​​​​Dr. Mohammad Reza Jafari joins HKA as Principal in its Forensic Engineering practice

News

​​​​Dr. Mohammad Reza Jafari joins HKA as Principal in its Forensic Engineering practice

HKA, a leading global consultancy in risk mitigation and dispute resolution, is pleased to announce that Dr. Mohammad Reza Jafari has joined the firm as a Principal in its Forensic Engineering practice.

A globally recognized expert in geotechnical and tunnel engineering, Dr. Jafari has over 36 years of international experience investigating infrastructure failures, construction defects, and geotechnical anomalies. His forensic work has supported litigation, insurance claims, and dispute resolution across major sectors, including transportation, water and wastewater, and underground construction.

Dr. Jafari has led complex infrastructure projects throughout North America, Europe, the Middle East, and Australia. His investigations have addressed tunnel collapses, ground movement, foundation failures, and construction delays. Dr. Jafari has also identified root causes and evaluated liability by applying advanced modeling techniques and field data analysis, contributing to fair outcomes in high-stakes disputes. His technical expertise includes underground construction and rehabilitation, trenchless technologies, deep support of excavation systems, ground treatment, advanced numerical modeling, and forensic analysis.

“Joining HKA is an exciting opportunity to apply my forensic engineering experience to help clients resolve complex technical disputes. Whether it’s analyzing tunnel failures, evaluating construction delays, or uncovering the root causes of structural distress, I’m passionate about delivering clarity and insight that supports fair outcomes and resilient infrastructure.”

Mohammad Reza Jafari, Principal

Throughout his distinguished career, Dr. Jafari has held senior leadership roles at top engineering firms and served as project manager, design lead, and technical reviewer on multi-billion-dollar infrastructure programs involving tunnels, wastewater systems, rail corridors, and flood protection schemes. His work has been recognized globally, including award-winning projects in Doha, Qatar, and New York City.  

“We are thrilled to welcome Dr. Jafari to HKA. His depth of technical knowledge, leadership in tunnel and geotechnical engineering, and global project experience will significantly enhance our forensic capabilities and client offerings.”

Michael Griffin, Partner, Head of Forensic Technical Services, Americas

Dr. Jafari holds a PhD in Geotechnical Engineering from the University of New South Wales and has completed postdoctoral research at both the University of Cambridge and MIT. He is a licensed Professional Engineer in Connecticut and Rhode Island and an active member of the American Society of Civil Engineers and the International Society of Soil Mechanics and Geotechnical Engineering.

For more information about HKA and its Forensic Engineering, Architectural & Scientific practice, visit www.hka.com.

Media contact 

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
Emailandrewkatz@hka.com

Uncovering hidden digital evidence: Mobile device forensics

Article

Uncovering hidden digital evidence: Mobile device forensics

Andy Antunez

Partner

andyantunez@hka.com

Expert Profile


Mobile devices are at the center of how we work in today’s digitally driven world. Capable of much more than just helping people stay connected through calls, text messages, and emails when they are not at their desks, mobile phones and tablets can now perform functions that were possible only with a computer just a few years ago. In fact, there is a growing prevalence of mobile-only applications as many developers move away from cross-platform development for computers. 

Whether mobile devices are used for communication, research, sharing information, storing confidential documents, transferring money, or a wide variety of other functions, they store millions of data records. If extracted and processed in a forensically sound manner, this data can provide crucial evidence for investigations related to employment matters, intellectual property, trade secrets, data exfiltration, and similar issues. Even if data has been deleted, much of the information can be recovered through mobile forensics — uncovering hidden digital trails that can make or break a case. 

Types of data on mobile devices

The millions of data points stored on mobile devices translate to thousands of different data types. The most common types of data on mobile devices that are relevant to investigations include: 

  • Contacts: Names, phone numbers, email addresses, and other personal details 
  • Call logs: Records of incoming, outgoing, and missed calls, including timestamps, call duration, and caller/recipient details 
  • iMessage/SMS/MMS messages: Text, multimedia, and metadata exchanged between devices 
  • Emails: Message content, attachments, sender, recipient, and timestamps 
  • Web browser and data history: Websites visited, search queries, bookmarks, cookies, and cached files 
  • GPS location data and information: GPS coordinates, Wi-Fi connections, and geotagged media files 
  • Photos and videos: Stored photos, videos, and associated metadata 
  • App data: Installed applications such as social media, banking, and communication platforms collect information like user activity, preferences, and other personal data  
  • Cloud storage: Data synchronized or backed up to cloud services (e.g., iCloud, Google Drive, Dropbox, OneDrive, etc.) 

These data points are critical pieces of the puzzle that can reveal a person’s actions, when and where those actions took place, and who else was involved. This information, which otherwise might not come to light, is often at the crux of legal arguments. A good example is the highly publicized Karen Read trial, where phone messages were at the heart of the case and indispensable for building the timeline that ultimately exonerated her for murder. 

Essential role of trained digital forensic examiners

While digital data can serve as vital electronic evidence, it must be properly captured and managed with skill and precision to ensure it is forensically sound. Enter digital forensic investigations, which consist of identifying, preserving, and analyzing electronic artifacts to form conclusions and opinions used in legal or investigative proceedings. 

Digital evidence is fragile and volatile. Improper handling of digital devices can alter or destroy the evidence contained on them, as can failing to collect the data in a timely manner. Further, if the digital device is not handled in accordance with digital forensics best practices, it can be impossible to determine what data was altered and whether those changes were intentional or unintentional.  

Spoliation—which occurs when someone with a duty to preserve evidence fails to do so by destroying, damaging, or losing it—is a serious concern. Defendants commonly wipe physical devices like phones, tablets, computers, and external USB devices. Emails, chats, and backups often go “missing.” And features like disappearing messages, also known as ephemeral messages, in applications like iMessage, Signal, and WhatsApp add additional layers of complexity. 

Digital devices need to be preserved and analyzed by a trained examiner using advanced forensic tools and techniques to protect evidence from being lost, overwritten, or changed. 

Extracting and recovering data from mobile devices

Digital forensic examiners can extract data of interest from mobile devices by acquiring or forensically copying the desired information. Depending on the device manufacturer, operating system, chipset, and forensic protocol governing the scope of the investigation, a variety of methods may be employed.  

  • Targeted extraction (quickest extraction): A targeted collection is the quickest way to extract data. It copies granular data, such as messaging, pictures, videos, audio, contacts, Internet, and social media information related to a specific date or application. 
  • Advanced logical extraction (most common): A logical extraction backs up data from the mobile device, similar to an iTunes backup with additional data points. It collects files and folders contained on the mobile device, excluding unallocated space where data may have been stored previously. Typically, data collected through a logical extraction includes messaging, pictures, video, audio, contacts, application data, some location data, Internet history, search history, social media, and more.  
  • Full file system extraction (most complete): A full file system (FFS) extraction is the most complete and in-depth method for acquiring data from a mobile device. Once available only to law enforcement and intelligence agencies, this capability is now accessible to select private sector forensic teams through advanced tools such as Magnet Graykey™, Magnet Verakey™, and Cellebrite Premium™. These platforms enable forensic examiners to bypass many device security features and gain root-level access to the entire internal memory of supported iOS and Android devices. 

Unlike standard logical or backup extractions, FFS extractions allow investigators to retrieve deleted records, system logs, write-ahead logging (WAL) journal data, and even encrypted app data, including access to the Keychain on iOS or Keystore on Android devices. These areas often store credentials, tokens, and encryption keys that can unlock data from secure messaging platforms such as Signal, Telegram, Wickr, Threema, and WhatsApp, apps typically inaccessible in logical acquisitions due to encryption and sandboxing. 

In addition to capturing everything found in a traditional extraction (i.e., SMS/iMessage, photos, call logs, and contacts), FFS also collects hidden system files, crash logs, location caches, and app-specific databases stored in private directories. This means forensic analysts can recover deleted conversations, location trails, browser artifacts, and residual app data, even from uninstalled applications, making FFS extractions essential in high-stakes investigations involving corporate espionage or insider threats. 

  • Physical extraction: Physical extraction captures a bit-by-bit copy of a device’s storage, including deleted files and file fragments. However, data that is physically extracted from modern versions of Apple and Android devices is typically not usable due to file-based encryption.  
  • Local and cloud backups (recommended to collect): When a device is factory reset (the date of which can be determined by forensic analysis of logs and files) or is missing altogether, data cannot be collected using extraction methods. In these cases, local and cloud backups may contain the evidence needed. When mobile devices are connected and backed up to a computer, a local backup file is created (an option less used since cloud backups were introduced). Similarly, when a mobile phone is backed up to the cloud, a cloud backup is created and may be the only remaining copy of the mobile content. These backup files are similar to an advanced logical collection and can be ingested into most cell phone forensics software and analyzed just like a forensic extraction. 

Forensic search and analysis methods

After the data is acquired, forensic experts use many different techniques to search and analyze the information. These methods entail searching by: 

  • MD5 hash value, a digital fingerprint of content represented as 32-digit hexadecimal numbers (e.g., aa55d3e698d289fa74g663725127babe), to identify all files that match the content regardless of the file name, location, or date 
  • File and folder names that exist or existed on servers, on computers, and in cloud repositories 
  • Specific terms such as client names, project names, vendor names, document authors, and other internal metadata 
  • Key dates to identify information created, accessed, or modified around important milestones, such as employee departure dates 
  • Forensic artifacts, which can be like “needles in a haystack” due to the high volume of records, require forensic experts to dive deep into the details of the data and timeline  
  • Concept and GenAI-driven search reveal emotional tone and intent, surfacing key insights even when keywords are hidden or language is indirect 

While these methods may seem straightforward, applying them reliably and efficiently across large volumes of data is far more challenging. It’s not just about knowing where and how to find the information; it’s also about accurately interpreting and presenting it in a legally defensible manner. Successfully supporting or challenging a case requires advanced industry knowledge and extensive subject matter expertise. 

Ensuring the quality of evidence

Using the right tools and techniques for mobile forensic investigations sets the foundation for identifying compelling evidence that holds up in court and avoiding spoliation. Ultimately, the quality of this data and the realities that surface from synthesizing various proof points rely on the capabilities of the forensic experts leading the effort. The importance of rigorously evaluating digital forensic teams based on authority, technical skills, and expert testimony experience is indisputable. 


About the author

Andy Antunez is a digital forensics expert with over 20 years of professional experience in digital forensics, information technology, and security. He has expertise in matters involving data exfiltration, unauthorized data access, intellectual property theft, and misappropriation of trade secrets. Andy has personally imaged over 10,000 computer devices and more than 5,000 mobile devices. He specializes in forensic technology services, including data preservation, digital forensics, eDiscovery, data analysis, metadata manipulation, complex preservation and data collection, and eDiscovery consulting. 



This article presents the views, thoughts, or opinions only of the author and not those of any HKA entity. The information in this article is provided for general informational purposes only. While we take reasonable care at the time of publication to confirm the accuracy of the information presented, the content is not intended to deal with all aspects of the referenced subject matter, should not be relied upon as the basis for business decisions, and does not constitute legal or professional advice of any kind. HKA Global, LLC is not responsible for any errors, omissions, or results obtained from the use of the information within this article. This article is protected by copyright © 2025 HKA Global, LLC. All rights reserved.


​​​​HKA Partner David Duffus recognized in Forbes’ 2025 America’s Top CPAs for Valuations​ 

News

​​​​HKA Partner David Duffus recognized in Forbes’ 2025 America’s Top CPAs for Valuations​ 

HKA is proud to announce that Partner and valuation expert David Duffus has been named to Forbes’ 2025 America’s Top CPAs for Valuations.     

Forbes’ inaugural list aims to provide a high-quality guide to outstanding valuation experts in the United States. It features Certified Public Accountants (CPAs) selected for their exceptional expertise, integrity, and leadership in valuation services. Candidates are identified through independent research, nominations, and CPA association recognitions and assessed based on their experience, innovation, thought leadership, and service.  

“It’s an honor to be recognized by Forbes among this distinguished group of professionals. Valuation is a critical tool in helping businesses navigate complex challenges, and I am proud to contribute to the advancement of the field.”

David Duffus, Partner

David is a Certified Public Accountant with over 25 years of experience. He has been retained as an expert on more than 250 occasions and provided expert witness testimony in more than 120 cases. His specialty expertise includes complex litigation services, forensic accounting, and valuation services assignments for businesses ranging from start-up entities to Fortune 100 companies.  

David is frequently called upon to value businesses and related ownership interests in stakeholder disputes, post-acquisition disputes, and bankruptcy matters. He has acted as an expert for disputed values of up to $275 million and for project values in excess of $300 million. He is also an instructor for the annual AICPA Expert Witness Skills Workshop, Certified in Financial Forensics (CFF), a Certified Fraud Examiner (CFE), and Accredited in Business Valuation (ABV).  

Lexology Index has recognized David as a recommended expert in its Consulting Experts – Financial Advisory and Valuation – Quantum of Damages and Commercial Litigation – Expert Witnesses categories.  

“Dave’s inclusion on the Forbes list reflects his deep commitment to delivering objective, defensible valuations in complex litigation, transaction, and advisory contexts. He consistently brings insight into complex matters, and we are proud to see his contributions acknowledged.” 

Paul Donato, Partner, Head of Operations for FACD, Americas 

View David’s expert Profile here and read the Forbes article here

Media contact 

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
Emailandrewkatz@hka.com

​​Veteran Intellectual Property Damages expert David Paris joins HKA in Washington, DC​ 

News

​​Veteran Intellectual Property Damages expert David Paris joins HKA in Washington, DC​ 

HKA, a leading global consultancy in risk mitigation, dispute resolution, expert witness, and litigation support services, is pleased to announce that Principal David Paris has joined its Intellectual Property (IP) practice in Washington, DC.   

“We are thrilled to welcome David to HKA. His deep expertise in IP damages and economic consulting, combined with his extensive testimony experience, will significantly enhance our capabilities and value to clients.”

Michael Lasinski, Partner

David brings over 35 years of experience as an economist and business consultant. His expertise spans domestic and international courts, arbitration, and administrative proceedings addressing damages, valuation, and competition issues in complex commercial disputes.  

David advises clients across various industries on IP strategy, licensing negotiation, royalty audits, and compliance reviews. He specializes in patent, trademark, and copyright infringement matters, trade secret misappropriation, licensing disputes, fraud, breach of contract, and antitrust violations. 

He has testified on damages and economic issues in U.S. District Courts and before the American Arbitration Association and International Trade Commission, addressing issues involving lost profits, reasonable royalty, unjust enrichment, commercial success, and economic considerations relevant to injunctive relief.  

“I’m excited to join HKA’s outstanding team of experts and contribute to the continued growth of its Intellectual Property and Patent Damages practice. HKA’s global reach and collaborative culture provide a unique platform to deliver high-impact solutions to clients facing complex IP challenges.” 

David Paris, Principal 

David is a published author and speaker who is actively involved in professional organizations, including the American Bar Association and the Licensing Executives Society. He holds a Master of Arts in Applied Economics from the University of Michigan and a Bachelor of Arts in Economics from George Washington University. 

View David’s Expert Centre Profile. 

About HKA’s Intellectual Property practice 

HKA’s IP consultants and experts work worldwide to value intangibles in most industries – from advanced technology to education, healthcare to e-commerce, and transport and consumer goods. The team is experienced in analyzing issues related to IP damages, such as apportionment of profits, manufacturing and sales capacity, available alternatives, customer demand, company and product profitability, competition, cost savings, and enhanced earnings related to licensing IP. The firm’s IP experts have evaluated and determined reasonable royalties for a broad range of products and industries, reviewing and analyzing thousands of license agreements. 

Learn more about HKA’s Forensic Accounting, Investigations, Business Valuation, Economic Damages, and Intellectual Property expert services. 

Media contact 

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
Emailandrewkatz@hka.com

Vanessa Varona joins HKA’s Forensic Accounting and Investigations practice in Miami 

News

Vanessa Varona joins HKA’s Forensic Accounting and Investigations practice in Miami 

HKA, a leading global consultancy in risk mitigation and dispute resolution, is pleased to announce that Vanessa Varona has joined its Forensic Accounting and Investigations practice as a Partner in Miami, Florida.  

Vanessa brings over 15 years of experience leading forensic, due diligence, and Foreign Corrupt Practices Act (FCPA) investigations, conducting risk compliance assessments, and providing dispute resolution services. 

“I’m thrilled to join HKA’s Forensic Accounting and Investigations practice. I look forward to collaborating with our distinguished investigations team to deliver the insights clients need to uncover misconduct, strengthen internal controls, and navigate complex challenges with clarity and confidence.”

Vanessa Varona, Partner

Vanessa has investigated allegations of fraud involving customs reporting, financial statements, investment management, vendor kickback schemes, and rogue trading. She has also conducted due diligence and FCPA investigations and led process improvement initiatives, financial restatements, contractual compliance assessments, and COVID-19 economic relief analyses. Her dispute resolution expertise includes analyzing and quantifying damages for lost profits, inventory theft, and post-acquisition matters. 

Vanessa has served clients from a wide range of industries, including transportation, healthcare and life sciences, power and utilities, manufacturing, oil and gas, telecommunications, construction and engineering, aerospace, and aviation. 

“We are excited to welcome Vanessa Varona to HKA. Her deep expertise in forensic investigations and dispute resolution significantly strengthens our capabilities and enhances the value we deliver to clients. Vanessa’s track record of uncovering complex financial misconduct and navigating cross-border challenges will be instrumental as we continue to expand our support for clients facing critical risk and compliance issues.”

Tim Hart, Partner 

Services practice. She has a Master of Business Administration from Florida International University and a Bachelor of Business Administration in Accounting from the University of Miami. Vanessa is a Certified Public Accountant and is fluent in Spanish. 

View Vanessa’s Expert Centre Profile.  

About HKA’s Forensic Accounting and Investigations Services 

HKA’s Forensic Accounting experts help corporate counsel, boards of directors, audit committees, government entities, compliance officers, and outside counsel navigate the financial complexity of alleged fraud, misappropriations, sanctions, and other regulatory violations.  

The firm’s experts undertake fraud, forensic, and regulatory investigations worldwide. They are experienced in investigating allegations of bribery and corruption, performing investigations and compliance reviews related to the Foreign Corrupt Practices Act, assessing allegations of mismanagement, and investigating corporate fraud.  

Drawing on forensic accounting expertise and a range of complementary disciplines, we conduct incisive investigations and in-depth research. Our experts lead corporate and financial investigations, regulatory and compliance investigations, specialist and personal investigations, and trace digital assets.  

Learn more about HKA’s Forensic Accounting services and Investigations services.  

Media contact 

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
Emailandrewkatz@hka.com

​​​​​​​​HKA welcomes Director Thomas Moreno to its Forensic Engineering Expert Services practice ​ 

News

​​​​​​​​HKA welcomes Director Thomas Moreno to its Forensic Engineering Expert Services practice ​ 

HKA, a leading global consultancy in risk mitigation and dispute resolution, is pleased to announce that Director Thomas Moreno will join its Forensic Engineering Expert Services team in San Francisco.   

Thomas is a California-licensed general contractor with over 27 years of experience in the construction industry. His consulting expertise includes project management and forensic analysis of construction defects to identify property structure problems, including moisture intrusion, fenestration, structural damage, and structural failure. Thomas inspects construction sites, assesses the scope and estimates the cost of repairs, and evaluates construction defect loss. 

“With nearly 30 years in the construction industry, I’m proud to bring my forensic technical expertise to HKA. I look forward to collaborating with this talented team to deliver clear, actionable insights and solutions for clients navigating complex construction challenges and property loss disputes.

Thomas Moreno, Director

In addition to his experience assessing construction defects, Thomas has supervised construction crews, prepared procurement bid packages, and provided cost estimates. He routinely analyzes critical path method scheduling, cash flow, design standards, and contracts, and he is an expert in change order management and insurance property loss evaluation.   

Thomas has worked on commercial, residential, and industrial construction projects across the United States. He has testified as an expert witness in depositions and trials, drawing on his decades of technical and project management experience. 

“Thomas brings an exceptional blend of hands-on construction experience and deep forensic expertise that strengthens our ability to serve clients facing complex technical challenges. His track record in construction defect analysis, project management, and expert testimony makes him a valuable asset to our team and to the clients who rely on our insights.”  

Mike Griffin, Partner, Head of Forensic Technical Services, Americas

Thomas holds a Bachelor of Science in Construction Management from California State University, Chico, and is a Certified Construction Inspector. 

View Thomas’s Expert Profile

About HKA’s Forensic Engineering, Architectural, and Scientific Expert Services 

HKA’s forensic engineering, architectural, and scientific experts provide expert advisory, expert determination, and expert witness services for clients worldwide. Depending on the assignment, the firm’s specialists act as sole experts within a specialized technical team or collaborate with other experts in complementary disciplines such as quantum, delay, forensic accounting, and commercial damages, known as HKA’s multidisciplinary service.  

Learn more about HKA’s Forensic Engineering, Architectural, and Scientific Expert Services. 

Media contact

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
Emailandrewkatz@hka.com

Unraveling crypto crimes through blockchain tracing

Article

Unraveling crypto crimes through blockchain tracing

Richard Peters

Partner

richardpeters@hka.com

Expert Profile


Ever since cryptocurrency moved from the margins of the financial ecosystem into the mainstream, crypto crimes have been on the rise. Today’s global crypto market is valued at $3 trillion, and news about the latest criminal activity tied to the pseudonymous digital currency is no longer the exception but the norm. As a result, crypto-related legal investigations are proliferating for fraud, ransomware attacks, money laundering, insider trading, tax evasion, and a litany of other crimes.

From large international crypto hacks to white-collar fraud, crypto crimes can be successfully unraveled through methodical blockchain tracing. With sophisticated techniques, digital forensic experts use blockchain tracing to follow the money through complex transactions, peel back layers of anonymity, and ultimately unmask the actors and their actions with tangible evidence.

Understanding how forensic investigators solve real-world crypto crimes requires a solid grasp of cryptocurrency and blockchain fundamentals as well as the most effective tracing methods and tools available.

The basics of cryptocurrency and blockchain

At a basic level, cryptocurrency is an entirely digital form of currency secured by cryptographic methods that hide identifying information. Crypto is decentralized, meaning there is no central authority, such as a government or bank, overseeing the currency. Instead of transactions being private, transactions are publicly visible and transparent on blockchain. There are some exceptions to this, but most tend to follow this pattern.

Given that users are identified by strings of numbers, not names, there is a common misconception that crypto transactions are anonymous. In reality, crypto transactions are pseudonymous, and users’ identities can often be uncovered with the right kind of tracing.

The primary differences between traditional government-issued fiat currency like the U.S. dollar and cryptocurrency are summarized below.

AspectFiat CurrencyCryptocurrency
FormPhysical (cash, coins) and digitalEntirely digital
ControlCentralized (government, banks)Decentralized (no central authority)
SupplyPotentially unlimitedLimited supply (e.g., Bitcoin capped at 21 million)
Transaction TransparencyTransactions private, controlled by institutionsTransactions publicly visible and transparent on blockchain
RecordkeepingTraditional banking systems (private)Publicly visible blockchain
AnonymityGenerally not anonymous, regulatedPseudonyms, publicly visible but identities hidden
SecurityDependent on institutions and regulationsSecured by cryptographic methods

Cryptocurrency is powered by blockchain technology. Blockchain is a decentralized digital ledger that securely records transactions across many computers and makes them visible to the public. Blockchain’s most notable features are:

  • Decentralization: No single entity controls the ledger.
  • Transparency: Anyone can view transactions.
  • Security: Information is stored in “blocks” and linked cryptographically.
  • Immutability: Once recorded, data cannot be altered or deleted.

Think of blockchain as a notebook (ledger) shared openly with everyone, where each page (block) is connected to the previous page. Everyone can see each entry clearly, and once written, an entry cannot be erased or changed. These transparency and security features have generated a groundswell of trust among the general public.

Why cryptocurrency matters in today’s economy

Approximately 861 million people around the world use cryptocurrency.[i] This includes more than one in four Americans.[ii] The growth and appeal of cryptocurrency are fueled by several factors, including:

  • Limited supply: Many cryptocurrencies, such as Bitcoin, have a capped total supply. This scarcity helps drive demand and can increase value over time, similar to gold and other precious resources. Others may not be limited but are controlled in some way to follow an economic model. 
  • Utility and functionality: Cryptocurrencies facilitate fast, secure, global transactions without intermediaries like banks. This functionality provides practical value, especially for cross-border payments and financial inclusion. 
  • Market demand and speculation: Like traditional currencies or commodities, cryptocurrency value is driven by supply and demand dynamics. Investor speculation and belief in future adoption or technological innovation contribute significantly to their valuation.  
  • Transparency and security: The blockchain technology underpinning cryptocurrencies offers unparalleled transparency and security, boosting trust and perceived value in the financial ecosystem.  
  • Community and network effect: A strong community supporting adoption, use, and development increases cryptocurrency’s usability and, thus, its overall value. The larger and more active the user base, the more valuable the cryptocurrency tends to become.  

Key techniques for effective crypto tracing

With an extensive user base, crypto transactions generate massive amounts of blockchain data. Navigating this data and successfully tracing crypto transactions calls for skilled investigators, a keen understanding of crypto criminal behaviors and transaction patterns, and advanced technical tools.

Investigators may use various blockchain tracing techniques. Among the most common are:

  • Exchange interaction analysis: Analyzing transactions at crypto exchanges where users convert traditional currency into different types of crypto coins, and vice versa, can provide critical insight that bridges the online and offline worlds. Because these exchanges have “know your customer” (KYC) regulations to verify the identities of users upfront, they can also be subpoenaed to reveal who owns a particular account.   
  • Address clustering: This entails spotting distinct crypto wallet addresses that regularly pool or cluster their money and send it to another account. When this happens frequently, it typically indicates that the feeder addresses are owned or controlled by the same entity, helping to connect the dots and providing pathways for further investigation.  
  • Common spend analysis: Similar to address clustering, common spend analysis links two or more crypto wallets together based on common, recurring transactions that fund larger accounts. 
  • Address reuse: When crypto addresses are reused for multiple transactions, historical transaction data that offers additional clues about a user’s activity and behavior can be investigated. The more an address is reused, the more potentially identifying information is available. 
  • IP correlation: It is possible, albeit difficult, in some cases to analyze network-level data and link IP addresses with specific cryptocurrency transactions or wallet addresses, potentially revealing users’ geographical locations and Internet service providers. When users access crypto exchanges, web wallets, or blockchain explorers without proper anonymization tools, they leave digital footprints that can be captured and correlated. By combining IP data with transaction timestamps and patterns, investigators can build profiles that connect online activities to real-world locations, although this method faces challenges from VPN usage, Tor networks, and other privacy-enhancing technologies.  
  • Dusting attack analysis: In a dusting attack, a small amount of crypto is sent to or dusted over several addresses. Often, users transfer this crypto to a larger account to consolidate their holdings, pointing investigators to additional addresses that can be tracked and analyzed.  
  • Suspicious pattern detection: Certain crypto transaction patterns are clear red flags that indicate a user is trying to obfuscate the money trail and confuse tracing attempts. These include peel chains, that is, the repeated splitting of funds into smaller transactions; using tumbler services that mix transaction inputs and outputs to obscure their origins; and the rapid splitting and combining of funds. 

Advanced blockchain tracing tools

One of the biggest crypto tracing challenges lies in the sheer volume and complexity of blockchain data. Professional tools are the key to efficiently and effectively applying tracing techniques to this digital sea of information. These tools can visualize highly complex transaction patterns, attribute crypto addresses to offline identities, automate monitoring, and much more, allowing investigators to transform detailed data into actionable intelligence.

Key capabilities of professional crypto tracing solutions include:

  • Advanced visualization and pattern recognition: There are various technologies that transform millions of blockchain transactions into intuitive visual maps and network graphs, revealing hidden connections between wallets, exchanges, and entities that would be impossible to detect manually. These tools can identify complex laundering patterns, mixing service usage, and multi-hop transaction chains. 
  • Attribution and entity identification: Cutting-edge software can link crypto addresses to known entities, including exchanges, darknet markets, ransomware groups, and legitimate businesses, by leveraging extensive databases. This attribution capability enables investigators to assign names and context to otherwise anonymous blockchain addresses. 
  • Real-time monitoring and alerts: Automating surveillance of specific addresses or transaction patterns triggers instant notifications when suspicious activities occur. This proactive monitoring helps prevent crimes in progress and enables rapid response to emerging threats. 
  • Risk scoring and compliance analytics: Tracing tools can automatically assess the risk level of transactions and counterparties based on their historical behavior, connections to illicit activities, and compliance with regulatory requirements. These risk assessments help organizations meet anti-money laundering (AML) and KYC obligations. 
  • Cross-chain analysis: As criminals increasingly use multiple blockchains to obscure their trails, this capability is crucial for tracking assets as they move between different blockchains through bridges, atomic swaps, and cross-chain protocols.  
  • Integration and reporting features: Select tracing tools can seamlessly connect with existing investigation platforms, case management systems, and compliance workflows while generating court-ready reports that document the entire investigative process with proper chain of custody, simplifying the management of crypto investigations. 

Staying ahead of crypto crime

The crypto landscape and, in turn, the challenges of crypto tracing are constantly changing. However, as blockchain technology continues to evolve, so will the techniques used for tracing illicit activities. By continually honing tracing strategies and staying on top of the latest technological capabilities, we can ensure blockchain remains a tool for transparency and accountability—not crime.


About the author

Richard Peters is a cybersecurity and crypto asset forensic expert with over 25 years of experience in cybersecurity breaches, security posture assessments, ransomware incidents, and crypto asset investigations. He has managed, performed, and delivered information technology security solutions, including technology risk management, auditing, security assessments, compliance assessments, attack-and-penetration testing services, and security analysis for domestic and international entities in the energy, technology, medical, financial, and manufacturing industries. He specializes in penetration testing, cybersecurity breach analysis, crypto tracing, and smart contract security assessments. 


References

[i] https://medium.com/quantum-economics/global-cryptocurrency-adoption-in-2025-a-country-by-country-breakdown-047ebc6b6734

[ii] https://www.security.org/digital-security/cryptocurrency-annual-consumer-report/


This article presents the views, thoughts, or opinions only of the author and not those of any HKA entity. The information in this article is provided for general informational purposes only. While we take reasonable care at the time of publication to confirm the accuracy of the information presented, the content is not intended to deal with all aspects of the referenced subject matter, should not be relied upon as the basis for business decisions, and does not constitute legl or professional advice of any kind. HKA Global, LLC is not responsible for any errors, omissions, or results obtained from the use of the information within this article. This article is protected by copyright © 2025 HKA Global, LLC. All rights reserved.


​​HKA expands its digital forensics and investigation capabilities across the U.S. with four strategic hires

News

​​HKA expands its digital forensics and investigation capabilities across the U.S. with four strategic hires

HKA is excited to announce the significant expansion of our digital forensics, discovery, and high-tech investigations team, strengthening our presence and capabilities across the nation with the addition of four accomplished professionals: Partner Eric Mazur (Miami), Principal David Griffith (Houston), Principal Jared Lake (San Francisco), and Associate Director Phu Nguyen (Washington, DC).

“This is a strategic moment in establishing our team’s presence and forensic expertise in key regions across the United States. Whether uncovering digital evidence, conducting crypto forensics, or supporting litigation through expert analysis and discovery, our team stands ready to deliver industry-leading service and insight, coast to coast.”

Michael Bandemer, Partner, Head of Digital Forensics and Data Solutions

Eric Mazur, Partner
Miami, Florida

Eric Mazur has over 34 years of experience in advanced digital forensic investigations. He has leveraged his expertise in data collection and eDiscovery to investigate unauthorized data access, misappropriation of trade secrets, and data manipulation and destruction matters in the public and private sectors.

Leading comprehensive domestic and international efforts, Eric has recovered, processed, and produced significant amounts of data under subpoena. He has also provided expert witness testimony on over 25 occasions in federal and state courts.

Eric’s investigative background is rooted in his early experience as a detective with the Metropolitan Police Department’s Financial Investigations Unit in Washington, DC. He was trained in computer forensics by the Federal Bureau of Investigation, the U.S. Secret Service, the U.S. Drug Enforcement Administration, the U.S. Internal Revenue Service’s Criminal Investigations Division, and the Federal Law Enforcement Training Center.

“Joining HKA’s Digital Forensics and Data Solutions practice is an exciting opportunity to collaborate with a premier team of industry experts. I’m eager to apply my years of experience investigating high-tech crimes, uncovering trade secret misappropriation, and resolving complex data collection and analysis challenges. With a passion for revealing the truth through data and a steadfast commitment to meaningful results, I look forward to helping our clients achieve clarity and success.”

Eric Mazur, Partner

Before joining HKA, Eric was the President and Founder of Advanced Forensic Investigative Solutions, LLC. He earned a Bachelor of Arts in Criminal Justice from the University of Maryland and several certifications, including Seized Computer Evidence Recovery Specialist, Encase Certified Examiner, Certified Electronic Evidence Collection Specialist, Certified Technical Trainer, and Computer Network Investigations (CNTP-FLETC).

View Eric’s full Expert Centre Profile here.


David Griffith, Principal
Houston, Texas

David Griffith has over 25 years of experience providing strategic guidance to organizations and legal teams navigating digital forensic investigations, bankruptcy proceedings, regulatory concerns, and litigation. He has spearheaded eDiscovery initiatives in some of the most expansive and intricate cases in the United States, handling everything from identification, preservation, and collection to processing, review, and production.

David’s project experience includes employment affairs, environmental incidents, shareholder actions, contractual disputes, white-collar crime, and merger integrations. He has applied his proficiency with structured (transactional) data and data modeling to manage disputes related to oil and gas royalties, intellectual property licensing, and insurance coverage allocation.

“I’m thrilled to join HKA and bring my expertise in digital forensics to an already impressive practice. People and organizations face increasingly sophisticated threats in the digital world, and I look forward to working with clients to navigate these challenges and uncover critical insights.”

David Griffith, Principal

Before joining HKA, David was a Senior Director of Forensic Technology Services at Alvarez & Marsal. He has a Bachelor of Science in Biomedical Science from Texas A&M University and a Master of Business Administration from the University of Houston. He is a licensed private investigator, a Certified e-Discovery Specialist, and a Relativity Master and Relativity Certified Administrator. He has also earned several other Relativity Specialist certifications.

View David’s Expert Centre Profile here.


Jared Lake, Principal
San Francisco, California

Jared Lake brings over 10 years of expertise in driving market expansion, building trusted partnerships, and solving complex problems to elevate brand visibility and achieve significant revenue results. 

He began his business development career in the technology sector, securing multi-million-dollar contracts and developing revenue optimization playbooks. Jared specializes in digital matters in technological sectors and has unique experience with advisory services, ERP implementation, digital forensics, compliance initiatives, eDiscovery, cybersecurity, data governance, and cross-border investigations (FCPA). 

“I’m thrilled to be joining HKA at such an exciting time. I look forward to collaborating with our dynamic business development team to tackle meaningful challenges together and deliver significant outcomes for our clients and our partners.”

Jared Lake, Principal

Before joining HKA, Jared was a Senior Advisor of Business Development at BPM, LLP. He holds a Bachelor of Arts in Psychology from the University of San Francisco and has held a Certified e-Discovery Specialist, a Cisco Certified Internetwork Expert, and a Relativity eDiscovery Platform certificate. 


Phu Nguyen, Associate Director
Washington, DC

Phu Nguyen has over 20 years of experience in digital forensics, eDiscovery, and data analytics. His forensic expertise includes various digital devices, storage media, servers, networks, and cloud-based services, as well as data collection, analysis, extraction, and evidence control and processing to support litigation.

Applying a compelling combination of investigative, business, and technical skills, Phu has managed large-scale forensic preservations of computers, mobile devices, cloud-based data sources, and network infrastructure for domestic and international corporate investigations and forensics processes.

“With more than two decades of experience in digital forensics, eDiscovery, and data analytics, I’m pleased to bring my skills to this new role in Washington, DC. I look forward to helping clients navigate complex digital investigations and deliver meaningful outcomes with confidence.”

Phu Nguyen, Associate Director

Before joining HKA, Phu was Vice President of Advanced Forensic Investigative Solutions LLC. He earned a Bachelor of Science in Decision Science and Management Information Systems from George Mason University.


HKA’s Digital Forensics and Data Solutions professionals specialize in the collection, analysis, investigation, discovery, tracing, and governance of digital data. The team has extensive experience delivering expert insights into the expansive realm of digital evidence. They excel at supporting organizations, law firms, and government agencies as they navigate the complexities of digital investigations, including eDiscovery, advanced analytics, high-tech crime, blockchain forensics, and cybersecurity. HKA’s services also address data privacy, governance, and compliance, providing reliable, actionable findings to meet litigation, regulatory, and security challenges.

Learn more about HKA’s Digital Forensics and Data Solutions expert services. 

 

Media contact

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
EmailAndrewKatz@hka.com

​​​HKA welcomes Dr. Gangjin Li to its Forensic Technical Services practice 

News

​​​HKA welcomes Dr. Gangjin Li to its Forensic Technical Services practice 

HKA is pleased to welcome Dr. Gangjin Li as a Director on its Forensic Technical Services team in Dallas, Texas.  

Dr. Li is a geotechnical engineer with 15 years of consulting and academic research experience in civil infrastructure. He has worked on over 60 large-scale transportation projects throughout North America, requiring in-depth expertise in geotechnical analysis and design, forensic investigation, opportunity and risk assessments, peer review, and technical report preparation. 

Dr. Li’s experience extends to numerical modeling, slope stabilization, and landslide mitigation. He is knowledgeable in the design of spread footings, driven piles, and drilled shafts for bridge and retaining wall foundations; the geotechnical design of earth-retaining structures, including cast-in-place concrete walls, mechanically stabilized earth walls, and sound walls; and short- and long-term settlement analysis for foundations and earth fills. 

Additionally, he has conducted seismic hazard evaluations and structural vulnerability assessments and is experienced with constructability reviews, the selection of construction means and methods, and temporary works design. 

“We are thrilled to welcome Dr. Li to our Forensic Technical Services team. His wealth of experience as a geotechnical engineer brings incredible expertise and insight to our organization. With Dr. Li on board, we are excited to expand our capabilities and provide enhanced services to our valued clients.”

Mike Griffin, Partner, Forensic Technical Services Lead, Americas 

Dr. Li holds a Doctor of Philosophy in Geotechnical Engineering from the University of Nevada, Reno, as well as a Master of Science in Bridge and Tunnel Engineering and a Bachelor of Science in Civil Engineering from Tongji University in China. He is a licensed Professional Engineer in Alabama, California, Maryland, Nevada, New York, North Carolina, Texas, Virginia, and Washington. 

View Dr. Li’s Expert Centre profile here.  

HKA’s forensic engineering, architectural, and technical experts provide expert advisory, expert determination, and expert witness services for clients worldwide. Depending on the assignment, the firm’s technical specialists act as sole experts within a specialized technical team or collaborate with other experts in complementary disciplines such as quantum, delay, forensic accounting, and commercial damages, known as HKA’s multidisciplinary service.  

Learn more about HKA’s Forensic Engineering, Architectural, and Technical Expert Services.  

Media contact

NameAndrew J. Katz, CPSM
TitleMarketing and Communications Director, Americas
Number+1 215 962 1136
EmailAndrewKatz@hka.com

The limits of secure messaging: Signal, forensic recovery, and lessons from the airstrike chat leak

Article

The limits of secure messaging: Signal, forensic recovery, and lessons from the airstrike chat leak

Michael Bandemer

Partner, Head of Digital Forensics and Data Solutions

michaelbandemer@hka.com

+1 858-832-8844

Expert Centre Profile

Geo Brown

Partner

geobrown@hka.com

+1 858-832-8844

Expert Centre Profile

The recent airstrike chat leak has brought renewed attention to the risks of digital communications, particularly the forensic traceability of messaging platforms. For attorneys handling litigation, investigations, or compliance matters, understanding how secure messaging apps store, retain, and expose data is essential, especially as encrypted communications become standard practice in corporate, legal, and governmental settings. 

One of the most frequently discussed platforms is Signal, often regarded as the gold standard for private communication. While its end-to-end encryption and minimal metadata retention make it far more secure than alternatives like WhatsApp, Telegram, or Microsoft Teams, the notion that Signal leaves no forensic trace is a misconception. In legal and forensic contexts, the reality is more nuanced. If a full file system image is obtained using tools like Magnet Graykey™ or Magnet Verakey™, and the keychain is extracted, the Signal database can be decrypted, allowing access to active (non-disappearing) messages, calls, and attachments.

This article explores how Signal compares to other messaging platforms, what forensic artifacts can be recovered, and why legal teams should carefully assess how confidential communications are handled.

Signal vs. other messaging platforms

FeatureSignalWhatsAppTelegramMicrosoft Teams
End-to-End Encryption (E2EE)Always onOn by defaultOptional (secret chats only)Not on by default
Message StorageDevice-only (unless extracted with keychain)Device & cloud backupsDevice & cloud (non-secret chats)Cloud-based, admin-controlled
Metadata LoggingMinimal (last online only)Stores sender/receiver, timestampsStores sender/receiver, timestampsExtensive logs, accessible to admins
Message RetentionDisappearing messages availableCloud backups (if enabled)Logs persist unless deletedRetained by organization
Forensic RecoverabilityPossible if full file system image & keychain obtainedFull chat logs retrievablePartial chat logs retrievableFull conversation history retrievable

Forensic recovery of Signal data: What is possible?

Despite Signal’s strong encryption and security features, forensic practitioners can decrypt its database under specific conditions:

With standard forensic extraction methods (logical, partial file system imaging)

Recoverable artifacts:

  • App installation logs
  • Last active timestamps
  • Push notification logs (temporary message previews may persist on Android)

 Not recoverable:

  • Message content (remains encrypted)
  • Call history (not stored in standard call logs)
  • Contacts and chat history (never stored on Signal servers)

With full file system imaging (Magnet Graykey™, Magnet Verakey™) and keychain extraction

Decrypted artifacts:

  • Active (non-disappearing) messages
  • Call logs
  • Attachments (images, videos, files)
  • Contact information (names/numbers associated with chats)

Still not recoverable:

  • Disappearing messages (deleted at operating system level if expired before acquisition)
  • Cloud backups (Signal does not store these)

TAKEAWAY

While Signal minimizes forensic traces under normal conditions, if the full file system is imaged and the keychain is decrypted, the Signal database becomes accessible, making it as recoverable as other encrypted messaging apps for active messages.

Forensic recovery of Signal data: What is possible?

The leak of military airstrike discussions highlights operational security (OPSEC) failures and the risks of using messaging platforms that leave forensic footprints. Forensic recovery would have been significantly limited if these communications had taken place on Signal with disappearing messages enabled.

From a forensic standpoint, this case underscores:

The importance of understanding keychain security: Without it, even encrypted messaging apps are vulnerable to forensic analysis.

Why disappearing messages matter: Standard extractions can miss ephemeral data, but full file system images do not.

The dangers of cloud backups: Most platforms allow cloud storage, which exposes conversations to remote access and subpoenas.

Operational security failures: Poor messaging hygiene can compromise even encrypted conversations.

Key takeaways for forensic investigators

  1. Signal is not immune to forensic recovery – with a full file system image and extracted keychain, investigators can decrypt messages, calls, and attachments.
  2. Platforms like WhatsApp, Telegram, and Teams retain far more forensic evidence in cloud backups and accessible databases.
  3. Disappearing messages remain the best countermeasure against forensic recovery – if they expired before the acquisition, they are effectively gone.
  4. Investigators must educate clients on secure communication practices – understanding forensic limitations can enhance investigative techniques and OPSEC for high-risk users.

The airstrike chat leak was preventable. Understanding the forensic recoverability of messaging apps is crucial – not just for forensic practitioners but for anyone handling classified, sensitive, or high-risk communications.

Please contact us if you would like to discuss secure communication analysis or forensic extraction techniques or visit our website for more information about our Digital Forensics and Data Solutions services.

Michael Bandemer has more than 20 years of experience leading the preservation, forensic collection, analysis, and search of electronically stored information (ESI) and forensic artifacts in more than 1,000 matters ranging from corporate/federal investigations to commercial litigation. He has provided expert witness and strategic consulting services to law firms and corporate clients in the areas of computer forensics, investigations, electronic discovery, data analytics, and data privacy/data breaches. 

View Michael’s Expert Centre profile here.

Geo Brown has over 25 years of experience in information technology and more than 18 years of experience in digital forensic collection and analysis, data analytics, investigations, and electronic discovery. He has opined, directed, managed, and conducted in-depth analyses on hundreds of complex matters in various industries. Geo’s strategic guidance and comprehensive analysis have assisted clients in safeguarding their intellectual property, maintaining competitive advantages, and navigating intricate legal and business landscapes.

View Geo’s Expert Centre profile here.

This article presents the views, thoughts, or opinions only of the author and not those of any HKA entity. The information in this article is provided for general informational purposes only. While we take reasonable care at the time of publication to confirm the accuracy of the information presented, the content is not intended to deal with all aspects of the referenced subject matter, should not be relied upon as the basis for business decisions, and does not constitute legal or professional advice of any kind. HKA Global, LLC is not responsible for any errors, omissions, or results obtained from the use of the information within this article. This article is protected by copyright © 2025 HKA Global, LLC. All rights reserved.

 

X

Follow HKA on WeChat

关注我们的官方微信公众号

HKA WeChat