How to Find a Needle in a Haystack (From the Insider Threat to Solo Perpetrators)