Risk
5/12/2008
12:40 PM
Connect Directly
RSS
E-Mail
50%
50%

FBI Fears Counterfeit Networking Equipment Could Compromise Security

A sensitive agency PowerPoint presentation indicates that the U.S. military purchased counterfeit gear, which could threaten the security of its systems.

The FBI has discovered that counterfeit networking equipment may have compromised security of U.S. military and other sensitive government systems, according to a PowerPoint presentation posted on an alternative news Web site.

AboveTopSecret.com, a site that features news about UFOs, the paranormal, secret societies, and conspiracies, posted parts of the presentation on its Web site. The FBI appeared to validate the report by issuing a statement saying the PowerPoint presentation was not meant for widespread distribution.

The report states that the military, the FBI, the Federal Aviation Administration, defense contractors, universities, and financial institutions purchased counterfeit equipment such as routers, switches, servers, and WAN interface cards. Other equipment, including PCs and printers, could also create security vulnerabilities, according to the FBI. It's unclear whether the counterfeiting was state sponsored or for-profit, according to the presentation.

The report highlights that the federal government's procurement system places an emphasis on low prices, and counterfeit goods sell for substantially less than authentic ones. It states that one out of 10 IT products on the market is counterfeit.

The FBI indicated the gear originated in China and revealed that the products sometimes ship directly to the United States through online purchases. Sometimes they arrive via foreign governments -- including Canada, Germany, the Netherlands, and the United Kingdom. Subcontractors and vendors also play a part, and the government performs minimal, if any, background checks on vendors, according to the presentation.

With counterfeit networking equipment, government systems are exposed to failure, unauthorized access, and weakening of cryptographic systems, the FBI presentation pointed out.

FBI Assistant Director James Finch of the FBI's Cyber Division said that division provided an unclassified PowerPoint presentation and briefing in January in response to a request from another federal government agency.

"This unclassified briefing was never intended for broad distribution or posting to the Internet," he said in a prepared statement. "This presentation discussed cyberthreats, including Operation Cisco Raider. In late February 2008, the FBI and its partners at the U.S. Department of Justice and U.S. Department of Homeland Security announced the culmination of this two-year operation."

The February announcement included information about counterfeit products entering sensitive government IT systems.

The FBI said Operation Cisco Raider included 15 investigations across nine FBI field offices and resulted in 39 search warrants. The effort, which included Cisco Systems' cooperation, disrupted a large distribution network and recovered about 3,500 counterfeit components thought to be valued at more than $3.5 million, the FBI said.

A Cisco spokesperson said the company did not believe that the equipment allowed unauthorized access to the government's systems, and the FBI said it was not accusing the Chinese government of spying, according to statements published in The New York Times.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio