Rules:
Tuesday, May 31, 2011
Win A Latin Invasion TShirt
Monday, May 30, 2011
go to http://www.facebook.com/pages/Pencil-Wars/102242676532791?ref=ts and click the Like button!
Pencil Wars... addicted to the pencil! http://www.facebook.com/pages/Pencil-Wars/102242676532791
http://www.facebook.com/pages/Pencil-Wars/102242676532791
www.manoartshows.com upcoming art shows http://www.manoartshows.com/?page_id=188
June 18
Beauty is More Than Flesh
Fusion Show
Models, artists and Body painting, live art collaboration,
public art collaboration plus art show
August 27
Resistance is Futile
Sci-Fi Show Comic Con Pre-Party Costume Contest
Robots, aliens, popular culture, comic books, anime, TV, film, fantasy, government conspiracies, the truth is out there
October 29
Saints and Sinners
World Religion & Ancient Mythology
Religious, irreligious, sacrilegious, anti-religious, mythology, world religions, Wiccan, Christian, Pagan, Earth Religions, Eastern Religions, Saints, Holy Objects
November 12
The Invisibles
Fundraising event for local charities and organizations
Canned food & clothing donations
The poor, displaced, global suffering, homeless, unemployed, hunger, ethnic war, genocide, exploitation
Saturday, May 28, 2011
Latin Invasion Shirts Are Hot! www.manoartshows.com only 20bux
$5 off Latin Invasion Tees only @VelocityPrint ask for DTM 404.695.5769
Friday, May 27, 2011
Hong Kong Airport - Heading to Chengdu
The flight from New York was as expected except they bumped me to Business. You know I have a love hate relationship with Business Class because the coffin seats are a little short. I did catch up on movies and the food was good. The fifteen or so hours just fly by.
Well, as the five of you who read this blog know - Blogger doesn't work in China. Therefore, after today I will be using the Travelblog: http://www.travelblog.org/Bloggers/Jeff-on-the-Road/page-1.html
I arrive in Chengdu at about 11:00 tonight and have a friend picking me up at the airport. The weekend is free and I don't have to be at the Sichuan University until 10:00 Monday morning. The jetlag will not be over by then but will definitely have lessened. I don't need to do very much prep work for the first few classes. The detailed outline was all prepared in New York and translated into Chinese. All further outlines will be based on that original model along with input from the students.
Thursday, May 26, 2011
Questions regarding SLAVERY & HUMAN TRAFFICKING
Why does it seem black celebrities are less involved than white celebrities in stopping slavery?
Is the situation in Guantanamo Bay considered slavery?
How would blacks feel if reparations were passed for the slaves today?
Are you wearing clothes made by slaves? Have you consumed food/drinks produced by enslaved people? There's a chance you have.
Is modern day slavery worst than the African slave trade?
What's your take on modern day slavery? How can this be happening right in front of our eyes?
If today's slavery is “equal opportunity”, why do we still hear very little reports of whites in slavery?
Should Freed/Rescued Victims Of Modern Day Slavery be Given Reparations?
What is the difference between Human Trafficking & Modern-Day Slavery?
How difficult is it to prosecute a human trafficking case?
In what ways do the products of slavery manifest themselves in our daily lives?
Given that “sex slavery” attracts the most media and government attention, what are the other forms of slavery in America today?
True or False? There Are More Slaves Today Than at Any Time in Human History?
What industries profit the most from Modern day Slavery?
Is the limited attention to modern day slavery more because we are unaware or because we are ignoring the issue?
Do we have the same sympathy for the people that are enslaved now as we do for those that were involved in the slave trade?
What are the many different terms used to hide the fact that Modern day slavery is alive & very well today?
How much is the going rate for a Modern day Slave, & How does today's price compare with cost of Slaves from the 1st American slave trade?
True or False? Slaves work in fields, brothels, homes, mines, restaurants -- anywhere slave owners can feed their greed?
True or False? Slavery is not legal anywhere but happens everywhere,even in here in America?
True or False? Each year roughly 50,000 thousands of slaves are trafficked into the US.?
True or False: In Europe, criminals are pocketing around $2.5 billion per year through sexual exploitation and forced labor.
True or False: 20,000 youth are trafficked in in the USA every year.
True or False: Human trafficking is the third-largest and fastest-growing criminal enterprise in the world.
Dark Girls: Preview
Dark Girls: Preview from Bradinn French on Vimeo.
Clips from the upcoming documentary exploring the deep-seated biases and attitudes about skin color---particularly dark skinned women, outside of and within the Black American culture.
This film will be released in Fall/Winter 2011. Please "Like" the Dark Girls page on Facebook, we will keep you updated with news there.
Directed by Bill Duke and D. Channsin Berry
Produced by Bill Duke for Duke Media
and D. Channsin Berry for Urban Winter Entertainment
Co-Produced by Bradinn French
Line Produced by Cheryl L. Bedford
Edited by Bradinn French
Back to China
The Sichuan University has invited me to come and teach on he subject of iconography in Tibetan art. It is not an easy subject and even more difficult to try and teach. Up until now there have been no systems, course curriculum or publications that teach a systematic and intelligible method of learning Tibetan iconography. I have spent many years thinking about a system and worked through many course models. Some failed miserably and others had moderate success. Through trial and error I believe I now have a model that will work - it just has to be proven in the field - a classroom with interested students. The graduate students at Sichuan University will be the test case.
Wednesday, May 25, 2011
How Hollywood Spreads Disinformation About Secret Societies
National Treasure
This is where everything falls apart. The Templars did not change their name to the Freemasons at the dawn of the American civilization. The Templars have actually disappeared in 1312, which is more than 400 years before the creation of the USA.
“Seemingly untouchable for nearly two centuries, the Templars fell from grace spectacularly after the loss of the Holy Land: in 1307, all Templars in France were arrested on charges of heresy, homosexuality, denial of the cross and devil worship. The order was suppressed by the Pope in 1312, and Jacques de Molay, the last Grand Master, was burnt at the stake as a heretic two years later. ”
- Sean Martin, The Knights Templar
” In order to insure great popularity for the [Scottish] rite, he [Isaac Long] linked it directly with the Templars by a mysterious legend.”
-Domenico Margiotta 33°, Adriano Lemmi
grandfather telling the story and the Pyramid of Gizeh.
His eye becomes the All-Seeing Eye of the Great Architect
Esoteric Meaning of the Movie
“Its [high degrees of Scottish Rite] religion is Manichean neo-gnosticism, teaching that the divinity is dual and that Lucifer is the equal of Adonay, with Lucifer, the God of Light and Goodness struggling for humanity against Adonay the God of Darkness and Evil.”
-Domenico Margiotta 33°, Adriano Lemmi
“When the Mason learns that the key to the warrior on the block is the proper application of the dynamo of living power, he has learned the mystery of his craft. The seething energies of Lucifer are in his hands and before he may step onwards and upwards he must prove his ability to properly apply (this) energy.”
- Manly P. Hall, Lost Keys of Freemasonry
Angels and Demons
The Illuminati was officially founded in Upper Bavaria, by Adam Weishaupt on May 1st 1776. This is more than 130 years after Galilei’s death and not even in the same country. The movie’s association of Galilei with the Illuminati seems like an attempt to associate this brilliant scientist’s name to the conspiratorial secret society.
It never was violent, its actions were based on infiltration and subversion.
The Illuminati was not a group of scientists dedicated to the advancement of common knowledge. The movie falsely portrays the secret society as the necessary rational counterpart to Christianity’s requirement of blind faith and its hindering of scientific advancement. In this optic, the average viewer cannot disagree with Tom Hank’s description of the Illuminati and sees the order in a favorable way. The real aim of the Illuminati was the overthrow of traditional institutions in favor of a new world order.
The objects of this powerful organization of the
Bavarian Illuminati, were :
1. The destruction of Christianity and of all Monarchical Governments ;
2. The destruction of nations as such in favor of universal
internationalism ;
3. The discouragement of patriotic and loyal effort branded
as narrow minded prejudice, incompatible with the
tenets of goodwill to all men and the cry of ” Universal
Brotherhood ” ;
4. The abolition of family ties and of marriage by means
of systematic corruption ;
5. The suppression of the rights of inheritance and property.
-Lady Queenborough, Occult Theocracy
Esoteric Meaning of the Movie
To Conclude
10 ways ‘the police state’ tracks you
The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry, which now seems to be becoming a war on “liberty and privacy.” Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot.
High-tech, first-world countries are being tracked, traced, and databased, literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:
GPS — Global positioning chips are now appearing in everything from U.S. passports and cell phones to cars. More common uses include tracking employees, and for all forms of private investigation. Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.
Internet — Internet browsers are recording your every move forming detailed cookies on your activities. The National Security Administration has been exposed as having cookies on their site that don’t expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide no privacy to users while technologies advance for real-time social network monitoring is already being used. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple’s iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cybersurveillance by citizens.
RFID — Forget your credit cards which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your Social Security number. Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more. RFID “proximity cards” take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access. Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless — perhaps including tracking hard currency so we can’t even keep cash undetected. (Also see microchips below).
Traffic cameras — License plate recognition has been used to remotely automate duties of the traffic police in the United States, but have been proven to have dual use in England such as to mark activists under the Terrorism Act. Perhaps the most common use will be to raise money and shore up budget deficits via traffic violations, but uses may descend to such “Big Brother” tactics as monitors telling pedestrians not to litter as talking cameras already do in the UK.
Computer cameras and microphones — The fact that laptops — contributed by taxpayers — spied on public school children (at home) is outrageous. Years ago Google began officially to use computer “audio fingerprinting” for advertising uses. They have admitted to working with the NSA, the premier surveillance network in the world. Private communications companies already have been exposed routing communications to the NSA. Now, keyword tools — typed and spoken — link to the global security matrix.
Public sound surveillance — This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous “keywords.” This technology has been launched in Europe to “monitor conversations” to detect “verbal aggression” in public places. Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.
Biometrics — The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or combinations of these for use in national identification cards.
DNA — Blood from babies has been taken for all people under the age of 38. In England, DNA was sent to secret databases from routine heel prick tests. Several reports have revealed covert Pentagon databases of DNA for “terrorists” and now DNA from all American citizens is databased. Digital DNA is now being used as well to combat hackers.
Microchips — Microsoft’s HealthVault and VeriMed partnership is to create RFID implantable microchips. Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future. The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.
Facial recognition — Anonymity in public is over. Admittedly used at President Obama’s campaign events, sporting events, and most recently at the G8/G20 protests in Canada. This technology is also harvesting data from Facebook images and surely will be tied into the street “traffic” cameras.
All of this is leading to Predictive Behavior Technology — It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling. It’s been marketed for such uses as blocking hackers. Things seem to have advanced to a point where a truly scientific Orwellian world is at hand. It is estimated that computers know to a 93 percent accuracy where you will be, before you make your first move. Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.
Many of us are asking: What would someone do with all of this information to keep us tracked, traced, and databased? It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.
Article by: Vigilant Citizen
The 25 Rules of Disinformation
1. Hear no evil, see no evil, speak no evil. Regardless of what you know, don’t discuss it — especially if you are a public figure, news anchor, etc. If it’s not reported, it didn’t happen, and you never have to deal with the issues.
2. Become incredulous and indignant. Avoid discussing key issues and instead focus on side issues which can be used show the topic as being critical of some otherwise sacrosanct group or theme. This is also known as the “How dare you!” gambit.
3. Create rumor mongers. Avoid discussing issues by describing all charges, regardless of venue or evidence, as mere rumors and wild accusations. Other derogatory terms mutually exclusive of truth may work as well. This method works especially well with a silent press, because the only way the public can learn of the facts are through such “arguable rumors”. If you can associate the material with the Internet, use this fact to certify it a “wild rumor” which can have no basis in fact.
4. Use a straw man. Find or create a seeming element of your opponent’s argument which you can easily knock down to make yourself look good and the opponent to look bad. Either make up an issue you may safely imply exists based on your interpretation of the opponent/opponent arguments/situation, or select the weakest aspect of the weakest charges. Amplify their significance and destroy them in a way which appears to debunk all the charges, real and fabricated alike, while actually avoiding discussion of the real issues.
5. Sidetrack opponents with name calling and ridicule. This is also known as the primary attack the messenger ploy, though other methods qualify as variants of that approach. Associate opponents with unpopular titles such as “kooks”, “right-wing”, “liberal”, “left-wing”, “terrorists”, “conspiracy buffs”, “radicals”, “militia”, “racists”, “religious fanatics”, “sexual deviates”, and so forth. This makes others shrink from support out of fear of gaining the same label, and you avoid dealing with issues.
6. Hit and Run. In any public forum, make a brief attack of your opponent or the opponent position and then scamper off before an answer can be fielded, or simply ignore any answer. This works extremely well in Internet and letters-to-the-editor environments where a steady stream of new identities can be called upon without having to explain criticism reasoning — simply make an accusation or other attack, never discussing issues, and never answering any subsequent response, for that would dignify the opponent’s viewpoint.
7. Question motives. Twist or amplify any fact which could so taken to imply that the opponent operates out of a hidden personal agenda or other bias. This avoids discussing issues and forces the accuser on the defensive.
8. Invoke authority. Claim for yourself or associate yourself with authority and present your argument with enough “jargon” and “minutiae” to illustrate you are “one who knows”, and simply say it isn’t so without discussing issues or demonstrating concretely why or citing sources.
9. Play Dumb. No matter what evidence or logical argument is offered, avoid discussing issues with denial they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
10. Associate opponent charges with old news. A derivative of the straw man usually, in any large-scale matter of high visibility, someone will make charges early on which can be or were already easily dealt with. Where it can be foreseen, have your own side raise a straw man issue and have it dealt with early on as part of the initial contingency plans. Subsequent charges, regardless of validity or new ground uncovered, can usually them be associated with the original charge and dismissed as simply being a rehash without need to address current issues — so much the better where the opponent is or was involved with the original source.
11. Establish and rely upon fall-back positions. Using a minor matter or element of the facts, take the “high road” and “confess” with candor that some innocent mistake, in hindsight, was made — but that opponents have seized on the opportunity to blow it all out of proportion and imply greater criminalities which, “just isn’t so.” Others can reinforce this on your behalf, later. Done properly, this can garner sympathy and respect for “coming clean” and “owning up” to your mistakes without addressing more serious issues.
12. Enigmas have no solution. Drawing upon the overall umbrella of events surrounding the crime and the multitude of players and events, paint the entire affair as too complex to solve. This causes those otherwise following the matter to begin to loose interest more quickly without having to address the actual issues.
13. Alice in Wonderland Logic. Avoid discussion of the issues by reasoning backwards with an apparent deductive logic in a way that forbears any actual material fact.
14. Demand complete solutions. Avoid the issues by requiring opponents to solve the crime at hand completely, a ploy which works best for items qualifying for rule 10.
15. Fit the facts to alternate conclusions. This requires creative thinking unless the crime was planned with contingency conclusions in place.
16. Vanishing evidence and witnesses. If it does not exist, it is not fact, and you won’t have to address the issue.
17. Change the subject. Usually in connection with one of the other ploys listed here, find a way to side-track the discussion with abrasive or controversial comments in hopes of turning attention to a new, more manageable topic. This works especially well with companions who can “argue” with you over the new topic and polarize the discussion arena in order to avoid discussing more key issues.
18. Emotionalize, Antagonize, and Goad Opponents. If you can’t do anything else, chide and taunt your opponents and draw them into emotional responses which will tend to make them look foolish and overly motivated, and generally render their material somewhat less coherent. Not only will you avoid discussing the issues in the first instance, but even if their emotional response addresses the issue, you can further avoid the issues by then focusing on how “sensitive they are to criticism”.
19. Ignore proof presented, demand impossible proofs. This is perhaps a variant of the “play dumb” rule. Regardless of what material may be presented by an opponent in public forums, claim the material irrelevant and demand proof that is impossible for the opponent to come by (it may exist, but not be at his disposal, or it may be something which is known to be safely destroyed or withheld, such as a murder weapon). In order to completely avoid discussing issues may require you to categorically deny and be critical of media or books as valid sources, deny that witnesses are acceptable, or even deny that statements made by government or other authorities have any meaning or relevance.
20. False evidence. Whenever possible, introduce new facts or clues designed and manufactured to conflict with opponent presentations as useful tools to neutralize sensitive issues or impede resolution. This works best when the crime was designed with contingencies for the purpose, and the facts cannot be easily separated from the fabrications.
21. Call a Grand Jury, Special Prosecutor, or other empowered investigative body. Subvert the (process) to your benefit and effectively neutralize all sensitive issues without open discussion. Once convened, the evidence and testimony are required to be secret when properly handled. For instance, if you own the prosecuting attorney, it can insure a Grand Jury hears no useful evidence and that the evidence is sealed an unavailable to subsequent investigators. Once a favorable verdict (usually, this technique is applied to find the guilty innocent, but it can also be used to obtain charges when seeking to frame a victim) is achieved, the matter can be considered officially closed.
22. Manufacture a new truth. Create your own expert(s), group(s), author(s), leader(s) or influence existing ones willing to forge new ground via scientific, investigative, or social research or testimony which concludes favorably. In this way, if you must actually address issues, you can do so authoritatively.
23. Create bigger distractions. If the above does not seem to be working to distract from sensitive issues, or to prevent unwanted media coverage of unstoppable events such as trials, create bigger news stories (or treat them as such) to distract the multitudes.
24. Silence critics. If the above methods do not prevail, consider removing opponents from circulation by some definitive solution so that the need to address issues is removed entirely. This can be by their death, arrest and detention, blackmail or destruction of their character by release of blackmail information, or merely by proper intimidation with blackmail or other threats.
25. Vanish. If you are a key holder of secrets or otherwise overly illuminated and you think the heat is getting too hot, to avoid the issues, vacate the kitchen.
-From Vigilant Citizen