$cieno spies and their masters (was CAN Laura used a false identity, she says.)
[22 February 1999]

She assumed the identity (which is $tandard $cientology intel tech)
for the very purpose of deceiving

From: Gerry Armstrong <armstrong@dowco.com>
Newsgroups: alt.religion.scientology
Subject: $cieno spies and their masters (was CAN Laura used a false identity, she says.)
Date: 22 February 1999

On 22 Feb 1999 00:41:42 GMT, ceon@u.washington.edu (Ceon Ramon) wrote:

>In article <7anf8h$6lh$1@nnrp02.primenet.com>,
>James J. Lippard (lippard@primenet.com) wrote:
>>If I were in Karin's position, I think I would have done the same--pushed
>>hard to get CAN LT to make the admission public, and if contact was cut
>>off, gone ahead and revealed that fact.
>Why, Jim?
>It's not exactly as if it were protecting the national interest to violate
>confidences shared in private, even though it was (arguably) relevant to
>matters discussed here in a.r.s.
>Why would you find this of sufficiently compelling importance to break a
>promise of confidentiality and reveal to everyone in the entire world what
>had been said to you in private?
>>The situation is that one person has been using a false identity, to some
>>detriment of the person from whom the name was taken.
>Was there any real, legal, or even ethical damage done to Laura Whatshername?
>Terepin is not Laura Whatshername's name any more and hasn't been, by her
>choice, for many years.
>I also don't agree that her _identity_ has been compromised in any way.
>The CAN woman didn't use the name to pretend to _be_ the other woman. I.e.,
>she didn't try to deceive anyone that she actually was the original Laura

Of course she did. She assumed the identity (which is $tandard
$cientology intel tech) for the very purpose of deceiving specifically
the people who might run a cursory check of her background.

>she didn't use the original Laura Terepin's background in order to
>profit financially from the name;

You have no evidence for this assertion. And of course she used the
fake identity to profit financially. There is no evidence she is a
renunciant; whereas there is considerable evidence that she was
devoted to the thriving cult of greed. That the cult leaders, and any
OSA whore's masters, sought to profit financially by destroying CAN is
beyond, one would hope, quibble.

>she didn't cash checks or try to collect insurance policies or get a
>job based on the academic background or sleep with her husband.

Again you are making assertions based on no evidence. This is a call
for goose and gander sauce.

>>It seems to me that the rights of the latter person to be cleared of
>>accusations of being the one with the stolen identity
>No one has credibly or in any way that would cause actual damage to the
>reputation of the non-CAN-Laura accused her of anything. It's all been
>so much moonshine and business-as-usual-squabbling-among-the-critics.
>>outweigh the rights of the former to keep the fact of the false identity
>>confidential. I'm sure I'd feel differently if the false identity was completely
>>fabricated rather than taken from another person.
>You know, there have been a number of cases in the past twenty years of
>novelists or short story writers using names they picked out of phone books
>or simply made up (they thought) being sued by people who were born with
>those names. I don't know the results of those cases. I would hope they
>were thrown out as extortion attempts. Names are odd (and by no means
>fixed) qualities, and we might easily remember them for any number of
>legitimate reasons that have nothing to do with a desire or intention to
>actually _steal_ someone else's identity, i.e., pretend to be that person,
>down to her dyed roots and choice in shoes and lying smile.

Oh yes.

But let's check out a small section of $cientology's Intelligence Hat
(i.e., training manual).



BOOKS: To be read in student's own time
            Black Boomerang
            Science of Survival


1. Look up in a BIG dictionary, use in sentences, demo kit and get
conceptually the following words:

case officer

2. Introduction, Vienna 1956, Chapters 1 & 2

3. Chapter 3, The Spy and His Masters

4. Clay demo: The Case Officer - agent relationship

5. Clay demo: A Cut-Out
                      A drop
                      A safe house
                      Money motivation
                      Compulsion motivation
                      Personal Gain motivation
                      Ambition motivation
                      Political motivation
                      Duty Motivation

6. Chapter 4, The Art of Cover

7. Clay demo building a cover

8. Chapter 5, The Art of Cover II

9. Clay demos: Front Group
                       Cover Organization
                       Organizational Cover

10. Eval on Covers, by H. Brendel

11. Write up on covers

12: Drill: Write up three possible covers in detail that you could use
that are "real". (ones that you could actually utilize) Take them to
Dir Collections for OK.

[End Quote]

Who or what will proclaim that this is not evidence?

(c) Gerry Armstrong


Copyright © Gerry Armstrong - All Rights Reserved.