On-chain investigative capability for departments that don't have it in-house.
RESILIENCE works with state, county, federal, and international law-enforcement agencies on cases involving lost or stolen funds. We provide on-chain investigation — wallet clustering, mixer and bridge tracing, exchange liaison, custom tooling — and deliver an evidence packet to the requesting officer. Engagement model, deliverable standards, and the refusal lanes are written down. Read them in full before reaching out.
What we bring to the table.
Each capability below is something we have actually delivered, in the language we use to describe the work to ourselves.
On-chain investigation
Wallet clustering, transaction-graph reconstruction, time-window analysis, and behavioral fingerprinting across the major chains we cover (Bitcoin, Ethereum and EVM-compatible L1s and L2s, Tron, Solana).
Mixer and bridge tracing
Timing-amount-fingerprint analysis on privacy mixers within the bounds of public ledger data; cross-chain bridge attribution against our own bridge-event index. We are honest about confidence bands.
Exchange liaison
Working contacts at major US-domiciled centralized exchanges and primary bridge protocols. We do not promise specific outcomes; we facilitate the path your subpoena or preservation request needs to travel.
Custom on-chain tooling
When an investigation calls for instrumentation we don't already have, we build it in-house. Recent examples: timing-window deposit clustering, off-the-shelf mixer pool reconciliation, signature-pattern attribution.
Evidence packets for the requesting officer
Reproducible methodology, on-chain transaction graphs annotated with block heights and timestamps, and a written report that documents what we found, how, and how confident we are. The packet is designed to be read and acted on by your investigators and your prosecutor — not by a courtroom.
How the relationship works.
Two tiers, written down so there is no ambiguity about which case lands where.
- 01
Standard agency rate
From $3,499 per engagement
Departmental matters where the on-chain question is well-scoped — a clear set of addresses, a defined time window, and a specific deliverable. Pricing scales with hop count, chains in play, and report depth. Quoted in writing before any work starts.
- 02
Complex matters
Custom-quoted
Sustained multi-jurisdictional investigations, multi-mixer cases, federal task-force coordination, or matters where the requesting agency expects ongoing coordination across weeks or months. Scoped in writing during the discovery call.
Written for the investigator and the prosecutor — not the courtroom.
Reproducible methodology
Reports include the queries, the heuristics, and the confidence bands that produced each conclusion. A second qualified analyst with the same data and the same report can reproduce the analyst's work.
Block-height keying
Every artifact is logged with a block height and a UTC timestamp. Re-running the analysis on the same inputs produces the same output. The agency owns the audit trail; we keep our copy for our records.
Annotated transaction graphs
On-chain transaction graphs are produced with clear legends, timestamps, and address-truncation conventions consistent across exhibits. Designed to be read in an investigator's case file, not a slide deck.
Plain-language reports
Reports explain technical findings in language an investigator or prosecutor can act on without a primer. Technical detail lives in appendices.
The refusal lanes.
These are documented because senior agency coordinators read them first. We mean each one.
- 01
We do not promise recovery.
Public ledgers are immutable. Self-custody wallets are non-penetrable by design. Any firm promising guaranteed recovery from the chain itself deserves a hard second look. What we deliver is the evidence trail your subpoena, exchange contact, or prosecutor needs to act on — not a guarantee of restitution.
- 02
We do not work pro-bono.
Every engagement runs on a written agreement and an invoice, including those at the standard agency rate. We are happy to discuss scope to fit a department's budget; we are not in a position to absorb the cost of the work.
- 03
We do not work on contingency.
Contingency-only crypto-recovery is a structure that selects for matters where the investigator has financial interest in the outcome. We will not introduce that conflict into a law-enforcement engagement.
- 04
We do not appear in court.
RESILIENCE delivers evidence packets to the requesting agency. We do not testify, we do not appear at depositions, we do not draft sworn declarations, and we do not coordinate with prosecutors during trial. Courtroom presentation is the agency and counsel's responsibility — our work is the input that informs their case, not a substitute for it.
- 05
We do not take off-the-books work.
Every engagement runs on a written agreement. Verbal scope is not scope. If a matter cannot be put in writing — for any reason — it is not a matter we can take.
Email is the right channel. We reply within one business day.
Use the subject-line template above and include the matter type, the agency, the requesting officer, and a brief description of the on-chain question. We will reply with a short intake form or a request for a coordination call, depending on the matter.