#FactCheck - "Deepfake Video Falsely Claims Justin Trudeau Endorses Investment Project”
Executive Summary:
A viral online video claims Canadian Prime Minister Justin Trudeau promotes an investment project. However, the CyberPeace Research Team has confirmed that the video is a deepfake, created using AI technology to manipulate Trudeau's facial expressions and voice. The original footage has no connection to any investment project. The claim that Justin Trudeau endorses this project is false and misleading.

Claims:
A viral video falsely claims that Canadian Prime Minister Justin Trudeau is endorsing an investment project.

Fact Check:
Upon receiving the viral posts, we conducted a Google Lens search on the keyframes of the video. The search led us to various legitimate sources featuring Prime Minister Justin Trudeau, none of which included promotion of any investment projects. The viral video exhibited signs of digital manipulation, prompting a deeper investigation.

We used AI detection tools, such as TrueMedia, to analyze the video. The analysis confirmed with 99.8% confidence that the video was a deepfake. The tools identified "substantial evidence of manipulation," particularly in the facial movements and voice, which were found to be artificially generated.



Additionally, an extensive review of official statements and interviews with Prime Minister Trudeau revealed no mention of any such investment project. No credible reports were found linking Trudeau to this promotion, further confirming the video’s inauthenticity.
Conclusion:
The viral video claiming that Justin Trudeau promotes an investment project is a deepfake. The research using various tools such as Google Lens, AI detection tool confirms that the video is manipulated using AI technology. Additionally, there is no information in any official sources. Thus, the CyberPeace Research Team confirms that the video was manipulated using AI technology, making the claim false and misleading.
- Claim: Justin Trudeau promotes an investment project viral on social media.
- Claimed on: Facebook
- Fact Check: False & Misleading
Related Blogs

Introduction
Since users are now constantly retrieving critical data on their mobile devices, fraudsters are now focusing on these devices. App-based, network-based, and device-based vulnerabilities are the three main ways of attacking that Mobile Endpoint Security names as mobile threats. Composed of the following features: program monitoring and risk, connection privacy and safety, psychological anomaly and reconfiguration recognition, and evaluation of vulnerabilities and management, this is how Gartner describes Mobile Threat Defense (MTD).
The widespread adoption and prevalence of cell phones among consumers worldwide have significantly increased in recent years. Users of these operating system-specific devices can install a wide range of software, or "apps," from online marketplaces like Google Play and the Apple App Store. The applications described above are the lifeblood of cell phones; they improve users' daily lives and augment the devices' performance. The app marketplaces let users quickly search for and install new programs, but certain malicious apps/links/websites can also be the origin of malware hidden among legitimate apps. These days, there are many different security issues and malevolent attacks that might affect mobile devices.
Unveiling Malware Landscape
The word "malware" refers to a comprehensive category of spyware intended to infiltrate networks, steal confidential data, cause disruptions, or grant illegal access. Malware can take many forms, such as Trojan horses, worms, ransomware, infections, spyware, and adware. Because each type has distinct goals and features, security specialists face a complex problem. Malware is a serious risk to both people and businesses. Security incidents, monetary losses, harm to one's credibility, and legal repercussions are possible outcomes. Understanding malware's inner workings is essential to defend against it effectively. Malware analysis is helpful in this situation. The practice of deconstructing and analysing dangerous software to comprehend its behaviour, operation, and consequences is known as malware analysis.Major threats targeting mobile phones
Viruses: Viruses are self-renewing programs that can steal data, launch denial of service assaults, or enact ransomware strikes. They spread by altering other software applications, adding malicious code, and running it on the target's device. Computer systems all over the world are still infected with viruses, which attack different operating systems like Mac and Microsoft Windows, even though there is a wealth of antiviral programs obtainable to mitigate their impacts.
Worms: Infections are independent apps that propagate quickly and carry out payloads—such as file deletion or the creation of botnets—to harm computers. Worms, in contrast to viruses, usually harm a computer system, even if it's just through bandwidth use. By taking advantage of holes in security or other vulnerabilities on the target computer, they spread throughout computer networks.
Ransomware: It causes serious commercial and organisational harm to people and businesses by encrypting data and demanding payment to unlock it. The daily operations of the victim organisation are somewhat disrupted, and they need to pay a ransom to get them back. It is not certain, though, that the financial transaction will be successful or that they will receive a working translation key.
Adware: It can be controlled via notification restrictions or ad-blockers, tracks user activities and delivers unsolicited advertisements. Adware poses concerns to users' privacy even though it's not always malevolent since the information it collects is frequently combined with information gathered from other places and used to build user profiles without their permission or knowledge.
Spyware: It can proliferate via malicious software or authentic software downloads, taking advantage of confidential data. This kind of spyware gathers data on users' actions without their authorisation or agreement, including:Internet activityBanking login credentialsPasswordsPersonally Identifiable Information (PII)
Navigating the Mobile Security Landscape
App-Centric Development: Regarding mobile security, app-centric protections are a crucial area of focus. Application authorisations should be regularly reviewed and adjusted to guarantee that applications only access the knowledge that is essential and to lower the probability of data misuse. Users can limit hazards and have greater oversight over their confidentiality by closely monitoring these settings. Installing trustworthy mobile security apps also adds another line of protection. With capabilities like app analysis, real-time protection, and antivirus scanning, these speciality apps strengthen your gadget's protection against malware and other harmful activity.
Network Security: Setting priorities for secure communication procedures is crucial for safeguarding confidential data and thwarting conceivable dangers in mobile security. Avoiding unprotected public Wi-Fi networks is essential since they may be vulnerable to cyberattacks. To lessen the chance of unwelcome entry and data surveillance, promote the usage of reliable, password-protected networks instead. Furthermore, by encrypting data transfer, Virtual Private Networks (VPNs) provide additional protection and make it more difficult for malevolent actors to corrupt information. To further improve security, avoid using public Wi-Fi for essential transactions and hold off until a secure network is available. Users can strengthen their handheld gadgets against possible privacy breaches by implementing these practices, which can dramatically lower the risk of data eavesdropping and illegal access.
Constant development: Maintaining a robust mobile security approach requires a dedication to constant development. Adopt a proactive stance by continuously improving and modifying your security protocols. By following up on recurring outreach and awareness campaigns, you can stay updated about new hazards. Because cybersecurity is a dynamic field, maintaining one step ahead and utilising emerging technologies is essential. Stay updated with security changes, implement the newest safeguards, and incorporate new industry standard procedures into your plan. This dedication to ongoing development creates a flexible barrier, strengthening your resistance to constantly evolving mobile security threats.
Threat emergency preparedness: To start, familiarise yourself with the ever-changing terrain associated with mobile dangers to security. Keep updated on new threats including malware, phishing, and illegal access.
Sturdy Device Management: Put in place a thorough approach to device management. This includes frequent upgrades, safe locking systems, and additional safeguarding capabilities like remote surveillance and erasing.
Customer Alertness: Emphasise proper online conduct and acquaint yourself and your team with potential hazards, such as phishing efforts.
Dynamic Measures for a Robust Wireless Safety Plan
In the dynamic field of mobile assurances, taking a proactive strategy is critical. To strengthen safeguards, thoroughly research common risks like malware, phishing, and illegal access. Establish a strong device management strategy that includes frequent upgrades, safe locking mechanisms, and remote monitoring and deletion capabilities for added security.
Promoting user awareness by educating people so they can identify and block any hazards, especially regarding phishing attempts. Reduce the dangers of data eavesdropping and illegal access by emphasising safe communication practices, using Virtual Private Networks (VPNs), and avoiding public Wi-Fi for essential transactions.
Pay close attention to app-centric integrity by periodically checking and modifying entitlements. Downloading trustworthy mobile security apps skilled at thwarting malware and other unwanted activity will enhance your smartphone's defenses. Lastly, create an atmosphere of continuous development by keeping up with new threats and utilising developing technology to make your handheld security plan more resilient overall.
Conclusion
Mobile privacy threats grow as portable electronics become increasingly integrated into daily activities. Effective defense requires knowledge of the various types of malware, such as worms, ransomware, adware, and spyware. Tools for Mobile Threat Defense, which prioritise vulnerability assessment, management, anomaly detection, connection privacy, and program monitoring, are essential. App-centric development, secure networking procedures, ongoing enhancement, threat readiness, strong device control, and user comprehension are all components of a complete mobile security strategy. People, as well as organisations, can strengthen their defenses against changing mobile security threats by implementing dynamic measures and maintaining vigilance, thereby guaranteeing safe and resilient mobile surrounding.
References
https://www.titanfile.com/blog/types-of-computer-malware/
https://www.simplilearn.com/what-is-a-trojan-malware-article
https://www.linkedin.com/pulse/latest-anti-analysis-tactics-guloader-malware-revealed-ukhxc/?trk=article-ssr-frontend-pulse_more-articles_related-content-card

Introduction
Misinformation is rampant all over the world and impacting people at large. In 2023, UNESCO commissioned a survey on the impact of Fake News which was conducted by IPSOS. This survey was conducted in 16 countries that are to hold national elections in 2024 with a total of 2.5 billion voters and showed how pressing the need for effective regulation had become and found that 85% of people are apprehensive about the repercussions of online disinformation or misinformation. UNESCO has introduced a plan to regulate social media platforms in light of these worries, as they have become major sources of misinformation and hate speech online. This action plan is supported by the worldwide opinion survey, highlighting the urgent need for strong actions. The action plan outlines the fundamental principles that must be respected and concrete measures to be implemented by all stakeholders associated, i.e., government, regulators, civil society and the platforms themselves.
The Key Areas in Focus of the Action Plan
The focus area of the action plan is on the protection of the Freedom of Expression while also including access to information and other human rights in digital platform governance. The action plan works on the basic premise that the impact on human rights becomes the compass for all decision-making, at every stage and by every stakeholder. Groups of independent regulators work in close coordination as part of a wider network, to prevent digital companies from taking advantage of disparities between national regulations. Moderation of content as a feasible and effective option at the required scale, in all regions and all languages.
The algorithms of these online platforms, particularly the social media platforms are established, but it is too often geared towards maximizing engagement rather than the reliability of information. Platforms are required to take on more initiative to educate and train users to be critical thinkers and not just hopers. Regulators and platforms are in a position to take strong measures during particularly sensitive conditions ranging from elections to crises, particularly the information overload that is taking place.
Key Principles of the Action Plan
- Human Rights Due Diligence: Platforms are required to assess their impact on human rights, including gender and cultural dimensions, and to implement risk mitigation measures. This would ensure that the platforms are responsible for educating users about their rights.
- Adherence to International Human Rights Standards: Platforms must align their design, content moderation, and curation with international human rights standards. This includes ensuring non-discrimination, supporting cultural diversity, and protecting human moderators.
- Transparency and Openness: Platforms are expected to operate transparently, with clear, understandable, and auditable policies. This includes being open about the tools and algorithms used for content moderation and the results they produce.
- User Access to Information: Platforms should provide accessible information that enables users to make informed decisions.
- Accountability: Platforms must be accountable to their stakeholders which would include the users and the public, which would ensure that redressal for content-related decisions is not compromised. This accountability extends to the implementation of their terms of service and content policies.
Enabling Environment for the application of the UNESCO Plan
The UNESCO Action Plan to counter misinformation has been created to create an environment where freedom of expression and access to information flourish, all while ensuring safety and security for digital platform users and non-users. This endeavour calls for collective action—societies as a whole must work together. Relevant stakeholders, from vulnerable groups to journalists and artists, enable the right to expression.
Conclusion
The UNESCO Action Plan is a response to the dilemma that has been created due to the information overload, particularly, because the distinction between information and misinformation has been so clouded. The IPSOS survey has revealed the need for an urgency to address these challenges in the users who fear the repercussions of misinformation.
The UNESCO action plan provides a comprehensive framework that emphasises the protection of human rights, particularly freedom of expression, while also emphasizing the importance of transparency, accountability, and education in the governance of digital platforms as a priority. By advocating for independent regulators and encouraging platforms to align with international human rights standards, UNESCO is setting the stage for a more responsible and ethical digital ecosystem.
The recommendations include integrating regulators through collaborations and promoting global cooperation to harmonize regulations, expanding the Digital Literacy campaign to educate users about misinformation risks and online rights, ensuring inclusive access to diverse content in multiple languages and contexts, and monitoring and refining tech advancements and regulatory strategies as challenges evolve. To ultimately promote a true online information landscape.
Reference
- https://www.unesco.org/en/articles/online-disinformation-unesco-unveils-action-plan-regulate-social-media-platforms
- https://www.unesco.org/sites/default/files/medias/fichiers/2023/11/unesco_ipsos_survey.pdf
- https://dig.watch/updates/unesco-sets-out-strategy-to-tackle-misinformation-after-ipsos-survey

Introduction
After the tragic bomb blast at RedFort on November 10, 2025, there is a trail of misinformation and false narratives spread rapidly across social media platforms, messaging and news channels. It can not only unfold into a public misunderstanding but can also incite panic, communal tensions and endanger lives. To prevent all of these from happening, we, as responsible citizens, can play a critical role by verifying information before sharing it with friends, family, or colleagues. This article provides guidance on practical, evidence-based strategies to navigate the information landscape and protect yourself and your community from the harm caused by misinformation and disinformation.
Digital Scams in the Aftermath of the Blast
Cybercriminals increased their activity in the hours after the Red Fort explosion, using the country’s sorrow as a chance to take advantage of fear.
Numerous allegations surfaced of residents receiving threatening calls that falsely claimed they were “digitally arrested” or that their phones, bank accounts, or Aadhaar were being “seized for investigation”, accusing them of being involved in the explosion. These fictitious intimidation calls sent innocent people into worry, anxiety, and doubt spirals.
The pattern is common after major national crises:
- Fear rises.
- People seek urgent answers.
- Cybercriminals exploit the confusion.
Knowing this makes it easier for us to remain watchful. No law enforcement organisation uses phone conversations, WhatsApp communications, or threats of “digital detention” to make arrests or conduct investigations.
Verify breaking news from trusted official channels
Whenever a crisis like bomb blasts occurs, people look for information on social media, news channels, and YouTube channels to stay fully informed about the situation. This is a very chaotic moment, and due to the lack of government verification of the initial information, false news spread rapidly.
Where to seek verified information:
a. Press Information Bureau (PIB): The official government news agency that, from time to time, clarifies viral news.
b. Delhi Police Official Channels: Check social media handles of Delhi Police.
c. Ministry of Home Affairs (MHA): MHA is responsible for internal security, and gives information about this information through official press releases and notifications.
d. Major Credible news outlets: Some news channels can be trusted with news, as they typically verify information before publishing, like The Hindu, Indian Express.
What to do:
Cross-check every unverified social media post and news that you come across from credible news channels and official government press releases.
Verify Images and videos using reverse search tools
Recently, many social media handles have been sharing old photos of different bomb blasts from Ukraine, Israel, and Palestine in the name of the Red Fort blasts. While it can create a false narrative, the same should be verified before sharing.
Reliable fact-checking resources and how to use them.
Every country has dedicated fact-checking organisations that systematically verify viral claims.
Fact-checking organisations based in India:
a. PIB Fact Check (https://factcheck.pib.gov.in/ )
· It is the official fact-checking unit of the PIB, which focuses on demystifying government-related misinformation.
· email: socialmedia@pib.gov.in
· Telegram: http://t.me/PIB_FactCheck
· Follow it on: Twitter (@PIBFactCheck), Facebook, Instagram, Telegram and WhatsApp.
How to use these resources:
· Whenever you come across any viral post, use exact keywords or quotes to find those on these resources.
· Look for the verdict (true, false, misleading), then share the verified fact-checks with your network to debunk false narratives.
Practice Digital Hygiene and Be Cautious When Sharing
Digital hygiene refers to the practices and habits individuals adopt to maintain a healthy and secure digital lifestyle. Simple digital practices can restrict the spread of misinformation. A vigilant individual can reduce the spread of misinformation. It can be done by below steps
i. Check URLs and Links: We can verify the URLs and links of any news and websites using different tools to check the credibility of any news
ii. How to Evaluate the Trustworthiness of Sources:
· Verify if the account sharing the information has a blue checkmark on most platforms.
· Examine the account's background, whether it is a recognised media source, an official government profile, or a newly created anonymous account?
· Approach posts featuring intense emotional language ("URGENT!", "SHOCKING!", "MUST SHARE!") with scepticism.
· Refrain from posting screenshots of tweets or posts while providing a link to the source, allowing others to confirm its validity.
iii. Before You Distribute:
· Question yourself: "Am I certain this is accurate based on a reliable source?"
· Avoid the temptation to share breaking news immediately; hold off until it has been confirmed by government sources.
· If you're uncertain, include a comment such as "I haven't confirmed this yet; please consult reliable sources" instead of sharing unverified information.
· Reflect on the consequences, as it might lead to panic, provoke communal violence, or damage an individual's reputation
6. How to report misinformation to platforms and authorities?
While it is important to verify news before sharing it to prevent fake news, it is also important to report it to reduce misinformation and the violence caused due to it. On social media like Facebook, Instagram, Twitter/X, WhatsApp, and Telegram, anyone can report the same on the platform.
Reporting to the Government Authorities:
a. PIB Fact Check WhatsApp (+91 8799711259):
Send Screenshots or texts of suspected government-related misinformation for verification, and then an automated acknowledgement is generated.
b. Delhi Police Cyber Crime Unit
Cyber Crimes such as Email Frauds, Social Media Crimes, Mobile App-related crimes, Business Email Compromise, Data Theft, Ransomware, Net Banking/ ATM Frauds and fake calls frauds, insurance frauds, lottery scam, bitcoin, cheating scams, online transactions frauds can be reported to the Delhi Police Cyber Crime Unit.
7. Quick checklist: What to do When You See Breaking News
· Wait before sharing any breaking news.
· Go through official channels like PIB and other official channels like MHA.
· If not available there, then cross-reference it from 2-3 credible news sources for the same information.
· Check timestamps and metadata, and compare metadata dates with claims about when events occurred.
· In case you find any information, news or any social media posts as misleading, then report the same.
CyberPeace Resolves: Pause. Reflect. Then Respond
Misinformation becomes the infection that spreads the fastest when people are confused and afraid. Every citizen is urged by CyberPeace to remain composed, stand tall, and not panic, particularly in times of national emergency.
Prior to experiencing an emotional response to any concerning call, message, or widely shared news:
Pause. Reflect. Acknowledge.
- Pause before sharing or responding.
- Reflect on whether the information is from a credible source.
- Acknowledge what you know—and what is just rumour.
CyberPeace is still dedicated to helping people and communities deal with online dangers, safeguard mental health, and dispel false information with clarity and truth.