Territorial Army Cyber Challenge:
Innovating for the Future of Defense
75 Years of Territorial Army
Building on the tremendous success of Terrier Cyber Quest 1.0, the Terrier Cyber Quest 2.0 aims to delve deeper into fostering innovation and collaboration in critical domains like securing emerging technologies like drone technology, AI/ML, Quantum etc. With an expanded scope and challenging tracks, this phase continues the journey to unite India's brightest minds from academia, industry, and government to address modern defense challenges through technology.
Jul 21st-26th
10:00 - 19:00
10:00 - 19:00
Deadline
EVENT LOCATION
LOCATION: Kargil Diwas
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
Learn about the tracks
Track 1
Capture The Flag
A race against the clock in high-stakes, Jeopardy-style CTF challenges, modeled after real-world cybersecurity scenarios. Participants must solve complex security puzzles, demonstrating their skills in hacking, defense, and problem-solving under pressure.
Registration
● Registration for Terrier Cyber Quest 2025 begins on 1st May 2025
● Participants can register individually or in teams of up to three members.
● To strengthen their application, participants are encouraged to share links to certifications or badges earned in the cybersecurity domain.
● Participants can register individually or in teams of up to three members.
● To strengthen their application, participants are encouraged to share links to certifications or badges earned in the cybersecurity domain.
Regional Round
● Selected teams will compete in a Jeopardy-style CTF challenge with scenarios crafted around vulnerabilities in railway systems and power grid infrastructures.
● These tasks will test their skills in network forensics, cryptography, OSINT, web exploitation, and ICS threat modeling.
● Performance in these regional rounds will determine advancement to the finale.
● Regional Rounds in Pune, Kolkata, Udhampur, Lucknow and Chandigarh August, 2025
● These tasks will test their skills in network forensics, cryptography, OSINT, web exploitation, and ICS threat modeling.
● Performance in these regional rounds will determine advancement to the finale.
● Regional Rounds in Pune, Kolkata, Udhampur, Lucknow and Chandigarh August, 2025
Grand Finale
Top 10 teams will be selected as finalists from the regional rounds who will compete in an advanced challenge-based format.
● Participants will engage in an attack-defense-style cybersecurity challenge focused on critical infrastructure hacking & defense (Railways & Power Sector)
● Teams will secure or exploit a simulated infrastructure network in real-time.
● Teams will secure or exploit a simulated infrastructure network in real-time.
Awards will be Presented by the Hon’ble Prime Minister of India Shri Narendra Modi / Hon’ble Raksha Mantri of India Shri Rajnath Singh
Timeline
Announcement of the Competition by RM/RRM
May 1st, 2025
Registration
May 1st - July 15th, 2025
Shortlisting of participants
July 16th - 31st, 2025
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Final Round
October 5th -6th, 2025
Award Ceremony
October 9th, 2025
Track 2
Datathon
The Datathon is a data-centric challenge designed to test participants' ability to build robust AI/ML-based models that can solve real-world problems related to defense and national security. This year’s focus is on predictive threat intelligence and anomaly detection using large-scale datasets.
Objectives:
● Accuracy: Maintain a high detection accuracy rate across various media formats (video, audio, and pictures).
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
Competition Format:
● Registration: Participants must register individually or in teams and submit an abstract explaining their proposed approach to the challenge. They should outline the problem they aim to solve, the methodology they intend to use, and any relevant experience or past work in the field of AI/ML or data analytics.
● Regional Round: Shortlisted teams will be invited to present their initial models or working prototypes based on a provided dataset. The focus will be on accuracy, technical soundness, innovation, and how well the solution aligns with defense requirements. Presentations can be virtual or in-person, depending on the hosting region. Regional Rounds in Pune, Kolkata, Udhampur, Lucknow and Chandigarh August, 2025
Grand Finale
Top 10 teams will be selected as finalists from the regional rounds who will compete in an advanced challenge-based format.
● Finalists will have 36 hours to develop a fully functional deepfake detection system using AI and machine learning.
● Live demonstrations will include real-time detection and mitigation of manipulated media.
● Live demonstrations will include real-time detection and mitigation of manipulated media.
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
Awards will be Presented by the Hon’ble Prime Minister of India Shri Narendra Modi / Hon’ble Raksha Mantri of India Shri Rajnath Singh
Timeline
Announcement of the Competition by RM/RRM
May 1st, 2025
Registration
May 1st - July 15th,2025
Shortlisting of participants
July 16th - 31st, 2025
Final Round
October 6th - 7th, 2025
Award Ceremony
October 9th, 2025
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Track 3
Call for Proposals
Emerging Technology Innovations for Military Applications
The Territorial Army invites tech companies, startups, defense contractors, and research institutions to submit proposals for "Innovating Defense: Emerging Technologies for Military Applications." This track focuses on discovering and evaluating cutting-edge technologies that can significantly enhance military operations and national security Selected participants will be invited at Manekshaw Center, New Delhi to present their technologies at the event, which includes live demonstrations, panel discussions, and networking sessions
Focus Areas:
● Artificial Intelligence and Machine Learning: Applications in predictive analytics, autonomous systems, decision support, and cybersecurity.
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
Submission Requirements
● Format: PDF | Length: Maximum 15 pages (including appendices)
● Executive Summary
● Past Performance and Experience
● Compliance and Security
● Demonstration Plan
● Technical Description
● Executive Summary
● Past Performance and Experience
● Compliance and Security
● Demonstration Plan
● Technical Description
● Medallions and Certificates: Awarded by the Territorial Army, these will serve as a prestigious recognition for participants' contributions and achievements during the event.
● Attractive Prizes: Winners will receive exciting prizes, enhancing the competitive spirit and rewarding innovative solutions that can contribute to national security.
● Boarding and Lodging: All participants will be provided with comfortable boarding and lodging facilities for the duration of the event, ensuring a seamless experience.
● Opportunity to Contribute to the Territorial Army: Participants will have a rare chance to collaborate with the Territorial Army, working alongside defense professionals and contributing directly to the national defense landscape.
● Honoring of Winners: Winners of each event will receive the ultimate recognition by being honored by the Chief of Army Staff (COAS), Indian Army, one of the most prestigious accolades in the defense and cybersecurity space.
● Attractive Prizes: Winners will receive exciting prizes, enhancing the competitive spirit and rewarding innovative solutions that can contribute to national security.
● Boarding and Lodging: All participants will be provided with comfortable boarding and lodging facilities for the duration of the event, ensuring a seamless experience.
● Opportunity to Contribute to the Territorial Army: Participants will have a rare chance to collaborate with the Territorial Army, working alongside defense professionals and contributing directly to the national defense landscape.
● Honoring of Winners: Winners of each event will receive the ultimate recognition by being honored by the Chief of Army Staff (COAS), Indian Army, one of the most prestigious accolades in the defense and cybersecurity space.
Grand Finale
Top 10 teams will be selected as finalists from the regional rounds who will compete in an advanced challenge-based format.
● Shortlisted participants will showcase their technology solutions through live demos in front ofsenior military officials and industry leaders.
● Winning proposals will have the opportunity for further development with Territorial Army support.
● Winning proposals will have the opportunity for further development with Territorial Army support.
Awards will be Presented by the Hon’ble Prime Minister of India Shri NarendraModi/Hon’ble Raksha Mantri of India Shri Rajnath Singh
Timeline
Announcement of the Competition by RM/RRM
May 1st, 2025
Registration
May 1st - July 15th,2025
Shortlisting of participants
July 16th - 31st, 2025
Final Round
October 6th, 2025
Award Ceremony
October 9th, 2025
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .

CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Important Dates
01
May
15
July
5-7
October
Shortlisting
period
period
09
October
Registration
Starts
Starts
Registration
Closes
Closes
Final
Round
Round
Award Ceremony
Key Highlights:
Medallions and Certificates:
Awarded by the Territorial Army, these will serve as a prestigious recognition for participants' contributions and achievements during the event.
Attractive Prizes:
Winners will receive exciting prizes, enhancing the competitive spirit and rewarding innovative solutions that can contribute to national security
Boarding and Lodging:
All participants will be provided with comfortable boarding and lodging facilities for the duration of the event, ensuring a seamless experience.
Opportunity to Contribute to the Territorial Army:
Participants will have a rare chance to collaborate with the Territorial Army, working alongside defense professionals and contributing directly to the national defense landscape
Honoring of Winners:
Winners of each event will receive the ultimate recognition by being honored by the Chief of Army Staff (COAS), Indian Army, one of the most prestigious accolades in the defense and cybersecurity space
Special Recognition Awards
Special Recognition Awards will be presented by the Hon’ble Prime Minister / Hon’ble Raksha Mantri
Join Us
Contribute to the future of the National Territorial Army’s defense technology! Register now to participate in Terrier Cyber Quest 2025 and turn your innovative ideas into reality.
Register Now
Hall of Fame
In the CyberChallenge Hall of Fame, we honour the achievements of top cybersecurity champions. Join us in celebrating their accomplishments and commitment to securing our nation's cyber infrastructure.
Explore the profiles of our winners from previous years.
Explore the profiles of our winners from previous years.
Past Winners >