OFFICE OF SPECIAL AFFAIRS
1 September 2006
OSA Network Order No. 601
(Excerpted from a briefing of 28 August 1972.)
We use intelligence, counter-espionage technologies and they are very standard.
We have added what is called in intelligence, flair to this business.
It is an art and a science and there is a standard procedure. I have been trained in this line of country and I have been trained, of course, in censorship also. That is an art in itself. Everybody thinks: “Censorship, well that’s people that cut things out of the paper.” That has very little to do with censorship.
Censorship is how you corral the enemy’s trade and break him financially. That’s censorship. It also operates as counter-espionage because you get the course of their letters and where they go.
All the public ever sees of it is a little tiny thing called security of people’s letters, making sure they don’t let go of information they shouldn’t have, or something like that. Tiny.
You can do things with these technologies. Just like anything else, they have to be rather standardly used and they are developed technologies and they are very old.
L. RON HUBBARD
HUBBARD COMMUNICATIONS OFFICE
Saint Hill Manor, East Grinstead, Sussex
HCO POLICY LETTER OF 1 SEPTEMBER 1969R
REVISED 24 SEPTEMBER 19831
Int Finance Office
HCO PL 12 Oct. 82 CORRUPT ACTIVITIES
HCO PL 14 Mar. 82 FINANCIAL IRREGULARITIES
HCO PL 13 Jan. 83
THE BUSINESS OF ORGS
No country or company has ever solved espionage and intelligence actions within it.
Industrial “espionage” is a very prevalent activity.
As our policy letters and materials are often found in wrong hands, we must be subjected to internal espionage on occasion. We certainly are subjected to intelligence externally.
Intelligence actions internally in a company or organization take five main courses:
1. Theft of documents or materials.
2. Executive actions contrary to the company’s best interests, if not outright destructive.
3. Administrative enturbulation, including messing up files, addresses, facilities or communications.
4. False reports or false advices to customers or staff to bring about apathy or defeatism.
5. Perversion or corruption of the product (in our case, technology).
Financial gain is the primary motive in almost all cases of infiltration. A very experienced European intelligence officer stated that he had never failed to buy any person he had ever approached in any government, and this in a lifetime career in the field of espionage.
Governments and many companies have amongst them people who are in or who can be forced into heavy financial trouble.
By offering surprisingly small sums of money, anyone of the five actions listed above could be effected by an enemy.
The practice is so common as to be commonplace, but the harm done is all out of proportion to the effort employed.
Guarding against infiltration is a vital action for survival, and nations and companies spend huge sums on counterintelligence, the action of foiling the efforts of enemies.
In studying the extensive literature of this subject, an inexpensive, effective solution has occurred to me which I do not think has ever been used. If finance is the motive, then of course one should reward successful counter-intelligence actions.
An enemy seeks those in debt or forces persons into debt so they can be bought. If the person being baited were assured of a safer reward, the person would usually incline toward his own country or company.
An org should therefore display in an area mostly frequented by staff, near the staff bulletin board or in the wc, but not necessarily to the public, a placard worded somewhat as follows:
As industrial espionage is an ordinary occurrence in most companies, the staff is requested to be alert for:
1. Any theft of documents or materials.
2. Orders or directions which will result destructively.
3. Any disturbance of files, bills or addresses.
4. False reports or advices to staff or customers or preached defeatism.
5. Willful corruption of tech.
Anyone detecting any of the above should report the matter at once to the Reports Officer, Religious Technology Center, with names and full particulars.
Should further investigation result in the disclosure and apprehension or arrest of persons attempting willful harm to this organization
A REWARD OF $1,000.00
will be paid by the International Finance Office.
Should a staff member be approached and asked to attempt any of the above actions, he should promptly seem to agree, should accept any money offered (which he may keep) and should quickly and quietly report the matter to the Religious Technology Center so that the instigators can be traced and arrested, at which time the $1,000.00 reward will be paid after the apprehension, arrest and conviction of the person(s) attempting the willful harm to this organization.
Another reward of $400.00 will be paid any staff member or person in the field who should hear of or be subjected to any provocative antiorganization activity in the field and who then forwards sufficient evidence of the criminal background and connections of the provocative person in such form that it may be given to the police by the Religious Technology Center.
Should any staff member have knowledge of any financial irregularity within the organization and furnish proof of it to the Int Finance Office and RTC promptly along with evidence sufficient to successfully prosecute, he shall be given a reward equivalent to 25 percent of all monies recovered or $1,000.00 whichever is less.
Any person or agency attempting to accomplish any of the above five points by reason of attempted BLACKMAIL of a staff member is liable to arrest. In this case the reward is also paid to the staff member on the arrest and conviction of those attempting the blackmail. Staffs are requested to cooperate fully to help continue to make an org and area a safe environment from which freedom may expand.
Alertness is the penalty we pay for living in an aberrated society.
Truth cannot live in an atmosphere of deceit.
Religious Technology Center
The amount of the rewards may be changed from time to time. It is the responsibility of the Int Finance Office to update the amount of the rewards in the future.
Our Dianetics and Scientology orgs are fortunate in that where tech is “in” very little infiltration can occur since persons cannot benefit from things they try to harm. Our primary protection is “in” tech and well-processed staffs. It follows that when tech is out, ethics will be found out also.
Persons who have no or little case gain are the only ones we have any trouble with.
No other organization and no country has as good a chance as ours to be free of infiltration.
One other thing worthy of note in connection with counterintelligence is that countries and companies which do not have a high cause, a high allegiance, have need of tremendous counterintelligence forces.
If we keep our integrity high and give staffs good and valuable government, we will have maximum counterintelligence effectiveness with minimum effort since our staffs would themselves militantly defend their executives and the org.
L. RON HUBBARD