#FactCheck - Bangladesh video falsely shared as BSF arresting an infiltrator at Bengal border
Executive Summary
A video showing security personnel overpowering a man is being widely shared on social media with the claim that it shows the Border Security Force (BSF) arresting an infiltrator attempting to cross the India-Bangladesh border in West Bengal. However, research by CyberPeace Research Wing found that the claim is false. The viral video is from Bangladesh and is unrelated to India or the BSF.
Claim
An X user shared the viral video claiming: “He was crossing the Bengal border from beneath the barbed fencing when the BSF caught him on the spot.”
The post was circulated as an incident from the India-Bangladesh border in West Bengal.

Fact Check
To verify the claim, we extracted keyframes from the viral video and conducted a reverse image search. During the research, we found the same video posted on 21 March 2026 by an X handle named “Niru Nahar.”
According to the caption of that post, the video showed Bangladesh Border Guards arresting BNP leader Mizan, also known as “Baba Mizan,” near the border.

Further research led us to a Facebook post uploaded on 22 March 2026 by Bangladeshi news platform Jono Pulse. The post identified the detained individual as “Juel,” an alleged drug trafficker from Chapainawabganj, and stated that he had been arrested by the Border Guard Bangladesh (BGB).
Chapainawabganj is located in Bangladesh, confirming that the video is unrelated to West Bengal or the BSF.

Conclusion
The viral claim is misleading. The video does not show the BSF arresting an infiltrator at the Bengal border. It is actually from Bangladesh and depicts a separate incident involving Border Guard Bangladesh personnel.
Related Blogs

What are Decentralised Autonomous Organizations (DAOs)?
A Decentralised Autonomous Organisation or a DAO, is a unique take on democracy on the blockchain. It is a set of rules encoded into a self-executing contract (also known as a smart contract) that operates autonomously on a blockchain system. A DAO imitates a traditional company, although, in its more literal sense, it is a contractually created entity. In theory, DAOs have no centralised authority in making decisions for the system; it is a communally run system whereby all decisions (be it for internal governance or for the development of the blockchain system) are voted upon by the community members. DAOs are primarily characterised by a decentralised form of operation, where there is no one entity, group or individual running the system. They are self-sustaining entities, having their own currency, economy and even governance, that do not depend on a group of individuals to operate. Blockchain systems, especially DAOs are characterised by pure autonomy created to evade external coercion or manipulation from sovereign powers. DAOs follow a mutually created, agreed set of rules created by the community, that dictates all actions, activities, and participation in the system’s governance. There may also be provisions that regulate the decision-making power of the community.
Ethereum’s DAO’s White Paper described DAO as “The first implementation of a [DAO Entity] code to automate organisational governance and decision making.” Can be used by individuals working together collaboratively outside of a traditional corporate form. It can also be used by a registered corporate entity to automate formal governance rules contained in corporate bylaws or imposed by law.” The referred white paper proposes an entity that would use smart contracts to solve governance issues inherent in traditional corporations. DAOs attempt to redesign corporate governance with blockchain such that contractual terms are “formalised, automated and enforced using software.”
Cybersecurity threats under DAOs
While DAOs offer increased transparency and efficiency, they are not immune to cybersecurity threats. Cybersecurity risks in DAO, primarily in governance, stem from vulnerabilities in the underlying blockchain technology and the DAO's smart contracts. Smart contract exploits, code vulnerabilities, and weaknesses in the underlying blockchain protocol can be exploited by malicious actors, leading to unauthorised access, fund manipulations, or disruptions in the governance process. Additionally, DAOs may face challenges related to phishing attacks, where individuals are tricked into revealing sensitive information, such as private keys, compromising the integrity of the governance structure. As DAOs continue to evolve, addressing and mitigating cybersecurity threats is crucial to ensuring the trust and reliability of decentralised governance mechanisms.
Centralisation/Concentration of Power
DAOs today actively try to leverage on-chain governance, where any governance votes or transactions are directly taken on the blockchain. But such governance is often plutocratic in nature, where the wealthy hold influences, rather than democracies, since those who possess the requisite number of tokens are only allowed to vote and each token staked implies that many numbers of votes emerge from the same individual. This concentration of power in the hands of “whales” often creates disadvantages for the newer entrants into the system who may have an in-depth background but lack the funds to cast a vote. Voting, presently in the blockchain sphere, lacks the requisite concept of “one man, one vote” which is critical in democratic societies.
Smart contract vulnerabilities and external threats
Smart contracts, self-executing pieces of code on a blockchain, are integral to decentralised applications and platforms. Despite their potential, smart contracts are susceptible to various vulnerabilities such as coding errors, where mistakes in the code can lead to funds being locked or released erroneously. Some of them have been mentioned as follows;
Smart Contracts are most prone to re-entrance attacks whereby an untrusted external code is allowed to be executed in a smart contract. This scenario occurs when a smart contract invokes an external contract, and the external contract subsequently re-invokes the initial contract. This sequence of events can lead to an infinite loop, and a reentrancy attack is a tactic exploiting this vulnerability in a smart contract. It enables an attacker to repeatedly invoke a function within the contract, potentially creating an endless loop and gaining unauthorised access to funds.
Additionally, smart contracts are also prone to oracle problems. Oracles refer to third-party services or mechanisms that provide smart contracts with real-world data. Since smart contracts on blockchain networks operate in a decentralised, isolated environment, they do not have direct access to external information, such as market prices, weather conditions, or sports scores. Oracles bridge this gap by acting as intermediaries, fetching and delivering off-chain data to smart contracts, enabling them to execute based on real-world conditions. The oracle problem within blockchain pertains to the difficulty of securely incorporating external data into smart contracts. The reliability of external data poses a potential vulnerability, as oracles may be manipulated or provide inaccurate information. This challenge jeopardises the credibility of blockchain applications that rely on precise and timely external data.
Sybil Attack: A Sybil attack involves a single node managing multiple active fake identities, known as Sybil identities, concurrently within a peer-to-peer network. The objective of such an attack is to weaken the authority or influence within a trustworthy system by acquiring the majority of control in the network. The fake identities are utilised to establish and exert this influence. A successful Sybil attack allows threat actors to perform unauthorised actions in the system.
Distributed Denial of Service Attacks: A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular functioning of a network, service, or website by overwhelming it with a flood of traffic. In a typical DDoS attack, multiple compromised computers or devices, often part of a botnet (a network of infected machines controlled by a single entity), are used to generate a massive volume of requests or data traffic. The targeted system becomes unable to respond to legitimate user requests due to the excessive traffic, leading to a denial of service.
Conclusion
Decentralised Autonomous Organisations (DAOs) represent a pioneering approach to governance on the blockchain, relying on smart contracts and community-driven decision-making. Despite their potential for increased transparency and efficiency, DAOs are not immune to cybersecurity threats. Vulnerabilities in smart contracts, such as reentrancy attacks and oracle problems, pose significant risks, and the concentration of voting power among wealthy token holders raises concerns about democratic principles. As DAOs continue to evolve, addressing these challenges is essential to ensuring the resilience and trustworthiness of decentralised governance mechanisms. Efforts to enhance security measures, promote inclusivity, and refine governance models will be crucial in establishing DAOs as robust and reliable entities in the broader landscape of blockchain technology.
References:
https://www.imperva.com/learn/application-security/sybil-attack/
https://www.linkedin.com/posts/satish-kulkarni-bb96193_what-are-cybersecurity-risk-to-dao-and-how-activity-7048286955645677568-B3pV/ https://www.geeksforgeeks.org/what-is-ddosdistributed-denial-of-service/ Report of Investigation Pursuant to Section 21 (a) of the Securities Exchange Act of 1934: The DAO, Securities and Exchange Board, Release No. 81207/ July 25, 2017
https://www.sec.gov/litigation/investreport/34-81207.pdf https://www.legalserviceindia.com/legal/article-10921-blockchain-based-decentralized-autonomous-organizations-daos-.html

Executive Summary:
Amid the ongoing conflict involving the US-Israel and Iran, Tehran has claimed that it shot down a US F-35 fighter jet. In this context, a video is going viral on social media showing a crashed American fighter aircraft on the ground. It is being claimed that the footage shows Iran downing a US F-35 jet. However, an research by the CyberPeace found that the viral video is a deepfake and not real. The clip appears to have been created using Google AI tools.
Claim:
A social media user “Azania” shared the viral video on March 20, 2026, with the caption,“#Iran hit the 5th generation F-35 fighter of the #US Air Force… An American F-35 fighter made an emergency landing at an air base in the Middle East after coming under Iranian fire, sources told CNN.”

Fact Check:
We began our research with a news search and found multiple reports stating that a US F-35 fighter jet was damaged during a combat mission over Iran. According to reports, Iran’s Islamic Revolutionary Guard Corps (IRGC) claimed to have damaged a US F-35 jet and also released a video. As per a CNN report, US officials confirmed that an American F-35 was damaged during a mission over Iran, forcing it to make an emergency landing at a US airbase in the Middle East. The pilot was safe and in stable condition, and the incident is currently under research .
A spokesperson for the US Central Command, Captain Tim Hawkins, also acknowledged that an F-35 made an emergency landing during the mission. However, the US has not officially confirmed that the damage was caused by an Iranian attack.Reports by Fox News and The Times of India also mention the emergency landing of the aircraft.

Upon closely examining the viral video, we noticed several inconsistencies indicating possible AI manipulation. We then analyzed the clip using Hive Moderation, which indicated nearly a 79 percent probability that the video is AI-generated. The analysis also suggests that it was likely created using Google’s AI video generation tools (Veo).

Conclusion:
The viral video claiming to show Iran shooting down a US F-35 fighter jet is AI-generated and not real. While Iran has claimed to have targeted a US F-35, and the US has confirmed an emergency landing during a mission, there is no official confirmation that the aircraft was shot down by Iran.

Executive Summary
Amid the ongoing conflict involving the US-Israel and Iran in West Asia, a video showing destroyed aircraft at an airport is going viral on social media. The clip is being shared with the claim that it shows an Israeli military base destroyed in an Iranian attack. However, an research by the CyberPeacen found that the viral video is not real but AI-generated.
Claim:
An Instagram user “sakirali8064” shared the video on March 22, 2026, claiming that Iran had demonstrated its military strength by deploying advanced missiles capable of long-range precision strikes.The video also carries a “Breaking News” overlay stating:“Iran attack Israel military base… the entire base destroyed.
Post link and archive link:

Fact Check:
To verify the claim, we extracted keyframes from the viral clip and conducted a reverse image search using Google Lens. We found a longer version of the same video posted on March 5, 2026, by a Facebook user named “With INC,” where it was also falsely linked to an Iranian attack on Israel’s Ben Gurion Airport.

Upon closely examining the video, we observed inconsistencies such as fire changing positions unnaturally, which raised suspicion of AI manipulation. We then analyzed the video using Hive Moderation, which indicated a probability of over 99% that the content is AI-generated.

Additionally, analysis using Tencent’s “Zhuque AI” detection tool suggested more than 78% likelihood of the video being AI-generated.

Conclusion:
The viral video claiming that an Iranian attack destroyed an Israeli military base is AI-generated and misleading. While Iran has claimed to have targeted Israel’s Ben Gurion International Airport using drones, the viral footage does not depict a real event.