Confidential
28 March 1972
CS-G Hat
GOWW Hat
D/G Hats
A/G Hats
Bu of InfoCOUNTER ATTACK TACTICS1
PRINCIPLE: When PR and Legal find themselves engaged in handling attacks, Intelligence has failed.
SITUATION: Those who attack Scientology as proven by Oxford Capacity Analysis graphs, criminal or shady record, personal lives etc., are provenly suppressive. When such people, as is currently common, ascend into the heights of governments or public or private organizations, or the press, they are able to exert the fullest dramatization against anything which might benefit others and usually do.
Being suppressive (a kind word for insane) their aims are destructive.
This is not limited to their fancied enemies. They are destructive to themselves and their own government or institution. This is well known to us. But there IS a situation in it which has not been solved.
WHEN YOU THREATEN TO UPSET THINGS WITH A COUNTERATTACK THIS IS PLEASING TO SUCH PEOPLE AND THEY GO ON ATTACKING AS THEY WANT THEIR OWN GOVT OR INSTITUTION ACTIVITY ATTACKED.
In other words, one plays into their hands. They WANT riot and civil commotion.
Also, by the laws of insanity (see HCO B 29 Nov 70, C/S Series 22, PSYCHOSIS) they also want themselves destroyed.
This is also known as “being selected as somebody’s executioner.”
The more you attack, the more such people goad one.
This is the true principle behind Clausewitz’s “laws of war” in which attack gets counterattack.
Such people are suicidal.
Investigation discloses, for instance, that certain persons in the US govt continually alienate OPINION LEADERS so they attack the govt. Upward of 2000 army sergeants in Defense Intelligence were engaged in just this in recent years.
IRS picks a celebrity a year to attack and degrade “as an example”.
The powers that be sometimes remove such persons. Robinson, Minister of Health, Goodrich, former FDA chief amongst others were removed by other seniors at Scientology insistence but they themselves left on post would have gone on attacking harder and harder until the resulting counter-commotion had practically destroyed their agencies.
WHY: An attacker who is attacking out of his own dramatization will go on attacking until his government or agency is destroyed by the counterattack because he is generally destructive.
STATS: The UK attacks tapered off and successful recovery was begun when Robinson was removed. The FDA agency attack began to cool down when Goodrich was forced to resign. The AMA attack apparently continues via various channels and nobody has been removed.
IDEAL SCENE: (For Information Bureau) Attackers against Scientology located and removed from their positions of power so that Scientology can get on with it. And any threat of attack restrained, leaving Scientology a clear field.
HANDLING:
BRIGHT IDEA:
1. These persons can always lose their jobs. These jobs, permitting them power to destroy, are valuable to them. This is A POINT OF VULNERABILITY.
2. If the person’s job is also not valuable to him or if he cannot be made to cost his job, something can be found which he is seeking to protect and it can be threatened.
EVOLVED OPERATING PRINCIPLES:
A. COUNTER ATTACK TO OBTAIN THE REMOVAL OF THE PERSON with a product of DISMISSED ATTACKER.
B. If on test, A is not feasible, SURVEY TO FIND WHAT THE PERSON CONSIDERS VALUABLE AND USE IT FOR RESTRAINT.
C. AVOID WHERE POSSIBLE THE COMMOTION AND WASTED ENERGY OF PARALLELING AN ATTACKER’S OWN EVIL PURPOSE OF DESTROYING HIS OWN GOVT, AGENCY OR INSTITUTION AND INSTEAD DISCOVER THE ATTACKER AND OPERATE TO COST HIM HIS JOB.
D. Where A and C fail, use B.
PLAN:
(a) Wherever an attack is in progress (and even when being held off by counter-propaganda from PR or actions from Legal) at once swiftly draw up a precise program using Intelligence principles and cross filing to isolate the attacker.
(b) Identify the instigator.
(c) When identified or even suspected as the instigator, draw up a project which includes at least three channels to cost him his job.
(d) Draw up a second project at once to survey and discover what the person really is defending and threaten it effectively.
(e) Execute the projects rapidly.
(f) On achieving success inform PR so that PR can call off the PR counterattack and capitalize on any information gained if it does not expose Intelligence.
(g) Inform legal so Legal can replan and utilize the information also gained to mop up.
NOTE: Intelligence in these regards is not feeding PR and Legal as the only fruit of its endeavors. It is OPERATING INDEPENDENTLY of these two functions with ITS OWN PRODUCT: I.E. A DISMISSED ATTACKER or its secondary product: a totally restrained and muzzled attacker.
Note: A small unit operating with superior technology can triumph over the most gigantic but vulnerable enemy and render him pleasant.
——————–
Notes
- This document in PDF format. Document source: https://scientologyosa.wordpress.com/ ↩