{"id":1837,"date":"2026-03-19T13:11:08","date_gmt":"2026-03-19T12:11:08","guid":{"rendered":"https:\/\/finanz-forensik.de\/?p=1837"},"modified":"2026-03-19T13:11:10","modified_gmt":"2026-03-19T12:11:10","slug":"crypto-fraud-what-forensic-blockchain-analysis-can-do-for-lawyers","status":"publish","type":"post","link":"https:\/\/finanz-forensik.de\/en\/kryptobetrug-was-forensische-blockchain-analyse-fuer-rechtsanwaelte-leistet\/","title":{"rendered":"Crypto fraud: What forensic blockchain analysis can do for lawyers"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1837\" class=\"elementor elementor-1837\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e67e032 e-con-full e-flex e-con e-parent\" data-id=\"3e67e032\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c341f82 elementor-widget elementor-widget-text-editor\" data-id=\"3c341f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"p1\">Court-admissible expert reports, OSINT investigations and cash flow diagrams<\/h2><p class=\"p1\">Crypto fraud is among the most challenging cases in legal practice: The perpetrators are anonymous or located abroad, the transactions are technically complex, and classic investigative approaches \u2013 IP addresses, email accounts, telephone numbers \u2013 often prove ineffective. What is usable, however, is the blockchain data itself. Every transaction is permanently, publicly, and immutably stored. <a href=\"https:\/\/finanz-forensik.de\/en\/financial-forensics-for-lawyers\/\">Financial forensics supports lawyers<\/a> with court-admissible crypto forensics reports, OSINT investigations and money flow diagrams \u2013 as specialized forensic support.<\/p><h2 class=\"p3\">Why traditional investigative approaches reach their limits in crypto fraud cases<\/h2><p class=\"p4\">In cases of cryptocurrency fraud, perpetrators consistently employ layers of obfuscation: changing domain names, prepaid SIM cards, VPN services, and forged identity documents. A criminal complaint based solely on these leads usually comes to nothing. Public prosecutors are overburdened and rarely possess their own blockchain forensics capabilities. Without a properly prepared transaction record, it can take months for investigators to take action\u2014by which time the perpetrators have long since moved the funds elsewhere.<b><\/b><\/p><p class=\"p4\">The key lever is the blockchain itself. While cryptocurrencies are often mistakenly considered anonymous, they are merely pseudonymized. Every transaction, including timestamp, amount, sender and recipient addresses, is permanently stored in the blockchain \u2013 and thus accessible for forensic analysis, provided one has the right tools and the necessary expertise.<\/p><h2 class=\"p3\">What a crypto forensics report actually achieves<\/h2><p class=\"p4\">A court-admissible blockchain analysis report is more than just a list of transactions. It maps the complete flow of funds \u2013 from your client&#039;s deposit wallet through intermediate wallets to the final destination wallet, often on a regulated cryptocurrency exchange like Binance, Kraken, or OKX. The result is a structured money flow diagram that makes the facts immediately comprehensible to law enforcement and courts.<b><\/b><\/p><p class=\"p4\"><b>Specifically, a <a href=\"https:\/\/finanz-forensik.de\/en\/services\/#krypto\">forensic report<\/a> typically:<\/b><b><\/b><\/p><ul class=\"ul1\"><li class=\"li7\"><b>Wallet analysis: <\/b>Examination of all relevant wallet addresses, including clustering \u2013 i.e., the assignment of multiple addresses to a common controller through behavioral pattern analysis.<\/li><li class=\"li7\"><b>Transaction tracking: <\/b>Complete tracking of the money flow across all intermediaries. Mix services, chain hopping, and privacy coin conversions are also recorded and documented to the extent technically possible.<\/li><li class=\"li7\"><b>Address assignment: <\/b>Identification of known wallet addresses \u2013 such as those of regulated exchanges, sanctioned entities, or known fraud infrastructures \u2013 using specialized tools like Crystal Intelligence and MetaSleuth.<\/li><li class=\"li7\"><b>Documentation admissible in court: <\/b>Preparation of all results in a structured report with a graphical cash flow diagram, which can be submitted as an attachment to a criminal complaint or as evidence in civil proceedings.<\/li><\/ul><p class=\"p7\">This report enables prosecutors and courts to act immediately: to block wallets, request information from exchanges, and freeze assets. Without it, authorities must conduct the analysis themselves \u2013 which can take weeks or even months.<\/p><h2 class=\"p3\">OSINT investigations: Identifying perpetrators beyond the blockchain<\/h2><p class=\"p4\">Blockchain data alone does not identify a person \u2013 it shows addresses, not names. To break pseudonyms and make perpetrators apprehended, <a href=\"https:\/\/finanz-forensik.de\/en\/services\/#osint\">Open Source Intelligence (OSINT) investigations<\/a> necessary. This involves systematically evaluating publicly available information from the clearnet, deepnet, and darknet and correlating it with blockchain data.<b><\/b><\/p><p class=\"p4\"><b>Typical OSINT approaches in crypto fraud cases include:<\/b><b><\/b><\/p><ul class=\"ul1\"><li class=\"li7\"><b>Domain and infrastructure analysis: <\/b>Registration data, hosting providers and technical fingerprints of fake platforms can allow conclusions to be drawn about perpetrator structures.<\/li><li class=\"li7\"><b>Social media and communication analysis: <\/b>Fake profiles, Telegram groups, WhatsApp accounts and other communication channels of the perpetrators are being systematically evaluated.<\/li><li class=\"li7\"><b>Darknet monitoring: <\/b>Examination of relevant marketplaces and forums for indications of fraud infrastructures, compromised data or backgrounds of the crimes.<\/li><li class=\"li7\"><b>Tool-supported analysis: <\/b>Use of specialized OSINT platforms such as Maltego to link and visualize information from heterogeneous sources.<\/li><\/ul><p class=\"p7\">The combination of blockchain forensics and OSINT provides a more complete picture of the situation \u2013 and gives prosecutors and courts the starting points that pure transaction data cannot offer.<\/p><h2 class=\"p3\">Typical scenarios in crypto fraud<\/h2><p class=\"p4\">In forensic practice, certain case patterns occur particularly frequently. For lawyers, it is helpful to know which scenarios are actually forensically actionable \u2013 and where the limits lie:<b><\/b><\/p><ul class=\"ul1\"><li class=\"li7\"><b>Fake investment platforms: <\/b>Victims transfer fiat currency or cryptocurrency to the perpetrators&#039; accounts or wallets. The flow of funds is often easily traceable on the blockchain, as the perpetrators frequently withdraw the funds through regulated exchanges.<\/li><li class=\"li7\"><b><a href=\"https:\/\/finanz-forensik.de\/en\/crypto-fraud-and-pig-butchering-financial-forensic-analysis-of-modern-fraud-schemes\/\">Pig Butchering<\/a> \/ Romance Scam: <\/b>Victims make multiple deposits over several weeks. The correlation between different deposits and their consolidation into perpetrator wallets can be forensically documented.<\/li><li class=\"li7\"><b>Phishing and wallet compromise: <\/b>Stolen crypto assets are moved immediately after being accessed. A rapid forensic response is crucial, as perpetrators often distribute funds within hours.<\/li><li class=\"li7\"><b>Rug pull and DeFi fraud: <\/b>Smart contract-based fraud cases require on-chain analysis of contract interactions that goes beyond traditional wallet analysis.<\/li><li class=\"li7\"><b>Money laundering investigations: <\/b>In criminal and civil proceedings related to money laundering, the origin of crypto assets can be proven or disproven through forensic analysis \u2013 relevant for both defense lawyers and the public prosecutor&#039;s office.<\/li><\/ul><p class=\"p7\">Important: Not every scenario lends itself equally well to forensic analysis. Privacy coins (Monero, Zcash) and highly complex mixing services can significantly complicate or even prevent analysis. A realistic preliminary assessment is part of our service.<\/p><h2 class=\"p3\">Proof of origin of funds: A frequently underestimated need<\/h2><p class=\"p4\">Not all cases where blockchain forensics is relevant involve victims of fraud. Lawyers specializing in banking and capital markets law, tax law, or compliance consulting increasingly require robust blockchain forensics tools. <a href=\"https:\/\/finanz-forensik.de\/en\/services\/#mittelherkunftsnachweise\">Proof of origin of funds<\/a> for crypto assets. Crypto exchanges, banks, and financial authorities require this documentation for KYC processes, account openings, or tax purposes.<b><\/b><\/p><p class=\"p4\">Financial Forensics creates professional proof-of-origin reports that document the origin of crypto assets, how they were acquired, and whether they came into contact with any criminal sources. The documentation is tailored to the specific requirements of exchanges and authorities and is GDPR-compliant.<b><\/b><\/p><p class=\"p4\">Forensic support is beneficial in crypto fraud cases as early as possible \u2013 ideally even before a criminal complaint is filed. The faster the analysis is initiated, the greater the chance of identifying funds on exchanges before they are moved further.<b><\/b><\/p><p class=\"p4\"><b>The typical interaction in practice:<\/b><b><\/b><\/p><ul class=\"ul1\"><li class=\"li7\"><b>Acceptance of mandate: <\/b>They take on the crypto fraud mandate and provide us with wallet addresses and transaction IDs.<\/li><li class=\"li7\"><b>Forensic initial assessment: <\/b>We examine the case and provide a realistic assessment of its feasibility from a forensic perspective \u2013 before any costs are incurred.<\/li><li class=\"li7\"><b>Expert report preparation: <\/b>We create the complete forensic report including money flow diagram, wallet clustering, and address mappings.<\/li><li class=\"li7\"><b>Legal processing: <\/b>They use the report as an attachment to a criminal complaint, as evidence in civil proceedings, or as a basis for blocking requests at stock exchanges.<\/li><\/ul><p class=\"p7\">For your clients who require direct forensic support as private individuals, our subsidiary brand is available. <a href=\"https:\/\/krypto-investigation.de\/\">Crypto Investigation<\/a> available.<\/p><h2>Conclusion<\/h2><p class=\"p4\">Conducting crypto fraud investigations without forensic support means working with a significant gap in evidence. Blockchain technology provides information of a quality unmatched by any other investigative tool. However, only those who professionally analyze this data, prepare it for court, and combine it with OSINT investigations can fully realize the potential of such investigations.<b><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-09be351 e-flex e-con-boxed e-con e-parent\" data-id=\"09be351\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-729b92f uael-faq-box-layout-yes align-at-left elementor-widget elementor-widget-uael-faq\" data-id=\"729b92f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"uael-faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id='uael-faq-wrapper-120' class=\"uael-faq-wrapper\">\n\t\t\t\t<div class=\"uael-faq-container uael-faq-layout-accordion\" data-layout=\"accordion\" >\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-c78350e\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-c78350e uael-question-span\" tabindex=\"0\" id=\"uael-faq-1-6a0f48a5a5423\">What distinguishes a forensic blockchain report from a simple transaction analysis?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">A simple transaction analysis merely lists movements within a wallet. A forensic report goes significantly further: It includes wallet clustering, address mapping to known entities, complete traceability of funds through intermediaries, and a structured money flow diagram. Crucially, the report must be presented in a legally admissible manner \u2013 comprehensible, reproducible, and with clear source citations.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-3ffed38\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-3ffed38 uael-question-span\" tabindex=\"0\" id=\"uael-faq-2-6a0f48a5a5446\">Is the expert opinion admissible in court and by the public prosecutor&#039;s office?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">Yes. The expert reports are designed for admissibility in court: comprehensible methodology, reproducible results, structured documentation. They can be submitted as an attachment to a criminal complaint, presented as evidence in civil proceedings, or provided to public prosecutors as a forensic basis for their work.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-8adba7d\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-8adba7d uael-question-span\" tabindex=\"0\" id=\"uael-faq-3-6a0f48a5a5458\">What information does Finanz Forensik GmbH need to start the analysis?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">The minimum requirements are the wallet address(es) to which your client transferred cryptocurrencies, as well as the transaction IDs of the relevant payments. The more additional information available \u2013 platform name, cryptocurrency used, approximate time periods, communication with perpetrators \u2013 the more precise the analysis can be.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-c3b1090\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-c3b1090 uael-question-span\" tabindex=\"0\" id=\"uael-faq-4-6a0f48a5a5468\">What happens if the funds have already been transferred to privacy coins or mixing services?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">Privacy coins like Monero and highly complex mixing services can significantly complicate or even completely prevent tracking. In such cases, the initial forensic assessment realistically evaluates the potential scope of the analysis. Even then, OSINT investigations often provide additional leads.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-e9caeca\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-e9caeca uael-question-span\" tabindex=\"0\" id=\"uael-faq-5-6a0f48a5a5477\">Can blocking requests be filed directly with cryptocurrency exchanges by financial forensics?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">Financial forensics identifies illicit funds on exchanges and prepares the necessary technical information for blocking requests. The formal submission of these requests is handled by the appointed lawyer or law enforcement agency. Experience shows that cryptocurrency exchanges respond significantly faster to letters from lawyers with an attached forensic report than to informal inquiries.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-c9db272\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-c9db272 uael-question-span\" tabindex=\"0\" id=\"uael-faq-6-6a0f48a5a5485\">How does forensic work relate to the GDPR?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">All analyses are conducted in compliance with the GDPR. Blockchain data is publicly accessible and its collection is generally unproblematic from a data protection perspective. For OSINT investigations involving personal data, the relevant data protection requirements are observed. The documentation is designed to be used even in data protection-sensitive processes.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"uael-accordion-f8fc5e3\" class=\"uael-faq-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t\t<div class= \"uael-accordion-title\" aria-expanded=\"false\" role=\"tab\">\n\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon uael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-closed\"><i class=\"fas fa-angle-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"uael-accordion-icon-opened\"><i class=\"fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"uael-question-f8fc5e3 uael-question-span\" tabindex=\"0\" id=\"uael-faq-7-6a0f48a5a5492\">When should I, as a lawyer, involve forensic support?<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"uael-accordion-content\" role=\"tabpanel\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<span><p class=\"p1\">As early as possible \u2013 ideally even before filing a criminal complaint. The faster the analysis begins, the higher the chance of identifying funds on stock exchanges before they are moved further. An early forensic assessment also provides you with a solid basis for discussions with clients about realistic prospects of success.<\/p><\/span>\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Without a forensic basis, any criminal complaint for crypto fraud remains incomplete. This article explains what a court-admissible blockchain report provides, how OSINT investigations enable perpetrator identification, and when forensic support is crucial in a case.<\/p>","protected":false},"author":2,"featured_media":1855,"menu_order":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/comments?post=1837"}],"version-history":[{"count":17,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1837\/revisions"}],"predecessor-version":[{"id":1856,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/posts\/1837\/revisions\/1856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/media\/1855"}],"wp:attachment":[{"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/media?parent=1837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/categories?post=1837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/finanz-forensik.de\/en\/wp-json\/wp\/v2\/tags?post=1837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}