid using cables that are left behind by other travelers in any public space. Users can correspondingly turn off their devices before connecting to a wary charging port. Nevertheless, the absence of documented cases does not necessarily imply that users cannot be a target of such an attack and a warning is still recommended when securing personal gadgets with susceptible user data while using standard cables. Also, using a virtual private network (VPN) and assuring that devices have the updated security updates established can aid in mitigating the danger of cyber attacks. It is equally important to utilize the security features of your device, such as passcodes, fingerprints, or facial recognition, enabled to count as a supplementary layer of safeguard.
Conclusion
In the contemporary digital age, individuals, on the whole, need to be vigilant about “Cybersecurity hygiene” and avoid accessing susceptible data or conducting financial transactions on unsecured networks. Mobile phones or devices should run on the latest operating system, and antivirus software should be revamped to mitigate conceivable security susceptibilities.
References
- https://www.forbes.com/sites/suzannerowankelleher/2023/04/20/juice-jacking-malware-phone-airports-hotels/?sh=47adab7e82ed
- https://www.businessairportinternational.com/features/how-ai-is-improving-business-aviation-operations.html
- https://www.news18.com/business/juice-jacking-attack-scam-bank-frauds-india-8412037.html
- https://www.comparitech.com/blog/information-security/juice-jacking/
- https://blogs.blackberry.com/en/2023/04/juice-jacking-advisory
- https://www.thehindubusinessline.com/info-tech/juice-jacking-rbi-issues-warning-against-charging-mobile-phones-using-public-ports/article67895091.ece
- https://www.thehindu.com/sci-tech/technology/juice-jacking-how-hackers-target-smartphones-tethered-to-public-charging-points/article67026433.ece
- https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/?sh=630f026a5955
- https://edition.cnn.com/2023/04/12/tech/fbi-public-charging-port-warning/index.html
- https://social-innovation.hitachi/en-in/knowledge-hub/hitachi-voice/digital-transformation/
- https://www.inmarsat.com/en/insights/aviation/2022/future-aviation-connectivity.html