What Is Entrapment?
In US law, entrapment is a defence available where a government agent induces a person to commit a crime they would not otherwise have been predisposed to commit. The doctrine has two recognised tests:
- Subjective test (federal, majority of states): Was the defendant predisposed to commit the offence before government inducement? If yes, no entrapment.
- Objective test (California, several other states): Would the government conduct have induced a normally law-abiding person to commit the offence? If yes, entrapment regardless of the defendant.
In practice the defence almost never succeeds. Federal sting operations — particularly post-9/11 terrorism cases — routinely feature confidential informants paid five- and six-figure sums to befriend targets, supply weapons or instructions, drive them to the location, and record the conversations the FBI later uses at trial. Courts overwhelmingly find "predisposition" once the defendant has been on tape saying anything incriminating, even where the informant did most of the talking.
Featured Video — Alex Jones & Gavin O'Blennis
Why this footage matters
The value of the O'Blennis material is that it is an insider description — by someone who claims to have worked inside the contractor ecosystem — of the same tactics that civil-liberties groups have documented from the outside for two decades. Whether one accepts every claim in the recording or not, the method described matches the public record on cases like the Newburgh Four, the Liberty City Seven, and a long list of post-9/11 FBI sting prosecutions.
Documented FBI Entrapment Patterns
The Newburgh Four (2009)
FBI informant Shahed Hussain — paid roughly $96,000 by the Bureau — spent over a year cultivating four men in Newburgh, NY, offering one of them $250,000 to participate in a fake plot to bomb a synagogue. The FBI supplied the (inert) explosives, the (inert) Stinger missile, the target list, and the transport. The trial judge described the defendants as having been targeted because they were vulnerable, not because they posed a real threat — but they were convicted and sentenced to 25 years apiece. The Second Circuit upheld the convictions.
Liberty City Seven (2006)
A group of seven men in a poor Miami neighbourhood were approached by an FBI informant posing as an Al-Qaeda recruiter. The informant supplied the script, the oath of allegiance, and the "operational planning." None of the defendants ever obtained explosives or had any contact with a real terrorist organisation. The first two trials resulted in hung juries; only on the third attempt did the government secure convictions. Civil-liberties groups called the case "thoughtcrime prosecution."
The Whitmer Kidnapping Plot (2020)
Of the 14 men charged with plotting to kidnap Governor Gretchen Whitmer, the FBI's own filings revealed that at least 12 FBI informants and undercover agents were embedded in the group — outnumbering or matching the actual defendants. Two federal defendants were acquitted by jury and two others had hung juries, in significant part because the defence successfully argued the informants had driven the planning. One lead informant was himself later charged with unrelated crimes.
The Common Pattern
Cultivation
Informant befriends target over months. Builds trust. Identifies emotional, financial or ideological pressure points.
Supply
Informant or undercover agent provides the means — weapons, explosives, money, transport, target intelligence — that the defendant could not otherwise obtain.
Scripting
Conversations are steered by the informant toward incriminating statements. Defendants who hesitate are pressured or shamed into compliance.
Selective Recording
Hours of exculpatory conversation are not recorded or "lost." The seconds of incriminating statement are preserved and edited for trial.
Arrest Theatre
Operation concludes with a public arrest timed for maximum media coverage. The agency announces a "thwarted plot" — the plot it engineered.
Plea Pressure
Defendant is offered 5 years if they plead, 40 years if they fight. 97% of federal cases end in plea agreement. The recordings are never tested at trial.
UK Law — No Entrapment Defence, Just "Abuse of Process"
Unlike the United States, the United Kingdom does not recognise entrapment as a substantive defence. A defendant cannot stand up at trial and say "the police talked me into it" and expect an acquittal on that basis alone. Instead, the only route is the much narrower abuse of process doctrine — an application to the trial judge to stay the prosecution on the ground that to proceed would bring the administration of justice into disrepute.
R v Looseley / Attorney General's Reference (No. 3 of 2000)
The Lords set out the test still applied today. A stay should be granted where the conduct of the state agent went beyond providing an unexceptional opportunity to commit a crime, and instead amounted to inciting, instigating, persuading, pressuring or wheedling the defendant into committing an offence they would not otherwise have committed. The test is officer-focused, not defendant-focused — courts look at what the state did, not whether the defendant was "predisposed."
In practice the threshold is so high that successful Looseley applications are vanishingly rare. The courts routinely accept that supplying drugs, money, weapons or transport is an "opportunity" rather than an "inducement," provided the defendant did not have to be talked into anything on the recording.
The CHIS Architecture — Statutory Licence to Manufacture
Where US sting operations rely on policy and prosecutorial discretion, the UK has gone further and put the entire architecture into statute:
- Regulation of Investigatory Powers Act 2000 (RIPA), Part II: Authorises the use of Covert Human Intelligence Sources — informants, undercover officers, agents-of-influence — across police, MI5, MI6, GCHQ, HMRC, the NCA and dozens of lesser bodies. Authorisation is signed off internally by the agency itself.
- Investigatory Powers Act 2016 ("Snoopers' Charter"): Extends and consolidates bulk surveillance powers, equipment interference, and the targeting capabilities used in long-running entrapment operations against journalists, activists and political organisations.
- Covert Human Intelligence Sources (Criminal Conduct) Act 2021 — the "CHIS Act": The most extraordinary piece of UK statute in this area. It permits Criminal Conduct Authorisations — written permissions for an informant to commit crimes in the course of their work, granted prospectively by their handling agency. The Act contains no statutory bar on murder, torture, rape or sexual offences. The only limit is whatever Convention rights can be read in via the Human Rights Act — themselves subject to derogation.
Documented UK Abuses — Where the Doctrine Was Tested and Failed
The Special Demonstration Squad & NPOIU
From 1968 until at least 2010, undercover Metropolitan Police officers — operating under the Special Demonstration Squad (SDS) and National Public Order Intelligence Unit (NPOIU) — infiltrated environmental, anti-racist, anti-fascist, women's-rights and animal-rights groups. Officers formed long-term sexual relationships with activists under false identities; fathered children with women they were targeting; used the names of deceased children as cover identities; and in several documented cases incited the very crimes they later helped prosecute. The ongoing Mitting Inquiry (Undercover Policing Inquiry) has heard evidence of more than 1,000 spied-on groups, with the vast majority engaged in lawful political activity.
Mark Kennedy / Ratcliffe-on-Soar (2009)
Undercover officer Mark Kennedy spent seven years embedded in the UK environmental movement under the name "Mark Stone." He participated in planning protests, supplied intelligence, drove activists to actions, and provided logistical resources. The 2009 Ratcliffe-on-Soar power-station occupation prosecution collapsed when it emerged the Crown had withheld evidence that Kennedy had been an agent provocateur. Twenty defendants had their convictions quashed. The Court of Appeal in R v Barkshire [2011] EWCA Crim 1885 described the non-disclosure as "an affront to the public conscience."
Five Black men were wrongly convicted in 1972 of attempting to rob a plainclothes officer on the London Underground. In 2021 — nearly 50 years later — their convictions were quashed by the Court of Appeal after evidence emerged that the officer, DS Derek Ridgewell, had been running a corrupt unit fabricating cases against Black men. Ridgewell himself was later jailed for an unrelated robbery. The case is one of dozens now being reviewed where Ridgewell or his unit constructed the offence wholesale.
Extrajudicial Harassment — When the State Skips the Courtroom Entirely
Where prosecution is inconvenient — because the evidence is too thin, the methods would not survive disclosure, or the target is too politically sensitive — the state has alternative tools. These tools sit in a deliberate grey zone described by intelligence professionals as "disruption," conducted under the guise of "national security" and explicitly without court oversight. They are the operational continuation of policy by means designed to leave no judicial paper trail.
Documented Harassment Tactics — UK & US
Schedule 7 Stops
The Terrorism Act 2000 lets UK border officers detain anyone at a port for up to 6 hours without suspicion, seize devices, demand passwords, and copy data. Used repeatedly against journalists (David Miranda), activists, and Muslim travellers. No criminal threshold required.
"Visit" Programmes
MI5 and counter-terrorism police conduct uninvited home visits — sometimes daily — to "have a chat" with a target. The visits are non-coercive on paper but operate as continuous reminder that the person is watched. No record of the conversation is given to the target.
Employer & Landlord Approaches
Officers approach an employer, landlord or licensing body and disclose that the target is "of interest." Job loss, eviction or licence refusal follow. The target is not told what was said about them.
Family Targeting
Approaches to parents, siblings, partners and children — to "warn" them about the target. Designed to destroy support networks. Documented across Prevent referrals, FBI Joint Terrorism Task Force visits, and Police Scotland intelligence-led practice.
Financial Pressure
Bank accounts closed without explanation ("de-banking"), payment processors withdrawing service, credit applications denied. Banks cite "internal policy" but the trigger is often a security-service notification under suspicious activity report (SAR) regimes.
Algorithmic Suppression
Platform-level downranking, demonetisation, shadowbanning or account suspension — coordinated through informal liaison channels with platform trust-and-safety teams. The target sees declining reach with no notification of the cause.
"Welfare" Referrals
Anonymous tips to social services, mental-health crisis teams, GPs, or schools — claiming the target is unstable, a danger to themselves or others, or unfit to care for children. Forces the target into adversarial contact with institutions that have coercive power.
Sleep & Sensory Disruption
Persistent noise from neighbours suddenly hostile; vehicles circling; surveillance teams positioned visibly; lights, alarms, and timed delivery of messages designed to fragment sleep and erode cognitive resilience. See Unethical Methods.
Digital Interference
Account compromises, modified webpages on first load, redirected DNS, MITM injection of altered content, fake messages from "friends," voice-cloned phone calls. See My Experience.
Why It Works — The Legal Architecture That Permits It
- NCND — Neither confirm nor deny. The target cannot prove harassment is happening because the state will not admit any of it is happening.
- IPT exclusivity — Surveillance complaints can only be heard at the Investigatory Powers Tribunal, whose hearings can be closed and whose findings of fact are effectively unappealable. See Complaints & Suggestions.
- CHIS Act 2021 — Prospective authorisation of crimes by state agents, with no list of off-limits offences in the statute itself.
- The "national security" trump card — Disclosure obligations under FOIA, civil litigation and even some criminal proceedings can be defeated by a public-interest immunity certificate citing national security. Courts almost never go behind the certificate.
- Plausible deniability through proxies — Where the agency does not want fingerprints on a tactic, it can be outsourced to informants, contractors, sympathetic media, foreign liaison partners, or unattributed online accounts.
Extrajudicial harassment is the operational continuation of prosecution by means that bypass disclosure, the rules of evidence, and the right to a trial. It does not require a court because it does not require a verdict. The harm itself is the disposition.
Targeting the Vulnerable — Addicts, Mental Health, and Coerced Dependency
One of the most consistent — and most legally insulated — features of state informant operations is the deliberate targeting of people the agency knows in advance are not capable of meaningful consent to the relationship being constructed. Drug addicts, people with serious mental-health conditions, those in financial crisis, the homeless, and the cognitively impaired are not picked despite their vulnerability. They are picked because of it. Vulnerability is operationally useful: it lowers the price of compliance, raises the ratio of inducement-to-incrimination, and reduces the likelihood that the target will ever credibly complain.
The Newburgh Court's Own Words
Judge Colleen McMahon, sentencing the Newburgh Four to 25 years each, openly stated that the FBI "came up with the crime, provided the means, and removed all relevant obstacles" and that "only the government could have made a terrorist out of Mr. Cromitie, whose buffoonery is positively Shakespearean in scope." The lead defendant was unemployed, mentally fragile, and so financially desperate that he had previously offered to sell his kidney. The FBI informant offered him $250,000 over a year of cultivation. The court convicted anyway — because under US "predisposition" doctrine, once you take the bait, the trap is irrelevant.
Behaviour Analysts — Industrialising Vulnerability Targeting
Vulnerability targeting is not improvised by individual handlers. Both the FBI and the National Crime Agency operate dedicated behavioural analysis units whose published remit is criminal profiling, but whose actual operational utility extends into the identification, selection and manipulation of the very targets best suited to the playbook described above.
The Behavioral Analysis Unit (BAU) / NCAVC
The FBI's Behavioral Analysis Unit, headquartered at the Quantico training academy, is divided into five sub-units covering counter-terrorism (BAU-1), threats to public officials and adults (BAU-2), crimes against children (BAU-3), violent crime against adults (BAU-4), and research/strategy (BAU-5). It is part of the National Center for the Analysis of Violent Crime (NCAVC), which sits inside the Critical Incident Response Group.
BAU analysts are trained at the intersection of forensic psychology, criminology, statement analysis, interview engineering, and what the Bureau itself terms "indirect personality assessment" — building psychological profiles of subjects without ever interviewing them, using only the materials the subject has produced (writings, social-media, recordings, prior interview transcripts). The unit's outputs include:
- Offender profiles used to narrow investigative focus
- Interview & interrogation strategies tailored to a specific subject's psychological vulnerabilities
- Threat assessments on individuals identified by other Bureau components
- "Influence" and engagement plans for use by handlers, undercover officers, and online operators
The NCA Behavioural Analysis Function
The National Crime Agency operates an analogous capability — the National Crime Agency Behavioural Analysis function, sitting within its specialist intelligence directorate and routinely deployed in support of serious-and-organised-crime, child-exploitation, and counter-terrorism operations. It is supplemented by behavioural advisers attached to Counter Terrorism Policing and National Counter Terrorism Security Office (NaCTSO), and by the academic-government interface at the Centre for Research and Evidence on Security Threats (CREST). The exact organisational footprint is not fully published; what is public confirms a structurally similar capability to the FBI's NCAVC.
How Behavioural Profiling Feeds the Vulnerability Pipeline
Pre-Selection
Behaviour analysts review available open-source and law-enforcement-database material on a candidate target — social media, prior contact reports, school/medical records where lawfully accessible — to produce a "suitability" assessment for operational engagement.
Pressure-Point Mapping
The profile identifies what the target most fears, most desires, most struggles to refuse: financial relief, romantic attention, ideological belonging, validation, sleep, escape from withdrawal, contact with an estranged child. Handlers are briefed on which lever to pull and when.
Scripted Engagement
The informant or undercover officer is given a tailored approach script — opening lines, conversational topics, emotional notes — designed to maximise the probability of building trust within a defined window. Failure modes are pre-anticipated.
Real-Time Adjustment
As recordings come back, analysts adjust the operational plan to reflect what is working and what is not. A target who is responding to financial inducement may have the offer escalated; a target who is responding to ideological flattery may receive more.
Interrogation Engineering
If the target is arrested, the BAU provides a customised interrogation plan — when to confront, when to feign sympathy, what to disclose strategically, what false claims to make under the Reid Technique or its UK equivalents. The defendant's psychology has been studied for months before the interview begins.
Discreditation Profiling
If prosecution is not pursued — or the target later complains — the same profile can be repurposed to brief journalists, MPs, or oversight bodies on why the target's account should not be believed. The very vulnerabilities the operation exploited become the reasons the target's complaint is dismissed.
The Addict Targeting Playbook
Identifying the Mark
Targets are identified through medical records, housing data, social services involvement, prior convictions, social-media patterns of drug-related content, or referrals from informants already inside the network. The agency knows the person is dependent before contact is initiated.
The "Friend" Phase
A handler or informant befriends the target — often during a low point: detox, relapse, eviction, bereavement, or hospital discharge. Money, food, drugs, or a place to sleep are offered with no apparent demand for repayment. Trust is purchased over weeks or months.
Cash for "Errands"
Cash payments begin — framed as favours, loans, or pay for trivial tasks. The amounts are large enough to fund a habit and small enough to escape suspicious-activity-report triggers. The target either knows the money is drug money or, on any reasonable view, should have known.
Maintenance of the Addiction
The handler ensures the dependency persists. Detox is discouraged; clean-up offers are dismissed; access to clean accommodation is conditioned on continued cooperation. The target's recovery would end their operational usefulness, so the agency has a structural interest in keeping them unwell.
The Reluctant Witness
When prosecution comes, the addict is either the defendant — too compromised to mount a defence — or the chief witness against someone the agency actually wanted. Their drug use is then quietly disclosed at trial as if it were unrelated background, rather than the leverage by which their testimony was obtained.
Disposable Asset
Once the operational value is exhausted, the target is dropped. Cash flow stops, the "friend" disappears, court support evaporates. Many die of overdose, suicide, or untreated illness within months of being decommissioned. The agency has no statutory duty of aftercare and treats the harm as a sunk cost of operations.
Documented UK/US Examples
Smith / Dougherty — Cocaine, Surveillance, and Gangsters
The trial of detectives David Smith and Christopher Dougherty (see Scottish Corruption) includes charges that Smith accepted cocaine from organised-crime figure Stephen Gauley while serving on duty, and used cocaine at the Scottish Police College. The case is the inverse of the dynamic described above — officers themselves dependent — but it illustrates how thoroughly the addict / informant / officer pipeline can become a single circulating system in which the same substances move between handler, source, and target.
"Stash House" Reverse Stings
For two decades the ATF and FBI ran fictitious "stash house" robbery stings, recruiting financially desperate men — many with prior drug convictions or active addictions — to "rob" a non-existent drug-house full of cocaine. The agency selected the amount of drugs (often above mandatory-minimum thresholds), the location, the personnel, and the timing of the arrest. Multiple federal judges (United States v. Black, 9th Cir.; United States v. Conley, N.D. Ill.) have condemned the operations as racially discriminatory and as "government-manufactured crime". The ATF formally suspended the technique in 2016, but only after thousands of convictions had already been secured.
Coercion of the Mentally Ill
Targeting people in poor mental health follows the same operational logic with a different vulnerability surface. Where the addict's compliance is purchased with substance and money, the unwell target's compliance is extracted through destabilisation: deliberately exacerbating symptoms, undermining trust in their own perception, and then exploiting the resulting confusion either to obtain incriminating statements or to discredit anything the target later says.
Tactics Documented or Alleged
Symptom Amplification
Engineered events — odd noises, "coincidences," staged encounters, anonymous messages — designed to feed paranoia or psychosis. The target's complaints become the evidence used to discredit them: "this person is unwell, ignore them."
Gaslighting at Scale
Modifying webpages on first load (MITM), altered messages from acquaintances, voice-cloned phone calls, fabricated social-media posts. The target sees things others cannot verify. See Unethical Methods.
Welfare / Mental-Health Referrals
Anonymous tips to crisis teams, GPs, or social workers. The target is then expected to relate to mental-health services as treatment when they are, structurally, an extension of the surveillance environment they are reporting.
Sleep Deprivation
Persistent low-grade disruption — noise, lights, timed deliveries, calls — calibrated to fragment sleep architecture. Acute sleep loss produces hallucinations and judgement collapse indistinguishable from psychotic episodes. See sleep section.
Medication Pressure
Sectioning threats (UK Mental Health Act), "voluntary" admission offers, and family pressure to medicate. Antipsychotic compliance can be used as evidence the target's account was delusional — even when independent documentation of the underlying events exists.
The "Unreliable Narrator" Defence
Once a target has a mental-health record, any subsequent complaint — to police, regulators, lawyers, journalists, the IPT — can be dismissed on those grounds. The targeting itself produces the discrediting document that future targeting will rely on.
The Ex-MI5 Officer Sectioned Indefinitely
As covered on GCHQ Scandals, in April 2026 a former MI5 employee was reportedly placed under indefinite section under the Mental Health Act after allegedly leaking secrets to a foreign power. Whatever the merits of that individual case, the underlying mechanism — psychiatric detention as an alternative to criminal proceedings, with no jury, no public trial, and no fixed end date — is now a live disposal route in the UK system. It echoes the Soviet psikhushka model in which dissent was redefined as illness and treated until the patient stopped dissenting.
Why Both Categories of Target Are Operationally Preferred
- Lower price of compliance. A few hundred pounds, a baggie, a place to sleep, an offer to "make the noise stop" — these are cheap inducements compared to the cost of running a clean operation against a high-functioning target.
- Built-in discreditation. Any complaint the target later makes can be dismissed as the product of addiction, illness, or instability — even when contemporaneous documentation exists. The targeting and the discrediting use the same evidence.
- Reduced legal-defence capacity. Addiction and mental-health crises consume the resources — money, attention, social support — that would otherwise fund competent representation. A target trying to manage withdrawal or psychosis cannot also manage disclosure, expert witnesses, or appellate strategy.
- Higher likelihood of plea. A defendant who cannot bear the stress of trial will plead. The state's manufactured evidence is never tested.
- Lower public sympathy. Juries, journalists, and politicians are less interested in addicts and the unwell. The state's costs of discovery, scandal, and reputational damage are correspondingly lower.
The doctrine that the state owes a higher duty of care to the vulnerable does not survive contact with the operational reality that the vulnerable are exactly the population the state finds most useful to use, most expensive to protect, and least costly to abandon.
Personal Allegation — The Same Playbook Against Me
I believe substantially similar tactics have been deployed against me over the past 1–2 years. Patterns I have observed and documented elsewhere on this site (My Experience, Unethical Methods) include:
- Accounts and personas approaching me online with topics designed to provoke incriminating responses
- "Friend" relationships that pivoted to operational pressure once trust was established
- Selective amplification of certain statements out of context across platforms and channels
- Threats and inducements alternated to destabilise judgement
- Pressure to take actions or make statements that would create prosecutable "evidence" of crimes I have not committed and would not commit
The throughline between the O'Blennis description, the documented FBI sting cases, and what I have experienced is the same: the agency or its proxies construct the case in conditions they control, then present the constructed evidence as if it were organic.
Speculation — Lil Durk, "Slide for Von", and Rap on Trial
Federal Use of Lyrics — and Possibly Edited Audio
This section is explicitly speculation and personal opinion. None of the claims below should be read as established fact.
Rapper Lil Durk (Durk Derrick Banks) was federally indicted in 2024 in connection with an alleged murder-for-hire over the killing of his associate King Von. The government's filings cite rap lyrics — most notably the track widely referred to as "Slide for Von" / "Wonderful Wayne & Jackie Boy" — as evidence of intent. Federal prosecutors stated they intend to introduce the lyrics, music videos, and associated audio at trial.
My personal speculation, not asserted as fact:
- The amplification and spread of the "slide for Von" framing — across social platforms, blogs, and aggregator channels — was disproportionate to organic music-fan interest, in a way consistent with algorithmic and informant-driven amplification rather than purely organic virality.
- Given the documented existence of voice-cloning and AI music generation tools capable of mimicking a specific artist's vocal signature, and given that prosecutors are not obligated to disclose the full provenance of every audio exhibit at the indictment stage, there is at least a theoretical risk that lyrical content presented as evidence has been edited, recontextualised, or AI-generated to strengthen the prosecution narrative.
- The broader pattern of "rap on trial" — using lyrics as if they were diary entries — has been documented by academics like Erik Nielson and challenged in legislatures (California's AB 2799 in 2022 limits the use of rap lyrics in criminal trials). The Durk case sits in that pattern regardless of the AI-amplification question.
The Lil Durk speculation is included here because the combination of (1) lyrics being treated as confession, (2) the documented ability to synthesise audio in any voice, and (3) the federal sting/entrapment patterns above creates a scenario where an artist's own catalogue can be weaponised against them by parties they cannot cross-examine. Whether that has actually happened in the Durk case is unknown to me — but the technical and legal preconditions for it exist.
Entrapment + Malware + Impersonation — A Dangerous Precedent
The classical entrapment cases described above — Newburgh, Liberty City, Whitmer, the Mark Kennedy operations — rely on a human informant operating in physical space. The target meets the informant, speaks to them, is recorded, and is eventually arrested. However manipulative, the operation has shape: a beginning, a middle, an arrest, a defendant who can at least identify who manipulated them.
The combination now emerging is qualitatively different. When entrapment is fused with malware-enabled device compromise and impersonation of the target's real friends and family, the operation no longer has identifiable edges. The "informant" becomes invisible. The "conversation" can be modified mid-transmission. The "evidence" can be generated against people who were not part of any operation and may not even be aware of what is being attributed to them.
Components of the Composite Operation
Device-Level Compromise
Spyware (Pegasus, Predator, NSO/Candiru tooling) or law-enforcement implants — authorised in the UK under "equipment interference" warrants — give the operator root access to the target's phone, laptop, or smart-home device. Every message in or out can be intercepted, read, and modified before delivery. See US Cyberweapons and UK RIPA.
Friend Impersonation
An account belonging to a real friend is compromised (credential theft, SIM swap, session hijack, or app-permission abuse), or a near-identical look-alike account is created on a platform that does not enforce identity verification. The target then "converses" with someone they trust about subjects the operator chose.
Family Impersonation
Voice-cloned phone calls from a parent, sibling, or partner — sometimes lasting only seconds, sometimes full conversations — used to extract statements, prompt actions, or simulate distress. Where the cloned relative is uninvolved and unaware, they cannot later confirm or deny the call took place.
MITM Webpage Modification
On a compromised network or device, pages load with content altered on first paint — inserted "messages," modified headlines, fake banking screens, fabricated court documents. The target reads something the publisher never wrote. See Unethical Methods.
Selective Capture
The operator decides what is preserved and what is silently dropped. Inculpatory output is logged for prosecution use. Exculpatory replies, refusals, and questions the target asked about provenance can be discarded — leaving an evidentiary record that omits the moments most favourable to the defence.
Third-Party Collateral
The "friends" and "family" whose identities are used are not informants, not paid, and frequently not even aware. They become unwitting characters in a constructed conversation whose existence they cannot attest to in court. The target loses the ability to call them as witnesses to a conversation that never happened.
Why This Crosses a Constitutional Line
Every protection ordinarily built into criminal procedure assumes a baseline that the composite operation destroys:
- Right to confront the accuser. Sixth Amendment in the US; Article 6(3)(d) ECHR in the UK. Impersonation makes the "accuser" a fiction — the target cannot cross-examine an account that was operated by an officer pretending to be their cousin.
- Authenticity of digital evidence. Federal and English rules of evidence assume that messages, emails and recordings are authentic absent specific challenge. Where the device itself has been compromised, the chain of custody begins before the message reached the device — at a point the defence cannot inspect.
- The right to silence. A target who "consents" to a conversation with what they believe is their brother is not exercising informed waiver of any right. The waiver is being extracted by fraud.
- Disclosure obligations. Under UK CPIA 1996 and US Brady doctrine, the prosecution must disclose material that could undermine its case. Where the existence of the compromise itself is classified as a "sensitive technique," disclosure is routinely withheld on public-interest immunity grounds — meaning the defence is told nothing about the means by which its client's "statements" were obtained.
- Innocent third parties as collateral. Friends and family members whose identities are used to entrap the target are themselves victims of state-perpetrated impersonation, but have no standing to challenge the operation, no notification that it happened, and no remedy when their names appear on a defendant's exhibit list.
The Precedent — Once Allowed, It Cannot Be Bounded
The reason this matters beyond any individual prosecution is that the composite technique, once normalised, is bounded by nothing in the existing legal architecture:
- There is no statute requiring disclosure that the prosecution's evidence was generated through device compromise rather than passive interception
- There is no expert-witness regime trained or resourced to detect MITM modification of in-flight messages at scale
- There is no notification right for an innocent third party whose voice was cloned or account impersonated
- There is no proportionality test specific to manufactured evidence as distinct from collected evidence
- There is no independent body with technical capacity to audit a state-grade compromise — the only bodies with the relevant access are themselves the agencies whose conduct would be under scrutiny
A defendant facing an honest informant can demand disclosure of the informant's identity, payments and instructions. A defendant facing a fabricated conversation with a voice-cloned relative has nothing to demand disclosure of. The evidentiary architecture of criminal justice depends on there being a "what happened" to fight about. Composite operations dissolve the "what happened" itself.
Why This Matters Beyond the Famous Cases
The reason these methods are dangerous is not that they catch the wrong famous person. It is that the same toolkit is deployable against anyone the state decides to target:
- Activists, organisers, journalists' sources
- Whistleblowers and would-be whistleblowers
- Targets of foreign intelligence services operating on US/UK soil
- Individuals — like myself — who have made themselves visible online in ways the state finds inconvenient
- Artists, musicians and creators whose published work can be retroactively re-coded as confession
The classical defence to entrapment assumes a court that will weigh inducement honestly. The classical defence does not survive in an environment where the inducement is invisible, the recordings are selective, the informant is paid, the lyrics are admissible as if they were confession, and the jury sees only what the prosecution chose to preserve.
Primary Sources & Further Reading
- Human Rights Watch / Columbia Law School — Illusion of Justice: Human Rights Abuses in US Terrorism Prosecutions (2014)
- Trevor Aaronson — The Terror Factory: Inside the FBI's Manufactured War on Terrorism (2013)
- Erik Nielson & Andrea Dennis — Rap on Trial: Race, Lyrics, and Guilt in America (2019)
- California Assembly Bill 2799 (2022) — Restrictions on creative expression as criminal evidence
- United States v. Cromitie et al. (Newburgh Four), 2nd Cir. 2013
- United States v. Augustin et al. (Liberty City Seven), S.D. Fla. 2009
- United States v. Fox et al. (Whitmer kidnapping plot), W.D. Mich. 2022
- BuzzFeed News — The FBI Used the Same Informant Strategy in the Whitmer Case That It Pioneered After 9/11 (2020)
- The Intercept — multiple investigations into FBI informant programs (2012–present)
- Federal indictment in United States v. Banks (Lil Durk) — public PACER filings, 2024
- Alex Jones / Infowars — interview / undercover footage with Gavin O'Blennis (referenced video file)