Tag Archives: privacy

The Lid is Off – Charles Eisenstein

The Lid is Off Click on the link above for this perceptive, important piece by Charles Eisenstein on www/charleseisenstein.net And here are some book links:- https://www.amazon.co.uk/Beautiful-Hearts-Possible-Sacred-Activism/dp/1583947248/ref=sr_1_1?ie=UTF8&qid=1476434506&sr=8-1&keywords=charles+eisenstein https://www.amazon.co.uk/Sacred-Economics-Money-Society-Transition/dp/1583943978/ref=sr_1_2?ie=UTF8&qid=1476434506&sr=8-2&keywords=charles+Eisenstein https://www.amazon.co.uk/Ascent-Humanity-Civilization-Human-Sense/dp/1583946365/ref=sr_1_3?ie=UTF8&qid=1476434506&sr=8-3&keywords=charles+eisenstein Palace Gate Counselling Service, Exeter Counselling in Exeter since 1994 Advertisements

Posted in 'evil', abuse, accountability, bullying, Charles Eisenstein, congruence, consciousness, criminal justice model, cultural questions, Disconnection, ecological issues, ethics, natural world, objectification, paradigm shift, perception, political, power and powerlessness, reality, self concept, shadow, transformation, vulnerability | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Jacob Appelbaum for openDemocracy

The last of three posts themed around the current international political situation, and the profound issues and choices we all face. What do we think we are seeing, and what do we intend to do about it? ‘It is not … Continue reading

Posted in 'evil', accountability, civil rights, communication, conflict, consent, creativity, cultural questions, Disconnection, diversity, empowerment, ethics, fear, non-conforming, objectification, paradigm shift, perception, political, power and powerlessness, reality, risk, sadness & pain, scapegoating, shadow, trauma, values & principles, violence, vulnerability | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment