Report: Counterterrorism Tactics Were Used on Dakota Access Pipeline Protesters
We knew this when they brought a mobile anti aircraft missile launcher for it’s radar to enforce the no fly zone. This is how our governments agencies treat serious protesters. Notice how differently things were handled an Maheur. That was white guys. This is indigenous people. Not white people. When the very white people of Bismark objected the pipe route was immediately changed.
TigerSwan internal communications draw comparisons between the anti-DAPL movement and jihadist fighters, and characterize it as, “an ideologically driven insurgent with a strong religious component.” A report dated February 27, 2017 reads, in part:
“[The anti-DAPL movement] generally followed the jihadist insurgency model while active, we can expect the individuals who fought for and supported it to follow a post-insurgency model after its collapse…. While we can expect to see the continued spread of the anti-DAPL diaspora … aggressive intelligence preparation of the battlefield and active coordination between intelligence and security elements are now a proven method of defeating pipeline insurgencies.”
Between September 2016 and May 2017, the firm prepared reports on TigerSwan operatives’ activity for Energy Transfer Partners (the company building the DAPL), which continues to retain the firm even though the oil profiteers and their allies won their bid to continue DAPL construction through Standing Rock Sioux Tribe land months ago.
Some documents in The Intercept’s trove show that TigerSwan conducted aerial surveillance on protesters, infiltrated activist groups, and developed a “counter-information” campaign. Others indicate extensive communications among agents from The Department of Homeland Security, the FBI, the U.S. Justice Department, the Bureau of Indian Affairs, the Marshals Service, and local police forces. Dozens of protesters were specifically named in early TigerSwan reports, and one report refers to a “persons of interest” list and databases chock-full of protesters’ identifying information.
More: Report: Counterterrorism Tactics Were Used on Dakota Access Pipeline Protesters