[an error occurred while processing this directive] [an error occurred while processing this directive]
Return to the Cazares Documents index   Scientology's Intelligence Operations
against Gabriel Cazares

[Main Scientology Index][More Internal Scientology Documents]


Guardian WW
D/G Int WW                                      9 March 1970

               Re: Successful and Unsuccessful Actions

Dear Jane,
      The following is a list of the successful and unsuccessful actions
used by intelligence .

SUccessful





(portions illegible)





Contacting the secretary or aide of the person you are interested in and chatting them up. Note this is very successful in getting tricky information that is not available in other areas. Is Dr. so and so on his vacation now. Where is he?" How long will he be gone. I nvent xxx letterhead of some organisation that is curious, i.e. have it printed up and use it to make queries. Use some fairly safe address but don't be over cautious. If you have a letter head nobody seems to bother checking it. Examples " Ford Foto Features " or " The Council for Human Relations in Industry" . If you have a letter head of any sort you will get answers to your questions %95 of the time. Of these using a phoney News Agency is the most successful. Using 2D on someone high in the government to seduce them over to our side. This particular action was not started as an Int action but was more personal. It did however move into a B2 activity.

Bottom of page 2 (top illegible):

  were fifths hand information based on hearsay by the fourth person.
  Although our info didn't specifically affect the case it did give our
  legal more certainty to press on.

  Infiltrating an enemy group with the end to getting documents.  T hese
  can either be about their own plans or what they have on us.

  Covert third partying with forged or phony signatures.

  Anonymous third partying. Particularly the Internal Revenue service
  appears to follow up every tip off they get.

  Getting information out of files. This is of course only vital files,
  not just any files.

  Direct theft of documents.

  Org Lines
  Taking over and doing Sec checks on certain possible sec risks rather than
  letting HCO Continue.

  Insisting that old recognised Sec Risks be kept off lines. Best terminal
  for this is whoever is the most security concious on the H CO line.

  Insisting that Troublesome sources policy be kept in.



This page is maintained by Jeff Lee <godfrey@shipbrook.net>
All typographical errors in the original documents have been preserved on these pages.
[an error occurred while processing this directive] [Main Scientology Index] [Scientology Documents Index]