Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
United States Social Networks

Leaked 'Standing Rock' Documents Reveal Invasive Counterterrorism Measures (theintercept.com) 310

An anonymous reader writes: "A shadowy international mercenary and security firm known as TigerSwan targeted the movement opposed to the Dakota Access Pipeline with military-style counterterrorism measures," reports The Intercept, decrying "the fusion of public and private intelligence operations." Saying the private firm started as a war-on-terror contractor for the U.S. military and State Department, the site details "sweeping and invasive" surveillance of protesters, citing over 100 documents leaked by one of the firm's contractors.

The documents show TigerSwan even havested information about the protesters from social media, and "provide extensive evidence of aerial surveillance and radio eavesdropping, as well as infiltration of camps and activist circles... The leaked materials not only highlight TigerSwan's militaristic approach to protecting its client's interests but also the company's profit-driven imperative to portray the nonviolent water protector movement as unpredictable and menacing enough to justify the continued need for extraordinary security measures... Internal TigerSwan communications describe the movement as 'an ideologically driven insurgency with a strong religious component' and compare the anti-pipeline water protectors to jihadist fighters."

The Intercept reports that recently "the company's role has expanded to include the surveillance of activist networks marginally related to the pipeline, with TigerSwan agents monitoring 'anti-Trump' protests from Chicago to Washington, D.C., as well as warning its client of growing dissent around other pipelines across the country." They also report that TigerSwan "has operated without a license in North Dakota for the entirety of the pipeline security operation."
This discussion has been archived. No new comments can be posted.

Leaked 'Standing Rock' Documents Reveal Invasive Counterterrorism Measures

Comments Filter:
  • Priorities (Score:5, Insightful)

    by Pikoro ( 844299 ) <init.init@sh> on Sunday May 28, 2017 @06:36PM (#54503087) Homepage Journal

    And this is legal how? Yet, don't copy that floppy or you'll get 10 years in a FPMITA prison.

    • Re:Priorities (Score:4, Interesting)

      by dwillden ( 521345 ) on Monday May 29, 2017 @07:01AM (#54504771) Homepage
      It's legal because TigerSwan was not operating on behalf of the government. The Constitution and the Bill of Rights restrict the actions of the government and of private companies and individuals acting on behalf of the government.

      TigerSwan was acting on behalf of the Pipeline company, which having invested large sums and built nearly the entire pipeline before this even became an issue, had a right to try to protect their operations and investment from protestors trying to damage their operations and equipment. TigerSwan broke no laws in their collection of information about potential threats to their employer's equipment, personnel and operations.

      Such a security company would of course be in contact with police agencies. I would be more concerned had they been operating without such contacts. The fact that they are passing information about what they are observing and their actions, indicates that they were concerned about not stepping across the line into illegal actions.

      If someone can point to documents showing where the government agencies (local, state or federal) tasked them to collect such information then we have crossed into illegal actions. But all this "report" states is that they coordinated with law enforcement which means they provided information about what they were doing and seeing. Unless tasked to collect the information (thus making them an agent of the government) they are free to collect any information they so choose (as long as the collection method is not illegal but this article gave no indication of such).

      Disagreeing with the pipeline does not make the pipeline company, or it's security company lawbreakers. Before you claim illegal or unconstitutional activities, you must know what qualifies as such.
      • Re: (Score:3, Insightful)

        by Anonymous Coward

        It's legal because TigerSwan was not operating on behalf of the government. The Constitution and the Bill of Rights restrict the actions of the government and of private companies and individuals acting on behalf of the government.

        Absolutely false: nothing in the Bill of Rights prevents the application of fundamental rights against private entities. Claims to the contrary are pure myth. Certain specific items, such as the 1st Amendment, are limited to specific government entities - though even in these cases the 14th Amendment muddies the waters.

        The open-ended items such as the 9th Amendment (unspecified rights retained by the people) and the the 10th Amendment (the part about unspecified rights reserved to the people) are not at a

    • by Megol ( 3135005 )

      What exactly shouldn't be legal?

    • And this is legal how?

      How is it illegal? Free country, remember? Everything, that is not explicitly prohibited, is implicitly allowed. Not the other way around.

      They also report that TigerSwan "has operated without a license in North Dakota for the entirety of the pipeline security operation."

      There is nothing mentioned in the write-up, that should required a license...

  • Terrorists (Score:5, Informative)

    by AK Marc ( 707885 ) on Sunday May 28, 2017 @06:44PM (#54503117)
    The definition of "terrorist" is "anyone you don't like". And private contractors will turn people into proven terrorists, for a fee. Gotta love the free market.
    • by goombah99 ( 560566 ) on Sunday May 28, 2017 @10:59PM (#54503851)

      Boy this is Deja Vu. It's exactly what happened with the Unions, the Pinkerton Detective agency and the tacit support of the US government in the early part of last century. Look up Eugene Debs in Wikipedia. https://en.wikipedia.org/wiki/... [wikipedia.org] He helped form the first nation wide trade union in the US (for the trains). And when they struck the Pullman company arranged with the complicity of the US govt to acquire the US mail contract making it a federal crime not to couple pulman cars to trains. Along the way someone set off a bomb (probably the pinkertons to frame the union strikers) and the entire union leadership was imprisoned. there's a nice picture of them all in their sunday best taken together in jail on the wikipedia site. (ironically in Woodstock, a place more known for 60s rock concerts now) . While in prison together Debs started reading various socialist literature and when they were release formed the Socialist party in the USA. He ran for president several times getting millions of votes (6% of the popular vote). He became famous for a stump speech saying no working class person should be going to fight in World War II because it's just a richmans war making the munitions makers richer and killing the poor. He was arrested for treason and sedition, sentenced to 10 years in prison, stripped of his own right to vote, and still ran for president (getting 3.4% of the popular vote while in his jail cell). In the court room when asked to recant he said

      "Your Honor, years ago I recognized my kinship with all living beings, and I made up my mind that I was not one bit better than the meanest on earth. I said then, and I say now, that while there is a lower class, I am in it, and while there is a criminal element, I am of it, and while there is a soul in prison, I am not free."

      While in prison he started the Prison Reform movement, and President Harding pardoned him partly hoping to quash that. He was nominated for the Nobel peace prize for his astute portrayl of World War I as the Capitalist war.

      Nearly every use of the Sedition act has been against political prisoners and frequently for union busting.

      • (ironically in Woodstock, a place more known for 60s rock concerts now)

        Debs was imprisoned in Woodstock, IL. The rock concert was in NY, and not actually in the town of Woodstock, NY.

    • Nice redefinition you tried there... Shame one group was engaged in violence... The other was not. Odd how this article is attacking the group who did not throw any molitov cocktails. Odd that eh?

  • by manu0601 ( 2221348 ) on Sunday May 28, 2017 @06:47PM (#54503137)
    Considering activists as jihadists is the first step. Then you consider jihadists have been considered illegal fighters (a term invented to spare international laws on war), and you can send an activist straight to Guantanamo. Brilliant.
    • Except the concept of irregular combatants is far older than the war on terror... And added to the international lexicon long ago, and for good reason.

  • Words fail (Score:2, Insightful)

    by Anonymous Coward

    They are comparing murderers who kill in the name of God to peaceful people who want to save their history, and more importantly, their watershed. What a bunch of follow-the-money bullshit.

  • involves anticipation of this possibility.
    • Any American trying to make an excuse for this kind of activity by either TigerSwan or the government is almost certainly a traitor, and should be dealt with accordingly.

  • "havested" should be "harvested".
  • Do we need counter terrorism invasive measures? Are invasive measures vital to counter terrorism? Maybe, but that's not the problem. The real problem is who controls the huge data linked to most people in the country, since 99.999% is not related to terrorism at all. We need an independent and trustworthy organism that controls data extraction, storage, usage and destruction. Until then, the invasive measures will always be looked at suspiciously.
    • Nobody, no person, no organization, that holds that amount of information and hence power, stays independent and trustworthy for long. What kind of saint do you expect to take that position? Even with the best of all intentions he would fail.

  • by Applehu Akbar ( 2968043 ) on Sunday May 28, 2017 @07:55PM (#54503349)

    I wish the builders of other infrastructure could afford a counter protest force like this one. We could get that telescope built on Maunakea, get some new-generation nuclear plants started if we wished to get serious about carbon, and California could finally finish its bullet train.

  • by will_die ( 586523 ) on Sunday May 28, 2017 @08:21PM (#54503435) Homepage
    That is shocking and would not be expected.
    Who would of thought that a group tracking the actions of another group would stoop to harvesting information about them from social media.
    Then to follow that up they used the term "militaristic" to describe them collecting data. So they started to attack them?
    Overall rather bias article to describe one group that was tracking the actions of another group.
  • by rsilvergun ( 571051 ) on Sunday May 28, 2017 @08:24PM (#54503447)
    Take care of the poor. Outside of the occasional loon organized terror only works because we've got millions (billions?) that lack food security. Said it before, will probably say it again: you abandon your poor at your peril.
  • Super Shadowy (Score:4, Informative)

    by JBMcB ( 73720 ) on Sunday May 28, 2017 @08:27PM (#54503455)

    All hush-hush top secret shadow organizations have a web site.

    http://www.tigerswan.com/ [tigerswan.com]

    And twitter feed.

    https://twitter.com/TigerSwan [twitter.com]

    • by bongey ( 974911 )

      Oh noesss they have been found.

    • You needn't be super secret just because you're a threat to freedom. All you need is government backing.

      • I'm commenting on how The Intercept is using language to portray the company in a certain light.

        If you are trying to portray a company as "shadowy" when it has a fairly robust online presence, you aren't doing journalism, you're doing propaganda.

  • by AHuxley ( 892839 ) on Monday May 29, 2017 @12:44AM (#54504093) Journal
    When people protested in East Germany, people who risked at lot by using a television camera did not get caught.

    Dont use your own equipment. If your wealthy enough to be able to afford to protest all day, buy an older weather sealed dslr camera and lens. No need for in camera wifi. Use the card to get your files to a computer of editing and upload later.
    Ensure the serial number in the camera is not linked to your name with every file uploaded or created.
    Take some images and video of the protest. Remove any camera serial numbers in the files, edit, add a voice over and your groups logo and branding, compress, then upload it using some existing network and on a computer that won't be used later.
    Do not take a "computer" thats "fast" or "sealed against the weather" from protest to protest. Dont use wifi or networking from your computer like device.
    Sneaker net your video file to a final separate, cheap device just for fast networking.

    All MAC and any other unique details about all networks will be collected on.
    Think about what device connects to that final network to send a file to the world. A random strangers offer of a free network, computer help could be an undercover contractor or police wanting to get more direct access to your hardware and software, OS.
    Protect your devices and equipment from digital tracking and "new" best friends or "smart" friendly strangers with free offers of help.
    Police and contractors can be anyone, thats why they are doing undercover work in protests. Some are past protesters who had to make a deal with the police to stay free. They have to collect it all and work very hard at making new friends.
    While a protester might have been taking years of French or arts at some liberal university, police and contractors learned how to become "protesters" over the years.
    The undercover officers offers will be for device access to help with "media" or "editing"

    Every face at a protest will be stored for facial recognition. Any and all networks or networked devices will be collected on.
    Read up on what the NSA, GCHQ, CIA and other 5 eye nations do when they "collect it all".
    The same ability is now on the open market at a low cost for a city, state or contractor. Dont trust any hardware, software or OS thats been near a protest after a protest.
    Anyone could have added code, altered the device, accessed the OS or collected its network details.
    Ensure the only collection a city or federal gov or its contractors can do is facial recognition. Keep your hardware and software way from their networks.
    A streaming cell phone is great for recoding an event and not having data erased on site but it comes with the cost of collection and device or OS alteration.
    Dont bring malware pushed down a network home after a protest. If your security aware, use dedicated devices as bait and see if any devices are altered. Study bait hardware later under Tempest https://en.wikipedia.org/wiki/... [wikipedia.org] conditions but don't allow your own deices to get altered to test for such gov/police/contractor pushed malware.

    The final thing to consider is the new stranger in your group. Get them talking about their past and get their image and see what different free and other image search products find online.
    City or state contractors might not have the skills to remove all past images or their story will not mach a few traces found online.
    Federal and contractors working undercover have the ability to rewrite online social media so their undercover "story" will mach perfectly to any and all online data sets that can be searched for.
    If your protest group has some international funding, take the image to any of the big national private detective groups in the USA.
    Their social media databases are long term, static, always updating and do not get altered like the online consumer networks.
    They can rewind most accounts to creation and see ho
  • To my eye all these posts about the giant pile of garbage are a giant pile of bike-shed garbage.

    It looks and smells like standard online disruption tactics, when there are far bigger fish to fry.

    Also, any post (or poster) citing "roommate" as a source (with or without ambiguous irony) needs to mentally hell-banned. Don't waste mental effort attempting to parse ambiguous irony bait. Anyone with a constructive intent would know better than to further cloud a crap fight.

    A worthwhile post: (1) does not mentio

    • One more thing about the money angle.

      Over the years, I've listened to most of the EconTalk back catalog. I agree with Russ Roberts about 60% of the time, yet I have some pretty strong disagreements in the other 40%.

      Part of his standard spiel about diminishing the role of government in all practical venues is his model of private charity. I just found this now, but it turns out he's actually written a paper on the subject:

      A Positive Model of Private Charity and Public Transfers [uchicago.edu]

      The whole point of relying le

      • by swb ( 14022 )

        EconTalk is a great podcast, even if you disagree with most of what Roberts and his guests have to say. Although I would argue that Roberts is intelligent enough and reasonable enough that only a doctrinaire ideologue could disagree with a significant majority of what gets said.

        My problem with private charity vs. government welfare is that private charity seems more prone to the moral hazard of putting its agenda ahead of its charity -- converting recipients to its faith, restricting its charity to organiza

    • by Reziac ( 43301 ) *

      Can't find the aerial shot I wanted offhand, but this will do:

      http://www.kfyrtv.com/content/... [kfyrtv.com]

      https://heatst.com/politics/da... [heatst.com]

      At about the halfway point, the total was 24,000 TONS of garbage. And about a dozen abandoned dogs.

Beware of all enterprises that require new clothes, and not rather a new wearer of clothes. -- Henry David Thoreau

Working...