Yes, it's true, dating sites attract scammers like donuts attract cops! But we at CyberDating are working really hard to banish the dating scams and fake profiles. Through both manual and automatic detection methods, we actively scan each new profile and if it seems fishy, we ban it and post it here.
Since no dating blacklist system is perfect, we do miss some of the fake profiles that are posted. That is why we have made public our database of fake profiles and scammers. Scammers are usually lazy and when they need to post a profile to gain access to an online dating site, they'll just copy and paste an ad from another dating Website.
If you see a questionable profile on CyberDating, you can search our database to see if someone else has used the same text or photo in a previous dating scam.
On the CyberDating Network Websites we are constantly on the lookout for fake profiles. The methods we use to detect fakes are both manually done and using automated software tools. Mostly, we use common sense methods that you can use yourself to spot suspect profiles.
We use custom software, continually enhanced through years of identifying fake profiles, that is able to identify many of the obvious indicators that someone has entered a bogus online profile. The software first scans for issues, identifying any words and phrases often used by scammers. It next looks up the IP addresses and email addresse in a list of known scammers. Lastly, it looks for fields that are filled in with silly or repeated information. Once the software finishes with the profile, it assigns a rating to the profile. Those profiles flagged as possible fakes are then sent to a human operator for the next steps in the process.
Every profile is summarized on a screen where a human operator checks it over. If the software used in the first step found any issues, the suspicious information is highlighted in red for the operator to review. The operator may also compare the profile with our database of fake profiles looking for similar ones. Often by simply reading a sentence or two of the profile a human can get a feeling that a profile is not real. A really obvious giveaway is when a new member says he is into reading Shakespeare and he or she misspells Shakespeare.
The last two steps are typically performed by the operator to finalize the process.
If the software hasn't already identified the IP Address of the new profile as one that is often trouble, the operator may perform additional look-ups. Using online tools we can determine if the person posted the profile using a computer located in a part of the world other than where the person claims to reside. We can also see if the person used a proxy service to hide his/her location. These are always suspect profiles and require a closer look.
Usually the last thing we do is to check for duplicates of either the profile text or the photo on other websites. We may use search engines like Google to do this or other Anti-Scam websites. Of course we use our own database of profiles extensively for this purpose.
If you would like some background information about online scammers work, read our article: How an Internet dating scam works. We also have information specific to the Nigerian scam here: Identifying and Avoiding the Nigerian (African) Internet Scam.