{"id":193750,"date":"2015-03-20T18:07:20","date_gmt":"2015-03-20T22:07:20","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/to-avoid-nsa-cisco-gear-gets-delivered-to-strange-addresses.php"},"modified":"2015-03-20T18:07:20","modified_gmt":"2015-03-20T22:07:20","slug":"to-avoid-nsa-cisco-gear-gets-delivered-to-strange-addresses","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/to-avoid-nsa-cisco-gear-gets-delivered-to-strange-addresses.php","title":{"rendered":"To avoid NSA, Cisco gear gets delivered to strange addresses"},"content":{"rendered":"<p><p>    One of the most successful    U.S. National Security Agency spying programs involved    intercepting IT equipment en route to customers and modifying    it.  <\/p>\n<p>    At secret workshops, backdoor    surveillance tools were inserted into routers, servers and    networking equipment before the equipment was repackaged and    sent to customers outside the U.S.  <\/p>\n<p>    The program, run by the NSAs        Tailored Access Operations (TAO) group, was revealed by    documents leaked by former NSA contractor Edward Snowden and    reported by     Der Spiegel and     Glenn Greenwald.  <\/p>\n<p>    It was one of many    revelations about the NSA that caused widespread suspicion that    U.S. technology products shouldnt be trusted, even if    companies strenuously denied helping the agency.  <\/p>\n<p>    And it appears some Cisco    Systems customers have since taken steps to prevent NSA    tampering.  <\/p>\n<p>    The company has shipped    equipment to addresses that are unrelated to a customer, said    John Stewart, Ciscos chief security and trust officer, on    Wednesday during a panel session at the Cisco Live conference    in Melbourne.  <\/p>\n<p>    In theory, that makes it    harder for the NSA to target an individual company and scoop up    their package. But supply chains are tough to secure, Stewart    said, and once a piece of equipment is handed from Cisco to DHL    or FedEx, its gone.  <\/p>\n<p>    Still, the risk of such    tampering is pretty low for most customers. Cisco has been    working on better ways for customers to verify the integrity of    the systems it ships, but there will always be certain amount    of risk that cant be mitigated, Stewart said.  <\/p>\n<p>    If a truly dedicated team is    coming after you, and theyre coming after you for a very long    period of time, then the probability of them succeeding at    least once does go up, Stewart said. And its because theyve    got patience, theyve got capacity and more often than not,    theyve got capability.  <\/p>\n<p>    One of the leaked Snowden    documents,     dated June 2010, has two photos of an NSA interdiction    operation, with a box that said Cisco on the side.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/2899852\/to-avoid-nsa-cisco-gear-gets-delivered-to-strange-addresses.html\/RK=0\/RS=RvZhxPqzCpsOWgx5UPYsqe3Ze38-\" title=\"To avoid NSA, Cisco gear gets delivered to strange addresses\">To avoid NSA, Cisco gear gets delivered to strange addresses<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it. At secret workshops, backdoor surveillance tools were inserted into routers, servers and networking equipment before the equipment was repackaged and sent to customers outside the U.S <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/to-avoid-nsa-cisco-gear-gets-delivered-to-strange-addresses.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-193750","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193750"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=193750"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/193750\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=193750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=193750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=193750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}