Territorial Army Cyber Challenge:
Innovating for the Future of Defense
75 Years of Territorial Army
Building on the tremendous success of Terrier Cyber Quest 1.0, the Terrier Cyber Quest 2.0 aims to delve deeper into fostering innovation and collaboration in critical domains like securing emerging technologies like drone technology, AI/ML, Quantum etc. With an expanded scope and challenging tracks, this phase continues the journey to unite India's brightest minds from academia, industry, and government to address modern defense challenges through technology.
Jul 21st-26th
10:00 - 19:00
10:00 - 19:00
Deadline
EVENT LOCATION
LOCATION: Kargil Diwas
REGISTRATIONS OPEN
00
Days
:
00
Hours
:
00
Minutes
5th Edition
We take a moment to express our heartfelt thanks to all the participants, and organizers for making the Terrier Cyber Quest 2024 such a resounding success.
5th Edition
Your energy, innovation, and dedication truly made this event exceptional.
Compendium
CCTNS Scheme had been conceptualized as a comprehensive and integrated system for enhancing the efficiency and effective policing at all levels and especially at the Police Station level in order to achieve the following key objectives:
Creating Centralized Databases
Creating State and Central levels databases on crime and criminals starting from FIRs.
Sharing Real-time Information
Enable easy sharing of real-time information/ intelligence across police stations, districts and States.
Prevention
Improved investigation and crime prevention.
Citizen Portals
Improved service delivery to the public/ stakeholders through Citizen Portals.
No. of participants
0+
Awards
0+
Tracks
0+
Cities
0+
Learn about the tracks
Track 1
AeroQuest
A thrilling drone race where participants test their aerial surveillance skills and tactical maneuvering. Pilots will navigate challenging courses, demonstrating precision and strategy to outpace their competitors.
Registration
Begins on 10th April 2025. Participants can register individually or in teams of up to three members. During registration, Applicants to share a video of racing through a track on Uncrashed FPV simulator (available on steam simulator).
Final Round
For the drone race event, visual inspectors equipped with flags will be stationed at each checkpoint to ensure no checkpoints are missed by the pilots. Safety nets will be provided for the checkpoint inspectors to ensure their protection. Shortlisted pilots will compete ingroups of three, with the number of groups determined based on the total number of pilots. The winning pilot from each group will advance to the next round, and pilots in subsequent rounds will be grouped according to their lap times.
Timeline
Announcement of the competition by CDS
April 2, 2025
Registration
April 10th - June 30th 2025
Participants Shortlisting
Jul 1st - Jul 10th 2025
Finalist Announcements
Jul 12th 2025
Final Round
Jul 21st 2025
Award Ceremony
Jul 26th 2025 (Kargil Diwas)
All entries received will be shortlisted in the first round by a screening committee.
After shortlisting by the Screening Committee, top 30 participating individuals will be invited to New Delhi for the final round of the competition and best 3 participants will be selected for awards.
Track 2
Capture The Flag
A race against the clock in high-stakes, Jeopardy-style CTF challenges, modeled after real-world cybersecurity scenarios. Participants must solve complex security puzzles, demonstrating their skills in hacking, defense, and problem-solving under pressure.
Registration
● Begins on 10th April 2025.
● Participants can register individually or in teams of up to three members.
● During the registration phase, participants are required to provide basic and professional details.
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise.
● Participants can register individually or in teams of up to three members.
● During the registration phase, participants are required to provide basic and professional details.
● They are also encouraged to provide links to any special certifications or badges they have earned in the field of cybersecurity to further highlight their expertise.
Shortlisting/Screening
● It will be a short Jeopardy style Capture the Flag (CTF) event.
● Participants will be provided with puzzles or programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Each problem statement has its own points, which depend on the difficulty of the problem
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
● Participants will be provided with puzzles or programs containing security vulnerabilities.
● Each puzzle has a secret key called a 'flag' embedded within it. Finding the flag proves that participants have solved the particular challenge, and submitting the flag earns points.
● Each problem statement has its own points, which depend on the difficulty of the problem
● The scoring procedure depends on how many points participants have earned and how much time they have taken to submit the flags.
Final Round
● The Grand Finale will be a 36-hour in-person event.
● The top 15 teams, selected from the screening round, will be invited to compete.
● During this phase, participants will tackle advanced challenges across multiple categories.
● The event will test their technical expertise, problem-solving abilities, and endurance, as they work to solve complex problems
● This final round will determine the ultimate winners, showcasing the best talent in a highly competitive environment.
● The top 15 teams, selected from the screening round, will be invited to compete.
● During this phase, participants will tackle advanced challenges across multiple categories.
● The event will test their technical expertise, problem-solving abilities, and endurance, as they work to solve complex problems
● This final round will determine the ultimate winners, showcasing the best talent in a highly competitive environment.
Timeline
Announcement of the competition by CDS
April 2, 2025
Registration
April 10th - June 30th 2025
Participants Shortlisting
Jul 1st - Jul 10th 2025
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Finalist Announcements
Jul 12th 2025
Final Round
Jul 21st - Jul 22nd 2025
Award Ceremony
Jul 26th 2025 (Kargil Diwas)
Track 3
Datathon
An innovation challenge focused on creating cutting-edge solutions to detect and mitigate deep fakes, with significant implications for cybersecurity and public safety. Participants will develop technologies to identify and counteract manipulated media in real-time, protecting against threats to digital integrity and enhancing trust in critical systems.
Objectives:
● Accuracy: Maintain a high detection accuracy rate across various media formats (video, audio, and pictures).
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
● Speed: Ensure that the system can process and analyze media content rapidly and with low latency.
● User Interface: Create an easy-to-use interface for cybersecurity professionals, content moderators, and law enforcement.
● Reporting: When a deepfake is found, send detailed reports or alerts that include confidence scores and the nature of the manipulation.
Competition Format:
● Registration: Begins on 10th April 2025. Participants can register individually or in teams of up to three members. Teams must submit a Proof of Concept (PoC) and a brief description of their solution during registration.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
● Final Round: A 36-hour event where participants will develop a working prototype based on their data-driven solution. The prototypes will be presented to a jury, including a live demonstration and a detailed PowerPoint presentation. Solutions will be evaluated on innovation, feasibility, scalability, and impact on defence operations.
Final Round
Create a reliable method for detecting and mitigating the impact of deepfake content in real time. The solution should focus on detecting deepfakes in videos, pictures, and audio data, with potential applications in cybersecurity, public safety, and digital forensics. The system should be capable of:
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
● Detection: Use advanced AI and machine learning methods to detect deepfakes with high accuracy while reducing false positives and negatives.
● Real-time Analysis: Process and analyze media information in real or near real time to ensure early detection of deepfakes, particularly in key settings such as live news broadcasts or social media platforms.
● Mitigation: Create ways to reduce the impact of recognized deepfakes, such as watermarking legitimate content, notifying users or platforms, and giving verifiable evidence to dispute bogus information.
● Scalability and Efficiency: Make sure the solution is scalable and can be integrated into several platforms (social media, news outlets, and government organizations) without sacrificing performance.
● Ethical considerations: Address ethical concerns about privacy, data consumption, and the possible misuse of the detection system. The solution should also follow legal guidelines and be flexible to changing requirements.
Timeline
Announcement of the competition by CDS
April 2, 2025
Registration
April 10th - June 30th 2025
Participants Shortlisting
Jul 1st - Jul 10th 2025
Finalist Announcements
Jul 12th 2025
Final Round
Jul 22nd - Jul 23rd 2025
Award Ceremony
Jul 26th 2025 (Kargil Diwas)
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Track 4
Call for Proposals
Emerging Technology Innovations for Military Applications
The Territorial Army invites tech companies, startups, defense contractors, and research institutions to submit proposals for "Innovating Defense: Emerging Technologies for Military Applications." This track focuses on discovering and evaluating cutting-edge technologies that can significantly enhance military operations and national security
Focus Areas:
● Artificial Intelligence and Machine Learning: Applications in predictive analytics, autonomous systems, decision support, and cybersecurity
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
● Unmanned Systems and Robotics: Innovations in drones, autonomous vehicles, ground robots, and related systems for surveillance, logistics, and combat support.
● Cybersecurity and Information Warfare: Advanced solutions for cyber defense, secure communications, data protection, and cyber threat intelligence.
● Augmented and Virtual Reality (AR/VR): Technologies for training, simulation, mission planning, and battlefield visualization.
● Advanced Communication Systems: Secure, resilient, and high-capacity communication technologies, including satellite and quantum communication.
● Sensor and Surveillance Technologies: Innovations in detection, reconnaissance, and situational awareness.
● Energy Solutions and Power Management: Portable power solutions, renewable energy technologies, and energy-efficient systems for field operations.
● Biotechnology and Health Innovations: Solutions for battlefield medicine, wearable health monitoring, and injury recovery.
Submission Requirements
Format: PDF | Length: Maximum 15 pages (including appendices)
Format: PDF | Length: Maximum 15 pages (including appendices)
● Executive Summary
● Technical Description
● Demonstration Plan
● Past Performance and Experience
● Compliance and Security
● Technical Description
● Demonstration Plan
● Past Performance and Experience
● Compliance and Security
Key Highlights
● Medallions and Certificates: Awarded by the Territorial Army, these will serve as a prestigious recognition for participants' contributions and achievements during the event.
● Attractive Prizes: Winners will receive exciting prizes, enhancing the competitive spirit and rewarding innovative solutions that can contribute to national security.
● Boarding and Lodging: All participants will be provided with comfortable boarding and lodging facilities for the duration of the event, ensuring a seamless experience.
● Opportunity to Contribute to the Territorial Army: Participants will have a rare chance to collaborate with the Territorial Army, working alongside defense professionals and contributing directly to the national defense landscape.
● Honoring of Winners: Winners of each event will receive the ultimate recognition by being honored by the Chief of Army Staff (COAS), Indian Army, one of the most prestigious accolades in the defense and cybersecurity space.
● Attractive Prizes: Winners will receive exciting prizes, enhancing the competitive spirit and rewarding innovative solutions that can contribute to national security.
● Boarding and Lodging: All participants will be provided with comfortable boarding and lodging facilities for the duration of the event, ensuring a seamless experience.
● Opportunity to Contribute to the Territorial Army: Participants will have a rare chance to collaborate with the Territorial Army, working alongside defense professionals and contributing directly to the national defense landscape.
● Honoring of Winners: Winners of each event will receive the ultimate recognition by being honored by the Chief of Army Staff (COAS), Indian Army, one of the most prestigious accolades in the defense and cybersecurity space.
Timeline
Announcement of the competition by CDS
April 2,2025
Registration
April 10th - June 30th 2025
Participants Shortlisting
Jul 1st - Jul 10th 2025
Finalist Announcements
Jul 12th 2025
Presentation
Jul 23rd 2025
Award Ceremony
Jul 26th 2025 (Kargil Diwas)
All entries received will be shortlisted in the first round by a screening committee identified by NCRB & Cyber Peace Foundation.
The shortlisted entries from the first round, will be further evaluated in the final round by the Jury composed of experts from the field. The participants will be required to give a presentation (10 minutes) followed by Q&A (5mins). During this time, they will also be given the opportunity to share applications, investigative aids, videos, tools and proof of concept. The Jury will select best 3 entries as winners of Track 2 .
Important Dates
02
April
01
July
10
July
Shortlisting
period
period
Registration
Starts
Starts
Registration
Closes
Closes
Finalist
Announcements
Announcements
Hall of Fame
In the CyberChallenge Hall of Fame, we honour the achievements of top cybersecurity champions. Join us in celebrating their accomplishments and commitment to securing our nation's cyber infrastructure.
Explore the profiles of our winners from previous years.
Explore the profiles of our winners from previous years.
Past Winners >