Call Us 24x7
+1 (315) 636-4564
  • You are here
  • Home
  • /
  • Products
  • /
  • Nirnaya

Nirnaya is an analytics tool which can be used for performing various analysis on CDRs/SDRs and tower logs by cyber police or similar regulatory teams, for identifying the possible suspects in a crime.

Anomaly Detection

The anomalous call behavior of suspects can be an indication of suspects involvement in a crime.

Time Series Analysis

Location and movement of suspects can be analysed from tower logs and CDRs. The movement of suspects can be visualized on maps which will give breakthrough insights to aid the investigations

Geo Fencing

Calls from the sensitive geographical locations like Prisons, Country Borders, Defence establishments etc. can be identified from the tower logs and CDRs.

Sandwich Pattern Analysis

To avoid being tapped, perpetrators of crime may avoid direct calling and route the call through a mediator. This can be identified through pattern analysis which will spot the recurring patterns of call behaviours among the suspects.

Frequent Call Pattern Analysis

Frequent callers and diallers of the suspects can be easily queried from the database. Frequent callers can be appropriately visualized to identify the associations among a group of suspects.

Short Duration Call Analysis

At the time of committing a crime the perpetrators may make series of short duration calls to communicate with the accomplices.

Sun Rise Analysis

The CDRs can be analysed and all the details of the suspects including the callers, diallers, duration, frequency and any other user defined data can be stored and retrieved.

Commonality Analysis

The common callers and IMEI numbers in multiple crime locations can be identified and visualized.

Suspect Analysis

The Number, IMEIs, home locations of the suspects are stored in the database for investigators perusal.

Conference Call Analysis

The conference call among the perpetrators of crime can be precisely spotted.

Equipment Analysis

If the suspects dump the old handset and SIM card after committing crime, it can be identified using the tool.

Recent Articles

There has always been a huge confusion on whether or not meta keywords are necessary for search engine ranking. Is using them feasible or not? Let's take a look on the practicality

Read More »

What is GDPR? The term GDPR has been buzzing more in our ears past few months. What is it? Few of you might have a question if it has any connection with the 'Brexit'. Let's see. GDPR

Read More »

Open source software presents a large amount of versatility and choice to improve the software without limitation. This finding, however, may not be carried on to all users and it is

Read More »

The yearly Google I/O conference is the year's biggest event of the year so far. Artificial intelligence was unquestionably the headliner of the program at Google I/O 2018, like Google

Read More »