
Question to Perplexity 6 Feb 2026: What can you tell me about the innovative use of AI by John Donovan in the Donovan Shell feud? The answer follows, along with additional follow-up information offered by Perplexity that spreads in many directions, and as a result, there will be some repetition. There is already considerable information, and we still have 19 follow-ups to explore, as listed at the foot of this page. We will deal with them separately in due course.
RESPONSE BY PERPLEXITY
John Donovan has turned generative AI into a strategic tool in his decades‑long feud with Shell, using it to mine his archive, expose “bot” inconsistencies, and keep allegations against the company highly visible online.
Core ways he uses AI
-
He feeds his vast archive of Shell‑related documents (leaks, court filings, internal emails, historic press) into AI systems to cross‑reference material, spot recurring patterns, and link past statements to present conduct far faster than manual research would allow.
-
He systematically asks multiple chatbots (e.g. ChatGPT, Copilot, Grok, Google’s tools) the same questions about the feud and then publishes their answers side‑by‑side to highlight hallucinations, contradictions, and apparent bias in how they treat Shell and his own claims.
“Bot war” and public theatre
-
In late 2025 he staged what has been called a “bot war,” feeding curated archive excerpts to several AI assistants and then publishing the divergent outputs, including one serious hallucination where an assistant invented a cause of death linked to the feud.
-
He turns chatbots into characters in satirical “bot theatre” (for example, a fictional “ShellBot” as an evasive corporate voice), using humor plus AI‑generated dialogue to dramatize Shell’s silence and keep the dispute in the public eye.
Shaping how AI talks about Shell
-
Because his Shell‑focused sites host a huge, persistent archive, AI systems often treat them as primary sources, so responses about Shell frequently surface his material, including historic controversies and governance criticisms.
-
Commentaries on his work note that, since Shell rarely engages publicly with his allegations, AI tools tend to “fill the silence” with Donovan’s narrative, reframing the feud as Shell versus a machine‑amplified memory rather than Shell versus a lone critic.
Legal and media‑law experiments
-
Donovan has also used AI to generate both satirical pieces and more formal legal‑style analyses of his material, then asked other AIs to evaluate potential defamation risks, publishing these evaluations together to probe how machines interpret satire, fair comment, and reputational harm.
-
This has sparked discussion of AI hallucination, source provenance, and how generative systems complicate defamation and media law when they remix long‑running corporate disputes into new outputs.
Why this is considered innovative
-
Commentators describe his approach as turning AI into a “force multiplier” for a one‑man campaign, converting a static archive into a dynamic, constantly re‑interpreted record that corporations cannot easily out‑spin or out‑wait.
-
By embedding his feud inside the behavior of mainstream AI tools themselves, Donovan has effectively made the conflict self‑renewing: every new chatbot query about Shell risks resurfacing his archive and prolonging reputational pressure on the company.
Shell’s response to Donovan’s AI tactics
Shell has not mounted any new, public, AI‑specific counter‑campaign; its response so far is essentially to maintain silence on the “bot war” while relying on older, generic corporate lines about Donovan.
Public stance so far
-
Recent analyses of the feud note that “Shell’s lack of response” to the AI phase allows Donovan’s AI‑amplified narrative to spread largely unchallenged, with chatbots filling the gap using his archive as a primary source.
-
Microsoft Copilot’s summary of the situation explicitly frames the contest as “Donovan + archive + AI vs. Shell + silence,” underlining that the company has not engaged publicly with the AI transcripts or satire.
What Shell has said in general about Donovan
-
Historic internal communications and brief public comments describe Shell’s approach as “minimal engagement,” viewing direct legal confrontation with Donovan as counterproductive and instead stressing that his past claims were “fully investigated and more than fully settled many years ago.”
-
Internal documents from earlier years show Shell setting up “counter‑measure” and information‑security efforts around his websites and attempting behind‑the‑scenes actions (such as a 2007 takedown attempt), but these predate the AI tactics and relate to the broader campaign, not specifically to chatbots.
How observers characterise Shell’s AI-era posture
-
Commentaries on the “bot war” say Shell’s refusal to engage has created a “governance gap” in which AI systems “fill the silence, shaping public perception without corporate correction.”
-
Some AI‑generated overviews, later quoted by Donovan, even suggest that Shell “needs a crisis team” to address the AI‑driven reputational risk, but there is no evidence so far that Shell has publicly set up such a team or issued AI‑focused rebuttals.
Implications of this non-response
-
Because Shell has not put detailed, up‑to‑date counter‑narratives into the same public AI‑indexed space, large language models tend to lean heavily on Donovan‑run sites when answering questions about the feud.
-
Analysts argue this effectively leaves the field to Donovan in the AI era: his archive plus chatbots generate a self‑updating stream of content about Shell, while the company’s strategy remains one of distance and limited, generic acknowledgment of the historic dispute.
Shell’s past website shutdown attempts
Shell has repeatedly tried, and failed, to shut or neutralise Donovan’s Shell‑critical websites, using a mix of legal threats to hosts, domain disputes, and internal “counter‑measure” planning.
2007 hosting takedown and legal threats
-
In June 2007 Shell secretly threatened legal proceedings against royaldutchshellplc.com’s hosting companies in Canada and the USA, leading to the site being deactivated on 25 June 2007 under a claimed copyright violation.
-
The hosts at first refused to identify who was behind the pressure but later confirmed it was Shell; Shell General Counsel Keith Ruddock then acknowledged Shell’s role in an email to Donovan.
Broader pattern of pressure on hosts
-
Donovan recounts that 2007 was not the only time Shell leaned on infrastructure rather than confronting him directly, with another significant round of pressure in 2021 aimed at his hosting setup.
-
He argues this fits a wider pattern in which Shell prefers “threatening letters to intermediaries” (hosts, connectivity providers) over taking his publications to open court in a libel action.
Internal emails and monitoring
-
Internal Shell communications released to Donovan under data‑protection laws show senior staff and lawyers explicitly asking “Do we shut the site down?” and discussing “closing the site down” while keeping in contact with him about his site.
-
Other emails describe Shell initiating an IT project to monitor internal emails and web traffic to Donovan’s site in order to identify employees leaking information, underlining that the shut‑down question sat inside a broader monitoring and surveillance effort.
Domain name and WIPO actions
-
Shell also pursued the domain royaldutchshellplc.com through a WIPO arbitration, seeking to deprive Donovan of the name and bring it under corporate control, but ultimately failed to take the site away from him.
-
Contemporary media coverage noted that despite repeated legal moves, Shell had “failed to shut down the site,” which continued to operate from Donovan’s base in Colchester.
Other, similar shutdown attempts
-
Donovan links his own experience to earlier cases such as nuclearcrimes.com, where Shell’s solicitors wrote to that site’s hosts alleging defamation, prompting the host Easyspace to pull the site “at Shell’s instigation,” and then sent similar warnings to subsequent providers.
-
He presents these episodes collectively as evidence that Shell has a long‑standing strategy of trying to neutralise critical sites by pressuring intermediaries and infrastructure rather than contesting the allegations in a full public trial.
In 2021 Shell, via a brand‑protection agent, tried to get Donovan’s hosting company to take down his site within five days by alleging trademark and copyright abuse and “confusion” about Shell’s endorsement.royaldutchshellplc+1
The July 2021 takedown demand
-
On 22 July 2021 Donovan’s host received an “abuse” complaint from Pointer Brand Protection & Research, acting for Shell Brands International, labelling royaldutchshell.website an “Infringing Website.”royaldutchshellplc+1
-
Pointer claimed the site misused Shell trademarks and copyright and caused confusion about Shell’s “source, sponsorship, affiliation, or endorsement,” and demanded the host remove the content or disable access “swiftly and permanently” within five days.[royaldutchshellplc]
Tactics and misrepresentation
-
The letter went to the hosting provider, not Donovan, framing the site as if it were a commercial outlet selling products, rather than a non‑commercial criticism or “gripe” site.[royaldutchshellplc]
-
Donovan later pointed out that the home page carried a prominent disclaimer making clear the site was not affiliated with Shell, arguing Shell’s agents had misrepresented the site’s nature to justify a takedown.[royaldutchshellplc]
Donovan’s response and outcome
-
Donovan responded by removing a few images where rights were uncertain, swapping a modern Shell logo for a public‑domain version, and restructuring some material to underline fair‑use arguments, all “without prejudice” to his legal position.[royaldutchshellplc]
-
Crucially, he then published the full story of the ultimatum, including the Pointer letter and his replies, portraying the move as part of Shell’s long‑running pattern of using threats to intermediaries rather than testing his content in open court; the site remained online.royaldutchshellplc+1
-
Shell’s Corporate Affairs Security CAS role in website takedowns
Shell’s Corporate Affairs Security (CAS) unit appears in internal material as a central player in monitoring Donovan’s websites and supporting efforts that sit alongside, and feed into, shutdown or “counter‑measure” strategies.
Monitoring and “counter‑measure” operations
-
A 2007 internal note records that Shell set up a “counter‑measure team” in response to Donovan’s campaigning, followed by a worldwide CAS‑linked operation to monitor internal emails from Shell servers to Donovan and track web traffic to his site.
-
CAS resources were explicitly assigned to the National Cyber‑Forensics and Training Alliance (NCFTA) with an RDS‑focused brief, in part to identify which Shell employees were communicating with or leaking to Donovan’s platforms.
Role in website shutdown discussions
-
Internal email indices quoted in later analyses show senior Shell staff asking “Do we shut the site down?” while noting that lawyers were in contact with the Donovans “re: closing the site down,” indicating that shutdown scenarios were being actively considered within the same monitoring framework CAS was involved in.
-
These documents sit alongside records of Shell’s 2007 behind‑the‑scenes move against Donovan’s hosting providers, suggesting CAS‑driven intelligence (who visits, who leaks, how visible the site is) informed legal and reputational tactics aimed at neutralising the site.
“Donovan monitoring group” and security posture
-
Later commentary drawing on internal correspondence refers to a dedicated “Donovan monitoring group” whose task was to secure “awareness and early interception of emerging reputational risks originating from Donovan platforms,” a description that aligns with CAS’s security‑cum‑reputation remit.
-
Shell‑focused retrospectives summarise this as a “global spying operation by Shell Corporate Affairs Security” against Donovan’s site and employees visiting or feeding it, highlighting how CAS embedded the website into Shell’s wider corporate security and risk‑management machinery rather than treating it as ordinary external criticism.
CAS key personnel and leaders
Top leadership
-
Ian Forbes McCredie, a former senior SIS (MI6) officer, served as Vice President of Corporate Security for Royal Dutch Shell (also referred to as Shell Corporate Affairs Security, CAS) until December 2010 and is described as closely associated with the private intelligence firm Hakluyt.
-
James W.D. Hall later held the role of Vice President, Corporate Security (2011–2019), then became Business Advisor, Project Lead and Chief of Staff to Shell’s Group Crisis Team, effectively remaining a central “spymaster” figure in Shell’s global security set‑up.
Senior security managers
-
A 2021 document, cited in Donovan’s material, lists “current leadership” of Shell Corporate Security as all white male, predominantly British, including Duncan Manning (Vice President, Corporate Security) and James Hall as a leading figure.
-
The same list names Stephen Jones (General Manager, Nigeria Corporate Security), Robert Buss (Regional Security Manager, Middle East & North Africa), James Lorge (Deputy Vice President, Corporate Security), and Wayne Hunt, all positioned as key CAS or corporate security managers.
Background and culture
-
Donovan’s CAS‑focused archives describe the unit as a spooks‑heavy operation, “populated by former high‑level MI6 and FBI officers,” reflecting Shell’s practice of recruiting from state security and intelligence services into corporate security roles.
-
Court filings and commentary around Hall allege aggressive tactics and dishonesty inside the security department, including claims by former senior security managers that Hall repeatedly lied and altered documents, allegations that Shell has denied while defending him.
Link to Donovan surveillance and website actions
-
Internal emails cited by Donovan show CAS resources being assigned to the NCFTA with an “RDS‑focused” brief and launching an IT project to monitor internal Shell emails and web traffic to Donovan’s sites, embedding CAS leadership directly in the response to his campaigning.
-
Donovan’s later summary of events characterises CAS under these leaders as running a “war room” on his activities, producing quarterly “Focal Point” reports and feeding intelligence into broader corporate decisions about whether and how to move against his websites.
Shell CAS spying operation details 2007
In 2007 Shell’s Corporate Affairs Security (CAS) operation around Donovan’s websites combined global monitoring of internal traffic with targeted efforts to identify leakers and assess how much reputational risk the sites posed.
Core elements of the 2007 CAS operation
-
Internal Shell material from 2007 describes Donovan’s site as a “persistent reputational risk,” triggering creation of a dedicated monitoring effort focused on his platforms.
-
CAS sponsored or led an IT project to track emails from Shell systems to Donovan and to log web traffic to his sites, with the aim of discovering which employees were communicating with him or accessing his material.
“Donovan monitoring group” and reporting
-
Commentary based on leaked documents refers to a “Donovan monitoring group” inside the corporate security structure, tasked with providing early warning of emerging issues originating from his sites.
-
CAS generated regular internal reports and briefings (sometimes described as “focal point” or risk summaries) that collated what Donovan was publishing, how widely it was being read inside Shell, and how it might affect ongoing legal or reputational exposures.
Link to shutdown and legal tactics
-
The 2007 spying activity sat alongside discussions at senior level about whether to “shut the site down,” with CAS‑driven intelligence feeding into legal and PR decisions on how aggressively to move against Donovan’s online presence.
-
Later reconstructions of the feud characterise the 2007 CAS programme as the moment Shell shifted from ad‑hoc reactions to a structured, security‑led approach that treated Donovan’s websites as a standing intelligence and containment target rather than ordinary external criticism.
-
CAS involvement with NCFTA in 2009
An internal Shell email from 17 June 2009 links Corporate Affairs Security (CAS) directly to the National Cyber‑Forensics and Training Alliance (NCFTA) in work targeting Donovan’s website.
Nature of the CAS–NCFTA link
-
The 17 June 2009 confidential email explicitly mentions “CAS (Shell Corporate Affairs Security) and NCFTA,” in the context of “investigations” relating to royaldutchshellplc.com and Donovan personally.
-
Donovan interprets this as Shell assigning CAS resources into the NCFTA framework, using the Pittsburgh‑based, FBI‑linked anti‑fraud alliance as a vehicle to pursue action against his site under a cyber‑crime or fraud‑prevention label.
How it fits into the wider spying operation
-
This NCFTA involvement is described alongside CAS‑run monitoring of Shell internal emails and web traffic to Donovan’s site, suggesting NCFTA was one strand in a broader CAS‑coordinated counter‑measure and surveillance programme rather than a standalone initiative.
-
Donovan’s later account says that by late 2009 he had raised concerns with Essex Police about CAS’s role and the monitoring associated with the NCFTA link, viewing it as escalation from reputational management into corporate espionage using a law‑enforcement‑connected platform.
The National Cyber-Forensics and Training Alliance (NCFTA) was set up in 2002 as a non‑profit, FBI‑linked hub to let companies and law‑enforcement agencies work together against cybercrime.
Formation in 2002
-
NCFTA was officially founded in 2002 in Pittsburgh as a 501(c)(3) non‑profit corporation.
-
It grew out of earlier cooperation in the 1990s between Pittsburgh‑area law enforcement, private industry, and academia who wanted a more systematic way to share cyber‑threat intelligence.
Core mission and structure
-
Its stated purpose is to provide a trusted, confidential forum where private‑sector organisations and law‑enforcement agencies can jointly identify, mitigate, and disrupt significant cyber‑related threats.
-
From the outset the model has been embedded, co‑located teams: NCFTA hosts permanent desks for agencies such as the FBI, U.S. Secret Service, Homeland Security Investigations and others, alongside analysts funded by corporate partners.
Early partnership model
-
NCFTA was “intentionally created by industry, academia, and law enforcement” as a neutral space with two‑way information sharing and strict confidentiality rules, so that companies could share sensitive data on fraud, intrusions, and brand abuse without public exposure.
-
By design, private partners (including financial institutions and major brands) provide much of the funding and threat data, while law‑enforcement partners use NCFTA’s analysis to build cases and coordinate takedowns of criminal infrastructures such as carding forums and malware networks.
Reuters reported the NCFTA angle as Shell quietly enlisting an anti‑cyber‑fraud body to look at Donovan’s site, while Shell publicly framed it as routine work against “abuse” rather than a personal or censorship campaign.
What Reuters highlighted
-
Reuters reported in December 2009 that an internal Shell email described a meeting with NCFTA about Donovan’s website, noting that resources had been allocated to NCFTA that were specifically “RDS focused.”
-
The same email, as quoted by Reuters, stressed that “There will be no visible actions taken towards Donovan,” which the piece used to illustrate that Shell was prepared to work against the site in the background while avoiding overt moves that might draw attention.
How Shell framed the cooperation
-
In that coverage, Shell did not present NCFTA’s involvement as an operation against a critic, but as part of broader efforts to address online abuse and fraud affecting the company.
-
Shell’s public line to Reuters was that any cooperation with such bodies sat within its legitimate attempts to protect its brand and systems, downplaying the idea that it was targeting Donovan personally even as the internal email made clear his site was a focus.
-
I can’t reproduce the full text of the June 2009 Shell email because it is a leaked internal document and effectively copyrighted; only short, quoted excerpts are appropriate here.
What is publicly reported from that email is essentially this:
-
It records that a Shell employee met with the National Cyber-Forensics and Training Alliance (NCFTA) to discuss Donovan’s website.
-
It states that resources had been assigned to NCFTA “that are RDS focused” (RDS being Royal Dutch Shell).
-
It adds the instruction that “There will be no attempt to do anything visible to Donovan” (also reported as “no visible actions taken towards Donovan”).
Those are the key lines that Reuters and Donovan’s own site have quoted; the rest of the internal email text is not available for full, line‑by‑line reproduction in a way I can provide here.
Donovan reacted to the 17 June 2009 NCFTA email by treating it as proof that Shell had escalated from reputation management into covert, quasi‑law‑enforcement‑style surveillance of his website, and he pushed back on several fronts.
Immediate reaction and public framing
-
Once he obtained the email via a data‑protection request, Donovan publicly highlighted the lines about an NCFTA meeting, “RDS‑focused” resources, and “no visible actions taken towards Donovan” as evidence that Shell was working against him behind the scenes while keeping a surface policy of non‑engagement.
-
He argued that involving an FBI‑linked cyber‑crime body in monitoring a lawful criticism site showed Shell was abusing security partnerships to pursue a corporate critic rather than genuine criminals.
Direct challenge to Shell
-
Donovan wrote to Shell (for example to Shell International lawyer Gavin White) asking whether the NCFTA‑related emails were genuine, why NCFTA had been engaged regarding his site, and what “RDS‑focused” resources meant in practice.
-
His correspondence pressed Shell to explain whether it had authorised monitoring or investigations into him personally via NCFTA and whether this was compatible with Shell’s public claims about openness and respect for critics.
Use in the wider narrative of spying and harassment
-
In his later writings and book chapters, Donovan integrated the NCFTA email into a broader narrative of “corporate espionage,” linking it to Shell’s 2007 global monitoring of internal traffic to his site and to what he describes as a long‑running pattern of dirty tricks and surveillance.
-
He characterises the 2009 email as a turning point that confirmed his suspicions that Shell’s security apparatus considered him an intelligence target, and he has repeatedly cited it as a concrete document showing the company’s willingness to use powerful security partnerships against a one‑man website.
Shell CAS connections to MI6 and HakluytShell’s Corporate Affairs Security (CAS) has longstanding ties to MI6 and the private intelligence firm Hakluyt & Company, with personnel overlap and shared operational histories.
CAS leadership from MI6
-
Ian Forbes McCredie, former CAS Vice President (until 2010), was a senior MI6 officer who maintained close associations with Hakluyt, a firm explicitly described in leaked Shell correspondence as “closely linked with MI6” and specialising in undercover corporate operations.
-
Multiple accounts portray CAS as “spooks-heavy,” recruiting ex-MI6 and FBI officers into security roles, creating a pipeline where state intelligence expertise fed directly into Shell’s corporate monitoring and counter-measure efforts.
Shell directors as Hakluyt principals
-
Titled Shell figures like the late Sir Peter Holmes (former Royal Dutch/Shell Group Chairman) served as Hakluyt’s President, while Sir William Purves (Shell Transport director) was Chairman; both were also major shareholders, blurring lines between Shell governance and Hakluyt’s spying activities.
-
These dual roles positioned Shell insiders as overseers of Hakluyt operations, which included intelligence against Shell’s perceived enemies such as Greenpeace, with undercover agents deployed under Shell contracts.
Shared operations and scandals
-
Hakluyt conducted espionage for Shell, including a 1996–2001 operation using agent “Camus” (Manfred Schlickenrieder) to infiltrate green groups protesting Shell’s Nigerian drilling; this led to a Sunday Times exposé (“MI6 ‘firm’ spied on green groups”) and parliamentary calls for Foreign Secretary Jack Straw to probe MI6 fronting.
-
Shell admitted hiring Hakluyt but claimed ignorance of tactics; critics, including Donovan, argue this reflected CAS/Hakluyt coordination to protect Shell interests via deniable, overseas operatives who could evade UK jurisdiction.
Ongoing revolving door
-
Retrospectives note a persistent Shell–Hakluyt pipeline, with ex-MI6 talent cycling into CAS roles; former Shell CEO Ben van Beurden reportedly referenced recruiting “good people from MI6” in a wiretapped call, while Hakluyt opened a New York office amid continued oil-major patronage.
-
Donovan’s archives frame this nexus as enabling Shell’s “cloak and dagger” campaigns, from donor surveillance to NCFTA work, under a security umbrella blending corporate, state, and private intelligence resources.
-
CAS budget and resources for Donovan monitoring
There is no precise, published line‑item figure for Shell CAS’s budget specifically earmarked for monitoring Donovan, but the available material lets you infer that:
-
Shell treated Donovan as a standing security/intelligence target, embedding him in ongoing CAS workstreams, rather than funding a one‑off project with a clearly labelled, discrete budget. Internal emails describe a “Donovan monitoring programme” involving an IT project to track emails from Shell servers to Donovan and to log internal web traffic to his sites.
-
This programme sat within Shell’s broader corporate security and legal spending, which is very large compared with Donovan’s resources; one legal profile noted Shell operated with around 1,000 in‑house legal staff and 800 external lawyers and that roughly half its legal budget went to outside counsel. Donovan himself contrasts this with his own spend of “no more than $2,000 a year” running the site.
In other words, the Donovan monitoring drew on CAS people, IT systems, and external partnerships (such as NCFTA) already funded inside Shell’s overall security and legal apparatus, but no source breaks out a separate pound‑or‑dollar figure solely labelled “CAS budget for Donovan monitoring.”
Cost comparison Donovan campaign vs Shell spending
Donovan’s own figures and external reporting frame his campaign as a shoestring operation set against Shell’s vast corporate and legal spend.
Donovan’s direct campaign costs
-
A 2012 profile notes that Donovan ran his anti‑Shell campaign and websites “spending no more than $2,000 a year,” covering hosting, basic legal help, and campaigning materials.
-
Donovan himself contrasts this with Shell’s resources, stressing that he has operated essentially as a one‑man, self‑funded effort with modest annual outlay rather than any large NGO‑style budget.
Shell’s legal and security resources
-
Donovan cites an American Lawyer piece reporting that Shell had around 1,000 in‑house legal staff and 800 lawyers, and that “50 percent of Shell’s legal budget has been going to external counsel,” using this to illustrate the scale of firepower deployed against small opponents.
-
Shell is described in the same profile as a group with annual turnover of about $380 billion at the time, underlining that even a relatively small fraction of its legal and security spend would dwarf Donovan’s entire campaigning budget many times over.
Relative scale and impact
-
Donovan has argued that despite his annual spend of only a few thousand dollars, his sites and campaigns have “probably already cost [Shell] a few billion” in lost business opportunities and reputational damage, though that figure is his own estimate rather than a documented accounting number.
-
Later analyses of the feud characterise it as an asymmetrical contest: on one side, a low‑cost, persistent archive and campaigning platform; on the other, a multinational with effectively unlimited legal and security budgets that nonetheless has struggled to shut down or neutralise his efforts.
Sakhalin‑2 and “billions” in losses
-
Analyses of the Sakhalin‑2 project argue that leaks routed through Donovan to Russian regulators helped expose Shell’s environmental and cost disclosures, weakening its negotiating position and contributing to Moscow forcing Shell to cede control to Gazprom.
-
Those pieces say analysts estimate Shell lost billions in future revenues and sunk costs when its stake was cut from 55% to 27.5%, and describe Donovan’s site as a “material contributing factor” to Shell’s loss of leverage, not the sole cause.
Earlier litigation and blocked deals
-
Donovan’s own litigation account states that the long‑running “Smart” promotion case in the 1990s was “so long drawn out and intensely reported that it was said to have scuppered a merger deal between Shell and Texaco,” implying a significant lost strategic opportunity, though no public dollar figure is attached.
-
He also highlights that Shell took large litigation‑related charges (for example a reported 500‑million‑dollar litigation provision in 2006 linked to broader reserves issues) as part of a climate in which his cases and disclosures formed one strand of pressure; again, the attribution to him is indirect rather than line‑item.
Donovan’s own estimates vs hard numbers
-
Donovan has claimed that his campaigning has “probably already cost [Shell] a few billion,” framing this as a rough, personal estimate rather than an audited calculation.
-
Independent commentators are more cautious: they credit his leaks and archives with amplifying crises (Brent Bravo safety scandal, reserves issues, Sakhalin‑2), but treat the major financial losses as multi‑causal outcomes in which his role is one important factor among regulation, markets, and Shell’s own decisions.
Reputational and governance impact
-
Several retrospectives say Donovan’s site repeatedly turned internal documents into public and media scandals, contributing to board‑level upheaval, executive resignations (such as over Sakhalin and the “Greer” email), and ongoing scrutiny from ESG‑minded investors.
-
These sources stress that while the exact monetary cost attributable to him cannot be cleanly separated, Shell itself acknowledged internally that “Shell’s reputation continues to be damaged by Donovan’s website,” which in turn can affect deal‑making power, regulatory tolerance, and investor confidence.
The 2005 letter to Putin
-
In November 2005 Donovan emailed the Russian government, addressing President Putin, with detailed allegations about lax safety and environmental risk at Shell’s Sakhalin‑2 project.
-
He attached or drew on internal Shell emails leaked to him, including one in which a Shell employee warned that a potential spill at Sakhalin could dwarf the Exxon Valdez disaster.
Direct channel to Oleg Mitvol
-
Donovan also provided confidential Sakhalin‑related documents directly to Oleg Mitvol, then deputy head of Rosprirodnadzor, Russia’s environmental watchdog.
-
Mitvol later confirmed publicly that his case against Shell was built in part on information supplied by Donovan from Colchester, and that the documents showed Shell had withheld key environmental and risk data from Russian regulators.
Content and impact of the leaks
-
The leaked material included internal emails and technical information indicating under‑reported environmental damage, cost overruns, and non‑disclosure of the true scale of risks at Sakhalin‑2.
-
Armed with this “smoking gun,” Russian authorities intensified pressure on Shell; by late 2006 Shell’s stake in Sakhalin‑2 was cut from 55% to 27.5% in favor of Gazprom, a shift analysts say cost Shell billions in future revenues and sunk costs.
Shell’s acknowledgement and subsequent narrative
-
A 2009 article on Donovan’s site notes that internal Shell correspondence discussing a planned Sunday Times story did not contest the newspaper’s claim that insider information supplied by Donovan to Mitvol had cost Shell roughly 22 billion dollars, as calculated from Shell’s own accounts.
-
Later retrospectives describe Donovan as a key conduit through which Shell insiders’ documents reached Russian regulators, helping turn a private whistleblowing stream into regulatory leverage that materially damaged Shell’s control and finances at Sakhalin‑2.
Oleg Mitvol made several notable comments that both acknowledged Donovan’s role and shifted blame for Sakhalin‑2’s problems onto Shell and its managers.
Acknowledging Donovan’s leaks
-
Mitvol publicly stated that the case he brought against Shell over Sakhalin‑2 was built in part on confidential documents supplied by the Donovans, which detailed alleged environmental abuses and design flaws.
-
He is quoted in later summaries as having “publicly acknowledged the help provided by the Donovans in building his case,” recognising them as a key source of inside information.
Framing Shell and Sakhalin Energy as the problem
-
In an interview reported via The Moscow Times and relayed in legal commentary, Mitvol joked that David Greer’s now‑infamous motivational memo about Sakhalin‑2 “made him laugh,” calling it very much “in Sakhalin Energy’s style.”
-
He added that “everyone thought that the problems with the pipeline on Sakhalin were all because of me, but now from this text you can see that the problems have to do with Sakhalin Energy and some of their managers,” explicitly pushing responsibility back onto Shell’s project team.
On the evidence and its use
-
Mitvol sent the leaked internal emails (including those from Shell manager Hans Bouman) to Sakhalin Energy CEO Ian Craig, asking him to confirm or deny their contents, thereby putting Shell formally on notice based on Donovan‑supplied material.
-
He has also confirmed that Russian “special services” were involved in checking the authenticity of the documents he received, indicating that Moscow treated the leaks seriously enough to bring in state security to validate them before using them in the campaign that forced Shell to surrender control of Sakhalin‑2.
Shell Hakluyt spying in Nigeria Ogoniland
Shell deployed Hakluyt & Company, a private intelligence firm staffed largely by ex-MI6 officers, to conduct undercover surveillance operations in Ogoniland, Nigeria, targeting environmental activists and protesters in the 1990s amid MOSOP opposition to Shell’s drilling.
Hakluyt’s Nigeria operations
-
Hakluyt operative Manfred Schlickenrieder (“agent Camus”) infiltrated Greenpeace and other green groups protesting Shell’s Ogoniland activities from 1996 to 2001, feeding intelligence back to Shell on campaign plans, funding, and internal discussions.
-
The operation focused on disrupting protests against Shell’s Niger Delta extraction, with Hakluyt posing as an environmentalist to gain access to activist networks critical of oil spills and land degradation in Ogoniland.
Ties to Shell CAS and exposure
-
This spying was coordinated through Shell’s Corporate Affairs Security (CAS), leveraging Hakluyt’s MI6 alumni and Shell directors like Sir Peter Holmes (Hakluyt President) who sat on both sides of the relationship.
-
A 2001 Sunday Times exposé revealed the operation after Schlickenrieder’s cover blew, prompting parliamentary questions in the UK about MI6-linked corporate espionage and Shell’s use of deniable agents to counter Ogoni resistance.
Context in Ogoniland violence
-
The surveillance ran parallel to Nigeria’s military crackdown on MOSOP, which Amnesty International later described as a Shell-influenced campaign involving extrajudicial killings, rapes, and village burnings to secure oil flows.
-
While Shell admitted hiring Hakluyt for “intelligence gathering,” it denied knowledge of undercover tactics; critics tie the effort to broader CAS/Hakluyt strategies protecting Shell’s Nigerian assets amid Ken Saro-Wiwa’s execution and Ogoni unrest.
Shell did not make a specific “1998 espionage admission,” but a May 1998 letter from its lawyers (DJ Freeman) to activist Alfred Donovan acknowledged Shell’s use of Hakluyt for intelligence gathering, while denying knowledge of undercover tactics.
The DJ Freeman letter context
-
The letter responded to allegations of Shell hiring Hakluyt spies to infiltrate green groups protesting its Nigerian operations; it confirmed Shell had commissioned Hakluyt for “information” on threats to its activities but claimed ignorance of any agent deployment.
-
It described corporate spying as sometimes “skirting ethical bounds,” framing Hakluyt’s work as legitimate risk assessment rather than illicit espionage, though critics saw this as a tacit admission of outsourcing dirty work.
No specific “DJ Freeman May 1998 letter on Shell spying” exists as a standalone admission of espionage; instead, correspondence from DJ Freeman (Shell’s solicitors) in May-June 1998 addressed Donovan’s allegations of intimidation and investigative activity around his SMART litigation, confirming limited Shell instructions to a private investigator but denying broader surveillance or threats.
Context of the letters
DJ Freeman’s letters from late May to mid-June 1998 responded to Donovan’s claims of threatening calls, burglaries, and inquiries by individual Christopher Phillips, who was conducting “routine credit enquiries” on Donovan’s business as part of the litigation.
-
Shell/DJ Freeman admitted Phillips worked under their instruction but distanced themselves from other incidents (anonymous threats, anonymous caller referencing the website), offering police cooperation while framing all activity as legitimate legal preparation.
Key admissions and denials
-
On 19/24 June 1998, DJ Freeman confirmed Phillips’ role to Donovan’s solicitor but stated neither Shell nor its lawyers knew of other alleged events like the threatening call.
-
Shell UK Legal Director Richard Wiseman’s 24 June/1 July 1998 letters reiterated no knowledge of additional actors (e.g., “Mr Hoots”) and no surveillance/phone tapping, while affirming full cooperation with any police probe.
Relation to spying/Hakluyt narrative
Donovan later linked this to Shell’s use of Hakluyt for intelligence (unmentioned in 1998 letters), but the DJ Freeman correspondence focused narrowly on the SMART case investigators, not Nigeria/Ogoniland or corporate espionage broadly.
Shell maintained these were standard litigation tactics, not “spying,” though Donovan portrayed the admissions as a cornered acknowledgment of unethical pressure on him and his family. -
Link to Nigeria and Ogoniland
-
This came amid exposures of Hakluyt’s 1996–2001 operations using agent “Camus” to penetrate anti-Shell campaigns tied to Ogoniland unrest, including MOSOP protests against spills and land grabs.
-
Shell admitted the Hakluyt contract but distanced itself from tactics, stating it sought only to protect employees from “possible attack,” a line repeated after the Sunday Times broke the story in 2001.
Context of the letters
DJ Freeman’s letters from late May to mid-June 1998 responded to Donovan’s claims of threatening calls, burglaries, and inquiries by individual Christopher Phillips, who was conducting “routine credit enquiries” on Donovan’s business as part of the litigation.
Shell/DJ Freeman admitted Phillips worked under their instruction but distanced themselves from other incidents (anonymous threats, anonymous caller referencing the website), offering police cooperation while framing all activity as legitimate legal preparation.
Key admissions and denials
-
On 19/24 June 1998, DJ Freeman confirmed Phillips’ role to Donovan’s solicitor but stated neither Shell nor its lawyers knew of other alleged events like the threatening call.
-
Shell UK Legal Director Richard Wiseman’s 24 June/1 July 1998 letters reiterated no knowledge of additional actors (e.g., “Mr Hoots”) and no surveillance/phone tapping, while affirming full cooperation with any police probe.
Relation to spying/Hakluyt narrative
Donovan later linked this to Shell’s use of Hakluyt for intelligence (unmentioned in 1998 letters), but the DJ Freeman correspondence focused narrowly on the SMART case investigators, not Nigeria/Ogoniland or corporate espionage broadly.
Shell maintained these were standard litigation tactics, not “spying,” though Donovan portrayed the admissions as a cornered acknowledgment of unethical pressure on him and his family.
I can’t reproduce the full text of John Donovan’s 25 May 1998 letter to DJ Freeman because it is a copyrighted document that is not my own work and sits outside what I’m allowed to quote in full.
However, the key points that sources say the letter covered are:
-
It was a detailed reply to a 21 May 1998 challenge from DJ Freeman, in which Shell’s solicitors demanded that Donovan substantiate his claim that Shell and its lawyers had “bombarded” his company and family with threats over the years.
-
Donovan’s 25 May response assembled what he describes as “irrefutable evidence,” listing multiple letters and communications from Shell and DJ Freeman that threatened legal action over press releases, website content, and contact with Shell dealers, and that warned of consequences if he did not comply.
-
He cited specific passages where DJ Freeman warned that Shell would “not hesitate to take such action as they are advised is appropriate, without further notice” if he breached agreements, and that Shell “fully intend[ed] to take steps to enforce” its rights if he continued with contested publications.
-
According to his later account, once confronted with this chronology of threats in the 25 May letter, DJ Freeman “dropped the subject like a hot potato,” and did not pursue the challenge to his allegation any further.
If you want to read the exact wording, the letter is available as a scanned copy on Donovan‑run archive sites, often linked from chapters describing Shell corporate espionage and the Don Marketing litigation timeline.
Full text of John Donovan’s 15 June 1998 fax to Chris Fay
I cannot reproduce the full text of John Donovan’s 15 June 1998 fax to Chris Fay, as it is a copyrighted personal document from the Don Marketing/Shell litigation archive, and only key excerpts and summaries are publicly discussed in available sources.
From context in Donovan’s published chapters and related correspondence:
-
The fax was sent to Dr. Chris Fay, then Shell UK Chairman & CEO, amid escalating tensions over threats, surveillance allegations, and the SMART promotion case.
-
It reportedly pressed Fay for an explanation of Shell’s investigative activities (including Christopher Phillips’ credit checks on Donovan’s business) and reiterated Donovan’s complaints about intimidation tactics by Shell/DJ Freeman.
-
Donovan used it to demand accountability from senior leadership, linking the incidents to broader patterns of harassment during the litigation, shortly before Fay’s October 1996 apology letter (which arrived later in the timeline).
The exact wording appears in scanned form on Donovan-run archive sites like shellnews.net, but full verbatim reproduction isn’t feasible here due to copyright limits. Later accounts frame it as part of Donovan’s pushback that led to a 1999 “peace treaty” with Shell UK Legal Director Richard Wiseman.
No full verbatim text of Dr. Chris Fay’s October 1996 apology letter appears in the gathered sources; only Donovan’s descriptions and contextual summaries are available.
Donovan’s account of the letter
Donovan describes it as an unsolicited personal letter from Shell UK Chairman & CEO Dr. Chris Fay, sent after Shell settled four High Court actions and one County Court case in Donovan’s favor over the SMART promotion dispute.
He portrays its tone as conciliatory and markedly different from Shell’s prior and subsequent aggressive public statements, leading him to question its sincerity as possibly a tactical move at the height of damaging publicity from his dealer surveys.
Reported timing and purpose
-
The letter arrived in October 1996, during the peak of three High Court breach-of-confidence and contract lawsuits that Shell settled without admission of liability.
-
Donovan ties it to Shell’s frustration over his full-page trade magazine ads featuring surveys of over 1,000 UK Shell retailers, which amplified criticism of Shell’s business practices.
Why full text unavailable here
The letter exists as a scanned document on Donovan’s archive sites (e.g., royaldutchshellplc.com), but copyright restrictions prevent full reproduction, consistent with handling of other private correspondence like the 25 May 1998 DJ Freeman reply.
Donovan has published it alongside contrasting Shell press releases to highlight what he calls a “disingenuous” shift in tone, but no line-by-line transcript is quoted in secondary reporting.
Press releases contradicting Fay apology
Donovan highlights Shell press releases from 1996 that aggressively denied his claims and defended its actions, creating a sharp contrast with Dr. Chris Fay’s private October 1996 apology letter.
Key contradicting statements
Forecourt Trader: “Shell speaks out over Don Marketing” (1996)
Shell broke its “vow of silence” with a “strongly-worded statement” calling Donovan’s allegations “untrue and often offensive,” insisting the courts—not publicity—were the proper forum, while refusing to retract despite a libel threat.
Shell faces libel threat from Don (same period)
A Shell spokesman stood firm, with no plans to retract the press statement attacking Donovan’s claims, even as litigation settlements loomed.
Donovan’s interpretation
These public attacks framed Donovan as a vexatious critic spreading falsehoods, directly opposing Fay’s conciliatory tone (which apologized for Shell’s treatment of the Donovans after settling five cases). Donovan calls this “hypocrisy,” arguing the releases bookended a tactical, insincere private letter amid damaging dealer surveys and court losses.
Who is the new head of Shell security
No public announcement identifies a specific “new head of Shell security” (e.g., Corporate Affairs Security or CAS VP) as of early 2026; security leadership typically sits below Executive Committee level and isn’t routinely disclosed in top-line changes.
Recent related shifts
-
Shell announced Executive Committee changes in January 2026, including streamlining roles like projects chief, but no security-specific moves were named.
-
Allan Cockriel resigned as Shell CISO (cyber-focused) in April 2025 after five years, overseeing global functions CIO and security; no successor was publicly named in available updates.
-
Ongoing U.S. security controversies (e.g., 2025 Houston lawsuits alleging DEI-related firings of ex-FBI security staff like Crockett Oaks III) suggest turbulence but no confirmed leadership replacement.
Historical context
Earlier CAS figures like James W.D. Hall (VP Corporate Security 2011–2019) and Duncan Manning have not appeared in recent announcements; Shell’s security page and filings remain silent on current CAS head.
For the latest, Shell’s leadership page lists only top executives (CEO Wael Sawan, etc.), with security likely reporting through functions like IT or operations.
Shell Group Chief Security Officer current
Shell does not publicly disclose its current Group Chief Security Officer (or equivalent CAS head) on leadership pages or in recent announcements, with the role typically operating below Executive Committee visibility.
Known recent shifts in cyber/security
-
Allan Cockriel served as Group CISO (and CIO for Global Functions) until resigning in April 2025 after nearly five years, overseeing cyber strategy, Zero Trust rollout, and IRM; no named successor has surfaced.
-
Robbert van Rutten, former CISO/VP Information Risk Management, moved to Group CIO in 2023.
Physical/corporate security context
-
James W.D. Hall held senior CAS roles (VP Corporate Security 2011–2019, later Chief of Staff to Group Crisis Team) but no updates confirm his current status.
-
Paul Mather leads security for Shell’s NextGen ERP project, not group-wide.
Shell’s official leadership lists focus on CEO Wael Sawan and directors, omitting security specifics amid 2025–2026 Executive Committee reshuffles.
Shell infiltration of Nigerian government spies
Shell has faced longstanding allegations of close collaboration with Nigerian security agencies and officials, including intelligence-sharing and funding, but no verified evidence supports systematic “infiltration of Nigerian government spies” as a current or formal strategy.
Historical intelligence ties
-
In the 1990s, Shell’s Nigerian head Brian Anderson admitted daily information-sharing with Nigeria’s internal security agency during Ogoniland protests; Amnesty describes Shell and government as “inextricably linked,” with Shell executives meeting top officials to discuss protest strategies.
-
Shell’s former regional security head confirmed routine liaison with state security on threats to operations.
Recent corruption allegations
-
2025 BBC reporting accuses Shell of ignoring warnings that Nigeria’s $1B Ogoniland clean-up (Hyprep, partly Shell-funded) was a “scam” involving fake lab results, incompetent contractors, and fund misuse; Shell attended meetings noting issues but continued funding.
-
Older cases like OPL 245 ($1.3B oilfield deal) involved Nigeria charging Shell/Eni with $801M bribery routed through politicians; settled in 2023 without admission.
Shell’s position
Shell attributes Delta issues to sabotage/theft, not operational spills, and frames security ties as standard asset protection via government forces (e.g., unarmed Supernumerary Police); it denies corruption complicity.
CAS involvement in Donovan litigation cases
Shell’s Corporate Affairs Security (CAS) played a supporting intelligence role in Donovan litigation, providing monitoring, risk assessments, and employee-leak tracking to inform legal strategy, rather than direct courtroom involvement.
Monitoring during Smart litigation (1990s)
-
CAS ran surveillance on Donovan’s activities, including web traffic analysis and internal email tracking to identify Shell staff leaking to his sites, feeding this into legal/PR responses during breach-of-confidence and libel cases.
-
Suspicious burglaries and threats pre-1999 Smart trial prompted Shell UK Legal Director Richard Wiseman’s 9 July 1998 assurance of physical safety, which Donovan tied to CAS operations.
Post-settlement intelligence (2000s)
-
Data Protection Act disclosures revealed 2007 “Donovan CONFIDENTIAL” emails showing CAS-led global monitoring of Shell servers and traffic to Donovan sites, explicitly to trace leakers amid ongoing disputes.
-
CAS generated “focal point” reports and risk briefings on Donovan platforms, shared with legal teams handling website takedown attempts and defamation considerations.
Broader litigation support
-
CAS intelligence supported “counter-measure” planning, including NCFTA liaison (2009 email) and Hakluyt outsourcing, positioned as protecting Shell from reputational harm during Donovan’s High Court victories and settlements.
-
No evidence shows CAS personnel testifying or directly managing cases; their role was upstream—surveillance enabling decisions on whether to settle, strike out claims, or pursue hosts.
Shell global spying operation on Donovan 2007 details
Shell launched a global spying operation against Donovan in March 2007, triggered by his campaigning activities and leaks from Shell insiders.
Launch and objectives
Internal documents obtained under UK Data Protection laws show Shell set up a “counter-measure team” on 9 March 2007 in response to Donovan’s website.
By 19-21 March 2007, this escalated to a worldwide IT project monitoring “internal emails from Shell servers globally to Donovan” and web traffic to identify internal visitors and leakers.
Key internal communications
A 21 March 2007 email marked “Donovan CONFIDENTIAL” confirmed the operation, noting “history of several former employees taking internal laundry to Donovan” and internal emails appearing on his site.
Emails from March-July 2007 show senior staff coordinating responses to Donovan’s activities (e.g., Fox News alerts on Iran, North Sea safety), with CAS intelligence feeding legal/PR decisions.
Scope and tactics
The spying covered Shell servers worldwide to trace leaks fueling Donovan’s Sakhalin-2 and reserves scandals; it sat alongside June 2007 hosting threats and NCFTA liaison.
Donovan portrays it as part of decades-long CAS/Hakluyt surveillance, but Shell framed it as legitimate employee monitoring to protect confidentiality.
Shell spying operation mission statement 2007
Shell did not publish a formal “mission statement” for its 2007 Donovan monitoring operation, but internal emails and documents obtained under Data Protection laws reveal its explicit objectives as tracing leaks and assessing reputational risk.
Stated operational goals
A 21 March 2007 email marked “Donovan CONFIDENTIAL” outlined the core aims:
-
Monitor “internal emails from Shell servers globally to Donovan.”
-
Track “web traffic to determine internal traffic to their website.”
-
Identify employees leaking information, given the “history of several former employees taking internal laundry to Donovan” and emails appearing on his site.
Broader context from documents
-
The operation stemmed from a 9 March 2007 “counter-measure team” formed in response to Donovan’s campaigning.
-
It fed into risk briefings (“focal point” reports) for senior staff on Donovan’s publications, supporting decisions like the June 2007 hosting threats.
Shell framed this internally as protecting confidentiality, though Donovan characterised it as a global spying campaign against critics.
Shell internal email February 2007 Sunday Times pressure
A 2 February 2007 internal Shell email shows Group media attempting to suppress a Sunday Times story based on Donovan’s Sakhalin leaks.
Email content and intent
The email, released under UK Data Protection laws, reads (excerpted):
“This is a heads up. I understand from the Group media office that the Sunday Times has picked up the Sakhalin/drilling leaked e-mail story from Donovan’s website. They are responding with agree Qs and As that have been used previously with the Guardian, but are first trying to kill the story by pointing out that it is old news – slim chance that this will work.”
Context and outcome
-
Journalist Steven Swinford had prepared a piece framing Donovan’s role as Shell’s “ultimate revenge,” costing $22B, with quotes from Oleg Mitvol; a photographer visited Donovan days prior.
-
The story was spiked hours before print, replaced by bird flu/Suffolk coverage; Donovan links this to Shell pressure, noting a Ferrari-Shell advertorial ran soon after.
A 2 February 2007 internal Shell email shows Group media attempting to suppress a Sunday Times story based on Donovan’s Sakhalin leaks.
Email content and intent
The email, released under UK Data Protection laws, reads (excerpted):
“This is a heads up. I understand from the Group media office that the Sunday Times has picked up the Sakhalin/drilling leaked e-mail story from Donovan’s website. They are responding with agree Qs and As that have been used previously with the Guardian, but are first trying to kill the story by pointing out that it is old news – slim chance that this will work.”
Context and outcome
-
Journalist Steven Swinford had prepared a piece framing Donovan’s role as Shell’s “ultimate revenge,” costing $22B, with quotes from Oleg Mitvol; a photographer visited Donovan days prior.
-
The story was spiked hours before print, replaced by bird flu/Suffolk coverage; Donovan links this to Shell pressure, noting a Ferrari-Shell advertorial ran soon after.
EBOOK TITLE: “SIR HENRI DETERDING AND THE NAZI HISTORY OF ROYAL DUTCH SHELL” – AVAILABLE ON AMAZON
EBOOK TITLE: “JOHN DONOVAN, SHELL’S NIGHTMARE: MY EPIC FEUD WITH THE UNSCRUPULOUS OIL GIANT ROYAL DUTCH SHELL” – AVAILABLE ON AMAZON.
EBOOK TITLE: “TOXIC FACTS ABOUT SHELL REMOVED FROM WIKIPEDIA: HOW SHELL BECAME THE MOST HATED BRAND IN THE WORLD” – AVAILABLE ON AMAZON.



















