Connect With Us

“Hot news, cold truths, utterly uncensored.” —Greg Palast
“[Censored] offers devastating evidence of the dumbing-down of main-stream news in America. . . . Required reading for broadcasters, journalists, and well-informed citizens.” —Los Angeles Times
“Censored 2014 is a clarion call for truth telling. Not only does this volume highlight fearless speech in fateful times, it connect the dots between the key issues we face, lauds our whistleblowers and amplifies their voices, and shines light in the dark places of our government that most need exposure.” –Daniel Ellsberg, The Pentagon Papers
“The staff of Project Censored presents their annual compilation of the previous year’s 25 stories most overlooked by the mainstream media along with essays about censorship and its consequences. The stories include an 813% rise in hate and anti-government groups since 2008, human rights violations by the US Border Patrol, and Israeli doctors injecting Ethiopian immigrants with birth control without their consent. Other stories focus on the environment, like the effects of fracking and Monsantos GMO seeds. The writers point out misinformation and outright deception in the media, including CNN relegating factual accounts to the “opinion” section and the whitewashing of Margaret Thatcher’s career following her death in 2013, unlike Hugo Chavez, who was routinely disparaged in the coverage following his death. One essay deals with the proliferation of “Junk Food News,” in which “CNN and Fox News devoted more time to ‘Gangnam Style’ than the renewal of Uganda’s ‘Kill the Gays’ law.” Another explains common media manipulation tactics and outlines practices to becoming a more engaged, free-thinking news consumer or even citizen journalist. Rob Williams remarks on Hollywood’s “deep and abiding role as a popular propaganda provider” via Argo and Zero Dark Thirty. An expose on working conditions in Chinese Apple factories is brutal yet essential reading. This book is evident of Project Censored’s profoundly important work in educating readers on current events and the skills needed to be a critical thinker.” -Publisher’s Weekly said about Censored 2014 (Oct.)
“Project Censored continues to be an invaluable resource in exposing and highlighting shocking stories that are routinely minimized or ignored by the corporate media. The vital nature of this work is underscored by this year’s NSA leaks. The world needs more brave whistle blowers and independent journalists in the service of reclaiming democracy and challenging the abuse of power. Project Censored stands out for its commitment to such work.” —Deepa Kumar, author of Islamophobia and the Politics of Empire and associate professor of Media Studies and Middle Eastern Studies at Rutgers University
“Activist groups like Project Censored . . . are helping to build the media democracy movement. We have to challenge the powers that be and rebuild media from the bottom up.” —Amy Goodman
“For ages, I’ve dreamed of a United States where Project Censored isn’t necessary, where these crucial stories and defining issues are on the front page of the New York Times, the cover of Time, and in heavy rotation on CNN. That world still doesn’t exist, but we always have Project Censored’s yearly book to pull together the most important things the corporate media ignored, missed, or botched.” –Russ Kick, author of You Are Being Lied To, Everything You Know Is Wrong, and the New York Times bestselling series The Graphic Canon.
“One of the most significant media research projects in the country.” —I. F. Stone
“Those who read and support Project Censored are in the know.” —Cynthia McKinney
“[Censored] should be affixed to the bulletin boards in every newsroom in America. And, perhaps read aloud to a few publishers and television executives.” —Ralph Nader
Buy it, read it, act on it. Our future depends on the knowledge this col-lection of suppressed stories allows us.” —San Diego Review
“Project Censored brings to light some of the most important stories of the year that you never saw or heard about. This is your chance to find out what got buried.” –Diane Ravitch, author of The Death and Life of the Great American School System.
“Project Censored interrogates the present in the same way that Oliver Stone and I tried to interrogate the past in our Untold History of the United States. It not only shines a penetrating light on the American Empire and all its deadly, destructive, and deceitful actions, it does so at a time when the Obama administration is mounting a fierce effort to silence truth-tellers and whistleblowers. Project Censored provides the kind of fearless and honest journalism we so desperately need in these dangerous times.” —Peter Kuznick, professor of history, American University, and coauthor, with Oliver Stone, of The Untold History of the United States
“In another home run for Project Censored, Censored 2013 shows how the American public has been bamboozled, snookered, and dumbed down by the corporate media. It is chock-full of ‘ah-ha’ moments where we understand just how we’ve been fleeced by banksters, stripped of our civil liberties, and blindly led down a path of never-ending war.” –Medea Benjamin, author of Drone Warfare, cofounder of Global Exchange and CODEPINK.
“Most journalists in the United States believe the press here is free. That grand illusion only helps obscure the fact that, by and large, the US corporate press does not report what’s really going on, while tuning out, or laughing off, all those who try to do just that. Americans–now more than ever–need those outlets that do labor to report some truth. Project Censored is not just among the bravest, smartest, and most rigorous of those outlets, but the only one that’s wholly focused on those stories that the corporate press ignores, downplays, and/or distorts. This latest book is therefore a must read for anyone who cares about this country, its tottering economy, and–most important– what’s now left of its democracy.” –Mark Crispin Miller, author, professor of media ecology, New York University.
“Project Censored is one of the organizations that we should listen to, to be assured that our newspapers and our broadcasting outlets are practicing thorough and ethical journalism.” —Walter Cronkite
“At a time when the need for independent journalism and for media outlets unaffiliated with and untainted by the government and corporate sponsors is greater than ever, Project Censored has created a context for reporting the complete truths in all matters that matter. . . . It is therefore left to us to find sources for information we can trust. . . . It is in this task that we are fortunate to have an ally like Project Cen-sored.” —Dahr Jamail
“Project Censored shines a spotlight on news that an informed public must have . . . a vital contribution to our democratic process.” —Rhoda H. Karpatkin, president, Consumer’s Union

3. Internet Privacy and Personal Access at Risk

Following in the steps of its predecessor, the Obama administration is expanding mass government surveillance of personal electronic communications. This surveillance, which includes the monitoring of the Internet as well as private (nongovernmental) computers, is proceeding with the proposal or passage of new laws granting government agencies increasingly wider latitude in their monitoring activities. At the same time, private companies and even some schools are engaging in surveillance activities that further diminish personal privacy.

Student Researchers:

  • Lynn DemosBen Solomon, Steve Wojanis, Trisha Himmelein, Emily Schuler, Claire Apatoff, Erin Kielty, and Tom Rich (DePauw University)
  • Alyssa Auerbach, Tyler Head, Mira Patel, Andrew Nassab, and Cristina Risso (Sonoma State University)

Faculty Evaluators:

  • Jeff McCall, Dave Berque, Brian Howard, and Kevin Howley (DePauw University)
  • Jimmy Dizmang (University of San Diego)
  • Noel Byrne and Kelly Bucy (Sonoma State University)
  • Mickey Huff (Diablo Valley College)

In spring 2009, Senate Bill 773, the Cybersecurity Act of 2009, was proposed, which gives the president power to “declare a cyber security emergency” with respect to private computer networks, and to do with these networks what it deems necessary to diffuse the attack. In a national emergency, the president would also have the power to completely shut down the Internet in the US. The proposal requires that certain private computer systems and networks be “managed” by “cyberprofessionals” licensed by the federal government. The bill permits the president to direct the national response to the cyber threat if necessary for national defense and security; to conduct “periodic mapping” of private networks deemed to be critical to national security; and to require these companies to “share” information requested by the federal government.

Such steps toward increased control over private computer networks have been taken amid an ongoing program of mass surveillance begun by the George W. Bush administration supposedly in response to the attacks of September 11, 2001. In January 2002, the Defense Advanced Research Projects Agency (DARPA) established the Information Awareness Office (IAO) to “imagine, develop, apply, integrate, demonstrate and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness.” Under the Bush administration, such surveillance technology was developed and subsequently deployed through major US telecommunication and Internet service providers (ISPs) to conduct mass, warrantless dragnets of all domestic and international electronic traffic passing through switches in the US. This technology includes so-called “deep packet inspection” (DPI) technology, which employs sophisticated algorithms to parse all Internet contents (data, voice, and video), searching for key words such as “rebel” or “grenade.”

Presently no legislation exists that disallows use of such technology to conduct mass, warrantless surveillance. In fact, in January 2009, as David Karvets reported in Wired, the Obama administration sided with the Bush administration by asking a federal judge to set aside a ruling that kept alive a lawsuit challenging the Bush administration’s authority to eavesdrop on Americans without warrants. Moreover, amendments to the Foreign Intelligence Surveillance Act (FISA) passed in 2008—and voted for by then Senator Obama—had already made it possible for the federal government to conduct such information dragnets without warrants. The 2008 FISA amendments also require electronic communication service providers such as AT&T and Verizon to “immediately provide the Government with all information, facilities, or assistance necessary to accomplish the [intelligence] acquisition,” while granting these companies retroactive and prospective immunity against civil suits, state investigations, and criminal prosecution.

In addition, in April 2009, the Obama Justice Department invoked the “state secrets privilege” to bar American citizens from suing the US government for illegally spying on them. It also went even further than the Bush administration by arguing that the US government is completely immune from litigation for illegal spying and can never be sued for surveillance that violates federal privacy laws.

The federal government is also presently increasing its capacity to analyze the massive sea of data on the Internet. As part of an effort to gather more “open source intelligence,” the Central Intelligence Agency (CIA) is investing in Visible Technologies, a data-mining company that analyzes the content of social media Web sites. Visible Technologies, which has offices in New York, Seattle, and Boston, was created in 2005, and in 2006 it developed a partnership with WPP, a worldwide communications firm. This company has the capacity to examine over half a million sites per day.

The Federal Bureau of Investigation (FBI) has also resorted to using federal court subpoenas to try to gain access to private, online information. On January 30, 2009, IndyMedia, an alternative online news source, received a subpoena from the Southern District of Indiana Federal Court for the “IP addresses, times, and any other identifying information” of all the site’s visitors on June 25, 2008. IndyMedia was then prohibited from notifying visitors of this release of otherwise private and protected information because disclosure “would impede the investigation being conducted and thereby interfere with the enforcement of the law.” IndyMedia and the Electronic Frontier Foundation (EFF) challenged the order and the subpoena was eventually dropped.

The Obama administration is also currently working with a group of UN nations on the development of the Anti-Counterfeiting Trade Agreement (ACTA), “a new intellectual property enforcement treaty” to prevent illegal downloading and copying of songs, movies, pictures, and other legally protected Web content. The new law is being developed in secrecy and might allow government access to personal content on hard drives thought to be in breach of copyright. On November 3, 2009, nations participating in negotiations on the proposed law met in Seoul, South Korea, for a closed discussion of “enforcement in the digital realm.” According to a leaked memo from the conference, the US is pushing for a three-strikes/graduated-response policy and proactive policing of ISPs to ensure that any digital copyright infringements are caught, stopped, and punished.

In addition to the current trend of government surveillance, private employers are also reading employees’ e-mails, eavesdropping on their telephone calls, monitoring their Internet access, and watching them through the use of hidden cameras. Millions of workers carry company-issued cell phones, which are equipped with a global positioning system (GPS). The technology required to track cell phones is inexpensive (costing only five dollars per month for round-the-clock surveillance of an employee) and is readily available.

Company-issued laptops are also being monitored. Companies usually permit their employees to use such computers for personal purposes as well as for business. However, unbeknownst to the employees, all their private files (such as e-mails, photographs, and financial records) are being inspected by company techs when the computers are brought in for upgrades or repairs. Consequently, anything the techs deem questionable can be disclosed to management. Further, if the company-issued laptop has a webcam, the employer can use it to eavesdrop on the employee, even if he or she is in the bathroom.

Such clandestine use of computer webcams has not been limited to private companies spying on their employees. In one recent case, a suburban Philadelphia school district issued laptops to its students and secretly installed software that allowed school administrators to spy on the students.

As electronic surveillance technologies continue to improve, in the absence of laws to regulate their use and government watchdogs to ensure that these laws are followed, privacy in the digital age will predictably continue to decline.

Update by Liz Rose at Free Press

Deep packet inspection is a technology that gives corporations unprecedented control over Internet communications. It’s the same technology that allows Iran and other countries to try to stifle Internet freedom. The use of DPI is now pervasive and has spread to next-generation wireless networks. In this country, the adoption of DPI means that the telephone and cable companies that provide Internet service can monitor, inspect, and block Internet traffic, posing a serious threat to the open Internet.

There are two major developments in this story:

  1. Major telecommunications companies (including Verizon, Comcast, AT&T, RCN, and COX) have now purchased DPI technology. Because of this investment, and because the technology has now been applied to wireless communications, the industry’s control over the Internet is increasing. The latest generation of DPI enables companies to monitor and ultimately to charge people for every use of an Internet connection.Free Press filed ten pages of comments with the Federal Communications Commission (FCC) about DPI. See pages 141 to 151 of our comments in the Net Neutrality proceeding on January 14, 2010 ( Free Press also released a paper titled “Deep Packet Inspection: The End of the Internet as We Know It” by Josh Silver, in March 2009, before the Democracy Now! story, “Deep Packet Inspection: Telecoms Aided Iran Government to Censor Internet Technology Widely Used in US,” ran, and it provides evidence of the threat posed by corporations having the power to inspect, block, and choke traffic on the Internet: (see _The_End_of _the_Internet_As_We_Know_It.pdf).
  2. On April 6, 2010, a federal court ruled that the FCC does not have the authority under the jurisdiction that it claimed to stop Comcast—or any company—from blocking or choking Internet traffic. So right now, there is no recourse when a company does abuse its power over online communications. The FCC has indicated that it may move ahead and try to reassert its authority to set rules of the road for the Internet, but most observers think it will be a long battle ahead over the jurisdictional issues as well as over any possible rules.


Josh Silver, “Deep Packet Inspection: Telecoms Aided Iran Government to Censor Internet, Technology Widely Used in US,” Democracy Now!, June 23, 2009,­_packet_inspection_telecoms_aided_iran.

David Karvets, “Obama Sides With Bush in Spy Case,” Wired, January 22, 2009,

Kim Zetter, “Deep-Packet Inspection in U.S. Scrutinized Following Iran Surveillance,” Wired, June 29, 2009,

Declan McCullagh, “Bill Would Give President Emergency Control of Internet,” CNET News, August 28, 2009,

Kevin Bankston, “From EFF’s Secret Files: Anatomy of a Bogus Subpoena,” Electronic Frontier Foundation, November 9, 2009,

Gwen Hinze, “Leaked ACTA Internet Provisions: Three Strikes and Global DMCA,” Electronic Frontier Foundation, November 3, 2009, 2009/11/leaked-acta-internet-provisions-three-strikes-and-.

Michael Geist, “The ACTA Internet Chapter: Putting the Pieces Together,” Michael Geist Blog, November 3, 2009,

Tim Jones, “In Warrantless Wiretapping Case, Obama DOJ’s New Arguments Are Worse Than Bush’s,” Electronic Frontier Foundation, April 7, 2009,

Steve Aquino, “Should Obama Control the Internet,” Mother Jones, April 2, 2009,

Noah Shachtman, “U.S. Spies Buy Stake in Firm that Monitors Blogs, Twitter,” Wired, October 19, 2009,

Noah Shachtman, “CIA Invests in Software Firm Monitoring Blogs, Twitter,” Democracy Now!, October 22, 2009, _software_firm_monitoring.

Lewis Maltby, “Your Boss Can Secretly Film You in the Bathroom—The Countless Ways You Are Losing Privacy at Work,” AlterNet, March 17, 2010,—_the_countless_ways_you _are_losing_privacy_at_work.

Elliot D. Cohen, Mass Surveillance and State Control: The Total Information Awareness Project (New York: Palgrave Macmillan, 2010).

Corporate Media Sources:

Rob Pegoraro, “Copyright Overreach Goes on World Tour,” Washington Post, November 5, 2009, financial sec., G01.

Facebook Comments