For example, on 20 14 and 10, the FBI was exposed to use the name of the Associated Press to imitate the Seattle Times website to make false news pages and implant malicious software "phishing" to track down a suspect who made a bomb threat. Generally speaking, only cyber criminals will use web pages to spread malicious software, but the FBI itself has stepped into the restricted area. The move was bombarded by the media and privacy protection groups.
Implementation mode
We can call it the first way of "revealing" That is, the parties themselves have attempted to violate the law or commit crimes, which have been implemented but have not yet been revealed.
The second way we can call it "temptation". That is, the parties themselves do not have any illegal and criminal intentions, and law enforcement departments take action to induce the parties to have illegal and criminal intentions.
The third way we can call it "framing". That is, the parties themselves do not have any illegal and criminal intentions, and the law enforcement departments take plans to frame the parties so that the parties have illegal and criminal intentions.