Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI: China may use counterfeit Cisco routers to penetrate U.S. networks
worldtribune ^ | May 15, 2008 | East-Asia-Intel

Posted on 05/15/2008 5:03:00 PM PDT by ricks_place

An FBI presentation states that China has counterfeited Cisco Systems network routers and may be using the equipment to penetrate U.S. government and private sector computer networks.

Federal authorities in February seized some 400 counterfeit Cisco Systems knockoffs worth $76 million. The equipment included routers, switches, gigabit interface converters and WAN interface cards. Among the purchasers of the fake equipment were the U.S. Naval Academy, U.S. Naval Air Warfare Center, U.S. Naval Undersea Warfare Center, U.S. Air Base at Spangdahelm, Germany, the Bonneville Power Administration, General Services Administration, and the defense contractor Raytheon, which makes key missile and weapons systems.

The FBI briefing slides on the case stated that while there are “intelligence gaps” on why the Chinese made the counterfeit equipment it could have been for profit or as part of a state-sponsored operation. Additionally the scope of the Chinese counterfeit equipment may extend beyond routers to include fake IT equipment such as PCs and printers.

Under a section titled “The Threat,” the FBI described the effort as “IT subversion/supply chain attack” that could “cause immediate or premature system failure during usage.”

The counterfeit equipment also could be used to “gain access to otherwise secure systems” and to “weaken cryptographic systems.”

The briefing slide said the Chinese information warfare efforts require “intimate access to target systems.”


TOPICS: Business/Economy; Front Page News; War on Terror
KEYWORDS: china; cisco; counterfeited; dod; nationalsecurity; noideasoftheirown; thechinesearethieves; tigersong
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 last
To: webheart

“But it’s the corporates that are giving their secrets to China. A bottom line increase in a quarter is seen as more important than any of those silly trade secrets. “

In some cases yes, because in some cases the people making those decisions have interests in other countries, no morals, or are greedy. Profit this quarter are the only important thing, besides their bonuses of course.

Many countries have very active efforts to capture US trade secrets and technology. Its not only military technology, but food technology, chemicals, materials, processes and so forth.

One example is the knowledge it takes to implement complex information systems. Methodologies that took many years to develop at untold cost are available for anyone to download.

The very IT security standards recommended for banks, government, health are other examples of whats available for download. We are giving away our economic and technical advantages.


61 posted on 05/16/2008 9:29:45 AM PDT by driftdiver
[ Post Reply | Private Reply | To 60 | View Replies]

To: 2 Kool 2 Be 4-Gotten

It could copy all manner of information gathered on the network and send it back out on the wire to a designated receiver controlled by the PLA, for starters. You could put enough logic onto an commodity ethernet chip now to do a wide variety of very nice things.

Think about it this way: many Ethernet chips are made with older fab technology. There isn’t a huge, crying demand for Ethernet chips made with 0.90nm processes, for example.

Buuuuut.... what if you want to cram a whole lot more stuff onto a chip and have it look the same outwards (eg, from the size of the package) as a commodity chip. Well, now you use a newer process, cram many, many, many more gates onto the chip than is usual, and you could have a complete embedded CPU+memory in there - alongside the commodity Ethernet functions.

Let’s go back to basics:

How do you know what is inside the epoxy package of a chip?

Answer: Absent splitting the package off the chip, you don’t know that there’s anything more in there than the functionality you bought. By testing all of the functionality, you can tell that something is *missing*, but you cannot tell that there might be something *extra*.

So if you’re a EE with the equipment, you think that you should be able to spot the extra logic through the JTAG interface, right?

They could use fuseable links and just blow open the connections from the JTAG interface to the extra logic when they ship the chip.

As I said previously - the only way to know what is really in those commodity chips is to open up the package, get our your microscope and start looking at what is on the wafer.


62 posted on 05/16/2008 9:54:58 AM PDT by NVDave
[ Post Reply | Private Reply | To 55 | View Replies]

To: NVDave

I think all that would be hard to do at the eithernet Phy layer.

Your point about not knowing what’s in a chip you purchase is a good one.

But as I said DOS type attacks would surely be doable.


63 posted on 05/16/2008 10:23:23 AM PDT by 2 Kool 2 Be 4-Gotten
[ Post Reply | Private Reply | To 62 | View Replies]

To: ZachS
$76 million / 400 = 190,000 per unit. Somehow I doubt that if it is routers, but then again, I have never purchased an industrial sized router for a government agency, either.

They get real big and real expensive. A completely tricked-out Cisco carrier grade system will run an obscene amount of traffic (IIRC around 100 terabits per second) and cost an obscene amount of money.

64 posted on 05/16/2008 1:04:04 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 13 | View Replies]

To: Nachoman

ping!


65 posted on 05/21/2008 12:43:07 PM PDT by AZCO
[ Post Reply | Private Reply | To 50 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-65 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson