Is someone checking your browsing?
This website will appear in your browser history. If you're concerned someone may be monitoring your internet use, consider using a trusted friend's device, a library computer, or your browser's private/incognito mode. You can press Quick Exit or hit Escape at any time to leave this site quickly.
Learn more about staying safe online
The person you're talking to may not be who they say they are
They might be using someone else's photos, lying about their age, inventing a life story, or pretending to be someone they're not. Online, identity is easy to fake — and some people build entire false personas to exploit others.
What You Might Notice
They won't video call or always have an excuse
If someone avoids showing their face live, they may not look like their photos.
Their story has inconsistencies
Details about their life, job, location, or past don't add up or change over time.
A reverse image search shows their photos belong to someone else
This is a strong indicator of catfishing or scam activity.
They claim to be younger/older than they appear
Especially concerning when an adult claims to be a teenager to contact minors.
What You Can Do
Do a reverse image search
Right-click their profile photo and search Google Images, or use TinEye. If the photo appears elsewhere with a different name, it's likely stolen.
Video call before meeting in person
A genuine person will be happy to video call. Persistent refusal is a red flag.
Talk to children about online identity deception
Help young people understand that the person they're talking to online may not be who they claim.
Frame this as 'people online can pretend to be anyone' rather than creating fear.
Important: This resource provides general information, not personal advice. Every situation is different. The actions suggested here may not be safe in your specific circumstances — particularly if the person causing harm could notice changes to your devices or accounts. Always consider your physical safety first.
If you need personalised support, contact 1800RESPECT (1800 737 732) or your local specialist domestic violence service. If you are in immediate danger, call 000.
Misrepresenting age, identity, appearance, occupation, or circumstances to build trust. Includes catfishing, using stolen photos, creating false personas, and age misrepresentation by adults targeting minors or by scammers targeting adults. The deception is the foundation on which the exploitative relationship is built.
Mitigations for this technique are under development. If you have suggestions on how to improve this content, please submit a pattern.
Detection Indicators
ID
Detection Indicator
SAFE-D-0001
Anomalous Battery Consumption Device battery depletes faster than baseline due to continuous background data transmission.
SAFE-D-0002
Unexplained Data Usage Increased mobile data consumption without corresponding user activity. Monitor per-app data usage for unknown processes.
SAFE-D-0003
Device Temperature Anomalies Device runs hot during idle periods indicating background process activity.
SAFE-D-0004
Information Leakage Indicators Adversary demonstrates knowledge of private communications, locations, or activities accessible only through device monitoring.
SAFE-D-0005
Unknown Applications or Profiles Presence of unrecognised apps, device administrator privileges, or configuration profiles.
The TFA Matrix is a research framework under active development. Technique classifications, detection methods, and mitigations reflect current understanding and are subject to revision. This framework does not constitute forensic methodology, legal evidence standards, or clinical diagnostic criteria. Practitioners should apply professional judgement appropriate to their discipline and jurisdiction.