Skip to main content

New story in Technology from Time: When a Teenager Reportedly Invented a Fake Congressional Candidate, Twitter Verified the Made Up Politician’s Account



Twitter verified an account for a fake Republican Rhode Island congressional candidate named Andrew Walz that was actually run by a teenager, CNN Business first reported on Friday. The account has since been permanently suspended in violation of Twitter’s rules, a spokesperson confirmed to TIME.

The 17-year-old high school student — who agreed to speak with CNN Business on the condition that his name not be used — reportedly lives in upstate New York. He told CNN Business he made a website for the fake candidate in “around 20 minutes” and the Twitter account in “maybe five minutes.” He said he got the fake candidate’s picture from a website called This Person Does Not Exist, which uses machine learning to generate realistic yet fake faces.

Why’d he do it? Because he was “bored” and wanted to test Twitter’s “election integrity efforts,” CNN Business reports.

The teen told CNN Business that he then submitted both the Twitter account and website to Ballotpedia, a nonprofit that bills itself as a “digital encyclopedia of American politics and elections.” Twitter has partnered with Ballotpedia to help identify political candidates to verify as the 2020 election swiftly approaches. Ballotpedia sends Twitter a list of candidates once a week to help with their verification process, and Twitter also reportedly investigates each candidate.

The fake candidate Andrew Walz was both listed on Ballotpedia and verified on Twitter, per CNN Business. The teen reportedly said that neither Twitter nor Ballotpedia asked for documentation to prove the candidate was real.

“We’ve put into place a rigorous process to ensure that, through our partnership with Ballotpedia, we accurately identify and verify candidates’ legitimate Twitter accounts,” a Twitter spokesperson said in a statement to TIME. “Sometimes, this thorough process can cause a short delay between when candidates qualified for the primary ballot and when candidates are verified.”

“Unfortunately, an individual found loopholes in our process by submitting a fake candidate and a fake account for verification,” she continued. “As soon as we discovered this, we took action on the account.” Creating a fake candidate account violates Twitter’s rules, and the account has been permanently suspended, per the spokesperson.

While Ballotpedia did not immediately respond to TIME’s request for comment Geoff Pallay, Ballotpedia’s editor in chief, issued a response to CNN Business that said, “Ballotpedia definitely made a mistake here.”

CNN Business reports that Pallay explained how the candidate was approved for the site without having filed official campaign documents. “Many candidates generate campaign activities, such as establishing an online presence, far in advance of their states’ filing deadlines. Because of that, we have observed a category of ‘declared candidate’ versus an ‘officially filed candidate,'” Pallay reportedly said. He added that Ballotpedia had been sending Twitter a list of candidates who had both declared and officially filed without distinguishing the difference, and Ballotpedia will make that distinction in the future, per CNN Business.

While Walz’s Ballotpedia page still exists, it now only includes a statement that says, “Ballotpedia was notified on Feb. 27, 2020, at 12:29 p.m. EST that Andrew Walz was not a legitimate candidate for office… Upon investigating this claim, we removed his entry from our database on Feb. 28, 2020. We have updated our declared candidate policy as a result of this situation.”

Comments

Popular posts from this blog

Slashdot: US Army Soldier Arrested In AT&T, Verizon Extortions

US Army Soldier Arrested In AT&T, Verizon Extortions Published on January 01, 2025 at 02:35AM An anonymous reader quotes a report from KrebsOnSecurity: Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea. Cameron John Wagenius was arrested near the Army base in Fort Hood, Texas on Dec. 20, after being indicted on two criminal counts of unlawful transfer of confidential phone records. The sparse, two-page indictment (PDF) doesn't reference specific victims or hacking activity, nor does it include any personal details about the accused. But a conversation with Wagenius' mother -- Minnesota native Alicia Roen -- filled in the gaps. Roen said that prio...

Slashdot: US Army Soldier Pleads Guilty To AT&T and Verizon Hacks

US Army Soldier Pleads Guilty To AT&T and Verizon Hacks Published on February 20, 2025 at 01:31AM Cameron John Wagenius pleaded guilty to hacking AT&T and Verizon and stealing a massive trove of phone records from the companies, according to court records filed on Wednesday. From a report: Wagenius, who was a U.S. Army soldier, pleaded guilty to two counts of "unlawful transfer of confidential phone records information" on an online forum and via an online communications platform. According to a document filed by Wagenius' lawyer, he faces a maximum fine of $250,000 and prison time of up to 10 years for each of the two counts. Wagenius was arrested and indicted last year. In January, U.S. prosecutors confirmed that the charges brought against Wagenius were linked to the indictment of Connor Moucka and John Binns, two alleged hackers whom the U.S. government accused of several data breaches against cloud computing services company Snowflake, which were among the ...

Slashdot: AT&T Now Lets Customers Lock Down Account To Prevent SIM Swapping Attacks

AT&T Now Lets Customers Lock Down Account To Prevent SIM Swapping Attacks Published on July 02, 2025 at 01:30AM AT&T has launched a new Account Lock feature designed to protect customers from SIM swapping attacks. The security tool, available through the myAT&T app, prevents unauthorized changes to customer accounts including phone number transfers, SIM card changes, billing information updates, device upgrades, and modifications to authorized users. SIM swapping attacks occur when criminals obtain a victim's phone number through social engineering techniques, then intercept messages and calls to access two-factor authentication codes for sensitive accounts. The attacks have become increasingly common in recent years. AT&T began gradually rolling out Account Lock earlier this year, joining T-Mobile, Verizon, and Google Fi, which already offer similar fraud prevention features. Read more of this story at Slashdot.