Presidential Candidate John McAfee Talks Cyber

source: abc news

The anti-virus software pioneer built a compound in the jungles of Belize, put a gun to his head in front of a visiting Wired reporter, and now wants your vote to become the next president of the United States.

He might not be anywhere near the front of the polls. But he is the only candidate with extensive cybersecurity experience, a topic that has become more important as hackers infiltrate major US companies and government agencies.

McAfee made a fortune from his former company, McAfee Associates, which was bought by Intel in 2010. He lost a healthy chunk of that money in the 2008 crash, then made headlines when he fled Belize after authorities wanted to question him over the murder of his neighbor. McAfee was later arrested in Guatemala and deported back to the United States.

When asked whether his past would turn off voters, McAfee remained defiant. "Because I'm like the people?" McAfee told NBC News. "Because I'm honest and recognize my mistakes? I don't think so."

McAfee is running as the candidate for the Cyber Party, which he created. While he has created rough outlines for his policies on everything from the economy to foreign policy, the bread-and-butter of his platform centers around cybersecurity.

Hackers in China have been blamed by US officials for a plethora of cyber attacks, from the Anthem hack to the security breach in the Office of Personnel Management (OPM) that affected more than 21 million people.

President Obama has called the attacks "not acceptable," but stopped short of imposing sanctions on China, instead forging agreements to ban hacking for commercial gain.

McAfee, on the other hand, would declare the cyber attacks an act of war.
"An act of war is something that focuses and makes a society act in unison," he told NBC News. "It took the bombing in Pearl Harbor to make Americans notice the war. When an entire Pacific fleet was sunk, we all woke up."

"We just need to declare, 'My god, China just waged war on us.' We then would have all been watching the TV just like we did after the attack in Paris. We would have woken up."

"The next war, I truly believe, will be a cyber war, and it will be devastating. And the Chinese are so far ahead of us," McAfee told NBC News.

McAfee would create a Digital Transformation Office to not only bolster the nation's defenses, but also create cyber weapons. The office would be funded, in part, by the money saved from completely dismantling the Transportation Security Administration.

"In order to protect yourself, you need to have offensive capabilities," he said. "What would happen if we didn't have nuclear weapons during the Cold War? We would all be speaking Russian. The fact that we did have them was a deterrent. If we had Weaponized software to the level that China has, they would back off."

Those weapons would be able to covertly gain access to a system, steal and alter information, and even infect facilities like power plants. He posed a hypothetical scenario where Chinese hackers gained access to the Tennessee Valley Authority and raised the temperature in power plants by 20 degrees.

"What is it going to do? It's going to fry a lot of components. The next thing we know, we're without power, and possibly without power permanently."

"Our leadership is illiterate when it comes to technology," he said. "Would you vote for a president who said, 'I can't read or write, but I have advisers who can explain words to me?' You wouldn't."

"In the government, I'd say it's two out of 10," McAfee told NBC News. "In corporate America, I'd say it's a five."

The answer for the government, he said, was to hire "red" and "blue" team hackers to attempt to break into and secure its systems, as some companies do today.

"Our private sector is ill-prepared, but at least they are taking measures to protect themselves," he said.
The problem, according to McAfee, is that the US government is reluctant to hire hackers. He would make them part of his new Digital Transformation Office, their salaries paid in part by that now free TSA money.

"You have to reach out to the hacker community, which have been blackballed and labeled by the government as an evil force," he said. "No, they're not. They're our only hope."

Recently, the possibility that terrorists have used encrypted messaging apps to communicate has spurred calls by intelligence officials to create "back doors" that would give them special access. Some in the tech industry claim it's impossible to do that without making the apps vulnerable to hackers.

McAfee said that officials like FBI Director James Comey don't understand that building a so-called "back door" into existing messaging apps won't stop terrorists from using encryption.
"You can call someone on the phone in India and for $10,000 get an app. Then you can develop your own encryption — it's the easiest thing to create," he said. "You don't think ISIS can create their own encryption? Nonsense."

Like Lawrence Lessig, the Democratic candidate who dropped out of the race after trying to raise awareness surrounding the issue of campaign finance reform, McAfee hopes to shine a spotlight on cybersecurity — although he maintains that he has a chance to win.

"This summer, I'll come out and I'll be loud and I'll be vocal," he said. "I believe people will listen. And if not, maybe it will change the public dialogue between everyone else."
Cyberwar:http://http://bit.ly/1Rh70DW

« IoT Attacks and Evasion Will Characterize 2016
Former NSA Expert ‘We are in the Cyber War’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

MetricStream

MetricStream

MetricStream provide integrated GRC solutions across business, IT, and security functions.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Swiss Cyber Forum (SCF)

Swiss Cyber Forum (SCF)

The Swiss Cyber Forum (SCF) builds competences and helps its members to mitigate the cyber risks associated with digitalisation.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

OneCollab

OneCollab

OneCollab, your unwavering ally in the dynamic landscape of IT services and cybersecurity.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.