A university's IT аdministrаtоr mоnitоred network trаffic and discovered unusual data exfiltration patterns during a routine audit. It turned out that a rogue employee had been transferring sensitive research data to an external server. In terms of threat categorization, this employee is classified as what?