You've seen it a thousand times in a movie or a television show. It is such a standard gambit that some days it seems mandatory. An object is thrown to make noise in a spot where the pursued is not in an effort to make the pursuer look in a different direction than the pursued's hiding spot.
There are variations on that theme. A predatory animal is described as hunting motion. If you stand very still the animal will ignore you as a stationary object which are not made of meat.
Either way, the foundational intent is the same. If you can make the entity looking for you have no reason to look in your direction, you will not be found (or noticed or whatever).
The corollary is that you are more likely to be found or seen or attacked if you call attention to yourself. Hold on to this for a bit. You're going to need it later.
One of the joys of modern existence is the ability to record and playback sights and/or sounds. Still photography, video photography and audio recording affect everyone living a reasonably modern life. Creating movies, television shows and music is the primary employment for an awful lot of folks. The rest of us consume what they create in one way or another. But our ability to record and playback does not stop there.
RADAR, SONAR and other sensing technologies can also have their outputs recorded and played back. For most of us, it would be difficult to find something we were less likely to watch or listen to. However, since long-term storage memory is (relatively) inexpensive, entities like the NSA, or their foreign analogues, tend to hang on to such recordings just in case some later development makes them useful. Therein (potentially) lies the problem.
In an example of what might be possible, an intelligence organization could acquire a cryptographic key in some method and apply it to recorded transmissions to read the contents.
Now instead of communications intercepts, let's cycle back to the sensing technologies. If we "knew" for a fact the exact time and date an adversary's submarine was within range of our acoustic sensors, we might be able to play back the recording and use advances in computerized analysis to see if it could pick out a sound signature that a human or older computer tech might have missed. If we can, voila! We can now identify that sub whenever it gets within range of a sensor whether it is fixed or mobile.
In their rush to get publicity Felon47 and his DUI hire, Hegseth, have ensured friend and foe alike who might have appropriately positioned land-based or space-based or mobile radars have reason to replay those recordings to look for an anomaly that could be the signature of a B2 Stealth bomber. They violated the precepts of prehistoric stealth in that they are calling attention to those planes. Various entities have reason to look exactly in our direction.
I cannot recall ever having seen reporting on the exact route a modern American submarine took. Why? Because this ain't the Stone Age. Technological analysis can be applied post event - possibly months or years after the event or whenever a technological advancement makes revisiting such recordings potentially fruitful. But we just did it with Stealth aircraft.
I personally consider this criminal malfeasance. (Not that that will impress anyone) I will likely never know if the stealth was compromised. That is the sort of thing national entities like to keep in their metaphorical backpockets. However, I consider it very likely the misadministration was advised about it and decided publicity was more important than national secrets.
Those people are not patriots.