Home

The Person With the Badge May Not Be Who They Claim to Be

$400MLost to home improvement and contractor fraud annually (FBI)
Updated February 2026

Someone knocks on your door in a branded uniform, holding a tablet. They say they're from your internet provider and need to inspect your connection equipment. The uniform looks authentic. Their vehicle has the right logo. But company uniforms are sold on eBay, magnetic door signs are made to order, and fake service calls are one of the oldest confidence tricks in the book — now supercharged with professional-looking materials that are trivially easy to produce.

Why Contractor Impersonation Is Surprisingly Common

Contractor and utility impersonation fraud spans a wide range of criminal activity: from simple theft during a fake service call to orchestrated burglaries enabled by advance reconnaissance under a false pretext. Criminals posing as utility workers, internet technicians, or home service professionals gain entry to properties, assess valuables, scope security systems, and either steal directly or return later with better preparation.

The Badge Problem: Credentials Are Easy to Fake

Professional-looking ID badges, uniforms, and even realistic vehicles can be assembled for a few hundred dollars. Most homeowners have no way to verify that the badge they're shown corresponds to a real employee of the company the person claims to represent. Calling the company's main line to verify is possible but slow, and the caller is often routed through a call center that cannot confirm field personnel deployment in real time.

Utility Impersonation Surges During Outages and Emergencies

The FBI consistently reports spikes in utility impersonation fraud following natural disasters, widespread outages, and infrastructure incidents. When communities are expecting repair crews and service personnel, the environment is perfect for criminals to present as legitimate responders. Victims who would normally be skeptical lower their guard because the visit is expected and contextually appropriate.

How Real Authenticator Protects You

How Service Companies Can Use Real Authenticator for Field Staff

Companies can establish Real Authenticator connections between their verified customer accounts and their field service technicians. Before a technician arrives, the company notifies the customer. When the technician knocks, the customer can request the current code. The technician, with the Real Authenticator connection on their work device, provides it in seconds. A fake technician cannot — regardless of how legitimate they look.

Personal Safety Protocol: What to Do Right Now

Before any implementation exists: always call the company directly (using the number from your bill, not the one the visitor gives you) to verify a scheduled visit before opening the door. Ask for the technician's employee ID and company ID number, and cross-reference via the company's main line. Real Authenticator provides a scalable, instantaneous version of this verification that doesn't require 10 minutes on hold.

Who this protects

Homeowners & renters

Key benefit

Confirms service personnel identity

Frequently Asked Questions

How can I verify a utility worker or contractor is legitimate?

Call the company at the number on your bill (not a number provided by the visitor), ask to verify that a crew member with the visitor's described appearance is scheduled at your address at this time. Never grant access before verbal confirmation from the company.

Is it rude to ask for verification from a service worker?

Not at all — legitimate service personnel expect to verify their identity and will not be offended by the request. Any hostile reaction to a request for identity verification is itself a red flag.

What do utility impersonation scams typically involve?

They range from distraction-based theft (one person keeps the homeowner busy while another steals valuables) to outright robbery, scam billing for fake services, and gathering information for subsequent targeted fraud.

Can businesses use Real Authenticator to issue verified identities to field teams?

Yes. A company can establish Real Authenticator connections between each field technician and their assigned customer accounts. The shared connection serves as a cryptographic credential that customers can verify instantly at the door.

What should I do if I think I admitted a fake contractor?

Note the description of the person and vehicle and contact local law enforcement. Then document anything that may have been accessed or disturbed. Notify your bank if financial information may have been seen. Change access codes for locks, security systems, and any accounts if a device was near an unattended screen.

Data & Sources

  1. 1.Estimated annual losses to home improvement and contractor fraud in the US (survey/modeled estimate)FBI Financial Crimes Report / IC3 Annual Reports
  2. 2.Home service scams tracked by BBB that involved misrepresented identity (survey/modeled estimate)Better Business Bureau Scam Tracker Annual Report 2022
  3. 3.Of contractor fraud victims who said the fake credential appeared legitimate (survey/modeled estimate)AARP Fraud Watch Network Survey (sample-based)
  4. 4.FBI consistently reports utility impersonation surges following major outages — exact % varies by event (survey/modeled estimate)FBI Public Service Announcements, 2022–2023

Statistics represent figures as reported by the cited source in the year indicated. Losses marked with superscript numbers are based on survey samples or industry modeled estimates and should be read as indicative trends rather than precise measurements. Many fraud incidents go unreported, so actual losses are likely higher than cited figures. This page is produced by Real Authenticator for informational purposes only and does not constitute legal or financial advice.

Know who you're really
talking to

In a world of deepfakes and impersonation, Real Authenticator gives you and your trusted contacts a private, unforgeable way to verify identity. Download today — it's free.

Download on App Store

Free to download · No credit card required · Privacy-first design