Feeds

Mum defends suspected Kiwi botmaster

Misunderstood youth

Next gen security for virtualised datacentres

New Zealand reporters have unearthed the identity and background of a teenage hacker at the centre of an international cybercrime investigation.

Owen Walker, 18, who police identified only by his online moniker of AKILL, was arrested last week as part of a larger FBI-led operation aimed at cracking down on the trade in compromised PCs, codenamed Operation Bot Roast. The teenager from the small town of Whitianga in New Zealand's North Island was bullied at school and suffers from Asperger's syndrome, a mild form of autism associated with poor social skills but proficiency in an area of special interest.

Walker's mum, Shell Moxham-Whyte, told the New Zealand Herald that she had no idea about her son's alleged involvement in cybercrime prior to his arrest although she was well aware of his interest in computing since a young age. The teenager, who was released on police bail after he was quizzed by police last week, is staying with relatives. Moxham-Whyte said the family has been under immense pressure since her son was named in connection with the international cybercrime inquiry on Saturday.

Police plan to question Walker on completion of a forensic examination of his computers, which were seized from the family home at the same time he was taken in for questioning last Wednesday. The teenager has since lost his job as a programmer at Trio Software Development. Former employers and even police forensic investigators are united in describing the youngster as a "brilliant computer programmer", the New Zealand Herald reports. Glenn Campbell, a director at Walker's former employer Trio, suggested Walker did not actively set out to get involved in cybercrime.

Moxham-Whyte described her son as a bright boy who has loved computers since he was young. Friends said Walker (AKA Snow Whyte) was something of a loner at school who was picked on by bullies. He completed his education using a correspondence course after leaving school early at 14 (year nine). ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New twist as rogue antivirus enters death throes
That's not the website you're looking for
ISIS terror fanatics invade Diaspora after Twitter blockade
Nothing we can do to stop them, says decentralized network
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.