a bunch of deceptive leads that would send the pursuer on a wild-goose chase. Finally, we’d build a new life for him quickly and quietly, using a series of anonymous private mailboxes and prepaid phones. Because Eileen and I used public records, credit reports, utility statements, and people-search Web sites to do most of our skip-tracing work, we’d be pretty much out of luck if those

