When and Why Threats Go Undetected