. . . "Identify relevant patterns, practices, and specific forms of activity that are red flags2 signaling possible identity theft and incorporate those red flags into the program;" .