#FactCheck: Viral AI image shown as AI -171 caught fire after collision
Executive Summary:
A dramatic image circulating online, showing a Boeing 787 of Air India engulfed in flames after crashing into a building in Ahmedabad, is not a genuine photograph from the incident. Our research has confirmed it was created using artificial intelligence.

Claim:
Social media posts and forwarded messages allege that the image shows the actual crash of Air India Flight AI‑171 near Ahmedabad airport on June 12, 2025.

Fact Check:
In our research to validate the authenticity of the viral image, we conducted a reverse image search and analyzed it using AI-detection tools like Hive Moderation. The image showed clear signs of manipulation, distorted details, and inconsistent lighting. Hive Moderation flagged it as “Likely AI-generated”, confirming it was synthetically created and not a real photograph.

In contrast, verified visuals and information about the Air India Flight AI-171 crash have been published by credible news agencies like The Indian Express and Hindustan Times, confirmed by the aviation authorities. Authentic reports include on-ground video footage and official statements, none of which feature the viral image. This confirms that the circulating photo is unrelated to the actual incident.

Conclusion:
The viral photograph is a fabrication, created by AI, not a real depiction of the Ahmedabad crash. It does not represent factual visuals from the tragedy. It’s essential to rely on verified images from credible news agencies and official investigation reports when discussing such sensitive events.
- Claim: An Air India Boeing aircraft crashed into a building near Ahmedabad airport
- Claimed On: Social Media
- Fact Check: False and Misleading
Related Blogs
.webp)
Introduction
India's Competition Commission of India (CCI) on 18th November 2024 imposed a ₹213 crore penalty on Meta for abusing its dominant position in internet-based messaging through WhatsApp and online display advertising. The CCI order is passed against abuse of dominance by the Meta and relates to WhatsApp’s 2021 Privacy Policy. The CCI considers Meta a dominant player in internet-based messaging through WhatsApp and also in online display advertising. WhatsApp's 2021 privacy policy update undermined users' ability to opt out of getting their data shared with the group's social media platform Facebook. The CCI directed WhatsApp not to share user data collected on its platform with other Meta companies or products for advertising purposes for five years.
CCI Contentions
The regulator contended that for purposes other than advertising, WhatsApp's policy should include a detailed explanation of the user data shared with other Meta group companies or products specifying the purpose. The regulator also stated that sharing user data collected on WhatsApp with other Meta companies or products for purposes other than providing WhatsApp services should not be a condition for users to access WhatsApp services in India. CCI order is significant as it upholds user consent as a key principle in the functioning of social media giants, similar to the measures taken by some other markets.
Meta’s Stance
WhatsApp parent company Meta has expressed its disagreement with the Competition Commission of India's(CCI) decision to impose a Rs 213 crore penalty on them over users' privacy concerns. Meta clarified that the 2021 update did not change the privacy of people's personal messages and was offered as a choice for users at the time. It also ensured no one would have their accounts deleted or lose functionality of the WhatsApp service because of this update.
Meta clarified that the update was about introducing optional business features on WhatsApp and providing further transparency about how they collect data. The company stated that WhatsApp has been incredibly valuable to people and businesses, enabling organization's and government institutions to deliver citizen services through COVID and beyond and supporting small businesses, all of which further the Indian economy. Meta plans to find a path forward that allows them to continue providing the experiences that "people and businesses have come to expect" from them. The CCI issued cease-and-desist directions and directed Meta and WhatsApp to implement certain behavioral remedies within a defined timeline.
The competition watchdog noted that WhatsApp's 2021 policy update made it mandatory for users to accept the new terms, including data sharing with Meta, and removed the earlier option to opt-out, categorized as an "unfair condition" under the Competition Act. It was further noted that WhatsApp’s sharing of users’ business transaction information with Meta gave the group entities an unfair advantage over competing platforms.
CyberPeace Outlook
The 2021 policy update by WhatsApp mandated data sharing with Meta's other companies group, removing the opt-out option and compelling users to accept the terms to continue using the platform. This policy undermined user autonomy and was deemed as an abuse of Meta's dominant market position, violating Section 4(2)(a)(i) of the Competition Act, as noted by CCI.
The CCI’s ruling requires WhatsApp to offer all users in India, including those who had accepted the 2021 update, the ability to manage their data-sharing preferences through a clear and prominent opt-out option within the app. This decision underscores the importance of user choice, informed consent, and transparency in digital data policies.
By addressing the coercive nature of the policy, the CCI ruling establishes a significant legal precedent for safeguarding user privacy and promoting fair competition. It highlights the growing acknowledgement of privacy as a fundamental right and reinforces the accountability of tech giants to respect user autonomy and market fairness. The directive mandates that data sharing within the Meta ecosystem must be based on user consent, with the option to decline such sharing without losing access to essential services.
References

Introduction
In a groundbreaking move, India's Reserve Bank has embarked on a transformative journey with its Central Bank Digital Currency (CBDC) project. As the world grapples with the evolving landscape of digital finance, the implications of India's CBDC initiative extend beyond its borders, potentially reshaping global payment systems. The Union Minister of State for Finance, Shri Pankaj Chaudhary, revealed that on October 7, 2022, the Reserve Bank of India released a proposal note on Central Bank Digital Currency (CBDC). Two pilot projects using blockchain-based technology are described in the concept note: Digital Rupee-Wholesale (e₹-W) and Digital Rupee-Retail (e₹-R). Launched on November 1, 2022, the bulk trading pilot aims to increase intermediary competitiveness, particularly in the resolution of trades in the secondary market involving sovereign debt. In parallel, on December 1, 2022, the retail banking pilot, known as e₹-R, got underway in a limited user group with eight banks taking part in stages.
The digital asset known as e₳-R is issued across financial institutions for Person-to-Person (P2P) and Person-to-Merchant (P2M) transactions. It is intended to serve as a virtual currency that represents legal money and exhibits characteristics similar to actual cash. Based on input gathered during the continuing trial phases, the RBI intends to progressively broaden the pilot project's scope.
Central Bank Digital Currency Pilot Projects
Central Bank Digital Currency (CBDC), which the Central Bank of India is promoting, may easily perform an essential part in payments made across borders, according to Reserve Bank Governor Shaktikanta Das. The CBDC is going to be expanded to the international financial markets after being implemented as a trial in both the retail and wholesale industries.
CBDC in International Payments
He emphasized that although physical currency will still exist, the CBDC will eventually replace all forms of money worldwide.
"CBDC is going to be the future currency of the world and it is necessary that every central bank, every country works on CBDC," he stated. He also stated that as worldwide commerce moves more and more around science and technology, CBDCs will play a significant role since they can effectively and affordably speed up payment processing across different countries. Regarding India's foreign exchange reserves, the governor stated that the selection to increase the resources as a safety net and protection versus contagion possibilities was made consciously.
CBDCs' Place in the Transnational Economic Revolution
In certain economies worldwide, having a CBDC internationally accessible could lead to more replacements for foreign currencies rather than the home currencies, which could cause financial aggregates to become volatile and change the mix of instruments of exchange.
CBDC may have benefits related to first-mover savings of scale, and other consequences even in everyday circumstances. If nations with global currencies have established CBDCs, they could strengthen current advantages and disadvantages, including consequences, particularly in terms of revenue. In a similar vein, CBDC might alter the structure of international liquidity while safeguarding asset supply. Additionally, and particularly if imposed abruptly, CBDC may, in certain circumstances, result in significant capital movements and associated repercussions on the foreign exchange rate as well as additional asset prices. Furthermore, nations may encounter difficulties in getting ready for virtual currencies issued by central banks.
The worldwide and international scope of CBDCs accessible to immigrants may become particularly apparent in situations where there is a widespread flight safety concern. In these circumstances, converting a CBDC into a foreign currency would make it possible for capital markets to deleverage more quickly. The elimination of debt challenges could show up as tight finance constraints and abrupt swings in foreign exchange markets if CBDCS expedited its flight from uncertainty.
Deposits of Foreign Exchange and Self-Dependency
Reserve Bank Governor Shaktikanta Das stated "We must rely on ourselves. We must maintain our robust reserves. In order to achieve that goal, we have been amassing quite substantial reserves, and the outside world has come to feel quite confident that India would be able to fulfil its contractual responsibilities to the international community no matter what the obstacles,"
Involvement of RBI in the Currency Market
Given that the trading community was confident that the Reserve Bank of India would be capable of and able to fulfil its contractual responsibilities, the value of the Indian rupee did not decline as dramatically. The RBI governor stated that the RBI does participate in the economy, but that "our engagement operates in two ways," he would not hesitate to acknowledge this.
The Value of Macroeconomic and Budgetary Cooperation
According to RBI Governor Das, the RBI makes purchases and sales of dollars based on the direction in which the financial sector is trending. However, the RBI does not intend to set a certain level for the rupee because it does not consider any specific threshold for the Indian rupee's conversion rate against the US dollar. He also emphasized how crucial it is for both the financial and monetary authorities to work together.
Conclusion
India's CBDC project signals a transformative shift in the global digital finance landscape. Governor Shaktikanta Das envisions CBDCs as the future global currency, emphasizing their role in international payments. The potential impact on financial systems, cross-border transactions, and the need for self-reliance underscore the significance of India's CBDC initiative in shaping the evolving dynamics of the digital economy. As the project progresses, close cooperation between financial and monetary authorities becomes imperative for navigating the challenges and opportunities associated with this groundbreaking venture.
References
- https://economictimes.indiatimes.com/news/economy/policy/central-bank-digital-currency-can-play-important-role-in-cross-border-payment-rbi-guv/articleshow/104706717.cms
- https://www.bis.org/cpmi/publ/d174.pdf
- https://bfsi.economictimes.indiatimes.com/news/fintech/explained-how-rbi-is-leveraging-upi-to-push-the-use-of-retail-cbdc/103591989
- https://www.imf.org/en/News/Articles/2022/02/09/sp020922-the-future-of-money-gearing-up-for-central-bank-digital-currency
- https://www.business-standard.com/economy/news/cbdc-pilot-projects-show-promising-results-rbi-governor-shaktikanta-das-123102601171_1.html

Executive Summary
The IT giant Apple has alerted customers to the impending threat of "mercenary spyware" assaults in 92 countries, including India. These highly skilled attacks, which are frequently linked to both private and state actors (such as the NSO Group’s Pegasus spyware), target specific individuals, including politicians, journalists, activists and diplomats. In sharp contrast to consumer-grade malware, these attacks are in a league unto themselves: highly-customized to fit the individual target and involving significant resources to create and use.
As the incidence of such attacks rises, it is important that all persons, businesses, and officials equip themselves with information about how such mercenary spyware programs work, what are the most-used methods, how these attacks can be prevented and what one must do if targeted. Individuals and organizations can begin protecting themselves against these attacks by enabling "Lockdown Mode" to provide an extra layer of security to their devices and by frequently changing passwords and by not visiting the suspicious URLs or attachments.
Introduction: Understanding Mercenary Spyware
Mercenary spyware is a special kind of spyware that is developed exclusively for law enforcement and government organizations. These kinds of spywares are not available in app stores, and are developed for attacking a particular individual and require a significant investment of resources and advanced technologies. Mercenary spyware hackers infiltrate systems by means of techniques such as phishing (by sending malicious links or attachments), pretexting (by manipulating the individuals to share personal information) or baiting (using tempting offers). They often intend to use Advanced Persistent Threats (APT) where the hackers remain undetected for a prolonged period of time to steal data by continuous stealthy infiltration of the target’s network. The other method to gain access is through zero-day vulnerabilities, which is the process of gaining access to mobile devices using vulnerabilities existing in software. A well-known example of mercenary spyware includes the infamous Pegasus by the NSO Group.
Actions: By Apple against Mercenary Spyware
Apple has introduced an advanced, optional protection feature in its newer product versions (including iOS 16, iPadOS 16, and macOS Ventura) to combat mercenary spyware attacks. These features have been provided to the users who are at risk of targeted cyber attacks.
Apple released a statement on the matter, sharing, “mercenary spyware attackers apply exceptional resources to target a very small number of specific individuals and their devices. Mercenary spyware attacks cost millions of dollars and often have a short shelf life, making them much harder to detect and prevent.”
When Apple's internal threat intelligence and investigations detect these highly-targeted attacks, they take immediate action to notify the affected users. The notification process involves:
- Displaying a "Threat Notification" at the top of the user's Apple ID page after they sign in.

- Sending an email and iMessage alert to the addresses and phone numbers associated with the user's Apple ID.
- Providing clear instructions on steps the user should take to protect their devices, including enabling "Lockdown Mode" for the strongest available security.
- Apple stresses that these threat notifications are "high-confidence alerts" - meaning they have strong evidence that the user has been deliberately targeted by mercenary spyware. As such, these alerts should be taken extremely seriously by recipients.
Modus Operandi of Mercenary Spyware
- Installing advanced surveillance equipment remotely and covertly.
- Using zero-click or one-click attacks to take advantage of device vulnerabilities.
- Gain access to a variety of data on the device, including location tracking, call logs, text messages, passwords, microphone, camera, and app information.
- Installation by utilizing many system vulnerabilities on devices running particular iOS and Android versions.
- Defense by patching vulnerabilities with security updates (e.g., CVE-2023-41991, CVE-2023-41992, CVE-2023-41993).
- Utilizing defensive DNS services, non-signature-based endpoint technologies, and frequent device reboots as mitigation techniques.
Prevention Measures: Safeguarding Your Devices
- Turn on security measures: Make use of the security features that the device maker has supplied, such as Apple's Lockdown Mode, which is intended to prevent viruses of all types from infecting Apple products, such as iPhones.
- Frequent software upgrades: Make sure the newest security and software updates are installed on your devices. This aids in patching holes that mercenary malware could exploit.
- Steer clear of misleading connections: Exercise caution while opening attachments or accessing links from unidentified sources. Installing mercenary spyware is possible via phishing links or attachments.
- Limit app permissions: Reassess and restrict app permissions to avoid unwanted access to private information.
- Use secure networks: To reduce the chance of data interception, connect to secure Wi-Fi networks and stay away from public or unprotected connections.
- Install security applications: To identify and stop any spyware attacks, think about installing reliable security programs from reliable sources.
- Be alert: If Apple or other device makers send you a threat notice, consider it carefully and take the advised security precautions.
- Two-factor authentication: To provide an extra degree of protection against unwanted access, enable two-factor authentication (2FA) on your Apple ID and other significant accounts.
- Consider additional security measures: For high-risk individuals, consider using additional security measures, such as encrypted communication apps and secure file storage services
Way Forward: Strengthening Digital Defenses, Strengthening Democracy
People, businesses and administrations must prioritize cyber security measures and keep up with emerging dangers as mercenary spyware attacks continue to develop and spread. To effectively address the growing threat of digital espionage, cooperation between government agencies, cybersecurity specialists, and technology businesses is essential.
In the Indian context, the update carries significant policy implications and must inspire a discussion on legal frameworks for government surveillance practices and cyber security protocols in the nation. As the public becomes more informed about such sophisticated cyber threats, we can expect a greater push for oversight mechanisms and regulatory protocols. The misuse of surveillance technology poses a significant threat to individuals and institutions alike. Policy reforms concerning surveillance tech must be tailored to address the specific concerns of the use of such methods by state actors vs. private players.
There is a pressing need for electoral reforms that help safeguard democratic processes in the current digital age. There has been a paradigm shift in how political activities are conducted in current times: the advent of the digital domain has seen parties and leaders pivot their campaigning efforts to favor the online audience as enthusiastically as they campaign offline. Given that this is an election year, quite possibly the most significant one in modern Indian history, digital outreach and online public engagement are expected to be at an all-time high. And so, it is imperative to protect the electoral process against cyber threats so that public trust in the legitimacy of India’s democratic is rewarded and the digital domain is an asset, and not a threat, to good governance.