Definition

The structural failure of intimate-image-protection statutes to account for third-party catfishers — actors who pose as the intended recipient of private media and, having obtained it, distribute it publicly. The statutes were written for the ex-partner / direct-distributor model; they do not have operational language for “a stranger impersonating an intimate partner through a stolen identity.” When a catfish mediates every step of the interaction, the statutory chain of intent, consent, and distribution breaks in specific ways that favor whichever party the court can reach.

Why It Matters for the Newsletter

Catfishing-as-legal-gap is the mechanism that makes Reachability Routing brutal in intimate image cases. The plaintiff has a real injury. The statute is the right shape. But the statute assumes a direct relationship between the private-sharer and the public-harmer, and the catfish sits in between, invisible to the statute’s vocabulary. When the catfish is also jurisdictionally unreachable (as in Solo (Ben Conway)‘s case), the legal machinery has no way to route liability to the actual wrongdoer and defaults to the reachable party who was themselves deceived.

For TCN readers, this is a useful precise instance of a broader pattern: law as a technology built around assumptions that digital-era facts violate systematically.

Evidence & Examples

  • Doe v. Bonnell (1-25-cv-20757) — Destiny shared intimate media with a Discord account bearing a real teenager’s name and photos but controlled by an anonymous adult UK catfisher. The statute has no operational concept of this. Rose’s deposition establishes the factual shape; the pleadings proceed as if the catfish did not exist.
  • Platform identity verification gap. Discord, Snapchat, Twitter, and similar platforms allow account creation with another person’s photos and name provided no direct login hijacking occurs. This is not fraud in most jurisdictions. It is also the mechanism by which catfish operations scale.
  • Yubo and under-18 platforms. Solo met Rose on Yubo, which is marketed to minors. Adults are technically prohibited but routinely present. The platform bears no liability for impersonation operations that originate there.
  • The “grooming + identity theft + NCII operation” combined harm. Rose experienced three distinct statutory harms simultaneously — under-age grooming, identity theft, and having her identity used in an NCII distribution chain. None produced a single coherent cause of action with a reachable defendant.

Tensions & Counterarguments

  • “The statute covers recipients.” In principle, an NCII statute could punish Solo for redistributing the media. In practice, Solo is in the UK, anonymous, and effectively immune to US civil process.
  • “Destiny still knew he was sharing intimate media.” True. The question is whether his intent covers the particular harm of public distribution by a catfisher posing as a trusted partner. The statute, as currently drafted, does not draw that distinction; the answer is a policy choice, not a factual one.
  • “Fix the platforms.” Section 230 and its analogs make the platform route politically impractical. The catfish gap is not primarily about platform design; it is about statutory design.

Key Sources