Researchers have mapped out a series of internet traffic hijacks and redirections that they say are part of large espionage and intellectual property theft effort by China.
The researchers, Chris Demchak of the United States Naval War College and Yuval Shavitt of the Tel Aviv University in Israel, say in their paper that state-owned China Telecom hijacked and diverted internet traffic going to or passing through the US and Canada to China on a regular basis.Tel Aviv University researchers built a route tracing system that monitors BGP announcements and which picks up on patterns suggesting accidental or deliberate hijacks and discovered multiple attacks by China Telecom over the past few years.
In 2016, China Telecom diverted traffic between Canada and Korean government networks to its PoP in Toronto. From there, traffic was forwarded to the China Telecom PoP on the US West Coast and sent to China, and finally delivered to Korea.
Normally, the traffic would take a shorter route, going between Canada, the US and directly to Korea. The traffic hijack lasted for six months, suggesting it was a deliberate attack, Demchak and Shavitt said.
Demchak and Shavitt detailed other traffic hijacks, including one that saw traffic from US locations to a large Anglo-American bank's Milan headquarters being terminated in China, and never delivered to Italy, in 2016.
During 2017, traffic between Scandinavia and Japan, transiting the United States, was also captured by China Telecom, ditto data headed to a mail server operated by a large Thai financial company.
China Telecom is able to divert the traffic by announcing bogus routes via the Border Gateway Protocol (BGP) that governs data flows between Autonomous Systems, the large networks operated by telcos, internet providers and corporations.
After the traffic was copied by China Telecom for encyption breaking and analysis, it was delivered to the intended networks with only small delays. Demchak and Shavitt said.
Such hijacking is difficult to detect as China Telecom has multiple points of presence (PoPs) in North America and Europe that are physically close to the attacked networks, causing almost unnoticeable traffic delivery delays despite the lengthened routes.
China in comparison does not allow overseas telcos to establish PoPs in the country, and has only three gateways into the country, in Beijing, Shanghai and Hong Kong. This isolation protects the country's domestic and transit traffic from foreign hijacking.BGP hijacking of internet traffic is a common phenomenon, one which requires the support of large network operators to exploit at scale.
While the US and China agreed in 2015 to not hack one another's computer networks, the deal did not cover hijacking of internet backbones, Demchak and Shavitt pointed out.
The researchers suggest the allied democratic nations establish an "access reciprocity" policy for internet PoPs located in their countries, to address the traffic hijacking.
Under the access reciprocity policy US telcos and providers should be allowed to set up PoPs in China, Demchak and Shavitt said.If access reciprocity is refused, "then an appropriate defence policy in response could state that no traffic to or from the US or ally is allowed to enter a China Telecom PoP in the US or in the ally's networks," the researchers suggested.
Such a policy could be inserted into BGP routing tables as required for automatic implementation.
https://www.itnews.com.au/news/china-systematically-hijacks-internet-traffic-researchers-514537 ....
This sounds ridiculous.
If russia rerouted american internet traffic to steal state secrets or intellectual property, CNN, MSNBC and other news outlets would be calling for immediate action. They would push military action or some type of severe penalty beyond already imposed economic sanctions. China gets a free pass--for whatever reason. China would appear to be the deep state "goldenboy" who receives a lot of special treatment for reasons that are unknown, unverified and maybe a little mysterious.
Events like this could help explain why many americans support raising tariffs on chinese goods.
On the technical side, I would be interested to know how common these types of man-in-the-middle(?) attacks are. The article seems to imply that having geographic POP helps execute this form of internet sniffing. AFAIK having POP isn't 100% necessary for it & there are many conditions where it may even be unnecessary considering how many platforms are compromised & already have backdoors built in to them.