Feeds

Mum defends suspected Kiwi botmaster

Misunderstood youth

The Essential Guide to IT Transformation

New Zealand reporters have unearthed the identity and background of a teenage hacker at the centre of an international cybercrime investigation.

Owen Walker, 18, who police identified only by his online moniker of AKILL, was arrested last week as part of a larger FBI-led operation aimed at cracking down on the trade in compromised PCs, codenamed Operation Bot Roast. The teenager from the small town of Whitianga in New Zealand's North Island was bullied at school and suffers from Asperger's syndrome, a mild form of autism associated with poor social skills but proficiency in an area of special interest.

Walker's mum, Shell Moxham-Whyte, told the New Zealand Herald that she had no idea about her son's alleged involvement in cybercrime prior to his arrest although she was well aware of his interest in computing since a young age. The teenager, who was released on police bail after he was quizzed by police last week, is staying with relatives. Moxham-Whyte said the family has been under immense pressure since her son was named in connection with the international cybercrime inquiry on Saturday.

Police plan to question Walker on completion of a forensic examination of his computers, which were seized from the family home at the same time he was taken in for questioning last Wednesday. The teenager has since lost his job as a programmer at Trio Software Development. Former employers and even police forensic investigators are united in describing the youngster as a "brilliant computer programmer", the New Zealand Herald reports. Glenn Campbell, a director at Walker's former employer Trio, suggested Walker did not actively set out to get involved in cybercrime.

Moxham-Whyte described her son as a bright boy who has loved computers since he was young. Friends said Walker (AKA Snow Whyte) was something of a loner at school who was picked on by bullies. He completed his education using a correspondence course after leaving school early at 14 (year nine). ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.