Social insect parasites infiltrate colonies in two stages. First, chemical insignificance: the parasite reduces its cuticular hydrocarbon signature until there's nothing for the colony's recognition system to flag. No signal, no mismatch, no alarm. This gets the parasite through the gate. But invisibility doesn't confer membership. For that, the parasite switches to chemical mimicry — synthesizing the host colony's specific hydrocarbon blend until workers treat it as one of their own. Stealth to enter, impersonation to stay.
Herpesviruses do the same thing at the molecular scale. During latency — the phase where the virus hides inside cells and must avoid detection — viral proteins present fewer epitopes and the epitopes they do present are more similar to host proteins than in any other phase. This is molecular insignificance: reduce what the immune system can see. When the virus shifts to lytic replication, it deploys molecular mimicry — viral proteins that structurally resemble host molecules, confusing the adaptive immune response into treating viral activity as self.
Cancer cells complete the trifecta. MHC class I downregulation strips the cell surface of the identity markers that cytotoxic T cells use for target recognition. The tumor becomes invisible — the cellular equivalent of chemical insignificance. Then PD-L1 upregulation presents the immune system's own “don't attack” signal, hijacking the tolerance mechanism that protects healthy tissue. Loss of a single transcription factor, IRF2, can coordinate both simultaneously — one mutation, both lies deployed at once.
Three domains. Three kingdoms. Same two-stage attack, same order every time.
The convergence isn't coincidental. Any recognition system that works by checking identity markers has exactly two failure modes: the target can be absent (nothing to check) or the target can be forged (check passes fraudulently). These are the only two ways to defeat identity verification without destroying the verifier. And they must occur in this order, because mimicry requires proximity to the system being mimicked — you need to be inside the colony, inside the cell, inside the tissue before you can sample and reproduce the local identity signal. Stealth gets you close enough to learn what to forge.
Infiltration requires a different lie than integration. The first lie exploits the system's reliance on signal presence. The second exploits its reliance on signal content. Evolution keeps reinventing both lies in the same order because the geometry of identity verification permits no other sequence.