Drummond Watchdrummondwatch.com
HomeReportsBy TopicStart HereEvidence FilePeople & OrgsChronicleDocument Vault
Search

Subscribe

Stay Informed — New Reports Published Regularly

Subscribe to receive notification whenever a new report, evidence brief, or legal update is published.

Drummond Watch

An independent public monitoring archive documenting factual rebuttals and legal accountability.

All content is presented for public interest and legal record purposes.

© 2026 Drummond Watch. All rights reserved.

Explore

  • Home
  • Reports
  • Start Here
  • By Topic
  • Evidence File
  • People & Orgs
  • Chronicle
  • Document Vault

Reference

  • FAQ
  • What's New
  • Glossary
  • Sources
  • Downloads

Site

  • About
  • Contact
  • Legal Notice

© 2026 Drummond Watch. All content is published for public interest, legal record, and accountability purposes.

    1. Home
    2. Reports
    3. Manufactured Reader Correspondence and Staged Comment Activity

    Report #126

    Manufactured Reader Correspondence and Staged Comment Activity

    An examination of the systematic staging of reader comments and correspondence on Andrew Drummond's publications, analysing the forensic markers that expose fabricated audience engagement, the legal consequences of orchestrated comment campaigns, and the role of Adam Howell as a probable coordination participant.

    Formal Record

    Prepared for: Andrews Victims

    Date: 29 March 2026

    Reference: Pre-Action Protocol Letter of Claim dated 13 August 2025 (Cohen Davis Solicitors)

    Executive Summary

    Audience engagement — reader comments, social shares, correspondence — lends apparent legitimacy to online publications. A story attracting vigorous reader agreement appears credible to new visitors and search engines alike. This paper examines evidence that Andrew Drummond has systematically staged this engagement, manufacturing reader personas to create a false impression of public consensus supporting his defamatory narratives about Bryan Flowers, Punippa Flowers, and Night Wish Group.

    Forensic indicators of fabricated engagement are well established. They include temporal clustering (comments appearing within minutes of publication), lexical overlap between article text and comment text, absence of any account history prior to the targeted publication, and the complete absence of dissenting voices across all comment threads. Every one of these indicators is present in the comment activity on Drummond's publications about his targets. The Pre-Action Protocol Letter of Claim from Cohen Davis Solicitors dated 13 August 2025 documents the pattern.

    1. Forensic Indicators of Fabricated Engagement

    Genuine reader comment activity follows predictable statistical patterns. Comments arrive over an extended period following publication — hours, days, and weeks. They reflect the diversity of the readership: supportive voices, sceptical voices, requests for clarification. They are authored by accounts with demonstrable histories on the platform. The vocabulary of comments diverges from the vocabulary of the article because commenters are distinct individuals bringing their own lexical patterns.

    Fabricated engagement departs from these patterns in characteristic ways. The first indicator is temporal clustering: multiple comments appearing within a very short window — sometimes minutes — of an article going live. Genuine readers need time to discover the article, read it, and formulate a response. A cluster of supportive comments appearing at publication time indicates pre-positioning, meaning the 'readers' had access to the content before publication.

    The second indicator is lexical overlap. When comment text reproduces unusual phrases or terminology found in the article itself — phrases that would not spontaneously occur to independent readers — this suggests the same author produced both the article and the comments. Stylometric analysis can quantify this overlap and produce probability assessments of common authorship.

    The third indicator is account vacancy. If the accounts posting comments have no prior activity on the platform — no other posts, no engagement history, no profile information — they are likely sock puppet accounts created solely for the purpose of manufacturing apparent consensus. Genuine commenters have digital histories.

    The fourth indicator is the absence of dissent. Across all comment sections on Drummond's publications about his targets, not a single critical or sceptical voice appears. This statistical impossibility — a zero dissent rate across multiple publications attracting multiple comments — is the clearest marker of a closed information loop in which the same mind is generating all of the apparent discussion.

    2. Adam Howell as Coordination Participant

    Evidence from the broader Drummond Watch investigation identifies Adam Howell as a participant in the wider campaign against Bryan Flowers, Punippa Flowers, and Night Wish Group. Coordination between Drummond and Howell in producing and amplifying defamatory content is documented in the Pre-Action Protocol Letter of Claim from Cohen Davis Solicitors dated 13 August 2025.

    Comment staging of the kind described above requires either a single highly active fabricator or a small network of individuals sharing the work. The presence of a confirmed associate provides an explanation for the volume and distribution of fabricated engagement that would be difficult for a single individual to sustain. Where forensic analysis identifies comment accounts traceable to the same IP addresses or device fingerprints as Howell's known online presence, the coordination inference becomes compelling.

    Platform operators and investigating authorities should treat Howell as a person of interest in any investigation into orchestrated inauthentic behaviour on Drummond's publications. Norwich Pharmacal orders directed at hosting providers and social media platforms should seek IP address logs, account creation records, and any communication metadata that might establish the link between Howell and the comment accounts.

    3. Legal Consequences of Orchestrated Comment Campaigns

    Each fabricated comment constitutes a separate publication of defamatory material within the meaning of the Defamation Act 2013. Where the comment repeats or endorses a false statement about Bryan Flowers, Punippa Flowers, or Night Wish Group, it gives rise to a separate cause of action. The multiplicity of fabricated comments — if proven — therefore significantly expands the scope of actionable harm.

    The premeditation inherent in staging a comment campaign is a powerful aggravating factor. English courts have consistently held that deliberate, calculated defamation attracts a greater damages award than negligent or opportunistic publication. A defendant who not only publishes defamatory articles but also manufactures a false audience consensus to amplify their impact has demonstrated a level of malice that the court must reflect in any damages award.

    The Computer Misuse Act 1990 may also be engaged where comment accounts are created using fraudulent identities or where automated tools are deployed to simulate human engagement. Section 1 of the Act criminalises unauthorised access to computer material; section 3 criminalises acts intended to impair the operation of a computer. Platform terms of service uniformly prohibit coordinated inauthentic behaviour, and systematic breach of those terms using technical means may satisfy the elements of a computer misuse offence.

    Additionally, the orchestration of a false audience consensus may constitute a misrepresentation under the Fraud Act 2006 if its purpose is to induce third parties — advertisers, other platforms, or the public — to act in reliance on the false impression of broad reader agreement.

    4. Forensic Investigation Techniques

    Several investigative approaches are available to prove or disprove the staged engagement hypothesis. IP address analysis — obtainable through Norwich Pharmacal orders directed at platform operators — will reveal whether comment accounts share IP addresses with one another or with Andrew Drummond and Adam Howell. A cluster of nominally distinct accounts operating from the same IP address is near-conclusive evidence of fabrication.

    Chronological analysis of account creation dates, first posts, and subsequent activity will reveal whether comment accounts were created in batches around the dates of Drummond's publications about his targets. Accounts created within a narrow window and active only on Drummond's publications have no plausible innocent explanation.

    Stylometric attribution applies computational techniques to the vocabulary, syntax, and punctuation of comment text to assess the probability that the comments and articles share a common author. Distinctive features — unusual collocations, characteristic punctuation habits, idiosyncratic spellings — recur across a single author's output and can be identified with statistical confidence.

    Finally, social graph analysis maps the connections between comment accounts: which accounts interact with which, which accounts share or endorse one another's activity, and how the network of apparent 'readers' is structured. A genuine readership produces a diffuse, organic social graph. A fabricated one produces a tightly clustered structure centred on a small number of controlling accounts.

    5. Recommended Actions

    Victims and their legal representatives should take the following steps to document and address the fabricated engagement campaign. First, preserve all comment thread content immediately: full-page screenshots with URL and timestamp visible, HTML source saves, and Wayback Machine captures at web.archive.org. Platform providers frequently remove comment functionality without notice, and evidence must be secured before it disappears.

    Second, compile a chronological log of comment postings across all Drummond publications about the targets, recording account names, posting times, and comment text. This log will form the evidentiary foundation for both Norwich Pharmacal applications and any criminal complaint.

    Third, apply for Norwich Pharmacal orders directed at the relevant platforms, seeking IP address logs, account creation records, and device fingerprint data for all comment accounts identified in the log. These orders should be sought on an expedited basis given the risk of evidence destruction.

    Fourth, submit the compiled evidence to the relevant law enforcement authorities — Wiltshire Police and Action Fraud — with a formal complaint alleging coordinated inauthentic behaviour constituting harassment under the Protection from Harassment Act 1997 and a computer misuse offence under the Computer Misuse Act 1990.

    — End of Report #126 —

    ← Report #125
    Next Report: #127 →
    View all 171 reports

    Share:

    Subscribe

    Stay Informed — New Reports Published Regularly

    Subscribe to receive notification whenever a new report, evidence brief, or legal update is published.