Contact Us

You can contact Censorship in America by using the contact form below.

If you are submitting information to become a contributor to our site, please include the word “Contributor” in the first line of the message body on this form.

Advertisements
3 comments on “Contact Us
  1. curtisneeley says:

    http://www.curtisneeley.com/Google/Booklet-Complaint.htm
    Regulation and censorship of the Internet by the FCC is demanded to be done as required by the Communications Act of 1934 and ignored because FCC v Pacifica was misinterpreted from the 1978 ruling followed by the moronic ruling of ACLU v Reno in 1996. One Justice was on the Supreme Court for each SCOTUS case.

  2. philip_wikel says:

    They Don’t Kill Artists Anymore, They Just Steal Their Money http://t.co/Ewd6kb03mV

  3. BJ Hutton says:

    ‘Smite’

    ASIS INTELLIGENCE – SABOTAGE DIGITAL EQUIVALENCY TO TREASON, GOVERN BY FOREIGN MP

    Prologue –

    BJ HuttonPeripheral Cyber tech War, is an active component taken to battle, within many nations.

    Privacy targeting, has been a focus point of political, legal and media cased discussions of recent years, thus surrounding ‘Unwarranted’ intrusion and ‘Targeting’ in breaches of ‘Act’, ‘Citizens’.

    Legal peripherals linked below surround the ‘FBI Intelligence Spy’ and ‘CBS Reporter’, of recent affirmed fact to these practices and types of people targeted are the ‘Logical Citizens’ and ‘Controversial Article Writers’, be media associated (paid) and or novice (freedoms of interest).

    Civilians, have been the subject of these ‘Terrorist smite attacks’, an assortment of ‘Digital’ and ‘Physical’, ‘Torment’ and ‘Touchier’, this the everyday psych bombardment.

    This is / was to be dished-out, via use of tactical ‘Sabotage’ to levels end of ‘Treason’, by division and groups, allocated with or without authority to ‘Profile’, selected individuals, to protect salesmanship.

    The aim of this given authority, is to target digital peripheral (computers, mobiles, tablets, websites and emailing) with protocol sanctions, and to inhibit these ‘Citizens’, in ‘Freedom of Liberty and Rights’.

    To financially inhibit, where there is opportunity given, thus is the secondary goal.

    Read Full:
    http://wp.me/yXVp

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Enter your email address to follow this blog and receive notifications of new posts by email. You have full control over the frequency of emails you receive, and you can unsubscribe at any time. We will NOT share your email address with anyone, ever!

Join 739 other followers

Member of The Internet Defense LeagueBloggers' Rights at EFF
%d bloggers like this: