General Fully Exposed


Channel's geo and language: USA, English
Category: Politics


General Fully Exposed exposes child sex trafficking while leading those in darkness to the Way, Truth, and Life - Jesus Christ.
๐™’๐™š ๐™๐™๐™š ๐™‹๐™š๐™ค๐™ฅ๐™ก๐™š of ๐™‚๐™ค๐™™'๐™จ ๐˜ผ๐™ง๐™ข๐™ฎ

Related channels  |  Similar channels

Channel's geo and language
USA, English
Category
Politics
Statistics
Posts filter


Video is unavailable for watching
Show in Telegram
Island Beach, NJ 1/23/2025

Dior Bags = Drones

(Dior Bags to get around tiktok i.e. govt censorship)


Video is unavailable for watching
Show in Telegram
Orb transforms into a drone on camera


Video is unavailable for watching
Show in Telegram
Orbs are transforming into drones


Video is unavailable for watching
Show in Telegram


Video is unavailable for watching
Show in Telegram


Video is unavailable for watching
Show in Telegram
Trump has a warm spot in his heart for one of the social media apps that spy on civilians for the government- Tiktok


Forward from: HISTORY
Video is unavailable for watching
Show in Telegram
An audio recording has emerged in which Clifton Carter, a former DNC executive director and close associate of Lyndon B. Johnson, allegedly implicates LBJ in the a*sassination of JFK.

The recording suggests that Johnson orchestrated the plot, hiring Mac Wallace to carry out the assassination.

The timing of this release is unusual, given that Trump is expected to declassify the entire JFK files.

Before his untimely death, JFK was working to have AIPAC register as a foreign agent.

This new theory shifts the blame from Israel and places it on LBJ.

Join us: HISTORY ๐Ÿ“œ


Did you notice which social media companies are listed as SPYING on us? And which one, is not listed?

In case you missed it, Tiktok, Facebook, X, all spy on us for the government, but Telegram is not listed.

๐Ÿ˜Š


Here is a comprehensive list of entities, both public (government agencies) and private (companies), known or reported to monitor civilian internet use. Note that the level of monitoring, legal frameworks, and transparency around these activities can vary significantly:

Government Agencies:

United States:
National Security Agency (NSA)
Federal Bureau of Investigation (FBI)
Central Intelligence Agency (CIA)
Department of Homeland Security (DHS)
Cybersecurity and Infrastructure Security Agency (CISA)
Defense Intelligence Agency (DIA)
U.S. Army Cyber Command (ARCYBER)
Naval Criminal Investigative Service (NCIS)
Air Force Office of Special Investigations (AFOSI)
Drug Enforcement Administration (DEA)
Immigration and Customs Enforcement (ICE)
United Kingdom:
Government Communications Headquarters (GCHQ)
Metropolitan Police Service (Cyber Crime Unit)
Other Countries (Examples):
Russia's Federal Security Service (FSB)
China's Ministry of Public Security (MPS) and Cyberspace Administration of China (CAC)
Israel's Unit 8200
Germany's Federal Office for the Protection of the Constitution (BfV)
Iran's Cyber Police (FATA)
Australia's Australian Signals Directorate (ASD)

Private Entities:

Technology Companies:
Google (Alphabet Inc.)
Meta (formerly known as Facebook)
X Corp (formerly Twitter)
Apple
Microsoft
Amazon (including AWS)
Yahoo
LinkedIn (Microsoft)
TikTok (ByteDance)
Snapchat
Reddit
Internet Service Providers (ISPs):
Verizon
AT&T
Comcast
Charter Communications (Spectrum)
T-Mobile
Cox Communications
Data Brokers and Analytics Firms:
Acxiom
Experian
Equifax
Oracle (BlueKai)
Epsilon
LexisNexis
Surveillance and Cybersecurity Companies:
Team Cymru (with services like Augury)
Palantir Technologies
Verint Systems
WebIntPro
Semptian (China, with Aegis)
Hacking Team (Italy)
NSO Group (with Pegasus spyware)
Gamma Group (FinFisher)
DarkMatter (UAE)
Cellebrite (Israel)
Ad Tech Companies:
DoubleClick (Google)
AppNexus (AT&T)
The Trade Desk
Criteo
Social Media Monitoring Services:
Dataminr
Brandwatch
Hootsuite Insights
Sprinklr
VPN and Proxy Service Providers (when not privacy-focused):
Some VPNs might log user data or comply with government requests, though this varies significantly by provider.
Telecommunications Equipment Providers:
Huawei (often cited in surveillance discussions, particularly in China)
Cisco Systems

This list is indicative rather than definitive, as new companies might emerge, others could change practices, or the involvement of certain entities might be less public. Also, the extent of monitoring can range from passive data collection for marketing to active surveillance for intelligence purposes. Remember, privacy policies, legal requirements, and international jurisdictions play significant roles in how these entities operate.


Grok names agencies that monitor the internet for civilian interaction.


Here are some government agencies and private entities known to monitor internet activity for civilian interaction:

Government Agencies:

National Security Agency (NSA): Known for programs like PRISM, which collects internet communications from various U.S. internet companies.

Federal Bureau of Investigation (FBI): Utilizes social media surveillance for investigations, often without a showing of criminal activity. They also have programs like InfraGard, where businesses report suspicious activities.

Department of Homeland Security (DHS): Operates multiple surveillance programs, including monitoring social media for various purposes like threat assessment and immigration screening.

Central Intelligence Agency (CIA): Engages in intelligence gathering, which can include internet surveillance, particularly on foreign targets but can involve U.S. persons' data incidentally.

Cybersecurity and Infrastructure Security Agency (CISA): Part of DHS, CISA focuses on cybersecurity, which includes monitoring internet threats that could affect infrastructure.

Private Entities:

Google: As one of the largest internet companies, Google collects vast amounts of data from users' interactions across its services. They have been part of government surveillance programs like PRISM.

Facebook (Meta): Similar to Google, with extensive data collection through its social platforms. It has also been involved in government requests for data.

Twitter (X Corp): Known for compliance with government requests for data, especially highlighted in discussions around censorship and surveillance.

Amazon: Through services like AWS, Amazon can monitor or log user data for security or compliance reasons, and it has been involved in government data requests.

Verizon: As an ISP, Verizon can monitor internet traffic and has been mentioned in relation to NSA surveillance activities.
Data Brokers: Entities like Acxiom or Experian collect and sell consumer data, which can be used by government agencies or other private companies for monitoring purposes.

Surveillance Software Companies: Companies like Verint and WebIntPro sell surveillance technologies to governments around the world for monitoring social media and internet activity.


This list isn't exhaustive, but it covers some of the key players in internet surveillance of civilian interactions. Remember, the extent of monitoring by these entities can vary based on legal frameworks, privacy policies, and the nature of the data collected or shared.


Grok sets the record straight on Space Force's cyber operations.


The U.S. Space Force is involved in various aspects of cyberspace operations, but its primary focus is on space domain awareness, satellite operations, and ensuring secure communications. Here's how this relates to internet monitoring:

Cybersecurity and Defense: The Space Force has units like the 645th Cyberspace Squadron, which focuses on defensive cyber operations to protect assets like the Eastern Range, ensuring access to space. This involves safeguarding military networks, which indirectly includes monitoring for cyber threats to these networks but not general internet monitoring for civilian purposes.

Digital Vision: The Space Force has expressed a vision to become a "Digital Service" with an emphasis on accelerating innovation through digital means. This involves improving data integration, decision-making speed, and using technologies like AI and machine learning for operations, particularly in the realm of space domain awareness rather than broad internet surveillance.

Space Surveillance Network (SSN) Upgrades: There's an ongoing effort to modernize the SSN, which includes improving data integration and communication systems. However, this network is geared towards tracking space objects and missile launches, not monitoring internet traffic.

Posts on X: There are mentions from posts on X suggesting that some believe the Space Force monitors everything online, but these should be taken with caution as they represent individual opinions or possibly misinformation rather than factual evidence of Space Force activities.

In summary, while the U.S. Space Force does engage in cyberspace operations, these are primarily defensive, aimed at protecting space assets and ensuring secure military communications rather than monitoring the general internet. Public information does not support the notion that Space Force routinely monitors civilian internet activity. However, without access to classified information, the full scope of any intelligence operations remains speculative.


If Space Force monitors the internet, why don't they capture online scammers who prey on the elderly?

Space Force acts just like cameras on the streets and highways. They're good for NOTHING!

#nothereforus




Don't look back and don't get attached.


Last year, around this time, i was working with three men who made it so difficult for me to get what I deserve.

This year, I'm working with three new men who gladly give me what I deserve and more!

God has been so good to me.

It has been a rocky road full of ups and downs, and working through mending my broken heart that was betrayed by men i was loyal to, but God is restoring everything anew.

Never retaliate. Never repay evil for evil. Just stay faithful and let God work it out for you. His ways are the best, and you have no idea what He has planned for you to prosper.

(I am feeling very sad as I look back over the past few years and the changes that's transpired, and as I look for a way to minimize the pain, God reminds me of what's transpiring and the bright future He has planned... it was all according to His plan... to show the secrets hidden in the hearts and minds of men).


Forward from: The General
Video is unavailable for watching
Show in Telegram
BREAKING: The FBI and DHS have raided the offices of Joseph Flynn, a prominent immigration lawyer in Providence, Rhode Island, a designated sanctuary city.

@GeneralMCNews


Video is unavailable for watching
Show in Telegram
JFK, RFK, and MLK Jt. assassination files declassified.


Video is unavailable for watching
Show in Telegram
WEF in complete meltdown at Davos.

"Trump has won, and we have lost"


Forward from: US Debt Clock
BREAKING: Donald Trump has redirected $2 billion previously designated for illegal immigrants to provide support for the people of North Carolina.

Follow: US Debt Clock โฐ


Younger sister of Sam Altman accused of sexually abusing his younger sister Annie Altman

https://www.lesswrong.com/posts/QDczBduZorG4dxZiW/sam-altman-s-sister-annie-altman-claims-sam-has-severely

20 last posts shown.