Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Government News

FBI Says Military Had Counterfeit Cisco Routers 186

There are new developments in the case of the counterfeit Cisco routers, which we have been discussing for some time. The NYTimes updates the story after an FBI PowerPoint presentation made its way onto the Web. It seems that experts at Cisco have examined some of the counterfeit routers in detail and proclaimed that they contain no back doors. Others don't believe we can be so sure. "Last month, [DARPA] began distributing chips with hidden Trojan horse circuitry to military contractors who are participating in the agency's Trusted Integrated Circuits program. The goal is to test forensic techniques for finding hidden electronic trap doors, which can be maddeningly elusive... The threat was demonstrated in April when a team of computer scientists from the University of Illinois presented a paper at a technical conference in San Francisco detailing how they had modified a Sun Microsystems SPARC microprocessor... The researchers were able to create a stealth system that would allow them to automatically log in to a computer and steal passwords."
This discussion has been archived. No new comments can be posted.

FBI Says Military Had Counterfeit Cisco Routers

Comments Filter:
  • And outsourcing.... (Score:5, Interesting)

    by proudfoot ( 1096177 ) on Friday May 09, 2008 @01:12PM (#23352266)
    Verification of the producer is essential here - and this is perhaps the moment where outsourcing will bite us in the ass. While you can only buy american made cisco routers, there is no doubt some chipsets made in it are manafactured overseas.
  • From what I understand, the counterfeit routers are made in the same factories by the same people who make the real routers; they just keep the assembly line running past the hours that Cisco is paying them for.

    In this case, if Cisco is comparing the counterfeit routers to their legit ones, they should always be the same.

    The question this doesn't answer is this: does the LEGIT Cisco equipment contain back doors? How can Cisco be sure it doesn't? Most of the components are manufactured offshore and the assembly is done offshore. Have they examined each part with an electron microscope to verify it doesn't do anything more than what the spec says it should do?

    They can't just watch for network activity; these routers might be filtering and caching data waiting for the eventual physical removal of the router in the next upgrade cycle -- or, they might all have a kill switch built in, so someone can remotely take out ALL routers. There are an infinite number of possibilities to look for, and since Cisco doesn't manufacture everything in-house, they really don't have much hope of detecting that none of the infinite possible modifications have been made.
  • Question is... (Score:2, Interesting)

    by Anonymous Coward on Friday May 09, 2008 @01:19PM (#23352368)
    ... of the DARPA-hacked routers were any of the 'cisco experts' able to determine tampering?

    That seems like a logical test, so I have to wonder if they have done it already... or not?

    If they contain no backdoors, *THAT WE CAN FIND*, do we continue using them?
  • by Ethanol-fueled ( 1125189 ) * on Friday May 09, 2008 @01:21PM (#23352394) Homepage Journal
    I merely skimmed one article which said that Cisco examined the routers and found no backdoors. The Ministry of Peace is probably just trying to test the sneakiness of their own snooping electronics in the name of "national security". The trojans which are found are omitted and the ones which aren't found make it to the production runs. Oh, and before all of this happens, they have the Ministry of Truth spread FUD about Eastasia doing it "first", even though Cisco checked the counterfeit routers and found nothing suspicious. To paraphrase what another slashdotter said a little while ago, "...the government is using 1984 as an instruction manual." They even got Emmanuel Goldstein right: instead of making him advocate freedom, they chose a more unlikeable character(and will chose others like him): Osama Bin Laden.
  • by gregarican ( 694358 ) on Friday May 09, 2008 @01:27PM (#23352480) Homepage
    More like any company that outsources and doesn't perform internal quality control of what they are reselling should be made criminal in this instance of reselling to governmental agencies. Buy a Cisco, throw it in a private LAN sandbox, fire up Wireshark. Rinse, lather, repeat. Yawn...
  • "Partnership" (Score:4, Interesting)

    by CustomDesigned ( 250089 ) <stuart@gathman.org> on Friday May 09, 2008 @01:27PM (#23352488) Homepage Journal
    Anne McCaffrey wrote a book called PartnerShip [amazon.com] with a plot very similar to this situation. The villian provides chips to the Galaxy, including the military. When nearly everyone has upgraded, it turns out that he can remotely control every device, including military hardware, controlled by the chips. That's enough of a spoiler. How can such a grand and well planned scheme be defeated? You'll have to read to find out...
  • by dreamchaser ( 49529 ) on Friday May 09, 2008 @01:30PM (#23352526) Homepage Journal
    I am generally for free trade and against protectionism, but I am leaning more and more towards the need for a law that makes it mandatory that all gear (guns, routers, computers, coffee makers, etc.) purchased by the Government for any use that is even remotely sensitive be made in the US by US owned companies. That won't necessarily solve this kind of problem, but it would certainly make it far easier to prosecute entities who do things that threaten our national security.
  • by MarkGriz ( 520778 ) on Friday May 09, 2008 @01:38PM (#23352608)
  • by failedlogic ( 627314 ) on Friday May 09, 2008 @01:40PM (#23352644)
    I would agree on this one 100%. Outsourcing is in part responsible for this, although, we can't ever be 100% sure of goods manufactured domestically. These companies could care less about counterfeiting Cisco routers so let's say Cisco were to pull the contract. What's to stop the outsourced producer from selling these counterfeits in their own country without the Cisco name? Maybe they already are because presumably (as I understand) because IP law is hard or impossible to enforce in some countries.

    As the NSA already seems to be certifying comm. gear in the military (or might even make the chips for it). Perhaps even for other departments like the FBI. I see one possibility of this that the NSA certifies routers (or makes them itself) or at least makes them in the USA. I don't work with routers nor am I familiar with their manufacturer. I guess my last point, pertaining at least to the FBI investigation, would be invalid if Cisco makes some routers in the USA except, as you indicate, for some chipsets. Though even on chipset in itself could pose a significant risk.

    I'm just surpised that the FBI is even making a "presentation" to anyone on this; regardless of wether the presentation leaked or not.
  • by Anonymous Coward on Friday May 09, 2008 @01:42PM (#23352664)
    As being someone who recently has purchased several Cisco products on Ebay lately, I can tell you that the counterfeit items are not made on the same assembly line. There are several design differences between them.I use the "Andover test" to tell if I'm purchasing authentic Cisco cards.

    If I did purchase a card or Cisco product that did pass the Andover test, then chances are that it was manufactured on the same assembly line, but then you would most likely see a report of a duplicate mac address on a "genuine" Cisco product somewhere. So yes it's a possibility, but highly unlikely IMHO.
  • by UnknowingFool ( 672806 ) on Friday May 09, 2008 @01:49PM (#23352746)
    I don't know if that will be enough. I remember there was a story from the Cold War on how the CIA spied on the KGB. The KGB used Xerox copiers in their offices. I don't know if the CIA convinced Xerox to modify the copier or they modified it before the KGB received it, but the copier would record all copies to flash memory. Every so often, the CIA would have to retrieve the memory. The KGB eventually got suspicious that one machine seemed to be serviced all the time while the other one wasn't. They weighed both machines and found a tiny difference in weights. Eventually they found an extra board. That's my recollection of it. I can't seem to google for the backstory. Even if you bought 100% American parts, there is not guarantee that it wasn't tampered with during a routine repair and maintenance or tampered with in the manufacturing process.
  • by natoochtoniket ( 763630 ) on Friday May 09, 2008 @02:03PM (#23352926)

    The question is not whether Cisco routers have back doors. That has to be assumed. If I was running NSA over the last several decades, I would have my people deep inside every communication equipment manufacturer. The manufacturers management might not even know about it.

    The NSA surely has arranged to have one or more back doors designed into virtually every kind of communications switch. The only Cisco employees who would know about them would be the NSA people who work inside Cisco, and some regular Cisco employees who have been cleared. If this has not been done, the NSA senior managers should be fired or jailed.

    The real questions are: How many back doors are there? and who has the keys? The (assumed) NSA back door might not be the only one. There is a possibility that the Chinese or Indian chip-fab or software contractors have also installed back doors for their own governments.

    With billion-gate machines, a few thousand extra gates would be hard to see. If the extra logic looks like instruction-cache, but just has a little extra code, it would be almost impossible.

  • by Dishevel ( 1105119 ) on Friday May 09, 2008 @02:10PM (#23353006)
    Lets see. A non free society that can barley feed its people now. That has a huge number of people that is now comming into the industrial age and is going to NEED all the energy it can get its hands on very soon is an enemy to be to all who are near.
  • by Anonymous Coward on Friday May 09, 2008 @02:49PM (#23353414)
    It's funny, how quickly corporate greed will make politicians forget history.
    Some analyst say, that the sudden collapse of the USSR, Berlin Wall etc. was attributed to an American secret service mission, in which CIA secretly supplied the Russians with "smuggled" computer equipments, which were on the COCOM technology embargo list. These computers used rigged chips and in the eighties the US government demonstrated that they contorl key installations by sabotaging an oil transport system - and possibly others. The Russians got into a situation, when they had no idea how deeply their military, etc. infrastructure was compromised without any hope to regain control.
    Americans forget very fast. How long do they think, other countries would do the same - especially, if production is sent to a country, which has been known for a long time as the biggest emerging future economic power, which also happens to be ruled by totalitarian political ideology? Is anyone surprized here? It took only a few governments in the USA to fall for the same trojan horse that they used themselves. But who cares, the shareholders are happy. For now.
  • Re:Fear Fear Fear (Score:3, Interesting)

    by _Sprocket_ ( 42527 ) on Friday May 09, 2008 @02:56PM (#23353492)
    I wouldn't be so quick to dismiss the IP rights issue. Counterfeiting is all about IP rights. The law doesn't differentiate between you producing knock-off fashion items, work-alike network gear, or burning copies of a music album or movie. Expect these kinds of stories to show up more as pushes are made to put more teeth behind these laws. The same laws that most benefit hot-button topics for the Media industries.

    Having said that - I would agree that counterfeit gear is a real issue with real potential impact.
  • by CodeBuster ( 516420 ) on Friday May 09, 2008 @03:03PM (#23353642)
    Even automatic checking and testing can be subverted by a determined adversary. For example consider the program, approved by President Reagan and beginning in 1982, whereby the CIA arranged for the Soviets, who were actively attempting to acquire western technology and hardware, to receive natural gas pipeline software and equipment that was designed to "go haywire" after a set amount of time in normal operation. When the pipeline software and hardware, which would have appeared totally normal at first even if the Soviets had bothered to test it, eventually went haywire (i.e. it ran the ultra high pressure scenario) the resulting explosion was so large that it was detected by satellites designed to monitor nuclear explosions from space. The following article [msn.com] from the Washington Post describes this and other programs and operations that took place during the Cold War as part of a coordinated CIA effort to slip bad technology to our enemies.
  • by CrazedWalrus ( 901897 ) on Friday May 09, 2008 @07:49PM (#23356852) Journal
    This is all coming down to the fact that we need to assume NO network is secure; that we may be subject to man-in-the-middle attacks even within our own networks.

    The solution is not to verify every chip, because that's probably impossible. Somebody's going to sneak something in somewhere. The solution is to make all data that travels through the chip unintelligible -- e.g. point-to-point encryption for *all* connections.

    Once you encrypt all communications, the biggest security concern becomes the endpoints, not the myriad of things in between.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...