
Top Aussie Scientologist is found dead after devoting her life to the mysterious religion - as details of her incredible link to its leader and her tragic cause of death are revealed
Marion Pouw, 72, died near the Scientology city of Clearwater where she spent much of her life dedicated to the controversial religion and its leader, David Miscavige.
Former friends - who say they were cut off from her after they left the church - revealed she had died from pancreatic cancer.
Pouw was said to be Miscavige's right-hand woman, with some former Scientologists branding her his 'henchman', while another said she was one of his 'closest lieutenants'.
A never-before-seen picture exclusively given to Daily Mail Australia reveals Pouw at her first wedding, with Miscavige's wife, Shelly, one of her bridesmaids.
Ms Miscavige inexplicably vanished 18 years ago and has never been found.
A death notice listed by Tampa funeral home Brewer & Sons shared that Ms Pouw was born on February 7, 1953, and died on June 20, 2025.
The listing has since been mysteriously deleted, but still appears online in a Google search.
An obituary on US website Echovita revealed that Ms Pouw died in Clermont, Florida, just a stone's throw from Scientology's Clearwater headquarters.
The obituary farewelled her 'Earthly form'.
Scientology's core belief is that humans are immortal spiritual beings, called thetans, who are in a continual cycle of reincarnation on Earth and other planets.
Ms Pouw's work for the church flew mostly under the radar, but she appeared in a Scientology video slamming David's father, the late Ron Miscavige, for leaving the church and writing a memoir about it.
Ms Pouw said she had helped Ron at his lowest point when his brother Red died, and that they were close family friends for more than 40 years.
In his book Ruthless: Scientology, My Son David Miscavige, and Me, Ron described Pouw as his son's henchman, which infuriated her.
'I find the fact that he references me as a 'top henchman' both offensive and insulting,' she said in the video which was posted online and revealed a lingering trace of her Australian accent.
'I mean we're talking a 40 year relationship… a close family friend that's gone out of her way for… and cared for him.
'And to now depict that relationship in that manner - a friend doesn't say that about a friend, ever. No matter the circumstances, you just don't say that.
'And I find it very insulting and such a gross misrepresentation of the relationship that… that I had with him.
'He was a friend - he's not a friend now - but he was a very close friend. I was family. And frankly, I was stunned.'
Ron Miscavige died in 2021, aged 85.
Pouw and her siblings were raised by Dutch parents in Melbourne, but the family fled to the church's UK HQ in Saint Hill after a 1965 government investigation into the religion, which stifled its activities in Victoria at the time.
She was raised alongside fellow Australian Scientology children, Terri, Janis and Peter Gillham.
According to Janis and fellow former Scientologist Mike Fisher, who co-host Scientology - Peeling The Onion, a YouTube series on life outside of the church, Marion spent her 'entire life' in the organisation's shadowy pseudo-navy, Sea Org.
Janis said Pouw's family left Scientology when she was a teenager, but as soon as she turned 17, she returned and signed up for Sea Org, an 'elite' subsection of the religion that spent much of its time at sea.
Pouw rapidly ascended the ranks, and became an assistant for Mary Sue Hubbard - the wife of Scientology founder, L Ron Hubbard.
It's understood she was incredibly close to the Scientology boss, especially in his latter years before his death in 1986.
Her unwavering loyalty then switched to his successor, Miscavige.
They were so close that Miscavige's wife Shelly was a bridesmaid in Pouw's wedding to fellow Scientologist, Bill Meisner.
Shelly has been a subject of global fascination since vanishing in 2007.
Actress and former Scientologist Leah Remini has been tireless in her quest to find Shelly, but Pouw never publicly commented on her friend's disappearance.
Janis, who left the church in 1990, was devastated that her friend and Aussie compatriot had died without ever getting to reconnect with her.
She exclusively shared pictures of Marion with Daily Mail Australia.
'She had a dedication and drive to Scientology...but had a goodness about her that got buried,' Janis said.
Her YouTube co-host Mike Fisher countered Janis' kind words by saying, 'But she chose that [the church] over her family and her friends that she'd known for years'.
Janis added: 'The sad part is she didn't go back to Holland to see her mum and dad.
'When her father passed away, he didn't tell Marion [that he was dying]. His thoughts were that, 'She didn't care enough about me when I was alive, why would she care that I'm dead?'
'They missed so many years with her, so there is that big hole.'
Janis, who now lives in Las Vegas, Nevada, recalled Pouw lecturing her father Peter Gillham Sr that he needed to 'Handle Janis and Peter Jr' after they left because they'd been 'speaking out against the church'.
Marion, third from left, is seen with Janis and her sister Terri, and another woman
Janis revealed her regret that Pouw did not come to see her, even if it was to apparently silence them.
'If Marion had come to see us, we would have turned her,' she said.
She alleged Pouw had formed a crucial part of Scientology's defence of mass protests in the mid-2000s, which were sparked by an exposé from internet activists Anonymous.
'She would go around and rope people back in [to the church] for Miscavige,' she said.
It is believed Pouw's mother Wilma is still alive, in her 90s, and living in the Netherlands.
Janis' late mother Yvonne was the brains behind Scientology's world-famous Celebrity Center in Los Angeles.
The church responded angrily to speculation about Ms Pouw's life and death when approached by Daily Mail Australia.
'How dare you use someone's death—someone who cannot respond—to spread lies,' said public affairs spokesman Karin Pouw, believed to be Marion's sister-in-law.
'Marion would be outraged to know her honorable name is being used to promote a bigoted agenda against the Church she served and the people she so deeply cared for.
'Marion stood for truth, compassion, and justice. That her name would be used to spread lies would violate everything she lived for and hurt those she truly loved.
'Marion is deeply missed and will long be remembered by her true friends who worked side by side with her day in and day out for five decades.
'We urge you to reconsider what you are doing. If you proceed, you will not only be spreading falsehoods—you will be participating in the willful defamation of someone who can no longer defend herself, but who is not without people willing to do so.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Independent
2 hours ago
- The Independent
Massachusetts mayoral candidate Geoffrey Epstein has to keep reminding people he's not Jeffrey Epstein
Name recognition can be helpful for prospective political candidates — just look at the Kennedys — but it's been more of a thorn in the side for Framingham, Massachusetts, mayoral candidate Geoffrey Epstein. The Australian -born Epstein said he's been making a point to remind people that he's not the notorious child sex trafficker and former pal of Donald Trump, Jeffrey Epstein. The infamous Epstein died in 2019 in the Metropolitan Detention Center while he was awaiting trial, but that hasn't stopped angry — and apparently quite out of date — commenters on social media demanding that he "show us the files," referring to the rumored Epstein client list. 'My guy. Might wanna pull out of the race if that's your name. Or, you could show us the files,' one commenter wrote on the mayoral candidate's Facebook page. Thankfully, according to the mayoral candidate, most of his prospective constituents can differentiate the two. He told Politico that "no one locally cares about that at all," noting that the Epstein with the creepy island was "a dead American, and I'm an alive Australian." It's an especially tough time to have Epstein as a surname if you're involved in politics, as the disgraced financier has been front and center in the news due to the Trump administration's failure to produce the sex trafficker's rumored 'client list.' After Trump and Bondi failed to produce the alleged client list, some of Trump's longtime supporters — including podcaster Joe Rogan and FBI Deputy Director Dan Bongino — criticized the White House's handling of the situation. But it's not all bad news for Geoffrey Epstein; another politician who shares both his first and last names with men accused of horrific crimes not only ran for office, but won. According to Politico, New York state assembly member Harvey Epstein — whose name is the unfortunate combination of disgraced film producer Harvey Weinstein's first name and Epstein's surname — feels the Australian mayor-hopeful's pain, but believes there's a lot more to a person than a name. 'My advice to Geoffrey would be to lead with your values and who you are as a candidate,' Harvey said. 'People will support you if you do the work and follow through.' Epstein — who goes by Geoff — told the publication he got into the race to try to tackle issues he's seen with the city's infrastructure, environmental action, and education. He's pitched expanding solar installation on school roofs and parking lots, and using more of the city's funds to pay for education. He's got strong competition in the city's incumbent Mayor Charlie Sisitsky, but if Harvey Epstein can pull it out despite his name, maybe there is hope for Geoffrey.


Daily Mail
8 hours ago
- Daily Mail
Urgent warning over QR code scam draining Americans' bank accounts
A dangerous new scam is quietly sweeping across the United States, and all it takes is a quick scan of a QR code to potentially empty your bank account. Cybersecurity experts are warning of a sharp rise in 'quishing,' a form of phishing that uses malicious QR codes to trick users into handing over personal information, credit card details, and banking credentials. According to a recent report, more than 26 million Americans have already been duped by the scam, and the number is rising rapidly. QR codes, or 'quick response' codes, are commonly used by businesses to allow customers to access websites, menus, or payment portals simply by scanning the code with a smartphone. But criminals are now exploiting this convenience by placing counterfeit QR codes over real ones in high-traffic areas, such as parking meters, public transportation signs, restaurant tables, and even on delivery packages. Dustin Brewer, senior director of proactive cybersecurity at BlueVoyant, said: 'The most dangerous part is they are hiding in plain sight. Attackers can just print their own QR code and paste it over a real one, and you'll never know the difference.' Once scanned, the fraudulent QR codes often lead to lookalike websites designed to steal login credentials or financial data. Others may install malicious software onto the user's phone without them realizing it. Experts said many fake codes are printed on low-quality stickers or appear slightly misaligned when pasted over legitimate ones. If the design seems inconsistent with a brand's usual look or appears to be hastily added, it could be a red flag. 'These scams are low-effort but have a very high return,' Brewer said. 'Because QR codes are now everywhere, from gas pumps to flyers, people do not question them. That's exactly what scammers are counting on,' he warned. In Miami, city officials uncovered fake QR codes at seven different locations and removed more than 7,000 fraudulent stickers earlier this year. The city's Parking Authority reported that scammers had been placing counterfeit QR codes on parking meters, tricking drivers into entering their credit card information on fake payment websites that closely mimicked official portals. The scam extends beyond public infrastructure. In one case reported by the Federal Trade Commission (FTC), victims received mysterious packages containing fake 'gifts' and a QR code labeled with a message prompting them to scan to find out who sent it. Instead, the code redirected users to phishing websites disguised as delivery return forms, which then requested login credentials or credit card information. Experts have also raised concerns that some of these fake QR codes can install malware onto users' phones, granting attackers full remote access without the victim's knowledge. These malicious programs can silently collect sensitive data, track activity, or even hijack device functions. A recent report from cybersecurity firm Malwarebytes found that 70 percent of iPhone users have scanned QR codes to make or complete a purchase, compared to 63 percent of Android users. Cybersecurity specialists also warn that attackers are embedding malicious QR codes into PDF attachments in phishing emails. Some of these emails impersonate trusted companies such as Microsoft or Adobe, further increasing the likelihood that unsuspecting recipients will scan the code and fall victim to the scam. In one of the ongoing scam, reported by Cisco , fraudsters are emailing QR codes disguised as a two-factor authentication reset requests to thousands of employees, tricking them into handing over internal access. To protect yourself, experts suggested to never scan QR codes from unknown sources, especially in emails, texts, or physical mail. Since most smartphones now display a preview of the website before opening it, cybersecurity experts recommend always checking that the link begins with ' and appears to be a legitimate web address. If the URL is misspelled, unfamiliar, or suspicious, officials warn: do not click. Users should also be wary of QR codes found on public surfaces or signage, especially if they appear tampered with, are printed on stickers, or do not match the branding around them. According to cybersecurity officials, a genuine QR code from a business will often include the company's logo, colors, or a short description of what to expect when scanning. For example, museums and educational institutions increasingly label QR codes with preview information to help guide visitors. If scanning a QR code prompts a login reset, a request for two-factor authentication details, or an offer that seems unusually generous, experts say it's likely a scam. One rising tactic involves phishing pages disguised as Microsoft login portals or fake multifactor authentication resets, which can trick users into handing over sensitive credentials. With global QR code payments expected to surpass $3 trillion in 2025, cybersecurity analysts warn that these scams will only continue to rise unless public awareness catches up. Officials are urging Americans to stay vigilant and double-check any QR code, even those that appear official, before scanning. 'QR codes weren't built with security in mind,' said Rob Lee, chief researcher at the SANS Institute. 'They were built to make life easier, which also makes them perfect for scammers.'


Daily Mail
9 hours ago
- Daily Mail
Urgent warning over QR code scam draining Americans' bank accounts... here's how to spot a fake
A dangerous new scam is quietly sweeping across the United States, and all it takes is a quick scan of a QR code to potentially empty your bank account. Cybersecurity experts are warning of a sharp rise in 'quishing,' a form of phishing that uses malicious QR codes to trick users into handing over personal information, credit card details, and banking credentials. According to a recent report, more than 26 million Americans have already been duped by the scam, and the number is rising rapidly. QR codes, or 'quick response' codes, are commonly used by businesses to allow customers to access websites, menus, or payment portals simply by scanning the code with a smartphone. But criminals are now exploiting this convenience by placing counterfeit QR codes over real ones in high-traffic areas, such as parking meters, public transportation signs, restaurant tables, and even on delivery packages. Dustin Brewer, senior director of proactive cybersecurity at BlueVoyant, said: 'The most dangerous part is they are hiding in plain sight. Attackers can just print their own QR code and paste it over a real one, and you'll never know the difference.' Once scanned, the fraudulent QR codes often lead to lookalike websites designed to steal login credentials or financial data. Others may install malicious software onto the user's phone without them realizing it. Experts said many fake codes are printed on low-quality stickers or appear slightly misaligned when pasted over legitimate ones. If the design seems inconsistent with a brand's usual look or appears to be hastily added, it could be a red flag. 'These scams are low-effort but have a very high return,' Brewer said. 'Because QR codes are now everywhere, from gas pumps to flyers, people do not question them. That's exactly what scammers are counting on,' he warned. In Miami, city officials uncovered fake QR codes at seven different locations and removed more than 7,000 fraudulent stickers earlier this year. The city's Parking Authority reported that scammers had been placing counterfeit QR codes on parking meters, tricking drivers into entering their credit card information on fake payment websites that closely mimicked official portals. The scam extends beyond public infrastructure. In one case reported by the Federal Trade Commission (FTC), victims received mysterious packages containing fake 'gifts' and a QR code labeled with a message prompting them to scan to find out who sent it. Instead, the code redirected users to phishing websites disguised as delivery return forms, which then requested login credentials or credit card information. Experts have also raised concerns that some of these fake QR codes can install malware onto users' phones, granting attackers full remote access without the victim's knowledge. These malicious programs can silently collect sensitive data, track activity, or even hijack device functions. A recent report from cybersecurity firm Malwarebytes found that 70 percent of iPhone users have scanned QR codes to make or complete a purchase, compared to 63 percent of Android users. Cybersecurity specialists also warn that attackers are embedding malicious QR codes into PDF attachments in phishing emails. Some of these emails impersonate trusted companies such as Microsoft or Adobe, further increasing the likelihood that unsuspecting recipients will scan the code and fall victim to the scam. In one of the ongoing scam, reported by Cisco, fraudsters are emailing QR codes disguised as a two-factor authentication reset requests to thousands of employees, tricking them into handing over internal access. To protect yourself, experts suggested to never scan QR codes from unknown sources, especially in emails, texts, or physical mail. Since most smartphones now display a preview of the website before opening it, cybersecurity experts recommend always checking that the link begins with ' and appears to be a legitimate web address. If the URL is misspelled, unfamiliar, or suspicious, officials warn: do not click. Users should also be wary of QR codes found on public surfaces or signage, especially if they appear tampered with, are printed on stickers, or do not match the branding around them. According to cybersecurity officials, a genuine QR code from a business will often include the company's logo, colors, or a short description of what to expect when scanning. For example, museums and educational institutions increasingly label QR codes with preview information to help guide visitors. If scanning a QR code prompts a login reset, a request for two-factor authentication details, or an offer that seems unusually generous, experts say it's likely a scam. One rising tactic involves phishing pages disguised as Microsoft login portals or fake multifactor authentication resets, which can trick users into handing over sensitive credentials. With global QR code payments expected to surpass $3 trillion in 2025, cybersecurity analysts warn that these scams will only continue to rise unless public awareness catches up. Officials are urging Americans to stay vigilant and double-check any QR code, even those that appear official, before scanning.