Impersonator

Last updated
Impersonators of Kim Jong-un (Howard X) and Donald Trump (Dennis Alan) during the 2018 North Korea-United States Singapore Summit Kim Jong-un and Donald Trump impersonators.jpg
Impersonators of Kim Jong-un (Howard X) and Donald Trump (Dennis Alan) during the 2018 North Korea–United States Singapore Summit
Patrick Knight as Boy George Patrick Knight as Boy George.jpg
Patrick Knight as Boy George
An impersonator of George Michael George-Michael-Impersonator.jpg
An impersonator of George Michael
Theodore Roosevelt impersonator Joe Wiegand performs October 27, 2008 in the East Room of the White House, during a celebration of Roosevelt's 150th birthday. Joe Wiegand TR WhiteHouse 2008.jpg
Theodore Roosevelt impersonator Joe Wiegand performs October 27, 2008 in the East Room of the White House, during a celebration of Roosevelt's 150th birthday.

An impersonator is someone who imitates or copies the behavior or actions of another. [1] There are many reasons for impersonating someone:

Contents

Celebrity impersonators

A Michael Jackson impersonator for the 25th anniversary of the album Thriller at the 2008 Tribeca Film Festival with performers from Step It Up and Dance. Michael Jackson impersonator for Thriller 25th anniversary.jpg
A Michael Jackson impersonator for the 25th anniversary of the album Thriller at the 2008 Tribeca Film Festival with performers from Step It Up and Dance.
A Madonna wannabe, an impersonator of Madonna's 1980s looks and fashion style. 1980s Madonna style.jpg
A Madonna wannabe, an impersonator of Madonna's 1980s looks and fashion style.

Celebrity impersonators are impostors who look similar to celebrities and dress in such a way as to imitate them. Impersonators are known as sound-alikes, look-alikes, impressionists, imitators tribute artists and wannabees. The interest may have originated with the need or desire to see a celebrity who has died.[ citation needed ] One of the most prominent examples of this phenomenon is the case of Elvis Presley. Edward Moss has appeared in movies and sitcoms, impersonating Michael Jackson. [3] [4] Tom Jones has attracted his share of impersonators from different places around the world. From the United States, to South East Asia, to the UK, there are performers who either sound like him or imitate his act. [5] [6] [7] [8]

Criminal impersonation

In England and Wales, the Poor Law Amendment Act 1851, section 3, made it an offence to impersonate a "person entitled to vote" at an election. In the case of Whiteley v Chappell (1868), the literal rule of statutory interpretation was employed to find that a dead person was not a "person entitled to vote" and consequently a person accused of this offence was acquitted. [9]

Although in a Colorado case, an immigrant was charged with "criminal impersonation" for using another person's Social Security number when signing up for a job,[ citation needed ] some courts have ruled that supplying this wrong information may not be criminal. [10] The ruling hinges on whether there was harm to the other person.[ citation needed ]

Impersonation using Deepfake

Audio deepfakes have been used as part of social engineering scams, fooling people into thinking they are receiving instructions from a trusted individual. [11] In 2019, a U.K.-based energy firm's CEO was scammed over the phone when he was ordered to transfer €220,000 into a Hungarian bank account by an individual who used audio deepfake technology to impersonate the voice of the firm's parent company's chief executive. [12]

As of 2023, the combination advances in deepfake technology, which could clone an individual's voice from a recording of a few seconds to a minute, and new text generation tools, enabled automated impersonation scams, targeting victims using a convincing digital clone of a friend or relative. [13]

See also

Related Research Articles

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

<span class="mw-page-title-main">Look-alike</span> Person who closely resembles another person

A look-alike, double, or doppelgänger is a person who bears a strong physical resemblance to another person, excluding cases like twins and other instances of family resemblance.

<span class="mw-page-title-main">Elvis impersonator</span> Musician who performs in the style of Elvis Presley

An Elvis impersonator is an entertainer who impersonates or copies the look and sound of American musician and singer Elvis Presley. Professional Elvis impersonators, commonly known as Elvis tribute artists (ETAs), work all over the world as entertainers, and such tribute acts remain in great demand due to the unique iconic status of Elvis. In addition, there are several radio stations that exclusively feature Elvis impersonator material. Some of these impersonators go to Graceland on the anniversary of Presley's death to make their personal tribute to the artist.

<span class="mw-page-title-main">Impressionist (entertainment)</span> Performer whose act consists of imitating sounds, voices and mannerisms of celebrities

An impressionist or a mimic is a performer whose act consists of imitating sounds, voices and mannerisms of celebrities and cartoon characters. The word usually refers to a professional comedian/entertainer who specializes in such performances and has developed a wide repertoire of impressions, including adding to them, often to keep pace with current events. Impressionist performances are a classic casino entertainment genre.

<span class="mw-page-title-main">Rich Little</span> Canadian-American impressionist and actor

Richard Caruthers Little is a Canadian-American comedian, impressionist and voice actor. Sometimes known as the "Man of a Thousand Voices", Little has recorded nine comedy albums and made numerous television appearances, including three HBO specials.

<span class="mw-page-title-main">Cultural depictions of Elvis Presley</span>

Elvis Presley has inspired artistic and cultural works since he entered the national consciousness. From that point, interest in his personal and public life has never stopped. Some scholars have studied many aspects of his profound cultural influence. Billboard historian Joel Whitburn declared Presley the "#1 act of the Rock era".

Paul Edward Boland Jr. is an American impressionist, singer, and announcer.

<span class="mw-page-title-main">Human image synthesis</span> Computer generation of human images

Human image synthesis is technology that can be applied to make believable and even photorealistic renditions of human-likenesses, moving or still. It has effectively existed since the early 2000s. Many films using computer generated imagery have featured synthetic images of human-like characters digitally composited onto the real or other simulated film material. Towards the end of the 2010s deep learning artificial intelligence has been applied to synthesize images and video that look like humans, without need for human assistance, once the training phase has been completed, whereas the old school 7D-route required massive amounts of human work .

A soundboard is a computer program, Web application, or device, formerly created in Adobe Flash, that catalogues and plays many audio clips. Soundboards are self-contained, requiring no outside media player. In recent years soundboards have been made available in the form of mobile apps available on iPhone App Store and Google Play. Since Adobe and web browser developers deprecated support for Flash, HTML5-based soundboards have gained popularity in recent years.

<span class="mw-page-title-main">Romance scam</span> Confidence trick using romantic intentions

A romance scam is a confidence trick involving feigning romantic intentions towards a victim, gaining the victim's affection, and then using that goodwill to get the victim to send money to the scammer under false pretenses or to commit fraud against the victim. Fraudulent acts may involve access to the victim's money, bank accounts, credit cards, passports, e-mail accounts, or national identification numbers; or forcing the victims to commit financial fraud on their behalf.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

<span class="mw-page-title-main">Elvis sightings</span> Conspiracy theory about Elvis Presley

Sightings of the American singer Elvis Presley have been reported following his death in 1977. The conspiracy theory that Elvis did not die and instead went into hiding was popularized by Gail Brewer-Giorgio and other authors.

Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information. Social hacking is most commonly associated as a component of “social engineering”.

Deepfakes are synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another. It can also refer to computer-generated images of human subjects that do not exist in real life. While the act of creating fake content is not new, deepfakes leverage tools and techniques from machine learning and artificial intelligence, including facial recognition algorithms and artificial neural networks such as variational autoencoders (VAEs) and generative adversarial networks (GANs). In turn the field of image forensics develops techniques to detect manipulated images.

A SIM swap scam is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.

Digital cloning is an emerging technology, that involves deep-learning algorithms, which allows one to manipulate currently existing audio, photos, and videos that are hyper-realistic. One of the impacts of such technology is that hyper-realistic videos and photos makes it difficult for the human eye to distinguish what is real and what is fake. Furthermore, with various companies making such technologies available to the public, they can bring various benefits as well as potential legal and ethical concerns.

An SSA impersonation scam, or SSA scam, is a class of telecommunications fraud and scam which targets citizens of the United States by impersonating personnel of the Social Security Administration. SSA scams are typically initiated by pre-recorded messages, or robocalls, which are designed to panic the victim so that they follow the scammer's instructions. In 2018, over 35,000 incidences of SSA scam robocalls were reported to the Better Business Bureau, and the total losses of victims added up to over $10 million. It is believed that approximately 47% of Americans were subject to an SSA impersonation scam robocall during a three-month period in mid- to late 2020, and that 21% of seniors were targeted by at least three SSA scam robocalls in the same time period.

<span class="mw-page-title-main">Hollywood Con Queen scam</span> Scam perpetrated by Hargobind Punjabi Tahilramani

The "Con Queen" scam is a long-running and elaborate scam perpetrated by the so-called Hollywood Con Queen, an Indonesian impostor named Hargobind Punjabi Tahilramani who was eventually found and arrested. The con, which was successfully operated for several years, targets entertainment industry gig workers, who travel to Indonesia believing that they have been recruited to work on the production of a film or television show.

<span class="mw-page-title-main">Madonna impersonator</span>

A Madonna impersonator is an entertainer who impersonates American singer-songwriter Madonna. Professional or dedicated Madonna impersonators have existed since at least the mid-1980s, and were sometimes sorted as "tribute acts". As an established artist, Madonna impersonators have seen a notable demand, many of them performing in front of thousands people and visiting several countries in their professional Madonna career as some media outlets have reported. Notable Madonna impersonators include Denise Bella Vlasis and Venus D-Lite. Others impressionists have included Madonna in their repertoire, such as Tracey Bell, Charlie Hides and Véronic DiCaire.

References

  1. "Impersonator". The Free Dictionary. Retrieved 2010-01-03.
  2. "Town of the Living Dead". LA Review of Books. October 15, 2013. Retrieved December 17, 2023. He is a Ralph Waldo Emerson reenactor. This man gets paid to dress like, act like, and speak like Ralph Waldo Emerson. He's 63 years old and wears a black frock coat...'I use the term 'historic interpreter' or 'living historian.' But when people say 'impersonator,' that doesn't bother me.'
  3. Baker, Bob (March 3, 2005). "King of Pop impersonator star of E! trial re-enactment". The Seattle Times. Archived from the original on July 9, 2009.
  4. John, Alex. "Damn Salvatore Rule" . Retrieved 13 August 2021.
  5. "Column: Golden Knights give Vegas a real sense of community". Los Angeles Times . 2018-04-12. Retrieved 2024-03-19.
  6. Billboard, May 9, 1998 - Page 60 Newsmakers, Now The Real Thing.
  7. MICHAEL, STUART. "Warren makes time for grandson". The Star. Retrieved 2024-03-19.
  8. "Stars shine for Sam Sorono at hospice fundraiser - VIDEO - The Star". 2018-04-19. Archived from the original on 2018-04-19.
  9. The Law Commission and the Scottish Law Commission, The Interpretation of Statutes, footnote 66, page 18, published 9 June 1969, accessed 17 December 2022
  10. "Using false S.S. number not impersonation". UPI. October 28, 2010.
  11. Statt, Nick (5 Sep 2019). "Thieves are now using AI deepfakes to trick companies into sending them money". Archived from the original on 15 September 2019. Retrieved 13 Sep 2019.
  12. Damiani, Jesse. "A Voice Deepfake Was Used To Scam A CEO Out Of $243,000". Forbes. Archived from the original on 14 September 2019. Retrieved 2019-11-09.
  13. Schwartz, Christopher; Wright, Matthew (17 March 2023). "Voice deepfakes are calling – here's what they are and how to avoid getting scammed". The Conversation.