The FBI briefing slides on the case stated that while there are “intelligence gaps” on why the Chinese made the counterfeit equipment it could have been for profit or as part of a state-sponsored operation.

Additionally the scope of the Chinese counterfeit equipment may extend beyond routers to include fake IT equipment such as PCs and printers.

Under a section titled “The Threat,” the FBI described the effort as “IT subversion/supply chain attack” that could “cause immediate or premature system failure during usage.”

The counterfeit equipment also could be used to “gain access to otherwise secure systems” and to “weaken cryptographic systems.”

The briefing slide said the Chinese information warfare efforts require “intimate access to target systems.”