recommended reading

Is it Illegal to Impersonate the Boston Marathon Bombing Suspects (or Anyone Else) on Twitter?

Flickr user eldh

After video of the Boston Marathon bombing suspects was released, journalists and citizen-sleuths turned to social media to find their digital footprint. They were greeted with a wealth of information. Not all of it was true.

By mid-day Friday, there were a number of Twitter accounts registered under the name of one of the suspects, Dzhokar Tsarnaev, who remained at large. Some featured photos released by the Federal Bureau of Investigation as the account’s profile picture.

News outlets including Quartz (which, like National Journal, is part of Atlantic Media) and Slate did some sleuthing and reported that one account that was receiving a lot of attention was a fake; later, ABC News reported that a different account belonged to Tsarnaev.

It’s not yet clear what Tsarnaev’s social media presence has been. But it seems implausible that he owns all of the accounts now registered in his name. Some must be impersonations (at least one is explicitly so). But can the people who created those fake accounts get in trouble?

Depends on what they say.

The clearest-cut example of a person who could face legal trouble for their Tsarnaev account is the person with the account by the name of @Dzhokar_A that features a widely-distributed photo of Tsaernaev. The owner of this account tweeted at the Boston Police’s official Twitter feed: “I will kill you all as you killed my brother.” The real Tsarnaev’s brother was killed in a firefight with police early Friday morning. Making threats against the lives of police officers is a crime, whether online or off.

But not all of the accounts under Tsarnaev’s name are making threats. Other Tweets ranged from, “am I famous yet ?” (@Dzhokharr) to “#ImSoTiredOf hearing people butcher my name. Come on everyone, sound it out!” (@dzhokartsarnae). The legal implications of those tweets are less clear. In 2012, the Supreme Court ruled that lying about military honors is not a crime. Is lying about being someone else not always a crime? 

Part of it depends where you are, although due to the vast scope of the internet, it’s not clear whether whoever is behind the accounts would be subject to state or federal law or both. Twitter accounts that are less oriented toward parody and more toward impersonation could be prosecuted under federal laws criminalizing false information and threats, or hoaxes. Trying to get a laugh out of your roomate is different than trying to persuade investors to snap up a stock.

And several states have laws prohibiting online impersonation. Although they vary, generally, to be a crime, impersonation must be committed with the intention of gaining a benefit, such as money, or defrauding someone. In California, for example, “Any person who knowingly and without consent credibly impersonates another actual person through or on an Internet Web site or by other electronic means for purposes of harming, intimidating, threatening, or defrauding another person is guilty of a public offense punishable pursuant to subdivision (d).” In Massachusetts, the goal must be “to obtain or to attempt to obtain money, credit, goods, services, anything of value.”

No wonder, Poynter, a journalism website, warned reporters not to be hoodwinked by fake accounts as they raced to provide information about the now-named suspects. If false information posted on Twitter distracts the police from their work, it could be conceivably be considered an obstruction of the investigation.

Even if, say, a district attorney wanted to prosecute a Twitter faker they would "have to literally put the person in the place at the time of the criminal activity. Just because something happened or something appears to be from someone’s account doesn’t mean the person whose account it’s from actually created the content,” said Bradley Shear, a social media law expert.

Twitter, for what it’s worth, has its own impersonation policy. “Impersonation is a violation of the Twitter Rules. Twitter accounts portraying another person in a confusing or deceptive manner may be permanently suspended under the Twitter Impersonation Policy,” the social-media site says. However, “Twitter users are allowed to create parody, commentary, or fan accounts (including role-playing)… In order to avoid impersonation, an account's profile information should make it clear that the creator of the account is not actually the same person or entity as the subject of the parody/commentary.” But of course clearly labeling something a joke--say, FakeJenniferLawrence--isn't that funny. So fake sites are going to keep popping up.

(Image via Flickr user eldh)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.