Using the following three examples, determine how an identity thief can piece together additional information about you. Using the following three examples, determine how an identity thief can piece together additional information about you.