We cross-reference with visual ID, surveillance, and behavior. If needed, skip tracing or alternative service methods are used.