How to Find a Needle in a Haystack: From the Insider Threat to Solo Perpetrators