• You are here
  • Home
  • /
  • Products
  • /
  • Nirnaya

Nirnaya is an analytics tool which can be used for performing various analysis on CDRs/SDRs and tower logs by cyber police or similar regulatory teams, for identifying the possible suspects in a crime.

Anomaly Detection

The anomalous call behavior of suspects can be an indication of suspects involvement in a crime.

Time Series Analysis

Location and movement of suspects can be analysed from tower logs and CDRs. The movement of suspects can be visualized on maps which will give breakthrough insights to aid the investigations

Geo Fencing

Calls from the sensitive geographical locations like Prisons, Country Borders, Defence establishments etc. can be identified from the tower logs and CDRs.

Sandwich Pattern Analysis

To avoid being tapped, perpetrators of crime may avoid direct calling and route the call through a mediator. This can be identified through pattern analysis which will spot the recurring patterns of call behaviours among the suspects.

Frequent Call Pattern Analysis

Frequent callers and diallers of the suspects can be easily queried from the database. Frequent callers can be appropriately visualized to identify the associations among a group of suspects.

Short Duration Call Analysis

At the time of committing a crime the perpetrators may make series of short duration calls to communicate with the accomplices.

Sun Rise Analysis

The CDRs can be analysed and all the details of the suspects including the callers, diallers, duration, frequency and any other user defined data can be stored and retrieved.

Commonality Analysis

The common callers and IMEI numbers in multiple crime locations can be identified and visualized.

Suspect Analysis

The Number, IMEIs, home locations of the suspects are stored in the database for investigators perusal.

Conference Call Analysis

The conference call among the perpetrators of crime can be precisely spotted.

Equipment Analysis

If the suspects dump the old handset and SIM card after committing crime, it can be identified using the tool.

Recent Articles

Some people think that Getting ISO certification is a kind of trouble. It may have some formalities to do but it will be worth for small as well as large businesses to have ISO certification. Majority

Read More »

When I was in my middle school, I never really understood why we would learn programming languages. We had LOGO (Language of Graphics Oriented), BASIC (Beginners All-purpose Symbolic

Read More »

Data Warehouses and Data Lakes are two different varieties of data storage repositories. Organizations utilise these to store, manage and analyze data. Data warehouses have been around

Read More »

Every day lots of mobile apps are launched to the Google Play store and Apple App Store. Some of these mobile apps are, for instance, games, social networks, and e-commerce apps. Each

Read More »