{"id":1256,"date":"2008-05-11T19:15:00","date_gmt":"2008-05-11T19:15:00","guid":{"rendered":"tag:www.hothardware.com:\/\/b13c8dd3a0d0e5e1172dee3f474be582"},"modified":"2008-05-11T19:15:00","modified_gmt":"2008-05-11T19:15:00","slug":"3500-fake-cisco-products-in-us-gov-networks","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=1256","title":{"rendered":"3500 Fake Cisco Products In US Gov Networks"},"content":{"rendered":"<p>Grab your tinfoil hats people, the conspiracy theories are about to start flying. The FBI just recently finished conducting an investigation into the networking components being used by the government.&#8221;Operation Cisco Raider uncovered 3,500 counterfeit Cisco network components, with an estimated value of $3.5 million. \u00a0According to the FBI\u2019s briefing of the Office of Management and Budget, the counterfeit equipment could allow the remote jamming of networks thought to be secure and possibly could allow access<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Grab your tinfoil hats people, the conspiracy theories are about to start flying. The FBI just recently finished conducting an investigation into the networking components being used by the government.&#8221;Operation Cisco Raider uncovered 3,500 counterfeit Cisco network components, with an estimated value of $3.5 million. \u00a0According to the FBI\u2019s briefing of the Office of Management and Budget, the counterfeit equipment could allow the remote jamming of networks thought to be secure and possibly could allow access <a href=\"https:\/\/computerhunter.us\/?p=1256\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-1256","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/1256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1256"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/1256\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}