Cisco: We'll send kit to the wrong address to dodge NSA

Cisco reveals extent it must go to in order to keep equipment from being hacked

Ordering equipment from Cisco, but worried the NSA may intercept it to plant surveillance tools? The company's thought of that, and will ship to decoy buildings to avoid spying. 

Last year, documents leaked by Edward Snowden revealed the US spying agency intercepts routers, servers and other network devices in order to plant backdoors and other surveillance tools. 

Speaking at a conference in Australia today, head of security John Stewart said Cisco was taking measures to avoid such interference. 

"We ship [boxes] to an address that's has nothing to do with the customer, and then you have no idea who ultimately it is going to," Stewart said, according to a report in the Register.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Steward added that some customers insist on picking up hardware directly from Cisco or its distributors.

"Security is a top priority for our customers, and Cisco is committed to providing our customers with trusted products and solutions including through our supply chain and distribution," the company said in a statement sent to IBTimes UK.

Last year, after the Snowden revelations about NSA interceptions, Cisco CEO John Chambers wrote to Obama saying such activity was hurting US tech firms.

"We simply cannot operate this way, our customers trust us to be able to deliver to their doorsteps products that meet the highest standards of integrity and security," he wrote at the time. 

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/hardware/354584/windows-10-and-the-tools-for-agile-working
Sponsored

Windows 10 and the tools for agile working

20 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020