A couple of weeks ago, Marty Rathbun posted what he says is a leaked program outlining a Scientology operation to shudder ex-Scientologist Chuck Beatty into silence. Targets of the program include signing Beatty up to get sleazy material sent to his house and having someone befriend Beatty to find out if he has child porn on his computer, then reporting him to the police.
Marty’s flock of sheep responded with outrage — 450+ comments, many condemning the Church’s acts, and rightfully so. Obviously, if someone really is a child pornographer, jail is where they belong. But to accuse someone of being a pedophile is about as low as it gets. (I’m guessing Mr. Beatty is innocent. He gave Marty permission to post the accusations uncensored, so I doubt he has anything to hide.)
Assuming this program is genuine*, how could Church leader David Miscavige do such a thing? One could say it’s because he’s an evil little troll bent on world domination.
One could also say he was simply doing what Scientology founder L. Ron Hubbard said to do.
Here are quotes from some of the LRH policies that justify the Church’s alleged actions against Mr. Beatty (all sourced from pre-1986 tech volumes):
“These people who attack [Scientology] have secrets. And hidden crimes.” — LRH, HCO PL 18 Feb 1966, ATTACKS ON SCIENTOLOGY (Continued)
“This is the correct procedure: 1) Spot who is attacking us; 2) Start investigating them promptly for FELONIES or worse using our own professionals, not outside agencies; (…) 4) Start feeding lurid, blood, sex, crime actual evidence on the attackers to the press.”
“The way we will eventually stop all attacks from here on out is by processing the society as follows: (1) Locate a source of attack on us. (2) Investigate it. (3) Expose it with wide lurid publicity. Don’t worry about libel… select targets, investigate and expose before they attack us.” — LRH, HCO PL 25 Feb 1966, ATTACKS ON SCIENTOLOGY (Additional Pol Letter)
“When such agents act or sound very suppressive, get them investigated, find the scandal and attack… such people also have crimes in their background that can be found. Find and expose them.” — LRH, HCO PL 26 Dec 1966, ADMIN KNOW-HOW PTS SECTIONS, PERSONNEL AND EXECS
Chuch Beatty was attacking, so he must have crimes. LRH’s assignment: Investigate, find the most lurid crimes possible, and expose them. Those were LRH’s express instructions. And LRH’s “tech” must be followed to the letter.
* There are holes in the story. Biggest one: The Wayback Machine shows that a “truthaboutbeatty.org” site was ever set up. Regardless, there is no doubt that Chuck Beatty was seen by the Church as an enemy. Even if this program is not legit, it is indicative of the type of actions the Church has been known to take against its enemies.
MY CHALLENGE TO INDEPENDENT SCIENTOLOGISTS
From your comments on Marty’s blog (at least, the ones that weren’t censored), you clearly abhor the actions taken against Mr. Beatty as much as I do. Now that you have seen the LRH “tech” behind those actions:
1) Will you join me in condemning L. Ron Hubbard for writing policies that condone such evil, invasive, and mean-spirited acts?
2) In his preamble, Marty talks about reforming the Church of Scientology “by foremost following the policy of its Founder.” Will you join me in asking Marty if he includes the Founder’s policies such as those I’ve quoted above?
Marty’s $cientology 2.0’s decision to take what they want and ignore the rest of what ElRon said is the very DEFINITION of squirreling the tech. (per ElRon ‘source’ himself)… They are either not willing to ‘confront’ that, or are still drinking the kool-aid from their brainwashing.
Yawn. Marty barks like a dog but he has got no teeth. DM is not worried about this dork at all – all he inherits are those that won;t give anymore or pursue more Scientology – they are a liability to the C of S. If 2,000 Scios demanded DM step down they have no rights in the matter. Marty might as well ask Obama to stop being president – he has about the same odds.
Make no mistake, Marty is after his own Cult. He has all the credentials.