information theft analysis