OEM
2010
CSP/19
CDAMS-Call Data Analysis & Management System
Telecom log analysis, Proactive crime prevention, Massive data handling and standardization, Suspect behavior and location tracking, Seamless integration with forensic tools
CDAMS is a cutting-edge tool designed to streamline the analysis of telecom logs, offering unparalleled efficiency in both post-incident investigations and proactive crime prevention. With the capability to handle massive volumes of data seamlessly, CDAMS empowers investigators to uncover critical leads with speed and precision. Featuring a comprehensive suite of preset queries for rapid insights, it also provides the flexibility for investigators to craft custom queries, transforming raw data into actionable intelligence. CDAMS is the ultimate solution for turning complex telecom information into meaningful, results-driven intelligence.
Differentiators
-
Handles massive telecom datasets with lightning-fast processing, ensuring investigators get results quickly and efficiently.
-
Provides unique insights into WhatsApp B-party communication, enhancing the depth of investigation during IPDR analysis.
-
Supports seamless import of telecom data in various formats, including Excel, CSV, and raw logs, simplifying data handling.
-
Generates comprehensive, investigator-ready reports with a single click, saving time and ensuring accuracy in documentation.
-
Allows investigators to design and execute tailored queries, ensuring flexibility to adapt to unique case requirements.
Features
-
Analysis of CDR / Tower Data / ISD Data / Gateway Data / SDR Data.
-
Subscriber data lookup with a single click.
-
Data can be analyzed on the basis of frequently called countries, IMEI usage, common IMEI, call duration, Cell ID location, conference call analysis and much more.
-
Fully compatible with the i2 Analyst's Notebook™.
-
Instant generation of suspect location, association and behavior reports.
-
Critical analytical capabilities including cross-case, geofencing, identity change, common number, new number and map based location & movement analysis.
-
Support for data extracted from mobile forensics tools such as Cellebrite’s UFED™, XRY™, etc.
Licenses
Software-based & Dongle-based
Client end Requirment
Client-Server Edition
- Hardware Requirememt:
- Processor: i7 13th gen
- Storage: 2 TB SSD
- RAM: 16 GB (min)
- OS: Windows 10 or 11
CDAMS Ultimate edition
- Processor: i5 13th gen
- Storage: 1 TB SSD
- RAM: 16 GB (min)
- OS: Windows 10 or 11
Educational Qualification
Sl No | Name of project | Project Manager | Project Duration |
---|---|---|---|
1 | Intelligence Agency (121 licences) | Mr. Samir Datt | 12 Years |
Architechture
Client-Server
Infrastructure/Operation
- Data Ingestion
- Data Analysis
- Lead Identification
- Location Tracking
- Reporting and Visualization
- Collaboration and Case Management
- Integration with Other Tools
Technical Specifications
1. Log Analysis Capabilities:
- Processes telecom logs such as CDRs, TDRs, IMEI scans, Gateway dumps, ISD dumps, and IPDR.
- Supports 2G, 3G, 4G, and 5G networks.
2. Data Standardization:
- Accepts and standardizes formats like Text (comma, tab, pipe), MS Excel (xls, xlsx), HTML, and MS Access.
3. Comprehensive Reporting:
- Single-screen visualizations for relationships between targets, IMEIs, Cell IDs, and locations.
- Identification of patterns like sandwich calls, conference calls, and new SIM/handset usage.
- Consolidated Excel reports with target summaries, frequency analysis, and suspect matches.
4. Data Management:
- Elimination of duplicate records.
- Merging and unmerging of target numbers.
- Decoding roaming cell tower information.
5. Visualization and Geo-Analysis:
- Visual link charts for identifying clusters and common elements.
- Import and use of Cell ID charts for location-based analysis.
- Geo-fencing capabilities to analyze calls in specific areas.
- GIS-based tools for plotting movements, meeting points, and tower coverage.
6. Advanced Filtering:
- Unified filters for investigation criteria (date, time, call type, IMEI, Cell ID, etc.) applicable across reports.
7. ISD Dump Analysis:
- Frequency and pattern analysis for calls to countries of interest.
- Geo-analysis of ISD dump calls on maps.
8. Tower Dump Insights:
- Identifies common/uncommon numbers, IMEIs, and SIM cards across locations.
- Provides detailed frequency reports for call types, durations, and locations.
- Matches suspect lists and identifies VOIP calls.
9. Subscriber and Case Management:
- Matches subscriber data with reports.
- Maintains suspect lists and bookmarks for investigation tracking.
- Multi-user case management with role-based access.
10. Forensics Integration:
- Compatible with i2 Analyst's Notebook and mobile forensic tools like Cellebrite UFED.
- Enables analysis of extracted data, including common numbers, summaries, and call patterns.
Target Clients
- State Law Enforcement Agencies- Anti-Terrorist Squads (ATS)
- Intelligence Agenices
- Central Intelligence Agencies
- Special Task Force (STF)
- Police Headquarters (PHQ)
- Railway Protection Force (RPF)
- State Police
- Financial Crime Investigation Agencies
- Anti-Narcotics Investigation Agencies
Use cases
- Criminal Network Analysis
- Kidnapping Investigations
- Cybercrime Investigations
- Terrorism and National Security
- Missing Persons Cases
Differentiators
-
Handles massive telecom datasets with lightning-fast processing, ensuring investigators get results quickly and efficiently.
-
Provides unique insights into WhatsApp B-party communication, enhancing the depth of investigation during IPDR analysis.
-
Supports seamless import of telecom data in various formats, including Excel, CSV, and raw logs, simplifying data handling.
-
Generates comprehensive, investigator-ready reports with a single click, saving time and ensuring accuracy in documentation.
-
Allows investigators to design and execute tailored queries, ensuring flexibility to adapt to unique case requirements.
Features
-
Analysis of CDR / Tower Data / ISD Data / Gateway Data / SDR Data.
-
Subscriber data lookup with a single click.
-
Data can be analyzed on the basis of frequently called countries, IMEI usage, common IMEI, call duration, Cell ID location, conference call analysis and much more.
-
Fully compatible with the i2 Analyst's Notebook™.
-
Instant generation of suspect location, association and behavior reports.
-
Critical analytical capabilities including cross-case, geofencing, identity change, common number, new number and map based location & movement analysis.
-
Support for data extracted from mobile forensics tools such as Cellebrite’s UFED™, XRY™, etc.
Licenses
Software-based & Dongle-based
Client end Requirment
Client-Server Edition
- Hardware Requirememt:
- Processor: i7 13th gen
- Storage: 2 TB SSD
- RAM: 16 GB (min)
- OS: Windows 10 or 11
CDAMS Ultimate edition
- Processor: i5 13th gen
- Storage: 1 TB SSD
- RAM: 16 GB (min)
- OS: Windows 10 or 11
Scope
Data Center
Faridabad, Haryana
Projects
Sl No | Name of project | Project Manager | Project Duration |
---|---|---|---|
1 | Intelligence Agency (121 licences) | Mr. Samir Datt | 12 Years |
Architechture
Client-Server
Infrastructure/Operation
- Data Ingestion
- Data Analysis
- Lead Identification
- Location Tracking
- Reporting and Visualization
- Collaboration and Case Management
- Integration with Other Tools
Technical Specifications
1. Log Analysis Capabilities:
- Processes telecom logs such as CDRs, TDRs, IMEI scans, Gateway dumps, ISD dumps, and IPDR.
- Supports 2G, 3G, 4G, and 5G networks.
2. Data Standardization:
- Accepts and standardizes formats like Text (comma, tab, pipe), MS Excel (xls, xlsx), HTML, and MS Access.
3. Comprehensive Reporting:
- Single-screen visualizations for relationships between targets, IMEIs, Cell IDs, and locations.
- Identification of patterns like sandwich calls, conference calls, and new SIM/handset usage.
- Consolidated Excel reports with target summaries, frequency analysis, and suspect matches.
4. Data Management:
- Elimination of duplicate records.
- Merging and unmerging of target numbers.
- Decoding roaming cell tower information.
5. Visualization and Geo-Analysis:
- Visual link charts for identifying clusters and common elements.
- Import and use of Cell ID charts for location-based analysis.
- Geo-fencing capabilities to analyze calls in specific areas.
- GIS-based tools for plotting movements, meeting points, and tower coverage.
6. Advanced Filtering:
- Unified filters for investigation criteria (date, time, call type, IMEI, Cell ID, etc.) applicable across reports.
7. ISD Dump Analysis:
- Frequency and pattern analysis for calls to countries of interest.
- Geo-analysis of ISD dump calls on maps.
8. Tower Dump Insights:
- Identifies common/uncommon numbers, IMEIs, and SIM cards across locations.
- Provides detailed frequency reports for call types, durations, and locations.
- Matches suspect lists and identifies VOIP calls.
9. Subscriber and Case Management:
- Matches subscriber data with reports.
- Maintains suspect lists and bookmarks for investigation tracking.
- Multi-user case management with role-based access.
10. Forensics Integration:
- Compatible with i2 Analyst's Notebook and mobile forensic tools like Cellebrite UFED.
- Enables analysis of extracted data, including common numbers, summaries, and call patterns.
Target Clients
- State Law Enforcement Agencies- Anti-Terrorist Squads (ATS)
- Intelligence Agenices
- Central Intelligence Agencies
- Special Task Force (STF)
- Police Headquarters (PHQ)
- Railway Protection Force (RPF)
- State Police
- Financial Crime Investigation Agencies
- Anti-Narcotics Investigation Agencies
Pricing / commercial model
Use cases
- Criminal Network Analysis
- Kidnapping Investigations
- Cybercrime Investigations
- Terrorism and National Security
- Missing Persons Cases