Antivirus pioneer John McAfee spins tales of a Hezbollah plot to smuggle toxic powder into the U.S. that he uncovered when he spied on Belize officials in hopes of getting dirt on them in retaliation for their raiding his island home there, shooting his dog and stealing his stuff.He rolls out his complex, disjointed narrative via his blog (he says he wrote partially while on the run from Belize police and military) and also through interviews he grants to sometimes gullible journalists — and it’s questionable how much of it is true and how much he just makes up.BACKGROUND: Murder suspect/fugitive John McAfee defends himself via blogMORE BACKGROUND: McAfee in a Guatemalan jail cell, still ‘blogging’ Regardless, he purports to have spied on Belize police, politicians and power brokers as a way to get back at them for what he says they did to him.For an operation designed by an antivirus pioneer, by his own description he employed only the most rudimentary of technical skills and relied heavily on socially manipulating his victims to gather intelligence, according to a top security consultant. “It’s standard stuff,” says John Pironti, president of IP Architects, and leader of the security track at Interop. “Most of what he did was social engineering.”While there is only McAfee’s word that he carried out anything, what he describes is a scheme in which he passed out 75 laptops tainted with key loggers and remote control capabilities to officials he wanted to spy on. The devices called home with lists of user names and passwords they harvested, and he turned on the cameras and microphones on some of the machines in hopes of learning more.He supplemented that with what McAfee calls the pillow talk of his targets as told to the operatives he assigned to cozy up to them.Yet for all the technical skills that he possessed as founder of the security company that still bears his name — he left it in 1994 — McAfee relied on personal deception and freeware to gather most of what he found out.“These are common techniques that parents use on their own children,” says Pironti. “He probably just downloaded freeware.”Indeed, in an interview with Alex Jones of InfoWars.com, McAfee notes that the key loggers he used could be downloaded from CNET for free. In addition to reporting pillow talk, the operatives borrowed computers their targets previously owned and cellphones to infect the computers with spyware and to copy text messages to the phones, McAfee claims.“It’s not something that hasn’t been done before,” Pironti says, and the social aspects of the deception have their roots in the most ancient intelligence gathering.Much of the success of McAfee’s purported operation relied on the gullibility of his victims, who should have known better, Pironti says. “Using laptops or desktops from someone they don’t know so well? That’s a training issue. Shame on them for that one.”By gaining lists of usernames and passwords for some accounts visited by targets, McAfee could likely exploit other sites given people’s tendency to reuse passwords account to account and site to site, Pironti says. And that is very powerful. “Once you get that level of credentialing it’s all over,” he says. The lesson? “Social engineering is still the most effective attack we have in the world. Without it, this would have been unsuccessful,” Pironti says.Still McAfee did a good job setting up his network. “He was a software, computer, security guy — the right factors to help a social engineering team work better,” he says. “He was organizing this in a fairly sophisticated way where he had the funds to do this.”Tim Greene covers Microsoft for Network World and writes theA Mostly MicrosoftA blog. Reach him atA tgreene@nww.comA and follow him on TwitterA @Tim_Greene.Read more about wide area network in Network World’s Wide Area Network section. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe