One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it.At secret workshops, backdoor surveillance tools were inserted into routers, servers and networking equipment before the equipment was repackaged and sent to customers outside the U.S.The program, run by the NSA’s Tailored Access Operations (TAO) group, was revealed by documents leaked by former NSA contractor Edward Snowden and reported by Der Spiegel and Glenn Greenwald. It was one of many revelations about the NSA that caused widespread suspicion that U.S. technology products shouldn’t be trusted, even if companies strenuously denied helping the agency. And it appears some Cisco Systems customers have since taken steps to prevent NSA tampering.The company has shipped equipment to addresses that are unrelated to a customer, said John Stewart, Cisco’s chief security and trust officer, on Wednesday during a panel session at the Cisco Live conference in Melbourne. In theory, that makes it harder for the NSA to target an individual company and scoop up their package. But supply chains are tough to secure, Stewart said, and once a piece of equipment is handed from Cisco to DHL or FedEx, it’s gone.Still, the risk of such tampering is pretty low for most customers. Cisco has been working on better ways for customers to verify the integrity of the systems it ships, but there will always be certain amount of risk that can’t be mitigated, Stewart said.“If a truly dedicated team is coming after you, and they’re coming after you for a very long period of time, then the probability of them succeeding at least once does go up,” Stewart said. “And its because they’ve got patience, they’ve got capacity and more often than not, they’ve got capability.”One of the leaked Snowden documents, dated June 2010, has two photos of an NSA interdiction operation, with a box that said Cisco on the side.The document, labeled top secret, goes on to say that supply-chain interdiction operations “are some of the most productive operations in TAO, because they pre-position access points into hard target networks around the world.”In May 2014, Cisco CEO John Chambers sent a letter to President Barack Obama, arguing that the NSA’s alleged actions undermine trust with its customers and more broadly hurt the U.S. technology industry. Cisco also asserted that it does not work with any government to intentionally weaken its products. During the roundtable on Wednesday, Stewart was asked if Cisco ever identified any strange hardware put inside any of its products.“No, we couldn’t, because the only people who would know that for sure is the NSA,” Stewart responded.(Adam Bender of Computerworld Australia contributed to this report.) Related content brandpost Sponsored by Zscaler NYC Department of Education builds the pipeline for future cybersecurity professionals NYC Department of Education's innovative programs empower students through hands-on experience and partnerships in cybersecurity, paving the way for diverse career pathways and long-term success in the digital workforce. By Demond Waters, CISO, and Anthony Dixon, Director of Cybersecurity Engineering at the New York City (NYC) Department of Education (DOE) Oct 21, 2024 10 mins Security brandpost Sponsored by Zscaler Are Your Firewalls and VPNs the Weakest Link in Your Security Stack? In an era when traditional network perimeters no longer exist, it’s time to adopt the Zero Trust mantra, "never trust, always verify.” By Zscaler Oct 21, 2024 9 mins Security brandpost Sponsored by Zscaler 6 key mobile and IoT/OT attack trend findings Zscaler ThreatLabz analysis shows more than 100% growth in spyware, much of which can bypass multifactor authentication, and 45% growth in IoT attacks. By Will Seaton, Viral Gandhi, Yesenia Barajas Oct 18, 2024 6 mins Security news Admins warned to update Palo Alto Networks Expedition tool immediately Six holes in the configuration migration tool could allow theft of cleartext passwords and more. By Howard Solomon Oct 11, 2024 1 min Network Security Security PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe