You are an information system auditor of HDA Inc. You are currently conducting an audit and have come across a situation where you discovered active privileged accounts that belong to former employees who have left the organization. In this specific scenario, you need to identify and determine the threat actor involved. Among the following options, who or what represents the potential threat actor in this case?