The decision got here from a quantity I didn’t acknowledge, with a Canadian space code.
A steely voice on the opposite finish of the road greeted me, figuring out himself as an official with the Canadian army.
He had a query: Had I been reaching out to him on WhatsApp, making an attempt to work him for data?
I paused. As an investigative reporter at ProPublica, I’m reaching out to lots of people on a regular basis. However as I racked my mind, I couldn’t consider any Canadians I had lately tried to develop as sources.
It appears as if somebody is impersonating you, the person warned.
I used to be at a loss. What was Pretend Me asking about? Had been they only utilizing my identify or my image too? How might I be certain the particular person warning me about this impostor wasn’t really an impostor himself?
The Canadian official assured me he’d ship a message from his authorities e-mail to substantiate his identification, and he’d embody screenshots of his dialog with Pretend Me. I thanked him, and we exchanged some pleasantries. Earlier than saying goodbye, I requested him if there was something he’d wish to get on the radar of an investigative reporter. (With out even realizing it, I used to be working him for data. Perhaps Pretend Me and Actual Me aren’t so totally different.)
The screenshots the Canadian despatched over later confirmed somebody with a Miami quantity utilizing my ProPublica headshot as their profile pic. I’ve by no means lived in Florida.
“That is Robert Faturechi from ProPublica,” Pretend Me wrote. “I actually need to get in contact with you.”
The Canadian requested me to not publicly reveal too many particulars about his work, but it surely entails coping with different nations, together with Ukraine.
I alerted our safety staff at ProPublica. They advised me that there was little we might do other than reporting the pretend account to WhatsApp.
We did, and I put the matter behind me — till two weeks later, after I received one other warning.
This time it was a Latvian businessman who stated he runs a corporation offering tools to the Ukrainian army and is concerned in a drone growth challenge with Ukrainian forces.
“Hey!” the Latvian wrote to me on LinkedIn. “Was good to speak on Sign! Let’s join right here as properly!”
The one downside was I had by no means chatted with him on Sign, the encrypted messaging app.
The Latvian reached out to me on LinkedIn as a result of he was involved he wasn’t speaking to Actual Me on Sign. He despatched over screenshots of somebody utilizing my headshot and claiming to be me.
“Am I proper in understanding that you’re an knowledgeable within the subject of UAVs?” Pretend Me had messaged the Latvian, referring to unmanned aerial automobiles, a flowery time period for drones.
“My purchasers,” the impostor defined, “are notably within the software of UAVs in Ukraine.”
The Latvian had supplied to debate the subject in a telephone name, however Pretend Me (who could possibly be a person or lady) declined, saying they weren’t “comfy” speaking on the telephone. They requested to proceed the “dialog in written format” or if the Latvian might “file a voice message on this matter.”
The Latvian, rising suspicious, insisted on a video name. Pretend Me relented, sending him step-by-step directions they stated would end in a safe video chat, however that really appeared to have been an try and trick the Latvian into giving up entry to his e-mail account.
The Latvian in the end blocked Pretend Me.
The impersonations have been disquieting. Investigative reporting is tough sufficient with public belief in media so low and people in energy stepping up assaults towards journalists. Scammers giving potential sources one other factor to fret about simply makes our work tougher.
I can’t make sure what Pretend Me is as much as, however posing as a journalist on this manner appears to be the most recent evolution in on-line deception. ProPublica has chronicled the darkish world of pig butchering, by which human traffickers in Asia drive their victims to rip-off folks by posing as buddies or potential romantic pursuits. In these circumstances, the aim is money.
However typically the target is stealing delicate data. And even subtle actors can fall sufferer to so-called phishing assaults, by which scammers impersonate legit entities. One of the vital notable and maybe consequential cases was when John Podesta, chair of Hillary Clinton’s 2016 presidential marketing campaign, fell sufferer to an e-mail purporting to be a Google safety alert, giving hackers entry to his private Gmail account. 1000’s of his emails, a few of them fairly damaging to Clinton and the Democratic Occasion, have been printed on-line.
From the screenshots the Canadian and Latvian despatched me, I might inform Pretend Me wasn’t asking for bank card information or urging anybody to purchase a present card. It didn’t seem like a moneymaking rip-off.
I’m unsure who else they’ve reached out to, however in each circumstances I used to be alerted to, Pretend Me appeared to have an curiosity in international militaries. Perhaps some clunky intelligence operation?
I attempted calling Pretend Me utilizing the telephone quantity they used to achieve out to the Canadian protection official. I received a recorded message saying the road was not in service.
On Sign and WhatsApp, the quantity rang and rang, with out a solution.
There was even much less we might do concerning the second impersonation than we might concerning the first.
Sign retains extraordinarily little details about its customers; it is aware of when somebody first created their account and the telephone quantity they used to take action however shops nothing about who they’re messaging. That’s by design. The hands-off strategy is a part of why it’s a protected platform for journalists to speak securely to sources. But it surely additionally makes catching impostor accounts tough. Crimson flags, like sending messages with suspicious hyperlinks, aren’t detectable by Sign. (WhatsApp can’t see the content material of messages until a consumer stories them. It has the power to see who its customers are messaging, however a spokesperson stated it’s uncommon for the corporate to retailer that information.)
Cooper Quintin, a technologist on the digital privateness nonprofit Digital Frontier Basis, stated he had by no means heard of a case like mine on Sign. However total he was noticing an upswing in scams on the safe messaging app. Sign was doing what it might, he stated, resembling including a function that slows down would-be spammers making an attempt to ship many messages in a short while body. Sign additionally makes hyperlinks from unknown senders unclickable. However there are limits to what Sign can do, he stated, with out compromising its hallmark privateness protections for its customers.
“This matches a trajectory. As Sign will get extra well-liked, extra attackers begin to view it as a possible platform for assaults,” stated Quintin, who insisted we speak by way of video chat so he might be certain I wasn’t a web-based impersonator asking to interview him about being impersonated on-line.
Some platforms — resembling Fb and Instagram — enable customers to get verified accounts by which the positioning primarily confirms they’re who they declare to be. But it surely wouldn’t be possible for Sign to do the identical, stated digital safety knowledgeable Runa Sandvik, who consults on safety issues for ProPublica. The nonprofit that runs Sign is small, and verification would require staffing it doesn’t have. Extra considerably, she stated, it might require Sign to gather extra details about its customers, eroding the privateness protections that make it well-liked.
Sign didn’t present remark for this text. A spokesperson for WhatsApp stated “now we have a robust observe file of banning these making an attempt to rip-off others and staying forward of scammers and their ways.” The spokesperson stated WhatsApp “took applicable motion according to our insurance policies” towards the account spoofing me however declined to say what that motion was. On the whole, WhatsApp tries to root out rip-off accounts, even earlier than they’re reported, by monitoring for suspicious habits that features trying to launch many accounts from a single location.
It seems, should you’re contacted by somebody pretending to be a reporter, the easiest way to scuttle their rip-off is to perform a little reporting of your individual.
Each journalist at ProPublica has a bio web page. Right here is mine. On my bio web page, you’ll discover my Sign deal with and e-mail should you click on on the Contact Me button. You possibly can at all times verify the Sign data or e-mail handle on my bio web page to confirm that I’m the particular person contacting you.
That is true for each ProPublica reporter: All of us have our Sign numbers or usernames on our profiles, and all of us have an e-mail ending in @propublica.org.

The identical goes for reporters at different shops. If one reaches out to you and you’ve got doubts, verify their web site and social accounts to confirm their e-mail or Sign or WhatsApp numbers. We’ve heard via the media grapevine and in printed accounts about scams much like mine hitting different organizations as properly.
They embody smaller-scale deceptions. The New York Occasions lately flagged an account on X falsely claiming to be an intern for the information group. In 2023, Reuters reported that two of its reporters in China have been being impersonated by way of Instagram and Telegram accounts that have been trying to get data on activists protesting the nation’s COVID-19 insurance policies. And simply this month, a correspondent for Reuters in Saudi Arabia warned his followers that somebody was impersonating him on WhatsApp.
There are additionally extra subtle campaigns to be on alert for. The German authorities this 12 months launched a imprecise warning about what it described as doubtless a state-sponsored actor trying to commandeer the Sign accounts of presidency officers and reporters throughout Europe. And final month, the FBI introduced that people related to Russian intelligence have been posing as Sign’s safety division to idiot American authorities officers and journalists into offering data that will enable the hackers to take over their accounts. As soon as they’d entry, the FBI warned, they might see conversations and speak to lists, and ship messages because the sufferer.
These scams ought to fear anybody who cares about investigative reporting. All through my profession, I’ve accomplished delicate tales exposing wrongs in politics, finance, the army and regulation enforcement. Lots of them relied on brave people who’ve taken leaps of religion and shared data, typically at actual private danger. I’m going to nice lengths to guard my sources and ensure they’re comfy taking that danger. If potential sources must doubt that I’m who I say I’m, they might be much less more likely to interact.
When journalists are impersonated on-line, like I’ve been, Sandvik stated they shouldn’t be quiet about it.
“If and when it does occur, be very public about it, which is what you’re doing now,” she stated. “Let folks know that is taking place so if folks hear from you, they know that is one thing to look out for.”

