For the past two decades, when Chinese government employees hacked foreign networks, the process was often the physical world equivalent of a “smash and grab” for sensitive data. It was noisy. Usually, “wake up the neighbors” noisy. The digital artifacts were numerous and readily available when defenders were available to observe. The infrastructure and tools were often reused, leaving the same digital fingerprints on every virtual surface.