He does know who owns those computers, and did not include any government computers on the list.
It's completely possible that these computers (or netblocks) were used as jumping off points for attacks against the U.S. or U.S. companies. We'll probably never know, but there certainly isn't enough information in the article to determine whether or not this was legitimate counterintelligence activity or whether these computers were reasonably targeted.
It's completely possible that these computers (or netblocks) were used as jumping off points for attacks against the U.S. or U.S. companies. We'll probably never know, but there certainly isn't enough information in the article to determine whether or not this was legitimate counterintelligence activity or whether these computers were reasonably targeted.