Cryptocurrency Crime Analyst (CCA)

The demand for Crypto Investigation & Blockchain Forensics professionals is MASSIVE. The supply is almost ZERO. The CCA certification changes that — starting with you.

Real Investigations

Meet your Teacher

Rohas Nagpal is an author, lawyer, and investigator with over 25 years of experience. He has worked across 18 countries on complex cases involving digital forensics, cyber terrorism, financial crime, and corporate liability.

He co-founded Asian School of Cyber Laws in 1999 and has assisted the Government of India in drafting rules under the Information Technology Act.

He authored the Cryptocurrency Investigation & Forensics Manual and the Cyber Crime Investigation Manual, described by The Times of India as the "Bible for cybercrime investigators", and wrote India's first legal commentary on the Information Technology Act.

Rohas first encountered Bitcoin in 2011 during a narcotics investigation, an experience that led to a long-term focus on blockchain, cryptocurrency crime, and financial infrastructure.

He later co-founded BankChain, a blockchain consortium of 37 banks, designed a Layer-1 protocol for regulated finance, and served as a consultant to the Reserve Bank Innovation Hub on NFTs & CBDCs.

c4 Lab

The Tools You Will Master

Unlike generic blockchain analytics platforms, every tool in c4 Lab is designed around real investigative tasks.

4 tools
c4 Checklists
Investigation playbooks for ransomware, money laundering, scams, and darknet workflows.
3 tools
c4 Seed
Seed phrase creation, recovery, and investigation across multiple derivation paths.
6 tools
c4 Blockchain
On-chain transaction and address analysis — trace funds, identify clusters, build intelligence.
1 Tool
c4 BAD
Lookup and flag risky or known blockchain addresses — exchanges, mixers, darknet markets, ransomware operators.
5 tools
c4 Wallet
Wallet artifact analysis, ownership profiling, and transaction operations.
9 tools
c4 DeFi
DeFi protocol, stablecoin, and chain-level investigation data — exploits, liquidity, and yield monitoring.
2 tools
c4 Tokens
Token symbol and contract intelligence — identify fraudulent launches, pump-and-dump schemes, and wash trading.
1 tool
TXG
Transaction graph visualization and flow tracing — map fund movements across wallets and chains.
3 tools
c4 Contract
Smart contract inspection and risk analysis — identify backdoors, hidden mints, and malicious upgrade mechanisms.
30 tools
c4 Utilities
General-purpose forensic helpers — encoding, time conversion, math, file, and text utilities.
23 tools
c4 Cyber
Suite of tools for Web Intelligence, Image Forensics, and File Forensics.
16 tools
c4 Cryptanalysis
Crypto and password analysis — hashing, cipher utilities, and cracking helpers for forensic investigations.

Recover and investigate wallets from seed phrases. Derive addresses across multiple derivation paths and analyze associated transaction history.

Deep forensic analysis of cryptocurrency wallets. Identify ownership patterns, transaction clusters, and links to known entities.

End-to-end blockchain transaction tracing. Follow the money across chains, identify obfuscation techniques, and build an evidence trail.

A searchable intelligence database of tagged blockchain addresses — exchanges, mixers, darknet markets, ransomware operators, sanctioned entities, and more.

Investigate specific cryptocurrencies: tokenomics, supply mechanics, known exploits, and on-chain behavior patterns relevant to investigations.

Monitor and investigate decentralized finance protocols. Detect exploits, rug pulls, flash loan attacks, and suspicious liquidity movements in real time.

Analyze token contracts, holder distributions, and transfer patterns. Identify pump-and-dump schemes, wash trading, and fraudulent token launches.

Forensic analysis of smart contracts. Identify malicious code, backdoors, hidden mint functions, and upgrade mechanisms used in crypto fraud.

Link on-chain activity to off-chain digital infrastructure: domains, IP addresses, email accounts, social profiles, and covert communications.

Analyze encrypted data, obfuscated communications, and hidden wallet artifacts found during digital forensic investigations.

The Manual

The Investigative Framework on Which CCA Is Built

6 volumes covering Wallet Forensics, Technical Foundations, Blockchain & Crypto Investigation, Covert Digital Infrastructure Investigation, Crime Scene First Response, and Global Enforcement. Written for practitioners. Designed to hold up in court.

CCA Application Form