B.A.T.S. TRAINING CENTER

Block Audit Tracing Standard - Complete Documentation & Training Materials

🎯 The Key Benefit of B.A.T.S.

Standardized Documentation = Reproducible Results

Any investigator following the B.A.T.S. methodology will arrive at the same conclusions, creating legally defensible evidence that withstands scrutiny and enables successful asset forfeiture.

πŸ“‘ Table of Contents

πŸ“– Overview - What is B.A.T.S.?

The Block Audit Tracing Standard (B.A.T.S.) is a revolutionary framework for cryptocurrency investigation that transforms blockchain analysis from an art into a science. It provides the mathematical certainty required for successful asset forfeiture cases.

Core Principles

Mathematical Precision

Every satoshi, wei, or cent is accounted for with mathematical validation at each step.

Standardized Process

Consistent methodology ensures any investigator reaches the same conclusions.

Legal Compliance

Meets stringent court requirements for criminal asset forfeiture proceedings.

Scope Control

Prevents investigation creep by maintaining focus on traced funds only.

Remember: B.A.T.S. ensures that two different investigators analyzing the same case will reach identical conclusions, providing the reproducibility that courts demand.

πŸ“Š BATS Investigation Graph Structure

The power of B.A.T.S. lies in its mathematical graph structure that creates an unbreakable chain of evidence. This visual representation shows how investigations maintain the golden thread from victims to terminal wallets.

Interactive Visualization Coming Soon

We are developing an interactive flow diagram that will demonstrate the BATS principles in action. This visualization will show how funds flow from victims through various wallet types while maintaining the mathematical integrity of the investigation.

Why This Structure Works

  • Directed Acyclic Graph (DAG): Funds flow in one direction, preventing circular logic
  • Node Classification: Wallet colors indicate function, not ownership
  • Edge Labels: V-T-H notation on every connection
  • Mathematical Constraints: Sum of inputs = Sum of outputs at each level

Key Graph Properties

  • Completeness: Every dollar from victims reaches a terminal node
  • Traceability: Path from any node back to specific victim(s)
  • Convergence Detection: YELLOW nodes show criminal consolidation
  • Terminal Identification: PURPLE/BLUE nodes indicate investigation endpoints

The Power of Graph-Based Investigation

By treating cryptocurrency flows as a mathematical graph, B.A.T.S. transforms subjective blockchain analysis into objective, court-ready evidence. The graph structure ensures that every investigative decision is documented, every fund movement is tracked, and the complete flow from victim to criminal is mathematically proven.

πŸ”¬ The B.A.T.S. Methodology

Step 1: Establish Root Total

Document all victim losses to create your mathematical baseline. This becomes your Adjusted Root Total (ART) after any justified write-offs.

Example: Victim 1 lost $10,000 + Victim 2 lost $5,000 = $15,000 Root Total

Step 2: Apply V-T-H Notation

Assign unique identifiers to every transaction maintaining clear lineage from victims.

V1-T1 β†’ V1-T1-H1 β†’ V1-T1-H2 β†’ Terminal Wallet

Step 3: Classify Wallets by Color

Assign permanent colors based on wallet function, not ownership assumptions.

Step 4: Validate at Each Hop

Ensure all thread totals at each hop level sum to your ART. This mathematical validation proves completeness.

Critical: If totals don't match, you've missed transactions!

Step 5: Document Terminal Points

Identify where funds reach exchanges (PURPLE) or cold storage (BLUE) for legal process or monitoring.

The Four Levels of B.A.T.S.

Level Purpose Key Activities Typical Duration
B.A.T.S. 1 - Discovery Quick case assessment & lead generation Identify victims, assess scope, determine viability Hours
B.A.T.S. 2 - Intelligence Criminal network mapping Create RED wallet index, identify criminal infrastructure Days
B.A.T.S. 3 - Case Prep Court-ready evidence with V-T notation Build prosecution case, legal process preparation Weeks
B.A.T.S. 4 - Asset Forfeiture Mathematical precision with V-T-H notation Support seizure/forfeiture with hop counting Weeks to months

🏷️ Understanding V-T-H Notation

The Formula: V[#]-T[#]-H[#]

  • V = Victim number (V1, V2, V3...)
  • T = Transaction number (T1, T2, T3...)
  • H = Hop count from victim (H1, H2, H3...)

Practical Examples

Notation Meaning Context
V1-T1 First victim's first transaction At the RED (victim-facing) wallet
V1-T1-H1 One hop away from victim First movement after RED wallet
V2-T3-H5 Second victim's third transaction, five hops away Deep in the money trail
V1,2,3-T1-H3 Convergence of multiple victims Funds have combined
Why This Matters: V-T-H notation creates an unambiguous audit trail that clearly documents every decision in your investigation, allowing reviewers to understand your methodology and reasoning.
Note on Investigation Levels: B.A.T.S. Level 3 uses V-T notation (without hop counting), while Level 4 introduces full V-T-H notation with hop counting for asset forfeiture precision.

🎨 Wallet Color Classification System

B.A.T.S. uses a standardized color system to classify wallets based on their function in the money trail:

πŸ”΄ RED Wallets

Definition: Victim-facing wallets

Rule: The first wallet to receive stolen funds where criminal acts are initiated

Significance: Starting point for all hop counting

Example: Scammer's receiving address, phishing wallet, hack destination

🌸 PINK Wallets

Definition: Dividend and deception operations

Rule: Where fake returns are sent to victims in investment scams

Significance: Provides undeniable proof of criminal intent and implicates all BLACK wallets between PINK and RED as part of the criminal network

Example: Ponzi scheme dividend payments, fake profit distributions

🟑 YELLOW Wallets

Definition: Hub wallets where multiple victim traces converge

Rule: Where multiple trace paths arrive and subsequently move out together

Significance: Proves common criminal control and links separate criminal operations

Example: Criminal consolidation wallet, money laundering hub

🟠 ORANGE Wallets

Definition: Bitcoin change addresses

Rule: Change outputs from Bitcoin transactions using UTXO model

Significance: Essential for UTXO tracing and maintaining accurate fund tracking

Example: Bitcoin transaction change returning to sender

🟀 BROWN Wallets

Definition: Asset conversion services

Rule: Wallets facilitating currency or asset swaps

Significance: Marks transition points between different cryptocurrencies

Example: DEX router addresses, swap service wallets, instant exchangers

⚫ BLACK Wallets

Definition: Default intermediary with no direct victim exposure

Rule: Default classification for all intermediary wallets not fitting other categories

Significance: Standard pass-through addresses in the laundering chain

Example: Mixer output addresses, tumbler wallets, layering addresses

πŸ”΅ BLUE Wallets

Definition: Cold storage wallets

Rule: Long-term holding addresses with minimal transaction activity

Significance: Indicates criminal savings or reserve funds

Example: Hardware wallet addresses, paper wallets, dormant addresses

🟣 PURPLE Wallets

Definition: Exchange deposit addresses

Rule: Known VASP/exchange wallets where on-chain trail terminates

Significance: Requires legal process to continue tracing

Example: Binance deposit, Coinbase wallet, Kraken address

βšͺ GRAY Wallets

Definition: Obfuscated or diluted funds

Rule: Wallets where tracing becomes impractical or impossible

Significance: Often results in write-offs due to privacy enhancement

Example: Mixer deposits, privacy coin conversions, coinjoin participants

🟒 GREEN Wallets

Definition: Victim-owned recovery addresses

Rule: Legitimate addresses controlled by victims for fund recovery

Significance: Marks successful recovery or restitution

Example: Victim's personal wallet receiving recovered funds

Important Rule: Wallet colors can progress UP the criminal hierarchy but never down. A BLACK wallet may reveal itself as YELLOW (hub) or PINK (deception), but once classified at a higher level of criminal involvement, it cannot revert to a lower classification.

Criminal Hierarchy (lowest to highest):
  1. GREEN (victim-owned) - Legitimate
  2. GRAY (obfuscated) - Write-off
  3. BLACK (default intermediary) - Standard laundering
  4. ORANGE/BROWN (technical functions) - Specialized use
  5. BLUE (cold storage) - Criminal savings
  6. YELLOW (hub) - Criminal consolidation
  7. PINK (deception) - Active victim targeting
  8. PURPLE (exchange) - Terminal point
  9. RED (victim-facing) - Highest criminal exposure
Note: All wallet classification changes must be authorized and documented with clear justification.

🧡 The Golden Thread Principle

Definition

The unbroken connection between a victim's original funds and any assets ultimately seized by law enforcement. This principle is essential for proving in court that specific seized cryptocurrency originated from criminal activity.

The PIFO Method (Proceeds In First Out)

The principle that when traced funds enter a wallet, the very next outbound transaction contains those funds, applied chronologically. Important: PIFO is fundamentally different from FIFO (First In First Out) inventory accounting - the practice of following 'dirty' funds does not reset upon each subsequent deposit to the wallet. PIFO is grounded in its own specific case law, not inventory accounting methods.

Example:
Wallet has 5 BTC existing balance
Victim sends 2 BTC (our traced funds)
Next transaction out is 3 BTC
β†’ We trace 2 BTC of that 3 BTC transaction

Maintaining the Thread

βœ… DO

  • Follow funds chronologically
  • Document every hop
  • Validate amounts at each level
  • Apply PIFO consistently (or document LIBR choice for asset preservation)
  • Document judgment calls clearly

❌ DON'T

  • Skip transactions
  • Make assumptions
  • Follow funds out of order
  • Exceed your root total

⚠️ Breaking the Thread

The golden thread breaks if you cannot mathematically prove the connection. Common breaks: mixers, privacy coins, or poor documentation. Document these as write-offs.

βš–οΈ Professional Judgment in B.A.T.S.

While B.A.T.S. provides a standardized framework, cryptocurrency investigations often require professional judgment based on training and experience. The framework ensures these decisions are well-documented and defensible.

Areas Requiring Judgment Calls

Transaction Attribution

PIFO vs. LIBR: While PIFO is the default method, investigators may choose LIBR (Lowest Intermediate Balance Rule) when seeking to arrest the flow of assets and maintain them in as few wallets as possible, as close to the RED wallet as possible.

Key: Document why you chose your method and maintain consistency throughout the investigation.

Convergence Handling

When multiple traces converge, determining exact proportions may require judgment.

Key: Show your mathematical reasoning.

Write-off Decisions

Determining when to abandon a trace path requires balancing resources vs. recovery potential.

Key: Justify with clear thresholds.

Wallet Classification

Edge cases may require judgment in color assignment based on wallet behavior.

Key: Document observed patterns.

Documentation Best Practices

  • State your methodological choices upfront
  • Document reasoning for each judgment call
  • Reference training and experience when applicable
  • Maintain consistency within your investigation
  • Be prepared to defend your decisions in court

Important Understanding

Two trained B.A.T.S. investigators may reach different conclusions on complex cases. This is acceptable and expected. What matters is that each investigator can clearly articulate their decision-making process and demonstrate the mathematical certainty of their traced paths.

⚑ Quick Start Guide

Starting Your First Investigation

Step 1: Setup (5 minutes)

  • Open the B.A.T.S. Tool
  • Enter case details (Case ID, Investigator, Type)
  • Write a brief synopsis
  • Click "Complete Setup & Continue"

Step 2: Document Victims (10 minutes per victim)

  • Click "Add Victim"
  • Paste transaction hash
  • Click "Lookup" to auto-fill details
  • Verify receiving wallet (RED wallet)
  • Add any notes

Step 3: Confirm Root Total (2 minutes)

  • Click "Generate Root Total"
  • Review the breakdown
  • Confirm to establish baseline
  • This becomes your Adjusted Root Total (ART)

Step 4: Begin Tracing (Time varies)

  • Start with Hop 1 from each RED wallet
  • Follow the PIFO rule
  • Document each transaction
  • Assign wallet colors

Step 5: Validate Progress (Continuous)

  • Check hop totals = ART
  • If not matching, find missing transactions
  • Tool validates automatically
  • Save work frequently

Common Scenarios

Scenario 1: Simple Theft

Victim β†’ RED wallet β†’ BLACK wallet β†’ PURPLE exchange
V1-T1 β†’ V1-T1-H1 β†’ V1-T1-H2

Scenario 2: Multiple Victims Converge

V1-T1 β†’ RED1 β†’ BLACK1 β†˜
                                YELLOW (hub) β†’ PURPLE exchange
V2-T1 β†’ RED2 β†’ BLACK2 β†—

Scenario 3: Funds Split

                  β†— BLACK2 ($3,000) β†’ More hops
V1-T1 β†’ RED β†’ BLACK1
($10,000)          β†˜ BLACK3 ($7,000) β†’ More hops

πŸ”¬ Advanced Concepts

Alternative Attribution Methods

LIBR (Lowest Intermediate Balance Rule)

Traditional asset tracing principle that tracks the lowest balance point in an account to determine maximum traceable amounts. Has the effect of holding traceable assets to fewer hops, keeping them closer to the RED wallet.

When to use: When the investigator seeks to arrest the flow of assets for stablecoin burn and reissue, or when they may obtain private keys or wallet access through suspect cooperation or compelled assistance.

Warning: Requires extensive documentation and manual balance analysis.

Sequential Hop Rule

When multiple trace paths converge at the same wallet and move out together, apply the highest hop count among all converging paths, plus one for the outbound transaction.

Example: If V1-T1-H3 and V2-T1-H5 converge at a YELLOW wallet, the output is at H6 (highest input + 1).

Dirty Wallet Principle

Applied only at terminal points (PURPLE exchanges) to identify additional victims. Never apply during active tracing to prevent scope creep.

Purpose: Victim discovery at investigation endpoints.

Caution: Improper application can exponentially expand investigation scope.

Special Considerations

UTXO Tracing for Bitcoin

Bitcoin's Unspent Transaction Output (UTXO) model requires special attention:

  • Track specific outputs, not just addresses
  • Identify and classify ORANGE change addresses
  • Consider coin selection algorithms
  • Document UTXO splits and consolidations

πŸ“– B.A.T.S. Glossary of Terms

Essential terminology for B.A.T.S. practitioners, organized alphabetically:

Term Definition
Adjusted Root Total (ART) The root minus any documented write-offs. This becomes the accounting baseline that all threads must sum to at each hop level for mathematical validation.
Back Tracing The investigative technique of working backward from known criminal infrastructure or terminal wallets to identify additional victims or funding sources. When performed during Level 3 or 4 investigations, back tracing functions as Level 1 discovery.
B.A.T.S. Block Audit Tracing Standard - A standardized framework for cryptocurrency investigation that maintains the golden thread of traceability required for successful asset forfeiture cases through systematic color classification, hierarchical notation, and accounting validation.
Cluster Analysis Examines relationships and patterns across multiple addresses without focusing on specific transaction flows, identifying relationships through behavioral patterns revealing common ownership.
Commingling When traced criminal proceeds mix with existing wallet balances or other fund sources, requiring careful application of PIFO principles to maintain the golden thread. Courts have established that commingling does not cleanse tainted funds.
Convergence When multiple trace paths arrive at the same wallet and subsequently move out together as a single transaction. Requires application of the Sequential Hop Rule.
Exchange Deposit Addresses Wallets where the on-chain trail terminates and legal process becomes necessary to continue tracing. Classified as PURPLE wallets in B.A.T.S.
Golden Thread The unbroken connection between a victim's original funds and any assets ultimately seized by law enforcement, essential for proving direct traceability in asset forfeiture cases. This principle aligns with judicial standards that examine direct connections between assets and criminal activity.
High-Risk Customer A customer or wallet identified through risk assessment procedures as presenting elevated money laundering or terrorist financing risk based on factors such as transaction patterns, geographic exposure, or business type.
Hop Count The measurement of distance from the victim-facing wallet rather than chronological discovery order. Each blockchain transaction increments the hop count by one.
Hub Wallets Wallets where multiple victim traces converge, proving common criminal control. Classified as YELLOW wallets and crucial for linking separate criminal operations.
LIBR Method Lowest Intermediate Balance Rule - Traditional asset tracing principle applicable to cryptocurrency investigations that tracks the lowest balance point in an account to determine maximum traceable amounts. Has the effect of holding traceable assets to fewer hops. Used when investigators seek to arrest the flow of assets and maintain them in as few wallets as possible, as close to the RED wallet as possible, which may be useful if stablecoin burn and reissue is the goal or if they are able through their investigation to obtain private keys or access to private wallets through suspect cooperation or compelled assistance.
Matching Transactions Principle (MTP) An exception to strict PIFO methodology when outgoing transactions precisely match incoming thread totals in amount and occur in close temporal proximity.
Off-Ramping The process by which criminals convert cryptocurrency to fiat currency or other assets, typically through exchanges.
On-Ramping The process by which stolen funds initially enter the criminal cryptocurrency infrastructure.
PIFO Method Proceeds In First Out - The principle that when traced funds enter a wallet, the very next outbound transaction contains those funds, applied chronologically. This method is often mischaracterized as first-in-first-out, but PIFO works fundamentally different as the practice of following "dirty" funds does not reset upon each subsequent deposit to the wallet, and PIFO is grounded in its own specific case law; not inventory accounting methods.
Red Wallet Index The formal inventory of all victim-facing wallets (RED wallets) identified in an investigation, with each assigned a permanent identifier (R1, R2, R3, etc.).
Root The original amount of a victim's transaction that forms the baseline for all subsequent tracing.
Root Validation The mathematical verification process ensuring that all thread totals at any given hop level sum to the adjusted root total, providing proof of investigation completeness and preventing scope creep.
Sequential Hop Rule The rule for handling convergence by applying the highest hop count among all converging paths, plus one for the outbound transaction.
Thread The specific amount being traced through a particular transaction path at any given hop level.
Thread Exposure The percentage of a wallet's total balance comprised of traced criminal proceeds.
Travel Rule Regulatory requirement mandating that VASPs collect and transmit specific originator and beneficiary information for cryptocurrency transfers exceeding designated thresholds.
Universal Wallet Index (UWI) A comprehensive index of all wallets involved in the money laundering process.
V-T Notation The standardized identification system used in B.A.T.S. Level 3 where V represents victim number, T represents transaction number.
V-T-H Notation The standardized identification system where V represents victim number, T represents transaction number, and H represents hop count from the victim-facing wallet.
Victim Facing Wallets The first wallets to receive stolen funds where criminal acts are initiated. Classified as RED wallets and serving as the starting point for all hop counting.
Write-off Documented abandonment of trace paths for practical reasons including dust amounts, dilution, obfuscation, or operational constraints.
Note: This glossary contains the essential terms for B.A.T.S. practitioners. For complete definitions and legal context, refer to the official B.A.T.S. Desk Reference.

❓ Frequently Asked Questions

General Questions

What is B.A.T.S.?

B.A.T.S. (Block Audit Tracing Standard) is a revolutionary framework for cryptocurrency investigation that maintains the "golden thread" of traceability required for successful asset forfeiture cases. It provides a standardized methodology for documenting investigative decisions with clarity and mathematical precision.

Why is B.A.T.S. necessary?

Traditional blockchain analysis tools often fail to maintain the mathematical precision required for asset forfeiture. B.A.T.S. addresses this gap by:

Technical Questions

What is Root Validation?

Root Validation is the mathematical verification process ensuring that all thread totals at any given hop level sum to the adjusted root total. This provides proof of investigation completeness and prevents scope creep.

How are write-offs handled?

B.A.T.S. recognizes practical investigation limitations through systematic write-offs:

What is the Sequential Hop Rule?

When multiple trace paths converge at the same wallet and move out together, apply the highest hop count among all converging paths, plus one for the outbound transaction.

Will different investigators reach the same conclusions?

Not necessarily. B.A.T.S. provides a standardized framework, but complex investigations often require judgment calls based on training and experience. Different investigators may make different decisions regarding transaction attribution (PIFO vs. LIBR), convergence handling, or write-off thresholds. What's crucial is that B.A.T.S. ensures every investigator can clearly document and defend their decision-making process with mathematical certainty.

Legal Questions

How does B.A.T.S. support asset forfeiture cases?

B.A.T.S. provides:

What about privacy considerations?

B.A.T.S. emphasizes proportionality to suspected criminal activity, scope discipline to avoid unnecessary exposure, and professional standards equivalent to traditional financial investigations.

Troubleshooting

"My totals don't match!"

  1. Check for missed transactions
  2. Verify your math
  3. Look for convergences
  4. Review write-offs

"Too many transactions to follow"

  1. Use justified write-offs for dust
  2. Focus on significant amounts
  3. Document abandonment reasons
  4. Maintain ART accuracy

🎯 Benefits Overview

The Block Audit Tracing Standard (B.A.T.S.) transforms cryptocurrency investigation from an art into a science, providing mathematical certainty where previously only probability existed.

Legal Benefits

Court-Ready Documentation

  • Mathematical certainty for exact dollar amounts
  • Unbreakable chain of evidence
  • Standardized reporting formats
  • Defense-proof methodology

Asset Forfeiture Success

  • Direct traceability to criminal proceeds
  • Overcome commingling challenges
  • Meet statutory requirements
  • Enable victim restitution

Operational Benefits

Investigation Efficiency

  • Prevent scope creep
  • Completeness verification
  • Resource optimization
  • Systematic approach

Multi-Victim Management

  • Individual victim tracking
  • Convergence identification
  • Consolidated reporting
  • Scalable methodology

Strategic Benefits

Criminal Network Mapping

  • Hub identification via YELLOW wallets
  • Infrastructure analysis
  • Behavioral intelligence
  • Predictive value

Inter-Agency Collaboration

  • Standardized language
  • Shareable intelligence
  • Training efficiency
  • International compatibility

Bottom Line

B.A.T.S. represents more than a methodologyβ€”it's a transformation in how cryptocurrency investigations deliver value. By providing mathematical certainty, operational efficiency, and legal reliability, B.A.T.S. enables investigators to achieve outcomes previously thought impossible in the complex world of blockchain forensics.

B.A.T.S. Framework Training Materials

Return to B.A.T.S. Tool