Kodex’s cover photo
Kodex

Kodex

Technology, Information and Internet

Boston, MA - Massachusetts 5,284 followers

Kodex helps companies manage their obligations to law enforcement to prevent real world harm

About us

Companies use the Kodex portal to manage workflows, communication, and secure file transfers with law enforcement and government agencies seeking information through legal process. With request verification, end-to-end encryption, full audit trails, transparency, real-time collaboration, and API integrations, Kodex is a complete case management solution for LERT and Trust and Safety teams. Each year, millions of data requests are sent from governments and law enforcement to companies who are legally required to respond. Currently, most data requests are sent through a combination of faxes, emails, and snail mail, making it difficult to manage, track, and respond to requests securely and on time.

Industry
Technology, Information and Internet
Company size
51-200 employees
Headquarters
Boston, MA - Massachusetts
Type
Privately Held
Founded
2020
Specialties
Legal Operations

Locations

Employees at Kodex

Updates

  • FATF's asset recovery guidance highlights something many people overlook: seizing crypto from an exchange is more complex than it appears. But when the seizure infrastructure runs on email, recovery suffers. As 🔌Stephen Sargeant points out, this can lead to cumbersome processes that are anything but easy. The bottleneck sits in the underlying infrastructure. Email wasn't designed to handle seizure requests that require audit trails, chain-of-custody tracking, and coordination across multiple jurisdictions. What’s missing is speed and standardization. https://bit.ly/4rpDvEX

    🤯📌 Financial Action Task Force (FATF) Shares 3 Main Ways to SEIZE Crypto 🤯📌 The Asset Recovery Guidance from FATF is chopped full of insights into what the virtual asset seizure industry is going to look like in 2026 and beyond. If you are crypto compliance professional, blockchain analytics firm or anyone touching digital assets, you may want to watch this 🎥 as I outline these 3 ways, the companies it impacts and how to position yourself in the market Here are the 3 Main Ways They Highlighted 💭⬇️ 📌 Direct Access of Private Keys (i.e. Seized Hardware). I'm going to "assume" not many criminals are going to willingly hand over their private keys or seed phrases, so law enforcement is going to need companies like CAT Labs to sift through petabytes of data via devices like phones and computers to find crypto artifacts that will identify these private keys and secure them. Lilita (Lili) I. has talked at length why LEAs can't do this process manually and expect to be effective in the search for digital asset footprints 📌 Recovery From Exchange-Based Wallets. As someone that has worked for one of the largest crypto exchanges, as "easy" as it seems to just seize funds from an exchange, this is more complex than you think. It wasn't until I met AJ Iafrate from Kodex, who explained they provide law enforcement a platform to submit these requests for seizures directly to crypto exchanges - so no more clunky and inefficient manual email requests 📌 The Use of Freezing Functionality in Cooperation with Stablecoin Providers. This is such an interesting one, considering that criminals still love stablecoins even with some of the crazy numbers produced by Vasily Vidmanovv, Viacheslav Demchuk and the AMLBot team which highlight that Tether.io(USDT) has blacklisted addresses holding a combined $3.29 billion in frozen assets, while Circle (USDC) has only frozen $109 million. Their report that analyzes data between 2023-2025 can be found in the comments along with Matthew Hogan,'s frustration over lack of recovery from victims that have lost USDC 📌 The most interesting part of this Guidance is that it touches almost all of the key features and functionality that Aidan Larkin, Hugo Hoyland and the team at Asset Reality have built with their platform for law enforcement to be able to realize on FATF's priority of asset recovery. p.s. Most of these companies that are mentioned are or have been Airdropd clients and we love working with teams that want to not only stop illicit activity but recovery the proceeds from that activity ⬇️💭 Have You Read FATF's 340 Page Asset Recovery Guidance 💭🤷🏾♂️

  • A siloed fraud defense allows attackers to operate at the ecosystem level. Even large companies that may have an in-house verification solution are still operating in a dark silo, with limited contextual information about the investigator, the agency, and the legal justification for the request. This information vacuum is fertile ground for social engineering attacks, including AI-generated fraudulent warrants and identities. When a company flags a compromised law-enforcement email, that credential may already have compromised a dozen other platforms. Shared visibility at an infrastructure level flips this by providing herd immunity. When one organization identifies a compromised credential, all organizations in the network are protected immediately. However, this only works at scale. You need global coverage across thousands of law enforcement agencies and tens of thousands of investigators. You need continuous monitoring because a verified email today can become a compromised credential tomorrow through phishing, credential stuffing, or insider access. Since the attackers have already mastered ecosystem-level operations, defense tactics must keep pace.

    • No alternative text description for this image
  • We're a proud sponsor of the Digital Investigation Conference Brazil, taking place at the Instituto Caldeira from February 26 - 27. 🇧🇷 We'll be on-site to discuss why data request response is one of the most undervalued problems in digital investigation. When law enforcement needs data to locate a missing person, investigate fraud, or stop an active threat, the speed and accuracy of that exchange can mean the difference between catching a criminal and losing the trail. The infrastructure that facilitates exchanges among companies, law enforcement, and across jurisdictions is critical to preventing real-world harm. https://bit.ly/3NKIFg8

    • No alternative text description for this image
  • 💡 Great insights into which trends will likely matter most in the crypto compliance industry during 2026 from 🔌Stephen Sargeant. A common issue happening in the industry right now: When law enforcement needs data from multiple companies, each request goes through separate manual processes. Days turn into weeks. Trails go cold. Assets move. As our own AJ Iafrate breaks down companies that streamline this process; everyone, from compliance teams to law enforcement to victims, comes out ahead. https://bit.ly/3Z9JUbb

  • Recent EU e-evidence laws have just compressed response timelines for emergency requests from weeks to 8 hours. ⏱️ This legislation improves agencies' access to electronic evidence via legal process and is an important step forward for public safety in the EU. Previously, cross-border law enforcement requests moved through diplomatic channels between member states. Multi-week timelines gave companies room to coordinate internally, verify through known government contacts, and tailor responses by jurisdiction. Now agencies can send direct requests across all EU member states. More than 50% of EU criminal investigations involve cross-border elements. Meaning companies can face hundreds of potential requesting jurisdictions with 8-hour emergency deadlines and 10-day non-emergency timelines. Manual verification doesn't compress that far. Routing across teams, verifying legitimacy, and coordinating responses takes structured systems, not just faster effort. Speed requires different infrastructure. The regulation created the requirement. Now, companies need to build the capability.

    • No alternative text description for this image
  • View organization page for Kodex

    5,284 followers

    Chief Privacy Officers face an impossible choice: protect user privacy or enable law enforcement investigations. 🔥 Hot take: this framing is broken. The real issue isn't privacy vs. public safety. It's that most companies can't reliably verify legitimate law enforcement requests from fraudulent ones. When the only verification check is whether it's from a .gov email address, you're gambling. So CPOs get stuck: either delay a legitimate investigation that could save lives or hand over data to an impersonator and face millions in fines. The issue happens because email data requests force an artificial trade-off between speed and verification.

  • View organization page for Kodex

    5,284 followers

    Legal teams process countless data requests every year through email and spreadsheets. Most assume they're legitimate. But the reality is that thousands of law enforcement impersonators have been identified attempting to steal user data. This reality goes beyond email spoofing. Bad actors are registering domains that look legitimate and building complete personas to request sensitive data at scale. It works because the standard of care hasn't evolved in response to the threat. Most companies still rely on manual verification processes. Meaning there's no systematic way to catch patterns or share visibility across platforms. So when the same attacker targets multiple companies, each platform sees only its own request in isolation. It's about ensuring legitimate investigations can proceed while blocking the fraudulent ones. Fraud operates at the ecosystem level; meanwhile, companies defend at the platform level. Until that changes, the advantage stays with the attackers.

    • No alternative text description for this image
  • Great to see our own AJ Iafrate and Tyler Steele representing Kodex at the Operation Shamrock / Crypto Coalition conference! We love the momentum behind cross-sector collaboration to disrupt scam networks and protect vulnerable communities. Events like this show what’s possible when intelligence, infrastructure, and cooperation come together around a shared goal: making it harder for scam networks to operate and easier for victims to get help. Kudos to the organizers and partners driving this critical work forward. The impact is real and growing. BIG thank you to Erin West for inviting the Kodex team! https://bit.ly/4aooWLS

    Morning friends, I’m heading home after an awesome 3 days in St. Louis at the Operation Shamrock/Crypto Coaltion conference. First things first, huge shoutout to Erin West, Michael Clinton, Aleks Ring ☘️, William J. Jones, Michele Ilich-Daubas, CAMS, CRC ☘️, Shannon Almborg and anyone I might have missed - this was an excellent event from start to finish and this is a very special community that is having a tremendous effect on protecting our most vulnerable. Fave presentation: there were lots of amazing ones but I’m a sucker for a good case study so I’ll have to say it’s a tie between Brad Thorne breaking down the Yahoo Boys and how they target young boys in sextortion scams and Alona Katz walking us through her team’s takedown of an elaborate scam operation in Brooklyn. That being said, the best and coolest moment of the conference was how Mike Clinton and Dave Barry closed it out. The entire audience, all together in one room, passing a microphone around, just bouncing ideas off of one another about how we can all work better together to shut these scammers down. I’ve never seen anything like it at a conference before. It was awesome. The teamwork and collaboration vibes were off the charts. I even convinced Aleks and Michele to take me through the Operation Shamrock train the trainer program. Once they deputize me, I’ll be heading out into my community to speak to potential victims and make them aware of how these scammers operate. Highly recommend everyone does the same! Keven Hendricks we missed you buddy - but I hear you designed the new Operation Shamrock sticker, pretty awesome! By the way, John Armit, I volunteered us to host an Operation Shamrock/Crypto Coalition event one of these years in Canada. Hope that’s okay with you 😂 Thank you to Erin and the whole team for inviting myself, Tyler Steele and Kodex to be a part of such an incredible event. We will see you at the next one!

    • No alternative text description for this image
    • No alternative text description for this image
    • No alternative text description for this image
  • View organization page for Kodex

    5,284 followers

    Email is the least secure way for companies to receive law enforcement requests. Yet 80% of companies still rely on it. The critical issue: email can't verify who's actually sending a request. Stolen credentials allow attackers to bypass protections, exploit trust signals, and appear authentic. Even worse, once you send data via email, you lose all control over it. You can't revoke it, track it, or limit who sees it downstream. Bad actors know this. They've systematically learned to exploit every gap in email-based verification. Kodex Head of Government Relations, AJ Iafrate, discusses why email workflows can't protect against modern threats and what organizations need instead. ▶️

  • View organization page for Kodex

    5,284 followers

    Unfortunately for FinTech companies, data request processes often create the security risks they're meant to prevent. You might say, "How does this happen?!" It's pretty simple: Most companies still handle law enforcement requests through email and manual checks. This leaves gaps that impersonators exploit, stalls multi-agency investigations, and makes regulatory compliance harder to demonstrate. Learn how leading companies like Stripe, Fidelity Investments, and OnePay are protecting their platforms: https://bit.ly/49e3yHC

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

Kodex 3 total rounds

Last Round

Series A

US$ 21.2M

See more info on crunchbase