Subject: Senior HCO Int Executive Directive from May 11th, 1991
11 May 1991
SNR HCO INT ED 33
PILOT LCI/CONT LCs OSA INT/CONTS SNR HCO INT/CONTS LCs HCOs DSAs
SECURITY SITUATION HANDLING CHECKLISTS
Refs: HCO PL 16 Dec 68 SECURITY DIV 1 HCO PL 23 Jan 59 ETHICS HCO PL 21 Apr 70 FIELD ETHICS HCO PL 1 Sept 69R COUNTER ESPIONAGE FO 1664 DIVISIONAL PRIMARY FUNCTIONS SPD 2 Oct 88 ORGANIZATIONAL SECURITY HCO PL 30 Oct 62 SECURITY RISKS INFILTRATION HCO PL 23 Nov 59 EMPLOYMENT OF CRIMINALS FORBIDDEN SO ED 4234 Int HCO & OSA COORDINATION ON SECURITY & INVESTIGATION MATTERS HCO PL 23 Dec 65 SUPPRESSIVE ACTS, SUPPRESSION OF SCIENTOLOGY AND SCIENTOLOGISTS HCO PL 27 Oct 64R POLICIES ON PHYSICAL HEALING, INSANITY AND SOURCES OF TROUBLE
Attached are several checklists for use by HCO and OSA/DSA personnel in the handling of security risks and security related situations. They are intended as a guideline of actions which can be taken which are in alignment with the above policy letters. The checklists themselves do not supplant policy which should be used as the guiding factor in handling such matters.
The point of using them is that proper coordination exists between HCO/Snr HCO and OSA and most importantly that the situation are actually handled.
The checklists are to be kept by I&R Chfs, HASes, DSAs, Snr I&R Int, Snr PCO Int, Staff Security Officer OSA INT/CONT, Security Chf Snr HCO INT, OSA Invest terminals, and Security personnel where posted, for use by them. This checklist should be implemented by any one of these terminals who discover that such a situation exists in an org or in the field that requires immediate coordination and handling.
The types of security situations which may come up on HCO/OSA lines are described in the policy references listed above and are generally listed in SO ED 4234 INT as items a-o, which are listed here as follows:
a. PTS Type C situations with public where an external source is threatening legal or pushing someone to threaten legal.
b. Illegal PCs category number three, where a person has connections to an outside intelligence agency of some sort.
c. Any threat of legal action or any other attack from a public against the organization.
d. Squirrels or declared individuals who are pushing onto org lines or lines of staff or public in good standing, either covertly or overtly.
e. Newspaper reporters, psychiatrists, psychologists, police, intelligence agency connected personnel trying to get on org lines.
f. Persons PDHed to do destructive actions against Scientology and those who PDHed them.
g. Attempted suicide cases or PTS Type IIIs and any external or antagonistic connections to them.
h. Criminals or persons with a criminal record who are trying to get on org lines.
i. Institutional and shock cases trying to get on lines.
j. Persons who have come to investigate Scientology for news stories or any other reason.
k. Members of squirrel groups or suppressive groups, or past members of such groups.
l. Incidents of theft, break-in or physical attacks on Scientology persons or property.
m. Persons who are encouraging Scientology public or staff to take illegal and destructive actions.
n. Persons engaged in mutiny or outright sabotage or any of the actions described in HCO PL 1 Sept 69, Rev. 24.9.83, COUNTER ESPIONAGE.
o. Persons who are members or connected to members of Anti-Religious groups organized to attack or persecute religions.
In addition to the above, these checklists give a guideline for dealing with any instance of an illegal PC per HCO PL 27 Oct 6 Dec 76RB, ILLEGAL PCs, ACCEPTANCE OF or troublesome source per HCO PL 27 Oct 64R, POLICIES ON PHYSICAL HEALING, INSANITY AND SOURCES OF TROUBLE found on org lines, serious enough to present a security risk to the organization; or any attempted enemy infiltration detected on Scientology lines.
There are separate checklists provided:
1. One which lays out the internal actions to be taken by HCO.
2. One which lays out external actions to be taken by OSA/DSA personnel.
3. A specialized checklist for dealing with PTS Type III cases found on org lines.
4. A specialized checklist for handling of a theft of org property or material.
When a checklist is logged out to a situation, each step, upon completion, should be initialed with date and post title of the person executing the actions. Once the matter is handled the checklist can be filed with any folders realted to the matter.
SNR I&R INT
Approved by LRH COMM INT
Authorized by AVC FLAG
for CHURCH OF SCIENTOLOGY INTERNATIONAL