Royal Dutch Shell Plc  .com Rotating Header Image

No kidding, Shell highly recommends ROYALDUTCHSHELLPLC.COM


I have already listed the various kinds of Shell insider information we receive. It has included confidential internal documents from a high-level source in Shell Global Security. Another email seen by Reuters, apparently from a Shell communications representative to U.S. news network Fox News said: “royaldutchshellplc.com is an excellent source of group news and comment and I recommend it far above what our own group internal comms puts out”.

Extracts from the ebook “John Donovan, Shell’s Nightmare” (now available on Amazon websites globally)

Extracts from pages 165 to 168 inclusive

By John Donovan

Shell cloak and dagger activities against me have continued in more recent years, but this time on a global basis, as revealed in a Reuters article (extract above). The most recent spying of which I am aware was directed at me, my website and against Shell’s own employees.

I have already listed the various kinds of Shell insider information we receive. It has included confidential internal documents from a high-level source in Shell Global Security.

We discovered that the continued campaigning on our part triggered another bout of sinister activity by Shell, this time targeting my website, myself and Shell employees.

It was the subject of a Reuters article by Tom Bergin published 2 December 2009 under the headline: “Shell critic says oil major targeting his website

Extracts

A prominent Internet critic of Royal Dutch Shell (RDSa.L) says the oil major has asked an anti-cyber fraud agency to target his site, which Shell admits provides better information on the group than its own internal communications.

Shell did not comment on the veracity of the communication or any of Donovan’s allegations, despite several emails and phone calls requesting it.

One email between Shell employees dated June 2009, said an individual whose name is blanked out but apparently also a Shell employee, met with “NCFTA” to discuss the website.

The email adds that resources had been assigned to NCFTA “that are RDS (presumably Royal Dutch Shell) focused” and that “There will be no attempt to do anything visible to Donovan”. Donovan believes NCFTA refers to the National Cyber Forensics and Training Alliance, a Pittsburgh-based organisation, whose website says it is supported by Fortune 500 companies and that its purpose is to help tackle cyber fraud.

A Google search for NCFTA yields the Pittsburgh organisation as the top result.

National Cyber Forensics and Training Alliance did not respond to emails or telephone calls.

Another email, dated March 2007 said Shell was monitoring emails from Shell servers globally to Donovan and internal traffic to their website. The email noted this information was “not for publication”.

Another email seen by Reuters, apparently from a Shell communications representative to U.S. news network Fox News said: “royaldutchshellplc.com is an excellent source of group news and comment and I recommend it far above what our own group internal comms puts out”. EXTRACTS END

Information about setting up a counter-measures team (“roundtable working group”) was contained in a Shell internal email dated 9 March 2007 classified as being “Legally Privileged and Confidential.”

As can be seen, the tone was aggressive with a proposal to mount a “demonstration that we won’t tolerate the Donovans’ approach unchallenged any longer.

In a Shell internal email dated 19 March 2007 (an email I sent to Bill O’Reilly at Fox News about “Shells treachery in Iran,”) the unidentified Shell author states:

“This latest Email to xxxxxxxx is not good if xxxxxxxx should take this and go public with it. I have contacted some of my sources in the USG and in London to see if they have anything else on the brothers, but that may take a few days for their response. We will monitor any fallout from this.”

The redacted information denoted by the “XXXXXXX’s” is believed to be “Bill O’Reilly” and “Fox News.” “USG” is believed to be a reference to the U.S. Government.

In a Shell internal email a few days later, dated 20 March 2007 Shell staff discussed whether to set up “an information security tasking to discover where exactly in Shell their (good) sources are located.”

Amusingly, the same email contained the spectacular endorsement of the website, quoted in the Reuters article, which its author obviously never intended for public consumption.

The following day, in a Shell internal email dated 21 March 2007 marked “Donavan CONFIDENTIAL”, there was confirmation that Shell had undertaken a global spying operation against its own employees in an attempt to discover the identity of employees supplying me with Shell insider information.

The spying plan included monitoring “Shell servers globally to Donovan” and “monitoring web traffic to determine internal traffic to their website. There is history of several former employees taking internal laundry to Donovan also, internal e-mails have appeared on his website.”

The primary objective was to stop Shell “internal laundry” from being aired online.

A Shell internal email dated 31 August 2007 said that Shell employees had been instructed not to visit our website. An abbreviation – “D’” – was used instead of our surname in one of the Shell emails.

This website and sisters royaldutchshellgroup.com, shellnazihistory.com, royaldutchshell.website, johndonovan.website, and shellnews.net, are owned by John Donovan. There is also a Wikipedia segment.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Comment Rules

  • Please show respect to the opinions of others no matter how seemingly far-fetched.
  • Abusive, foul language, and/or divisive comments may be deleted without notice.
  • Each blog member is allowed limited comments, as displayed above the comment box.
  • Comments must be limited to the number of words displayed above the comment box.
  • Please limit one comment after any comment posted per post.