![]() It was China Telecom’s network presence in Ottawa and other strategic network nodes across North America that enabled China’s digital espionage in 2016 (and in other cases). A quick glance at China Telecom’s global data center map shows, for example, how their growing global presence has resulted in several dozen strategic installations of Chinese routing equipment across North American and European networks. With Chinese technology firms expanding their market shares in areas critical to network infrastructure like telecommunications and submarine cables, there has been a corresponding increase in Chinese presence across foreign networks. Research below confirms this was not an isolated incident. One of the discoveries that emerged from excellent technical work performed by a research team that focused on tracing Border Gateway Protocol (BGP) routes was that China hijacked all data from Canadian to Korean government sites for six months in 2016 and rerouted it through Chinese networks. ![]() For over a decade ( 2010, 2018, 2019, 2020), China has quietly shown a pattern of hijacking global data flows by redirecting them through servers located in China, sometimes for minutes, other times for much longer, where the data could be copied onto Chinese Communist Party (CCP) networks and decrypted at leisure. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |