Best Practices for Uncovering Deeply Hidden Threats