Anonycat
Crusader
I get these stupid Flag emails, and one was the Quote of the day, which I have pasted below. As a tribute to the insanity of Hubbard, I have added my own quotes of the day. BTW, the double-negative was in the email, and not my own typo.
"Two things: You don't don't have to do what your bank says. And the other one is, you don't have to add your own case in to any computation you make. And these are two of my stablest, stable data in Dianetics and Scientology...They are good ones to use."
L. Ron Hubbard,
from the 20th American ACC,
"Case Analysis—Rock Hunting",
1 August 1958
*******************************
"HCO POLICY LETTER OF 15 AUGUST 1960
In the face-of danger from Govts or courts there are only two errors one can make: (a) do nothing and (b) defend. The right things to do with any threat are to (1) Find out if we want to play the offered game or not, (2) If not, to derail the offered game with a feint or attack upon the most vulnerable point which can be disclosed in the enemy ranks, (3) Make enough threat or clamor to cause the enemy to quail, (4) Don't try to get any money out of it, (5) Make every attack by us also sell Scientology and (6) Win. If attacked on some vulnerable point by anyone or anything or any organization, always find or manufacture enough threat against them to cause them to sue for peace. Peace is bought with an exchange of advantage, so make the advantage and then settle. Don't ever defend. Always attack. Don't ever do nothing. Unexpected attacks in the rear of the enemy's front ranks work best.
The goal of the Department is to bring the government and hostile philosophies or societies into a state of complete compliance with the goals of Scientology. This is done by high level ability to control and in its absence by low level ability to overwhelm. Introvert [their word for infiltrate] such agencies. Control such agencies. Scientology is the only game on Earth where everybody wins. There is no overt in bringing good order."
["Overt" is a wrong-doing against Scientology.]
**********************
9 March 1970
Guardian WW
D/G Int WW
Re: Successful and Unsuccessful Actions
Dear Jane,
The following is a list of the successful and unsuccessful actions used by intelligence.
Successful - Prosecuting Traitors - [that means traitors to Scientology]
1) In the United States finding evidence of a crime and handing it over to the police or vice-squad. This is any crime.
2) In the United Kingdom - Finding evidence of a crime against the org [that means organisation], and having a representative of the Church press charges for a prosecution.
Regularly getting out files and reading through them.
Especially any files or cases that were handled prior to your coming on post.
If reading through files brings up a connection you were not aware of, or had forgotten, chase it up and get out the other files pertinent to the area. [All these are the files which Hubbard says are absolutely confidential.]
Use the files regularly and continuously referring to them as often as possible. Crossfiling should not only be done under names of people but under groups and organizations as well.
Also under subjects. In other words thorough crossfiling.
Use of telephoning to get simple information such as addresses etc., rather than a personal visit.
Contacting the secretary or aide of the person you are interested in and chatting them up. Note this is very successful in getting tricky information that is not available in other areas. Is Dr. so and so on his vacation now? Where is he? How long will he be gone?
Invent letterhead of some organization that is spurious, i.e.
have it printed up and use it to make queries. Use some fairly safe address but don't be over cautious. if you have a letterhead nobody seems to bother checking it. Examples "Ford Foto Features" or "The Council for Human Relations in Industry". If you have a letterhead of any sort you will get answers to your questions most of the time. Of these using a phoney News Agency is the most successful.
Using 2D [that means Second Dynamic, and it means sexual relations or relationships or family relationships] on someone high in the government to seduce them over to our side. This particular action was not started as an intelligence action but was more personal. It did however move into 2D activity.
Infiltrating an enemy group with the end to getting documents.
These can either be about their own plans or what they have on us.
Covert third partying with forged or phoney signatures.
Anonymous third partying. Particularly the Internal Revenue service appears to follow up every tip off they get. Getting information out of files. This is of course only vital files, not just any files.
Direct theft of documents ... " ["Third partying" is character assassination.]
----------
"25 Mar 1977
RE: RED BOX
Dear All,
This is to introduce into B1US [Bureau 1, US - Ed.] the complete red box system. Most of you have heard of this earlier - I will now explain it in detail.
First of all, all data that is red box data, has to be pulled from your areas. The complete definition of Red Box material is attached.
Secondly, you must ensure that none of your juniors (for those of you who have them) have red box data in their areas. All the red box material from your areas must be centrally located, together and in a moveable container (ideally a briefcase, locked, and marked.
When this is done in each area, we will divide up the amounts and deputize persons in the area to be responsible for its removal from the premises in the case of a raid. This procedure will be drilled. This procedure will stay in at the new location.
Please have all this data sorted and located in proper container by Monday night Mar 28. 1 will then divide up removal duties, and we will drill it Tuesday night just before the all hands.
RED BOX DATA INFORMATION SHEET
1. What is Red Box data?
a) Proof that a Scientologist is involved in criminal activities.
b) Anything illegal that implicates MSH (Mary Sue Hubbard), LRH (L. Ron Hubbard).
c) Large amounts of non-FOI [Freedom of Information Act] docs.
d) Operations against any government group or persons.
e) All operations that contain illegal activities.
f) Evidence of incriminating activities.
g) Names and details of confidential financial accounts."
"Two things: You don't don't have to do what your bank says. And the other one is, you don't have to add your own case in to any computation you make. And these are two of my stablest, stable data in Dianetics and Scientology...They are good ones to use."
L. Ron Hubbard,
from the 20th American ACC,
"Case Analysis—Rock Hunting",
1 August 1958
*******************************
"HCO POLICY LETTER OF 15 AUGUST 1960
In the face-of danger from Govts or courts there are only two errors one can make: (a) do nothing and (b) defend. The right things to do with any threat are to (1) Find out if we want to play the offered game or not, (2) If not, to derail the offered game with a feint or attack upon the most vulnerable point which can be disclosed in the enemy ranks, (3) Make enough threat or clamor to cause the enemy to quail, (4) Don't try to get any money out of it, (5) Make every attack by us also sell Scientology and (6) Win. If attacked on some vulnerable point by anyone or anything or any organization, always find or manufacture enough threat against them to cause them to sue for peace. Peace is bought with an exchange of advantage, so make the advantage and then settle. Don't ever defend. Always attack. Don't ever do nothing. Unexpected attacks in the rear of the enemy's front ranks work best.
The goal of the Department is to bring the government and hostile philosophies or societies into a state of complete compliance with the goals of Scientology. This is done by high level ability to control and in its absence by low level ability to overwhelm. Introvert [their word for infiltrate] such agencies. Control such agencies. Scientology is the only game on Earth where everybody wins. There is no overt in bringing good order."
["Overt" is a wrong-doing against Scientology.]
**********************
9 March 1970
Guardian WW
D/G Int WW
Re: Successful and Unsuccessful Actions
Dear Jane,
The following is a list of the successful and unsuccessful actions used by intelligence.
Successful - Prosecuting Traitors - [that means traitors to Scientology]
1) In the United States finding evidence of a crime and handing it over to the police or vice-squad. This is any crime.
2) In the United Kingdom - Finding evidence of a crime against the org [that means organisation], and having a representative of the Church press charges for a prosecution.
Regularly getting out files and reading through them.
Especially any files or cases that were handled prior to your coming on post.
If reading through files brings up a connection you were not aware of, or had forgotten, chase it up and get out the other files pertinent to the area. [All these are the files which Hubbard says are absolutely confidential.]
Use the files regularly and continuously referring to them as often as possible. Crossfiling should not only be done under names of people but under groups and organizations as well.
Also under subjects. In other words thorough crossfiling.
Use of telephoning to get simple information such as addresses etc., rather than a personal visit.
Contacting the secretary or aide of the person you are interested in and chatting them up. Note this is very successful in getting tricky information that is not available in other areas. Is Dr. so and so on his vacation now? Where is he? How long will he be gone?
Invent letterhead of some organization that is spurious, i.e.
have it printed up and use it to make queries. Use some fairly safe address but don't be over cautious. if you have a letterhead nobody seems to bother checking it. Examples "Ford Foto Features" or "The Council for Human Relations in Industry". If you have a letterhead of any sort you will get answers to your questions most of the time. Of these using a phoney News Agency is the most successful.
Using 2D [that means Second Dynamic, and it means sexual relations or relationships or family relationships] on someone high in the government to seduce them over to our side. This particular action was not started as an intelligence action but was more personal. It did however move into 2D activity.
Infiltrating an enemy group with the end to getting documents.
These can either be about their own plans or what they have on us.
Covert third partying with forged or phoney signatures.
Anonymous third partying. Particularly the Internal Revenue service appears to follow up every tip off they get. Getting information out of files. This is of course only vital files, not just any files.
Direct theft of documents ... " ["Third partying" is character assassination.]
----------
"25 Mar 1977
RE: RED BOX
Dear All,
This is to introduce into B1US [Bureau 1, US - Ed.] the complete red box system. Most of you have heard of this earlier - I will now explain it in detail.
First of all, all data that is red box data, has to be pulled from your areas. The complete definition of Red Box material is attached.
Secondly, you must ensure that none of your juniors (for those of you who have them) have red box data in their areas. All the red box material from your areas must be centrally located, together and in a moveable container (ideally a briefcase, locked, and marked.
When this is done in each area, we will divide up the amounts and deputize persons in the area to be responsible for its removal from the premises in the case of a raid. This procedure will be drilled. This procedure will stay in at the new location.
Please have all this data sorted and located in proper container by Monday night Mar 28. 1 will then divide up removal duties, and we will drill it Tuesday night just before the all hands.
RED BOX DATA INFORMATION SHEET
1. What is Red Box data?
a) Proof that a Scientologist is involved in criminal activities.
b) Anything illegal that implicates MSH (Mary Sue Hubbard), LRH (L. Ron Hubbard).
c) Large amounts of non-FOI [Freedom of Information Act] docs.
d) Operations against any government group or persons.
e) All operations that contain illegal activities.
f) Evidence of incriminating activities.
g) Names and details of confidential financial accounts."