DOJ discloses U.S. convictions for sale of counterfeit networking hardware
IDG News Service - U.S. agencies targeting the sale of counterfeit networking hardware have gotten 30 felony convictions, including a man attempting to sell fake networking equipment to the U.S. Marine Corps, and seized $143 million worth of fake Cisco hardware, the U.S. Department of Justice said on Thursday.
The DOJ, U.S. Federal Bureau of Investigation, U.S. Immigration and Customs Enforcement (ICE), and U.S. Customs and Border Protection (CBP) have conducted Operation Network Raider, which has made 700 separate seizures of networking equipment since 2005, the DOJ said.
In addition to the convictions and seizures, nine people are facing trial and another eight defendants are awaiting sentencing, the agencies said. There was a 75 percent decrease in seizures of counterfeit network hardware at U.S. borders from 2008 to 2009, CBP said.
Operation Network Raider seeks to protect computer networks and IT infrastructure in the U.S. from failures associated with counterfeit network hardware, including network routers, switches and network cards, the agencies said.
On Thursday, Ehab Ashoor, 49, a Saudi citizen residing in Sugarland, Texas, was sentenced in the U.S. District Court for the Southern District of Texas to just over four years in prison and ordered to pay $119,400 in restitution to Cisco Systems. On Jan. 22, a jury found Ashoor guilty of charges related to trafficking in counterfeit Cisco products, the DOJ said.
Ashoor purchased counterfeit Cisco Gigabit Interface Converters (GBICs) from an online vendor in China with the intention of selling them to the U.S. Department of Defense for use by Marine Corps personnel operating in Iraq, the DOJ said. The computer network for which the GBICs were intended is used by the Marine Corps to transmit troop movements, relay intelligence and maintain security for a military base west of Fallujah, Iraq, the DOJ said.
On Jan. 25, Yongcai Li, 33, a resident of China, was sentenced to two-and-a-half years in prison and ordered to pay $790,683 in restitution to Cisco Systems in U.S. District Court for the Central District of California. Li procured counterfeit Cisco products in China in response to orders and then shipped the products to the U.S., the DOJ said.
“Trafficking in counterfeit computer components is a problem that spans the globe and impacts most, if not all, major network equipment manufacturers," Assistant Attorney General Lanny Breuer, of the DOJ's Criminal Division, said in a statement. "We are intensely focused on bringing to justice those who engage in piracy and counterfeiting.”
ICE and CBP have seized more than 94,000 counterfeit Cisco networking devices and labels in the operation, the DOJ said.
“These cases involve greedy businessmen hocking counterfeit and substandard hardware to any buyer -- whether it could affect the health and safety of others in a hospital setting or the security of our troops on the battlefield,” John Morton, assistant secretary of homeland security for ICE, said in a statement. “They pose a triple threat to our nation by stealing from our economy, threatening U.S. jobs and potentially putting the safety of our citizens at risk."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Legal White Papers | Webcasts