Asian - here's the exec summary you'd like. No trouble, mate. Happy to help
1. By 2011 "GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks" <url>https://theintercept.com/2015/12/23/juniper-firewalls-successfully-targeted-by-nsa-and-gchq</url>
2. An external researcher or internal engineer found the security flaws. "The company said it discovered the backdoors during an internal code review, but it didn’t say if this was a routine review or if it had examined the code specifically after receiving a tip that something suspicious was in it." <url>http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors</url>
3. Juniper sat on it until the discoverer was at the point of going public.
4. Juniper's CTO made the "During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections" announcement to own the discovery <url>http://www.wired.com/2015/12/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors</url>
5. Juniper issues fixes that don't fix all the security issues <url>http://www.wired.com/2016/01/new-discovery-around-juniper-backdoor-raises-more-questions-about-the-company</url>
A damning piece of circumstantial evidence is that Juniper won't be explicit about who/how/when the security flaws came to light. It would be to their credit to claim that they found it, but being caught lying (as opposed to evasive) would make their situation and trustworthiness so much worse. That implies that Juniper's hand was forced by the discoverer who was not under their control.
So, Cisco, got anything you need to need to do? Like go to court to get any NSA instructions to you judged illegal before you get caught?