Exhibit 52Ops checksheet - page one1. Read GO Intell Its Role.
2. Demo how an Op could result in harm to the Org if it was done without consulting establishment data.
3. Clay demo a covert operation on an opponent which him and the beneficial result to us.
4. Clay demo how knowing the mental processes of persons can make for an effective op.
5. Demo how using violence in an Op could bring about public scandal on the Org.
6. Clay demo what would happen to a Scn area where no or ineffective Ops were conducted.
7. Read Scn Five, HCOPL 14Aug73
8. Do the drills in the drill section of this PL.
9. Select an enemy and try to write an attack article on them without using any of the 7 criteria for a press story.
10. Read HCO Manual of Justice, "Punishment", "The basis of All Crime".
11. Read The Guardian, 1 Mar 66, "Intell Sectn".
12. Read Attacks on Scientology, 25 Feb 66.
13. Take steps 1-4 and write an essay on how these steps can apply to an operation.
14. Read Public Investigation Section 17 Feb 66.
15. Demo three different channels through which crimes could be exposed covertly (ie, source not COfS)
16. Read Intell Actions 25 Apr 68.
17. Demo why proper filing is important to Ops.
18. Read Intell Actions -- Covert Intell Data Coll, 2 Dec 69.
19. Clay demo what happens if no care is taken to cover the source of covertly collected data when it is being exposed.
20. Demo the main similarities, differences and identities between covert data collection done by (1) Collections (2) Operations.
21. rate, M7, M4 the section on "Covert Operations".
22. Look up in a BIG dictionary, use in sentences, demo kit and get conceptually the following words:
COVERT
DISCREDIT
PROPAGANDA
OPERATION
OVERTHROW
EXPOSURE
EMBARRASS
REMOVE
OPPONENT
23. Clay demo a covert operation on an opponent which embarasses him and the beneficial result to us.
24. Clay demo a covert operation on an opponent which discredits him and the beneficial result to us.
25. Clay demo a covert operation on an opponent which overthrows him and the beneficial result to us.
26. Clay demo a covert operation on an opponent which removes him and the beneficial result to us.
26-A. Clay demo a covert operation on an opponent which restrains him and the beneficial result to us.
27. Demo the difference between an actual and possible opponent.
28. Write up a program to run an operation on an enemy which utilizes the "enemy propaganda tactic" which has been used against us. (You do not need to get as detailed as you would in a project, but include enough data so that you could write detailed projects off of your program if you needed to.)
29. Clay demo why it is important to have a known objective when engaging in a covert operation.
30. Demo what would happen to your program in #28 if its objective was total annihilation of that enemy group and it never lead to an overt operation.
31. Demo how much exposure it would take for your #28 program to (a) fade out; (b) be blown.
32. Write an essay on why ops are based on data, and how the quantity and quality of data can effect the product of the op.
33. Read the WFMH Program.
34. Demo how not doing target #8 would effect the product of the Program in an area.
35. Enemy Names, 16 Feb 66, is to be read.
36. Taking the data and example in paragraphs 8 and 9, choose a recent attack from your own area and demo a similar B1 handling of that attack.
37. Demo why running an operation on enemy territory or subject is better strategy than running an operation on your own territory or subject.
38. Read Battle Tactics, 16 Feb 69 II.
39. Demo what happens when you attack a wrong enemy target.
40. Write an essay on how you could get an enemy to attack a wrong target, and why this is a good tactic.
41. In reference to P. 2, paragraph 4, Clay demo: why it is important to know your public's hate and love buttons when running an operation on an enemy.
42. Targets Defense, 16 Feb 69 IV, to be read.
43. Taking targets T1-T7 on page 2, demo how operations could assist the GO in accomplishing such target.
44. Read Info Bureau Stat GO 1150, 7 May 57.
45. Locate the definition of an "incident" which aligns to operations products. Write a summary report of a fictional months work in an operations section. Now with a different colored pen underline the incidents in that report.
46. Read Intell Estimates and Predictions, GO 907, 22 Aug 73.
47. Clay demo the relationship of Ops to CIC and Collections in the overall activity of finding and handling a WHO.
48. See page 2, "Prediction: Dogs will continue ..... (8 lines) ...... give up her career of crime." Write up a simple general plan to handle Mrs. Snap from an Ops viewpoint.
49. Read Purpose of GO, GO 1514, 26 Jan 75.
50. Do clay demo stated in last sentence of this issue from the viewpoint of the Ops post.
51. Read C/S Series #22 (HCOB)
52. (reference section: "Nature of Man") If you were being attacked by the local psychiatric society and knew by investigation that "Dr. Fender" of that society is the insane person within the society instigating attacks on your Org, which would be the better target of an operation, the society or Dr. Fender? Why? Write an essay on this explaining your reasoning in detail.
53. (reference section: "Technique") Taking the way you would assist a Scientologist out of an insane state or prevent it, utilize the theory of the technique and apply it to an Ops plan to attack or cave-in an enemy. Demo it.
54. Read The Anti-Social Personality, The Anti-Scientologist, HCOB, 27 Sept 66.
55. Read P.A.B. #124, "Communication and Is-ness", 15 Nov 57.
56. Demo what would happen if B1 only defended an Org from its enemies and never ran any offensive operations.
57. rate, M7, M4 each of the Operations Definitions.
58. Demo the activity and product of conducting a button survey.
59. Demo a simple Ops plan and its three separate channels.
60. Demo a created B1 incident and how it could be exploited by PR.
61. Demo the differences in the current state of Scientology in an area, when Ops has: (1) a totally unrestrained enemy; (2) a restrained enemy; (3) a removed enemy.
62. Read the USB1 Operations Weekly Stat form.
63. Read the Third Party Law, 26 Dec 68.
64. Demo what would happen if you continued to battle an attacker, but never located or handled the instigator behind your problems with that attacker.
65. Write up a situation in which you could use the 3rd Party Law as the basis for an operation, what your product would be, and how you would go about achieving that product.
66. Read the Target Series.
67. Mock up a fictional project to carry out off the major target of: " (person) of (group) losing his/her job from which he/she is attacking Scientology."
68. Now demo what could happen if you did, or had this project done without the major target stated.
69. Demo what could happen if there were no primary targets.
70. Demo what could happen if there were no vital targets.
71. Demo what could happen if there were no conditional targets.
72. Demo what could happen if there were no operating targets.
73. Demo what could happen if their were no production targets.
74. Read Black PR, PR Series 7.
75. Demo the differences, similarities and identities between regular PR and Black PR.
76. Read the survey data in PR Series 13, 14, 15R, 16.
77. Mock up an Ops situation for which a more formal type survey would be advantageous to use; mock up the cover you'd use while taking the survey, how it would be executed, and what questions you'd ask.
78. Read How to Handle Black PR, PR Series 1d.
79. Demo how a rumor that has no basis in fact can go through a society.
80. Demo why an Ops propaganda campaign based on true data lasts longer and is more effective than one based on false data.
81. Write an essay on what you would do if while running operations on an opponent, the opponent begins to run a black propaganda campaign on you (ie, tries to discredit your ops actions). Include how you would do it.
82. The Enemy Line, PR Series 27, read it.
83. Demo an ops situation where the enemy makes a "Glutz PR" mistake in trying to defend against your op, and how you would capitalize on it.
84. Read FBI Bulletin, May 67, "Typewriter Examinations".
85. Mock up an Ops situation which involved your typing up a document which is intended to wind up in enemy hands. Take each point listed in the FBI write-up which could present a security problem to you and write up how you're going to handle it when typing up your document.
86. Read FBI Bulletin, Feb 67, "Document Examination from a Photocopy".
87. Mock up an ops situation where you'd want to use an altered or phoney document. Based on the FBI write-up, write out what steps you'd take to make the document most difficult to examine for authenticity.
88. Now produce such a document.
89. Read FBI Bulletin, 1966, "Approximate Age of a Document".
90. Mock up a document which would be hard to date as to its creation.
91. Now attach a cover sheet to the document explaining each basic thing you did to accomplish a document which is hard to date.
92. Read the book, Black Boomerang, by Sefton Delmar; and while reading the book note down any major ideas you get on apply a method or technique presented in the book to your Ops post duties.
93. Develop one or more of these ideas in a write-up, and also list any points you would need to research further in order to fully carry it out.
94. (prerequisit to doing Spy and His Masters items is completion of Spy and His Masters items on the GO WW checksheet - GO 1314)
Read Chapt. 3 of Spy and His Masters.
95. Clay demo why it is important for the operations case officer to be able to run tight control on the operations agent while an op is in progress.
96. Read Chapt. 4 and Chapt. 5.
97. Write up an operation in which the agent carrying out the operation would need a pretty good cover.
98. Now write-up in full a cover for that operation agent which is:
a. Not sufficient for the operation and the agent and the Org would get blown on the simplest investigation.
b. Overly sufficient for the agent, would never get blown, and would be so elaborate and time consuming to mock up that it would be impractical.
c. Sufficient to get the job done, cannot be blown, and can be built in enough time to be of use.
99. Clay demo a situation in which you are exposing documents obtained by a collections agent still in place, and the cover you are using in exposing those documents so that the collections agent doesn't get blown.
100. Read Chapt. 6.
101. Now go out and observe and speak with several Scientologists and several wogs on non-Scientology subjects. Note all major observations about Scientologists which tipped you off to them being a Scientologist that you did not observe in the wogs. List them out. (This drill must be done honestly from the viewpoint of not knowing beforehand whether the person is a Scn or not)
102. Now for each item on the list write out how you would handle those characteristics in a potential ops agent so that he would not be spotted as a Scn. after being observed by or talked to by the enemy.
103. Read GO 1735 Intell and PTSs.
104. Clay demo why you don't use a PTS agent to carry out an operation.
105. Read 2 Dec 74, DDG I WW Write-up on Plants.
106. Demo the relationship (the proper one) of the Ops agent, the Ops case officer, ops headquarters and the enemy individuals throughout a sequence of an op beginning, the agent getting caught doing something considered improper all the way through to the end of the cycle which finds the case officer and headquarters never being found out about.
107. Read Ops US Successful and Unsuccessful Actions, Aug 75.
108. Demo each successful and unsuccessful action.
109. Read Br 1 US write-up, 24 July 75, Agents, Selecting and Running Them. Case Officer Actions.
110. Interview 3 non-B1 people and through good two way comm and obnosis determine each person's motivation. Write up results and if you'd recommend each person as an Ops agent (based only on this criterion).
111. Interview 3 non-B1 people determining as much as possible their ethics level (chart of human evaluation; Science of Survival); then check their ethics history in the files. Write up results and if you'd recommend them as Ops agents. (based only on this criterion).
112. Now interview and check ethics files on 3 more non-B1 people locating both their motivation and ethics level. Then check any other data or files, etc. necessary to determine whether or not you'd take them on as ops agents.
113. Clay demo what happens to an ops agents production and products when the ops case officer has dropped out good and regular 2 way comm with the agent.
114. Read WW write-up "The Tailing and Following of Agents: What to Do."
115. Get a coach to drill you through dummy examples, him being the one who's tailing, you being the one tailed. Do gradiently to the point where you feel confident about doing it and the coach really gets the missed-withhold phenomena.
116. Do TR/3 Int. on ops subjects.
117. Do TR/3 Reporting on Ops subjects.
118. Do TR/3 Blown cover in ops situations.
119. Read "The Case Officer", 17 Dec 74 WW.
120. Demo why infoing the ops agent of major GO wins and keeping the agent assured of his worth is often a valuable function of the Case Officer.
121. Read in the book CIA, and Cult of Intelligence, Chapt. 6., by Marchetti and Marks.
122. Read the following parts of the book KGB, by J. Barron. Chapt. 4- p. 78 "Disinformation Dept A", "Executive Action Dept. V."; Chapt 6- p. 86 "Tech Ops Dir"; and Chapters 8, 11 and 13.
123. Read the book Psychological Warfare Against Nazi Germany by Daniel Lerner, 1971.
The Art of War, by Sun Tzu
translated by Samuel B. Griffith
Oxford University Press 1972.
(It is recommended that a good map of China and a Chinese history book are available if needed while reading this book.)
(1) Read Biography of Sun Tzu, p. 57. (0 rate) _____.
(2) Read Chapt. 1 "Estimates". (0 rate) _____.
(a) Clay demo, "It is advantageous to use deception when attacking". _____.
(b) Do a demo on how weather could adversely effect an operation if not planned for. _____
(3) Read Chapt. 2 "Waging War". (0 rate) _____.
(a) Write an essay on how Sun Tzu's statement "For there has never been a protracted war from which a country has benefited" could apply to running operations. _____
(4) Read Chapt. 3 "Offensive Strategy". (*0 rate) _____. [* and get conceptually the following words:]
(a) In an essay apply Sun Tzu's statements 4-7 to operations on a Scientology enemy situation and explain how Sun Tzu's priorities are valid in that situation. _____
(b) Clay demo how "knowing the enemy" makes for a better operation than being ignorant of the enemy. _____
(5) Read Chapt. 4 "Dispositions". (0 rate) _____.
(a) Demo how an operation can initially be a successful attack, but eventually result in overall defeat. _____
(6) Read Chapt. 5 "Energy". (0 rate) _____.
(a) Demo how operations are similar to Sun Tzu's "extraordinary forces". _____
(7) Read Chapt. 6 "Weaknesses and Strengths" (0 rate) _____.
(a) Taking Sun Tzu's statements 7, 8, 10, 11, from the attack viewpoint, demo the differences as to what happens when you attack an undefended point in an enemy and a defended point. _____
(b) Clay demo how doing the opposite of statement #9 could put you on the defense and at effect. _____
(c) Demo why statement #26 is important to operations. _____
(8) Read Chapt. 13 "Employment of Secret Agents" (0 rate)
(a) Demo how the different types of agents, statements 7-11, could be used in an operation. _____