A superpower hacked Littleton’s water supply

Five takeaways for Acton
November 15, 2025

Littleton, Massachusetts, is a quiet “bedroom community” of about 10,000 residents. It is the kind of place that seems a world away from the high-stakes chess match of global geopolitics. With no major military base or obvious connection to national security, it is, by all accounts, an ordinary American town.

That perception was shattered by a recent “60 Minutes” report. The CBS news program revealed that Littleton’s public Electric Light & Water Department was targeted by a sophisticated Chinese government hacking operation. The FBI (Federal Bureau of Investigation) arrived in November 2023 to inform the utility’s general manager that China had gained access to his computer network, which controls the town’s electricity and the chemical treatment of its water supply.

The incident in Littleton is not an isolated event, but a stark warning. It pulls back the curtain on a new front in international conflict, one that runs through the essential infrastructure of everyday life.

Here are five critical takeaways from this story, revealing a national threat that affects every community, including Acton.

A wooeden building with yellow walls and a white two story entrance. The windvane on the top of the building is in the shape of a faucet.
The Acton Water District building on Mass Ave. Photo: Greg Jarboe

1. No target is too small

Perhaps the most counter-intuitive aspect of the story is the target itself. The Electric Light & Water Department of Littleton serves a small community with no clear strategic value. When the FBI first arrived, the utility’s general manager, Nick Lawler, voiced an obvious question. “That’s the exact question I had for the FBI when they visited me on that first day, and I still can’t answer that question,” he told “60 Minutes.”

The selection of such an unassuming target is precisely what makes the threat so alarming to national security experts. It signals a shift in strategy where any piece of American infrastructure is considered a legitimate target. Retired Air Force General Tim Haugh, the former head of U.S. Cyber Command, explained the chilling implication:

“If you are willing to go after a small water provider in Littleton, Massachusetts, what other target is on the list? (‘60 Minutes’ reports on alleged Chinese hacking in small Mass. town’) So, from that perspective, this is a national threat. It’s one that needs to be addressed. But it’s also one that every American should understand, because if they’re willing to go after that small provider that doesn’t have a national security connection, that means every target is on the list.”

2. The goal isn’t immediate destruction, it’s strategic distraction

General Haugh’s analysis explains why a global superpower would target a non-military, non-economic asset like Littleton’s utility. The objective is not immediate destruction but to pre-position assets for a future crisis.

According to Haugh, in the event of a conflict between the U.S. and China in the Indo-Pacific, these compromised systems could be activated. By disrupting essential services, China could cause chaos on the American home front, diverting attention and resources to make it significantly harder for the United States to “mobilize in a crisis.” The strategy also includes a psychological warfare component. Haugh noted that if “there were three to four other examples simultaneously plus an information campaign, it could seem much larger than it is,” sowing panic.

“There was no other reason to target those systems. There’s no advantage to be gained economically. There was no foreign intelligence-collection value. The only value would be for use in a crisis or a conflict.”

3. The hackers hide in plain sight

The method used to infiltrate Littleton’s network was deceptively subtle. This wasn’t a brute-force attack. Instead of installing obvious malicious software, or malware, which might trigger alarms, the hackers exploited a common weakness in a network firewall – the kind that arises “when software vulnerabilities go unpatched or when out-of-date equipment is no longer supported with security updates.” This allowed them to steal legitimate login credentials.

Once inside, the hackers chose to “masquerade as a legitimate employee.” They did not immediately attempt to disrupt operations. Instead, they opted to “lay dormant” on the network, maintaining access for potential future use. This “living off the land” technique makes the intrusion incredibly difficult to detect, allowing the adversary to remain hidden indefinitely.

4. The danger isn’t just digital, it’s physical

When “60 Minutes” correspondent Scott Pelley asked how much of Littleton’s utility is controlled remotely by computer, general manager Nick Lawler gave a stark, three-word answer: “All of it.” From the electrical grid to the precise mixture of chemicals used to treat the town’s water supply, everything is vulnerable. The threat is not one of stolen data but of tangible, physical harm.

During a tour of the water treatment plant, Pelley noted that a hacker with remote control of the chemical tanks could poison the water. Lawler confirmed this. This incident underscores how vulnerable digital systems can become direct threats to public health and safety. As former FBI Director Christopher Wray summarized in congressional testimony:

“Cyber threats to our critical infrastructure represent real-world threats to our physical safety.”

5. The scale of the threat is large

The breach in Littleton was not an isolated incident. The FBI informed Lawler that his network was just one of at least 200 compromised utilities they had found, with some officials citing “hundreds” of targets. The campaign, attributed to a Chinese state-sponsored group known as Volt Typhoon, extended far beyond small towns, targeting “New York City’s Metropolitan Transportation Authority, 13 gas pipeline operators, the port of Houston, and major phone companies.”

According to then-FBI Director Christopher Wray, China “has a bigger hacking program than every other major nation combined.” The resource imbalance facing U.S. authorities is equally stark.

“If each one of the FBI’s cyber agents and intelligence analysts focused exclusively on the China threat, China’s hackers would still outnumber FBI cyber personnel by at least 50 to 1.”

How vulnerable is Acton?

The events in Littleton, Massachusetts demonstrate that modern geopolitical conflicts are being prepared not just on distant battlefields, but inside the essential infrastructure of everyday American towns. The front line has moved from remote military outposts to the local water treatment plant and power station.

Fortunately, federal authorities caught the intrusion before the hackers gained full operational control. Littleton was able to work with federal agencies to isolate the threat and rebuild its network — at a cost of over $50,000 — but the incident serves as a crucial wake-up call. It reveals a patient and widespread strategy to hold American civilian life hostage in a future conflict.

How prepared is Acton?

Matthew Mostoller, District Manager for the Water Supply District of Acton, said, “Thank you for reaching out on this important topic. Major takeaways are that we are all vulnerable in an interconnected world. With that said, the Acton Water District feels better prepared than Littleton was at the time of the incident.”

Mostoller added, “We make targeted investments in cybersecurity, including keeping our hardware and software updated, providing critical employee training, conducting audits and assessments internally and with third parties, and maintaining separate control and enterprise networks. Most importantly, we have emergency response and backup plans in place to minimize downtime while continuing to provide safe and reliable water, should that become necessary.”

John Petersen, a member of the Acton Water District’s Finance Committee, said, “Computer controlled and remote operations are cost effective and essential to utilities that operate 24/7. Both nation-states and terrorists are motivated attackers who will attempt to exploit this inherent vulnerability. The diverse nature of the threat requires vigilance and investment at the local level augmented by federal government and private sector work.”

While Greg Jarboe is the Senior Center beat reporter for the Acton Exchange, he writes about much more.

Featured Sponsors

Click logos below for more information.