What are some ways that an abuser might use technology for impersonation?
There are many ways that abusers misuse technology to help them impersonate someone.
Social media
Abusers might misuse social media by using it to:
- create fake social media accounts in your name;
- log into your accounts by having or guessing the password; or
- manipulate technology to make it seem like a communication is coming from you.
Through impersonation, abusers may gather confidential or personal information about you from your friends, family, or an employer who believe they are talking to you. An abuser may create false “evidence” that could cast doubt on allegations you make in court or to the police. For example, abusers can create fake messages from your account to make it look like you are harassing them on social media. Then they can use those “harassing messages” to file a police report or protection order against you.
Generative AI (“Deepfakes”)
An abuser or stalker may use generative artificial intelligence (“AI”) tools to create fake recordings or videos of you. These are sometimes called deepfakes. The deepfakes may be sexual in nature or they may be meant to harm you in other ways. In 2024, for example, a stalker used these tools to create a deepfake recording of a school principal saying racist and antisemitic comments. This led to outrage and harassment against the principal and the school until it was discovered that the recording was a deepfake.
Email
Abusers may create email accounts not connected to their own name for various reasons to send harassing emails. Abusers may send an email from these “fake” accounts to harass, threaten, or intimidate you. They may try to trick you into opening a message with a virus or stalkerware to let them to spy on your computer. Abusers may also create an email account in your name in order to send emails to others while pretending to be you. They could be trying to embarrass or discredit you, put you at risk of harm, or cause other problems for you.
In many cases, though, the original sender of the email can still be proven. This may require the help of law enforcement.
Spoofing
Spoofing is masking or hiding one’s actual phone number so that a phone number chosen by the user shows up on the recipient’s caller ID. You can find more information about spoofing on our Spoofing page.
Online impersonation
An abuser may use your personal information to pose as you online. S/he may invite others to harass or endanger you. For example, an abuser may create an ad posing as you directing others to contact you for escort or massage services. Or the ad might invite others to come to your home or call you for a specific purpose.
Some abusers could even use impersonation to encourage others to sexually assault you. An abuser could say in the ad or online post that you have a “rape fetish” or “rape fantasy.” The ad or post could then ask for someone to carry out this “fantasy.” The purpose of these types of online posts is so that the person who is sexually assaulting you thinks that if you say “no” or fight back, your resistance is part of “role-playing” in the “rape fantasy.” In these types of cases, the abuser who makes the post can be charged with rape or solicitation to commit rape. This is in addition to whatever rape charges are filed against the person who actually commits the sexual assault.