Presidential Candidate John McAfee Talks Cyber

source: abc news

The anti-virus software pioneer built a compound in the jungles of Belize, put a gun to his head in front of a visiting Wired reporter, and now wants your vote to become the next president of the United States.

He might not be anywhere near the front of the polls. But he is the only candidate with extensive cybersecurity experience, a topic that has become more important as hackers infiltrate major US companies and government agencies.

McAfee made a fortune from his former company, McAfee Associates, which was bought by Intel in 2010. He lost a healthy chunk of that money in the 2008 crash, then made headlines when he fled Belize after authorities wanted to question him over the murder of his neighbor. McAfee was later arrested in Guatemala and deported back to the United States.

When asked whether his past would turn off voters, McAfee remained defiant. "Because I'm like the people?" McAfee told NBC News. "Because I'm honest and recognize my mistakes? I don't think so."

McAfee is running as the candidate for the Cyber Party, which he created. While he has created rough outlines for his policies on everything from the economy to foreign policy, the bread-and-butter of his platform centers around cybersecurity.

Hackers in China have been blamed by US officials for a plethora of cyber attacks, from the Anthem hack to the security breach in the Office of Personnel Management (OPM) that affected more than 21 million people.

President Obama has called the attacks "not acceptable," but stopped short of imposing sanctions on China, instead forging agreements to ban hacking for commercial gain.

McAfee, on the other hand, would declare the cyber attacks an act of war.
"An act of war is something that focuses and makes a society act in unison," he told NBC News. "It took the bombing in Pearl Harbor to make Americans notice the war. When an entire Pacific fleet was sunk, we all woke up."

"We just need to declare, 'My god, China just waged war on us.' We then would have all been watching the TV just like we did after the attack in Paris. We would have woken up."

"The next war, I truly believe, will be a cyber war, and it will be devastating. And the Chinese are so far ahead of us," McAfee told NBC News.

McAfee would create a Digital Transformation Office to not only bolster the nation's defenses, but also create cyber weapons. The office would be funded, in part, by the money saved from completely dismantling the Transportation Security Administration.

"In order to protect yourself, you need to have offensive capabilities," he said. "What would happen if we didn't have nuclear weapons during the Cold War? We would all be speaking Russian. The fact that we did have them was a deterrent. If we had Weaponized software to the level that China has, they would back off."

Those weapons would be able to covertly gain access to a system, steal and alter information, and even infect facilities like power plants. He posed a hypothetical scenario where Chinese hackers gained access to the Tennessee Valley Authority and raised the temperature in power plants by 20 degrees.

"What is it going to do? It's going to fry a lot of components. The next thing we know, we're without power, and possibly without power permanently."

"Our leadership is illiterate when it comes to technology," he said. "Would you vote for a president who said, 'I can't read or write, but I have advisers who can explain words to me?' You wouldn't."

"In the government, I'd say it's two out of 10," McAfee told NBC News. "In corporate America, I'd say it's a five."

The answer for the government, he said, was to hire "red" and "blue" team hackers to attempt to break into and secure its systems, as some companies do today.

"Our private sector is ill-prepared, but at least they are taking measures to protect themselves," he said.
The problem, according to McAfee, is that the US government is reluctant to hire hackers. He would make them part of his new Digital Transformation Office, their salaries paid in part by that now free TSA money.

"You have to reach out to the hacker community, which have been blackballed and labeled by the government as an evil force," he said. "No, they're not. They're our only hope."

Recently, the possibility that terrorists have used encrypted messaging apps to communicate has spurred calls by intelligence officials to create "back doors" that would give them special access. Some in the tech industry claim it's impossible to do that without making the apps vulnerable to hackers.

McAfee said that officials like FBI Director James Comey don't understand that building a so-called "back door" into existing messaging apps won't stop terrorists from using encryption.
"You can call someone on the phone in India and for $10,000 get an app. Then you can develop your own encryption — it's the easiest thing to create," he said. "You don't think ISIS can create their own encryption? Nonsense."

Like Lawrence Lessig, the Democratic candidate who dropped out of the race after trying to raise awareness surrounding the issue of campaign finance reform, McAfee hopes to shine a spotlight on cybersecurity — although he maintains that he has a chance to win.

"This summer, I'll come out and I'll be loud and I'll be vocal," he said. "I believe people will listen. And if not, maybe it will change the public dialogue between everyone else."
Cyberwar:http://http://bit.ly/1Rh70DW

« IoT Attacks and Evasion Will Characterize 2016
Former NSA Expert ‘We are in the Cyber War’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Digital Forensics Inc (DFI)

Digital Forensics Inc (DFI)

Digital Forensics Inc. is a nationally recognized High Technology Forensic Investigations and Information System Security firm

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

URS Certification

URS Certification

United Registrar of Systems (URS Certification) is an independent certification body operating in more than 30 countries within the multinational URS Holdings.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Neptune Cyber

Neptune Cyber

Neptune is a cyber security company that works exclusively in the marine sector. Our team combines experts in shipbuilding, maintenance and operations and cyber security testing and design.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.