It's not clear what evidence there is against Kretsinger other than VPN logs, which may be damning and may be irrelevant. Even the Supreme Court found recently that an IP address is not the same thing as an identity.
My wild guess is that, if Kretsinger was involved in the Sony hacks – and it was hit so many times that most of those doing the attacking must have been copycats rather than the original attackers.
What makes Kretsinger look more like a fringe member of a group like LulzSec – if he turns out to be guilty, or can be shown to have been involved at all – isn't the VPN logs or target, though.
It's that he used a single, commercial VPN proxy service to try to hide his identity and figured wiping his hard drive would keep forensic investigators from recreating at least some of his data after they confiscated it.
That's the kind of security level even script kids would consider amateurish.
Wiping a hard drive – even using military-grade software that fills, deletes and reformats the drive many times to try to layer junk over good data before wiping both out – isn't certain to get rid of all the evidence unless you go beyond security utilities to include power tools in your repertoire. Actual power tools – drills and saws and shredders, will usually do the trick. Them forensic dudes is tricky, and magnetic data is notoriously difficult to wipe out completely unless it's something no one else cares about but that you need desperately and have no time to try to recreate.
It happens a lot in the U.S. between 11 pm and 12 pm on April 15. Must be the alignment of the planets or something.
Just using a single commercial VPN proxy service – one designed to be inexpensive and to offer a demonstrable level of privacy but not a bulletproof wall of anonymity to use against law enforcement – is even more naïve.
Hidemyass.com's Terms of Service page says clearly it keeps logs of when and for how long members connect and what Internet resources they access.
They keep the logs for 30 days and promise that if the cops come calling (with the right warrants and subpoenas), it will turn over that information.
It is not the mark of a hard core or dedicated hacker to assume that one $12/month proxy service will hold off the FBI is worse than naïve. It's asking for trouble.
There are dozens of free- and paid VPN services designed to offer exactly the same service, the free and open-source TOR being the best known and most venerable.
Most are not much of an obstacle to cops with subpoenas, and they're not designed to be.