Call Us 24x7
+1 (315) 636-4564
  • You are here
  • Home
  • /
  • Products
  • /
  • Nirnaya

Nirnaya is an analytics tool which can be used for performing various analysis on CDRs/SDRs and tower logs by cyber police or similar regulatory teams, for identifying the possible suspects in a crime.

Anomaly Detection

The anomalous call behavior of suspects can be an indication of suspects involvement in a crime.

Time Series Analysis

Location and movement of suspects can be analysed from tower logs and CDRs. The movement of suspects can be visualized on maps which will give breakthrough insights to aid the investigations

Geo Fencing

Calls from the sensitive geographical locations like Prisons, Country Borders, Defence establishments etc. can be identified from the tower logs and CDRs.

Sandwich Pattern Analysis

To avoid being tapped, perpetrators of crime may avoid direct calling and route the call through a mediator. This can be identified through pattern analysis which will spot the recurring patterns of call behaviours among the suspects.

Frequent Call Pattern Analysis

Frequent callers and diallers of the suspects can be easily queried from the database. Frequent callers can be appropriately visualized to identify the associations among a group of suspects.

Short Duration Call Analysis

At the time of committing a crime the perpetrators may make series of short duration calls to communicate with the accomplices.

Sun Rise Analysis

The CDRs can be analysed and all the details of the suspects including the callers, diallers, duration, frequency and any other user defined data can be stored and retrieved.

Commonality Analysis

The common callers and IMEI numbers in multiple crime locations can be identified and visualized.

Suspect Analysis

The Number, IMEIs, home locations of the suspects are stored in the database for investigators perusal.

Conference Call Analysis

The conference call among the perpetrators of crime can be precisely spotted.

Equipment Analysis

If the suspects dump the old handset and SIM card after committing crime, it can be identified using the tool.

Recent Articles

If someone tries to start an online (e-commerce) business, he or she has to learn the whole procedure and how to choose the right one so that significant financial loss does not occur.

Read More »

Database Clustering is the process of combining more than one servers or instances connecting a single database. Sometimes one server may not be adequate to manage the amount of data

Read More »

The Open Source software is that kind of product whose original source code can be retrieved by anyone. It is particularly best for those who own a small business and do not have enough

Read More »

The voice search has been in the trend lately, and it is likely growing. It is estimated that it might replace the keyboard entirely in the coming decades, but about that, the idea

Read More »