Vulnerabilities / Threats
12/12/2012
11:14 AM
50%
50%

McAfee To Be Released From Guatemalan Prison

Antivirus founder's lawyer said a Guatemalan judge will rule that McAfee was illegally detained, paving the way for his return to the United States.

Who Is Hacking U.S. Banks? 8 Facts
Who Is Hacking U.S. Banks? 8 Facts
(click image for larger view and for slideshow)
Antivirus founder John McAfee is set to be released from a Guatemalan jail.

Telesforo Guerra, McAfee's lawyer in Guatemala, told the Los Angeles Times Tuesday that Guatemalan Judge Judith Secaida verbally said to him that she plans to rule that McAfee had been illegally incarcerated.

Guerra said McAfee would be released as soon as the court could process the judge's written instructions, which would likely happen Thursday or Friday. "It's a victory because the government wanted to send him back to Belize," he told the newspaper via phone. "With this kind of resolution, they cannot do it."

[Read 6 Wacky McAfee Facts: From Guatemala, With Twists.]

By Wednesday, McAfee's blog posted a message saying that McAfee would be released at 9 a.m. local time that day from the immigration facility in which he's currently incarcerated in Guatemala City.

According to Guerra, Guatemalan law grants anyone who enters the country 10 days to settle their immigration status. "There is no crime in coming without any visa," he said. "If there's not any crime, the immigration office has to release him."

McAfee Tuesday told Britain's Sky News that he was "100% certain" that he'd soon be leaving Guatemala for the United States. He's stated multiple times that he planned to relocate there with his 20-year-old girlfriend, Sam Vanegas.

McAfee, who's resided in Belize since 2008, was arrested last week in Guatemala on immigration violation charges. But he posted regular blog updates, in part to criticize the Belize government for corruption, as well as for attempting to frame him for the murder of his American neighbor, Gregory Viant Faull, 52.

Belize prime minister Dean Barrow has denied those charges, and instead criticized McAfee for his "extremely paranoid" and "bonkers" behavior. Furthermore, Belizean police investigators are maintaining that McAfee is a "person of interest" in their murder investigation, saying they want to question him. No charges, however, have been filed against McAfee.

It's been a busy week for McAfee, who announced that he's sold the rights to his life story. He also said Tuesday that he would be ending his relationship with Vice magazine, which had filmed his three-week flight from Belize to Guatemala over land and by boat.

Shortly after landing, Vice published a story, titled "We Are With John McAfee Right Now, Suckers," which included an iPhone photograph showing two of its journalists with McAfee, but declining to name their location. The EXIF data attached to the photograph, however, showed that it had been taken in Guatemala, and according to McAfee, that mishap led directly to his arrest.

"Due to information just received, It is no longer clear to Mr. McAfee that the 'accidental' release of his co-ordinates due to Vice Magazine's editorial department's failure to remove location data from their now notorious photo, was indeed an accident," according to a post to McAfee's blog made by "Harold M.," who's described on the blog only as "a close friend of Mr McAfee."

"This incident led directly to Mr. McAfee's arrest," according to the post. "The reason, possibly, was that Vice wanted exclusive access to Mr. McAfee's arrest, which they in fact obtained and broadcast. This, and subsequent developments, including a breach of verbal contract, has led Mr. McAfee to terminate all contact with Vice."

Storing and protecting data are critical components of any successful cloud solution. Join our webcast, Cloud Storage Drivers: Auto-provisioning, Virtualization, Encryption, to stay ahead of the curve on automated and self-service storage, enterprise class data protection and service level management. Watch now or bookmark for later.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
12/17/2012 | 8:13:33 PM
re: McAfee To Be Released From Guatemalan Prison
Do the reporter shave any IT knowledge at all. Really they are going to upload a pic from their mobile phone and didnG«÷t know that it disclosed the pics location? McAfee allowed them to snap he shot also, that was not to smart considering he is in hiding and the pic led to his arrest! So what is the outcome of McAfee?

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.