Skiptrace: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
added short description
Line 10: Line 10:
Skip tracing is performed in stages. The first step is to verify the information provided by the client to understand who the subject is and if the client has any misinformation. Then the skip tracer will start collecting as much information as possible about the subject. The information is then analyzed, reduced, and verified. Sometimes the subject's current whereabouts are in the data, but are obfuscated by the sheer amount of information or disinformation. Often, the job becomes more than mere research since one must often employ methods of social engineering, which involves calling or visiting former neighbors, or other known contacts to ask about the subject, sometimes under false or misleading pretenses.<ref>{{cite book |last1=Blake |first1=William F. |title=A manual of private investigation techniques : developing sophisticated investigative and business skills to meet modern challenges |date=February 1, 2013 |publisher=Charles C Thomas |isbn=9780398088569 |pages=147–165}}</ref>
Skip tracing is performed in stages. The first step is to verify the information provided by the client to understand who the subject is and if the client has any misinformation. Then the skip tracer will start collecting as much information as possible about the subject. The information is then analyzed, reduced, and verified. Sometimes the subject's current whereabouts are in the data, but are obfuscated by the sheer amount of information or disinformation. Often, the job becomes more than mere research since one must often employ methods of social engineering, which involves calling or visiting former neighbors, or other known contacts to ask about the subject, sometimes under false or misleading pretenses.<ref>{{cite book |last1=Blake |first1=William F. |title=A manual of private investigation techniques : developing sophisticated investigative and business skills to meet modern challenges |date=February 1, 2013 |publisher=Charles C Thomas |isbn=9780398088569 |pages=147–165}}</ref>


Records or Information that "skiptracers" use may include phone number databases, [[credit report]]s (including information provided on a [[loan application]], [[credit card]] application, and in other debt collector databases), [[job application]] information, [[criminal background check]]s, utility bills (electricity, gas, water, sewage, phone, internet, and cable), [[social security]], [[disability insurance|disability]], and public tax information.<ref>{{Cite web|last=Miller|first=James|date=2018-08-20|title=What is Skip Tracing and How You Can Use It [2019 Update]|url=https://www.searchbug.com/info/what-is-skip-tracing/|access-date=2021-04-09|website=Searchbug Blog|language=en-US}}</ref> While some of these records may be publicly available, some cannot be accessed without an appropriate [[search warrant]], or a specific permissible purpose, which is generally only available to financial institutions, their contracted third party vendors, law enforcement or licensed private investigators.{{citation needed|date=May 2013}}<ref>{{Cite journal|last=Ball|first=Craig|title=Cybersleuthing for People Who Still Can't Program Their VCRS|journal=GPSolo}}</ref>
Records or Information that "skiptracers" use may include phone number databases, [[credit report]]s (including information provided on a [[loan application]], [[credit card]] application, and in other debt collector databases), [[job application]] information, [[criminal background check]]s, utility bills (electricity, gas, water, sewage, phone, internet, and cable), [[social security]], [[disability insurance|disability]], and public tax information.<ref>{{Cite web|last=Miller|first=James|date=2018-08-20|title=What is Skip Tracing and How You Can Use It [2019 Update]|url=https://www.searchbug.com/info/what-is-skip-tracing/|access-date=2021-04-09|website=Searchbug Blog|language=en-US}}</ref> While some of these records may be publicly available, some cannot be accessed without an appropriate [[search warrant]], or a specific permissible purpose, which is generally only available to financial institutions, their contracted third-party vendors, law enforcement or licensed private investigators.{{citation needed|date=May 2013}}<ref>{{Cite journal|last=Ball|first=Craig|title=Cybersleuthing for People Who Still Can't Program Their VCRS|journal=GPSolo}}</ref>


Even when no specific information is returned, public and private databases exist that cross-reference skiptracing information with others the "skip" may have lived with in the recent past. For instance, if previous records show a "skip" lived in the same house as a third party, the third party may also be skiptraced in an effort to locate the primary target.<ref name="SkipTracingManual2018">{{cite web|url=https://archive.org/details/SkipTracingManual2018|title=Skip Tracing Manual 2018|first=Brad|last=Lyons|date=12 January 2018|publisher=|via=Internet Archive}}</ref>
Even when no specific information is returned, public and private databases exist that cross-reference skiptracing information with others the "skip" may have lived with in the recent past. For instance, if previous records show a "skip" lived in the same house as a third party, the third party may also be skiptraced in an effort to locate the primary target.<ref name="SkipTracingManual2018">{{cite web|url=https://archive.org/details/SkipTracingManual2018|title=Skip Tracing Manual 2018|first=Brad|last=Lyons|date=12 January 2018|publisher=|via=Internet Archive}}</ref>

Revision as of 04:45, 26 July 2022

Skiptrace (also skip tracing, or debtor and fugitive recovery)[1] is the process of locating a person's whereabouts. A skip tracer is someone who performs this task, which may be the person's primary occupation. The term "skip" (as a noun) refers to the person being searched for, and is derived from the idiomatic expression "to skip town", meaning to depart (perhaps in a rush), leaving minimal clues behind to "trace" the "skip" to a new location.

Skip tracing tactics may be employed by a skip tracer, contact tracer, debt collector, process server, bail bondsman or bail agency enforcer (bounty hunter), repossession agent, bail enforcement agent, private investigator, lawyer, police detective, journalist, stalker or by any person attempting to locate a subject whose contact information is not immediately known. Similar techniques have also been used by investigators to locate witnesses in criminal trials.[2]

Methods

Skip tracing is performed in stages. The first step is to verify the information provided by the client to understand who the subject is and if the client has any misinformation. Then the skip tracer will start collecting as much information as possible about the subject. The information is then analyzed, reduced, and verified. Sometimes the subject's current whereabouts are in the data, but are obfuscated by the sheer amount of information or disinformation. Often, the job becomes more than mere research since one must often employ methods of social engineering, which involves calling or visiting former neighbors, or other known contacts to ask about the subject, sometimes under false or misleading pretenses.[3]

Records or Information that "skiptracers" use may include phone number databases, credit reports (including information provided on a loan application, credit card application, and in other debt collector databases), job application information, criminal background checks, utility bills (electricity, gas, water, sewage, phone, internet, and cable), social security, disability, and public tax information.[4] While some of these records may be publicly available, some cannot be accessed without an appropriate search warrant, or a specific permissible purpose, which is generally only available to financial institutions, their contracted third-party vendors, law enforcement or licensed private investigators.[citation needed][5]

Even when no specific information is returned, public and private databases exist that cross-reference skiptracing information with others the "skip" may have lived with in the recent past. For instance, if previous records show a "skip" lived in the same house as a third party, the third party may also be skiptraced in an effort to locate the primary target.[1]

In the past skip tracing used to include things like dumpster diving and pretext calls to utility companies. Currently, skip tracing is largely conducted online using paid databases and phone calls to gather and verify information.[6] Modern social media platforms such as Facebook have greatly simplified skip tracing work.[1]

See also

References

  1. ^ a b c Lyons, Brad (12 January 2018). "Skip Tracing Manual 2018" – via Internet Archive.
  2. ^ Bohm, David (2007-02-15). "Practical Handbook for Professional Investigators". doi:10.1201/9781420006407. {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ Blake, William F. (February 1, 2013). A manual of private investigation techniques : developing sophisticated investigative and business skills to meet modern challenges. Charles C Thomas. pp. 147–165. ISBN 9780398088569.
  4. ^ Miller, James (2018-08-20). "What is Skip Tracing and How You Can Use It [2019 Update]". Searchbug Blog. Retrieved 2021-04-09.
  5. ^ Ball, Craig. "Cybersleuthing for People Who Still Can't Program Their VCRS". GPSolo.
  6. ^ Harms, Steven; Larson, Aaron (2009-07-31). Credit & collections kit for dummies. John Wiley & Sons. p. 197. ISBN 978-0470555408.