The procurement ticket sat in the queue, tagged Insider Threat Detection, with a priority flag that nobody wanted to own. Inside the codebase and network logs, the signs were already there—slow exfiltration, quiet privilege escalations, subtle config changes that passed compliance checks. The danger wasn’t an outside barrage.