Sidney Reilly (1873-1925), British intelligence operative, operated on a simple principle: become the version of yourself that your target wants you to be, then you can move them in any direction because they trust the identity you've constructed more than they trust any objective reality.1
Reilly would position himself differently for different targets: to royalists, he was a royalist; to Bolsheviks, he was a revolutionary sympathizer; to business figures, he was a business opportunist. Each identity was carefully constructed, consistent, and compelling.
His targets trusted him not because he was trustworthy, but because he had become their ideal of trustworthiness.
Think of Reilly as weaponizing the target's own desires and beliefs against them — they believed you because you became the person they wanted to believe in.
PRINCIPLE 1: INTELLIGENCE ON TARGET'S DESIRES
Before constructing identity, thoroughly understand what the target wants to believe about the world and themselves. What role do they want to play? What kind of ally would they trust?
PRINCIPLE 2: CONSISTENT IDENTITY PERFORMANCE
Construct an identity that's perfectly aligned with the target's desires. Be consistent in that identity across all interactions.
PRINCIPLE 3: DEMONSTRATE COMMITMENT
Show through actions (not just words) that you're genuinely committed to the role you're playing. Take risks. Make sacrifices that prove identity is real.
PRINCIPLE 4: EXPLOIT THROUGH IDENTITY
Once the target trusts the identity, they'll move in the direction you want because you've positioned yourself as their trusted ally in pursuing their own goals.
Reilly's operations in post-Bolshevik Russia demonstrate the principle:
Reilly positioned himself as a businessman interested in making deals with Bolshevik leadership. He became trusted at high levels by consistently presenting himself as someone with resources and connections who could benefit them.
His targets trusted him because:
By the time Bolshevik leadership realized Reilly was an intelligence operative (if they ever fully did), he had already accomplished his operational objectives.
STAGE 1: INTELLIGENCE GATHERING
Understand target's worldview, desires, fears, ideal ally. What kind of person would they immediately trust?
STAGE 2: CONSTRUCT MATCHING IDENTITY
Create an identity that:
STAGE 3: ESTABLISH THROUGH COMMITMENT
Demonstrate commitment to the identity through actions that cost you something. Make sacrifices that prove you're not just performing.
STAGE 4: BUILD RELATIONSHIP
Once trusted, deepen the relationship. The deeper the trust, the more direction influence you have.
STAGE 5: EXPLOIT AT OPTIMAL MOMENT
When the moment arrives, move the target in the direction you want. They'll follow because they trust the identity you've constructed.
The system fails when:
Reilly's career ended (execution) when his double-agent status was exposed. Once identity failed, all previous actions were reinterpreted as deception.
Evidence: Reilly's operations are historically documented. His ability to move in and out of different social circles while maintaining different identities is well-attested.
Tensions:
Open questions:
Haha Lung frames Reilly as master of operative identity: understanding target desires well enough to construct an identity that becomes more real than reality.
A biographer might emphasize Reilly's genuine charm and capability — he succeeded partly because he was genuinely interesting and skilled.
An ethicist would emphasize the manipulation involved in becoming someone's ideal only to exploit that trust.
The tension reveals: Reilly's effectiveness came from understanding people deeply enough to become what they needed. That same skill could have been used non-manipulatively. The manipulation came through intent, not skill.
Reilly and Noh theater operate through identical structural principles: the performer becomes an archetypal vessel that the audience recognizes and responds to. In Noh, the actor dons a mask and assumes a spiritual presence; the audience doesn't see the performer—they see the essence the mask embodies. Reilly applied this same principle interpersonally: he became the archetype each target needed and recognized. Both Noh and Reilly's method work because they exploit the audience's hunger for pattern completion. The target/spectator fills in the gaps, projects their own expectations onto the performed identity, and experiences profound recognition when the performance aligns with their archetypal desire. The mask isn't a deception obscuring a true self; it is the operative reality that both systems deploy.
Where the domains diverge reveals something crucial: Noh operates within a ritual frame that both performer and audience consent to (we know we're watching theater). Reilly operates within a frame of assumed authenticity. Noh's power comes from acknowledged artifice combined with genuine skill; Reilly's power comes from hidden artifice presenting itself as authenticity. This difference—consent vs. deception—matters operationally but not mechanically. The underlying mechanism of archetypal activation and identity-as-performance is identical. The structural parallel reveals that role-typing works regardless of whether the audience knows they're in the presence of performance, as long as the performance is consistent and skilled.
Reilly demonstrates a psychological principle that most people don't consciously integrate: the self is not a fixed interior truth that we then express, but rather an accumulated pattern of consistent performances. Repeated, committed performance of an identity literally rewires how the performer neurologically experiences themselves. Reilly became the identities he performed not through deception-of-self but through the same mechanism that makes any sustained practice transform the practitioner. A meditation practitioner who meditates for years becomes "a meditator" in cellular ways; Reilly became "a charismatic businessman" or "a revolutionary sympathizer" in the same way—through consistent behavioral reiteration that embeds the identity into his nervous system. This creates a paradox: Reilly's performance was both deliberately constructed AND absolutely authentic to him in the moment of performance. He wasn't pretending; he was embodying.
What makes this psychologically different from normal identity formation is intentionality and speed. Most people form identities unconsciously over years; Reilly formed them deliberately in months. But the mechanism is identical. This reveals that identity authenticity is not about accessing a true inner self, but about the consistency and embodied commitment with which a pattern is performed. The psychology domain teaches that sustained performance becomes authentic identity through nervous-system integration; Reilly's case shows that this happens faster and more completely when the performer consciously leverages it as a tactic.
Reilly's success rests on a disturbing insight: targets wanted to be deceived. They didn't want objective reality; they wanted a reality that confirmed their desires and beliefs. Reilly simply recognized that the gap between what people claim to want (truth, honesty) and what they actually respond to (confirmation, alignment, flattery) is not a bug—it's a feature his targets paid him to exploit. Most people experience this as violation. But it's worth asking: how much of your trust in people isn't based on their actual trustworthiness but on their skill at performing the identity you've unconsciously commissioned them to embody? Reilly succeeds at scale because he's conscious of what most people do unconsciously and disowingly. He simply runs the game everyone's already running, but with visibility and precision.
Can someone excel at identity-based infiltration without developing a fragmented sense of self? Reilly managed multiple identities simultaneously for years without apparent psychological crisis (until exposure). Most practitioners of deep cover report severe dissociative consequences. What's the difference between Reilly's integration and the dissociation that breaks most agents? Does it depend on starting with no core identity to fragment?
What's the minimal consistency threshold required to maintain identity belief in a target? Reilly's case suggests small contradictions should shatter trust—but he survived inconsistencies that should have exposed him. Was his operational success despite contradiction, or did targets unconsciously suppress noticing contradictions because his identity served them too well to examine?
Does identity-based infiltration become more or less effective as targets develop psychological sophistication? In a world where everyone understands these mechanisms, does the tactic still work, or does consciousness of the game itself become the vulnerability that skilled operators exploit?