25+ tools covering the full investigative workflow — all offline on your Android device.
🌙
Night Call Analysis
All calls 11 PM–6 AM. Detects night call spikes, duration surges, new night-only contacts, habitual callers, and first/last night call changes.
BEHAVIORAL
🧠
Behaviour Change Detector
17+ algorithms detect IMEI swaps, night surges, new contacts, velocity jumps, circadian shifts, and pre-incident spikes.
AI ANALYSIS
📊
Risk Score Engine
Algorithmic suspicion scoring across 15+ factors. Auto-ranks top suspicious contacts by risk level.
SCORING
🕸️
Contact Network Graph
Visual network map of all connections. List, Radar, Timeline views. Database hits shown on nodes. Interactive zoom/pan.
VISUALIZATION
🔗
Burner Chain Detection
Finds A→X→B→C indirect connections. Detects burner chains using common contact analysis across 3 CDRs.
NETWORK
🗄️
Crime Database Matching
Auto-checks all CDR numbers against 8 offline databases. NDPS, Gunda, Terrorism, Theft, Cheating and more — instant hit detection.
DATABASE
🗺️
Tower Hotspot Map
Plots call locations using tower data. Red/yellow hotspot circles by call frequency. Flags calls near known crime zones.
LOCATION
▶️
Tower Movement Playback
Animated chronological replay of movement across towers. Speed controls, call detail popups, and timeline navigation.
PLAYBACK
🤝
Handler / Financier Detection
Finds one-way callers — people who receive calls but rarely call back. Typical for handlers, financiers, and commanders.
INTELLIGENCE
🔐
Encrypted App Switch
Short call spike pattern identifies when suspects switch to Signal/Telegram/WhatsApp and go dark on regular networks.
COUNTER-INTEL
🔇
Tactical Silence
Detects long zero-call periods — suspects turn phones off during crime execution. Flags exact dead zones in the timeline.
DETECTION
👻
Chaff / Ghosting
Stationary phone with high call volume 48+ hours — a decoy left at home while suspect operates a burner elsewhere.
DECEPTION
🔄
Ping-Pong Coordination
A→X→B middleman relay detection. Finds coordinators passing messages between parties without direct contact.
NETWORK
⚡
Pre-Incident Spike
48-hour communication surge before a silent period or major travel — the classic pattern before planned criminal incidents.
PREDICTIVE
📋
Quick Report Generator
One-tap FIR-ready reports. Visual and raw tabs, case info fields, threat banners, clipboard copy, WhatsApp sharing.
REPORTING
🔍
Global CDR Search
Search any number, date, IMEI, or keyword across all loaded CDRs. Results show source CDR (A, B, or C).
SEARCH
📅
New Numbers After Date
Enter crime date → finds numbers appearing only after. Identifies post-incident burner phones acquired for criminal use.
FORENSICS
📊
Multi-CDR Comparison
Load 3 CDRs. A vs B comparison, triple overlap — numbers in all three suspects' CDRs. Powerful for gang analysis.
COMPARISON