Alleged data-heist kingpin is a computer addict, lawyer says
Security analysts scoff, say Gonzalez more likely 'addicted to money'
Computerworld - Albert Gonzalez, the man described by federal authorities as the kingpin of a gang responsible for stealing more than 130 million payment cards, is a computer addict constantly looking for ways to challenge his abilities, according to his lawyer.
In a conversation with Computerworld on Wednesday, Rene Palomino, the Miami-based lawyer representing Gonzalez, said his client has had an unhealthy obsession with computers since the age of 8. However, he stopped short of saying it was this obsession that might have pushed Gonzalez to allegedly get involved with the crimes.
"He was self-taught," Palomino said of Gonzalez. "He didn't go out in the sandbox or play baseball. The computer was his best friend."
Gonzalez was drawn to look for bigger and bigger tests of his abilities, Palomino said. "One challenge was not enough, and he'd move on to another challenge," he said. "It wasn't healthy. It's a sickness. It's a problem that has not been addressed in our society." Palomino said he hopes to shed some light on computer addiction and to warn parents about the issue.
"[Gonzalez] is not looking to harm anybody physically," he added. "He's not a hardened criminal."
Gonzalez was one of three individuals indicted Monday in federal district court in New Jersey on charges related to the massive data thefts at Heartland Payment Systems, Hannaford Bros., 7-Eleven and two other unidentified retailers. The three men are alleged to have stolen data on more than 130 million payment cards from the five companies.
Gonzalez had been indicted twice in the past year -- in Massachusetts and in New York -- in connection with the sensational data heists at TJX, Dave & Buster's, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21 and DSW. He is being held without bail in a Brooklyn, N.Y., detention center.
It's unclear how much money Gonzalez may have made from the operation dubbed "Get Rich or Die Tryin," but it was apparently enough to support a lavish lifestyle. Court documents related to his previous indictments described a $75,000 birthday party that was thrown by Gonzalez, and how he once complained about having to manually count more than $340,000 in cash that was illegally withdrawn from ATM machines. At the time of his arrest last May, Gonzalez had $1.65 million in bank accounts, a Glock 27 pistol with several rounds of ammunition, and numerous PCs, laptop computers and storage devices.
It also was unknown whether Palomino plans on using Gonzalez's computer addiction issue as a defense in court or to drive a plea bargain. But the mere suggestion that it might evoked a stream of derision and criticism from security experts.
- University of North Florida breach exposes data on 107,000 individuals
- Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
- GAO slams White House for failing to lead on cybersecurity
- Man charged with attack on Web site of Fox News' Bill O'Reilly
- Heartland breach expenses pegged at $140M -- so far
- IT contractor gets five years for $2M credit union theft
- Democracy would suffer if Google left China, says MIT panel
- Gonzalez accomplice gets five years for hacking TJX
- Threat of cyberattacks from overseas high, federal IT execs say
- Botnets 'the Swiss Army knife of attack tools'
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts