SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning -- Ignore unavailable to you. Want to Upgrade?


To: goldworldnet who wrote (104236)9/15/2019 6:47:18 PM
From: FJB1 Recommendation

Recommended By
goldworldnet

  Respond to of 110581
 
China’s Maxim –Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Chris C. Demchak
Yuval Shavitt

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement

scholarcommons.usf.edu

Cover Page Footnote
The views and ideas expressed here are the authors alone, and do not represent those of the Department of Defense, U.S. Navy, or U.S. Naval War College.

Small Excerpt:

Surprisingly, the voluntary 2015 Xi-Obama agreement stopping military forces from hacking commercial enterprises for economic gain did appear to dramatically reduce Chinese theft efforts against western targets. China’s technological development process, however, was still dependent on massive expropriation of foreign R&D. This necessitated new ways to get information while still technically adhering to the agreement. Since the agreement only covered military activities, Chinese corporate state champions could be tasked with taking up the slack. But even Chinese multinationals,such as Huawei or ZTE,were already being viewed with suspicion. Instead data suggests the government opted to leverage a seemingly innocuous player –one that is normally viewed as a passive service provider–to target the foundational infrastructure of the internet to by pass the agreement, avoid detection, and provide the necessary access to information. Enter China Telecom 3–a large state champion telecommunications company–as an option. While the 2015 agreement prohibited direct attacks on computer networks, it did nothing to prevent the hijacking of the vital internet backbone of western countries. Conveniently, China Telecom hasten strategically placed, Chinese controlled internet ‘points of presence’4(PoPs) across the internet backbone of North America. Vast rewards can be reaped from the hijacking, diverting,and then copying of information-rich traffic going into or crossing the United States and Canada –often unnoticed and then delivered with only small delays.This essay will show how this hijacking works, and how ChinaT elecom seems to employ its distributed points of presence(PoPs) in western democracies’ telecommunications systems to selectively redirect internet traffic through China. It will show the observed routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications. These Chinese PoPs are found all over the world including Europe and Asia. The prevalence of –and demonstrated ease with which–one can simply redirect andcopy data by controlling key transit nodes buried in a nation’s infrastructure requires an urgent policy response. To that end, we recommend an ‘Access Reciprocity’ strategy for vulnerable democracies–one that is ...



To: goldworldnet who wrote (104236)9/22/2019 1:44:14 AM
From: goldworldnet  Read Replies (1) | Respond to of 110581
 
If anything, I have too many hobbies that dilute my focus and there is no shortage of non-internet of things to do. :)

Best -- Josh

* * *



To: goldworldnet who wrote (104236)10/2/2019 6:37:09 PM
From: goldworldnet1 Recommendation

Recommended By
Honey_Bee

  Read Replies (2) | Respond to of 110581
 
(Poll) Preferred SmartPhone size.

Votes Cast : 38
Preferred SmartPhone size.
Smaller is better.
 
6
Bigger is better.
 
14
Medium, but phones are getting too big.
 
18
 
This poll is now closed (poll closed on 14 Oct 2019).

This Poll closes October 14, 2019

Thanks for Participating -- Josh

* * *