The Power of Malicious Digital Impersonation