Call Us 24x7
+1 (315) 636-4564
  • You are here
  • Home
  • /
  • Products
  • /
  • Nirnaya

Nirnaya is an analytics tool which can be used for performing various analysis on CDRs/SDRs and tower logs by cyber police or similar regulatory teams, for identifying the possible suspects in a crime.

Anomaly Detection

The anomalous call behavior of suspects can be an indication of suspects involvement in a crime.

Time Series Analysis

Location and movement of suspects can be analysed from tower logs and CDRs. The movement of suspects can be visualized on maps which will give breakthrough insights to aid the investigations

Geo Fencing

Calls from the sensitive geographical locations like Prisons, Country Borders, Defence establishments etc. can be identified from the tower logs and CDRs.

Sandwich Pattern Analysis

To avoid being tapped, perpetrators of crime may avoid direct calling and route the call through a mediator. This can be identified through pattern analysis which will spot the recurring patterns of call behaviours among the suspects.

Frequent Call Pattern Analysis

Frequent callers and diallers of the suspects can be easily queried from the database. Frequent callers can be appropriately visualized to identify the associations among a group of suspects.

Short Duration Call Analysis

At the time of committing a crime the perpetrators may make series of short duration calls to communicate with the accomplices.

Sun Rise Analysis

The CDRs can be analysed and all the details of the suspects including the callers, diallers, duration, frequency and any other user defined data can be stored and retrieved.

Commonality Analysis

The common callers and IMEI numbers in multiple crime locations can be identified and visualized.

Suspect Analysis

The Number, IMEIs, home locations of the suspects are stored in the database for investigators perusal.

Conference Call Analysis

The conference call among the perpetrators of crime can be precisely spotted.

Equipment Analysis

If the suspects dump the old handset and SIM card after committing crime, it can be identified using the tool.

Recent Articles

Switching from Virtual Private Server to dedicated server literally is not that easy and most technicians know it who have to do the practical part. Moreover, it also requires to invest

Read More »

AngularJS is a language based on JavaScript which is an open source web application framework for front-end development. It was developed by Google and maintained by Google along with

Read More »

Images are necessary to enhance the look of a website. As we all know that visuals create a lasting impact in an individual's mind, the presence of images is sure factor to attract

Read More »

If a firm is actively into a business it certainly needs to upgrade itself with time. If that is not followed it would not be able to meet its clients demands and that would soon result

Read More »