Translating page…
PLENA
VERITA ASCENDA LEGIBLA FORTIA PROVA NAVIGA DIGITA DETECTA AEQUITA TEMPORA CONSERVA ORIGINA COMMERCIA
Demo
🌐 Choose your language: English Français Español Português Deutsch عربي Swahili हिन्दी Русский 中文 Bahasa فارسی Italiano 日本語
🔍 Verify Before You Act.

The real protection
is verification, not detection.

AI fakes are now indistinguishable from reality. Detection tools are losing the arms race. What still works: verifying through channels AI cannot touch. DETECTA gives you the protocols, tools, and outputs to do exactly that — for yourself, your family, and your organisation.

Verification beats detection. A callback to a number you found independently. A document checked through an official body. A family code word confirmed in person. These cannot be faked. DETECTA's AI analysis helps flag risk — but source verification is the real protection.
Who are you here for?
👤
Myself or my family
Check a suspicious contact, protect a family member, or verify something before you act.
🏛
My organisation
Train staff, protect your community, build incident records, or assess your fraud exposure.
Jump to your sector
What DETECTA verifies
AI voice clones used in CEO wire fraud — losses averaging $25M per incident
Deepfake video calls now indistinguishable to the untrained eye — used in job scams & romance fraud
💬 Get help on messaging apps
WhatsApp Telegram

Message PLENA directly on WhatsApp or Telegram. Free. Requires a free AI key on first use.

← Back
⚙️
Connect Your AI Key
DETECTA works in Demo mode without a key. Add a free AI key to unlock full verification analysis, personalised protocols, and structured outputs. Your key is stored locally on your device only — PLENA never sees it. When you use AI tools, your queries are sent to your chosen AI provider (e.g. Google, Anthropic). They are not sent to PLENA.
Data notice: When you use AI-powered tools, the text you enter is sent to your chosen AI provider (e.g. Google, Anthropic, Groq). It is not sent to PLENA. Your API key is stored locally on your device only. Do not paste highly sensitive personal data — names, account numbers, passwords — into AI analysis fields.
Where to get a key
FREEGroqFree tier, fast.Get key →
PAIDClaudeBest for nuanced analysis.Get key →
← All Services
⚠ Voice Is No Longer Proof of Identity
Three seconds of audio from a voicemail, a social media video, or a phone call is enough to clone a voice with current AI. "Mum, I'm in trouble, I need money right now" can be generated by anyone. Your bank's customer service voice can be cloned. Your employer's voice can be cloned. The sound of a voice is no longer evidence that the person is who they claim to be.
🎙
Voice Call Verification Protocol
You received a call from someone claiming to be a family member, your bank, your employer, or an authority. Here is the verification protocol that works regardless of how convincing the voice sounds.
🧑‍👩‍👧 Family member or friend in emergency
The "grandparent scam" and its variants are now AI-powered. The caller sounds exactly like your son, daughter, or grandchild. They are in trouble. They need money immediately. They ask you not to tell anyone else.
1
Hang up. Tell them you will call back immediately. If they protest or pressure you not to — that pressure is the confirmation it is a scam.
2
Call the person directly on a number you already have for them — not the number that just called you. If they are genuinely in trouble, they will answer.
3
Establish a family code word — a word only your real family member would know, agreed in advance. Ask for it. A cloned voice cannot know a private code word.
🏦 Bank or financial institution
Your bank calls to say there is suspicious activity. They need you to confirm your account details, move your money to a "safe account," or authorise a transaction urgently.
1
No bank ever calls asking you to move money to a safe account. That phrase, in any form, is fraud. Hang up.
2
Hang up and call back using the number on the back of your physical card or on the bank's official website — which you find by typing the bank name yourself. Do not redial the number that called you.
3
Real banks will have a record of the interaction if it was genuine. If the bank has no record of calling you — the call was fraudulent.
🏛 Government authority or immigration official
A caller claims to be from the tax authority, immigration department, police, or a court. They say you owe money, are about to be arrested, or your visa is at risk. Pay immediately or face serious consequences.
1
No government agency demands immediate payment by phone — ever. Not HMRC. Not the CRA. Not the IRS. Not the Home Office. Not USCIS. If a call demands immediate payment to avoid arrest — it is fraud.
2
Real government communication about tax debts, immigration status, or court matters arrives by physical post to your registered address first. A phone call demanding immediate action is not how these agencies operate.
3
Hang up. Search the agency's name and call their official number directly. Ask if there is any open case or correspondence in your name.
💡 Set up a family verification code word today
Choose a single word that every member of your immediate family knows. It should be memorable but not guessable from public information. If you receive an emergency call from a family member's voice — ask for the code word. A cloned voice cannot know it. This takes 5 minutes to set up and provides permanent protection.
DETECTA provides verification guidance — not call tracing or voice analysis. DETECTA cannot tell you whether a specific call used cloned audio. It teaches the verification protocols that protect you regardless of the technology used.
← All Services
🎥
Video & Image Verification
Deepfake video in real-time video calls. AI-generated profile photos. Fabricated investment screenshots. What to check and which free tools to use.
📸 Profile photo — is this person real?
AI-generated faces look highly convincing. Investment recruiters, romance contacts, and fake professionals routinely use synthetic photos.
1
Reverse image search: Right-click any profile photo and select "Search image" (Chrome) or use images.google.com. If the same face appears with different names — it is stolen or AI-generated.
2
Check for AI tells in photos: Asymmetric earrings. Teeth that blur at the edges. Hair that merges with the background. Eyes with unusual reflections. Backgrounds with repeated or impossible patterns.
3
Free AI image detectors: Hive Moderation · Illuminarty. Upload the photo. These tools are imperfect but flag many AI-generated images.
🖥 Video call — is this person who they claim to be?
Real-time deepfake video is advancing rapidly. In a Zoom or WhatsApp video call, the face you see may not be the person you are talking to.
1
Ask them to perform a specific physical action: Turn their head fully sideways. Put their hand in front of their face. Look directly up. Current deepfake technology degrades significantly with unusual angles and obstructions.
2
Watch for: Slight lag between speech and lip movement. Edges of the face that blur or shimmer. Hair or glasses that clip into the background. Unnatural blinking patterns.
3
For high-stakes calls: Request to meet in person or via a verified video platform (Microsoft Teams, Google Meet with authenticated accounts) rather than WhatsApp or Telegram.
📊 Investment screenshot or dashboard — is this real?
AI generates convincing trading dashboards, account balance screenshots, and profit records used to recruit victims into investment fraud.
1
A screenshot proves nothing. Anyone can generate a screenshot showing any balance, any return, any profit. Screenshots are not evidence of a real account.
2
Ask them to share their screen in real time and navigate to their account while you watch — not show a static image.
3
Then check the platform on the regulator's register (FINRA, FCA, ASIC, IIROC). If it is not registered, the live dashboard you watched is also part of the fraud.
No detection tool is 100% reliable. AI generation improves faster than detection. The verification protocols above work because they test the person's ability to respond in real time — which current AI cannot fully fake — rather than analysing the image or video itself.
🔬 Real Computer Vision Scan — Hive Moderation
Upload an image for analysis using Hive Moderation's real computer vision models — actual signal-level analysis (GAN fingerprints, facial consistency, JPEG artefacts), not an AI text description. This is the same technology used by major platforms. Requires a free Hive API key.
Hive API key — get a free key at thehive.ai →
Key is stored on your device only — never sent to PLENA.
← All Services
📋
Document Verification
AI generates scholarship letters, employment contracts, government notices, tenancy agreements, and bank statements that are visually identical to authentic documents. Visual inspection is no longer a reliable test.
Loading verification protocol…
📋
Document Verification Protocol
The only reliable document verification is direct source confirmation — contacting the issuing institution using contact details you find independently, not from the document itself. DETECTA guides you through that process.
← All Services
👤
Identity Verification
Online contacts, recruiters, investors, landlords, and potential partners may not be who they claim. These are the fast, free verification steps that work.
Verifying a person online — the 4-step protocol
1
Reverse image search their profile photo. Use Google Images or TinEye. If the photo appears elsewhere with a different name, it is stolen or AI-generated.
2
Check their LinkedIn independently. Search the name directly on LinkedIn — not via a link they sent. Check: when was the account created? Do they have real connections and recommendations? Is their employment history verifiable?
3
Search name + "scam" and name + "fraud." Victims of fraud routinely post warnings. Three minutes of searching can save thousands.
4
For employers or companies: Verify the business registration independently. UK: Companies House. Canada: Corporations Canada. USA: your state's Secretary of State website.
Before you meet someone in person from an online contact
1
Always tell a trusted person where you are going, who you are meeting, and when you expect to be back. Share the contact's name and profile.
2
Meet in a public place with CCTV for a first meeting. Never go to a private address to view a rental, meet an employer, or collect anything of value from an online contact.
3
Never carry significant cash or transfer money before or during a first in-person meeting with someone you met online.
DETECTA provides verification guidance only. For serious concerns about an individual's identity in a legal context, contact your local police or relevant authority.
← All Services
✉️
Message & Email Verification
AI-personalised attacks use your name, employer, children's names, recent events, and financial situation to craft messages indistinguishable from real contacts. The verification layer that still works.
Analysing verification signals…
✉️
Message Verification Analysis
Even a message with no obvious red flags may be fraudulent. AI produces perfect grammar, correct names, and plausible context. The verification step — going to the source independently — applies to every message requesting action, regardless of how legitimate it appears.
The one verification rule that works regardless of AI
Never act on an inbound contact — always initiate outbound
When you receive any message requesting action — click a link, call a number, send money, provide credentials, confirm details — do not use any contact information in that message. Close it. Open a new tab. Find the organisation's official website yourself (type it into Google). Use the contact details on their official site. Ask them if they sent the message. This takes 2 minutes and defeats every form of AI-personalised phishing, regardless of how convincing it is.
← All Services
🗂
Your Digital Footprint
Scammers aggregate your public data — LinkedIn, Facebook, Instagram, data broker profiles, news mentions — to build a personalised attack profile. Understanding what is public is the first step to reducing your exposure.
What attackers know about you before they contact you
Before a hyper-personalised attack reaches you, the attacker has likely gathered: your full name and employer from LinkedIn, your family members' names from Facebook, your neighbourhood from Instagram location data, your financial stress signals from recent posts, your immigration status from community group mentions, and your email address from data broker databases. The attack is personalised because your data was public.
Find out what data brokers hold about you
1
Search your own name on Google — in quotation marks. See what appears. This is approximately what an attacker sees.
2
Check major data brokers for your profile: Spokeo, Whitepages, Intelius. Each has an opt-out mechanism — use it.
3
Under GDPR (EU/UK) and PIPEDA (Canada), you have the right to request deletion of your personal data from data brokers. Submit erasure requests directly on their websites.
4
Review your privacy settings on LinkedIn, Facebook, and Instagram. Limit who can see your connections, employment history, and location data. Turn off location tagging on photos.
Practical steps to reduce your attack surface
1
Use a separate email address for financial accounts, immigration applications, and government services — distinct from the email you use for social media and shopping.
2
Never post your phone number publicly. It is the primary vector for SIM swapping attacks and targeted phone fraud.
3
Enable two-factor authentication on every important account — email first, then banking, then social media. Use an authenticator app (Google Authenticator, Authy) rather than SMS where possible.
4
Be conscious of what you post publicly about financial stress, job searching, housing needs, or immigration status. These signals are actively monitored by fraud networks.
DETECTA provides privacy and security guidance — not legal representation. For data deletion requests that are refused, your data protection authority can help: ICO (UK) · CNIL (France) · OPC (Canada) · OAIC (Australia).
Simple, honest pricing

All core verification guidance is always free.

Free, indefinitely
$0/month
No signup required.
  • All 6 verification services
  • Voice call protocols
  • Document verification guides
  • Digital footprint guidance
  • Identity verification steps
  • 14 languages
  • AI-powered message analysis
With AI Key
Pay-as-you-use
Use your own Groq (free) or Claude key.
  • Everything in Free
  • Message-specific AI analysis
  • Document-specific verification
  • Personalised protocol for your situation
  • Groq tier is free
Institutional
Custom
For employers, universities, NGOs.
  • Everything in AI tier
  • Staff training on AI verification
  • Custom verification protocols
  • Onboarding integration
  • Multilingual delivery

What DETECTA is

DETECTA is the eleventh platform in the PLENA suite — a verification literacy platform for the AI age. It teaches the procedural habits that protect people from AI-assisted fraud: how to verify voices, video, documents, identities, and messages when AI has made every traditional fraud tell obsolete.

Why verification — not detection

"AI generation improves faster than AI detection. The arms race cannot be won. The only protection that compounds rather than decays is the habit of verifying at the source."

Every tool that promises to detect AI-generated content is in a permanent arms race it is losing. The moment a detector improves, the generators adapt. DETECTA does not play that game. Instead it teaches one principle that defeats every form of AI fraud regardless of how advanced it becomes: never act on an inbound contact without first verifying through an independent outbound channel.

⚡ Enhanced Tools

🔍 Live Verification Tools

Use these authoritative checkers:

→ PolitiFact   → Snopes   → FactCheck.org   → Full Fact (UK)   → Search all fact-checkers

A personal exposure audit identifies what information about you is publicly accessible and could be used by scammers to impersonate you or gain your trust.

         

A verification code word is a pre-agreed word or phrase between you and trusted people. If someone claims to be them in an emergency — ask for the code word. AI voice clones cannot know it.

⚡ Advanced Tools

Paste a suspicious message. DETECTA scores each manipulation tactic present.

Part of PLENA

DIGITA protects you from known fraud patterns. DETECTA protects you from fraud that looks like reality. Together they form PLENA's complete protection layer for the AI age.

Created by

DETECTA is part of PLENA, created by Jean Claude Havyarimana. hvyjea0012@protonmail.com

← All Services
🚨
Quick Check
Something feels wrong right now? Use these tools in the moment — while the call is happening, while the message is open, before you click anything.
🚨 Round 1 — Real-Time Scam Verdict

Something doesn't feel right. Paste or type exactly what they said — a message, a call script, an email. Get a verdict in seconds.

← All Services
🏛 DETECTA for Institutions
INSTITUTIONAL
Why institutions choose DETECTA

ChatGPT gives your staff general information. DETECTA gives them structured, actionable outputs — formatted for police, legal teams, and compliance departments, tailored to your sector and country, printable and shareable in one tap.

Sectors we serve
🎓
Universities
Student fraud, credential scams, academic integrity
🏦
Banks & Finance
BEC, payment fraud, customer protection
🏥
NHS / Healthcare
Invoice fraud, identity theft, procurement scams
⚖️
Legal Aid
Client document fraud, impersonation, deepfakes
👥
HR & Employers
Fake CVs, AI applications, payroll fraud
🤝
NGOs & Charities
Beneficiary protection, donation fraud
🏛
Government
Benefits fraud, immigration scams, impersonation
📰
Journalism
Deepfake sources, synthetic media, disinformation

What sets DETECTA apart
Structured outputs, not essays
Every tool produces formatted reports, printable checklists, and documents ready to attach to a file — not paragraphs for staff to decode.
Country & sector specific
Reporting obligations, legal duties, and threat landscapes vary by country and sector. DETECTA tailors every output to where you actually operate.
Outward-facing tools
Protect your community, not just your organisation. Generate awareness materials, briefings, and guides for your students, customers, or beneficiaries.
Your data stays in your control
Case records and settings are stored on your device only — PLENA never receives them. When AI tools are active, your queries go to your chosen AI provider only (e.g. Google, Groq). PLENA never sees your content.
All six tools are free to try right now.
Institutional licensing — admin dashboards, bulk access, white-labelling, SSO/SAML, and audit trails — are on our development roadmap. Contact us to discuss early access and timeline.
🛡 Protect Your Staff

Three tools for internal fraud resilience — training your team, building incident records, and honestly assessing your exposure.

🎓 Staff Training Content Generator

Generate a ready-to-use fraud awareness training module — tailored to your sector and staff audience. Includes a 3-question quiz. Suitable for printing, email, or intranet.

👥 Protect Your Community

Tools to deploy outward — to your students, customers, patients, or beneficiaries. Generate awareness materials, bulletins, and targeted guides in minutes.

📦 Awareness Pack Generator

Generate a complete three-part awareness pack for your community: a briefing document, a printable poster, and a wallet-sized "What To Do If Scammed" card — all tailored to who you serve.

📢 Community Scam Bulletin

Generate a current scam alert bulletin formatted as a newsletter or email — ready to send to your community this week. Tailored to sector and country.

🎯 Targeted Guide for Vulnerable Groups

Generate a plain-language, targeted fraud guide for a specific vulnerable group in your community — written at the right literacy level, covering the risks they actually face.

📋 Policy & Compliance

Generate policy documents, understand your legal reporting duties, and check GDPR compliance — specific to your sector and country.

📝 Fraud Policy Template Generator

Generate a complete, editable organisational fraud policy document — covering prevention, detection, reporting, and disciplinary procedures, tailored to your sector.

Important: This tool generates a starting template using AI. It is not legal advice and has not been reviewed by a solicitor. Have any policy document reviewed by qualified legal counsel before adoption, especially for regulated sectors.
⚖️ Reporting Obligations Checker

When fraud occurs, what are you legally required to do — and to whom? Get the specific reporting obligations for your sector and country, with contacts and deadlines.

Important: AI-generated output only. Reporting obligations are complex and jurisdiction-specific. Always verify with a qualified legal advisor or your regulator before acting on this output.
🔒 GDPR / Data Protection Compliance Checklist

Using fraud detection tools with personal data carries GDPR obligations. Get a compliance checklist specific to your jurisdiction and use case — with what you must do, what you should do, and what to document.

Important: AI-generated starting checklist only. Data protection law is complex. Have this reviewed by your Data Protection Officer or a qualified advisor before treating it as compliance evidence.
📡 Sector Intelligence

Threat intelligence tailored to your sector — not just your country. Know what fraudsters are targeting in your industry this week, and brief your team before it reaches them.

📡 Weekly Sector Threat Intelligence Brief

Get a structured threat intelligence briefing for your sector and country. Suitable for circulation to leadership, security teams, or as a standing agenda item at your weekly staff meeting.

🎭 Fraud Scenario Library for Training

Generate a set of realistic fraud scenarios specific to your sector — use them in training, phishing simulations, or tabletop exercises. Each scenario includes the script, the red flags, and the correct response.

🚀 Get Started

All tools are free to use right now with your own AI key — no signup required. Institutional licensing (admin dashboards, bulk onboarding, SSO/SAML, audit trails, and SLA support) is in active development. We are working with early institutional partners now.

1
Try any tool right now — no signup
Every tool on this page works immediately. Use the Staff Training Generator, build an Incident Report, or run a Risk Assessment — free, with no account required.
2
Connect a free AI key for full outputs
Tools work in demo mode or with a free Gemini key from Google AI Studio. No credit card needed. Takes two minutes.
3
Request institutional licensing
Tell us what you need. We are building institutional infrastructure — admin dashboards, SSO/SAML, audit trails, DPA — with early partners now. Get in touch to discuss your requirements and timeline.
What you get — now and on the roadmap
✓ Available now — free
✓ All 6 tool suites
✓ Staff training generator
✓ Incident report builder
✓ Fraud risk assessment
✓ Community awareness packs
✓ Policy & compliance tools
✓ Sector threat intelligence
✓ Drill mode (5 scenarios)
✓ Case workspace & export
✓ 14 languages
🔧 In development — institutional roadmap
◦ Admin dashboard & reporting
◦ Bulk onboarding (CSV / API)
◦ SSO / SAML integration
◦ GDPR Data Processing Agreement
◦ White-label deployment
◦ Audit trail & compliance export
◦ Dedicated SLA support
◦ Annual invoicing
Early institutional partners are helping shape these features. Contact us to be involved.
Request Institutional Access

Tell us your institution type, approximate user count, and intended use. We respond within 2 business days.

Contact for Institutional Access →
← Home
📁 Case Workspace
Every suspicious event — real or drill — becomes a structured record.
⚠️ Cases are stored in your browser only. Sign in to sync across all your devices and protect against data loss.
📁 New Case
← Home
🎯 Drill Mode — Beyond KnowBe4
Train against 2026 threats, not 2015 phishing
Five interactive scenarios — AI voice clones, deepfake video calls, WhatsApp impersonation, fake documents, and identity fraud. Scenarios are reviewed and updated regularly to reflect current threat patterns. Each gives you personalised AI coaching on your exact choice. Results save to your Case Workspace.
📞
The CEO Voice Clone
A call from your "CEO" asking for an urgent transfer
Hard Business Email Compromise · Voice Fraud
🎙 Scenario — you receive this call
You're at your desk on a Tuesday afternoon. Your phone rings. Caller ID shows your CEO's name and number.

"Hi, it's [CEO name]. I'm in a confidential board meeting and I can't talk long. I need you to process an urgent supplier payment — £18,500 to a new account. I'll send you the details by text. Don't put it through the usual approval chain — this is time-sensitive and confidential until the deal closes. Can you do that for me right now?"

The voice sounds exactly like your CEO. The number matches. The request feels urgent.
What do you do?
📱
WhatsApp Family Emergency
An urgent message from a "family member" in trouble
Medium Impersonation · Social Engineering
📱 Scenario — WhatsApp message, unknown number
An unknown WhatsApp number messages you at 7pm:

"Mum/Dad it's me. I dropped my phone and broke it, using a friend's. I've been in a small accident — nothing serious but I need to pay for repairs before I can leave. I need £650 sent urgently. Please don't call Dad/Mum yet — don't want to worry them until I'm home. I'll explain everything tonight. Can you send to this account?"

They send a sort code and account number. The message sounds like your child's voice. They use a nickname only your child uses.
What do you do?
🎥
The Deepfake Job Offer
A video interview that asks for your ID and bank details
Hard Deepfake · Identity Theft
🎥 Scenario — Zoom interview, applied 3 weeks ago
You applied for a remote marketing role three weeks ago. A recruiter emails inviting you to a Zoom interview. The interviewer appears on video — professional, articulate, good lighting. The company name matches a real business you can find on LinkedIn.

Midway through, the video freezes briefly. The interviewer continues: "We'd love to offer you the position today. To process your contract and set up payroll, I'll need your National Insurance number, bank account details, and a scan of your passport — just standard onboarding. Can you send those across by end of day?"

The job pays well above market rate. You've been job-hunting for two months.
What do you do?
🏦
The Bank Fraud Team Call
Your "bank" calls about suspicious activity on your account
Easier Vishing · Financial Fraud
📞 Scenario — unexpected call, caller ID shows your bank's name
Your phone rings. The caller ID shows your bank's name. A professional voice says:

"Good morning, this is [Bank name] fraud prevention. We've detected unusual activity on your account — two transactions from overseas merchants in the last hour. To secure your account, I need to verify your identity. Can you confirm your sort code, account number, and the one-time passcode we're sending to your mobile right now?"

A text arrives with a 6-digit code. The caller is polite, professional, and says they need the code "to freeze the fraudulent transactions."
What do you do?
📄
The Scholarship Processing Fee
You've won a scholarship — but must pay a fee first
Easier Advance Fee Fraud · Document Fraud
📧 Scenario — email with official-looking PDF attachment
You receive an email with a university logo and a PDF attachment. The letter states:

"Congratulations. Following a competitive review process, you have been selected to receive a £4,500 International Excellence Scholarship. To release the funds, a processing and administration fee of £175 must be paid within 48 hours via bank transfer to the account below. Failure to pay within the deadline will result in the award lapsing and being offered to the next candidate."

The PDF looks professional. The university name is real. You did apply to this university last month.
What do you do?
← Home
👤 My Account
Your data: Cases are stored securely in your Supabase database. Queries sent to AI tools go to your chosen AI provider only — not to PLENA. You can export or delete all your data at any time.
← Account
🏛 Institutional Admin
All cases across your organisation