• I would be willing to say that there might be such a scenario in the works somewhere in the world; but I question whether those who perform such dastardly deeds are willing to wait 25 years to develop such pseudo-beings. It is way too easy these days to steal an existing identity through social engineering, hacking into poorly secured databases, or stealing that laptop, thumb drive or document that is just laying about and glean the benefits of a mature identity immediately.