top of page
OT12YY1.jpg

Terrier

Terrier is a tool designed to help law enforcement agencies (like Police) organize digital evidence, analyze packet data, and uncover critical insights making it easier to track suspicious activity and accelerate investigations.

Overview

During my tenure at Cleartrail Technologies, a cybersecurity company that builds advanced products for law enforcement and intelligence agencies worldwide, I worked on multiple projects aimed at transforming raw digital evidence into actionable intelligence.

​

Cleartrail’s solutions enable investigative teams to collect, process, and analyze complex communication data to solve high-stakes cases involving cybercrime, terrorism, and organized crime.

​

One of these projects was Terrier, a next-generation packet sniffing software designed to convert raw PCAP files into clear, legible data, helping investigators uncover patterns, connections, and critical leads during criminal investigations.

My Role

Worked as a UI/UX Designer in a cross-collaborative team, contributing to user research, persona creation, user flows, and information architecture, followed by designing the User Interface and validating it through usability testing.

Macbook_Blank_003.png

Problem

Law enforcement agencies handle vast volumes of packet data that contain critical evidence, but existing analysis tools are either too technical for non-specialists or too limited for advanced investigations.
 

Goals

1

To create a new platform for data visualization and analytics for law enforcement agents.

2

Understand user needs and market gaps through research with investigators and analysis of existing tools.

3

Integrate multiple data sources into a single, easy-to-use interface.

4

Deliver an intuitive, secure, and efficient interface to speed up decision-making and investigations.

Desktop screens.png

Approach

A user-centred, iterative approach was followed, starting with understanding the domain of communication analytics in cybercrime, then combining secondary research (literature review, law & policy study, competitor benchmarking) with primary research (interviews and surveys with law enforcement and intelligence officers). Insights from both were synthesised to uncover pain points and opportunities.

Based on these findings, concept ideation and information architecture were developed, followed by low-fidelity prototypes for early testing.

Continuous feedback from industry experts and end-users guided refinements, leading to the final design of a clean, accessible, and integrated platform tailored to real investigative workflows.

 

Secondary Research

I conducted secondary research by deep diving into the methodology, protocols, laws and appraoches of doing a criminal data investigation both in Indian and Global context. I interviewed Tech and Research Team for better understanding. 

​

I conducted a competitive analysis of 10 tools, including Wireshark and NetworkMiner, to study their interfaces, workflows, and technical capabilities, and to understand how target users interact with network analysis and forensic tools.

Insights

Investigations are fragmented and protocol-heavy

Existing tools are powerful but complex

Gap between global practices and local systems

The Gap

There is no unified, intuitive, and secure platform that simplifies fragmented, highly technical workflows for law enforcement.

Primary Research

I conducted primary research by interviewing personnel from Law Enforcement and Intelligence Agencies to understand their workflows, pain points, and expectations from investigation tools. Follow-up surveys were used to capture their visual and usability preferences, which helped me identify practical challenges, user needs, and opportunities for creating a more accessible and efficient platform.

Insights

Users lack technical expertise.

Workflows are fragmented and slow.

Need for simple, visual, intuitive tools.

The Gap

there is no simple easy to learn softwares that can be used by all law enforcement agents ​

After gathering insights from research, we started creating personas and user journey to establish the context and usability of the application. 

Persona

Depending on the responsibilities and the level of superiority, three types of personas can be created based on the age, experience, and behaviour associated with each personality type. They are: 

Analyst Type A

​

A young Sub-constable of police with only a year of experience

is in charge of data analysis for a case investigation.

 

Analyst Type B

​

A sub-inspector with 20 years of on-field service who is given the responsibility of analyzing data for a case investigation. 

 

Investigator

​

A deputy director of IB who is investigating a case and requires insights from data obtained at the scene.

Analyst 4 (1).png

Jagdish’s journey to analyze data

Scenario

Jagdish wants to capture the data files from the network of a target and compare it with the files of other suspects to get plausible connections between them. He wants to give relevant data report to his senior officer in time to help with the investigation.

Expectations

Analyze the information fast
Get desired data with a click of a button
Get print ready reports in time

Phase 1

Phase 2

Coming back and analyzing data that was captured

He comes back to office and puts all the files for analysis.

He gets various parameters of analysis and gets details on the target.

Frame 1.png

Hopeful
Excited
Enthusiastic

Phase 3

Comparing the data with a previous data file of another target

He is then asked to find any connections to a previous target.

He uploads a data file from previous records and analyzes it to extract information.

He then compares with the captured files based on parameters that were found on field

Downloading the report with suggestions and findings

Phase 4

Going to the targets place and capturing data

Jagdish sits in the same network as the target and captures all the files in that device

He discovers a few connections between them and puts auto suggestions and his own suggestions into the report.

He takes the printout of the detailed report and takes it to his team and seniors to discuss.

Anxious 
Stressed
Overwhelmed

Exhausted
Agitated
Annoyed

Excited
Content
Optimistic

Frame 2.png
Frame 1.png
Frame 2.png

Use AI and ML to help with investigations

Highlight any information that can be useful.

Innovative data visualizations to help in better analysis and comparison of information.

Auto analysis to save time.

Options to add personal comments and physical discoveries.

Sharing and collaborating with teams.

Better sharing options

Digital repository of data files.

STAGES

ACTIVITIES

EMOTIONS

OPPORTUNITIES

From the persona and journey, I found users need a simple start but later require support for parallel data analysis, which shaped the tool to balance easy entry with advanced handling.

User Flow

Group 1000014872.png

Information Architecture

Group 1000014873.png

I created rough iterations through quick wireframes. I followed an elimination method by taking feedback from team members and with stakeholders. 

Wireframes

Grad Project (9).png
Grad Project (20).png
Grad Project (3).png
Grad Project (11).png
POL 4.png
Grad Project (15).png
compare 1.png

Challenges

  • Understanding how to segregate and distribute information to improve user experience.

  • Designing effective filters to help users organize and access relevant information.

  • Enabling note-taking throughout the process for better tracking and context.

  • Analyzing how data is used across different contexts and adapting information distribution.

  • Balancing simplicity with complexity to meet the needs of different user groups.

Slide 16_9 - 15.png
Slide 16_9 - 12.png

Final Design

Visual Design

Identity

Font: Delight Bold

Terrier Logo white-12.png

Why Terrier?

Terriers are a type of dog species that are exceptionally good at sniffing out narcotics and explosives.

 

They are friendly and good companions and are used by law enforcement.

Typography

Color Scheme

Neutral, Dark, High Contrast, Familiar

Heading

Mulish Semi Bold

Subheading

Mulish Medium

Body

Mulish Regular

#FFD45A

#FFFFFF

#B2B6BC

#2F3638

#1A1E1F

#000000

Screenshot 2025-08-26 150149.png

Components

Final Prototype 

Signup/ Login

Sign Up.png

Creating a New Case

The analysis of files can only be done after creating a case. A case will contain all the details regarding the incident. To create a new case, files have to be either captured through network traffic or uploaded from archives. The case files are then processed to view detailed outcomes. 

Home.png
Create new case - select files.png

Case Contents

Once the files are processed, various parameters called Case Contents are analyzed to get to the results to the investigation.  

There are a total of 12 Case Contents that can be analyzed through Terrier. Namely:
1. Location
2. IP Address
3. VoIP Calls
4. MAC Address
5. Applications
6. Devices
7. Protocols
8. Servers
9. Domains
10. Email ID
11. Phone Number
12. Media (Photos, Videos, etc)

Case Analysis-2.png

Case Contents Interactions: Location

The case contents can be analyzed by expanding the view, Selecting a timeline, Searching through Terrier AI, Adding personal notes and Marking the results. 

Case Analysis - Location-2.png
Case Analysis-3.png
Frame 1000014689.png
Frame 1000014691.png
Frame 1000014690.png

Case Contents Interactions: VoIP Calls

VoIP Calls can be further expand and the connections can be highlighted.

Case Analysis - VoIP-1.png

We studied Network Graphs and Ontologies to come up with visualization of VoIP Calls

Case Analysis-9.png
Case Analysis-10.png

Case Contents:
Media Records

Case Analysis - Media.png

Case Contents:
IP Address Records

Case Analysis - Location.png

Pattern of Life

Pattern-of-life analysis is a method of surveillence that documents or understands the habits of a person or population

Here, the pattern of life is like a comparitive analysis of all the case components in a timeline. 

Pattern of Life.png

A single entity in the timeline can also be viewed. 

Pattern of Life single.png

 Data visualization for Pattern of life was inspired by heatmaps used in interactive timeline systems.

Pattern of life can be viewed for multiple suspects. 

Pattern of Life-1.png

Selected case contents can be compared.

Pattern of Life-2.png

Cross Comparison

A cross-comparison from the previous cases of parameters like Suspects, Cases or Contents can be done, and valuable insights can be brought out to ease the investigation or uncover patterns between cases.

Compare-1.png
Compare Results.png

Taking a report

After the analysis, a printed report can be generated to pass the information to a team or a superior officer. The printed report will contain a meta summary, all marked parameters with details and personal notes. 

Reports.png
Reports-1.png

Impact

  • The product was an instant hit in the market, receiving strong validation from both industry experts and law enforcement users.

​​

  • Helped Cleartrail position itself as a leader in intuitive cybersecurity solutions.

​​

  • Gained real-world experience in designing a product that achieved immediate market success.

​​

  • Learned how to translate user pain points into impactful design decisions that directly influenced adoption.

BehanceWhite

View more Projects on

InstaWhite

Short Videos

 © 2025 created by Ananya Kori

bottom of page