OEM


    2024


    24.01.1.5


    CSP/21

IPDAMS-Internet Protocol Data Analysis & Management System

IP Data Analysis & Management, Cybercrime Investigation, Custom Data Mapping, Offline Decoding, Advanced Filtering, Graphical Analysis and Visualization, PoI and Application Analysis

IPDAMS is an advanced IPDR Analysis tool designed for seamless processing of massive datasets with intuitive analysis and app/domain decoding. It offers graphical application insights, WhatsApp call analysis with B-party details, and offline IP decoding for uninterrupted investigations. Features include interactive timelines, customizable filtering by PoI, domains, and apps, and versatile reporting in multiple formats. IPDAMS empowers investigators with actionable intelligence, simplifying complex IPDR data analysis in a user-friendly interface.


    Foundation Futuristic Technologies (Forensics Guru)



Mr. Samir Datt



    OEM


    2024


    24.01.1.5


    CSP/21


Differentiators

SPECIAL FEATURES:

- Identify the B party.
- Can handle big data.
- Separate tool for analyzing the IP Data.

Features

  1. B-Party Identification
  2. Big Data Handling
  3. App and Domain Decoding
  4. Intuitive User Interface
  5. Dedicated IPDR Analysis Tool

Licenses

Software-based & Dongle-based

Client end Requirment

Hardware Requirements:

  • Processor: i5 13th Gen
  • Storage: 1 TB SSD
  • RAM: 16 GB (min)
  • OS: Windows 10 or 11

Architechture

Standalone Software

Infrastructure/Operation

  • Data Ingestion and Processing
  • Custom Data Mapping
  • Offline Decoding
  • Advanced Filtering
  • Graphical Analysis and Visualization
  • PoI and Application Analysis

Technical Specifications

  1. It has the ability to process and analyze large volumes of IPDR data quickly, importing over 2500 records per second.
  2. It can import various file types, including .txt, .csv, .html, and .xls, with auto-detection and drag-and-drop mapping of file columns.
  3. It can decode IPs and Cell Tower IDs offline without the need for internet connectivity.
  4. It provides filters based on PoI, application (e.g., WhatsApp, Telegram), domain name (e.g., Amazon, Google), Cell Tower ID, and IMEI.
  5. It allows users to define customized file specifications for tailored data imports.
  6. It graphically displays total cases, top 10 crime types, and total data records in 2D charts, alongside sortable case lists with search functionality.
  7. It includes user, case, and data management windows for creating, updating, and deleting cases or users.
  8. It generates five-sheet reports and exports them in multiple formats, including Excel, PDF, CSV, and TIFF.
  9. It features an interactive timeline report with drill-down functionality from year to seconds.
  10. It lists applications used by PoIs, categorizes them (e.g., food, travel), and analyzes application usage frequency.
  11. It shows day-wise and night-wise location analysis, top 5 locations, and top 10 application durations of PoIs in bar graphs and grids.
  12. It includes IMEI use frequency analysis, identification of common IMEIs between PoIs, and handset details.
  13. It identifies VoIP calls and applications used by PoIs or multiple PoIs in parallel.
  14. It generates PoI and IP-wise subreports, summaries, and exports multiple PoI data summaries simultaneously.
  15. It identifies common applications (destination IPs) used by multiple PoIs, enhancing cross-analysis capabilities.

Target Clients

  1. State Law Enforcement Agencies
  2. Anti-Terrorist Squads (ATS)
  3. Intelligence Agenices
  4. Central Intelligence Agencies
  5. Special Task Force (STF)
  6. Police Headquarters (PHQ)
  7. Railway Protection Force (RPF)
  8. State Police
  9. Financial Crime Investigation Agencies
  10. Anti-Narcotics Investigation Agencies

Use cases

  1. Cybercrime Investigations
  2. Terrorism and National Security
  3. Stalking and Harassment
  4. VoIP Call Analysis

Differentiators

SPECIAL FEATURES:

- Identify the B party.
- Can handle big data.
- Separate tool for analyzing the IP Data.

Features

  1. B-Party Identification
  2. Big Data Handling
  3. App and Domain Decoding
  4. Intuitive User Interface
  5. Dedicated IPDR Analysis Tool

Licenses

Software-based & Dongle-based

Client end Requirment

Hardware Requirements:

  • Processor: i5 13th Gen
  • Storage: 1 TB SSD
  • RAM: 16 GB (min)
  • OS: Windows 10 or 11

Scope

Data Center

Faridabad, Haryana

 

Architechture

Standalone Software

Infrastructure/Operation

  • Data Ingestion and Processing
  • Custom Data Mapping
  • Offline Decoding
  • Advanced Filtering
  • Graphical Analysis and Visualization
  • PoI and Application Analysis

Technical Specifications

  1. It has the ability to process and analyze large volumes of IPDR data quickly, importing over 2500 records per second.
  2. It can import various file types, including .txt, .csv, .html, and .xls, with auto-detection and drag-and-drop mapping of file columns.
  3. It can decode IPs and Cell Tower IDs offline without the need for internet connectivity.
  4. It provides filters based on PoI, application (e.g., WhatsApp, Telegram), domain name (e.g., Amazon, Google), Cell Tower ID, and IMEI.
  5. It allows users to define customized file specifications for tailored data imports.
  6. It graphically displays total cases, top 10 crime types, and total data records in 2D charts, alongside sortable case lists with search functionality.
  7. It includes user, case, and data management windows for creating, updating, and deleting cases or users.
  8. It generates five-sheet reports and exports them in multiple formats, including Excel, PDF, CSV, and TIFF.
  9. It features an interactive timeline report with drill-down functionality from year to seconds.
  10. It lists applications used by PoIs, categorizes them (e.g., food, travel), and analyzes application usage frequency.
  11. It shows day-wise and night-wise location analysis, top 5 locations, and top 10 application durations of PoIs in bar graphs and grids.
  12. It includes IMEI use frequency analysis, identification of common IMEIs between PoIs, and handset details.
  13. It identifies VoIP calls and applications used by PoIs or multiple PoIs in parallel.
  14. It generates PoI and IP-wise subreports, summaries, and exports multiple PoI data summaries simultaneously.
  15. It identifies common applications (destination IPs) used by multiple PoIs, enhancing cross-analysis capabilities.

Target Clients

  1. State Law Enforcement Agencies
  2. Anti-Terrorist Squads (ATS)
  3. Intelligence Agenices
  4. Central Intelligence Agencies
  5. Special Task Force (STF)
  6. Police Headquarters (PHQ)
  7. Railway Protection Force (RPF)
  8. State Police
  9. Financial Crime Investigation Agencies
  10. Anti-Narcotics Investigation Agencies

Pricing / commercial model

Use cases

  1. Cybercrime Investigations
  2. Terrorism and National Security
  3. Stalking and Harassment
  4. VoIP Call Analysis

A Technologist's Expertise Company