WomensLaw serves and supports all survivors, no matter their sex or gender.

About Abuse

Abuse Using Technology

View all
Updated: January 10, 2017

What are some ways that an abuser might use technology for impersonation?

There are many ways that abusers misuse technology to help them impersonate someone.

Social Media
Abusers might create fake social media accounts in your name, log into your accounts by having or guessing the password, or manipulate technology in a way that makes it seem like a communication is coming from you. Through impersonation, abusers may gather confidential or personal information about you from your friends, family, or employer; spread harmful information about you; or even create false “evidence” that casts doubt on your courtroom testimony or on your version of events that you included in a court petition or police report. Some abusers have even created fake messages to make it look like they are the person who is getting harassed. Additionally, an abuser may try to impersonate you or someone else online as a way to learn information about your location or trick you into meeting him/her somewhere.

Abusers may create “fake” email accounts (accounts not connected to their own name) for various reasons. They may use the accounts to send harassing emails that look like they are coming from someone else or that mask their identity as the sender. In many cases, however, the original sender can still be proven with the help of law enforcement.

Abusers may also send an email from these “fake” accounts to trick you into opening a message that contains a virus or spyware that would then allow them to spy on your computer. Abusers may also create an email account in your name in order to send emails to others while pretending to be you. This could be done because they are trying to embarrass you, discredit you, put you at risk of harm, or cause some other negative consequences in your life.

Spoofing is a form of impersonation where an abuser could mask or hide his/her actual phone number so that another phone number (chosen by the user) shows up on the recipient’s caller ID. You can find more information about spoofing in on our Spoofing page.

Online impersonation
An abuser may also use your private information to pose as you on the Internet and invite others to harass you or put you in danger. For example, an abuser may create an advertisement (posing as you) directing others to contact you for escort or massage services, or inviting others to come to your home or call your home for a specific purpose.

Some abusers could even use impersonation to encourage others to sexually assault you. An abuser could include information in the advertisement or online post that states that you have a “rape fetish” or “rape fantasy” and asks for someone to carry out this “fantasy.” The purpose of these types of online posts is so that the third party who is sexually assaulting you thinks that your protest or resistance is part of some type of “role-playing.” (Note: In these types of cases, the abuser who makes the post will often be charged with rape or solicitation to commit rape, in addition to whatever rape charges are filed against the person who actually commits the sexual assault).