"...The tactic exploits the internet routing protocol BGP (Border Gateway Protocol) to let an attacker surreptitiously monitor unencrypted internet traffic anywhere in the world, and even modify it before it reaches its destination...." http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html -- Giancarlo Rubio