The document discusses how the Border Gateway Protocol (BGP) that routes internet traffic can be hijacked. BGP relies on trust between internet service providers (ISPs) without validation of routing information, allowing a malicious attacker or nation state to reroute large amounts of internet traffic. In 1998, security experts warned government agencies about vulnerabilities in BGP that could allow hijacking of internet traffic, but the issues have not been fully addressed. The document raises questions about how China Telecom was able to reroute 15% of US internet traffic for 18 minutes in 2010 without being overwhelmed by the increased load.