Subscribe to our mailing list


Be a Hero / Submit a Tip

Your Tips, Information and Reports Are Welcome Here

As you see, our work is primarily composed of providing news and information to consumers about the field of debt relief.

Frankly, we’d love to say we find the majority of the stories that finally appear on the site but the truth is the best stories are often sent in by anonymous tipsters inside the debt relief industry and by consumers that have received mailers or information from a debt relief company.

If You Are a Consumer and Want to Submit a Tip

Please share information you’ve received from a debt relief company if it raises concerns for you. Many of the paranoid security tips below may not apply if the company has already sent the information to you. Any information you share will be scrubbed to attempt to remove all information that might publicly identify you, like name, address, account number, etc.

How to Leak Information From Inside to Help Protect Consumers

I might be brave to publish some of the things I do but information often starts from a an even braver tipster inside the debt relief industry.

While the safest way to get me information would be to arrange a secret drop at midnight under the third tree from the right, we don’t live in a spy movie world.

Sharing information electronically is an inherently risky proposition. But here are some ways to reduce the risk.

  • Don’t use your work computer to communicate with me.
  • Don’t e-mail documents you want to leak to your private account from your work computer. Print them out or take a picture of the document displayed on your computer screen with your personal phone. Then send me the picture from a Wi-Fi network not at work or at home. Stop by a coffee shop and use their free Wi-Fi.
  • Documents you find lying around at the printer or fax machine are far easier to leak anonymously than digital ones.
  • Make sure the document you want to release has been shared widely enough so that the digital trail linking you to it won’t incriminate you.
  • If you must communicate with me electronically, use a throwaway e-mail account, preferably on a computer you don’t own and especially not from a work computer. Don’t use your real name and details to register the account, and use an open Wi-Fi connection at a cafe to send your communication.
  • Don’t tell anyone — except your priest, rabbi or imam — that you’re the source.
  • Don’t read or talk about the leaked story at work — UNLESS someone sends it to you.
  • If you have a salacious memo in PDF form, don’t email it to me. Print it out (but be careful—the printing can be logged) and take it to a FedEx Kinko’s. Scan it in and email the scan from a public computer terminal. Be sure to pay for the scan and the computer time in cash.
  • Alternatively, screenshots are a good way to capture something on the screen, like documentation or PDFs, rather than email the digital original.
  • Use Tor. Tor is a software bundle that makes it impossible for your computer’s IP address to be tracked back to you. The only downside is that it slows down your internet connection considerably. Everything has a trade off.
  • Upload Anonymously – If you want to upload files to us anonymously click this link.

This Site is Better When You Participate

If you have information you feel you want to share with us please use the methods below.

There are some easy ways to get information to me.

  1. If you feel you have been scammed and would like to report it, please complete this form.
  2. If you want to reach Steve, you can use this form.
  3. Upload – If you have scanned documents or files you want to share then you can upload them when you submit the form below.
  4. Upload Anonymously – If you want to upload files to us anonymously click this link.
  5. If you have advertising or marketing information you’d like to get paid for submitting, take a look at the I Buy Junk Mail program.

Your Identity is Protected Under the North Carolina Shield Law

As a journalist in North Carolina, my sources receive the following protection under the Shield Law, which says:

§ 8‑53.11. Persons, companies, or other entities engaged in gathering or dissemination of news.

(a) Definitions. – The following definitions apply in this section:

(1) Journalist. – Any person, company, or entity, or the employees, independent contractors, or agents of that person, company, or entity, engaged in the business of gathering, compiling, writing, editing, photographing, recording, or processing information for dissemination via any news medium.

(2) Legal proceeding. – Any grand jury proceeding or grand jury investigation; any criminal prosecution, civil suit, or related proceeding in any court; and any judicial or quasi‑judicial proceeding before any administrative, legislative, or regulatory board, agency, or tribunal.

(3) News medium. – Any entity regularly engaged in the business of publication or distribution of news via print, broadcast, or other electronic means accessible to the general public.

(b) A journalist has a qualified privilege against disclosure in any legal proceeding of any confidential or nonconfidential information, document, or item obtained or prepared while acting as a journalist.

(c) In order to overcome the qualified privilege provided by subsection (b) of this section, any person seeking to compel a journalist to testify or produce information must establish by the greater weight of the evidence that the testimony or production sought:

(1) Is relevant and material to the proper administration of the legal proceeding for which the testimony or production is sought;

(2) Cannot be obtained from alternate sources; and

(3) Is essential to the maintenance of a claim or defense of the person on whose behalf the testimony or production is sought.

Any order to compel any testimony or production as to which the qualified privilege has been asserted shall be issued only after notice to the journalist and a hearing and shall include clear and specific findings as to the showing made by the person seeking the testimony or production.

(d) Notwithstanding subsections (b) and (c) of this section, a journalist has no privilege against disclosure of any information, document, or item obtained as the result of the journalist’s eyewitness observations of criminal or tortious conduct, including any physical evidence or visual or audio recording of the observed conduct. (1999‑267, s. 1.)

For more information on the North Carolina Shield Law and what protection it may afford you as a source, click here and here.