Risk
5/12/2008
12:40 PM
50%
50%

FBI Fears Counterfeit Networking Equipment Could Compromise Security

A sensitive agency PowerPoint presentation indicates that the U.S. military purchased counterfeit gear, which could threaten the security of its systems.

The FBI has discovered that counterfeit networking equipment may have compromised security of U.S. military and other sensitive government systems, according to a PowerPoint presentation posted on an alternative news Web site.

AboveTopSecret.com, a site that features news about UFOs, the paranormal, secret societies, and conspiracies, posted parts of the presentation on its Web site. The FBI appeared to validate the report by issuing a statement saying the PowerPoint presentation was not meant for widespread distribution.

The report states that the military, the FBI, the Federal Aviation Administration, defense contractors, universities, and financial institutions purchased counterfeit equipment such as routers, switches, servers, and WAN interface cards. Other equipment, including PCs and printers, could also create security vulnerabilities, according to the FBI. It's unclear whether the counterfeiting was state sponsored or for-profit, according to the presentation.

The report highlights that the federal government's procurement system places an emphasis on low prices, and counterfeit goods sell for substantially less than authentic ones. It states that one out of 10 IT products on the market is counterfeit.

The FBI indicated the gear originated in China and revealed that the products sometimes ship directly to the United States through online purchases. Sometimes they arrive via foreign governments -- including Canada, Germany, the Netherlands, and the United Kingdom. Subcontractors and vendors also play a part, and the government performs minimal, if any, background checks on vendors, according to the presentation.

With counterfeit networking equipment, government systems are exposed to failure, unauthorized access, and weakening of cryptographic systems, the FBI presentation pointed out.

FBI Assistant Director James Finch of the FBI's Cyber Division said that division provided an unclassified PowerPoint presentation and briefing in January in response to a request from another federal government agency.

"This unclassified briefing was never intended for broad distribution or posting to the Internet," he said in a prepared statement. "This presentation discussed cyberthreats, including Operation Cisco Raider. In late February 2008, the FBI and its partners at the U.S. Department of Justice and U.S. Department of Homeland Security announced the culmination of this two-year operation."

The February announcement included information about counterfeit products entering sensitive government IT systems.

The FBI said Operation Cisco Raider included 15 investigations across nine FBI field offices and resulted in 39 search warrants. The effort, which included Cisco Systems' cooperation, disrupted a large distribution network and recovered about 3,500 counterfeit components thought to be valued at more than $3.5 million, the FBI said.

A Cisco spokesperson said the company did not believe that the equipment allowed unauthorized access to the government's systems, and the FBI said it was not accusing the Chinese government of spying, according to statements published in The New York Times.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Better he's on the Internet than on the couch."
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join us as Dark Reading editors speak with IT security hiring experts about improving IT career prospects.