Instead, they spend months silently monitoring email, stealing sensitive documents, and mapping out ways to break into not ...