Before trusting someone online — whether a new business contact, a person met through a dating platform, or a freelancer offering services — it is possible to assess whether their claimed identity holds up to scrutiny using publicly available information. This process does not require specialist tools or paid services. It requires a methodical approach, an understanding of what genuine online presence looks like, and awareness of the signals that indicate fabrication.
What This Issue Is
Meeting people online has become a routine part of professional and personal life. Job candidates are interviewed remotely. Business partnerships are initiated through social media. Romantic connections form through apps before any in-person meeting takes place. In each of these contexts, one party — or both — is placing some degree of trust in an identity that has not been verified face to face.
Identity fabrication online ranges from minor misrepresentation to elaborate deception. At the most serious end, fraudsters construct entirely false personas — complete with manufactured work histories, stolen photographs, and scripted life stories — for the purpose of extracting money, personal information, or professional access from their targets. These operations are commonly referred to as catfishing when they occur in personal contexts, and as impersonation fraud when deployed professionally.
The difficulty is that a convincing false identity is not substantially harder to build than a genuine one. Social platforms make it easy to create an account, populate it with content, and accumulate connections. Without deliberate verification, it is straightforward to be deceived.
Why This Happens
Several factors make online identity deception both common and difficult to detect instinctively. The conventions of online communication work in a deceiver’s favour: people do not typically demand proof of identity from a LinkedIn connection or a dating match in the way they might from a new employee. The medium normalises a level of distance and abstraction.
Fraudsters also exploit the social pressure to appear reasonable. Asking someone to verify their identity can feel disproportionate or paranoid — particularly early in a relationship or professional exchange. This hesitancy is something that experienced fraudsters deliberately cultivate, often by building rapport before making any request that might trigger suspicion.
The growth of AI-generated imagery has also changed the landscape. It is now possible to create a photorealistic profile picture that has never belonged to a real person, which means that reverse image searches — while still useful — no longer provide the definitive assurance they once did. Verification therefore requires a layered approach rather than reliance on any single check.
Contexts Where Verification Is Particularly Important
Online Dating
Romance fraud is among the most financially damaging forms of online deception. Personas are often maintained for weeks or months before any financial request is made.
Freelance & Remote Work
Fake candidates, credential fraud, and impersonation of real professionals are well-documented in hiring processes that take place entirely online.
Business Partnerships
New suppliers, investors, or collaborators contacted via social media or email may not be who they appear. Company impersonation is a documented fraud vector.
Buying & Selling
Marketplace platforms and peer-to-peer transactions carry risk when the other party’s identity cannot be confirmed independently of the platform profile.
Warning Signs That an Identity May Be Fabricated
- The profile was created recently, particularly if contact was initiated shortly after account creation
- Profile photographs are few, unusually polished, or show the same person in a limited range of settings — studio-style shots with no candid images are a common signal
- The account has a high number of connections or followers but low engagement — likes, comments, and interactions appear sparse relative to the follower count
- Claimed professional credentials do not appear in verifiable public records such as company registries, professional body directories, or published work
- The person communicates exclusively through one platform and declines to move to a video call, citing technical problems, time zones, or work restrictions
- Their stated location conflicts with small details in their messages — time references, local knowledge, cultural references, or unusual phrasing patterns
- The story they present contains inconsistencies across different conversations, or elements that evolve when questioned directly
- They accelerate emotional intimacy or professional trust at an unusual pace
- Requests for personal information, financial assistance, or introduction to third parties emerge before the relationship has developed naturally
How to Check or Verify a Person's Identity Online
The following steps work in sequence. Each adds a layer of confidence. The process should stop when a satisfactory level of assurance is established, or when a clear indication of deception is found.
1. Search the name directly with and without qualifiers.
Begin with a simple search engine query using the person’s full name.
Add qualifiers such as their stated employer, city, or professional title.
People in established professional roles usually appear in company directories,
published articles, conference listings, professional body registers, or news archives.
A complete absence of results for someone claiming an established career is itself informative.
Cross-reference against Companies House (for UK directors), LinkedIn,
and relevant sector registries.
2. Run a reverse image search on the profile photograph.
Save the profile photo and upload it to Google Images, Bing Visual Search, or TinEye.
A genuine photograph typically appears in one or a small number of consistent contexts.
A stolen image often appears on unrelated profiles, stock image libraries,
or under different names.
If no results appear at all for a very polished image,
consider whether it may be AI-generated.
3. Assess indicators of AI-generated images.
AI-generated profile pictures often show subtle anomalies:
unusual facial symmetry, blurred ears or hair edges,
unnatural skin texture at high resolution,
poorly resolved backgrounds,
or jewellery and glasses that lack structural coherence.
Save and zoom in on the image rather than judging from a thumbnail.
4. Check username reuse across platforms.
Many people reuse the same username across services.
Search the username directly in a search engine.
For common names, use platform-specific site searches.
A username that exists only on the contact platform
and nowhere else may indicate a purpose-built account.
5. Verify claimed professional credentials independently.
Do not rely on credentials as presented on a profile.
UK solicitors, doctors, financial advisers, and other licensed professionals
must appear on their respective public regulatory registers.
These registers are free and searchable.
Any professional claim that cannot be independently confirmed
should not be accepted on trust.
6. Assess account history and content consistency.
Review when the account was created and how content is distributed over time.
Genuine accounts usually show varied activity across an extended period.
Deceptive accounts often show compressed timelines,
bulk-uploaded content, or interactions that feel staged rather than organic.
7. Request a live video call and assess the response.
A genuine person will usually agree to a video call without unusual resistance.
Persistent refusal, repeated technical excuses,
or insistence on text-only or voice-only contact
is a strong indicator of deception.
During a call, compare appearance, manner of speech,
and background environment with existing material.
8. Cross-reference details across conversations.
Note any inconsistencies in facts, timelines, locations, or explanations.
Sustained deception is difficult to maintain across long exchanges.
Patterns of inconsistency are more meaningful than any single anomaly.
What to Do If You Suspect Deception
If verification checks raise serious doubt about a person’s identity, the appropriate response depends on the context and how far the relationship has developed.
- Do not confront directly. Alerting a fraudster that they have been identified can prompt escalation, particularly if any personal information has already been shared. Cease contact without explanation if necessary.
- Do not send money or personal documents under any circumstances until identity has been independently confirmed to a satisfactory standard.
- Report to the platform. Most major platforms have a mechanism to report fake or suspicious accounts. Doing so helps protect others who may be contacted by the same profile.
- Report to Action Fraud if the deception involved, or was likely to involve, financial loss. In the UK, Action Fraud is the national reporting centre for fraud and cybercrime.
- Preserve records. Before blocking or ending contact, save screenshots of conversations, profile details, and any documents or images shared. These may be useful if a formal complaint is later necessary.
Prevention Tips
- Make identity verification a standard step in any new online relationship — professional or personal — rather than something reserved for obvious suspicion
- Establish a personal rule that no financial transaction or sharing of sensitive documents takes place before a verified video call has occurred
- Search your own name and photographs periodically to check whether your identity is being used without your knowledge
- Be cautious of relationships that develop very quickly online, particularly those accompanied by strong emotional appeals or urgency
- Use platform features such as profile badges, verification ticks, and account age indicators as one signal among many — not as definitive proof of authenticity
- Brief others in your household or organisation about the verification process, particularly those who may be less familiar with fraud tactics
Related Internal Reading
- Investigating an unknown phone number using OSINT — when a number surfaces during identity research, this guide covers how to trace it further
- Recognising the signs of a romance scam — the tactics that fraudsters use in personal contexts once a fake identity is established
- Social engineering red flags in online communication — understanding the manipulation techniques used alongside false identities
- Removing your personal information from data broker sites — limiting what is publicly findable about your own identity
Trusted External References
- Action Fraud — Romance Fraud — the UK’s national fraud reporting centre, including guidance on identity deception in personal relationships and how to report it.
- Financial Conduct Authority — Financial Services Register — the UK’s public register for checking whether an individual or firm is authorised to provide financial services.
- National Cyber Security Centre — Social Engineering Guidance — government guidance on how identity deception and manipulation are used in cyberattacks and fraud.
Summary
- Verifying an online identity before engaging requires a layered approach — no single check is definitive, but multiple consistent signals build a reliable picture
- Reverse image search, credential verification through public registers, and a live video call are among the most effective and accessible tools available
- AI-generated profile photographs are increasingly common and require visual inspection rather than reliance on reverse image search alone
- Absence of verifiable presence — no professional record, no account history, no external references — is as informative as finding a direct contradiction
- In the UK, suspected fraud should be reported to Action Fraud; suspicious financial contacts should be cross-checked against the FCA register before any engagement proceeds