Impersonations or false identities are used to bypass controls,
manage perception, or create conditions amenable to attack. Examples
include spies, impersonators, network personae, fictional callers, and many
other false and misleading identity-based methods.
Complexity: This appears
to be a very complex social, political, and analytical issue that is nowhere
near being solved.
fc@red.a.net