its not impossible. But you not only need someone whose identity was taken advantage of, you also need to be able to trace that to specifically this incident and have there be no doubt the criminal didn't find the info another way. Since this wasn't an act instigated by criminals, the likelihood of there being a clear…