If you haven’t received your verification email, please Contact Us
Download subpoena templates for major crypto providers like Binance, Coinbase, Kraken, Gemini, plus Bitcoin ATMs and more. Each template is structured for quick completion and submission through your prosecutor’s office.
Subpoenas are the legal backbone for obtaining cryptocurrency records from exchanges. Yet without standardized formats, investigators often spend hours recreating provider-specific formats, risking delays or rejections from providers.
Our crypto subpoena templates eliminate that barrier by giving law enforcement pre-built, exchange-specific structures that align with provider requirements while ensuring compliance.
Access is limited to verified law enforcement personnel only.
Choose the subpoena template that corresponds to the cryptocurrency exchange relevant to your investigation.
Enter case-specific details and submit through your prosecuting attorney's office. Templates are structured to reduce rejections and delays.
Designed for investigations involving accounts, wallet transfers, and KYC data.
Covers transaction history, wallet addresses, and user identity verification.
Structured for U.S. law enforcement requests with case details and transaction scope.
Compliant with state and federal standards for exchange records.
Includes Bitcoin ATM subpoena templates, Athena, and other cryptocurrency service providers.
Continuously expanding to cover new and international crypto platforms, enabling investigators to obtain compliant records from evolving service providers.
Secure and preserve relevant crypto account and transaction data before it’s altered or deleted.
Request the removal of unauthorized or non-compliant crypto-related websites from hosting platforms.
Network participation requires verified law enforcement status or regulated financial institution classification. Credentialing processes validate organizational authority prior to intelligence access authorization.
Tiered access controls govern intelligence distribution according to participant category and operational necessity. Sensitive investigative indicators remain restricted to appropriately credentialed entities.
Delivers automated alerts when investigations overlap on the same on‑chain entities, while keeping all investigative files, tactics, and operations fully siloed from other participants.
Network participation requires verified law enforcement status or regulated financial institution classification. Credentialing processes validate organizational authority prior to intelligence access authorization.
Tiered access controls govern intelligence distribution according to participant category and operational necessity. Sensitive investigative indicators remain restricted to appropriately credentialed entities.
Delivers automated alerts when investigations overlap on the same on‑chain entities, while keeping all investigative files, tactics, and operations fully siloed from other participants.
Streamline your crypto investigations with ready-to-use templates