This document discusses vulnerabilities in internet core routing protocols, specifically Border Gateway Protocol (BGP). It describes how BGP routing updates can be manipulated through techniques like TCP spoofing, route hijacking, and man-in-the-middle attacks. The document provides examples of how an attacker could use route maps and AS path prepending to hijack traffic by advertising a more specific network prefix. It recommends network design, access controls, strong authentication, and encrypted connections as policies to help secure BGP routing.