Risk
5/12/2008
12:40 PM
50%
50%

FBI Fears Counterfeit Networking Equipment Could Compromise Security

A sensitive agency PowerPoint presentation indicates that the U.S. military purchased counterfeit gear, which could threaten the security of its systems.

The FBI has discovered that counterfeit networking equipment may have compromised security of U.S. military and other sensitive government systems, according to a PowerPoint presentation posted on an alternative news Web site.

AboveTopSecret.com, a site that features news about UFOs, the paranormal, secret societies, and conspiracies, posted parts of the presentation on its Web site. The FBI appeared to validate the report by issuing a statement saying the PowerPoint presentation was not meant for widespread distribution.

The report states that the military, the FBI, the Federal Aviation Administration, defense contractors, universities, and financial institutions purchased counterfeit equipment such as routers, switches, servers, and WAN interface cards. Other equipment, including PCs and printers, could also create security vulnerabilities, according to the FBI. It's unclear whether the counterfeiting was state sponsored or for-profit, according to the presentation.

The report highlights that the federal government's procurement system places an emphasis on low prices, and counterfeit goods sell for substantially less than authentic ones. It states that one out of 10 IT products on the market is counterfeit.

The FBI indicated the gear originated in China and revealed that the products sometimes ship directly to the United States through online purchases. Sometimes they arrive via foreign governments -- including Canada, Germany, the Netherlands, and the United Kingdom. Subcontractors and vendors also play a part, and the government performs minimal, if any, background checks on vendors, according to the presentation.

With counterfeit networking equipment, government systems are exposed to failure, unauthorized access, and weakening of cryptographic systems, the FBI presentation pointed out.

FBI Assistant Director James Finch of the FBI's Cyber Division said that division provided an unclassified PowerPoint presentation and briefing in January in response to a request from another federal government agency.

"This unclassified briefing was never intended for broad distribution or posting to the Internet," he said in a prepared statement. "This presentation discussed cyberthreats, including Operation Cisco Raider. In late February 2008, the FBI and its partners at the U.S. Department of Justice and U.S. Department of Homeland Security announced the culmination of this two-year operation."

The February announcement included information about counterfeit products entering sensitive government IT systems.

The FBI said Operation Cisco Raider included 15 investigations across nine FBI field offices and resulted in 39 search warrants. The effort, which included Cisco Systems' cooperation, disrupted a large distribution network and recovered about 3,500 counterfeit components thought to be valued at more than $3.5 million, the FBI said.

A Cisco spokesperson said the company did not believe that the equipment allowed unauthorized access to the government's systems, and the FBI said it was not accusing the Chinese government of spying, according to statements published in The New York Times.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.