Feeds

McAfee founder raided in Belize by gang-busting police

Claims political persecution and dog murder

High performance access to file storage

John McAfee, retired founder of McAfee Antivirus, has had his Belize laboratory raided and his dog shot during a dawn raid by thirty officers of the local police Gang Suppression Unit.

At 6am on Monday morning the officers with a warrant stormed McAfee's laboratory, which researches ways to use bacterial communication to fight disease. In a statement to local station Channel Five, McAfee said police smashed open unlocked doors, handcuffed the 12 employees and "murdered my dog in cold blood."

"This is clearly a military dictatorship where people are allowed to go and harass citizens based on rumor alone and treat them as if they are guilty before any evidence whatsoever is obtained," he said. "It is astonishing, it is beyond belief and I intend not to let this stand. I will not stand idly by to let this happen to me."

The police claimed that the facility had unlicensed firearms, and McAfee claims the correct documents were all handed over, but after the raid a single firearms certificate was missing and he and his staff were left handcuffed in the compound for 14 hours. It took copies of the original certificates and the intervention of the US embassy to get him released, but his passport was seized.

McAfee claims that he was approached by a local politician who asked for a donation to his campaign. He refused. McAfee has spent millions on local health and police programs, but has not wanted to get involved in politics, he said.

"I am an old man, I am sixty-six. I have a fair amount of money and not much to do. So I spend it where I think it will do good. And I don’t ever invest in politics," he said. "I don’t donate to any political party; I don’t have any political affiliations. I think politics is foolish for a private citizen like myself to engage in — the winning party, you never get your money and the losing party, you're on the outs."

McAfee originally started researching the Brain virus as an intellectual exercise, before marketing code to handle the first malware by pioneering shareware. He eventually started McAfee before selling it to Network Associates and retiring to study yoga, while still investing in technology and research. ®

High performance access to file storage

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.