Presidential Candidate John McAfee Talks Cyber

source: abc news

The anti-virus software pioneer built a compound in the jungles of Belize, put a gun to his head in front of a visiting Wired reporter, and now wants your vote to become the next president of the United States.

He might not be anywhere near the front of the polls. But he is the only candidate with extensive cybersecurity experience, a topic that has become more important as hackers infiltrate major US companies and government agencies.

McAfee made a fortune from his former company, McAfee Associates, which was bought by Intel in 2010. He lost a healthy chunk of that money in the 2008 crash, then made headlines when he fled Belize after authorities wanted to question him over the murder of his neighbor. McAfee was later arrested in Guatemala and deported back to the United States.

When asked whether his past would turn off voters, McAfee remained defiant. "Because I'm like the people?" McAfee told NBC News. "Because I'm honest and recognize my mistakes? I don't think so."

McAfee is running as the candidate for the Cyber Party, which he created. While he has created rough outlines for his policies on everything from the economy to foreign policy, the bread-and-butter of his platform centers around cybersecurity.

Hackers in China have been blamed by US officials for a plethora of cyber attacks, from the Anthem hack to the security breach in the Office of Personnel Management (OPM) that affected more than 21 million people.

President Obama has called the attacks "not acceptable," but stopped short of imposing sanctions on China, instead forging agreements to ban hacking for commercial gain.

McAfee, on the other hand, would declare the cyber attacks an act of war.
"An act of war is something that focuses and makes a society act in unison," he told NBC News. "It took the bombing in Pearl Harbor to make Americans notice the war. When an entire Pacific fleet was sunk, we all woke up."

"We just need to declare, 'My god, China just waged war on us.' We then would have all been watching the TV just like we did after the attack in Paris. We would have woken up."

"The next war, I truly believe, will be a cyber war, and it will be devastating. And the Chinese are so far ahead of us," McAfee told NBC News.

McAfee would create a Digital Transformation Office to not only bolster the nation's defenses, but also create cyber weapons. The office would be funded, in part, by the money saved from completely dismantling the Transportation Security Administration.

"In order to protect yourself, you need to have offensive capabilities," he said. "What would happen if we didn't have nuclear weapons during the Cold War? We would all be speaking Russian. The fact that we did have them was a deterrent. If we had Weaponized software to the level that China has, they would back off."

Those weapons would be able to covertly gain access to a system, steal and alter information, and even infect facilities like power plants. He posed a hypothetical scenario where Chinese hackers gained access to the Tennessee Valley Authority and raised the temperature in power plants by 20 degrees.

"What is it going to do? It's going to fry a lot of components. The next thing we know, we're without power, and possibly without power permanently."

"Our leadership is illiterate when it comes to technology," he said. "Would you vote for a president who said, 'I can't read or write, but I have advisers who can explain words to me?' You wouldn't."

"In the government, I'd say it's two out of 10," McAfee told NBC News. "In corporate America, I'd say it's a five."

The answer for the government, he said, was to hire "red" and "blue" team hackers to attempt to break into and secure its systems, as some companies do today.

"Our private sector is ill-prepared, but at least they are taking measures to protect themselves," he said.
The problem, according to McAfee, is that the US government is reluctant to hire hackers. He would make them part of his new Digital Transformation Office, their salaries paid in part by that now free TSA money.

"You have to reach out to the hacker community, which have been blackballed and labeled by the government as an evil force," he said. "No, they're not. They're our only hope."

Recently, the possibility that terrorists have used encrypted messaging apps to communicate has spurred calls by intelligence officials to create "back doors" that would give them special access. Some in the tech industry claim it's impossible to do that without making the apps vulnerable to hackers.

McAfee said that officials like FBI Director James Comey don't understand that building a so-called "back door" into existing messaging apps won't stop terrorists from using encryption.
"You can call someone on the phone in India and for $10,000 get an app. Then you can develop your own encryption — it's the easiest thing to create," he said. "You don't think ISIS can create their own encryption? Nonsense."

Like Lawrence Lessig, the Democratic candidate who dropped out of the race after trying to raise awareness surrounding the issue of campaign finance reform, McAfee hopes to shine a spotlight on cybersecurity — although he maintains that he has a chance to win.

"This summer, I'll come out and I'll be loud and I'll be vocal," he said. "I believe people will listen. And if not, maybe it will change the public dialogue between everyone else."
Cyberwar:http://http://bit.ly/1Rh70DW

« IoT Attacks and Evasion Will Characterize 2016
Former NSA Expert ‘We are in the Cyber War’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

TalaTek

TalaTek

TalaTek is a full-service risk management firm providing expert services in risk management, cybersecurity, and compliance.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Verichains

Verichains

Verichains Lab is a pioneer and leading APAC blockchain security firm with extensive expertise in the areas of security, cryptography and core blockchain technology.

Systal Technology Solutions

Systal Technology Solutions

Systal is a global managed network and security service and transformation specialist. We help enterprise-level businesses maximise the security and business value of their complex IT infrastructure.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.