How to Find Someone Using a Fake Name: Aliases, Pseudonyms, Court Name-Change Records, and Cross-Identifier Investigation
Subjects using fake names, aliases, or pseudonyms create investigation challenges, but the underlying paper trail typically still exists. Court name-change records are public โ most legal name changes leave findable court records. SSN verification through credit-header methodology cross-references identifiers across name variants. Business affiliation searches reveal subjects across multiple business identities. Known-associate analysis identifies subjects through their relationships when direct identifiers fail.
Subjects using fake names, aliases, or pseudonyms fall into several distinct categories with different investigation methodology recommendations. Legal name changes through court procedures are public โ court records typically reveal both the original and new names along with the connecting court order. Aliases and pseudonyms used informally without legal name change leave less direct paper trail but typically still produce identifiable indicators through SSN verification, business affiliation, and various other cross-references. Subjects deliberately establishing fraudulent identities for criminal purposes (identity theft, witness avoidance, fraud) create the most challenging investigation but typically still produce findable indicators through forensic methodology.
The investigation methodology adapts to the category. Legal name changes are findable through court records in the jurisdiction where the change was sought (typically subject’s residence at the time). Informal aliases are findable through SSN verification โ credit-header methodology shows all names associated with a Social Security Number, capturing both legal name and any aliases attached to credit relationships. Pseudonyms used for specific contexts (creative work, online activity, social media) often appear in business affiliation searches showing the subject’s business or professional activities under the pseudonym alongside their legal identity activities.
Practitioners search for subjects using fake names for several legitimate purposes: fraud investigation (identifying perpetrators using false identities); divorce and custody investigation (uncovering hidden assets or relationships under alternative names); judgment enforcement (locating debtors using aliases to avoid collection); estate administration (identifying heirs known by family names different from official records); and legitimate business due diligence (verifying counterparty identity when name discrepancies appear). The investigation operates under FCRA/GLBA permitted-purpose framework with appropriate documentation of the legitimate purpose.
๐บ In this video
๐ก Three name-variation categories with three methodology paths
Legal name changes (court-ordered, public records): findable through court records in the change jurisdiction. Informal aliases (used for personal/business reasons without legal change): findable through SSN verification and credit-header methodology showing all names attached to the SSN. Fraudulent identities (deliberate concealment, fraud, criminal context): require forensic investigation methodology including SSN verification, fingerprint-based identification when warranted, and known-associate analysis. Identify the category first; the methodology follows from the category.
Subject using a fake name? We connect the identifiers.
Professional identity investigation including alias verification, name-change court records, SSN verification, and known-associate analysis under FCRA/GLBA permitted-purpose framework โ delivered in 5โ7 business days.
Court records for legal name changes
Legal name changes through court procedures are typically public records. Most U.S. states require name changes to be filed in court (typically Superior Court or District Court depending on state) with public notice procedures and a court order documenting both the original name and the new legal name. The records support investigation by providing the connection between original and new identities.
State name-change procedures
State procedures vary but typically include: filing a petition with the appropriate state court (varies by state โ Superior Court, District Court, or specific court of general jurisdiction); publishing notice in a newspaper of general circulation in the petitioner’s county (with specific format and frequency requirements); appearing at a hearing where the court evaluates the petition; obtaining a court order granting the name change. The court order is the documenting record creating the connection between original and new names.
Search methodology
Court name-change searches typically begin with the state and county of the subject’s likely residence at the time of the name change. The search uses the original name (the name being abandoned) โ searching for the new name typically does not find the order because the order indexes by petitioner’s then-current name. State court search systems (PACER for federal, state court electronic systems for state) support the searches in jurisdictions with electronic court records.
Marriage and divorce name changes
Marriage and divorce produce name changes that are typically not registered separately โ the change is documented in the marriage or divorce records rather than separate name-change petitions. The procedure: marriage produces optional name change documented in marriage license; divorce can include name restoration documented in divorce decree. The records connecting maiden names, married names, and post-divorce names are typically in marriage and divorce records rather than separate name-change petitions.
Federal protections
Some name changes operate under federal protection rather than state public-record framework. Witness protection (WITSEC) name changes are not publicly searchable and are protected under federal law (see witness protection page). Some adoption-related name changes are sealed under state adoption confidentiality framework. Some specific privacy-protection name changes (domestic violence victims, certain professional contexts) may be sealed or restricted under specific state framework.
Credit-header methodology for cross-name identification
Social Security Numbers (SSN) are the most reliable identifier connecting subjects across name variations. Credit-header methodology shows all names associated with a specific SSN, capturing legal names, aliases used in credit relationships, and various other name variants attached to financial activity. The methodology works because financial transactions consistently require SSN identification, producing reliable cross-name aggregation through credit reporting framework.
Credit-header SSN aggregation
When credit-header data is searched by SSN, the result includes all names attached to that SSN across the credit reporting framework. The aggregation captures: legal names; informal aliases used in credit applications; nicknames and shortened names; misspellings; maiden names and post-marriage names; and various other name variants. The aggregated name list provides comprehensive cross-name identification supporting investigation across name variations.
GLBA framework for SSN-based searches
GLBA permitted-purpose framework allows SSN-based searches for: legitimate business need; fraud prevention; debt collection; legal compliance; and various other authorized purposes. The framework requires permitted-purpose documentation and appropriate use limitations. Professional skip tracing services document permitted purpose for each investigation and limit information use to the permitted purpose context.
DPPA framework for DMV-related searches
The Driver’s Privacy Protection Act (DPPA, 18 USC ยง2721 et seq.) governs DMV record disclosure including name-and-SSN cross-references. DPPA permitted purposes include: (b)(1) governmental functions; (b)(2) motor vehicle safety/theft; (b)(3) insurance; (b)(4) civil litigation; (b)(6) insurance; (b)(7) towing/lien; (b)(8) licensed PI investigation. DMV-derived name verification operates under DPPA permitted-purpose framework with appropriate documentation.
Reverse SSN searches
When investigation begins with an SSN (perhaps obtained through prior employment records, court records, or credit reports) but the current name is unknown, reverse SSN searches reveal current names attached to the SSN. The methodology supports investigation when subjects have changed names without informing original-relationship parties โ a common pattern in fraud investigation, divorce, and various other contexts.
Business records across name variants
Subjects using business or professional identities under different names often appear in business records including: state corporate filings (varies by state, but typically Secretary of State records); fictitious business name (DBA) filings; professional licensing records (varies by profession and state); business operating licenses; and various other business records. The aggregated business records reveal subject activities across name variants.
State Secretary of State searches typically support: business name searches showing companies operating under specific business names; agent and officer searches showing individuals associated with multiple businesses; UCC filings showing financial relationships involving named individuals. The cross-references reveal subjects who maintain multiple business identities under different names.
Professional licensing records (medical, legal, real estate, security, financial services, contracting) often show licensee names and any registered aliases or DBAs. The licensing records can connect a subject’s professional identity (often using legal name) with their business identity (often using DBA or different name). The connection supports investigation when subjects use one identity in professional context and another in business context.
Forensic identification through fingerprints
When name-based methodology fails (deliberately fraudulent identities, comprehensive identity changes, or other challenging cases), fingerprint-based identification provides forensic identification. Fingerprints are unique biometric identifiers that survive name changes, identity changes, and even surgical alterations. The methodology operates through specific authorized channels.
When fingerprints are available
Fingerprint records exist for: subjects with prior arrests (booking fingerprints); subjects with security clearance or sensitive employment (employment-related fingerprinting); subjects with specific professional licensing (medical, legal, financial in various states); subjects with military service (military-related fingerprinting). When fingerprint records exist, FBI IAFIS (Integrated Automated Fingerprint Identification System) and state-level fingerprint databases support identification across name variants.
Investigation procedure
Fingerprint-based identification typically requires specific authorized procedures: law enforcement inquiry through IAFIS/NGI; specific licensing-board procedures for licensed-professional verification; specific employer procedures for employment-related fingerprint verification; FBI Identity History Summary procedures for subjects reviewing their own records. The procedure varies substantially by purpose and jurisdiction.
Limitations for civilian investigation
Civilian and FCRA-regulated investigation has limited fingerprint-based capabilities. NCIC and IAFIS are restricted to law enforcement. State criminal repositories with fingerprint capabilities have varying public-access procedures. Civilian investigators generally use fingerprint identification when subject cooperation is available (such as employment-related background checks where the subject provides fingerprints) rather than as primary investigation methodology against uncooperative subjects.
Identification through subject relationships
When direct identifiers fail, known-associate analysis identifies subjects through their relationships. The methodology operates on the principle that subjects rarely change all relationships when they change names โ family members, business partners, friends, neighbors, and various other associates typically maintain continuity across the subject’s identity changes. The associate continuity creates investigation paths even when subject identifiers fail.
Common associate categories include: family members (spouses, children, parents, siblings โ rarely change identity in coordination with subject); business partners (often retain original business relationships even when subject changes business identity); long-term professional associates (attorneys, accountants, financial advisors); social associates (long-term friends, social club memberships); neighborhood associates (neighbors at long-term residence locations).
The investigation typically identifies known associates through: prior records showing relationships (real property co-ownership, business partnerships, joint accounts, marriage records); social media analysis showing current relationships; obituary research showing family relationships; alumni and professional association membership records. The aggregated associate identification supports investigation paths through associates’ identifiable activities to reach the subject through their continuing relationships.
Common fake-name investigation scenarios
Fake-name investigation arises in several common practitioner scenarios with specific methodology recommendations.
Fraud investigation
Fraud investigators often face subjects using fraudulent identities. The methodology typically begins with: any available identifiers (SSN, fingerprints, biographical information) from the fraud activity; SSN verification showing legitimate identity owners and any unauthorized usage; fingerprint identification through cooperative law enforcement when criminal charges are pursued; victim and witness interviews building identity profile; and integration with broader fraud investigation including financial transaction analysis.
Divorce and custody investigation
Divorce and custody cases sometimes involve subjects using alternative identities to hide assets, relationships, or activities. The methodology: comprehensive SSN-based asset discovery showing assets across name variants; business affiliation searches showing business activities under alternative identities; known-associate analysis showing relationships under alternative identities; integration with broader marital property and custody investigation.
Judgment enforcement
Judgment debtors sometimes use aliases to avoid collection. The methodology: SSN-based comprehensive search showing all names and identifiers; asset search across all identified name variants; employer searches across all identifiers; integration with broader enforcement framework. Many subjects who use aliases for asset concealment maintain SSN-traceable connections supporting investigation.
Estate administration
Estate administrators sometimes encounter heirs known by family names different from official records. The methodology: marriage and name-change record searches connecting known names to legal names; family relationship verification through vital records and probate records; SSN verification when SSN information is available; integration with estate identification and notification procedures.
Common fake-name investigation contexts
Fake-name investigation arises in several distinct practitioner contexts. Each has specific methodology recommendations and applicable framework considerations.
Fraud investigation
Fraud investigation frequently involves subjects using fake names โ fraud schemes typically depend on subject identity concealment. Methodology: identify the underlying real identity through SSN-based investigation (when available), fingerprint-based investigation (when criminal history exists), known-associate investigation (subjects actual networks), and various other approaches that bypass name-based investigation. Fraud cases benefit from coordination with appropriate enforcement agencies (FBI for federal fraud, state attorneys general, FTC for consumer fraud) and civil litigation methodology supporting recovery.
Asset discovery in divorce contexts
Asset discovery in divorce contexts frequently involves spouse-asset concealment through fake names or business identities. Methodology: comprehensive asset search using SSN-based investigation supplementing name-based investigation; business identity investigation through state Secretary of State searches across all states of likely activity; banking investigation through GLBA framework permitted purposes for divorce contexts; integration with forensic accounting methodology when financial complexity warrants. Divorce-context asset investigation typically benefits from coordination with experienced divorce counsel and forensic accountants.
Witness location
Witness location frequently involves witnesses using fake names โ witnesses concerned about being involved in litigation may use varying name patterns. Methodology: court name-change record verification; SSN-based identifier cross-reference; known-associate investigation through litigation-related contacts; integration with subpoena methodology when witness is identified. Witness location methodology typically has clear permitted-purpose framework through litigation context.
Custody-related investigation
Custody-related investigation involving fake-name use by other parents or third parties: comprehensive identity verification through SSN, fingerprint (when applicable), and known-associate methodology; integration with custody investigation framework; protection of children through identity verification supporting custody decisions. Custody investigation typically operates under specific family-law framework with attorney-client coordination supporting investigation methodology.
Comprehensive background check methodology includes identity verification through multiple identifiers supporting fake-name investigation. The integrated approach often resolves identity questions that single-identifier methodology cannot resolve.
Common questions
How do I find someone using a fake name?
Method depends on the type of name variation. Legal name changes are findable through court records in the change jurisdiction. Informal aliases are findable through SSN verification and credit-header methodology showing all names attached to the SSN. Fraudulent identities require forensic investigation including SSN verification, fingerprint identification when warranted, and known-associate analysis.
Are court name-change records public?
Generally yes, in most U.S. states. Most state name-change procedures involve public court filings, newspaper notice publication, and public court orders documenting both original and new names. Some specific name changes (witness protection, certain adoption-related, certain privacy-protection categories) are sealed under specific frameworks. Otherwise, the records are typically publicly accessible.
How does SSN verification work?
Credit-header methodology shows all names associated with a specific SSN across the credit reporting framework. The aggregation captures legal names, informal aliases used in credit applications, nicknames, misspellings, maiden names, post-marriage names, and various name variants. Multi-bureau methodology (Experian, Equifax, TransUnion) captures the most comprehensive cross-name identification.
Can I find aliases through public records?
Often yes, through several channels: court name-change records (legal name changes); business records and DBA filings (business identities); marriage and divorce records (post-marriage and post-divorce names); newspaper archives (notice publications); SSN verification (financial-relationship aliases). Comprehensive investigation typically integrates multiple channels to capture the full alias picture.
What if someone has been using a fake name for years?
Long-term use produces more paper trail, not less. Subjects using fake names for extended periods typically establish credit relationships, business activities, professional licensing, and various other infrastructure under the alternative identity. The infrastructure produces paper trail across the alternative identity. Multi-source investigation captures the alternative-identity infrastructure and connects it to the legal-identity records.
Can fingerprints connect different names?
Yes, when fingerprint records exist. FBI IAFIS and state fingerprint databases support cross-name identification when fingerprint records are available. The methodology requires specific authorized access (law enforcement, specific licensing procedures, specific employment procedures). Civilian investigation generally uses fingerprint identification when subject cooperation is available.
What if the subject changed identity through witness protection?
WITSEC participants are not findable through standard investigation methodology. The federal program specifically defeats third-party investigation. See witness protection page for the specific framework. Communication with WITSEC participants is through U.S. Marshals intermediation rather than direct investigation.
How do I verify someone’s real name?
SSN-based verification through credit-header methodology shows all names attached to the SSN. Government-issued identification (driver’s license, passport) typically shows legal name. Court records show legal names from court proceedings. Cross-reference between sources verifies the legal name and identifies any inconsistencies suggesting alias use.
Can I search for known aliases of someone?
Yes, through several methodologies: SSN verification showing all names attached to the SSN; comprehensive skip tracing producing alias lists from credit-header data; business records showing DBA and alternative business names; court records showing prior names; comprehensive background investigation. Professional skip tracing produces comprehensive alias lists supporting investigation.
Is using a fake name illegal?
Depends on context and purpose. Legal name changes through court procedures are entirely lawful. Informal aliases for personal or creative purposes (pen names, stage names) are generally lawful. Use of fake names to commit fraud, evade legal process, evade debt collection, or facilitate criminal activity is illegal under various federal and state framework. The investigation should support legitimate purposes including identifying fraud, supporting civil enforcement, and various other lawful purposes.
Ready to investigate name variations and aliases?
Professional identity investigation across legal names, aliases, pseudonyms, and fraudulent identities under FCRA/GLBA permitted-purpose framework. Fraud investigation, divorce/custody, judgment enforcement, and estate administration applications.
Reviewed by People Locator Skip Tracing Investigation Team
Established 2004 · 20+ Years Experience · FCRA · GLBA · DPPA Compliant
A professional skip tracing service trusted by attorneys, process servers, and debt collectors since 2004.
Legal Disclaimer. People Locator Skip Tracing provides investigative services for lawful purposes only. Identity investigation operates under FCRA, GLBA, and DPPA permitted-purpose frameworks. The investigation supports legitimate fraud investigation, civil enforcement, family communication, estate administration, and other lawful purposes. This page is informational and not legal advice.
ยฉ 2026 People Locator Skip Tracing® โ All rights reserved.
