Alleged data-heist kingpin is a computer addict, lawyer says
Security analysts scoff, say Gonzalez more likely 'addicted to money'
Computerworld - Albert Gonzalez, the man described by federal authorities as the kingpin of a gang responsible for stealing more than 130 million payment cards, is a computer addict constantly looking for ways to challenge his abilities, according to his lawyer.
In a conversation with Computerworld on Wednesday, Rene Palomino, the Miami-based lawyer representing Gonzalez, said his client has had an unhealthy obsession with computers since the age of 8. However, he stopped short of saying it was this obsession that might have pushed Gonzalez to allegedly get involved with the crimes.
"He was self-taught," Palomino said of Gonzalez. "He didn't go out in the sandbox or play baseball. The computer was his best friend."
Gonzalez was drawn to look for bigger and bigger tests of his abilities, Palomino said. "One challenge was not enough, and he'd move on to another challenge," he said. "It wasn't healthy. It's a sickness. It's a problem that has not been addressed in our society." Palomino said he hopes to shed some light on computer addiction and to warn parents about the issue.
"[Gonzalez] is not looking to harm anybody physically," he added. "He's not a hardened criminal."
Gonzalez was one of three individuals indicted Monday in federal district court in New Jersey on charges related to the massive data thefts at Heartland Payment Systems, Hannaford Bros., 7-Eleven and two other unidentified retailers. The three men are alleged to have stolen data on more than 130 million payment cards from the five companies.
Gonzalez had been indicted twice in the past year -- in Massachusetts and in New York -- in connection with the sensational data heists at TJX, Dave & Buster's, BJ's Wholesale Club, OfficeMax, Boston Market, Barnes & Noble, Sports Authority, Forever 21 and DSW. He is being held without bail in a Brooklyn, N.Y., detention center.
It's unclear how much money Gonzalez may have made from the operation dubbed "Get Rich or Die Tryin," but it was apparently enough to support a lavish lifestyle. Court documents related to his previous indictments described a $75,000 birthday party that was thrown by Gonzalez, and how he once complained about having to manually count more than $340,000 in cash that was illegally withdrawn from ATM machines. At the time of his arrest last May, Gonzalez had $1.65 million in bank accounts, a Glock 27 pistol with several rounds of ammunition, and numerous PCs, laptop computers and storage devices.
It also was unknown whether Palomino plans on using Gonzalez's computer addiction issue as a defense in court or to drive a plea bargain. But the mere suggestion that it might evoked a stream of derision and criticism from security experts.
- University of North Florida breach exposes data on 107,000 individuals
- Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
- GAO slams White House for failing to lead on cybersecurity
- Man charged with attack on Web site of Fox News' Bill O'Reilly
- Heartland breach expenses pegged at $140M -- so far
- IT contractor gets five years for $2M credit union theft
- Democracy would suffer if Google left China, says MIT panel
- Gonzalez accomplice gets five years for hacking TJX
- Threat of cyberattacks from overseas high, federal IT execs say
- Botnets 'the Swiss Army knife of attack tools'
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts