Terrier Cyber Quest 2024 -
Territorial Army Cyber Challenge:
Innovating for the Future of Defense
75 Years of Territorial Army
The Territorial Army, often referred to as the "Citizens' Army," was established on October 9, 1949. It comprises individuals from various walks of life who contribute to the nation's defense while maintaining their civilian professions. As we approach the Platinum Jubilee of the Territorial Army, celebrating 75 years of exemplary service to the nation, the Terrier Cyber Quest 2024 forms a crucial part of our celebrations, underlining our commitment to advancing defense capabilities through cutting-edge technology.
Oct 3rd-4th
10:00 - 19:00
10:00 - 19:00
Deadline
EVENT LOCATION
The United Service
Institution of India Rao
Tula Ram Marg,
New Delhi - 110 057
Institution of India Rao
Tula Ram Marg,
New Delhi - 110 057
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
Overview
5th Edition
Terrier Cyber Quest 2024 - Territorial Army Cyber Challenge: Innovating for the Future of Defense
To commemorate 75 years of the Territorial Army, Terrier Cyber Quest 2024 is being organized by the Territorial Army in collaboration with CyberPeace. This groundbreaking national cyber challenge, the first of its kind in India, aims to unite the brightest minds from academia, industry, and the defense sector to tackle complex cybersecurity challenges. It offers a unique platform for students, researchers, and professionals to showcase their innovative concepts and develop solutions that address critical issues in national defense and cybersecurity.
CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Learn about the tracks
Track 1
10TH SEPTEMBER 2024
AeroQuest
Imagine the possibilities when the power of advanced drone technology is harnessed for our nation’s defense. Participate in a Drone Race that will enhance our aerial capabilities, from surveillance to tactical support.
Registration
Begins on 10th September 2024. Participants can register individually or in teams of up to two members. During registration, Applicants to share a video of racing through a track on Uncrashed FPV simulator (available on steam simulator).
Final Round
The Grand Finale will be a 36 hours in-person event, where the selected top 15 participants will be invited. For the drone race event, visual inspectors equipped with flags will be stationed at each checkpoint to ensure no checkpoints are missed by the pilots. Safety nets will be provided for the checkpoint inspectors to ensure their protection. Shortlisted pilots will compete ingroups of three, with the number of groups determined based on the total number of pilots. The winning pilot from each group will advance to the next round, and pilots in subsequent rounds will be grouped according to their lap times.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
Final Round
October 3rd - October 4th, 2024
Award Ceremony
October 5th, 2024
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
Track 2
25th September 2024
Capture The Flag
Theme: Securing The Nation’s Infrastructure
The silent battle of the digital age. Your mission is to identify and rectify vulnerabilities within critical systems. Find the flaws, patch the gaps, and fortify our defenses against all odds.
Registration
● During the registration phase, participants are required to provide basic and professional details
● Participants are required to share their Cybersecurity profiles, such as their work experience and educational background, to showcase their skill set
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise
● Participants are required to share their Cybersecurity profiles, such as their work experience and educational background, to showcase their skill set
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise
Shortlisting/Screening
● It will be a short Jeopardy style Capture the Flag (CTF) event.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Tasks will be tentatively categorized as Cryptographic challenges, Steganographic challenges, Web-based challenges, Reverse engineering, Networking, Forensics, and others.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Tasks will be tentatively categorized as Cryptographic challenges, Steganographic challenges, Web-based challenges, Reverse engineering, Networking, Forensics, and others.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
Final Event
● The Grand Finale will be a 36 hours in-person event, where the selected top 15 participants will be invited.
● It will be a short Jeopardy style Capture the Flag (CTF) event.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Tasks will be tentatively categorised as Cryptographic challenges, Steganographic challenges, Web-based challenges, Reverse engineering, Networking, Forensics, and others.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
● It will be a short Jeopardy style Capture the Flag (CTF) event.
● Participants will be provided with puzzles/programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Tasks will be tentatively categorised as Cryptographic challenges, Steganographic challenges, Web-based challenges, Reverse engineering, Networking, Forensics, and others.
● Each problem statement has its own points, which depend on the difficulty of the problem.
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Final Round
October 2nd - October 3rd, 2024
Award Ceremony
October 5th, 2024
Track 3
Oct 3rd - Oct 4th,2024
Datathon
Deepfakes—AI-generated synthetic media where a person in an existing image or video is replaced with someone else's likeness—pose significant threats in various domains, including cybersecurity, public safety, political integrity, and personal privacy. As deepfake technology advances, it becomes increasingly difficult to distinguish between authentic and manipulated content, leading to potential misuse in spreading misinformation, conducting fraud, or harming reputations.
Objectives:
● Accuracy: Maintain a high detection accuracy rate across various
media formats (video, audio, and pictures).
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
Competition Format:
● Registration: Begins on September 10th 2024. Participants can register individually or in teams of up to two members. Teams must submit a Proof of Concept (PoC) and a brief description of their solution during registration.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
Final Event
The Grand Finale will be a 36 hours in-person event, where the selected top 15 participants will be invited. Create a reliable method for detecting and mitigating the impact of deepfake
content in real time. The solution should focus on detecting deepfakes in videos, pictures, and audio data, with potential applications in cybersecurity, public safety, and digital forensics. The system should be capable of:
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
Final Round
October 3rd - October 4th, 2024
Award Ceremony
October 5th, 2024
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Track 4
October 5th, 2024
Call for Proposals (CFP) - Emerging Technology Innovations for Military Applications
The Territorial Army invites tech companies, startups, defense contractors, and research institutions to submit proposals for "Innovating Defense: Emerging Technologies for Military Applications." This track focuses on discovering and evaluating cutting-edge technologies that can significantly enhance military operations and national security.
Focus Areas:
● Artificial Intelligence and Machine Learning: Applications in predictive analytics, autonomous systems, decision support, and cybersecurity
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
Submission Requirements
Proposals must include:
Proposals must include:
● Executive Summary
● Technical Description
● Demonstration Plan
● Past Performance and Experience
● Compliance and Security
● Format: PDF
● Length: Maximum 15 pages (including appendices)
● Technical Description
● Demonstration Plan
● Past Performance and Experience
● Compliance and Security
● Format: PDF
● Length: Maximum 15 pages (including appendices)
Evaluation Criteria:
● Innovation and Technical Merit
● Relevance to Military Needs
● Feasibility and Scalability
● Potential Impact
● Compliance and Security
● Relevance to Military Needs
● Feasibility and Scalability
● Potential Impact
● Compliance and Security
Event Details:
Selected participants will be invited to present their technologies at the event, which includes live demonstrations, panel discussions, and networking sessions.
Timeline
Registration
September 10th - September 20th, 2024
Participants Shortlisting
September 20th - September 24th, 2024
Finalists Announcement
September 25th, 2024
Final Round
October 3rd - October 4th, 2024
Award Ceremony
October 5th, 2024
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Important Dates
10
September
20
September
25
September
Shortlisting
period
period
Registration
Starts
Starts
Registration
Closes
Closes
Finalist
Announcements
Announcements
Awards Schedule
First Prize
300,000
Second Prize
150,000
Third Prize
50,000
Special Recognition
Awards will be presented by the Raksha Mantri.
An opportunity to contribute in the Territorial Army.
An opportunity to contribute in the Territorial Army.
Hall of Fame
In the CyberChallenge Hall of Fame, we honour the achievements of top cybersecurity champions. Join us in celebrating their accomplishments and commitment to securing our nation's cyber infrastructure.
Explore the profiles of our winners from previous years.
Explore the profiles of our winners from previous years.
Past Winners >