No Jitter is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The Counterfeit Network: Penalties and Prevention - Part 2

My previous blog, "Is Your Network Counterfeit - Part 1?" discussed the discovery by the FBI of considerable counterfeit network equipment. The security of the counterfeit equipment does not seem to be an issue, YET. I worked in military intelligence R&D. The best intrusion is one that is very difficult to detect.

My previous blog, "Is Your Network Counterfeit - Part 1?" discussed the discovery by the FBI of considerable counterfeit network equipment. The security of the counterfeit equipment does not seem to be an issue, YET. I worked in military intelligence R&D. The best intrusion is one that is very difficult to detect.Independent of the security issues, there are penalties for buying the counterfeit equipment: downtime, duplicate MAC addresses and other penalties are to be expected; counterfeit equipment has even caught on fire. The problem is not new. Counterfeit network equipment started surfacing in 2004. Many in the network business don't know how bad the counterfeiting can be to their operation.

Counterfeit Penalties So what can happen to the unwary buyer? Network components can fail immediately or early in their life cycle. Secure computer access may not be secure computer access. Encryption systems can be weakened and compromised. Here are some examples:

  • Cisco WAN interface cards (WIC) were purchased for installation in Cisco 2811 routers. The counterfeit cards caused routers to drop off the network.
  • Duplicate MAC addresses shut down an end user's network.
  • The North American weather network of a government agency upgraded their network and it immediately failed.
  • A Cisco 1721 router power supply caught fire.
  • Each of these organizations not only had the problems, but then had to procure replacement equipment, raising the total cost above what would have been the non- counterfeit cost.
  • Each organization spent many labor hours trying resolve the problems at additional cost.

    Counterfeit Detection There is a great page on the Web, and now it is quoted in many eBay listings. It is called the Andover test. This site is also mentioned in the FBI Powerpoint presentation, "FBI Fears Chinese Hackers Have Back Door into US Government & Military" found at the website, Above Top Secret. The presentation has a side-by-side picture of a Cisco WIC-1DSU-T1 card for comparison.

    The Andover site has many photo comparisons of real versus counterfeit WIC cards. What is significant about this page is it shows that recognizing counterfeit products is relatively easy. Most of the effort should be diverted to teaching people to recognize the counterfeit vs. real differences. Any distributor/ seller/broker should be aware about how to tell the differences.

    Counterfeit Prevention Counterfeit goods can occur anywhere in the distribution chain. Distribution can occur when a broker selling counterfeit goods claims they are legitimate goods and sells them to another broker, distributor or reseller. Eventually counterfeit products can become mixed with genuine products, making distinguishing between genuine and counterfeit extremely difficult.

    Purchasing IT products through authorized channels or other means of distribution established by the original equipment manufacturer or directly from the manufacturer will greatly increase the enterprise's assurance that they are receiving genuine, new and factory warranted product. Most manufacturers have listings of authorized dealers on their websites.

    An article, by Deb Radcliff, appeared on Network World, "Fake network gear: Counterfeit goods have popped up in the channel and could be in your organization." In the article, Radcliff provided several recommendations when buying products. She said, "Because clones and packaging are getting more realistic, many people don't realize they have counterfeit network equipment until it's installed and begins acting quirky. Outages and failures are often the tip-off that the gear is fake."

    The following are Radcliff's recommendations to avoid counterfeit products:

  • "Don't shop on eBay for deeply discounted gear, particularly from sellers in China."
  • "Don't go outside your trusted channel to buy critical network components."
  • "If you're in the market for refurbished gear, the safest bet is to purchase certified products through the manufacturer."
  • "Check the serial numbers against the vendor database."
  • "Check the packaging carefully, inspecting for anything out of the ordinary in the logo, size and type of packaging materials by comparing them with others in the same shipment."
  • "Closely examine the gear and compare holograms and chip sets."

    Counterfeit Detection There is a great page on the Web, and now it is quoted in many eBay listings. It is called the Andover test. This site is also mentioned in the FBI Powerpoint presentation, "FBI Fears Chinese Hackers Have Back Door into US Government & Military" found at the website, Above Top Secret. The presentation has a side-by-side picture of a Cisco WIC-1DSU-T1 card for comparison.

    The Andover site has many photo comparisons of real versus counterfeit WIC cards. What is significant about this page is it shows that recognizing counterfeit products is relatively easy. Most of the effort should be diverted to teaching people to recognize the counterfeit vs. real differences. Any distributor/ seller/broker should be aware about how to tell the differences.

    Counterfeit Prevention Counterfeit goods can occur anywhere in the distribution chain. Distribution can occur when a broker selling counterfeit goods claims they are legitimate goods and sells them to another broker, distributor or reseller. Eventually counterfeit products can become mixed with genuine products, making distinguishing between genuine and counterfeit extremely difficult.

    Purchasing IT products through authorized channels or other means of distribution established by the original equipment manufacturer or directly from the manufacturer will greatly increase the enterprise's assurance that they are receiving genuine, new and factory warranted product. Most manufacturers have listings of authorized dealers on their websites.

    An article, by Deb Radcliff, appeared on Network World, "Fake network gear: Counterfeit goods have popped up in the channel and could be in your organization." In the article, Radcliff provided several recommendations when buying products. She said, "Because clones and packaging are getting more realistic, many people don't realize they have counterfeit network equipment until it's installed and begins acting quirky. Outages and failures are often the tip-off that the gear is fake."

    The following are Radcliff's recommendations to avoid counterfeit products:

  • "Don't shop on eBay for deeply discounted gear, particularly from sellers in China."
  • "Don't go outside your trusted channel to buy critical network components."
  • "If you're in the market for refurbished gear, the safest bet is to purchase certified products through the manufacturer."
  • "Check the serial numbers against the vendor database."
  • "Check the packaging carefully, inspecting for anything out of the ordinary in the logo, size and type of packaging materials by comparing them with others in the same shipment."
  • "Closely examine the gear and compare holograms and chip sets."