Saw some discussion around the idea of "SWATing as a service" being an explanation of how Fatrick is SWATing himself. To my knowledge, I haven't seen any service like that generally on offer to targets of your choice in my encounters.
Even in the case of that Jewish teen pulling the "What are you doing rabbi" on the JCCs, all he wanted to do was SWAT JCCs, and he set up a "service" on the darkweb where people could pay him to do it, but he did it regardless of getting paid or not. It was more like a tip jar, which is what I've generally seen. The amount of Risk/Reward it takes to SWAT makes it primarily a passion project thing, the perp is always personally invested.
For those wondering how they do it, this is the general modus operandi for doing it "anonymously", and also the method used by the JCC bomb hoax perp (all of the following is strictly for informational use only, none of this is advice, this is a fictional sci-fi draft for my new fiction book sequel to Christmas Carol in which Tiny Tim is a cybercriminal Mr. Robot):
Step 1: acquire prepaid burner cell with US based number. Basically, following basic drug dealer protocol, buying prepaid in cash from a store with minimal camera presence and lax attitudes towards archiving security footage.
Step 2: Obscure your actual IP through most secure method of choice. No-log VPN, proxies, etc. This step is the second most important because this has to be a wall the people sniffing after you can't/won't go to the effort of cracking. I.E., if you're doing state-level crimes, make it be something that will take top level international police collaboration to crack. All the following steps need to take place with cloaking.
Step 3: With your IP cloaked, create a burner google voice account, using the burner cell to activate it.
Step 4: Create a bitcoin wallet with some funds in untraceable manner, and use that bitcoin to pay for a service such as SpoofCard which allows you to spoof your caller ID, and also realtime mask your voice.
Step 5: use the combination of the Google Voice account and SpoofCard to call your best friend or do whatever else it is you intend to do with a number that cannot be easily traced back to yourself and will appear with whatever Caller ID you desire.
Step 6: burn the entire rig after a single use, never re-use any account or burner phone, don't buy burners from the same place multiple times.
As you can see, it's a fairly labor intensive act to perpetrate, and it requires more risk than average for comparative cybercrimes (DDoS, etc.), since it can't be done entirely online.
The reason this setup is hard for the police to crack is because it requires multiple subpoenas that can't take place simultaneously.
First, they need to trace the call back to spoofcard and subpoena their records. That leads to the burner google voice account, which they need to subpoena for the IP address and phone number linked. Then they'd be faced with an uncrackable (by their police level ability) wall with regards to the IP address, and a fuck-ton of IRL policework (especially if the burner phone is purchased in a different state than the crime) to try to trace the burner phone, which should also be a dead end. And if the rig is burned after a single use, all that police and DA work needs to take place from the start every time.
For internet streamer nobodies and the other non-politician or bomb threat campaign-level SWAT targets, the police will generally just say "fuck it, easier just to knock on some retards door a couple times a year and deal with their sperging", since a state-level agency trying to get FBI and Interpol level involvement for what is ultimately a nuiscence is impossible unless something insane happens, like Fatrick getting I can't Sneeded by the cops and getting Saint Floyd level attention both domestically and abroad.
Now, if someone gets lazy or sloppy with any of the steps, then it makes the cops job much easier, and getting lazy with the IP masking is what got the Jewish kid caught. Connected with his clearnet IP address to the google voice account, and that's how they caught him. But over the course of two years, even with the top level agencies trying to track down the perp as he was actively doing it and monitoring the accounts he reused constantly, they weren't able to get him until he made a really dumb mistake and got lazy.
Basically, with presidential level scrutiny it took 2 years, the top agencies in the world, and a dumb lazy mistake by the criminal. So, the likelihood of whoever is perpetrating it getting busted rests mainly on the level of effort, skill, and motivation of the perpetrator. If they do everything correctly and never cut corners, its basically impossible. If they get lazy, the amount of laziness will determine the likelihood of them being caught.