Fake ProPublica Reporter Scams Raise U.S. Security Alarm

ProPublica impersonation – Impersonators used a ProPublica reporter’s identity on Signal and WhatsApp to approach overseas sources tied to Ukraine—highlighting rising risks for U.S. journalists.
A call from a number with a Canadian area code sounded like a warning, not a conversation starter.
The journalist said the person on the line claimed to be a Canadian military official and asked whether he’d been contacting him on WhatsApp.. The reporter quickly realized the uncomfortable truth: someone was impersonating him online. using his name and headshot to approach people—first with a Canadian contact tied to work involving Ukraine. then with a Latvian businessman connected to drone development.
How the impersonation worked
The first outreach arrived from a WhatsApp account using the reporter’s ProPublica identity and photo.. The exchange. shared later through screenshots. suggested the impostor wasn’t asking for money or trying to trigger a typical consumer scam.. Instead. the messages focused on whether the reporter could “get in touch” and on subject matter tied to overseas military interests.
Two weeks later, the pattern reappeared in a different form.. This time the contact came through LinkedIn. where a Latvian businessman warned he was concerned he wasn’t speaking to the “real” person he believed he was messaging.. Screenshots showed a Signal conversation attempt: an account using the reporter’s image claimed expertise in UAVs—drones—and pushed for written “secure” communication while repeatedly avoiding ordinary phone contact.
The Latvian grew suspicious, and the impersonator attempted to steer the interaction toward a video chat setup described as secure. In practice, the steps appeared designed to extract access to the businessman’s email account—an escalation from identity fraud into a potential phishing play.
That sequence matters because it shows a shift in how online impersonation campaigns are evolving. They may begin as credibility theft—borrowing a journalist’s face, name, and reputation—and then move toward the real objective: information access.
Why it matters for U.S. politics and national security
Impersonation isn’t just a media problem.. Investigative reporting is one of the few parts of the political system that regularly connects public interest to private wrongdoing—often by relying on sources who have reasons to stay quiet.. When scammers use journalist identities to contact people connected to foreign militaries, they can chill legitimate outreach and compromise operations.
In these cases, the reporter’s concern centered on foreign military activity, including Ukraine-linked work.. That makes the risk more than reputational.. If a scammer gains access to an individual’s email or messaging account. they can potentially map networks. obtain prior communications. and then reach into the same channels that journalists and their sources use.. Even partial compromise can be enough to reroute a sensitive conversation, delay a decision, or reveal a person’s contacts.
This is also a U.S.. security issue because American officials. journalists. and activists routinely interact across borders—whether through policy processes. court cases. oversight efforts. or diplomacy.. A tactic that targets a journalist in one country can quickly become a template for targeting other U.S.. institutions.
The secure-messaging trap
The scams described here took place on WhatsApp and Signal—apps designed with user privacy in mind. That privacy can help genuine sources communicate safely, but it also reduces some of the visibility that would make impersonation easier to detect.
Signal’s model is intentionally restrictive: it stores very limited information about users.. The same design that protects legitimate conversations also means blocking and attribution can be harder once a fake account is already messaging someone.. WhatsApp. meanwhile. can act against accounts based on behavior and policy enforcement. but even that doesn’t eliminate the risk of impersonators reaching targets before any action is taken.
In this instance, the reporter said reporting the fake accounts was among the few practical options once the interactions began.. But the limits were clear: without stronger verification systems—something most privacy-focused platforms avoid because it can erode the very anonymity they protect—impostors can keep trying.
For readers and potential sources, the lesson is brutally simple: even encrypted apps don’t stop identity fraud.
What journalists and sources can do now
The reporter’s response wasn’t just to document the scams; it was to push a verification routine that anyone interacting with a journalist can apply.
Every ProPublica reporter has a bio page with direct contact information. including a Signal handle or username and an email address.. The advice is to verify identity through those official channels before engaging with anyone who claims to represent a newsroom.. The same approach applies broadly: check an outlet’s website and confirm the handle. email domain. or official social accounts before trusting a message.
That isn’t paranoia—it’s operational discipline.. In sensitive political reporting, a single compromised account can create cascading damage.. A source might delay sharing information, choose safer but less timely channels, or walk away entirely.. The political impact is indirect but real: fewer credible sources, slower investigative timelines, and a higher barrier to accountability.
The bigger editorial point is that misinformation and deception aren’t confined to election cycles or partisan messaging. They can show up in private inboxes, behind familiar faces, and in the quiet steps that lead to what ends up on the record.
The policy challenge ahead
U.S.. policymakers already recognize cyber threats as a national concern. and the FBI has warned about intrusion tactics involving messaging and impersonation.. Still. the technology fight creates a recurring dilemma: platforms want privacy. governments want trust and security. and users want both safety and simplicity.
For journalists, the demand is clear—make verification easier without undermining source safety. For platform operators, the demand is harder—reduce impersonation risk without collecting enough user data to threaten the core promise of encrypted communication.
If impersonators keep scaling up. expect more pressure on news organizations to standardize verification methods and on platforms to refine enforcement against fake accounts.. Until then. the most reliable defense remains the same across every platform: confirm identity through official channels and treat unexpected contact—especially from “journalists” asking for communication outside normal procedures—as a potential threat.
That’s the uncomfortable takeaway from the calls and screenshots: the scams don’t just spoof a reporter’s face. They try to exploit the trust that investigative work depends on.
Trump expedites review of psychedelics for mental health