Active and passive security threats contrast