TraceLink logo
Initializing…
Privacy-first reporting • Controlled access • Secure coordination
Missing & Unidentified Persons Platform

Every face has a name.
We help find it.

TraceLink connects missing persons reports, public sightings, and unidentified hospital patients — with privacy-first matching, careful handling of sensitive media, and secure communication.

In an emergency? Contact local emergency services first. TraceLink supports coordination and reporting — it does not replace emergency response.
People searching — representing the mission of TraceLink
“Behind every report is a family waiting. Every sighting, a thread worth pulling.”

TraceLink was built on a simple belief: safe, coordinated information-sharing can reunite families and bring dignity to the unidentified. The platform operates with protective defaults — blurred images, optional anonymity, and human review at every critical step.

Built for real institutional workflows: hospitals, morgues, investigators, and community partners.

From report to reunion

A simple, respectful flow designed for speed, clarity, and the protection of everyone involved.

01

Submit

Create a report — missing person, sighting, hospital, or morgue. Anonymous if needed. You receive a reference code.

02

Profile

TraceLink structures details into a person profile, ready for careful matching and investigator review.

03

Match

Rules-based similarity scoring surfaces match candidates. A designated investigator confirms or rejects — always human-led.

04

Communicate

Secure, alias-based messaging enables coordination without forcing identity exposure until both parties are ready.

Built for the weight of the work

Every feature exists because someone, somewhere, needed it.

Anonymous sightings

Submit sightings with location, time, and description. Your identity stays optional. You get a reference code regardless.

Institution reporting

Hospitals and morgues report through verified accounts, with role permissions and full audit trails.

Smart matching

Similarity scoring ranks candidates — reviewed by investigators, never auto-confirmed.

Sensitive media controls

Uploads are blurred by default. Clear viewing requires permissions and (where configured) an access code.

Full audit trail

Actions like image access, status changes, and match decisions are logged with user, timestamp, and reason.

Secure messaging

Alias-based conversations by default; identity reveal only when both parties explicitly consent.

People. Not cases.

Every entry in the system is someone’s person — someone’s reason to keep searching.

All images are representational. TraceLink handles real cases with complete privacy and care.

Privacy and security visualization
Anonymous reporting supported
Sensitive images blurred by default
Access codes for unblurred viewing
Sensitive actions logged & audited
Human investigator confirms every match

Designed to reduce harm

Every design decision in TraceLink asks: what could go wrong, and how do we prevent it? From blurred images to anonymous aliases, protection is not an add-on — it’s the foundation.

Yes. You can submit a sighting without providing personal details. You'll receive a reference code to track the report. Contact information is always optional.
Images are blurred for public-facing views. Clear viewing requires appropriate permissions and, where configured, a valid access code. Every access event is logged.
Never. The system surfaces match candidates based on similarity scoring. A designated human investigator must review and confirm — no automated identity decisions are made.
Conversations use alias-based identities by default. Identity is shared only when both parties explicitly consent, and important safeguarding events can be audited.

For hospitals, morgues & investigators

Verified institutional access with role-based permissions — so the right people see only what they need to.

01 / Verified Access

Institutional accounts

Hospitals and morgues onboard with verified accounts. Role-based permissions control what staff can access, view, or modify.

02 / Case Workflow

Investigator dashboard

Review match candidates, update case status, document decisions, and communicate securely — in an auditable workflow.

03 / Governance

Full accountability

Every sensitive action generates an audit log entry. Governance oversight is built in from day one.