Feeds

Mum defends suspected Kiwi botmaster

Misunderstood youth

SANS - Survey on application security programs

New Zealand reporters have unearthed the identity and background of a teenage hacker at the centre of an international cybercrime investigation.

Owen Walker, 18, who police identified only by his online moniker of AKILL, was arrested last week as part of a larger FBI-led operation aimed at cracking down on the trade in compromised PCs, codenamed Operation Bot Roast. The teenager from the small town of Whitianga in New Zealand's North Island was bullied at school and suffers from Asperger's syndrome, a mild form of autism associated with poor social skills but proficiency in an area of special interest.

Walker's mum, Shell Moxham-Whyte, told the New Zealand Herald that she had no idea about her son's alleged involvement in cybercrime prior to his arrest although she was well aware of his interest in computing since a young age. The teenager, who was released on police bail after he was quizzed by police last week, is staying with relatives. Moxham-Whyte said the family has been under immense pressure since her son was named in connection with the international cybercrime inquiry on Saturday.

Police plan to question Walker on completion of a forensic examination of his computers, which were seized from the family home at the same time he was taken in for questioning last Wednesday. The teenager has since lost his job as a programmer at Trio Software Development. Former employers and even police forensic investigators are united in describing the youngster as a "brilliant computer programmer", the New Zealand Herald reports. Glenn Campbell, a director at Walker's former employer Trio, suggested Walker did not actively set out to get involved in cybercrime.

Moxham-Whyte described her son as a bright boy who has loved computers since he was young. Friends said Walker (AKA Snow Whyte) was something of a loner at school who was picked on by bullies. He completed his education using a correspondence course after leaving school early at 14 (year nine). ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.