CCTV Surveillance Security & Forensics Hackathon 2.0 Decoding the Future of Digital Evidence

Offline

00

days

00

hours

00

minutes

00

seconds
Register Now
Register Now
May 9, 2025
9:00 am
to
5:00 pm
TBD

Introduction

The CCTV Surveillance Security & Forensics Hackathon 2.0 unites cutting-edge technology with real-world challenges by bringing together innovators from academia, industry, and law enforcement. Participants are tasked with designing and developing indigenous surveillance systems that leverage AI for enhanced threat detection, facial recognition, and predictive analytics, while ensuring robust cybersecurity measures are in place to protect against data breaches and hacking attempts.

Through a rigorous, multi-phased competition—from the registration of teams and evaluation of detailed nomination packages to a 36-hour grand finale—participants will have ample opportunities to showcase their creativity and technical acumen. The hackathon not only challenges teams to create prototypes that are both innovative and practically viable but also provides a dynamic platform for mentorship, networking, and knowledge sharing with experts across multiple disciplines. This collaborative environment is designed to fuel breakthrough innovations in digital evidence gathering and surveillance.

At its core, the event is a call to action for transforming the future of digital security and forensic analysis. By encouraging cross-disciplinary collaboration and equipping law enforcement with state-of-the-art cyber defense tools, the hackathon aspires to empower a new generation of cybersecurity leaders. This approach ensures that innovative surveillance solutions are not only conceptualized but also effectively implemented, ultimately bolstering public safety and national security in an increasingly digital world.

Objective

Develop Indigenous CCTV Solutions

Goal: Encourage the creation of locally manufactured surveillance hardware that caters specifically to the domestic market needs.

Focus: Emphasize innovation in the design and production of robust, secure, and reliable CCTV systems.

Integrate AI & Smart Analytics

Goal: Enhance traditional CCTV systems by incorporating state-of-the-art Artificial Intelligence.

Focus: Utilize AI for advanced threat detection, facial recognition, and the development of predictive models to support proactive security policies.

Strengthen Cybersecurity

Goal: Design security measures that safeguard against hacking, unauthorized access, and data breaches within CCTV networks.

Focus: Develop security protocols and features that ensure the integrity and confidentiality of surveillance data.

Deliver Cost-Effective Solutions

Goal: Create scalable, affordable surveillance systems that are adaptable for both densely populated urban environments and dispersed rural settings. 

Focus: Prioritize cost efficiency without compromising on the technological robustness or security of the systems.

Problem Statements & Challenges

Challenge 1: Secure and Indigenous CCTV Design

Title: "Make in India Eyes: Building Secure, Tamper-Proof CCTV Hardware"

Background

India’s dependence on imported surveillance hardware creates vulnerabilities like backdoors, insecure firmware, and lack of supply-chain transparency. A shift toward indigenous and secure-by-design CCTV systems is essential to enhance national security and self-reliance.

Overview:

This challenge focuses on designing and developing a next-generation CCTV system that is secure, tamper-proof, and manufactured using domestically sourced components and technologies. The goal is to reduce dependency on foreign surveillance infrastructure by fostering indigenous innovation in both hardware and firmware. Participants must take into account supply chain security, hardware integrity, and firmware-level protections while building a trustworthy surveillance solution that aligns with the "Make in India" initiative.

Objectives

  • Design CCTV hardware using Indian or domestically available components.
  • Incorporate secure boot, chip-level encryption, tamper detection, and firmware integrity mechanisms.
  • Promote manufacturing feasibility and mass scalability.
  • Address physical layer and supply-chain security threats.

Registration Requirements: During the registration participants need to share a deck in PPT/PDF format (10-12 slides) consisting of their proposed idea highlighting-

  • Concept note and clearly defined problem.
  • System block diagram/architecture.
  • List of indigenous components to be used.
  • Estimated cost and manufacturing feasibility.
  • Proposed tech stack and security mechanisms.

Grand Finale Deliverables: The Grand finale will be a 36 hours in-person event.

  • GitHub link to firmware/configuration code.
  • Installation/setup instructions or emulator documentation.
  • A demo video (max 5 mins) showing prototype/simulation.
  • A pitch deck showcasing:

    • Problem & objectives
    • Indigenous innovation
    • Security design
    • Scalability and impact

Bonus Points

  • Supply chain transparency features
  • Firmware signing or boot verification
  • Manufacturing cost efficiency

Challenge 2: AI and Smart Analytics Integration

Title: "Smart Eyes: Empowering CCTV with AI for Intelligent Surveillance"

Background

Standard CCTV systems are passive. With AI, they can become intelligent observers, detecting threats, unusual activity, or known faces autonomously and in real time.

Overview

This challenge calls for the integration of artificial intelligence into CCTV systems to enable intelligent surveillance. Participants are expected to embed real-time analytics that can autonomously detect threats, recognize faces, analyze crowd behavior, and even predict incidents before they happen. The focus is on using AI to shift from passive video recording to proactive monitoring and response.

Objectives

  • Apply AI/ML for real-time analytics
  • Implement facial/vehicle recognition with anti-spoofing.
  • Enable behavior classification, predictive threat alerts, and cross-camera tracking.
  • Leverage edge AI for real-time processing.

Registration Requirements: During the registration participants need to share a deck in PPT/PDF format (10-12 slides) consisting of their proposed idea highlighting-

  • Use-case scenarios and target environment.
  • Model architecture and deployment workflow.
  • Description of analytics features and data privacy considerations.
  • Dataset plan, training/testing methodology.
  • AI toolkits/frameworks to be used (such as: OpenCV, YOLO, TensorFlow).

Grand Finale Deliverables: The Grand finale will be a 36 hours in-person event.

  • GitHub repository with AI model and scripts.
  • Setup instructions and environment configuration.
  • A demo video (max 5 mins) with annotated surveillance footage or simulations.
  • A pitch deck explaining:

    • The problem and detection goals
    • Model performance
    • Privacy ethics
    • Scalability and future use

Bonus Points

  • On-device (edge) AI implementation
  • Anti-deepfake or spoofing defense
  • Multi-camera correlation and real-time insights

Challenge 3: Cybersecurity in CCTV Networks

Title: "Harden the Grid: Cyber Defense for CCTV Infrastructure"

Background

Networked CCTV systems are prime targets for cyberattacks. Once compromised, they can be used for lateral movement in networks or data exfiltration. A resilient cybersecurity layer is imperative.

Overview

Modern CCTV systems are vulnerable to cyberattacks that can compromise data integrity, surveillance reliability, and public safety. This challenge asks participants to develop a comprehensive cybersecurity framework tailored to CCTV networks, incorporating robust encryption, secure transmission, user authentication, and intrusion detection to prevent unauthorized access or data breaches.

Objectives

  • Implement secure data transmission (such as: VPN, TLS, DTLS).
  • Enable intrusion detection/prevention systems (IDS/IPS).
  • Apply RBAC, MFA, and secure firmware management.
  • Integrate zero-trust and threat intelligence capabilities.

Registration Requirements: During the registration participants need to share a deck in PPT/PDF format (10-12 slides) consisting of their proposed idea highlighting-

  • Defined threat models and scenarios.
  • Network architecture highlighting vulnerable areas.
  • Cybersecurity layers and controls (encryption, auth, logging).
  • Open-source frameworks and tools considered.
  • Sample red/blue team test environments (mock attacks, if possible).

Grand Finale Deliverables : The Grand finale will be a 36 hours in-person event.

  • GitHub repo with IDS/firewall/authentication tools.
  • Deployment scripts and simulation instructions.
  • A demo video (max 5 mins) of a threat scenario and its mitigation.
  • A pitch deck that highlights:

    • Cyber risks addressed
    • Technical solution
    • Real-time response
    • Deployment scalability

Bonus Points

  • Zero-trust architecture
  • Threat intelligence feed integration
  • Advanced access control models

Challenge 4: Cost-Effective Surveillance Solutions

Title: "Budget Watch: Scalable, Affordable Surveillance for All"

Background

Rural and low-income areas need effective surveillance without expensive infrastructure. The goal is to develop affordable yet efficient systems using open-source and low-power platforms.

Overview

This challenge focuses on building affordable, scalable CCTV systems that can be deployed across diverse environments—including rural areas with limited resources. The idea is to innovate around cost-saving components, energy efficiency, minimal infrastructure dependency, and user-friendly deployment, all while retaining core surveillance capabilities.

Objectives

  • Build CCTV systems using peripherals such as Raspberry Pi, ESP32-CAM, etc.
  • Design solar-powered or battery-efficient models.
  • Support basic analytics like motion detection or alerts.
  • Enable offline capability with delayed cloud sync.

Registration Requirements: During the registration participants need to share a deck in PPT/PDF format (10-12 slides) consisting of their proposed idea highlighting-

  • Defined use-case and problem setting.
  • Architecture for rural or urban low-resource deployments.
  • Cost analysis and bill of materials.
  • Simplicity in deployment, scalability, and maintenance.
  • Innovative features that reduce cost and enhance usability.

Grand Finale Deliverables: The Grand finale will be a 36 hours in-person event.

  • GitHub repository with source code and documentation.
  • Deployment guide and setup instructions.
  • A demo video (max 5 mins) simulating field deployment.
  • A pitch deck including:

    • Problem definition
    • System design
    • Cost analysis
    • Impact on rural/public safety

Bonus Points

  • Offline sync or mobile alert dashboard
  • Local language UI for community usage
  • DIY setup models or training resources

‍Competition Phases

Phase 1 – Registration Phase (May 9 – June 9, 2025)

• Teams from academic institutions, industries, and research organizations begin registration.

• Institutions (colleges, universities, and companies) will nominate teams through the official hackathon portal.

• Registration details, guidelines, and nomination requirements are available on the event website.

Phase 2 – Shortlisting Phase (June 9 – June 19, 2025)

• After the registration deadline, submitted nomination packages undergo a stringent evaluation process.

• Participants will be shortlisted based on the quality of their proposals, team credentials, and alignment with hackathon objectives.

Phase 3 – Grand Finale (End of June, 2025)

• Selected teams will compete in a 36-hour intensive challenge.

• The finale will focus on the creation of a working prototype, detailed presentation of the proof of concept (POC), and a dynamic interactive Q&A session with the panel of expert judges.

Phase 4 – Award Ceremony (July, 2025)

• The event will conclude with a formal award ceremony.

• Recognition and awards will be distributed to the top three teams from both Academia and Industry categories.

Participation Details

Eligibility & Registration

Team Format Only:

▪ Participation is exclusively on a team basis; individual entries are not permitted.

▪ Each participating institution (academic or corporate) can nominate teams.

Who Can Participate:

▪ Open to teams comprising students, professionals, Ph.D. scholars, and researchers.

▪ Institutions such as colleges, universities, and companies are invited to nominate teams.

▪ Special emphasis is placed on multidisciplinary teams that can combine technical prowess with practical cybersecurity insights.

Registration Process:

▪ Registration must include comprehensive team details, member credentials, and a brief proposal outlining the team’s vision.

▪ Registrations can only be done through the official website of CCTV Surveillance Security & Forensics Hackathon.

Benefits of Participation

Expert Mentorship:

▪ Teams will have access to industry experts who provide guidance throughout the

hackathon.

Networking Opportunities:

▪ Connect with peers, leading professionals, and law enforcement agencies, facilitating potential future collaborations.

Exposure & Recognition:

▪ Opportunity to showcase innovative ideas and secure recognition in both academic and industry circles.

Future Collaborations:

▪ Potential for partnerships, internships, or project sponsorships beyond the event.

Judging Criteria

Each project will be evaluated on several key dimensions to ensure that the winning proposals are both innovative and practical:

Innovation & Creativity:

Assessing originality, inventiveness, and the potential to disrupt traditional approaches. The solution must align well with the competition's theme and directly address the selected problem statement. The idea should demonstrate uniqueness, creativity, or innovation in its approach.

Technical Implementation and Feasibility:

Evaluating the feasibility, scalability, and robustness of the design and prototype. The solution should be practical and realistic to implement in real-world scenarios. It must be technically and economically viable, with resources or infrastructure being reasonably accessible. The potential challenges of implementing the solution should be identified, and appropriate strategies to address them must be outlined effectively.

Technical depth and Illustration of the idea:

The idea must be clearly presented, highlighting its key features, workflows, and functionality through effective use of visual aids such as diagrams, flowcharts, or lifecycle visualizations. Additionally, participants should demonstrate the technical depth of their solution by detailing the coding, technologies, frameworks, or libraries used. Any code samples provided should be well-commented and easy to understand, clearly explaining the purpose and usability of each component.

Impact on Security:

Measuring how effectively the solution enhances surveillance capabilities and fortifies cybersecurity measures.

Presentation & Clarity:

Examining the clarity of the project presentation, the ability to articulate the problem-solving approach, and the overall persuasive power of the demonstration. The PowerPoint presentation should be clear, organized, and comprehensive. It must effectively convey the idea using a  balanced mix of visuals, text, and explanations to ensure the audience understands the solution.

No items found.
Speakers
No items found.

You're invited! Join hands with the cyber peace movement and register for our upcoming event.

Agenda
Registration begins from 09:00
10:00 AM to 10:10 AM
Welcome Address and Opening Remarks
Lt Gen (Dr.) Rajesh Pant PVSM, AVSM, VSM (Retd)
Ex National Cyber Security Coordinator
Prime MInister’s Office, Government of India
10:10 AM to 10:20 AM
Address
Prof. Rajan Bose
Director IIT Delhi
10:20 AM - 10:25 AM
Industry Address
Dr. Subi Chaturvedi
Global Senior Vice President & Chief Corporate Affairs & Public Policy Officer
InMobi Group
10:25 AM to 10:30 AM
Address
Professor Sanjay Jha
Director of Research and Innovation, School of Computer Science and Engineering
UNSW, Sydney
10:30 AM to 10:35 AM
Address
Ms. Pooja Kinger
Homeland Security Investigation
US Embassy
10:35 AM to 10:40 AM
Government Address
Dr. Gaurav Gupta
Additional Director / Scientist 'E'
Ministry of Electronics & Information Technology (MeitY), Government of India
10:40 AM - 10:45 AM
Survivor Video
10:45 AM to 11:45 PM
PANEL 1
Emerging Technologies and vulnerable Populations: A Security by design Approach
Mr. Samiran Gupta
Vice President, Stakeholder Engagement and Managing Director, Asia Pacific
Internet Corporation for assigned Names and Numbers
Professor Sanjay Jha
Director of Research and Innovation
School of Computer Science and Engineering UNSW, Sydney
Prof Anjali Kaushik
Professor, Ex-DEAN, and Chair, CoE on Digital Economy and, Cyber Security (DECCS),
Management Development Institute, Gurgaon
Dr. Shruti Mantri
Associate Director
Institute of Data Sciences,Indian School of Business, Hyderabad
Moderator
Maj Gen (Dr) Ripin Bakshi AVSM, VSM (Retd)
Senior Fellow
Center for Land Warfare Studies (CLAWS)
11:45 PM to 12:00 PM
Tea / Coffee Break
12:00 PM to 12:15 PM
Paper Presentation, GD Goenka
12:15 PM to 12:25 PM
Launch of Report and Unveiling of the Digital Forensics Magazine
12:25 PM to 12:35 PM
Debriefing of the Report: Fact-Checking India: Identifying the Spread of Fake News and Policy Recommendations for Combating Misinformation
Dr. Shruthi Mantri
Associate Director
Institute of Data Sciences, Indian School of Business, Hyderabad
12:35 PM to 12:45 PM
Key Highlights of the Study: Unmasking the Digital Deception: Advancements in Tackling Misinformation, Deepfakes & AI Generated Fakes
Prof Anjali Kaushik
Professor, Ex-DEAN, and Chair, CoE on Digital Economy and, Cyber Security (DECCS),
Management Development Institute, Gurgaon
12:45 PM to 13:00 PM
Keynote Address: The Cornerstones of Trust and Safety in Digital Environments
Smt. Rekha Sharma
Member of Parliament
Rajya Sabha
13:00 PM to 14:00 PM
Networking and Lunch
14:00 PM to 15:15 PM
PANEL 2
Risk Mitigation in Digital Environments: Elevating User Grievance Redressal Mechanisms and Trust-Building in the Age of Emerging Technologies
Dr.Pavan Duggal
Advocate
Supreme Court of India
Mr. Bhajan Poonia
CTO
OLX India
Dr. Rakesh Maheshwari
Former Sr. Director and Group Coordinator, Cyber Laws and Data Governance,
Ministry of Electronics and Information Technology Government of India
Mr. Sudhir Sharma
Sr Manager, Product Management, GTM Support Operations
Google Singapore
Dr. Aparajita Bhatt
Associate Professor of Law & Director, Center for Cyber Laws
National Law University, Delhi
Moderator
Mr. Pradyot Chandra Haldar
President Policy Perspective Foundation (PPF)
Former Director, Intelligence Bureau, Government of India
15:15 PM to 15:30 PM
Tea Break
15:30 PM to 16:30 PM
Awards AND HONORS
Cyberpeace Honors
eRaksha Winners
CyberPeace Corps Volunteers
16:30 PM to 17:00 PM
Valedictory session
Mr. Suresh Yadhav
Senior Director (A.I) Trade Oceans and Natural Resources Directorate Commonwealth Secretrait
Major Vineet Kumar
Founder and Global President CyberPeace
Donate
Engage