One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it.At secret workshops, backdoor surveillance tools were inserted into routers, servers and networking equipment before the equipment was repackaged and sent to customers outside the U.S.The program, run by the NSA’s Tailored Access Operations (TAO) group, was revealed by documents leaked by former NSA contractor Edward Snowden and reported by Der Spiegel and Glenn Greenwald. It was one of many revelations about the NSA that caused widespread suspicion that U.S. technology products shouldn’t be trusted, even if companies strenuously denied helping the agency. And it appears some Cisco Systems customers have since taken steps to prevent NSA tampering.The company has shipped equipment to addresses that are unrelated to a customer, said John Stewart, Cisco’s chief security and trust officer, on Wednesday during a panel session at the Cisco Live conference in Melbourne. In theory, that makes it harder for the NSA to target an individual company and scoop up their package. But supply chains are tough to secure, Stewart said, and once a piece of equipment is handed from Cisco to DHL or FedEx, it’s gone.Still, the risk of such tampering is pretty low for most customers. Cisco has been working on better ways for customers to verify the integrity of the systems it ships, but there will always be certain amount of risk that can’t be mitigated, Stewart said.“If a truly dedicated team is coming after you, and they’re coming after you for a very long period of time, then the probability of them succeeding at least once does go up,” Stewart said. “And its because they’ve got patience, they’ve got capacity and more often than not, they’ve got capability.”One of the leaked Snowden documents, dated June 2010, has two photos of an NSA interdiction operation, with a box that said Cisco on the side.The document, labeled top secret, goes on to say that supply-chain interdiction operations “are some of the most productive operations in TAO, because they pre-position access points into hard target networks around the world.”In May 2014, Cisco CEO John Chambers sent a letter to President Barack Obama, arguing that the NSA’s alleged actions undermine trust with its customers and more broadly hurt the U.S. technology industry. Cisco also asserted that it does not work with any government to intentionally weaken its products. During the roundtable on Wednesday, Stewart was asked if Cisco ever identified any strange hardware put inside any of its products.“No, we couldn’t, because the only people who would know that for sure is the NSA,” Stewart responded.(Adam Bender of Computerworld Australia contributed to this report.) Related content how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux news High-bandwidth memory nearly sold out until 2026 While it might be tempting to blame Nvidia for the shortage of HBM, it’s not alone in driving high-performance computing and demand for the memory HPC requires. By Andy Patrizio May 13, 2024 3 mins CPUs and Processors High-Performance Computing Data Center opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux how-to Download our SASE and SSE enterprise buyer’s guide From the editors of Network World, this enterprise buyer’s guide helps network and security IT staff understand what Secure Access Service Edge (SASE) and Secure Service Edge) SSE can do for their organizations and how to choose the right solut By Neal Weinberg May 13, 2024 1 min SASE Remote Access Security Network Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe