BlackEyes LogoBLACKEYES
Guide

How to trace someone

Long-lost friend, biological parent, elusive debtor, or missing witness — tracing uses a repeatable seven-step method. This guide covers the tools, the legal limits, and when to call a professional.

Summary

Tracing someone follows a seven-step method: anchor on known identifiers; run an email and username sweep; search social platforms; query public records and the electoral roll; check genealogy databases for older subjects; search newspaper and web archives; triangulate across at least three independent sources before treating the identity as confirmed. Most UK tracing uses free tools: HaveIBeenPwned, Sherlock, 192.com, FindmyPast, Companies House, Wayback Machine, LinkedIn, and Facebook. Paid services add speed or specialist access — genealogy platforms like Ancestry, or licensed tracing agents for debt recovery and legal enforcement. Tracing itself is lawful; contacting the subject can engage harassment law if unwelcome and repeated. Automated OSINT platforms compress the first four steps into minutes when an email address is available.

Why people trace

Four broad categories cover almost every tracing request. The method is similar; the legal context varies.

Family reunification

Reconnecting with estranged relatives, adopted family members, or friends lost to time. Hundreds of thousands of people trace family members every year through general research combined with DNA-service contacts.

Legal and debt matters

Process service on an elusive party, tracing a debtor before enforcement, matrimonial or probate work. In the UK, licensed tracing agents and enforcement officers handle most of this work commercially.

Matrimonial and relationship

Pre-action due diligence in matrimonial cases, reconnection with a biological parent, or context-gathering ahead of a significant decision about a person already known.

Commercial and investigative

Corporate investigations, fraud follow-ups, missing-witness work, or pre-contract due diligence on a counterparty who has become hard to locate.

The seven-step method

Work through the steps in order. Each builds on the output of the previous one. A well-managed trace often closes at step three or four — the later steps are reserved for harder cases or long-time-gap reconnections.

01

Anchor on what you already know

Start with every verified identifier: full name (including any former names), date of birth if known, last known address, former employer, school or university, and any email address, phone number, or social handle. Accuracy at this stage determines the success of every step that follows.

02

Email and username sweep

An email address is the highest-value identifier in modern tracing. Run it through breach databases (HaveIBeenPwned), check username variants across social platforms (Sherlock, WhatsMyName), and search the exact address on the open web. If you don’t have an email but do have a plausible username, start there instead.

03

Social platform discovery

Search LinkedIn for professional history, Facebook for relationship and location signals, Instagram and TikTok for current activity. For older subjects, check Classmates.co.uk, Friends Reunited archives, and local Facebook community groups. A name combined with a former location is often enough.

04

Public-record and electoral roll

The UK edited electoral roll is queryable through services like 192.com and FindmyPast. Companies House for directorships. Land Registry for property ownership (by full name). BT directory (where applicable). These give anchor addresses.

05

Genealogy databases

For long-gone relatives, genealogy platforms (Ancestry, FindmyPast, MyHeritage) pick up traces through census records, BMD (birth, marriage, death) records, and increasingly through DNA-match networks. Trace Labs runs missing-persons CTF events that teach the modern methodology.

06

Newspaper and archive search

The British Newspaper Archive, local newspaper archives, and Wayback Machine preserve mentions a person may have forgotten. Obituaries, wedding announcements, charity or sport club mentions — all common anchor points.

07

Triangulate and verify

Cross-reference findings across at least three independent sources before treating an identity as confirmed. A name match on social media alone is never enough — two people can share a name. A name match combined with a matching former employer, school year, and location pattern is a verified identity.

Compressing the first four steps

Where you have an email address, steps 1 through 4 can be automated into a parallel pipeline that runs in around fifteen minutes.

BLACKEYES runs breach sweeps, username graphs, social-platform discovery, public-record lookups, and geographic triangulation simultaneously from an email seed. The output is an eleven-section dossier with every finding source-cited — exactly the foundation a tracing agent would otherwise build manually over several hours.

The automated approach suits: pre-hire candidate research, pre-tenancy applicant research, insurance fraud work, pre-litigation due diligence, and modern PI case openings. It doesn’t replace the later manual steps (newspaper archive search, doorstep enquiry, DNA-network follow-up) — those remain the tracer’s craft.

When to hire a professional tracer

DIY tracing works for most reconnection cases. Four scenarios reliably call for a professional.

When statutory tools are needed

Bailiffs and enforcement officers have access to data paths a private individual doesn’t — credit-bureau address histories through regulated inquiry processes. For debt enforcement specifically, instruct a licensed tracing agent.

When time-pressure matters

Pre-action litigation deadlines, probate urgency, or imminent court dates. A professional tracing agent can move considerably faster than DIY research, often closing a trace within days.

When the subject is actively evading

Someone actively avoiding being found requires skills beyond digital research — surveillance, doorstep enquiry, and interviewing in a way that complies with RIPA and data-protection law. Licensed private investigators are trained for this.

When the outcome will go to court

Tracing evidence that will be relied upon in proceedings needs to be gathered to evidential standards, documented with chain-of-custody, and defensible under cross-examination. A professional tracer builds a case that survives.

Frequently asked questions

Can you trace someone with just a name?

Partially, but less reliably. A common name plus nothing else leaves too many possibilities. With a name plus any additional identifier — former address, former employer, school, DOB, or a relative’s name — success rates rise substantially. With a name plus an email address, tracing is usually straightforward.

What’s the difference between tracing and skip tracing?

Skip tracing is a specific category of tracing focused on debtors or parties who have deliberately moved without forwarding address — typically in debt recovery, process service, or legal enforcement contexts. Tracing more broadly includes family reunification, long-lost friend searches, and witness location. The methodology overlaps; the purpose and legal framework differ.

How long does a trace take?

A DIY trace with reasonable starting information typically takes a few hours to a few days — depending how quickly social platforms and public records yield confirmation. A professional tracing agent can close a trace within days once instructed. A skip trace on an actively evading debtor can take weeks.

Do I have to tell someone I’m tracing them?

No — the research phase is passive. You have no obligation to inform the subject you’re looking for them. Once you make contact, that’s a different matter — the subject has the right to decline further contact, and repeated unwelcome contact can cross into harassment.

Is it legal to pay for tracing services?

Yes. Paid tracing services — tracing agents, private investigators, genealogy research firms — are legal in the UK where the purpose is lawful. Some categories (debt tracing, enforcement-related tracing) are regulated and require licensing. Buying a tracing service for harassment, stalking, or coercive purposes is not lawful and carries criminal liability.

Can OSINT alone find anyone?

Not quite. OSINT is extremely effective for anyone with a public digital footprint — which is most people in modern working age. For subjects with minimal public presence (some elderly people, deliberately private individuals, or those without email or social media), OSINT hits natural limits and physical tracing methods — doorstep enquiry, electoral roll, deed searches — take over.

Start a trace with one email

The first four steps of the seven-step method, automated. Fifteen minutes to a source-cited foundation for any trace.

Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ