Presidential Candidate John McAfee Talks Cyber

source: abc news

The anti-virus software pioneer built a compound in the jungles of Belize, put a gun to his head in front of a visiting Wired reporter, and now wants your vote to become the next president of the United States.

He might not be anywhere near the front of the polls. But he is the only candidate with extensive cybersecurity experience, a topic that has become more important as hackers infiltrate major US companies and government agencies.

McAfee made a fortune from his former company, McAfee Associates, which was bought by Intel in 2010. He lost a healthy chunk of that money in the 2008 crash, then made headlines when he fled Belize after authorities wanted to question him over the murder of his neighbor. McAfee was later arrested in Guatemala and deported back to the United States.

When asked whether his past would turn off voters, McAfee remained defiant. "Because I'm like the people?" McAfee told NBC News. "Because I'm honest and recognize my mistakes? I don't think so."

McAfee is running as the candidate for the Cyber Party, which he created. While he has created rough outlines for his policies on everything from the economy to foreign policy, the bread-and-butter of his platform centers around cybersecurity.

Hackers in China have been blamed by US officials for a plethora of cyber attacks, from the Anthem hack to the security breach in the Office of Personnel Management (OPM) that affected more than 21 million people.

President Obama has called the attacks "not acceptable," but stopped short of imposing sanctions on China, instead forging agreements to ban hacking for commercial gain.

McAfee, on the other hand, would declare the cyber attacks an act of war.
"An act of war is something that focuses and makes a society act in unison," he told NBC News. "It took the bombing in Pearl Harbor to make Americans notice the war. When an entire Pacific fleet was sunk, we all woke up."

"We just need to declare, 'My god, China just waged war on us.' We then would have all been watching the TV just like we did after the attack in Paris. We would have woken up."

"The next war, I truly believe, will be a cyber war, and it will be devastating. And the Chinese are so far ahead of us," McAfee told NBC News.

McAfee would create a Digital Transformation Office to not only bolster the nation's defenses, but also create cyber weapons. The office would be funded, in part, by the money saved from completely dismantling the Transportation Security Administration.

"In order to protect yourself, you need to have offensive capabilities," he said. "What would happen if we didn't have nuclear weapons during the Cold War? We would all be speaking Russian. The fact that we did have them was a deterrent. If we had Weaponized software to the level that China has, they would back off."

Those weapons would be able to covertly gain access to a system, steal and alter information, and even infect facilities like power plants. He posed a hypothetical scenario where Chinese hackers gained access to the Tennessee Valley Authority and raised the temperature in power plants by 20 degrees.

"What is it going to do? It's going to fry a lot of components. The next thing we know, we're without power, and possibly without power permanently."

"Our leadership is illiterate when it comes to technology," he said. "Would you vote for a president who said, 'I can't read or write, but I have advisers who can explain words to me?' You wouldn't."

"In the government, I'd say it's two out of 10," McAfee told NBC News. "In corporate America, I'd say it's a five."

The answer for the government, he said, was to hire "red" and "blue" team hackers to attempt to break into and secure its systems, as some companies do today.

"Our private sector is ill-prepared, but at least they are taking measures to protect themselves," he said.
The problem, according to McAfee, is that the US government is reluctant to hire hackers. He would make them part of his new Digital Transformation Office, their salaries paid in part by that now free TSA money.

"You have to reach out to the hacker community, which have been blackballed and labeled by the government as an evil force," he said. "No, they're not. They're our only hope."

Recently, the possibility that terrorists have used encrypted messaging apps to communicate has spurred calls by intelligence officials to create "back doors" that would give them special access. Some in the tech industry claim it's impossible to do that without making the apps vulnerable to hackers.

McAfee said that officials like FBI Director James Comey don't understand that building a so-called "back door" into existing messaging apps won't stop terrorists from using encryption.
"You can call someone on the phone in India and for $10,000 get an app. Then you can develop your own encryption — it's the easiest thing to create," he said. "You don't think ISIS can create their own encryption? Nonsense."

Like Lawrence Lessig, the Democratic candidate who dropped out of the race after trying to raise awareness surrounding the issue of campaign finance reform, McAfee hopes to shine a spotlight on cybersecurity — although he maintains that he has a chance to win.

"This summer, I'll come out and I'll be loud and I'll be vocal," he said. "I believe people will listen. And if not, maybe it will change the public dialogue between everyone else."
Cyberwar:http://http://bit.ly/1Rh70DW

« IoT Attacks and Evasion Will Characterize 2016
Former NSA Expert ‘We are in the Cyber War’ »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Surevine

Surevine

Surevine builds secure, scalable collaboration solutions for the most security conscious organisations, enabling collaboration on their most sensitive information.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University (NFSU) - India

National Forensic Sciences University is the world’s first and only University dedicated to Digital Forensic and allied Sciences.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Aligned Technology Solutions (ATS)

Aligned Technology Solutions (ATS)

ATS manage, monitor, and maintain everything from your network and servers to your workstations and mobile devices, and we do it proactively to eliminate downtime and keep hackers at bay.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Intersistemi Italia

Intersistemi Italia

Intersistemi is a leading Italian company in the field of information technology integration and digital transformation including cybersecurity.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.