Wed. Sep 19th, 2018

Killing the Idea After the Man: Revolution as an Idea 50 Years After Malcolm X

This was a talk given February 26, 2015 at California State University, Dominguez Hills.

5 thoughts on “Killing the Idea After the Man: Revolution as an Idea 50 Years After Malcolm X

  1. Dr. Ball,

    Another great presentation. I couldn’t make the title of the documentary. Side war? No internet search result.

  2. These are U.S. Department of Defense terms used “when preparing correspondence, to include policy, strategy, doctrine, and planning documents” for military operations.

    military information support operations — Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations,
    groups, and individuals in a manner favorable to the originator’s objectives. Also called MISO. (JP 3-13.2)

    information operations — The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own. Also called IO. (JP 3-13)

    military deception — Actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission. Also called MILDEC. (JP 3-13.4)

    vulnerability — 1. The susceptibility of a nation or military force to any action by any means through which its war potential or combat effectiveness may be reduced or its will to fight diminished. (JP 3-01) 2. The characteristics of a system that cause it to suffer a definite degradation (incapability to perform the designated mission) as a result of having been subjected to a certain level of effects in an unnatural (man-made) hostile environment. (JP 3-60) 3. In information operations, a weakness in information system security design, procedures, implementation, or internal controls that could be
    exploited to gain unauthorized access to information or an information system. (JP 3-13)

  3. Speaking of the national security state and African people in the US, Michael Vincent Hayden links the war on terror directly to a war on black people.

    “This has a lot more to do with the Crips and the Bloods than it has to do with the Koran or Hadith.”

    Michael Vincent Hayden, retired United States Air Force four-star general, former Director of the National Security Agency, Director of the Central Intelligence Agency and Principal Deputy Director of National Intelligence on threats to United States National Security, February 26, 2013

Leave a Reply

SUBSCRIBE!

Get new posts by email:
close

FOLLOW! SHARE! CLICK ABOVE TO SUPPORT!