Chinese hackers infiltrated T-Mobile and other telecom giants in a months-long campaign to spy on high-value targets. How would they address this situation?