UNCLASSIFIEDllLAW ENFORCEMENT SENSITIVE
Dark Web and Cryptocurrency
What
to
Look for During a Search Warrant
Nevada High
Intensity
Drug
Trafficking
Area
(U) Overview
(U//FOUO)
In
June
of
2021,
the
Nevada
lligh
Intensity
Drug
Trafficking Area (HIDTA) Drug
Enforcement
Agency (DEA)
Enforcemen
t Group
3
arres
t
ed
four
members
of
a
Drug
Trafficking
Money
Laundering
Organization
(DTMLO)
responsible
for
selling
millions
of
dollars'
worth
of
cocaine
on
the
dark
web
and
transporting
it
through
the
United
States
Postal
Services (USPS).
Federal
search
warrants
were
executed
at
the
DTMLO's
primary
residences
in
Las Vegas
as
well
as
two
stash
l
ocations
which
resulted
in
the
seizure
of
approximately
12.6
kilograms
of
cocaine,
13
firearms,
approximately
$86,000
in
bulk
currency,
1
vehicle,
and
numerous
luxury
motorcycles
valued
at
$450,000.
At all
locations,
electronic
devices
such
as
phones,
computers,
and
BULLETIN
September
2021
(U//LES) Photo
of
cocaine and pharmaceuticals found
at
stash loca
ti
on.
Source:
DE
A E
nforcemen
t Group 3 June 2021.
cryptocurrency
devices
were
located
as
well as
drug
records,
financial
documents,
and
paper
recovery
seeds.
Subsequent
to
the
search
warrants,
over
30
wallets
were
reconstituted
which
allowed
for
the
seizure
of
approximately
$115,000
worth
of
cryptocurrency.
1
The
purpose
of
this
product
is
to
inform
law
enforcement
partners
on
how
to
better
recognize
(U//LES) E
le
ctron
i
cs
and
crypto
devices located
at
stash location.
Source:
DEA
Enforcement Gr
oup
3 June 2021.
key
indicators
of
dark
web
activity
while
executing
search
warrants.
This
includes
information
to
assist
law
enforcement
in
positively
identifying
cryptocurrency
devices,
electronic
applications,
and
recovery
seeds,
which
is critical for
seizing
digital
assets.
(U)
Re
l
evance
(U//FOUO)
In
2020,
the
Nevada
HIDTA
reported
a
surge
in
dark
web
drug
Please comp
le
te our survey
by
cl
icking
on
the
li
nk below.
https://www.suNeymonkey.com/r/2021 NVH I OT A-I nformation-1 ntelliqence-Bulletin-SuNey
UNCLASSIFIEDl!LAW ENFORCEMENT SENSITIVE
UNCLASSJFIEDl/LAW ENFORCEMENT SENSITIVE
related
activity
and
cryptocurrency
usage.
2
Due to
the
unique
n
ature
of
the
case
and
having
limited local resou
rces
that
specialized
in
cryptocurrency
and
cyber
re
l
ated
crimes,
along
with
several
locations involved,
investigators
required
additional
support
from
an
ou
t-of-
state
digital forensics
group
to
be
on
site
at
all locations
during
the
execution
of
the
search
warrants.
Prior
to
the
warrants,
an
overview
of
key
things
to look for
regarding
cryptocurrency
devices,
recovery
seeds
and
any
electronics
that
could
be
exami
ned
for
evidentiary
value
was
necessary
for all
law
enforcement
personne
l involved;
however,
many
of
the
law
enforcement
personnel
were
not
familiar
with
the
information
and
termino
l
ogy
that
was
provided
during
the
brief. Details
and
examples
of
what
to
l
ook
for
during
a
sea
rch
warrant
involving
dark
web
and
cryptocurrency
related
crime
is
provided
below
for l
aw
enforcement
partners.
(U) Hard
wa
re Wallets and Devi
ces
(U//FOUO)
Hardware
wallets
are
commonly
used
by
cryptocurrency
investors
as
well
as
dark
web
criminals
and
are
considered
the
bes
t
method
to
store
cryptocurrencies.
A
hardware
wallet
is
a
cryptocurrency
wa
l
let
which
stores
the
user's
private
keys in a
secure
hardware
device. The
main
principle
behind
a
hardware
wallet
is to
provide
full isolation
between
the
private
keys
and
the
user's
computer.
Private keys
are
codes
that
only
the
user
has access
to
and
are
used
to access
the
user's
crypto
assets
.
Private
keys
are
what
gives
the
user
ownership
of
their
cryptocurrency.
Hardware
wall
ets
have
an
associa
t
ed
web,
mobile,
an
d
/or
d
esk
t
op
appl
i
ca
ti
on
that
enables
you
to
monitor
your
cryptocurrency
addresses
and
spend
your
cryptocurrency.
Examples
of
hardware
wallets
are
shown
below
.3
Trez
or
- Single chip
base
Ledger - Double chip
base
(provides
more
securi
t
y)
(U
//
LES
) Ph
oto
of
recovery seed belonging
to
a dark
web
pill dis
trib
utor. Source:
DEA
Ta
ctical Diversion
Sq
uad
De
ce
mber 2019.
(U//FOUO) Example photos of Trezors and Ledger
Sou
rce: The Crypto
Merchant
Web
si
te
August 2021.
(U//FOUO)
Trezor
models
are
buil
t
on
a
si
ngle
chip base,
whereas
Ledger
devices
use
a
double
chip base. Ledger's
second
chip is a
bank-grade
secure
ele
ment (SE),
providing
additional
security
against
hardware-based
attacks.
(U) Recovery Seeds and Phrases
(U//FO
U
O)
A
crypto
wa
ll
et
will
randomly
generate
a
seed
phrase
or r
ecove
ry
ph
r
ase
in an
ordered
set
of
12
or
24
words,
sometimes
more
depending
on
the
type
of
wallet
being
used
.
The
crypto
wallet
al
so
uses
the
seed
Please complete our
su
rvey by clicking on the l
in
k bel
ow.
https :/
/W
WI/I/.
su
rveymonkey. c
om
/r/
202
1 N
VHI
OT
A-I
nfo
rm
ation-1 ntelliqence
-B
ulletin-Survey
UNCLASSIFIEDllLAW ENFORCEMENT SENSITIVE
UNCLASSIFIEDl/LAW ENFORCEMENT SENSITIVE
phrase
to
create
private
keys.
The
seed
phrase
is
not
linked
to
a
particular
cryptocurrency
and
can
be
used
to access
an
entire
portfolio
of
cryptocurrencies
such
as
Bitcoin, Litecoin,
Ethereum
and
other
crypto
assets
. A
seed
phrase
is
the
only
way
to
access
and
recover
a
wallet
as
well
as
all
of
its
contents
if a device
that
was
linked to
the
wallet
is
wiped,
lost,
or
stolen.4 If
possible,
recovering
wallets
and
seizing
cryptocurrency
in
an
expeditious
manner
is highly
recommended
and
should
be
treated
with
a
sense
of
urgency. Anyone
who
maintains
a
copy
of
the
recovery
seed
or
has
access
to
the
recovery
seed
can
re-create
the
wallet
without
geographical
limitations
and
could
easily
withdrawal
the
funds. Examples
of
seed
phrases
are
shown
below.
~
..
u
...
1""""'12 ...
0-<HOn~~j.(Wd«•
...
~O
'M•...0
....
11
~-
,o..;
to
•K'\)\o
..
f°""
..
aMoM
""
C:.-
OC
CO'l'\&All
«
I•-•
.
,.......,OM:'Olo•~ti~
,..,
.,..
l'ttM
I•
on•,,.._,_.,.
00
l"'CIPI
~uw
-
.
II
llt
-c'tt()no(....,
.....
.
{U//
FOUO)
Example
photos of recovery
seed
phrase.
Source:
The Crypto Merchant
and
Decryptionary webs
it
e
accessed
August
2021.
(U)
Software Wallets
(U//FOUO)
Software
wallets
come
in
many
forms, each
with
its
own
set
of
unique
characteristics
and
are
somehow
connec
t
ed
to
the
internet.
Wallets
are
distinguished
by
a
set
of
supported
cryptocurrencies
and
software
platforms
such
as
Windows,
Mac
and
other
operating
systems.
Software
wallets
are
available in
three
forms -
desktop,
mobile
and
online.s
Desktop
wallets
are
computer
programs
that
store
cryptocurrencies
on
a
PC
so
that
its
information
is
not
accessible
to
anyone
but
the
user.
Privat
e
keys
are
typically
kept
on
a
desktop.
Mobile
wallets
come
in
the
form
of
a
smartphone
app and
are
easily
accessible
to
their
use1-s
at
any
tin1e.
However,
mobile
devices
are
vulnerable
to
various
malware
and
can
be
eas
ily lost.
Online
wallets
are
web
-
based
wallets
that
can
be
accessed
from
anywhere
and
any
device. This
makes
them
more
convenient
for
accessing
funds,
and
their
private
keys
are
stored
by
website
owners
rather
than
locally on
user
devices.
(U)
Common
Types
of
Cryptocurrencies, Wallets and Exchanges
(U//FOUO) The
most
common
cryptocurrencies,
wallets
and
exchanges
encountered
in
the
Nevada
HIDTA
AOR
are
shown
on
the
following page:6
Please
complete our
su
rvey
by
clicking on the l
in
k
be
low.
https://www.surveymonkey.com/r/2021 NVHI
DT
A-I nformation-lntelligence-B ulletin-Survey
UNCLASS/FIEDl/LAW ENFORCEMENT SENSITIVE
UNCLASSIFIEDl/LAW ENF
OR
CEME
NT
SENSITIVE
Cry
pto
currency Icons:
8.tcom
(BTC)
Monera
(XMR)
0
Litecom
(l
TC)
Ethereum
(ETH) PAX Standard (PAX)
Dogecoan
(DOGE
Atgory
(ALG)
(U//FOUO) Photos
of
commonly
used cryptocurrenci
es.
Source: Cryptologos.cc website accessed August 2021.
T
ether
(USDT)
Software
Wallets
are
used
solely
for
storage,
sending
and
receiving
cryptocurrency
and
providing
more
anonymity.
Examples
of
common
software
wallets
encoun
t
ered
during
Nevada HIDTA
investigations
are
shown
below.
*
m
r~
...
.
~
E1cctrurn
hod
us
Coanom1
MoneroGUI
BRO
Blockcha•n
Mycel.u1.1
(U//FOUO) Photos
of
common
ly used software
wa
llet
s.
Source: Google images accessed August 2021.
Exchan
ge
Walle
ts
have
t
he
same
functions
as
software
wa
ll
ets
but
can
be
cashed
out
and
require
specific
use
r
information.
Examples
are
sh
o
wn
below.
B
-
Coin base Kraken Crypto.c
om
Binance Bits
tamp
(U//FOUO) Photos
of
commonly
used exchange wallets.
Source: Google images accessed August 2021.
Please complete o
ur
survey by clicking on the link below.
https://www.surveymonkey.com/r/2021 NVHIDT A-lnformat1on-lntelligence-Bulletin-Survey
UNCLASSIFIEDl/LAW ENFORCEMENT SENSITIVE
UNCLASSIFIEDllLAW ENFORCEMENT SENSITIVE
(U) Indicators of Dark Web Usage
(U//FOUO) Common indicators of
dark
web usage used on computers and phones
encountered during Nevada
HID
TA investigations
are
shown below.
7
Brow
sers
:
Virtual
Private
Networks
(VPN):
".
..
-\/
. ft
Tor
Red
Onion
Tor
Nord
Proton
VPN
Tunnel Bear
(U//FOUO)
Ph
otos
of
commonly used browsers.
Sou
r
ce:
Google i
ma
ges ac
cessed
Au
gu
st 2021.
(U//FOUO) Photos of commonly
us
ed
VPN
S.
Sour
ce:
Goog
le i
ma
g
es
ac
ce
sse
d
Augu
st
20
21.
E
xam
ple
s of Dark N
et
Ma
rket
Link
s:
ht
tp://yxuy5oa
u
7n
ug4
kpb
4
lcl
rqd
bi
x
p3
w
vc
4i uiad23ebyp2
q3
g7rtr
gq
.o
nion
ht
tp://3ezbpwjyz
r6uhv7gyaaokkwfw
4b
oqgrnugn2vf7n4yyo72nhbe
nv2
a .o
nion
http://333
f7
gpu
i
shj
x
imod
vyn
nois
xicgwaetzywgk
xo
xu
je
5p
h
3q
y
qju
i .onion
(U/
/FOUO
) Example photo
of
d
ar
k net m
arke
t lin
ks
.
Source:
D
ar
k Net
Liv
e website
accesse
d August 2021.
(U) Pretty G
ood
Pri
vacy
(PGP)
En
cry
ptio
n
0
Surfshor
k
Surf shark
(U//
F
OUO)
Pretty
Good
Privacy
(PGP)
is an encryption system used for both sending and
receiving encrypted emails and encrypting sensitive files.
PGP
encryption
is
requir
ed
on
most popul
ar
dark net markets such as
Whi
te House Market.
If
messages are not encry
pt
ed
using
PGP
encryption, dark net markets will not allow users to send and receive messages
or
purcha
se
illicit commodities. Examples of
PGP
encryption
are
shown below.
PGP
Encryption:
Kleop
at
ra
Proton Mail
(U
//F
OUO) Photos
of
commonly
use
d PGP encryption s
ys
tem
s.
So
ur
ce:
Google i
mages
accessed
August 2021.
Pl
ease
complete our survey by c
li
cking on the link b
elow
.
https://www.surveymonkey.com/r/2021 NVH I OT A-l nformation-lntelligence-Bu lletin-Survey
UNCLASSIFIEDllLAW ENFORCEMENT SENSITIVE
Fro
m:
UNCLASSIFIEDllLAW ENFORCEMENT SENSITIVE
--·--------
- -
·untitled · N
ote
pad
0 x
File
Ed
it
Fom131
View
Help
-----BEGIN
PGP
PUB
L
IC
KEY
BLOC
K
-----
mQINB
F / C
xbMB
EADNa
2cw+bcd
Z J 0Z6Q8 3
Rg91•4
s y6hi·J3 el•LH/Cn I
+DSOYXSdKU+
2e
d Se03KHd f1.ij 7Mko
3MR
f XpuAl
Pe4Z
J e
BnPOR
tYn
7
nq
u 5gVG6 j 51\•gMUPk hXySHiSO
rqNL7qD7PaIX4eihlWZB91pD9+rKRuARibwRE6q/Oz5739euenGyoPebrYU9Ej4Q
NZ
31
F
b3
bRXX2
rYc
Ke
j
LOC
m1
·1swuojt:6V0
zpX6dOGK
F rxC8XMy
L8f
pq
rq
Lgk i + s
vXE
Mo3Uu0G4lbhGAI2w/sxz+m2y/dv8603nLTcdif+lt:E26T2aycmEisBIBclt:t:quc7
nYq7a4i2dLH7nUJ/olVRlDSgngvxivwJV0hr0t6HbnN10UbgyR2UC4rzdeZOya2y
AbZ/UivNRky2btlusJJBhbGo3ZjiSGw06En4w5Fsj6MrQlurxzupqxoPB36cVhjl
XETknSYfULy47jTTmUXnyzUWZ9GAmhq3n02tIDiQHM0GHDM1XtqvBmhgXVQAvql4
e87GtGJKCq/b+Fl6wGRWbd9KS0rmPY6e7ACaZqg8A0KgfXEs0Ro/9rkAYzEBqd4Q
FSXjylxhASHx4hFh7tRt9lg6pzmtbtrjl0CYg7eqqlI4lt2jnJrZhbHPWcy01Yjs
COvlxnSkVtqVr3lcZ0DeTM/WGnPsHDQGzDHmixw4h8MdQF8caDVuqNQ00wARAQAB
tBNJ
bnN0YSA8a\~5 zdGFAal~SzdG
E
+iQJ
OBBMBCgA4F
i
EE
EZ
lUl
F g SBdmTjv
Lt.JKVC
5
q
1·1
ZwMnYFAl
I
CxbMCG\.i
MF
Cwk
I
81"MF
F
Qo
J CAs
FF
gIDAQACHgECF4AACgkQKVC
Sq1.iZ1.i
Mn
Za
SQ/+
L
YHE
Xtb0qp9R
5f9KAQa BphbF uUDShsOHd x
Zml
•R
BOwrh i j
bYF
qeMo0Nob
l·IU03
iMI SRSnc kVfYZ4
JYxe
i
FAXR
j
05My+b9S/
N 2q8xBMFf awk
KUbWq
IWZFAa
r4K
kblgYqaNqY6Z65H9h60oF
+T
wFk
ytudxHjcnEv+oiU5vpOQY53Z4e/zxyZvpltv+l
/XFEfE19d
lp
Kbcu
lz
j9PXqc0tMj
DjS7
MhbfumKv7Wye
FWObUv
4JPdGrTSvhPH17A
DLM
Ld
OnlZEu21Kw4JE/cuuYcJPmoG8r+l5KohyFURgf+eMSP/pg0lyZR2ckSDaIK
EaedLDKeUROnBtye8RV066Sc0
/xw
rlGaFuXiHqihgeix6ztlaNHBLiQiYT20Jlv8
+dC4bwIXUlvHcSxRYkh4YRwnDBZzQNiBwp3LF2cnLRpGm2JttYPTgoVxL42L8M7I
-----
ENO
PGP
PUBLIC
KEY
B!LOCK
-----
.__
·-~---
·
-
-
---
-
--·
·
------
·
·----·-----
-- -
-------
-
--
·----
(U//FOUO) Photo example
of
PG
P public key.
Source: Nevada HIDTA supported investigation August 2021
Sub;ect:
REPLY:
ORDER
J1
1
••E
> -Buyer;
••••
listing:
70209 7
grarn
s
Cocaine
- Uncut
Bri
ck
If you
(.;tmnut
decrwt
this
111e!>sCJge
tfll:l st]nder
used
obsolBte/incornpahble
PGP
soft-1
1.
9l<m.lA8W/A2£8UNQVAONOOXLS1·
36SbUflPwq£o+G81JFURxdiLR2uiqXWn4NeDJW
ch2LqNHyq7£5u4qPlHT1/3LncTW4c7hILH3iP~fk9CdxKJ3akThu9Jwnpb0waN7
13N5VT0tmff67mZ2b3c/HlHMHZOTvZhJp65eEK6xPzR7S8Es8xorBQlNQi/8EsGO
nVl<So3a/pfwAhbVuVFDK5PzFNCcsLuPElqZ/uxorucN1.MHqkZ£6kitthVDEQaKz
vqgs404L/4qETGXWOW3d7IhjtrlnibUObfqLgnZOAP6s/SMXxuuKyg12h+IQcX/d'
L
·--.-...-·
•™*'
......
www
....
...
,...
·-
(U//
L
ES)
Photo
of
encrypted message
on
White
Hou
se
Market.
Source: Nevada HIDTA supported investigation acces
sed
August 2021.
Please
comp
le
te
our survey by clicking
on
the
li
nk bel
ow.
https://www. su rveymonkey. com/r/2021 NVH I OT A-Information-Intelligence-Bulletin-Survey
UNCLASSIFIED!ILAW ENFORCEMENT SENSITIVE
UNCLA
SS
IFIEDllLAW ENFORCEMENT SENSITIVE
+
.~
. .
';.
: .
;,
' - , . , . . . - a
f!{e
Yi
tw
!triA
1
Utts
Joo
ls S•Hll\9S
V/
tf'Ciov.·
tje
lp
~
i:.li
~
Q.
l!!I 0
Sig
n/
Enctyp1.
.•
Decrypt/Verify.. Import ..
E>por.
•·
r
Looi,
up
on
Serv
er
... Certi
fates
Notepad
Smartcards
: Slgn I
En
crypt Notepad Decrypt I Venfy Notepad
'
No
t
epad
?.
R
eci
pients
ll;"f,"
t),I
t··~tl
>!,"'
l.-,t
..
l ,
\If"
ir
'
"Oll
A fl't.,.11
lh
l1
-11...-
t1Wt,11
,
lllll
°"'
•".-tf: 1
1
iI.-tfl
f
...,...,
•llr
r.,,
...
,
'i
l
~
,..,1
.hit
•t.• f
sn:,
..
I r
f}
I,
I l I
1 f
'"'"•
-
n1
"'kr :
t'
J:.
\0.:
.3
.f•
,.,
.1.
t
ul,
11
1 I
.,.it.
fi•
, 1 ' 1 r
1J
r :
ir.
1 1 ,1 1
11
,•
l
Ht•r
t1
h•.c
11P-ze.i.
Out'
tUr11trs
11.-.
_,U!'t
1)1·
e,•1
d.e
.• .
P."'r.·
ts
~~l
w
~
11111·~
.
S!
•C
111•
' t 1
tlJ
;
•n~
t"111
t'
•;-, 1 f
alfllt.
Pl
l"''
j,n
' t
mP~s-..
1
u
p1J
1
1
7
JJ'
1
::
t•
.{IJf"'
f1J
.a
t
'1.llJJ!
l
111•"
I•
1
ll~
l-"' Y..;aJ-... , ,-,t
t[1_
1
U!1•
l•
-lo!
II
\.\.
\,111H•\1
1 J
f•'"IJ
l
tC
••
_<..J
:!
l t.tl>.•
··~c
i-
1'
/l:!
, t
~1
t,d,
t
.111
n
'ft''
ha
·
.e-
..
111
1 t
111•
,,x
•,
--.r,-:.-
..
~1
··u1
11 t
1H1•
l 1
J11·•
1
t·1
,\!le"""
1 J
1:
Ji•,.::
! !'.'h1
rr
·i
r
1'J
til"l
1
~
r11u1
t•"
•""t
t •..,ri r
1,
1 '
t""1t.ll I i :
....
1.
S•
·
(11
ala'
..i.t•~u1
-i
·
tu•
rl<'r
re
..
(11
1
i.'e
'110 .. !
~
:ut,<:.t!y
f•h(
1~1r1
ur
l
ll"./
rt:t•
rl,•r
..
'with111
1 h u l
t.:-~.~·
.
r
..
110
t!
~
:ih.a!lz~
ir
a
l11nol
m.ar.i
e.r
wtll
r~zutr
11
""'":1n-tli'"'":
t.
T u
~
: r
--
t
••
r-
t
-
(U
//LE
S)
Ph
oto
of decrypt
ed
message on
Wh
ite Hou
se
M ar
ket
.
So
ur
ce: Nevada HIDTA sup
po
rt
ed
i
nv
es
ti
gation accessed A
ug
ust 202
1.
(U)
Conclusion
(U
//
FOUO
) In
2020
,
th
e N
ev
ada
HIDTA re
ported
an
increase
in
dark
web
related
dru
g
activity a nd
crypto
currenc
y
usage
and
assessed
with
high
confidence
that
th
e
use
of
the
dark
web
for
drug
trafficking a
nd
mo
n
ey
l
aunderi
ng
activities
will
continue.a
Wi
th
the
progression
and
advancement
of
tec
hnologies,
cou
pled
with
the
rise
of
cryptocu
r
rencies,
it
is
import
a
nt
for
all
law
enforcement
pe
rsonnel
to familia
rize
th
emselves
with
the
ever-
changing me
thodologie
s
that
criminals
ut
ilize to
particip
ate in illegal activities
such
as
dru
g
traffickin
g,
distribution
a
nd
money
laund
e
ring
on
the
dark
web.
(U)
Contact
(U/
/
FOUO)
This
bulletin
was
produced
by N
ev
ada
HIDTA.
For
more
inform
a
tion
about
this
bulletin
, pl
ea
se
email
,
or
direct
questions
to
NV-HIDTA@lv
mpd.com.
1
(U//
FOUO) Nevada
HIDTA
Supp
ort
ed
Initiati
ves; 2021; UNCL
/\
SSIFIE
D/
/
FOR
OFFICIAL
USE
ONLY.
2 (U
//
FO
UO) 2020 Nevada I IID'f'A
Threat
AssessmcnL; 2021; UNCLA
SS
l
l7
1E
D//FOR
OFFICIAL
USE
ONLY.
Pl
ease complete o
ur
survey by clicking on the link below.
https://www. su rveymonkey. com/r/2021 NVH IDT A
-I
nformation-1 ntel ligence-Bu lletin-Survey
UNCLASSIFIEDllLAW ENFORCEME
NT
SENSITIVE
UNCLASS/F/EDllLAW ENFORC
EMENT
SENSITIVE
3
(U)
The Crypto Merchant https://www.thecryptomerchant.com/blogs/resourccs/why-you-need-a-hardware-
wallet-1; "Why
You
Need a Hardware Wallet";
01
July
2019;
UNCLASSIFIED.
1
(U)
The Crypto Merchant https://www.thecryptomerchant.com/blogs/resources/hardware-wallet-recovery-seeds-
explained; "Hardware Wallet Recovery Seeds Explained"; accessed on 12 August 2021;
UNCLASSIFIED.
5
(U)
Coin
Telegraph
https://cointe
legraph.com/ncws/ovcrview-of-software-wallcts-thc-casy-way-
to
-store-crypto;
"Overview of Software Wallets, the Easy Way to Store Crypto"; 29 March 2020;
UNCLASSIFIED.
6
(U//FOUO) Nevada
HIDTA
Supported Initiatives; 2021;
UNCLASSIFIED//FOR
OFFICIAL
USE
ONLY.
7
(U//FOUO) Nevada
HI
OTA
Supported Initiatives; 2021;
UNCLASSIFIED//FOR
OFFICIAL
USE
ONLY.
8
U//FOUO) 2020 Nevada
~IIDTA
Threat Assessment; 2021;
UNCLASS
IFIED
//FOR
OFFICIAL
USE
ONLY.
Please
complete
our
survey
by
clicking
on
the
link
below
.
https:
//www
su rveymonkey. com/r/2021 NVHI OT
A-1
nformation-Intelligence-Bulletin-Survey
UNCLASSIF/EDllLAW ENFORCEMENT SENSITIVE