Feeds

Scientology threatens Wikileaks with injunction

You say 'Bible.' We say 'Advanced Technology'

The essential guide to IT transformation

The Church of Scientology has acknowledged that Wikileaks is offering the world quick and easy access to the church's top-secret "bibles".

Or should that be formerly top-secret?

On March 24, the swashbuckling truth-seekers at Wikileaks.org published what they referred to as "the collected secret 'bibles' of Scientology," and three days later, church-friendly lawyers threatened the site with legal action if the documents weren't taken down. Calling them "Advanced Technology of the Scientology religion," the lawyers pointed out that the documents are copyrighted works registered to the Religious Technology Center (RTC), a church-related holding company.

Wikileaks did not remove the documents. But it did tell the world their veracity has been verified.

Written by Scientology founder L. Ron Hubbard, these "Operating Thetan" (OT) documents show Scientologists how they can reach the eight different "levels" Scientologists are interested in reaching. That's OT1 to OT8. "A great many phenomena (strange things) can happen while doing these drills, if they are done honestly," reads a handwritten note from Hubbard, as he describes the path to OT1. These drills include:

1) Walk around and count bodies until you have a cognition. Make a report saying how many you counted and your cognition.

2) Note several large and small female bodies until you have a cognition. Note it down.

3) Note several large and several small male bodies until you have a cognition. Note it down.

4) Find a tight packed crowd of people. Write it as a crowd and then as individuals until you have a cognition. Note it down. Do step over until you do.

With an email dated March 27, the Los Angeles-based law firm Moxon & Kobrin said that in publishing such Advanced Technology, Wikileaks has violated US copyright law. "It is unlawful to reproduce or distribute someone else's copyrighted work without that person's authorization," the letter reads. "Indeed, courts have entered numerous permanent injunctions and awarded statutory damages and attorneys' fees regarding infringement of these and similar works."

In an apparent effort to find out who leaked the Advanced Technology in the first place, the lawyers also urged Wikileaks to "preserve any and all documents pertaining to this matter...including, but not limited to, logs, data entry sheets, applications - electronic or otherwise, registrations forms, billings statements or invoices, computer print-outs, disks, hard drives, etc."

Clearly, the Church of Scientology is unaware that Wikileaks preserves almost nothing - and that it isn't frightened of the law. Wikileaks realizes that the Church has often used lawyers and copyrights to prevent public access to its materials, but it sees this as little more than an indictment of the Western media.

"After reviewing documentation on Scientology's endless attacks, legal and illegal, on critics ranging from Time Magazine and CNN, which spent over $3 million defending against just one of their suits, to investigative freelancers who have had publishers pulp their books rather than facing litigation costs, we have come to the conclusion that Scientology is not only an abusive cult, but that it aids and abets a general climate of Western media self-censorship, due to the fear of litigation costs," a representative of the site told us.

"If the West cannot defend its cultural values of free speech and press freedoms against a money making cult like Scientology, it can hardly lecture China and other state abusers of these same values. Such states are quick to proclaim their censorship regime is no mere matter of protecting a cult's profits, but rather of national security."

In February, after Wikileaks released confidential information about its customers, Swiss-based bank Julius Baer asked a US court to shut the site down. But the bank eventually dropped its case, after Judge Jeffrey S. White said that a shutdown was barred by the First Amendment to the US Constitution.

Originally, White did order a shutdown. But this was less than successful. After all, Wikileaks is "bulletproof". ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Judge nixes HP deal for director amnesty after $8.8bn Autonomy snafu
Lawyers will have to earn their keep the hard way, says court
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.