CIB Weekly Intelligence Brief | Vol. 01 | Iss. 02
CIB Weekly Intelligence Brief | Vol. 01 | Iss. 02 | 25 October 2017
CIB Weekly Intelligence Brief | Vol. 01 | Iss. 02 | 25 October 2017
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Vol</strong>ume 1 | <strong>Iss</strong>ue 2 October 30, 2<strong>01</strong>7<br />
WEEKLY INTELLIGENCE BRIEF<br />
Published by the Chanticleer <strong>Intelligence</strong> <strong>Brief</strong> at Coastal Carolina University in Conway, South Carolina, USA<br />
IMAGE CREDIT: AL JAZEERA<br />
GUNMEN KILL 13 GENDARMES IN<br />
WESTERN NIGER<br />
Daniel Lewis, Member, Africa Desk | October 25, 2<strong>01</strong>7<br />
A convoy of militants on motorcycles and trucks attacked a base<br />
in western Niger on October 21, 2<strong>01</strong>7. The attackers killed 13 and<br />
wounded another five Nigerien police officers.<br />
British newspaper The Guardian states that the attack occurred in the<br />
town of Ayourou, which is located about 25 miles from the Mali-Niger<br />
border.<br />
Radio France Internationale stated that the attackers arrived in five<br />
vehicles and, once reinforcements arrived, loaded up bodies and fled.<br />
Reuters reported that the militants also managed to steal four Nigerien<br />
army vehicles, and fled into Mali while being pursued.<br />
While no militant group in the area has claimed the attack, there are a<br />
number of active groups in the region that are affiliated with al-Qaeda<br />
or with the Islamic State of Iraq and Syria. A joint task force known as<br />
G5 Sahel was launched in an attempt to bring together the Sahel countries,<br />
Mali, Niger, Chad, Mauritania and Burkina Faso, to fight these<br />
militants as regional partners. Only time will tell if this coalition can<br />
enforce an effective counterinsurgency effort.<br />
CONNECT WITH THE <strong>CIB</strong> YouTube: search “Chanticleer <strong>Intelligence</strong> <strong>Brief</strong>”<br />
Website: cibrief.org | Facebook: facebook.com/cibrief | Twitter: twitter.com/thecib<br />
Instagram: instagram.com/cibrief/ | The <strong>CIB</strong> meets every Wednesday 6-7 p.m. in room<br />
300 of the Coastal Science Center (CSCC 300). Everyone is welcome to participate.<br />
The <strong>Weekly</strong> <strong>Intelligence</strong> <strong>Brief</strong> is a publication<br />
of the Chanticleer <strong>Intelligence</strong> <strong>Brief</strong> (<strong>CIB</strong>), a<br />
student-run initiative supported by the Department<br />
of Politics at Coastal Carolina University.<br />
It operates as an ancillary practicum<br />
for students in the <strong>Intelligence</strong> and National<br />
Security Studies program who wish to cultivate<br />
and refine their ability to gather, analyze<br />
and present information in accordance with<br />
techniques used in the intelligence profession<br />
LINDSEY HAMILTON, EDITOR-IN-CHIEF<br />
LOGAN JARRELL, ASSOCIATE EDITOR<br />
The <strong>Weekly</strong> <strong>Intelligence</strong> <strong>Brief</strong> is supported by<br />
the members of the <strong>CIB</strong> and through a generous<br />
grant by the Edwards College Experiential<br />
Learning Project at Coastal Carolina University
BOTNET “REAPER” IS<br />
INFECTING MILLIONS<br />
OF DEVICES<br />
Kyle Brossard, Member, Cyber Desk,<br />
October 29, 2<strong>01</strong>7<br />
Researchers at “Netlab 360” have detected<br />
a botnet called “Reaper”, which is<br />
spreading from one device to another.<br />
It is said to be one of the largest botnets<br />
in years. Currently almost two million<br />
devices have been compromised.<br />
[Editors’ note: Botnets are networks of individual<br />
computers that are infected with malicious<br />
software and controlled in a coordinated fashion<br />
without their owners' knowledge]<br />
Reaper infects internet connected webcams,<br />
security cameras, and digital video recorders<br />
(DVRs) according to ZDNet.<br />
It quietly targets known vulnerabilities and<br />
can take control of the device while also<br />
spreading the malware to other devices.<br />
Reaper allows the controller of the botnet<br />
to hijack the device and issue any commands<br />
they would like.<br />
ZDNet said the intentions of the botnet are<br />
unknown, researchers are unsure of when<br />
or what the attack may entail.<br />
Protection from the botnet is in the hands<br />
of each device’s manufacturers, therefore<br />
everyone is advised to keep updating all<br />
devices that are connected to the internet.<br />
I believe that the Reaper will cause great<br />
damage in the near future either to home<br />
devices or in a coordinated, large-scale infrastructure<br />
attack.<br />
THIRD ISSUE OF THE INTELLIGENCE<br />
REVIEW NOW OUT<br />
The <strong>CIB</strong> is pleased to announce the publication of the third issue<br />
of The <strong>Intelligence</strong> Review, a volume of useful analytical forecasts<br />
by <strong>CIB</strong> analysts, which relate to some of the most pressing<br />
questions in global security today.<br />
The first issue of The <strong>Intelligence</strong> Review was published in July of<br />
2<strong>01</strong>6 to showcase the work of the <strong>CIB</strong> both online and in print. It contained<br />
11 articles from nearly every geographical section of the <strong>CIB</strong>. It<br />
was followed by a second issue of the journal, published in March of<br />
this year.<br />
The volume is the product of a transatlantic collaboration between the<br />
<strong>CIB</strong> and the European <strong>Intelligence</strong> Academy (EIA), a network of intelligence<br />
studies scholars, specialists<br />
and students, who are<br />
dedicated to promoting intergence<br />
scholarship and research.<br />
In this volume, eight <strong>CIB</strong> analysts<br />
tackle some of the most<br />
pressing and timely questions<br />
confronting intelligence experts<br />
today. Topics include the current<br />
and projected strength of<br />
the Islamic State in Libya, the<br />
status of unification efforts on<br />
the island of Cyprus, the future<br />
of the government in Venezuela,<br />
and the United States’ place in<br />
the Paris climate agreement.<br />
There are also papers examining<br />
the construction of energy<br />
pipelines in Central Asia, as well<br />
as aspects of Iranian geopolitics<br />
in relation to the United<br />
States. Last, though certainly not least, we have included an estimative<br />
intelligence analysis of the first round of this year’s presidential<br />
elections in France. It refers to an event of global significance that has<br />
already taken place. However, it is included in this volume as an illustration<br />
of the power of intellectual accuracy and the ability of an intelligence<br />
analyst to achieve 100 percent accuracy —as this analyst does—<br />
by methodically considering and evaluating the analytical parameters<br />
of her question with the right balance of precision and intuition.<br />
The <strong>CIB</strong> analysts whose work is included in the first issue of The <strong>Intelligence</strong><br />
Review are, in alphabetical order: Tahleia Bishop, Kayla<br />
“Ace” Chambers, Kiersten Chambers, Benjamin Dunham, Connor Kilgore,<br />
Jack Lincoln, Casey Mallon, and Troy Ramsbacher. The issue<br />
is edited by <strong>CIB</strong> Faculty Mentor Dr. Joseph Fitsanakis and includes a<br />
foreword by EIA Director Dr. John Nomikos.<br />
<strong>CIB</strong> MEMBERSHIP MEETING ON WEDNESDAY,<br />
OCTOBER 25, 2<strong>01</strong>7<br />
You can read the first three issues of The <strong>Intelligence</strong> Review on the<br />
<strong>CIB</strong>’s website, www.cibrief.org. To order printed copies of any issue,<br />
contact the <strong>CIB</strong>.