Criminal Defense

How Can People Who Commit Fraud Impersonate Me?

December 20, 2022 by Seppi Esfandi in Criminal Defense  
Thumbnail for: How Can People Who Commit Fraud Impersonate Me?

It is illegal to use another person’s name or identity to do injury or get an inappropriate profit, as defined in PC 529, which also goes by the label of “false personation.” A misdemeanor or a felony might be charged for this crime. A criminal conviction carries a sentence of up to three years in prison. PC 529 requires that the prosecution show that the defendant impersonated another person by one of the following means:

  • Posting bail or a bond in the name of another person;
  • Document in the name of another person is verified, published, acknowledged, or proven to be true (i.e., pretending to be someone else to cash a check made out to that person;
  • Doing something that makes another person civilly or criminally liable for the defendant’s actions or subject to any other penalty or charges. This might be as simple as signing their name or taking their picture or fingerprints at the police station.

What Tactics Criminals May Use to Impersonate Someone?

To impersonate you, a criminal may have used any one of several tactics:

Criminals can infiltrate your computer system

Cybercriminals may make attempts to hack your email. For example, they might send an urgent notification that an account you own is about to be shut down until you verify your bank or personal details. A web link will most likely be included in the email to allow you to provide the fraudster with your personal information. White-collar thieves may utilize your personal information in a variety of ways. A hacker may get their hands on your email and begin sending spam. They may be able to get access to your computer and watch your activity directly. Scammers may target your bank accounts. Fraudsters might get your personal information in several ways, even when you avoid phishing or hacking attempts.

Scammers may use your email address to send fraudulent emails to you

A Forbes article claims that scammers in the real estate sector may send emails purporting to be from agents or other parties involved in the transaction to deceive unsuspecting property purchasers. Looking at the email address first, you cannot tell whether it is correct. The emails may have all the correct names and formatting. If the email address differs by even a single character from the legitimate one, you’ve probably received a fake.

Email spoofing does not need a hacker breaking into your computer. To set up a fake email account, fraudsters might hunt for email addresses or other information on public sites. These thieves may target anybody, from business owners and financial institutions to real estate brokers and other service providers.

Fake social media profiles

Deceptive individuals and organizations use stolen photographs, logos, and other identifying information to set up phony social media profiles to spread misinformation. There are many bogus social media accounts since it is the most straightforward method of impersonation for fraudsters. As a result, scammers may take advantage of the fact that freshly established accounts aren’t immediately visible. These periods of low visibility are exploited by impersonators who target clients with aggressive false advertising campaigns. Customers are typically routed to a website outside the social network, where the fraudster offers counterfeit items purporting to be the original brand.

Internet Impersonation

Someone abusing you may also use your personal information to pretend to be you online, inviting others to harass or harm you. In other cases, attackers may even impersonate someone else to get others to assault you. This “dream” may be described as a “rape fetish” in the ad or online post by the abuser, who would then beg for someone to fulfill this wish.

For the person sexually assaulting you to believe that your protest or resistance is part of some “role-playing,” these kinds of internet postings are made. It is very uncommon for rape charges to be made against both the abuser who posts the message and the perpetrator of the crime to be charged with rape or solicitation to rape.

It’s time to explore an internet reputation management service if the law cannot aid you. After all, imitation is only detrimental if others can notice it. Impersonation will have little effect if you drown it in a sea of accurate and reliable facts. In the long run, the fraudster will likely give up and solve your issue.

Need an Attorney? CALL NOW: 310-274-6529

Seppi Esfandi is an Expert Attorney who has over 21 years of practice defending a variety of cases.

Contact Us:         
Esfandi Law Group QR Code
Esfandi Law Group
Lara S.
December 3, 2019
Seppi had my case reduced to just an infraction, and thanks to him I was able to keep my job. Jorge was extremely helpful too, the reason I went with this law firm. Overall pleased.

How to Win Your Case

We cannot stress enough that you read, understand and follow these 10 basic rules if you are criminally charged or under investigation:

  1. Don’t ever talk to the police
  2. Do not discuss your case with anyone
  3. Everything you tell your lawyer is confidential
  4. Tell police you need to contact your attorney
  5. Never consent to any search by the police
  6. If the police knock on your door, don't answer!
  7. Realize the consequences of a criminal conviction
  8. Your lawyer (not you) will contact any witnesses
  9. Information on your cell phone is evidence
  10. Early Intervention is the key

Get a Free Consultation

    Free Consultation Form