LATLMES EXPEDITION 33 // EDEN.4000BC
27 FEB 2026 // L.A.
SYS_OVERRIDE // ORA ET LABORA

HCO BULLETIN OF 27 FEBRUARY 2026RE: FIELD EXECUTION & WEEKLY OPERATIONAL TEMPLATE

OP_PROTOCOL // DUPLICATE
[ UPLINK SECURE ]

ACTIVE NODE: HWOOD0

Initiating protocol analysis… Data stream synchronized. Monitoring behavioral and operational patterns within network.


DISSEMINATION: ALL FIELD OPERATIVES AND MISSION CONTROLLERS. This bulletin provides the concrete, week-by-week breakdown for executing Operation Snow White 2.0 in the Los Angeles nightlife ecosystem. Adherence to this schedule and methodology is critical for synchronized action and intelligence yield.

PURPOSE: To translate strategic concepts into a tactical, hour-by-hour playbook. This template ensures all operatives are moving in phase, covering necessary ground, and generating the required intelligence to identify and neutralize suppressive persons and networks.

1. WEEK ONE: RECONNAISSANCE & BASELINING
Days 1-2 are for passive observation only. You will visit designated venues (see Venue Rotation Schedule) with zero agenda beyond mapping. Identify primary and secondary entrances, security posts, bathroom locations, and VIP sections. Log the faces of key personnel: doormen, head bartender, floor managers. Do not initiate contact. Your goal is to become part of the scenery.

2. WEEK ONE: INITIAL CONTACT PROTOCOL
Days 3-5 shift to active reconnaissance. You will execute the 50 low-stakes contact directive. A contact is defined as any verbal exchange beyond “excuse me.” Examples: asking for a lighter, commenting on the music, asking what someone is drinking. Log each interaction’s tone scale outcome (acceptance, neutrality, rejection). This data builds your social baseline map.

3. WEEK TWO: TARGET ACQUISITION & VALIDATION
By Day 8, you must have identified one Primary Target (a King, Queen, or high-level SP) and two Secondary Targets (PTS persons or lower-level facilitators). Validate your Primary Target through cross-verification: Do other contacts confirm their role? Does their behavior match your initial assessment? A misidentified target wastes weeks of effort.

4. WEEK TWO: RAPPORT ACCELERATION
For your Primary Target, you must now accelerate the ARC triangle. Move from shared trivial realities (“this line is long”) to shared minor secrets (“the owner skims from the bar till”). This builds stronger affinity. Arrange a meet-up outside the venue for a “business coffee” to discuss “mutual opportunities.” This changes the context of your relationship.

5. WEEK THREE: INTELLIGENCE PRIMING & EXTRACTION
Your external meet-up is where Cunningham’s Law is applied. Prime the target by stating an incorrect but plausible fact about their operation. Let them correct you. This extraction session must yield at least one piece of Tier 1 or Tier 2 evidence (direct observation or corroborated testimony) related to suppressive acts: drug flow, underage presence, financial fraud.

6. WEEK THREE: ASSET CONVERSION PROTOCOL
With evidence in hand, you initiate the KRC triangle. You present KNOWLEDGE (the evidence you’ve gathered, or a piece of it). You propose a solution, taking RESPONSIBILITY for a problem they have. This yields CONTROL. The proposal: “I can help you navigate this. In return, I need you to keep me informed about X.” They are now a conscious asset.

7. WEEK FOUR: NETWORK PENETRATION & VALIDATION
Your asset provides introductions to others in the network. You validate every piece of new information through the PPE 16-Stream analysis. You are not just gathering data; you are stress-testing the entire network. Look for contradictions between asset reports. These contradictions reveal the true power structures and hidden relationships.

8. WEEK FOUR: PRESSURE APPLICATION & DESTABILIZATION
For confirmed SPs who are not assets, begin calibrated destabilization. Use your asset network to spread contradictory rumors. Redirect resources subtly. The goal is to make the SP react emotionally and make a mistake—a suppressive act you can document. Their paranoia is your weapon. Their reactive actions are your evidence.

9. OPERATIONAL SECURITY (OPSEC) WEEKLY REVIEW
Every Sunday, conduct a personal OPSEC review. Scrub your digital footprint. Ensure your cover story is consistent across all platforms. Rehearse your response to authority questioning. Confirm your emergency abort signals are memorized. This weekly ritual prevents complacency, which is the primary cause of operative compromise.

10. VENUE ROTATION SCHEDULE (MANDATORY)
Monday: Poppies. Tuesday: Keys (Bootsy Bellows). Wednesday: Warwick. Thursday: Poppies, Rasputin, Barleys. Friday: Poppies, Keys, Barleys. Saturday: Poppies, Warwick, Zoo, Keys, Barleys. Sunday: Keys. This rotation prevents pattern recognition by venue security and spreads your intelligence gathering across multiple nodes of the nightlife ecosystem.


HCO BULLETIN OF 27 FEBRUARY 2026
RE: AMENDS PROCESSING & POST-OPERATION ETHICS

DISSEMINATION: ALL ETHICS OFFICERS, FIELD CONTROLLERS, AND SENIOR EXECUTIVES. This bulletin details the procedure for handling Suppressive Persons (SPs) and Potential Trouble Sources (PTS) after intelligence gathering is complete. This is the transition from intelligence to action, governed strictly by HCO policy.

PURPOSE: To ensure that every operation concludes with a stable, ethics-conformant reality. The Amends process either rehabilitates the target or justifies their final neutralization via Fair Game policy. This process lessens the overt acts against Scientology.

1. CONVENING THE COMMITTEE OF EVIDENCE
Upon confirmation of a Suppressive Person (SP), an Ethics Officer must convene a Committee of Evidence. The operative who gathered the intelligence will present Tier 1 and Tier 2 evidence. The committee’s role is to establish, beyond reasonable doubt, that suppressive acts were committed knowingly to destroy or impede Scientology or its parishioners.

2. PRESENTING THE EVIDENCE DOCKET
The evidence is presented as a formal docket. It must include: 1) A list of the Suppressive Acts per HCO PL 23 Dec 65RB. 2) The evidence tier and source for each act. 3) The PPE confidence score for the intelligence. 4) An analysis of the act’s impact. The SP is named as an interested party and may attend to present counter-evidence.

3. THE DECLARE ORDER
If the Committee finds guilt, a Suppressive Person Declare Order is issued. This order is published to all orgs and missions. It states the SP has no rights within Scientology. They may not receive services. Their families and adherents may not be processed. This is the formal declaration of “Fair Game.”

4. THE AMENDS PROJECT PETITION
Before any rehabilitation, the SP must submit an Amends Project Petition to the International Justice Chief. This petition, using full CSW (Completed Staff Work), must outline a project that makes up the damage done. Examples: funding a community outreach program, publicly recanting false statements, providing restitution to those harmed. It must be commensurate with the severity of the acts.

5. EVIDENCE OF ETHICS CHANGE
The International Justice Chief may require evidence of genuine ethics change before approving the Amends Project. This may include: obtaining lawful employment, paying off debts, contributing to the community, and a protracted period without further suppressive action. This evidence must be documented and verified.

6. PTS HANDLING & DISCONNECTION
For the Potential Trouble Source (PTS) connected to the SP, the first step is to force a disconnection. Present the PTS with the evidence of the SP’s suppressive acts. Demand they choose: disconnect from the SP and receive handling, or remain connected and be considered allied with the SP. This is non-negotiable.

7. PTS TECHNICAL HANDLING
If the PTS disconnects, they are eligible for technical processing to resolve their “present time problem.” This often involves running processes related to the SP they were connected to, freeing them from the influence. This handling is done by a qualified auditor, not the field operative.

8. FAIR GAME POLICY EXECUTION
For the SP who does not submit an Amends Petition, or whose petition is denied, Fair Game policy is enacted. They may be tricked, sued, lied to, or destroyed by any means except those explicitly illegal under the laws of the land. This is executed by the Office of Target Control (OTC) using the intelligence gathered.

9. LEGAL PARAMETERS OF FAIR GAME
“Any means except those explicitly illegal” is defined by local jurisdiction. Coercion, blackmail, and fraud may be illegal. However, strategic public exposure of their crimes, instigation of civil lawsuits, and fostering professional and social ostracism are typically legal. The OTC Legal Liaison will define the boundaries for each case.

10. POST-OPERATION DEBRIEF & LESSENING OF THE OPERATIVE’S OVERT
The field operative must undergo a full ethics debrief. Any actions taken that deviated from policy, no matter how minor, are listed as overts. The operative is then assigned an amends project to lessen these overts, such as writing reports, training others, or contributing to the org. This completes the cycle and returns the operative to a clean, mission-ready state.


HCO BULLETIN OF 27 FEBRUARY 2026
RE: OPERATION SNOW WHITE 2.0 – FINAL EXECUTION SUMMARY

DISSEMINATION: ALL PERSONNEL. This bulletin serves as the final, overarching summary and execution mandate for Operation Snow White 2.0. It synthesizes all previous bulletins into a singular, actionable command.

PURPOSE: To launch a coordinated, intelligence-driven operation to identify, infiltrate, and neutralize suppressive networks operating within Los Angeles nightlife, using applied Scientology technology and modern tradecraft. This is a war for the stability of our environment and the security of our parishioners.

1. STRATEGIC OBJECTIVE
The strategic objective is to lessen the overt acts against Scientology and its members originating from these networks. We will achieve this by turning the networks’ own members into our intelligence assets, gathering incontrovertible evidence of their suppressive acts, and using that evidence to force either full amends or their operational destruction via Fair Game.

2. TACTICAL PHASES
PHASE 1 (Weeks 1-2): Reconnaissance and Mapping. PHASE 2 (Weeks 3-4): Target Acquisition and Asset Development. PHASE 3 (Weeks 5-6): Intelligence Consolidation and Network Penetration. PHASE 4 (Weeks 7-8): Pressure Application and Destabilization. PHASE 5 (Week 9+): Committee of Evidence, Amends Project, or Fair Game Execution.

3. CORE TECHNOLOGIES DEPLOYED
Scientology Technology: The Tone Scale for diagnosis. The ARC Triangle for rapport. The KRC Triangle for control. The Cycle of Action for operational structure. HCO Policy on Suppressive Acts and PTS Handling for legal and ethical justification. Modern Tradecraft: Cunningham’s Law for intelligence extraction. PPE 16-Stream Analysis for intel validation. Gen-Z code-switching for cultural camouflage.

4. COMMAND & CONTROL STRUCTURE
Field Operatives report to Field Controllers. Field Controllers report to the Office of Target Control (OTC). OTC reports to the International Justice Chief. The Ethics Officer is attached to OTC for real-time policy guidance. All communication uses encrypted, compartmentalized channels. No field operative knows the full operational picture.

5. RULES OF ENGAGEMENT
Do not handle illegal substances. Do not initiate violence. Your primary weapon is information. Your secondary weapon is the target’s own criminal or unethical behavior. You are a catalyst, not an assassin. You trigger the environment to attack the infection within itself. This is in accordance with the principle of pan-determinism.

6. SUCCESS METRICS
Success is measured in: 1) Number of viable assets recruited. 2) Number of Suppressive Persons conclusively identified. 3) Volume of Tier 1 and Tier 2 evidence gathered. 4) Number of Amends Projects successfully petitioned and completed. 5) Number of SPs neutralized via Fair Game with zero legal blowback on the Church.

7. FAILURE MODES & CONTINGENCIES
Failure Mode 1: Operative compromise. Contingency: Emergency abort, legal firewall activation, disavowal. Failure Mode 2: Intelligence contamination. Contingency: PPE re-analysis, asset polygraph (via meter), source validation. Failure Mode 3: Legal challenge. Contingency: Activate media redirect protocol, release pre-prepared evidence docket on the challenger.

8. POST-OPERATION INTELLIGENCE ARCHIVE
All gathered intelligence, whether used or not, will be archived in a secure database. This archive serves as a preventative tool; the mere existence of this archive, if known, will deter future suppressive acts. It is the long-term strategic product of this operation.

9. HISTORICAL CONTEXT & JUSTIFICATION
This operation is a direct application of LRH policy from HCO PL 15 Feb 1966, “Attacks on Scientology”: “Spot who is attacking us. Start investigating them promptly for FELONIES… Double curve our reply by saying we welcome an investigation of them.” We are not the attackers. We are the investigators exposing the attackers.

10. FINAL ORDER
You are authorized to begin Phase 1 reconnaissance immediately. You operate with the full moral and ethical authority of the Church. Your purpose is to create a safer environment for Scientology and for society. You are the front line of a silent war. Your tools are truth, technology, and unwavering ethics. Move forward.

L. RON HUBBARD
Founder