www.secretservice.gov
Open in
urlscan Pro
2a02:26f0:ef:288::1955
Public Scan
Submitted URL: http://www.secretservice.gov/investigation/
Effective URL: https://www.secretservice.gov/investigation
Submission: On July 02 via api from IN — Scanned from DE
Effective URL: https://www.secretservice.gov/investigation
Submission: On July 02 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOM<form class="gsc-search-box gsc-search-box-tools survey-processed" accept-charset="utf-8">
<table cellspacing="0" cellpadding="0" class="gsc-search-box">
<tbody>
<tr>
<td class="gsc-input">
<div class="gsc-input-box" id="gsc-iw-id1">
<table cellspacing="0" cellpadding="0" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
<tbody>
<tr class="odd">
<td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
<td class="gsib_b">
<div class="gsst_b" id="gs_st50" dir="ltr">
<a class="gsst_a survey-processed" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
</td>
</tr>
</tbody>
</table>
</div>
</td>
<td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
<title>search</title>
<path
d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
</path>
</svg></button></td>
<td class="gsc-clear-button">
<div class="gsc-clear-button" title="clear results"> </div>
</td>
</tr>
</tbody>
</table>
</form>
Text Content
Menu * About Us Open submenu * Protection Open submenu * Investigations Open submenu * Mission Support * Newsroom Open submenu * Careers Open submenu * Contact Open submenu Close submenuAbout Us * History Open submenu * Leadership * Diversity * Annual Reports Close submenuHistory * 150+ Years of History * The Evolution of Our Badges * Wall of Honor Close submenuProtection * Protecting Leaders * Safeguarding Places * Securing Events * Threat Assessment Close submenuInvestigations * Cyber Investigations * Counterfeit Investigations * Forensic Expertise * Most Wanted Fugitives Close submenuNewsroom * Press Releases * Speeches and Testimony Close submenuCareers * Special Agent * Uniformed Division Officer * Technical Law Enforcement * Administrative, Professional and Technical * Student Employment * Veterans Close submenuContact * Field Offices Skip to main content An official website of the United States government Here’s how you know Here’s how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Menu United States Secret Service × search * About Us * About Us * History * Leadership * Diversity * Annual Reports * Protection * Protection * Protecting Leaders * Safeguarding Places * Securing Events * Threat Assessment * Investigations * Investigations * Cyber Investigations * Counterfeit Investigations * Forensic Expertise * Most Wanted Fugitives * Mission Support * Newsroom * Newsroom * Press Releases * Speeches and Testimony * Careers * Careers * Special Agent * Uniformed Division Officer * Technical Law Enforcement * Administrative, Professional and Technical * Student Employment * Veterans * Contact * Contact * Field Offices Image DIGITAL ASSETS U.S. Secret Service Launches Cryptocurrency Awareness Hub The new website will feature the latest in the agency’s work combating illicit use of digital assets as well as provide public awareness information on digital asset security and how to ensure it remains secure Read more Image INVESTIGATIONS Combating the illicit use of digital assets The U.S. Secret Service is committed to doing its part to safeguard the nation from illicit activity involving digital assets. Learn more Previous Pause Next BREADCRUMB 1. Home $3.8 BILLION Did you know? We prevented the U.S. dollar equivalent of $3.8 billion in currency from reaching domestic and transnational criminals in 2019. OUR INVESTIGATIVE MISSION The U.S. Secret Service has a long and storied history of safeguarding America’s financial and payment systems from criminal exploitation. The agency was created in 1865 to combat the rise of counterfeit currency following the Civil War. As the U.S. financial system has evolved - from paper currency to plastic credit cards to, now, digital information - so too have our investigative responsibilities. Today, Secret Service agents, professionals, and specialists work in field offices around the world to fight the 21st century’s financial crimes, which are increasingly conducted through cyberspace. These investigations continue to address counterfeit, which still undermines confidence in the U.S. dollar, but it is credit card fraud, wire and bank fraud, computer network breaches, ransomware, and other cyber-enabled financial crimes, that have become the focus of much of the Secret Service investigative work. * OFFICE OF INVESTIGATIONS STRATEGY FY 2021–2027 The Office of Investigations operates as a global network of multi-functional teams, conducting high-impact criminal investigations that safeguard the integrity of financial and payment systems, while fully supporting all protective requirements. Download OUR INVESTIGATIVE MISSION FOCUS -------------------------------------------------------------------------------- Counter critical criminal threats to U.S. financial systems through criminal investigations and network intrusion responses. Support our protective mission through investigation of threats, and safeguarding leaders, locations, and national special security events. Strengthen and grow our workforce through identifying, developing, and equipping the best personnel. FINANCIAL AND CYBER CRIME INVESTIGATIONS Our primary investigative mission is to protect the financial infrastructure of the United States by investigating complex, often cyber-enabled financial crimes. Learn More COUNTERFEIT INVESTIGATIONS The threat of counterfeit U.S. currency to the financial system of the United States continues to evolve. Learn More Report Counterfeit Notes FORENSIC EXPERTISE We are home to expert forensic analysts who employ advanced investigative and technological capabilities in support of the Secret Service integrated mission and law enforcement partners. Learn More PROTECTIVE THREAT INVESTIGATIONS The digital expertise we gain from our investigative mission plays an increasingly important role within our protective mission, ensuring that leaders, facilities, and events are secure from cybersecurity and other threats. SUPPORT FOR NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN We are a key supporter of NCMEC, employing the range of our investigative expertise to assist in protecting children by Congressional mandate since 1994. NCMEC Support IMPACT OF OUR CRIMINAL INVESTIGATIONS -------------------------------------------------------------------------------- For Fiscal Year 2021 2.3B Loss prevented by cyber financial crime investigations 937 Number of cyber financial crime arrests 51.4M Counterfeit currency seized RESOURCES PREPARE FOR A CYBER INCIDENT -------------------------------------------------------------------------------- A Secret Service introductory guide for cyber incident response planning. View VERIZON DATA BREACH INVESTIGATIONS REPORT -------------------------------------------------------------------------------- Our experts contributed to this report, which provides actionable insight into how data breaches occur. View NATIONAL COMPUTER FORENSICS INSTITUTE -------------------------------------------------------------------------------- Register for cyber incident response, investigation, and forensic examination training. View Return to top of page SIGN-UP FOR SECRET SERVICE NEWS STRAIGHT TO YOUR MAILBOX. Subscribe United States Secret Service OFFICE OF COMMUNICATION AND MEDIA RELATIONS * Home * Site Policies * Privacy Policy * OIG * The White House * Accessibility * No FEAR Act * DHS.gov * DHS Budget * USA.gov * FOIA Close menu Would you like to take a brief survey regarding the website?