Journal: Learning Styles Concepts and Evidence

04 Education, IO Mapping, IO Multinational, IO Sense-Making

Learning Styles:Concepts and Evidence

Psychological Science in the Public Interest

Abstract

The term “learning styles” refers to the concept that individuals differ in regard to what mode of instruction or study is most effective for them. Proponents of learning-style assessment contend that optimal instruction requires diagnosing individuals' learning style and tailoring instruction accordingly. Assessments of learning style typically ask people to evaluate what sort of information presentation they prefer (e.g., words versus pictures versus speech) and/or what kind of mental activity they find most engaging or congenial (e.g., analysis versus listening), although assessment instruments are extremely diverse. The most common—but not the only—hypothesis about the instructional relevance of learning styles is the meshing hypothesis, according to which instruction is best provided in a format that matches the preferences of the learner (e.g., for a “visual learner,” emphasizing visual presentation of information).

Read rest of Abstract

Phi Beta Iota: Advanced Information Operations (IO) will see the blending of Cognitive Science with Collective Intelligence inside the IO Cube.  While the World Brain and Global are the final outcome, Advanced IO concepts and doctrine are possible now–they merely require the robust integration of intelligence and integrity in tandem, leading to the identification and pursuit of the right things–and recognize that information is a substitute for time, space, capital, labor, and violence.  Sun Tzu meets John Boyd.  Arugah.

Journal: Covert War in Pakistan–Lessons Not Learned

04 Inter-State Conflict, 05 Civil War, 07 Other Atrocities, 08 Wild Cards, 10 Security, 11 Society, Cultural Intelligence, Government, IO Multinational, IO Sense-Making, Military
Thomas Leo Briggs

Something caught my eye while reading a Slate item written by Tom Scocca and posted on December 20, 2010, “Two Ways of Looking at Our Covert War in Pakistan.”

Mr. Scocca wrote:

“There are diplomatic tensions because we are fighting a full-on undeclared war on the territory of a country with which we are an ally, using covert agents as the commanding officers”.

So what’s new?  Didn’t we fight a full-on undeclared war on the territory of Laos from about 1961 to 1973?  Wasn’t Laos an ally while trying to maintain the fig-leaf of neutrality?  Wasn’t the United States government using ‘covert agents as commanding officers’?

Moreover the New York Times published an article by Mark Mazzetti and Dexter Filkins the same day titled “U.S. Military Seeks to Expand Raids in Pakistan”.

In particular I noticed the following that Mazzetti and Filkins attributed to senior military commanders in Afghanistan.

Continue reading “Journal: Covert War in Pakistan–Lessons Not Learned”

Journal: CSIS on IAEA and NATO Intelligence

IO Multinational, IO Secrets, IO Sense-Making
Berto Jongman Recommends...

Shining a Brighter Light on Dark Places: Improving the IAEA’s Use of Intelligence through Cooperation with NATO

By Michael Hertzberg

Center for Strategic & International Studies Dec 21, 2010

One possible improvement to the IAEA’s monitoring and verification regime would be enhancing the IAEA’s use of intelligence by formalizing cooperation with a multilateral security organization such as the North Atlantic Treaty Organization (NATO). Working through NATO, which has established procedures and infrastructure for sharing and disseminating classified information, would avoid many problems that occur in bilateral intelligence-sharing.

Phi Beta Iota: NATO does not have any intelligence collection or processing capabilities of its own; it is completely dependent on what its members choose to provide it–and as with intelligence provided to the UN (e.g. IAEA), this is generally impoverished if not blatantly misleading.  The only viable solution for multinational intelligence is the establishment of a Multinational Decision Support Centre (MDSC) with Regional MDSC, all reliant primarily on Open Source Intelligence (OSINT), but all also having full-spectrum Human Intelligence (HUMINT) capabilities as well as Advanced Information Operations (IO) capabilities.  The Americans must learn that in Epoch B, must must surrender control in order to gain command of the truth.

Journal: Denial of Service Attacks on Humanitarian Sites

07 Other Atrocities, 10 Security, 11 Society, Computer/online security, Gift Intelligence, IO Multinational, Non-Governmental
Berto Jongman Recommends...

DDoS Attacks Continue to Plague Human Rights Sites

By: Chloe Albanesius

PC Magazine, 12.22.2010

WikiLeaks and Operation Payback have put distributed denial of service (DDoS) attacks in the news recently, but independent media and human rights Web sites have been battling these attacks on a consistent basis with no easy solution in sight, according to a Wednesday study.

While major sites can fend off a DDoS or recover quickly, smaller sites can be crippled by these attacks, which often hit in conjunction with other attacks like filtering, intrusions, and defacements, according to the Berkman Center for Internet & Society.

“DDoS is an increasingly common Internet phenomenon capable of silencing Internet speech, usually for a brief interval but occasionally for longer,” the report said. “Our report offers advice to independent media and human rights sites likely to be targeted by DDoS but comes to the uncomfortable conclusion that there is no easy solution to these attacks for many of these sites, particularly for attacks that exhaust network bandwidth.”

The report's authors suggest that DDoS attacks will become more common amidst news about similar WikiLeaks and Operation Payback attacks. Even before that, however, DDoS attacks on independent media and human rights sites were quite common during the last year, happening even outside of major events like elections, protests, and military operations.

These sites are being hit with two types of DDoS: application and network. Application attacks exhaust local server resources and can usually be rectified with the help of a skilled system admin. Network attacks, however, exhaust network bandwidth and can usually only be fixed with the (costly) help of a hosting provider.

Read rest of article….

Journal: Wind Power Boondoggle–and the Information Operations (IO) Challenge of Energy and Time in Relation to Policy, Acquisition, and Operations

Advanced Cyber/IO, Analysis, Budgets & Funding, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Earth Intelligence, Ethics, History, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Key Players, Methods & Process, Officers Call, Open Government, Peace Intelligence, Policies, Strategy, Threats
Chuck Spinney Recommends...

My good friend Robert Bryce, author of the must-read Power Hungry: The Myths of ‘Green' Energy and the Real Fuels of the Future just launched this little torpedo.

A Wind Power Boonedoggle

T. Boone Pickens badly misjudged the supply and price of natural gas.

By ROBERT BRYCE, Wall Street Journal, 22 December 2010

After 30 months, countless TV appearances, and $80 million spent on an extravagant PR campaign, T.

Boone Pickens has finally admitted the obvious: The wind energy business isn't a very good one.

Read full article….

Click to Enlarge

Phi Beta Iota: Buckminster Fuller and Russell Ackoff nailed it–everything has to be evaluated in relation to energy source and cost and time cost, and you have to focus on doing the right things, not doing the wrong things righter.  Where Mr. Pickens went wrong was in sticking with the centralized ownership concept.  Wind power and solar power are best for localized applications.  The central grid–the Industrial Era top down control grid, is DEAD.  Similarly, water and sewage should not be centralized grids demanding massive investments in collection and processing.  The graphic to the right shows corruption in the center–when analytics and decision-making lose their holistic integrity, they inevitably fail to achieve the desired outcome while creating cascading costs everywhere else.  Military spending in the USA is at the beginning of a nose dive–our military leaders would be wise to get a grip sooner than later, and “beat the dive” by making evidence-based decisions (Advanced IO) sooner than later.  Now a really advanced thought: 21st Century national security is about eradicating corruption at home and abroad–this makes possible the creation of a prosperous world at peace.  The breadth of that challenge is in the graphic below.  That is an IO challenge, not a kinetic challenge.  IO must be co-equal to kinetics beginning immediately.  In our humble opinion.

Click to Enlarge

See Also:

Journal: ‘Systemic Corruption’–Daunting Challenge in Globalized Era

Reference: Frog 6 Guidance 2010-2020

Reference: Transparency Killer App Plus “Open Everything” RECAP (Back to 01/2007)

Reference: Cultures of Resistance–A Look at Global Militarization

Reference: Logistics Oversight as an Information Operations (IO) Mission

Articles & Chapters, Computer/online security, Cultural Intelligence, InfoOps (IO), Intelligence (government), IO Multinational, IO Sense-Making, Methods & Process, Military, Officers Call, Peace Intelligence, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, Strategy, Threats

David IsenbergDavid Isenberg

Posted: December 21, 2010 11:59 PM

Huffington Post

Can't Anyone at DoD Do Oversight? Anyone at All?

The perennial issue regarding private military security contractors is the degree to which they are subject to effective oversight. In that regard there is only one item in today's news worth looking at. That is the report issued by the House Subcommittee on National Security and Foreign Affairs, chaired by John F. Tierney (D-MA). The Majority staff report is titled, Mystery at Manas: Strategic Blind Spots in the Department of Defense's Fuel Contracts in Kyrgyzstan. The report culminates an eight-month investigation into the Department of Defense's multi-billion dollar aviation fuel contracts at the Manas Transit Center in Kyrgyzstan.

Reminding one of the famous line by 1st Lieutenant Milo Minderbinder in Joseph Heller's famous Catch-22 novel, “We're gonna come out of this war rich!” the report found that to keep U.S. warplanes flying over Afghanistan, the Pentagon allowed a “secrecy obsessed” business group to supply jet fuel to a U.S. air base in Kyrgyzstan, turning a blind eye to an elaborate fraud involving fuel deliveries from Russia.

. . . . . . .

But the fuel was being bought by the Pentagon for shipment to the American airbase in Manas, Kyrgyzstan, and from there on to Afghanistan, the report said. Once Russian officials discovered the true identity of the recipient, they cut off supplies, creating a major logistical headache for United States military commanders.

That breakdown forced a major redrawing of supply routes into Afghanistan for jet fuel, which is in chronically short supply in landlocked Afghanistan. It also touched off a major behind-the-scenes diplomatic effort by the Obama administration to rebuild the fuel lines.

Read the complete very well-presented and documented article….

Phi Beta Iota: David Isenberg, author of Shadow Force: Private Security Contractors in Iraq, has become a valuable oversight contributor with respect to the out-of-control acquisition system on top of the out-of-control Private Military Contractor (PMC) system.  When reliability and redundancy matter, any military force that does not understand its supply chain timelines, costs, and geospatial realities down to the RFID level, as well as the vulnerabilities to disruption, is begging for a major hit.  The Information Operations (IO) domain appears poised for a major advance, integrating intelligence, logistics, operations, and civil affairs information in a manner never before attempted–with the supplemental value of placing Human Intelligence (HUMINT) in proper relationship to Cyber-Security, i.e. 70-30 or thereabouts (some would say 80-20).  Make this multinational, and it will be a game changer.  This is one reason the Office of the Inspector-General is one of the fifteen slices of HUMINT that must be managed by IO.

See Also:

Continue reading “Reference: Logistics Oversight as an Information Operations (IO) Mission”

2011 Top 10 Cyber Predictions (and Then Some)

Collaboration Zones, Communities of Practice, Computer/online security, Cyberscams, malware, spam, InfoOps (IO), IO Multinational, IO Sense-Making, IO Technologies, Key Players, Methods & Process, Mobile, Officers Call, Policies, Real Time, Secrecy & Politics of Secrecy, Standards, Strategy, Technologies, Threats

2011 Top 10 Cyber Predictions

Posted by Anup Ghosh on December 16, 2010

Everybody is putting out their Top 10 lists of predictions for 2011. Not to be left out of the party, below is a list of what we expect to see in 2011 in Cyber Security.

1.  Malware.

2.  Blame the User.

3.  Reactive approaches to security will continue to fail.

4.  Major Breaches in Sectors with Intellectual Property.

5.  Hacktivists will bask in their new-found glory.

6.  Critical Infrastructure Attacks.

7.  Hello Android.

8.  Windows Kernel Exploits.

9.  Organized Crime rises.

10.  Congress will rear its head.

Read full paragraph that goes with each of the above….

Phi Beta Iota: Nothing wrong with any of the above, except that they are out of context.  As the still-valid cyber-threat slide created by Mitch Kabay in the 1990's shows, 70% of our losses have nothing to do with disgruntled or dishonest insiders, or external attacks including viruses.  Cyber has not been defined, in part because the Human Intelligence crowd does not compute circuits, and the circuit crowd do not computer human intelligence.  We are at the very beginning of a startling renaissance in cyber/Information Operations (IO) in which–we predict–existing and near-term hardware and software vulnerabilities will be less than 30% of the problem.  Getting analog Cold War leaders into new mind-sets, and educating all hands toward sharing rather than hoarding, toward multinational rather than unilateral, will be key aspects of our progress.  Cyber is life, life is cyber–it's all connected.  Stove-piped “solutions” make it worse.

See Also:

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Journal: 1 in 4 Fail US Army Extrance Exam

Journal: Development at Gunpoint? Wasteful & Wrong

Undersea Cables: The Achilles Heel of our Economies

Journal: NSA Assumes It Has Been Compromised…Correct!

Reference: Frog 6 Guidance 2010-2020