Traffic Routed to Chinese Servers on April 8
Well, it may be a tricky question to answer. Basically, before the traffic could be routed, the name servers (that are part of the Domain Name System that translates human-friendly terms like brighthub.com into numerical web addresses that computers understand) were hijacked. The major issue was the lack of security in Border Gateway Protocol due to which someone at an ISP reprogrammed a router, and it believed that a Chinese server was the closest router to reach the destination (and a reliable source to pass on the information packets).
The amazing thing is that lot of information in those packets had also originated from U.S. government and military sites, and there was a good possibility of the information being intercepted by the Chinese servers.
This wrong routing prevailed just for about 18 minutes, and far worse the redirected traffic even included commercial websites such as IBM, Microsoft, Dell, and Yahoo!
So, in short, traffic to and from sites was wrongly forced to believe that the best route to reach the destination was through the Chinese servers! This has been the center of criticism, serious worries, and calls to action to improve the security flaws in the working of Border Gateway Protocol, and the overall traffic routing system that caused this mishap. If this could happen once, then it can surely happen again, so it's important to find out the root cause of the incident, and fix it for good.
For now we can just hope that such a thing doesn't happen again, and the Internet traffic gets routed only through reliable routers, and doesn't get intercepted on the way; we'll keep you posted as and when more updates become available on this matter.