BradReese.Com Cisco Hardware Quotes Call Toll Free 877-549-2680 or 828-277-7272

Home About Repair Power Supplies Refurbished Blog Quick Links Site Map Contact Us

 
Brad Reese speaks out
Learn more about Brad Reese...
Archive
  Help

Aironet

Power Supplies

VoIP Gateways

Cisco Repair

Refurbished Cisco

Cisco CPQRGs

New Cisco

New HP ProCurve

Cisco Tools

Competitive Lab Tests

Tech Forums

How-to Tutorials

CCIE Gossip

Blogroll

 
View archive of Brad Reese speaks out

Subscribe

Top secret document contradicts Cisco's denial of NSA spy cooperation

According to my own personal research, Cisco's denial of NSA spy cooperation totally contradicts this Top Secret NSA document:

"The SIGINT Enabling Project actively engages the US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs."

Hummelstown, PA:   Wed, 5/14/14 - 11:15am    View comments
 

Update 5/15/2014 - 12:00pm:

"Newly reported revelations that the National Security Agency bugged Cisco Systems' networking equipment so the agency could spy on various adversaries has triggered a biting response from the San Jose company."

SiliconBeat: Cisco Systems gear reportedly bugged by NSA
 

Don ClarkThe Wall Street JournalEarlier this week, the longtime (14-years) Silicon Valley Deputy Bureau Chief for The Wall Street Journal, Don Clark, wrote:

Greenwald: NSA Plants ‘Backdoors’ in Foreign-Bound Routers

"The National Security Agency, he asserts, plants intelligence-gathering 'backdoors' in U.S. suppliers' routers and other networking hardware before they reach foreign customers.

NSACisco"A spokesman for Cisco, the largest maker of networking equipment, noted that the book excerpt in the Guardian did not mention the company by name.
 

"We've stated previously that Cisco does not work with any government to weaken our products for exploitation,' he said. 'We would, of course, be deeply concerned with anything that could damage the integrity of our products or our customers' networks."

However according to my own personal research, Cisco's denial of NSA spy cooperation totally contradicts the following Top Secret NSA document:

Top Secret (TS) | Special Intelligence (SI) | Talent Keyhole (TK) | No Foreign Nationals (NOFORN) - Computer Network Operations Signals Intelligence (SIGINT) Enabling Project

Top Secret (TS) | Special Intelligence (SI) | Talent Keyhole (TK) | No Foreign Nationals (NOFORN) - Computer Network Operations Signals Intelligence (SIGINT) Enabling Project

View how classified documents (part 1 and part 2) in the United States are labeled for viewing (i.e. abbreviations, etc).

Note: FVEY stands for "five eyes," a restriction limiting disclosure of information to officials of the U.S. and four key allies who cooperate closely with NSA: Australia, Canada, New Zealand, and the United Kingdom.
 

View the key points of this top secret NSA document:

Project Description

The SIGINT Enabling Project actively engages the US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs. These design changes make the systems in question exploitable through SIGINT collection (e.g., Endpoint, MidPoint, etc.) with foreknowledge of the modification. To the consumer and other adversaries, however, the systems' security remains intact. In this way, the SIGINT Enabling approach uses commercial technology and insight to manage the increasing cost and technical challenges of discovering and successfully exploiting systems of interest within the ever-more integrated and security-focused global communications environment.

This Project supports the Comprehensive National Cybersecurity Initiative (CNCI) by investing in corporate partnerships and providing new access to intelligence sources, reducing collection and exploitation costs of existing sources', and enabling expanded network operation and intelligence exploitation to support network defense and cyber situational awareness.

Base resources in this project are used to:

  • Insert vulnerabilities into commercial systems, IT systems, networks, and endpoint communications devices used by targets.
  • Collect target network data and metadata via cooperative network carriers and/or increased control over core networks.
  • Leverage commercial capabilities to remotely deliver or receive information to and from target endpoints.
  • Exploit foreign trusted computing platforms and technologies.
  • Influence policies, standards and specification for commercial public key technologies.
  • Make specific and aggressive investments to facilitate the development of a robust exploitation capability against Next-Generation Wireless (NGW) communications.
  • Provide for continued partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses and allow the continuation of partnering with commercial Managed Security Service Providers and threat researchers, doing threat/vulnerability analysis.
  • Continue relationships with commercial IT partners and capitalize on new opportunities, including the enabling of used by the governments; enable the being used in a high interest satellite signal, which allows access to the communications being carried on a commercial satellite provider.
  • Reach full operating capability for SIGINT access to data flowing through a hub for a major commercial communications provider and assess its long term benefits.
  • Reach full operating capability for SIGINT access to a major Internet Peer-to-Peer voice and text communications system.
  • Make gains in enabling and Computer Network Exploitation (CNE) access to fourth generation/Long Term Evolution networks via enabling.
  • Assess existing wireless calling metadata accesses and balance flow of this data into with the ability to ingest and utilize this information.
  • Assess existing commercial cyber information flows and balance the flow of this data into with the ability to ingest and analyze this information to support cyber situational awareness.
  • Shape the worldwide commercial cryptography marketplace to make it more tractable to advanced cryptanalytic capabilities being developed by NSA/CSS (i.e. Central Security Service).
  • Reflects additional level of investment in enabling exploitation capabilities against NGW mobile and data networks.
  • Enables additional support to Endpoint operations. Support to this mission area requires SIGINT Enabling to invest in new infrastructure and capabilities with commercial partners.

 

It's my personal opinion that this Top Secret NSA document proves once and for all that Cisco cooperates with NSA spying.

Related documents:

Top Secret NSA Document

Classified documents (part 1 and part 2)

Global Government Surveillance Reform

Cisco's Mark Chandler: Internet Security Necessary for Global Technology Economy

Related stories:

SiliconBeat: Cisco Systems gear reportedly bugged by NSA

The Guardian: Glenn Greenwald: how the NSA tampers with US-made internet routers

The Wall Street Journal: Greenwald: NSA Plants ‘Backdoors’ in Foreign-Bound Routers

Cisco denies complicity of top executive accepting $10 million contract as NSA backdoor payoff

Rumor Cisco product development engineers penalized for reporting security issues

Top Secret National Security Agency (NSA) JETPLOW firmware persistence implant (backdoor) for Cisco firewalls

Cisco spy issue could affect the war on global terrorism

Is the National Security Agency (NSA) killing innovation at Cisco?

ZTE's State of the Art Trusted Delivery Model

Is Cisco behind the U.S. Congressional attack on Huawei and ZTE?
 


What's your take?

Contact Brad Reese

Brad's Favorite Story Picks

  1. Did Cisco's videoscape czar Jesper Andersen get the guillotine?
  2. Rumor Cisco's $14 trillion Internet of Things (IoT) general manager, Guido Jouret, has resigned
  3. Cisco Systems: The greatest stock-laundering machine ever invented
  4. Cisco CCIE salaries in India have plunged -50%
  5. Vexed Cisco CEO John Chambers vows to outsell tiny Arista Networks
  6. HP OpenNFV vs. Cisco ACI
  7. Prediction: Soni Jiandani will be appointed Cisco CEO in May 2014
  8. Critique on Cisco channel partner program by former Cisco sales executive, Kevin Avery
  9. IPO comparison: Arista Networks vs. Box, Inc.
  10. Cisco announces -$1.4 billion margin haircut?
  11. Why Cisco passed on buying VMware
  12. Anatomy of a Cisco bid rigging
  13. Cisco video surveillance 2621V IP dome (CIVS-IPC-2621) appears to have manufacturing defect
  14. Rumor Cisco marketing executives SVP Doug Merritt and VP Marie Hattar are both out
  15. $70,000 list price Cisco Nexus 7000 series 32 port 10Gb ethernet module (N7K-M132XP-12) has defective memory
  16. Cisco's San Jose office made pornographic phone call to traumatize Brad Reese
  17. Cisco part numbers with defective memory
  18. Network World test reveals Cisco's application centric infrastructure (ACI) as being barely-baked
  19. POS theft detection is difficult
  20. View the archive of Bloggers speak out on BradReese.Com
 
Subscribe
comments powered by Disqus

CCIE available Metro DC

Supplement Cisco SMARTnet Contracts

 

©2014 Alliance Networking LLC - Home - About - Repair - Power Supplies - Refurbished - Blog - Quick Links - Site Map - Contact Us