Many people in the U.S. still struggle to pay bills — even for something as basic as food.
One in five American teachers now works a second job on top of full-time teaching.
Doctors and scientists increasingly suspect attacks with microwave weapons are the cause of the mysterious ailments that have stricken more than three dozen American diplomats and family members in Cuba and China.
Any country not under economic attack from the US will soon be the exception.
Reports of people being berated or attacked while communicating in the world’s second most spoken language are on the rise.
The settlers claimed their antipathy for slavery contrasted them from the rest of the world, especially their colonial competitor Spain, already infamous for working Native Americans to death. Yet after the Pequot War of 1637, Puritans shipped captured Pequots to bondage in a small Puritan community on the coast of Nicaragua called Providence Island.
Facebook is increasing its lobbying presence in Washington DC.
The US Department of State wants to ask visa applicants to provide details on the social media accounts they've used in the past five years, as well as telephone numbers, email addresses, and international travel during this period.
Russian nobles invented many of the same kinds of racial arguments to defend serfdom that American slave-owners used to justify slavery.
Millions of Americans get tests, drugs, and operations that won’t make them better, may cause harm, and cost billions.
Nearly half of US arms exports over the past five years have gone to the war-stricken Middle East.
Willis Hawley and Reed Smoot have haunted Congress since the 1930s when they were the architects of the Smoot-Hawley tariff bill, among the most decried pieces of legislation in US history and a bill blamed by some for not only for triggering the Great Depression but also contributing to the start of the second world war.
Shocking hygiene failings have been discovered in some of the US’s biggest meat plants, as a new analysis reveals that as many as 15% (one in seven) of the US population suffers from foodborne illnesses annually.
Livestock raised for food in the US are dosed with five times as much antibiotic medicine as farm animals in the UK. The difference in rates of dosage rises to at least nine times as much in the case of cattle raised for beef, and may be as high as 16 times the rate of dosage per cow in the UK. There is currently a ban on imports of American beef throughout Europe, owing mainly to the free use of growth hormones in the US.
The Department of Homeland Security uses facial recognition to ensure people haven’t overstayed their visas. But according to a report by the Center on Privacy and Technology at Georgetown University, that can end up violating the privacy of American citizens.
The problem for the FBI, and others of a similar mind, is that there isn't some rainbow unicorn software solution to implementing a cops-only backdoor in secure end-to-end or storage encryption. The finest minds in cryptography – and the NSA – are united on this score. It's mathematically impossible to introduce an encryption backdoor that only law enforcement can find and use.
With device searches at American border crossings reaching an all-time high, the US Customs and Border Patrol (CBP) this week tightened its rules for when agents can pull data from phones and computers.
Trump’s indifference to the printed word has been apparent for some time, the depth and implications of Trump’s strong preference for oral communication over the written word demand closer examination.
The US Department of Homeland Security (DHS) has confirmed a major privacy leak affecting nearly a quarter of a million employees as well as others associated with departmental investigations.
The Department of Justice (DoJ) has indicted three Chinese nationals who allegedly worked indirectly for their government to steal hundreds of gigabytes of highly sensitive corporate data from Siemens, Moody’s Analytics and GPS firm Trimble. The co-conspirators sought to conceal their activities, location and affiliation by using aliases in registering online accounts, intermediary computer servers known as ‘hop points’ and valid credentials stolen from victim systems.