SlideShare a Scribd company logo
FBI Criminal Investigation:
Cisco Routers
Section Chief Raul Roldan
Supervisory Special Agent Inez Miyamoto
Intelligence Analyst Tini Leon
January 11, 2008
The overall classification of this presentation is
UNCLASSIFIED
Agenda
• FBI Criminal Investigation
• Supply Chain
• Critical Infrastructure Threats
• Government Procurement Problems
• FBI Coordination
• Intelligence Gap
FBI Criminal Investigation
Cisco Routers
Nationwide Cases
Green – DCIS; Red – FBI joint cases; Blue – FBI
Search Warrants Executed
Boston
Cleveland
Boulder
Houston
Columbus
Kansas City
Long Beach
Dallas
Oklahoma City
Counterfeit Equipment
• Routers
– Models: 1000 and 2000 Series
• Switches
– Models: WS-C2950-24, WS-X4418-GB (for
CAT4000series)
• GigaBit Interface Converter (GBIC)
– Models: WS-G5483, WS-G5487
• WAN Interface Card (WIC)
– Models: VWIC-1MFT-E1, VWIC-2MFT-G703, WIC-
1DSU-T1-V2
Counterfeit Products
Source: <http://www.usedcisco.com/press-my-esm_used_cisco_identifying_fake_chisco.aspx>
Cost Comparison Example
• Counterfeit
– 1721 Router
– $234.00
• Genuine
– 1721 Router
– $1,375.00
Cisco Identified Problems
• Problems
– Low manufacturing standards
– Higher failure rate
– Duplicate MAC addresses of routers and switches
can shut down an entire network
• Examples
– In 2002, duplicate MAC addresses shut down an end
user’s network in Pittsburgh
– In 2004, a government agency conducted a network
upgrade to its North American weather
communication system—it failed upon installation
– Cisco 1721 router installed in a network caught fire
due to a faulty power supply
Sub-Contracting Process
GSA IT Vendor
1st Sub-Contractor
3rd Sub-Contractor
2nd Sub-Contractor
Counterfeit Equipment
Distributor
Government or
Govt. Contractor
(drop ships as GSA Vendor)
(order placed)
Supply Chain
ShenZhen, PRC
Supply Chain 1 –
Directly from PRC
Supplied to Government
through “drop ship”
U.S. Distributors
places orders
Supply Chain 2 –
Through Foreign Country
Distributors
Supply Chain 3 – ebay
Supply Chain 4 –
Government Credit Card
Non-GSA Vendor
Selling Cisco Equipment
Government
Purchase Card
Open Source Examples
• Supply Chain 1 – Directly from PRC
– eGlobe Solutions Inc.
– Syren Technology
– Navy Project
– MortgageIT
• Supply Chain 3 – ebay
– Todd Richard
• Supply Chain 4 – Government Purchase Card
– FBI
eGlobe Solutions Inc.
Source: <http://www.usdoj.gov/usao/waw/press/2006/nov/song.html>
eGlobe
Solutions
(Authorized Cisco Vendor)
eGlobe Solutions Inc.
• May 2003 – July 2005
– $788,000 counterfeit equipment
• November 2006 Indicted
– Conspiracy, Mail Fraud, and Counterfeit Trademark
• Sold to
– U.S. Naval Academy
– U.S. Naval Air Warfare Center
– U.S. Naval Undersea Warfare Center
– U.S. Air Base (Spangdahelm, Germany)
– Bonneville Power Administration
– General Services Administration
– Raytheon (Defense Contractor)
Syren Technology
Source: <http://http://www.usdoj.gov/usao/txs/releases/January%202008/080104Edman.html>
Syren
Technology
Syren Technology
• August 2002 – July 2004
• December 2007 Indicted
– Trafficking in counterfeit Cisco products
• Sold to
– Marine Corps
– Air Force
– Federal Aviation Administration
– FBI
– Defense Contractors
– Universities and Financial Institutions
U.S. Navy Project
Source: <http://www.govexec.com/dailyfed/0907/092807j1.htm>
Sub-contractor
(Won bid for US Navy Project)
(Ships counterfeit to U.S. Navy)
U.S. Navy
(Unauthorized Cisco reseller)
U.S. Navy Project
• $250,111 counterfeit Cisco equipment
• Lockheed Martin
– Did not use GSA IT Vendor or authorized
Cisco reseller
– Discovered duplicate serial numbers Cisco
switches
MortgageIT:
Non-government Example
Source: <http://www.networkworld.com/news/2006/102306counterfeit.html>
Unidentified
Distributor
(Authorized Cisco Vendor)
Unidentified
Supplier
MortgageIT:
Non-government Example
• Discovered WICs were faulty during
routers upgrade
– 30 counterfeit WAN Interface Cards (WIC)
• Atec Group Inc.
– Authorized reseller selling counterfeit
• Cisco
• Microsoft
• Symantec
Todd Richard
Source: <http://www.cybercrime.gov/richardPlea.pdf>
Todd Richard
• Between 2003 – 2007
– $1,000,000 counterfeit equipment
• October 2007 Indicted
– Trafficking in counterfeit Cisco trademarks
• Separate shipments
– Counterfeit equipment, labels, boxes, and
manuals
Supply Chain 4 –
Government Credit Card
Non-GSA Vendor
Selling Cisco Equipment
Government
Purchase Card
Critical Infrastructure Threat
Scope of the Problem
• Alliance for Gray Market and
Counterfeit Abatement (AGMA) &
KPMG White Paper
– 1 in 10 IT products sold are counterfeit
– 10% IT products counterfeit
• $100 billion
Source: KPGM International, “Managing the Risks of Counterfeiting in the Information Technology Industry,” 2006
Scope of the Problem
• Law Enforcement estimates much higher
– Customs and Border Protection (CBP)
• Only seize registered items
– Dell Computers not registered
– No label = no seizure
• Cannot check every container
– FBI
• Chinese postal service vs. shipping services
– Smaller shipments
• Hardware, software, manuals and labels shipped separately
– Assembled in United States
Total Number of IPR Seizures
5,793
6,500
7,255
8,022
14,675
2002 2003 2004 2005 2006
Total Number of IPR Seizures
Total Domestic Value of IPR Seizures
$98,990,341
$94,019,227
$138,767,885
$93,234,510
$155,369,236
2002 2003 2004 2005 2006
Total Domestic Value of IPR Seizures
Government Procurement
Problem
Government Procurement
• Most government agencies use enterprise
information system
– Coordinate business process
– Standard data structure
– Standard equipment
• Cisco routers used in enterprise
information systems
Why Cisco Routers?
• Cisco has 80% market share
Government Procurement
• Government searches for lowest price
• Contract language allows for
– Subcontracts
• 2 to 3 levels of sub-contractors
– “Blind drop” or “drop ship”
– Non-OEM purchase
– Smaller businesses
• No vetting of vendors by Cisco or GSA
• If done by government, usually only background check
Problems with Cisco
• No Direct Sales
– Cisco has 5 major distributors
• 2 distributors sell to government via GSA
– Comstor.net (200+ vendors)
– Immix Group (not awarded yet - ? vendors)
• Exceptions
– Highly specialized equipment sales
• Intelligence community agencies
• Large telecom providers
Problems with Cisco
• Cisco’s solution:
– Use Cisco Gold/Silver Partners
• Training/support designation given by Cisco
Problems with Cisco
• Government’s Problem:
– Gold/Silver Partners
• purchased counterfeit
• sold counterfeit to government and defense
contractors
– Cisco’s Brand Protection does NOT
coordinate with Cisco’s Government Sales
FBI Effort to Combat Problem
FBI Coordination
• 3 Case Coordination Meetings (2006-2007)
• Immigration & Customs Enforcement (ICE)
• Customs & Border Protection (CBP)
• Defense Criminal Investigative Service (DCIS)
• Department of Interior (DOI)
• Environmental Protection Agency (EPA)
• Department of State (DOS)
• Department of Defense (DOD)
• Local Police Departments
FBI Coordination
• General Services Administration (GSA)
– Ongoing coordination
• 03/2007, GSA attended FBI Case Coordination Meeting
(Dallas)
• 07/2007, GSA-FBI-DCIS Coordination Meeting (Seattle)
– GSA Actions
• Letters of supply
• Policy review - ongoing
• Expansion of investigation to address all counterfeit IT
equipment
• Supporting FBI investigations
FBI Coordination
• Department of Defense – multiple investigations
• Defense Criminal Investigative Service (DCIS)
• Naval Criminal Investigative Service
• Air Force Office of Special Investigations
• Army Criminal Investigative Service
– All services concerned with critical infrastructure
protection
• DCIS-FBI Counterfeit IT Equipment Working Group
US-China Joint Liaison Group
• Co-chaired by US DOJ and Chinese
Ministry of Public Security (MPS)
– Facilitate cross-border criminal enforcement
operations
– Intellectual Property Criminal Enforcement
Working Group
• Submitted requests for investigation
• Example: Summer Solstice (Microsoft software
investigation)
Overseas Coordination
• Canada
• Germany
• United Kingdom
Intelligence Gap
Intelligence Gap
• Purpose of counterfeit:
– For profit or state sponsored?
• Scope of counterfeit equipment problem:
– Routers?
– Other IT equipment (PCs, printers, etc.)?
• Effect on the critical infrastructure?
The Threat
• IT Subversion/Supply Chain Attack
– Cause immediate or premature system failure
during usage
– Gain access to otherwise secure systems
– Weaken cryptographic systems
• Requires “intimate access to target
system”
Source: Committee on National Security Systems, “Framework for Lifecycle Risk Mitigation For National Security Systems in the Era of Globalization,” November 2006
SC Raul Roldan
Raul.roldan@ic.fbi.gov
202-324-3472
SSA Inez Miyamoto
Inez.miyamoto@ic.fbi.gov
202-324-2455
IA Tini Leon
Tini.Leon@ic.fbi.gov
202-324-6310

More Related Content

Similar to Fbi cisco-om bbriefing2008.01.11 a

Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016
Peter Sproull
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Kristal Snider
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
Winston & Strawn LLP
 
When not if
When not ifWhen not if
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
John Gilligan
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
Eric Vanderburg
 
Intellectual Property trends
Intellectual Property trendsIntellectual Property trends
Intellectual Property trends
Mike Evans
 
Intellectual Property Trends
Intellectual Property Trends Intellectual Property Trends
Intellectual Property Trends
Mike Evans
 
August 27, 2018 General IP presentation for SCORE
August 27, 2018 General IP presentation for SCOREAugust 27, 2018 General IP presentation for SCORE
August 27, 2018 General IP presentation for SCORE
Kirk Damman
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
Eric Kavanagh
 
Joe Wolf: USPTO
Joe Wolf: USPTOJoe Wolf: USPTO
Joe Wolf: USPTO
Alfresco Software
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
Hackers
HackersHackers
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Gianluca Varisco
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search software
Charlie Hull
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
APNIC
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
Annelore van der Lint
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 

Similar to Fbi cisco-om bbriefing2008.01.11 a (20)

Peter Sproull Resume July 2016
Peter Sproull Resume July 2016 Peter Sproull Resume July 2016
Peter Sproull Resume July 2016
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
When not if
When not ifWhen not if
When not if
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
 
Intellectual Property trends
Intellectual Property trendsIntellectual Property trends
Intellectual Property trends
 
Intellectual Property Trends
Intellectual Property Trends Intellectual Property Trends
Intellectual Property Trends
 
August 27, 2018 General IP presentation for SCORE
August 27, 2018 General IP presentation for SCOREAugust 27, 2018 General IP presentation for SCORE
August 27, 2018 General IP presentation for SCORE
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Joe Wolf: USPTO
Joe Wolf: USPTOJoe Wolf: USPTO
Joe Wolf: USPTO
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Hackers
HackersHackers
Hackers
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Turning search upside down with powerful open source search software
Turning search upside down with powerful open source search softwareTurning search upside down with powerful open source search software
Turning search upside down with powerful open source search software
 
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet dataPacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
PacNOG 22: Intrusion in cybsecurity - observations from Honeynet data
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 

More from James Atkinson

Source2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugsSource2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugs
James Atkinson
 
Photography.history.invention..hexagon.final
Photography.history.invention..hexagon.finalPhotography.history.invention..hexagon.final
Photography.history.invention..hexagon.final
James Atkinson
 
Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09
James Atkinson
 
Adult cpr &amp; aed copy multimdi
Adult cpr &amp; aed copy multimdiAdult cpr &amp; aed copy multimdi
Adult cpr &amp; aed copy multimdi
James Atkinson
 
Crj 117 global war of terror.b
Crj 117 global war of terror.bCrj 117 global war of terror.b
Crj 117 global war of terror.b
James Atkinson
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
James Atkinson
 
Havard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-prunedHavard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-pruned
James Atkinson
 
Eri2006 what to do fter descovering
Eri2006   what to do fter descoveringEri2006   what to do fter descovering
Eri2006 what to do fter descovering
James Atkinson
 
Eri2006 vehcile sweeps
Eri2006   vehcile sweepsEri2006   vehcile sweeps
Eri2006 vehcile sweeps
James Atkinson
 
Eri2006 sweep documentation-2006
Eri2006   sweep documentation-2006Eri2006   sweep documentation-2006
Eri2006 sweep documentation-2006
James Atkinson
 
Artof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentationArtof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentation
James Atkinson
 
Gloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copyGloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copy
James Atkinson
 
Hearing Press Release
Hearing Press ReleaseHearing Press Release
Hearing Press Release
James Atkinson
 
James Atkinson-Summary
James Atkinson-SummaryJames Atkinson-Summary
James Atkinson-Summary
James Atkinson
 
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
James Atkinson
 
FullCommitteeTranscript-v2
FullCommitteeTranscript-v2FullCommitteeTranscript-v2
FullCommitteeTranscript-v2
James Atkinson
 
Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07James Atkinson
 
JamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimonyJamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimony
James Atkinson
 
i-Safe Certification
i-Safe Certificationi-Safe Certification
i-Safe Certification
James Atkinson
 

More from James Atkinson (20)

Source2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugsSource2009 03.12.2009-vehcile bugs
Source2009 03.12.2009-vehcile bugs
 
Photography.history.invention..hexagon.final
Photography.history.invention..hexagon.finalPhotography.history.invention..hexagon.final
Photography.history.invention..hexagon.final
 
Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09Itar slides for_qaisc_5-27-09
Itar slides for_qaisc_5-27-09
 
Adult cpr &amp; aed copy multimdi
Adult cpr &amp; aed copy multimdiAdult cpr &amp; aed copy multimdi
Adult cpr &amp; aed copy multimdi
 
Crj 117 global war of terror.b
Crj 117 global war of terror.bCrj 117 global war of terror.b
Crj 117 global war of terror.b
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
 
Havard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-prunedHavard phone lecture-05.28.2009e-pruned
Havard phone lecture-05.28.2009e-pruned
 
Eri2006 what to do fter descovering
Eri2006   what to do fter descoveringEri2006   what to do fter descovering
Eri2006 what to do fter descovering
 
Eri2006 vehcile sweeps
Eri2006   vehcile sweepsEri2006   vehcile sweeps
Eri2006 vehcile sweeps
 
Eri2006 sweep documentation-2006
Eri2006   sweep documentation-2006Eri2006   sweep documentation-2006
Eri2006 sweep documentation-2006
 
Artof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentationArtof photography.feb2014.chapterpresentation
Artof photography.feb2014.chapterpresentation
 
Gloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copyGloucester Daily 03_27_03 copy
Gloucester Daily 03_27_03 copy
 
Hearing Press Release
Hearing Press ReleaseHearing Press Release
Hearing Press Release
 
James Atkinson-Summary
James Atkinson-SummaryJames Atkinson-Summary
James Atkinson-Summary
 
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_…-3
 
FullCommitteeTranscript-v2
FullCommitteeTranscript-v2FullCommitteeTranscript-v2
FullCommitteeTranscript-v2
 
Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07Cummings Ltr to Allen 4-13-07
Cummings Ltr to Allen 4-13-07
 
JamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimonyJamesAtkinsonwrittenTestimony
JamesAtkinsonwrittenTestimony
 
James Atkinson
James AtkinsonJames Atkinson
James Atkinson
 
i-Safe Certification
i-Safe Certificationi-Safe Certification
i-Safe Certification
 

Recently uploaded

What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 

Recently uploaded (20)

What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 

Fbi cisco-om bbriefing2008.01.11 a

  • 1. FBI Criminal Investigation: Cisco Routers Section Chief Raul Roldan Supervisory Special Agent Inez Miyamoto Intelligence Analyst Tini Leon January 11, 2008 The overall classification of this presentation is UNCLASSIFIED
  • 2. Agenda • FBI Criminal Investigation • Supply Chain • Critical Infrastructure Threats • Government Procurement Problems • FBI Coordination • Intelligence Gap
  • 4. Nationwide Cases Green – DCIS; Red – FBI joint cases; Blue – FBI
  • 6. Counterfeit Equipment • Routers – Models: 1000 and 2000 Series • Switches – Models: WS-C2950-24, WS-X4418-GB (for CAT4000series) • GigaBit Interface Converter (GBIC) – Models: WS-G5483, WS-G5487 • WAN Interface Card (WIC) – Models: VWIC-1MFT-E1, VWIC-2MFT-G703, WIC- 1DSU-T1-V2
  • 8. Cost Comparison Example • Counterfeit – 1721 Router – $234.00 • Genuine – 1721 Router – $1,375.00
  • 9. Cisco Identified Problems • Problems – Low manufacturing standards – Higher failure rate – Duplicate MAC addresses of routers and switches can shut down an entire network • Examples – In 2002, duplicate MAC addresses shut down an end user’s network in Pittsburgh – In 2004, a government agency conducted a network upgrade to its North American weather communication system—it failed upon installation – Cisco 1721 router installed in a network caught fire due to a faulty power supply
  • 10. Sub-Contracting Process GSA IT Vendor 1st Sub-Contractor 3rd Sub-Contractor 2nd Sub-Contractor Counterfeit Equipment Distributor Government or Govt. Contractor (drop ships as GSA Vendor) (order placed)
  • 13. Supply Chain 1 – Directly from PRC Supplied to Government through “drop ship” U.S. Distributors places orders
  • 14. Supply Chain 2 – Through Foreign Country Distributors
  • 15. Supply Chain 3 – ebay
  • 16. Supply Chain 4 – Government Credit Card Non-GSA Vendor Selling Cisco Equipment Government Purchase Card
  • 17. Open Source Examples • Supply Chain 1 – Directly from PRC – eGlobe Solutions Inc. – Syren Technology – Navy Project – MortgageIT • Supply Chain 3 – ebay – Todd Richard • Supply Chain 4 – Government Purchase Card – FBI
  • 18. eGlobe Solutions Inc. Source: <http://www.usdoj.gov/usao/waw/press/2006/nov/song.html> eGlobe Solutions (Authorized Cisco Vendor)
  • 19. eGlobe Solutions Inc. • May 2003 – July 2005 – $788,000 counterfeit equipment • November 2006 Indicted – Conspiracy, Mail Fraud, and Counterfeit Trademark • Sold to – U.S. Naval Academy – U.S. Naval Air Warfare Center – U.S. Naval Undersea Warfare Center – U.S. Air Base (Spangdahelm, Germany) – Bonneville Power Administration – General Services Administration – Raytheon (Defense Contractor)
  • 21. Syren Technology • August 2002 – July 2004 • December 2007 Indicted – Trafficking in counterfeit Cisco products • Sold to – Marine Corps – Air Force – Federal Aviation Administration – FBI – Defense Contractors – Universities and Financial Institutions
  • 22. U.S. Navy Project Source: <http://www.govexec.com/dailyfed/0907/092807j1.htm> Sub-contractor (Won bid for US Navy Project) (Ships counterfeit to U.S. Navy) U.S. Navy (Unauthorized Cisco reseller)
  • 23. U.S. Navy Project • $250,111 counterfeit Cisco equipment • Lockheed Martin – Did not use GSA IT Vendor or authorized Cisco reseller – Discovered duplicate serial numbers Cisco switches
  • 25. MortgageIT: Non-government Example • Discovered WICs were faulty during routers upgrade – 30 counterfeit WAN Interface Cards (WIC) • Atec Group Inc. – Authorized reseller selling counterfeit • Cisco • Microsoft • Symantec
  • 27. Todd Richard • Between 2003 – 2007 – $1,000,000 counterfeit equipment • October 2007 Indicted – Trafficking in counterfeit Cisco trademarks • Separate shipments – Counterfeit equipment, labels, boxes, and manuals
  • 28. Supply Chain 4 – Government Credit Card Non-GSA Vendor Selling Cisco Equipment Government Purchase Card
  • 30. Scope of the Problem • Alliance for Gray Market and Counterfeit Abatement (AGMA) & KPMG White Paper – 1 in 10 IT products sold are counterfeit – 10% IT products counterfeit • $100 billion Source: KPGM International, “Managing the Risks of Counterfeiting in the Information Technology Industry,” 2006
  • 31. Scope of the Problem • Law Enforcement estimates much higher – Customs and Border Protection (CBP) • Only seize registered items – Dell Computers not registered – No label = no seizure • Cannot check every container – FBI • Chinese postal service vs. shipping services – Smaller shipments • Hardware, software, manuals and labels shipped separately – Assembled in United States
  • 32. Total Number of IPR Seizures 5,793 6,500 7,255 8,022 14,675 2002 2003 2004 2005 2006 Total Number of IPR Seizures
  • 33. Total Domestic Value of IPR Seizures $98,990,341 $94,019,227 $138,767,885 $93,234,510 $155,369,236 2002 2003 2004 2005 2006 Total Domestic Value of IPR Seizures
  • 35. Government Procurement • Most government agencies use enterprise information system – Coordinate business process – Standard data structure – Standard equipment • Cisco routers used in enterprise information systems
  • 36. Why Cisco Routers? • Cisco has 80% market share
  • 37. Government Procurement • Government searches for lowest price • Contract language allows for – Subcontracts • 2 to 3 levels of sub-contractors – “Blind drop” or “drop ship” – Non-OEM purchase – Smaller businesses • No vetting of vendors by Cisco or GSA • If done by government, usually only background check
  • 38. Problems with Cisco • No Direct Sales – Cisco has 5 major distributors • 2 distributors sell to government via GSA – Comstor.net (200+ vendors) – Immix Group (not awarded yet - ? vendors) • Exceptions – Highly specialized equipment sales • Intelligence community agencies • Large telecom providers
  • 39. Problems with Cisco • Cisco’s solution: – Use Cisco Gold/Silver Partners • Training/support designation given by Cisco
  • 40. Problems with Cisco • Government’s Problem: – Gold/Silver Partners • purchased counterfeit • sold counterfeit to government and defense contractors – Cisco’s Brand Protection does NOT coordinate with Cisco’s Government Sales
  • 41. FBI Effort to Combat Problem
  • 42. FBI Coordination • 3 Case Coordination Meetings (2006-2007) • Immigration & Customs Enforcement (ICE) • Customs & Border Protection (CBP) • Defense Criminal Investigative Service (DCIS) • Department of Interior (DOI) • Environmental Protection Agency (EPA) • Department of State (DOS) • Department of Defense (DOD) • Local Police Departments
  • 43. FBI Coordination • General Services Administration (GSA) – Ongoing coordination • 03/2007, GSA attended FBI Case Coordination Meeting (Dallas) • 07/2007, GSA-FBI-DCIS Coordination Meeting (Seattle) – GSA Actions • Letters of supply • Policy review - ongoing • Expansion of investigation to address all counterfeit IT equipment • Supporting FBI investigations
  • 44. FBI Coordination • Department of Defense – multiple investigations • Defense Criminal Investigative Service (DCIS) • Naval Criminal Investigative Service • Air Force Office of Special Investigations • Army Criminal Investigative Service – All services concerned with critical infrastructure protection • DCIS-FBI Counterfeit IT Equipment Working Group
  • 45. US-China Joint Liaison Group • Co-chaired by US DOJ and Chinese Ministry of Public Security (MPS) – Facilitate cross-border criminal enforcement operations – Intellectual Property Criminal Enforcement Working Group • Submitted requests for investigation • Example: Summer Solstice (Microsoft software investigation)
  • 46. Overseas Coordination • Canada • Germany • United Kingdom
  • 48. Intelligence Gap • Purpose of counterfeit: – For profit or state sponsored? • Scope of counterfeit equipment problem: – Routers? – Other IT equipment (PCs, printers, etc.)? • Effect on the critical infrastructure?
  • 49. The Threat • IT Subversion/Supply Chain Attack – Cause immediate or premature system failure during usage – Gain access to otherwise secure systems – Weaken cryptographic systems • Requires “intimate access to target system” Source: Committee on National Security Systems, “Framework for Lifecycle Risk Mitigation For National Security Systems in the Era of Globalization,” November 2006
  • 50. SC Raul Roldan Raul.roldan@ic.fbi.gov 202-324-3472 SSA Inez Miyamoto Inez.miyamoto@ic.fbi.gov 202-324-2455 IA Tini Leon Tini.Leon@ic.fbi.gov 202-324-6310

Editor's Notes

  1. This is not an intell brief. We need to change the titles of
  2. Enterprise Information Systems provide a technology platform that enable organizations to integrate and coordinate their business processes. They provide a single system that is central to the organization and ensure that information can be shared across all functional levels and management hierarchies. Enterprise systems are invaluable in eliminating the problem of information fragmentation caused by multiple information systems in an organization, by creating a standard data structure.
  3. IP Criminal Enforcement Working Group of the U.S.-China Joint Liaison Group for law enforcement, which is co-chaired by the Criminal Division of the U.S. Department of Justice and the PRC, MPS. The Working Group is dedicated to increasing cooperation in intellectual property law enforcement efforts and pursuing more joint US-China cross-border criminal enforcement operations.