Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI: China may use counterfeit Cisco routers to penetrate U.S. networks
worldtribune ^ | May 15, 2008 | East-Asia-Intel

Posted on 05/15/2008 5:03:00 PM PDT by ricks_place

An FBI presentation states that China has counterfeited Cisco Systems network routers and may be using the equipment to penetrate U.S. government and private sector computer networks.

Federal authorities in February seized some 400 counterfeit Cisco Systems knockoffs worth $76 million. The equipment included routers, switches, gigabit interface converters and WAN interface cards. Among the purchasers of the fake equipment were the U.S. Naval Academy, U.S. Naval Air Warfare Center, U.S. Naval Undersea Warfare Center, U.S. Air Base at Spangdahelm, Germany, the Bonneville Power Administration, General Services Administration, and the defense contractor Raytheon, which makes key missile and weapons systems.

The FBI briefing slides on the case stated that while there are “intelligence gaps” on why the Chinese made the counterfeit equipment it could have been for profit or as part of a state-sponsored operation. Additionally the scope of the Chinese counterfeit equipment may extend beyond routers to include fake IT equipment such as PCs and printers.

Under a section titled “The Threat,” the FBI described the effort as “IT subversion/supply chain attack” that could “cause immediate or premature system failure during usage.”

The counterfeit equipment also could be used to “gain access to otherwise secure systems” and to “weaken cryptographic systems.”

The briefing slide said the Chinese information warfare efforts require “intimate access to target systems.”


TOPICS: Business/Economy; Front Page News; War on Terror
KEYWORDS: china; cisco; counterfeited; dod; nationalsecurity; noideasoftheirown; thechinesearethieves; tigersong
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last
To: ricks_place

Perhaps all of the posters who have appeared recently on FR who state they they are from the PRC could come to this thread and weigh in.


41 posted on 05/15/2008 7:06:15 PM PDT by happinesswithoutpeace
[ Post Reply | Private Reply | To 1 | View Replies]

To: DeLaVerdad

And WHAT preceded all this? That’s right, a deal between China and Cisco Systems. I remember the smiling visage of what’s-his-face, CEO of Cisco talking about what a great deal it was.

YOU and all the rest of us are suckers for doing any business with China. This is the price we pay for lifting them out of poverty. Bunch of rice-sucking parasites...


42 posted on 05/15/2008 8:13:20 PM PDT by bioqubit
[ Post Reply | Private Reply | To 14 | View Replies]

To: CodeToad; Travis McGee; ex-Texan

>>Yes, sir, China is our friend. /sarcasm

Perhaps it’s a “Special Relationship”, like the one Comrade Greenspan boasted about with the City of London?

Corporatism... communism... nothing to see here; move along and worship the hive. Bzzzzzz.


43 posted on 05/15/2008 9:36:16 PM PDT by LomanBill (A bird flies because the right wing opposes the left.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: brityank
Well well, speak of the devil.

At least it's only in our military's systems. I'd hate to think the kid's Xboxes were messed up. /s

44 posted on 05/15/2008 9:36:40 PM PDT by TigersEye (Berlin 1936. Olympics for murdering regimes. Beijing 2008.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: adcycn

Here is an article you might be interested in.


45 posted on 05/15/2008 9:40:45 PM PDT by TigersEye (Berlin 1936. Olympics for murdering regimes. Beijing 2008.)
[ Post Reply | Private Reply | To 44 | View Replies]

To: driftdiver; CodeToad; Travis McGee

Possible solution to this would be for the firmware source code to be examined, certified, and held in escrow by a trusted agency. New hardware would be submitted to said agency for comparison and certification before being placed into service.

Something comparable to the key certification available in the software world?


46 posted on 05/15/2008 9:46:22 PM PDT by LomanBill (A bird flies because the right wing opposes the left.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: ricks_place; TigersEye; Travis McGee; Jeff Head; potlatch; devolve; ntnychik; Grampa Dave; gonzo; ..
Unrestricted Warfare Qiao Liang and Wang Xiangsui (Beijing: PLA Literature and Arts Publishing House, February 1999)
47 posted on 05/15/2008 10:01:20 PM PDT by PhilDragoo (Hitlery: das Butch von Buchenvald)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LomanBill; All

This wouldn’t solve the problem. It is a piece of the solution, but it is not the whole solution.

Since so many commodity chips are now being made in China, let me paint a scenario for you all:

Let’s use a fairly easy scenario: a commodity Ethernet chip, a knock-off of a well known design that has become a second-tier product. Some 10/100 Mbit product that has only a 10BaseT interface, for example.

Into this chip using modern chip technology, it is possible to lay down a tremendous amount of logic that is not needed for an Ethernet chip. The PRC engineers could design in logic that will ‘sniff’ the packet stream and do something upon seeing a highly improbable combination of octets in the input stream.

Let’s not worry about the specifics of what the chip does when it sees the wake-up sequence. The point is, the chip could work perfectly for what you want - ie, an Ethernet transceiver and interface to a PCI card or motherboard. Perfectly. There’s just a whole lot of extra logic buried in the chip.

How would you find this? Well, you’d have to pull apart the chip, put it under a microscope, and figure out what is on the chip and see if there are blocks of logic that aren’t explained by the primary function of being an ethernet chip.

That’s the simplest scenario. You could make the same case for just about any chip within a computer; Ethernet chips are the best case, because they can do something upon seeing the correct frame that doesn’t require firmware, CPU or software interaction upon seeing the particular frame.

With the increasing free-trade agenda coming out of our moronic “leaders” in DC, the only practical way to certify that network interface chips are secure would be to use FPGA’s of US manufacture, chosen at random through blind purchases, and certified code to program the FPGA.


48 posted on 05/15/2008 10:02:18 PM PDT by NVDave
[ Post Reply | Private Reply | To 46 | View Replies]

To: NVDave

>>How would you find this?
>>Well, you’d have to pull apart the chip,
>>put it under a microscope,...

Ah, you’re right. Now that I think of it, with VLSI tech (or whatever the latest is), you’ve essentially got whole chips within chips. Processors, RAM, ROM... all packed together on the same wafer.

So it’s not as simple as pulling out an EPROM and scanning the address space.

Quite the clever pickle we’re in.


49 posted on 05/15/2008 10:12:02 PM PDT by LomanBill (A bird flies because the right wing opposes the left.)
[ Post Reply | Private Reply | To 48 | View Replies]

To: ricks_place

Just sell the Chinese only Microsoft products. Then they’ll be to busy chasing and fixing bugs to have time to hack.


50 posted on 05/15/2008 10:33:06 PM PDT by Nachoman (My guns and my ammo, they comfort me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigersEye
Here is an article you might be interested in.

Why do you think so?I am not an engineer,some posts have very complicated words and phrasing and I cant get its meaning.It make me headache. o_o

As for the topic,I just wanna ask that isn't American's technology more advanced than China's?That's what we all know and believe in.If china can do such a trick which sounds more like in a novel about spy or science fiction,then I should say I'm shocked and feel a little proud.Well,seems it failed at last.At least USA have some good QC system.Maybe Chinese should learn more before they run such a risk in a domain they know little.

ok,that's all.About the other charges,I only can say they are more like market economy and some bad guys break the law.Tell you something,It's real,that there are many thiefs,bandits,murderer,and almost all criminal you can imagine among chinese.Sorry for we are not all angels from heaven.

51 posted on 05/15/2008 10:57:40 PM PDT by adcycn (maybe I should find some sponsor for writing so hardly~~ O_O)
[ Post Reply | Private Reply | To 45 | View Replies]

To: ricks_place

bttt


52 posted on 05/16/2008 1:10:16 AM PDT by AnimalLover ( ((Are there special rules and regulations for the big guys?)))
[ Post Reply | Private Reply | To 1 | View Replies]

To: jahp; LilAngel; metmom; EggsAckley; Battle Axe; SweetCaroline; Grizzled Bear; goldfinch; B4Ranch; ..
MADE IN CHINA POTTERY STAMP

A ping list dedicated to exposing the quality, safety and security issues of food and other products made in China.


Please FReepmail me if you would like to be on or off of the list.

(This can be a high volume ping list.)

53 posted on 05/16/2008 2:52:36 AM PDT by JACKRUSSELL
[ Post Reply | Private Reply | To 22 | View Replies]

To: Hyzenthlay

ping


54 posted on 05/16/2008 5:35:07 AM PDT by metmom (Welfare was never meant to be a career choice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NVDave

Your example is intriguing but .....

It would be hard for a low level thing (Enet chip) to do a high level function I would think. It could I guess stop working though - if you see “12345abcde” - go into degraded mode. That could be done I would think. I don’t really see how an enet chip is going to “call home” or steal the chocolate chip cookie recipe or whatever.


55 posted on 05/16/2008 7:24:35 AM PDT by 2 Kool 2 Be 4-Gotten
[ Post Reply | Private Reply | To 48 | View Replies]

To: ricks_place

We will never learn to not trust Communists or Liberal/Socialist/Progressive/Marxists.


56 posted on 05/16/2008 7:30:47 AM PDT by Dustbunny (Freedom prospers when religion is vibrant and the rule of law under God is acknowledged. The Gipper)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ricks_place

Gosh, what a beneficient bunch. Lead poisoned toys, poisoned medicine, poisoned pet food, poisoned FOOD food...fake routers, cyber attacks...PNTR was a GREAT idea. Thanks, Bill Clinton.


57 posted on 05/16/2008 7:33:01 AM PDT by cake_crumb (Obama's bus needs a lift kit just to clear all the bodies!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ricks_place

Tired of chicoms.


58 posted on 05/16/2008 7:42:52 AM PDT by MARKUSPRIME
[ Post Reply | Private Reply | To 1 | View Replies]

To: adcycn

Interesting tagline. HIGHLY interesting that there’s as little content as their is grammar in our post...except for well, if you can’t beat China you deserve what you get angle. Interesting.


59 posted on 05/16/2008 7:43:38 AM PDT by cake_crumb (Obama's bus needs a lift kit just to clear all the bodies!)
[ Post Reply | Private Reply | To 51 | View Replies]

To: driftdiver
Corporate secrets are also high on the list.

But it's the corporates that are giving their secrets to China. A bottom line increase in a quarter is seen as more important than any of those silly trade secrets.

60 posted on 05/16/2008 8:23:29 AM PDT by webheart
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson