by DGR News Service | May 19, 2021 | Biodiversity & Habitat Destruction, Colonialism & Conquest, Culture of Resistance, Direct Action, Indigenous Autonomy, Listening to the Land, Lobbying, Mining & Drilling, Movement Building & Support, Obstruction & Occupation, Repression at Home, Toxification, White Supremacy
In this statement, Atsa koodakuh wyh Nuwu (the People of Red Mountain), oppose the proposed Lithium open pit mines in Thacker Pass. They describe the cultural and historical significance of Thacker Pass, and also the environmental and social problems the project will bring.
We, Atsa koodakuh wyh Nuwu (the People of Red Mountain) and our native and non-native allies, oppose Lithium Nevada Corp.’s proposed Thacker Pass open pit lithium mine.
This mine will harm the Fort McDermitt Paiute-Shoshone Tribe, our traditional land, significant cultural sites, water, air, and wildlife including greater sage grouse, Lahontan cutthroat trout, pronghorn antelope, and sacred golden eagles. We also request support as we fight to protect Thacker Pass.
”Lithium Nevada Corp. (“Lithium Nevada”) – a subsidiary of the Canadian corporation Lithium Americas Corp. – proposes to build an open pit lithium mine that begins with a project area of 17,933 acres. When the Mine is fully-operational, it would use 5,200 acre-feet per year (equivalent to an average pumping rate of 3,224 gallons per minute) in one of the driest regions in the nation. This comes at a time when the U.S. Bureau of Reclamation fears it might have to make the federal government’s first-ever official water shortage declaration which will prompt water consumption cuts in Nevada. Meanwhile, despite Lithium Nevada’s characterization of the Mine as “green,” the company estimates in the FEIS that, when the Mine is fully-operational, it will produce 152,703 tons of carbon dioxide equivalent emissions every year.
Mines have already harmed the Fort McDermitt tribe.
Several tribal members were diagnosed with cancer after working in the nearby McDermitt and Cordero mercury mines. Some of these tribal members were killed by that cancer.
In addition to environmental concerns, Thacker Pass is sacred to our people. Thacker Pass is a spiritually powerful place blessed by the presence of our ancestors, other spirits, and golden eagles – who we consider to be directly connected to the Creator. Some of our ancestors were massacred in Thacker Pass. The name for Thacker pass in our language is Peehee mu’huh, which in English, translates to “rotten moon.” Pee-hee means “rotten” and mm-huh means “moon.” Peehee mu’huh was named so because our ancestors were massacred there while our hunters were away. When the hunters returned, they found their loved ones murdered, unburied, rotting, and with their entrails spread across the sage brush in a part of the Pass shaped like a moon. To build a lithium mine over this massacre site in Peehee mu’huh would be like building a lithium mine over Pearl Harbor or Arlington National Cemetery. We would never desecrate these places and we ask that our sacred sites be afforded the same respect.
Thacker Pass is essential to the survival of our traditions.
Our traditions are tied to the land. When our land is destroyed, our traditions are destroyed. Thacker Pass is home to many of our traditional foods. Some of our last choke cherry orchards are found in Thacker Pass. We gather choke cherries to make choke cherry pudding, one of our oldest breakfast foods. Thacker Pass is also a rich source of yapa, wild potatoes. We hunt groundhogs and mule deer in Thacker Pass. Mule deer are especially important to us as a source of meat, but we also use every part of the deer for things like clothing and for drumskins in our most sacred ceremonies.
Thacker Pass is one of the last places where we can find our traditional medicines.
We gather ibi, a chalky rock that we use for ulcers and both internal and external bleeding. COVID-19 made Thacker Pass even more important for our ability to gather medicines. Last summer and fall, when the pandemic was at its worst on the reservation, we gathered toza root in Thacker Pass, which is known as one of the world’s best anti-viral medicines. We also gathered good, old-growth sage brush to make our strong Indian tea which we use for respiratory illnesses.
Thacker Pass is also historically significant to our people.
The massacre described above is part of this significance. Additionally, when American soldiers were rounding our people up to force them on to reservations, many of our people hid in Thacker Pass. There are many caves and rocks in Thacker Pass where our people could see the surrounding land for miles. The caves, rocks, and view provided our ancestors with a good place to watch for approaching soldiers. The Fort McDermitt tribe descends from essentially two families who, hiding in Thacker Pass, managed to avoid being sent to reservations farther away from our ancestral lands. It could be said, then, that the Fort McDermitt tribe might not be here if it wasn’t for the shelter provided by Thacker Pass.
We also fear, with the influx of labor the Mine would cause and the likelihood that man camps will form to support this labor force, that the Mine will strain community infrastructure, such as law enforcement and human services. This will lead to an increase in hard drugs, violence, rape, sexual assault, and human trafficking. The connection between man camps and missing and murdered indigenous women is well-established.
Finally, we understand that all of us must be committed to fighting climate change. Fighting climate change, however, cannot be used as yet another excuse to destroy native land. We cannot protect the environment by destroying it.
Sign the petition from People of Red Mountain: https://www.change.org/p/protect-thacker-pass-peehee-mu-huh
Donate: https://www.classy.org/give/423060/#!/donation/checkout
For more on the Protect Thacker Pass campaign
#ProtectThackerPass #NativeLivesMatter #NativeLandsMatter
by DGR News Service | Mar 8, 2021 | Education, Movement Building & Support, Repression at Home, Strategy & Analysis
In this article Max Wilbert outlines the political and environmental need for security culture. He offers recommendations to secure communications.
By Max Wilbert
For 50 days, the Protect Thacker Pass camp has stood here in the mountains of northern Nevada, on Northern Paiute territory, to defend the land against a strip mine.
Lithium Americas, a Canadian corporation, means to blow up, bulldoze, or pave 5,700 acres of this wild, biodiverse land to extract lithium for “green” electric cars. In the process, they will suck up billions of gallons of water, import tons and tons of waste from oil refineries to be turned into sulfuric acid, burn 11,000 gallons of diesel fuel per day, toxify groundwater with arsenic, antimony, and uranium, harm wildlife from Golden eagles and Pronghorn antelope to Greater sage-grouse and the endemic King’s River pyrg, and lay waste to traditional territories still used by people from the Fort McDermitt reservation and the local ranching and farming communities.
The Campaign to Protect Thacker Pass
They claim this is an “environmentally sustainable” project. We disagree, and we mean to stop them from destroying this place.
Thus far, our work has been focused on outreach and spreading the word. For the first two weeks, there were only two of us here. Now word has begun to spread. The campaign is entering a new stage. There are new opportunities opening, but we must be cautious.
How Corporations Disrupt Grassroots Resistance Movements
Corporations, faced with grassroots resistance, follow a certain playbook. We can look at the history of how these companies respond to determine their strategies and the best ways to counteract them.
Corporations like Lithium Americas Corporation generally do not have in-house security teams, beyond basic security for facilities and IT/digital security. Therefore, when faced with growing grassroots resistance, their first move will be to hire an outside corporation to conduct surveillance, intelligence gathering, and offensive operations.
Private Military Corporations (PMCs) are essentially mercenaries acting largely outside of government regulation or democratic control. They are hired by private corporations to assist in their interests and act as for-hire businesses with few or no ethical considerations. Some examples of these corporations are TigerSwan, Triple Canopy, and STRATFOR.
PMCs are often staffed with U.S. military veterans, and employ counterinsurgency techniques and skills honed during the invasions of Iraq and Afghanistan, or other military operations. And in many cases, these PMCs collaborate with public law enforcement agencies to share information, such that law enforcement is essentially acting as a private contractor for a corporation.
Disruption Tactics Used by Corporate Goon Squads
PMCs can be expected to deploy four basic tactics.
- Intelligence Gathering
First, they will attempt to gather as much information on protesters as possible. This begins with what is called OSINT — Open Source Intelligence. This simply means combing through open records on the internet: Googling names, scrolling through social media profiles and groups, and compiling information that is publicly available for anyone who cares to look.
Other methods of information gathering are more active, and include physical surveillance (such as flying a helicopter overhead, as occurred today), signals intelligence (attempting to capture cell phone calls, emails, texts, and website traffic using a device like a Stingray also known as an IMSI catcher), and infiltration or human intelligence (HUMINT). This last is perhaps the most important, the most dangerous, and the most difficult to combat.
- Disruption
Second, they will attempt to disrupt the protest. This is often done by using the classic tactics of COINTELPRO to plant rumors, false information, and foment infighting to weaken opposition.
During the protests against the Dakota Access Pipeline, one TigerSwan infiltrator working inside the protest camps wrote to his team that
“I need you guys to start looking at the activists in your area and see if there are individuals who are vulnerable. They’re broke, always talking about needing gas money or whatever. Maybe they’re disillusioned, depressed a little. Life is fucking them over. We can buy them a bus ticket to any camp they want if they’re willing to provide intel. We win no matter what. If they agree to inform for pay, we get intel. If they tell our pitchman to go f*** himself/herself, the activist will start wondering who did take the money and it’ll cause conflict within the activist groups and it won’t cost us anything.”
In 2013, there was a leak of documents from the private intelligence company STRATFOR, which has worked for the American Petroleum Institute, Dow Chemical, Northrup Grumman, Coca Cola, and so on. The leaked documents revealed one part of STRATFOR’s strategy for fighting social movements. The document proposes dividing activists into four groups, then exploiting their differences to fracture movements.
“Radicals, idealists, realists and opportunists [are the four categories],” the leaked documents state. “The Opportunists are in it for themselves and can be pulled away for their own self-interest. The Realists can be convinced that transformative change is not possible and we must settle for what is possible. Idealists can be convinced they have the facts wrong and pulled to the Realist camp. Radicals, who see the system as corrupt and needing transformation, need to be isolated and discredited, using false charges to assassinate their character is a common tactic.”
As I will discuss later on, solidarity and movement culture is the best way to push back against these methods.
Other examples of infiltration and disruption have often focused on:
- Increasing tensions around racist or sexist behavior
- Targeting individuals with drug or alcohol addictions to become informants
- Using sex appeal and relationship building to get information
- Acting as an “agent provocateur” to encourage protesters to become violent, even to the point of supplying them with bombs, in order to secure arrests
- Spreading rumors about inappropriate behavior to sew discord and mistrust
- Intimidation
The third tactic used by these companies is intimidation. They will use fear and paranoia as a deliberate form of psychological warfare. This can include anonymous threats, shows of force, visible surveillance, and so on.
- Violence
When other methods fail, PMCs and public law enforcement will ultimately resort to direct violence, as we have seen with Standing Rock and many other protest movements.
As I have written before, colonial states enforce their resource extraction regimes with force, and we should disabuse ourselves of notions to the contrary. Vigilante violence is also always a concern. When people seek to defend land from destruction, men with guns are usually dispatched to arrest them, remove them from the site, and lock them in cages.
How to Resist Against Surveillance and Repression
There are specific techniques we can deploy to protect ourselves, and by extension, protect the land at Thacker Pass. These techniques are called “security culture.”
Security culture is a set of practices and attitudes designed to increase the safety of political communities. These guidelines are created based on recent and historic state repression, and help to reduce paranoia and increase effectiveness.
Security culture cannot keep us 100% safe, all the time. There is risk in political action. But it helps us manage risks that do exist, and take calculated risks when necessary to achieve our goals.
The first rule of security culture is this: be cautious, but do not live in fear. We cannot let their intimidation be effective. Creating paranoia is a key goal for PMCs and other repressive organizations. When they make us so paranoid we no longer take action, reach out to potential allies, or plan and carry out our campaigns, they win using only the techniques of psychological warfare. When we are fighting to protect the land and water, we are doing something righteous, and we should be proud and stand tall while we do this work.
The second rule of security culture is that solidarity is how we overcome paranoia, snitchjacketing, and rumor-spreading. We must act with principles and in a deeply ethical and honorable way. Work to build alliances, friendships, and trust—while maintaining good boundaries and holding people accountable. This is the foundation of a good culture.
In regards to infiltration, security culture recommends the following:
- It’s not safe nor a good idea to generally speculate or accuse people of being infiltrators. This is a typical tactic that infiltrators use to shut movements down.
- Paranoia can cause destructive behavior.
- Making false/uncertain accusations is dangerous: this is called “bad-jacketing” or “snitch-jacketing.”
- Build relationships deliberately, and build trust slowly. Do not share sensitive information with people who don’t need to know it. There is a fine line between promoting a campaign and sharing information that could put someone at risk.
- Good security culture focuses on identifying and stopping bad behavior.
- Do not talk to police or law enforcement unless you are a designated liaison.
Secure communications are an important part of security culture.
Here are some basic recommendations to secure your communications.
- Email, phone calls, social media, and text messages are inherently insecure. Nothing sensitive should be discussed using these platforms.
- Preferably, use modern secure messaging apps such as Signal, Wire, or Session. These apps are free and easy to use.
- We recommend setting up and using a VPN for all your internet access needs at camp. ProtonVPN and Firefox VPN are two reputable providers. These tools are easy to use after a brief initial setup, and only cost a small amount. Invest in security.
We must also remember that secure communications aren’t a magic bullet. If you’re communicating with someone who decides to share your private message, it’s no longer private. Use common sense and consider trust when using secure communications tools.
Security culture also warns us not talk about some sensitive issues, including:
- Your or someone else’s participation in illegal action.
- Someone else’s advocacy for such actions.
- Your or someone else’s plans for a future illegal action.
- Don’t talk about illegal actions in terms of specific times, people, places, etc.
Note: Nonviolent civil disobedience is illegal, but can sometimes be discussed openly. In general, the specifics of nonviolent civil disobedience should be discussed only with people who will be involved in the action or those doing support work for them. It’s still acceptable (even encouraged) to speak out generally in support of monkeywrenching and all forms of resistance as long as you don’t mention specific places, people, times, etc.
Conclusion
Security is a very important topic, but is challenging. There are so many potential threats, and we are not used to acting in a secure way. That’s why we are working to create a “security culture”—so that our communities of resistance are always considering security, assessing threats, studying our opposition, and creating countermeasures to their methods.
This article is only a brief introduction to the topic of security culture. Moving forward, we will be providing regular trainings in security culture to Protect Thacker Pass participants.
Most importantly, do not let this scare you, and do not be overwhelmed. Simply take one security measure at a time, begin to study it, and then implement better protocols one by one. We use the term “security culture” because security is a mindset that should be developed and shared.
Resources:
Recommended topics of study:
by DGR News Service | Nov 30, 2020 | Repression at Home
By Dave Maass and Matthew Guariglia / November 19, 2020 / Electronic Frontier Foundation
A few years ago, when you saw a security camera, you may have thought that the video feed went to a VCR somewhere in a back office that could only be accessed when a crime occurs. Or maybe you imagined a sleepy guard who only paid half-attention, and only when they discovered a crime in progress. In the age of internet-connectivity, now it’s easy to imagine footage sitting on a server somewhere, with any image inaccessible except to someone willing to fast forward through hundreds of hours of footage.
That may be how it worked in 1990s heist movies, and it may be how a homeowner still sorts through their own home security camera footage. But that’s not how cameras operate in today’s security environment. Instead, advanced algorithms are watching every frame on every camera and documenting every person, animal, vehicle, and backpack as they move through physical space, and thus camera to camera, over an extended period of time.
The term “video analytics” seems boring, but don’t confuse it with how many views you got on your YouTube “how to poach an egg” tutorial. In a law enforcement or private security context, video analytics refers to using machine learning, artificial intelligence, and computer vision to automate ubiquitous surveillance.
Through the Atlas of Surveillance project, EFF has found more than 35 law enforcement agencies that use advanced video analytics technology. That number is steadily growing as we discover new vendors, contracts, and capabilities. To better understand how this software works, who uses it, and what it’s capable of, EFF has acquired a number of user manuals. And yes, they are even scarier than we thought.
Briefcam, which is often packaged with Genetec video technology, is frequently used at real-time crime centers. These are police surveillance facilities that aggregate camera footage and other surveillance information from across a jurisdiction. Dozens of police departments use Briefcam to search through hours of footage from multiple cameras in order to, for instance, narrow in on a particular face or a specific colored backpack. This power of video analytic software would be particularly scary if used to identify people out practicing their First Amendment right to protest.
Avigilon systems are a bit more opaque, since they are often sold to business, which aren’t subject to the same transparency laws. In San Francisco, for instance, Avigilon provides the cameras and software for at least six business improvement districts (BIDs) and Community Benefit Districts (CBDs). These districts blanket neighborhoods in surveillance cameras and relay the footage back to a central control room. Avigilon’s video analytics can undertake object identification (such as whether things are cars and people), license plate reading, and potentially face recognition.
You can read the Avigilon user manual here, and the Briefcam manual here. The latter was obtained through the California Public Records Act by Dylan Kubeny, a student journalist at the University of Nevada, Reno Reynolds School of Journalism.
But what exactly are these software systems’ capabilities? Here’s what we learned:
Pick a Face, Track a Face, Rate a Face

If you’re watching video footage on Briefcam, you can select any face, then add it to a “watchlist.” Then, with a few more clicks, you can retrieve every piece of video you have with that person’s face in it.
Briefcam assigns all face images 1-3 stars. One star: the AI can’t even recognize it as a person. Two stars: medium confidence. Three stars: high confidence.
Detection of Unusual Events

Avigilon has a pair of algorithms that it uses to predict what it calls “unusual events.”
The first can detect “unusual motions,” essentially patterns of pixels that don’t match what you’d normally expect in the scene. It takes two weeks to train this self-learning algorithm. The second can detect “unusual activity” involving cars and people. It only takes a week to train.
Also, there’s “Tampering Detection” which, depending on how you set it, can be triggered by a moving shadow:
Enter a value between 1-10 to select how sensitive a camera is to tampering Events. Tampering is a sudden change in the camera field of view, usually caused by someone unexpectedly moving the camera. Lower the setting if small changes in the scene, like moving shadows, cause tampering events. If the camera is installed indoors and the scene is unlikely to change, you can increase the setting to capture more unusual events.
Pink Hair and Short Sleeves

With Briefcam’s shade filter, a person searching a crowd could filter by the color and length of items of clothing, accessories, or even hair. Briefcam’s manual even states the program can search a crowd or a large collection of footage for someone with pink hair.
In addition, users of BriefCam can search specifically by what a person is wearing and other “personal attributes.” Law enforcement attempting to sift through crowd footage or hours of video could search for someone by specifying blue jeans or a yellow short-sleeved shirt.
Man, Woman, Child, Animal
BriefCam sorts people and objects into specific categories to make them easier for the system to search for. BriefCam breaks people into the three categories of “man,” “woman,” and “child.” Scientific studies show that this type of categorization can misidentify gender nonconforming, nonbinary, trans, and disabled people whose bodies may not conform to the rigid criteria the software looks for when sorting people. Such misidentification can have real-world harms, like triggering misguided investigations or denying access.
The software also breaks down other categories, including distinguishing between different types of vehicles and recognizing animals.
Proximity Alert

In addition to monitoring the total number of objects in a frame or the relative size of objects, BriefCam can detect proximity between people and the duration of their contact. This might make BriefCam a prime candidate for “COVID-19 washing,” or rebranding invasive surveillance technology as a potential solution to the current public health crisis.
Avigilon also claims it can detect skin temperature, raising another possible assertion of public health benefit. But, as we’ve argued before, remote thermal imaging can often be very inaccurate, and fail to detect virus carriers that are asymptomatic.
Public health is a collective effort. Deploying invasive surveillance technologies that could easily be used to monitor protestors and track political figures is likely to breed more distrust of the government. This will make public health collaboration less likely, not more.
Watchlists
One feature available both with Briefcam and Avigilon are watchlists, and we don’t mean a notebook full of names. Instead, the systems allow you to upload folders of faces and spreadsheets of license plates, and then the algorithm will find matches and track the targets’ movement. The underlying watchlists can be extremely problematic. For example, EFF has looked at hundreds of policy documents for automated license plate readers (ALPRs) and it is very rare for an agency to describe the rules for adding someone to a watchlist.
Vehicles Worldwide
Often, ALPRs are associated with England, the birthplace of the technology, and the United States, where it has metastasized. But Avigilon already has its sights set on new markets and has programmed its technology to identify license plates across six continents.
It’s worth noting that Avigilon is owned by Motorola Solutions, the same company that operates the infamous ALPR provider Vigilant Solutions.
Conclusion
We’re heading into a dangerous time. The lack of oversight of police acquisition and use of surveillance technology has dangerous consequences for those misidentified or caught up in the self-fulfilling prophecies of AI policing.
In fact, Dr. Rashall Brackney, the Charlottesville Police Chief, described these video analytics as perpetuating racial bias at a recent panel. Video analytics “are often incorrect,” she said. “Over and over they create false positives in identifying suspects.”
This new era of video analytics capabilities causes at least two problems. First, police could rely more and more on this secretive technology to dictate who to investigate and arrest by, for instance, identifying the wrong hooded and backpacked suspect. Second, people who attend political or religious gatherings will justifiably fear being identified, tracked, and punished.
Over a dozen cities across the United States have banned government use of face recognition, and that’s a great start. But this only goes so far. Surveillance companies are already planning ways to get around these bans by using other types of video analytic tools to identify people. Now is the time to push for more comprehensive legislation to defend our civil liberties and hold police accountable.
To learn more about Real-Time Crime Centers, read our latest report here.
Republished under the Creative Commons Attribution License.
by DGR News Service | Oct 15, 2020 | Obstruction & Occupation
The Capitol State Forest, Washington — Early Wednesday afternoon just as the fog melted off, a convoy of trucks from at least four different law enforcement agencies parked on a logging road for an unannounced raid on a camp of forest protection activists, sweeping the camp away and leaving one man in the forest canopy tied to a unique contraption that continues to impede work on the controversial “Chameleon” timber sale. The officers came from the Thurston County Sheriff’s Office, the Washington State Patrol, the state Fish and Game Department, and the Department of Natural Resources (DNR) which planned and sold the timber sale and oversees all of the Capitol State Forest. They temporarily closed the roads to through traffic while they cleared the activists from the camp.
Ian Frederick, 29, a teacher from Olympia, was on the ground making coffee when the cops arrived. “There were just so many of them,” he said. “It seems like a lot of force to bring to deal with two unarmed civilians eating lunch.”
The two activists were briefly detained before being allowed to walk away while the officers attempted to negotiate with the remaining “tree-sitter” who continued to block the logging road. The DNR law enforcement eventually brought in spotlights and a generator and began to prepare for a siege of the tree-sit.
The man in the treesit was John “Tree’Angelo” Barksdale. Mr. Barksdale, 34, an outdoor educator from Tumwater, has watched with dismay over the past several years as the DNR has systematically clear-cut most of its remaining old-growth stands. An avid hiker, he’s seen many of his favorite local trails turned to moonscapes.
“Unit 1 of Chameleon is some of the most intact forest, the best habitat left across one hundred thousand acres,” Mr. Barksdale said. “If we want all this to actually be a forest and not just an oversized tree plantation, we need to save at least something. We can’t clear-cut all of it.”
Mr. Barksdale has used years of climbing experience to erect a unique “dunk-tank” platform atop an old-growth douglas-fir tree, tied to an abandoned Ford Explorer parked across the proposed logging road. If the car moves, his platform drops. It’s about one hundred feet down to the steep slopes of the forest below. Mr. Barksdale claims to have plenty of food and water and says he is prepared to wait out the DNR indefinitely.
“I’ve always wanted to tree-sit,” he says. “I love trees. I love camping. I can work remotely out here and attend Zoom meetings from right here on the platform. It’s super dreamy up here, and I’m trying to save these trees. I can’t think of anything else I’d rather be doing.”
The protest camp, which was started ten days ago by a few friends of Mr. Barksdale, quickly picked up support from local hunters, fishermen and ATV users concerned about the health of the forest. Protectors of the Salish Sea, an indigenous water advocacy group, held space with songs and prayers at the blockade on Saturday. Multiple community groups across Thurston County have come out in support of the blockade and are calling for the cancellation of the timber sale.
The tree sit came to an end several days later when storms forced Mr. Barksdale to descend.

by DGR News Service | Jul 22, 2020 | Agriculture, Biodiversity & Habitat Destruction
Deforestation rate climbs higher as Amazon moves into the burning season
10 July 2020
- Deforestation in the Brazilian Amazon climbed higher for the fifteenth straight month, reaching levels not seen since the mid-2000s, according to data released today by Brazil’s national space research institute INPE.
- INPE’s satellite-based deforestation alert system detected 1,034 square kilometers of forest clearing during June 2020 bringing the twelve-month total to 9,564 sq km, 89% higher than a year ago.
- The extent of deforestation over the past year is the highest on record since INPE started releasing monthly numbers in 2007.
- The 12-month deforestation rate has risen 96% since President Jair Bolsonaro took office in January 2019.
Deforestation in the Brazilian Amazon climbed higher for the fifteenth straight month, reaching levels not seen since the mid-2000s, according to data released today by Brazil’s national space research institute INPE. The news comes as the region moves into the dry season, when deforestation and forest fires typically accelerate.
INPE’s satellite-based deforestation alert system detected 1,034 square kilometers of forest clearing during June 2020 bringing the twelve-month total to 9,564 sq km, 89% higher than a year ago. The extent of deforestation over the past year is the highest recorded since INPE started releasing monthly numbers in 2007.
The 12-month deforestation rate has risen 96% since President Jair Bolsonaro took office in January 2019.
Under pressure from big companies and the E.U. over rising deforestation and fire risk in the Amazon, the Bolsonaro Administration on Wednesday decreed a 120-day ban on fires in the Amazon. The administration had already deployed the army to the region to try to rein in burning, but fires are already well underway despite it being early in the dry season, according to analysis of satellite data by Amazon Conservation’s MAAP project.
MAAP found there are have been 14 major fires in the Amazon this year through July 2nd. MAAP’s analysis excludes fires in pasture and scrub lands, providing a clearer picture on fires associated with recent deforestation and in existing forest.
Deforestation has been trending upward in the Brazilian Amazon since 2012, but the rate of loss has dramatically accelerated over the past year-and-a-half as the Bolsonaro Administration has relaxed law enforcement, stripped conservation areas and indigenous lands of protection, promoted mining and industrial forest conversion, and tried to pass policies weakening environmental safeguards in the region.
Scientists have warned that the Amazon rainforest may be approaching a tipping point where the forest shifts toward a drier, savanna-like ecosystem. Such a transition could have significant and sustained impacts on local and regional rainfall patterns, while triggering the release of vast amounts of carbon into the atmosphere.
Published on the 10th July 2020, you can read the original and full article, with associated graphs and images here: