Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?