Fake Profiles & Online Impersonation

When watching my local news the other evening, I heard of a case that really surprised me. A Town Commissioner of a small town in North Carolina, disagreed with his fellow board members over a specific topic. So much so, that he decided to create a fake Facebook profile and use it to harrass and argue with residents. Later, he admitted using a Charlotte area businessman’s real name & real profile picture. The surprising part of this is that we expect this from scammers, but not someone who would be sitting on a board of a city or town. It seems that these days, anything is possible. Being proactive is a must.

Online Impersonation Tricks

  1. Facebook Marketplace: Fake ads on the site have become a real problem. Some of the ads look like they are from legitimate businesses such as Home Depot, Lowes, etc.. They make the post look very real, using lots of pictures. The Better Business Bureau says the fake ads are common and they get thousands of complaints each year. “Impersonation is one of the key factors of what scammers love to do,” Sarah Wetzel of the BBB said. “They love to impersonate those well-known companies because that way they already have a foot in the door with the consumers.”
Source: Digital Information World

2. Rental Scams: Scammers ( who operate anywhere in the world ) can advertise a fake rental online. Next, they add a sense of urgency to attempt to get a deposit on the property. They will use excuses as to why they can not meet you in person. They also make sure to tell you that several people are looking at the property. Nationally, over 230 rental scams have been reported this year, up from the same time last year. Victims report losing an average of $550.

Better Business Bureau offers these tips:

  • Do an online search for the landlord’s email and phone number. If the same ad is listed in other cities, that’s a red flag.
  • If you can’t see the property in person, try to find someone you trust to go and confirm the unit is what’s being advertised online.
  • Don’t fall for deals that are too good to be true. If a unit is well below market rate or promising extra amenities than normal, it could be a red flag.
  • Be wary of required payments through cash transfer apps. Peer to peer apps are meant to be used with people you know.

Use the Better Business Bureau’s scam tracker as a tool to both report and prevent scam.

3. Catfishing: When someone creates a fake identity online for the purpose of starting a relationship. They then use this as a way to gain interest and confidence so they can scam the person out of money. Social Catfish is a software company that works to help people who believe they have been the victim of catfishing. It is one of the many software platforms we use at eChatter when conducting online research. They also have a great reverse image tool within the platform.

Impersonation of a Business

This is sometimes called Domain Spoofing. When done correctly, it can damage a business’ reputation while scamming consumers who fall for their pitch. All while impersonating the business. Two of the most common ways is cybersquatting and typosquatting.

  • Cybersquatting: Scammers use already established business websites and copy them to look just like the real website. They then sell counterfeit products.
  • Typosquatting: Scammers register a domain name similar to that of the legitimate business. They purposely use typo errors to change it but at first glance, people take it as the legitimate company’s website. This is sometimes used to redirect someone to a competitor’s website or try to collect ad revenue.

This just scratches the surface of the many ways scammers use the web and social media. It is a subject we will continue to write about in the future, so check back often for updates.

Adults Contacting Minors Online

Adults contacting minors online for the purpose of sextortion or meeting up for sex continues to be a big problem. Federal investigators believe there are more than 500,000 online predators active each day and they all have multiple online profiles. The ACM’s (Adults Contacting Minors) attempt to groom their minor victims, one step at a time.  They start by making a connection. Next, they spark conversation, and then try to lure them in by sending a provocative photo of themselves. For most, the end goal is to meet for sex. In some cases, they are satisfied by either video chats or even exchanging of photos. More than 50% of victims are ages 12 to 15 and 89% of victims are contacted by a predator through a chatroom and instant messaging.

Most ACM’s have a level of confidence in this because currently it Is underreported. There is a sense that the ACM is “anonymous” online with no way to find out who he really is. This makes it almost impossible to catch them. With the help of great organizations like SOSA (Safe From Online Sex Abuse), whose goal it is to raise awareness and combat abuse, they are making some headway.

Recently the organization created a documentary on this subject that every parent should watch. It is called Undercover/Underage.  Roo Powell is on a mission to expose the dangers of and prevent online child sex abuse. She works together with her nonprofit group, SOSA to set up aliases to engage with child predators.  She works with law enforcement and professionals in the field. Over the course of the documentary, Roo transforms herself into several 15–16-year-old personas. It is no easy undertaking to make 30-year old’s look (Roo) and act like a 15-year-old minor. However, she pulls it off. She has done her research and understands the behavior, likes/dislikes of an average teen.

Alias Creation (aka Sock Puppets)

  1. Setting up and creating a fake profile requires a lot of upfront work. Because this may lead to a video meeting or even an in-person meeting, everything must jive. Using the same username is critical across all platforms.
  2. Creating a community of “friends” to make the profile look believable.
  3. Photos – hiring a professional photographer who specializes in photo editing. The photographer in the documentary works in the fashion industry and is great at identifying and removing any age regressing features. The goal is to make her look like a teenager.
  4. The use of hashtags is very important. Teens will use hashtags – #freshman, #15yearsold, #mixedgirl, #daddyissue, etc. The more the better to get the right kind of attention online.

OSINT Work

One thing that I found to be interesting as I watched the documentary, is how the team used OSINT techniques every step of the way. They used the “Leave no stone unturned” strategy to try to ID the guy. In one episode, the ACM loved to talk about himself. He talked about his work history, his hobbies, the fact that he has 4 kids, etc. The team is shown searching all of it to connect the dots and find out information about this guy online. He’s a pro however- he knows what he is doing and is careful. Just one small little crumb could be enough to point them in the right direction. The average person has no idea how much information is housed on the web. It could be an old press release that has been forgotten about that names him. Or it could be an obituary of a deceased relative that includes the name of the ACM. Anything is possible and that is why it is important to take the time needed to search.

The group also uses Honey Pot computing to lure in the ACM. A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. In this case it is being use as a lure to try to identify the ACM’s IP address. For this case, it is being populated with the teen girl persona’s photos, poetry, etc. On the backend of the site there is an activity log. This lists out the visitors of the site. From that IP address, one may be able to identify the location of the ACM, if they do not use a VPN of course.

Keeping Up With the Apps

It makes sense that teens are more inclined to use apps. Apps allow users to share photos and videos with their friends through their mobile device. The documentary mentions a few sites/apps you may not have heard of before.

  • boardgamegeek.com :This site’s database has more than fifty thousand board games along with their developers and players. The games themselves are linked to users through lists called GeekLists, along with owned/played/wanted etc. connections, ratings, reviews, session reports, and so on. It has a forum which has some search capabilities. Good to keep in mind if your subject is a gamer. Search by location and then by name.
  • Online chat groups, Message apps, Gaming apps, make it easy for a predator to make a connection with a minor online. Interactions can easily escalate to “sextortion”, in which minors are coerced into sending explicit imagery of themselves. According to a New York Times recent article titled, “How to Protect Your Children From Online Predators”, the following are the ones to watch closely

In summary, the team uses outstanding critical thinking skills along with online research to try to identify the ACM’s. Some fall through the cracks, but in some cases, she does provide enough evidence to law enforcement to “take it from there”. It is not an easy task, and it really takes a thick skin and a strong stomach. Some scenes show Roo emotionally drained from the experience of playing out conversations with child predators. But in the end, it is her deep desire to help the kids. If she can get one or two arrested, she has done what she set out to do.