The Silent Intruder: How to Detect Identity Breaches?