Start your 7-day free trial with 5 interviews includedGet started →

Identity Verification

The person you interview should be the person you hire

Proxy candidates. Deepfake videos. Someone else entirely on the other end of the camera. It happens more than you think.

This isn't hypothetical.

In 2024, the Department of Justice revealed that over 300 US companies had unknowingly hired IT workers tied to North Korea. Fortune 500 companies. Defense contractors with access to ITAR-controlled data. The workers used deepfakes, stolen identities, and US-based "laptop farms" to appear domestic.

The money funded weapons programs. The access enabled IP theft. One defense contractor lost technical data over a three-month period before anyone noticed.

And that's just the state-sponsored fraud. Criminal networks in Russia, China, and elsewhere run similar operations for profit. Individuals fake their location to collect SF salaries while living overseas. Candidates have others control their computers during technical interviews via remote desktop.

Source

US Department of Justice, May 2024. Related enforcement actions continued through 2025, including FBI raids on 21 laptop farm locations across 14 states.

U.S. Department of Justice
Office of Public Affairs
May 2024 — Press Release

Justice Department Disrupts North Korean IT Worker Fraud Schemes

Over 300 U.S. companies unknowingly hired IT workers generating revenue for North Korea's weapons programs.

Workers used stolen American identities and operated through domestic laptop farms to appear to be working from the United States.

Victims included Fortune 500 companies and defense contractors with access to sensitive technical data.

21 laptop farm locations raided across 14 states
What We're Detecting

Four fraud patterns. Different methods. Same goal.

Deepfake impersonation

Real-time face and voice manipulation. Virtual camera software injects synthetic video into the call. The person you're talking to doesn't exist. Used heavily by state actors and organized fraud rings.

Location fraud

Candidate claims San Francisco. They're actually in Mumbai, Bogotá, or Pyongyang. VPNs mask the connection. Laptop farms provide US IP addresses. You're creating compliance exposure without knowing it.

Remote assistance

The face on camera is real. But someone else is controlling their computer. Remote desktop software or a hidden second keyboard lets an expert complete the technical assessment while the candidate just talks.

Complete proxy

Different person entirely. Professional interview stand-ins exist as a service. They ace your interview. Someone else shows up on day one. By then you've already given system access and shared sensitive information.

What shows up in your report

We verify the technical reality of every interview. Not behavioral guesses. Binary facts you can act on.

Video source — Physical webcam or virtual camera software
Audio source — Physical microphone or virtual audio routing
Location — Stated location vs. actual connection origin
Remote access — Remote desktop or secondary input devices detected
VPN/proxy usage — Connection masking detected and reported
Timestamps — When each issue was first detected and how long it persisted
Identity Report
Dec 10, 2024 · 2:31 PM
3 Issues
Virtual CameraCritical
Detected 2:31 PM, active throughout
Location MismatchCritical
Stated: San Francisco, CA. Actual: Pyongyang, North Korea
VPN DetectedWarning
Connection routed through commercial VPN
No Remote Access
No remote desktop or secondary input detected

This is a compliance issue, not just a hiring issue

Hiring someone who misrepresents their location creates tax liability, employment law violations, and potential sanctions exposure. If they access sensitive data from a sanctioned country, that's your problem. We give you the information to make informed decisions before it's too late.

Stay compliant

Know who you're hiring

Verify identity throughout every interview. Make decisions with confidence.

7-day free trial with 5 interviews included