Feeds

US, Canada seize fake Cisco goods

Rotten routers

HP ProLiant Gen8: Integrated lifecycle automation

US and Canadian authorities have seized counterfeit Cisco hardware and product labels worth an estimated $76m following more than 400 raids.

The US Department of Justice (DoJ) and the Department of Homeland Security said in a statement last Thursday that Feds, customs officials and Royal Canadian Mounted Police have all been involved in the ongoing investigation, which began in 2005.

The DoJ – which hailed the operation as a big success – said it decided to crackdown on dodgy Cisco gear, much of which reaches US and Canadian shores from China, to protect the public from network infrastructure failures.

“This initiative shows that through collaboration among law enforcement agencies and prosecutors worldwide, we can achieve dramatic enforcement results and protect public safety,” said assistant Attorney General Alice S Fisher.

The FBI part of the multi-agency probe, which it dubbed Operation Cisco Raider, has so far led to 10 convictions and $1.7m in restitution.

Over the past two years Feds have been involved in the investigation of 15 cases with the operation producing 36 search warrants and around 3,500 pirated network components with a total retail value of about $3.5m.

Meanwhile, Immigration and Customs Enforcement and Custom Border Protection officials have so far seized more than 74,000 knock-off Cisco goods valued at over $73m.

In January two US brothers were charged with various crimes after they allegedly sold counterfeit Cisco equipment to several government agencies including the FBI, the Federal Aviation Authority and the Marine Corps.

The DoJ news release is here. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.