Categories: Security

Leaked NSA Map Details China ‘Cyber-Espionage’ Attacks

The Chinese government has reportedly carried out more than 600 successful cyber-espionage attacks on US industrial, government and military targets in recent years.

Prominent firms including Google and Lockheed Martin were targeted, as well as companies linked with automobile manufacturing, pharmaceuticals and military and civilian air traffic control systems, according to the NBC News report, which cited unnamed intelligence sources.


The report is the latest to highlight the escalating tensions between the US and China, which have grown more acute since the US government said it believes China was responsible for a recent hack that affected US government personnel records.

NBC published an NSA map dating from last year that indicated where the attacks had taken place, focusing on intrusions over a five-year period that were successful in stealing secret data. The map indicated more than 600 private and public-sector “Victims of Chinese Cyber Espionage” during the period, with California having 50 targets, the most in a single state.

The north-east coastal region from Washington to Boston was also a concentration area for attacks, with others reportedly including Dallas, Miami, Chicago, Seattle, Los Angeles and Detroit.

Information stolen in the attacks includes data on the US’ critical infrastructure, such as its electrical power and telecomunications networks, according to NBC’s sources.

The map was part of an NSA briefing by the NSA Threat Operations Centre (NTOC) in February of last year, NBC said.

Cyber security

The US has regularly highlighted the national cyber-security threat posed by China in recent years, including China-based manufacturers of IT products such as Huawei and ZTE.

James Clapper, director of national intelligence, in June told a Washington intelligence conference that China was the “leading suspect” in attacks on US government personnel databases announced earlier that month. Clapper said at the time that such attacks are likely to continue in the absence of a clear strategy for deterrence.

“Until such time as we can create both the substance and the psychology of deterrence, this is going to go on,” he said, adding that the government has “struggled” with the issue due to “concerns about unintended consequences and other related policy issues”.

In the absence of such a strategy the government must focus more on “defence”, he said.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Bitcoin ‘Creator’ Craig Wright Admits He Is Not Satoshi Nakamoto

Australian computer scientist Craig Wright referred to Crown Prosecution Service (CPS) to be considered for…

1 hour ago

GitLab Explores Possible Sale – Report

Coding platform GitLab is reportedly exploring a sale, nearly three years after successful IPO on…

2 hours ago

TikTok Parent Loses Bid To Avoid EU ‘Gatekeeper’ Label

China's ByteDance has lost a legal challenge to avoid a European Union 'Gatekeeper' designation, but…

3 hours ago

Kaspersky To Shutter US Operation After National Security Ban

Russian cybersecurity giant Kaspersky is to close down all of its operations in the United…

4 hours ago

Microsoft Faces UK Probe Over Inflection Staff Hiring

Poaching staff? UK's CMA regulator confirms phase one investigation of Microsoft's “hiring” of former Inflection…

7 hours ago

Elon Musk To Relocate SpaceX, X HQ To Texas

Leaving California. Elon Musk protests new gender-identity law, says he will move headquarters of SpaceX…

8 hours ago