Background checks are used to verify that a person is who they claim to be. They can help ensure that someone in your network isn't an infiltrator, informant, or otherwise lying about their identity for malicious reasons.
Performing a background check on someone may involve:
- Contacting or meeting their friends or family to ask questions about them.
- Visiting their home or place of employment.
- Reviewing their identity or administrative documents (employment or rental history, criminal record, etc.)
We recommend two different approaches to background checks:
- The consensual, mutual approach: If you already trust someone to some degree but would like to trust them more, you can do a mutual background check, where each of you checks the other.
- The non-consensual approach: If you already have strong suspicions that someone is lying about their identity, you can do a background check on them without their consent to confirm your suspicions.
See also:
- Confidence, Courage, Connection, Trust on the use of ID checks to verify that someone is who they say they are.
- Handbook for Exposing an Undercover Cop on a method for identifying, investigating and exposing undercover cops, including through using background checks.
Techniques addressed by this mitigation
Name | Description |
---|---|
Infiltrators | You can perform background checks to help ensure that someone in your network is not an infiltrator. |
Informants | You can perform background checks to help ensure that someone in your network is not an informant. |