Janet Cresswell

E-Mail




These links are more information and pictures




There are two stories behind the harassment ahistorical one spanning more than thirty years and a more recent one.

Recent History

The recent story arises from my employment with NCR Teradata – a US computer company. The company manufactures and develops the largest database computer hardware and software in the world.

I was employed for six and a half years in the North Sydney office of this company.

The computers and databases are delivered to government and commercial sites where each installation is worth millions of dollars. Australian and New Zealand employees are employed on the government and commercial sites in the Asia Pacific region.

NCR Teradata also supplies database hardware and software to the military and intelligence communities worldwide.

NCR Teradata has the machine addresses for all of the sites worldwide. It is technologically feasible to insert, update, amend, delete or copy any or all of the database records at any of these sites.

Direct access to Australian databases includes:

The government sites - Tax, Customs, Social Security and Medicare.
The major banks - National Australia Bank, Commonwealth Bank, St George Bank, Westpac Bank.
The 3 telecommunications providers – Optus, Vodafone, Telstra.

Therefore any record on these databases may be inserted, updated, amended, deleted or copied.

I resigned from NCR Teradata in August 2001. During the exit interview I was repeatedly questioned about what I was going to do next. I was told that ‘your view and ours on big brother do not coincide’ and further ‘you will be harassed for the rest of your life’.

I have since travelled around Australia, England, New Zealand and India and experienced both constant surveillance and harassment.

In the life experience of an individual targeted directly by NCR Teradata, like myself, any or all database records can be changed to create the circumstances required. The data can be changed by the company or its military and intelligence associates on any international database.

When the data is queried and retrieved by a government, military, intelligence or law enforcement official, they will believe it to be true because it appears on the screen of a computer.

Longterm History

The longterm history relates to the use of the identity ‘Janet Cresswell’.

Definitions surrounding an Identity

The words comprising a name constitute an identity in any country:

e.g. 'Janet Cresswell'

An identity in any country may be assumed by a document of identity: e.g. birth certificate, adoption certificate, marriage certificate, change of name certificate, driver's licence, pilot's licence, credit card, passport.

A document of identity in any country may be stored as a digital computer record:

A document of identity in any country may exist in a physical form as a document, card etc:

A document of identity in any country may be created by differing agencies:

e.g. government agencies, banks, embassies, law enforcement agencies; individuals, national and international security organisations.

A document of identity in any country may be used by differing individuals:

e.g. government agencies, banks, embassies, law enforcement agencies; individuals, national and international security organisations.

A document of identity recorded by the British Home Office, under National Security may be assumed by employees of agencies under National Security.

Searching for an Identity

An individual may be identified on the internet by a variety of searches:

e.g. general search on identity, White Pages, Yellow Pages, address mapping, telephone mapping, driver's licence, court records, criminal records, births deaths and marriages, genealogical records.

All these searches will result in an identity being associated with particular data types.

Potential Use of an Identity

Since this individual information is accessible internationally, it may be assumed that a national or international security agency would not choose to select an identity for its employee's from accessible web sites as that identity could be checked.

An individual confined under the above the British National Security Act would not be in need of a new or renewed identity document e.g. passport, driver's licence.

Individuals employed by national or international security agencies are trained and permitted to perform acts which, if enacted by a private individual, may be deemed unlawful or criminal.

If an individual's identity had been used in this manner it would be convenient to confine that individual in an institution for an indefinite period of time.

It may be alleged that the identity 'Janet Cresswell' has been used by a national or international security agency in this manner.

Recorded Data

The records for the identity 'Janet Cresswell' commenced in the 1970's.
The records were digitised at a later date.
The records have been digitally stored for many years in many locations.
Computer records are maintained, inserted, amended, appended, added to, changed, modified, deleted, backed up, updated, merged, shared, linked, flagged, copied etc. over an extended period of time.

The records are recorded on databases which are linked, copied, updated, accessed by national and international security agencies, law enforcement agencies and immigration and customs agencies throughout the world.

These databases are not accessible to the individual with the identity under National Security, use of the Freedom of Information Act does not permit access nor does legal process.

ID1 – Janet Cresswell

Unlike Janet Cresswell in Broadmoor, I have been employed throughout my adult life. Albeit under stress from the circumstances as described.

I have never been under psychiatric assessment.

I have known since the early 1970’s that there were incorrect data records on databases in my name which contributed to many difficult circumstances.

I have known definitely since 1984 that the incorrect data records existed.

From other bizarre incidents while travelling I realised that people who confronted me thought I was somebody else.

I did not realise the identities of the other ID’s until I looked up my name in the general search engine of the internet in November 2001.

The Identity Janet Cresswell.

ID1 – Janet Cresswell – 1950 - myself ID1 was born in Rugby, Warwickshire. She went to school in England and New Zealand and has since lived in Australia during her adult life.

ID1 has suffered harassment by the authorities for 30 years, due to the ID Janet Cresswell being used by ID3 and others.

ID2 – Janet Cresswell - 1930 ID2 was born in England and has suffered 25 years of involuntary incarceration in Broadmoor, Berkshire, a high security psychiatric facility. There are numerous web wages describing her plight.

ID3 – Jasmine Cresswell ID3 was born in Wales and studied languages as did ID1. She subsequently worked for British embassies overseas and lived in Melbourne and Sydney as did ID1. There are numerous web pages detailing her achievements.

The following article is one about ID2 - Janet Cresswell in Broadmoor

By Sophie Goodchild,
Home Affairs Correspondent
09 November 2003

After 25 years in Broadmoor the writer Janet Cresswell has been moved to a medium-secure unit following a major 'IoS' campaign For the first time in years, Janet Cresswell can sit at her own word processor and type intimate letters to her family and her loyal friends. The former secretary was banned from owning a computer at Broadmoor hospital, where she was a patient for 25 years. The authorities feared that even 72- year-old grandmothers such as Ms Cresswell would download child pornography from the internet. This was only one of the petty privations that she endured at the high-security hospital in Berkshire where the award-winning playwright spent nearly a third of her life. Although the oldest woman left in Broadmoor, Ms Cresswell was repeatedly turned down for release after refusing the supervision of a Home Office psychiatrist because she said that she was not mad. Her "sentence" was longer than that of most murderers, despite the fact Ms Cresswell has killed no one. She was deprived of her freedom nearly a quarter of a century ago after attacking her psychiatrist with a vegetable knife - a serious offence but not one to merit such a lengthy stay in a high-security hospital. Incarcerated with child killers and serial murderers, Ms Cresswell feared that she would die in Broadmoor. But today she is finally able to celebrate her transfer to the medium-secure unit Thornford Park in Berkshire. This follows the decision earlier this year by a special health panel that Ms Cresswell was fit to be moved. Her transfer to a medium-secure unit comes three years after The Independent on Sunday first highlighted her plight and that of an estimated 400 people denied transfer from high-security units because of a shortage of psychiatric beds.

ID3 – Jasmine Cresswell

From Wales, Scotland, England and Italy to Brazil, America, Australia and Canada, Jasmine's roster of past addresses reads like the international directory of an in-flight magazine. Raised in London, England, with a short stint in Scotland and summers on the Adriatic Coast in Italy, Jasmine studied modern languages at the illustrious Lycée Français in London. Fluent in French, German and English, Jasmine's first job out of college was as a junior political officer at the Foreign Office in London, working closely with the EEC (European Economic Community). Bitten by the travel bug, Jasmine jumped at the opportunity to move to Brazil when she was asked to take up a post as a foreign language expert at the British embassy in Rio de Janeiro. Little did she know it would change her life forever.

Married to Malcolm Candlish, whom she met while she was working for the British Embassy in Rio de Janeiro, Jasmine and her husband have lived all over the world. She has a Bachelor's Degree with a double major in history and philosophy from Melbourne University, a second degree in history from Macquarie University, as well as a Masters Degree in history and archival administration from Case Western Reserve University in Ohio.

A book written by Jasmine Cresswell is about a woman who has been held in a psychiatric institution for more than 25 years, the name of the institution where she is held is Merton House, I worked at a school in Melbourne called Merton Hall from 1978-1982.

Title: SECRET SINS
Author: Jasmine Cresswell
Publisher: Mira
Published: Feb 1997
Type: Romantic Suspense

personal-account: The Identity Janet Cresswell.

ID1 ID1 was born in Rugby, Warwickshire. She went to school in England and New Zealand and has since lived in Australia during her adult life.

ID1 has suffered harassment by the authorities for 30 years, due to the ID Janet Cresswell being used by ID3.

ID2 ID2 was born in England and has suffered a lifetime of involuntary incarceration in Broadmoor, Berkshire. There are numerous web wages describing her plight.

ID3 ID3 was born in Wales and studied languages as did ID1. She subsequently worked for British embassies overseas and lived in Melbourne and Sydney as did ID1. There are numerous web pages detailing her achievements.

Five Power Defense Agreement

Under the Five Power Defense Agreement – Australia, New Zealand, Canada, United Kingdom, Singapore/Malaysia – employees of the police, military and intelligence services are able to operate within any of these countries. This agreement provides the means to mount an operation against any individual or organisation in any of these countries without the legally requisite permission having to be raised within the country of operation. The operation may be arranged from one of the other countries and some of the operatives may also be imported from another country.

Activities Include:

Total Disruption of Communication

Telephone Interception and recording of all calls. Complete use of the connection: i.e. Calls to known voices will go through, calls to other organisations or individuals will be answered by the operative to provide incorrect information.

Mail Interference with all mail.
Removal of mail delivered.
Removal of mail sent.

Computer
Removal of all data on a regular basis.
Interception of all emails.

Privacy
Entry to property.
Incorrect information given to employers.
Incorrect information given to landlords, estate agents.
Incorrect information given to neighbours.
Incorrect information given to relatives, friends, associates.
Removal of funds from bank accounts.

Incorrect Information on Databases

The data is changed regularly on databases which may be subject to Freedom of Information. Other databases are denoted a matter of national security and requests for information are refused on that basis.
Credit Rating
Customs
Social Security
Medicare

Electronic Harassment to debilitate and ruin health. Please see websites pertaining to ‘electronic harassment’, ‘non-lethal weapons’, ‘direct energy weapons’ and ‘mind control’.
Equipment can be set up within a day at any location. All equipment is now standard to the police, military and intelligence services in the above countries.

See through the wall radar
Microwave
Laser
Ladar
Flir

Contributing Factors to Harassment of ID1

1984 Australian Federal Police woman at Melbourne airport known to ID1 searched the information on record at that time.

Her brother lived with a friend of ID1. She went to the friend and questioned her about the record. The friend reported the discussion to ID1. This incorrect record explained why she was searched every time she travelled. The record at the time listed 3 murders, terrorism and gun running. The terrorist squad were called to the airport every time she travelled.

1984 ID1 used the services of a lawyer at Chisholm Institute of Technology, where she worked from 1982–1985. Freedom of Information requests were sent to the relevant agencies – Customs, Australian Federal Police, ASIO, Interpol etc. They all replied that the information was a ‘matter of national security’.

1984 ID1 suffered noticeable effects to health from harassment, which continue to this day, dependent upon harassment activity. Any animal resident at the same property has wasted away and died within a short time.

1986 ID1 obtained the services of a barrister who arranged an interview with the head of the Australian Federal Police in Melbourne. On entry to the secure building the officers repeatedly asserted that ID1 worked for ASIO. The chief would not commence any discussion until he knew the name of the police officer at the airport.

Three days later he rang ID1 at work and repeated three times that “there is nothing there now”.

1994 ID1 worked for the Parliament of Victoria from 1992 – 1995. The Natural Resources and Environment Committee produced a report on the activities of the Commonwealth relating to the environment in the state of Victoria. One aspect of the report dealt with the erection of mobile phone towers, the use of specific frequencies and their harmful effects on all living cells. The report concluded that the frequencies were harmful.

Submissions from the enquiry were requested by the ABC television programme, 4 Corners. A programme was produced and went to air about the harmful effects of frequencies.

1997 onwards From 1997 to 2002 she worked for NCR, a large American computing company which supplies the hardware, software and expertise to establish and run the largest databases in the world. In the Australia Pacific Region the databases in the public arena include major banks, retailers, telecommunications providers, customs and social security. The clients are the same in many western countries.

She was involved in contributing information to another 4 Corners programme about the use of mercenaries from South Africa and other countries organised by Executive Outcomes to overthrow the population surrounding the Bougainville Copper Mine. She had been given the information by Gary Scott, an ex major in the Australian army.

During repeated business trips to New Zealand ID1 was questioned at Customs asked if she needed to see a psychiatrist.

She is always stopped by Customs and her hand luggage is searched and sniffed by a dog before the main luggage arrives on the conveyor belt.

2002 In August 2002 ID1 ‘resigned’ from NCR having been told that ‘your views and ours on Big Brother do not coincide’. She was then told that she would be harassed for the rest of her life.

The electronic harassment then became overt and during this period she has recognised the patterns of events both historical and current effects on health.

Research of websites dealing with these issues has both verified and clarified the preceding history.

She has since sought legal assistance in Australia, New Zealand and the United Kingdom to no avail.

Please note websites and book by Tim Rifat which describe some harassment techniques in the UK.

The Book Secret Sins

The book Secret Sins by Jasmine Cresswell describes the life of a woman who has been kept in a mental institution for more than 25 years (ID2).

The name of the institution is Merton House. Merton Hall is the common name for Melbourne Church of England Girls Grammar School where ID1 worked from 1978– 1982.

Marla Harris is a secretary who is killed. Marie Harris was a secretary and friend of ID1 when she worked for the Parliament of Victoria from 1992-1995.

Janet Cresswell

Use of identity and subsequent harassment to this day.

ID1

ID2

ID3




NCR Teradata

NCR Teradata is a large multinational US Computer company with offices operating worldwide. NCR Teradata hardware and software provides databases for data warehousing to the largest organisations worldwide.

The computers and databases are delivered to government and commercial sites where each installation is worth millions of dollars. Australian and New Zealand employees are employed on the government and commercial sites in the Asia Pacific region.

NCR Teradata also supplies database hardware and software to the military and intelligence communities worldwide.

NCR Teradata has the machine addresses for all of the sites worldwide. It is technologically feasible to insert, update, amend, delete or copy any or all of the database records at any of these sites.

Direct access to Australian databases includes: The government sites - Tax, Customs, Social Security and Medicare. The major banks - National Australia Bank, Commonwealth Bank, St George Bank, Westpac Bank. The 3 telecommunications providers – Optus, Vodafone, Telstra.

Therefore any or all records on these databases may be inserted, updated, amended, deleted or copied.

It is technologically feasible to copy all the data from any computer site.

The historical precedent to this practice is the history of the PROMIS database. The PROMIS database software was created by a private company and sold to the CIA. The CIA modified the software and inserted a ‘backdoor’ so that all the data could be downloaded. The software was sold to the intelligence and police services of many countries.

The original software company did not receive any funds from these sales. They sued the CIA and from that point onwards there were accidents and deaths.

Very Large Databases – VLDB

Scalable Data Warehousing

The very large database companies are American, IBM, NCR Teradata, Oracle.

All these companies now have databases which have increased exponentially in size when compared with a few years ago. Database sizes may now be measured in terabytes as opposed to gigabytes, some can already grow to petabytes.

Prior to these technological advances a large database could be built, but it was not possible to query it. The database had to be segmented for the hardware and the software to cope with the size. Therefore, loading of data would be problematic and analysing data would be impossible in terms of querying across the whole database.

There are two very large databases being created in America. One is TIA – Terrorist Information Awareness. The other is LifeLog. Both of these databases are designed to carry all personal information about individuals, all over the world.

The companies who provide the hardware and the software to design and create these databases have access to the machines via the machine address.

The machine address is available in the country where the computer site is located. It is also available in the regional office of the company and in America. This means that any or all data may be updated, amended, inserted, deleted or copied.

Data warehouses are not transaction processing systems. They operate at the end of the chain of all the systems in the company.

Data Models

Logical Data Model

The logical data model is designed from a business point of view – it relies on information from the Business Discovery. However, a sound knowledge of the standard requirements of an industry type is required.

There now exist standard models to retrofit the company’s data.

This is still a difficult task as data may not be available for the model, it may be extraneous to the model, it may be the wrong data type.

The programmes required to load data for the historical data may be quite different from that required for the current data.

The loading programmes have to be re-written if the systems feeding the data warehouse change.

The Logical Data Model for the business must include everything from the outset and must not be changed

Physical Data Model

The Physical Data Model is the design of the database at the machine level. It is mapped from the Logical Data Model but has to follow the rules of the database type.

Ideally it should be in absolute third normal form for ease of querying across the whole database.

The Physical Data Model like the Logical Data Model should not change. It should include everything for that industry type from the outset.

Both these models should be available from the software database vendor. The work of designing them should not have to be repeated.

All this work has already been done, there is no need to re- invent the wheel. It should also be the case that suites of queries generic to the industry type are provided with the model. A selection of these can then be aimed for in the Proof of Concept and in each phase of building the data warehouse.

Genome Database

NCR Teradata also has the database for the Genome project. If this data were linked with the Mormon data it would be possible to ascend a family tree and then descend to other members currently alive – even thought their specific DNA is not available.

The main DNA markers will match through the generations. The hereditary weaknesses may be marked.

Many sources of DNA are available as an initial source, specifically from captive populations of prisoners, defense personnel, police, hospital staff, mental patients, bloodbanks, sperm banks etc.

The weaknesses of the DNA may be noted against the family or individual. In this way it is now possible to tune electronic harassment to DNA and in particular its weaknesses.

Mormon Database

The Mormon database is being accessed / duplicated by the FBI. Using the Mormon database as a worldwide hereditary database will provide the central database with the information required to link all people.

These relationships being confirmed will be the basis for all the other data loaded about current ID data.

Received 11-01-2004