Terrier Cyber Quest 2024 -
Territorial Army Cyber Challenge:
Innovating for the Future of Defense
75 Years of Territorial Army
The Territorial Army, often referred to as the "Citizens' Army," was established on October 9, 1949. It comprises individuals from various walks of life who contribute to the nation's defense while maintaining their civilian professions. As we approach the Platinum Jubilee of the Territorial Army, celebrating 75 years of exemplary service to the nation, the Terrier Cyber Quest 2024 forms a crucial part of our celebrations, underlining our commitment to advancing defense capabilities through cutting-edge technology.
Oct 3rd-4th
10:00 - 19:00
10:00 - 19:00
Deadline
EVENT LOCATION
The United Service
Institution of India Rao
Tula Ram Marg,
New Delhi - 110 057
Institution of India Rao
Tula Ram Marg,
New Delhi - 110 057
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
Overview
5th Edition
Terrier Cyber Quest 2024 - Territorial Army Cyber Challenge: Innovating for the Future of Defense
To commemorate 75 years of the Territorial Army, Terrier Cyber Quest 2024 is being organized by the Territorial Army in collaboration with CyberPeace. This groundbreaking national cyber challenge, the first of its kind in India, aims to unite the brightest minds from academia, industry, and the defense sector to tackle complex cybersecurity challenges. It offers a unique platform for students, researchers, and professionals to showcase their innovative concepts and develop solutions that address critical issues in national defense and cybersecurity.
CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Learn about the tracks
Track 1
10TH SEPTEMBER 2024
AeroQuest
A thrilling drone race where participants can test their skills in aerial surveillance and tactical maneuvering capabilities.
Registration
Begins on 10th September 2024. Participants can register individually or in teams of up to two members. During registration, Applicants to share a video of racing through a track on Uncrashed FPV simulator (available on steam simulator).
Final Round
The Grand Finale will be a 36 hours in-person event, where the selected top 15 participants will be invited. For the drone race event, visual inspectors equipped with flags will be stationed at each checkpoint to ensure no checkpoints are missed by the pilots. Safety nets will be provided for the checkpoint inspectors to ensure their protection. Shortlisted pilots will compete ingroups of three, with the number of groups determined based on the total number of pilots. The winning pilot from each group will advance to the next round, and pilots in subsequent rounds will be grouped according to their lap times.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
Final Round
October 3rd - October 4th, 2024
Award Ceremony
October 5th, 2024
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
Track 2
25th September 2024
Capture The Flag
A race against the clock in a realistically modelled high-stake cybersecurity challenges.
Registration
● During the registration phase, participants are required to provide basic and professional details
● Participants are required to share their Cybersecurity profiles, such as their work experience and educational background, to showcase their skill set
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise.
● Participants are required to share their Cybersecurity profiles, such as their work experience and educational background, to showcase their skill set
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise.
Shortlisting/Screening
● It will be a short Jeopardy style Capture the Flag (CTF) event.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
Final Event
● The Grand Finale will be a 36-hour in-person event.
● The top 15 individual participants, selected from the screening round, will be invited to compete.
● During this phase, participants will tackle advanced challenges across multiple categories. The event will test their technical expertise, problem-solving abilities, and endurance, as they work to solve complex problems.
● This final round will determine the ultimate winners, showcasing the best talent in a highly competitive environment.
● The top 15 individual participants, selected from the screening round, will be invited to compete.
● During this phase, participants will tackle advanced challenges across multiple categories. The event will test their technical expertise, problem-solving abilities, and endurance, as they work to solve complex problems.
● This final round will determine the ultimate winners, showcasing the best talent in a highly competitive environment.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Final Round
October 2nd - October 3rd, 2024
Award Ceremony
October 5th, 2024
Track 3
Oct 3rd - Oct 4th,2024
Datathon
Aimed at developing solutions to detect and mitigate deepfakes, with major implications for cybersecurity and public safety
Objectives:
● Accuracy: Maintain a high detection accuracy rate across various
media formats (video, audio, and pictures).
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
Competition Format:
● Registration: Begins on September 10th 2024. Participants can register individually or in teams of up to two members. Teams must submit a Proof of Concept (PoC) and a brief description of their solution during registration.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
Final Event
The Grand Finale will be a 36 hours in-person event, where the selected top 15 participants will be invited. Create a reliable method for detecting and mitigating the impact of deepfake
content in real time. The solution should focus on detecting deepfakes in videos, pictures, and audio data, with potential applications in cybersecurity, public safety, and digital forensics. The system should be capable of:
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
Final Round
October 3rd - October 4th, 2024
Award Ceremony
October 5th, 2024
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Important Dates
10
September
20
September
25
September
Shortlisting
period
period
Registration
Starts
Starts
Registration
Closes
Closes
Finalist
Announcements
Announcements
Key Highlights
Medallions and Certificates
Attractive Prizes
Boarding and Lodging
Honoring of Winners
Special Recognition
Awards will be presented by the Chief of Army Staff (COAS), Indian Army
An opportunity to contribute in the Territorial Army.
An opportunity to contribute in the Territorial Army.
Hall of Fame
In the CyberChallenge Hall of Fame, we honour the achievements of top cybersecurity champions. Join us in celebrating their accomplishments and commitment to securing our nation's cyber infrastructure.
Explore the profiles of our winners from previous years.
Explore the profiles of our winners from previous years.
Past Winners >