#FactCheck - Viral Graphic Falsely Attributes Statement on UGC to CM Yogi Adityanath
Executive Summary
A news graphic is being shared on social media claiming that Uttar Pradesh Chief Minister Yogi Adityanath said,“Those who practice casteism and discrimination are the ones opposing UGC. If you do not indulge in caste-based discrimination, what is there to fear?” The CyberPeace’s research found the viral claim circulating on social media to be false. Our research revealed that Chief Minister Yogi Adityanath never made such a statement. It was also established that the viral news graphic has been digitally edited.
Claim
On February 8, a user on social media platform X (formerly Twitter) shared a news graphic bearing the logo of Navbharat Times, attributing the above statement to CM Yogi Adityanath. The post and its archived version can be seen below, along with screenshots. (Links and screenshots provided)

Fact Check:
To verify the authenticity of the claim, we conducted a keyword-based search on Google. However, we did not find any credible or reliable media report supporting the viral statement. We further examined the official social media accounts of Chief Minister Yogi Adityanath, including his Facebook and Instagram handles. Our review found no post, speech, or statement resembling the claim made in the viral graphic.
Continuing the research , we examined the official social media accounts of Navbharat Times. During this process, we found the original graphic published on the Navbharat Times Facebook page on January 26, 2026. The caption of the original graphic read: “On the occasion of Republic Day 2026, Uttar Pradesh Chief Minister Yogi Adityanath said, ‘No one is above the Constitution.’”
This clearly differs from the claim made in the viral graphic, indicating that the latter was altered.

Conclusion
Our research confirms that Uttar Pradesh Chief Minister Yogi Adityanath did not make the statement being attributed to him on social media. The viral news graphic is digitally edited and misleading. The claim, therefore, is false.
Related Blogs

Introduction
India is making strides in developing its own quantum communication capabilities, despite being a latecomer compared to nations like China and the US. In the digital age, quantum communication is gradually becoming one of the most important technologies for national security. It promises to transform secure data exchange across government, financial, and military systems by enabling unhackable communication channels through quantum concepts like entanglement and superposition. Scientists from the Defence Research and Development Organisation (DRDO) and IIT Delhi recently demonstrated quantum communication over a distance of over one kilometre in free space. One significant step at a time, India's quantum roadmap is beginning to take shape thanks to strategic partnerships between top research institutes and defence organisations.
Recent Developments
- In February 2022, by DRDO and IIT Delhi, a 100 km Quantum Key Distribution (QKD) link was established between Prayagraj and Vindhyachal using pre-existing commercial-grade optical fibre, with secure key rates of up to 10 kHz. This proved that using India's current telecom infrastructure to implement quantum-secure communication is feasible.
- Scientists at DRDO finished testing a 6-qubit superconducting quantum processor in August 2024, showing complete system integration by submitting quantum circuits through a cloud interface, running them on quantum hardware, and updating the results.
- A free-space QKD demonstration over over 1 km was conducted in June 2025, with a secure key rate of approximately 240 bits/s and a Quantum Bit Error Rate (QBER) of less than 7%. A crucial step towards satellite-based and defence-grade secure networks, this successful outdoor trial demonstrates that quantum-secure communication is now feasible in actual atmospheric conditions.
- India is looking to space as well. Since 2017, the Raman Research Institute (RRI) and ISRO have been collaborating on satellite-based QKD, with funding totalling more than ₹15 crore. In 2025, a specialised QKD-enabled satellite called SAQTI (Secured Applications using Quantum and optical Technologies by ISRO) is anticipated to go into orbit. The initiative's foundation has already been established by ground-based quantum encryption trials up to 300 meters.
- In India, private companies such as QNu Labs are assisting in the commercialisation of quantum communication. QNu, which was founded at IIT Madras, has created the plug-and-play QKD module Armos, the quantum random number generator (QRNG)Tropos, and the integrated platform QShield, which combines QKD, QRNG, and post-quantum cryptography (PQC).
Where India Stands Globally
India is still in its infancy when compared to China's 2,000 km Beijing–Shanghai QKD network and its satellite-based communication accomplishments. Leading nations like the US, UK, and Singapore are also ahead of the curve, concentrating on operationalising QKD trials for government systems and incorporating post-quantum cryptography (PQC) into national infrastructure.
However, considering the nation's limited prior exposure to quantum technologies, India's progress is noteworthy for its rapid pace and indigenous innovation.
Policy Challenges and Priorities
- Strong policy support is required to match India's efforts in quantum communication. The standardisation of PQC algorithms and their incorporation into digital public infrastructure have to be major priorities.
- Scaling innovation from lab to deployment through public-private partnership
- Accelerating satellite QKD to establish a secure communications ecosystem owned by India.
- International standards compliance and worldwide interoperability for secure quantum protocols.
Conclusion
India has made timely strides in quantum communication, spearheaded by DRDO, IITs, and ISRO. Establishing unbreakable communication systems will be essential to national security as digital infrastructure becomes more and more integrated into governance and economic life. India can establish itself as a significant player in the developing quantum-secure world with consistent investment, well-coordinated policy, and international collaboration.
References
- https://www.thehindu.com/sci-tech/science/quantum-communication-iit-delhi-drdo-entanglement-qkd-explained/article69705017.ece
- https://drdo.gov.in/drdo/quantum-technologies
- https://www.indiatoday.in/science/story/the-end-of-hacking-how-isro-and-drdo-are-building-an-unhackable-quantum-future-2743715-2025-06-22
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2136702
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=1800648
- https://thequantuminsider.com/2024/08/29/indias-drdo-scientists-complete-testing-of-6-qubit-superconducting-quantum-processor/
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2077600
- https://www.pib.gov.in/PressReleasePage.aspx?PRID=2121617
- https://www.rri.res.in/news/quic-lab-achieves-next-step-towards-realising-secure-satellite-based-quantum-communication#:~:text=QuIC%20lab%20achieves%20the%20next,transactions%2Dsafe%2D2561836.html
- https://www.gsma.com/newsroom/post-quantum-government-initiatives-by-country-and-region/
- https://tech.hindustantimes.com/tech/news/rri-demonstrates-secure-satellite-based-quantum-communication-in-collaboration-with-isro-71680375748247.html

Introduction
In today’s digital era, warfare is being redefined. Defence Minister Rajnath Singh recently stated that “we are in the age of Grey Zone and hybrid warfare where cyber-attacks, disinformation campaigns and economic warfare have become tools to achieve politico-military aims without a single shot being fired.” The crippling cyberattacks on Estonia in 2007, Russia’s interference in the 2016 US elections, and the ransomware strike on the Colonial Pipeline in the United States in 2021 all demonstrate how states are now using cyberspace to achieve strategic goals while carefully circumventing the threshold of open war.
Legal Complexities: Attribution, Response, and Accountability
Grey zone warfare challenges the traditional notions of security and international conventions on peace due to inherent challenges such as :
- Attribution
The first challenge in cyber warfare is determining who is responsible. Threat actors hide behind rented botnets, fake IP addresses, and servers scattered across the globe. Investigators can follow digital trails, but those trails often point to machines, not people. That makes attribution more of an educated guess than a certainty. A wrong guess could lead to misattribution of blame, which could beget a diplomatic crisis, or worse, a military one. - Proportional Response
Even if attribution is clear, designing a response can be a challenge. International law does give room for countermeasures if they are both ‘necessary’ and ‘proportionate’. But defining these qualifiers can be a long-drawn, contested process. Effectively, governments employ softer measures such as protests or sanctions, tighten their cyber defences or, in extreme cases, strike back digitally. - Accountability
States can be held responsible for waging cyber attacks under the UN’s Draft Articles on State Responsibility. But these are non-binding and enforcement depends on collective pressure, which can be slow and inconsistent. In cyberspace, accountability often ends up being more symbolic than real, leaving plenty of room for repeat offences.
International and Indian Legal Frameworks
Cyber law is a step behind cyber warfare since existing international frameworks are often inadequate. For example, the Tallinn Manual 2.0, the closest thing we have to a rulebook for cyber conflict, is just a set of guidelines. It says that if a cyber operation can be tied to a state, even through hired hackers or proxies, then that state can be held responsible. But attribution is a major challenge. Similarly, the United Nations has tried to build order through its Group of Governmental Experts (GGE) that promotes norms like “don’t attack. However, these norms are not binding, effectively leaving practice to diplomacy and trust.
India is susceptible to routine attacks from hostile actors, but does not yet have a dedicated cyber warfare law. While Section 66F of the IT ACT, 2000, talks about cyber terrorism, and Section 75 lets Indian courts examine crimes committed abroad if they impact India, grey-zone tactics like fake news campaigns, election meddling, and influence operations fall into a legal vacuum.
Way Forward
- Strengthen International Cooperation
Frameworks like the Tallinn Manual 2.0 can form the basis for future treaties. Bilateral and multilateral agreements between countries are essential to ensure accountability and cooperation in tackling grey zone activities. - Develop Grey Zone Legislation
India currently relies on the IT Act, 2000, but this law needs expansion to specifically cover grey zone tactics such as election interference, propaganda, and large-scale disinformation campaigns. - Establish Active Monitoring Systems
India must create robust early detection systems to identify grey zone operations in cyberspace. Agencies can coordinate with social media platforms like Instagram, Facebook, X (Twitter), and YouTube, which are often exploited for propaganda and disinformation, to improve monitoring frameworks. - Dedicated Theatre Commands for Cyber Operations
Along with the existing Defence Cyber Agency, India should consider specialised theatre commands for grey zone and cyber warfare. This would optimise resources, enhance coordination, and ensure unified command in dealing with hybrid threats.
Conclusion
Grey zone warfare in cyberspace is no longer an optional tactic used by threat actors but a routine activity. India lacks the early detection systems, robust infrastructure, and strong cyber laws to counter grey-zone warfare. To counter this, India needs sharper attribution tools for early detection and must actively push for stronger international rules in this global landscape. More importantly, instead of merely blaming without clear plans, India should focus on preparing for solid retaliation strategies. By doing so, India can also learn to use cyberspace strategically to achieve politico-military aims without firing a single shot.
References
- Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Michael N. Schmitt)
- UN Document on International Law in Cyberspace (UN Digital Library)
- NATO Cyber Defence Policy
- Texas Law Review: State Responsibility and Attribution of Cyber Intrusions
- Deccan Herald: Defence Minister on Grey Zone Warfare
- VisionIAS: Grey Zone Warfare
- Sachin Tiwari, The Reality of Cyber Operations in the Grey Zone

Overview:
It is worth stating that millions of Windows users around the world are facing the Blue Screen of Death (BSOD) problem that makes systems shutdown or restart. This has been attributed to a CrowdStrike update that was released recently and has impacted many organizations, financial institutions, and government agencies across the globe. Indian airlines have also reported disruptions on X (formerly Twitter), informing passengers about the issue.
Understanding Blue Screen of Death:
Blue Screen errors, also known as black screen errors or STOP code errors, can occur due to critical issues forcing Windows to shut down or restart. You may encounter messages like "Windows has been shut down to prevent damage to your computer." These errors can be caused by hardware or software problems.
Impact on Industries
Some of the large U. S. airlines such as American Airlines, Delta Airlines, and United Airlines had to issue ground stops because of communication problems. Also, several airports on Friday suffered a massive technical issue in check-in kiosks for IndiGo, Akasa Air, SpiceJet, and Air India Express.
The Widespread Issue
The issue seems widespread and is causing disruption across the board as Windows PCs are deployed at workplaces and other public entities like airlines, banks, and even media companies. It has been pointed out that Windows PCs use a special cybersecurity solution from a company called CrowdStrike that seems to be the culprit for this outage, affecting most Windows PC users out there.
Microsoft's Response
The issue was acknowledged by Microsoft and the mitigations are underway. The company in its verified X handle Microsoft 365 status has shared a series information on the latest outage and they are looking into the matter. The issue is under investigation.
In one of the posts from Microsoft Azure, it is mentioned that they have become aware of an issue affecting Virtual Machines (VMs) running Windows Client and Windows Server with the CrowdStrike Falcon agent installed. These VMs may encounter a bug check (BSOD) and become stuck in a restarting state. Their analysis indicates that this issue started approximately at 19:00 UTC on July 18th. They have provided recommendations as follows:
Restore from Backup: In case customers have available backups prior to 19:00 UTC on July 18th, they should recover VM data from the backups. If the customer is using Azure Backup, they can get exact steps on how to restore VM data in the Azure portal. here.
Offline OS Disk Repair: Alternatively, customers can attempt offline repair of the OS disk by attaching an unmanaged disk to the affected VM. Encrypted disks may require additional steps to unlock before repair. Once attached, delete the following file:
Windows/System/System32/Drivers/CrowdStrike/C00000291*.sys
After deletion, reattach the disk to the original VM.
Microsoft Azure is actively investigating additional mitigation options for affected customers. We will provide updates as we gather more information.
Resolving Blue Screen Errors in Windows
Windows 11 & Windows 10:
Blue Screen errors can stem from both hardware and software issues. If new hardware was added before the error, try removing it and restarting your PC. If restarting is difficult, start your PC in Safe Mode.
To Start in Safe Mode:
From Settings:
Open Settings > Update & Security > Recovery.
Under "Advanced startup," select Restart now.
After your PC restarts to the Choose an option screen, select Troubleshoot > Advanced options > Startup Settings > Restart.
After your PC restarts, you'll see a list of options. Select 4 or press F4 to start in Safe Mode. If you need to use the internet, select 5 or press F5 for Safe Mode with Networking.
From the Sign-in Screen:
Restart your PC. When you get to the sign-in screen, hold the Shift key down while you select Power > Restart.
After your PC restarts, follow the steps above.
From a Black or Blank Screen:
Press the power button to turn off your device, then turn it back on. Repeat this two more times.
After the third time, your device will start in the Windows Recovery Environment (WinRE).
From the Choose an option screen, follow the steps to enter Safe Mode.
Additional Help:
Windows Update: Ensure your system has the latest patches.
Blue Screen Troubleshooter: In Windows, open Get Help, type Troubleshoot BSOD error, and follow the guided walkthrough.
Online Troubleshooting: Visit Microsoft's support page and follow the recommendations under "Recommended Help."
If none of those steps help to resolve your Blue Screen error, please try the Blue Screen Troubleshooter in the Get Help app:
- In Windows, open Get Help.
- In the Get Help app, type Troubleshoot BSOD error.
- Follow the guided walkthrough in the Get Help app.
[Note: If you're not on a Windows device, you can run the Blue Screen Troubleshooter on your browser by going to Contact Microsoft Support and typing Troubleshoot BSOD error. Then follow the guided walkthrough under "Recommended Help."]
For detailed steps and further assistance, please refer to the Microsoft support portal or contact their support team.
CrowdStrike’s Response:
In the statement given by CrowdStrike, they have clearly mentioned it is not any cyberattack and their resources are working to fix the issue on Windows. Further, they have identified the deployment issue and fixed the same. Crowdstrike mentions about their problematic versions as follows:
- “Channel file "C-00000291*.sys" with timestamp of 0527 UTC or later is the reverted (good) version.
- Channel file "C-00000291*.sys" with timestamp of 0409 UTC is the problematic version.
Note: It is normal for multiple "C-00000291*.sys files to be present in the CrowdStrike directory - as long as one of the files in the folder has a timestamp of 0527 UTC or later, that will be the active content.”
The CrowdStrike will be providing latest updates on the same and advises their customers and organizations to contact their officials officially to get latest updates and accurate information. It is encouraged to refer to customer’s support portal for further help.
Stay safe and ensure regular backups to mitigate the impact of such issues.
References:
https://status.cloud.microsoft/
https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/