Feeds

TJX hacker mulls Asperger's defense

Move over, McKinnon

Choosing a cloud hosting partner with confidence

The international hacker who has admitted to stealing more than 130 million payment card numbers has mounted a new defense claim that he might suffer from Asperger's syndrome, a court filing indicates.

On Tuesday, attorneys for Albert Gonzalez filed a report from a forensic psychologist that questioned the criminal hacker's "capacity to knowingly evaluate the wrongfulness of his actions and consciously behave lawfully and avoid crime," according to federal prosecutors. The report went on to state that his "behavior was consistent with description of the Asperger's disorder."

Gonzalez becomes the latest hacker under prosecution to raise the Asperger's defense in arguing for leniency. Most notably, NASA hacker Gary McKinnon has cited the Autism-related disorder in fighting extradition to the US to face computer trespass charges. UK Home Secretary Alan Johnson has repeatedly rejected claims raised by McKinnon's attorneys and supporters and has indicated he will not stop the forced transfer.

In August, convicted hacker Viachelav Berkovich received two years less than the minimum called for under federal sentencing guidelines after the judge in the case took the disability into consideration as a mitigating factor.

The judge hearing Gonzalez's case has canceled a December 21 sentencing hearing, according to an entry made Wednesday on a federal court website. It's unclear when a new hearing will be held.

People with Asperger's are said to display behavior that's repetitive and restricted, and they also show social awkwardness and an inability to empathize. The link between Asperger's and crime, however, has been disputed by some researchers.

Word of Gonzalez's new defense was made in a government motion filed Tuesday to delay sentencing and was reported earlier by Wired.com.

Wired.com went on to report that Gonzalez has identified two Russian accomplices who helped him hack into numerous companies. The hackers, identified for the first time by the handles "Grigg" and "Annex," have breached at least four card processing companies and a variety of foreign banks, according to a sentencing memo filed by defense attorneys.

The information was intended to remain confidential, but because of a redaction error, it was available by electronically cutting the document contents and pasting them into a new file.

Gonzalez has provided the government with "extensive information" to prosecutors, including the names of people he was close to who are suspected of breaking the law. According to Wired.com, he also drew prosecutors a map that helped them find more than $1.1m that had been buried in is parents' backyard. Much more is available here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.