To: goldworldnet  who wrote (104236 ) 9/15/2019 6:47:18 PM From: FJB  1 RecommendationRecommended By 
 Respond to    China’s Maxim –Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking scholarcommons.usf.edu Vast rewards can be reaped from the hijacking, diverting,and then copying of information-rich traffic going into or crossing the United States and Canada –often unnoticed and then delivered with only small delays.This essay will show how this hijacking works, and how ChinaT elecom seems to employ its distributed points of presence(PoPs) in western democracies’ telecommunications systems to selectively redirect internet traffic through China.  It will show the observed routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications. These Chinese PoPs are found all over the world including Europe and Asia. The prevalence of –and demonstrated ease with which–one can simply redirect andcopy data by controlling key transit nodes buried in a nation’s infrastructure requires an urgent policy response. To that end, we recommend an ‘Access Reciprocity’ strategy for vulnerable democracies–one that is ...