#FactCheck- Delhi Metro Rail Corporation Price Hike
Executive Summary:
Recently, a viral social media post alleged that the Delhi Metro Rail Corporation Ltd. (DMRC) had increased ticket prices following the BJP’s victory in the Delhi Legislative Assembly elections. After thorough research and verification, we have found this claim to be misleading and entirely baseless. Authorities have asserted that no fare hike has been declared.
Claim:
Viral social media posts have claimed that the Delhi Metro Rail Corporation Ltd. (DMRC) increased metro fares following the BJP's victory in the Delhi Legislative Assembly elections.


Fact Check:
After thorough research, we conclude that the claims regarding a fare hike by the Delhi Metro Rail Corporation Ltd. (DMRC) following the BJP’s victory in the Delhi Legislative Assembly elections are misleading. Our review of DMRC’s official website and social media handles found no mention of any fare increase.Furthermore, the official X (formerly Twitter) handle of DMRC has also clarified that no such price hike has been announced. We urge the public to rely on verified sources for accurate information and refrain from spreading misinformation.

Conclusion:
Upon examining the alleged fare hike, it is evident that the increase pertains to Bengaluru, not Delhi. To verify this, we reviewed the official website of Bangalore Metro Rail Corporation Limited (BMRCL) and cross-checked the information with appropriate evidence, including relevant images. Our findings confirm that no fare hike has been announced by the Delhi Metro Rail Corporation Ltd. (DMRC).

- Claim: Delhi Metro price Hike after BJP’s victory in election
- Claimed On: X (Formerly Known As Twitter)
- Fact Check: False and Misleading
Related Blogs
.webp)
Introduction
MEITY’s Indian Computer Emergency Response Team (CERT-In) in collaboration with SISA, a global leader in forensics-driven cyber security company, launched the ‘Certified Security Professional for Artificial Intelligence’ (CSPAI) program on 23rd September. This initiative marks the first of its kind ANAB-accredited AI security certification. The CSPAI also complements global AI governance efforts. International efforts like the OECD AI Principles and the European Union's AI Act, which aim to regulate AI technologies to ensure fairness, transparency, and accountability in AI systems are the sounding board for this initiative.
About the Initiative
The Certified Security Professional for Artificial Intelligence (CSPAI) is the world’s first ANAB-accredited certification program that focuses on Cyber Security for AI. The collaboration between CERT-In and SISA plays a pivotal role in shaping AI security policies. Such partnerships between the public and private players bridge the gap between government regulatory needs and the technological expertise of private players, creating comprehensive and enforceable AI security policies. The CSPAI has been specifically designed to integrate AI and GenAI into business applications while aligning security measures to meet the unique challenges that AI systems pose. The program emphasises the strategic application of Generative AI and Large Language Models in future AI deployments. It also highlights the significant advantages of integrating LLMs into business applications.
The program is tailored for security professionals to understand the do’s and don’ts of AI integration into business applications, with a comprehensive focus on sustainable practices for securing AI-based applications. This is achieved through comprehensive risk identification and assessment frameworks recommended by ISO and NIST. The program also emphasises continuous assessment and conformance to AI laws across various nations, ensuring that AI applications adhere to standards for trustworthy and ethical AI practices.
Aim of the Initiative
As AI technology integrates itself to become an intrinsic part of business operations, a growing need for AI security expertise across industries is visible. Keeping this thought in the focal point, the accreditation program has been created to equip professionals with the knowledge and tools to secure AI systems. The CSPAI program aims to make a safer digital future while creating an environment that fosters innovation and responsibility in the evolving cybersecurity landscape focusing on Generative AI (GenAI) and Large Language Models (LLMs).
Conclusion
This Public-Private Partnership between the CERT-In and SISA, which led to the creation of the Certified Security Professional for Artificial Intelligence (CSPAI) represents a groundbreaking initiative towards AI and its responsible usage. CSPAI can be seen as an initiative addressing the growing demand for cybersecurity expertise in AI technologies. As AI becomes more embedded in business operations, the program aims to equip security professionals with the knowledge to assess, manage, and mitigate risks associated with AI applications. CSPAI as a programme aims to promote trustworthy and ethical AI usage by aligning with frameworks from ISO and NIST and ensuring adherence to AI laws globally. The approach is a significant step towards creating a safer digital ecosystem while fostering responsible AI innovation. This certification will significantly impact the healthcare, finance, and defence sectors, where AI is rapidly becoming indispensable. By ensuring that AI applications meet the requirements of security and ethical standards in these sectors, CSPAI can help build public trust and encourage broader AI adoption.
References
- https://pib.gov.in/PressReleasePage.aspx?PRID=2057868
- https://www.sisainfosec.com/training/payment-data-security-programs/cspai/
- https://timesofindia.indiatimes.com/business/india-business/cert-in-and-sisa-launch-ai-security-certification-program-to-integrate-ai-into-business-applications/articleshow/113622067.cms

Pretext
The Army Welfare Education Society has informed the Parents and students that a Scam is targeting the Army schools Students. The Scamster approaches the students by faking the voice of a female and a male. The scamster asks for the personal information and photos of the students by telling them they are taking details for the event, which is being organised by the Army welfare education society for the celebration of independence day. The Army welfare education society intimated that Parents to beware of these calls from scammers.
The students of Army Schools of Jammu & Kashmir, Noida, are getting calls from the scamster. The students were asked to share sensitive information. Students across the country are getting calls and WhatsApp messages from two numbers, which end with 1715 and 2167. The Scamster are posing to be teachers and asking for the students’ names on the pretext of adding them to the WhatsApp Groups. The scamster then sends forms links to the WhatsApp groups and asking students to fill out the form to seek more sensitive information.
Do’s
- Do Make sure to verify the caller.
- Do block the caller while finding it suspicious.
- Do be careful while sharing personal Information.
- Do inform the School Authorities while receiving these types of calls and messages posing to be teachers.
- Do Check the legitimacy of any agency and organisation while telling the details
- Do Record Calls asking for personal information.
- Do inform parents about scam calling.
- Do cross-check the caller and ask for crucial information.
- Do make others aware of the scam.
Don’ts
- Don’t answer anonymous calls or unknown calls from anyone.
- Don’t share personal information with anyone.
- Don’t Share OTP with anyone.
- Don’t open suspicious links.
- Don’t fill any forms, asking for personal information
- Don’t confirm your identity until you know the caller.
- Don’t Reply to messages asking for financial information.
- Don’t go to a fake website by following a prompt call.
- Don’t share bank Details and passwords.
- Don’t Make payment over a prompt fake call.

Introduction
In real-time warfare scenarios of this modern age, where actions occur without delay, the relevance of edge computing emerges as paramount. By processing data close to the source in the battlefield with the help of a drone or through video imaging from any military vehicle or aircraft, the concept of edge computing allows the military to point targets faster and strike with accuracy. It also enables local processing to relay central data, helping ground troops get intelligence inputs to act rapidly in critical mission scenarios.
As the global security landscape experiences a significant transformation in different corners of the world, it presents unprecedented challenges in the present scenario. In this article, we will try to understand how countries can maintain their military capabilities with the help of advanced technologies like edge computing.
Edge Computing in Modern Warfare
Edge computing involves the processing and storage of data at the point of collection on the battlefield, for example, through vehicles and drones, instead of relying on centralized data centers. This enables faster decision-making in real-time. This approach creates a resilient and secure network by reducing reliance on potentially compromised external connections, supporting autonomous systems, precision-based targeting, and data sharing among military personnel, drones, and command centers amidst a challenging environment.
A report released by the US Department of Defence in March 2025 found a crucial reality surrounding the operation of hardware relying on outdated industrial-age processes in the digital era. In the case of applications with video, edge computing helps to deliver significant advantages to a wide range of crucial military operations, which include:
- Situational awareness with real-time data processing that provides improved battlefield visibility and proper threat detection.
- Autonomous warfare systems such as drones, which use a tactical edge cloud computing to get the capability to navigate faster.
- Developing a strong communication and networking capability to secure low-latency communication for troops to stay connected in challenging environments.
- Ensuring predictive maintenance with the help of effective sensors to carry out edge detection and attrition at an early point, thereby reducing equipment failures.
- Developing effective targeting and weapons systems to ensure faster processing to enable precision-based targeting and response, besides a strong logistics and supply chain that can provide real-time tracking to improve delivery accuracy and resource management.
This report also highlighted that the DoD is rapidly updating its software and investing in AI enablers like data sets or MLOps tools. This also stresses the breaking down of integration barriers by enforcing MOSA (Modular Open Systems Approaches), APIs (Application Programming Interface), and modular interfaces to ensure interoperability across platforms, sensors, and networks to make software-defined warfare an effective strategy.
Developing Edge with Artificial Intelligence for Future Warfare
A significant insight from the work of the US Department of Defense is its emphasis on the importance of edge computing in shaping the future of warfare. In that context, the Annual Threat Assessment Report highlights a key limitation of traditional AI strategies that rely on centralised cloud computing, since these might not be suitable for modern battlefields with congested networks and limited bandwidth. The need for real-time data processing requires a distributed and edge-based AI solution to address contemporary threats. This report also directly supports the deployment of effective edge with AI in a defined, disrupted, intermittent, and limited-bandwidth (DDIL) environment. In that case, when the communication networks fail, the edge servers at the edge of the network offer crucial advantages that cloud-dependent systems cannot. This ability to analyse data and make decisions without consistent connectivity and operate with limited computational resources is a strategic necessity.
The scenario of warfare is a phenomenon that requires maintaining a strong strategic and tactical approach, which, in the present times, is being examined through the domain of digital platforms. Modern warfare patterns demand faster decision-making and edge computing deliveries by shifting the power of distant servers to the frontlines. The US military is already moving in the direction of deploying edge-enabled systems to prove the nature of sensors and networks to compute at the tactical edge to transform warfighting.
However, it can be understood with the help of an example, as creating fusion in the skies with F-35s. As they have showcased the capability of edge computing by fusing sensor data with MADL (Multi-Functional Advanced Data Link) to create a unified picture, making the squadrons a force multiplier. An example of this was visible when an F-35 relayed real-time tracking data, enabling a navy ship to neutralise a missile beyond its range.
Conclusion: The Way Ahead
As the changing nature of warfare moves towards adopting software-defined systems, where edge computing thrives as a futuristic military technology, it calls for the need for integration across all domains of warfighting. But at the same time, several imperatives do emerge, such as:
- Developing an open architecture that enables both flexibility and innovation.
- Ensuring an effective connectivity that actually combines a confluence of legacy systems.
- Developing interoperability among the systems that can function in synergy with all platforms and can function across all domains.
- Prioritising edge-native AI development systems, where it is also necessary to ensure the shift to adopting cloud-based AI models to create solutions optimised from the ground up for edge deployment.
- Investing in edge infrastructure to establish a robust edge computing infrastructure that enables rapid deployment by testing and updating AI capabilities across diverse hardware platforms. Like the way the military training academies in India are developing training infrastructures for training officer cadets or personnel to handle drones and all forms of advanced warfare tactics emerging in this age.
- Fostering talent and expertise by embracing commercial solutions where software talent could be enabled across the enterprises with expertise in edge computing capabilities and AI. In this case, the role of the commercial sector can help to drive innovations in edge AI, and the only way to move in this direction is by leveraging these advances through partnerships and collaborative efforts.
Taking the example of the ARPANET, which once seeded the modern internet, edge computing can also help to create a transformative network effect within the digital battlespace. In conclusion, future conflicts will be defined by the speed and accuracy provided by the edge, as nations integrating AI and robust edge infrastructures can hold a strong advantage in the multi-domain battlefields in the future.
References
- https://www.idsa.in/mpidsanews/rk-narangs-article-what-the-regions-first-drone-warfare-taught-us-published-in-the-new-indian-express
- https://latentai.com/blog/software-defined-warfare-why-edge-ai-is-critical-to-americas-defense-future/
- https://www.boozallen.com/s/insight/blog/how-the-us-military-is-using-edge-computing.html
- https://capsindia.org/wp-content/uploads/2022/08/RK-Narang-3.pdf
- https://www.newindianexpress.com/opinions/2025/May/12/what-the-regions-first-drone-warfare-taught-us
- https://www.maris-tech.com/blog/edge-computing-in-the-military-challenges-and-solutions/#:~:text=In%20modern%20warfare%2C%20decisions%20need,enables%20precision%20targeting%20and%20response
- https://cassindia.com/digital-soldiers/