Yes, it's true, dating sites attract scammers like donuts attract cops! But we at CyberDating are working really hard to banish the dating scams and fake profiles. Through both manual and automatic detection methods, we actively scan each new profile and if it seems fishy, we ban it and post it here.
Since no dating blacklist system is perfect, we do miss some of the fake profiles that are posted. That is why we have made public our database of fake profiles and scammers. Scammers are usually lazy and when they need to post a profile to gain access to an online dating site, they'll just copy and paste an ad from another dating Website.
If you see a questionable profile on CyberDating, you can search our database to see if someone else has used the same text or photo in a previous dating scam.
On our CyberDating websites we are constantly on the lookout for fake profiles and the methods we use are both manually done and with automatic software. Mostly we use common sense methods that you can use yourself when you look at a profile.
We use custom software, continually enhanced through years of identifying fake profiles, that is able to identify many of the obvious things that are wrong with bogus profiles. The software does things like searching for words and phrases often used by scammers. It looks for the IP addresses and email addresses of known scammers and it looks for fields that are filled in with silly or repeated information. Once the software finishes with the profile. It may be flagged as suspect and then all of the profiles are sent to a human operator for the next steps in the process.
Every profile is summarized on a screen where a human operator looks it over. If the software used in the first step found any issues, the suspicious information is highlighted in red for the operator to review. The operator may also compare the profile with our database of fake profiles looking for similar ones. Often by simply reading a sentence or two of the profile a human can get a feeling that a profile is not real. A really obvious giveaway is when a new member says he is into reading Shakespeare and he or she misspells Shakespeare.
The last two steps are typically performed by the operator to finalize the process.
If the software hasn't already identified the IP Address of the new profile as one that is often trouble, the operator may perform additional look ups. Using online tools we can determine if the person posted the profile using a computer located in a part of the world other than where the person claims to reside. We can also see if the person used a proxy service to hide his/her location. These are always suspect profiles.
Usually the last thing we do is to check for duplicates of either the profile text or the photo on other websites. We may use search engines like Google to do this or other Anti-Scam websites. Of course we use our own database of profiles extensively for this purpose.
If you would like some background information about online scammers work, read our article: How an Internet dating scam works. We also have information specific to the Nigerian scam here: Identifying and Avoiding the Nigerian (African) Internet Scam.