Schroebel and Schrooten cases related for one trial
It appears many of the indictment charges against Christoph
er and David are similar. These are always intriguing cases since the evidence appears mostly circumstantial. This case may have some common ground with a hacker trial a few years ago in a Seattle. Here’s an exert from an analysis done by Philip Attfield after the USA vs. Gorshkov trial in which the government got a conviction.
5.1 Establishing the link between “digital” and “human” domains
Digital data is not human and bears no relation to the entity or human that might have
caused their creation – there are no human fingerprints in cyberspace. The primary strategy
underlying the presentation of computer data and its forensic analysis is to demonstrate a
connection between material from the “digital domain” and the real world where flesh-andbone
The F.B.I. did not witness Mr. Gorshkov typing at the keyboard of “tech.net.ru” in
Chelyabinsk when intrusions took place at computers belonging to the victims associated with
the case. They did however learn first-hand of “tech.net.ru” hacking exploits during the Invita
undercover. They also learned of incidents for which Mr. Gorshkov claimed responsibility.
The trial needed to demonstrate the connection between Mr. Gorshkov’s interview at the
Invita undercover, the data downloaded from “tech.net.ru” and the testimony and data
obtained from victims.
The forensic analysis of the reconstructed “tech.net.ru” and “freebsd.tech.net.ru” systems
showed that somebody (“kvakin”) had knowledge and significant control of those computers.
The keystroke log captured the login of “kvakin” on “tech.net.ru” and “freebsd.tech.net.ru”
during the undercover. Statements made during the Invita undercover in relation to victims
and incidents demonstrated Mr. Gorshkov’s knowledge and involvement. The undercover
keystroke log demonstrated Mr. Gorshkov’s knowledge and control of the digital domain (he
logged into “tech.net.ru” and retrieved a hacking tool). Forensic analysis of the downloaded
data as well as data obtained from victims strengthened the link between Mr. Gorshkov and
the “tech.net.ru” criminal activities – it placed him within the context of the greater body of
Schrooten court docket out
Schrooten indictment out
David B. Schrooten, alledged to be Fortezza, Xakep, Empirion, and Echelon arrested in Cluj Romania.
March 13 IM
David is feeling pressure and says he’s heading to Romania.
Xakep: my american friend will probably become hot news
Xakep: sooner or later in your country
Xakep: he already was last year
anondis5: if’s he’s targeted, yes.
Xakep: but yes
Xakep: i admit
Xakep: i’m lost
anondis5: is it Interpol or USSS?
Xakep: united states secret service
Xakep: and fbi
Xakep: he told me fbi sucked
Xakep: but secret service was good
anondis5: well..those agencies compete a bit.
anondis5: both have specific agenda’s to cuff u
Xakep: i know
Xakep: i talked with tinkode
Xakep: before he got arrested
Xakep: literally 24 hours
Xakep: before his arrest lol
Xakep: i talked with so many people that are being extradited to usa
Xakep: my nickname is probably all over them
anondis5: which nik?
anondis5: why did u pick that name? and echelon?
Xakep: Why do you think
anondis5: I’m asking u
Xakep: You know
Xakep: the meaning of those names
anondis5: more or less
This was the first time the name Fortezza was ever mentioned. It’s still not a 100% confirmation as many of the admin posts signed by Fortezza at kurupt.su were written by multiple people.
*As I’m still developing the Fortezza profile, I’d be appreciative of any information that may help this project. I can be reached confidentially and or anonymously at email@example.com