Most cyber reporting stops at individual incidents. This report connects the dots, showing how China’s operations add up to a broader strategy. It explains the methods and infrastructure that give the PRC scale and persistence, and it sets out concrete steps the U.S. and its allies can take to disrupt these efforts and protect their freedom of action.