Tag: cyber warfare

IT specialists investigate cyber warfare crimes at Standing Rock

State worked with TigerSwan to ensure “battle rhythm,” second DAPL security worker whistleblower steps forward 

 By C.S. Hagen
CANNON BALL – The lawsuit against TigerSwan for illegally working security in North Dakota is a civil case, but proof now exists that cyber warfare tactics were used against activists at the Standing Rock camps, according to IT analysts. One question remains: who was responsible for launching the attacks?

Hundreds of mobile phones and vehicles were damaged as batteries were suddenly drained of power, or were “fried,” during warm and cold weather. Incidents of random hot spots for Internet reception with alternating GPS locations, hacked laptops and cellphones, are too many to count. Bugs or listening devices were planted in meeting rooms at the nearby Prairie Knights Casino & Resort. Fiber cable boxes were broken into. Additionally, cars en route to and from Oceti Sakowin broke down without warning, and have not been the same since.

Morton County Sheriff’s Department denied that their deputies used cyber weaponry, but leased a mobile cellular tower from Verizon to boost reception. The Office of the Governor of the State of North Dakota claims it was unaware that TigerSwan was operating illegally, and yet was in the loop, keeping the “battle rhythm” alive. The National Guard is considered a “law enforcement multiplier” under emergency situations, and police are not in the business of digital disruption, preferring to operate in the legal gray zone of electronic intelligence gathering. Possible suspects that remain include the federal government and TigerSwan, the North Carolina security firm whose services were paid by Energy Transfer Partners, the parent company of Dakota Access LLC.

Headed by former Delta Force officer James Reese, both Reese and TigerSwan face a civil lawsuit filed by the North Dakota Private Investigation and Security Board for illegally working in the state despite repeated warnings. 

The cyber and cellular attacks at Standing Rock on activists ranged from malware, IMSI catchers, to electromagnetic field devices, IT analysts report. Malware typically comes as viruses through emails, links, or attachments and acts with stealth, not programed to alert the owner. IMSI Catchers – sometimes known by the brand Stingrays – act as fake cellular towers, forcing GSM phones to connect and then suck in data. The electromagnetic field device is a cyber weapon used in the Middle East to block cellular phones sending data to Improvised Explosive Devices, or IEDs. It is a short burst of electromagnetic energy meant to disrupt or damage nearly any equipment with a microchip.

Semi-mobile Stingray rogue field intercept cell tower antenna array with collection/detection gear powered by a grid utility pole with a backup battery, photographed by drone near to where Standing Rock Chairman was arrested – photo by Myron Dewey

Only government entities can authorize a cyber or cellular attack. 

Plucked from the war-torn fields of Afghanistan and Iraq, TigerSwan employees are well trained in military tactics, and the company not only advertises its military-grade data and human intelligence capabilities on its website, it has a history of partnering with hi-tech companies, such as its 2012 partnership with Saffron Technology. 

Saffron Technology is a small data analytics company that uses technology to mimic the human brain’s capability to connect people, places, and things, at lightning speed, according to the company’s website. Saffron Technology’s products were originally used in Iraq to predict where bombs were located, according to Reuters, but now it offers its services to corporations such as Boeing Co., to forecast weather, and to TigerSwan. 

While IT technicians continue the hunt for additional proof of cyber weaponry used at the Standing Rock camps, the Water Protector Legal Collective, which operates in partnership with the National Lawyers Guild in defending many activists, reports Kourtni Dockter, a former DAPL security employee, is not the only whistleblower.

On Tuesday night, Kyle Thompson, the former project manager for Leighton Security Security Services, came forward live on Digital Smoke Signals with owner Myron Dewey, and began to tell his side of the Dakota Access Pipeline story, making hints that more is to come. Thompson’s burgeoning testimony comes after his former girlfriend and Leighton security employee, Dockter, blew the whistle on TigerSwan activities.

Kyle Thompson during interview on Digital Smoke Signals

“We are starting to see some of the security workers defect,” Water Protector Legal Collective staff attorney Andrea Carter said. “When you look at Kyle’s interview yesterday, i think he feels very troubled about what happened, and a part of him really wants to connect to the camps.” 

Thompson plans on sharing more information about his experience working security along the Dakota Access Pipeline, but “not yet,” he said. 

“I feel like I can help a lot of people with me coming out with my truth, which could benefit the people facing charges,” Thompson said during the recorded interview. 

“The healing has started,” Dewey said. “And it’s not easy.” 

The casualties

As the Dodge Ram’s engine sputtered, Alex Glover-Herzog wasn’t thinking of the military-Internet complex or of TigerSwan, or of the DAPL helicopter that swooped low along the Missouri River’s banks. 

Late November outside of Standing Rock, Glover-Herzog was trying to stay warm. His 4×4’s engine was purring normally, pouring much-needed heat from the vents before the engine coughed, then suddenly died. 

“It was way too cold to think about anything else at that moment,” Glover-Herzog said. “The only thing I can say is that my truck died twice for no reason while at Oceti.” 

Hundreds of others camped outside of Standing Rock during the Dakota Access Pipeline controversy experienced the same phenomena, Myron Dewey, owner of Digital Smoke Signals, said. It resembled a futuristic nightmare straight from the movie “Matrix,” executive director for Geeks Without Bounds, Lisha Sterling, said. She spent months at the camps training people and helping improve communication technology. Geeks Without Bounds is a Washington-based humanitarian organization that works toward improving communication and technology. 

Two automobiles that suddenly lost battery power at Standing Rock camps – photo provided by Myron Dewey

“When the squids were coming at them.” Sterling said about the comparison of the “Matrix” scene and what happened at the Standing Rock camps. “They powered down their machine and did an EM pulse, which fries electronics… and the squids coming at them.” 

Cooper Quentin, the staff technologist on the cyber team with Electronic Frontier Foundation, a nonprofit organization defending liberties in the digital world, spent a few days at the Standing Rock camps.

“While I was there I was looking for evidence of Stingrays, and I did not find any evidence,” Quentin said. “But they could have been using them before I got there.”

He looked at computers, mobile phones, but said he found nothing conclusive.

“There is definitely some weird stuff, and I don’t think it’s a coincidence, but it doesn’t have to be malware. Extreme temperatures can do weird things to phone batteries. There were definitely a lot of weird things going on at the camps, but none of that is exclusive.”

Quentin is still interested in investigating further, however, but the case needs a digital forensics expert, which is costly.

“Even if we do find malware that looked like spyware, and we were able to prove from time stamps that they got it while they were at Standing Rock, we would still need to prove where it came from. If the server is owned by law enforcement or TigerSwan, then you have solid attribution. If that’s not the case then it becomes much harder to figure out who to blame.

“But my opinion is not shared by some of the other experts. If people have solid evidence I would happily continue to investigate.”

Colorado resident Christina Arreguin’s first phone at Standing Rock became little better than a paperweight in mid-October, she said. She had 80 percent battery left when it got hit, but even after trying three separate chargers, her phone was never able to call or text again. She learned to adapt quickly; stowed the battery in one pocket, and her new phone in the other when she went to the frontlines.

The attacks weren’t isolated to the frontlines. Cars broke down when a helicopter flew by, she noticed. 

“The sound from the planes so much became like part of the background, just a familiar noise, kinda like how you get used to the beep from a smoke detector after a while,” Arreguin said. “I do remember a helicopter though, when the Blazer broke down it looked different than the other ones.” 

The omnipresent white helicopter over Standing Rock camps – photo provided by Myron Dewey

“When the Cessna flew by, that’s when cellphones got zapped,” Lisa Ling, also with Geeks Without Bounds, said. Ling is a former Air Force technical sergeant who worked in America’s armed drone program in what is known as a Distributed Ground System, a secret networked killing operation capable of sucking up personal data to be able to track and shoot people anywhere, and at any time. Ling turned whistleblower in 2014, and her testimony was featured in the 2016 documentary film National Bird

On Ling’s first trip to the Standing Rock camps, Internet connection was difficult. 

“When we first got there the only place you could get any connectivity was Facebook Hill,” Ling said. “If you left Facebook Hill there was no connectivity.” On her second trip, she said random places in the camps had connectivity. She knocked on tent and tipi doors asking people if they had boosters. No one had any. 

“My phone actually got zapped a number of times by some sort of EMP,” Ling said. “These cellular disruptors, as we call them, can do physical damage to the phone.” Such an attack is not legal for a private company to issue, and Ling said it should not be legal for law enforcement to utilize without warrants. 

FOIA requests to the Office of the Governor of North Dakota, to the Bureau of Indian Affairs, to the North Dakota National Guard, so far, have revealed that no warrants were issued for the use of cyber weapons outside of Standing Rock.

Such attacks are an invasion of privacy, a right protected by the Fourth Amendment of the US Constitution, which states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause.”

Fiber optic box broken into near Standing Rock – photo provided by Lisa Ling

“I paid close attention to what things flying above us when certain things happened,” Ling said. “And there was a small white plane, and that’s the thing that flew when our phones got zapped. So if you managed to turn your phone off when that thing came by, then your phone wouldn’t get zapped. When that Cessna was up, cellphones got zapped, and it wasn’t because of the cold, as they’re trying to say, it happened before the winter as well.” 

Ling brought radios to the camps to help with communication and safety during sub-zero temperatures, she said, but TigerSwan operatives discovered their frequencies and harassed them. Internet cables were cut inside the dome by infiltrators, she said. 

“They were intentionally interrupting that,” Ling said, adding that during the freezing winter months such interruptions could have cost lives. 

The automobile breakdowns coincided with either the private Cessna that circled the camps, or with helicopters. 

“I documented, I have proof,” Dewey said. Proof was easy to obtain because of the “digital divide” separating Indian country and the rest of the modernized world. He spotted and photographed a Stingray device near Highway 1806 where Standing Rock Sioux Tribe Chairman Dave Archambault II was arrested. 

Myron Dewey with drone, all charges against him dropped earlier this week – Facebook page

The device has been identified by multiple sources as a semi-mobile Stingray rogue field intercept cell tower antenna array with collection and detection gear powered by a grid utility pole with a battery backup.

“It was easy to identify cyber warfare out there, because we already were in a digital divide,” Dewey said. Dewey is also a filmmaker, uses drones, and lost at least three to gunfire and electromagnetic field devices, he said. Charges against Dewey were dropped this week, and he is waiting the return of one of his drones in Mandan. 

“Indian country has been in a digital divide since America has had access to technology.” 

Dewey claims that TigerSwan operatives on snowmobiles chased him while he was driving, and he has video to prove the harassment. One of his drones was hit at Treaty Camp, which was taken over by law enforcement on October 27, 2016.

“The drones were hit several different ways, so I sent one drone up and another to film it and see what happened,” Dewey said. “It seemed like an EMP charge, but it was more like a wave, and it dropped into the water.”

His mobile phone also got hacked, Dewey said. “It started recording my voice right in front of me and another guy, and then sent to text. I was really paranoid a lot of the times, but I had people to protect me some times.”

In addition to the cyber attacks, TigerSwan operatives, or security personnel working under the TigerSwan umbrella, boarded vehicles like pirates to a ship, he said, smashed out windows, stole radios to report misleading information, and curse.

“‘We’re going to rape your women and have half-breed babies,’” Dewey said the security operatives would yell over frequencies activists used. The threats were difficult to ignore as they brought on old fears from native oral stories and traditions handed down for generations.

“If the military catches you, stuff your insides with dirt in the hopes that they kill you,” Dewey said. “We thought the police were there to keep the peace, but it was like Custer who wanted the gold. History repeating itself, the second wave of Custer’s cavalry, and they felt the need to win.”

Dewey drives a Yukon Hybrid, and had just installed a new battery when it too was fried at the Standing Rock camps. The first electromagnetic pulse hit the camps in August, Dewey said. “Several hoods were up, and I went over and asked them what happened and they said they’re batteries were dead as well.” 

The cyber field of battle sits in a legal gray zone, but inside the United States only a government entity has the authority to utilize use cyber weapons. Private companies, even if they are attacked first, cannot legally reciprocate on their own volition.

“So my educated guess is that the IMSI Catchers were owned and authorized by either or both the Morton County Sheriff’s Department and the National Guard, but the chances are similarly high that they would not have had the experience to manage them, so that is where TigerSwan comes in,” Sterling said.

“It is also possible that nobody really cared, and that they were owned by TigerSwan themselves.”

Outside of the NSA, the CIA, the FBI, and a handful of other government agencies, only criminal organizations and massive corporations have the funds to purchase and store high-end disruptive cyber weapons. A zero-day vulnerability exploit targeting Apple products can cost as much as $500,000.

IMSI Catchers used to be difficult to obtain, but now can be bought online for under $2,000 on Alibaba, or from dozens of companies online some of whom specify their products are for law enforcement use only.

“What we got now is the lull between battles,” Sterling said. “It will more likely be seen in the big cities soon, Standing Rock Part Two, in terms of the cyber warfare, the strong-armed tactics, and not just militarized police, but the militarized contractors as well.”

North Dakota National Guard vehicles at Standing Rock camps – photo provided by Myron Dewey

The gray zone

Cyber weapons are not lethal in the sense of traditional weapons, but can also be dangerous and disruptive far beyond an intended target, Shane Harris, the author of the 2014 book “@ War: The Rise of the Military-Internet Complex,” wrote. Harris is a senior correspondent at the Daily Beast and covers national security, intelligence, and cyber security. 

Cyber warfare began in the 1990s. Early pioneers, or cyber warriors, blazed a complicated legal trail into the 2000s until 2013, when former President Barack Obama issued executive order PDD-20, effectively paving the way for more streamlined cyber defense and offense. 

Black helicopter flying over the Standing Rock camps – photo provided by Myron Dewey

The president must order all cyber strikes internationally; no private companies are authorized for digital, cellular, or cyber offensive actions. Despite a contentious relationship between government agencies and private companies, “there’s an alliance forming between government and business in cyberspace,” Harris wrote. 

“It’s born of a mutual understanding that US national security and economic well-being are fundamentally threatened by rampant cyber espionage and potential attacks on vital infrastructure,” Harris wrote. 

Oil pipelines are included under the infrastructure category by the Department of Homeland Security, as are dams, chemicals, emergency services, communications, critical manufacturing, healthcare, water and wastewater, transportation, information technology, and government facilities, along with other sectors of economy. 

Approximately 85 percent of the computer networks in the United States are owned and operated by private groups and individuals, and any one of the telecom companies, the tech titans, the financial institutions, the defense contractors, could be the weak link against cyber attacks. 

“The government has decided that protecting cyberspace is a top national priority,” Harris wrote. “But the companies have a voice in how that job gets done. That’s the alliance at the heart of the military-Internet complex.” 

Masked TigerSwan employee – photo provided by Myron Dewey

The Homeland Security Presidential Directive, or HSPD-7, signed by former president George W. Bush on December 17, 2003, seeks to protect infrastructure from “terrorist attacks.”

During the months TigerSwan was illegally involved as the chief security organizer for Energy Transfer Partners’s oil interests, the security company called activists camped against the Dakota Access Pipeline terrorists, even jihadists.

“Terrorists seek to destroy, incapacitate, or exploit critical infrastructure and key resources across the United States to threaten national security, cause mass casualties, weaken our economy, and damage public morale and confidence,” HSPD-7 reports. 

“While it is not possible to protect or eliminate the vulnerability of all critical infrastructure and key resources throughout the country, strategic improvements in security can make it more difficult for attacks to succeed and can lessen the impact of attacks that may occur. In addition to strategic security enhancements, tactical security improvements can be rapidly implemented to deter, mitigate, or neutralize potential attacks.” 

The lines between spies, saboteurs, or intelligence gathering and military operations are blurred. Intelligence gathering techniques fall into a legal gray area and while the tactic may not be illegal for a federal or police agency to conduct on US citizens, the evidence obtained by such means may still not be allowed in a court of law. 

Daily, TigerSwan coordinated and provided intelligence to Energy Transfer Partners and others. TigerSwan placed operatives in the law enforcement joint operations center, and were responsible for in-depth analyses of cyber, workforce, facility, electronic, and environmental security threats, according to the North Dakota Private Investigation and Security Board.

Emails shared between Morton County Sheriff’s Department Public Information Officer Rob Keller and Office of the Governor of North Dakota Communications Director Mike Nowatzki, the governor’s office was knowledgeable of TigerSwan’s activity, but reported they did not know the security company was working illegally.

“I wanted to give you a heads up on this Energy Transfer and TigerSwan meeting with Kyle [Kirchmeier],” Keller wrote to Nowatzki on January 16. “I don’t know the intent and the PIOs will not be there.” 

“If it is a closed session, it’s fine,…” Nowatzki wrote back. “Our JIC PIO and Unified Command meet from 0830 to 1000 (CT) every Tuesday so that battle rhythm should be protected with our state team.” 

Battle rhythm is a military term, meant to describe the maintenance of synchronized activity and process among distributed “warfighters,” according to the Defense Technical Information Center.

“I was deployed to the Middle East, and the term was used there,” Ling said. “I worked in the drone program, and the term was there. I worked in the National Guard and the term was used there, but I have never heard the term battle rhythm used in a civilian setting. It would imply that there is an enemy.”

– This story is part of the ongoing investigation into government and TigerSwan’s actions during the Dakota Access Pipeline controversy. 

Standing Rock’s Invisible Enemy

Cyber warfare and misinformation directed at No DAPL activists creates real damage

By C.S. Hagen
OCETI SAKOWIN – An invisible enemy – streaming the airwaves – haunts Standing Rock’s supporters. The nemesis’ presence has long been felt inside the camps opposing the Dakota Access Pipeline, but few had proof of its existence until recently.

Cell phone and live streaming problems were jokes, hidden behind nervous chuckles. Then people began pointing to the ubiquitous airplane circling on the hour, nearly every hour, wondering if their sudden connection issues were created by someone inside. The reports were rumors, conspiracy theories. Soon, few among the thousands could say their devices were not being affected.

The difficulties spring partly from the area’s remoteness and the rugged terrain, but more-so now from what can only be psychological-driven digital attacks. Sudden signal loss, computer files disappearing, fried fiber optic cables, sudden battery deaths from a near full charge, are common. At least one person’s PayPal account was emptied of all monies, according to activists.

“There is an invisible antagonist winking at us, but no one knows exactly what that means, but we know how it feels,” Ari Herman said. He’s from northern California and is daily at the front lines facing heavily protected law enforcement with tear gas, pepper spray, water cannons, and percussion grenades.

Herman discovered this “antagonist” when he received an email from Google on November 9, reverse traced the email through an IP search and discovered it was sent by a technical department of North Dakota from Fort Totten, approximately 200 miles to the north.

“It’s egregious, and it’s terrifying,” Herman said. “It’s a very sound approach when you think about it. It’s subversion. Less violent. Less costly. I felt it. I felt it was like an emotional waterboarding, it was happening to me and a lot of people. It was creating a very strange aura of suspicion.

“People who announce they are coming to Standing Rock start to have issues even before coming to the state. The precedence this sets is disturbing to say the least.”

A non-profit organization savvy about online setups in conflict zones, was alerted to Standing Rock’s situation. Geeks Without Bounds, a Washington state organization established in 2010, is an accelerator for humanitarian projects. They’ve been working with the Oceti Sakowin camp since September, setting up Internet and Intranet accesses in specific spots by using a “network hop” to catch the signal from Standing Rock Telecom. A giant geodesic dome, known as the big white dome, donated by participants from Burning Man, became the camp’s first Internet café. Power to run the equipment comes from the sun, and a mini tower called “the stick in the ground on Hop Hill” has been erected to boost signals.

The organization reports many people’s cell phones are acting strangely, and legal observers are documenting and investigating the real threats that come from digital surveillance and communication interference.

Files from long-term criminal defense attorney Bruce Ellison’s computers have disappeared, he said. Ellison is working pro bono as legal team coordinator for the Lawyer’s Guild Mass Defense Committee.

“I know we’ve been investigating a lot of claims of mass data seizure,” Ellison said.

An electronics bug was found inside the Prairie Knights Casino. The device fell from under a table during a meeting inside the Indigenous Environmental Network’s suite, Ellison said. The bug wasn’t sophisticated enough to come from government; he suspects DAPL security teams.

Cyber warfare isn’t the only subversive threat, Ellison said, he knows from experience that agitators and infiltrators posing as activists try to blend in, especially during times of chaos, such as the case of DAPL security employee Kyle Thompson who was apprehended by the Bureau of Indian Affairs on October 27. Police and state’s attorneys called Thompson a victim, and did not file charges against Thompson.

Or the instance when an unknown person came up behind an activist at the front line, pointed at her to police, and then shoved her forward, Ellison said.

“There’s all kinds of stuff going on there that isn’t good, and certainly isn’t democratic. Historically, company security really takes the lead. They provide information to the Federal Bureau of Investigation and other agencies. We suspect that this comes down to corporate security.”

Additionally, video footage shows an FBI agent with the Joint-Terrorism Task Force waiting outside Sophia Wilansky’s hospital door, he said. Wilansky nearly had her arm blown off by a percussion grenade after she was hit, and knocked to the ground by a rubber bullet on November 20, medics and activists said.

“There’s a lot of unknowns going on, and we’re trying to keep our eyes and our ears open.”

After Ellison returned home from Standing Rock approximately three weeks ago, one of his telephone lines connected to the Internet – the only line he used while at the camp – was completely destroyed.

A complete new line had to be installed, Ellison said.

Many at Oceti Sakowin have felt “lost in the wind,” Herman said, without access to their digital worlds. He’s also a writer on The Lego Box Travelogue, and some of his stories have been featured on the Oceti Sakowin webpage. Movements such as Standing Rock’s opposition to the Dakota Access Pipeline need social media and Internet access to grow.

“Living out here under the security apparatus, it’s terrifying,” he said. To a small extent, the experience has taught him as a white person, what it might feel like living as a native person, or black person, or as a LGBT person, he said.

Herman arrived at the camps in early November. “I heard the calling, a little whisper,” he said. “I was ashamed of our treatment of Native Americans, and I wanted to come out here on the ground with my beliefs. This is an important frontier for our relationship with native communities, but setting an important precedent for climate issues… and the climate of surveillance in the occupation camps.” He’s an American, and he’s not against corporations making money, but recognizes the need for change.

“The intimidation is strongly reminiscent of the motto used by the Air Force’s Special Operations Wing in charge of Psy-Ops, “Never Seen, Always Heard,” Herman wrote in his article. He is currently helping out at Oceti Sakowin, he said.

“No one knows for sure who is behind the attacks, but the top suspects include a collusion between Morton County Sheriff’s Department, Energy Transfer Partners’ security and intelligence contractor TigerSwan or another military contractor, the National Guard, and/or the North Dakota Police,” Herman wrote.

Morton County Sheriff Kyle Kirchmeier has repeatedly denied that his agency is involved in cyber warfare against Standing Rock and its supporters. The FBI refuses to answer questions to its involvement in the DAPL controversy, and spokespeople from Energy Transfer Partners and its subsidiary, Dakota Access Pipeline, would not return telephone calls or emails for comment.  

Lisha Sterling, the Geeks Without Bounds executive director, said she can’t solve hackers, and she can’t hack back against DAPL or law enforcement as that is illegal and dangerous to Standing Rock.

“What we can do is teach people how to be safer,” Sterling said. “We’ve got encrypted comms options in camp, something called a Mumble server, that anyone can connect to over the Wi-Fi Mesh Intranet if they use that instead of calling each other over the phones their conversations will not be listened in on.”

Encryption is one of the keys to help protect laptops, cell phones, and even personal banking accounts. Also, downloading “Signal” to use for text messaging and for voice calls, turning off automatic updates in Settings, backing up phone data to computer, and being careful to update operating systems, are other ways to help limit hackers’ success rates.

Herman says that another media blackout is currently underway – once again – at the camps, and fears that a police plan is in the works. The FAA has issued another no-fly zone at Standing Rock until December 2, and the “siege” tactics declared by Governor Jack Dalrymple against Standing Rock, authorizing police to fine anyone hauling supplies to Standing Rock up to USD 1,000, and threatening to take away emergency response teams is only part of the state’s strategy.

The legal repercussions are not known, even more ethereal are legal strategies to combat these digital wraiths. “I can tell you I was really pissed off when I found out who did it, I was surprised…” Herman said.

His voice scrambled on the phone, like listening to an AM radio station halfway tuned in. And then the line went dead.

Tipis with snow at Oceti Sakowin - photo provided by Terry Wiklund

Tipis with snow at Oceti Sakowin – photo provided by Terry Wiklund

Radio, Facebook, and hacks

Last week, Anonymous, the international network of activists and hacktivists, threatened Morton County Sheriff’s Department, and allegedly destroyed its website and Facebook pages. On Wednesday, a new Morton County Sheriff’s Department Facebook page, followed by more than 600 people, reported the following:

“Greetings, everyone. We’d like to formally apologize for being ignorant f*cks. We know no better. We are privileged and do not understand the importance of water and its connection to the essence of life. We do not believe in science, climate change, or sustainability. Sincerely. The Pipeline Pigs.”

On Tuesday, the Facebook page posted: “On this white and snowy day in North Dakota, we’d like to announce that our pig heads are so bloated, we think we have the authority to illegally interfere with interstate commerce. We think we can trample over the constitution with our cloven hooves. We are looking to hire lawyers as we can face jail time for violating the Constitution and people’s civil rights.”

A different Morton County Sheriff’s Department Facebook page has cultivated approximately 30 followers, and appears to be Pro DAPL, or at least supportive of government decisions to restrict emergency services to Standing Rock, and to fine anyone carrying supplies up to USD 1,000.

“Soon there will be nothing to keep those crybaby anarchists fed and warm but peace signs and prayer,” the alternative Facebook page reports. “It’s been fun terrorizing them, but all good things must come to an end. Us boys in blue are starting to get chilly, even in full combat gear we’re wearing. Time for you hippies to give up and move on. No more supplies, no more emergency services, take the hint already… Love being evil.”

There is also two more Facebook pages, one called Morton County Sheriff Department, which appears to be a venting platform.

Scott Hennen, a partner at Flag Family Media, who broadcasts on stations such as KFYR 55 AM Bismarck and WZFG 1100 AM Fargo, called the activists at Standing Rock “sick,” “a group of lawless thugs,” and “eco-terrorists” on his Facebook page. He believes North Dakota should sue the federal government, according to Facebook posts.

On Monday, Hennen interviewed Morton County Sheriff Kyle Kirchmeier, reporting 110 days had passed since the beginning of the “siege,” as Hennen described the situation outside of Cannonball.

Kirchmeier won’t send law enforcement to clear Oceti Sakowin, and doesn’t expect federal assistance, “as long as the current administration is there,” the sheriff said during the interview.

“I’ve heard stories of rampant drug use and rapes, I don’t know, they’re just stories,” Hennen said. “Do we know what’s happening in the way of lawless behavior in the camp?”

“There is definitely, the alcohol, the drug use, the sexual assault, we do have reports of that.” Kirchmeier said, adding that such reports are forwarded to the Army Corps.

Henner praised Dalrymple’s decision to stop emergency responses to the camps. He called a lawsuit against Kirchmeier and the Morton County Sheriff’s Department’s use of excessive force “bunk.”

“Law officers have been shot at, spit on, had feces thrown at them, had their families terrorized – and now they’re being sued. Throw it out of court – along with the violent extremists invading Morton County.”

Hennen’s claims have been called lies by people supporting Standing Rock.

Cannonball Sacred Stone Camp - photo provided by Terry Wiklund

Cannonball Sacred Stone Camp – photo provided by Terry Wiklund

Dalrymple’s orders

On Wednesday, the governor backtracked the seriousness of his emergency evacuation message, saying that law enforcement will not be hunting Standing Rock suppliers, or arbitrarily stopping people. He also petitioned for a meeting with Standing Rock leaders, he said, and wants to discuss how to rebuild the relationship between the tribe and the state.

“We want the entire public to know that this is not a safe place,” Dalrymple said. During a press conference reporters asked Dalrymple why call the emergency evacuation if he wasn’t planning on cleaning the camps out.

“We get that question every time there is a flood too, what purpose does it serve. It is an official notice from the state, from the National Guard, from law enforcement that we may not be able to help you in an emergency situation. No, we are not going to be having roadblocks or stopping vehicles.”

Dalrymple’s assurances did not ease activists’ fears near Standing Rock late Wednesday afternoon, especially after an online report that a Red Cross shipment was stopped by North Dakota National Guard.

Lynn Speral, chief executive officer for American Red Cross Dakotas Region, said she was aware of the online reports, but that the American Red Cross is a neutral organization and is not assisting anyone involved in the DAPL controversy at this time.

“If things would warrant a disaster type relief response, such as cars stranded because of a storm,” then her organization would respond. “But the situation there is not one that requires the American Red Cross’ assistance, Speral said. If Standing Rock required blood then the supplies would not come from the American Red Cross.

Dalrymple also said he has never contemplated using National Guard or federal or state officers to forcibly remove activists from Army Corps lands. The pipeline is finished everywhere in North Dakota, 95 percent complete, with one exception: under the Missouri River at Lake Oahe.

“To change the route now is probably not feasible,” Dalrymple said.

Lieutenant Governor Drew Wrigley said the state will not be held responsible if serious injury or death occurs at Oceti Sakowin. “They’re there without a permit… they’ve stayed through many seasons. This snowstorm was predicted several days in advance, all of it was out in the media. At some point there’s an assumption of risk, there’s a lot that’s involved and I don’t mean to make light of any of it. There are some people there who probably don’t know anything about this weather.”

Emergency response crews will attempt to respond to calls, Dalrymple said, but arrivals will not be guaranteed.

Dalrymple further mentioned that he has had no official offers from Kelcy Warren, CEO of Energy Transfer Partners, to pay government costs, which are expected to reach a total USD 17 million.

“I don’t even know if it’s possible,” Dalrymple said.

A decision for Morton County to accept any official offer would not rest in the governor’s lap, he said.

Dalrymple also stated during a press conference that his office has been in constant contact with Standing Rock Sioux Tribe Chairman Dave Archambault II, however; according to an official request for information filed with the governor’s office approximately six weeks ago, the governor had no contact with Archambault’s office during a two-week period when tensions were heightening between the state and the tribe.

Ladonna Tamakawastewin Allard, a historian and owner of the Sacred Stone Camp lands, said the governor’s office doesn’t understand the tenacity of the Standing Rock Sioux tribe and its supporters.

“We have been here for thousands of years,” Allard said. “We understand North Dakota winter. When they first issued the order to cow the Indian people, to get back to the reservation, there was a blizzard. And the winter was hard. And the Indian said, ‘Who moves in a blizzard?’ Now we come to 2016 we’re saying the same thing, ‘Who moves in a blizzard?’

“We are not going to back down. We are not in anyone’s home, we are in our own home. Awake. We are in our own home, from the Heart River, to the Platte River, to the plateaus, to the Missouri, 1851 is the supreme law of the land.”

She believes in the rule of law, but says that it is no longer working.

“What do you do against injustice? You stand up, you stand in prayer, you stand in the best way you can. So the governor doesn’t understand prayer. The governor doesn’t understand that the real power is the people, and the real power has always been the people, not a corporation. I think we are seeing that today, where the people are saying ‘We need to change.’ We are not standing down. We are in our home. We are strong, and we have prayer. The governor has no idea what he’s facing.”

© 2024 C.S.News

Theme by Anders NorenUp ↑

close
Facebook Iconfacebook like buttonTwitter Icontwitter follow buttonVisit Our GoodReads