About the Competition
- Peace-a-Thon will be hosted online globally
- The competition will be hosted in two phases–Ideathon and Finale
- Participants can register as individuals or as a team of three members
- Participants will be required to develop a working solution to the given problem statement
Peace-a-Thon 2.0 will be conducted in the following rounds;
1- Participants can register themselves by visiting the official website of Global CyberPeace Challenge 2.0 (www.cyberchallenge.net)
2- A set of problem statements will be published on the website, participants will be selecting any of them as challenge to develop the solution
3- Participants need to submit their idea and technology to be used at the time of registration
4- Shortlisting of the participants/Teams will be done on the basis of the ideas submitted
5- One team/Participant can submit only one idea
1- Shortlisted participants will be called for the Grand Finale of the Global CyberPeace Challenge 2.0
2- The grand finale of Peace-a-Thon will be hosted on Zoom
3- Link to join the competition will be mailed to the participants one hour prior to the start of competition
4- The grand finale will be a 48-hour long event, participants are requested to be online for the whole event
5- Multiple sessions will be organized for the participants during the grand finale
1- Registration/ Ideathon
- Participants can register themselves by visiting the official website of Global Cyber Challenge 2020 (www.cyberchallenge.net)
- A set of problem statements will be published on the website, participants will be selecting any of them as challenge to develop the solution
- Participants need to submit their idea and technology to be used at the time of registration
- Shortlisting of the participants/Teams will be done on the basis of the ideas submitted
- One team/Participant can submit only one idea
2- Grand Finale
- Shortlisted participants will be called for the Grand Finale of the Global CyberPeace Challenge 2.0
- The grand finale of Peace-a-Thon will be hosted on Zoom
- Link to join the competition will be mailed to the participants one hour prior to the start of competition
- The grand finale will be a 48-hour long event, participants are requested to be online for the whole event
- Multiple sessions will be organized for the participants during the grand finale
Problem Statements :
- Security of Smart Homes (5G & IoT)
With the roll out of 5G technology and proliferation of the Internet of Things (IoT), connected devices will become the new weapons of choice for perpetrators of domestic and family violence, allowing them to further harass, stalk and control people with unprecedented ease. With faster speeds, smartphones and connected devices will become super-connected hubs of data – and the ensuing safety risks will be heightened.
IoT devices will occupy the 5G network capacity, and the connection of all these devices in the 5G network will disclose previously unresearched problems in the design and behavior of 5G. So why are we talking about smart homes? Network service providers will have extensive access to large amounts of data transferred by user devices and so-called smart homes. It could show exactly what is happening inside a user’s home and describe their living environment, in-house sensors and parameters via metadata.
In some cases, vulnerabilities could cause injuries or ill health, for instance, if a client’s therapeutic gadgets are disconnected and not operational. The potential threats may become even greater when critical infrastructure components such as water and energy equipment are put at risk. Research this new technology and help users to stay safe in the 5G-covered world!
2. Driving Innovation to Monitor Online Sexual Abuse Against Children
Description: “Across the world the production and distribution of images and video depicting the sexual abuse of children has reached a level that is exceeding the capabilities of law enforcement to investigate and prosecute. The sexual abuse of a child is a crime and requires investigation and intervention when detected. What technological solutions can be implemented to stop the flow of these images into, across and out of India whilst ensuring that appropriate action is taken to locate and identify child victims? “
What technological solutions can be given to law enforcement to help them handle the volume of referrals they are getting daily? How can they easily triage the information they are receiving to determine which cases are a priority?
Reports of child sexual abuse material (CSAM) have dramatically increased over the years and is still growing. The National Center for Missing and Exploited Children has received over 80 million reports regarding the exploitation of children that resolve globally. The internet has made it easy for abusers to create images and videos and to share these files with other abusers. This in turn perpetuates the abuse and retraumatizes the child each time that image or video is shared. Offenders are getting more and more technically savvy in hiding their identities online and hiding the identifies of the victims.
Around the world many countries have hotlines that allow citizens to make reports regarding websites that contain CSAM. Help create a reporting mechanism that allows citizens of India and victims to easily submit reports that can be taken and forwarded onto law enforcement for investigation or notify ISP’s of this material, so it can be taken down.
3. Integrated Recourse for Cybercrime Victims
Description: Technology has played an important role in transforming lives by providing digital authentication, facilitating digital payments and extending the service to citizens through digital means. Banking, communication, government services, ecommerce etc. is available on the fingertips and, in event of a disruption, can lead to national chaos or disrupt our personal life. Due to the nature of cyber (or technology) integration in our life and work, it is important that citizen support should be all encompassing and be available through a single channel. The challenge here is to facilitate citizens at different levels for reporting any incident related to Digital Payment through a single channel preferably through an app or website. The solution should be capable of advising remedial actions. Solution shall carry out historical analysis based on the incidents reported to it and generate regular advisories to its users. It shall also provide correct and updated contact details for reporting incidents to Regulatory Authorities/Law Enforcement Authorities, if required all necessary communication may also be initiated through app/website only on behalf of the user (one stop shop for all complaints related to digital payments). This will not only help citizens but also it will emerge as a central helpline for all incidents related to Digital Payments regardless of industry/sector.
4. Stalker ware:
Description: Stalker ware is (primarily mobile) spyware that is often used in abusive relationships by partners or ex-partners to exert power and control over survivors. It allows an abuser to remotely monitor activity on the phone, including message content and browsing activity, and track the phone’s location, often in real time, activity that is tremendously invasive and causes significant psychological trauma. Though technically not very different from malware, traditional anti-malware techniques are not suitable due to the power and control dynamics in abusive relationships. For example, a survivor may not want to remove stalker ware because it may alert the abuser and that could result in the escalation of the abuse. What technical or non-technical solutions (or a combination thereof) can be implemented to limit the harm caused by stalker ware while keeping abuse victims safe?
5. Intimate Partner Violence Threat Model:
Description: Intimate Partner Violence (IPV, sometimes referred to as domestic violence) is an age-old problem that persists around the world. Technology has given abusers extra abilities they did not have in the past and would allow them to spy on an (ex-) partner’s phone or remotely control Internet-connected devices (like lights or locks) in their house. Though technologists are aware of security threats, they often do not consider threats posed by an intimate (ex-)partner when designing, testing, or deploying products and services. Unlike a typical cybercriminal, abusers are often in physical proximity to their target and may know enough information about them to access their accounts or circumvent security controls. What can we do to make technologists consider this particular and important threat when developing software and devices? You might also like to consider image-based abuse.