9th June 2025
Deadline
LOCATION:
New Delhi
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
REGISTRATION OPEN
May 9th

CCTV Surveillance Security

& Forensics Hackathon 2.0

Decoding the future of digital evidance
9th May 2025
Deadline
EVENT LOCATION
New Delhi
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
Overview
5th Edition

CCTV Surveillance Security & Forensic Hackathon

Know more about CCTNS
This event aims to induce collaboration among the students, professionals and law enforcement agencies to empower law enforcement personnel with advanced cyber skills, equipping them to face the complex and evolving landscape of digital threats with confidence and expertise.
CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Develop Indigenous CCTV Solutions
Create locally manufactured and secure surveillance hardware.
Integrate AI & Smart Analytics
Enhance threat detection, facial recognition, and predictive policy models.
Strengthen Cybersecurity
Secure CCTV networks against hacking and data breaches.
Deliver Cost-Effective Solutions
Design affordable and scalable surveillance systems for both urban and rural settings.
Registration
May 9 – June 9, 2025
Begins on
May 9 – June 9, 2025
  • Institutions (colleges, universities, and companies) submit nominations for their teams.
  • Teams are officially formed and registered via the hackathon portal.
Shortlisting
June 9 – June 19, 2025
June 9 – June 19, 2025
  • Evaluation of the nomination submissions begins immediately after registration closes.
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
Finale
End of June, 2025
End of June, 2025
  • Shortlisted teams compete in a 36-hour Grand Finale.
  • The focus will be on prototype creation, detailed presentations (POC), and interactive Q&A sessions with the judges.
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
Award
July, 2025
July, 2025
  • 3 winners each from Academia and Industry Category will be selected as winners.
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
5th Edition

Participation
Details

Know more about CCTNS
Eligibility Criteria:

  • No Individual Participation: Teams are the sole format for participation.
Desired Criteria:

  • PHD Scholars and Researchers are encouraged to apply.
Team Nomination Only:

  • Participation is possible only by nomination either from Academia or Industry.
Nomination Process:

  • Institutions must submit a nomination package that includes team details and credentials.
  • Detailed nomination guidelines will be shared on our website.
Benefits of Participation:
  • Access to industry experts and mentorship sessions
  • Opportunities to network with peers and leading professionals
  • Potential for collaboration and future partnerships
CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Problem Statement

Secure and Indigenous CCTV Design

Title: Make in India Eyes: Building Secure, Tamper-Proof CCTV Hardware
Background:

India relies heavily on imported surveillance hardware, which exposes it to security risks like backdoors and insecure firmware. The goal is to create indigenous, secure-by-design CCTV systems.
Objectives
  • Use Indian/domestic components
  • Include secure boot, chip-level encryption, tamper detection, firmware integrity
  • Focus on scalability and manufacturing feasibility
  • Address physical and supply-chain security threats
Registration Requirements (PPT/PDF - 10–12 slides)
  • Concept note and problem definition
  • System architecture
  • List of indigenous components
  • Cost estimate and feasibility
  • Tech stack and security mechanisms
Grand Finale Deliverables
  • GitHub link to firmware/config
  • Setup instructions/emulator docs
  • Demo video (max 5 mins)
  • Pitch deck:
    - Problem & objectives
    - Indigenous innovation
    - Security design
    - Scalability and impact
Bonus Points
  • Supply chain transparency
  • Firmware signing/boot verification
  • Cost efficiency

AI and Smart Analytics Integration

Title: Empowering CCTV with AI for Intelligent Surveillance
Background:

Traditional CCTV is passive. With AI, it can be proactive and intelligent.
Objectives
  • Real-time AI/ML analytics
  • Facial/vehicle recognition with anti-spoofing
  • Behavior classification, threat alerts, tracking
  • Edge AI implementation
Registration Requirements (PPT/PDF - 10–12 slides)
  • Use-case and environment
  • Model architecture and workflow
  • Analytics features and privacy
  • Dataset, training/testing methods
  • AI frameworks (e.g., OpenCV, YOLO, TensorFlow)
Grand Finale Deliverables
  • GitHub with model/scripts
  • Setup/config instructions
  • Demo video with annotated footage
  • Pitch deck:
    - Problem & detection goals
    - Model performance
    - Privacy ethics
    - Scalability & future use
Bonus Points
  • On-device AI
  • Anti-deepfake/spoofing
  • Multi-camera real-time insights

Cybersecurity in CCTV Networks

Title: Harden the Grid: Cyber Defense for CCTV Infrastructure
Background:

Networked CCTV systems are cyberattack targets. Cyber defense is crucial.
Objectives
  • Secure transmission (VPN, TLS, DTLS)
  • Intrusion detection/prevention (IDS/IPS)
  • RBAC, MFA, secure firmware
  • Zero-trust and threat intelligence integration
Registration Requirements (PPT/PDF - 10–12 slides)
  • Defined threat models
  • Network architecture showing vulnerabilities
  • Cybersecurity layers and controls
  • Tools and frameworks
  • Sample test environments (mock attacks)
Grand Finale Deliverables
  • GitHub with IDS/firewall/auth tools
  • Deployment scripts/simulations
  • Demo video (max 5 mins)
  • Pitch deck:
    - Risks addressed
    - Technical solution
    - Real-time response
    - Scalability
Bonus Points
  • Zero-trust architecture
  • Threat intelligence feed integration
  • Advanced access control

Effective Surveillance Solutions

Title: Budget Watch: Scalable, Affordable Surveillance for All
Background:

Affordable surveillance is needed in rural/low-income areas.
Objectives
  • Use components like Raspberry Pi, ESP32-CAM
  • Solar/battery-efficient designs
  • Basic analytics (e.g., motion detection)
  • Offline support with delayed cloud sync
Registration Requirements (PPT/PDF - 10–12 slides)
  • Use-case and setting
  • Architecture for low-resource areas
  • Cost breakdown
  • Simplicity in deployment and scalability
  • Cost-saving and usability-enhancing innovations
Grand Finale Deliverables
  • GitHub with code/docs
  • Setup/deployment guide
  • Demo video (max 5 mins)
  • Pitch deck:
    - Problem
    - System design
    - Cost analysis
    - Rural/public safety impact
Bonus Points
  • Offline sync/mobile dashboard
  • Local language UI
  • DIY setup/training models

Judging Criteria

  • Innovation & Creativity: Assessing originality, inventiveness, and the potential to disrupt traditional approaches. The solution must align well with the competition's theme and directly address the selected problem statement. The idea should demonstrate uniqueness, creativity, or innovation in its approach.
  • Technical Implementation and Feasibility: Evaluating the feasibility, scalability, and robustness of the design and prototype. The solution should be practical and realistic to implement in real-world scenarios. It must be technically and economically viable, with resources or infrastructure being reasonably accessible. The potential challenges of implementing the solution should be identified, and appropriate strategies to address them must be outlined effectively.
  • Technical depth and Illustration of the idea: The idea must be clearly presented, highlighting its key features, workflows, and functionality through effective use of visual aids such as diagrams, flowcharts, or lifecycle visualizations. Additionally, participants should demonstrate the technical depth of their solution by detailing the coding, technologies, frameworks, or libraries used. Any code samples provided should be well-commented and easy to understand, clearly explaining the purpose and usability of each component.
  • Impact on Security: Measuring how effectively the solution enhances surveillance capabilities and fortifies cybersecurity measures
  • Presentation & Clarity: Examining the clarity of the project presentation, the ability to articulate the problem-solving approach, and the overall persuasive power of the demonstration. The PowerPoint presentation should be clear, organized, and comprehensive. It must effectively convey the idea using a balanced mix of visuals, text, and explanations to ensure the audience understands the solution.
Top three teams from Academia and Industry will be declared as winners.
Hall of Fame
In the CyberChallenge Hall of Fame,  we honour the achievements of top cybersecurity champions. Join us in celebrating their accomplishments and commitment to securing our nation's cyber infrastructure.

Explore the profiles of our winners from previous years.
Past Winners >
Stay Updated
Have a Question
Drop a hello
to us
>
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.