The Antivirus Expired. 42 Million Records Didn't.
The PhilHealth breach was not a mystery. It was a maintenance failure, an expired antivirus subscription, and a warning about how institutional cybersecurity actually breaks down.
Read essayEssays, analysis, and commentary from Ferdie James Nervida.
Selected writing on investigations, cybercrime, and digital systems.
The PhilHealth breach was not a mystery. It was a maintenance failure, an expired antivirus subscription, and a warning about how institutional cybersecurity actually breaks down.
Read essayYou can't track the token. But you can track the mistakes. This groundbreaking analysis reveals how investigators follow the money through Monero's privacy layer by profiling human behavior patterns.
Read essayThe goal isn’t always to win the battle. It’s to map the terrain, tighten the net, and wait for the one slip that gives everything away.
Read essayIn 2017, global investigators quietly launched a case that would unravel one of the darkest corners of the internet. Using only open-source blockchain data and forensic techniques like clustering, they traced payments and kicked down digital doors in 38 countries.
Read essayWhy the blockchain is trustless, but the trading ecosystem still needs rules. A deep dive into the myth of total decentralization and the human psychology driving crypto markets.
Read essayAcademia loves to believe it is the gatekeeper of innovation. It wasn't. In 2008, an anonymous figure named Satoshi Nakamoto dropped a nine-page PDF into an obscure cryptography mailing list—and the world changed forever.
Read essayThe address looked ordinary. No label. No history I could rely on. But something didn't add up. This wasn't a whale or a scammer—this was infrastructure. Most likely, an exchange.
Read essayRecently, ZachXBT shared a great list of tools he uses for blockchain investigations and open source intelligence (OSINT) work. Here's my own working toolkit for tracing wallets, scams, laundering ops, and wallet attribution.
Read essayWhen Tornado Cash walked free, it reignited an old argument: How private can programmable money really be? Here's how investigators unravel crypto privacy tactics.
Read essayThey've stolen over $2 billion in crypto, yet no one can say with certainty who's really behind them. The Lazarus Group is the boogeyman of the crypto world — North Korea's elite cyber unit blamed for history's boldest digital heists.
Read essayIn an age where software can challenge governance systems, we need to rethink the way we view code. Lawrence Lessig's famous phrase "Code is Law" clearly captured an idea that software architecture has the power to regulate human behavior just as powerfully as any legal framework.
Read essayCryptocurrencies, with Bitcoin leading the charge, have long been hailed as the champions of decentralization in the financial world. But as we dig deeper into the realities of how these systems operate, a paradox emerges.
Read essayI'm a blockchain forensics expert specializing in cryptocurrency investigations, cybercrime analysis, and digital security. With years of experience in uncovering complex financial crimes and tracing digital assets, I provide insights that bridge the gap between technology and law enforcement.
My work has been featured in major publications and has helped solve some of the most challenging cases in the cryptocurrency space.
Learn More About My Work