Skiptrace

Last updated

Skiptracing is the process of locating a person's whereabouts. Skiptracing tactics may be employed by a skip tracer, contact tracer (in a public health context), debt collector, process server, bail bondsman or bail agency enforcer (bounty hunter), repossession agent, bail enforcement agent, private investigator, lawyer, police detective, journalist, stalker or by any person attempting to locate a subject whose contact information is not immediately known. Similar techniques have also been used by investigators to locate witnesses in criminal trials. [1]

Contents

Terminology

Other terms include to skip trace, or debtor and fugitive recovery. [2] A skip tracer is someone who performs this task, which may be the person's primary occupation. The term "skip" (as a noun) refers to the person being searched for, and is derived from the idiomatic expression "to skip town", meaning to depart (perhaps in a rush or perhaps hoping to elude creditors or law enforcement). As such, the skip tracers need to track down ("trace") the "skip" to their new location. The term "skip" is "attested by the mid 14th century, meaning 'to run, go, rush, flee,' and also 'to make off, hasten away'." [3]

Methods

Skiptracing is performed in stages. The first step is gather the basic information about the person, such as first, middle, and last name, variants (e.g. Robert may go by "Rob"), aliases, and nicknames. The person's date of birth, last known physical addresses, email addresses, and phone numbers are also important. The person's social media pages may yield clues about their whereabouts. The skip tracer also gathers historical information such as the names of schools the person attended, as this can generate leads about friends who might know their whereabouts. Skip tracers also gather information about the person's friends, family and business associates.

Then the skip tracer will start collecting as much information as possible about the subject using Internet searches, databases, public records, and their network of contacts. Often, the job becomes more than research since one must usually employ methods of social engineering, which involves calling or visiting former neighbors or other known contacts to ask about the person, sometimes under false or misleading pretenses. [4]

Records or Information that skip tracers use may include phone number databases, credit reports (including information provided on a loan application, credit card application, and in other debt collector databases), job application information, criminal background checks, utility bills, Social Security, disability, and public tax information. [5] While some of these records may be publicly available, some cannot be accessed without an appropriate search warrant, or a specific permissible purpose, which is generally only available to financial institutions, their contracted third-party vendors, law enforcement or licensed private investigators. [6]

Even when no specific information is returned, public and private databases exist that cross-reference skiptracing information with others the "skip" may have lived with in the recent past. For instance, if previous records show a "skip" lived in the same house as a third party, the third party may also be skiptraced in an effort to locate the primary target. [2]

The next step is to verify the information. The information is then analyzed and verified, eliminating some leads as outdated or associated with the wrong person. Sometimes the person's current whereabouts are in the data, but are obfuscated by the sheer amount of information or disinformation.

In the past, skiptracing included such things as dumpster diving and pretext calls to utility companies. Currently, skip tracing is largely conducted online using paid databases and phone calls to gather and verify information. [7] Modern social media platforms such as Facebook have greatly simplified skiptracing work. [2]

See also

Related Research Articles

<span class="mw-page-title-main">Private investigator</span> Person hired to undertake investigatory law services

A private investigator, a private detective, or inquiry agent is a person who can be hired by individuals or groups to undertake investigatory law services. Private investigators often work for attorneys in civil and criminal cases.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Detective</span> Investigator in law enforcement

A detective is an investigator, usually a member of a law enforcement agency. They often collect information to solve crimes by talking to witnesses and informants, collecting physical evidence, or searching records in databases. This leads them to arrest criminals and enable them to be convicted in court. A detective may work for the police or privately.

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

A background check is a process a person or company uses to verify that an individual is who they claim to be, and this provides an opportunity to check and confirm the validity of someone's criminal record, education, employment history, and other activities from their past. The frequency, purpose, and legitimacy of background checks vary among countries, industries, and individuals. An employment background check typically takes place when someone applies for a job, but it can also happen at any time the employer deems necessary. A variety of methods are used to complete these checks including comprehensive database search and personal references.

<span class="mw-page-title-main">Contact tracing</span> Finding and identifying people in contact with someone with an infectious disease

In public health, contact tracing is the process of identifying persons who may have been exposed to an infected person ("contacts") and subsequent collection of further data to assess transmission. By tracing the contacts of infected individuals, testing them for infection, and isolating or treating the infected, this public health tool aims to reduce infections in the population. In addition to infection control, contact tracing serves as a means to identify high-risk and medically vulnerable populations who might be exposed to infection and facilitate appropriate medical care. In doing so, public health officials utilize contact tracing to conduct disease surveillance and prevent outbreaks. In cases of diseases of uncertain infectious potential, contact tracing is also sometimes performed to learn about disease characteristics, including infectiousness. Contact tracing is not always the most efficient method of addressing infectious disease. In areas of high disease prevalence, screening or focused testing may be more cost-effective.

A GPS tracking unit, geotracking unit, satellite tracking unit, or simply tracker is a navigation device normally on a vehicle, asset, person or animal that uses satellite navigation to determine its movement and determine its WGS84 UTM geographic position (geotracking) to determine its location. Satellite tracking devices may send special satellite signals that are processed by a receiver.

Sourcing is a talent acquisition discipline which is focused on the identification, assessment and engagement of skilled worker candidates through proactive recruiting techniques. Professionals specializing in sourcing are known primarily as Sourcers; but also Internet Recruiters, Recruiting Researchers or Talent Scouts.

<span class="mw-page-title-main">Credit card fraud</span> Financial crime

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

<span class="mw-page-title-main">Restoring Family Links</span> Services provided by the Red Cross and Red Crescent movement

Restoring Family Links (RFL) is a program of the Red Cross and Red Crescent Movement, more specifically the International Committee of the Red Cross (ICRC) and National Red Cross and Red Crescent Societies involving activities that aim to prevent separation and disappearance, look for missing persons, restore and maintain contact between family members and clarify the fate of persons reported missing. The activities are carried out by the components of the RFL is sometimes also referred to as family tracing.

BeenVerified is a background check company that provides consumer initiated criminal background and people search services through its website for profit as well as its mobile application "Background Check App." The company also launched additional mobile applications including a reverse number look up called NumberGuru and a registered sex offender tracking app that uses augmented reality to locate sex offenders.

Transnational child protection refers to the protection of children from violence, exploitation, abuse and neglect in an international setting. When a non-national child comes into contact with public authorities and service providers, a series of checks, assessments and immediate measures sets in to identify the child and to assess her or his situation. Article 19 of the UN Convention on the Rights of the Child provides for the protection of children in and out of the home, including in their country of origin, residence or a third country. Article 2 of the Convention provides for the right to non-discrimination, meaning children have the right to protection regardless of the national origin or status of the child or his or her parents or legal guardians.

<span class="mw-page-title-main">COVID-19 apps</span> Mobile apps designed to aid contact tracing

COVID-19 apps include mobile-software applications for digital contact-tracing - i.e. the process of identifying persons ("contacts") who may have been in contact with an infected individual - deployed during the COVID-19 pandemic.

TraceTogether is a digital system implemented by the Government of Singapore to facilitate contact tracing efforts in response to the COVID-19 pandemic in Singapore. The main goal is quick identification of persons who may have come into close contact with anyone who has tested positive for COVID-19. The system helps in identifying contacts such as strangers encountered in public one would not otherwise be able to identify or remember. Together with SafeEntry, it allows the identification of specific locations where a spread between close contacts may occur.

<span class="mw-page-title-main">NZ COVID Tracer</span> Mobile software application

NZ COVID Tracer is a mobile software application that enables a person to record places they have visited, in order to facilitate tracing who may have been in contact with a person infected with the COVID-19 virus. The app allows users to scan official QR codes at the premises of businesses and other organisations they visit, to create a digital diary. It was launched by New Zealand's Ministry of Health on 20 May 2020, during the ongoing COVID-19 pandemic. It can be downloaded from the App Store and Google Play.

<span class="mw-page-title-main">NHS Test and Trace</span> Government COVID-19 agency in England

NHS Test and Trace is a government-funded service in England, established in 2020 to track and help prevent the spread of COVID-19. The programme is part of the UK Health Security Agency; the service and the agency are headed by Jenny Harries.

<span class="mw-page-title-main">Corona-Warn-App</span> German COVID-19 contact tracing app

Corona-Warn-App was the official and open-source COVID-19 contact tracing app used for digital contact tracing in Germany made by SAP and Deutsche Telekom subsidiary T-Systems.

<span class="mw-page-title-main">Valtrace</span> Contact tracing platform

Valtrace is a contact tracing platform used in Valenzuela, Metro Manila. Its current role is to replace paper forms that increases possible contact with the virus. Valtrace uses QR code technology to provide contact-less tracing within the city. People who are going into the city's establishments should register to the program, in order to enter the establishment.

References

  1. Bohm, David (2007-02-15). Practical Handbook for Professional Investigators. doi:10.1201/9781420006407. ISBN   9780429245268.
  2. 1 2 3 Lyons, Brad (12 January 2018). "Skip Tracing Manual 2018" via Internet Archive.
  3. "Skip". www.etymonline.com. Online Etymological Dictionary. 20 January 2023. Retrieved 20 January 2023.
  4. Blake, William F. (February 1, 2013). A manual of private investigation techniques : developing sophisticated investigative and business skills to meet modern challenges. Charles C Thomas. pp. 147–165. ISBN   9780398088569.
  5. Miller, James (2018-08-20). "What is Skip Tracing and How You Can Use It [2019 Update]". Searchbug Blog. Retrieved 2021-04-09.
  6. Ball, Craig. "Cybersleuthing for People Who Still Can't Program Their VCRS". GPSolo.
  7. Harms, Steven; Larson, Aaron (2009-07-31). Credit & collections kit for dummies. John Wiley & Sons. p. 197. ISBN   978-0470555408.