Voicing opinions. Sharing advice. Online public forums, chat rooms and news sites host lively conversations about every imaginable topic. These online communities are also a destination for impersonators, imposters and fraudsters with a wide range of goals. The objective might be financial gain, although usually many of these bad actors are first interested in building followers, influencing opinions, destroying reputations or gathering phishing targets for downstream exploitation.
Fake personas are easy to create in a world of fragmented and stolen identities. After massive data breaches in recent years, digital identity elements are easily available for sale. With an average of 8.4 social network profiles per person, individuals have their own range of—usually legitimate—personas. How do you know who is real? Or trustworthy? It helps to become aware of how abusers, scammers and fraudsters work in online communities.
Impersonation can be something as simple as creating a profile that is partly true but uses a fake phone number, email address or other identifier in order to prevent unwanted contact. Although it's understandable, it's still a form of impersonation. Impersonators on a more serious mission will copy photos, names, descriptions and hashtags from official accounts to create new accounts with names of random people.
Online impersonators and fraudsters individually—or in collaboration—use their fake profiles with the following tactics to advance their causes.
Trust as a Strategic Weapon
It's impossible to over-value trust in online interactions. When impersonators’ and fraudsters’ tactics are known, online communities can leverage trust to their advantage. It begins with trusted identities, because a trusted identity will interact authentically. Whereas non-trusted identities and fake profiles are potential threats likely to be up to no good. Organizations that can verify identities of their users—at any point along their journey, across all points and over time—can begin to identify trustworthy customers, followers and users.
With trusted identities, organizations can give their good customers and followers safe, frictionless online experiences. This is especially critical when trust is essential to building accounts and attracting new users. Word travels fast on the internet, and a once-thriving online community can become a virtual ghost town if abusive fake profiles are allowed to run rampant. Trusted identities enable organizations to keep the door to their business open while greatly reducing risk and exposure to scams, abuse and fraud.
Want to know more? Download Best Practices for Online Trust & Safety guide or learn how to automate trust decisioning with Pipl Trust, here.