The process included physicalverification, weighing, measuring, length, status, nature, value, provenance, description and digital photography of each object.
If this involves a stolen ID of a person, a correct verification can only be made is physical space, usually after much damage has already been done via cyberspace.