This article will show how this hijacking works, and how China employs its conveniently distributed points of presence (PoPs) in western democracies’ telecommunications systems to redirect internet traffic through China for malicious use. It will show the actual routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications.