#FactCheck – Human Helicopter or AI Illusion? The Truth Behind the Viral Flying Man Video
Executive Summary:
A viral video circulating on social media shows a man attempting to fly using a helicopter like fan attached to his body, followed by a crash onto a parked car. The clip was widely shared with humorous captions, suggesting it depicts a real life incident. Given the unusual nature of the visuals, the video was subjected to technical verification using AI content detection tools. Analysis using the AI detection platform indicates that the video is AI generated, and not a genuine real world event.
Claim:
A viral video (archive link) claims to show a person attempting to fly using a self made helicopter fan mechanism, briefly lifting off before crashing onto a car in a public setting. The video shows a man attempting to fly by strapping a helicopter like rotating fan to himself, essentially trying to imitate a human helicopter using a DIY mechanism. For a brief moment, it appears as if the device might work, but the attempt quickly fails due to lack of control, engineering support, and safety measures. Within seconds, the man loses balance and crashes down, landing on top of a parked car. The scene highlights a mix of overconfidence, unregulated experimentation, and risk taking carried out in a public space, with bystanders watching rather than intervening. The clip is shared humorously with the caption “India is not for beginners”.

Fact Check:
To verify the authenticity of the video, it was analyzed using the Hive Moderation AI detection tool, a widely used platform for identifying synthetic and AI generated media. The tool flagged the video with a high probability of AI generation, indicating that the visuals are not captured from a real physical event. Additional indicators such as unrealistic motion physics, inconsistent human object interaction further support the conclusion that the clip was artificially generated or heavily manipulated using generative AI techniques. No credible news reports or independent eyewitness sources corroborate the occurrence of such an incident.

Conclusion:
The claim that the video shows an individual attempting and failing to fly using a helicopter like device is false. Technical analysis confirms that the video is AI generated, and it should be treated as synthetic or fictional content rather than a real life incident. This case highlights how AI generated videos, when shared without context, can mislead audiences and be mistaken for real events, reinforcing the need for verification tools and critical evaluation of viral content.
- Claim: A viral video claims to show a person attempting to fly using a self made helicopter fan mechanism, briefly lifting off before crashing onto a car in a public setting
- Claimed On: X (Formally Twitter)
- Fact Check: False and Misleading
Related Blogs
.webp)
Introduction
India is confronting a wake-up call as a recent cyber incident aimed at the aviation sector underscores the fragile nature of digital systems that guide national air travel. The disclosure in Parliament has pushed the conversation on flight safety, signal integrity, and cyber readiness back into urgent focus. In a written response to a Parliamentary question, Civil Aviation Minister Ram Mohan Naidu acknowledged that GPS spoofing, a malicious method employed to alter navigation signals, had been noticed at seven major airports of the country. New Delhi flights had not been affected during the incident, but still, it was an event that again made air travel's safety, GNSS interference, and the overall cyber threat to India's airspace an issue of concern.
The Incident: What Happened?
Initial notices came from Indira Gandhi International Airport in Delhi, where the pilots of the different inbound flights talked about GPS spoofing as the reason for their landing. Spoofing is the process of sending counterfeit GPS signals which mislead the aircraft's navigation systems and may cause a wrong measure of the altitude, the position or the runway alignment. In Delhi, pilots operating under GPS-based landing procedures over Runway 10 experienced errors in their approaches and promptly switched to the alternative procedures without any delay.
The Minister said that apart from Delhi, other airports, viz. Kolkata, Amritsar, Mumbai, Hyderabad, Bengaluru, and Chennai were the 6 airports that recorded similar GNSS interference patterns consisting of both jamming and spoofing. Though no major interruptions or incidents occurred, these occurrences are a sign of a steady and enlarging threat.
Why Is GPS Spoofing So Dangerous?
Satellite navigation and communication systems are the backbone of modern aviation, which is now a matter of great precision. Signal jamming by malicious actors comes with a bunch of risks:
- Diversions and Delays: Pilots may be forced to either give up attempts to land or divert flights, which translates into higher consumption of fuel and more complicated operations due to the case of jamming.
- Threat of Safety Issue: Pilots are trained to deal with such incidents by following the prescribed fallback procedures, but still they depend very much on the GNSS signals that are accurate for safe manoeuvring, especially in low visibility situations.
- Pressure on Old Systems: Indian airports are still in the process of completely converting from ground-based navigation aids to GNSS. Signal disruptions entail the use of older technologies, which results in putting additional pressure on the already overburdened air traffic control systems.
- Opening Up Possibilities for Direct Attacks: Signal jamming can be made a tool for more clever tactics of operation that can include causing confusion during the busy traffic period or performing coordinated attacks to create chaos.
Aviation and Cyber Threats
The disturbances that have been mentioned at the seven airports are not unique. The civil aviation regulators all over the world have already reported an increase in GNSS jamming. The exemplary cases in the Middle East, Eastern Europe, and East Asia have revealed that the safety of airspace has turned into a tactical issue.
Moreover, India's quick adoption of digital technology in the aviation sector could open threat vulnerabilities from state-sponsored groups, hackers. In this instance, the government has not yet announced who was responsible for the spoofing, but the trend points to an adversary with advanced technology.
Government and Regulatory Response
The confirmation from the Civil Aviation Minister underscores a proactive stance by agencies such as:
- Directorate General of Civil Aviation (DGCA)
- Ministry of Civil Aviation
- Airports Authority of India (AAI)
The involved entities are collaborating now to do an inquiry into the cases and set up preventive measures.
The main steps that are taken in response are:
- More thorough observation of GNSS signal anomalies
- More pilot briefings and training on dealing with spoofing situations
- Improving navigation aids to set up a backup
- Working with IT security experts to find out the sources of interference
- Communicating with other global aviation authorities to share the best practices
India, being a significant player in the world aviation market, is not allowed to relax its guard. Cyberattacks on airports show how digital as well as physical security are becoming more and more intertwined.
The Bigger Picture: Protecting Critical Infrastructure
Aviation is a sector that very clearly shows that threats from cyberspace can easily translate into security issues for a nation. The airport system not only becomes more vulnerable to attacks but also the whole aviation industry as the digital ecosystems gain more complex forms together with integrated telecommunications networks, the Internet of Things (IoT)-enabled systems, and cloud-based services.
One of the many threats in the form of GNSS spoofing demonstrates so-called:
- Ransomware attacks on airport systems
- Contamination of air traffic control infrastructure
- Data breaches conducted by insiders
- Passenger data attacks
- Hinderance of airport logistics and baggage systems
What Needs to Happen Next?
India is compelled to embrace a multi-faceted approach in order to manage the intricacies of GNSS interference risk:
- Cybersecurity Measures in Aviation Enforced: New monitoring tools, anomaly detection systems, and instant response plans will be put into service.
- Redundant Technology: The non-GNSS-based navigation system will be expanded to guarantee the continuity of operations in the event of jamming.
- Cyber Drills Across all Sectors: To get pilots, air traffic control personnel, and airport operators ready, the aviation cyber drills will be conducted at the national level.
- Global Cooperation: International organisations will be approached to share the information and standardise the procedures.
- R&D and Innovations: Funding will be directed towards anti-spoofing technology, stronger satellite signals, and the domestic navigation system, like NavIC.
Conclusion
The cyberattack that targeted the seven airports serves as a clear reminder that aviation cybersecurity should not be considered a secondary issue anymore. Even though the quick reaction from the authorities managed to averted any disruptions, the event still shows the vulnerabilities of modern aviation systems. India's air travel infrastructure expansion will be a good time for the country to install its strong cybersecurity frameworks to protect its passengers, maintain the continuity of operations, and secure the airspace of its territory. At CyberPeace, we believe that a coordinated, proactive, and technology-driven approach is no longer an option, it is the new fundamental of aviation security in the digital age.
Reference

Introduction
With the increasing frequency and severity of cyber-attacks on critical sectors, the government of India has formulated the National Cyber Security Reference Framework (NCRF) 2023, aimed to address cybersecurity concerns in India. In today’s digital age, the security of critical sectors is paramount due to the ever-evolving landscape of cyber threats. Cybersecurity measures are crucial for protecting essential sectors such as banking, energy, healthcare, telecommunications, transportation, strategic enterprises, and government enterprises. This is an essential step towards safeguarding these critical sectors and preparing for the challenges they face in the face of cyber threats. Protecting critical sectors from cyber threats is an urgent priority that requires the development of robust cybersecurity practices and the implementation of effective measures to mitigate risks.
Overview of the National Cyber Security Policy 2013
The National Cyber Security Policy of 2013 was the first attempt to address cybersecurity concerns in India. However, it had several drawbacks that limited its effectiveness in mitigating cyber risks in the contemporary digital age. The policy’s outdated guidelines, insufficient prevention and response measures, and lack of legal implications hindered its ability to protect critical sectors adequately. Moreover, the policy should have kept up with the rapidly evolving cyber threat landscape and emerging technologies, leaving organisations vulnerable to new cyber-attacks. The 2013 policy failed to address the evolving nature of cyber threats, leaving organisations needing updated guidelines to combat new and sophisticated attacks.
As a result, an updated and more comprehensive policy, the National Cyber Security Reference Framework 2023, was necessary to address emerging challenges and provide strategic guidance for protecting critical sectors against cyber threats.
Highlights of NCRF 2023
- Strategic Guidance: NCRF 2023 has been developed to provide organisations with strategic guidance to address their cybersecurity concerns in a structured manner.
- Common but Differentiated Responsibility (CBDR): The policy is based on a CBDR approach, recognising that different organisations have varying levels of cybersecurity needs and responsibilities.
- Update of National Cyber Security Policy 2013: NCRF supersedes the National Cyber Security Policy 2013, which was due for an update to align with the evolving cyber threat landscape and emerging challenges.
- Different from CERT-In Directives: NCRF is distinct from the directives issued by the Indian Computer Emergency Response Team (CERT-In) published in April 2023. It provides a comprehensive framework rather than specific directives for reporting cyber incidents.
- Combination of robust strategies: National Cyber Security Reference Framework 2023 will provide strategic guidance, a revised structure, and a proactive approach to cybersecurity, enabling organisations to tackle the growing cyberattacks in India better and safeguard critical sectors.
Rising incidents of malware attacks on critical sectors
In recent years, there has been a significant increase in malware attacks targeting critical sectors. These sectors, including banking, energy, healthcare, telecommunications, transportation, strategic enterprises, and government enterprises, play a crucial role in the functioning of economies and the well-being of societies. The escalating incidents of malware attacks on these sectors have raised concerns about the security and resilience of critical infrastructure.
- Banking: The banking sector handles sensitive financial data and is a prime target for cybercriminals due to the potential for financial fraud and theft.
- Energy: The energy sector, including power grids and oil companies, is critical for the functioning of economies, and disruptions can have severe consequences for national security and public safety.
- Healthcare: The healthcare sector holds valuable patient data, and cyber-attacks can compromise patient privacy and disrupt healthcare services. Malware attacks on healthcare organisations can result in the theft of patient records, ransomware incidents that cripple healthcare operations, and compromise medical devices.
- Telecommunications: Telecommunications infrastructure is vital for reliable communication, and attacks targeting this sector can lead to communication disruptions and compromise the privacy of transmitted data. The interconnectedness of telecommunications networks globally presents opportunities for cybercriminals to launch large-scale attacks, such as Distributed Denial-of-Service (DDoS) attacks.
- Transportation: Malware attacks on transportation systems can lead to service disruptions, compromise control systems, and pose safety risks.
- Strategic Enterprises: Strategic enterprises, including defence, aerospace, intelligence agencies, and other sectors vital to national security, face sophisticated malware attacks with potentially severe consequences. Cyber adversaries target these enterprises to gain unauthorised access to classified information, compromise critical infrastructure, or sabotage national security operations.
- Government Enterprises: Government organisations hold a vast amount of sensitive data and provide essential services to citizens, making them targets for data breaches and attacks that can disrupt critical services.
Conclusion
The sectors of banking, energy, healthcare, telecommunications, transportation, strategic enterprises, and government enterprises face unique vulnerabilities and challenges in the face of cyber-attacks. By recognising the significance of safeguarding these sectors, we can emphasise the need for proactive cybersecurity measures and collaborative efforts between public and private entities. Strengthening regulatory frameworks, sharing threat intelligence, and adopting best practices are essential to ensure our critical infrastructure’s resilience and security. Through these concerted efforts, we can create a safer digital environment for these sectors, protecting vital services and preserving the integrity of our economy and society. The rising incidents of malware attacks on critical sectors emphasise the urgent need for updated cybersecurity policy, enhanced cybersecurity measures, a collaboration between public and private entities, and the development of proactive defence strategies. National Cyber Security Reference Framework 2023 will help in addressing the evolving cyber threat landscape, protect critical sectors, fill the gaps in sector-specific best practices, promote collaboration, establish a regulatory framework, and address the challenges posed by emerging technologies. By providing strategic guidance, this framework will enhance organisations’ cybersecurity posture and ensure the protection of critical infrastructure in an increasingly digitised world.

Artificial intelligence is growing at a rapid pace, with startups promising breakthroughs in industries and attracting billions in investment. Among these was Builder.ai, a London-based company founded in 2016 by an Indian entrepreneur. Once valued at over $1.5 billion, it was known for its game-changing platform that could let anyone build custom apps quickly and affordably with the help of AI.
Yet in 2025, Builder.ai collapsed dramatically, filing for bankruptcy across multiple countries and laying off nearly 80% of its workforce. What was once a celebrated unicorn has become a cautionary tale, exposing not only the risks of hype-driven growth in AI but also inflicting reputational damage on Indian founders in the global startup ecosystem.
The Rise: Big Promises, Big Investors
Builder.ai branded itself as a no-code/low-code app development platform, where its AI assistant “Natasha” would guide customers in creating apps without technical expertise. The pitch was simple and attractive: app development was made “as easy as ordering pizza.” The story resonated with major investors. Backed by SoftBank, Microsoft, and Qatar’s sovereign wealth fund, Builder.ai raised more than $450 million. It scaled rapidly, positioning itself as one of Europe’s most promising AI startups.
The Cracks Appear
Behind the glamour, the first cracks appeared as early as 2019, when The Wall Street Journal reported that Builder.ai’s platform depended far more on human engineers than on the AI automation it advertised. In reality, the much-hyped AI assistant “Natasha” was often just “a guy instead”, i.e., skilled developers in India manually writing code behind the scenes on whose backs the company expanded aggressively.
The real blow came from Builder.ai’s finances. The company was accused of inflating revenue figures by 300%, with alleged use of round-tripping tactics involving fake invoices that inflated financials. While it publicly projected revenues of $220 million in 2024, its actual figure was closer to $55 million. When this reality surfaced, investor confidence was lost quickly, and the company’s liabilities ballooned to nearly $100 million, with less than $ 10 million in assets remaining.
Collapse and Legal Scrutiny
By 2025, the company’s foundations had crumbled. The founder stepped down as CEO but retained the unusual title of “Chief Wizard.” Massive debts to AWS, Microsoft, and other partners mounted into the hundreds of millions. Assets were seized, and the company filed for bankruptcy in the U.S., UK, India, and the UAE.
For clients, the collapse meant abandoned projects. For employees, around 1,000 of them, it meant sudden unemployment. And for investors, it was a devastating loss. The Securities and Exchange Commission and U.S. Attorney’s Office in New York have since launched investigations into potential fraud and investor misrepresentation.
Reputational Damage: Impact on Indian Founders
Perhaps the most enduring consequence of Builder.ai’s downfall is the hit to the credibility of Indian founders on the global stage.
For years, Indian entrepreneurs have earned trust in global tech circles, with leaders heading companies from Google to Microsoft. Indian-led startups abroad were viewed as reliable, innovative, and growth-driven. Builder.ai’s collapse disrupts this narrative.
The allegations of inflated revenue, AI exaggeration, and questionable governance risk reinforcing skepticism among global investors regarding Indian organisational ethics. For other Indian founders seeking international capital, the road has now become tougher: stricter due diligence, harsher scrutiny of claims, and slower trust-building.
This reputational damage arrives at a critical time when India is positioning itself as a global hub for AI and leads the world in AI skill penetration. Rather than highlighting the strength of India’s entrepreneurial and talent ecosystem, the fall of Builder.ai has drawn attention to the risks of overpromising and underdelivering.
Conclusion
The fall of Builder.ai is more than the bankruptcy of one AI unicorn. It is a warning to companies against chasing hyper growth fueled by the riding of the AI wave. While the company’s downfall exposed flaws in governance and accountability, its deeper impact lies in how it dented trust. To drive AI and technology innovation, startups must move beyond flashy valuations and commit to authentic innovation, transparency, and financial integrity.
References
- https://www.moodys.com/web/en/us/insights/lending/moodys-early-warning-in-action-builder-ai.html#:~:text=Despite%20marketing%20itself%20as%20an,fake%20invoices%20that%20inflated%20financials.
- https://today-innovation.webflow.io/unveiling-the-power-of-natasha-an-ai-assistant-of-builder-ai-to-revolutionize-app-generation
- https://finance.yahoo.com/news/builder-ais-shocking-450m-fall-170009323.html
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2108810
- https://www.cnbctv18.com/technology/how-a-london-based-startups-artificial-ai-gambit-backfired-ws-l-19613692.htm#