background preloader

Esalyn

Facebook Twitter

ARS. Human Experimentation. FOIA. Neurones miroirs. Secrets in Plain Sight 1-23 (Full video) Secrecy. Delegitimizing Wars. Being Defensive. 600 Applied Sciences. Cults, Communes & Sects. Spiritual Fraternities & Secret Societies.

Facebook-1. Knowledge Management. Personality Tests. Micro Expressions. Interesting Info -> Lying Index & Body Language -> Micro Expressions Is the show "Lie to Me" for real? I am not a police interrogator, scientist, or other expert... I am however a mother & people watcher. Years ago, when I wrote articles on How to Detect Lies & Eye Movement and Lying -- I knew of the Micro expression theory, but had a difficult time researching the subject well enough to relay it into an article.

Recently, I've come across tons of new research, websites, articles, videos, etc. about micro expressions and believe anyone who reads my old articles about lying & body language would benefit from micro expression research and theory. What are Micro Expressions? A micro expression is a momentary involuntary facial expression -- that people unconsciously display when they are hiding an emotion. The main points to remember are that micro expressions are: Brief - Micro-expressions can appear then disappear off the face in a fraction of a second. . And the Duchenne Smile. Dr. Dr. Dr. How to Tell If You are Hypothyroid. Who's in Control? - by Jean Liedloff. It appears that many parents of toddlers, in their anxiety to be neither negligent nor disrespectful, have gone overboard in what may seem to be the other direction. by Jean Liedloff First appeared in Mothering magazine, Winter 1994 It took some time before the significance of what I was looking at sank into my "civilized" mind.

I had spent more than two years living in the jungles of South America with Stone Age Indians. Where were the "terrible twos"? The Yequana Way There is a Yequana expression equivalent to "Boys will be boys"; it has a positive connotation, however, and refers to the boys' high spirits as they run about and whoop and swim in the river or play Yequana badminton (a noncompetitive game in which all players keep the cornhusk shuttlecock in the air as long as possible by batting it with open hands). Far from being disciplined or suppressed into compliant behavior, these little angels are relaxed and cheerful. How do they do it? The "Civilized" Experience The Way to Harmony. The Delusional Way Out - The narcissist reacts ... The Delusional Way Out: The Narcissist's Reactions to Deficient Narcissistic Supply By: Dr. Sam Vaknin Click HERE and HERE to view the videos Malignant Self Love - Buy the Book - Click HERE!!!

Relationships with Abusive Narcissists - Buy the e-Books - Click HERE!!! READ THIS: Scroll down to review a complete list of the articles - Click on the blue-coloured text! "A surprising ... fact in the process of self-splitting is the sudden change of the object relation that has become intolerable, into narcissism. [Ferenczi and Sandor - "Notes and Fragments" - International Journal of Psychoanalysis - Vol XXX (1949), p. 234] The study of narcissism is a century old and the two scholarly debates central to its conception are still undecided. The second debate is easier to resolve if one agrees to adopt a more comprehensive definition of "abuse". This is because, as Horney pointed out, the child is dehumanized and instrumentalized.

(continued below) The narcissist then resorts to self-delusion. The Narcissist's Ideas of Reference. The Narcissist's Ideas of Reference By: Dr. Sam Vaknin Click HERE to Watch the Video Malignant Self Love - Buy the Book - Click HERE!!! Relationships with Abusive Narcissists - Buy the e-Books - Click HERE!!! READ THIS: Scroll down to review a complete list of the articles - Click on the blue-coloured text! The narcissist is the centre of the world. This is understandable. The narcissist derives his sense of being, his experience of his own existence, and his self-worth from the outside.

This constant obsession with one's locus, with one's centrality, with one's position as a hub - leads to referential ideation ("ideas of reference"). When people talk - the narcissist is convinced that he is the topic of discussion. And, to the narcissist, everyone is but an audience. (continued below) This article appears in my book, "Malignant Self-love: Narcissism Revisited" Click HERE to buy the print edition from Barnes and Noble Click HERE for SPECIAL OFFER 1 and HERE for SPECIAL OFFER 2 Copyright Notice. The Narcissist’s Victims. The Narcissist’s Victims Frequently Asked Question # 38 The narcissist’s nearest and dearest end up being victimized by his instability, misleading cues, and counter-dependence (his hatred of authority figures, for instance).

Read more and buy the book(s) Click HERE to Watch the Video By: Dr. Sam Vaknin Malignant Self Love - Buy the Book - Click HERE!!! Relationships with Abusive Narcissists - Buy the e-Books - Click HERE!!! READ THIS: Scroll down to review a complete list of the articles - Click on the blue-coloured text! Question: You describe the narcissist as a cunning, immoral extortionist. Answer: Sooner, or later, everyone around the narcissist is bound to become his victim. Different people are adversely affected by different aspects of the narcissist's life and psychological make-up. There are three categories of victims: Victims of the narcissist's instability The narcissist leads an unpredictable, vicissitudinal, precarious, often dangerous life.

(continued below) There is none. Also Read. A gallery of disruptive technologies. Memetic engineering. The Complete Guide to Not Giving a Fuck. Ok, I have a confession to make. I have spent almost my whole life– 31 years–  caring far too much about offending people, worrying if I’m cool enough for them, or asking myself if they are judging me. I can’t take it anymore. It’s stupid, and it’s not good for my well being. It has made me a punching bag–  a flighty, nervous wuss.

But worse than that, it has made me someone who doesn’t take a stand for anything. It has made me someone who stood in the middle, far too often, and not where I cared to stand, for fear of alienating others. No more. Not today. Today, ladies and gentlemen, is different. We’re going to talk about the cure. Do you wonder if someone is talking shit about you? Well, it’s time you started not giving a fuck. FACT NUMBER 1. Yes, it’s really happening right at this moment. What people truly respect is when you draw the line and say “you will go no further.” Right. Regular people are fine– you don’t actually hear it when they’re talking behind your back. STEP 1. What we learned from 5 million books. Handbook for Life: 52 Tips for Happiness and Productivity.

By Leo Babauta This is something I’ve been wanting to write for some time — a Handbook for Life. Now, is there any handbook that can be a guide to every single person? Of course not. This is just a list of tips that I think will help many people in life — some of them common-sense tips that we often forget about. Consider this guide a reminder. It’ll also become apparent from the links in this handbook that I’ve written about this stuff before. How to use this handbook This handbook is not meant to be a step-by-step guide, nor should you adopt all the tips below. Pick and choose the tips that will be most useful to you. 52 Tips for Happiness and Productivity Try rising early. What Are You Saying Between the Lines?

Antioxidants and Cancer Prevention. International Center Against Abuse of Covert Technologies: What should you do? The Nature of the Self: Experimental Philosopher Joshua Knobe on How We Know Who We Are. By Maria Popova A mind-bending new understanding of our basic existential anchor. “The fate of the world depends on the Selves of human beings,” pioneering educator Annemarie Roeper wrote in her meditation on how poorly we understand the self. Indeed, while philosophers may argue that the self is a toxic illusion and psychologists may insist that it’s forever changing, we tend to float through life anchored by a firm conviction that the self is our sole constant companion. But when psychologist David DeSteno asks “Can the present you trust the future you?” In his fantastic exploration of the psychology of trust, the question leaves us — at least, leaves me — suddenly paralyzed with the realization that the future self is in many ways fundamentally different from the present self.

Our emotions and beliefs and ideals are constantly evolving — Anaïs Nin put it perfectly: “I am a series of moods and sensations. Donating = Loving Brain Pickings has a free weekly newsletter. Share on Tumblr. DNA/Oxidative Stress Marker - Urine - Metametrix Clinical Laboratory. Correlates of Markers of Oxidative Status in the General Population. + Author Affiliations Received July 11, 2000. Accepted January 17, 2001. Abstract Oxidative stress has been implicated in the etiology of many chronic diseases, including cardiovascular disease. However, limited information exists on the factors that may influence oxidative status in the general population. The potential role of free radicals, reactive oxygen species, and antioxidants in the etiology of chronic diseases, including cardiovascular disease, lung disease, cancer, and others, has stimulated extensive research in recent years (1–3). Despite strong biologic plausibility for this hypothesis, establishing a direct link between free radicals and specific disease has been difficult.

The data used here pertained to randomly selected healthy White men (n = 1,065) and women (n = 1,078) aged 35–79 years from the general population of Erie and Niagara counties in western New York. Information on alcohol consumption was elicited with the use of a computer-assisted interview schedule. Four Horsemen - Feature Documentary - Official Version. Anonymous Official Movie - How to Kill the Illuminati/New World Order. (2015 US Edition) | Never Seen on TV. About Pearltrees: FAQs. Nanobiometrics Will Track You By Smell. Nicholas WestActivist Post In a few short years, we already have become accustomed to drone surveillance and an array of biometric ID tracking technology that has formed a pervasive matrix of identification and personal data retention.

As discussed in How Close Are We to a Nano-Based Surveillance State? Back in February of 2011, the next phase of ID will be on the nano scale. DARPA and their contractors have been working for quite a while on making you, not just your personal data, the tracking mechanism. Through a matrix of biological sensors and biometrics, the individual is now set to be tracked, traced and databased with greater frequency and much greater ease. A new announcement from a Spanish engineering firm highlights the direction that is being taken in extracting the most innate personally identifying information possible. Nanotechnology for identification purposes already has been introduced in the following ways, just to name a few: Recently by Nicholas West: Productivity Strategies. Visual Thinking. The NSA Files: PRISM & Boundless Information. Secret Societies.

What FACEBOOK and GOOGLE are Hiding from world. Pearltrees Channel. Human Experimentation Cover-Up : Documentary on Secret Government Experimentation on Americans. Technologies & History of Directed Energy Weapons - Organised Crime of Covert Electronic Assault, Stalking & Surveillance - New Zealand. More on what these victims endure Read the short story below - About what victims endure Pages 1-7.Page 8 onward includes plenty of credible information with directions to the informative links page - to back/up the histories and usages of these tactics etc Re below... The True Story-The Bourne Identity(History Channel) A very informative documentary about the early days of experiments on controlling the human mind and creating assassination with no memory of their killing actions.

The CIA and various government departments carried out these experiments on their own people as well as 1000's of unwitting/non consenting innocent citizens. Terrorism and Mental Health: The issue of psychological fragility(October 2009)Journal of Pakistan Medical AssociationByAmin Muhammad - Clinical professor of Psychiatry Of late, there are reports of a new and dreadful invention of weapons of violence that are called Bio-electromagnetic Weapons. See Amin Muhammad’s biography here Human V2.0CNN (BBC Broadcast) Silent Weapons For Quiet Wars Document - Full Read. Arthur C Clarke - Fractals - The Colors Of Infinity. 3D Fractal Box Menger Box 1 - HD 720p - Mandelbulb 3D anaglyph stereo. Mafia States. The global economic crisis has been a boon for transnational criminals. Thanks to the weak economy, cash-rich criminal organizations can acquire financially distressed but potentially valuable companies at bargain prices. Fiscal austerity is forcing governments everywhere to cut the budgets of law enforcement agencies and court systems.

Millions of people have been laid off and are thus more easily tempted to break the law. Large numbers of unemployed experts in finance, accounting, information technology, law, and logistics have boosted the supply of world-class talent available to criminal cartels. Meanwhile, philanthropists all over the world have curtailed their giving, creating funding shortfalls in the arts, education, health care, and other areas, which criminals are all too happy to fill in exchange for political access, social legitimacy, and popular support. A Revolution in Crime Conventional wisdom about international criminal networks rests on three faulty assumptions. Francesco De Comité | Mathematical Art Galleries.

Optical setup helps researchers hide an event from time. Cloaking devices are one of the inventions of science fiction that have made a few tentative steps towards the real world in recent years. Now, researchers have moved the concept into the fourth dimension, creating a setup that hides a specific point in time from being perceived by observers. But if you want to make an event disappear, you have to act fast: right now, we can only hide a few picoseconds worth of time. The cloaking devices we've made all work based on a similar principle: light that enters the device is bent in such a way that when it exits, its location and direction make it appear that the device itself, and anything within it, were not present. In other words, while within the device, light travels as if it were present.

It's just that, once it exits the other side, there's no evidence that anything unusual has taken place. The same general idea governs the action of a temporal cloaking device. Fifty picoseconds isn't a lot to work with. Revealed: US spy operation that manipulates social media | Technology. The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. The project has been likened by web experts to China's attempts to control and restrict free speech on the internet.

Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme. An Introduction to the fascinating patterns of Visual Math. Visual Understanding Environment. Clustering & Casual Visualization. NSA Devises Radio Pathway Into Computers not connected to the internet. By DAVID E. SANGER and THOM SHANKER WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. No Domestic Use Seen Richard A. A Focus on Defense An Old Technology. How Nsa Uses Radio Frequencies. The 3 rules of a secure cell phone.

Are Drones Watching You? How to see what government agency is spying on your phone. Activist Desire, Cultural Criticism, and the Situationist International. Face Research » Psychology experiments about preferences for faces and voices. Five tips to stay secure despite NSA encryption cracking. NSA TEMPEST Attack can remotely view your computer using radio waves!

Total Surveillance : NSA can use radio waves to spy on your offline computers (Jan 15, 2014) Amy Cuddy: Your body language shapes who you are. How to Win Friends and Influence People by Dale Carnegie. Template Trove. The Morphic Field War. The Camera is Mightier Than The Sword. How to Tap Into Someones Cell Phone | Track PhoneTrack Phone. Optogenetics: A wireless, optical router for your brain. Special Abilities. The Limits of Intelligence.

How to Maximize the Range of Your Radios » Survival and Beyond. Government Secret Societies. Writing. How to Modify an AM Radio to Receive Shortwave Broadcasts » Survival and Beyond. Government Secret Societies. Secret-Internet. How your environment influences you. Classical conditioning. When David Beats Goliath: The Advantage of Large Size in Interspecific Aggressive Contests Declines over Evolutionary Time. How to Make the Most of Your Momentum When Getting Things Done. Get Your ANGRIES Out. 9GAG - Just for Fun! Reward system. Ever Tell Yourself You're In Love With A Deeply Difficult Person Instead Of Facing The Truth? The Oldest Written Melody in History c.1400 BC!!! Manual of Disobedience. Aesthetics. Truth Hurts. 13 more of the coolest hidden Google tricks. Fragrance Pyramid and Perfume Notes : Myth and Reality « Bois de Jasmin. General Perfume Info - The Perfumed Court.

Synergistic Toxicity. Create the Perfect Daily Routine by Layering Four Types of Activities.