Collection Advisor Magazine
Login RSS
A+ A A-

Breaking News

Hunstein Decision Not Final for All Other Circuit Courts Pending Possible R…

Steel Rose

The 11th Circuit Court of Appeals is withholding issuance of the mandate in Hunstein v. Preferred Collection and Management Services, of June 14, 2021. Therefore the Hunstein Decision is not final in all other circuit courts pending all 12 of the 11th circuit judges determining if they will rehear the case...


The Bottom Line

Product Spotlight

CSS Product Spotlight

Henry Gardner

CSS, Inc., a leading provider of enterprise class accounts receivable management and financial software offers a broad portfolio of platforms & solutions. CSS enables companies to transition their legacy revenue & payment management systems to a modern, cognitive, centralized, cloud-based Financial Ecosystem®. CSS may be utilized to provide business financial...


Skip Tracing Advisor

Developing a Network of Closed Sources by Ron Brown, Skip Tr…

Ron Brown

As we begin this article it is very important that the professional tracer clearly understand what constitutes a “CLOSED SOURCE”, the value of a closed source network and the obligation due to each closed source. Definition: CLOSED SOURCE… sources of information with restricted access and information available only through mutual information...


Collection Software Roundtables

Shielding Collectors From TCPA and FDCPA Violations

Joshua Fluegel

The demands of regulators lead collection professionals to collect debt with the credo of “as little contact with the consumer as possible.” Every eliminated encounter with a consumer while the payment is still being collected is one less chance for a TCPA or FDCPA violation. For this reason many accounts...


Feature Stories

Hunstein on Rehearing – Revisiting Article III Standing in t…

Eve Cann and Jonathan Green

On April 21, 2021, the Eleventh Circuit Court of Appeals issued its decision in Richard Hunstein v. Preferred Collection and Management Services, Inc., and potentially created a new claim under the Fair Debt Collection Practices Act (FDCPA) – ruling that a debt collector's sharing of information with a vendor is a violation...


Collection Agency Advisor

The Secret to Excelling in Profit AND Performance

Gordon C. Beck III

To each their own. That’s what I keep telling myself when discussing with my competitors what their strategy is to run and operate a successful collection agency. Everyone’s outlook is different, but the same. Sure, everyone wants to be a top agency, that’s what everyone is supposed to say. But...


Legal Collection Advisor

Executive Orders Impacting Collections

Michael Starzec

No, this is not a review of the 1996 thriller starring Kurt Russell, Halle Berry and Steven Seagal but it does focus on the prestige of the word “Executive.”   At hotels and sports arenas, you want the executive suite. In Illinois, at least a 1,000 corporations integrate “executive” into their...


Collection Industry Advisor

3 Options to Offer During Tax Season

Nick Jarman

When it comes to collecting debt, tax season is without argument the most profitable season of the year. Tax season starts at the beginning of February and wraps up in early May. February generally sees the highest return and slightly tapers off each month thereafter. One issue that can ease...


Compliance Advisor

PCI Compliance, SOC, and HITRUST

Debra J. Ciskey

With the June, 2019, disclosure of a data breach at AMCA looming large in the rearview mirror, debt collectors both large and small are scrambling to verify the security of their consumer portals and their consumer information in general. With numerous vendors and auditors serving the industry in this key...


Developing a Network of Closed Sources by Ron Brown, Skip Tracing Advisor

  • Written by Ron Brown

As we begin this article it is very important that the professional tracer clearly understand what constitutes a “CLOSED SOURCE”, the value of a closed source network and the obligation due to each closed source.

Definition: CLOSED SOURCE… sources of information with restricted access and information available only through mutual information sharing agreements.

To clarify the definition as it applies to the tracing industry… a source of information available to the tracer and not to the general public built on mutual trust and confidence. 

The WHY and the HOW.

THE WHY: Every tracer must have a closed source network, that is a person or place that will provide information to the tracer and to no one else. Developing and expanding their closed source network is a fundamental requirement if the tracer is to be successful. These closed sources must have an absolute and complete trust in the tracer and know for certain that the information they provide will be used in a legal manner and the tracer will never disclose the source of the information. In many cases the exchange of information may flow in both directions, there may be in some cases some other type of renumeration to the source for providing the requested information.

THE HOW: I would first suggest that tracer decide how to protect the network “in transit” and it is my opinion that the best way to preserve the closed source network contact information be through the utilization of a dedicated thumb drive. This method provides a mobile source, easy to transport, available from any computer and password protected.

The data on the thumb drive list should contain the following information on each individual source:

NAME: I would suggest the tracer NEVER put the sources real name down but rather use a code name or number, for example, 19-101 or EMPNFO -19. The significance of the 19 would be the year indicator enabling the tracer to know at a glance how current the source might be. The EMPNFO would indicate the source had employment information.

CONTACT INFORMATION: If the tracer is using a telephone number to contact the source, I suggest the number be coded. I vary between CANDYSTORE where C = 0, A = 1 N = 2 and so on until E = 9 or a crisscross variation of the phone key pad where 1 = 9 and 9 = 1, 3 = 7 and 7 = 3, 4 = 6 and 6 = 4, 2 = 8 and 8 = 2 and finally 5 = 0 and 0 = 5. By using this coded system if someone would gain access to your contact list, they would not be able to readily access your information. 

RECORD OF PAYMENT: If there is any type of payment for the information, which by the way is a business tax deduction, I suggest a record showing the date, amount, and method of payment. I caution the tracer to never pay for information in violation of any municipal, state, or federal law and never ask the source to violate any law.

How it works.

I am trying to locate the residence and employment of John Smith… I cyber track to check chattel mortgage records (usually filed with the Secretary of State) in the state where I suspect John Smith resides and locate the lien filing on his vehicle, a 2019 Ford F150 truck… the lien filing provides the Vehicle Identification Number of the vehicle (F150XXXYYYZZZ). I now move from cyber tracking mode to skip tracing mode and contact my closed source of information, the Finance and Insurance Manager at the local Ford dealership. I provide him the VIN to the vehicle and he runs it through his international database which, since the vehicle is under warranty, will indicate the last time the vehicle was serviced, where it was serviced, the address provided the dealership and the day time contact number (usually the employment number). Now I move back to the cyber tracker mode and run the daytime phone number which will provide the consumer’s employment address, I run motor vehicle records to obtain the tag number of the vehicle which I place in an LPR system and finally check out the residence address provided to the dealership by using google earth to determine the consumers life style..

By using a combination of cyber tracking and skip tracing through a closed source of information, I have current location information on my missing consumer.

I once had a tracer tell me they had no closed sources, no one they could go to get information. I asked if they had brothers or sisters… the reply was, “yes” and I sked where they were employed. The brother was a deputy sheriff and his wife worked for the city utility department, the sister worked at the local library and her husband was employed in the service department at a local truck dealership. What a closed source network was at her fingertips. 

Closed Source Network, another tool in the professional tracers’ tool bag.

Good Luck and Good Hunting.

Ron Brown is a member of the National Association of Fraud Investigators and the author of “MANHUNT: The Book.” Contact him at This email address is being protected from spambots. You need JavaScript enabled to view it..