• Contact Network Graph
• Tower Movement Playback
• Burner Chain Detection
• Crime Database Matching — Cross-reference phone numbers against NDPS, Theft, Gunda, and Terrorism databases
• Triple Overlap Analysis
• Pre-Incident Spike Detection
• Ping-Pong Coordination Detection
• SIM Swap & Burner Phone Detection
• Database Hit Timeline