http://i.imgur.com/56ZijwD.png Today is the first day of trial for the now 21 year old Danish man that is on trial along with the Pirate Bay founder Gottfrid Svartholm “Anakata" Warg, for allegedly breaching the system of the NSA fork company CSC, that handles most official government data for the Danish state, and included the data for the Danish police. The “evidence” in the case is a chat log between two people from February 12 – 14, 2012 where the Danish man, allegedly calling himself “Advanced Persistent Terrorist Threat” sends hacked user accounts with access to the CSC databases to another person believed to be Warg under the alias “My Evil Twin”. For the next almost 5 months the two are accused to be accessing the CSC databases and copying data to unknown locations. The company itself claims to have no knowledge of the breach and have said they were unaware that anyone unauthorized was accessing their system. The intruders have access to police records, tax records, records of the department of motor vehicles and data from the European Schengen police cooperation. The prosecutor states that data have been downloaded to IP addresses in Germany, Cambodia and Iran, but have no further proof or knowledge about if the data have been used, sold or what has happened to it. On August 30, 2012 Gottfrid “Anakata" Warg is arrested by Swedish police in his apartment above the Cadillac Bar & Grill in the Cambodian capital Phnom Penh, and according to the state prosecutor the unauthorized access to the CSC data ends at the same time. Warg is accused by Swedish police to having gained unauthorized access to the company Logica, that handles a lot of the Swedish government data. They confiscate his worn out Macbook Pro that's missing six keys, and have been setup as a access point for remote connections. The hard drive is encrypted but Danish authorities data forensics are later on able to use a truecrypt vulnerability where the laptops sleep function of closing and opening the lid, reveals credentials needed to decrypt the device. The Swedish police recovers logs that involve the breach into the CSC system, and alert Danish authorities about the unauthorized access. It has been more than 11 months since the CSC system was originally breached, and it is only after Swedish police contacts the Danes, that they discover that the system have been compromised. On June 5, 2013 the investigation by Danish police leads to the arrest of the then 20 year old Danish man that attempts to escape in his socks with his laptop police knocks on the door to his home in Copenhagen. Since then the man have been held in custody for 15 months while investigation was taken place. His Lenovo Thinkpad laptop have been in the hands of Danish authorities and their data forensics since his arrest they have however been unable to break the encryption. The man himself have refused to help gaining access to his computer, and the silent man and his unbreakable encrypted computer is now the great unknown factor in what is being called the biggest hacker case in Danish history. Ward and the Danish man faces up to 6 years in prison for illegal unauthorized access and disruption of government infrastructure. Since the Danish authorities have not been able to access the laptop of the Danish man, their case is relying entirely on a chat log from February 2012 where the accused man believed to be the person behind the alias “Advanced Persistent Terrorist Threat” allegedly handed over tools and information needed to breach the CSC system to the person believed to be Warg. In the 15 month the Danish man have been in custody he has not once agreed to talk to the police and have even refused to participate in the numerous court hearings taking place to prolong his incarceration. The man’s defense layer states that it is not because the man refuses to talk about the case, but because he saw no reason to aid the people building a case against him, but only address the judge and jury that had to make the actual verdict in his case. The young man is described as a computer wunderkind with an eidetic memory, and have since his early childhood had a unique ability to master everything from networks to data architecture. Upon his arrest the man was living in a collective housing from the far left autonomous community in Copenhagen, though the man himself was generally described as being a fairly non-political person. His unique skills made him a great asset to the IT community in Denmark and at the age of just 17, he was working as consultant for the countries largest revision company. Shortly after his 18th birthday, he was approached by “PET”, which is the secret Danish police intelligence service. They approached him with job offers and promises of not going after his left-wing autonomous friends. He refused the offer but PET kept on passing him up outside his home or when he got off work with the same offer of joining their ranks. His friends have described that he naturally felt very uneasy by the constant contact by the PET secret intelligence service. And around 2011 the man traveled to Brisbane in Australia to work for a security company. If it was to avoid the constant approaches by PET is unknown. Around march 2012 he spend a week in Cambodia and during his stay more than 50 attempts was made to breach the CSC system from Warg’s computer, this will be used by the prosecutor as proof of Warg and the Danish man’s guilt. Warg have already been acquitted in the almost identical case in Sweden where the prosecutor was unable to prove that it was actually Warg breaching the Systems of the Nordea bank and the IT companies Applicate and Logica. That sort of missing proof does not seem to be a problem for the Danish authorities that at this point seems to rely on profiling their way to a verdict in their favor, and have even gone to great length to attempt to get the judge in the case to dismiss Jacob Applebaum as a possible expert speaker on behalf of the defense. The prosecutor states the reason that Jacob Applebaum has no relevant education that can grant him the title of “expert”. One could argue that the Danish man on trial, that is also without an education relevant to what he is accused of, then could not be on trial for something he has not been educated to be able to do. The court have however dismissed the prosecutors request. During the 5 month long breach of the CSC system the company was warned about weak security in its annual revision rapport, and the Danish Defense Intelligence services that have supplied the court with two rapports on the case, have also criticized CSC for its weak security of highly sensitive information. Minister for Justice have replied to a political inquiry that the Danish police is contemplating to sue CSC for the low security. The trial is taking place today on September 2, 2014, and this story will be updated as new information is revealed.