Coriolanus

About the author

Coriolanus's background is as an all source fusion intelligence analyst. He currently works as a hybrid intelligence analyst and security engineer. He has worked in the intel industry for over ten years and specializes in DoD joint intelligence analysis, counter terrorism, joint targeting, and cyber information operations, among others. Coriolanus has worked at the tactical, operational, and strategic levels of war working for special mission units and policy makers; and working in areas such as Central and South America, Iraq and Afghanistan theaters of war, and throughout Southeast Asia. His views are his own and do not necessarily reflect the views of the Department of Defense or that of his current employer.

The Fusion Analyst: An intro to all source intelligence and analysis

“Every great magic trick consists of three parts or acts. The first part is called “The Pledge.” The magician shows you something ordinary: a deck of cards, a bird or a man. He shows you this object. Perhaps he asks you to inspect it to see if it is indeed real, unaltered, normal. But of […]

Op-Ed: Mythos, logos, and sexual harassment in the information security profession

According to many historians, the “Greek miracle” of a polis was achieved as a result of a cultural transition from mythos to logos. That is the transition of a culture based on myths to one of reason. It was on logos on which society was born in Greek culture. But myths didn’t die, they just took a second seat. Even […]

Empty chessboards: Rethinking the military intelligence apparatus

This shit is chess. It ain’t checkers. – Alonzo Harris, Training Day Bottom Line Up Front: This is a rebuttal to “Fixing Intel: A Blueprint for Making Intelligence Relevant in Afghanistan”(Flynn 2010), and includes my own assertions regarding military intelligence. This post is a series of observations based on my own experience within the community […]

Sailors’ personally identifiable information stolen by Ricky Ninja

On October 27, 2016, an unknown person or persons of interest stole 134,386 names and social security numbers of US Navy sailors from a laptop of a contractor working for Hewlett Packard and under contract by the Navy. The exfiltrated data derives from the Career Waypoints database (C-WAY). The C-WAY database is used to for re-enlistment […]

The Harmonious Fist of China: Artifacts

The term “artifact” has at least two meanings: From a technical perspective, an artifact is an unintentional pattern in data, arising from processes of collection and management. From a cultural perspective, an artifact is a designed object, with a social and material history. -Yanni Loukissas As I laid out in the first part of this […]

The Harmonious Fist Of China: Twenty Years of Strategy In The Making

The artifice on which every intra-state relationship with the People’s Republic of China (PRC) stands is: “In China, ‘win-win” means China wins twice.” There have been a few articles on the PRC here on SOFREP. I recently worked on a project that dealt with this, and thus my decision to write on it was appropriately […]

Govt. Hackers, Console Cowboys, The Tech Model Railroad Club & The Dark Web Part 1

This article spawns from a conversation on the nature of the “Deep Web” and/or the “Dark Web,” and what is the difference and why. The “why” is “Why does it matter to me the reader?” It should. It’s your Internet.  To quote William Gibson in Neuromancer: “Cyberspace. A consensual hallucination experienced daily by billions of […]