Skip to main content

John McAfee: Why Homeland Security is failing miserably at protecting us online

domestic security digital age the fortress wall
Like a fortress wall with a hole in it, Homeland Security's cyber policy has a major problem. tOrange.us
John McAfee is one of the most influential commentators on cybersecurity anywhere in the world. His new venture — Future Tense Central — focuses on security and personal privacy-related products. McAfee provides regular insight on global hacking scandals and internet surveillance, and has become a hugely controversial figure following his time in Belize, where he claims to have exposed corruption at the highest level before fleeing the country amid accusations of murder (the Belize government is currently not pursuing any accusations against him).

In the U.S., domestic security is handled by the Department of Homeland Security. Homeland Security was formed shortly after the 2001 attacks on the World Trade Center and the Pentagon — at a time when the Internet was still in its infancy and the concepts of cyber warfare had not been seriously considered.

“The world has subtly circumvented Homeland Security and its focus on ancient security paradigms.”

In 2001, if a foreign government wanted access to sensitive files about U.S. foreign agents it would have had to rely on embedded agents who might be able to walk off with a few select files using a copy machine or a hidden camera. Stealing a few thousand such files would have been an unimaginable coup.

I am 100-percent confident that Homeland Security is well positioned to counter the above threat, and would detect any attempts at such theft well before enough files could be accessed that would significantly damage the U.S. The problem is, we will never again see such a threat.

The world has subtly circumvented Homeland Security and its focus on ancient security paradigms. Earlier this year, the Chinese walked off with more than 14 million files of every person who has worked for the U.S. government for the past 30 years, including every person with a top secret clearance — our covert agents. This would have been beyond the realm of imagination 15 years ago, but now, we know that a pre-teen with a few weeks of time on their hands could have pulled off the same heist, in spite of Homeland Security spending billions on counter cyber surveillance tools. Why? Because America is clueless when it comes to cyber science.

Any good programming manager, with sufficient experience, will verify what I am about to say.

John-McAfee--How-no-one-got-laid-on-Ashley-Madison
Image used with permission by copyright holder

Cyber science is unique in the history of sciences in that man-hour requirements for any given task do not map linearly to individual programmers. I first learned this in a gig way when I managed a group of programmers while I worked at Lockheed. One of the tasks assigned to my group was the development of a very complex algorithm (my clearance at the time prevents me from giving specifics). I made a few attempts at an efficient design and concluded that half a man year would be required to implement it. I assigned it to one of my top programmers, who came back and said that it would take at least a year to implement. Something that I couldn’t put my finger on kept nagging me, though. I had two consecutive nights of dreaming about the issue and finally went to a programmer who seldom talked named Ed Hatch. Ed was quiet and didn’t join in on group discussions, but the few times I had heard him speak the eloquence was impressive.

I discussed the algorithm with Ed, who said little. I left his office still thoughtful and troubled. At noon Ed walked into my office and handed me a program consisting of less than 100 lines of code. It was the completed algorithm. I perused the code. It consisted of nested recursive subroutines arranged in such an exquisitely beautiful pattern that, in spite of my embarrassment, brought tears to my eyes. That began a lifelong relationship with Ed that has included a book on physics and numerous programming projects.

Later, when I founded McAfee Antivirus, I came across a programmer named Dennis Yelle. Dennis had no social life and would be classified by most people as sociopathic. We first met when I was running the Home base bulletin board in Silicon Valley. He was a user of the board. He had complained about the accuracy of my system clock, which gained a few seconds over a matter of months. The clock was not used for processing — just for telling time — so I didn’t consider it an issue. It was Dennis, however, who showed up at my house one morning with a new system click chip — insisting I allow him inside to change out the clock. I did not object, so he came in, shut the system down, changed out the clock, re-assembled my computer, restarted it, and left without a word.

“America is clueless when it comes to cyber science.”

The first programming job I assigned Dennis, which I judged would take an excellent programmer a couple of months to complete, was returned to me, finished, in three hours. He improved from there. For the first 18 months of the existence of McAfee Antivirus I had one programmer: Dennis. Symantec, my closest competitor at the time, employed over 200 programmers that were assigned full time to working on their antivirus product. Symantec had 10 percent of the world antivirus marketplace at the time. I had 87 percent. I have met hundreds of similar talents in my years, most recently Eijah, the architect and programmer of Demonsaw and lead AI programmer for GTA — and my good friend.

What I need to point out is the following: No matter how good an assembly line worker, bus driver, airline pilot, or ship captain may be, they cannot be more productive than their co-workers by a wide margin. You can’t push an oil tanker to make a voyage across the Pacific 200 times faster than the tanker that it left port with. But cyber science does not adhere to this constraint.

Programmers like Ed Hatch and Dennis Yelle go off, and with their reputation, are paid 10 times what an average programmer makes. The U S. government has guidelines for salaries that account for time spent at the desk only. If someone walks through the door who could save them in short order, where thousands of others have failed, and even asks for twice what others are making, they will be sent home.

We will remain a third-rate nation, measured on our cyberwar acumen, until we as a country and as a society understand the position our ossified government has placed us in.

John McAfee
Former Digital Trends Contributor
Who is John McAfee? John McAfee is one of the most influential commentators on cybersecurity anywhere in the world. His…
How to create a Subreddit on desktop and mobile
Laptop Working from Home

Few social media sites are as popular as Reddit. Regardless of what you're interested in, there's probably a thriving community for you to interact with on the platform. Known as subreddits, these communities are home to topics like gaming, world news, science, movies, and more. If you can't find a subreddit with your particular interest, Reddit makes it easy to create your own Reddit community.

Running a successful Reddit community isn't easy – but the process of starting one only takes a few minutes. Keep in mind that you'll want to keep a close eye on your subreddit to prevent it from being shut down or turning into a wasteland with no users, but running a subreddit can be a lot of fun when done properly. If you prefer, you can also create a private community that only your friends can join, giving you a place to hang out beyond Twitter and TikTok.

Read more
How to download music from YouTube on desktop and mobile
A woman sitting on a couch, wearing airpods and holding and looking at a smartphone.

Downloading music from YouTube is a fairly common practice, and the demand for making the process easier has inspired the creation of countless websites and software.

But not every service can be considered safe. In fact, some of these services may infect your computer with malware or produce poor-quality audio files. When downloading music from YouTube, you’ll need to first make sure that the websites or apps you use for doing so won’t hurt your device. For this guide our team has found two methods to make the process safer and easier.

Read more
How to clear your browser cache in Chrome, Edge, or Firefox
The Firefox iPhone app.

A stocked computer cache may be convenient for logging into and out of go-to sites in seconds flat, but a major buildup of these tracking codes could significantly impact your PC’s performance. If you’ve noticed that your PC has been running rather slow of late, or you’re using a new browser and don’t know how to clear its cache, we’ve got you covered with the following guide.

Read more