#mind control attacks against bradley carl geiger
Explore tagged Tumblr posts
Text
8/15 π^2 r^5
1/2 π^2 r^4
4/3 π r^3
Use the 5th physical dimension and higher to differentiate projections from the surrounding universe.
ATTEMPTS ARE CONSTANTLY BEING MADE TO PORTRAY BRADLEY CARL GEIGER AS MERELY AN AUTOMATED REMOTELY CONTROLLED BODY SO THAT HIS ENERGY SIGNATURE IS VIEWED AS BEING A FALSE PROJECTION AND DISREGARDED.
Attempts are also being made to portray him as an alien invader so that he can (and most of the time, is) be attacked with mind control and sensory replacement weapons, or even have unwitting military members deployed to attempt to kill him.
#detecting projections#soul disguise#partial or complete soul disguise using projections#brad geiger#witness intimidation#evidence tampering#murder#cover up#concealing evidence of crimes#mind control attacks against Bradley Carl Geiger#sensory replacement attacks against Bradley Carl Geiger#mind control attacks against a citizen of the United States of America#mind control attacks against a citizen of the planet Earth#sensory replacement attacks against a citizen of the United States of America#sensory replacement sttacks against a citizen of the planet Earth#IBM#INTERNATIONAL BUSINESS MACHINES#WINDSOR#WILLIAM#WALES#CENTRAL INTELLIGENCE AGENCY#MILITARY INTELLIGENCE OF THE UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND#popularizing search terms through media publishing to multiple venues and sources of media#song names as concepts andbnames related to crime#censored police reports never acted upon or investigated because they have been censored
9 notes
·
View notes
Photo
GAMES PROVIDED FALSE DATA VIA COMMUNICATION OR DATA INJECTION ATTACKS THAT SUGGESTS SOMEONE WAS ALREADY ON THEM OR JUST JOINED OR JUST LEFT
#data injection attacks Cybersecurity#data injection attacks#cybersecurity#data#injection#attacks#brad geiger#Cybersecurity#mind control attacks against bradley carl geiger#sensory replacement attacks against a citizen of the united states of america#terra#earth#geography#games encouraging attacks against those supposedly faking their supposedly authorized and verified and trusted users or players#players#administrators#administrator#emit#technologies#identity fraud and impersonation#english language#fraudulent games portraying themselves and their users or players as trustworthy and time travel crime#time travel crime#time traveling criminals#whitetail cybersecurity
220K notes
·
View notes