#FactCheck- Old Georgia, Bulgaria Videos Falsely Linked to Attacks in Israel
Executive Summary
Amid uncertainty over the future of the two-week ceasefire following 21 hours of inconclusive talks between the United States and Iran, two videos linked to Israel are going viral on social media.In one clip, a man speaking at a microphone is suddenly attacked by another person. Some users claim the video shows an incident inside Israel’s parliament, the Knesset.
In another video, a similar scene is being shared with the claim that a Member of Parliament assaulted Israeli Prime Minister Benjamin Netanyahu. However, a research by the CyberPeace found both claims to be false. The videos are old and unrelated to Israel.
Claim
An Instagram user shared one of the videos claiming it shows an attack inside the Israeli parliament.Another user shared a similar clip alleging that an MP assaulted Prime Minister Netanyahu.


Fact Check
First Video
We extracted keyframes from the first viral clip and conducted a reverse image search. The footage was found on the YouTube channel of AFP News Agency, uploaded on April 15, 2024. According to the report, the video shows a scuffle inside the parliament of Georgia. The clash broke out after the government reintroduced a controversial bill, during which an opposition leader punched a ruling party MP, triggering chaos in the chamber.

The same incident was also reported by BBC on April 16, 2024, confirming that the video is from Georgia and not Israel.

Second Video
The second video has also circulated earlier with similar claims. Verification shows that it dates back to January 2013 and is from Bulgaria. Footage uploaded by the YouTube channel “On Demand News” on January 19, 2013 shows an attack on Bulgarian political leader Ahmed Dogan, when a man pointed a gun at him before being overpowered by security personnel.

Conclusion
The viral claims are false and misleading. Neither of the videos is related to Israel. The first clip is from Georgia’s parliament in April 2024, while the second dates back to a 2013 incident in Bulgaria. Both videos have been taken out of context and falsely linked to Israel and Prime Minister Benjamin Netanyahu to mislead viewers.
There is no evidence of any such attack in Israel’s parliament or on its prime minister as claimed. Users are advised to verify information before sharing such content, especially during sensitive geopolitical situations.
Related Blogs

In an era defined by perpetual technological advancement, the hitherto uncharted territories of the human experience are progressively being illuminated by the luminous glow of innovation. The construct of privacy, once a straightforward concept involving personal secrets and solitude, has evolved into a complex web of data protection, consent, and digital rights. This notion of privacy, which often feels as though it elusively ebbs and flows like the ghost of a bygone epoch, is now confronted with a novel intruder – neurotechnology – which promises to redefine the very essence of individual sanctity.
Why Neuro Rights
At the forefront of this existential conversation lie ventures like Elon Musk's Neuralink. This company, which finds itself at the confluence of fantastical dreams and tangible reality, teases a future where the contents of our thoughts could be rendered as accessible as the words we speak. An existence where machines not only decipher our mental whispers but hold the potential to echo back, reshaping our cognitive landscapes. This startling innovation sets the stage for the emergence of 'neurorights' – a paradigm aimed at erecting a metaphorical firewall around the synapses and neurons that compose our innermost selves.
At institutions such as the University of California, Berkeley, researchers, under the aegis of cognitive scientists like Jack Gallant, are already drawing the map of once-inaccessible territories within the mind. Gallant's landmark study, which involved decoding the brain activity of volunteers as they absorbed visual stimuli, opened Pandora's box regarding the implications of mind-reading. The paper published a decade ago, was an inchoate step toward understanding the narrative woven within the cerebral cortex. Although his work yielded only a rough sketch of the observed video content, it heralded an era where thought could be translated into observable media.
The Growth
This rapid acceleration of neuro-technological prowess has not gone unnoticed on the sociopolitical stage. In a pioneering spirit reminiscent of the robust legislative eagerness of early democracies, Chile boldly stepped into the global spotlight in 2021 by legislating neurorights. The Chilean senate's decision to constitutionalize these rights sent ripples the world over, signalling an acknowledgement that the evolution of brain-computer interfaces was advancing at a daunting pace. The initiative was spearheaded by visionaries like Guido Girardi, a former senator whose legislative foresight drew clear parallels between the disruptive advent of social media and the potential upheaval posed by emergent neurotechnology.
Pursuit of Regulation
Yet the pursuit of regulation in such an embryonic field is riddled with intellectual quandaries and ethical mazes. Advocates like Allan McCay articulate the delicate tightrope that policy-makers must traverse. The perils of premature regulation are as formidable as the risks of a delayed response – the former potentially stifling innovation, the latter risking a landscape where technological advances could outpace societal control, engendering a future fraught with unforeseen backlashes.
Such is the dichotomy embodied in the story of Ian Burkhart, whose life was irrevocably altered by the intervention of neurotechnology. Burkhart's experience, transitioning from quadriplegia to digital dexterity through sheer force of thought, epitomizes the utopic potential of neuronal interfaces. Yet, McCay issues a solemn reminder that with great power comes great potential for misuse, highlighting contentious ethical issues such as the potential for the criminal justice system to over extend its reach into the neural recesses of the human psyche.
Firmly ensconced within this brave new world, the quest for prudence is of paramount importance. McCay advocates for a dyadic approach, where privacy is vehemently protected and the workings of technology proffered with crystal-clear transparency. The clandestine machinations of AI and the danger of algorithmic bias necessitate a vigorous, ethical architecture to govern this new frontier.
As legal frameworks around the globe wrestle with the implications of neurotechnology, countries like India, with their burgeoning jurisprudence regarding privacy, offer a vantage point into the potential shape of forthcoming legislation. Jurists and technology lawyers, including Jaideep Reddy, acknowledge ongoing protections yet underscore the imperativeness of continued discourse to gauge the adequacy of current laws in this nascent arena.
Conclusion
The dialogue surrounding neurorights emerges, not merely as another thread in our social fabric, but as a tapestry unto itself – intricately woven with the threads of autonomy, liberty, and privacy. As we hover at the edge of tomorrow, these conversations crystallize into an imperative collective undertaking, promising to define the sanctity of cognitive liberty. The issue at hand is nothing less than a societal reckoning with the final frontier – the safeguarding of the privacy of our thoughts.
References:
.webp)
Introduction
Raksha Bandhan is a cherished festival which is celebrated every year on the full moon day of the Hindu month of Shravan. It is a festival that represents the love, care, and protection that siblings share. This year, Raksha Bandhan falls on 09th August 2025. On this day, sisters tie a sacred thread known as Rakhi on their brothers' wrists as a symbol of love and protection, and in return, brothers promise to safeguard them in all walks of life. The origin of this festival traces back to the Mahabharata, when lord Krishna injured his finger. To bandage the wound, Draupadi, also known as Panchali, tore a piece of her saree and tied it on Krishna's finger. Krishna was touched by her selfless gesture and promised to always protect her, a promise he fulfilled during Drapadi’s time of greatest need.
Today, in the evolving world driven by technology in all aspects of life, the nature of threats has evolved. In this digital age, physical safety alone is no longer enough. Alongside the traditional vow, there is now a growing need for another promise, the promise of Cyber Raksha (Cyber Safety). As we celebrate the spirit of Raksha Bandhan, this year also take the pledge of offering and taking care of the Cyber Suraksha of your sibling.
Ek Vaada Cyber Raksha ka
All the brothers and sisters share the bond of mutual care and responsibility. In the evolving threats of cybercrimes, they must understand the vulnerabilities they might face and the cyber safety tips they should be aware of to protect themselves. You must promise to guide, protect each other from online dangers, and help understand the importance of digital safety. Hence, this Raksha Bandhan, let’s also tie a knot of cyber awareness, responsibility, and digital protection, because true raksha in today’s age is not only about protection in the offline world, it is about protection in both the offline and online world.
CyberPeace has curated the following best practices for you to consider in your life and also to share with your sisters and brothers.
Password Security
It is most important to realise that cybercrooks mostly have their eyes on your passwords to target and gain access to your accounts or information. Scammers try multiple ways to get access to your passwords by way of various methods such as OTP frauds, Fake login pages (spoofing), Social engineering, Credential stuffing, Brute-force attacks, phishing, etc.
Quick Tips
- Use strong passwords.
- Regularly update passwords.
- Use separate passwords for different accounts.
- Use secure & trusted password managers.
- Use two-factor authentication for an extra layer of security.
- Make sure not to save passwords on random devices.
Social Media Security
There are endless cyber scams that take place through social media, such as identity theft, cyberbullying, cyber stalking, online harassment, data leaks, suspicious links leading to phishing and malware, exposure to inappropriate content, etc. It becomes important for netizens to protect their accounts, data, and online presence on social media platforms from the growing cyber threats.
Quick Tips
- Review app permissions and do not give any unnecessary app permissions.
- Keep your account private or customise your privacy settings as per your needs.
- Be cautious while interacting with strangers.
- Do not click on any suspicious or unknown links.
- Make sure to log out in case you have to log in to your social media on an unfamiliar device, and update your password to prevent unauthorised access.
- Always use Two-Factor authentication for your social media accounts.
- Avoid sharing too much of your personal information on the public story or public posts. This can be used by cybercriminals for social engineering.
- Use the report & block function to protect yourself from spam accounts and unwanted interactions.
- If you encounter any issue, report it to the ‘Platform’s reporting mechanism at the ‘Help Centre’.
- One can also reach out to the platform’s grievance officer.
Device Security
In today’s world, the interconnectedness is unavoidable, your devices, be it smartphones, tablets, laptops are not just tools, they are digital extensions of yourself. They contain your discussions, recollections, private information, and frequently your financial and professional information. Safeguarding your devices in the digital world can be equated with safeguarding your physical possessions against undesirable encroachments. Just like a sibling would never let anyone invade your privacy, you too must promise to keep your devices secured against malicious threats like malware, spyware, ransomware, and unauthorized access.
Quick Tips
- Update your apps, browsers, and operating systems frequently; these updates frequently contain security vulnerabilities.
- Install reliable anti-virus and anti-malware software, then perform routine device scans.
- Do not download files or apps from unidentified sources.
- Avoid using open or unprotected public Wi-Fi for private activities like email or banking.
- Employ screen locks (passwords, biometrics, or PINs) to stop unwanted physical access.
- Enable remote wipe or ‘find my Device’ functions in case your device is lost or stolen.
Digital Payments Security
Rakshabandhan is all about giving, but let’s not make it easy for cyber fraudsters to take! Convenience can come at a great cost. It often comes with a danger of fraud, phishing, and money-stealing schemes, as evidenced by the rise in digital payments and UPI transactions. But by being cautious, one can avoid being defrauded. Whether you’re gifting a sibling online or shopping for festive deals, promise yourself and your loved ones that you’ll transact wisely and safely.
Quick Tips
- Never give out your bank credentials, CVV, OTP, or UPI PIN to anyone, even if they seem trustworthy before extensively verifying their credentials.
- Before completing a transaction, confirm the account information or UPI ID.
- Refund or payment links sent by WhatsApp accounts or unknown numbers should not be clicked.
- Use only trusted apps (like BHIM, PhonePe, Google Pay, etc.) downloaded from official app stores.
Email Security
Your email serves as a key to your digital kingdom and serves as more than just a tool for communication. Your email frequently connects everything, from banking to social networking. Scammers use phishing assaults, malware attachments, and impersonation frauds to target it first. Just like a sibling watches your back, watch your inbox. Make a vow not to fall for the digital bait.
Quick tips
- Never open attachments or links in emails that seem strange or suspicious.
- Subject lines that evoke fear, such as “Account Suspended,” “Urgent Action Required” should be avoided.
- Verify the sender’s email address at all times because scammers frequently use little misspellings to deceive you.
- Set up two-factor authentication and create a secure, one of a kind password for your email accounts.
- Avoid using unprotected Wi-Fi networks or public computers to check your email.
- Avoid responding to spam emails or unsubscribing through dubious links as this could give the attacker your address.
Common scams to watch out for
Festive deals scams
As the festive season sales surge in India, so does the risk of cyber scams. Cyber crooks exploit the victims and urge them to share OTPs under the guise of preventing fraudulent activity, sharing malicious links to get sensitive information.
Mis-disinformation
The spread of mis-disinformation has surged on social media platforms. It spreads like wildfire across the digital landscape, and the need for effective strategies to counteract these challenges has grown exponentially in a very short period. ‘Prebunking’ and ‘Debunking’ are two approaches for countering the growing spread of misinformation online.
Deepfake and Voice cloning scams
By using the Deepfake technology, cybercriminals manipulate audio and video content which looks very realistic but, in actuality, is fake. Voice cloning is also a part of deepfake. To create a voice clone of anyone's, audio can be deepfaked too, which closely resembles a real one but, in actuality, is a fake voice created through deepfake technology.
Juice Jacking
Cybercriminals can hack your phone using or exploiting some public charging stations, such as at airports, Malls, hotel rooms, etc. When you plug your cell phone into a USB power charger, you may be plugging into a hacker. Juice jacking poses a security threat commonly at places that provide free charging stations for mobile devices.
Suspicious links & downloads
Suspicious links & downloads can lead you to a phishing site or install malware into your system, which can even lead to compromise your device, expose sensitive data, and cause financial losses.
Conclusion
This Rakhi, ensure your and your sibling’s online safety and security by being cybersafe and smart. You can seek assistance from the CyberPeace Helpline at helpline@cyberpeace.net

Executive Summary
A video is being widely shared on social media showing soldiers carrying coffins with full military honours. Users are claiming that the footage shows the bodies of American soldiers who were killed in the war with Iran being brought back to the United States.
However, research by the CyberPeacefound the viral claim to be misleading. Our research revealed that the video has no connection to the recent Iran-Israel conflict. The footage actually dates back to December 2025, when an Islamic State gunman in Syria killed two US soldiers and a US civilian.
Following that incident, the bodies of the victims were transported with military honours, and the ceremony was recorded in the viral video. The clip is now being circulated online with a false claim.
Claim
On March 1, 2026, an Instagram user shared the viral video claiming that it shows the bodies of American soldiers returning to the US after being killed in the war against Iran. The caption of the post reads: “Bodies of American soldiers martyred against Iran are returning to the United States. War always brings destruction, which we are now witnessing.”
The link to the post and its archived version can be seen below.

Fact check
To verify the claim, we extracted key frames from the viral video and performed a reverse image search using Google Lens. During the search, we found the full version of the video in a report published by BBC on December 18, 2025. This confirms that the footage predates the current developments.

According to the BBC report, US President Donald Trump attended a dignified transfer ceremony for two members of the US National Guard and a US civilian who were killed in Syria. The somber ceremony took place at Dover Air Force Base in Delaware, United States. The US Central Command (Centcom) stated that the two soldiers and a civilian interpreter were killed in an ambush carried out by an Islamic State (IS) gunman in Syria. The US Army identified the two soldiers as Sgt. Edgar Brian Torres-Tovar (25) of Des Moines and Sgt. William Nathaniel Howard (29) of Marshalltown. A US civilian interpreter, Ayad Mansoor Sakat, was also killed in the attack. Officials said that three other service members were injured during the attack, and the gunman was engaged and killed. Syria’s state media also reported that two Syrian security personnel were injured in the incident.
Further research led us to a report published on the News Nation YouTube channel on December 18, 2025, which also featured the same footage related to the incident.

Conclusion
Our research found that the viral video is not related to the recent Iran-Israel conflict. The footage dates back to December 2025, when two US soldiers and a US civilian were killed in an Islamic State attack in Syria. The video shows the dignified transfer of their remains and is now being shared on social media with a misleading claim.