Langley, BC
(604) 800-9060
Teradrive Forensics
Cryptocurrency tracing in matrimonial cases

Cryptocurrency tracing in matrimonial cases

How forensic teams discover hidden cryptocurrency in Canadian divorce matters, including device examination, on-chain tracing, and exchange subpoena workflow.

Published May 1, 2026Updated Apr 1, 202610 min read

Hidden cryptocurrency in a Canadian matrimonial matter is discoverable through three combined approaches: forensic examination of the suspected spouse's devices for wallet and exchange-app artifacts, analysis of bank records for fiat-to-crypto on-ramp transactions, and on-chain tracing supported by exchange subpoenas where funds have moved to centralized platforms. The combination usually surfaces holdings the spouse believed were undiscoverable. This guide walks through the workflow, the artifacts that matter, and how to coordinate with family law counsel.

Table of contents

  1. Why crypto matters in family law in 2026
  2. Indicators that hidden crypto may be in play
  3. Device-level forensic examination
  4. Bank record analysis
  5. On-chain tracing
  6. Exchange subpoena workflow
  7. Working with family law counsel
  8. FAQ

1. Why crypto matters in family law in 2026

Cryptocurrency adoption in Canada is mainstream. Coinbase, Kraken, Binance, Bitbuy, Newton, Wealthsimple, and others operate Canadian-resident accounts at scale. A meaningful fraction of Canadian household balance sheets includes some crypto exposure.

For matrimonial matters, this creates a discovery challenge. Crypto holdings are easier to hide than traditional bank accounts. The wallet does not appear on a credit report. The exchange account does not generate a paper statement unless requested. The blockchain transactions are public, but only if you know which addresses to look at.

Family law counsel are seeing more matters where one spouse suspects undisclosed crypto holdings. The forensic toolkit for these matters has matured significantly.

2. Indicators that hidden crypto may be in play

Common red flags:

  • Bank transactions to known crypto on-ramps. E-transfers to Bitbuy, Newton, NDAX, or Wealthsimple Crypto. Wire transfers to Coinbase Canada or other exchanges.
  • Unusual cash withdrawals at frequencies or amounts that do not match historical patterns.
  • Crypto-app installs found during examination of the spouse's phone or laptop (MetaMask, Coinbase, Binance, Trust Wallet, Phantom).
  • Browser activity to crypto exchange sites, blockchain explorers, or wallet management tools.
  • Email confirmations from exchanges in the spouse's mailbox.
  • Hardware wallet purchases in credit card or amazon order history (Ledger, Trezor).
  • Mentions of crypto in the spouse's text messages, email, or social media activity.

Any one of these can be innocent. Two or more together justify a forensic look.

3. Device-level forensic examination

Forensic examination of the suspected spouse's devices is usually the highest-yield starting point. Devices to examine, where lawful access can be obtained:

  • Phone. Wallet apps, exchange apps, browser history, message threads, photos (sometimes including screenshots of seed phrases), notes app entries.
  • Laptop or desktop. Browser-based wallet extensions (MetaMask in Chrome or Firefox), saved exchange logins, downloaded wallet files, screenshots, document files.
  • Tablet or other shared devices. Same artifact set as above.
  • Hardware wallets if available. Hardware wallets do not hold the keys readable by software, but their existence and serial numbers can be documented.

The key artifact for tracing is the wallet address. Once we have a wallet address, we can move to on-chain analysis.

For matters where the device is not in the spouse's possession (it is jointly owned, or court order permits access), forensic acquisition follows our standard methodology. For matters where access is contested, counsel will need to obtain a preservation order or production order before forensic work begins.

4. Bank record analysis

Bank records are the second source. Patterns to look for:

  • Outgoing transfers to crypto exchanges. E-transfers to Bitbuy or Newton are particularly common in the Canadian market.
  • Wire transfers to international exchanges (Coinbase, Binance, Kraken).
  • Recurring purchases suggesting a dollar-cost-averaging crypto investment program.
  • Unexplained cash withdrawals that may indicate over-the-counter crypto purchases.

The bank record analysis usually surfaces the entry points. From there, we know which exchanges to subpoena and approximately when the spouse first started accumulating crypto.

5. On-chain tracing

Where we have a wallet address, on-chain tracing reconstructs the flow of funds across blockchains. We use commercial blockchain analytics tools (Chainalysis Reactor, TRM Labs, Elliptic) for the heavy lifting.

The trace can establish:

  • The total funds that flowed through the wallet over a specified time period.
  • The destination wallets, exchanges, or services that received funds.
  • The current balance at the wallet address.
  • Attribution of related wallets that appear to be controlled by the same entity.
  • Cross-chain movements through bridges, DEXs, or wrapped-asset services.

The output is a transaction graph with annotations. For court use, we structure the graph and underlying transaction data into an examiner report and (if needed) an affidavit.

6. Exchange subpoena workflow

Where funds have moved to a centralized exchange (Coinbase, Kraken, Binance, Bitbuy, Newton), the next step is usually a subpoena or production order directed at the exchange.

Major Canadian-facing exchanges have established legal-process pages with documented contact paths. We prepare a tracing memo that supports the subpoena: which addresses are at issue, what transactions hit the exchange, what timeframe is relevant, and what records the exchange is likely to hold.

Counsel drafts and serves the subpoena. The exchange's response usually includes:

  • Account holder identification (KYC records).
  • Account opening date.
  • Transaction history.
  • Linked bank accounts.
  • IP addresses and devices used.

This is often the decisive step. Once the exchange records confirm account ownership and transaction history, the spouse's denial collapses.

7. Working with family law counsel

Crypto matters in family law have a few characteristics that shape how we work with counsel:

  • The legal anchor is essential. We accept matrimonial engagements only where there is an active or imminent legal proceeding.
  • Privilege framing. Engagements through counsel support a litigation-privilege claim over the forensic work.
  • Disclosure timing. Counsel decides when and how the forensic findings are introduced into the family law proceeding (interrogatories, examination for discovery, expert affidavit).
  • Cost discipline. Family matters often have tighter cost constraints than commercial litigation. We give a written estimate at scoping and bill against it.
  • Sensitivity. Family matters are not commercial litigation. We approach every engagement with the awareness that the people involved are under stress.

Reference: Family Law Act of British Columbia. Office of the Privacy Commissioner of Canada, virtual currencies.

8. FAQ

Q: How do you discover hidden cryptocurrency in a divorce? A: Through forensic examination of devices, bank record analysis for fiat-to-crypto transactions, on-chain tracing of any addresses surfaced, and exchange subpoenas where funds have moved to centralized platforms.

Q: Can stolen Bitcoin be traced and recovered? A: Bitcoin is traceable. Recovery is a separate question that usually requires legal process against an exchange where the funds landed.

Q: Are crypto exchange records admissible in Canadian court? A: Yes, when properly produced through subpoena or production order and authenticated under section 31.1 of the Canada Evidence Act.

Q: Can transactions through a mixer or tumbler still be traced? A: Often yes, but with reduced confidence. Modern mixer analysis is supported by commercial tools.

Q: How long does a typical matrimonial crypto investigation take? A: A defined-scope investigation (one device, one or two suspected exchanges) typically takes three to six weeks from intake. More complex matters take longer.

Related posts

CTA strip

Headline: Suspect hidden crypto in a family law matter? Primary CTA: Book a confidential consultation Secondary text: Or call (604) 800-9060


Frequently asked

How do you discover hidden cryptocurrency in a divorce?
Through forensic examination of devices, bank record analysis for fiat-to-crypto transactions, on-chain tracing of any addresses surfaced, and exchange subpoenas where funds have moved to centralized platforms.
Can stolen Bitcoin be traced and recovered?
Bitcoin is traceable. Recovery is a separate question that usually requires legal process against an exchange where the funds landed.
Are crypto exchange records admissible in Canadian court?
Yes, when properly produced through subpoena or production order and authenticated under section 31.1 of the Canada Evidence Act.
Can transactions through a mixer or tumbler still be traced?
Often yes, but with reduced confidence. Modern mixer analysis is supported by commercial tools.
How long does a typical matrimonial crypto investigation take?
A defined-scope investigation (one device, one or two suspected exchanges) typically takes three to six weeks from intake. More complex matters take longer.

Need digital evidence handled defensibly?

Book a confidential consultation. Our team will reach out as soon as possible.