Mr Linford told the BBC that the attack was being investigated by five different national cyber-police-forces around the world.
BBC: Global internet slows after 'biggest attack in history'
About 90 federal agencies send their personnel to the centers for training in everything from criminal investigations to cyber terrorism and land-management police training.
WSJ: Federal Offenses: Law-Enforcement Teams Grow at U.S. Government Agencies
And all police forces will be encouraged to follow the lead of the Metropolitan Police and train "cyber specials" with expert knowledge of cybercrime.
Many U.S. police departments do not have trained cyber forces, including the Washington, D.
FORBES: Congress Needs to Go Back To School on Cyber Legislation
Internet providers take the issue very seriously, and say they work closely with the police to investigate any form of cyber crime.
Police say hackers who stole online identities, cyber-thieves who targeted banks as well as virus writers were all grabbed during the raids.
Emma Short, a British psychologist who is setting up the world's first outfit dedicated to researching cyber-stalking, says that few victims think the police can help them and many do not report the crime.
ECONOMIST: The internet allows the malicious to menace their victims
The Ministry of Justice and Home Office will also consider whether orders restricting internet use can be enforced using "cyber tags", software which triggers automatic warnings to the police or probation service that a suspect is breaching an order.
The organizations include the CERT Coordination Center, the Electricity Sector Information Sharing and Analysis Center, the European Cyber Crime Center, the Malaysia Computer Emergency Response Team, the Australian Federal Police and the Irish Reporting and Information Security Service.
The police must be allowed to tackle "21st-Century crimes" such as cyber fraud and money laundering, she added.
There is little to suggest police will be any more prepared for these emerging threats than they were for basic cyber crimes.
But the strategy also urges police, prosecutors and the courts to use existing powers to restrict and monitor computer use by convicted cyber criminals, who are considered likely to strike again online.
应用推荐