<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>John McAfee &#187; John McAfee</title>
	<atom:link href="http://www.whoismcafee.com/author/francois/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.whoismcafee.com</link>
	<description>Who is McAfee - The Official Blog of John McAfee</description>
	<lastBuildDate>Thu, 03 Apr 2014 23:00:09 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.2</generator>
	<item>
		<title>DCentral1 App Now available for download</title>
		<link>http://www.whoismcafee.com/dcentral1-app/</link>
		<comments>http://www.whoismcafee.com/dcentral1-app/#comments</comments>
		<pubDate>Thu, 03 Apr 2014 22:59:17 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfeezine]]></category>
		<category><![CDATA[Android App]]></category>
		<category><![CDATA[best apps]]></category>
		<category><![CDATA[dcentral]]></category>
		<category><![CDATA[future tense central]]></category>
		<category><![CDATA[john mcafee app]]></category>
		<category><![CDATA[security app]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3320</guid>
		<description><![CDATA[&#160; Dcentral is Now available for download at Future Tense Central  and  Google play]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.whoismcafee.com/wp-content/uploads/2014/04/McAFEE-APP-ANDROID.jpg"><img class="alignleft" alt="McAFEE APP ANDROID" src="http://www.whoismcafee.com/wp-content/uploads/2014/04/McAFEE-APP-ANDROID-1024x307.jpg" /></a></p>
<p>&nbsp;</p>
<h3>Dcentral is Now available for download at <a href="http://www.futuretensecentral.com" target="_blank">Future Tense Central</a>  and  <a href="https://play.google.com/store/apps/details?id=com.dcentral1.android" target="_blank">Google play</a></h3>
<p><iframe frameborder="0" height="360" src="//www.youtube.com/embed/3aTDVoG6smw" width="640"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/dcentral1-app/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/04/dcentral-by-john-mcafee-296x246.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>John McAfee’s ultimate hack</title>
		<link>http://www.whoismcafee.com/john-mcafees-ultimate-hack/</link>
		<comments>http://www.whoismcafee.com/john-mcafees-ultimate-hack/#comments</comments>
		<pubDate>Sat, 15 Mar 2014 01:52:36 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3297</guid>
		<description><![CDATA[JOHN CASARETTO &#124; MARCH 11TH ORIGINAL SOURCE: SILICON ANGLE   Truth is indeed stranger than fiction, and this story is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>JOHN CASARETTO | MARCH 11TH</p>
<p><a href="http://siliconangle.com/blog/2014/03/11/john-mcafees-ultimate-hack/" target="_blank">ORIGINAL SOURCE: SILICON ANGLE  </a></p>
<p><a href="http://www.whoismcafee.com/wp-content/uploads/2014/03/2013-10-23-15.27.00.jpg"><img class="alignleft" alt="2013-10-23-15.27.00" src="http://www.whoismcafee.com/wp-content/uploads/2014/03/2013-10-23-15.27.00-168x300.jpg" width="168" height="300" /></a>Truth is indeed stranger than fiction, and this story is about as strange as it could be. For all the computer virus infections that John McAfee’s software may have prevented over the years, there has been one situation the man himself was unable to escape unscathed.  He may however be having his day now.  This Op/Ed is based on my first hand interviews with McAfee.</p>
<p>McAfee wants to tell his story.  He has shared bits of what has happened through news stories here and there, but sifting through all the ‘millionaire gone mad’ angles that have emerged, the essence is easily lost.</p>
<p>McAfee has stumbled onto a layered story of government corruption, of criminal gangs gone wild, of murder for hire, of the illegal selling of passports and a complex history of public opinions.</p>
<p>McAfee’s story has taken on more form over <a href="http://siliconangle.com/blog/2013/12/13/cybersecurity-predictions-with-john-mcafee/">time</a>, yet it hasn’t ever really changed and reflecting on this collective information what I found most compelling going into this was the amount of information from the story that were easily verified.  There is a situation here that includes stories about Belize, stories about its government – real stories and real people doing terrible things, all of which seemingly corroborate McAfee’s continued tale.  Things only begin within the series of events that led to the raid on his property.</p>
<p>This is the story that few know or have given any attention to.  The raid on his Belize property, the murder of Greg Faull and everything that led up to it are still a part of this, but this story is even stranger, bigger, and more nefarious than you would ever think.  Welcome to McAfee’s life after his “last stand.”   It’s a story of how he hacked an entire country.</p>
<h2>Games of power in Belize</h2>
<p>&nbsp;</p>
<p><a href="http://siliconangle.com/files/2014/03/John-Mcafee-Eddie-Mize.jpg"><img class="alignleft" alt="John Mcafee -Eddie Mize" src="http://siliconangle.com/files/2014/03/John-Mcafee-Eddie-Mize-300x228.jpg" width="300" height="228" /></a>After reading into a <a href="http://www.thedialogue.org/PublicationFiles/IAD9014_Belize_Lopez_Paper_FINAL.pdf">number of reports on criminal activities in Belize</a>, it was hard to believe why anybody would risk living down there, this is where I started.  Crime is rampant, violence is everywhere and corruption, poverty and a lack of education are big issues.  There are massive drug routes that go through the country, with aid and support of major drug cartels.  They work in coordination with government officials, they also work through a network of intimidation, payouts and murder.  The Gang Suppression Unit (GSU), which was behind the raid on McAfee’s compound is the very same crew whose officials are very openly tied to and associate with members of the cartel.</p>
<p>This is not at all about small crime, this is big crime.  McAfee applied first world principles to a third world country – and things just got away from him.</p>
<p>McAfee states that his actions in Belize from the time after the raid were in response to what other corroborate as a period of very open intimidation.  Everywhere he went the GSU were present, a message that was designed to let McAfee know he was being watched.  What they did not know yet was that McAfee had deployed a replicating key-logging software onto government and police computers he had donated.   He was attempting to find hard evidence that the government had illegally instigated the raid.  What he found was far more.</p>
<p>After some time, McAfee and his crew had full awareness of what the government was doing, who it was calling and so on with full-on camera, full-on microphone and access to everything.  When the police would organize for McAfee to get ‘picked up’, always at night, McAfee was onto it, and he’d disappear before they could arrive, anywhere in town.  The cat and mouse game went on for some time until the discovery of McAfee’s surveillance, and later the murder of Gregory Faull, which as the public well knows, McAfee has been “wanted for questioning” in the case.</p>
<p>From McAfee’s perspective this now meant that he could now be picked up in the day and his last-second getaways enabled by his own surveillance would no longer last.  The rest is history: McAfee escapes to Guatemala, and is deported off to the U.S., eventually arriving in Portland (where you would think most people would settle down).</p>
<h2>McAfee is Dead – Keep Portland Weird</h2>
<p>&nbsp;</p>
<p>Portland’s slogan is “Keep Portland Weird”.  What happens next is pretty faithful to that.  For the first time in the history of Belize, its national soccer team, a group of part-time athletes ranked at best 128th in the world gains entry into the 2013 CONCACAF Gold Cup to take on the US National team.  They are traveling to Portland Oregon.  It was a slaughter, a 6-1 US victory in a game which the US admittedly did not play their best.  It’s an unlikely and interesting coincidence at the same time.</p>
<h3>A message at C2SV</h3>
<p>&nbsp;</p>
<p><a href="http://siliconangle.com/files/2014/03/woman1.jpg"><img alt="woman1" src="http://siliconangle.com/files/2014/03/woman1-300x225.jpg" width="300" height="225" /></a></p>
<p>Woman from Belize gives John McAfee a message at C2SV</p>
<p><a href="http://siliconangle.com/files/2014/03/mcafeesecurity.jpg"><img alt="Mystery man spotted by McAfee's security" src="http://siliconangle.com/files/2014/03/mcafeesecurity-300x249.jpg" width="300" height="249" /></a></p>
<p>Mystery man spotted by McAfee’s security</p>
<p>Fast forward to late September 2013, McAfee travels down against the advice of his security team to San Jose for the C2SV Technology Conference.  Site security insists he use a certain entrance, he refuses and enters through the main entrance.  After he is done with his “Fireside Chat” and he is talking to some people in the audience his security spots a man who is watching him and watching McAfee.</p>
<p>Suddenly, a Belizean woman reaches out to McAfee and offers to cook him a Belizean meal at her home.  McAfee has no idea who she is or why this offer is made.  She insists.  She then hands McAfee a large manila envelope, then she and the mysterious man who also looks like he may be from Belize, leave.</p>
<p>Inside the envelope, a picture of a door, just your everyday average door, a message meant to intimidate McAfee somehow.  McAfee sent the photo of the man to friends in Belize who identified the man as a cousin to one his ex-employees.</p>
<h3></h3>
<h3>McAfee is dead</h3>
<p>&nbsp;</p>
<p>Then in November 2013, news emerged that McAfee was hit with an eviction and protective order.  It is here back at home that McAfee and his wife Janice report that an attempt was made on their lives.  There he reports that late one evening two police motorcycles come down the street, followed by a black SUV-type vehicle which was followed by a garbage truck.</p>
<p>It’s not garbage day.  McAfee and his wife make a run for the parking garage and hide for hours while voices and footsteps all around indicate they are looking for him, thinking he is armed.  McAfee and his wife think about running, but there’s only one way out and it is well covered.  As dawn breaks, the garbage truck collects the contents of a garbage bin where they think he is hiding in the parking structure and crushes it, and they leave.</p>
<p>McAfee collects his stuff, runs into the property manager who has strangely come in much earlier than usual.  As McAfee describes it “it was like he saw a ghost.  We asked him to show us the surveillance tapes and they have strangely disappeared.”  Shortly thereafter we have the protective order, which would ostensibly have made him come back to answer questions in Portland.</p>
<p>They have been on the run ever since and he has been tracked throughout the country.  He was meant to disappear.  A day and a half before this <a href="http://www.escapistmagazine.com/news/view/127611-John-McAfees-Death-Disappoints-John-McAfee">now-scrubbed Irish media source said McAfee had died</a>.  Later that same day, McAfee’s security guards were arrested, so he was without security for that one single day.</p>
<blockquote><p>McAfee was pronounced dead at the Palms Casino Resort in Las Vegas, where he was discovered by security personnel in a semi-conscious state following what authorities believe was a “cocaine and alcohol-fueled binge,” according to the report. He slipped into unconsciousness shortly after and could not be revived.</p></blockquote>
<p>Coincidence?  McAfee doesn’t think so.  One has to question why a news source would have a story ready to go, that detailed and published at this point in time.  McAfee figures it must have been a distraction had the attempt to make him “disappear” the next day been successful.</p>
<h2>Who wants McAfee dead?</h2>
<p>&nbsp;</p>
<p>The line forms to the left and the list is long.  It starts with his former girlfriend Amy Emshwiller – who at the very least tried to kill him at one point, leaving him rather deaf in one ear after a bullet missed his head.  Add to that list various quacks out there, a cartel or two, a list of Belizean officials and you start to get a good idea of what McAfee’s story entails.</p>
<p><a href="http://siliconangle.com/files/2014/03/IMG_20140301_162722_494.jpg"><img class="alignleft" alt="IMG_20140301_162722_494" src="http://siliconangle.com/files/2014/03/IMG_20140301_162722_494-169x300.jpg" width="169" height="300" /></a>For now, McAfee has set up camp out deep amongst the thick woods in the Blue Ridge Mountains of the eastern United States, linked to the world with redundant satellite internet connections, reminiscent of his early days at McAfee Associates, where he set up a mobile virus response unit.</p>
<p>He’s actually tracking and researching the elements of his story out here, and still working on the launch of his new company, FutureTense.  Here, McAfee is putting together the puzzle of who wants him dead, who is tailing him, and who are the people behind it all.</p>
<blockquote><p>“As crazy as it sounds, it’s real life.  It’s my life.  But we’re living in a crazy age, don’t you think?  People are crazy to accept this surveillance we live under, the freedoms we are giving up and how much money is being wasted.  That’s crazy – I’m just a wealthy man – formerly wealthy man that was in the most beautiful place in the world, but it was the most corrupt, dirty form of government and law enforcement you could ever imagine.” – John McAfee</p></blockquote>
<h2>Putting the pieces together</h2>
<p>&nbsp;</p>
<p><a href="http://siliconangle.com/files/2014/03/IMG_20140228_143018_621.jpg"><img class="alignleft" alt="IMG_20140228_143018_621" src="http://siliconangle.com/files/2014/03/IMG_20140228_143018_621-300x169.jpg" width="300" height="169" /></a>I went there to find out more and over the course of three days we get through a tremendous amount of research, going through mountains of documents, including internal memos from the Belizean government and secretly recorded discussions with government officials, and troves of evidence in a quest for the truth.</p>
<p>Over a series of calls with private investigators, associates and even officials inside the Belizean government that are loyal to McAfee, feeding him information, there’s testimony of plots, of murders happening right now, of officials causing trouble for anyone that even briefly dealt with McAfee.  A call with a private investigator reports that a contract was put out on McAfee’s life while he was in Portland worth $2 million.</p>
<p>Now somebody facilitated this contract, which according to research was carried out by potential members of the Sinaloa cartel.  McAfee’s Belizean insiders confirm many details, complete with names, places and dates.  The same investigator also reveals that a second contract had been put out, worth $650,000.  The question is if these things are true, and as McAfee reports he has been on the run, accosted by strangers in the most unusual of places, in coincidence after coincidence across the country, then who may have facilitated these contracts.</p>
<p>It would have to be somebody with extreme wealth and political connections, able to pay people off to keep their mouths shut every step of the way.</p>
<p>In the meantime, McAfee trains to keep alive until the threat is neutralized.<br />
<iframe frameborder="0" height="360" src="//www.youtube.com/embed/65IVnoJJa-g" width="640"></iframe></p>
<h2>Passports for sale: Infiltrating the US</h2>
<p>&nbsp;</p>
<p>The trail turns to a pair of American businessmen, one of which was implicated in a forceful kidnapping in California, the other, who with a massive network of hundreds of shell corporations has managed to keep his profile rather quiet.  Tiny little misspellings and variations of his name adds to the complexity of companies he has opened and closed.  At least one in Belize, and many others in the Middle East.  The web of connections is seemingly complex, but simple at the same time.</p>
<p>The paradoxes are plentiful.  Both of these businessmen are extremely wealthy, yet both own each other’s California properties through a myriad of trusts.  This network of corporations has a consistent membership of officers that consists of a repeated presence of a disgraced attorney once arrested in a congressional blackmail case and a pattern of names that come up again and again in different forms, in different companies, in different states.</p>
<p>Both businessmen reportedly associate with high-ranking Belizean officials and members of the same cartels that are tied to certain powerful officials.  A big part of this American fortune is amassed through the ownership of a chain of fast food restaurants, which sounds innocuous enough.  However once you look into the fact that some have been requesting visas from the US government with the requirements of Arabic and Farsi-speaking candidates, it takes on a new level of mystery.</p>
<p>So you have chicken restaurants that serve Americans asking for visas based on foreign language requirements; somewhat odd by any measure.   One of these American businessmen attempted to illegally purchase his own Belizean passport, a fact that was widely reported in the Belizean press.  The details of this investigation, including names are mostly already public and they will be coming forward.</p>
<h2>Corruption in Belize</h2>
<p>&nbsp;</p>
<p><a href="http://siliconangle.com/files/2014/03/1390479_10202071436817806_145174689_n.jpg"><img class="alignleft" alt="1390479_10202071436817806_145174689_n" src="http://siliconangle.com/files/2014/03/1390479_10202071436817806_145174689_n-300x223.jpg" width="300" height="223" /></a>Accusations of corruption in the Belizean government, selling passports to people have never touched the country are not difficult to find.</p>
<p>Chinese nationals with Belizean passports.  Middle-Easterners with Belizean passports.</p>
<p>McAfee has found recordings through his spyware network that include the actual price negotiations of what these passports should sell for.  From <a href="http://edition.channel5belize.com/archives/94588">Belize’s News Five report</a>:</p>
<blockquote><p>News Five has obtained a copy of an internal report compiled on the Won Hong Kim immigration scandal. Kim, A South Korean national imprisoned in Taiwan, got his nationality certificate and Belizean passport in September, 2013. It was subsequently revealed that both documents were obtained through fraudulent means, since Kim was behind bars, and never set foot in Belize. The man who signed both the nationality certificate and the passport recommendation, and indeed pushed the documents through processing, was former Minister of State with responsibility for immigration, Elvin Penner. For his role, Penner was asked to step down from his government responsibilities on September nineteenth. Exactly four months after, it has become evident that the U.D.P. official enjoys very high-level protection. Despite at least three alleged investigations, only three public officers, two of them junior level, have been targeted.</p></blockquote>
<p>They brag about the things they do, it’s nothing to them to say they are so connected and above the law, look at how powerful I am, then deny all charges as though they’re outrageous.</p>
<p>That was the end of the line and when McAfee put out this video:</p>
<p><iframe frameborder="0" height="360" src="//www.youtube.com/embed/qFgKR-_thqc" width="480"></iframe></p>
<p>Now, with the capture of Joaquin “El Chapo” Guzman, the head of the Sinaloa Cartel, he feels that a prime agent of at least one open attempt on his life will be gone for a long time.  The Sinaloa Cartel has a network of criminal activities up and down the North and South American continents including drugs, guns, murder, human trafficking and yes, assassinations.</p>
<p><a href="http://siliconangle.com/files/2014/03/McAfee-SUV.jpg"><img alt="McAfee-SUV" src="http://siliconangle.com/files/2014/03/McAfee-SUV-300x169.jpg" width="300" height="169" /></a></p>
<p>McAfee’s security vehicle</p>
<p>That’s the story McAfee is coming out with today.  He has been running for his life, he’s donned disguises, he’s criss-crossed the country in a specialized security vehicle and he’s been following leads in his story.  All while <a href="http://siliconangle.com/blog/2014/02/11/john-mcafee-has-had-enough-of-excessive-app-permissions-introduces-cognizant/">launching a company</a>.</p>
<p>It all started when he went a little too far and found out a little too much when he was down in Belize.  Still able to collect data through his network of informants, investigators and spyware system, he now has collected just about everything.  It’s that information that he feels they are still hoping will be silenced, or that they can at least continue to echo that somehow he is a madman and this is all a fallacy.  However, there is a tremendous amount of public evidence that shows substantial veracity to these claims.  It is hoped that by collecting this public evidence and reporting it that the public will begin to ask questions and perhaps any further reporters, not about McAfee, but about what exactly is going on in Belize.</p>
<p>What is going on at the Mexican border?  Why hasn’t this surfaced thus far?  Why is this considered standard public knowledge down there, yet this has no play here in the States?</p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/john-mcafees-ultimate-hack/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/03/2013-10-23-15.27.00-296x526.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Alex Jones Show: Thursday (3-13-14) John McAfee in Studio</title>
		<link>http://www.whoismcafee.com/alex-jones-show-thursday-3-13-14-john-mcafee-in-studio/</link>
		<comments>http://www.whoismcafee.com/alex-jones-show-thursday-3-13-14-john-mcafee-in-studio/#comments</comments>
		<pubDate>Sat, 15 Mar 2014 01:42:00 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3295</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><iframe width="640" height="360" src="//www.youtube.com/embed/hmWAIDJyjPI" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/alex-jones-show-thursday-3-13-14-john-mcafee-in-studio/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2013/01/alexjones-296x222.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>John McAfee Is The Real Most Interesting Man in The World</title>
		<link>http://www.whoismcafee.com/john-mcafee-is-the-real-most-interesting-man-in-the-world/</link>
		<comments>http://www.whoismcafee.com/john-mcafee-is-the-real-most-interesting-man-in-the-world/#comments</comments>
		<pubDate>Tue, 11 Mar 2014 03:02:41 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>
		<category><![CDATA[John McAfee the real most interesting man]]></category>
		<category><![CDATA[qikfunder]]></category>
		<category><![CDATA[quickfunder.com]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3291</guid>
		<description><![CDATA[Stay solvent with Qikfunder]]></description>
				<content:encoded><![CDATA[<h2>Stay solvent with <a href="http://www.qikfunder.com" target="_blank">Qikfunder</a></h2>
<p><iframe frameborder="0" height="360" src="//www.youtube.com/embed/eko_Npcv1lY" width="640"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/john-mcafee-is-the-real-most-interesting-man-in-the-world/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/03/JOHN-MCAFEE-296x167.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>John McAfee has had enough of excessive app permissions – introduces Dcentral1</title>
		<link>http://www.whoismcafee.com/dcentral1/</link>
		<comments>http://www.whoismcafee.com/dcentral1/#comments</comments>
		<pubDate>Tue, 11 Feb 2014 22:10:15 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[dcentral1]]></category>
		<category><![CDATA[john mcafee app]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3279</guid>
		<description><![CDATA[JOHN CASARETTO &#124; FEBRUARY 11TH ORIGINAL SOURCE : SILICON ANGLE Now that the long running war with Intel is behind him, John [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://siliconangle.com/blog/author/jcasaretto/">JOHN CASARETTO</a> | FEBRUARY 11TH</p>
<p><a href="http://siliconangle.com/blog/2014/02/11/john-mcafee-has-had-enough-of-excessive-app-permissions-introduces-cognizant/" target="_blank">ORIGINAL SOURCE : SILICON ANGLE</a></p>
<p>Now that the long running war with Intel is behind him, John McAfee feels like the best thing about it all is that he can finally put his name behind a security product again.  The first of his projects is about to come together in a new product that launches on March 1st.  The product is called Dcentral1, a free to download app for Android mobile phones and tablets.  It protects those devices by empowering the user to be fully aware of all the permissions that applications have been granted on a device, knowingly or not.  Think of it as a mobile applications audit.  It’s a problem that has lacked an answer for a long time and that’s a campaign that McAfee has been on for some time – we are walking around with powerful portable computers in our pockets and trusting these applications to do the things they do is bad news.</p>
<p>In a non-descript Montreal office building, McAfee demonstrated how one popular chat application in particular had by default been granted what can only be described as excessive permissions.  The application has access to things like:  all call history, contacts, GPS, camera access, the ability to silently make calls and even turn off notifications of these activities to the user.   I install the app on my own phone to see this and sure enough, it’s pretty shocking.   If you think about it, if one were to describe a program that did all of these things on a PC, it could be called malware.  McAfee states that there are thousands upon thousands of apps out there doing the exact same thing, taking more permissions than are clearly necessary or that you may be comfortable with.</p>
<p>&nbsp;</p>
<h2>Security, Privacy, Freedom, there’s more that you can do</h2>
<p>&nbsp;</p>
<p>Privacy watchdogs have long advised the public to be aware of the applications they are installing, be careful with the permissions they request, and be sure you trust the source where they are being gathered from.  Many take this advice to heart, but as it turns out, that’s just not enough and it’s just not reasonably possible for the average phone user to routinely be on top of.  Before long permissions increasingly creep as applications update with new features, app updating begins to happen in the background and people stop paying attention altogether over time; as they switch phones and install apps throughout their digital lives from all over the place.    That’s the cold hard truth and as McAfee and others pointed out in our cybersecurity prediction series over the last few weeks, the human factor will always be the weakest link in any security system.  We’re letting these applications do what they want without giving it all full thought.  After all installing apps is quite easy, tap a few buttons and we trade a place on our devices for whatever functionality that app is selling, but that is increasingly not working out to be a fair trade.  The results could mean a loss of privacy, loss of control of your device or possibly a loss of information that you don’t want to happen.</p>
<blockquote><p>“When it comes to these portable computing devices, we have these great big steel doors protecting a paper house, that’s why we’ve launched this product.  Endpoint protection, anti-virus, anti-malware, even encryption – all of those mean nothing if you have voluntarily given these applications access to everything”</p>
<p>&nbsp;</p></blockquote>
<h2>Control your smartphone, know your apps</h2>
<p>Dcentral1 by John McAfee</p>
<p>Dcentral1 is aiming to put that control back in people’s hands.  The app functions on the same kernel that is the core of McAfee’s future product D-Central.  D- Central of course is the product that was famously proclaimed as an anti-NSA device for the masses, designed to thwart rampant data collection by decentralizing the connective nature of your client device.   That hardware-based product is still forthcoming scheduled for now for later in the year.  Cognisant is but one piece of the full-on suite that McAfee is building because he sees the threat as far more than addressing these over-reaching apps, there are other threats to privacy and security out there that include the NSA.</p>
<p>&nbsp;</p>
<blockquote><p><a href="http://www.whoismcafee.com/wp-content/uploads/2014/02/cid_FC2816C91E09455585A283D16B0960D8@Qikfunder1PC.png"><img class="alignleft" alt="!cid_FC2816C91E09455585A283D16B0960D8@Qikfunder1PC" src="http://www.whoismcafee.com/wp-content/uploads/2014/02/cid_FC2816C91E09455585A283D16B0960D8@Qikfunder1PC-150x300.png" /></a>“Info collection is everywhere and people have just assumed that all these apps are on the up and up – that’s a big problem.  When you ask yourself what a chat app is doing with built-in capabilities to silently make calls and put out other information, it’s a pretty dire picture.  It’s all about taking information, accessing your location, your camera and we’re losing our privacy.  There are many companies doing this, but that’s not the only threat, we’ve talked about the NSA but many governments are doing this as well.  There are persistent rumors and documented concerns about how much information is leaking to countries like China and Russia.  It would be surprising if they weren’t taking data at will at the highest levels possible right now, so why would it be any different for these applications.  There are also cybercriminals out there that live off of information they gather, it’s a big target.  When I launched McAfee Associates 27 years ago, the world of PC security was basically the Wild West and no one was really aware of the threat and the very real dangers we still deal with today.  We are in that exact same spot again.”</p></blockquote>
<p>The timing of this is rather interesting as people are still reacting to news barely over a week old that had the NSA and GCHQ mining the popular phone apps that were leaking information, such as the incredibly successful and widespread game app Angry Birds.  The agencies have put systems in place to collect this commercial data that was freely given up by the applications.  ‘Leaky’ apps translates on one level to outbound information that is granted by permission apps – a perfect use case scenario for Dcentral1 it would seem.</p>
<h2>McAfee 2.0 – ReLaunch</h2>
<p>McAfee has done this before – bootstrapping a business that was ultimately acquired for over $7.6 billion.  One thing that is clearly different today is how McAfee is launching a company this time around.  Settled into Montreal, his operation is a global network of conference calls and virtual meetings that is heavily focused right now up to the launch with developers and engineers.  As if the fact that the first product is destined to be a Google Play app weren’t enough evidence, McAfee has picked up the framework of the modern startup quickly and he sees great things for this new venture ahead.   As Dcentral1 launches and the complete suite of Future Tense products are developed, there will be plenty of attention in this age of privacy concerns.</p>
<p>&nbsp;</p>
<p>John McAfee is scheduled to sit down live on CrowdChat to take your questions and talk about Dcentral1.  <a href="http://siliconangle.com/blog/2014/02/11/john-mcafee-has-had-enough-of-excessive-app-permissions-introduces-cognizant/1)%20Share%20this%20link%20:%20https://www.crowdchat.net/mcafee">https://www.crowdchat.net/mcafee </a></p>
<p>February 14, 2014 at 3pm EST.</p>
<h2></h2>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/dcentral1/feed/</wfw:commentRss>
		<slash:comments>23</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/02/1618364_594615290629239_748997247_o-296x88.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>Huffington Post &#8220;The Security Risks From The Internet Of Things&#8221;</title>
		<link>http://www.whoismcafee.com/huffington-post-the-security-risks-from-the-internet-of-things/</link>
		<comments>http://www.whoismcafee.com/huffington-post-the-security-risks-from-the-internet-of-things/#comments</comments>
		<pubDate>Tue, 21 Jan 2014 23:36:16 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3259</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><iframe frameborder="0" height="270" src="http://embed.live.huffingtonpost.com/HPLEmbedPlayer/?segmentId=52d97085fe34445b53000352" width="480"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/huffington-post-the-security-risks-from-the-internet-of-things/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/01/HUFINGTON-POST-LIVE.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>CNN With Martin Savidge &#8220;America has lost its way&#8221;</title>
		<link>http://www.whoismcafee.com/cnn-with-martin-savidge-america-has-lost-its-way/</link>
		<comments>http://www.whoismcafee.com/cnn-with-martin-savidge-america-has-lost-its-way/#comments</comments>
		<pubDate>Tue, 21 Jan 2014 20:19:01 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3253</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><iframe width="640" height="360" src="http://www.cnn.com/video/api/embed.html#/video/bestoftv/2014/01/20/exp-john-mcafee-on-privacy.cnn" frameborder="0"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/cnn-with-martin-savidge-america-has-lost-its-way/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/01/cnn-logo-296x175.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>For The First Time Hackers Have Used A Refrigerator To Attack Businesses</title>
		<link>http://www.whoismcafee.com/for-the-first-time-hackers-have-used-a-refrigerator-to-attack-businesses/</link>
		<comments>http://www.whoismcafee.com/for-the-first-time-hackers-have-used-a-refrigerator-to-attack-businesses/#comments</comments>
		<pubDate>Fri, 17 Jan 2014 06:59:52 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[McAfeezine]]></category>
		<category><![CDATA[hacker appliances]]></category>
		<category><![CDATA[Refrigerator hack]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3235</guid>
		<description><![CDATA[Security researchers at Proof point have uncovered the very first wide-scale hack that involved television sets and at least one [&#8230;]]]></description>
				<content:encoded><![CDATA[<h3></h3>
<p>Security researchers at Proof point have uncovered the very first wide-scale hack that involved television sets and at least one refrigerator. Yes, a fridge. This is being hailed as the first home appliance &#8220;botnet&#8221; and the first cyber attack from the Internet of Things.  A botnet is a series of computers that seem to be ordinary computers functioning in people&#8217;s homes and businesses, but are really secretly controlled by hackers. The Internet of Things, is a new term in the tech industry that refers to a concept where every device in your house gets its own computer chip, software, and connection to the Internet: your fridge, thermostat, smart water meter, door locks, etc.  <span style="color: #0000ff;"><a href="http://www.businessinsider.com/hackers-use-a-refridgerator-to-attack-businesses-2014-1" target="_blank"><span style="color: #0000ff;">READ FULL ARTICLE FROM WWW.BUSINESSINSIDER.COM </span></a></span></p>
<p>&nbsp;</p>
<h3 style="text-align: center;"><span style="color: #ff0000;">As predicted by John McAfee on November 8 2013  - India Ground Zero Summit</span></h3>
<p><iframe frameborder="0" height="315" src="//www.youtube.com/embed/nevPqXNjM-k" width="560"></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/for-the-first-time-hackers-have-used-a-refrigerator-to-attack-businesses/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/01/smart-fridge-296x221.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>RT NEWS : A government that spies on us all the time is no use&#8230;</title>
		<link>http://www.whoismcafee.com/rt-news-a-government-that-spies-on-us-all-the-time-is-no-use/</link>
		<comments>http://www.whoismcafee.com/rt-news-a-government-that-spies-on-us-all-the-time-is-no-use/#comments</comments>
		<pubDate>Fri, 10 Jan 2014 22:08:16 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>
		<category><![CDATA[John McAfee]]></category>
		<category><![CDATA[rt news]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3230</guid>
		<description><![CDATA[]]></description>
				<content:encoded><![CDATA[<p><iframe width="640" height="360" src="//www.youtube.com/embed/GCePM3FGx-4" frameborder="0" allowfullscreen></iframe></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/rt-news-a-government-that-spies-on-us-all-the-time-is-no-use/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/01/rt-news-296x164.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
		<item>
		<title>The Secret Cyber War with George Noory</title>
		<link>http://www.whoismcafee.com/the-secret-cyber-war-with-george-noory/</link>
		<comments>http://www.whoismcafee.com/the-secret-cyber-war-with-george-noory/#comments</comments>
		<pubDate>Mon, 06 Jan 2014 20:51:18 +0000</pubDate>
		<dc:creator><![CDATA[John McAfee]]></dc:creator>
				<category><![CDATA[In The News]]></category>
		<category><![CDATA[George Noory]]></category>

		<guid isPermaLink="false">http://www.whoismcafee.com/?p=3169</guid>
		<description><![CDATA[&#8220;THE SECRET CYBER WAR&#8221; with George Noory  Gaiamtv Wednesday Jan 8 2014 &#160; While many of us may be struggling to keep up [&#8230;]]]></description>
				<content:encoded><![CDATA[<h2>&#8220;THE SECRET CYBER WAR&#8221; with <a href="http://www.gaiamtv.com/video/secret-cyber-war-john-mcafee?chan=Noory&amp;utm_source=JohnMcAfee " target="_blank">George Noory  Gaiamtv</a> Wednesday Jan 8 2014</h2>
<p>&nbsp;</p>
<p><em><a href="http://www.whoismcafee.com/wp-content/uploads/2014/01/BB-Secret-Cyber-wars.jpg"><img class="alignleft" alt="BB-Secret-Cyber-wars" src="http://www.whoismcafee.com/wp-content/uploads/2014/01/BB-Secret-Cyber-wars.jpg" width="350" height="490" /><br />
</a></em></p>
<p><i>While many of us may be struggling to keep up with technological advancements, others are strongly motivated to keep up with these changes. Some are contriving new ways to compromise your security and privacy while others are determined to stop these unwarranted cyber attacks. John McAfee gives us a peek into the secret cyber war as he recounts his multiple successes and offers us a glimpse of what lies just beyond tomorrow’s horizon in this interview with George Noory .</i></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><i>Please Note:</i> You will only be able to see the show if you are a subscriber or by signing up for the <a href="http://www.gaiamtv.com/video/secret-cyber-war-john-mcafee?chan=Noory&amp;utm_source=JohnMcAfee " target="_blank">FREE 10-day trial.</a></p>
<p><script language="JavaScript" type="text/javascript" src="http://admin.brightcove.com/js/BrightcoveExperiences.js"></script></p>
<p><object id="myExperience3006682636001" class="BrightcoveExperience"><param name="bgcolor" value="#FFFFFF" /><param name="width" value="480" /><param name="height" value="270" /><param name="playerID" value="1995245672001" /><param name="playerKey" value="AQ~~,AAABJh6J5rk~,hTTefTrujMdkTZH7PWokrKhj24caHiS8" /><param name="isVid" value="true" /><param name="isUI" value="true" /><param name="dynamicStreaming" value="true" /><param name="@videoPlayer" value="3006682636001" /></object></p>
]]></content:encoded>
			<wfw:commentRss>http://www.whoismcafee.com/the-secret-cyber-war-with-george-noory/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
	<enclosure
                            url="http://www.whoismcafee.com/wp-content/uploads/2014/01/BB-FB_Promo-JohnMcafee-296x296.jpg"
                            type="image/jpeg"
                            length=""
                            />	</item>
	</channel>
</rss>
