Chiefs' Corner

Bitcoin Investigative Field Guide

The National White Collar Crime Center’s Bitcoin Investigative Field Guide provides law enforcement-specific information on the Bitcoin cryptocurrency. The Field Guide explains Bitcoin basics (its history, market value, and uses); how Bitcoin can be obtained (through online exchanges and “mining”); where it can be stored; how to obtain a Bitcoin wallet; and a 4-step process for seizing a suspect’s Bitcoin.

Mobile Field Guide
A mobile version of the Field Guide is accessible via computer, tablet, or smartphone.

Print Version
An 11×17 PDF version of the Field Guide is available for print.

Click here to view the entire document.


Cybersecurity Awareness Training

This paper is designed to casually explain common vulnerabilities and initial steps to proactively protect an agencies infrastructure.

Click here to view the entire document.


Managing Cybersecurity Risk: A Law Enforcement Guide

This paper is designed to aid in educating law enforcement executives on their responsibility to ensure the cybersecurity of their organizations is managed in an effective manner. It provides essential background material to create a greater understanding of the complex issues involved. This paper will be of assistance to any law enforcement executive, whether they are involved in state, province, local, or tribal law enforcement organizations.

Click here to view the entire document.


BJA and PERF Release The Utah Model: A Path Forward for Investigating and Building Resilience to Cyber Crime

As new internet-based technologies are introduced, cybercrime is growing exponentially, both in the proliferation of crimes and the associated impact on victims concerning financial loss, invasion of privacy, blackmail, and threats to our national security.  To respond to this ever-changing threat, national and local police agencies across the globe continue to explore ways to coordinate resources with each other and attack the problem. This document highlights the many promising practices of the Utah State Model in support of “Operation Wellspring” and related efforts involving law enforcement leaders, cyber investigators, fusion center staff, emergency management personnel, and other national subject matter experts, working in partnership with the Federal Bureau of Investigation and the Department of Homeland Security.  However, this document is more than a “case study.”  Indeed, this publication serves as a foundational national document, strategically targeted, for Governor’s, their staff, and others, to guide and inform their policies and practices.  Special thanks are given to the Utah Department of Public Safety, FBI, DHS, IACP, RAND, NW3C, NGA, NACSIO, ASCIA and others.

Click here to view the entire document.

See our Chief’s Corner for more information by Chiefs, for Chiefs.

Directory of Cybercrime Labs and Resources

Search for regional crime labs and other resources to help with cybercrime investigations and assistance.

What's New?




You have collected the digital evidence, you have examined and analyzed it, and reported on the results of your findings. Then it happens, you get informed that you need to testify. It could be having to testify in a criminal prosecution, a civil trial, or even in some form of disciplinary hearing. For most people testifying is not the norm, and can be a scary and intimidating process. Because the success of a case can depend on the quality of the witness testifying, doing it right is important.

This webcast, the first in a series of three, will introduce the first time or inexperienced witness to the fundamental process of testifying, and help them understand the testifying process, so that there are no surprises and that they know what to expect.

Click here to register. 

Top 10 Cyber Crime Stories of 2017

Without a doubt, the most significant cyber crime related stories in 2017 were about the first global cyber attacks from WannaCry and NotPetya, which for many individuals and organisations, made the cyber threat real. The potential effect of cyber attacks was graphically illustrated by the impact of WannaCry on the NHS and NotPetya on Danish shipping giant Maersk.

Click here for full article.

Top 10 Malware November 2017

In November 2017 notifications regarding the Top 10 Malware decreased by 41%, coinciding with an overall 45% decrease in all new malware infections, compared to October 2017. The Top 10 Malware made up 72% of all new malware infections reported by the MS-ISAC in November. This is five percentage points higher than the Top 10 Malware accounted for in October 2017, continuing a rising trend since July 2017.

Click here for full article.



Sarahah is a messaging application launched in November 2016 by independent developer Zain al-Abidin Tawfiq. The word “Sarahaha” is the pronunciation of the Arabic word for “honesty.” 1 It was originally launched as a service for Middle-Eastern businesses to solicit anonymous, candid feedback from their employees and co-workers. However, it quickly went viral in Saudi Arabia and Egypt among teenagers and young adults as an anonymous messaging application.

For more information, please visit:



Houseparty was launched in February 2016 by Life on Air as a free, easy-to-use video conferencing platform. It was built from the remnants of previous failed attempts at creating a livestreaming application, and was initially launched under a pseudonym, Alexander Herzick. It experienced relatively slow growth before going viral in late 2016. Houseparty can support video conferences (“houseparties”) with up to 8 simultaneous participants, in which every participant can see and talk to every other participant. The application is currently available via the Google Play Store and Apple iOS Store.

For more information, please visit:



Roblox is a user-generated massive multiplayer online social gaming platform. The name Roblox was created by blending the words “robots” and “blocks.” Roblox users create their own virtual worlds and design their own avatars and games within the platform. New users must register with a username, email address, and date of birth. After registration and email verification, the new user then selects and customizes a virtual character that is used as his or her identity in the Roblox world.

For more information, please visit:


Protecting law enforcement from cyber threats

This document provides material designed to assist law enforcement in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don’ts, and links to further cyber training and resources. Download and read the full article at–Steps-to-Protect-Personal-Information


Want to follow the LECC on RSS?

Just point your RSS reader to (for the blogs) and for our news feeds.


Internet of Things Infographic

This fun infographic shows many different kinds of electronic devices that may be found in a residential home. Where possible, we describe the technologies imbedded within the devices, and the kinds of data they generate. While some devices store data on the device itself, others act as sensors that transmit data back to a smartphone application, cloud service provider, or other remote location.

Click here to begin exploring the digital home.


For the Prosecutor

This information provides resources to those who prosecute cyber crimes, and includes both links to statutes and case law explicitly focusing on cyber crimes, as well as links to other legal resources related to cyber crime prosecution, such as digital search warrants, and litigation guides. Click here to view more.


Cybercrime Community Awareness and Prevention

In an effort to support and advance police/community interaction addressing cyber crime and victimization, the National White Collar Crime Center, International Association of Chiefs of Police, and the Office of Community Oriented Policing Services, and the U.S. Department of Justice, have developed training modules that identify the most common types of Internet and computer-related scams, and instructional tools to help people avoid being victimized by these scams. Click here to view the latest training module.


More Updates