Part of the CustodyStress archive of observed Bitcoin custody incidents
CS-01336
Legal authority constraint — hardware wallet (2025)
BlockedCase description
A US district court ruled in February 2025 on a civil forfeiture case involving Bitcoin seized from a defendant who was acquitted of the underlying criminal charges. The court ruled that acquittal on criminal charges did not automatically require return of seized Bitcoin under civil forfeiture standards, which applied a lower burden of proof. The ruling highlighted how civil forfeiture mechanisms created a distinct access blockage pathway independent of criminal proceedings—a holder whose Bitcoin was seized pursuant to a civil forfeiture action could have their funds permanently transferred to government ownership without ever being convicted of any crime.
Custody context
| Stress condition | Legal or authority constraint |
| Custody system | Hardware wallet (single key) |
| Outcome | Blocked |
| Documentation | Unknown |
| Year observed | 2025 |
| Country | United States |
Structural dependencies observed
What this illustrates
Before anyone could access the funds, a legal process had to be completed first. Access was not recoverable.
Outcome interpretation
Access was not possible under the reported conditions.
Source
Publicly Reported
Evidence type
News article
Evidence link
Related cases involving legal or authority constraint
39 cases involve legal or authority constraint
274 cases involve hardware wallet (single key)
View archive statistics →
This archive documents observed custody survivability failures. It does not attempt to document all Bitcoin losses or security incidents.
Submit a case
← All cases
Framework references
Where Bitcoin Custody Intersects Legal and Fiduciary Authority
Where custody creates gaps in estate planning, fiduciary duty, and professional responsibility.
Professional Scope Boundary Matrix
What each professional or product covers, what they do not, and where gaps form between them.
The Independent Assessment Layer in Bitcoin Custody
How independent diagnostic layers emerge when multiple parties depend on shared infrastructure.