π° Originally published on Securityelites β AI Red Team Education β the canonical, fully-updated version of this article.
A Hong Kong finance worker sat through a 40-minute multi-person video call with deepfaked versions of the CFO and colleagues. They wired $25 million. The faces looked real. The voices sounded real. The expressions, the movements, the conversation β all AI-generated in real time. Detecting deepfakes is getting harder, but not impossible. Understanding the tells, the verification techniques that work regardless of AI quality, and the tools available in 2026 gives you a practical advantage. Here is the complete guide.
What Youβll Learn
Visual tells for deepfake video β what to look for frame by frame
Audio tells for voice clones β the subtle signs that still exist in 2026
Free detection tools and how reliable they actually are
Verification techniques that defeat deepfakes regardless of quality
How to spot AI-generated profile photos and images
β±οΈ 12 min read ### How to Spot AI Deepfakes β Complete Detection Guide 2026 1. Video Deepfake Tells β What to Look For 2. Voice Clone Tells β Audio Detection 3. AI-Generated Image Detection 4. Detection Tools β What Works and What Doesnβt 5. Verification Techniques That Always Work Deepfakes are one of the most financially damaging AI fraud methods of 2026, and one of the six AI scam types covered in the AI Scams 2026 guide. The technical layer β how AI systems are used in the attacks described here β is covered in the AI Vulnerabilities overview. For real-time suspicious link checking, the Phishing URL Scanner helps identify fake sites linked from deepfake-accompanied fraud attempts.
Video Deepfake Tells β What to Look For
The visual tells for deepfake video are real but shrinking as the technology improves. Understanding them is useful for casual screening β but I want to be direct about the limits: a determined attacker using current best-in-class tools can produce video that passes most of these checks. My honest assessment of where we are in 2026: a 10-second look at a still image is usually insufficient for reliable detection. Subtle motion over multiple seconds is more revealing. The tells I describe below are what current deepfake tools struggle with β they may not apply to future improvements, which is why the verification section is the most important part of this guide.
VIDEO DEEPFAKE VISUAL TELLSCopy
Face and skin
Blurring or softness around the hairline and face boundary
Skin texture that looks too smooth or inconsistently rendered
Inconsistent skin tone between face and neck/hands
Face appears slightly βfloatingβ β doesnβt move completely naturally with head
Eyes and mouth
Unnatural blinking pattern β too regular, too infrequent, or missed blinks
Eyes donβt track naturally β gaze direction slightly wrong
Lip sync slightly mismatched β especially on complex mouth movements
Teeth rendering: deepfakes often struggle with realistic teeth
Movement and lighting
Lighting inconsistency: face lit differently from background or clothing
Head rotation past 45 degrees: quality degrades at extreme angles
Hair movement: individual strands often rendered poorly in current tools
Earrings, glasses, and jewellery: often misrendered, flicker, or disappear
How to test on a live call
Ask the person to turn their head slowly to one side
Ask them to put their hand in front of their face briefly
Ask for an action that requires specific, unusual physical coordination
Note: these tests are temporary β future tools will handle them better
securityelites.com
Deepfake Detection β Checklist for Live Video Calls
β¬
Hairline and face boundary β blurry or soft edges?
High signal
β¬
Blinking pattern β unnatural frequency?
High signal
β¬
Lighting β face matches background?
Medium signal
β¬
Head rotation test β quality holds past 45Β°?
High signal
β¬
Teeth rendering β realistic or blurred?
Medium signal
β¬
Accessories (glasses, earrings) β stable?
Medium signal
β¬
End call and call back on known number
Always works
πΈ Deepfake detection checklist for video calls. High-signal indicators are the most reliable for current deepfake tools. However, the only fully reliable verification β regardless of detection score β is the last item: ending the call and calling back on a number you already have. Detection tools and visual tells are a temporary advantage that may not apply to next-generation deepfake technology.
Voice Clone Tells β Audio Detection
Voice clones are more convincing than deepfake video in many cases because voice only needs to fool one sense. I find that people who know a personβs voice well can still sometimes detect clones β but this is not a reliable defence. The tells are subtle and decreasing.
VOICE CLONE AUDIO TELLSCopy
Subtle audio artifacts (best heard in quiet conditions)
Slightly mechanical quality at the edges of words and sentence endings
Unnatural breathing patterns β pauses in unusual places
Emotional tone that doesnβt quite match the words being said
Background noise thatβs too clean β real calls have ambient noise variation
Consistent audio quality β real calls have natural fluctuations
What voice clones struggle with
Specific local dialect features and idiosyncratic speech patterns of the target
Spontaneous laughter, interruptions, genuine emotional responses
Answering genuinely unexpected questions that require personal knowledge
Testing voice authenticity on a call
Ask a question only the real person would know (specific recent shared experience)
Say something unexpected that requires genuine emotional or personal response
Ask them to say an unusual specific phrase you request: βrepeat after me: purple elephant 47β
Note: sophisticated real-time voice conversion agents can sometimes handle this via operator
π Read the complete guide on Securityelites β AI Red Team Education
This article continues with deeper technical detail, screenshots, code samples, and an interactive lab walk-through. Read the full article on Securityelites β AI Red Team Education β
This article was originally written and published by the Securityelites β AI Red Team Education team. For more cybersecurity tutorials, ethical hacking guides, and CTF walk-throughs, visit Securityelites β AI Red Team Education.

Top comments (0)