← Back to Index

Law Enforcement Methods / Documented & Alleged

Entrapment — Manufactured Crimes, Manufactured Defendants

How federal contractors, undercover handlers and informants create the very crimes they later prosecute. Includes the Alex Jones / Gavin O'Blennis recording, and a personal allegation that the same playbook has been used against me — and, speculatively, against Lil Durk.

What Is Entrapment?

In US law, entrapment is a defence available where a government agent induces a person to commit a crime they would not otherwise have been predisposed to commit. The doctrine has two recognised tests:

In practice the defence almost never succeeds. Federal sting operations — particularly post-9/11 terrorism cases — routinely feature confidential informants paid five- and six-figure sums to befriend targets, supply weapons or instructions, drive them to the location, and record the conversations the FBI later uses at trial. Courts overwhelmingly find "predisposition" once the defendant has been on tape saying anything incriminating, even where the informant did most of the talking.

The structural problem
Once an agency has decided you are a target, the cost of building a case against you is no longer the cost of finding evidence — it is the cost of creating evidence in conditions the agency controls. The informant chooses the topic, the location, the recording moment, and the timing of the arrest. The defendant chooses only whether to take the bait.

Featured Video — Alex Jones & Gavin O'Blennis

entrapmentMethodsFBI.mp4 · Undercover footage referenced by Alex Jones (Infowars) featuring Gavin O'Blennis, described in the recording as a former federal contractor with intelligence-community links. The clip outlines the operational mechanics by which federal stings construct cases — informant cultivation, supplied means, scripted dialogue, and the recording of statements that can be presented to a jury out of context.

Why this footage matters

The value of the O'Blennis material is that it is an insider description — by someone who claims to have worked inside the contractor ecosystem — of the same tactics that civil-liberties groups have documented from the outside for two decades. Whether one accepts every claim in the recording or not, the method described matches the public record on cases like the Newburgh Four, the Liberty City Seven, and a long list of post-9/11 FBI sting prosecutions.

Documented FBI Entrapment Patterns

Sting Architecture

The Newburgh Four (2009)

Federal Court, Southern District of New York

FBI informant Shahed Hussain — paid roughly $96,000 by the Bureau — spent over a year cultivating four men in Newburgh, NY, offering one of them $250,000 to participate in a fake plot to bomb a synagogue. The FBI supplied the (inert) explosives, the (inert) Stinger missile, the target list, and the transport. The trial judge described the defendants as having been targeted because they were vulnerable, not because they posed a real threat — but they were convicted and sentenced to 25 years apiece. The Second Circuit upheld the convictions.

Sting Architecture

Liberty City Seven (2006)

Miami, FL — Federal Prosecution

A group of seven men in a poor Miami neighbourhood were approached by an FBI informant posing as an Al-Qaeda recruiter. The informant supplied the script, the oath of allegiance, and the "operational planning." None of the defendants ever obtained explosives or had any contact with a real terrorist organisation. The first two trials resulted in hung juries; only on the third attempt did the government secure convictions. Civil-liberties groups called the case "thoughtcrime prosecution."

Sting Architecture

The Whitmer Kidnapping Plot (2020)

Michigan — Federal & State Trials

Of the 14 men charged with plotting to kidnap Governor Gretchen Whitmer, the FBI's own filings revealed that at least 12 FBI informants and undercover agents were embedded in the group — outnumbering or matching the actual defendants. Two federal defendants were acquitted by jury and two others had hung juries, in significant part because the defence successfully argued the informants had driven the planning. One lead informant was himself later charged with unrelated crimes.

Method

The Common Pattern

Cultivation

Informant befriends target over months. Builds trust. Identifies emotional, financial or ideological pressure points.

Supply

Informant or undercover agent provides the means — weapons, explosives, money, transport, target intelligence — that the defendant could not otherwise obtain.

Scripting

Conversations are steered by the informant toward incriminating statements. Defendants who hesitate are pressured or shamed into compliance.

Selective Recording

Hours of exculpatory conversation are not recorded or "lost." The seconds of incriminating statement are preserved and edited for trial.

Arrest Theatre

Operation concludes with a public arrest timed for maximum media coverage. The agency announces a "thwarted plot" — the plot it engineered.

Plea Pressure

Defendant is offered 5 years if they plead, 40 years if they fight. 97% of federal cases end in plea agreement. The recordings are never tested at trial.

UK Law — No Entrapment Defence, Just "Abuse of Process"

Unlike the United States, the United Kingdom does not recognise entrapment as a substantive defence. A defendant cannot stand up at trial and say "the police talked me into it" and expect an acquittal on that basis alone. Instead, the only route is the much narrower abuse of process doctrine — an application to the trial judge to stay the prosecution on the ground that to proceed would bring the administration of justice into disrepute.

UK Leading Authority

R v Looseley / Attorney General's Reference (No. 3 of 2000)

House of Lords, [2001] UKHL 53

The Lords set out the test still applied today. A stay should be granted where the conduct of the state agent went beyond providing an unexceptional opportunity to commit a crime, and instead amounted to inciting, instigating, persuading, pressuring or wheedling the defendant into committing an offence they would not otherwise have committed. The test is officer-focused, not defendant-focused — courts look at what the state did, not whether the defendant was "predisposed."

In practice the threshold is so high that successful Looseley applications are vanishingly rare. The courts routinely accept that supplying drugs, money, weapons or transport is an "opportunity" rather than an "inducement," provided the defendant did not have to be talked into anything on the recording.

The CHIS Architecture — Statutory Licence to Manufacture

Where US sting operations rely on policy and prosecutorial discretion, the UK has gone further and put the entire architecture into statute:

Read together
The CHIS Act, the Looseley threshold, and the IPT's NCND posture combine into a regime where: (a) the state can authorise its informant to commit a crime against you, (b) you cannot find out it was authorised, (c) you cannot raise entrapment as a defence at trial, and (d) the only judicial body that could hear a complaint is one whose findings of fact cannot be appealed and whose hearings can be held in secret. There is no equivalent statutory architecture anywhere in the EU.

Documented UK Abuses — Where the Doctrine Was Tested and Failed

Spy Cops · Mitting Inquiry

The Special Demonstration Squad & NPOIU

From 1968 until at least 2010, undercover Metropolitan Police officers — operating under the Special Demonstration Squad (SDS) and National Public Order Intelligence Unit (NPOIU) — infiltrated environmental, anti-racist, anti-fascist, women's-rights and animal-rights groups. Officers formed long-term sexual relationships with activists under false identities; fathered children with women they were targeting; used the names of deceased children as cover identities; and in several documented cases incited the very crimes they later helped prosecute. The ongoing Mitting Inquiry (Undercover Policing Inquiry) has heard evidence of more than 1,000 spied-on groups, with the vast majority engaged in lawful political activity.

Documented Incitement

Mark Kennedy / Ratcliffe-on-Soar (2009)

Undercover officer Mark Kennedy spent seven years embedded in the UK environmental movement under the name "Mark Stone." He participated in planning protests, supplied intelligence, drove activists to actions, and provided logistical resources. The 2009 Ratcliffe-on-Soar power-station occupation prosecution collapsed when it emerged the Crown had withheld evidence that Kennedy had been an agent provocateur. Twenty defendants had their convictions quashed. The Court of Appeal in R v Barkshire [2011] EWCA Crim 1885 described the non-disclosure as "an affront to the public conscience."

Stockwell Six (1972 / quashed 2021)

Five Black men were wrongly convicted in 1972 of attempting to rob a plainclothes officer on the London Underground. In 2021 — nearly 50 years later — their convictions were quashed by the Court of Appeal after evidence emerged that the officer, DS Derek Ridgewell, had been running a corrupt unit fabricating cases against Black men. Ridgewell himself was later jailed for an unrelated robbery. The case is one of dozens now being reviewed where Ridgewell or his unit constructed the offence wholesale.

Extrajudicial Harassment — When the State Skips the Courtroom Entirely

Where prosecution is inconvenient — because the evidence is too thin, the methods would not survive disclosure, or the target is too politically sensitive — the state has alternative tools. These tools sit in a deliberate grey zone described by intelligence professionals as "disruption," conducted under the guise of "national security" and explicitly without court oversight. They are the operational continuation of policy by means designed to leave no judicial paper trail.

The doctrine — disruption without prosecution
The Security Service (MI5) has openly described "disruption" as a legitimate operational outcome alongside prosecution. Where the agency decides that bringing a case is undesirable, the target can instead be subjected to operational harassment calibrated to degrade their capacity to function, organise, communicate, work, travel, sleep, or maintain relationships — without ever being charged with anything. The justification offered to oversight bodies, when offered at all, is "national security."

Documented Harassment Tactics — UK & US

Schedule 7 Stops

The Terrorism Act 2000 lets UK border officers detain anyone at a port for up to 6 hours without suspicion, seize devices, demand passwords, and copy data. Used repeatedly against journalists (David Miranda), activists, and Muslim travellers. No criminal threshold required.

"Visit" Programmes

MI5 and counter-terrorism police conduct uninvited home visits — sometimes daily — to "have a chat" with a target. The visits are non-coercive on paper but operate as continuous reminder that the person is watched. No record of the conversation is given to the target.

Employer & Landlord Approaches

Officers approach an employer, landlord or licensing body and disclose that the target is "of interest." Job loss, eviction or licence refusal follow. The target is not told what was said about them.

Family Targeting

Approaches to parents, siblings, partners and children — to "warn" them about the target. Designed to destroy support networks. Documented across Prevent referrals, FBI Joint Terrorism Task Force visits, and Police Scotland intelligence-led practice.

Financial Pressure

Bank accounts closed without explanation ("de-banking"), payment processors withdrawing service, credit applications denied. Banks cite "internal policy" but the trigger is often a security-service notification under suspicious activity report (SAR) regimes.

Algorithmic Suppression

Platform-level downranking, demonetisation, shadowbanning or account suspension — coordinated through informal liaison channels with platform trust-and-safety teams. The target sees declining reach with no notification of the cause.

"Welfare" Referrals

Anonymous tips to social services, mental-health crisis teams, GPs, or schools — claiming the target is unstable, a danger to themselves or others, or unfit to care for children. Forces the target into adversarial contact with institutions that have coercive power.

Sleep & Sensory Disruption

Persistent noise from neighbours suddenly hostile; vehicles circling; surveillance teams positioned visibly; lights, alarms, and timed delivery of messages designed to fragment sleep and erode cognitive resilience. See Unethical Methods.

Digital Interference

Account compromises, modified webpages on first load, redirected DNS, MITM injection of altered content, fake messages from "friends," voice-cloned phone calls. See My Experience.

Why It Works — The Legal Architecture That Permits It

Extrajudicial harassment is the operational continuation of prosecution by means that bypass disclosure, the rules of evidence, and the right to a trial. It does not require a court because it does not require a verdict. The harm itself is the disposition.
The cumulative picture
Stack the layers: bulk surveillance (IPA 2016) gives the agency the data; CHIS authorisations (CHIS Act 2021) give it deniable human assets; abuse-of-process is the only available defence and almost never wins; the IPT is the only complaints forum and almost never finds against the state; and "disruption" gives the agency a deliberately court-free disposal route. The result is an architecture in which a target can be surveilled, manipulated, manufactured into a defendant, or — if prosecution proves inconvenient — simply destroyed by attrition, with no judicial moment at which any of it is ever tested in public.

Targeting the Vulnerable — Addicts, Mental Health, and Coerced Dependency

One of the most consistent — and most legally insulated — features of state informant operations is the deliberate targeting of people the agency knows in advance are not capable of meaningful consent to the relationship being constructed. Drug addicts, people with serious mental-health conditions, those in financial crisis, the homeless, and the cognitively impaired are not picked despite their vulnerability. They are picked because of it. Vulnerability is operationally useful: it lowers the price of compliance, raises the ratio of inducement-to-incrimination, and reduces the likelihood that the target will ever credibly complain.

Documented Pattern

The Newburgh Court's Own Words

United States v. Cromitie et al., S.D.N.Y. 2011

Judge Colleen McMahon, sentencing the Newburgh Four to 25 years each, openly stated that the FBI "came up with the crime, provided the means, and removed all relevant obstacles" and that "only the government could have made a terrorist out of Mr. Cromitie, whose buffoonery is positively Shakespearean in scope." The lead defendant was unemployed, mentally fragile, and so financially desperate that he had previously offered to sell his kidney. The FBI informant offered him $250,000 over a year of cultivation. The court convicted anyway — because under US "predisposition" doctrine, once you take the bait, the trap is irrelevant.

Behaviour Analysts — Industrialising Vulnerability Targeting

Vulnerability targeting is not improvised by individual handlers. Both the FBI and the National Crime Agency operate dedicated behavioural analysis units whose published remit is criminal profiling, but whose actual operational utility extends into the identification, selection and manipulation of the very targets best suited to the playbook described above.

FBI — Quantico

The Behavioral Analysis Unit (BAU) / NCAVC

National Center for the Analysis of Violent Crime — FBI Critical Incident Response Group

The FBI's Behavioral Analysis Unit, headquartered at the Quantico training academy, is divided into five sub-units covering counter-terrorism (BAU-1), threats to public officials and adults (BAU-2), crimes against children (BAU-3), violent crime against adults (BAU-4), and research/strategy (BAU-5). It is part of the National Center for the Analysis of Violent Crime (NCAVC), which sits inside the Critical Incident Response Group.

BAU analysts are trained at the intersection of forensic psychology, criminology, statement analysis, interview engineering, and what the Bureau itself terms "indirect personality assessment" — building psychological profiles of subjects without ever interviewing them, using only the materials the subject has produced (writings, social-media, recordings, prior interview transcripts). The unit's outputs include:

UK Equivalent

The NCA Behavioural Analysis Function

The National Crime Agency operates an analogous capability — the National Crime Agency Behavioural Analysis function, sitting within its specialist intelligence directorate and routinely deployed in support of serious-and-organised-crime, child-exploitation, and counter-terrorism operations. It is supplemented by behavioural advisers attached to Counter Terrorism Policing and National Counter Terrorism Security Office (NaCTSO), and by the academic-government interface at the Centre for Research and Evidence on Security Threats (CREST). The exact organisational footprint is not fully published; what is public confirms a structurally similar capability to the FBI's NCAVC.

The dual-use problem
On its published face, behavioural analysis is a tool for understanding offenders — work that, in some cases, is genuinely useful. The problem is that the same techniques used to profile a serial offender's psychological structure work equally well for selecting and exploiting a vulnerable target's. The skillset required to predict how a hostage-taker will respond to negotiation is the same skillset required to predict which pressure point will cause an unstable defendant to plead, or which lonely young man will accept an informant's friendship if the approach is staged at the right moment in the right tone. The unit's official customers are investigators. Nothing in its training or doctrine prevents its outputs being used in the other direction.

How Behavioural Profiling Feeds the Vulnerability Pipeline

Pre-Selection

Behaviour analysts review available open-source and law-enforcement-database material on a candidate target — social media, prior contact reports, school/medical records where lawfully accessible — to produce a "suitability" assessment for operational engagement.

Pressure-Point Mapping

The profile identifies what the target most fears, most desires, most struggles to refuse: financial relief, romantic attention, ideological belonging, validation, sleep, escape from withdrawal, contact with an estranged child. Handlers are briefed on which lever to pull and when.

Scripted Engagement

The informant or undercover officer is given a tailored approach script — opening lines, conversational topics, emotional notes — designed to maximise the probability of building trust within a defined window. Failure modes are pre-anticipated.

Real-Time Adjustment

As recordings come back, analysts adjust the operational plan to reflect what is working and what is not. A target who is responding to financial inducement may have the offer escalated; a target who is responding to ideological flattery may receive more.

Interrogation Engineering

If the target is arrested, the BAU provides a customised interrogation plan — when to confront, when to feign sympathy, what to disclose strategically, what false claims to make under the Reid Technique or its UK equivalents. The defendant's psychology has been studied for months before the interview begins.

Discreditation Profiling

If prosecution is not pursued — or the target later complains — the same profile can be repurposed to brief journalists, MPs, or oversight bodies on why the target's account should not be believed. The very vulnerabilities the operation exploited become the reasons the target's complaint is dismissed.

The asymmetry
The defendant in an FBI or NCA case is, almost without exception, an untrained individual with no behavioural-science background, no access to comparable profiling on the officers approaching them, and no ability to detect that the relationship is engineered. The state arrives at the encounter having modelled the target's mind for months. The target arrives having modelled nothing. Calling the resulting interaction "consent" — to a conversation, to a transaction, to a confession — is a category error.

The Addict Targeting Playbook

Identifying the Mark

Targets are identified through medical records, housing data, social services involvement, prior convictions, social-media patterns of drug-related content, or referrals from informants already inside the network. The agency knows the person is dependent before contact is initiated.

The "Friend" Phase

A handler or informant befriends the target — often during a low point: detox, relapse, eviction, bereavement, or hospital discharge. Money, food, drugs, or a place to sleep are offered with no apparent demand for repayment. Trust is purchased over weeks or months.

Cash for "Errands"

Cash payments begin — framed as favours, loans, or pay for trivial tasks. The amounts are large enough to fund a habit and small enough to escape suspicious-activity-report triggers. The target either knows the money is drug money or, on any reasonable view, should have known.

Maintenance of the Addiction

The handler ensures the dependency persists. Detox is discouraged; clean-up offers are dismissed; access to clean accommodation is conditioned on continued cooperation. The target's recovery would end their operational usefulness, so the agency has a structural interest in keeping them unwell.

The Reluctant Witness

When prosecution comes, the addict is either the defendant — too compromised to mount a defence — or the chief witness against someone the agency actually wanted. Their drug use is then quietly disclosed at trial as if it were unrelated background, rather than the leverage by which their testimony was obtained.

Disposable Asset

Once the operational value is exhausted, the target is dropped. Cash flow stops, the "friend" disappears, court support evaporates. Many die of overdose, suicide, or untreated illness within months of being decommissioned. The agency has no statutory duty of aftercare and treats the harm as a sunk cost of operations.

"Should have known"
UK and US law treats the recipient of cash with constructive knowledge that it will be used for drugs as a participant in the supply chain — money laundering, proceeds-of-crime offences, joint enterprise. The same legal doctrine that holds a defendant responsible for what they should have known evaporates when the cash flows in the other direction. A state agent paying an addict knows — on the facts the agency itself collected — that the money will fund drug purchases. There is no equivalent prosecution of the handler. The constructive-knowledge sword cuts only one way.

Documented UK/US Examples

Police Scotland · Public Record

Smith / Dougherty — Cocaine, Surveillance, and Gangsters

The trial of detectives David Smith and Christopher Dougherty (see Scottish Corruption) includes charges that Smith accepted cocaine from organised-crime figure Stephen Gauley while serving on duty, and used cocaine at the Scottish Police College. The case is the inverse of the dynamic described above — officers themselves dependent — but it illustrates how thoroughly the addict / informant / officer pipeline can become a single circulating system in which the same substances move between handler, source, and target.

FBI Informant Practice

"Stash House" Reverse Stings

For two decades the ATF and FBI ran fictitious "stash house" robbery stings, recruiting financially desperate men — many with prior drug convictions or active addictions — to "rob" a non-existent drug-house full of cocaine. The agency selected the amount of drugs (often above mandatory-minimum thresholds), the location, the personnel, and the timing of the arrest. Multiple federal judges (United States v. Black, 9th Cir.; United States v. Conley, N.D. Ill.) have condemned the operations as racially discriminatory and as "government-manufactured crime". The ATF formally suspended the technique in 2016, but only after thousands of convictions had already been secured.

Coercion of the Mentally Ill

Targeting people in poor mental health follows the same operational logic with a different vulnerability surface. Where the addict's compliance is purchased with substance and money, the unwell target's compliance is extracted through destabilisation: deliberately exacerbating symptoms, undermining trust in their own perception, and then exploiting the resulting confusion either to obtain incriminating statements or to discredit anything the target later says.

Why mental-health targeting is coercive
A person whose grasp on reality is being deliberately attacked is, by definition, not in a position to give informed consent to an investigative encounter, refuse a search, decline an interview without legal representation, or reliably distinguish between genuine threats and manufactured ones. Approaching such a person operationally — to extract information, to elicit incriminating statements, or to provoke conduct that can later be charged — is not policing. It is coercion conducted in a regulatory void.

Tactics Documented or Alleged

Symptom Amplification

Engineered events — odd noises, "coincidences," staged encounters, anonymous messages — designed to feed paranoia or psychosis. The target's complaints become the evidence used to discredit them: "this person is unwell, ignore them."

Gaslighting at Scale

Modifying webpages on first load (MITM), altered messages from acquaintances, voice-cloned phone calls, fabricated social-media posts. The target sees things others cannot verify. See Unethical Methods.

Welfare / Mental-Health Referrals

Anonymous tips to crisis teams, GPs, or social workers. The target is then expected to relate to mental-health services as treatment when they are, structurally, an extension of the surveillance environment they are reporting.

Sleep Deprivation

Persistent low-grade disruption — noise, lights, timed deliveries, calls — calibrated to fragment sleep architecture. Acute sleep loss produces hallucinations and judgement collapse indistinguishable from psychotic episodes. See sleep section.

Medication Pressure

Sectioning threats (UK Mental Health Act), "voluntary" admission offers, and family pressure to medicate. Antipsychotic compliance can be used as evidence the target's account was delusional — even when independent documentation of the underlying events exists.

The "Unreliable Narrator" Defence

Once a target has a mental-health record, any subsequent complaint — to police, regulators, lawyers, journalists, the IPT — can be dismissed on those grounds. The targeting itself produces the discrediting document that future targeting will rely on.

Recent Precedent · 2026

The Ex-MI5 Officer Sectioned Indefinitely

As covered on GCHQ Scandals, in April 2026 a former MI5 employee was reportedly placed under indefinite section under the Mental Health Act after allegedly leaking secrets to a foreign power. Whatever the merits of that individual case, the underlying mechanism — psychiatric detention as an alternative to criminal proceedings, with no jury, no public trial, and no fixed end date — is now a live disposal route in the UK system. It echoes the Soviet psikhushka model in which dissent was redefined as illness and treated until the patient stopped dissenting.

Why Both Categories of Target Are Operationally Preferred

The doctrine that the state owes a higher duty of care to the vulnerable does not survive contact with the operational reality that the vulnerable are exactly the population the state finds most useful to use, most expensive to protect, and least costly to abandon.

Personal Allegation — The Same Playbook Against Me

Personal account · Liam Graham

I believe substantially similar tactics have been deployed against me over the past 1–2 years. Patterns I have observed and documented elsewhere on this site (My Experience, Unethical Methods) include:

The throughline between the O'Blennis description, the documented FBI sting cases, and what I have experienced is the same: the agency or its proxies construct the case in conditions they control, then present the constructed evidence as if it were organic.

Speculation — Lil Durk, "Slide for Von", and Rap on Trial

Speculation · Personal Opinion

Federal Use of Lyrics — and Possibly Edited Audio

United States v. Banks (Durk Derrick Banks) — pending federal prosecution

This section is explicitly speculation and personal opinion. None of the claims below should be read as established fact.

Rapper Lil Durk (Durk Derrick Banks) was federally indicted in 2024 in connection with an alleged murder-for-hire over the killing of his associate King Von. The government's filings cite rap lyrics — most notably the track widely referred to as "Slide for Von" / "Wonderful Wayne & Jackie Boy" — as evidence of intent. Federal prosecutors stated they intend to introduce the lyrics, music videos, and associated audio at trial.

My personal speculation, not asserted as fact:

The Lil Durk speculation is included here because the combination of (1) lyrics being treated as confession, (2) the documented ability to synthesise audio in any voice, and (3) the federal sting/entrapment patterns above creates a scenario where an artist's own catalogue can be weaponised against them by parties they cannot cross-examine. Whether that has actually happened in the Durk case is unknown to me — but the technical and legal preconditions for it exist.

Entrapment + Malware + Impersonation — A Dangerous Precedent

The classical entrapment cases described above — Newburgh, Liberty City, Whitmer, the Mark Kennedy operations — rely on a human informant operating in physical space. The target meets the informant, speaks to them, is recorded, and is eventually arrested. However manipulative, the operation has shape: a beginning, a middle, an arrest, a defendant who can at least identify who manipulated them.

The combination now emerging is qualitatively different. When entrapment is fused with malware-enabled device compromise and impersonation of the target's real friends and family, the operation no longer has identifiable edges. The "informant" becomes invisible. The "conversation" can be modified mid-transmission. The "evidence" can be generated against people who were not part of any operation and may not even be aware of what is being attributed to them.

The composite threat
Entrapment alone is a defensible target's nightmare. Malware alone is a privacy violation. Impersonation alone is fraud. Combined, they produce a regime in which the state can manufacture a conversation between a target and a non-consenting third party, present that fabricated exchange to a jury as authentic communication, and rely on the target being unable to disprove what the third party themselves cannot confirm or deny without testifying about events they never witnessed.

Components of the Composite Operation

Device-Level Compromise

Spyware (Pegasus, Predator, NSO/Candiru tooling) or law-enforcement implants — authorised in the UK under "equipment interference" warrants — give the operator root access to the target's phone, laptop, or smart-home device. Every message in or out can be intercepted, read, and modified before delivery. See US Cyberweapons and UK RIPA.

Friend Impersonation

An account belonging to a real friend is compromised (credential theft, SIM swap, session hijack, or app-permission abuse), or a near-identical look-alike account is created on a platform that does not enforce identity verification. The target then "converses" with someone they trust about subjects the operator chose.

Family Impersonation

Voice-cloned phone calls from a parent, sibling, or partner — sometimes lasting only seconds, sometimes full conversations — used to extract statements, prompt actions, or simulate distress. Where the cloned relative is uninvolved and unaware, they cannot later confirm or deny the call took place.

MITM Webpage Modification

On a compromised network or device, pages load with content altered on first paint — inserted "messages," modified headlines, fake banking screens, fabricated court documents. The target reads something the publisher never wrote. See Unethical Methods.

Selective Capture

The operator decides what is preserved and what is silently dropped. Inculpatory output is logged for prosecution use. Exculpatory replies, refusals, and questions the target asked about provenance can be discarded — leaving an evidentiary record that omits the moments most favourable to the defence.

Third-Party Collateral

The "friends" and "family" whose identities are used are not informants, not paid, and frequently not even aware. They become unwitting characters in a constructed conversation whose existence they cannot attest to in court. The target loses the ability to call them as witnesses to a conversation that never happened.

Why This Crosses a Constitutional Line

Every protection ordinarily built into criminal procedure assumes a baseline that the composite operation destroys:

The integrity question
A justice system can survive informants. It can — with reform — survive sting operations. It cannot survive a regime in which the state operates the defendant's mouth, modifies the defendant's correspondence, impersonates the defendant's loved ones, and then presents the resulting transcript as if it had been intercepted in nature. At that point the courtroom is no longer adjudicating evidence. It is auditing fabrications it has no tools to detect.

The Precedent — Once Allowed, It Cannot Be Bounded

The reason this matters beyond any individual prosecution is that the composite technique, once normalised, is bounded by nothing in the existing legal architecture:

A defendant facing an honest informant can demand disclosure of the informant's identity, payments and instructions. A defendant facing a fabricated conversation with a voice-cloned relative has nothing to demand disclosure of. The evidentiary architecture of criminal justice depends on there being a "what happened" to fight about. Composite operations dissolve the "what happened" itself.
Dangerous precedent
If a UK or US court — at any level, in any case — admits evidence that was procured through the combination of device compromise, in-flight message modification, friend or family impersonation, and selective capture, and does so without requiring full disclosure of every component of the operation, that decision becomes citable authority. It will be cited. It will be expanded. The legal threshold for the next operation will be lower, the operational appetite of the next agency will be greater, and the population of viable targets — defined as anyone the state finds inconvenient — will be larger. The integrity of the justice system is not a fixed quantity. It is preserved or surrendered case by case, and the cases that surrender it tend to do so quietly, in unreported judgments, against defendants too compromised to appeal.

Why This Matters Beyond the Famous Cases

The reason these methods are dangerous is not that they catch the wrong famous person. It is that the same toolkit is deployable against anyone the state decides to target:

The classical defence to entrapment assumes a court that will weigh inducement honestly. The classical defence does not survive in an environment where the inducement is invisible, the recordings are selective, the informant is paid, the lyrics are admissible as if they were confession, and the jury sees only what the prosecution chose to preserve.
Bottom line
Entrapment is not the act of catching a criminal. It is the act of manufacturing one. Every case described above — Newburgh, Liberty City, Whitmer, the O'Blennis account, and the patterns I have personally experienced — describes a state apparatus that no longer waits for crime, but produces it on demand, against the targets it has already chosen.

Primary Sources & Further Reading