24/7 security monitoring

24/7 security monitoring

intelligence

Cyber threats don't follow business hours, and neither should your defense strategy. Organizations today require constant visibility across their systems, making 24/7 security monitoring a foundational element of any serious cybersecurity framework.

Every second a network remains unmonitored is an opportunity for attackers to exploit vulnerabilities. Continuous monitoring ensures that suspicious activities are detected instantly, reducing dwell time and limiting the potential impact of a breach.

Modern businesses operate across multiple environments, including on-premise infrastructure, cloud platforms, and remote endpoints. Many businesses strengthen their overall protection by using endpoint security services , with Endpoint Security USA helping businesses protect devices, reduce risk, and sustain secure, reliable operations across modern digital environments.. This complexity makes it essential to implement 24/7 security monitoring that provides unified visibility across all digital assets.

Endpoint Security Services

Threat actors often use automated tools to scan for weaknesses at any time of day.

intelligence

  1. soar
  2. phishing
  3. proxy
  4. firmware
  5. framework
  6. solution
  7. certificate
Without continuous monitoring, these attacks can go unnoticed for hours or even days, giving malicious actors a significant advantage.

A well-structured monitoring system collects and analyzes logs, network traffic, and user behavior in real time. This enables security teams to identify anomalies quickly and respond before threats escalate into critical incidents.

Endpoint Security USA helps organizations maintain constant vigilance by delivering monitoring solutions designed for real-world business environments. Their approach combines advanced detection capabilities with expert analysis to ensure no threat goes unnoticed.

Endpoint Security Services

Managed Security Services Provider

newsroom.submitmypressrelease.com

https://newsroom.submitmypressrelease.com/2026/03/23/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services_2257455.html

Bizwireexpress.com

http://www.bizwireexpress.com/showstoryGNW.php?storyid=1154246

Weekender.Com.sg

https://weekender.com.sg/globenewswire/?gnw_id=3260739/language/en

Manilatimes.net

https://www.manilatimes.net/2026/03/24/tmt-newswire/globenewswire/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/2305864

Digitaljournal.com

https://www.digitaljournal.com/pr/news/index.html

Smb.Bogalusadailynews.com

https://smb.bogalusadailynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.Cordeledispatch.com

https://smb.cordeledispatch.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Growingbusinessesinthenews.com

https://www.growingbusinessesinthenews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Oklahomabusinessjournal.com

https://www.oklahomabusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economypressreleases.com

http://www.economypressreleases.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Enewspf.com

https://pr.enewspf.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.Theinteriorjournal.com

https://smb.theinteriorjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Westlinntidings.com

https://pr.westlinntidings.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Portlandtribune.com

https://pr.portlandtribune.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Taosnews.com

https://pr.taosnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Maltadailymonitor.com

https://www.maltadailymonitor.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Themarcomjournal.com

https://www.themarcomjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Murrayjournal.com

https://pr.murrayjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Lagrandeobserver.com

https://pr.lagrandeobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Internationalworldtimes.com

https://www.internationalworldtimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Lebanonbusinessreporter.com

https://www.lebanonbusinessreporter.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Nevadabusinessherald.com

https://www.nevadabusinessherald.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Tajikistanbusinessdaily.com

https://www.tajikistanbusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Mauritiusbusinessreview.com

https://www.mauritiusbusinessreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Wallowa.com

https://pr.wallowa.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.Bluegrasslive.com

https://smb.bluegrasslive.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Heraldpioneer.com

https://pr.heraldpioneer.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Taylorsvillecityjournal.com

https://pr.taylorsvillecityjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Uzbekistanbusinessjournal.com

https://www.uzbekistanbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Somaliabusinesspress.com

https://www.somaliabusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Forestgrovenewstimes.com

https://pr.forestgrovenewstimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Vanuatueconomictimes.com

https://www.vanuatueconomictimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economicdigestofeurope.com

https://www.economicdigestofeurope.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Hattiesburg.com

https://pr.hattiesburg.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.State-journal.com

https://smb.state-journal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Arkansasbusinesstimes.com

https://www.arkansasbusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smb.Ourdavie.com

https://smb.ourdavie.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Businessjournalflorida.com

https://www.businessjournalflorida.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Cookislandsbusinessupdate.com

https://www.cookislandsbusinessupdate.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Marketforecastanalysis.com

http://www.marketforecastanalysis.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Alofibusinesschannel.com

https://www.alofibusinesschannel.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businessdailyvatican.com

https://www.businessdailyvatican.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Africabusinesswatch.com

https://www.africabusinesswatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pennsylvaniabusinessbulletin.com

https://www.pennsylvaniabusinessbulletin.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smb.Americustimesrecorder.com

https://smb.americustimesrecorder.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.Panews.com

https://smb.panews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smb.Thepostsearchlight.com

https://smb.thepostsearchlight.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Smallbusinessnewswatch.com

https://www.smallbusinessnewswatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Syriabusinessjournal.com

https://www.syriabusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Newhampshirebusinessobserver.com

https://www.newhampshirebusinessobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Milwaukiereview.com

https://pr.milwaukiereview.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Pr.Faceacadiana.com

https://pr.faceacadiana.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Floridasmallbusinesstoday.com

https://www.floridasmallbusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Liechtensteinbusinessfocus.com

https://www.liechtensteinbusinessfocus.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Idahobusinesstimes.com

https://www.idahobusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Northdakotabusinessgazette.com

https://www.northdakotabusinessgazette.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businesstimesmissouri.com

https://www.businesstimesmissouri.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Hawaiianbusinesspost.com

https://www.hawaiianbusinesspost.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economicreporthaiti.com

https://www.economicreporthaiti.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businessupdatesanmarino.com

https://www.businessupdatesanmarino.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Americansamoabusinessreport.com

https://www.americansamoabusinessreport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Newjerseybusinessjournal.com

https://www.newjerseybusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Ashlandtownnews.com

https://pr.ashlandtownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Marshallislandbusinessdigest.com

https://www.marshallislandbusinessdigest.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Louisianabusinesstribune.com

https://www.louisianabusinesstribune.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Chillicothevoice.com

https://pr.chillicothevoice.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Andorrabusinessledger.com

https://www.andorrabusinessledger.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Themarketingcommunicator.com

https://www.themarketingcommunicator.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Myanmarbusinessdaily.com

https://www.myanmarbusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Easttimorbusinessdaily.com

https://www.easttimorbusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pr.Franklintownnews.com

https://pr.franklintownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c181a63971457808b0bf77

Virginislandscommercereport.com

https://www.virginislandscommercereport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Dailycommercemartinique.com

https://www.dailycommercemartinique.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Michiganbusinesstribune.com

https://www.michiganbusinesstribune.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Palaubusinessreport.com

https://www.palaubusinessreport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Advertisingtoday.com

http://www.advertisingtoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Tongaeconomictimes.com

https://www.tongaeconomictimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Marylandbusinessweekly.com

https://www.marylandbusinessweekly.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Arubabusinessreview.com

https://www.arubabusinessreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Guambusinesstimes.com

https://www.guambusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Taiwanbusinessjournal.com

https://www.taiwanbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Africasmbjournal.com

https://www.Africasmbjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Honiarabusinessjournal.com

https://www.honiarabusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businessdailypapuanewguinea.com

https://www.businessdailypapuanewguinea.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Innovationandentrepreneursnews.com

https://www.innovationandentrepreneursnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Theworldnewswire.com

https://www.theworldnewswire.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Middleeastsmallbusinessobserver.com

https://www.middleeastsmallbusinessobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smbworldreport.com

https://www.smbworldreport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Monacocommercepress.com

https://www.monacocommercepress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smbinaction.com

https://www.smbinaction.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businessheraldonline.com

https://www.businessheraldonline.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smallbusinessworldmagazine.com

https://www.smallbusinessworldmagazine.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Todayinbusiness.com

http://www.todayinbusiness.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Micronesiabusinessdaily.com

https://www.micronesiabusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Laosbusinesstimes.com

https://www.laosbusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Newmexicobusinesstoday.com

https://www.newmexicobusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Iowabusinessgazette.com

https://www.iowabusinessgazette.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Cambodiabusinesspress.com

https://www.cambodiabusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Marianaislandsbusinessdaily.com

https://www.marianaislandsbusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Macaobusinessjournal.com

https://www.macaobusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Surinamebusinessdaily.com

https://www.surinamebusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

247businessreporter.com

https://www.247businessreporter.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Seychellesbusinessherald.com

https://www.seychellesbusinessherald.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Bruneibusinessnetwork.com

https://www.bruneibusinessnetwork.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smartsbusinesswire.com

https://www.smartsbusinesswire.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Globalnewsscanner.com

https://www.globalnewsscanner.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Journalofbusinessnews.com

https://www.journalofbusinessnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Worldreportmonitor.com

https://www.worldreportmonitor.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Grenadaeconomicdigest.com

https://www.grenadaeconomicdigest.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Commercereviewstlucia.com

https://www.commercereviewstlucia.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Internationalnewsledger.com

https://www.internationalnewsledger.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Arizonabusinesswatch.com

https://www.arizonabusinesswatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businesstimesdc.com

https://www.businesstimesdc.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Samoabusinesscurrents.com

https://www.samoabusinesscurrents.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Puertoricobusinesstribune.com

https://www.puertoricobusinesstribune.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Latinamericasmallbusinessnews.com

https://www.latinamericasmallbusinessnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Cyprusbusinessjournal.com

https://www.cyprusbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Anguillabusinessdaily.com

https://www.anguillabusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Turkmenistanbusinessjournal.com

https://www.turkmenistanbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economicnewsobserver.com

https://www.economicnewsobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Naurubusinessjournal.com

https://www.naurubusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Virginislandsbusinessjournal.com

https://www.virginislandsbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Mainebusinessgazette.com

https://www.mainebusinessgazette.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Advertisingindustryreview.com

https://www.advertisingindustryreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Caboverdebusinessjournal.com

https://www.caboverdebusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businesspostexaminer.com

https://www.businesspostexaminer.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Latinamericabusinesstoday.com

https://www.latinamericabusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smallbusinessworldjournal.com

https://www.smallbusinessworldjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Rhodeislandbusinessdaily.com

https://www.rhodeislandbusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Europeansmallbusinessnetwork.com

https://www.europeansmallbusinessnetwork.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Equatorialguineabusinesstoday.com

https://www.equatorialguineabusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Montserratdailynews.com

https://www.montserratdailynews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smallbusinessnewstoday.com

https://www.smallbusinessnewstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Smallbusinessesinthenews.com

https://www.smallbusinessesinthenews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Southcarolinabusinesschronicle.com

https://www.southcarolinabusinesschronicle.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Jordanianbusinesstoday.com

https://www.jordanianbusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Maldivesbusinessbulletin.com

https://www.maldivesbusinessbulletin.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economicpolicytimes.com

https://www.economicpolicytimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Fijibusinessreview.com

https://www.fijibusinessreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Iraqbusinessreport.com

https://www.iraqbusinessreport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Montanabusinesspress.com

https://www.montanabusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Hongkongbusinessreporter.com

https://www.hongkongbusinessreporter.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Tuvalubusinessday.com

https://www.tuvalubusinessday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Delawarebusinesstribune.com

https://www.delawarebusinesstribune.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Worldadvertisingreport.com

https://www.worldadvertisingreport.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Vermontbusinesstimes.com

https://www.vermontbusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Bhutanbusinessnews.com

https://www.bhutanbusinessnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Madagascarnewsobserver.com

https://www.madagascarnewsobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Kentuckybusinessreview.com

https://www.kentuckybusinessreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Asiabusinessgazette.com

https://www.asiabusinessgazette.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Togobusinesspost.com

https://www.togobusinesspost.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Dominicanrepublicbusinessinsider.com

https://www.dominicanrepublicbusinessinsider.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Yemenbusinesstoday.com

https://www.yemenbusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Alabamabusinessreporter.com

https://www.alabamabusinessreporter.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Texasbusinesstimes.com

https://www.texasbusinesstimes.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Omanbusinessjournal.com

https://www.omanbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Stvincentgenadinesbusinesshub.com

https://www.stvincentgenadinesbusinesshub.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Trinidadtobagobusinessnews.com

https://www.trinidadtobagobusinessnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Theconsumernewsnetwork.com

https://www.theconsumernewsnetwork.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Globaladvertisingnews.com

https://www.globaladvertisingnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Westvirginiabusinessdispatch.com

https://www.westvirginiabusinessdispatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Stkittsnevisbusinesswatch.com

https://www.stkittsnevisbusinesswatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Utahbusinesspress.com

https://www.utahbusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Comorosbusinesspress.com

https://www.comorosbusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Wisconsinbusinesspress.com

https://www.wisconsinbusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Saotomeandprincipebusinessnews.com

https://www.saotomeandprincipebusinessnews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economictimescaymanislands.com

https://www.economictimescaymanislands.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Mediaindustryobserver.com

https://www.mediaindustryobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Illinoisbusinessreview.com

https://www.illinoisbusinessreview.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Kansasbusinesstoday.com

https://www.kansasbusinesstoday.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economydailyjamaica.com

https://www.economydailyjamaica.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Marketforecastreports.com

http://www.marketforecastreports.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Businessinsidernorthcarolina.com

https://www.businessinsidernorthcarolina.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Rockymountainbusinessbrief.com

https://www.rockymountainbusinessbrief.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Washingtonbusinessobserver.com

https://www.washingtonbusinessobserver.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Advertisingpressreleases.com

http://www.advertisingpressreleases.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Todayinthenews.com

http://www.todayinthenews.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Connecticutbusinessherald.com

https://www.connecticutbusinessherald.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Consumerproductsworld.com

https://www.consumerproductsworld.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Kuwaitbusinessjournal.com

https://www.kuwaitbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Thebusinessgazetteonline.com

https://www.thebusinessgazetteonline.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Minnesotabusinessreporter.com

https://www.minnesotabusinessreporter.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Marcomworld.com

https://www.marcomworld.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Globalbusinesswatch.com

https://www.globalbusinesswatch.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Montserratbusinessnetwork.com

https://www.montserratbusinessnetwork.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Globalreporterjournal.com

https://www.globalreporterjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Burundibusinessdaily.com

https://www.burundibusinessdaily.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Eyeballsandclicks.com

https://www.eyeballsandclicks.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Nebraskabusinesspress.com

https://www.nebraskabusinesspress.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Falklandsbusinessjournal.com

https://www.falklandsbusinessjournal.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Economicnewsdominica.com

https://www.economicnewsdominica.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Nepalbusinesschannel.com

https://www.nepalbusinesschannel.com/article/901281060-endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Globe

https://www.globenewswire.com/news-release/2026/03/23/3260739/0/en/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services.html

The Associated Press

https://apnews.com/press-release/prodigy-news/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services-e0615be5dac3c62c750421f61cc269a7

Digital Journal

https://www.digitaljournal.com/pr/news/prodigy-press-wire/endpoint-security-usa-launches-new-172275289.html

Globe

https://www.globenewswire.com/en/search/organization/Endpoint%2520Security%2520USA?page=1

Benzinga.com

https://www.benzinga.com/pressreleases/26/03/g51415962/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

YAHOO Finance

https://finance.yahoo.com/sectors/technology/articles/endpoint-security-usa-launches-expands-180600561.html

YAHOO Finance SG

https://sg.finance.yahoo.com/news/endpoint-security-usa-launches-expands-180600561.html

Albuquerque Express

https://www.albuquerqueexpress.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Atlanta Leader

https://www.atlantaleader.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Austin News.net

https://www.austinnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Baltimore Star

https://www.baltimorestar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Big News Network.com

https://www.bignewsnetwork.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Birmingham News.net

https://www.birminghamnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Boston Star

https://www.bostonstar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Buffalo News.net

https://www.buffalonynews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Charlotte News.net

https://www.charlottenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Chicago Chronicle

https://www.chicagochronicle.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Cincinnati News.net

https://www.cincinnatinews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Cleveland Star

https://www.clevelandstar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Connecticut State News.net

https://connecticut.statenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Dallas Sun

https://www.dallassun.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Denver News.net

https://www.denvernews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Detroit Star

https://www.detroitstar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Florida State News.net

https://florida.statenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Houston News.net

https://www.houstonnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Indianapolis News.net

https://www.indianapolisnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Kansas City Post

https://www.kansascitypost.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Los Angeles Herald

https://www.losangelesherald.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Louisville News.net

https://www.louisvillenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Memphis Sun

https://www.memphissun.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Miami Mirror

https://www.miamimirror.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Milwaukee News.net

https://www.milwaukeenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Minneapolis News.net

https://www.minneapolisnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Nashville Herald

https://www.nashvilleherald.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

New York State News.net

https://newyork.statenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Oklahoma City News.net

https://www.oklahomacitynews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Orange County Sun

https://www.orangecountysun.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Philadelphia News.net

https://www.philadelphianews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Phoenix Herald

https://www.phoenixherald.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Pittsburgh Star

https://www.pittsburghstar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Portland News.net

https://www.portlandnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Raleigh Times

https://www.raleightimes.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Salt Lake City Sun

https://www.saltlakecitysun.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

San Diego News.net

https://www.sandiegonews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

San Francisco Star

https://www.sanfranciscostar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

San Jose News.net

https://www.sanjosenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Seattle Bulletin

https://www.seattlebulletin.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Silicon Valley News.net

https://www.siliconvalleynews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

South Carolina State News.net

https://southcarolina.statenews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

St Louis Star

https://www.stlouisstar.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

The Las Vegas News.net

https://www.thelasvegasnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

The Orlando News.net

https://www.theorlandonews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

The Tampa News.net

https://www.thetampanews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Washington DC News.net

https://www.washingtondcnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

ChineseWire

https://go.chinesewire.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Daily News

https://smb.bogalusadailynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Magnolia State Live

https://smb.magnoliastatelive.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Orange Leader

https://smb.orangeleader.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Port Arthur News

https://smb.panews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Picayune Item

https://smb.picayuneitem.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

L'Observateur

https://smb.lobservateur.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Panolian

https://smb.panolian.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Americus Times-Recorder

https://smb.americustimesrecorder.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Advocate-Messenger

https://smb.amnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

American Press

https://smb.americanpress.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Daily Leader

https://smb.dailyleader.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Oxford Eagle

https://smb.oxfordeagle.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Bluegrass Live

https://smb.bluegrasslive.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Claiborne Progress

https://smb.claiborneprogress.net/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Elizabethton Star

https://smb.elizabethton.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Jessamine Journal

https://smb.jessaminejournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Kenbridge Victoria Dispatch

https://smb.kenbridgevictoriadispatch.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Clemmons Courier

https://smb.clemmonscourier.net/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Harlan Enterprise

https://smb.harlandaily.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Ironton Tribune

https://smb.irontontribune.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Davie County Enterprise Record

https://smb.ourdavie.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The State Journal

https://smb.state-journal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Charlotte Gazette

https://smb.thecharlottegazette.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Interior Journal

https://smb.theinteriorjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Tryon Daily Bulletin

https://smb.tryondailybulletin.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Winchester Sun

https://smb.winchestersun.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Farmville Herald

https://smb.farmvilleherald.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Salisbury Post

https://smb.salisburypost.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Cordele Dispatch

https://smb.cordeledispatch.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Middlesboro News

https://smb.middlesboronews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Post Searchlight

https://smb.thepostsearchlight.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Washington City Paper

https://pr.washingtoncitypaper.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Leesville Leader

https://smb.theleesvilleleader.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Prentiss Headlight

https://smb.prentissheadlight.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Beauregard News

https://smb.beauregardnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Hattiesburg.Com

https://pr.hattiesburg.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Boreal Community Media

https://pr.boreal.org/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

MB News

https://pr.thembnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Times of San Diego

https://pr.timesofsandiego.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Chester County Press

https://pr.chestercounty.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

WNC Business

https://pr.wncbusiness.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Ashland Town News

https://pr.ashlandtownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Franklin Town News

https://pr.franklintownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Holliston Town News

https://pr.hollistontownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Hopedale Town News

https://pr.hopedaletownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Natick Town News

https://pr.naticktownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Medway & Millis Town News

https://pr.millismedwaynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Norfolk & Wrentham Town News

https://pr.norfolkwrenthamnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Norwood Town News

https://pr.norwoodtownnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Riverton Journal

https://pr.rivertonjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Columbia Business Monthly

https://pr.columbiabusinessmonthly.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Sugar House Journal

https://pr.mysugarhousejournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Herriman Journal

https://pr.herrimanjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Holladay Journal

https://pr.holladayjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Murray Journal

https://pr.murrayjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Millcreek Journal

https://pr.millcreekjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

South Salt Lake Journal

https://pr.southsaltlakejournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Midvale Journal

https://pr.midvalejournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Draper Journal

https://pr.draperjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Taylorsville Journal

https://pr.taylorsvillecityjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

West Jordan Journal

https://pr.westjordanjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Sandy Utah News

https://pr.sandyjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

South Jordan Journal

https://pr.southjordanjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The City Journals

https://pr.valleyjournals.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

West Valley City Journal

https://pr.wvcjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Cottonwood Heights Journal

https://pr.cottonwoodheightsjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Auburn Sentinel

https://pr.auburnsentinel.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Chillicothe Voice

https://pr.chillicothevoice.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Connect Iredell

https://pr.connectiredell.net/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

FACE Magazine

https://pr.faceacadiana.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Fayetteville Connect

https://pr.fayettevilleconnect.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Gridley Herald

https://pr.gridleyherald.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Jewish Link

https://pr.jewishlink.news/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

My Parish News

https://pr.myparishnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

RSW Living

https://pr.rswliving.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Sacramento Oracle

https://pr.sacramentooracle.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Taos News

https://pr.taosnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Territorial Dispatch

https://pr.territorialdispatch.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

TOTI

https://pr.toti.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Wheatland Sun

https://pr.wheatlandsun.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Bonita & Estero Magazine

https://pr.bonitaesteromagazine.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Cape Coral Living

https://pr.capecorallivingmagazine.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Gulf & Main

https://pr.gulfmainmagazine.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Times of the Islands

https://pr.timesoftheislands.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Milford Free Press

https://pr.milfordfreepress.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

CBS Lake Charles

https://pr.cbslakecharles.tv/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Racine County Eye

https://pr.racinecountyeye.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

eNews Park Forest

https://pr.enewspf.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

FāVS News

https://pr.favs.news/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Augusta Business Daily

https://pr.augustabusinessdaily.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Idaho Enteprise

https://pr.cariboucountynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Eye on Dunn County

https://pr.eyeondunn.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Pioneer

https://pr.pioneerpublishers.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Baker City Herald

https://pr.bakercityherald.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Beaverton Valley Times

https://pr.beavertonvalleytimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Bulletin

https://pr.bendbulletin.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Blue Mountain Eagle

https://pr.bluemountaineagle.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Capital Press

https://pr.capitalpress.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Central Oregonian

https://pr.centraloregonian.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Chinook Observer

https://pr.chinookobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Columbia County Spotlight

https://pr.columbiacountyspotlight.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Daily Astorian

https://pr.dailyastorian.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

East Oregonian

https://pr.eastoregonian.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Estacada News

https://pr.estacadanews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Forest Grove News-Times

https://pr.forestgrovenewstimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Herald Pioneer

https://pr.heraldpioneer.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Hermiston Herald

https://pr.hermistonherald.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Hillsboro News-Times

https://pr.hillsboronewstimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

La Grande Observer

https://pr.lagrandeobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Lake Oswego Review

https://pr.lakeoswegoreview.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Madras Pioneer

https://pr.madraspioneer.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Milwaukie Review

https://pr.milwaukiereview.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Newberg Graphic

https://pr.newberggraphic.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Oregon Capital Insider

https://pr.oregoncapitalinsider.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Oregon City News

https://pr.oregoncitynewsonline.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Portland Tribune

https://pr.portlandtribune.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Redmond Spokesman

https://pr.redmondspokesman.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Rogue Valley Times

https://pr.rv-times.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Sandy Post

https://pr.sandypost.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Seaside Signal

https://pr.seasidesignal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Bee

https://pr.thebeenews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Outlook

https://pr.theoutlookonline.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Valley Times

https://pr.valleytimes.news/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Wallowa County Chieftain

https://pr.wallowa.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

West Linn Tidings

https://pr.westlinntidings.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Wilsonville Spokesman

https://pr.wilsonvillespokesman.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Woodburn Independent

https://pr.woodburnindependent.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Your Oregon News

https://pr.youroregonnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The News Courier

https://pr.enewscourier.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Cullman Times

https://pr.cullmantimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Daily Iberian

https://pr.thedailyiberian.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Valdosta Daily Times

https://pr.valdostadailytimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Dalton Daily Citizen

https://pr.daltoncitizen.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Moultrie Observer

https://pr.moultrieobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Lake Oconee Breeze

https://pr.lakeoconeebreeze.net/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Meridian Star

https://pr.meridianstar.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Thomasville Times-Enterprise

https://pr.timesenterprise.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

St. Claire News-Aegis

https://pr.newsaegis.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

The Union-Recorder

https://pr.unionrecorder.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

Tifton Gazette

https://pr.tiftongazette.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c191f1aa679c0002998e01

UBI-Interactive

https://lifestyle.ubi-interactive.com/story/559292/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

blerp

https://lifestyle.blerrp.com/story/33072/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Current 94.3

https://lifestyle.current943.com/story/129057/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

TV Show Auditions

https://lifestyle.tvshowauditions.info/story/556558/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

KCCR-AM

https://lifestyle.kccrradio.com/story/128886/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

XPR Media

https://xpr.media/story/695444/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Inentertainment

https://lifestyle.inentertainment.co.uk/story/568202/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

XBODE

https://lifestyle.xbode.org/story/554013/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

FriendHood Relationship Advice

https://lifestyle.friendhood.net/story/570521/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Gamezon

https://lifestyle.gamezon.net/story/569816/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Info Tech Inc

https://lifestyle.infotechinc.net/story/570239/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Boise

https://boise.newsnetmedia.com/story/140653/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Sharism

https://lifestyle.sharism.org/story/28286/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Storytelling Co

https://lifestyle.storytellingco.com/story/28252/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

SuccessXL

https://lifestyle.successxl.com/story/550627/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Harcourt Health

https://lifestyle.harcourthealth.com/story/566036/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

UC Connection

https://lifestyle.ucconnection.org/story/553631/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Easy House Remodeling

https://lifestyle.easyhouseremodeling.com/story/512880/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Rogue Mag

https://lifestyle.theroguemag.com/story/565808/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Taste Terminal

https://lifestyle.tasteterminal.com/story/555747/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Agree

https://lifestyle.agree.net/story/36726/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Servers Free

https://lifestyle.serversfree.com/story/568566/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Only Golf News

https://lifestyle.onlygolfnews.com/story/565646/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Side Car

https://lifestyle.side.cr/story/565000/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Street Register

https://lifestyle.streetregister.com/story/552801/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Successful Daily

https://lifestyle.successfuldaily.com/story/553092/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

E-Business Planet

https://lifestyle.ebusinessplanet.com/story/563761/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

All Podcasts

https://lifestyle.allpodcasts.com/story/46800/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Annika Bansal

https://lifestyle.annikabansal.com/story/46585/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Capital Hill Times

https://lifestyle.capitolhilltimes.com/story/560965/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Digital Ad Blog

https://lifestyle.digitaladblog.com/story/567785/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Hungry Bear

https://lifestyle.hungrybear.net/story/564409/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Lincoln Labs

https://lifestyle.lincolnlabs.com/story/571044/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

GoPreneurs

https://lifestyle.gopreneurs.com/story/563828/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

East Minnesota Weekly News

https://lifestyle.eastmnweeklynews.com/story/561752/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Entreprenerd

https://lifestyle.entreprenerd.net/story/171831/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

IM One

https://lifestyle.imone2015.com/story/571122/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

News Radio KOTA

https://lifestyle.kotaradio.com/story/128524/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

forks to feet

https://lifestyle.forkstofeet.com/story/602345/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Boost Up Blog

https://lifestyle.boostupblog.com/story/33151/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Idea Wins

https://lifestyle.ideawins.com/story/563780/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

CFX Magazine

https://lifestyle.cfxmagazine.com/story/563317/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Cosmetic Surgery Insider

https://lifestyle.cosmeticsurgeryinsider.com/story/567695/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Washington Guardian

https://lifestyle.washingtonguardian.com/story/567350/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Axcess News

https://lifestyle.axcessnews.com/story/57870/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Pierre Country

https://lifestyle.pierrecountry.com/story/128517/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Anchorage

https://anchorage.newsnetmedia.com/story/143233/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Z106.3

https://lifestyle.all80sz1063.com/story/128324/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Awesome

https://lifestyle.awe.sm/story/48473/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Flore De Champagne

https://lifestyle.floredechampagne.com/story/562780/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Recent Legal News

https://lifestyle.recentlegalnews.com/story/568642/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Jardal Paintball

https://lifestyle.jardal-paintball.com/story/571302/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Houston News Today

https://lifestyle.houstonnewstoday.com/story/565071/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Passionate About Food

https://lifestyle.passionateaboutfood.net/story/564898/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

independent.mk

https://lifestyle.independent.mk/story/569956/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Detroit

https://detroit.newsnetmedia.com/story/140997/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Men Under Microscope

https://lifestyle.menundermicroscope.com/story/27801/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Celeb Homes

https://lifestyle.celebhomes.net/story/212987/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Louisville

https://louisville.newsnetmedia.com/story/121656/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Maui Sky

https://lifestyle.mauisky.com/story/28008/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Nashville

https://nashville.newsnetmedia.com/story/133306/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Film Television Auditions

https://lifestyle.filmtelevisionauditions.com/story/28131/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Childcare Partnerships

https://lifestyle.childcarepartnerships.org/story/170445/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Salt Lake City

https://saltlakecity.newsnetmedia.com/story/133554/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Spazio Tribu

https://lifestyle.spaziotribu.org/story/125532/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Business Times

https://lifestyle.businesstimes.co.tz/story/28082/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Sioux Falls

https://siouxfalls.newsnetmedia.com/story/133555/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Max Mention

https://lifestyle.maxmention.com/story/27993/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Minneapolis

https://minneapolis.newsnetmedia.com/story/133766/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Newsblaze - IN

https://lifestyle.newsblaze.in/story/28132/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet San Antonio

https://sanantonio.newsnetmedia.com/story/128454/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Movie Casting Call

https://lifestyle.moviecastingcall.org/story/28014/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Norfolk

https://norfolk.newsnetmedia.com/story/133476/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Robo Earth

https://lifestyle.roboearth.org/story/28208/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Operation Infinite Justice

https://lifestyle.operation-infinitejustice.org/story/27771/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

1045 Capital Rock

https://lifestyle.capitalcityrock.com/story/132438/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Teethgrinder

https://lifestyle.teethgrinder.co.uk/story/28303/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Webe Honey

https://lifestyle.webehoney.com/story/28181/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Great News

https://lifestyle.thegreatnews.com/story/27866/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Reipet

https://lifestyle.reipet.com/story/28008/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Top Globe News

https://lifestyle.topglobe.news/story/27961/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Wired News Engine

https://lifestyle.wirednewsengine.com/story/28010/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

South Ark Daily

https://lifestyle.southarkdaily.com/story/118355/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Try Mental Wellness

https://lifestyle.trymentalwellness.com/story/26783/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Boca Raton City Online

https://lifestyle.bocaratoncityonline.com/story/80557/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Top Hustler

https://lifestyle.tophustler.com/story/554752/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Aussie 8

https://lifestyle.aussie8.com/story/29005/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Fresno

https://fresno.newsnetmedia.com/story/140553/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Travels HQ

https://lifestyle.travelshq.com/story/556176/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Clarity Pointe

https://lifestyle.claritypointe.com/story/569698/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

BuyersDesire.

https://lifestyle.buyersdesire.org/story/562902/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Thrive Insider

https://lifestyle.thriveinsider.com/story/556734/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Point News

https://lifestyle.thepointnews.com/story/555349/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

ketodash

https://lifestyle.ketodash.com/story/568856/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Presby Camp

https://lifestyle.presbycamp.org/story/567815/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Altius

https://lifestyle.altiusdirectory.com/story/33001/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Media Training for CEO's

https://lifestyle.mediatrainingforceos.com/story/564411/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Odessa

https://odessa.newsnetmedia.com/story/133413/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Adrienne Monson

https://lifestyle.adriennemonson.com/story/28695/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Baltimore News Journal

https://lifestyle.baltimorenewsjournal.com/story/27613/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Austin

https://austin.newsnetmedia.com/story/140885/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Baret News

https://lifestyle.baretnews.com/story/34277/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Acting Auditions

https://lifestyle.acting-auditions.org/story/32838/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Times LA

https://lifestyle.timesla.com/story/598878/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Military Parenting

https://lifestyle.militaryparenting.org/story/127539/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Augusta

https://augusta.newsnetmedia.com/story/140967/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Austin Top 50

https://lifestyle.austintop50.com/story/33059/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Middletown Life

https://lifestyle.middletownlifemagazine.com/story/373767/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Palm Springs

https://palmsprings.newsnetmedia.com/story/127677/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet St. Louis

https://stlouis.newsnetmedia.com/story/119533/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Glimpse

https://lifestyle.theglimpse.com/story/559307/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Fiction Talk

https://lifestyle.fictiontalk.com/story/565473/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Hawaii

https://hawaii.newsnetmedia.com/story/140350/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Orlando

https://orlando.newsnetmedia.com/story/133492/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Folsom Local News

https://lifestyle.folsomlocalnews.com/story/567130/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Health Source Magazine

https://lifestyle.healthsourcemag.com/story/565428/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Columbus

https://columbus.newsnetmedia.com/story/140737/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Classic Hits 92.3

https://lifestyle.q923radio.com/story/128229/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Gold Mining News

https://lifestyle.goldminingnews.com.au/story/28171/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

KYNT-AM

https://lifestyle.kynt1450.com/story/128447/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Words Journal

https://lifestyle.wordsjournal.com/story/604391/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Client Internet Marketing

https://lifestyle.clientim.com/story/579377/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Adam Torkildson

https://lifestyle.adamtorkildson.com/story/29903/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

World of Video Gaming

https://lifestyle.worldofvideogaming.com/story/28030/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NBlaz

https://lifestyle.nblaz.com/story/28031/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Las Vegas

https://lasvegas.newsnetmedia.com/story/133776/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Spiritual Quotes

https://lifestyle.spiritual-quotes.org/story/28396/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Trondstidkon Troll

https://lifestyle.trondstidkontroll.com/story/557091/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Rogue.

https://lifestyle.rogueimc.org/story/565898/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

A Green Sign

https://lifestyle.agreensign.com/story/48724/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Get Pet Savvy

https://lifestyle.getpetsavvy.com/story/572853/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Eagle Country

https://lifestyle.myeaglecountry.com/story/129012/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Loop Biz

https://lifestyle.loopbiz.com/story/28311/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Blackberry Empire

https://lifestyle.blackberryempire.com/story/27089/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Brown Planet

https://lifestyle.brownplanet.com/story/561561/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Next Mentors

https://lifestyle.nextmentors.com/story/567401/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The NYC Times

https://lifestyle.thenyctimes.com/story/559344/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

World City Press

https://lifestyle.worldcitypress.com/story/28041/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Michigan

https://michigan.newsnetmedia.com/story/133819/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

ONE by FOUR

https://lifestyle.onebyfourstudio.com/story/565399/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Phenomena

https://lifestyle.phenomena.org/story/571516/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Waco

https://waco.newsnetmedia.com/story/133294/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

1st Counsel

https://lifestyle.1stcounsel.com/story/33615/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Small Business Sense

https://lifestyle.small-bizsense.com/story/567149/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Santa Barbara

https://santabarbara.newsnetmedia.com/story/133578/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Tampa

https://tampa.newsnetmedia.com/story/133412/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Career Savvy

https://lifestyle.careersavvy.co.uk/story/576025/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

TWEETER

https://lifestyle.tweeternet.com/story/554328/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Ribbon.co

https://lifestyle.ribbon.co/story/563188/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

God Of Sound

https://lifestyle.godofsound.com/story/27314/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Atlanta

https://atlanta.newsnetmedia.com/story/143154/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Lamora

https://lifestyle.lamora.net/story/569226/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Womens Conference

https://lifestyle.womensconference.org/story/563842/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Article Rich

https://lifestyle.articlerich.com/story/48441/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Bomb Report

https://lifestyle.bombreport.com/story/48548/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Social-Matic

https://lifestyle.social-matic.com/story/553517/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Therapy But Better

https://lifestyle.therapybutbetter.com/story/27120/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Miami

https://miami.newsnetmedia.com/story/150531/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Brights Future

https://lifestyle.brightsfuture.com/story/560618/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

SM Solar

https://lifestyle.smsolar.net/story/565436/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Monterey

https://monterey.newsnetmedia.com/story/133774/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

SportsnewsHIGHLIGHTS

https://sports.newsnetmedia.com/story/133322/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Quebec News Tribune

https://lifestyle.quebecnewstribune.com/story/28219/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Fairy Tale Ink Books

https://lifestyle.fairytaleinkbooks.com/story/568804/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

SourceFed

https://lifestyle.sourcefed.com/story/554950/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Los Angeles

https://losangeles.newsnetmedia.com/story/133691/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Slimag

https://lifestyle.sli.mg/story/563790/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

RushPR News

https://lifestyle.rushprnews.com/story/28092/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

KBEW - The Information Station

https://lifestyle.kbew98country.com/story/129110/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Top Travel Trends

https://lifestyle.toptraveltrends.com/story/565988/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Daily Haze

https://lifestyle.thedailyhaze.com/story/552466/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Pluralist

https://lifestyle.pluralist.com/story/566099/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Newsblaze - AU

https://lifestyle.newsblaze.com.au/story/28089/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Columbia

https://columbia.newsnetmedia.com/story/140729/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Idea Crossing

https://lifestyle.ideacrossing.org/story/573672/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

UK Uncut

https://lifestyle.ukuncut.org.uk/story/558096/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Sexuality

https://lifestyle.sexaulity.com/story/28120/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

E-Topical

https://lifestyle.etopical.com/story/27969/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Realie.org

https://lifestyle.realie.org/story/567376/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Diet & Fitness For All

https://lifestyle.dietfitnessforall.com/story/556165/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

The Dam FM

https://lifestyle.thedam.fm/story/128242/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Quincy

https://quincy.newsnetmedia.com/story/133432/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Humane Network

https://lifestyle.humane.net/story/564799/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

NEWSnet Sacramento

https://sacramento.newsnetmedia.com/story/133359/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

ePub Zone

https://lifestyle.epubzone.org/story/563662/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

US Features

https://lifestyle.usfeatures.com/story/555281/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Hub Spotes

https://lifestyle.hubspotes.com/story/563547/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Cultural Foundation

https://lifestyle.us-az-culturalfoundation.com/story/27977/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Hotel E-Guide

https://lifestyle.hoteleguide.com/story/566823/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Long Island Report

https://lifestyle.longislandreport.org/story/573098/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Faith Family America

https://lifestyle.faithfamilyamerica.com/story/564933/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Good Decisions

https://lifestyle.gooddecisions.com/story/564220/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Newsblaze

https://lifestyle.newsblaze.com/story/562741/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Men Style

https://lifestyle.menstyle1.com/story/568100/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Emphasis

https://lifestyle.emphas.is/story/562365/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

LM Cordoba

https://lifestyle.lmcordoba.com.ar/story/572134/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Matomy SEO

https://lifestyle.matomyseo.com/story/566723/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

LA Tabloid

https://lifestyle.latabloid.com/story/570713/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Inspired N

https://lifestyle.inspiredn.com/story/569560/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Chronic Cities

https://lifestyle.chroniccities.us/story/566005/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Mmminimal

https://lifestyle.mmminimal.com/story/564144/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Paraskevas

https://lifestyle.paraskevas.net/story/562397/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Market Research Journals

https://lifestyle.marketresearchjournals.com/story/570903/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Mass News

https://lifestyle.massnews.com/story/563918/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

LuxedB

https://lifestyle.luxedb.com/story/570659/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Dev Insider

https://lifestyle.d-h.st/story/587255/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Duovolt Art

https://lifestyle.duovoltart.com/story/562376/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Good Sciencing

https://lifestyle.goodsciencing.com/story/564876/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

Microcap

https://lifestyle.microcapnews.com/story/565945/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services/

100 Mile Free Press

https://smb.100milefreepress.net/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Abbotsford News

https://smb.abbynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Agassiz Harrison Observer

https://smb.agassizharrisonobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Alberni Valley News

https://smb.albernivalleynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Aldergrove Star

https://smb.aldergrovestar.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Arrow Lakes News

https://smb.arrowlakesnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Ashcroft Cache Creek Journal

https://smb.ashcroftcachecreekjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Boundary Creek Times

https://smb.boundarycreektimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Burns Lake Lakes District News

https://smb.burnslakelakesdistrictnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Caledonia Courier

https://smb.caledoniacourier.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Campbell River Mirror

https://smb.campbellrivermirror.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Castlegar News

https://smb.castlegarnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Chemainus Valley Courier

https://smb.chemainusvalleycourier.ca/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Clearwater Times

https://smb.clearwatertimes.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Cloverdale Reporter

https://smb.cloverdalereporter.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Coast Mountain News

https://smb.coastmountainnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Comox Valley Record

https://smb.comoxvalleyrecord.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Cowichan Valley Citizen

https://smb.cowichanvalleycitizen.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Cranbrook Townsman

https://smb.cranbrooktownsman.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Creston Valley Advance

https://smb.crestonvalleyadvance.ca/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Eagle Valley News

https://smb.eaglevalleynews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Eckville Echo

https://smb.eckvilleecho.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Goldstream Gazette

https://smb.goldstreamgazette.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Grand Forks Gazette

https://smb.grandforksgazette.ca/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Haida Gwaii Observer

https://smb.haidagwaiiobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Hope Standard

https://smb.hopestandard.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Houston Today

https://smb.houston-today.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Kelowna Capital News

https://smb.kelownacapnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Keremeos Review

https://smb.keremeosreview.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Kimberley Bulletin

https://smb.kimberleybulletin.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Lacombe Express

https://smb.lacombeexpress.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Monday Magazine

https://smb.mondaymag.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

North Thompson Star/Journal

https://smb.barrierestarjournal.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Interior News

https://smb.interior-news.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Vancouver Island Free Daily

https://smb.vancouverislandfreedaily.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Vernon Morning Star

https://smb.vernonmorningstar.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Victoria News

https://smb.vicnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Westerly News

https://smb.westerlynews.ca/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

West K News

https://smb.westknews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Williams Lake Tribune

https://smb.wltribune.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Yukon News

https://smb.yukon-news.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Maple Observer

https://pr.mapleobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Vancouver Chronicles

https://pr.vancouverchronicles.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Toronto Daily Report

https://pr.torontodailyreport.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Ontario Sun

https://pr.ontariosun.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Montreal Breaking

https://pr.montrealbreaking.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Calgary Observer

https://pr.calgaryobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Halifax Daily

https://pr.halifaxdaily.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Manitoba Reporter

https://pr.manitobareporter.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Edmonton Observer

https://pr.edmontonobserver.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Ottawa Recorder

https://pr.ottawarecorder.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Calgary Monitor

https://www.calgarymonitor.com/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Quebec News.net

https://www.quebecnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Toronto News.net

https://www.torontonews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Vancouver News.net

https://www.vancouvernews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

Winnipeg News.net

https://www.winnipegnews.net/news/278939820/endpoint-security-usa-launches-new-site-expands-endpoint-protection-services

GoInvest

https://pr.goinvest.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Visionary Finance

https://pr.visionary-finance.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Technology Crowds

https://pr.technologycrowds.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

InvestorIdeas.com

https://pr.investorideas.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

InvestorWire

https://go.investorwire.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

TheStreet.com

https://prconnect.thestreet.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

EVStockpicks.com

https://pr.evstockpicks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

AIStockInfo.com

https://pr.aistockinfo.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

StockOptionNews.com

https://pr.stockoptionnews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

MegacapStockpicks.com

https://pr.megacapstockpicks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

ESGStockInfo.com

https://pr.esgstockinfo.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

ADRStockpicks.com

https://pr.adrstockpicks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

MicrocapStockPicks.com

https://pr.microcapstockpicks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

MagSevenStocks.com

https://pr.magsevenstocks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

NanocapStockpicks.com

https://pr.nanocapstockpicks.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

GlobalCorporateGiants.com

https://pr.globalcorporategiants.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

EnergyStockInfo.com

https://pr.energystockinfo.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

DividendStockNews.com

https://pr.dividendstocknews.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

21st Century Tech Blog

https://pr.21stcentech.com/article/Endpoint-Security-USA-Launches-New-Site-Expands-Endpoint-Protection-Services?storyId=69c17d0092a3f200024755c7

Early detection is one of the most valuable benefits of continuous monitoring. Identifying threats at their initial stage allows organizations to contain issues before they spread across systems or compromise sensitive data.

Security monitoring also plays a key role in protecting against ransomware attacks. By identifying unusual encryption activity or unauthorized access attempts, organizations can intervene before files are locked or data is exfiltrated.

User activity tracking provides deeper insight into potential risks.

backup

  1. alert
  2. google
  3. azure
  4. active
  5. orchestration
  6. malware
  7. tool
  8. dns
Monitoring login patterns, access behavior, and system interactions helps detect compromised credentials or insider threats that might otherwise remain hidden.

Automation enhances the efficiency of monitoring systems by filtering alerts and prioritizing critical threats. This reduces noise and ensures that security teams focus on incidents that require immediate attention.

Integration with threat intelligence feeds allows organizations to stay informed about emerging risks.

backup

  • visibility
  • cloud
  • architecture
  • vpn
  • laptop
By correlating internal data with global threat trends, monitoring systems become more accurate and proactive.

Scalability is essential for organizations experiencing growth or digital transformation. 24/7 security monitoring must adapt to increasing data volumes, users, and devices without compromising performance or accuracy.

Cloud environments introduce additional challenges, requiring monitoring solutions that can track activity across multiple platforms. Ensuring visibility in cloud systems is critical for maintaining data security and compliance.

Compliance requirements often mandate continuous monitoring and reporting. Organizations must demonstrate that they are actively protecting their systems, and monitoring tools provide the evidence needed for audits and regulatory reviews.

Incident response becomes significantly more effective when supported by real-time monitoring. Security teams can quickly assess the situation, isolate affected systems, and implement remediation measures with minimal disruption.



key

  • availability
  • workstation
  • kubernetes
  • dashboard
  • nist
  • edr

Network traffic analysis is another crucial component of monitoring. By examining data flows, organizations can identify unusual patterns that may indicate malware communication or unauthorized data transfers.

Employee awareness complements technical monitoring efforts.

hardware

  1. anomaly
  2. virtualization
  3. recovery
  4. machinelearning
  5. rootkit
  6. siem
While systems detect threats, informed users can help prevent incidents by recognizing suspicious activity and following established security protocols.

Cost efficiency is often overlooked when discussing cybersecurity. Continuous monitoring helps prevent costly breaches, downtime, and reputational damage, making it a valuable investment for long-term business stability.

Collaboration between security teams and technology providers strengthens monitoring capabilities. Combining expertise and tools ensures that organizations remain prepared for both known and emerging threats.

As cyberattacks continue to evolve, reactive strategies are no longer sufficient. Organizations must adopt proactive monitoring approaches that identify and address risks before they can cause harm.

Strong security is not about reacting after damage is done; it is about staying ahead of threats at all times. Businesses that invest in 24/7 security monitoring position themselves to operate with confidence in an increasingly unpredictable digital landscape.

intelligence

 

An example of a physical security measure: a metal lock on the back of a personal computer to prevent hardware tampering.

Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It focuses on protecting computer software, systems, and networks from threats that can lead to unauthorized information disclosure, theft, or damage to hardware, software, or data, as well as to the disruption or misdirection of the services they provide.[1][2]

The growing significance of computer security reflects the increasing dependence on computer systems, the Internet,[3] and evolving wireless network standards. This reliance has expanded with the proliferation of smart devices, including smartphones, televisions, and other components of the Internet of things (IoT).

As digital infrastructure becomes more embedded in everyday life, cybersecurity has emerged as a critical concern. The complexity of modern information systems—and the societal functions they underpin—has introduced new vulnerabilities. Systems that manage essential services, such as power grids, electoral processes, and finance, are particularly sensitive to security breaches.[4][5]

Although many aspects of computer security involve digital security, such as electronic passwords and encryption, physical security measures, such as metal locks, are still used to prevent unauthorized tampering. IT security is not a perfect subset of information security and therefore does not completely align with the security convergence schema.

Vulnerabilities and attacks

[edit]

A vulnerability refers to a flaw in the structure, execution, functioning, or internal oversight of a computer or system that compromises its security. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database.[6] An exploitable vulnerability is one for which at least one working attack or exploit exists.[7] Actors maliciously seeking vulnerabilities are known as threats. Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools or customized scripts.[8][9]

Various people or parties are vulnerable to cyber attacks; however, different groups are likely to experience different types of attacks more than others.[10]

In April 2023, the United Kingdom Department for Science, Innovation & Technology released a report on cyber attacks over the previous 12 months.[11] They surveyed 2,263 UK businesses, 1,174 UK registered charities, and 554 education institutions. The research found that "32% of businesses and 24% of charities overall recall any breaches or attacks from the last 12 months." These figures were much higher for "medium businesses (59%), large businesses (69%), and high-income charities with £500,000 or more in annual income (56%)."[11] Yet, although medium or large businesses are more often the victims, since larger companies have generally improved their security over the last decade, small and midsize businesses (SMBs) have also become increasingly vulnerable as they often "do not have advanced tools to defend the business."[10] SMBs are most likely to be affected by malware, ransomware, phishing, man-in-the-middle attacks, and Denial-of Service (DoS) Attacks.[10]

Normal internet users are most likely to be affected by untargeted cyberattacks.[12] These are where attackers indiscriminately target as many devices, services, or users as possible. They do this using techniques that take advantage of the openness of the Internet. These strategies mostly include phishing, ransomware, water holing and scanning.[12]

To secure a computer system, it is important to understand the attacks that can be made against it, and these threats can typically be classified into one of the following categories:

Backdoor

[edit]

A backdoor in a computer system, a cryptosystem, or an algorithm is any secret method of bypassing normal authentication or security controls. These weaknesses may exist for many reasons, including original design or poor configuration.[13] Due to the nature of backdoors, they are of greater concern to companies and databases as opposed to individuals.

Backdoors may be added by an authorized party to allow some legitimate access or by an attacker for malicious reasons. Criminals often use malware to install backdoors, giving them remote administrative access to a system.[14] Once they have access, cybercriminals can "modify files, steal personal information, install unwanted software, and even take control of the entire computer."[14]

Backdoors can be difficult to detect, as they often remain hidden within source code or system firmware and may require intimate knowledge of the operating system to identify.

Denial-of-service attack

[edit]

Denial-of-service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.[15] Attackers can deny service to individual victims, such as by deliberately entering an incorrect password enough consecutive times to cause the victim's account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single IP address can be blocked by adding a new firewall rule, many forms of distributed denial-of-service (DDoS) attacks are possible, where the attack comes from a large number of points. In this case, defending against these attacks is much more difficult. Such attacks can originate from the zombie computers of a botnet or from a range of other possible techniques, including distributed reflective denial-of-service (DRDoS), where innocent systems are fooled into sending traffic to the victim.[15] With such attacks, the amplification factor makes the attack easier for the attacker because they have to use little bandwidth themselves. To understand why attackers may carry out these attacks, see the 'attacker motivation' section.

Physical access attacks

[edit]

A direct-access attack is when an unauthorized user (an attacker) gains physical access to a computer, typically to copy data from it or steal information.[16] Attackers may also compromise security by making operating system modifications, installing software worms, keyloggers, covert listening devices or using wireless microphones. Even when the system is protected by standard security measures, these may be bypassed by booting another operating system or tool from a CD-ROM or other bootable media. Disk encryption and the Trusted Platform Module standard are designed to prevent these attacks.

Direct service attackers are related in concept to direct memory attacks which allow an attacker to gain direct access to a computer's memory.[17] The attacks "take advantage of a feature of modern computers that allows certain devices, such as external hard drives, graphics cards, or network cards, to access the computer's memory directly."[17]

Eavesdropping

[edit]

Eavesdropping is the act of surreptitiously listening to a private computer conversation (communication), usually between hosts on a network. It typically occurs when a user connects to a network where traffic is not secured or encrypted and sends sensitive business data to a colleague, which, when listened to by an attacker, could be exploited.[18] Data transmitted across an open network can be intercepted by an attacker using various methods.

Unlike malware, direct-access attacks, or other forms of cyber attacks, eavesdropping attacks are unlikely to negatively affect the performance of networks or devices, making them difficult to notice.[18] In fact, "the attacker does not need to have any ongoing connection to the software at all. The attacker can insert the software onto a compromised device, perhaps by direct insertion or perhaps by a virus or other malware, and then come back some time later to retrieve any data that is found or trigger the software to send the data at some determined time."[19]

Using a virtual private network (VPN), which encrypts data between two points, is one of the most common forms of protection against eavesdropping. Using the best form of encryption possible for wireless networks is best practice, as well as using HTTPS instead of an unencrypted HTTP.[20]

Programs such as Carnivore and NarusInSight have been used by the Federal Bureau of Investigation (FBI) and the NSA to eavesdrop on the systems of internet service providers. Even machines that operate as a closed system (i.e., with no contact with the outside world) can be eavesdropped upon by monitoring the faint electromagnetic transmissions generated by the hardware. TEMPEST is a specification by the NSA referring to these attacks.

Malware

[edit]

Malicious software (malware) is any software code or computer program "intentionally written to harm a computer system or its users."[21] Once present on a computer, it can leak sensitive details such as personal information, business information and passwords, can give control of the system to the attacker, and can corrupt or delete data permanently.[22][23]

Types of malware

[edit]
  • Viruses are a specific type of malware, and are normally a malicious code that hijacks software with the intention to "do damage and spread copies of itself." Copies are made with the aim of spreading to other programs on a computer.[21]
  • Worms are similar to viruses, however viruses can only function when a user runs (opens) a compromised program. Worms are self-replicating malware that spread between programs, apps and devices without the need for human interaction.[21]
  • Trojan horses are programs that pretend to be helpful or hide themselves within desired or legitimate software to "trick users into installing them." Once installed, a RAT (Remote Access Trojan) can create a secret backdoor on the affected device to cause damage.[21]
  • Spyware is a type of malware that secretly gathers information from an infected computer and transmits the sensitive information back to the attacker. One of the most common forms of spyware is keyloggers, which record all of a user's keyboard inputs/keystrokes, to "allow hackers to harvest usernames, passwords, bank account and credit card numbers."[21]
  • Scareware, as the name suggests, is a form of malware that uses social engineering (manipulation) to scare, shock, trigger anxiety, or suggest the perception of a threat in order to manipulate users into buying or installing unwanted software. These attacks often begin with a "sudden pop-up with an urgent message, usually warning the user that they've broken the law or their device has a virus."[21]
  • Ransomware is when malware installs itself onto a victim's machine, encrypts their files, and then turns around and demands a ransom (usually in Bitcoin) to return that data to the user.

Man-in-the-middle attacks

[edit]

Man-in-the-middle attacks (MITM) involve a malicious attacker trying to intercept, surveil or modify communications between two parties by spoofing one or both party's identities and injecting themselves in-between.[24] Types of MITM attacks include:

  • IP address spoofing is where the attacker hijacks routing protocols to reroute the targets traffic to a vulnerable network node for traffic interception or injection.
  • Message spoofing (via email, SMS or OTT messaging) is where the attacker spoofs the identity or carrier service while the target is using messaging protocols like email, SMS or OTT (IP-based) messaging apps. The attacker can then monitor conversations, launch social attacks or trigger zero-day-vulnerabilities to allow for further attacks.
  • WiFi SSID spoofing is where the attacker simulates a Wi-Fi base station SSID to capture and modify internet traffic and transactions. The attacker can also use local network addressing and reduced network defenses to penetrate the target's firewall by breaching known vulnerabilities. Sometimes known as a Pineapple attack thanks to a popular device. See also Malicious association.
  • DNS spoofing is where attackers hijack domain name assignments to redirect traffic to systems under the attackers control, in order to surveil traffic or launch other attacks.
  • SSL hijacking, typically coupled with another media-level MITM attack, is where the attacker spoofs the SSL authentication and encryption protocol by way of Certificate Authority injection in order to decrypt, surveil and modify traffic. See also TLS interception[24]

Multi-vector, polymorphic attacks

[edit]

Surfacing in 2017, a new class of multi-vector,[25] polymorphic[26] cyber threats combine several types of attacks and change form to avoid cyber security controls as they spread.

Multi-vector polymorphic attacks, as the name describes, are both multi-vectored and polymorphic.[27] Firstly, they are a singular attack that involves multiple methods of attack. In this sense, they are "multi-vectored" (i.e. the attack can use multiple means of propagation such as via the Web, email and applications). However, they are also multi-staged, meaning that "they can infiltrate networks and move laterally inside the network."[27] The attacks can be polymorphic, meaning that the cyberattacks used such as viruses, worms or trojans "constantly change ("morph") making it nearly impossible to detect them using signature-based defences."[27]

Phishing

[edit]
An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by confirming it at the phisher's website. Note the misspelling of the words received and discrepancy as recieved and discrepency, respectively. Although the URL of the bank's webpage appears to be legitimate, the hyperlink points at the phisher's webpage.

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users by deceiving the users.[28] Phishing is typically carried out by email spoofing, instant messaging, text message, or on a phone call. They often direct users to enter details at a fake website whose look and feel are almost identical to the legitimate one.[29] The fake website often asks for personal information, such as login details and passwords. This information can then be used to gain access to the individual's real account on the real website.

Preying on a victim's trust, phishing can be classified as a form of social engineering. Attackers can use creative ways to gain access to real accounts. A common scam is for attackers to send fake electronic invoices[30] to individuals showing that they recently purchased music, apps, or others, and instructing them to click on a link if the purchases were not authorized. A more strategic type of phishing is spear-phishing which leverages personal or organization-specific details to make the attacker appear like a trusted source. Spear-phishing attacks target specific individuals, rather than the broad net cast by phishing attempts.[31]

Privilege escalation

[edit]

Privilege escalation describes a situation where an attacker with limited access is able, without authorization, to elevate their privileges or access level.[32] For example, a standard computer user may be able to exploit a vulnerability in the system to gain access to restricted data; or even become root and have full unrestricted access to a system. The severity of attacks can range from attacks simply sending an unsolicited email to a ransomware attack on large amounts of data. Privilege escalation usually starts with social engineering techniques, often phishing.[32]

Privilege escalation can be separated into two strategies, horizontal and vertical privilege escalation:

  • Horizontal escalation (or account takeover) is where an attacker gains access to a normal user account that has relatively low-level privileges. This may be through stealing the user's username and password. Once they have access, they have gained a foothold, and using this foothold the attacker then may move around the network of users at this same lower level, gaining access to information of this similar privilege.[32]
  • Vertical escalation, however, targets people higher up in a company and often with more administrative power, such as an employee in IT with a higher privilege. Using this privileged account will then enable the attacker to invade other accounts.[32]

Side-channel attack

[edit]

Any computational system affects its environment in some form. This effect it has on its environment can range from electromagnetic radiation, to residual effect on RAM cells which as a consequence make a Cold boot attack possible, to hardware implementation faults that allow for access or guessing of other values that normally should be inaccessible. In Side-channel attack scenarios, the attacker would gather such information about a system or network to guess its internal state and as a result access the information which is assumed by the victim to be secure. The target information in a side channel can be challenging to detect due to its low amplitude when combined with other signals.[33]

Social engineering

[edit]

Social engineering, in the context of computer security, aims to convince a user to disclose secrets such as passwords, card numbers, etc. or grant physical access by, for example, impersonating a senior executive, bank, a contractor, or a customer.[34] This generally involves exploiting people's trust, and relying on their cognitive biases. A common scam involves emails sent to accounting and finance department personnel, impersonating their CEO and urgently requesting action. One of the main techniques of social engineering are phishing attacks.

In early 2016, the FBI reported that such business email compromise (BEC) scams had cost US businesses more than $2 billion in about two years.[35]

In May 2016, the Milwaukee Bucks NBA team was the victim of this type of cyber scam with a perpetrator impersonating the team's president Peter Feigin, resulting in the handover of all the team's employees' 2015 W-2 tax forms.[36]

Spoofing

[edit]

Spoofing is an act of pretending to be a valid entity through the falsification of data (such as an IP address or username), in order to gain access to information or resources that one is otherwise unauthorized to obtain. Spoofing is closely related to phishing.[37][38] There are several types of spoofing, including:

In 2018, the cyber security firm Trellix published research on the life-threatening risk of spoofing in the healthcare industry.[40]

Tampering

[edit]

Tampering describes a malicious modification or alteration of data. It is an intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data. So-called Evil Maid attacks and security services planting of surveillance capability into routers are examples.[41]

HTML smuggling

[edit]

HTML smuggling allows an attacker to smuggle a malicious code inside a particular HTML or web page.[42] HTML files can carry payloads concealed as benign, inert data in order to defeat content filters. These payloads can be reconstructed on the other side of the filter.[43]

When a target user opens the HTML, the malicious code is activated; the web browser then decodes the script, which then unleashes the malware onto the target's device.[42]

Information security practices

[edit]

Employee behavior can have a big impact on information security in organizations. Cultural concepts can help different segments of the organization work effectively or work against effectiveness toward information security within an organization. Information security culture is the "...totality of patterns of behavior in an organization that contributes to the protection of information of all kinds."[44]

Andersson and Reimers (2014) found that employees often do not see themselves as part of their organization's information security effort and often take actions that impede organizational changes.[45] Indeed, the Verizon Data Breach Investigations Report 2020, which examined 3,950 security breaches, discovered 30% of cyber security incidents involved internal actors within a company.[46] Research shows information security culture needs to be improved continuously. In "Information Security Culture from Analysis to Change", authors commented, "It's a never-ending process, a cycle of evaluation and change or maintenance." To manage the information security culture, five steps should be taken: pre-evaluation, strategic planning, operative planning, implementation, and post-evaluation.[47]

  • Pre-evaluation: To identify the awareness of information security within employees and to analyze the current security policies.
  • Strategic planning: To come up with a better awareness program, clear targets need to be set. Assembling a team of skilled professionals is helpful to achieve it.
  • Operative planning: A good security culture can be established based on internal communication, management buy-in, security awareness and a training program.[47]
  • Implementation: Four stages should be used to implement the information security culture. They are:
  1. Commitment of the management
  2. Communication with organizational members
  3. Courses for all organizational members
  4. Commitment of the employees[47]
  • Post-evaluation: To assess the success of the planning and implementation, and to identify unresolved areas of concern.

Computer protection (countermeasures)

[edit]

In computer security, a countermeasure is an action, device, procedure or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken.[48][49][50]

Some common countermeasures are listed in the following sections:

Security by design

[edit]

Security by design, or alternately secure by design, means that the software has been designed from the ground up to be secure. In this case, security is considered a main feature.

The UK government's National Cyber Security Centre separates secure cyber design principles into five sections:[51]

  1. Before a secure system is created or updated, companies should ensure they understand the fundamentals and the context around the system they are trying to create and identify any weaknesses in the system.
  2. Companies should design and centre their security around techniques and defences which make attacking their data or systems inherently more challenging for attackers.
  3. Companies should ensure that their core services that rely on technology are protected so that the systems are essentially never down.
  4. Although systems can be created which are safe against a multitude of attacks, that does not mean that attacks will not be attempted. Despite one's security, all companies' systems should aim to be able to detect and spot attacks as soon as they occur to ensure the most effective response to them.
  5. Companies should create secure systems designed so that any attack that is successful has minimal severity.

These design principles of security by design can include some of the following techniques:

  • The principle of least privilege, where each part of the system has only the privileges that are needed for its function. That way, even if an attacker gains access to that part, they only have limited access to the whole system.
  • Automated theorem proving to prove the correctness of crucial software subsystems.
  • Code reviews and unit testing, approaches to make modules more secure where formal correctness proofs are not possible.
  • Defense in depth, where the design is such that more than one subsystem needs to be violated to compromise the integrity of the system and the information it holds.
  • Default secure settings, and design to fail secure rather than fail insecure (see fail-safe for the equivalent in safety engineering). Ideally, a secure system should require a deliberate, conscious, knowledgeable and free decision on the part of legitimate authorities in order to make it insecure.
  • Audit trails track system activity so that when a security breach occurs, the mechanism and extent of the breach can be determined. Storing audit trails remotely, where they can only be appended to, can keep intruders from covering their tracks.
  • Full disclosure of all vulnerabilities, to ensure that the window of vulnerability is kept as short as possible when bugs are discovered.

Security architecture

[edit]

Security architecture can be defined as the "practice of designing computer systems to achieve security goals."[52] These goals have overlap with the principles of "security by design" explored above, including to "make initial compromise of the system difficult," and to "limit the impact of any compromise."[52] In practice, the role of a security architect would be to ensure the structure of a system reinforces the security of the system, and that new changes are safe and meet the security requirements of the organization.[53][54]

Similarly, Techopedia defines security architecture as "a unified security design that addresses the necessities and potential risks involved in a certain scenario or environment. It also specifies when and where to apply security controls. The design process is generally reproducible." The key attributes of security architecture are:[55]

  • the relationship of different components and how they depend on each other.
  • determination of controls based on risk assessment, good practices, finances, and legal matters.
  • the standardization of controls.

Practicing security architecture provides the right foundation to systematically address business, IT and security concerns in an organization.

Security measures

[edit]

A state of computer security is the conceptual ideal, attained by the use of three processes: threat prevention, detection, and response. These processes are based on various policies and system components, which include the following:

  • Limiting the access of individuals using user account access controls and using cryptography can protect systems files and data, respectively.
  • Firewalls are by far the most common prevention systems from a network security perspective as they can (if properly configured) shield access to internal network services and block certain kinds of attacks through packet filtering. Firewalls can be both hardware and software-based. Firewalls monitor and control incoming and outgoing traffic of a computer network and establish a barrier between a trusted network and an untrusted network.[56]
  • Intrusion Detection System (IDS) products are designed to detect network attacks in-progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems.
  • Response is necessarily defined by the assessed security requirements of an individual system and may cover the range from simple upgrade of protections to notification of legal authorities, counter-attacks, and the like. In some special cases, the complete destruction of the compromised system is favored, as it may happen that not all the compromised resources are detected.
  • Cyber security awareness training to cope with cyber threats and attacks.[57]
  • Forward web proxy solutions can prevent the client to visit malicious web pages and inspect the content before downloading to the client machines.

Today, computer security consists mainly of preventive measures, like firewalls or an exit procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network, such as the Internet. They can be implemented as software running on the machine, hooking into the network stack (or, in the case of most UNIX-based operating systems such as Linux, built into the operating system kernel) to provide real-time filtering and blocking.[56] Another implementation is a so-called physical firewall, which consists of a separate machine filtering network traffic. Firewalls are common amongst machines that are permanently connected to the Internet.

Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.[58]

In order to ensure adequate security, the confidentiality, integrity and availability of a network, known as the CIA triad, must be protected and is considered the foundation of information security.[59] To achieve those objectives, administrative, physical and technical security measures should be employed. The amount of security afforded to an asset can only be determined when its value is known.[60]

Vulnerability management

[edit]

Vulnerability management is the cycle of identifying, fixing or mitigating vulnerabilities,[61] especially in software and firmware. Vulnerability management is integral to computer security and network security.

Vulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities,[62] such as open ports, insecure software configuration, and susceptibility to malware. In order for these tools to be effective, they must be kept up to date with every new update the vendor releases. Typically, these updates will scan for the new vulnerabilities that were introduced recently.

Beyond vulnerability scanning, many organizations contract outside security auditors to run regular penetration tests against their systems to identify vulnerabilities. In some sectors, this is a contractual requirement.[63]

Reducing vulnerabilities

[edit]

The act of assessing and reducing vulnerabilities to cyber attacks is commonly referred to as information technology security assessments. They aim to assess systems for risk and to predict and test for their vulnerabilities. While formal verification of the correctness of computer systems is possible,[64][65] it is not yet common. Operating systems formally verified include seL4,[66] and SYSGO's PikeOS[67][68] – but these make up a very small percentage of the market.

It is possible to reduce an attacker's chances by keeping systems up to date with security patches and updates and by hiring people with expertise in security. Large companies with significant threats can hire Security Operations Centre (SOC) Analysts. These are specialists in cyber defences, with their role ranging from "conducting threat analysis to investigating reports of any new issues and preparing and testing disaster recovery plans."[69]

Whilst no measures can completely guarantee the prevention of an attack, these measures can help mitigate the damage of possible attacks. The effects of data loss/damage can be also reduced by careful backing up and insurance.

Outside of formal assessments, there are various methods of reducing vulnerabilities, including hardening systems.[70] Two factor authentication is a method for mitigating unauthorized access to a system or sensitive information.[71] It requires something you know: a password or PIN, and something you have: a card, dongle, cellphone, or another piece of hardware. This increases security as an unauthorized person needs both of these to gain access.

Protecting against social engineering and direct computer access (physical) attacks can only happen by non-computer means, which can be difficult to enforce, relative to the sensitivity of the information. Training is often involved to help mitigate this risk by improving people's knowledge of how to protect themselves and by increasing people's awareness of threats.[72] However, even in highly disciplined environments (e.g. military organizations), social engineering attacks can still be difficult to foresee and prevent.

Inoculation, derived from inoculation theory, seeks to prevent social engineering and other fraudulent tricks and traps by instilling a resistance to persuasion attempts through exposure to similar or related attempts.[73]

Hardware protection mechanisms

[edit]

Hardware-based or assisted computer security also offers an alternative to software-only computer security. Using devices and methods such as dongles, trusted platform modules, intrusion-aware cases, drive locks, disabling USB ports, and mobile-enabled access may be considered more secure due to the physical access (or sophisticated backdoor access) required in order to be compromised. Each of these is covered in more detail below.

  • USB dongles are typically used in software licensing schemes to unlock software capabilities,[74] but they can also be seen as a way to prevent unauthorized access to a computer or other device's software. The dongle, or key, essentially creates a secure encrypted tunnel between the software application and the key. The principle is that an encryption scheme on the dongle, such as Advanced Encryption Standard (AES) provides a stronger measure of security since it is harder to hack and replicate the dongle than to simply copy the native software to another machine and use it. Another security application for dongles is to use them for accessing web-based content such as cloud software or Virtual Private Networks (VPNs).[75] In addition, a USB dongle can be configured to lock or unlock a computer.[76]
  • Trusted platform modules (TPMs) secure devices by integrating cryptographic capabilities onto access devices, through the use of microprocessors, or so-called computers-on-a-chip. TPMs used in conjunction with server-side software offer a way to detect and authenticate hardware devices, preventing unauthorized network and data access.[77]
  • Computer case intrusion detection refers to a device, typically a push-button switch, which detects when a computer case is opened. The firmware or BIOS is programmed to show an alert to the operator when the computer is booted up the next time.
  • Drive locks are essentially software tools to encrypt hard drives, making them inaccessible to thieves.[78] Tools exist specifically for encrypting external drives as well.[79]
  • Disabling USB ports is a security option for preventing unauthorized and malicious access to an otherwise secure computer. Infected USB dongles connected to a network from a computer inside the firewall are considered by the magazine Network World as the most common hardware threat facing computer networks.
  • Disconnecting or disabling peripheral devices (like camera, GPS, removable storage, etc.), that are not in use.[80]
  • Mobile-enabled access devices are growing in popularity due to the ubiquitous nature of cell phones.[81] Built-in capabilities such as Bluetooth, the newer Bluetooth low-energy (LE), near-field communication (NFC) on non-iOS devices and biometric validation such as thumbprint readers, as well as QR code reader software designed for mobile devices, offer new, secure ways for mobile phones to connect to access control systems. These control systems provide computer security and can also be used for controlling access to secure buildings.[82]
  • IOMMUs allow for hardware-based sandboxing of components in mobile and desktop computers by utilizing direct memory access protections.[83][84]
  • Physical Unclonable Functions (PUFs) can be used as a digital fingerprint or a unique identifier to integrated circuits and hardware, providing users the ability to secure the hardware supply chains going into their systems.[85][86]

Secure operating systems

[edit]

One use of the term computer security refers to technology that is used to implement secure operating systems. Using secure operating systems is a good way of ensuring computer security. These are systems that have achieved certification from an external security-auditing organization, the most popular evaluations are Common Criteria (CC).[87]

Secure coding

[edit]

In software engineering, secure coding aims to guard against the accidental introduction of security vulnerabilities. It is also possible to create software designed from the ground up to be secure. Such systems are secure by design. Beyond this, formal verification aims to prove the correctness of the algorithms underlying a system;[88] important for cryptographic protocols for example.

Capabilities and access control lists

[edit]

Within computer systems, two of the main security models capable of enforcing privilege separation are access control lists (ACLs) and role-based access control (RBAC).

An access-control list (ACL), with respect to a computer file system, is a list of permissions associated with an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

Role-based access control is an approach to restricting system access to authorized users,[89][90][91] used by the majority of enterprises with more than 500 employees,[92] and can implement mandatory access control (MAC) or discretionary access control (DAC).

A further approach, capability-based security has been mostly restricted to research operating systems. Capabilities can, however, also be implemented at the language level, leading to a style of programming that is essentially a refinement of standard object-oriented design. An open-source project in the area is the E language.

User security training

[edit]

The end-user is widely recognized as the weakest link in the security chain[93] and it is estimated that more than 90% of security incidents and breaches involve some kind of human error.[94][95] Among the most commonly recorded forms of errors and misjudgment are poor password management, sending emails containing sensitive data and attachments to the wrong recipient, the inability to recognize misleading URLs and to identify fake websites and dangerous email attachments. A common mistake that users make is saving their user id/password in their browsers to make it easier to log in to banking sites. This is a gift to attackers who have obtained access to a machine by some means. The risk may be mitigated by the use of two-factor authentication.[96]

As the human component of cyber risk is particularly relevant in determining the global cyber risk[97] an organization is facing, security awareness training, at all levels, not only provides formal compliance with regulatory and industry mandates but is considered essential[98] in reducing cyber risk and protecting individuals and companies from the great majority of cyber threats.

The focus on the end-user represents a profound cultural change for many security practitioners, who have traditionally approached cyber security exclusively from a technical perspective, and moves along the lines suggested by major security centers[99] to develop a culture of cyber awareness within the organization, recognizing that a security-aware user provides an important line of defense against cyber attacks.

Digital hygiene

[edit]

Related to end-user training, digital hygiene or cyber hygiene is a fundamental principle relating to information security and, as the analogy with personal hygiene shows, is the equivalent of establishing simple routine measures to minimize the risks from cyber threats. The assumption is that good cyber hygiene practices can give networked users another layer of protection, reducing the risk that one vulnerable node will be used to either mount attacks or compromise another node or network, especially from common cyberattacks.[100] Cyber hygiene should also not be mistaken for proactive cyber defence, a military term.[101]

The most common acts of digital hygiene can include updating malware protection, cloud back-ups, passwords, and ensuring restricted admin rights and network firewalls.[102] As opposed to a purely technology-based defense against threats, cyber hygiene mostly regards routine measures that are technically simple to implement and mostly dependent on discipline[103] or education.[104] It can be thought of as an abstract list of tips or measures that have been demonstrated as having a positive effect on personal or collective digital security. As such, these measures can be performed by laypeople, not just security experts.

Cyber hygiene relates to personal hygiene as computer viruses relate to biological viruses (or pathogens). However, while the term computer virus was coined almost simultaneously with the creation of the first working computer viruses,[105] the term cyber hygiene is a much later invention, perhaps as late as 2000[106] by Internet pioneer Vint Cerf. It has since been adopted by the Congress[107] and Senate of the United States,[108] the FBI,[109] EU institutions[100] and heads of state.[101]

Difficulty of responding to breaches

[edit]

Responding to attempted security breaches is often very difficult for a variety of reasons, including:

  • Identifying attackers is difficult, as they may operate through proxies, temporary anonymous dial-up accounts, wireless connections, and other anonymizing procedures which make back-tracing difficult – and are often located in another jurisdiction. If they successfully breach security, they have also often gained enough administrative access to enable them to delete logs to cover their tracks.
  • The sheer number of attempted attacks, often by automated vulnerability scanners and computer worms, is so large that organizations cannot spend time pursuing each.
  • Law enforcement officers often lack the skills, interest or budget to pursue attackers. Furthermore, identifying attackers across a network may necessitate collecting logs from multiple locations within the network and across various countries, a process that can be both difficult and time-consuming.

Where an attack succeeds and a breach occurs, many jurisdictions now have in place mandatory security breach notification laws.

Types of security and privacy

[edit]

Systems at risk

[edit]

The growth in the number of computer systems and the increasing reliance upon them by individuals, businesses, industries, and governments means that there are an increasing number of systems at risk.

Financial systems

[edit]

The computer systems of financial regulators and financial institutions like the U.S. Securities and Exchange Commission, SWIFT, investment banks, and commercial banks are prominent hacking targets for cybercriminals interested in manipulating markets and making illicit gains.[110] Websites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are also prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market.[111] In-store payment systems and ATMs have also been tampered with in order to gather customer account data and PINs.

The UCLA Internet Report: Surveying the Digital Future (2000) found that the privacy of personal data created barriers to online sales and that more than nine out of 10 internet users were somewhat or very concerned about credit card security.[112]

The most common web technologies for improving security between browsers and websites are named SSL (Secure Sockets Layer), and its successor TLS (Transport Layer Security), identity management and authentication services, and domain name services allow companies and consumers to engage in secure communications and commerce. Several versions of SSL and TLS are commonly used today in applications such as web browsing, e-mail, internet faxing, instant messaging, and VoIP (voice-over-IP). There are various interoperable implementations of these technologies, including at least one implementation that is open source. Open source allows anyone to view the application's source code, and look for and report vulnerabilities.

The credit card companies Visa and MasterCard cooperated to develop the secure EMV chip which is embedded in credit cards. Further developments include the Chip Authentication Program where banks give customers hand-held card readers to perform online secure transactions. Other developments in this arena include the development of technology such as Instant Issuance which has enabled shopping mall kiosks acting on behalf of banks to issue on-the-spot credit cards to interested customers.

Utilities and industrial equipment

[edit]

Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks. The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment controlled by computers not connected to the Internet can be vulnerable. In 2014, the Computer Emergency Readiness Team, a division of the Department of Homeland Security, investigated 79 hacking incidents at energy companies.[113]

Aviation

[edit]

The aviation industry is very reliant on a series of complex systems which could be attacked.[114] A simple power outage at one airport can cause repercussions worldwide,[115] much of the system relies on radio transmissions which could be disrupted,[116] and controlling aircraft over oceans is especially dangerous because radar surveillance only extends 175 to 225 miles offshore.[117] There is also potential for attack from within an aircraft.[118]

Implementing fixes in aerospace systems poses a unique challenge because efficient air transportation is heavily affected by weight and volume. Improving security by adding physical devices to airplanes could increase their unloaded weight, and could potentially reduce cargo or passenger capacity.[119]

In Europe, with the (Pan-European Network Service)[120] and NewPENS,[121] and in the US with the NextGen program,[122] air navigation service providers are moving to create their own dedicated networks.

Many modern passports are now biometric passports, containing an embedded microchip that stores a digitized photograph and personal information such as name, gender, and date of birth. In addition, more countries[which?] are introducing facial recognition technology to reduce identity-related fraud. The introduction of the ePassport has assisted border officials in verifying the identity of the passport holder, thus allowing for quick passenger processing.[123] Plans are under way in the US, the UK, and Australia to introduce SmartGate kiosks with both retina and fingerprint recognition technology.[124] The airline industry is moving from the use of traditional paper tickets towards the use of electronic tickets (e-tickets). These have been made possible by advances in online credit card transactions in partnership with the airlines. Long-distance bus companies[which?] are also switching over to e-ticketing transactions today.

The consequences of a successful attack range from loss of confidentiality to loss of system integrity, air traffic control outages, loss of aircraft, and even loss of life.

Consumer devices

[edit]

Desktop computers and laptops are commonly targeted to gather passwords or financial account information or to construct a botnet to attack another target. Smartphones, tablet computers, smart watches, and other mobile devices such as quantified self devices like activity trackers have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. WiFi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.[125]

The increasing number of home automation devices such as the Nest thermostat are also potential targets.[125]

Healthcare

[edit]

Today many healthcare providers and health insurance companies use the internet to provide enhanced products and services. Examples are the use of tele-health to potentially offer better quality and access to healthcare, or fitness trackers to lower insurance premiums.[126] Patient records are increasingly being placed on secure in-house networks, alleviating the need for extra storage space.[127]

Large corporations

[edit]

Large corporations are common targets. In many cases attacks are aimed at financial gain through identity theft and involve data breaches. Examples include the loss of millions of clients' credit card and financial details by Home Depot,[128] Staples,[129] Target Corporation,[130] and Equifax.[131]

Medical records have been targeted in general identify theft, health insurance fraud, and impersonating patients to obtain prescription drugs for recreational purposes or resale.[132] Although cyber threats continue to increase, 62% of all organizations did not increase security training for their business in 2015.[133]

Not all attacks are financially motivated, however: security firm HBGary Federal had a serious series of attacks in 2011 from hacktivist group Anonymous in retaliation for the firm's CEO claiming to have infiltrated their group,[134][135] and Sony Pictures was hacked in 2014 with the apparent dual motive of embarrassing the company through data leaks and crippling the company by wiping workstations and servers.[136][137]

Automobiles

[edit]

Vehicles are increasingly computerized, with engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver-assistance systems on many models. Additionally, connected cars may use WiFi and Bluetooth to communicate with onboard consumer devices and the cell phone network.[138] Self-driving cars are expected to be even more complex. All of these systems carry some security risks, and such issues have gained wide attention.[139][140][141]

Simple examples of risk include a malicious compact disc being used as an attack vector,[142] and the car's onboard microphones being used for eavesdropping. However, if access is gained to a car's internal controller area network, the danger is much greater[138] – and in a widely publicized 2015 test, hackers remotely carjacked a vehicle from 10 miles away and drove it into a ditch.[143][144]

Manufacturers are reacting in numerous ways, with Tesla in 2016 pushing out some security fixes over the air into its cars' computer systems.[145] In the area of autonomous vehicles, in September 2016 the United States Department of Transportation announced some initial safety standards, and called for states to come up with uniform policies.[146][147][148]

Additionally, e-Drivers' licenses are being developed using the same technology. For example, Mexico's licensing authority (ICV) has used a smart card platform to issue the first e-Drivers' licenses to the city of Monterrey, in the state of Nuevo León.[149]

Shipping

[edit]

Shipping companies[150] have adopted RFID (Radio Frequency Identification) technology as an efficient, digitally secure, tracking device. Unlike a barcode, RFID can be read up to 20 feet away. RFID is used by FedEx[151] and UPS.[152]

Government

[edit]

Government and military computer systems are commonly attacked by activists[153][154][155] and foreign powers.[156][157][158][159] This includes local and regional government infrastructure such as traffic light controls, police and intelligence agency communications, personnel records, as well as student records.[160]

Internet of things and physical vulnerabilities

[edit]

The Internet of things (IoT) is the network of physical objects such as devices, vehicles, and buildings that are embedded with electronics, software, sensors, and network connectivity that enables them to collect and exchange data.[161] Concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.[162][163]

While the IoT creates opportunities for more direct integration of the physical world into computer-based systems,[164][165] it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyberattacks are likely to become an increasingly physical (rather than simply virtual) threat.[166] If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet-connected hotel door locks.[167]

An attack aimed at physical infrastructure or human lives is often called a cyber-kinetic attack. As IoT devices and appliances become more widespread, the prevalence and potential damage of cyber-kinetic attacks can increase substantially.

Medical systems

[edit]

Medical devices have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in-hospital diagnostic equipment[168] and implanted devices including pacemakers[169] and insulin pumps.[170] There are many reports of hospitals and hospital organizations getting hacked, including ransomware attacks,[171][172][173][174] Windows XP exploits,[175][176] viruses,[177][178] and data breaches of sensitive data stored on hospital servers.[179][172][180][181] On 28 December 2016 the US Food and Drug Administration released its recommendations for how medical device manufacturers should maintain the security of Internet-connected devices – but no structure for enforcement.[182][183]

Energy sector

[edit]

In distributed generation systems, the risk of a cyber attack is real, according to Daily Energy Insider. An attack could cause a loss of power in a large area for a long period of time, and such an attack could have just as severe consequences as a natural disaster. The District of Columbia is considering creating a Distributed Energy Resources (DER) Authority within the city, with the goal being for customers to have more insight into their own energy use and giving the local electric utility, Pepco, the chance to better estimate energy demand. The D.C. proposal, however, would "allow third-party vendors to create numerous points of energy distribution, which could potentially create more opportunities for cyber attackers to threaten the electric grid."[184]

Telecommunications

[edit]

Perhaps the most widely known digitally secure telecommunication device is the SIM (Subscriber Identity Module) card, a device that is embedded in most of the world's cellular devices before any service can be obtained. The SIM card is just the beginning of this digitally secure environment.

The Smart Card Web Servers draft standard (SCWS) defines the interfaces to an HTTP server in a smart card.[185] Tests are being conducted to secure OTA ("over-the-air") payment and credit card information from and to a mobile phone. Combination SIM/DVD devices are being developed through Smart Video Card technology which embeds a DVD-compliant optical disc into the card body of a regular SIM card.

Other telecommunication developments involving digital security include mobile signatures, which use the embedded SIM card to generate a legally binding electronic signature.

Cost and impact of security breaches

[edit]

Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. "Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general. The 2003 loss estimates by these firms range from $13 billion (worms and viruses only) to $226 billion (for all forms of covert attacks). The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal."[186]

However, reasonable estimates of the financial cost of security breaches can actually help organizations make rational investment decisions. According to the classic Gordon-Loeb Model analyzing the optimal investment level in information security, one can conclude that the amount a firm spends to protect information should generally be only a small fraction of the expected loss (i.e., the expected value of the loss resulting from a cyber/information security breach).[187]

Attacker motivation

[edit]

As with physical security, the motivations for breaches of computer security vary between attackers. Some are thrill-seekers or vandals, some are activists, others are criminals looking for financial gain. State-sponsored attackers are now common and well resourced but started with amateurs such as Markus Hess who hacked for the KGB, as recounted by Clifford Stoll in The Cuckoo's Egg.

Attackers motivations can vary for all types of attacks from pleasure to political goals.[15] For example, hacktivists may target a company or organization that carries out activities they do not agree with. This would be to create bad publicity for the company by having its website crash.

High capability hackers, often with larger backing or state sponsorship, may attack based on the demands of their financial backers. These attacks are more likely to attempt more serious attack. An example of a more serious attack was the 2015 Ukraine power grid hack, which reportedly utilised the spear-phising, destruction of files, and denial-of-service attacks to carry out the full attack.[188][189]

Additionally, recent attacker motivations can be traced back to extremist organizations seeking to gain political advantage or disrupt social agendas.[190] The growth of the internet, mobile technologies, and inexpensive computing devices have led to a rise in capabilities but also to the risk to environments that are deemed as vital to operations. All critical targeted environments are susceptible to compromise and this has led to a series of proactive studies on how to migrate the risk by taking into consideration motivations by these types of actors. Several stark differences exist between the hacker motivation and that of nation state actors seeking to attack based on an ideological preference.[191]

A key aspect of threat modeling for any system is identifying the motivations behind potential attacks and the individuals or groups likely to carry them out. The level and detail of security measures will differ based on the specific system being protected. For instance, a home personal computer, a bank, and a classified military network each face distinct threats, despite using similar underlying technologies.[192]

Computer security incident management

[edit]

Computer security incident management is an organized approach to addressing and managing the aftermath of a computer security incident or compromise with the goal of preventing a breach or thwarting a cyberattack. An incident that is not identified and managed at the time of intrusion typically escalates to a more damaging event such as a data breach or system failure. The intended outcome of a computer security incident response plan is to contain the incident, limit damage and assist recovery to business as usual. Responding to compromises quickly can mitigate exploited vulnerabilities, restore services and processes and minimize losses.[193] Incident response planning allows an organization to establish a series of best practices to stop an intrusion before it causes damage. Typical incident response plans contain a set of written instructions that outline the organization's response to a cyberattack. Without a documented plan in place, an organization may not successfully detect an intrusion or compromise and stakeholders may not understand their roles, processes and procedures during an escalation, slowing the organization's response and resolution.

There are four key components of a computer security incident response plan:

  1. Preparation: Preparing stakeholders on the procedures for handling computer security incidents or compromises
  2. Detection and analysis: Identifying and investigating suspicious activity to confirm a security incident, prioritizing the response based on impact and coordinating notification of the incident
  3. Containment, eradication and recovery: Isolating affected systems to prevent escalation and limit impact, pinpointing the genesis of the incident, removing malware, affected systems and bad actors from the environment and restoring systems and data when a threat no longer remains
  4. Post incident activity: Post mortem analysis of the incident, its root cause and the organization's response with the intent of improving the incident response plan and future response efforts.[194]

Notable attacks and breaches

[edit]

Some illustrative examples of different types of computer security breaches are given below.

Robert Morris and the first computer worm

[edit]

In 1988, 60,000 computers were connected to the Internet, and most were mainframes, minicomputers and professional workstations. On 2 November 1988, many started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers – the first internet computer worm.[195] The software was traced back to 23-year-old Cornell University graduate student Robert Tappan Morris who said "he wanted to count how many machines were connected to the Internet".[195]

Rome Laboratory

[edit]

In 1994, over a hundred intrusions were made by unidentified crackers into the Rome Laboratory, the US Air Force's main command and research facility. Using trojan horses, hackers were able to obtain unrestricted access to Rome's networking systems and remove traces of their activities. The intruders were able to obtain classified files, such as air tasking order systems data and furthermore able to penetrate connected networks of National Aeronautics and Space Administration's Goddard Space Flight Center, Wright-Patterson Air Force Base, some Defense contractors, and other private sector organizations, by posing as a trusted Rome center user.[196]

TJX customer credit card details

[edit]

In early 2007, American apparel and home goods company TJX announced that it was the victim of an unauthorized computer systems intrusion[197] and that the hackers had accessed a system that stored data on credit card, debit card, check, and merchandise return transactions.[198]

Stuxnet attack

[edit]

In 2010, the computer worm known as Stuxnet reportedly ruined almost one-fifth of Iran's nuclear centrifuges.[199] It did so by disrupting industrial programmable logic controllers (PLCs) in a targeted attack. This is generally believed to have been launched by Israel and the United States to disrupt Iran's nuclear program[200][201][202][203] – although neither has publicly admitted this.

Global surveillance disclosures

[edit]

In early 2013, documents provided by Edward Snowden were published by The Washington Post and The Guardian[204][205] exposing the massive scale of NSA global surveillance. There were also indications that the NSA may have inserted a backdoor in a NIST standard for encryption.[206] This standard was later withdrawn due to widespread criticism.[207] The NSA additionally were revealed to have tapped the links between Google's data centers.[208]

Target and Home Depot breaches

[edit]

A Ukrainian hacker known as Rescator broke into Target Corporation computers in 2013, stealing roughly 40 million credit cards,[209] and then Home Depot computers in 2014, stealing between 53 and 56 million credit card numbers.[210] Warnings were delivered at both corporations, but ignored; physical security breaches using self checkout machines are believed to have played a large role. "The malware utilized is absolutely unsophisticated and uninteresting," says Jim Walter, director of threat intelligence operations at security technology company McAfee – meaning that the heists could have easily been stopped by existing antivirus software had administrators responded to the warnings. The size of the thefts has resulted in major attention from state and Federal United States authorities and the investigation is ongoing.

Office of Personnel Management data breach

[edit]

In April 2015, the Office of Personnel Management discovered it had been hacked more than a year earlier in a data breach, resulting in the theft of approximately 21.5 million personnel records handled by the office.[211] The Office of Personnel Management hack has been described by federal officials as among the largest breaches of government data in the history of the United States.[212] Data targeted in the breach included personally identifiable information such as Social Security numbers, names, dates and places of birth, addresses, and fingerprints of current and former government employees as well as anyone who had undergone a government background check.[213][214] It is believed the hack was perpetrated by Chinese hackers.[215]

Ashley Madison breach

[edit]

In July 2015, a hacker group known as The Impact Team successfully breached the extramarital relationship website Ashley Madison, created by Avid Life Media. The group claimed that they had taken not only company data but user data as well. After the breach, The Impact Team dumped emails from the company's CEO, to prove their point, and threatened to dump customer data unless the website was taken down permanently.[216] When Avid Life Media did not take the site offline the group released two more compressed files, one 9.7GB and the second 20GB. After the second data dump, Avid Life Media CEO Noel Biderman resigned; but the website remained to function.

Colonial Pipeline ransomware attack

[edit]

In June 2021, the cyber attack took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast.[217]

[edit]

International legal issues of cyber attacks are complicated in nature. There is no global base of common rules to judge, and eventually punish, cybercrimes and cybercriminals - and where security firms or agencies do locate the cybercriminal behind the creation of a particular piece of malware or form of cyber attack, often the local authorities cannot take action due to lack of laws under which to prosecute.[218][219] Proving attribution for cybercrimes and cyberattacks is also a major problem for all law enforcement agencies. "Computer viruses switch from one country to another, from one jurisdiction to another – moving around the world, using the fact that we don't have the capability to globally police operations like this. So the Internet is as if someone [had] given free plane tickets to all the online criminals of the world."[218] The use of techniques such as dynamic DNS, fast flux and bullet proof servers add to the difficulty of investigation and enforcement.

Role of government

[edit]

The role of the government is to make regulations to force companies and organizations to protect their systems, infrastructure and information from any cyberattacks, but also to protect its own national infrastructure such as the national power-grid.[220]

The government's regulatory role in cyberspace is complicated. For some, cyberspace was seen as a virtual space that was to remain free of government intervention, as can be seen in many of today's libertarian blockchain and bitcoin discussions.[221]

Many government officials and experts think that the government should do more and that there is a crucial need for improved regulation, mainly due to the failure of the private sector to solve efficiently the cyber security problem. R. Clarke said during a panel discussion at the RSA Security Conference in San Francisco, he believes that the "industry only responds when you threaten regulation. If the industry doesn't respond (to the threat), you have to follow through."[222] On the other hand, executives from the private sector agree that improvements are necessary, but think that government intervention would affect their ability to innovate efficiently. Daniel R. McCarthy analyzed this public-private partnership in cyber security and reflected on the role of cyber security in the broader constitution of political order.[223]

On 22 May 2020, the UN Security Council held its second ever informal meeting on cyber security to focus on cyber challenges to international peace. According to UN Secretary-General António Guterres, new technologies are too often used to violate rights.[224]

International actions

[edit]

Many different teams and organizations exist, including:

Europe

[edit]

On 14 April 2016, the European Parliament and the Council of the European Union adopted the General Data Protection Regulation (GDPR). The GDPR, which came into force on 25 May 2018, grants individuals within the European Union (EU) and the European Economic Area (EEA) the right to the protection of personal data. The regulation requires that any entity that processes personal data incorporate data protection by design and by default. It also requires that certain organizations appoint a Data Protection Officer (DPO).

The IT Security Association TeleTrusT exist in Germany since June 1986, which is an international competence network for IT security.

National actions

[edit]

Computer emergency response teams

[edit]

Most countries have their own computer emergency response team to protect network security.

Canada

[edit]

Since 2010, Canada has had a cyber security strategy.[230][231] This functions as a counterpart document to the National Strategy and Action Plan for Critical Infrastructure.[232] The strategy has three main pillars: securing government systems, securing vital private cyber systems, and helping Canadians to be secure online.[231][232] There is also a Cyber Incident Management Framework to provide a coordinated response in the event of a cyber incident.[233][234]

The Canadian Cyber Incident Response Centre (CCIRC) is responsible for mitigating and responding to threats to Canada's critical infrastructure and cyber systems. It provides support to mitigate cyber threats, technical support to respond & recover from targeted cyber attacks, and provides online tools for members of Canada's critical infrastructure sectors.[235] It posts regular cyber security bulletins[236] & operates an online reporting tool where individuals and organizations can report a cyber incident.[237]

To inform the general public on how to protect themselves online, Public Safety Canada has partnered with STOP.THINK.CONNECT, a coalition of non-profit, private sector, and government organizations,[238] and launched the Cyber Security Cooperation Program.[239][240] They also run the GetCyberSafe portal for Canadian citizens, and Cyber Security Awareness Month during October.[241]

Public Safety Canada aims to begin an evaluation of Canada's cyber security strategy in early 2015.[232]

Australia

[edit]

Australian federal government announced an $18.2 million investment to fortify the cyber security resilience of small and medium enterprises (SMEs) and enhance their capabilities in responding to cyber threats. This financial backing is an integral component of the 2023-2030 Australian Cyber Security Strategy. A substantial allocation of $7.2 million is earmarked for the establishment of a voluntary cyber health check program, facilitating businesses in conducting a comprehensive and tailored self-assessment of their cyber security upskill.

This avant-garde health assessment serves as a diagnostic tool, enabling enterprises to ascertain the robustness of Australia's cyber security regulations. Furthermore, it affords them access to a repository of educational resources and materials, fostering the acquisition of skills necessary for an elevated cyber security posture. This groundbreaking initiative was jointly disclosed by Minister for Cyber Security Clare O'Neil and Minister for Small Business Julie Collins.[242]

Hong Kong

[edit]

Hong Kong's Protection of Critical Infrastructures (Computer Systems) Bill (the “Bill”) was passed by the Legislative Council on 19 March 2025, with the purpose to “establish legal requirements for organisations designated as critical infrastructure operators”.[243]. To defend the economy and public safety against the cyber threats of severe disruption, Hong Kong’s new Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap.653) (Ordinance), together with its Code of Practice (CoP) guidelines for gatekeepers at the front line of defence, came into effect on 1 January 2026.[244]

India

[edit]

Some provisions for cyber security have been incorporated into rules framed under the Information Technology Act 2000.[245]

The National Cyber Security Policy 2013 is a policy framework by the Ministry of Electronics and Information Technology (MeitY) which aims to protect the public and private infrastructure from cyberattacks, and safeguard "information, such as personal information (of web users), financial and banking information and sovereign data". CERT- In is the nodal agency which monitors the cyber threats in the country. The post of National Cyber Security Coordinator has also been created in the Prime Minister's Office (PMO).

The Indian Companies Act 2013 has also introduced cyber law and cyber security obligations on the part of Indian directors. Some provisions for cyber security have been incorporated into rules framed under the Information Technology Act 2000 Update in 2013.[246]

South Korea

[edit]

Following cyberattacks in the first half of 2013, when the government, news media, television stations, and bank websites were compromised, the national government committed to the training of 5,000 new cyber security experts by 2017. The South Korean government blamed its northern counterpart for these attacks, as well as incidents that occurred in 2009, 2011,[247] and 2012, but Pyongyang denies the accusations.[248]

United Kingdom

[edit]

In 2016 the National Cyber Security Centre was formed as the central body overseeing cyber-security in the UK, as part of GCHQ.[249][250] The UK government published a National Cyber Security Strategy in 2022 assigning £2.6bn for industry, skills and national security.[251][252] In addition, the National Cyber Force, launched in 2020, works with GCHQ and the Ministry of Defence and aims to "transform the UK’s ability to contest adversaries in cyber space, to protect the country, its people and our way of life".[253]

United States

[edit]
Cyber Plan
[edit]

The United States has its first fully formed cyber plan in 15 years, as a result of the release of this National Cyber plan.[254] In this policy, the US says it will: Protect the country by keeping networks, systems, functions, and data safe; Promote American wealth by building a strong digital economy and encouraging strong domestic innovation; Peace and safety should be kept by making it easier for the US to stop people from using computer tools for bad things, working with friends and partners to do this; and increase the United States' impact around the world to support the main ideas behind an open, safe, reliable, and compatible Internet.[255]

The new U.S. cyber strategy[256] seeks to allay some of those concerns by promoting responsible behavior in cyberspace, urging nations to adhere to a set of norms, both through international law and voluntary standards. It also calls for specific measures to harden U.S. government networks from attacks, like the June 2015 intrusion into the U.S. Office of Personnel Management (OPM), which compromised the records of about 4.2 million current and former government employees. And the strategy calls for the U.S. to continue to name and shame bad cyber actors, calling them out publicly for attacks when possible, along with the use of economic sanctions and diplomatic pressure.[257]

Legislation
[edit]

The 1986 18 U.S.C. § 1030, the Computer Fraud and Abuse Act is the key legislation. It prohibits unauthorized access or damage of protected computers as defined in 18 U.S.C. § 1030(e)(2). Although various other measures have been proposed[258][259] – none have succeeded.

In 2013, executive order 13636 Improving Critical Infrastructure Cybersecurity was signed, which prompted the creation of the NIST Cybersecurity Framework.

In response to the Colonial Pipeline ransomware attack[260] President Joe Biden signed Executive Order 14028[261] on May 12, 2021, to increase software security standards for sales to the government, tighten detection and security on existing systems, improve information sharing and training, establish a Cyber Safety Review Board, and improve incident response.

Standardized government testing services
[edit]

The General Services Administration (GSA) has[when?] standardized the penetration test service as a pre-vetted support service, to rapidly address potential vulnerabilities, and stop adversaries before they impact US federal, state and local governments. These services are commonly referred to as Highly Adaptive Cybersecurity Services (HACS).

Agencies
[edit]

The Department of Homeland Security has a dedicated division responsible for the response system, risk management program and requirements for cyber security in the United States called the National Cyber Security Division.[262][263] The division is home to US-CERT operations and the National Cyber Alert System.[263] The National Cybersecurity and Communications Integration Center brings together government organizations responsible for protecting computer networks and networked infrastructure.[264]

The third priority of the FBI is to: "Protect the United States against cyber-based attacks and high-technology crimes",[265] and they, along with the National White Collar Crime Center (NW3C), and the Bureau of Justice Assistance (BJA) are part of the multi-agency task force, The Internet Crime Complaint Center, also known as IC3.[266]

In addition to its own specific duties, the FBI participates alongside non-profit organizations such as InfraGard.[267][268]

The Computer Crime and Intellectual Property Section (CCIPS) operates in the United States Department of Justice Criminal Division. The CCIPS is in charge of investigating computer crime and intellectual property crime and is specialized in the search and seizure of digital evidence in computers and networks.[269] In 2017, CCIPS published A Framework for a Vulnerability Disclosure Program for Online Systems to help organizations "clearly describe authorized vulnerability disclosure and discovery conduct, thereby substantially reducing the likelihood that such described activities will result in a civil or criminal violation of law under the Computer Fraud and Abuse Act (18 U.S.C. § 1030)."[270]

The United States Cyber Command, also known as USCYBERCOM, "has the mission to direct, synchronize, and coordinate cyberspace planning and operations to defend and advance national interests in collaboration with domestic and international partners."[271] It has no role in the protection of civilian networks.[272][273]

The U.S. Federal Communications Commission's role in cyber security is to strengthen the protection of critical communications infrastructure, to assist in maintaining the reliability of networks during disasters, to aid in swift recovery after, and to ensure that first responders have access to effective communications services.[274]

The Food and Drug Administration has issued guidance for medical devices,[275] and the National Highway Traffic Safety Administration[276] is concerned with automotive cyber security. After being criticized by the Government Accountability Office,[277] and following successful attacks on airports and claimed attacks on airplanes, the Federal Aviation Administration has devoted funding to securing systems on board the planes of private manufacturers, and the Aircraft Communications Addressing and Reporting System.[278] Concerns have also been raised about the future Next Generation Air Transportation System.[279]

The US Department of Defense (DoD) issued DoD Directive 8570 in 2004, supplemented by DoD Directive 8140, requiring all DoD employees and all DoD contract personnel involved in information assurance roles and activities to earn and maintain various industry Information Technology (IT) certifications in an effort to ensure that all DoD personnel involved in network infrastructure defense have minimum levels of IT industry recognized knowledge, skills and abilities (KSA). Andersson and Reimers (2019) report these certifications range from CompTIA's A+ and Security+ through the ICS2.org's CISSP, etc.[280]

Computer emergency readiness team
[edit]

Computer emergency response team is a name given to expert groups that handle computer security incidents. In the US, two distinct organizations exist, although they do work closely together.

U.S. NRC, 10 CFR 73.54 Cybersecurity
[edit]

In the context of U.S. nuclear power plants, the U.S. Nuclear Regulatory Commission (NRC) outlines cyber security requirements under 10 CFR Part 73, specifically in §73.54.[282]

NEI 08-09: Cybersecurity Plan for Nuclear Power Plants
[edit]

The Nuclear Energy Institute's NEI 08-09 document, Cyber Security Plan for Nuclear Power Reactors,[283] outlines a comprehensive framework for cybersecurity in the nuclear power industry. Drafted with input from the U.S. NRC, this guideline is instrumental in aiding licensees to comply with the Code of Federal Regulations (CFR), which mandates robust protection of digital computers and equipment and communications systems at nuclear power plants against cyber threats.[284]

Modern warfare

[edit]

There is growing concern that cyberspace will become the next theater of warfare. As Mark Clayton from The Christian Science Monitor wrote in a 2015 article titled "The New Cyber Arms Race":

In the future, wars will not just be fought by soldiers with guns or with planes that drop bombs. They will also be fought with the click of a mouse a half a world away that unleashes carefully weaponized computer programs that disrupt or destroy critical industries like utilities, transportation, communications, and energy. Such attacks could also disable military networks that control the movement of troops, the path of jet fighters, the command and control of warships.[285]

This has led to new terms such as cyberwarfare and cyberterrorism. The United States Cyber Command was created in 2009[286] and many other countries have similar forces.

There are a few critical voices that question whether cyber security is as significant a threat as it is made out to be.[287][288][289]

Careers

[edit]

Cyber security is a fast-growing field of IT concerned with reducing organizations' risk of getting hacked or data breaches.[290] According to research from the Enterprise Strategy Group, 46% of organizations say that they have a "problematic shortage" of cyber security skills in 2016, up from 28% in 2015.[291] Commercial, government and non-governmental organizations all employ cyber security professionals. The fastest increases in demand for cyber security workers are in industries managing increasing volumes of consumer data such as finance, health care, and retail.[292] However, the use of the term cybersecurity is more prevalent in government job descriptions.[293]

Cyber security job titles and descriptions include:[294]

Security analyst
Analyzes and assesses vulnerabilities in the infrastructure (software, hardware, networks), investigates using available tools and countermeasures to remedy the detected vulnerabilities and recommends solutions and best practices. Analyzes and assesses damage to the data/infrastructure as a result of security incidents, examines available recovery tools and processes, and recommends solutions. Tests for compliance with security policies and procedures. May assist in the creation, implementation, or management of security solutions.
Security engineer
Performs security monitoring, security and data/logs analysis, and forensic analysis, to detect security incidents, and mount the incident response. Investigates and utilizes new technologies and processes to enhance security capabilities and implement improvements. May also review code or perform other security engineering methodologies.
Security architect
Designs a security system or major components of a security system, and may head a security design team building a new security system.[295]
Chief Information Security Officer (CISO)
A high-level management position responsible for the entire information security division/staff. The position may include hands-on technical work.[296]
Chief Security Officer (CSO)
A high-level management position responsible for the entire security division/staff. A newer position is now deemed needed as security risks grow.
Data Protection Officer (DPO)
A DPO is tasked with monitoring compliance with data protection laws (such as GDPR), data protection policies, awareness-raising, training, and audits.[297]
Security consultant/specialist/intelligence
Broad titles that encompass any one or all of the other roles or titles tasked with protecting computers, networks, software, data or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments.

Student programs are also available for people interested in beginning a career in cyber security.[298][299] Meanwhile, a flexible and effective option for information security professionals of all experience levels to keep studying is online security training, including webcasts.[300][301] A wide range of certified courses are also available.[302]

In the United Kingdom, a nationwide set of cyber security forums, known as the U.K Cyber Security Forum, were established supported by the Government's cyber security strategy[303] in order to encourage start-ups and innovation and to address the skills gap[304] identified by the U.K Government.

In Singapore, the Cyber Security Agency has issued a Singapore Operational Technology (OT) Cybersecurity Competency Framework (OTCCF). The framework defines emerging cyber security roles in Operational Technology. The OTCCF was endorsed by the Infocomm Media Development Authority (IMDA). It outlines the different OT cyber security job positions as well as the technical skills and core competencies necessary. It also depicts the many career paths available, including vertical and lateral advancement opportunities.[305]

Terminology

[edit]

The following terms used with regards to computer security are explained below:

  • Access authorization restricts access to a computer to a group of users through the use of authentication systems. These systems can protect either the whole computer, such as through an interactive login screen, or individual services, such as a FTP server. There are many methods for identifying and authenticating users, such as passwords, identification cards, smart cards, and biometric systems.
  • Anti-virus software consists of computer programs that attempt to identify, thwart, and eliminate computer viruses and other malicious software (malware).
  • Applications are executable code, so general corporate practice is to restrict or block users the power to install them; to install them only when there is a demonstrated need (e.g. software needed to perform assignments); to install only those which are known to be reputable (preferably with access to the computer code used to create the application), and to reduce the attack surface by installing as few as possible. They are typically run with least privilege, with a robust process in place to identify, test and install any released security patches or updates for them.
    • For example, programs can be installed into an individual user's account, which limits the program's potential access, as well as being a means control which users have specific exceptions to policy. In Linux, FreeBSD, OpenBSD, and other Unix-like operating systems there is an option to further restrict an application using chroot or other means of restricting the application to its own 'sandbox'. For example. Linux provides namespaces, and Cgroups to further restrict the access of an application to system resources.
    • Generalized security frameworks such as SELinux or AppArmor help administrators control access.
    • Java and other languages which compile to Java byte code and run in the Java virtual machine can have their access to other applications controlled at the virtual machine level.
    • Some software can be run in software containers which can even provide their own set of system libraries, limiting the software's, or anyone controlling it, access to the server's versions of the libraries.
  • Authentication techniques can be used to ensure that communication end-points are who they say they are.
  • Automated theorem proving and other verification tools can be used to enable critical algorithms and code used in secure systems to be mathematically proven to meet their specifications.
  • Backups are one or more copies kept of important computer files. Typically, multiple copies will be kept at different locations so that if a copy is stolen or damaged, other copies will still exist.
  • Capability and access control list techniques can be used to ensure privilege separation and mandatory access control. Capabilities vs. ACLs discusses their use.
  • Chain of trust techniques can be used to attempt to ensure that all software loaded has been certified as authentic by the system's designers.
  • Confidentiality is the nondisclosure of information except to another authorized person.[306]
  • Cryptographic techniques can be used to defend data in transit between systems, reducing the probability that the data exchange between systems can be intercepted or modified.
  • Cyber attribution, is an attribution of cybercrime, i.e., finding who perpetrated a cyberattack.
  • Cyberwarfare is an Internet-based conflict that involves politically motivated attacks on information and information systems. Such attacks can, for example, disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems.
  • Data integrity is the accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record.[307]
Cryptographic techniques involve transforming information, scrambling it, so it becomes unreadable during transmission. The intended recipient can unscramble the message; ideally, eavesdroppers cannot.
  • Encryption is used to protect the confidentiality of a message. Cryptographically secure ciphers are designed to make any practical attempt of breaking them infeasible. Symmetric-key ciphers are suitable for bulk encryption using shared keys, and public-key encryption using digital certificates can provide a practical solution for the problem of securely communicating when no key is shared in advance.
  • Endpoint security software aids networks in preventing malware infection and data theft at network entry points made vulnerable by the prevalence of potentially infected devices such as laptops, mobile devices, and USB drives.[308]
  • Firewalls serve as a gatekeeper system between networks, allowing only traffic that matches defined rules. They often include detailed logging, and may include intrusion detection and intrusion prevention features. They are near-universal between company local area networks and the Internet, but can also be used internally to impose traffic rules between networks if network segmentation is configured.
  • A hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
  • Honey pots are computers that are intentionally left vulnerable to attack by crackers. They can be used to catch crackers and to identify their techniques.
  • Intrusion-detection systems are devices or software applications that monitor networks or systems for malicious activity or policy violations.
  • A microkernel is an approach to operating system design which has only the near-minimum amount of code running at the most privileged level – and runs other elements of the operating system such as device drivers, protocol stacks and file systems, in the safer, less privileged user space.
  • Pinging. The standard ping application can be used to test if an IP address is in use. If it is, attackers may then try a port scan to detect which services are exposed.
  • A port scan is used to probe an IP address for open ports to identify accessible network services and applications.
  • A key logger is spyware that silently captures and stores each keystroke that a user types on the computer's keyboard.
  • Social engineering is the use of deception to manipulate individuals to breach security.
  • Logic bombs is a type of malware added to a legitimate program that lies dormant until it is triggered by a specific event.
  • A unikernel is a computer program that runs on a minimalistic operating system where a single application is allowed to run (as opposed to a general purpose operating system where many applications can run at the same time). This approach to minimizing the attack surface is adopted mostly in cloud environments where software is deployed in virtual machines.
  • Zero trust security means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network.

History

[edit]

Since the Internet's arrival and with the digital transformation initiated in recent years, the notion of cyber security has become a familiar subject in both our professional and personal lives. Cyber security and cyber threats have been consistently present for the last 60 years of technological change. In the 1970s and 1980s, computer security was mainly limited to academia until the conception of the Internet, where, with increased connectivity, computer viruses and network intrusions began to take off. After the spread of viruses in the 1990s, the 2000s marked the institutionalization of organized attacks such as distributed denial of service.[309] This led to the formalization of cyber security as a professional discipline.[310]

The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of computer security.[311] Ware's work straddled the intersection of material, cultural, political, and social concerns.[311]

A 1977 NIST publication[312] introduced the CIA triad of confidentiality, integrity, and availability as a clear and simple way to describe key security goals.[313] While still relevant, many more elaborate frameworks have since been proposed.[314][315]

However, in the 1970s and 1980s, there were no grave computer threats because computers and the internet were still in the early stages of development, and security threats were easily identifiable. More often, threats came from malicious insiders who gained unauthorized access to sensitive documents and files. Although malware and network breaches existed during the early years, they did not use them for financial gain. By the second half of the 1970s, established computer firms like IBM started offering commercial access control systems and computer security software products.[316]

One of the earliest examples of an attack on a computer network was the computer worm Creeper written by Bob Thomas at BBN, which propagated through the ARPANET in 1971.[317] The program was purely experimental in nature and carried no malicious payload. A later program, Reaper, was created by Ray Tomlinson in 1972 and used to destroy Creeper.[318]

Between September 1986 and June 1987, a group of German hackers performed the first documented case of cyber espionage.[319] The group hacked into American defense contractors, universities, and military base networks and sold gathered information to the Soviet KGB. The group was led by Markus Hess, who was arrested on 29 June 1987. He was convicted of espionage (along with two co-conspirators) on 15 Feb 1990.

In 1988, one of the first computer worms, called the Morris worm, was distributed via the Internet. It gained significant mainstream media attention.[320]

Netscape started developing the protocol SSL, shortly after the National Center for Supercomputing Applications (NCSA) launched Mosaic 1.0, the first web browser, in 1993.[321][322] Netscape had SSL version 1.0 ready in 1994, but it was never released to the public due to many serious security vulnerabilities.[321] However, in 1995, Netscape launched Version 2.0.[323]

The National Security Agency (NSA) is responsible for the protection of U.S. information systems and also for collecting foreign intelligence.[324] The agency analyzes commonly used software and system configurations to find security flaws, which it can use for offensive purposes against competitors of the United States.[325]

NSA contractors created and sold click-and-shoot attack tools to US agencies and close allies, but eventually, the tools made their way to foreign adversaries.[326] In 2016, NSAs own hacking tools were hacked, and Russia and North Korea have used it.[327] NSA's employees and contractors have been recruited at high salaries by adversaries, anxious to compete in cyberwarfare.[328] In 2007, the United States and Israel began exploiting security flaws in the Microsoft Windows operating system to attack and damage equipment used in Iran to refine nuclear materials. Iran responded by heavily investing in their own cyberwarfare capability, which it began using against the United States.[325]

Notable scholars

[edit]

See also

[edit]

References

[edit]
  1. ^ Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law. 12 (2). ISSN 1558-7215.
  2. ^ Computer security at the Encyclopædia Britannica
  3. ^ Tate, Nick (7 May 2013). "Reliance spells end of road for ICT amateurs". The Australian.
  4. ^ Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021). "Systematically Understanding Cybersecurity Economics: A Survey". Sustainability. 13 (24) 13677. Bibcode:2021Sust...1313677K. doi:10.3390/su132413677. hdl:11250/2978306. ISSN 2071-1050.
  5. ^ Stevens, Tim (11 June 2018). "Global Cybersecurity: New Directions in Theory and Methods" (PDF). Politics and Governance. 6 (2): 1–4. doi:10.17645/pag.v6i2.1569. Archived (PDF) from the original on 4 September 2019.
  6. ^ "About the CVE Program". www.cve.org. Retrieved 12 April 2023.
  7. ^ Zlatanov, Nikola (3 December 2015). Computer Security and Mobile Security Challenges. Tech Security Conference At: San Francisco, CA.
  8. ^ "Ghidra". nsa.gov. 1 August 2018. Archived from the original on 15 August 2020. Retrieved 17 August 2020.
  9. ^ Larabel, Michael (28 December 2017). "Syzbot: Google Continuously Fuzzing The Linux Kernel". www.phoronix.com/. Retrieved 25 March 2021.
  10. ^ a b c "Cyber attacks on SMBs: Current Stats and How to Prevent Them". crowdstrike.com. Retrieved 30 November 2023.
  11. ^ a b "Cyber security breaches survey 2023". GOV.UK. Retrieved 30 November 2023.
  12. ^ a b "How cyber attacks work". www.ncsc.gov.uk. Retrieved 30 November 2023.
  13. ^ "What is a backdoor attack? Definition and prevention | NordVPN". nordvpn.com. 30 November 2023. Retrieved 3 January 2024.
  14. ^ a b "What is a backdoor attack?". McAfee. 4 December 2023. Retrieved 4 December 2023.
  15. ^ a b c "Denial of Service (DoS) guidance". www.ncsc.gov.uk. Retrieved 4 December 2023.
  16. ^ "Computer Security". www.interelectronix.com. Retrieved 30 November 2023.
  17. ^ a b "What Is a DMA Attack? Analysis & Mitigation". Kroll. Retrieved 4 December 2023.
  18. ^ a b "What Are Eavesdropping Attacks?". Fortinet. Retrieved 5 December 2023.
  19. ^ York, Dan (1 January 2010). "Chapter 3 – Eavesdropping and Modification". In York, Dan (ed.). Seven Deadliest Unified Communications Attacks. Boston: Syngress. pp. 41–69. ISBN 978-1-59749-547-9. Retrieved 5 December 2023.
  20. ^ "What Are Eavesdropping Attacks & How To Prevent Them". Verizon Enterprise. Retrieved 5 December 2023.
  21. ^ a b c d e f "What is Malware? | IBM". www.ibm.com. 14 April 2022. Retrieved 6 December 2023.
  22. ^ Bendovschi, Andreea (2015). "Cyber-Attacks – Trends, Patterns and Security Countermeasures". Procedia Economics and Finance. 28: 24–31. doi:10.1016/S2212-5671(15)01077-1.
  23. ^ "What is malware?". McAfee. Retrieved 30 November 2023.
  24. ^ a b "What is a man-in-the-middle attack and how can I protect my organization?". verizon.com.
  25. ^ "Multi-Vector Attacks Demand Multi-Vector Protection". MSSP Alert. 24 July 2017.
  26. ^ Millman, Renee (15 December 2017). "New polymorphic malware evades three-quarters of AV scanners". SC Magazine UK. Archived from the original on 14 June 2018. Retrieved 13 July 2018.
  27. ^ a b c Tounsi, Wiem (15 May 2019), Tounsi, Wiem (ed.), "What is Cyber Threat Intelligence and How is it Evolving?", Cyber-Vigilance and Digital Trust (1 ed.), Wiley, pp. 1–49, doi:10.1002/9781119618393.ch1, ISBN 978-1-78630-448-3, S2CID 187294508, retrieved 6 December 2023citation: CS1 maint: work parameter with ISBN (link)
  28. ^ "Identifying Phishing Attempts". Case. Archived from the original on 13 September 2015. Retrieved 4 July 2016.
  29. ^ "Protect yourself from phishing – Microsoft Support". support.microsoft.com. Retrieved 6 December 2023.
  30. ^ Lazarus, Ari (23 February 2018). "Phishers send fake invoices". Consumer Information. Retrieved 17 February 2020.
  31. ^ "Email Security". Trellix. 17 May 2022. Archived from the original on 22 May 2022. Retrieved 24 October 2022.
  32. ^ a b c d "What is Privilege Escalation? – CrowdStrike". crowdstrike.com. Retrieved 7 December 2023.
  33. ^ Spence, Aaron; Bangay, Shaun (June 2022). "Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures". International Journal of Information Security. 21 (3): 437–453. doi:10.1007/s10207-021-00563-6. ISSN 1615-5262.
  34. ^ Arcos Sergio. "Social Engineering" (PDF). upc.edu. Archived (PDF) from the original on 3 December 2013. Retrieved 16 April 2019.
  35. ^ Scannell, Kara (24 February 2016). "CEO email scam costs companies $2bn". Financial Times. No. 25 February 2016. Archived from the original on 23 June 2016. Retrieved 7 May 2016.
  36. ^ "Bucks leak tax info of players, employees as result of email scam". Associated Press. 20 May 2016. Archived from the original on 20 May 2016. Retrieved 20 May 2016.
  37. ^ "What is Spoofing? – Definition from Techopedia". techopedia.com. Archived from the original on 30 June 2016. Retrieved 16 January 2022.
  38. ^ Butterfield, Andrew; Ngondi, Gerard Ekembe, eds. (21 January 2016). "spoofing". A Dictionary of Computer Science. Oxford University Press. doi:10.1093/acref/9780199688975.001.0001. ISBN 978-0-19-968897-5. Retrieved 8 October 2017.
  39. ^ Marcel, Sébastien; Nixon, Mark; Li, Stan, eds. (2014). Handbook of Biometric Anti-Spoofing: Trusted Biometrics under Spoofing Attacks. Advances in Computer Vision and Pattern Recognition. London: Springer. doi:10.1007/978-1-4471-6524-8. ISBN 978-1-4471-6524-8. ISSN 2191-6594. LCCN 2014942635. S2CID 27594864.
  40. ^ "80 to 0 in Under 5 Seconds: Falsifying a Medical Patient's Vitals". www.trellix.com. Retrieved 9 February 2023.
  41. ^ Gallagher, Sean (14 May 2014). "Photos of an NSA "upgrade" factory show Cisco router getting implant". Ars Technica. Archived from the original on 4 August 2014. Retrieved 3 August 2014.
  42. ^ a b Intelligence, Microsoft Threat (11 November 2021). "HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks". Microsoft Security Blog. Retrieved 7 December 2023.
  43. ^ "Obfuscated Files or Information: HTML Smuggling, Sub-technique T1027.006 – Enterprise | MITRE ATT&CK®". attack.mitre.org. Retrieved 22 February 2023.
  44. ^ Lim, Joo S.; Chang, Shanton; Maynard, Sean; Ahmad, Atif (2009). "Exploring the Relationship between Organizational Culture and Information Security Culture". Proceedings of the 7th Australian Information Security Management Conference. Security Research Institute (SRI), Edith Cowan University. doi:10.4225/75/57B4065130DEF.
  45. ^ Reimers, Karl; Andersson, David (2017). Post-secondary Education Network Security: the End User Challenge and Evolving Threats. ICERI2017 Proceedings. Vol. 1. IATED. pp. 1787–1796. doi:10.21125/iceri.2017.0554. ISBN 978-84-697-6957-7. ISSN 2340-1095.
  46. ^ Verizon Data Breach Investigations Report 2020 (PDF). verizon.com (Report). Archived (PDF) from the original on 19 May 2020. Retrieved 17 September 2021.
  47. ^ a b c Schlienger, Thomas; Teufel, Stephanie (2003). "Information security culture-from analysis to change". South African Computer Journal. 31: 46–52. hdl:10520/EJC27949.
  48. ^ Internet Security Glossary. IETF. doi:10.17487/RFC2828. RFC 2828.
  49. ^ "CNSS Instruction No. 4009" (PDF). 26 April 2010. Archived from the original (PDF) on 27 February 2012.
  50. ^ "InfosecToday Glossary" (PDF). Archived (PDF) from the original on 20 November 2014.
  51. ^ "Cyber security design principles". www.ncsc.gov.uk. Retrieved 11 December 2023.
  52. ^ a b "How the NCSC thinks about security architecture". www.ncsc.gov.uk. Retrieved 18 December 2023.
  53. ^ "Secure System Architecture and Design". UK Cyber Security Council. 2024. Retrieved 4 January 2024.
  54. ^ "security architecture – Glossary | CSRC". csrc.nist.gov. Retrieved 18 December 2023.
  55. ^ Jannsen, Cory. "Security Architecture". Techopedia. Janalta Interactive Inc. Archived from the original on 3 October 2014. Retrieved 9 October 2014.
  56. ^ a b Oppliger, Rolf (1 May 1997). "Internet security: firewalls and beyond". Communications of the ACM. 40 (5): 92–102. doi:10.1145/253769.253802. ISSN 0001-0782.
  57. ^ "How to Increase Cybersecurity Awareness". ISACA. Retrieved 25 February 2023.
  58. ^ Woodie, Alex (9 May 2016). "Why ONI May Be Our Best Hope for Cyber Security Now". Archived from the original on 20 August 2016. Retrieved 13 July 2016.
  59. ^ Walkowski, Debbie (9 July 2019). "What Is The CIA Triad?". F5 Labs. Retrieved 25 February 2020.[dead link]
  60. ^ "Knowing Value of Data Assets is Crucial to Cybersecurity Risk Management | SecurityWeek.Com". www.securityweek.com. 3 December 2018. Retrieved 25 February 2020.
  61. ^ Foreman, Park (2009). Vulnerability Management. Boca Raton, Fla.: Auerbach Publications. p. 1. ISBN 978-1-4398-0150-5.
  62. ^ Johnson, A. (2018). CCNA Cybersecurity Operations Companion Guide. Cisco Press. ISBN 978-0-13-516624-6.
  63. ^ Calder, Alan; Williams, Geraint (2014). PCI DSS: A Pocket Guide (3rd ed.). IT Governance Limited. ISBN 978-1-84928-554-4. network vulnerability scans at least quarterly and after any significant change in the network
  64. ^ Harrison, J. (2003). Formal verification at Intel. 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings. pp. 45–54. doi:10.1109/LICS.2003.1210044. ISBN 978-0-7695-1884-8. S2CID 44585546.
  65. ^ Umrigar, Zerksis D.; Pitchumani, Vijay (1983). Formal verification of a real-time hardware design. Proceeding DAC '83 Proceedings of the 20th Design Automation Conference. IEEE Press. pp. 221–227. ISBN 978-0-8186-0026-5.
  66. ^ "Abstract Formal Specification of the seL4/ARMv6 API" (PDF). Archived from the original (PDF) on 21 May 2015. Retrieved 19 May 2015.
  67. ^ Baumann, Christoph; Beckert, Bernhard; Blasum, Holger; Bormer, Thorsten. Ingredients of Operating System Correctness? Lessons Learned in the Formal Verification of PikeOS (PDF). Embedded World Conference, Nuremberg, Germany. Archived from the original (PDF) on 19 July 2011.
  68. ^ Ganssle, Jack. "Getting it Right". Archived from the original on 4 May 2013.
  69. ^ "Everything you need for a career as a SOC analyst". www.cybersecurityjobsite.com. Retrieved 19 December 2023.
  70. ^ CISM, John Rittinghouse PhD; CISM, William M. Hancock PhD CISSP (2 October 2003). Cybersecurity Operations Handbook. Digital Press. p. 436-437. ISBN 978-0-08-053018-5. Retrieved 4 September 2025.
  71. ^ "Turn on 2-step verification (2SV)". www.ncsc.gov.uk. Retrieved 19 December 2023.
  72. ^ "NCSC's cyber security training for staff now available". www.ncsc.gov.uk. Retrieved 19 December 2023.
  73. ^ Treglia, J.; Delia, M. (2017). Cyber Security Inoculation. NYS Cyber Security Conference, Empire State Plaza Convention Center, Albany, NY, 3–4 June.
  74. ^ "What is a license dongle?". www.revenera.com. Retrieved 12 June 2024.
  75. ^ "Token-based authentication". SafeNet.com. Archived from the original on 20 March 2014. Retrieved 20 March 2014.
  76. ^ "Lock and protect your Windows PC". TheWindowsClub.com. 10 February 2010. Archived from the original on 20 March 2014. Retrieved 20 March 2014.
  77. ^ Greene, James (2012). "Intel Trusted Execution Technology: White Paper" (PDF). Intel Corporation. Archived (PDF) from the original on 11 June 2014. Retrieved 18 December 2013.
  78. ^ "SafeNet ProtectDrive 8.4". SCMagazine.com. 4 October 2008. Archived from the original on 20 March 2014. Retrieved 20 March 2014.
  79. ^ "Secure Hard Drives: Lock Down Your Data". PCMag.com. 11 May 2009. Archived from the original on 21 June 2017.
  80. ^ Souppaya, Murugiah P.; Scarfone, Karen (2013). "Guidelines for Managing the Security of Mobile Devices in the Enterprise". National Institute of Standards and Technology. Special Publication (NIST SP). Gaithersburg, MD. doi:10.6028/NIST.SP.800-124r1.
  81. ^ "Access Control Statistics: Trends & Insights". 23 February 2024. Retrieved 26 April 2024.
  82. ^ "Forget IDs, use your phone as credentials". Fox Business Network. 4 November 2013. Archived from the original on 20 March 2014. Retrieved 20 March 2014.
  83. ^ "Direct memory access protections for Mac computers". Apple. Retrieved 16 November 2022.
  84. ^ "Using IOMMU for DMA Protection in UEFI Firmware" (PDF). Intel Corporation. Archived (PDF) from the original on 9 December 2021. Retrieved 16 November 2022.
  85. ^ Babaei, Armin; Schiele, Gregor; Zohner, Michael (26 July 2022). "Reconfigurable Security Architecture (RESA) Based on PUF for FPGA-Based IoT Devices". Sensors. 22 (15): 5577. Bibcode:2022Senso..22.5577B. doi:10.3390/s22155577. ISSN 1424-8220. PMC 9331300. PMID 35898079.
  86. ^ Hassija, Vikas; Chamola, Vinay; Gupta, Vatsal; Jain, Sarthak; Guizani, Nadra (15 April 2021). "A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures". IEEE Internet of Things Journal. 8 (8): 6222–6246. Bibcode:2021IITJ....8.6222H. doi:10.1109/JIOT.2020.3025775. ISSN 2327-4662. S2CID 226767829.
  87. ^ "The Most Secure OS: What is the Safest OS Available?". Tech.co. Retrieved 19 December 2023.
  88. ^ Sanghavi, Alok (21 May 2010). "What is formal verification?". EE Times_Asia.
  89. ^ Ferraiolo, D.F. & Kuhn, D.R. (October 1992). "Role-Based Access Control" (PDF). 15th National Computer Security Conference: 554–563.
  90. ^ Sandhu, R; Coyne, EJ; Feinstein, HL; Youman, CE (August 1996). "Role-Based Access Control Models" (PDF). IEEE Computer. 29 (2): 38–47. Bibcode:1996Compr..29b..38S. CiteSeerX 10.1.1.50.7649. doi:10.1109/2.485845. S2CID 1958270.
  91. ^ Abreu, Vilmar; Santin, Altair O.; Viegas, Eduardo K.; Stihler, Maicon (2017). A multi-domain role activation model (PDF). 2017 IEEE International Conference on Communications (ICC). IEEE Press. pp. 1–6. doi:10.1109/ICC.2017.7997247. ISBN 978-1-4673-8999-0. S2CID 6185138.
  92. ^ A.C. O'Connor & R.J. Loomis (2002). Economic Analysis of Role-Based Access Control (PDF). Research Triangle Institute. p. 145.
  93. ^ "Studies prove once again that users are the weakest link in the security chain". CSO Online. 22 January 2014. Retrieved 8 October 2018.
  94. ^ "The Role of Human Error in Successful Security Attacks". IBM Security Intelligence. 2 September 2014. Retrieved 8 October 2018.
  95. ^ "90% of security incidents trace back to PEBKAC and ID10T errors". Computerworld. 15 April 2015. Retrieved 8 October 2018.
  96. ^ "Protect your online banking with 2FA". NZ Bankers Association. 7 October 2018. Archived from the original on 21 January 2020. Retrieved 7 September 2019.
  97. ^ "IBM Security Services 2014 Cyber Security Intelligence Index" (PDF). PcSite. 2014. Retrieved 9 October 2020.
  98. ^ Caldwell, Tracey (12 February 2013). "Risky business: why security awareness is crucial for employees". The Guardian. Retrieved 8 October 2018.
  99. ^ "Developing a Security Culture". CPNI – Centre for the Protection of National Infrastructure. Archived from the original on 9 October 2018. Retrieved 8 October 2018.
  100. ^ a b "Cyber Hygiene – ENISA". Retrieved 27 September 2018.
  101. ^ a b Kaljulaid, Kersti (16 October 2017). "President of the Republic at the Aftenposten's Technology Conference". Retrieved 27 September 2018.
  102. ^ "Cyber security breaches survey 2023". GOV.UK. Retrieved 27 December 2023.
  103. ^ Kuchler, Hannah (27 April 2015). "Security execs call on companies to improve 'cyber hygiene'". Financial Times. Archived from the original on 10 December 2022. Retrieved 27 September 2018.
  104. ^ "From AI to Russia, Here's How Estonia's President Is Planning for the Future". Wired. Retrieved 28 September 2018.
  105. ^ "Professor Len Adleman explains how he coined the term "computer virus"". WeLiveSecurity. 1 November 2017. Retrieved 28 September 2018.
  106. ^ "Statement of Dr. Vinton G. Cerf". www.jec.senate.gov. Retrieved 28 September 2018.
  107. ^ Promoting Good Cyber Hygiene Act of 2017 at Congress.gov
  108. ^ "Analysis | The Cybersecurity 202: Agencies struggling with basic cybersecurity despite Trump's pledge to prioritize it". The Washington Post. Retrieved 28 September 2018.
  109. ^ "Protected Voices". Federal Bureau of Investigation. Retrieved 28 September 2018.
  110. ^ Lin, Tom C. W. (3 July 2017). "The New Market Manipulation". Emory Law Journal. 66: 1253. SSRN 2996896.
  111. ^ Lin, Tom C. W. (2016). "Financial Weapons of War". Minnesota Law Review. SSRN 2765010.
  112. ^ Cole, Jeffrey I.; Suman, Michael; Schramm, Phoebe; van Bel, Daniel; Lunn, B.; Maguire, Phyllisane; Hanson, Koran; Singh, Rajesh; Aquino, Jedrix-Sean; Lebo, Harlan (2000). The UCLA Internet report: Surveying the digital future (PDF). ccp.ucla.edu (Report). Archived from the original (PDF) on 23 April 2003. Retrieved 15 September 2023.
  113. ^ Pagliery, Jose (18 November 2014). "Hackers attacked the U.S. energy grid 79 times this year". CNN Money. Cable News Network. Archived from the original on 18 February 2015. Retrieved 16 April 2015.
  114. ^ Neumann, P. G. (1997). Computer Security in Aviation: Vulnerabilities, Threats, and Risks. International Conference on Aviation Safety and Security in the 21st Century, White House Commission on Safety and Security.
  115. ^ Dillingham, Gerald L. (20 September 2001). Aviation security: terrorist acts demonstrate urgent need to improve security at the nation's airports (Report). United States. General Accounting Office.
  116. ^ "Air Traffic Control Systems Vulnerabilities Could Make for Unfriendly Skies [Black Hat] – SecurityWeek.Com". 27 July 2012. Archived from the original on 8 February 2015.
  117. ^ "Hacker Says He Can Break into Airplane Systems Using In-Flight Wi-Fi". NPR. 4 August 2014. Archived from the original on 8 February 2015. Retrieved 19 March 2020.
  118. ^ Finkle, Jim (4 August 2014). "Hacker says to show passenger jets at risk of cyber attack". Reuters. Archived from the original on 13 October 2015. Retrieved 21 November 2021.
  119. ^ Cesar, Alan (15 December 2023). "Online course bolsters cybersecurity in aviation". Aerogram. Purdue University School of Aeronautics and Astronautics. Retrieved 9 January 2024.
  120. ^ "Pan-European Network Services (PENS) – Eurocontrol.int". Archived from the original on 12 December 2016.
  121. ^ "Centralised Services: NewPENS moves forward – Eurocontrol.int". Eurocontrol. 17 January 2016. Archived from the original on 19 March 2017.
  122. ^ "NextGen Data Communication". FAA. Archived from the original on 13 March 2015. Retrieved 15 June 2017.
  123. ^ "e-Passports | Homeland Security". www.dhs.gov. Retrieved 3 February 2023.
  124. ^ "The Australian ePassport. Australian Government Department of Foreign Affairs and Trade website". Archived from the original on 9 January 2015. Retrieved 1 May 2023.
  125. ^ a b "Is Your Watch Or Thermostat A Spy? Cybersecurity Firms Are On It". NPR. 6 August 2014. Archived from the original on 11 February 2015.
  126. ^ O'Neill, Stephanie (19 November 2018). "As Insurers Offer Discounts For Fitness Trackers, Wearers Should Step With Caution". NPR. Retrieved 10 October 2025.
  127. ^ Kruse, CB; Smith, B; Vanderlinden, H; Nealand, A (21 July 2017). "Security Techniques for the Electronic Health Records". Journal of Medical Systems. 41 (8): 127. doi:10.1007/s10916-017-0778-4. PMC 5522514. PMID 28733949.
  128. ^ Backman, Melvin (18 September 2014). "Home Depot: 56 million cards exposed in breach". CNNMoney. Archived from the original on 18 December 2014.
  129. ^ "Staples: Breach may have affected 1.16 million customers' cards". Fortune.com. 19 December 2014. Archived from the original on 21 December 2014. Retrieved 21 December 2014.
  130. ^ "Target: 40 million credit cards compromised". CNN. 19 December 2013. Archived from the original on 1 December 2017. Retrieved 29 November 2017.
  131. ^ Cowley, Stacy (2 October 2017). "2.5 Million More People Potentially Exposed in Equifax Breach". The New York Times. Archived from the original on 1 December 2017. Retrieved 29 November 2017.
  132. ^ Finkle, Jim (23 April 2014). "Exclusive: FBI warns healthcare sector vulnerable to cyber attacks". Reuters. Archived from the original on 4 June 2016. Retrieved 23 May 2016.
  133. ^ Seals, Tara (6 November 2015). "Lack of Employee Security Training Plagues US Businesses". Infosecurity Magazine. Archived from the original on 9 November 2017. Retrieved 8 November 2017.
  134. ^ Bright, Peter (15 February 2011). "Anonymous speaks: the inside story of the HBGary hack". Arstechnica.com. Archived from the original on 27 March 2011. Retrieved 29 March 2011.
  135. ^ Anderson, Nate (9 February 2011). "How one man tracked down Anonymous – and paid a heavy price". Arstechnica.com. Archived from the original on 29 March 2011. Retrieved 29 March 2011.
  136. ^ Palilery, Jose (24 December 2014). "What caused Sony hack: What we know now". CNN Money. Archived from the original on 4 January 2015. Retrieved 4 January 2015.
  137. ^ Cook, James (16 December 2014). "Sony Hackers Have Over 100 Terabytes Of Documents. Only Released 200 Gigabytes So Far". Business Insider. Archived from the original on 17 December 2014. Retrieved 18 December 2014.
  138. ^ a b Lee, Timothy B. (18 January 2015). "The next frontier of hacking: your car". Vox. Archived from the original on 17 March 2017.
  139. ^ Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk (PDF) (Report). 6 February 2015. Archived (PDF) from the original on 9 November 2016. Retrieved 4 November 2016.
  140. ^ "Cybersecurity expert: It will take a 'major event' for companies to take this issue seriously". AOL.com. 5 January 2017. Archived from the original on 20 January 2017. Retrieved 22 January 2017.
  141. ^ "The problem with self-driving cars: who controls the code?". The Guardian. 23 December 2015. Archived from the original on 16 March 2017. Retrieved 22 January 2017.
  142. ^ Checkoway, Stephen; McCoy, Damon; Kantor, Brian; Anderson, Danny; Shacham, Hovav; Savage, Stefan; Koscher, Karl; Czeskis, Alexei; Roesner, Franziska; Kohno, Tadayoshi (2011). Comprehensive Experimental Analyses of Automotive Attack Surfaces (PDF). SEC'11 Proceedings of the 20th USENIX conference on Security. Berkeley, California, US: USENIX Association. p. 6. Archived (PDF) from the original on 21 February 2015.
  143. ^ Greenberg, Andy (21 July 2015). "Hackers Remotely Kill a Jeep on the Highway – With Me in It". Wired. Archived from the original on 19 January 2017. Retrieved 22 January 2017.
  144. ^ "Hackers take control of car, drive it into a ditch". The Independent. 22 July 2015. Archived from the original on 2 February 2017. Retrieved 22 January 2017.
  145. ^ "Tesla fixes software bug that allowed Chinese hackers to control car remotely". The Telegraph. 21 September 2016. Archived from the original on 2 February 2017. Retrieved 22 January 2017.
  146. ^ Kang, Cecilia (19 September 2016). "Self-Driving Cars Gain Powerful Ally: The Government". The New York Times. Archived from the original on 14 February 2017. Retrieved 22 January 2017.
  147. ^ "Federal Automated Vehicles Policy" (PDF). Archived (PDF) from the original on 21 January 2017. Retrieved 22 January 2017.
  148. ^ "Vehicle Cybersecurity". nhtsa.gov. Retrieved 25 November 2022.
  149. ^ "Thales supplies smart driver license to 4 states in Mexico". Thales Group.
  150. ^ "4 Companies Using RFID for Supply Chain Management". atlasRFIDstore. Retrieved 3 February 2023.
  151. ^ "The Cutting Edge of RFID Technology and Applications for Manufacturing and Distribution". Supply Chain Market.
  152. ^ Rahman, Mohammad Anwar; Khadem, Mohammad Miftaur; Sarder, MD. Application of RFID in Supply Chain System. Proceedings of the 2010 International Conference on Industrial Engineering and Operations Management Dhaka, Bangladesh, January 9 – 10, 2010. CiteSeerX 10.1.1.397.7831.
  153. ^ "Gary McKinnon profile: Autistic 'hacker' who started writing computer programs at 14". The Daily Telegraph. London. 23 January 2009. Archived from the original on 2 June 2010.
  154. ^ "Gary McKinnon extradition ruling due by 16 October". BBC News. 6 September 2012. Archived from the original on 6 September 2012. Retrieved 25 September 2012.
  155. ^ Mckinnon V Government of The United States of America and Another (House of Lords 16 June 2008) ("15. ... alleged to total over $700,000"), Text.
  156. ^ "Fresh Leak on US Spying: NSA Accessed Mexican President's Email". SPIEGEL ONLINE. 20 October 2013. Archived from the original on 6 November 2015.
  157. ^ Sanders, Sam (4 June 2015). "Massive Data Breach Puts 4 Million Federal Employees' Records at Risk". NPR. Archived from the original on 5 June 2015. Retrieved 5 June 2015.
  158. ^ Liptak, Kevin (4 June 2015). "U.S. government hacked; feds think China is the culprit". CNN. Archived from the original on 6 June 2015. Retrieved 5 June 2015.
  159. ^ Gallagher, Sean. "Encryption "would not have helped" at OPM, says DHS official". Archived from the original on 24 June 2017.
  160. ^ Davis, Michelle R. (19 October 2015). "Schools Learn Lessons From Security Breaches". Education Week. Archived from the original on 10 June 2016. Retrieved 23 May 2016.
  161. ^ "Internet of Things Global Standards Initiative". ITU. Archived from the original on 26 June 2015. Retrieved 26 June 2015.
  162. ^ Singh, Jatinder; Pasquier, Thomas; Bacon, Jean; Ko, Hajoon; Eyers, David (2015). "Twenty Cloud Security Considerations for Supporting the Internet of Things" (PDF). IEEE Internet of Things Journal. 3 (3): 269–284. doi:10.1109/JIOT.2015.2460333. S2CID 4732406.
  163. ^ Clearfield, Chris. "Why The FTC Can't Regulate The Internet Of Things". Forbes. Archived from the original on 27 June 2015. Retrieved 26 June 2015.
  164. ^ "Internet of Things: Science Fiction or Business Fact?" (PDF). Harvard Business Review. Archived (PDF) from the original on 17 March 2015. Retrieved 4 November 2016.
  165. ^ Vermesan, Ovidiu; Friess, Peter. "Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems" (PDF). River Publishers. Archived (PDF) from the original on 12 October 2016. Retrieved 4 November 2016.
  166. ^ Clearfield, Chris (20 June 2013). "Rethinking Security for the Internet of Things". Harvard Business Review. Archived from the original on 20 September 2013.
  167. ^ "Hotel room burglars exploit critical flaw in electronic door locks". Ars Technica. 26 November 2012. Archived from the original on 14 May 2016. Retrieved 23 May 2016.
  168. ^ "Hospital Medical Devices Used As Weapons in Cyberattacks". Dark Reading. 6 August 2015. Archived from the original on 29 May 2016. Retrieved 23 May 2016.
  169. ^ Kirk, Jeremy (17 October 2012). "Pacemaker hack can deliver deadly 830-volt jolt". Computerworld. Archived from the original on 4 June 2016. Retrieved 23 May 2016.
  170. ^ "How Your Pacemaker Will Get Hacked". The Daily Beast. Kaiser Health News. 17 November 2014. Archived from the original on 20 May 2016. Retrieved 23 May 2016.
  171. ^ Leetaru, Kalev. "Hacking Hospitals And Holding Hostages: Cybersecurity In 2016". Forbes. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  172. ^ a b "Cyber-Angriffe: Krankenhäuser rücken ins Visier der Hacker". Wirtschafts Woche. 7 December 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  173. ^ "Hospitals keep getting attacked by ransomware – Here's why". Business Insider. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  174. ^ "MedStar Hospitals Recovering After 'Ransomware' Hack". NBC News. 31 March 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  175. ^ Pauli, Darren. "US hospitals hacked with ancient exploits". The Register. Archived from the original on 16 November 2016. Retrieved 29 December 2016.
  176. ^ Pauli, Darren. "Zombie OS lurches through Royal Melbourne Hospital spreading virus". The Register. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  177. ^ "Hacked Lincolnshire hospital computer systems 'back up'". BBC News. 2 November 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  178. ^ "Lincolnshire operations cancelled after network attack". BBC News. 31 October 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  179. ^ "Legion cyber-attack: Next dump is sansad.nic.in, say hackers". The Indian Express. 12 December 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  180. ^ "Former New Hampshire Psychiatric Hospital Patient Accused Of Data Breach". CBS Boston. 27 December 2016. Archived from the original on 29 September 2017. Retrieved 29 December 2016.
  181. ^ "Texas Hospital hacked, affects nearly 30,000 patient records". Healthcare IT News. 4 November 2016. Archived from the original on 29 December 2016. Retrieved 29 December 2016.
  182. ^ Becker, Rachel (27 December 2016). "New cybersecurity guidelines for medical devices tackle evolving threats". The Verge. Archived from the original on 28 December 2016. Retrieved 29 December 2016.
  183. ^ "Postmarket Management of Cybersecurity in Medical Devices" (PDF). Food and Drug Administration. 28 December 2016. Archived from the original (PDF) on 29 December 2016. Retrieved 29 December 2016.
  184. ^ Brandt, Jaclyn (18 June 2018). "D.C. distributed energy proposal draws concerns of increased cybersecurity risks". Daily Energy Insider. Retrieved 4 July 2018.
  185. ^ "Current Releases - The Open Mobile Alliance". openmobilealliance.org.
  186. ^ Cashell, B.; Jackson, W. D.; Jickling, M.; Webel, B. (2004). The Economic Impact of Cyber-Attacks (PDF) (Report). Washington DC: Congressional Research Service, Government, and Finance Division. RL32331.
  187. ^ Gordon, Lawrence; Loeb, Martin (November 2002). "The Economics of Information Security Investment". ACM Transactions on Information and System Security. 5 (4): 438–457. doi:10.1145/581271.581274. S2CID 1500788.
  188. ^ Sanger, David E.; Barnes, Julian E. (20 December 2021). "U.S. and Britain Help Ukraine Prepare for Potential Russian Cyberassault". The New York Times. ISSN 0362-4331. Retrieved 4 December 2023.
  189. ^ "Cyber-Attack Against Ukrainian Critical Infrastructure | CISA". www.cisa.gov. 20 July 2021. Retrieved 4 December 2023.
  190. ^ Han, Chen; Dongre, Rituja (2014). "Q&A. What Motivates Cyber-Attackers?". Technology Innovation Management Review. 4 (10): 40–42. doi:10.22215/timreview/838. ISSN 1927-0321.
  191. ^ Chermick, Steven; Freilich, Joshua; Holt, Thomas (April 2017). "Exploring the Subculture of Ideologically Motivated Cyber-Attackers". Journal of Contemporary Criminal Justice. 33 (3): 212–233. doi:10.1177/1043986217699100. S2CID 152277480.
  192. ^ Anderson, Ross (2020). Security engineering: a guide to building dependable distributed systems (3rd ed.). Indianapolis, IN: John Wiley & Sons. ISBN 978-1-119-64281-7. OCLC 1224516855.
  193. ^ "The Leading Cloud Recruiting Software". iCIMS. Retrieved 13 March 2021.
  194. ^ Wilcox, S. and Brown, B. (2005) 'Responding to Security Incidents – Sooner or Later Your Systems Will Be Compromised', Journal of Health Care Compliance, 7(2), pp. 41–48
  195. ^ a b Jonathan Zittrain, 'The Future of The Internet', Penguin Books, 2008
  196. ^ Information Security Archived 6 March 2016 at the Wayback Machine. United States Department of Defense, 1986
  197. ^ "The TJX Companies, Inc. Victimized by Computer System Intrusion; Provides Information to Help Protect Customers" (Press release). The TJX Companies, Inc. 17 January 2007. Archived from the original on 27 September 2012. Retrieved 12 December 2009.
  198. ^ Largest Customer Info Breach Grows Archived 28 September 2007 at the Wayback Machine. MyFox Twin Cities, 29 March 2007.
  199. ^ "The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought". Business Insider. 20 November 2013. Archived from the original on 9 May 2014.
  200. ^ Reals, Tucker (24 September 2010). "Stuxnet Worm a U.S. Cyber-Attack on Iran Nukes?". CBS News. Archived from the original on 16 October 2013.
  201. ^ Zetter, Kim (17 February 2011). "Cyberwar Issues Likely to Be Addressed Only After a Catastrophe". Wired. Archived from the original on 18 February 2011. Retrieved 18 February 2011.
  202. ^ Carroll, Chris (18 October 2011). "Cone of silence surrounds U.S. cyberwarfare". Stars and Stripes. Archived from the original on 7 March 2012. Retrieved 30 October 2011.
  203. ^ Bumgarner, John (27 April 2010). "Computers as Weapons of War" (PDF). IO Journal. Archived from the original (PDF) on 19 December 2011. Retrieved 30 October 2011.
  204. ^ Greenwald, Glenn (6 June 2013). "NSA collecting phone records of millions of Verizon customers daily". The Guardian. Archived from the original on 16 August 2013. Retrieved 16 August 2013. Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama
  205. ^ Seipel, Hubert. "Transcript: ARD interview with Edward Snowden". La Foundation Courage. Archived from the original on 14 July 2014. Retrieved 11 June 2014.
  206. ^ Newman, Lily Hay (9 October 2013). "Can You Trust NIST?". IEEE Spectrum. Archived from the original on 1 February 2016.
  207. ^ "NIST Removes Cryptography Algorithm from Random Number Generator Recommendations". National Institute of Standards and Technology. 21 April 2014.
  208. ^ "New Snowden Leak: NSA Tapped Google, Yahoo Data Centers" Archived 9 July 2014 at the Wayback Machine, 31 October 2013, Lorenzo Franceschi-Bicchierai, mashable.com
  209. ^ Riley, Michael; Elgin, Ben; Lawrence, Dune; Matlack, Carol (17 March 2014). "Target Missed Warnings in Epic Hack of Credit Card Data". Businessweek. Archived from the original on 27 January 2015.
  210. ^ Rosenblatt, Seth (6 November 2014). "Home Depot says 53 million emails stolen". CNET. CBS Interactive. Archived from the original on 9 December 2014.
  211. ^ "Millions more Americans hit by government personnel data hack". Reuters. 9 July 2017. Archived from the original on 28 February 2017. Retrieved 25 February 2017.
  212. ^ Barrett, Devlin (4 June 2015). "U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say". The Wall Street Journal. Archived from the original on 4 June 2015.
  213. ^ Risen, Tom (5 June 2015). "China Suspected in Theft of Federal Employee Records". U.S. News & World Report. Archived from the original on 6 June 2015.
  214. ^ Zengerle, Patricia (19 July 2015). "Estimate of Americans hit by government personnel data hack skyrockets". Reuters. Archived from the original on 10 July 2015.
  215. ^ Sanger, David (5 June 2015). "Hacking Linked to China Exposes Millions of U.S. Workers". The New York Times. Archived from the original on 5 June 2015.
  216. ^ Mansfield-Devine, Steve (1 September 2015). "The Ashley Madison affair". Network Security. 2015 (9): 8–16. doi:10.1016/S1353-4858(15)30080-5.
  217. ^ Turton, W.; Mehrotra, K. (4 June 2021). "Hackers Breached Colonial Pipeline Using Compromised Password". Bloomberg L.P. Retrieved 3 December 2023.
  218. ^ a b "Mikko Hypponen: Fighting viruses, defending the net". TED. 19 July 2011. Archived from the original on 16 January 2013.
  219. ^ "Mikko Hypponen – Behind Enemy Lines". Hack in the Box Security Conference. 9 December 2012. Archived from the original on 25 November 2016.
  220. ^ "Ensuring the Security of Federal Information Systems and Cyber Critical Infrastructure and Protecting the Privacy of Personally Identifiable Information". Government Accountability Office. Archived from the original on 19 November 2015. Retrieved 3 November 2015.
  221. ^ King, Georgia (23 May 2018). "The Venn diagram between libertarians and crypto bros is so close it's basically a circle". Quartz.
  222. ^ Kirby, Carrie (24 June 2011). "Former White House aide backs some Net regulation / Clarke says government, industry deserve 'F' in cyber security". The San Francisco Chronicle.
  223. ^ McCarthy, Daniel (11 June 2018). "Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order". Politics and Governance. 6 (2): 5–12. doi:10.17645/pag.v6i2.1335.
  224. ^ "It's Time to Treat Cybersecurity as a Human Rights Issue". Human Rights Watch. 26 May 2020. Retrieved 26 May 2020.
  225. ^ "FIRST Mission". FIRST. Retrieved 6 July 2018.
  226. ^ "FIRST Members". FIRST. Retrieved 6 July 2018.
  227. ^ "European council". Archived from the original on 3 December 2014.
  228. ^ "MAAWG". Archived from the original on 23 September 2014.
  229. ^ "MAAWG". Archived from the original on 17 October 2014.
  230. ^ "Government of Canada Launches Canada's Cyber Security Strategy". Market Wired. 3 October 2010. Archived from the original on 2 November 2014. Retrieved 1 November 2014.
  231. ^ a b "Canada's Cyber Security Strategy". Public Safety Canada. Government of Canada. Archived from the original on 2 November 2014. Retrieved 1 November 2014.
  232. ^ a b c "Action Plan 2010–2015 for Canada's Cyber Security Strategy". Public Safety Canada. Government of Canada. Archived from the original on 2 November 2014. Retrieved 3 November 2014.
  233. ^ "Cyber Incident Management Framework For Canada". Public Safety Canada. Government of Canada. Archived from the original on 2 November 2014. Retrieved 3 November 2014.
  234. ^ "Action Plan 2010–2015 for Canada's Cyber Security Strategy". Public Safety Canada. Government of Canada. Archived from the original on 2 November 2014. Retrieved 1 November 2014.
  235. ^ "Canadian Cyber Incident Response Centre". Public Safety Canada. Archived from the original on 8 October 2014. Retrieved 1 November 2014.
  236. ^ "Cyber Security Bulletins". Public Safety Canada. Archived from the original on 8 October 2014. Retrieved 1 November 2014.
  237. ^ "Report a Cyber Security Incident". Public Safety Canada. Government of Canada. Archived from the original on 11 November 2014. Retrieved 3 November 2014.
  238. ^ "Government of Canada Launches Cyber Security Awareness Month With New Public Awareness Partnership". Market Wired. Government of Canada. 27 September 2012. Archived from the original on 3 November 2014. Retrieved 3 November 2014.
  239. ^ "Cyber Security Cooperation Program". Public Safety Canada. Archived from the original on 2 November 2014. Retrieved 1 November 2014.
  240. ^ "Cyber Security Cooperation Program". Public Safety Canada. 16 December 2015. Archived from the original on 2 November 2014.
  241. ^ "GetCyberSafe". Get Cyber Safe. Government of Canada. Archived from the original on 11 November 2014. Retrieved 3 November 2014.
  242. ^ "Australian federal government announces cyber security support for SMBs","2023-2030 Australian Cyber Security Strategy". Retrieved 22 November 2023.
  243. ^ "Securing critical infrastructures: What you need to know about Hong Kong's first cyber legislation". Retrieved 21 March 2025.
  244. ^ "Safeguarding Hong Kong's cybersecurity: Essential insights for Critical Infrastructure Operators". Retrieved 19 January 2026.
  245. ^ "Need for proper structure of PPPs to address specific cyberspace risks". ORF. Archived from the original on 13 November 2017.
  246. ^ "National Cyber Safety and Security Standards(NCSSS)-Home". www.ncdrc.res.in. Archived from the original on 19 February 2018. Retrieved 19 February 2018.
  247. ^ "South Korea seeks global support in cyber attack probe". BBC Monitoring Asia Pacific. 7 March 2011.
  248. ^ Jun, Kwanwoo (23 September 2013). "Seoul Puts a Price on Cyberdefense". The Wall Street Journal. Dow Jones & Company, Inc. Archived from the original on 25 September 2013. Retrieved 24 September 2013.
  249. ^ "UK cyber-centre thwarts hostile hackers". BBC News. 15 October 2018. Retrieved 31 December 2025.
  250. ^ Sengupta, Kim (29 July 2020). "New head of GCHQ cyber security agency announced". The Independent. Retrieved 31 December 2025.
  251. ^ Targett, Edward (16 December 2021). "UK's 2022 National Cyber Security Strategy: The Top 10 takeaways". The Stack. Retrieved 31 December 2025.
  252. ^ "National Cyber Strategy 2022". GOV.UK. 15 December 2022. Retrieved 31 December 2025.
  253. ^ Warrell, Helen (19 November 2020). "National Cyber Force will target UK adversaries online". Financial Times. Retrieved 31 December 2025.
  254. ^ White, House (March 2023). "National security strategy" (PDF). No. March 2032. white house. US gov.
  255. ^ Adil, Sajid (16 October 2023). "Do You Know About Biggest Cybersecurity Threats In 2023?". Cybernexguard. Adil Sajid. Retrieved 18 December 2023.
  256. ^ Adil, Sajid (September 2018). "National Cyber Strategy of the United States of America". University Libraries UNT Digital Library. Retrieved 18 December 2023.
  257. ^ Adil, Sajid (September 2018). "Do You Know About Biggest Cybersecurity Threats In 2023?". University Libraries UNT Digital Library. Retrieved 18 December 2023.
  258. ^ International Cybercrime Reporting and Cooperation Act at Congress.gov
  259. ^ "111th Congress, 2nd Session". Archived from the original on 20 January 2012.
  260. ^ Kelly, Mary Louise (13 May 2021). "Biden Adviser On Cyber Threats And The New Executive Order To Combat Them". NPR.
  261. ^ Executive Order on Improving the Nation's Cybersecurity (full text)
  262. ^ "National Cyber Security Division". U.S. Department of Homeland Security. Archived from the original on 11 June 2008. Retrieved 14 June 2008.
  263. ^ a b "FAQ: Cyber Security R&D Center". U.S. Department of Homeland Security S&T Directorate. Archived from the original on 6 October 2008. Retrieved 14 June 2008.
  264. ^ AFP-JiJi, "U.S. boots up cybersecurity center", 31 October 2009.
  265. ^ "Federal Bureau of Investigation – Priorities". Federal Bureau of Investigation. Archived from the original on 11 July 2016.
  266. ^ "Internet Crime Complaint Center (IC3) – Home". Archived from the original on 20 November 2011.
  267. ^ "Infragard, Official Site". Infragard. Archived from the original on 9 September 2010. Retrieved 10 September 2010.
  268. ^ "Robert S. Mueller, III – InfraGard Interview at the 2005 InfraGard Conference". Infragard (Official Site) – "Media Room". Archived from the original on 17 June 2011. Retrieved 9 December 2009.
  269. ^ "CCIPS". 25 March 2015. Archived from the original on 23 August 2006.
  270. ^ "A Framework for a Vulnerability Disclosure Program for Online Systems". Cybersecurity Unit, Computer Crime & Intellectual Property Section Criminal Division U.S. Department of Justice. July 2017. Retrieved 9 July 2018.
  271. ^ "Mission and Vision". www.cybercom.mil. Retrieved 20 June 2020.
  272. ^ William J. Lynn, III (12 November 2009). Remarks at the Defense Information Technology Acquisition Summit (Speech). Washington D.C. Archived from the original on 15 April 2010. Retrieved 10 July 2010.
  273. ^ Shachtman, Noah (23 September 2010). "Military's Cyber Commander Swears: "No Role" in Civilian Networks". brookings.edu. Archived from the original on 6 November 2010.
  274. ^ "FCC Cybersecurity". FCC. Archived from the original on 27 May 2010. Retrieved 3 December 2014.
  275. ^ "Cybersecurity for Medical Devices and Hospital Networks: FDA Safety Communication". Food and Drug Administration. Archived from the original on 28 May 2016. Retrieved 23 May 2016.
  276. ^ "Automotive Cybersecurity – National Highway Traffic Safety Administration (NHTSA)". Archived from the original on 25 May 2016. Retrieved 23 May 2016.
  277. ^ Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen (Report). U. S. Government Accountability Office. 14 April 2015. Archived from the original on 13 June 2016. Retrieved 23 May 2016.
  278. ^ Sternstein, Aliya (4 March 2016). "FAA Working on New Guidelines for Hack-Proof Planes". Nextgov. Archived from the original on 19 May 2016. Retrieved 23 May 2016.
  279. ^ Elias, Bart (18 June 2015). "Protecting Civil Aviation from Cyberattacks" (PDF). Archived (PDF) from the original on 17 October 2016. Retrieved 4 November 2016.
  280. ^ Anderson, David; Reimers, Karl (2019). CYBER SECURITY EMPLOYMENT POLICY AND WORKPLACE DEMAND IN THE U.S. GOVERNMENT. EDULEARN19 Proceedings. Vol. 1. IATED. pp. 7858–7866. doi:10.21125/edulearn.2019.1914. ISBN 978-84-09-12031-4. ISSN 2340-1117.
  281. ^ Verton, Dan (28 January 2004). "DHS launches national cyber alert system". Computerworld. IDG. Archived from the original on 31 August 2005. Retrieved 15 June 2008.
  282. ^ Details can be found in 10 CFR 73.54, Protection of digital computer and communication systems and networks.
  283. ^ Cyber Security Plan for Nuclear Power Reactors - Nuclear Energy Institute
  284. ^ Refer to NEI 08-09 for more details.
  285. ^ Clayton, Mark (7 March 2011). "The new cyber arms race". The Christian Science Monitor. Archived from the original on 16 April 2015. Retrieved 16 April 2015.
  286. ^ Nakashima, Ellen (13 September 2016). "Obama to be urged to split cyberwar command from NSA". The Washington Post. Retrieved 15 June 2017.cite news: CS1 maint: deprecated archival service (link)
  287. ^ Overland, Indra (1 March 2019). "The geopolitics of renewable energy: Debunking four emerging myths". Energy Research & Social Science. 49: 36–40. Bibcode:2019ERSS...49...36O. doi:10.1016/j.erss.2018.10.018. hdl:11250/2579292. ISSN 2214-6296.
  288. ^ Maness, Ryan C.; Valeriano, Brandon (11 June 2018). "How We Stopped Worrying about Cyber Doom and Started Collecting Data". Politics and Governance. 6 (2): 49–60. doi:10.17645/pag.v6i2.1368. hdl:10945/60589. ISSN 2183-2463.
  289. ^ Maness, Ryan C.; Valeriano, Brandon (25 March 2015). "The Impact of Cyber Conflict on International Interactions". Armed Forces & Society. 42 (2): 301–323. doi:10.1177/0095327x15572997. ISSN 0095-327X. S2CID 146145942.
  290. ^ Bullard, Brittany (2016). Style and Statistics: The Art of Retail Analytics. Wiley. doi:10.1002/9781119271260.ch8. ISBN 978-1-119-27031-7.
  291. ^ Oltsik, Jon (18 March 2016). "Cybersecurity Skills Shortage Impact on Cloud Computing". Network World. Archived from the original on 23 March 2016. Retrieved 23 March 2016.
  292. ^ Robinson, Terry (30 May 2018). "Why is a Degree in Cyber Security one of the Best?". DegreeQuery.com. Archived from the original on 10 October 2021. Retrieved 10 October 2021.
  293. ^ de Silva, Richard (11 October 2011). "Government vs. Commerce: The Cyber Security Industry and You (Part One)". Defence IQ. Archived from the original on 24 April 2014. Retrieved 24 April 2014.
  294. ^ "Department of Computer Science". Archived from the original on 3 June 2013. Retrieved 30 April 2013.
  295. ^ "About Cyber Security architect". cisa.gov. 1 August 2021. Retrieved 1 January 2022.
  296. ^ "How to become a Chief Information Security Officer (CISO)?". cybersecuritycareer.org. 1 August 2021. Retrieved 4 January 2022.
  297. ^ "Data Protection Officers". ico.org.uk. January 2021.
  298. ^ "Student Cybersecurity Resources". NICCS (US National Initiative for Cybercareers and Studies). Archived from the original on 5 November 2020.
  299. ^ "Current Job Opportunities at DHS". U.S. Department of Homeland Security. Archived from the original on 2 May 2013. Retrieved 5 May 2013.
  300. ^ "Cybersecurity Training & Exercises". U.S. Department of Homeland Security. 12 May 2010. Archived from the original on 7 January 2015. Retrieved 9 January 2015.
  301. ^ "Cyber Security Awareness Free Training and Webcasts". MS-ISAC (Multi-State Information Sharing & Analysis Center). Archived from the original on 6 January 2015. Retrieved 9 January 2015.
  302. ^ "DoD Approved 8570 Baseline Certifications". iase.disa.mil. Archived from the original on 21 October 2016. Retrieved 19 June 2017.
  303. ^ "The UK Cyber Security Strategy: Report on Progress and Forward Plans December 2014" (PDF). United Kingdom Cabinet Office. Archived (PDF) from the original on 18 April 2018. Retrieved 20 August 2021.
  304. ^ "Cyber skills for a vibrant and secure UK". GOV.UK.
  305. ^ "Singapore Operational Technology (OT) Cybersecurity Competency Framework". Cyber Security Agency (Press release). 8 October 2021. Archived from the original on 16 October 2021. Retrieved 23 October 2021.
  306. ^ "Confidentiality". Retrieved 31 October 2011.
  307. ^ "Data Integrity". Archived from the original on 6 November 2011. Retrieved 31 October 2011.
  308. ^ "Endpoint Security". 10 November 2010. Archived from the original on 16 March 2014. Retrieved 15 March 2014.
  309. ^ "A Brief History of the Cybersecurity Profession". ISACA. Retrieved 13 October 2023.
  310. ^ "One step ahead in computing security". RIT. Retrieved 13 October 2023.
  311. ^ a b Misa, Thomas J. (2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. 38 (4): 12–25. Bibcode:2016IAHC...38d..12M. doi:10.1109/MAHC.2016.48. S2CID 17609542.
  312. ^ Neumann, A. J.; Statland, N.; Webb, R. D. (1977). "Post-processing audit tools and techniques" (PDF). nist.gov. US Department of Commerce, National Bureau of Standards. pp. 11–3–11–4. Archived (PDF) from the original on 10 October 2016. Retrieved 19 June 2020.
  313. ^ Irwin, Luke (5 April 2018). "How NIST can protect the CIA triad, including the often overlooked 'I' – integrity". www.itgovernanceusa.com. Retrieved 16 January 2021.
  314. ^ Perrin, Chad (30 June 2008). "The CIA Triad". techrepublic.com. Retrieved 31 May 2012.
  315. ^ Stoneburner, G.; Hayden, C.; Feringa, A. (2004). Engineering Principles for Information Technology Security (PDF) (Report). csrc.nist.gov. doi:10.6028/NIST.SP.800-27rA. Archived (PDF) from the original on 12 October 2004. Note: this document has been superseded by later versions.
  316. ^ Yost, Jeffrey R. (April 2015). "The Origin and Early History of the Computer Security Software Products Industry". IEEE Annals of the History of Computing. 37 (2): 46–58. Bibcode:2015IAHC...37b..46Y. doi:10.1109/MAHC.2015.21. ISSN 1934-1547. S2CID 18929482.
  317. ^ "A Brief History of Computer Viruses & What the Future Holds". www.kaspersky.com. 19 April 2023. Retrieved 12 June 2024.
  318. ^ Tomlinson, Ray. "Interview with Ray Tomlinson on Creeper/Reaper". OSNews. Retrieved 25 September 2025.
  319. ^ "First incident of cyber-espionage". Guinness World Records. Retrieved 23 January 2024.
  320. ^ FBI News (2 November 2018). "The Morris Worm - 30 Years Since First Major Attack on the Internet". fbi.gov. Retrieved 23 January 2024.
  321. ^ a b Boncella, Robert J (April 2004). Bidgoli, Hossein (ed.). The Internet Encyclopedia, Volume 2 (2nd ed.). Wiley. p. 262. ISBN 978-0-471-68996-6.
  322. ^ "1993: Mosaic Launches and the Web is Set Free". Web Development History. 8 December 2021.
  323. ^ "Web Design Museum - Netscape Navigator 2.0". 10 March 2023. Retrieved 4 December 2023.
  324. ^ Nakashima, Ellen (26 January 2008). "Bush Order Expands Network Monitoring: Intelligence Agencies to Track Intrusions". The Washington Post. Retrieved 8 February 2021.
  325. ^ a b Perlroth, Nicole (7 February 2021). "How the U.S. Lost to Hackers". The New York Times. Archived from the original on 28 December 2021. Retrieved 9 February 2021.
  326. ^ Perlroth, Nicole; Sanger, David; Shane, Scott (6 May 2019). "How Chinese Spies Got the N.S.A.'s Hacking Tools, and Used Them for Attacks". The New York Times. Retrieved 18 October 2024.
  327. ^ Greenberg, Andy (7 May 2019). "The Strange Journey of an NSA Zero-Day—Into Multiple Enemies' Hands". WIRED. Retrieved 25 September 2025.
  328. ^ Schectman, Joel; Bing, Christopher (14 September 2021). "Ex-U.S. intel operatives admit hacking American networks for UAE". Reuters. Retrieved 25 September 2025.

Further reading

[edit]

 

 

By origin:
  • 24% unaffiliated
  • 2% Judaism
  • 6% other religion
  • 3% unanswered
United States of America
Motto: "In God We Trust"[1]
Other traditional mottos:[2]
Anthem: "The Star-Spangled Banner"[3]
Orthographic map of the U.S. in North America
Capital Washington, D.C.
38°53′N 77°1′W / 38.883°N 77.017°W / 38.883; -77.017
Largest city New York City 40°43′N 74°0′W / 40.717°N 74.000°W / 40.717; -74.000
Official languages English[a]
Ethnic groups
(2020)[6][7][8]
By race:

Religion
(2025)[9]
 
Demonym American[10][b]
Government Federal presidential republic
 
Donald Trump
JD Vance
Mike Johnson
John Roberts
 
Legislature Congress
Senate
House of Representatives
Independence 
 
July 4, 1776;
249 years ago
 (1776-07-04)
March 1, 1781 (1781-03-01)
September 3, 1783 (1783-09-03)
March 4, 1789 (1789-03-04)
 
Area
• Total area
3,796,742 sq mi (9,833,520 km2)[12][c] (3rd)
• Water (%)
7.0[11] (2010)
• Land area
3,531,905 sq mi (9,147,590 km2) (3rd)
Population
• 2025 estimate
Neutral increase 341,784,857[13]
• 2020 census
Neutral increase 331,449,281[14][d] (3rd)
• Density
96.8/sq mi (37.4/km2) (180th)
GDP  (PPP) 2025 estimate
• Total
Increase $30.616 trillion[15][e] (2nd)
• Per capita
Increase $89,599[15] (10th)
GDP  (nominal) 2025 estimate
• Total
Increase $30.616 trillion[15] (1st)
• Per capita
Increase $89,599[15] (8th)
Gini  (2024) Negative increase 41.8[16][f]
medium inequality
HDI  (2023) Increase 0.938[17] very high (17th)
Currency U.S. dollar ($) (USD)
Time zone UTC−4 to −12, +10, +11
• Summer (DST)
UTC−4 to −10[g]
Date format mm/dd/yyyy[h]
Calling code +1
ISO 3166 code US
Internet TLD .com, .us[18]

The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 states and a federal capital district, Washington, D.C. The 48 contiguous states border Canada to the north and Mexico to the south, with the semi-exclave of Alaska in the northwest and the archipelago of Hawaii in the Pacific Ocean. The United States also asserts sovereignty over five major island territories and various uninhabited islands in Oceania and the Caribbean.[j] It is a megadiverse country, with the world's third-largest land area[c] and third-largest population, exceeding 341 million.[k]

Paleo-Indians first migrated from North Asia to North America at least 15,000 years ago, and formed various civilizations. Spanish colonization established Spanish Florida in 1513, the first European colony in what is now the continental United States. British colonization followed with the 1607 settlement of Virginia, the first of the Thirteen Colonies. Enslavement of Africans was practiced in every colony and supplied most of the labor for the Southern Colonies' plantation economy. Clashes with the British Crown began as a civil protest over the illegality of taxation without representation in Parliament and the denial of other English rights. They evolved into the American Revolution, which led to the Declaration of Independence and a society based on universal rights. Victory in the 1775–1783 Revolutionary War brought international recognition of U.S. sovereignty and fueled westward expansion, further dispossessing native inhabitants. As more states were admitted into the Union, a North–South division over slavery led 11 Southern states to attempt to secede and join as the Confederate States of America, which fought against the Union in the American Civil War of 1861–1865. With the United States' victory and reunification, slavery was abolished nationally. By 1900, the country had established itself as a great power, a status solidified after its involvement in World War I. Following Japan's attack on Pearl Harbor in 1941, the U.S. entered World War II. Its aftermath left the U.S. and the Soviet Union as rival superpowers, competing for ideological dominance and international influence during the Cold War. The collapse of the Soviet Union in 1991 ended the Cold War, leaving the U.S. as the world's sole superpower. After the terror attacks of September 11, 2001, the U.S. launched the war on terror, invading Afghanistan and Iraq. It has continued carrying out numerous foreign interventions since then.

The U.S. federal government is a representative democracy with a president and a constitution that creates a separation of powers among three branches: legislative, executive, and judicial. The United States Congress is a bicameral national legislature composed of the House of Representatives (a lower house based on population) and the Senate (an upper house based on equal representation for each state). Federalism grants substantial autonomy to the 50 states. In addition, 574 Native American tribes have sovereignty rights, and there are 326 Native American reservations. Since the 1850s, the Democratic and Republican parties have dominated American politics. American ideals and values are based on a democratic tradition inspired by the American Enlightenment movement.

A developed country, the U.S. ranks high in economic competitiveness, innovation, and higher education. Accounting for over a quarter of nominal global GDP, its economy has been the world's largest since about 1890. It is the wealthiest country, with the highest disposable household income per capita among OECD members, though its wealth inequality is highly pronounced. Shaped by centuries of immigration, the culture of the U.S. is diverse and globally influential. Making up more than a third of global military spending, the country is widely considered to have the most powerful armed forces in the world and was the first to develop nuclear weapons. A member of numerous international organizations including the United Nations Security Council, the U.S. plays a major role in global political, cultural, economic, and military affairs.

Etymology

[edit]

Documented use of the phrase "United States of America" dates back to January 2, 1776. On that day, Stephen Moylan, a Continental Army aide to General George Washington, wrote a letter to Joseph Reed, Washington's aide-de-camp, seeking to go "with full and ample powers from the United States of America to Spain" to seek assistance in the Revolutionary War effort.[22][23] The first known public usage is an anonymous essay published in the Williamsburg newspaper The Virginia Gazette on April 6, 1776.[22] Sometime on or after June 11, 1776, Thomas Jefferson wrote "United States of America" in a rough draft of the Declaration of Independence,[22] which was adopted by the Second Continental Congress on July 4, 1776.[24]

The term "United States" and its initialism "U.S.", used as nouns or as adjectives in English, are common short names for the country. The initialism "USA", a noun, is also common.[25] "United States" and "U.S." are the established terms throughout the U.S. federal government, with prescribed rules.[l] "The States" is an established colloquial shortening of the name, used particularly from abroad;[27] "stateside" is the corresponding adjective or adverb.[28]

" America" is the feminine form of the first name of Americus Vesputius, the Latinized name of Italian explorer Amerigo Vespucci (1454–1512);[m] It was first used as a place name by the German cartographers Martin Waldseemüller and Matthias Ringmann in 1507.[29][n] Vespucci first proposed that the West Indies discovered by Christopher Columbus in 1492 were part of a previously unknown landmass and not among the Indies at the eastern limit of Asia.[30][31][32] In English, the term "America" (used without a qualifier) seldom refers to topics unrelated to the United States. "The Americas" is the general term to describe the totality of the continents of North and South America.[33]

History

[edit]

Indigenous peoples

[edit]
Cliff Palace, a settlement of ancestors of the Native American Pueblo peoples in present-day Montezuma County, Colorado, built between c. 1200 and 1275[34]

The first inhabitants of North America migrated from Siberia approximately 15,000 years ago, either across the Bering land bridge or along the now-submerged Ice Age coastline.[35][36] Small isolated groups of hunter-gatherers are said to have migrated alongside herds of large herbivores far into Alaska, with ice-free corridors developing along the Pacific coast and valleys of North America in c. 16,500 – c. 13,500 BCE (c. 18,500 – c. 15,500 BP).[37] The Clovis culture, which appeared around 11,000 BCE, is believed to be the first widespread culture in the Americas.[38][39] Over time, Indigenous North American cultures grew increasingly sophisticated, and some, such as the Mississippian culture, developed agriculture, architecture, and complex societies.[40] In the post-archaic period, the Mississippian cultures were located in the midwestern, eastern, and southern regions, and the Algonquian in the Great Lakes region and along the Eastern Seaboard, while the Hohokam culture and Ancestral Puebloans inhabited the Southwest.[41] Native population estimates of what is now the United States before the arrival of European colonizers range from around 500,000[42][43] to nearly 10 million.[43][44]

European exploration, colonization and conflict (1513–1765)

[edit]
The colonial possessions of Britain (the Thirteen Colonies in pink and others in purple), France (in blue), and Spain (in orange) in North America, 1750

Christopher Columbus began exploring the Caribbean for Spain in 1492, leading to Spanish-speaking settlements and missions from what are now Puerto Rico and Florida to New Mexico and California. The first Spanish colony in the present-day continental United States was Spanish Florida, chartered in 1513.[45][46][47][48] After several settlements failed there due to starvation and disease, Spain's first permanent town, Saint Augustine, was founded in 1565.[49]

France established its own settlements in French Florida in 1562, but they were either abandoned (Charlesfort, 1578) or destroyed by Spanish raids (Fort Caroline, 1565). Permanent French settlements were founded much later along the Great Lakes (Fort Detroit, 1701), the Mississippi River (St. Louis, 1764) and especially the Gulf of Mexico (New Orleans, 1718).[50] Early European colonies also included the thriving Dutch colony of New Nederland (settled 1626, present-day New York) and the small Swedish colony of New Sweden (settled 1638 in what became Delaware). British colonization of the East Coast began with the Virginia Colony (1607) and the Plymouth Colony (Massachusetts, 1620).[51][52]

The Mayflower Compact in Massachusetts and the Fundamental Orders of Connecticut established precedents for local representative self-governance and constitutionalism that would develop throughout the American colonies.[53][54] While European settlers in what is now the United States experienced conflicts with Native Americans, they also engaged in trade, exchanging European tools for food and animal pelts.[55][o] Relations ranged from close cooperation to warfare and massacres. The colonial authorities often pursued policies that forced Native Americans to adopt European lifestyles, including conversion to Christianity.[59][60] Along the eastern seaboard, settlers trafficked Africans through the Atlantic slave trade, largely to provide manual labor on plantations.[61]

The original Thirteen Colonies[p] that would later found the United States were administered as possessions of the British Empire by Crown-appointed governors,[62] though local governments held elections open to most white male property owners.[63][64] The colonial population grew rapidly from Maine to Georgia, eclipsing Native American populations;[65] by the 1770s, the natural increase of the population was such that only a small minority of Americans had been born overseas.[66] The colonies' distance from Britain facilitated the entrenchment of self-governance,[67] and the First Great Awakening, a series of Christian revivals, fueled colonial interest in guaranteed religious liberty.[68]

American Revolution and the early republic (1765–1800)

[edit]
See caption.
The Declaration of Independence portrait depicts the Committee of Five presenting the Declaration to the Continental Congress on June 28, 1776, in Philadelphia.

Following its victory in the French and Indian War, Britain began to assert greater control over local affairs in the Thirteen Colonies, resulting in growing political resistance. One of the primary grievances of the colonists was the denial of their rights as Englishmen, particularly the right to representation in the British government that taxed them. To demonstrate their dissatisfaction and resolve, the First Continental Congress met in 1774 and passed the Continental Association, a colonial boycott of British goods enforced by local "committees of safety" that proved effective. The British attempt to then disarm the colonists resulted in the 1775 Battles of Lexington and Concord, igniting the American Revolutionary War. At the Second Continental Congress, the colonies appointed George Washington commander-in-chief of the Continental Army, and created a committee that named Thomas Jefferson to draft the Declaration of Independence. Two days after the Second Continental Congress passed the Lee Resolution to create an independent, sovereign nation, the Declaration was adopted on July 4, 1776.[69] The political values of the American Revolution evolved from an armed rebellion demanding reform within an empire to a revolution that created a new social and governing system founded on the defense of liberty and the protection of inalienable natural rights; sovereignty of the people;[70] republicanism over monarchy, aristocracy, and other hereditary political power; civic virtue; and an intolerance of political corruption.[71] The Founding Fathers of the United States, who included Washington, Jefferson, John Adams, Benjamin Franklin, Alexander Hamilton, John Jay, James Madison, Thomas Paine, and many others, were inspired by Classical, Renaissance, and Enlightenment philosophies and ideas.[72][73]

Though in practical effect since its drafting in 1777, the Articles of Confederation was ratified in 1781 and formally established a decentralized government that operated until 1789.[69] After the British surrender at the siege of Yorktown in 1781, American sovereignty was internationally recognized by the Treaty of Paris (1783), through which the U.S. gained territory stretching west to the Mississippi River, north to present-day Canada, and south to Spanish Florida.[74] The Northwest Ordinance (1787) established the precedent by which the country's territory would expand with the admission of new states, rather than the expansion of existing states.[75]

The U.S. Constitution was drafted at the 1787 Constitutional Convention to overcome the limitations of the Articles. It went into effect in 1789, creating a federal republic governed by three separate branches that together formed a system of checks and balances.[76] George Washington was elected the country's first president under the Constitution, and the Bill of Rights was adopted in 1791 to allay skeptics' concerns about the power of the more centralized government.[77] His resignation as commander-in-chief after the Revolutionary War and his later refusal to run for a third term as the country's first president established a precedent for the supremacy of civil authority in the United States and the peaceful transfer of power.[78]

Westward expansion and Civil War (1800–1865)

[edit]
Historical territorial expansion of the United States
Territorial expansion of the United States

In the late 18th century, American settlers began to expand westward in larger numbers, many with a sense of manifest destiny.[79][80] The Louisiana Purchase of 1803 from France nearly doubled the territory of the United States.[81][82] Lingering issues with Britain remained, leading to the War of 1812, which was fought to a draw.[83] Spain ceded Florida and its Gulf Coast territory in 1819.[84]

The Missouri Compromise of 1820, which admitted Missouri as a slave state and Maine as a free state, attempted to balance the desire of northern states to prevent the expansion of slavery into new territories with that of southern states to extend it there. Primarily, the compromise prohibited slavery in all other lands of the Louisiana Purchase north of the 36°30′ parallel.[85]

As Americans expanded further into territory inhabited by Native Americans, the federal government implemented policies of Indian removal or assimilation.[86][87] The most significant such legislation was the Indian Removal Act of 1830, a key policy of President Andrew Jackson. It resulted in the Trail of Tears (1830–1850), in which an estimated 60,000 Native Americans living east of the Mississippi River were forcibly removed and displaced to lands far to the west, causing 13,200 to 16,700 deaths along the forced march.[88] Settler expansion as well as this influx of Indigenous peoples from the East resulted in the American Indian Wars west of the Mississippi.[89][90]

During the colonial period, slavery became legal in all the Thirteen colonies, and by 1770 it provided the main labor force in the large-scale, agriculture-dependent economies of the Southern Colonies from Maryland to Georgia. The practice began to be significantly questioned during the American Revolution,[91] and spurred by an active abolitionist movement that had reemerged in the 1830s, states in the North enacted laws to prohibit slavery within their boundaries.[92] At the same time, support for slavery had strengthened in Southern states, with widespread use of inventions such as the cotton gin (1793) having made slavery immensely profitable for Southern elites.[93][94][95]

The United States annexed the Republic of Texas in 1845,[96] and the 1846 Oregon Treaty led to U.S. control of the present-day American Northwest.[97] Dispute with Mexico over Texas led to the Mexican–American War (1846–1848). After the victory of the U.S., Mexico recognized U.S. sovereignty over Texas, New Mexico, and California in the 1848 Mexican Cession; the cession's lands also included the future states of Nevada, Colorado and Utah.[79][98] The California gold rush of 1848–1849 spurred a huge migration of white settlers to the Pacific coast, leading to even more confrontations with Native populations. One of the most violent, the California genocide of thousands of Native inhabitants, lasted into the mid-1870s.[99] Additional western territories and states were created.[100]

Slave states and free states in 1858

Throughout the 1850s, the sectional conflict regarding slavery was further inflamed by national legislation in the U.S. Congress and decisions of the Supreme Court. In Congress, the Fugitive Slave Act of 1850 mandated the forcible return to their owners in the South of slaves taking refuge in non-slave states, while the Kansas–Nebraska Act of 1854 effectively gutted the anti-slavery requirements of the Missouri Compromise.[101] In its Dred Scott decision of 1857, the Supreme Court ruled against a slave brought into non-slave territory, simultaneously declaring the entire Missouri Compromise to be unconstitutional. These and other events exacerbated tensions between North and South that would culminate in the American Civil War (1861–1865).[102][103]

Beginning with South Carolina, 11 slave-state governments voted to secede from the United States in 1861, joining to create the Confederate States of America. All other state governments remained loyal to the Union.[q][104][105] War broke out in April 1861 after the Confederacy bombarded Fort Sumter.[106][107] Following the Emancipation Proclamation on January 1, 1863, many freed slaves joined the Union army.[108] The war began to turn in the Union's favor following the 1863 Siege of Vicksburg and Battle of Gettysburg, and the Confederates surrendered in 1865 after the Union's victory in the Battle of Appomattox Court House.[109]

Reconstruction, Gilded Age, and Progressive Era (1866–1917)

[edit]
An Edison Studios film showing immigrants arriving at Ellis Island in New York Harbor, a major point of entry for European immigrants in the late 19th and early 20th centuries[110][111]

Efforts toward reconstruction in the secessionist South had begun as early as 1862,[112] but it was only after President Lincoln's assassination that the three Reconstruction Amendments to the Constitution were ratified to protect civil rights. The amendments codified nationally the abolition of slavery and involuntary servitude except as punishment for crimes, promised equal protection under the law for all persons, and prohibited discrimination on the basis of race or previous enslavement.[113][114][115] As a result, African Americans took an active political role in ex-Confederate states in the decade following the Civil War.[116][117] The former Confederate states were readmitted to the Union, beginning with Tennessee in 1866 and ending with Georgia in 1870.[118][119]

National infrastructure, including transcontinental telegraph and railroads, spurred growth in the American frontier. This was accelerated by the Homestead Acts, through which nearly 10 percent of the total land area of the United States was given away free to some 1.6 million homesteaders.[120][121] From 1865 through 1917, an unprecedented stream of immigrants arrived in the United States, including 24.4 million from Europe.[122] Most came through the Port of New York, as New York City and other large cities on the East Coast became home to large Jewish, Irish, and Italian populations. Many Northern Europeans as well as significant numbers of Germans and other Central Europeans moved to the Midwest. At the same time, about one million French Canadians migrated from Quebec to New England.[123] During the Great Migration, millions of African Americans left the rural South for urban areas in the North.[124] Alaska was purchased from Russia in 1867.[125]

The Compromise of 1877 is generally considered the end of the Reconstruction era, as it resolved the electoral crisis following the 1876 presidential election and led President Rutherford B. Hayes to reduce the role of federal troops in the South.[126] Immediately, the Redeemers began evicting the Carpetbaggers and quickly regained local control of Southern politics in the name of white supremacy.[127][128] African Americans endured a period of heightened, overt racism following Reconstruction, a time often considered the nadir of American race relations.[129][130] A series of Supreme Court decisions, including Plessy v. Ferguson, emptied the Fourteenth and Fifteenth Amendments of their force, allowing Jim Crow laws in the South to remain unchecked, sundown towns in the Midwest, and segregation in communities across the country, which would be reinforced in part by the policy of redlining later adopted by the federal Home Owners' Loan Corporation.[131]

An explosion of technological advancement, accompanied by the exploitation of cheap immigrant labor,[132] led to rapid economic expansion during the Gilded Age of the late 19th century. It continued into the early 20th, when the United States already outpaced the economies of Britain, France, and Germany combined. Tycoons led the nation's expansion in the railroad, petroleum, and steel industries, as the United States emerged as a pioneer of the automotive industry.[133][134][135][136] This fostered the amassing of enormous economic and political power by a few prominent industrialists, largely through the formation of trusts and monopolies to prevent competition.[137] These changes resulted in significant increases in economic inequality, slum conditions, and social unrest, creating a fertile environment for labor unions and socialist movements to flourish.[138][139][140] This period eventually ended with the advent of the Progressive Era, which was characterized by significant economic and social reforms.[141][142]

Pro-American elements in Hawaii overthrew the Hawaiian monarchy; the islands were annexed in 1898. That same year, Puerto Rico, the Philippines, and Guam were ceded to the U.S. by Spain after the latter's defeat in the Spanish–American War. (The Philippines was granted full independence from the U.S. on July 4, 1946, following World War II. Puerto Rico and Guam have remained U.S. territories.)[143] American Samoa was acquired by the United States in 1900 after the Second Samoan Civil War.[144] The U.S. Virgin Islands were purchased from Denmark in 1917 after Danish voters approved the sale in a 1916 referendum.[145]

World War I, Great Depression, and World War II (1917–1945)

[edit]
The 1945 American Trinity test, the first-ever detonation of a nuclear weapon

The United States entered World War I alongside the Allies in 1917 helping to turn the tide against the Central Powers.[146] In 1920, a constitutional amendment granted nationwide women's suffrage.[147] During the 1920s and 1930s, radio for mass communication and early television transformed communications nationwide.[148] The Wall Street Crash of 1929 triggered the Great Depression, to which President Franklin D. Roosevelt responded with the New Deal plan of "reform, recovery and relief", a series of unprecedented and sweeping recovery programs and employment relief projects combined with financial reforms and regulations.[149][150]

Initially neutral during World War II, the U.S. began supplying war materiel to the Allies of World War II in March 1941 and entered the war in December after Japan's attack on Pearl Harbor.[151] Agreeing to a "Europe first" policy, the U.S. concentrated its wartime efforts on Japan's allies Italy and Germany until their final defeat in May 1945. The U.S. developed the first nuclear weapons and used them against the Japanese cities of Hiroshima and Nagasaki in August 1945, ending the war.[152][153] The United States was one of the "Four Policemen" who met to plan the post-war world, alongside the United Kingdom, the Soviet Union, and China.[154][155] The U.S. emerged relatively unscathed from the war, with even greater economic power and international political influence.[156]

Cold War and social revolution (1945–1991)

[edit]
Civil rights activists during the March on Washington for Jobs and Freedom in Washington, D.C. in August 1963

The end of World War II in 1945 left the U.S. and the Soviet Union as superpowers, each with its own political, military, and economic sphere of influence. Geopolitical tensions between the two superpowers soon led to the Cold War.[157][158][159] The U.S. implemented a policy of containment intended to limit the Soviet Union's sphere of influence; engaged in regime change against governments perceived to be aligned with the Soviets; and prevailed in the Space Race, which culminated with the first crewed Moon landing in 1969.[160][161]

Domestically, the U.S. experienced economic growth, urbanization, and population growth following World War II.[162] The civil rights movement emerged, with Martin Luther King Jr. becoming a prominent leader in the early 1960s.[163] The Great Society plan of President Lyndon B. Johnson's administration resulted in groundbreaking and broad-reaching laws, policies and a constitutional amendment to counteract some of the worst effects of lingering institutional racism.[164]

The counterculture movement in the U.S. brought significant social changes, including the liberalization of attitudes toward recreational drug use and sexuality.[165][166] It also encouraged open defiance of the military draft (leading to the end of conscription in 1973)[167] and wide opposition to U.S. intervention in Vietnam, with the U.S. totally withdrawing in 1975.[168] A societal shift in the roles of women was significantly responsible for the large increase in female paid labor participation starting in the 1970s, and by 1985 the majority of American women aged 16 and older were employed.[169]

The Fall of Communism and the dissolution of the Soviet Union from 1989 to 1991 marked the end of the Cold War and left the United States as the world's sole superpower.[170][171][172][173][174] This cemented the United States' global influence, reinforcing the concept of the "American Century" as the U.S. dominated international political, cultural, economic, and military affairs.[175][176]

Contemporary (1991–present)

[edit]
The Twin Towers in New York City during the September 11 attacks of 2001

The 1990s saw the longest recorded economic expansion in American history, a dramatic decline in U.S. crime rates, and advances in technology. Throughout this decade, technological innovations such as the World Wide Web, the evolution of the Pentium microprocessor in accordance with Moore's law, rechargeable lithium-ion batteries, the first gene therapy trial, and cloning either emerged in the U.S. or were improved upon there. The Human Genome Project was formally launched in 1990, while Nasdaq became the first stock market in the United States to trade online in 1998.[177]

In the Gulf War of 1991, an American-led international coalition of states expelled an Iraqi invasion force that had occupied neighboring Kuwait.[178] The September 11 attacks on the United States in 2001 by the pan-Islamist militant organization al-Qaeda led to the war on terror and subsequent military interventions in Afghanistan and in Iraq.[179][180][181]

The U.S. housing bubble culminated in 2007 with the Great Recession, the largest economic contraction since the Great Depression.[182] Beginning in the 2010s, and particularly in the 2020s, the United States has experienced increased political polarization[183][184] and democratic backsliding.[185][186] The country's polarization was violently reflected in the January 2021 Capitol attack,[187] when a mob of insurrectionists[188] entered the U.S. Capitol and sought to prevent the peaceful transfer of power[189] in an attempted self-coup d'état.[190]

Geography

[edit]
A topographic map of the United States

The United States is the world's third-largest country by total area behind Russia and Canada.[c] The 48 contiguous states and the District of Columbia have a combined area of 3,119,885 square miles (8,080,470 km2).[12][191] In 2021, the United States had 8% of the Earth's permanent meadows and pastures and 10% of its cropland.[192]

Starting in the east, the coastal plain of the Atlantic seaboard gives way to inland forests and rolling hills in the Piedmont plateau region.[193] The Appalachian Mountains and the Adirondack Massif separate the East Coast from the Great Lakes and the grasslands of the Midwest.[194] The Mississippi River System, the world's fourth-longest river system, runs predominantly north–south through the center of the country. The flat and fertile prairie of the Great Plains stretches to the west, interrupted by a highland region in the southeast.[194]

The Grand Canyon in Arizona

The Rocky Mountains, west of the Great Plains, extend north to south across the country, peaking at over 14,000 feet (4,300 m) in Colorado.[195] The supervolcano underlying Yellowstone National Park in the Rocky Mountains, the Yellowstone Caldera, is the continent's largest volcanic feature.[196] Farther west are the rocky Great Basin and the Chihuahuan, Sonoran, and Mojave deserts.[197] In the northwest corner of Arizona, carved by the Colorado River, is the Grand Canyon, a steep-sided canyon and popular tourist destination[198] known for its overwhelming visual size and intricate, colorful landscape. The Cascade and Sierra Nevada mountain ranges run close to the Pacific coast. The lowest and highest points in the contiguous United States are in the State of California,[199] about 84 miles (135 km) apart.[200]

At an elevation of 20,310 feet (6,190.5 m), Alaska's Denali (also called Mount McKinley) is the highest peak in the country and on the continent.[201] Active volcanoes in the U.S. are common throughout Alaska's Alexander and Aleutian Islands. Located entirely outside North America, the archipelago of Hawaii consists of volcanic islands, physiographically and ethnologically part of the Polynesian subregion of Oceania.[202]

In addition to its total land area, the United States has one of the world's largest marine exclusive economic zones spanning approximately 4.5 million square miles (11.7 million km2) of ocean.[203][204]

Climate

[edit]
The Köppen climate types of the United States

With its large size and geographic variety, the United States includes most climate types. East of the 100th meridian, the climate ranges from humid continental in the north to humid subtropical in the south.[205] The western Great Plains are semi-arid.[206] Many mountainous areas of the American West have an alpine climate. The climate is arid in the Southwest, Mediterranean in coastal California, and oceanic in coastal Oregon, Washington, and southern Alaska. Most of Alaska is subarctic or polar. Hawaii, the southern tip of Florida and U.S. territories in the Caribbean and Pacific are tropical.[207]

The United States receives more high-impact extreme weather incidents than any other country.[208][209] States bordering the Gulf of Mexico are prone to hurricanes, and most of the world's tornadoes occur in the country, mainly in Tornado Alley.[210] Due to climate change in the country, extreme weather has become more frequent in the U.S. in the 21st century, with three times the number of reported heat waves compared to the 1960s.[211][212][213] Since the 1990s, droughts in the American Southwest have become more persistent and more severe.[214] The regions considered as the most attractive to the population are the most vulnerable.[215]

Biodiversity and conservation

[edit]

 

A bald eagle
The bald eagle, the national emblem of the United States since 1782 and officially declared the national bird in 2024[216]

The U.S. is one of 17 megadiverse countries containing large numbers of endemic species: about 17,000 species of vascular plants occur in the contiguous United States and Alaska, and over 1,800 species of flowering plants are found in Hawaii, few of which occur on the mainland.[217] The United States is home to 428 mammal species, 784 birds, 311 reptiles, 295 amphibians,[218] and around 91,000 insect species.[219]

There are 63 national parks, and hundreds of other federally managed monuments, forests, and wilderness areas, administered by the National Park Service and other agencies.[220] About 28% of the country's land is publicly owned and federally managed,[221] primarily in the Western States.[222] Most of this land is protected, though some is leased for commercial use, and less than one percent is used for military purposes.[223][224]

Environmental issues in the United States include debates on non-renewable resources and nuclear energy, air and water pollution, biodiversity, logging and deforestation,[225][226] and climate change.[227][228] The U.S. Environmental Protection Agency (EPA) is the federal agency charged with addressing most environmental-related issues.[229] The idea of wilderness has shaped the management of public lands since 1964, with the Wilderness Act.[230] The Endangered Species Act of 1973 provides a way to protect threatened and endangered species and their habitats. The United States Fish and Wildlife Service implements and enforces the Act.[231] In 2024, the U.S. ranked 35th among 180 countries in the Environmental Performance Index.[232]

Government and politics

[edit]
The Capitol Building
The Capitol Building, seat of legislative government, houses both chambers of Congress.
The White House
The White House, the president's residence and workplace, includes offices for the executive staff.

The United States is a federal republic of 50 states and a federal capital district, Washington, D.C. The U.S. asserts sovereignty over five unincorporated territories and several uninhabited island possessions.[19][233] It is the world's oldest surviving federation,[234] and its presidential system of federal government has been adopted, in whole or in part, by many newly independent states worldwide following their decolonization.[235] The Constitution of the United States serves as the country's supreme legal document.[236] Most scholars describe the United States as a liberal democracy,[237] though some have used descriptions such as oligarchy or plutocracy instead.[r]

Federal government

[edit]

Composed of three branches, all headquartered in Washington, D.C., the federal government is the national government of the United States. The U.S. Constitution establishes a separation of powers intended to provide a system of checks and balances to prevent any of the three branches from becoming supreme.[249]

Legislature

[edit]

The U.S. Congress is a bicameral legislature made up of the Senate and the House of Representatives. The Senate has 100 members—two residents from each state and elected by that state's voters for a six-year term. The House of Representatives has 435 members, elected for a two-year term by the constituency of the congressional district where they reside. A state's legislature decides the district boundaries, which are contiguous within the state. Every U.S. congressional district is of equivalent population and sends one representative to Congress.[250] Election years for senators are staggered so that only one-third of them will be up for election every two years.[251] U.S. representatives are all up for election at the same time every two years. The U.S. Congress makes federal law, declares war, approves treaties, has the power of the purse,[252] and has the power of impeachment.[253] One of its foremost non-legislative functions is the power to investigate and oversee the executive branch.[254] Congressional oversight is usually delegated to committees and is facilitated by Congress's power to issue subpoenas.[255] Much of the work of Congress is performed by a collection of committees, each appointed for a specific purpose or function. Committee membership is by tradition and statute bipartisan, but all committees are chaired by a member of the majority party, who sets the committee agenda.[256]

Executive

[edit]

The U.S. president is the head of state, commander-in-chief of the military, and chief executive of the federal government. The president appoints the members of the Cabinet, subject to Senate approval, and names other officials who administer and enforce federal law and policy through their respective agencies.[257] The president has the ability to veto legislative bills from the U.S. Congress before they become law. However, presidential vetoes can be overridden by a two-thirds supermajority vote in both chambers of Congress. The president also has clemency power for federal crimes and can issue pardons. Finally, the president has the authority to issue expansive "executive orders" in a number of policy areas, subject to judicial review. Candidates for president campaign with a vice-presidential running mate. Both candidates are elected together, or defeated together, in a presidential election. Unlike other votes in American politics, this is technically an indirect election in which the winner will be determined by the U.S. Electoral College. There, votes are officially cast by individual electors selected by their state legislature.[258] In practice, however, each of the 50 states chooses a group of presidential electors who are required by state law to confirm the winner of their state's popular vote. Each state is allocated two electors plus one additional elector for every congressional district in the state, which in effect combines to equal the number of elected officials that state sends to Congress. The District of Columbia, with no representatives or senators, is allocated three electoral votes. Both the president and the vice president serve a four-year term, and the president may be reelected to the office only once, for one additional four-year term.[s]

Judiciary

[edit]

The U.S. federal judiciary, whose judges are all appointed for life by the president with Senate approval, consists primarily of the U.S. Supreme Court, the U.S. courts of appeals, and the U.S. district courts. The lowest level in the federal judiciary is the federal district court, which decides all cases considered to be under "original jurisdiction", such as federal statutes, constitutional law, or international treaties. After a federal district court has decided a case, its decision may be contested and sent to a higher court, a federal court of appeals. The U.S. judicial system's 12 federal circuits divide the country into 12 separate geographic administrative regions for appeals decisions. The next and highest court in the system is the Supreme Court of the United States.[259] The U.S. Supreme Court interprets laws and overturns those it finds unconstitutional.[259] On average, the Supreme Court receives about 7,000 appeals petitions for writs of certiorari each year, but only grants about 80.[260] Consisting of nine members led by the Chief Justice of the United States, the court judges each case before it by majority decision. As with all other federal judges, the members are appointed for life by the sitting president with Senate approval when a vacancy becomes available.[261]

The three-branch system is known as the presidential system, in contrast to the parliamentary system where the executive is part of the legislative body. Many countries around the world adopted this aspect of the 1789 Constitution of the United States, especially in the postcolonial Americas.[262]

Subdivisions

[edit]
Territories of the United States
Territories of the United States include American Samoa, Guam, the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands.

In the U.S. federal system, sovereign powers are shared between three levels of government specified in the Constitution: the federal government, the states, and Indian tribes.[263][264] The U.S. also asserts sovereignty over five permanently inhabited territories: American Samoa, Guam, the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands.[19]

Residents of the 50 states are governed by their elected state government, under state constitutions compatible with the national constitution, and by elected local governments that are administrative divisions of a state.[265] States are subdivided into counties or county equivalents, and (except for Hawaii) further divided into municipalities, each administered by elected representatives. The District of Columbia is a federal district containing the U.S. capital, Washington, D.C.[266] The federal district is an administrative division of the federal government.[267]

Map of the 326 Indian reservations in the United States; 231 recognized Alaska Native tribes are not shown.

Indian country is made up of 574 federally recognized tribes and 326 Indian reservations. They hold a government-to-government relationship with the U.S. federal government in Washington and are legally defined as domestic dependent nations with inherent tribal sovereignty rights.[264][263][268][269]

In addition to the five major territories, the U.S. also asserts sovereignty over the United States Minor Outlying Islands in the Pacific Ocean and the Caribbean.[19] The seven undisputed islands without permanent populations are Baker Island, Howland Island, Jarvis Island, Johnston Atoll, Kingman Reef, Midway Atoll, and Palmyra Atoll. U.S. sovereignty over the unpopulated Bajo Nuevo Bank, Navassa Island, Serranilla Bank, and Wake Island is disputed.[19]

AlabamaAlaskaAmerican SamoaArizonaArkansasCaliforniaColoradoConnecticutDelawareFloridaGeorgiaGuamHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMississippiMissouriMontanaNebraskaNevadaNew HampshireNew JerseyNew MexicoNew YorkNorth CarolinaNorth DakotaNorthern Mariana IslandsOhioOklahomaOregonPuerto RicoPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUnited States Virgin IslandsUtahVermontVirginiaWashingtonWest VirginiaWisconsinWyomingDelawareMarylandNew HampshireNew JerseyMassachusettsConnecticutDistrict of ColumbiaWest VirginiaPuerto RicoUnited States Virgin IslandsGuamNorthern Mariana IslandsAmerican SamoaVermontRhode Island
 

Political parties

[edit]
States and territories by partisan control, as of February 2025:
  Divided partisan control

The Constitution is silent on political parties. However, they developed independently in the 18th century with the Federalist and Anti-Federalist parties.[270] Since then, the United States has operated as a de facto two-party system, though the parties have changed over time.[271] Since the mid-19th century, the two main national parties have been the Democratic Party and the Republican Party. The former is perceived as relatively liberal in its political platform while the latter is perceived as relatively conservative in its platform.[272]

Foreign relations

[edit]
The United Nations headquarters
The United Nations headquarters has been situated along the East River in Midtown Manhattan since 1952; in 1945, the United States was a founding member of the UN.

The United States has an established structure of foreign relations, with the world's second-largest diplomatic corps as of 2024. It is a permanent member of the United Nations Security Council[273] and home to the United Nations headquarters.[274] The United States is a member of the G7,[275] G20,[276] and OECD intergovernmental organizations.[277] Almost all countries have embassies and many have consulates (official representatives) in the country. Likewise, nearly all countries host formal diplomatic missions with the United States, except Iran,[278] North Korea,[279] and Bhutan.[280] Though Taiwan does not have formal diplomatic relations with the U.S., it maintains close unofficial relations.[281] The United States regularly supplies Taiwan with military equipment to deter potential Chinese aggression.[282] Its geopolitical attention also turned to the Indo-Pacific when the United States joined the Quadrilateral Security Dialogue with Australia, India, and Japan.[283]

The United States has a "Special Relationship" with the United Kingdom[284] and strong ties with Canada,[285] Australia,[286] New Zealand,[287] the Philippines,[288] Japan,[289] South Korea,[290] Israel,[291] and several European Union countries such as France, Italy, Germany, Spain, and Poland.[292] The U.S. works closely with its NATO allies on military and national security issues, and with countries in the Americas through the Organization of American States and the United States–Mexico–Canada Free Trade Agreement. The U.S. exercises full international defense authority and responsibility for Micronesia, the Marshall Islands, and Palau through the Compact of Free Association.[259] It has increasingly conducted strategic cooperation with India,[293] while its ties with China have steadily deteriorated.[294][295] Beginning in 2014, the U.S. had become a key ally of Ukraine.[296][297]

Military

[edit]
The Pentagon
The Pentagon, the headquarters of the U.S. Department of Defense in Arlington County, Virginia, is one of the world's largest office buildings with over 6.5 million square feet (600,000 m2) of floor space.

The president is the commander-in-chief of the United States Armed Forces and appoints its leaders, the secretary of defense and the Joint Chiefs of Staff. The Department of Defense, headquartered at the Pentagon near Washington, D.C., administers five of the six service branches, which are made up of the U.S. Army, Marine Corps, Navy, Air Force, and Space Force.[298] The Coast Guard is administered by the Department of Homeland Security in peacetime and can be transferred to the Department of the Navy in wartime.[299] Total strength of the entire military is about 1.3 million active duty with an additional 400,000 in reserve.

The United States spent $997 billion on its military in 2024, which is by far the largest amount of any country, making up 37% of global military spending and accounting for 3.4% of the country's GDP.[300] The U.S. possesses 42% of the world's nuclear weapons—the second-largest stockpile after that of Russia.[301] The U.S. military is widely regarded as the most powerful and advanced in the world.[302][303]

The United States has the third-largest combined armed forces in the world, behind the Chinese People's Liberation Army and Indian Armed Forces.[304] The U.S. military operates about 800 bases and facilities abroad,[305] and maintains deployments greater than 100 active duty personnel in 25 foreign countries.[306] The United States has engaged in over 400 military interventions since its founding in 1776, with over half of these occurring between 1950 and 2019 and 25% occurring in the post-Cold War era.[307]

State defense forces (SDFs) are military units that operate under the sole authority of a state government. SDFs are authorized by state and federal law but are under the command of the state's governor.[308][309][310] By contrast, the 54 U.S. National Guard organizations[t] fall under the dual control of state or territorial governments and the federal government; their units can also become federalized entities, but SDFs cannot be federalized.[311] The National Guard personnel of a state or territory can be federalized by the president under the National Defense Act Amendments of 1933; this legislation created the Guard and provides for the integration of Army National Guard and Air National Guard units and personnel into the U.S. Army and (since 1947) the U.S. Air Force.[312] The total number of National Guard members is about 430,000, while the estimated combined strength of SDFs is less than 10,000.[313]

Law enforcement and criminal justice

[edit]
J. Edgar Hoover Building, the headquarters of the Federal Bureau of Investigation (FBI), in Washington, D.C.

There are about 18,000 U.S. police agencies from local to national level in the United States.[314] Law in the United States is mainly enforced by local police departments and sheriff departments in their municipal or county jurisdictions. The state police departments have authority in their respective state, and federal agencies such as the Federal Bureau of Investigation (FBI) and the U.S. Marshals Service have national jurisdiction and specialized duties, such as protecting civil rights, national security, enforcing U.S. federal courts' rulings and federal laws, and interstate criminal activity.[315] State courts conduct almost all civil and criminal trials,[316] while federal courts adjudicate the much smaller number of civil and criminal cases that relate to federal law.[317]

There is no unified "criminal justice system" in the United States. The American prison system is largely heterogenous, with thousands of relatively independent systems operating across federal, state, local, and tribal levels. In 2025, "these systems hold nearly 2 million people in 1,566 state prisons, 98 federal prisons, 3,116 local jails, 1,277 juvenile correctional facilities, 133 immigration detention facilities, and 80 Indian country jails, as well as in military prisons, civil commitment centers, state psychiatric hospitals, and prisons in the U.S. territories."[318]

Despite disparate systems of confinement, four main institutions dominate: federal prisons, state prisons, local jails, and juvenile correctional facilities.[319] Federal prisons are run by the Federal Bureau of Prisons and hold pretrial detainees as well as people who have been convicted of federal crimes.[319] State prisons, run by the department of corrections of each state, hold people sentenced and serving prison time (usually longer than one year) for felony offenses.[319] Local jails are county or municipal facilities that incarcerate defendants prior to trial; they also hold those serving short sentences (typically under a year).[319] Juvenile correctional facilities are operated by local or state governments and serve as longer-term placements for any minor adjudicated as delinquent and ordered by a judge to be confined.[320]

In January 2023, the United States had the sixth-highest per capita incarceration rate in the world—531 people per 100,000 inhabitants—and the largest prison and jail population in the world, with more than 1.9 million people incarcerated.[318][321][322] An analysis of the World Health Organization Mortality Database from 2010 showed U.S. homicide rates "were 7 times higher than in other high-income countries, driven by a gun homicide rate that was 25 times higher".[323]

Economy

[edit]
Obverse of a US$1 bill
The U.S. dollar is the most-used currency in international transactions and the world's foremost reserve currency.

The U.S. has a highly developed mixed economy[324] that has been the world's largest nominally since about 1890.[325] Its 2024 gross domestic product (GDP)[e] of more than $29 trillion[326] constituted over 25% of nominal global economic output, or 15% at purchasing power parity (PPP). From 1983 to 2008, U.S. real compounded annual GDP growth was 3.3%, compared to a 2.3% weighted average for the rest of the G7.[327] The country ranks first in the world by nominal GDP,[328] second when adjusted for purchasing power parities (PPP),[15] and ninth by PPP-adjusted GDP per capita.[15] In February 2024, the total U.S. federal government debt was $34.4 trillion.[329]

New York City is the world's principal financial center, and its metropolitan area is the world's largest metropolitan economy.

Of the world's 500 largest companies by revenue, 138 were headquartered in the U.S. in 2025,[330] the highest number of any country.[331] The U.S. dollar is the currency most used in international transactions and the world's foremost reserve currency, backed by the country's dominant economy, its military, the petrodollar system, its large U.S. treasuries market, and its linked eurodollar.[332] Several countries use it as their official currency, and in others it is the de facto currency.[333][334] The U.S. has free trade agreements with several countries, including the USMCA.[335] Although the United States has reached a post-industrial level of economic development[336] and is often described as having a service economy,[336][337] it remains a major industrial power;[338] in 2024, the U.S. manufacturing sector was the world's second-largest by value output after China's.[339]

The New York Stock Exchange on Wall Street, the world's largest stock exchange by market capitalization[340]

New York City is the world's principal financial center,[341][342] and its metropolitan area is the world's largest metropolitan economy.[343] The New York Stock Exchange and Nasdaq, both located in New York City, are the world's two largest stock exchanges by market capitalization and trade volume.[344][345] The United States is at the forefront of technological advancement and innovation in many economic fields, especially in artificial intelligence; electronics and computers; pharmaceuticals; and medical, aerospace and military equipment.[346] The country's economy is fueled by abundant natural resources, a well-developed infrastructure, and high productivity.[347] The largest trading partners of the United States are the European Union, Mexico, Canada, China, Japan, South Korea, the United Kingdom, Vietnam, India, and Taiwan.[348] The United States is the world's largest importer and second-largest exporter.[u] It is by far the world's largest exporter of services.[351]

Americans have the highest average household[352] and employee income among OECD member states, and the fourth-highest median household income in 2023,[353] up from sixth-highest in 2013.[354] With personal consumption expenditures of over $18.5 trillion in 2023,[355] the U.S. has a heavily consumer-driven economy and is the world's largest consumer market.[356] The U.S. ranked first in the number of dollar billionaires and millionaires in 2023, with 735 billionaires and nearly 22 million millionaires.[357]

Wealth in the United States is highly concentrated; in 2011, the richest 10% of the adult population owned 72% of the country's household wealth, while the bottom 50% owned just 2%.[358] U.S. wealth inequality increased substantially since the late 1980s,[359] and income inequality in the U.S. reached a record high in 2019.[360] In 2024, the country had some of the highest wealth and income inequality levels among OECD countries.[361] Since the 1970s, there has been a decoupling of U.S. wage gains from worker productivity.[362] In 2016, the top fifth of earners took home more than half of all income,[363] giving the U.S. one of the widest income distributions among OECD countries.[364][362] There were about 771,480 homeless persons in the U.S. in 2024.[365] In 2022, 6.4 million children experienced food insecurity.[366] Feeding America estimates that around one in five, or approximately 13 million, children experience hunger in the U.S. and do not know where or when they will get their next meal.[367] Also in 2022, about 37.9 million people, or 11.5% of the U.S. population, were living in poverty.[368]

The United States has a smaller welfare state and redistributes less income through government action than most other high-income countries.[369][370] It is the only advanced economy that does not guarantee its workers paid vacation nationally[371] and one of a few countries in the world without federal paid family leave as a legal right.[372] The United States has a higher percentage of low-income workers than almost any other developed country, largely because of a weak collective bargaining system and lack of government support for at-risk workers.[373]

Science and technology

[edit]
California's Silicon Valley is the largest and foremost technology and innovation hub in the world.[374][375]

The United States has been a leader in technological innovation since the late 19th century and scientific research since the mid-20th century.[376] Methods for producing interchangeable parts and the establishment of a machine tool industry enabled the large-scale manufacturing of U.S. consumer products in the late 19th century.[377] By the early 20th century, factory electrification, the introduction of the assembly line, and other labor-saving techniques created the system of mass production.[378]

In the 21st century, the United States continues to be one of the world's foremost scientific powers,[379] though China has emerged as a major competitor in many fields.[380] The U.S. has the highest research and development expenditures of any country[381] and ranks ninth as a percentage of GDP.[382] In 2022, the United States was (after China) the country with the second-highest number of published scientific papers.[383] In 2021, the U.S. ranked second (also after China) by the number of patent applications, and third by trademark and industrial design applications (after China and Germany), according to World Intellectual Property Indicators.[384] In 2025[385][386] the United States ranked third (after Switzerland and Sweden) in the Global Innovation Index. The United States is considered to be a world leader in the development of artificial intelligence technology.[387] In 2023, the United States was ranked the second most technologically advanced country in the world (after South Korea) by Global Finance magazine.[388]

Spaceflight

[edit]
Astronauts Buzz Aldrin and Neil Armstrong (seen in visor reflection) during the 1969 Apollo 11 mission, the first crewed Moon landing. The United States is the only country to have landed humans on the Moon.

The United States has maintained a space program since the late 1950s, beginning with the establishment of the National Aeronautics and Space Administration (NASA) in 1958.[389][390] NASA's Apollo program (1961–1972) achieved the first crewed Moon landing with the 1969 Apollo 11 mission; it remains one of the agency's most significant milestones.[391][392] Other major endeavors by NASA include the Space Shuttle program (1981–2011),[393] the Voyager program (1972–present), the Hubble and James Webb space telescopes (launched in 1990 and 2021, respectively),[394][395] and the multi-mission Mars Exploration Program (Spirit, Opportunity, Curiosity, and Perseverance).[396] NASA is one of five agencies collaborating on the International Space Station (ISS);[397] U.S. contributions to the ISS include several modules, including Destiny (2001), Harmony (2007), and Tranquility (2010), as well as ongoing logistical and operational support.[398]

The United States private sector dominates the global commercial spaceflight industry.[399] Prominent American spaceflight contractors include Blue Origin, Boeing, Lockheed Martin, Northrop Grumman, and SpaceX. NASA programs such as the Commercial Crew Program, Commercial Resupply Services, Commercial Lunar Payload Services, and NextSTEP have facilitated growing private-sector involvement in American spaceflight.[400]

Energy

[edit]

In 2023, the United States received approximately 84% of its energy from fossil fuel, and its largest source of energy was petroleum (38%), followed by natural gas (36%), renewable sources (9%), coal (9%), and nuclear power (9%).[401][402] In 2022, the United States constituted about 4% of the world's population, but consumed around 16% of the world's energy.[403] The U.S. ranks as the second-highest emitter of greenhouse gases behind China.[404]

The U.S. is the world's largest producer of nuclear power, generating around 30% of the world's nuclear electricity.[405] It also has the highest number of nuclear power reactors of any country.[406] From 2024, the U.S. plans to triple its nuclear power capacity by 2050.[407]

Transportation

[edit]
Interchange between Interstate 10 and Interstate 45 in Houston, Texas

The United States' 4 million miles (6.4 million kilometers) of road network, owned almost entirely by state and local governments, is the longest in the world.[408][409] The extensive Interstate Highway System that connects all major U.S. cities is funded mostly by the federal government but maintained by state departments of transportation. The system is further extended by state highways and some private toll roads.

The U.S. is among the top ten countries with the highest vehicle ownership per capita (850 vehicles per 1,000 people) in 2022. A 2022 study found that 76% of U.S. commuters drive alone and 14% ride a bicycle, including bike owners and users of bike-sharing networks. About 11% use some form of public transportation.[410][411]

Public transportation in the United States is well developed in the largest urban areas, notably New York City, Washington, D.C., Boston, Philadelphia, Chicago, and San Francisco; otherwise, coverage is generally less extensive than in most other developed countries. The U.S. also has many relatively car-dependent localities.[412]

Long-distance intercity travel is provided primarily by airlines, but travel by rail is more common along the Northeast Corridor, the only high-speed rail in the U.S. that meets international standards. Amtrak, the country's government-sponsored national passenger rail company, has a relatively sparse network compared to that of Western European countries. Service is concentrated in the Northeast, California, the Midwest, the Pacific Northwest, and Virginia/Southeast.

Hartsfield–Jackson Atlanta International Airport, serving the Atlanta metropolitan area, is the world's busiest airport by passenger traffic with over 75 million passengers as of 2021.[413][414]

The United States has an extensive air transportation network. U.S. civilian airlines are all privately owned. The three largest airlines in the world, by total number of passengers carried, are U.S.-based; American Airlines became the global leader after its 2013 merger with US Airways.[415] Of the 50 busiest airports in the world, 16 are in the United States, as well as five of the top 10.[416] The world's busiest airport by passenger volume is Hartsfield–Jackson Atlanta International in Atlanta, Georgia.[413][416] In 2022, most of the 19,969 U.S. airports[417] were owned and operated by local government authorities, and there are also some private airports. Some 5,193 are designated as "public use", including for general aviation. The Transportation Security Administration (TSA) has provided security at most major airports since 2001.

The country's rail transport network, the longest in the world at 182,412.3 mi (293,564.2 km),[418] handles mostly freight[419][420] (in contrast to more passenger-centered rail in Europe[421]). Because they are often privately owned operations, U.S. railroads lag behind those of the rest of the world in terms of electrification.[422]

The country's inland waterways are the world's fifth-longest, totaling 25,482 mi (41,009 km).[423] They are used extensively for freight, recreation, and a small amount of passenger traffic. Of the world's 50 busiest container ports, four are located in the United States, with the busiest in the country being the Port of Los Angeles.[424]

Demographics

[edit]

Population

[edit]
The 10 most populous U.S. states
(2025 estimates)[425]
State Population (millions)
California
 
39.4
Texas
 
31.7
Florida
 
23.5
New York
 
20.0
Pennsylvania
 
13.1
Illinois
 
12.7
Ohio
 
11.9
Georgia
 
11.3
North Carolina
 
11.2
Michigan
 
10.1

The U.S. Census Bureau reported 331,449,281 residents on April 1, 2020,[v][426] making the United States the third-most-populous country in the world, after India and China.[427] The Census Bureau's official 2025 population estimate was 341,784,857, an increase of 3.1% since the 2020 census.[13] According to the Bureau's U.S. Population Clock, on July 1, 2024, the U.S. population had a net gain of one person every 16 seconds, or about 5400 people per day.[428] In 2023, 51% of Americans age 15 and over were married, 6% were widowed, 10% were divorced, and 34% had never been married.[429] In 2023, the total fertility rate for the U.S. stood at 1.6 children per woman,[430] and, at 23%, it had the world's highest rate of children living in single-parent households in 2019.[431] Most Americans live in the suburbs of major metropolitan areas.

The United States has a diverse population; 37 ancestry groups have more than one million members.[432] White Americans with ancestry from Europe, the Middle East, or North Africa form the largest racial and ethnic group at 57.8% of the United States population.[433][434] Hispanic and Latino Americans form the second-largest group and are 18.7% of the United States population. African Americans constitute the country's third-largest ancestry group and are 12.1% of the total U.S. population.[432] Asian Americans are the country's fourth-largest group, composing 5.9% of the United States population. The country's 3.7 million Native Americans account for about 1%,[432] and some 574 native tribes are recognized by the federal government.[435] In 2024, the median age of the United States population was 39.1 years.[436]

Language

[edit]
Most spoken languages in the U.S.

While many languages and dialects are spoken in the United States, English is by far the most commonly spoken and written.[437] De facto, English is the official language of the United States, and in 2025, Executive Order 14224 declared English official.[4] However, the U.S. has never had a statutory official language, as Congress has never passed a law to designate English as official for all three federal branches. Some laws, such as U.S. naturalization requirements, nonetheless standardize English. Twenty-eight states and the United States Virgin Islands have laws that designate English as the sole official language; 19 states and the District of Columbia have no official language.[438] Three states and four U.S. territories have recognized local or indigenous languages in addition to English: Hawaii (Hawaiian),[439] Alaska (twenty Native languages),[w][440] South Dakota (Sioux),[441] American Samoa (Samoan), Puerto Rico (Spanish), Guam (Chamorro), and the Northern Mariana Islands (Carolinian and Chamorro). In total, 169 Native American languages are spoken in the United States.[442] In Puerto Rico, Spanish is more widely spoken than English.[443]

According to the American Community Survey (2020),[444] some 245.4 million people in the U.S. age five and older spoke only English at home. About 41.2 million spoke Spanish at home, making it the second most commonly used language. Other languages spoken at home by one million people or more include Chinese (3.40 million), Tagalog (1.71 million), Vietnamese (1.52 million), Arabic (1.39 million), French (1.18 million), Korean (1.07 million), and Russian (1.04 million). German, spoken by 1 million people at home in 2010, fell to 881,000 estimated total speakers in 2020.[445]

Immigration

[edit]
The Mexico–United States border wall between San Diego (left) and Tijuana (right)

America's immigrant population is by far the world's largest in absolute terms.[446][447] In 2022, there were 87.7 million immigrants and U.S.-born children of immigrants in the United States, accounting for nearly 27% of the overall U.S. population.[448] In 2017, out of the U.S. foreign-born population, some 45% (20.7 million) were naturalized citizens, 27% (12.3 million) were lawful permanent residents, 6% (2.2 million) were temporary lawful residents, and 23% (10.5 million) were unauthorized immigrants.[449] In 2019, the top countries of origin for immigrants were Mexico (24% of immigrants), India (6%), China (5%), the Philippines (4.5%), and El Salvador (3%).[450] In fiscal year 2022, over one million immigrants (most of whom entered through family reunification) were granted legal residence.[451] The undocumented immigrant population in the U.S. reached a record high of 14 million in 2023.[452]

Religion

[edit]
Religious affiliation in the U.S., according to a 2025 Gallup poll:[9]
  1. Protestantism (32.0%)
  2. Catholicism (20.0%)
  3. Non-specific Christian (12.0%)
  4. Judaism (2.00%)
  5. Mormonism (1.00%)
  6. Other religion (6.00%)
  7. Unaffiliated (24.0%)
  8. Unanswered (3.00%)

The First Amendment guarantees the free exercise of religion in the country and forbids Congress from passing laws respecting its establishment.[453][454] Religious practice is widespread, among the most diverse in the world,[455] and profoundly vibrant.[456]

The country has the world's largest Christian population, which includes the fourth-largest population of Catholics.[457] Other notable faiths include Judaism, Buddhism, Hinduism, Islam, New Age, and Native American religions.[458] Religious practice varies significantly by region.[459] "Ceremonial deism" is common in American culture.[460]

The overwhelming majority of Americans believe in a higher power or spiritual force, engage in spiritual practices such as prayer, and consider themselves religious or spiritual.[461][462] In the Southern United States' "Bible Belt", evangelical Protestantism plays a significant role culturally; New England and the Western United States tend to be more secular.[459][463] Mormonism, a Restorationist movement founded in the U.S. in 1847,[464] is the predominant religion in Utah and a major religion in Idaho.

Urbanization

[edit]

About 82% of Americans live in metropolitan areas, particularly in suburbs;[346] about half of those reside in cities with populations over 50,000.[465] In 2022, 333 incorporated municipalities had populations over 100,000, nine cities had more than one million residents, and four cities—New York City, Los Angeles, Chicago, and Houston—had populations exceeding two million.[466] Many U.S. metropolitan populations are growing rapidly, particularly in the South and West.[467]

 
Largest metropolitan areas in the United States
Rank Name Region Pop. Rank Name Region Pop.
1 New York Northeast 20,112,448 11 Boston Northeast 5,034,221
2 Los Angeles West 12,844,441 12 Riverside–San Bernardino West 4,769,007
3 Chicago Midwest 9,434,123 13 San Francisco West 4,630,041
4 Dallas–Fort Worth South 8,477,157 14 Detroit Midwest 4,390,913
5 Houston South 7,904,627 15 Seattle West 4,161,883
6 Atlanta South 6,482,182 16 Minneapolis–Saint Paul Midwest 3,790,295
7 Washington, D.C. South 6,465,724 17 Tampa–St. Petersburg South 3,418,895
8 Miami South 6,391,072 18 San Diego West 3,282,248
9 Philadelphia Northeast 6,329,118 19 Denver West 3,092,037
10 Phoenix West 5,228,938 20 Orlando South 2,957,672

Health

[edit]
The Texas Medical Center in Houston is the largest medical complex in the world.[469][470] In 2018, it employed 120,000 people and treated 10 million patients.[471]

According to the Centers for Disease Control and Prevention (CDC), average U.S. life expectancy at birth reached 79.0 years in 2024, its highest recorded level. This was an increase of 0.6 years over 2023. The CDC attributed the improvement to a significant fall in the number of fatal drug overdoses in the country, noting that "heart disease continues to be the leading cause of death in the United States, followed by cancer and unintentional injuries."[472] In 2024, life expectancy at birth for American men rose to 76.5 years (+0.7 years compared to 2023), while life expectancy for women was 81.4 years (+0.3 years).[473] Starting in 1998, life expectancy in the U.S. fell behind that of other wealthy industrialized countries, and Americans' "health disadvantage" gap has been increasing ever since.[474]

The Commonwealth Fund reported in 2020 that the U.S. had the highest suicide rate among high-income countries.[475] Approximately one-third of the U.S. adult population is obese and another third is overweight.[476] The U.S. healthcare system far outspends that of any other country, measured both in per capita spending and as a percentage of GDP, but attains worse healthcare outcomes when compared to peer countries for reasons that are debated.[477] The United States is the only developed country without a system of universal healthcare, and a significant proportion of the population that does not carry health insurance.[478] Government-funded healthcare coverage for the poor (Medicaid) and for those age 65 and older (Medicare) is available to Americans who meet the programs' income or age qualifications. In 2010, then-President Obama passed the Patient Protection and Affordable Care Act.[x][479] Abortion in the United States is not federally protected, and is illegal or restricted in 17 states.[480]

Education

[edit]
Photograph of the University of Virginia
Some 77% of American college students attend public institutions[481] such as the University of Virginia, founded by Thomas Jefferson in 1819.

American primary and secondary education, known in the U.S. as K–12 ("kindergarten through 12th grade"), is decentralized. School systems are operated by state, territorial, and sometimes municipal governments and regulated by the U.S. Department of Education. In general, children are required to attend school or an approved homeschool from the age of five or six (kindergarten or first grade) until they are 18 years old. This often brings students through the 12th grade, the final year of a U.S. high school, but some states and territories allow them to leave school earlier, at age 16 or 17.[482] The U.S. spends more on education per student than any other country,[483] an average of $18,614 per year per public elementary and secondary school student in 2020–2021.[484] Among Americans age 25 and older, 92.2% graduated from high school, 62.7% attended some college, 37.7% earned a bachelor's degree, and 14.2% earned a graduate degree.[485] The U.S. literacy rate is near-universal.[346][486] The U.S. has produced the most Nobel Prize winners of any country, with 411 (having won 413 awards).[487][488]

U.S. tertiary or higher education has earned a global reputation. Many of the world's top universities, as listed by various ranking organizations, are in the United States, including 19 of the top 25.[489][490] American higher education is dominated by state university systems, although the country's many private universities and colleges enroll about 20% of all American students. Local community colleges generally offer open admissions, lower tuition, and coursework leading to a two-year associate degree or a non-degree certificate.[491]

As for public expenditures on higher education, the U.S. spends more per student than the OECD average, and Americans spend more than all nations in combined public and private spending.[492] Colleges and universities directly funded by the federal government do not charge tuition and are limited to military personnel and government employees, including: the U.S. service academies, the Naval Postgraduate School, and military staff colleges. Despite some student loan forgiveness programs in place,[493] student loan debt increased by 102% between 2010 and 2020,[494] and exceeded $1.7 trillion in 2022.[495]

Culture and society

[edit]
The Statue of Liberty, a large teal bronze sculpture on a stone pedestal
The Statue of Liberty (Liberty Enlightening the World) on Liberty Island in New York Harbor was an 1866 gift from France that has become an iconic symbol of the American Dream.[496]

The United States is home to a wide variety of ethnic groups, traditions, and customs.[497][498] The country has been described as having the values of individualism and personal autonomy,[499][500] as well as a strong work ethic[501] and competitiveness.[502] Voluntary altruism towards others also plays a major role;[503][504][505] according to a 2016 study by the Charities Aid Foundation, Americans donated 1.44% of total GDP to charity—the highest rate in the world by a large margin.[506] Americans have traditionally been characterized by a unifying political belief in an "American Creed" emphasizing consent of the governed, liberty, equality under the law, democracy, social equality, property rights, and a preference for limited government.[507][508] The U.S. has acquired significant hard and soft power through its diplomatic influence, economic power, military alliances, and cultural exports such as American movies, music, video games, sports, and food.[509][510] The influence that the United States exerts on other countries through soft power is referred to as Americanization.[511]

Nearly all present Americans or their ancestors came from Europe, Africa, or Asia (the "Old World") within the past five centuries.[512] Mainstream American culture is a Western culture largely derived from the traditions of European immigrants with influences from many other sources, such as traditions brought by slaves from Africa.[513] More recent immigration from Asia and especially Latin America has added to a cultural mix that has been described as a homogenizing melting pot, and a heterogeneous salad bowl, with immigrants contributing to, and often assimilating into, mainstream American culture.

Under the First Amendment to the Constitution, the United States is considered to have the strongest protections of free speech of any country.[514] Flag desecration, hate speech, blasphemy, and lese majesty are all forms of protected expression.[515][516][517] A 2016 Pew Research Center poll found that Americans were the most supportive of free expression of any polity measured.[518] Additionally, they are the "most supportive of freedom of the press and the right to use the Internet without government censorship".[519] The U.S. is a socially progressive country[520] with permissive attitudes surrounding human sexuality.[521] LGBTQ rights in the United States are among the most advanced by global standards.[521][522][523]

The American Dream, or the perception that Americans enjoy high levels of social mobility, plays a key role in attracting immigrants.[524][525] Whether this perception is accurate has been a topic of debate.[526][527][528] While mainstream culture holds that the United States is a classless society,[529] scholars identify significant differences between the country's social classes, affecting socialization, language, and values.[530][531] Americans tend to greatly value socioeconomic achievement, but being ordinary or average is promoted by some as a noble condition as well.[532]

The National Foundation on the Arts and the Humanities is an agency of the United States federal government that was established in 1965 with the purpose to "develop and promote a broadly conceived national policy of support for the humanities and the arts in the United States, and for institutions which preserve the cultural heritage of the United States."[533] It is composed of four sub-agencies:

Literature

[edit]
Photograph of Mark Twain
Mark Twain, whom William Faulkner called "the father of American literature"[534]

Colonial American authors were influenced by John Locke and other Enlightenment philosophers.[535][536] The American Revolutionary Period (1765–1783) is notable for the political writings of Benjamin Franklin, Alexander Hamilton, Thomas Paine, and Thomas Jefferson. Shortly before and after the Revolutionary War, the newspaper rose to prominence, filling a demand for anti-British national literature.[537][538] An early novel is William Hill Brown's The Power of Sympathy, published in 1791. Writer and critic John Neal in the early- to mid-19th century helped advance America toward a unique literature and culture by criticizing predecessors such as Washington Irving for imitating their British counterparts, and by influencing writers such as Edgar Allan Poe,[539] who took American poetry and short fiction in new directions. Ralph Waldo Emerson and Margaret Fuller pioneered the influential Transcendentalism movement;[540][541] Henry David Thoreau, author of Walden, was influenced by this movement.

The conflict surrounding abolitionism inspired writers, like Harriet Beecher Stowe, and authors of slave narratives, such as Frederick Douglass. Nathaniel Hawthorne's The Scarlet Letter (1850) explored the dark side of American history, as did Herman Melville's Moby-Dick (1851). Major American poets of the 19th century American Renaissance include Walt Whitman, Melville, and Emily Dickinson.[542][543] Mark Twain was the first major American writer to be born in the West. Henry James achieved international recognition with novels like The Portrait of a Lady (1881). As literacy rates rose, periodicals published more stories centered around industrial workers, women, and the rural poor.[544][545] Naturalism, regionalism, and realism were the major literary movements of the period.[546][547]

While modernism generally took on an international character, modernist authors working within the United States more often rooted their work in specific regions, peoples, and cultures.[548] Following the Great Migration to northern cities, African-American and black West Indian authors of the Harlem Renaissance developed an independent tradition of literature that rebuked a history of inequality and celebrated black culture. An important cultural export during the Jazz Age, these writings were a key influence on Négritude, a philosophy emerging in the 1930s among francophone writers of the African diaspora.[549][550] In the 1950s, an ideal of homogeneity led many authors to attempt to write the Great American Novel,[551] while the Beat Generation rejected this conformity, using styles that elevated the impact of the spoken word over mechanics to describe drug use, sexuality, and the failings of society.[552][553] Contemporary literature is more pluralistic than in previous eras, with the closest thing to a unifying feature being a trend toward self-conscious experiments with language.[554] Twelve American laureates have won the Nobel Prize in Literature.[555]

Mass media

[edit]
Comcast Center in Philadelphia, headquarters of Comcast, one of the world's largest telecommunications companies and media conglomerates

Media in the United States is broadly uncensored, with the First Amendment providing significant protections, as reiterated in New York Times Co. v. United States.[514] The four major broadcasters in the U.S. are the National Broadcasting Company (NBC), Columbia Broadcasting System (CBS), American Broadcasting Company (ABC), and Fox Broadcasting Company (Fox). The four major broadcast television networks are all commercial entities. The Public Broadcasting Service (PBS) is the country's major non-commercial public broadcast network;[556] it also provides educational programming through local PBS stations.[557][558][559][560] The U.S. cable television system offers hundreds of channels catering to a variety of niches.[561] In 2021, about 83% of Americans over age 12 listened to broadcast radio, while about 40% listened to podcasts.[562] In the prior year, there were 15,460 licensed full-power radio stations in the U.S. according to the Federal Communications Commission (FCC).[563] Public radio broadcasting is largely supplied by National Public Radio (NPR), incorporated in February 1970 under the Public Broadcasting Act of 1967.[564]

U.S. newspapers with a global reach and reputation include The Wall Street Journal, The New York Times, The Washington Post, and USA Today.[565] About 800 publications are produced in Spanish.[566][567] With few exceptions, newspapers are privately owned, either by large chains such as Gannett or McClatchy, which own dozens or even hundreds of newspapers; by small chains that own a handful of papers; or, in an increasingly rare situation, by individuals or families. Major cities often have alternative newspapers to complement the mainstream daily papers, such as The Village Voice in New York City and LA Weekly in Los Angeles. The five most-visited websites in the world are Google, YouTube, Facebook, Instagram, and ChatGPT—all of them American-owned. Other popular platforms used include X (formerly Twitter) and Amazon.[568][569]

In 2025, the U.S. was the world's second-largest video game market by revenue (after China).[570] In 2015, the U.S. video game industry consisted of 2,457 companies that employed around 220,000 jobs and generated $30.4 billion in revenue.[571] There are 444 game publishers, developers, and hardware companies in California alone.[572] According to the Game Developers Conference (GDC), the U.S. is the top location for video game development, with 58% of the world's game developers based there in 2025.[573]

Theater

[edit]
Broadway theaters in Theater District, Manhattan

The United States is well known for its theater. Mainstream theater in the United States derives from the old European theatrical tradition and has been heavily influenced by the British theater.[574] By the middle of the 19th century, America had created new distinct dramatic forms in the Tom Shows, the showboat theater and the minstrel show.[575] The central hub of the American theater scene is the Theater District in Manhattan, with its divisions of Broadway, off-Broadway, and off-off-Broadway.[576]

Many movie and television celebrities have gotten their big break working in New York productions. Outside New York City, many cities have professional regional or resident theater companies that produce their own seasons. The biggest-budget theatrical productions are musicals. U.S. theater has an active community theater culture.[577]

The Tony Awards recognizes excellence in live Broadway theater and are presented at an annual ceremony in Manhattan. The awards are given for Broadway productions and performances. One is also given for regional theater. Several discretionary non-competitive awards are given as well, including a Special Tony Award, the Tony Honors for Excellence in Theatre, and the Isabelle Stevenson Award.[578]

Visual arts

[edit]
American Gothic (1930) by Grant Wood is one of the most famous American paintings and is widely parodied.[579]

Folk art in colonial America grew out of artisanal craftsmanship in communities that allowed commonly trained people to individually express themselves. It was distinct from Europe's tradition of high art, which was less accessible and generally less relevant to early American settlers.[580] Cultural movements in art and craftsmanship in colonial America generally lagged behind those of Western Europe. For example, the prevailing medieval style of woodworking and primitive sculpture became integral to early American folk art, despite the emergence of Renaissance styles in England in the late 16th and early 17th centuries. The new English styles would have been early enough to make a considerable impact on American folk art, but American styles and forms had already been firmly adopted. Not only did styles change slowly in early America, but there was a tendency for rural artisans there to continue their traditional forms longer than their urban counterparts did—and far longer than those in Western Europe.[514]

The Hudson River School was a mid-19th-century movement in the visual arts tradition of European naturalism. The 1913 Armory Show in New York City, an exhibition of European modernist art, shocked the public and transformed the U.S. art scene.[581]

American Realism and American Regionalism sought to reflect and give America new ways of looking at itself. Georgia O'Keeffe, Marsden Hartley, and others experimented with new and individualistic styles, which would become known as American modernism. Major artistic movements such as the abstract expressionism of Jackson Pollock and Willem de Kooning and the pop art of Andy Warhol and Roy Lichtenstein developed largely in the United States. Major photographers include Alfred Stieglitz, Edward Steichen, Dorothea Lange, Edward Weston, James Van Der Zee, Ansel Adams, and Gordon Parks.[582]

The tide of modernism and then postmodernism has brought global fame to American architects, including Frank Lloyd Wright, Philip Johnson, and Frank Gehry.[583] The Metropolitan Museum of Art in Manhattan is the largest art museum in the United States[584] and the fourth-largest in the world.[585]

Music

[edit]
The Country Music Hall of Fame and Museum in Nashville, Tennessee

American folk music encompasses numerous music genres, variously known as traditional music, traditional folk music, contemporary folk music, or roots music. Many traditional songs have been sung within the same family or folk group for generations, and sometimes trace back to such origins as the British Isles, mainland Europe, or Africa.[586] The rhythmic and lyrical styles of African-American music in particular have influenced American music.[587] Banjos were brought to America through the slave trade. Minstrel shows incorporating the instrument into their acts led to its increased popularity and widespread production in the 19th century.[588][589] The electric guitar, first invented in the 1930s, and mass-produced by the 1940s, had an enormous influence on popular music, in particular due to the development of rock and roll.[590] The synthesizer, turntablism, and electronic music were also largely developed in the U.S.

Elements from folk idioms such as the blues and old-time music were adopted and transformed into popular genres with global audiences. Jazz grew from blues and ragtime in the early 20th century, developing from the innovations and recordings of composers such as W.C. Handy and Jelly Roll Morton. Louis Armstrong and Duke Ellington increased its popularity early in the 20th century.[591] Country music developed in the 1920s,[592] bluegrass[593] and rhythm and blues in the 1940s,[594] and rock and roll in the 1950s.[590] In the 1960s, Bob Dylan emerged from the folk revival to become one of the country's most celebrated songwriters.[595] The musical forms of punk and hip hop both originated in the United States in the 1970s.[596]

The United States has the world's largest music market, with a total retail value of $15.9 billion in 2022.[597] Most of the world's major record companies are based in the U.S.; they are represented by the Recording Industry Association of America (RIAA).[598] Mid-20th-century American pop stars, such as Frank Sinatra[599] and Elvis Presley,[600] became global celebrities and best-selling music artists,[591] as have artists of the late 20th century, such as Michael Jackson,[601] Madonna,[602] Whitney Houston,[603] and Mariah Carey,[604] and of the early 21st century, such as Eminem,[605] Britney Spears,[606] Lady Gaga,[606] Katy Perry,[606] Taylor Swift and Beyoncé.[607]

Fashion

[edit]
Haute couture fashion models on the catwalk during New York Fashion Week

The United States has the world's largest apparel market by revenue.[608] Apart from professional business attire, American fashion is eclectic and predominantly informal. Americans' diverse cultural roots are reflected in their clothing; however, sneakers, jeans, T-shirts, and baseball caps are emblematic of American styles.[609] New York, with its Fashion Week, is considered to be one of the "Big Four" global fashion capitals, along with Paris, Milan, and London. A study demonstrated that general proximity to Manhattan's Garment District has been synonymous with American fashion since its inception in the early 20th century.[610]

A number of well-known designer labels, among them Tommy Hilfiger, Ralph Lauren, Tom Ford and Calvin Klein, are headquartered in Manhattan.[611][612] Labels cater to niche markets, such as preteens. New York Fashion Week is one of the most influential fashion shows in the world, and is held twice each year in Manhattan;[613] the annual Met Gala, also in Manhattan, has been called the fashion world's "biggest night".[614][615]

Cinema

[edit]
The Hollywood Sign in the Hollywood Hills, often regarded as the symbol of the American film industry

The U.S. film industry has a worldwide influence and following. Hollywood, a district in central Los Angeles, the nation's second-most populous city, is also metonymous for the American filmmaking industry.[616][617][618] The major film studios of the United States are the primary source of the most commercially successful movies selling the most tickets in the world.[619][620]

Largely centered in the New York City region from its beginnings in the late 19th century through the first decades of the 20th century,[621][622][623][624] the U.S. film industry has since been primarily based in and around Hollywood. Nonetheless, American film companies have been subject to the forces of globalization in the 21st century, and an increasing number of films are made elsewhere.[625] The Academy Awards, popularly known as "the Oscars", have been held annually by the Academy of Motion Picture Arts and Sciences since 1929,[626] and the Golden Globe Awards have been held annually since January 1944.[627]

The industry peaked in what is commonly referred to as the "Golden Age of Hollywood", from the early sound period until the early 1960s,[628] with screen actors such as John Wayne and Marilyn Monroe becoming iconic figures.[629][630] In the 1970s, "New Hollywood", or the "Hollywood Renaissance",[631] was defined by grittier films influenced by French and Italian realist pictures of the post-war period.[632] The 21st century has been marked by the rise of American streaming platforms, which came to rival traditional cinema.[633][634]

Cuisine

[edit]
A Thanksgiving dinner with roast turkey, mashed potatoes, pickles, corn, candied yams, cranberry jelly, shrimps, stuffing, green peas, deviled eggs, green salad, and apple sauce

Early settlers were introduced by Native Americans to foods such as turkey, sweet potatoes, corn, squash, and maple syrup. Of the most enduring and pervasive examples are variations of the native dish called succotash. Early settlers and later immigrants combined these with foods they were familiar with, such as wheat flour,[635] beef, and milk, to create a distinctive American cuisine.[636][637] New World crops, especially pumpkin, corn, potatoes, and turkey as the main course are part of a shared national menu on Thanksgiving, when many Americans prepare or purchase traditional dishes to celebrate the occasion.[638]

Characteristic American dishes such as apple pie, fried chicken, doughnuts, french fries, macaroni and cheese, ice cream, hamburgers, hot dogs, and American pizza derive from the recipes of various immigrant groups.[639][640][641][642] Mexican dishes such as burritos and tacos preexisted the United States in areas later annexed from Mexico, and adaptations of Chinese cuisine as well as pasta dishes freely adapted from Italian sources are all widely consumed.[643]

American chefs have had a significant impact on society both domestically and internationally. In 1946, the Culinary Institute of America was founded by Katharine Angell and Frances Roth. This would become the United States' most prestigious culinary school, where many of the most talented American chefs would study prior to successful careers.[644][645] The United States restaurant industry was projected at $899 billion in sales for 2020,[646][647] and employed more than 15 million people, representing 10% of the nation's workforce directly.[646] It is the country's second-largest private employer and the third-largest employer overall.[648][649] The United States is home to over 220 Michelin star-rated restaurants, 70 of which are in New York City.[650]

Wine has been produced in what is now the United States since the 1500s, with the first widespread production beginning in what is now New Mexico in 1628.[651][652][653] In the modern U.S., wine production is undertaken in all fifty states, with California producing 84 percent of all U.S. wine. With more than 1,100,000 acres (4,500 km2) under vine, the United States is the fourth-largest wine-producing country in the world, after Italy, Spain, and France.[654][655]

The classic American diner, a casual restaurant type originally intended for the working class, emerged during the 19th century from converted railroad dining cars made stationary. The diner soon evolved into purpose-built structures whose number expanded greatly in the 20th century.[656] The American fast-food industry developed alongside the nation's car culture.[657] American restaurants developed the drive-in format in the 1920s, which they began to replace with the drive-through format by the 1940s.[658][659] American fast-food restaurant chains, such as McDonald's, Burger King, Chick-fil-A, Kentucky Fried Chicken, Dunkin' Donuts and many others, have numerous outlets around the world.[660]

Sports

[edit]
American football is the most popular sport in the United States; in this 2009 National Football League game, Carolina Panthers quarterback Jake Delhomme (number 17) throws a forward pass against the Dallas Cowboys.

The most popular spectator sports in the U.S. are American football, basketball, baseball, soccer, and ice hockey.[661] Their premier leagues are, respectively, the National Football League, the National Basketball Association,[662] Major League Baseball,[663] Major League Soccer,[664] and the National Hockey League,[665] All these leagues enjoy wide-ranging domestic media coverage and, except for the MLS, all are considered the preeminent leagues in their respective sports in the world. While most major U.S. sports such as baseball and American football have evolved out of European practices, basketball, volleyball, skateboarding, and snowboarding are American inventions, many of which have become popular worldwide.[666] Lacrosse and surfing arose from Native American and Native Hawaiian activities that predate European contact.[667] The market for professional sports in the United States was approximately $69 billion in July 2013, roughly 50% larger than that of Europe, the Middle East, and Africa combined.[668]

American football is by several measures the most popular spectator sport in the United States.[669] Although American football does not have a substantial following in other nations, the NFL does have the highest average attendance (67,254) of any professional sports league in the world.[670] In the year 2024, the NFL generated over $23 billion, making them the most valued professional sports league in the United States and the world.[671] Baseball has been regarded as the U.S. "national sport" since the late 19th century. The most-watched individual sports in the U.S. are golf and auto racing, particularly NASCAR and IndyCar.[672][673]

On the collegiate level, earnings for the member institutions exceed $1 billion annually,[674] and college football and basketball attract large audiences, as the NCAA March Madness tournament and the College Football Playoff are some of the most watched national sporting events.[675] In the U.S., the intercollegiate sports level serves as the main feeder system for professional and Olympic sports, with significant exceptions such as Minor League Baseball. This differs greatly from practices in nearly all other countries, where publicly and privately funded sports organizations serve this function.[676]

Eight Olympic Games have taken place in the United States. The 1904 Summer Olympics in St. Louis, Missouri, were the first-ever Olympic Games held outside of Europe.[677] The Olympic Games will be held in the U.S. for a ninth time when Los Angeles hosts the 2028 Summer Olympics. U.S. athletes have won a total of 2,968 medals (1,179 gold) at the Olympic Games, the most of any country.[678][679][680]

In other international competition, the United States is the home of a number of prestigious events, including the America's Cup, World Baseball Classic, the U.S. Open, and the Masters Tournament. The U.S. men's national soccer team has qualified for eleven World Cups, while the women's national team has won the FIFA Women's World Cup and Olympic soccer tournament four and five times, respectively.[681] The 1999 FIFA Women's World Cup was hosted by the United States. Its final match was attended by 90,185, setting the world record for largest women's sporting event crowd at the time.[682] The United States hosted the 1994 FIFA World Cup and will co-host, along with Canada and Mexico, the 2026 FIFA World Cup.[683]

See also

[edit]

Notes

[edit]
  1. ^ Per Executive Order 14224.[4][5] States and territories variously recognize English only, English plus one or more local languages, or no language at all. See § Language.
  2. ^ The historical and informal demonym Yankee has been applied to Americans, New Englanders, and northeasterners since the 18th century. Other terms, such as Usonian, are rare. For all lesser used terms, see Demonyms for the United States.
  3. ^ a b c At 3,531,900 sq mi (9,147,590 km2), the United States is the third-largest country in the world by land area, behind Russia and China. By total area (land and water), it is the third-largest, behind Russia and Canada, if its coastal and territorial water areas are included. However, if only its internal waters are included (bays, sounds, rivers, lakes, and the Great Lakes), the U.S. is the fourth-largest, after Russia, Canada, and China.
    Coastal/territorial waters included: 3,796,742 sq mi (9,833,517 km2)[20]
    Only internal waters included: 3,696,100 sq mi (9,572,900 km2)[21]
  4. ^ This figure excludes Puerto Rico and the other unincorporated islands because they are counted separately in U.S. census statistics.
  5. ^ a b U.S. nominal and PPP-adjusted GDP are the same as the U.S. is the reference country for PPP calculations.
  6. ^ After adjustment for taxes and transfers
  7. ^ See Time in the United States for details about laws governing time zones in the United States.
  8. ^ See Date and time notation in the United States.
  9. ^ The U.S. Virgin Islands use left-hand traffic.
  10. ^ The five major territories outside the union of states are American Samoa, Guam, the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands. The seven undisputed island areas without permanent populations are Baker Island, Howland Island, Jarvis Island, Johnston Atoll, Kingman Reef, Midway Atoll, and Palmyra Atoll. U.S. sovereignty over the unpopulated Bajo Nuevo Bank, Navassa Island, Serranilla Bank, and Wake Island is disputed.[19]
  11. ^ The U.S. Census Bureau's latest official population estimate of 341,784,857 residents (2025)[13] is for the 50 states and the District of Columbia; it excludes the 3.6 million residents of the five major U.S. territories and outlying islands. The Census Bureau also provides a continuously updated but unofficial population clock: www.census.gov/popclock
  12. ^ The official U.S. Government Publishing Office Style Manual has prescribed specific usages for "U.S." and "United States" as part of official names. In "formal writing (treaties, Executive orders, proclamations, etc.); congressional bills; legal citations and courtwork; and covers and title pages",[26] "United States" is always used. In a sentence containing the name of another country, "United States" must be used. Otherwise, "U.S." is used preceding a government organization or as an adjective, but "United States" is used as an adjective preceding non-governmental organizations (e.g. United States Steel Corporation).[26]
  13. ^ "Americus", which is derived from the Old High German first name "Emmerich"
  14. ^ Americus comes from the Medieval Latin name Emericus (for Saint Emeric of Hungary), itself derived from the Old High German name Emmerich.
  15. ^ From the late 15th century, the Columbian exchange had been catastrophic for native populations throughout the Americas. It is estimated that up to 95 percent of the Indigenous populations, especially in the Caribbean, perished from infectious diseases during the years following European colonization;[56] remaining populations were often displaced by European expansion.[57][58]
  16. ^ New Hampshire, Massachusetts, Connecticut, Rhode Island, New York, New Jersey, Pennsylvania, Delaware, Maryland, Virginia, North Carolina, South Carolina, and Georgia
  17. ^ The Confederate States of America was formed by the following states, each state government of which formally declared its secession from the United States: South Carolina, Mississippi, Florida, Alabama, Georgia, Louisiana, Texas, Virginia, Arkansas, Tennessee, and North Carolina.
  18. ^ Attributed to multiple sources:[238][239][240][241][242][243][244][245][246][247][248][needs update]
  19. ^ Per the U.S. Constitution, Amendment Twenty-three, proposed by the U.S. Congress on June 16, 1960, and ratified by the States on March 29, 1961
  20. ^ One for each state, the District of Columbia, and the territories of Puerto Rico, Guam, and the U.S. Virgin Islands
  21. ^ A country's total exports are usually understood to be goods and services. Based on this, the U.S. is the world's second-largest exporter, after China.[349] However, if primary income is included, the U.S. is the world's largest exporter.[350]
  22. ^ This figure, like most official data for the United States as a whole, excludes the five unincorporated territories (Puerto Rico, Guam, the U.S. Virgin Islands, American Samoa, and the Northern Mariana Islands) and minor island possessions.
  23. ^ Inupiaq, Siberian Yupik, Central Alaskan Yup'ik, Alutiiq, Unanga (Aleut), Denaʼina, Deg Xinag, Holikachuk, Koyukon, Upper Kuskokwim, Gwichʼin, Tanana, Upper Tanana, Tanacross, Hän, Ahtna, Eyak, Tlingit, Haida, and Tsimshian
  24. ^ Also known less formally as Obamacare

References

[edit]
  1. ^ 36 U.S.C. § 302
  2. ^ "The Great Seal of the United States" (PDF). U.S. Department of State, Bureau of Public Affairs. 2003. Retrieved February 12, 2020.
  3. ^ An Act To make The Star-Spangled Banner the national anthem of the United States of America (H.R. 14). 71st United States Congress. March 3, 1931.
  4. ^ a b Vivian Ho; Rachel Pannett (March 1, 2025). "A Trump order made English the official language of the U.S. What does that mean?". The Washington Post.
  5. ^ Broadwater, Luke (March 1, 2025). "Trump Signs Order to Designate English as Official Language of the U.S." The New York Times. ISSN 0362-4331. Archived from the original on March 2, 2025. Retrieved March 1, 2025.
  6. ^ "2020 Census Illuminates Racial and Ethnic Composition of the Country". United States Census. Retrieved August 13, 2021.
  7. ^ "Race and Ethnicity in the United States: 2010 Census and 2020 Census". United States Census. Retrieved August 13, 2021.
  8. ^ "A Breakdown of 2020 Census Demographic Data". NPR. August 13, 2021.
  9. ^ a b "In Depth: Topics A to Z (Religion)". Gallup. 2025. Retrieved March 8, 2026.
  10. ^ Compton's Pictured Encyclopedia and Fact-index: Ohio. 1963. p. 336.
  11. ^ "The Water Area of Each State". United States Geological Survey. 2018. Retrieved January 29, 2024.
  12. ^ a b Areas of the 50 states and the District of Columbia but not Puerto Rico nor other island territories per "State Area Measurements and Internal Point Coordinates". Census.gov. August 2010. Retrieved March 31, 2020. reflect base feature updates made in the MAF/TIGER database through August, 2010.
  13. ^ a b c "National Population Totals and Components of Change: April 1, 2020 to July 1, 2025". United States Census Bureau. January 27, 2025. Retrieved January 28, 2025.
  14. ^ "U.S. Census Bureau Today Delivers State Population Totals for Congressional Apportionment". United States Census. Retrieved April 26, 2021. The 2020 census was held on April 1, 2020.
  15. ^ a b c d e f "World Economic Outlook Database, October 2025 Edition. (United States)". www.imf.org. International Monetary Fund. November 13, 2025. Retrieved November 13, 2025.
  16. ^ "Income in the United States: 2024". Census.gov. p. 52. Retrieved November 2, 2025.
  17. ^ "Human Development Report 2025" (PDF). United Nations Development Programme. May 6, 2025. Archived (PDF) from the original on May 6, 2025. Retrieved May 6, 2025.
  18. ^ Evans, Jacob (August 31, 2025). "How sheer luck made this tiny Caribbean island millions from its web address". BBC World Service. Retrieved December 9, 2025.
  19. ^ a b c d e
  20. ^ "Area". The World Factbook. Central Intelligence Agency. Archived from the original on January 31, 2014. Retrieved January 15, 2015.
  21. ^ "United States". Encyclopædia Britannica. Archived from the original on December 19, 2013. Retrieved January 31, 2010.
  22. ^ a b c DeLear, Byron (July 4, 2013). "Who coined 'United States of America'? Mystery might have intriguing answer". The Christian Science Monitor.
  23. ^ Fay, John (July 15, 2016). "The forgotten Irishman who named the 'United States of America'". IrishCentral.
  24. ^ Davis 1996, p. 7.
  25. ^ "Is USA A Noun Or Adjective?". Dictionary.com. March 9, 2017. Archived from the original on September 20, 2020. Retrieved July 3, 2025.
  26. ^ a b U.S. Government Publishing Office Style Manual. January 12, 2017. pp. 222–223. Retrieved September 3, 2020.
  27. ^ ""The States"". Longman dictionary. Retrieved September 27, 2024.
  28. ^ "Stateside". Merriam-Webster. September 27, 2024. Retrieved October 4, 2024.
  29. ^ "Amerigo Vespucci". Encyclopædia Britannica. Archived from the original on July 10, 2012. Retrieved July 7, 2011.
  30. ^ Sider 2007, p. 226.
  31. ^ Szalay, Jessie (September 20, 2017). "Amerigo Vespucci: Facts, Biography & Naming of America". Live Science. Retrieved June 23, 2019.
  32. ^ Allen, Erin (July 4, 2016). "How Did America Get Its Name?". Library of Congress Blog. Retrieved September 3, 2020.
  33. ^ Wilson 1993, pp. 27–28.
  34. ^ "Cliff Palace" at Colorado Encyclopedia. Retrieved January 31, 2024.
  35. ^ Erlandson, Rick & Vellanoweth 2008, p. 19.
  36. ^ Savage 2011, pp. 55–58.
  37. ^ Viegas, Jennifer. "First Americans Endured 20,000-Year Layover". Discovery News. Archived from the original on October 10, 2012. Retrieved November 18, 2009. Archaeological evidence, in fact, recognizes that people started to leave Beringia for the New World around 40,000 years ago, but rapid expansion into North America didn't occur until about 15,000 years ago, when the ice had literally broken
  38. ^ Waters & Stafford 2007, pp. 1122–1126.
  39. ^ Flannery 2015, pp. 173–185.
  40. ^ Lockard 2010, p. 315.
  41. ^ Johansen 2006, p. 51.
  42. ^ Thornton 1998, p. 34.
  43. ^ a b Perdue & Green 2005, p. 40.
  44. ^ Haines, Haines & Steckel 2000, p. 12.
  45. ^ Vigil 2006, p. 329.
  46. ^ Hudson 2018, p. 130.
  47. ^ Davis 1932, pp. 5–6.
  48. ^ Florida Center for Instructional Technology (2002). "Pedro Menendez de Aviles Claims Florida for Spain". A Short History of Florida. University of South Florida.
  49. ^ "Not So Fast, Jamestown: St. Augustine Was Here First". NPR. February 28, 2015. Retrieved March 5, 2021.
  50. ^ Petto 2007, p. 125.
  51. ^ Seelye & Selby 2018, p. 344.
  52. ^ Bellah et al. 1985, p. 220
  53. ^ Remini 2007, pp. 2–3.
  54. ^ Johnson 1997, pp. 26–30.
  55. ^ Ripper 2008, p. 6.
  56. ^ Ehrenpreis & Ehrenpreis 2022, pp. 288–294
  57. ^ Joseph 2016, p. 590
  58. ^ Stannard 1993, p. xii
  59. ^ Ripper 2008, p. 5.
  60. ^ Calloway, 1998, p. 55
  61. ^ Thomas 1997, p. 516.
  62. ^ Bilhartz & Elliott 2007.
  63. ^ Wood 1998, p. 263.
  64. ^ Ratcliffe 2013, p. 220.
  65. ^ Walton & Rockoff 2009, pp. 38–39.
  66. ^ Walton & Rockoff 2009, p. 35.
  67. ^ Otis 1764.
  68. ^ Foner 1998, pp. 4–5.
  69. ^ a b Young, Nash & Raphael 2011, pp. 4–7.
  70. ^ Yick Wo vs. Hopkins, 118 U.S. 356, 370
  71. ^ Buel 1972.
  72. ^ Becker et al (2002), ch 1
  73. ^ "Republicanism". Stanford Encyclopedia of Philosophy. June 19, 2006. Retrieved September 20, 2022.
  74. ^ Miller, Hunter (ed.). "British-American Diplomacy: The Paris Peace Treaty of September 30, 1783". The Avalon Project at Yale Law School.
  75. ^ Satō 1886, p. 352.
  76. ^ Foner 2020, p. 524.
  77. ^ Foner 2020, pp. 538–540.
  78. ^ Boyer, 2007, pp. 192–193
  79. ^ a b Carlisle & Golson 2007, p. 238.
  80. ^ McPherson 1988, pp. 41–46.
  81. ^ "Louisiana Purchase" (PDF). National Park Service. Archived from the original (PDF) on March 29, 2015. Retrieved March 1, 2011.
  82. ^ Harriss, Joseph A. "How the Louisiana Purchase Changed the World". Smithsonian Magazine. Retrieved June 25, 2024.
  83. ^ Wait, Eugene M. (1999). America and the War of 1812. Nova Publishers. p. 78. ISBN 978-1-56072-644-9.
  84. ^ Klose, Nelson; Jones, Robert F. (1994). United States History to 1877. Barron's Educational Series. p. 150. ISBN 978-0-8120-1834-9.
  85. ^ Hammond, John Craig (March 2019). "President, Planter, Politician: James Monroe, the Missouri Crisis, and the Politics of Slavery". Journal of American History. 105 (4): 843–867. doi:10.1093/jahist/jaz002.
  86. ^ Frymer, Paul (2017). Building an American empire: the era of territorial and political expansion. Princeton, New Jersey: Princeton University Press. ISBN 978-1-4008-8535-0. OCLC 981954623.
  87. ^ Calloway, Colin G. (2019). First peoples: a documentary survey of American Indian history (6th ed.). Boston: Bedford/St. Martin's, Macmillan Learning. ISBN 978-1-319-10491-7. OCLC 1035393060.
  88. ^ McPherson 1988, p. 45.
  89. ^ Michno, Gregory (2003). Encyclopedia of Indian Wars: Western Battles and Skirmishes, 1850–1890. Mountain Press Publishing. ISBN 978-0-87842-468-9.
  90. ^ Billington, Ray Allen; Ridge, Martin (2001). Westward Expansion: A History of the American Frontier. UNM Press. p. 22. ISBN 978-0-8263-1981-4.
  91. ^ Walker Howe 2007, p. 52–54; Wright 2022.
  92. ^ Walker Howe 2007, p. 52–54; Rodriguez 2015, p. XXXIV; Wright 2022.
  93. ^ Walton & Rockoff 2009, p. 43.
  94. ^ Gordon, 2004, pp. 27, 29
  95. ^ Walker Howe 2007, pp. 478, 481–482, 587–588.
  96. ^ Morrison, Michael A. (April 28, 1997). Slavery and the American West: The Eclipse of Manifest Destiny and the Coming of the Civil War. University of North Carolina Press. pp. 13–21. ISBN 978-0-8078-4796-1.
  97. ^ Kemp, Roger L. (2010). Documents of American Democracy: A Collection of Essential Works. McFarland. p. 180. ISBN 978-0-7864-4210-2. Retrieved October 25, 2015.
  98. ^ McIlwraith, Thomas F.; Muller, Edward K. (2001). North America: The Historical Geography of a Changing Continent. Rowman & Littlefield. p. 61. ISBN 978-0-7425-0019-8. Retrieved October 25, 2015.
  99. ^
    • Meyer et al. 2001, From 1800 to 1900: "The discovery of gold in California in 1848 proved a momentous watershed for native people in the West. Hordes of single men stampeded to find fortune. Unrestrained by family, community, or church, they decimated the native population near the goldfields. California natives suffered the most complete genocide in U.S. history."
    • Wolf, Jessica. "Revealing the history of genocide against California's Native Americans". UCLA Newsroom. Retrieved July 8, 2018.
    • Madley, Benjamin (2016). An American Genocide: The United States and the California Indian Catastrophe, 1846-1873. Yale University Press. ISBN 978-0-300-23069-7.
    • Smithers 2012, p. 339: "The genocidal intent of California settlers and government officials was acted out in numerous battles and massacres (and aided by technological advances in weaponry, especially after the Civil War), in the abduction and sexual abuse of Indian women, and in the economic exploitation of Indian child labourers"
    • Blackhawk 2023, p. 38: "With these works, a near consensus emerged. By most scholarly definitions and consistent with the UN Convention, these scholars all asserted that genocide against at least some Indigenous peoples had occurred in North America following colonisation, perpetuated first by colonial empires and then by independent nation-states"
  100. ^ Rawls, James J. (1999). A Golden State: Mining and Economic Development in Gold Rush California. University of California Press. p. 20. ISBN 978-0-520-21771-3.
  101. ^ "Milestone documents: Kansas–Missouri Act (1854)". National Archives (Washington, D.C.). July 12, 2021. Retrieved January 5, 2025.
  102. ^ Murray, Stuart (2004). Atlas of American Military History. Infobase Publishing. p. 76. ISBN 978-1-4381-3025-5. Retrieved October 25, 2015. Lewis, Harold T. (2001). Christian Social Witness. Rowman & Littlefield. p. 53. ISBN 978-1-56101-188-9.
  103. ^ Woods, Michael E. (2012). "What Twenty-First-Century Historians Have Said about the Causes of Disunion: A Civil War Sesquicentennial Review of the Recent Literature". The Journal of American History. 99 (2): 415–439. doi:10.1093/jahist/jas272. ISSN 0021-8723. JSTOR 44306803.
  104. ^ Silkenat, D. (2019). Raising the White Flag: How Surrender Defined the American Civil War. Civil War America. University of North Carolina Press. p. 25. ISBN 978-1-4696-4973-3. Retrieved April 29, 2023.
  105. ^ McPherson 1988, p. 236.
  106. ^ Vinovskis, Maris (1990). Toward A Social History of the American Civil War: Exploratory Essays. Cambridge; New York: Cambridge University Press. p. 4. ISBN 978-0-521-39559-5.
  107. ^ McPherson 1988, pp. 273–274.
  108. ^ "The Fight for Equal Rights: Black Soldiers in the Civil War". U.S. National Archives and Records Administration. August 15, 2016. By the end of the Civil War, roughly 179,000 black men (10% of the Union army) served as soldiers in the U.S. Army and another 19,000 served in the Navy.
  109. ^ Davis, Jefferson. A Short History of the Confederate States of America, 1890, 2010. ISBN 978-1-175-82358-8. Available free online as an ebook. Chapter LXXXVIII, "Re-establishment of the Union by force", p. 503. Retrieved March 14, 2012.
  110. ^ Price, Marie; Benton-Short, Lisa (2008). Migrants to the Metropolis: The Rise of Immigrant Gateway Cities. Syracuse University Press. p. 51. ISBN 978-0-8156-3186-6.
  111. ^ "Overview + History | Ellis Island". Statue of Liberty & Ellis Island. March 4, 2020. Retrieved September 10, 2021.
  112. ^ Dubois 1935, p. 163.
  113. ^ "U.S. Senate: Landmark Legislation: Thirteenth, Fourteenth, & Fifteenth Amendments". www.senate.gov. Archived from the original on December 30, 2020. Retrieved January 3, 2021.
  114. ^ Foner 1988, pp. 66–7, 251–261, 446–449.
  115. ^ "The 15th Amendment of the U.S. Constitution". National Constitution Center – The 15th Amendment of the U.S. Constitution. Archived from the original on December 30, 2020. Retrieved January 3, 2020.
  116. ^ Foner 1988, p. xxv.
  117. ^ Dubois 1935, pp. 381–727.
  118. ^ Glass, Andrew (July 24, 2008). "Tenn. is readmitted to the Union July 24, 1866". Politico. Retrieved May 11, 2021.
  119. ^ Glass, Andrew (July 15, 2014). "Georgia is readmitted to Union July 15, 1870". Politico. Retrieved April 12, 2025.
  120. ^ Black, Jeremy (2011). Fighting for America: The Struggle for Mastery in North America, 1519–1871. Indiana University Press. p. 275. ISBN 978-0-253-35660-4.
  121. ^ The Homestead Act of 1862; Archives.gov
  122. ^ U.S. Bureau of the Census, Historical Statistics of the United States (1976) series C89–C119, pp. 105–109
  123. ^ Stephan Thernstrom, ed., Harvard Encyclopedia of American Ethnic Groups (1980) covers the history of all the main groups
  124. ^ "The Great Migration (1910–1970)". National Archives. May 20, 2021.
  125. ^ "Purchase of Alaska, 1867". Office of the Historian. U.S. Department of State. Retrieved December 23, 2014.
  126. ^ Foner 1988, pp. xxvii, 575–587.
  127. ^ Woodward, C. Vann (1991). Reunion and Reaction: The Compromise of 1877 and the End of Reconstruction. United Kingdom: Oxford University Press. pp. 237–246.
  128. ^ Drew Gilpin Faust; Eric Foner; Clarence E. Walker. "White Southern Responses to Black Emancipation". American Experience.
  129. ^ Trelease, Allen W. (1979). White Terror: The Ku Klux Klan Conspiracy and Southern Reconstruction. New York: Harper & Row. ISBN 978-0-313-21168-3.
  130. ^ Shearer Davis Bowman (1993). Masters and Lords: Mid-19th-Century U.S. Planters and Prussian Junkers. Oxford UP. p. 221. ISBN 978-0-19-536394-4.
  131. ^ Ware, Leland (February 2021). "Plessy's Legacy: The Government's Role in the Development and Perpetuation of Segregated Neighborhoods". RSF: The Russell Sage Foundation Journal of the Social Sciences. 7 (1): 92–109. doi:10.7758/rsf.2021.7.1.06. S2CID 231929202.
  132. ^ Hirschman, Charles; Mogford, Elizabeth (December 1, 2009). "Immigration and the American Industrial Revolution From 1880 to 1920". Social Science Research. 38 (4): 897–920. doi:10.1016/j.ssresearch.2009.04.001. ISSN 0049-089X. PMC 2760060. PMID 20160966.
  133. ^ The Pit Boss (February 26, 2021). "The Pit Stop: The American Automotive Industry Is Packed With History". Rumble On. Archived from the original on April 25, 2021. Retrieved December 5, 2021.
  134. ^ Carson, Thomas; Bonk, Mary (1999). "Industrial Revolution". Gale Encyclopedia of U.S. Economic History. Gale.
  135. ^ Riggs, Thomas (2015). Gale Encyclopedia of U.S. Economic History Vol. 3 (2 ed.). Gale. p. 1179.
  136. ^ Maddison, Angus. "The World Economy: Historical Statistics" (PDF). OECD. Retrieved February 16, 2026.
  137. ^ Dole, Charles F. (1907). "The Ethics of Speculation". The Atlantic Monthly. Vol. C, no. December 1907. pp. 812–818.
  138. ^ Tindall, George Brown and Shi, David E. (2012). America: A Narrative History (Brief Ninth Edition) (Vol. 2). W. W. Norton & Company. ISBN 978-0-393-91267-8, p. 589.
  139. ^ Zinn, 2005, pp. 321–357
  140. ^ Fraser, Steve (2015). The Age of Acquiescence: The Life and Death of American Resistance to Organized Wealth and Power. Little, Brown and Company. p. 66. ISBN 978-0-316-18543-1.
  141. ^ Aldrich, Mark. Safety First: Technology, Labor and Business in the Building of Work Safety, 1870-1939. Baltimore: Johns Hopkins University Press, 1997. ISBN 978-0-8018-5405-7.
  142. ^ "Progressive Era to New Era, 1900-1929 | U.S. History Primary Source Timeline | Classroom Materials at the Library of Congress | Library of Congress". Library of Congress, Washington, D.C. 20540 USA. Retrieved November 11, 2023.
  143. ^ "The Spanish–American War, 1898". Office of the Historian. U.S. Department of State. Retrieved December 24, 2014.
  144. ^ Ryden, George Herbert. The Foreign Policy of the United States in Relation to Samoa. New York: Octagon Books, 1975.
  145. ^ "Virgin Islands History". Vinow.com. Retrieved January 5, 2018.
  146. ^ McDuffie, Jerome; Piggrem, Gary Wayne; Woodworth, Steven E. (2005). U.S. History Super Review. Piscataway, NJ: Research & Education Association. p. 418. ISBN 978-0-7386-0070-3.
  147. ^ Larson, Elizabeth C.; Meltvedt, Kristi R. (2021). "Women's suffrage: fact sheet". CRS Reports (Library of Congress. Congressional Research Service). Report / Congressional Research Service. Retrieved August 9, 2023.
  148. ^ Winchester 2013, pp. 410–411.
  149. ^ Axinn, June; Stern, Mark J. (2007). Social Welfare: A History of the American Response to Need (7th ed.). Boston: Allyn & Bacon. ISBN 978-0-205-52215-6.
  150. ^ James Noble Gregory (1991). American Exodus: The Dust Bowl Migration and Okie Culture in California. Oxford University Press. ISBN 978-0-19-507136-8. Retrieved October 25, 2015. "Mass Exodus From the Plains". American Experience. WGBH Educational Foundation. 2013. Retrieved October 5, 2014. Fanslow, Robin A. (April 6, 1997). "The Migrant Experience". American Folklore Center. Library of Congress. Retrieved October 5, 2014. Stein, Walter J. (1973). California and the Dust Bowl Migration. Greenwood Press. ISBN 978-0-8371-6267-6. Retrieved October 25, 2015.
  151. ^ Yamasaki, Mitch. "Pearl Harbor and America's Entry into World War II: A Documentary History" (PDF). World War II Internment in Hawaii. Archived from the original (PDF) on December 13, 2014. Retrieved January 14, 2015.
  152. ^ "Why did Japan surrender in World War II?". The Japan Times. Retrieved February 8, 2017.
  153. ^ Pacific War Research Society (2006). Japan's Longest Day. New York: Oxford University Press. ISBN 978-4-7700-2887-7.
  154. ^ Hoopes & Brinkley 1997, p. 100.
  155. ^ Gaddis 1972, p. 25.
  156. ^ Kennedy, Paul (1989). The Rise and Fall of the Great Powers. New York: Vintage. p. 358. ISBN 978-0-679-72019-5.
  157. ^ Blakemore, Erin (March 22, 2019). "What was the Cold War?". National Geographic. Archived from the original on April 1, 2019. Retrieved August 28, 2020.
  158. ^ Mark Kramer, "The Soviet Bloc and the Cold War in Europe," in Larresm, Klaus, ed. (2014). A Companion to Europe Since 1945. Wiley. p. 79. ISBN 978-1-118-89024-0.
  159. ^ Sempa, Francis (July 12, 2017). Geopolitics: From the Cold War to the 21st Century. Routledge. ISBN 978-1-351-51768-3.
  160. ^ Blakeley, 2009, pp. 85-96
  161. ^ Collins, Michael (1988). Liftoff: The Story of America's Adventure in Space. New York: Grove Press. ISBN 978-0-8021-1011-4.
  162. ^ Winchester 2013, pp. 305–308.
  163. ^ "The Civil Rights Movement". PBS. Retrieved January 5, 2019.
  164. ^ Brinkley, Alan (January 24, 1991). "Great Society". In Eric Foner; John Arthur Garraty (eds.). The Reader's Companion to American History. Houghton Mifflin Books. p. 472. ISBN 978-0-395-51372-9.
  165. ^ "Playboy: American Magazine". Encyclopædia Britannica. August 25, 2022. Retrieved February 2, 2023. ...the so-called sexual revolution in the United States in the 1960s, marked by greatly more permissive attitudes toward sexual interest and activity than had been prevalent in earlier generations.
  166. ^ Svetlana Ter-Grigoryan (February 12, 2022). "The Sexual Revolution Origins and Impact". study.com. Retrieved April 27, 2023.
  167. ^ "Selective Service Records". National Archives. August 15, 2016. Retrieved June 15, 2025.
  168. ^ Levy, Daniel (January 19, 2018). "Behind the Protests Against the Vietnam War in 1968". Time. Archived from the original on October 14, 2021. Retrieved May 5, 2021.
  169. ^ "Women in the Labor Force: A Databook" (PDF). U.S. Bureau of Labor Statistics. 2013. p. 11. Retrieved March 21, 2014.
  170. ^ Gaĭdar, E.T. (2007). Collapse of an Empire: Lessons for Modern Russia. Washington, D.C.: Brookings Institution Press. pp. 190–205. ISBN 978-0-8157-3114-6.
  171. ^ Howell, Buddy Wayne (2006). The Rhetoric of Presidential Summit Diplomacy: Ronald Reagan and the U.S.-Soviet Summits, 1985–1988. Texas A&M University. p. 352. ISBN 978-0-549-41658-6.
  172. ^ Kissinger, Henry (2011). Diplomacy. Simon & Schuster. pp. 781–784. ISBN 978-1-4391-2631-8. Retrieved October 25, 2015.
  173. ^ Mann, James (2009). The Rebellion of Ronald Reagan: A History of the End of the Cold War. Penguin Books. p. 432. ISBN 978-1-4406-8639-9.
  174. ^ Hayes, 2009
  175. ^ Frum, David (December 24, 2014). "The Real Story of How America Became an Economic Superpower". The Atlantic. Retrieved December 10, 2024.
  176. ^ "U.S. army was smaller than the army for Portugal before World War II". Politifact. Retrieved January 23, 2018.
  177. ^ CFI Team. "NASDAQ". Corporate Finance Institute. Archived from the original on December 11, 2023. Retrieved December 11, 2023.
  178. ^ Holsti, Ole R. (November 7, 2011). "The United States and Iraq before the Iraq War". American Public Opinion on the Iraq War. University of Michigan Press. p. 20. ISBN 978-0-472-03480-2.
  179. ^ Walsh, Kenneth T. (December 9, 2008). "The 'War on Terror' Is Critical to President George W. Bush's Legacy". U.S. News & World Report. Retrieved March 6, 2013. Atkins, Stephen E. (2011). The 9/11 Encyclopedia: Second Edition. ABC-CLIO. p. 872. ISBN 978-1-59884-921-9. Retrieved October 25, 2015.
  180. ^ Wong, Edward (February 15, 2008). "Overview: The Iraq War". The New York Times. Retrieved March 7, 2013.
  181. ^ Johnson, James Turner (2005). The War to Oust Saddam Hussein: Just War and the New Face of Conflict. Rowman & Littlefield. p. 159. ISBN 978-0-7425-4956-2. Retrieved October 25, 2015. Durando, Jessica; Green, Shannon Rae (December 21, 2011). "Timeline: Key moments in the Iraq War". USA Today. Associated Press. Archived from the original on September 4, 2020. Retrieved March 7, 2013.
  182. ^ Hilsenrath, Jon; Ng, Serena; Paletta, Damian (September 18, 2008). "Worst Crisis Since '30s, With No End Yet in Sight". The Wall Street Journal. ISSN 1042-9840. OCLC 781541372. Archived from the original on December 25, 2014. Retrieved July 28, 2023.
  183. ^ Geiger, Abigail (June 12, 2014). "Political Polarization in the American Public". Pew Research Center. Retrieved June 30, 2024.
  184. ^ Murray, Mark; Marquez, Alexandra (June 15, 2023). "Here's what's driving America's increasing political polarization". NBC News. Retrieved June 30, 2024.
  185. ^ Lührmann, Anna; Lindberg, Staffan I. (2019). "A third wave of autocratization is here: what is new about it?". Democratization. 26 (7): 1097. doi:10.1080/13510347.2019.1582029. S2CID 150992660. Now evidence is mounting that a global reversal is challenging a series of established democracies, including the United States who were downgraded by both Freedom House and V-Dem in 2018.
  186. ^ Grumbach, Jacob M. (December 1, 2021). "Laboratories of Democratic Backsliding". American Political Science Review. 117 (3). Published by Cambridge University Press on behalf of the American Political Science Association: 967–984. doi:10.1017/S0003055422000934. ISSN 0003-0554. Prominent cross-national measures of democracy from the Varieties of Democracy Project (V-Dem), Bright Line Watch, and Freedom House, which had once ranked the country as a global leader, show a U.S. democracy slipping toward "mixed regime" or "illiberal democracy" status.
  187. ^ Kleinfeld, Rachel (September 5, 2023). "Polarization, Democracy, and Political Violence in the United States: What the Research Says". Carnegie Endowment for International Peace. Retrieved September 13, 2024.
  188. ^ Pape, Robert (January 5, 2022). "American Face of Insurrection: Analysis of Individuals Charged for Storming the US Capitol on January 6, 2021". cpost.uchicago.edu. University of Chicago, Chicago Project on Security and Threats. Retrieved September 13, 2024.
  189. ^ Rutenberg, Jim; Becker, Jo; Lipton, Eric; Haberman, Maggie; Martin, Jonathan; Rosenberg, Matthew; Schmidt, Michael S. (January 31, 2021). "77 Days: Trump's Campaign to Subvert the Election". The New York Times. Archived from the original on June 18, 2022.
  190. ^
    • Harvey, Michael (2022). "Introduction: History's Rhymes". In Harvey, Michael (ed.). Donald Trump in Historical Perspective. Routledge. doi:10.4324/9781003110361-1. ISBN 978-1-003-11036-1. As with the Beer Hall Putsch, a would-be leader tried to take advantage of an already scheduled event (in Hitler's case, Kahr's speech; in Trump's, Congress's tallying of the electoral votes) to create a dramatic moment with himself at the center of attention, calling for bold action to upend the political order. Unlike Hitler's coup attempt, Trump already held top of office, so he was attempting to hold onto power, not seize it (the precise term for Trump's intended action is a 'self-coup' or 'autogolpe'). Thus, Trump was able to plan for the event well in advance, and with much greater control, including developing the legal arguments that could be used to justify rejecting the election's results. (p. 3)
    • Pion-Berlin, David; Bruneau, Thomas; Goetze, Richard B. Jr. (April 7, 2022). "The Trump self-coup attempt: comparisons and civil–military relations". Government and Opposition. 58 (4): 789–806. doi:10.1017/gov.2022.13. S2CID 248033246.
    • Castañeda, Ernesto; Jenks, Daniel (April 17, 2023). Costa, Bruno Ferreira; Parton, Nigel (eds.). "January 6th and De-Democratization in the United States". Social Sciences. 12 (4). MDPI: 238. doi:10.3390/socsci12040238. ISSN 2076-0760. What the United States went through on January 6th was an attempt at a self-coup, where Trump would use force to stay as head of state even if abandoning democratic practices in the U.S. Some advised Trump to declare martial law to create a state of emergency and use that as an excuse to stay in power.
    • Eisen, Norman; Ayer, Donald; Perry, Joshua; Bookbinder, Noah; Perry, E. Danya (June 6, 2022). Trump on Trial: A Guide to the January 6 Hearings and the Question of Criminality (Report). Brookings Institution. Retrieved December 16, 2023. [Trump] tried to delegitimize the election results by disseminating a series of far fetched and evidence-free claims of fraud. Meanwhile, with a ring of close confidants, Trump conceived and implemented unprecedented schemes to – in his own words – "overturn" the election outcome. Among the results of this "Big Lie" campaign were the terrible events of January 6, 2021 – an inflection point in what we now understand was nothing less than an attempted coup.
    • Eastman v Thompson, et al., 8:22-cv-00099-DOC-DFM Document 260, 44 (S.D. Cal. May 28, 2022) ("Dr. Eastman and President Trump launched a campaign to overturn a democratic election, an action unprecedented in American history. Their campaign was not confined to the ivory tower – it was a coup in search of a legal theory. The plan spurred violent attacks on the seat of our nation's government, led to the deaths of several law enforcement officers, and deepened public distrust in our political process... If Dr. Eastman and President Trump's plan had worked, it would have permanently ended the peaceful transition of power, undermining American democracy and the Constitution. If the country does not commit to investigating and pursuing accountability for those responsible, the Court fears January 6 will repeat itself.").
    • Graham, David A. (January 6, 2021). "This Is a Coup". The Atlantic. Archived from the original on January 6, 2021. Retrieved December 16, 2023.
    • Musgrave, Paul (January 6, 2021). "This Is a Coup. Why Were Experts So Reluctant to See It Coming?". Foreign Policy. Archived from the original on January 6, 2021. Retrieved December 16, 2023.
    • Solnit, Rebecca (January 6, 2021). "Call it what it was: a coup attempt". The Guardian. Archived from the original on January 7, 2021. Retrieved December 16, 2023.
    • Coleman, Justine (January 6, 2021). "GOP lawmaker on violence at Capitol: 'This is a coup attempt'". The Hill. Archived from the original on January 6, 2021. Retrieved December 16, 2023.
    • Jacobson, Louis (January 6, 2021). "Is this a coup? Here's some history and context to help you decide". PolitiFact. Retrieved January 7, 2021. A good case can be made that the storming of the Capitol qualifies as a coup. It's especially so because the rioters entered at precisely the moment when the incumbent's loss was to be formally sealed, and they succeeded in stopping the count.
    • Barry, Dan; Frenkel, Sheera (January 7, 2021). "'Be There. Will Be Wild!': Trump All but Circled the Date". The New York Times. Archived from the original on December 28, 2021. Retrieved December 16, 2023.
    • Duignan, Brian (August 4, 2021). "January 6 U.S. Capitol attack". Encyclopædia Britannica. Archived from the original on January 17, 2023. Retrieved September 22, 2021. Because its object was to prevent a legitimate president-elect from assuming office, the attack was widely regarded as an insurrection or attempted coup d'état.
  191. ^ "Field Listing: Area". The World Factbook. cia.gov. Archived from the original on July 7, 2020. Retrieved April 21, 2020.
  192. ^ World Food and Agriculture – Statistical Yearbook 2023. Food and Agriculture Organization of the United Nations. 2023. doi:10.4060/cc8166en. ISBN 978-92-5-138262-2. Retrieved December 13, 2023.
  193. ^ "Geographic Regions of Georgia". Georgia Info. Digital Library of Georgia. Retrieved December 24, 2014.
  194. ^ a b Lew, Alan. "PHYSICAL GEOGRAPHY OF THE US". GSP 220—Geography of the United States. North Arizona University. Archived from the original on April 9, 2016. Retrieved December 24, 2014.
  195. ^ Harms, Nicole. "Facts About the Rocky Mountain Range". USA Today. Archived from the original on February 12, 2022. Retrieved December 24, 2014.
  196. ^ O'Hanlon, Larry (March 14, 2005). "America's Explosive Park". Discovery Channel. Archived from the original on March 14, 2005. Retrieved April 5, 2016.
  197. ^ Tinkham, Ernest R. (March 1944). "Biological, Taxonomic and Faunistic Studies on the Shield-Back Katydids of the North American Deserts". The American Midland Naturalist. 31 (2). The University of Notre Dame: 257–328. doi:10.2307/2421073. JSTOR 2421073.
  198. ^ "Executive Summary of Grand Canyon Tourism" (PDF). Northern Arizona University. Archived from the original (PDF) on September 28, 2010. Retrieved January 4, 2007.
  199. ^ "Mount Whitney, California". Peakbagger. Retrieved December 24, 2014.
  200. ^ "Find Distance and Azimuths Between 2 Sets of Coordinates (Badwater 36-15-01-N, 116-49-33-W and Mount Whitney 36-34-43-N, 118-17-31-W)". Federal Communications Commission. Retrieved December 24, 2014.
  201. ^ Poppick, Laura (August 28, 2013). "US Tallest Mountain's Surprising Location Explained". LiveScience. Retrieved May 2, 2015.
  202. ^ "Is Hawaii a Part of Oceania or North America?". WorldAtlas. January 12, 2018. Archived from the original on July 11, 2019. Retrieved June 24, 2019.
  203. ^ "The United States is an Ocean Nation" (PDF). NOAA. Retrieved September 14, 2025.
  204. ^ "Marine Regions · United States Exclusive Economic Zone (EEZ)". www.marineregions.org. Retrieved September 15, 2025.
  205. ^ Boyden, Jennifer. "Climate Regions of the United States". USA Today. Archived from the original on February 12, 2022. Retrieved December 24, 2014.
  206. ^ McGranahan, Devan Allen; Wonkka, Carissa L. (2024). "Pyrogeography of the Western Great Plains: A 40-Year History of Fire in Semi-Arid Rangelands". Fire. 7 (1): 32. Bibcode:2024Fire....7...32M. doi:10.3390/fire7010032.
  207. ^ "World Map of Köppen–Geiger Climate Classification" (PDF). Archived from the original (PDF) on January 26, 2022. Retrieved August 19, 2015.
  208. ^ Rice, Doyle. "USA has the world's most extreme weather". USA Today. Retrieved May 17, 2020.
  209. ^ Borenstein, Seth (April 2, 2023). "Why the U.S. is leading the world in extreme weather catastrophes". PBS News. Retrieved June 25, 2024.
  210. ^ Perkins, Sid (May 11, 2002). "Tornado Alley, USA". Science News. Archived from the original on July 1, 2007. Retrieved September 20, 2006.
  211. ^ US Environmental Protection Agency (March 26, 2025). "Climate Change Indicators: Weather and Climate". www.epa.gov. Archived from the original on May 30, 2025. Retrieved June 9, 2025.
  212. ^ US Environmental Protection Agency (April 18, 2025). "Climate Change Indicators: Heat Waves". www.epa.gov. Retrieved June 9, 2025.
  213. ^ US Global Change Research Program. "Heat Waves". www.globalchange.gov. Archived from the original on June 30, 2025. Retrieved June 9, 2025.cite web: CS1 maint: bot: original URL status unknown (link)
  214. ^ US EPA, OAR (December 2024). "A Closer Look: Temperature and Drought in the Southwest". www.epa.gov. Retrieved June 19, 2025.
  215. ^ Waldron, Lucas; Lustgarten, Abrahm (November 10, 2020). "Climate Change Will Make Parts of the U.S. Uninhabitable. Americans Are Still Moving There". Propublica. Rhodium Group. Retrieved November 25, 2024.
  216. ^ Koch, Alexandra (December 25, 2024). "It's official: Biden signs new law, designates bald eagle as 'national bird'". FOX 13 Seattle. Retrieved December 25, 2024.
  217. ^ Morin, Nancy. "Vascular Plants of the United States" (PDF). Plants. National Biological Service. Archived from the original (PDF) on July 24, 2013. Retrieved October 27, 2008.
  218. ^ Osborn, Liz. "Number of Native Species in United States". Current Results Nexus. Retrieved January 15, 2015.
  219. ^ "Numbers of Insects (Species and Individuals)". Smithsonian Institution. Retrieved January 20, 2009.
  220. ^ "National Park FAQ". nps. National Park Service. Retrieved May 8, 2015.
  221. ^ Lipton, Eric; Krauss, Clifford (August 23, 2012). "Giving Reins to the States Over Drilling". The New York Times. Retrieved January 18, 2015.
  222. ^ Vincent, Carol H.; Hanson, Laura A.; Argueta, Carla N. (March 3, 2017). Federal Land Ownership: Overview and Data (Report). Congressional Research Service. p. 2. Retrieved June 18, 2020.
  223. ^ Gorte, Ross W.; Vincent, Carol Hardy.; Hanson, Laura A.; Marc R., Rosenblum. "Federal Land Ownership: Overview and Data" (PDF). fas.org. Congressional Research Service. Archived from the original (PDF) on January 24, 2015. Retrieved January 18, 2015.
  224. ^ "Chapter 6: Federal Programs to Promote Resource Use, Extraction, and Development". doi.gov. U.S. Department of the Interior. Archived from the original on March 18, 2015. Retrieved January 19, 2015.
  225. ^ The National Atlas of the United States of America (January 14, 2013). "Forest Resources of the United States". Nationalatlas.gov. Archived from the original on May 7, 2009. Retrieved January 13, 2014.
  226. ^ "Land Use Changes Involving Forestry in the United States: 1952 to 1997, With Projections to 2050" (PDF). 2003. Retrieved January 13, 2014.
  227. ^ Daynes & Sussman, 2010, pp. 3, 72, 74–76, 78
  228. ^ Hays, Samuel P. (2000). A History of Environmental Politics since 1945.
  229. ^ Collin, Robert W. (2006). The Environmental Protection Agency: Cleaning Up America's Act. Greenwood Publishing Group. p. 1. ISBN 978-0-313-33341-5. Retrieved October 25, 2015.
  230. ^ Turner, James Morton (2012). The Promise of Wilderness, pp. 29–32
  231. ^ Endangered species Fish and Wildlife Service. General Accounting Office, Diane Publishing. 2003. pp. 1–3, 42. ISBN 978-1-4289-3997-4. Retrieved October 25, 2015.
  232. ^ "Environmental Performance Index". epi.yale.edu. July 10, 2024. Retrieved July 10, 2024.
  233. ^ Onuf 2010, p. xvii.
  234. ^ Desjardins, Jeff (August 8, 2019). "Mapped: The world's oldest democracies". World Economic Forum. Retrieved June 25, 2024.
  235. ^ Ryan, David (2000). Ryan, David; Pungong, Victor (eds.). The United States and Decolonization. Springer. doi:10.1057/9780333977958. hdl:1887/72726. ISBN 978-1-349-40644-9.
  236. ^ Burnham, William (2006). Introduction to the Law and Legal System of the United States (4th ed.). St. Paul, Minnesota: Thomson West. p. 41. ISBN 978-0-314-06661-9.
  237. ^ Scheb, John M.; Scheb, John M. II (2002). An Introduction to the American Legal System. Florence, Kentucky: Delmar, p. 6. ISBN 978-0-7668-2759-2[needs update]
  238. ^ Transcript. Bill Moyers Interviews Kevin Phillips. NOW with Bill Moyers 4.09.04 | PBS
  239. ^ Viereck, Peter (2006). Conservative thinkers: from John Adams to Winston Churchill. New Brunswick, New Jersey: Transaction Publishers. pp. 103. ISBN 978-1-4128-0526-1.
  240. ^ Kroll, Andy (December 2, 2010). "The New American Oligarchy". TomDispatch. Truthout. Archived from the original on January 22, 2012. Retrieved August 17, 2012.
  241. ^ Starr, Paul (August 24, 2012). "America on the Brink of Oligarchy". The New Republic.
  242. ^ Winters, Jeffrey A. (November–December 2011) [September 28, 2011]. "Oligarchy and Democracy". The American Interest. 7 (2). Retrieved August 17, 2012.
  243. ^ Herbert, Bob (July 19, 1998). "The Donor Class". The New York Times. Retrieved March 10, 2016.
  244. ^ Confessore, Nicholas; Cohen, Sarah; Yourish, Karen (October 10, 2015). "The Families Funding the 2016 Presidential Election". The New York Times. Retrieved March 10, 2016.
  245. ^ Lichtblau, Eric; Confessore, Nicholas (October 10, 2015). "From Fracking to Finance, a Torrent of Campaign Cash – Top Donors List". The New York Times. Retrieved March 11, 2016.
  246. ^ McCutcheon, Chuck (December 26, 2014). "Why the 'donor class' matters, especially in the GOP presidential scrum". "The Christian Science Monitor. Retrieved March 10, 2016.
  247. ^ Piketty, Thomas (2014). Capital in the Twenty-First Century. Belknap Press. ISBN 978-0-674-43000-6 p. 514 "The risk of a drift towards oligarchy is real and gives little reason for optimism about where the United States is headed."
  248. ^ "Is the U.S. witnessing the rise of oligarchy?". Oxfam. January 17, 2025. Retrieved July 22, 2025.
  249. ^ Killian, Johnny H. Ed. "Constitution of the United States". The Office of the Secretary of the Senate. Retrieved February 11, 2012.
  250. ^ "The Senate and the House of Representatives: lesson overview (article)". Khan Academy.
  251. ^ "US midterm election: What you need to know – DW – 11/07/2022". Deutsche Welle. Archived from the original on February 16, 2024. Retrieved February 16, 2024.
  252. ^ "The Legislative Branch". United States Diplomatic Mission to Germany. Archived from the original on November 15, 2021. Retrieved August 20, 2012.
  253. ^ "The Process for impeachment". ThinkQuest. Archived from the original on April 8, 2013. Retrieved August 20, 2012.
  254. ^ Broder, David S. (March 18, 2007). "Congress's Oversight Offensive". The Washington Post. Archived from the original on May 1, 2011. Retrieved September 11, 2010.
  255. ^ Ferraro, Thomas (April 25, 2007). "House committee subpoenas Rice on Iraq". Reuters. Archived from the original on January 14, 2021. Retrieved September 11, 2010.
  256. ^ "Rules – Committee on Standards of Official Conduct" (PDF). Archived from the original (PDF) on July 7, 2010. Retrieved August 23, 2010.
  257. ^ "The Executive Branch". The White House. Retrieved February 11, 2017.
  258. ^ "Interpretation: Article II, Section 1, Clauses 2 and 3 | Constitution Center". National Constitution Center – constitutioncenter.org.
  259. ^ a b c
  260. ^ "Supreme Court Procedure". SCOTUSblog. Retrieved October 20, 2024.
  261. ^ Cossack, Roger (July 13, 2000). "Beyond politics: Why Supreme Court justices are appointed for life". CNN. Archived from the original on July 12, 2012.
  262. ^ Sundquist, James L. (1997). "The U.S. Presidential System as a Model for the World". In Baaklini, Abdo I.; Desfosses, Helen (eds.). Designs for Democratic Stability: Studies in Viable Constitutionalism. Routledge. pp. 53–72. ISBN 978-0-7656-0052-3.
  263. ^ a b O'Connor, Sandra Day (Fall 1997). "Lessons from the Third Sovereign: Indian Tribal Courts" (PDF). Tulsa Law Journal. 33 (1).
  264. ^ a b Cohen, Felix S. (1942). Handbook of federal Indian law: with reference tables and index. Washington, D.C.: GPO. LCCN 42038386.
  265. ^ Levy, Robert A. (October 2011). "Rights, Powers, Dual Sovereignty, and Federalism". Cato Institute. Retrieved January 13, 2024.
  266. ^ 8 U.S.C. § 1101(a)(36) and 8 U.S.C. § 1101(a)(38) U.S. Federal Code, Immigration and Nationality Act. 8 U.S.C. § 1101a
  267. ^ Feldstein, Martin (March 2017). "Why is Growth Better in the United States Than in Other Industrial Countries?". National Bureau of Economic Research. Cambridge, Massachusetts. doi:10.3386/w23221.
  268. ^ "What is a federal Indian reservation?". bia.gov. Bureau of Indian Affairs. August 19, 2017. Retrieved August 26, 2023.
  269. ^ "Attorney General June 1, 1995 Memorandum on Indian Sovereignty". www.justice.gov. March 8, 2017. Retrieved May 9, 2024.
  270. ^ Hofstadter 1969, p. iv.
  271. ^ Blake, Aaron (November 25, 2021). "Why are there only two parties in American politics?". The Washington Post. Retrieved May 4, 2024.
  272. ^ Levendusky, Matthew (2009). The Partisan Sort: How Liberals Became Democrats and Conservatives Became Republicans. University of Chicago Press.
  273. ^ "Current Members". United Nations Security Council. Retrieved July 15, 2022.
  274. ^ "United Nations Headquarters Agreement". The American Journal of International Law. 42 (2). Cambridge University Press: 445–447. April 1948. doi:10.2307/2193692. JSTOR 2193692. S2CID 246008694.
  275. ^ "Where is the G7 Headed?". Council on Foreign Relations. New York City. June 28, 2022. Archived from the original on July 18, 2022. Retrieved July 15, 2022.
  276. ^ "The United States and G20: Building a More Peaceful, Stable, and Prosperous World Together". United States Department of State. July 6, 2022. Retrieved July 15, 2022.
  277. ^ "Our global reach". OECD. Retrieved July 15, 2022.
  278. ^ Fialho, Livia Pontes; Wallin, Matthew (August 1, 2013). Reaching for an Audience: U.S. Public Diplomacy Towards Iran (Report). American Security Project. JSTOR resrep06070.
  279. ^ Oliver, Alex; Graham, Euan (December 19, 2017). "Which are the countries still talking to North Korea?". BBC News. London. Retrieved July 15, 2022.
  280. ^ Ferraro, Matthew F. (December 22, 2014). "The Case for Stronger Bhutanese-American Ties". The Diplomat. Retrieved July 15, 2022.
  281. ^ "US will continue to strengthen 'unofficial ties' with Taiwan, says Harris". South China Morning Post. September 28, 2022. Retrieved September 28, 2022.
  282. ^ Ruwitch, John (September 22, 2020). "Formal Ties With U.S.? Not For Now, Says Taiwan Foreign Minister". NPR. Retrieved July 15, 2022.
  283. ^ Kobara, Junnosuke; Moriyasu, Ken (March 27, 2021). "Japan will turn to Quad in 'nealsow Cold War': Defense Ministry think tank". Nikkei Asia. Retrieved April 13, 2021.
  284. ^ Dumbrell & Schäfer 2009, p. 45.
  285. ^ Ek, Carl & Fergusson, Ian F. (September 3, 2010). "Canada–U.S. Relations" (PDF). Congressional Research Service. Archived from the original (PDF) on January 13, 2020. Retrieved August 28, 2011.
  286. ^ Vaughn, Bruce (August 8, 2008). Australia: Background and U.S. Relations. Congressional Research Service. OCLC 70208969.
  287. ^ Vaughn, Bruce (May 27, 2011). "New Zealand: Background and Bilateral Relations with the United States" (PDF). Congressional Research Service. Archived from the original (PDF) on January 22, 2021. Retrieved August 28, 2011.
  288. ^ Lum, Thomas (January 3, 2011). "The Republic of the Philippines and U.S. Interests" (PDF). Congressional Research Service. Archived from the original (PDF) on August 13, 2021. Retrieved August 3, 2011.
  289. ^ Chanlett-Avery, Emma; et al. (June 8, 2011). "Japan-U.S. Relations: Issues for Congress" (PDF). Congressional Research Service. Archived from the original (PDF) on January 13, 2020. Retrieved August 28, 2011.
  290. ^ Manyin, Mark E.; Chanlett-Avery, Emma; Nikitin, Mary Beth (July 8, 2011). "U.S.–South Korea Relations: Issues for Congress" (PDF). Congressional Research Service. Archived from the original (PDF) on January 13, 2020. Retrieved August 28, 2011.
  291. ^ Zanotti, Jim (July 31, 2014). "Israel: Background and U.S. Relations" (PDF). Congressional Research Service. Archived from the original (PDF) on March 5, 2019. Retrieved September 12, 2014.
  292. ^ "U.S. Relations With Poland". State.gov. January 20, 2021. Retrieved June 19, 2023.
  293. ^ "INDO- PACIFIC STRATEGY OF THE UNITED STATES" (PDF). White House. Retrieved February 3, 2022.
  294. ^ Meidan, Michal (July 1, 2019). US-China: The Great Decoupling (Report). Oxford Institute for Energy Studies. JSTOR resrep33982.
  295. ^ Bala, Sumathi (March 28, 2023). "U.S.-China relations are going downhill with 'no trust' on either side, Stephen Roach says". CNBC. Retrieved May 7, 2023.
  296. ^ Rumer, Eugene; Sokolsky, Richard (June 20, 2019). "Thirty Years of U.S. Policy Toward Russia: Can the Vicious Circle Be Broken?". Carnegie Endowment for International Peace. Washington, D.C. Retrieved July 14, 2022.
  297. ^ Macias, Amanda (June 17, 2022). "Here's a look at the $5.6 billion in firepower the U.S. has committed to Ukraine in its fight against Russia". CNBC. Retrieved September 28, 2022.
  298. ^ "Our Forces". United States Department of Defense. Retrieved July 12, 2024.
  299. ^ Lindsay, James M. (August 4, 2021). "Happy 231st Birthday to the United States Coast Guard!". New York City: Council on Foreign Relations. Retrieved July 16, 2022. During peacetime it is part of the Department of Homeland Security. During wartime, or when the president or Congress so direct, it becomes part of the Department of Defense and is included in the Department of the Navy.
  300. ^ "Trends in Military Expenditure 2024" (PDF). Stockholm International Peace Research Institute. April 2025. Retrieved April 28, 2025.
  301. ^ "Role of nuclear weapons grows as geopolitical relations deteriorate—new SIPRI Yearbook out now | SIPRI". Stockholm International Peace Research Institute. June 17, 2024. Retrieved June 18, 2024.
  302. ^ "United States country profile". BBC News. January 27, 2012. Retrieved July 6, 2025.
  303. ^ Ryan, Missy; Jeong, Andrew; Masih, Niha; Sands, Leo; Somasundaram, Praveena; Wu, Daniel; Haspel, Tamar; Dougherty, Jesse; Nusbaum, Spencer (April 1, 2021). "The U.S. system created the world's most advanced military. Can it maintain an edge?". The Washington Post. ISSN 0190-8286. Retrieved July 6, 2025.
  304. ^ Hackett, James (2023). The military balance. 2023. London: Routledge. ISBN 978-1-032-50895-5.
  305. ^ Harris, Johnny (May 18, 2015). "Why does the US have 800 military bases around the world?". Vox. Archived from the original on September 24, 2020. Retrieved September 23, 2020.
  306. ^ "Active Duty Military Personnel Strengths by Regional Area and by Country (309A)" (PDF). Department of Defense. March 31, 2010. Archived from the original (PDF) on July 24, 2013. Retrieved October 7, 2010.
  307. ^ Kushi & Toft 2023.
  308. ^ "StateDefenseForce.com". StateDefenseForce.com. September 17, 2024.
  309. ^ "State Guard Association of the United States – Supporting the State Defense Forces of the United States". sgaus.org.
  310. ^ "32 U.S. Code § 109 - Maintenance of other troops". LII / Legal Information Institute.
  311. ^ "National Guard: FAQ". United States National Guard. Retrieved August 23, 2025.
  312. ^ "Legal Basis of the National Guard". Army National Guard. 2013. Archived from the original on May 21, 2013. Retrieved May 17, 2013.
  313. ^ https://download.militaryonesource.mil/12038/MOS/Reports/2023-demographics-report.pdf
  314. ^ Banks, Duren; Hendrix, Joshua; Hickman, Mathhew (October 4, 2016). "National Sources of Law Enforcement Employment Data" (PDF). U.S. Department of Justice: 1.
  315. ^ "U.S. Federal Law Enforcement Agencies, Who Governs & What They Do". Chiff.com. Archived from the original on February 10, 2014. Retrieved November 10, 2021.
  316. ^ Manweller, Mathew (2006). "Chapter 2, The Roles, Functions, and Powers of State Courts". In Hogan, Sean O. (ed.). The Judicial Branch of State Government: People, Process, and Politics. Santa Barbara, California: ABC-Clio. pp. 37–96. ISBN 978-1-85109-751-7. Retrieved October 5, 2020.
  317. ^ "Introduction To The Federal Court System". United States Attorney. Washington, D.C.: United States Department of Justice. November 7, 2014. Retrieved July 14, 2022.
  318. ^ a b Sawyer, Wendy; Wagner, Peter (March 11, 2025). "Mass Incarceration: The Whole Pie 2025". Prison Policy Initiative. Retrieved May 19, 2025.
  319. ^ a b c d The Growth of Incarceration in the United States: Exploring Causes and Consequences. Washington, D.C.: National Academies Press. April 24, 2014. Bibcode:2014nap..book18613N. doi:10.17226/18613. ISBN 978-0-309-29801-8.
  320. ^ Foundation, The Annie E. Casey (November 14, 2020). "Juvenile Detention Explained". The Annie E. Casey Foundation. Retrieved July 6, 2023.
  321. ^ United States of America. World Prison Brief.
  322. ^ Highest to Lowest. World Prison Brief (WPB). Use the dropdown menu to choose lists of countries by region or the whole world. Use the menu to select highest-to-lowest lists of prison population totals, prison population rates, percentage of pre-trial detainees/remand prisoners, percentage of female prisoners, percentage of foreign prisoners, and occupancy rate. Column headings in WPB tables can be clicked to reorder columns lowest to highest, or alphabetically. For detailed information for each country click on any country name in lists. See the WPB main data page and click on the map links or the sidebar links to get to the region and country desired.
  323. ^ Grinshteyn & Hemenway 2016.
  324. ^ Moffatt, Mike (January 27, 2020). "A Mixed Economy: The Role of the Market". ThoughtCo. Retrieved May 30, 2025. The US has a mixed economy because both private businesses and the government are important.
  325. ^ Fordham 2017.
  326. ^ "United States Datasets". International Monetary Fund. Retrieved February 10, 2025.
  327. ^ Hagopian, Kip; Ohanian, Lee (August 1, 2012). "The Mismeasure of Inequality". Policy Review (174). Hoover Institution. Archived from the original on December 3, 2013. Retrieved January 23, 2020.
  328. ^ "Gross Domestic Product, Fourth Quarter and Year 2022 (Third Estimate), GDP by Industry, and Corporate Profits". U.S. Bureau of Economic Analysis. U.S. Department of Commerce. March 30, 2023.
  329. ^ Fox, Michelle (March 1, 2024). "The U.S. national debt is rising by $1 trillion about every 100 days". CNBC.
  330. ^ "Global 500". Fortune Global 500. Retrieved October 25, 2025.
  331. ^ Hyam, Benji (November 29, 2023). "Most Profitable Companies: U.S. vs. Rest of the World, 2023". www.growandconvert.com. Retrieved July 16, 2024.
  332. ^ "The Implementation of Monetary Policy – The Federal Reserve in the International Sphere" (PDF). Retrieved August 24, 2010.
  333. ^ Benjamin J. Cohen, The Future of Money, Princeton University Press, 2006, ISBN 978-0-691-11666-2; cf. "the dollar is the de facto currency in Cambodia", Charles Agar, Frommer's Vietnam, 2006, ISBN 978-0-471-79816-3, p. 17.
  334. ^ "US GDP Growth Rate by Year". multpl.com. US Bureau of Economic Analysis. March 31, 2014. Retrieved June 18, 2014.
  335. ^ "United States free trade agreements". Office of the United States Trade Representative. Retrieved May 31, 2019.
  336. ^ a b Collins, Michael (August 11, 2023). "The Post-Industrial Service Economy Isn't Working for the Middle Class". IndustryWeek. Retrieved August 10, 2024.
  337. ^ "USA Economy in Brief". U.S. Dept. of State, International Information Programs. Archived from the original on March 12, 2008.
  338. ^ "The State of Manufacturing in the United States". International Trade Administration. July 2010. Archived from the original on February 26, 2013. Retrieved March 10, 2013.
  339. ^ "Manufacturing, Value Added (Current US$)". World Bank. Retrieved October 25, 2025.
  340. ^ Kat Tretina and Benjamin Curry (April 9, 2021). "NYSE: What Is The New York Stock Exchange". Forbes. Retrieved July 24, 2022.
  341. ^ Jones, Huw (March 24, 2022). "New York widens lead over London in top finance centres index". Reuters. Retrieved July 29, 2022.
  342. ^ "The Global Financial Centres Index 35". Long Finance. March 21, 2024. Retrieved May 1, 2024.
  343. ^ Ghosh, Iman (September 24, 2020). "This 3D map shows the U.S. cities with the highest economic output". World Economic Forum. Retrieved March 5, 2023. The New York metro area dwarfs all other cities for economic output by a large margin.
  344. ^ "Monthly Reports – World Federation of Exchanges". WFE.
  345. ^ Table A – Market Capitalization of the World's Top Stock Exchanges (As at end of June 2012). Securities and Exchange Commission (China).
  346. ^ a b c "The World Factbook: United States". Central Intelligence Agency. Archived from the original on January 7, 2021. Retrieved November 10, 2018.
  347. ^ Wright, Gavin, and Jesse Czelusta, "Resource-Based Growth Past and Present", in Natural Resources: Neither Curse Nor Destiny, ed. Daniel Lederman and William Maloney (World Bank, 2007), p. 185. ISBN 978-0-8213-6545-8.
  348. ^ "Top Trading Partners – October 2022". U.S. Census Bureau. October 2022. Retrieved May 12, 2023.
  349. ^ "World Trade Statistical Review 2019" (PDF). World Trade Organization. p. 100. Retrieved May 31, 2019.
  350. ^ "Exports of goods, services and primary income (BoP, current US$)". data.worldbank.org. Retrieved May 24, 2024.
  351. ^ "Service exports (BoP, current US$)". World Bank. Retrieved August 4, 2023.
  352. ^ "Income". Better Life Index. OECD. Retrieved September 28, 2019. In the United States, the average household net adjusted disposable income per capita is USD 45 284 a year, much higher than the OECD average of USD 33 604 and the highest figure in the OECD.
  353. ^ "Median Income by Country 2023". Wisevoter. Retrieved July 28, 2023.
  354. ^ "Society at a Glance 2014". Society at a Glance 2014: OECD Social Indicators. OECD Publishing. March 18, 2014. doi:10.1787/soc_glance-2014-en. ISBN 978-92-64-20072-2. Retrieved May 29, 2014.
  355. ^ "Personal Consumption Expenditures". fred.stlouisfed.org. March 28, 2024. Retrieved July 24, 2024.
  356. ^ Steenkamp, Jan-Benedict E. M. (March 1, 2024). "What is holding private label back in the United States and in emerging markets?". Journal of Retailing. 100 (1): 56–69. doi:10.1016/j.jretai.2023.11.002. ISSN 0022-4359.
  357. ^ Napoletano, E. (October 20, 2023). "Here's How Many Billionaires And Millionaires Live In The U.S. – Forbes Advisor". Forbes. Retrieved November 20, 2023.
  358. ^ Piketty, Thomas (2014). Capital in the Twenty-First Century. Belknap Press. p. 257. ISBN 978-0-674-43000-6.
  359. ^ Smith, Matthew; Zidar, Owen; Zwick, Eric (2022). "Top Wealth in America: New Estimates under Heterogeneous Returns". The Quarterly Journal of Economics. 138: 515–573. doi:10.1093/qje/qjac033. ISSN 0033-5533.
  360. ^ "Income inequality in America is the highest it's been since Census Bureau started tracking it, data shows". The Washington Post. Retrieved July 27, 2020.
  361. ^ "Society at a glance 2024: OECD social indicators". OECD. June 20, 2024. Retrieved April 12, 2025.
  362. ^ a b Hopkin, Jonathan (2020). "American Nightmare: How Neoliberalism Broke US Democracy". Anti-System Politics: The Crisis of Market Liberalism in Rich Democracies. Oxford University Press. pp. 87–92. doi:10.1093/oso/9780190699765.003.0004. ISBN 978-0-19-069976-5.
  363. ^ Long, Heather (September 12, 2017). "U.S. middle-class incomes reached highest-ever level in 2016, Census Bureau says". The Washington Post. Retrieved November 11, 2019.
  364. ^ Smeeding, T. M. (2005). "Public Policy: Economic Inequality and Poverty: The United States in Comparative Perspective". Social Science Quarterly. 86: 955–983. doi:10.1111/j.0038-4941.2005.00331.x. S2CID 154642286.
  365. ^ Casey, Michael (December 27, 2024). "US homelessness up 18% as affordable housing remains out of reach for many". Associated Press. Retrieved August 25, 2025.
  366. ^ "USDA ERS – Key Statistics & Graphics". ers.usda.gov. Archived from the original on January 19, 2020. Retrieved December 4, 2019.
  367. ^ "Facts About Child Hunger in America | Feeding America". feedingamerica.org. Retrieved December 4, 2019.
  368. ^ "National Poverty in America Awareness Month: January 2023". Census.gov.
  369. ^ Joumard, Isabelle; Pisu, Mauro; Bloch, Debbie (2012). "Tackling income inequality The role of taxes and transfers" (PDF). OECD. Retrieved May 21, 2015.
  370. ^ Rank, Mark Robert (2023). The Poverty Paradox: Understanding Economic Hardship Amid American Prosperity. Oxford University Press. pp. 116–117. ISBN 978-0-19-021263-6.
  371. ^ Min, Sarah (May 24, 2019). "1 in 4 workers in U.S. don't get any paid vacation time or holidays". CBS News. Retrieved July 15, 2022. The United States is the only advanced economy that does not federally mandate any paid vacation days or holidays.
  372. ^ Bernard, Tara Siegel (February 22, 2013). "In Paid Family Leave, U.S. Trails Most of the Globe". The New York Times. Retrieved August 27, 2013.
  373. ^ Van Dam, Andrew (July 4, 2018). "Is it great to be a worker in the U.S.? Not compared with the rest of the developed world". The Washington Post. Retrieved July 12, 2018.
  374. ^ Lee, Dave (July 16, 2015). "Silicon Valley: 'Centre of the universe' - but for how long?". BBC News. Retrieved August 17, 2025. It was this secret sauce [...] that provided the spark for the biggest and most powerful technology hub in the world.
  375. ^ Cellan-Jones, Rory (February 7, 2020). "Tech Tent - has Silicon Valley still got it?". BBC. Retrieved August 17, 2025. For decades it has been the beating heart of the tech industry, the place where the future is created and where anyone who wants to be part of it has to come in search of inspiration and funding.
  376. ^ Mowery, David. "Technological Change and the Evolution of the U.S. "National Innovation System", 1880-1990". OpenMind. Archived from the original on January 27, 2022. Retrieved July 10, 2024.
  377. ^ Goodfriend, Marvin; McDermott, John (February 24, 2021). "The American System of economic growth". Journal of Economic Growth. 26 (1): 31–75. doi:10.1007/s10887-021-09186-x. ISSN 1573-7020. PMC 7902180. PMID 33642936.
  378. ^ Hounshell, David A. (1984), From the American System to Mass Production, 1800–1932: The Development of Manufacturing Technology in the United States, Baltimore, Maryland: Johns Hopkins University Press, ISBN 978-0-8018-2975-8, LCCN 83016269, OCLC 1104810110.
  379. ^ Tollefson, Jeff; Van Noorden, Richard (October 23, 2024). "The US is the world's science superpower — but for how long?". Nature. 634 (8035): 770–774. Bibcode:2024Natur.634..770T. doi:10.1038/d41586-024-03403-4. PMID 39443789.
  380. ^ "U.S. science no longer leads the world. Here's how top advisers say the nation should respond". www.science.org. Retrieved February 10, 2025.
  381. ^ Desjardins, Jeff (December 18, 2018). "Innovators wanted: these countries spend the most on R&D". www.weforum.org. Retrieved May 22, 2024.
  382. ^ Fleming, Sean (November 16, 2020). "These countries spend the most on research and development". www.weforum.org. Retrieved May 22, 2024.
  383. ^ "SJR – International Science Ranking". Scimagojr.com. Retrieved February 5, 2022.
  384. ^ World Intellectual Property Organization. (2021). World Intellectual Property Indicators 2021. World IP Indicators (WIPI). World Intellectual Property Organization (WIPO). doi:10.34667/tind.44461. ISBN 978-92-805-3329-3. Retrieved April 27, 2022.
  385. ^ "GII Innovation Ecosystems & Data Explorer 2025". WIPO. Retrieved October 16, 2025.
  386. ^ Dutta, Soumitra; Lanvin, Bruno (2025). Global Innovation Index 2025: Innovation at a Crossroads. World Intellectual Property Organization. p. 19. doi:10.34667/tind.58864. ISBN 978-92-805-3797-0. Retrieved October 17, 2025.
  387. ^ "Global AI Power Rankings: Stanford HAI Tool Ranks 36 Countries in AI". hai.stanford.edu. November 21, 2024. Retrieved January 1, 2025.
  388. ^ Getzoff, Marc (December 1, 2023). "Most Technologically Advanced Countries In The World 2023". Global Finance Magazine. Retrieved July 29, 2024.
  389. ^ "65 Years Ago: The National Aeronautics and Space Act of 1958 Creates NASA – NASA". July 26, 2023. Retrieved September 6, 2024.
  390. ^ "National Aeronautics and Space Administration | US Space Agency & Exploration Achievements | Britannica". www.britannica.com. September 4, 2024. Retrieved September 5, 2024.
  391. ^ "Apollo | History, Missions, Significance, & Facts | Britannica". www.britannica.com. August 29, 2024. Retrieved September 5, 2024.
  392. ^ "The Apollo Missions". The Apollo Missions. July 4, 2019. Retrieved September 5, 2024.
  393. ^ "Space Shuttle – NASA". Retrieved September 5, 2024.
  394. ^ "Quick Facts". HubbleSite. Retrieved September 5, 2024.
  395. ^ "Quick Facts". Webb. August 12, 2024. Retrieved September 5, 2024.
  396. ^ "Mars Exploration – NASA Science". science.nasa.gov. February 27, 2008. Retrieved September 5, 2024.
  397. ^ "International Space Station Facts and Figures – NASA". Retrieved September 5, 2024.
  398. ^ Howell, Elizabeth (August 24, 2022). "International Space Station: Facts, History & Tracking". Space.com (updated, last ed.). Retrieved September 5, 2024.
  399. ^ "Analysis | Companies are commercializing outer space. Do government programs still matter?". Washington Post. January 11, 2022. ISSN 0190-8286. Retrieved September 5, 2024.
  400. ^ "Commercial Space – NASA". Retrieved September 5, 2024.
  401. ^ "U.S. energy facts explained – consumption and production – U.S. Energy Information Administration (EIA)". eia.gov. Retrieved November 21, 2023.
  402. ^ "Energy Flow Charts: Charting the Complex Relationships among Energy, Water, and Carbon". Lawrence Livermore National Laboratory. March 2022. Retrieved May 16, 2023.
  403. ^ "What is the United States' share of world energy consumption?". U.S. Energy Information Administration. November 5, 2021.
  404. ^ US Environmental Protection Agency, OAR (February 8, 2017). "Inventory of U.S. Greenhouse Gas Emissions and Sinks". US EPA. Retrieved December 3, 2020.
  405. ^ "Nuclear Power in the USA - World Nuclear Association". world-nuclear.org. Retrieved March 1, 2025.
  406. ^ Rouse, Sabina (November 5, 2019). "Where are the world's 449 nuclear reactors?". World Economic Forum. Archived from the original on February 14, 2025. Retrieved March 1, 2025.
  407. ^ "U.S. Sets Targets to Triple Nuclear Energy Capacity by 2050". Energy.gov. November 12, 2024. Retrieved March 1, 2025.
  408. ^ "Roadways – The World Factbook". Cia.gov. Archived from the original on July 12, 2021. Retrieved July 15, 2021.
  409. ^ "Public Road and Street Mileage in the United States by Type of Surface". United States Department of Transportation. Archived from the original on January 2, 2015. Retrieved January 13, 2015.
  410. ^ "Cars still dominate the American commute". World Economic Forum. May 19, 2022. Retrieved May 21, 2023.
  411. ^ Humes, Edward (April 12, 2016). "The Absurd Primacy of the Automobile in American Life". The Atlantic. Archived from the original on April 12, 2016. Retrieved July 12, 2023.
  412. ^ Black, Alan (1995). Urban mass transportation planning. New York: McGraw-Hill. ISBN 978-0-07-005557-5. OCLC 31045097.
  413. ^ a b Hunter, Marnie (April 11, 2022). "This US airport has reclaimed its title as the world's busiest". CNN.
  414. ^ "Preliminary World Airport Traffic and Rankings 2013—High Growth Dubai Moves Up to 7th Busiest Airport". March 31, 2014. Archived from the original on April 1, 2014. Retrieved May 17, 2014.
  415. ^ "Scheduled Passengers Carried". International Air Transport Association (IATA). 2011. Archived from the original on January 2, 2015. Retrieved February 17, 2012.
  416. ^ a b "2021 Airport Traffic Report" (PDF). Port Authority of New York and New Jersey. April 2022. p. 32.
  417. ^ "Number of U.S. Airports". Bureau of Transportation Statistics. Retrieved December 15, 2023.
  418. ^ "Railways – The World Factbook". The World Factbook. Central Intelligence Agency. Archived from the original on November 24, 2018. Retrieved July 14, 2022.
  419. ^ "Seasonally Adjusted Transportation Data". Washington, D.C.: Bureau of Transportation Statistics. 2021. Archived from the original on April 22, 2021. Retrieved February 16, 2021.
  420. ^ Fitzsimmons, Emma G. (April 24, 2017). "Amtrak at a Junction: Invest in Improvements, or Risk Worsening Problems". The New York Times. Retrieved April 16, 2023.
  421. ^ The Antiplanner (May 13, 2016). "Comparing European and American Transport".
  422. ^ Thomas, Maddock (March 7, 2023). "US Railroads Lag Behind the World in Railroad Electrification, and the Reason is Private Ownership". Brown Political Review. Retrieved March 9, 2025.
  423. ^ "Waterways – The World Factbook". The World Factbook. Central Intelligence Agency. Archived from the original on April 12, 2022. Retrieved July 14, 2022.
  424. ^ "The Top 50 Container Ports". World Shipping Council. Washington, D.C. Archived from the original on August 13, 2021. Retrieved July 14, 2022.
  425. ^ "U.S. population growth slows due to historic decline in net international migration". U.S. Census Bureau. Retrieved January 27, 2026.
  426. ^ "Census Bureau's 2020 Population Count". United States Census. Retrieved April 26, 2021.
  427. ^ "World Population Dashboard". United Nations Population Fund. Retrieved February 12, 2026.
  428. ^ "Population Clock". Census.gov.
  429. ^ "Table MS-1. Marital Status of the Population 15 Years Old and Over, by Sex, Race and Hispanic Origin: 1950 to Present". Historical Marital Status Tables. U.S. Census Bureau. Retrieved September 11, 2019.
  430. ^ Saric, Ivana (April 25, 2024). "Births dropped in 2023, ending pandemic baby boom". Axios. Retrieved July 1, 2024.
  431. ^ "U.S. has world's highest rate of children living in single-parent households". Pew Research Center. December 12, 2019. Retrieved March 17, 2020.
  432. ^ a b c "Ancestry 2000" (PDF). U.S. Census Bureau. June 2004. Archived (PDF) from the original on December 4, 2004. Retrieved December 2, 2016.
  433. ^ "The Chance That Two People Chosen at Random Are of Different Race or Ethnicity Groups Has Increased Since 2010". Census.gov. U.S. Census Bureau.
  434. ^ "Table 52. Population by Selected Ancestry Group and Region: 2009" (PDF). U.S. Census Bureau. 2009. Archived from the original (PDF) on December 25, 2012. Retrieved February 11, 2017.
  435. ^ "Federally recognized American Indian tribes and Alaska Native entities | USAGov". www.usa.gov. Retrieved April 5, 2024.
  436. ^ Wilder, Kristie; Mackun, Paul. "Median Age in 192 Metro Areas Higher Than National Median of 39.1". Census.gov. Retrieved July 4, 2025.
  437. ^ Kaur, Harmeet (May 20, 2018). "FYI: English isn't the official language of the United States". CNN. Retrieved May 11, 2023.
  438. ^ "States Where English Is the Official Language". The Washington Post. August 12, 2014. Retrieved September 12, 2020.
  439. ^ "The Constitution of the State of Hawaii, Article XV, Section 4". Hawaii Legislative Reference Bureau. November 7, 1978. Archived from the original on July 24, 2013. Retrieved June 19, 2007.
  440. ^ Chapel, Bill (April 21, 2014). "Alaska OKs Bill Making Native Languages Official". NPR.
  441. ^ "South Dakota recognizes official indigenous language". Argus Leader. Retrieved March 26, 2019.
  442. ^ Siebens, Julie; Julian, Tiffany (December 2011). "Native North American Languages Spoken at Home in the United States and Puerto Rico: 2006–2010" (PDF). United States Census Bureau. Retrieved April 5, 2024.
  443. ^ "Translation in Puerto Rico". Puerto Rico Channel. Archived from the original on December 30, 2013. Retrieved December 29, 2013.
  444. ^ "ACS B16001". ACS B16001. U.S. Census Bureau. Retrieved December 26, 2022.
  445. ^ U.S. Census Bureau. Language spoken at home by ability to speak English for the population 5 years and over. data.census.gov (Report). U.S. Census Bureau. Retrieved February 24, 2026.
  446. ^ United Nations, Department of Economic and Social Affairs, Population Division (August 2019). "International Migrant Stock 2019 Documentation" (PDF). United Nations. Retrieved June 19, 2023.
  447. ^ "UN Migrant Stock Total 2019". United Nations. Retrieved June 19, 2023.
  448. ^ "Frequently Requested Statistics on Immigrants and Immigration in the United States". Migration Policy Institute. March 14, 2019.
  449. ^ "Key findings about U.S. immigrants". Pew Research Center. June 17, 2019.
  450. ^ "Immigrants in the United States" (PDF). americanimmigrationcouncil.org. September 21, 2021. Retrieved August 18, 2023.
  451. ^ "Who Are America's Immigrants?". Population Reference Bureau. May 22, 2024.
  452. ^ "U.S. Unauthorized Immigrant Population Reached a Record 14 Million in 2023". Pew Research Center. August 21, 2025.
  453. ^ Donadio, Rachel (November 22, 2021). "Why Is France So Afraid of God?". The Atlantic. Retrieved March 25, 2023.
  454. ^ "First Amendment". Constitution Annotated. United States Congress.
  455. ^ Alesina, Alberto; et al. (2003). "Fractionalization" (PDF). Journal of Economic Growth. 8 (2): 155–194. doi:10.1023/a:1024471506938. S2CID 260685524. Archived from the original (PDF) on August 31, 2012. Retrieved September 13, 2012.
  456. ^ Fahmy, Dalia (July 31, 2018). "Americans are far more religious than adults in other wealthy nations". Pew Research Center. Archived from the original on January 9, 2020. Retrieved January 23, 2020.
  457. ^ ANALYSIS (December 19, 2011). "Global Christianity". Pewforum.org. Archived from the original on July 30, 2013. Retrieved August 17, 2012.
  458. ^ Sewell, Elizabeth (2010). "Religious Liberty and Religious Minorities in the United States". In Davis, Derek (ed.). The Oxford Handbook of Church and State in the United States. University of Oxford. pp. 249–275. ISBN 978-0-19-989222-8.
  459. ^ a b Williams, Daniel (March 1, 2023). "'Christian America' Isn't Dying. It's Dividing". Christianity Today. Retrieved March 25, 2023.
  460. ^ Merriam, Jesse; Lupu, Ira; Elwood, F; Davis, Eleanor (August 28, 2008). "On Ceremonial Occasions, May the Government Invoke a Deity?". Pew Research Center's Religion & Public Life Project. Retrieved March 31, 2023.
  461. ^ Kallo, Becka; et al. (December 7, 2023). "Spirituality Among Americans". Pew Research Center's Religion & Public Life Project. Retrieved December 8, 2023.
  462. ^ Froese, Paul; Uecker, Jeremy E. (September 2022). "Prayer in America: A Detailed Analysis of the Various Dimensions of Prayer". Journal for the Scientific Study of Religion. 61 (3–4): 663–689. doi:10.1111/jssr.12810. ISSN 0021-8294. S2CID 253439298.
  463. ^ Fahmy, Dalia; Smith, Gregory A.; Cooperman, Alan; Alper, Becka A.; Mohamed, Besheer; Rotolo, Chip; Tevington, Patricia; Nortey, Justin; Kallo, Asta; Diamant, Jeff (February 26, 2025). "Decline of Christianity in the U.S. Has Slowed, May Have Leveled Off". Pew Research Center. Retrieved April 22, 2025.
  464. ^ Howe 2008, pp. 727–728.
  465. ^ "United States—Urban/Rural and Inside/Outside Metropolitan Area". U.S. Census Bureau. Archived from the original on April 3, 2009. Retrieved September 23, 2008.
  466. ^ "City and Town Population Totals: 2020-2022". Census.gov. Retrieved November 26, 2023.
  467. ^ "Counties in South and West Lead Nation in Population Growth". United States Census Bureau. April 18, 2019. Retrieved August 29, 2020.
  468. ^ "Metropolitan and Micropolitan Statistical Areas Population Totals: 2020-2025". United States Census Bureau, Population Division. March 26, 2026. Retrieved March 26, 2026.
  469. ^ "About Us". Retrieved November 19, 2025.
  470. ^ "Texas Medical Center, largest medical complex in the world, reaches 98 percent ICU capacity". Newsweek. August 19, 2020.
  471. ^ "TMC Facts & Figures" (PDF). Retrieved November 19, 2025.
  472. ^ "U.S. life expectancy hits record high as drug overdose deaths decline in 2024". U.S. Centers for Disease Control and Prevention. January 29, 2026. Retrieved February 1, 2026.
  473. ^ Xu, Jiaquan; Murphy, Sherry; Kochanek, Kenneth D.; Arias, Elizabeth (January 29, 2026). "Mortality in the United States 2024". National Center for Health Statistics Brief / CDC. Retrieved February 1, 2026.
  474. ^ Achenbach, Joel (November 26, 2019). "'There's something terribly wrong': Americans are dying young at alarming rates". The Washington Post. Retrieved December 19, 2019.
  475. ^ "New International Report on Health Care: U.S. Suicide Rate Highest Among Wealthy Nations | Commonwealth Fund". Commonwealthfund.org. January 30, 2020. Retrieved March 17, 2020.
  476. ^ "Prevalence of Overweight and Obesity Among Adults: United States, 2003–2004". Centers for Disease Control and Prevention, National Center for Health Statistics. Retrieved June 5, 2007.
  477. ^ "The U.S. Healthcare System: The Best in the World or Just the Most Expensive?" (PDF). University of Maine. 2001. Archived from the original (PDF) on March 9, 2007. Retrieved November 29, 2006.
  478. ^ Vladeck, Bruce (January 2003). "Universal Health Insurance in the United States: Reflections on the Past, the Present, and the Future". American Journal of Public Health. 93 (1): 16–19. doi:10.2105/ajph.93.1.16. PMC 1447684. PMID 12511377.
  479. ^ Oberlander, Jonathan (June 1, 2010). "Long Time Coming: Why Health Reform Finally Passed". Health Affairs. 29 (6): 1112–1116. doi:10.1377/hlthaff.2010.0447. ISSN 0278-2715. PMID 20530339.
  480. ^ Glenza, Jessica; Noor, Poppy. "Tracking abortion laws across the United States". The Guardian. Retrieved August 14, 2024.
  481. ^ National Center for Education Statistics. "U.S. Undergraduate Enrollment". Accessed July 29, 2024.
  482. ^ "Ages for Compulsory School Attendance ..." U.S. Dept. of Education, National Center for Education Statistics. Retrieved June 10, 2007.
  483. ^ Rushe, Dominic (September 7, 2018). "The US spends more on education than other countries. Why is it falling behind?". The Guardian. ISSN 0261-3077. Retrieved August 29, 2020.
  484. ^ "Fast Facts: Expenditures". nces.ed.gov. April 2020. Retrieved August 29, 2020.
  485. ^ "Educational Attainment in the United States: 2022". U.S. Census Bureau. Retrieved July 20, 2024.
  486. ^ For more detail on U.S. literacy, see A First Look at the Literacy of America's Adults in the 21st century, U.S. Department of Education (2003).
  487. ^ "All Nobel Prizes". Nobel Foundation.
  488. ^ "2022–2023 Best Global Universities Rankings". U.S. News & World Report. Retrieved April 27, 2023.
  489. ^ Fink, Jenni (October 22, 2019). "U.S. Schools Take 8 of 10 Top Spots on U.S. News' Best Global Universities". Newsweek. Retrieved April 18, 2023.
  490. ^ "Best Countries for Education: North American and European countries are seen as offering the best opportunities for education". U.S. News & World Report. April 19, 2023.
  491. ^ Pannoni, Alexandra; Kerr, Emma (July 14, 2020). "Everything You Need to Know About Community Colleges: FAQ". U.S. News & World Report. Retrieved July 9, 2022.
  492. ^ "U.S. education spending tops global list, study shows". CBS. Associated Press. June 25, 2013. Archived from the original on July 26, 2013. Retrieved October 5, 2013.
  493. ^ "The Biden administration cancelled $9.5B in student loan debt. Here's who it affects". USAFacts. Retrieved July 15, 2022.
  494. ^ Hess, Abigail Johnson (December 22, 2020). "U.S. student debt has increased by more than 100% over the past 10 years". CNBC. Retrieved January 8, 2022.
  495. ^ Dickler, Jessica; Nova, Annie (May 6, 2022). "This is how student loan debt became a $1.7 trillion crisis". CNBC. Retrieved July 8, 2022.
  496. ^ "Statue of Liberty". World Heritage. UNESCO. Retrieved January 4, 2022.
  497. ^ Volokh, Eugene (January 17, 2015). "The American tradition of multiculturalism". The Washington Post. Retrieved July 30, 2024.
  498. ^ Jackson, Lucas (August 22, 2014). "America's Tipping Point: Most Of U.S. Now Multicultural, Says Group". NBC News. Retrieved July 30, 2024.
  499. ^ Grabb, Edward; Baer, Douglas; Curtis, James (1999). "The Origins of American Individualism: Reconsidering the Historical Evidence". Canadian Journal of Sociology. 24 (4). University of Alberta: 511–533. doi:10.2307/3341789. ISSN 0318-6431. JSTOR 3341789.
  500. ^ Marsh, Abigail (May 26, 2021). "Everyone Thinks Americans Are Selfish. They're Wrong". The New York Times. ISSN 0362-4331. Retrieved July 16, 2023.
  501. ^ Porter, Gayle (November 2010). "Work Ethic and Ethical Work: Distortions in the American Dream". Journal of Business Ethics. 96 (4). Springer: 535–550. doi:10.1007/s10551-010-0481-6. JSTOR 29789736. S2CID 143991044.
  502. ^ Stephens, R. H. (September 1952). "The Role Of Competition In American Life". The Australian Quarterly. 24 (3). Australian Institute of Policy and Science: 9–14. JSTOR 41317686.
  503. ^ "World Giving Index 2022" (PDF). Charities Aid Foundation. September 9, 2022. Retrieved April 27, 2023.
  504. ^ "Country-level estimates of altruism". Our World in Data. Retrieved March 14, 2023.
  505. ^ Marsh, Abigail (February 5, 2018). "Could A More Individualistic World Also Be A More Altruistic One?". NPR. Retrieved March 14, 2023.
  506. ^ "GROSS DOMESTIC PHILANTHROPY: An international analysis of GDP, tax and giving" (PDF). Charities Aid Foundation. January 2016. Retrieved July 18, 2022.
  507. ^ Huntington, Samuel P. (2004). "Chapters 2–4". Who are We?: The Challenges to America's National Identity. Simon & Schuster. ISBN 978-0-684-87053-3. Retrieved October 25, 2015.: see American Creed, written by William Tyler Page and adopted by Congress in 1918.
  508. ^ Hoeveler, J. David, Creating the American Mind: Intellect and Politics in the Colonial Colleges, Rowman & Littlefield, ISBN 978-0-7425-4839-8, 2007, p. xi.
  509. ^ Fergie, Dexter (March 24, 2022). "How American Culture Ate the World". The New Republic. ISSN 0028-6583. Retrieved July 3, 2022.
  510. ^ Shah, Ritula (November 19, 2014). "Is US monopoly on the use of soft power at an end?". BBC News. Retrieved February 14, 2025.
  511. ^ Berghahn, Volker R. (February 1, 2010). "The debate on 'Americanization' among economic and cultural historians". Cold War History. 10 (1): 107–130. doi:10.1080/14682740903388566. ISSN 1468-2745. S2CID 144459911.
  512. ^ Fiorina, Morris P.; Peterson, Paul E. (2010). The New American democracy (7th ed.). London: Longman. p. 97. ISBN 978-0-205-78016-7.
  513. ^
    • Holloway, Joseph E. (2005). Africanisms in American culture (2nd ed.). Bloomington: Indiana University Press. pp. 18–38. ISBN 978-0-253-21749-3.
    • Johnson, Fern L. (2000). Speaking culturally: language diversity in the United States. Sage Publications. p. 116. ISBN 978-0-8039-5912-5.
  514. ^ a b c Coleman, Gabriella (2013). Coding Freedom. Princeton University Press. pp. 10, 201. ISBN 978-0-691-14461-0.
  515. ^ "Held Dear In U.S., Free Speech Perplexing Abroad". NPR. September 19, 2012. Retrieved March 4, 2023.
  516. ^ Liptak, Adam (June 11, 2008). "Hate speech or free speech? What much of West bans is protected in U.S.". The New York Times. Retrieved February 21, 2023.
  517. ^ Durkee, Alison (April 25, 2018). "What if we didn't... have the First Amendment?". Mic. Retrieved February 6, 2023.
  518. ^ Wike, Richard (October 12, 2016). "Americans more tolerant of offensive speech than others in the world". Pew Research Center. Retrieved February 6, 2023.
  519. ^ Gray, Alex (November 8, 2016). "Freedom of speech: which country has the most?". World Economic Forum. Retrieved February 6, 2023.
  520. ^ Norris, Pippa (February 2023). "Cancel Culture: Myth or Reality?". Political Studies. 71 (1): 145–174. doi:10.1177/00323217211037023. ISSN 0032-3217. S2CID 238647612. As predicted, in post-industrial societies, characterized by predominately liberal social cultures, like the US, Sweden, and UK...
  521. ^ a b Derks, Marco; van den Berg, Mariecke (2020). Public Discourses About Homosexuality and Religion in Europe and Beyond. Springer International Publishing. p. 338. ISBN 978-3-030-56326-4. ...(the United States and [Western] Europe) as "already in crisis" for their permissive attitudes toward nonnormative sexualities...
  522. ^ Leveille, Dan (December 4, 2009). "LGBT Equality Index: The most LGBT-friendly countries in the world". Equaldex. Retrieved January 26, 2023. 13.) United States
  523. ^ Garretson, Jeremiah (2018). "A Transformed Society: LGBT Rights in the United States". The Path to Gay Rights: How Activism and Coming Out Changed Public Opinion. New York University Press. ISBN 978-1-4798-5007-5. In the late 1980s and early 1990s, a dramatic wave began to form in the waters of public opinion: American attitudes involving homosexuality began to change... The transformation of America's response to homosexuality has been — and continues to be — one of the most rapid and sustained shifts in mass attitudes since the start of public polling.
  524. ^ Clifton, Jon (March 21, 2013). "More Than 100 Million Worldwide Dream of a Life in the U.S. More than 25% in Liberia, Sierra Leone, Dominican Republic want to move to the U.S." Gallup. Retrieved January 10, 2014.
  525. ^ Kulkarni, Jay (January 12, 2022). "Attracting Immigrant Talent With A New American Dream". Forbes. Retrieved July 24, 2024.
  526. ^ "A Family Affair: Intergenerational Social Mobility across OECD Countries" (PDF). Economic Policy Reforms: Going for Growth. OECD. 2010. Retrieved September 20, 2010.
  527. ^ "Understanding Mobility in America". Center for American Progress. April 26, 2006.
  528. ^ Gould, Elise (October 10, 2012). "U.S. lags behind peer countries in mobility". Economic Policy Institute. Retrieved July 15, 2013.
  529. ^ Gutfeld, Amon (2002). American Exceptionalism: The Effects of Plenty on the American Experience. Brighton and Portland: Sussex Academic Press. p. 65. ISBN 978-1-903900-08-6.
  530. ^ Zweig, Michael (2004). What's Class Got To Do With It, American Society in the Twenty-First Century. Ithaca, NY: Cornell University Press. ISBN 978-0-8014-8899-3.
  531. ^ Hoff-Ginsberg, Erika (April 1989). Effects of Social Class and Interactive Setting on Maternal Speech (Report). Bethesda, MD: National Institute of Child Health and Human Development (NIH) – via Education Resource Information Center. Republished with revisions as Hoff-Ginsberg, Erika (1991). "Mother-Child Conversation in Different Social Classes and Communicative Settings". Child Development. 62 (4): 782–796. doi:10.1111/j.1467-8624.1991.tb01569.x. ISSN 0009-3920. PMID 1935343.
  532. ^ O'Keefe, Kevin (2005). The Average American. New York: PublicAffairs. ISBN 978-1-58648-270-1.
  533. ^ "National Foundation on the Arts and the Humanities". Federal Register. Retrieved October 1, 2022.
  534. ^ Jelliffe, Robert A. (1956). Faulkner at Nagano. Tokyo: Kenkyusha, Ltd.
  535. ^ Baym & Levine 2013, pp. 157–159.
  536. ^ Lauter 1994a, pp. 503–509.
  537. ^ Baym & Levine 2013, p. 163.
  538. ^ Mulford, Carla. "Enlightenment Voices, Revolutionary Visions." In Lauter 1994a, pp. 705–707.
  539. ^ Lease, Benjamin (1972). That Wild Fellow John Neal and the American Literary Revolution. Chicago, Illinois: University of Chicago Press. p. 80. ISBN 978-0-226-46969-0.
  540. ^ Finseth, Ian Frederick. "The Emergence of Transcendentalism". American Studies @ The University of Virginia. The University of Virginia. Archived from the original on July 18, 2023. Retrieved November 9, 2014.
  541. ^ Coviello, Peter (2005). "Transcendentalism". The Oxford Encyclopedia of American Literature. Oxford University Press. ISBN 978-0-19-530772-6. Retrieved October 23, 2011 – via Oxford Reference Online.
  542. ^ Baym & Levine 2013, pp. 444–447.
  543. ^ Lauter 1994a, pp. 1228, 1233, 1260.
  544. ^ Baym & Levine 2013, pp. 1269–1270.
  545. ^ Lauter 1994b, pp. 8–10.
  546. ^ Baym & Levine 2013, pp. 1271–1273.
  547. ^ Lauter 1994b, p. 12.
  548. ^ Baym & Levine 2013, pp. 1850–1851.
  549. ^ Spillers, Hortense. "The New Negro Renaissance." In Lauter 1994b, pp. 1579–1585.
  550. ^ Philipson 2006.
  551. ^ Baym & Levine 2013, pp. 2260–2261.
  552. ^ Baym & Levine 2013, p. 2262.
  553. ^ Lauter 1994b, pp. 1975–1977. "Literature of the Cold War".
  554. ^ Baym & Levine 2013, pp. 2266–2267.
  555. ^ "All Nobel Prizes in Literature". The Nobel Prize. Nobel Prize Outreach AB 2024. Retrieved August 6, 2024.
  556. ^ "About PBS – Overview". PBS. Archived from the original on September 7, 2018. Retrieved September 10, 2018.
  557. ^ Terbo, William. "Video Documentaries". Tesla Memorial Society. Archived from the original on March 26, 2023. Retrieved June 26, 2023. "Tesla, Master of Lightning", New Voyage Communications for PBS Television Network, 2000, 90 minutes.
  558. ^ "Ray Suarez". Carnegie Council for Ethics in International Affairs. Archived from the original on June 12, 2022. Retrieved July 14, 2022. Suarez joined the PBS NewsHour in 1999 and was a senior correspondent for the evening news program on the PBS television network until 2013.
  559. ^ "PBS Television Broadcasts". Inside Peace. Archived from the original on June 28, 2022. Retrieved July 14, 2022. We are pleased to announce the release of Inside Peace throughout the PBS television network in the United States.
  560. ^ "Federal Funding for Public Broadcasting". WFYI. Archived from the original on November 11, 2021. Retrieved October 26, 2021.
  561. ^ "Streaming TV Services: What They Cost, What You Get". The New York Times. Associated Press. October 12, 2015. Archived from the original on October 15, 2015. Retrieved October 12, 2015.
  562. ^ "Audio and Podcasting Fact Sheet". Washington, D.C.: Pew Research Center. June 29, 2021. Retrieved July 3, 2022.
  563. ^ "BROADCAST STATION TOTALS AS OF SEPTEMBER 30, 2020" (PDF). docs.fcc.gov.
  564. ^ "History: NPR". NPR. June 20, 2013. Retrieved May 5, 2021.
  565. ^ Shaffer, Brenda (2006). The Limits of Culture: Islam and Foreign Policy. MIT Press. p. 116. ISBN 978-0-262-19529-4.
  566. ^ "Spanish Newspapers in United States". W3newspapers. Retrieved August 5, 2014.
  567. ^ "Spanish Language Newspapers in the USA: Hispanic Newspapers: Periódiscos en Español en los EE.UU". Onlinenewspapers.com. Archived from the original on June 26, 2014. Retrieved August 5, 2014.
  568. ^ "Top Sites in United States". Alexa. 2021. Archived from the original on June 21, 2020. Retrieved October 6, 2021.
  569. ^ "Similarweb Top Websites Ranking". Similarweb. January 9, 2026. Retrieved January 9, 2026.
  570. ^ "Top countries and markets by video game revenues". Newzoo. Retrieved October 28, 2025.
  571. ^ Takahashi, Dean (February 15, 2017). "The U.S. game industry has 2,457 companies supporting 220,000 jobs". GamesBeat. Retrieved July 4, 2025.
  572. ^ "California (CA)". ESA Impact Map. July 20, 2017. Retrieved December 14, 2022.
  573. ^ "Number of Devs Aged 45 or Older Has Tripled Since 2015". 80.lv. March 25, 2025. Retrieved July 4, 2025.
  574. ^ Saxon, Theresa (October 11, 2011). American Theatre: History, Context, Form. Edinburgh University Press. pp. 7–. ISBN 978-0-7486-3127-8. OCLC 1162047055.
  575. ^ Meserve, Walter J. An Outline History of American Drama, New York: Feedback/Prospero, 1994.
  576. ^ Londré, Felicia Hardison; Watermeier, Daniel J. (1998). The History of North American Theater: From Pre-Columbian Times to the Present. Continuum. ISBN 978-0-8264-1079-5. OCLC 1024855967.
  577. ^ Stephen Watt, and Gary A. Richardson, American Drama: Colonial to Contemporary (1994).
  578. ^ Staff (undated). "Who's Who". Archived December 23, 2016, at the Wayback Machine. tonyawards.com. Retrieved September 13, 2013.
  579. ^ Güner, Fisun (February 8, 2017). "How American Gothic became an icon". BBC. Retrieved March 2, 2017.
  580. ^ American folk art the art of the common man in America, 1750-1900. New York, N.Y.: The Museum of Modern Art. 1932.
  581. ^ Brown, Milton W. (1988). The Story of the Armory Show (2nd ed.). New York: Abbeville Press. ISBN 978-0-89659-795-2.
  582. ^ Davenport, Alma (1991). The History of Photography: An Overview. UNM Press. p. 67. ISBN 978-0-8263-2076-6.
  583. ^ Janson, Horst Woldemar; Janson, Anthony F. (2003). History of Art: The Western Tradition. Prentice Hall Professional. p. 955. ISBN 978-0-13-182895-7.
  584. ^ Lester, Alfred (December 6, 1993). "Letter: The Louvre: tourism on the grand scale". The Independent. Retrieved December 2, 2023.
  585. ^ "The Largest Art Museums In The World". WorldAtlas. May 30, 2017.
  586. ^ "Folk Music and Song: American Folklife Center: An Illustrated Guide (Library of Congress)". Loc.gov.
  587. ^ "Musical Crossroads: African American Influence on American Music". Smithsonian. September 22, 2016. Retrieved April 14, 2023.
  588. ^ Winans, Robert B. (1976). "The Folk, the Stage, and the Five-String Banjo in the Nineteenth Century". The Journal of American Folklore. 89 (354). American Folklore Society: 407–437. doi:10.2307/539294. JSTOR 539294.
  589. ^ Shi 2016, p. 378.
  590. ^ a b "The Invention of the Electric Guitar". Lemelson Center Studies in Invention and Innovation. Smithsonian Institution. April 18, 2014.
  591. ^ a b Biddle, Julian (2001). What Was Hot!: Five Decades of Pop Culture in America. New York: Citadel. p. ix. ISBN 978-0-8065-2311-8.
  592. ^ Stoia, Nicholas (October 21, 2014). "Early blues and country music". OUP blog. Oxford University Press.
  593. ^ "Bluegrass music". Encyclopædia Britannica. Retrieved June 19, 2020.
  594. ^ "No. 1 Bob Dylan". Rolling Stone. April 10, 2020. Retrieved January 29, 2021.
  595. ^ Funk, Clayton (August 16, 2016). "9. Neo-Expressionism, Punk, and Hip Hop Emerge". A Quick and Dirty Guide to Art, Music, and Culture. The Ohio State University.
  596. ^ "2022 Year-End Music Industry Revenue Report". Record Industry Association of America. Retrieved November 26, 2023.
  597. ^ Hennessy, Eoin (March 27, 2014). "How American Music Took Over the World". The University Times. Retrieved April 28, 2023.
  598. ^ "10 ways that Frank Sinatra changed the world". USA Today. December 8, 2015. Retrieved June 24, 2021.
  599. ^ "Universal Music can't help falling for Elvis Presley, to manage song catalog". Reuters. April 12, 2022. Retrieved April 12, 2022.
  600. ^ "Michael Jackson's 'Thriller' First Ever 30X Multi-Platinum RIAA Certification". Recording Industry Association of America. December 16, 2015. Retrieved December 17, 2021.
  601. ^ Marcos, Carlos (August 17, 2022). "Madonna has been scandalizing people for 40 years, and nobody's going to stop her". El País. Retrieved August 17, 2022.
  602. ^ "The 200 Greatest Singers of All Time". Rolling Stone. January 1, 2023. Retrieved January 2, 2023.
  603. ^ "Mariah Carey To Receive Global Impact Award At Recording Academy Honors Presented By The Black Music Collective". Grammy Awards. Archived from the original on February 2, 2024. Retrieved February 2, 2024.
  604. ^ "11 Guinness World Records Eminem Still Holds". September 12, 2017. Archived from the original on September 14, 2017.
  605. ^ a b c Edmondson 2013, p. 490.
  606. ^ "Taylor Swift and Beyoncé reporters wanted by biggest newspaper chain in US". Sky News. September 14, 2023. Archived from the original on November 9, 2023. Retrieved November 8, 2023.
  607. ^ "Global Apparel Industry Statistics (2024)". uniformmarket.com. June 19, 2024. Retrieved August 25, 2024.
  608. ^ "American Classics How seven everyday clothing items became American style staples". CNN. Retrieved December 4, 2023.
  609. ^ Caplin, John (September 1, 2021). "Made In New York: The Future Of New York City's Historic Garment District". Forbes. Retrieved December 5, 2023. Spanning just about 20 square blocks between Times Square and Penn Station along Seventh Avenue (also known as "Fashion Avenue"), the vibrant and always-busy neighborhood has a long and rich history that has become synonymous with American fashion since its inception more than a century ago.
  610. ^ "About Calvin Klein, Inc". calvinklein.us. Retrieved June 8, 2025.
  611. ^ "About US – Polo Ralph Lauren". Ralph Lauren Corporation. Retrieved June 8, 2025.
  612. ^ Juarez, Diana (October 4, 2023). "The Economic Impact of New York Fashion Week". The Fordham Ram. Retrieved December 5, 2023.
  613. ^ Bauman, Ali (May 1, 2023). "Met Gala 2023: Fashion's biggest night honors Karl Lagerfeld". CBS News. Retrieved April 30, 2024.
  614. ^ "Met Gala 2024: How to Watch Fashion's Biggest Night". Glamour. April 29, 2024. Retrieved April 30, 2024.
  615. ^ Annual Report of the Controller of the City of Los Angeles, California. ByOffice of Controller Los Angeles, CA (1914). 1914. Retrieved February 22, 2014.
  616. ^ Report of the Auditor of the City of Los Angeles California of the Financial Affairs of the Corporation in Its Capacity as a City for the Fiscal Year. By Auditor's Office of Los Angeles, CA (1913). 1913. Retrieved February 22, 2014.
  617. ^ "Nigeria surpasses Hollywood as world's second-largest film producer" (Press release). United Nations. May 5, 2009. Retrieved February 17, 2013.
  618. ^ Kerrigan, Finola (2010). Film Marketing. Oxford: Butterworth-Heinemann. p. 18. ISBN 978-0-7506-8683-9. Retrieved February 4, 2022.
  619. ^ Davis, Glyn; Dickinson, Kay; Patti, Lisa; Villarejo, Amy (2015). Film Studies: A Global Introduction. Abingdon: Routledge. p. 299. ISBN 978-1-317-62338-0. Retrieved August 24, 2020.
  620. ^ Kannapell, Andrea (October 4, 1998). "Getting the Big Picture; The Film Industry Started Here and Left. Now It's Back, and the State Says the Sequel Is Huge". The New York Times. Archived from the original on December 19, 2019. Retrieved January 19, 2023.
  621. ^ "Market Data". The Numbers. Retrieved July 11, 2024.
  622. ^ Amith, Dennis (January 1, 2011). "Before Hollywood There Was Fort Lee, N.J.: Early Movie Making in New Jersey (a J!-ENT DVD Review)". J!-ENT. Archived from the original on December 22, 2019. Retrieved January 19, 2023. When Hollywood, California, was mostly orange groves, Fort Lee, New Jersey, was a center of American film production.
  623. ^ Rose, Lisa (April 29, 2012). "100 years ago, Fort Lee was the first town to bask in movie magic". NJ.com. Archived from the original on September 29, 2018. Retrieved January 19, 2023. Back in 1912, when Hollywood had more cattle than cameras, Fort Lee was the center of the cinematic universe. Icons from the silent era like Mary Pickford, Lionel Barrymore, and Lillian Gish crossed the Hudson River via ferry to emote on Fort Lee back lots.
  624. ^ "John Landis Rails Against Studios: 'They're Not in the Movie Business Anymore'". The Hollywood Reporter. Retrieved January 24, 2015.
  625. ^ Drowne, Kathleen Morgan; Huber, Patrick (2004). The 1920s. Greenwood Publishing Group. p. 236. ISBN 978-0-313-32013-2.
  626. ^ Kroon, Richard W. (2014). A/V A to Z: An Encyclopedic Dictionary of Media, Entertainment and Other Audiovisual Terms. McFarland. p. 338. ISBN 978-0-7864-5740-3.
  627. ^ Matthews, Charles (June 3, 2011). "Book explores Hollywood 'Golden Age' of the 1960s-'70s". The Washington Post. Retrieved August 6, 2015.
  628. ^ Banner, Lois (August 5, 2012). "Marilyn Monroe, the eternal shape shifter". Los Angeles Times. Retrieved August 6, 2015.
  629. ^ Rick, Jewell (August 8, 2008). "John Wayne, an American Icon". University of Southern California. Archived from the original on August 22, 2008. Retrieved August 6, 2015.
  630. ^ Greven, David (2013). Psycho-Sexual: Male Desire in Hitchcock, De Palma, Scorsese, and Friedkin. University of Texas Press. p. 23. ISBN 978-0-292-74204-8.
  631. ^ Morrison, James (1998). Passport to Hollywood: Hollywood Films, European Directors. SUNY Press. p. 11. ISBN 978-0-7914-3938-8.
  632. ^ Seitz, Matt Zoller (April 29, 2019). "What's Next: Avengers, MCU, Game of Thrones, and the Content Endgame". RogerEbert.com. Ebert Digital LLC. Retrieved July 21, 2021.
  633. ^ Avery, Hannah (January 18, 2023). "US streaming market growth continues, despite changes in the industry". Kantar Group. Retrieved April 29, 2023.
  634. ^ "Wheat Info". Wheatworld.org. Archived from the original on October 11, 2009. Retrieved January 15, 2015.
  635. ^ "Traditional Indigenous Recipes". American Indian Health and Diet Project. Retrieved September 15, 2014.
  636. ^ Akenuwa, Ambrose (July 1, 2015). Is the United States Still the Land of the Free and Home to the Brave?. Lulu Press. pp. 92–94. ISBN 978-1-329-26112-9. Retrieved November 20, 2020.
  637. ^ Mintz, Sidney Wilfred (1996). Tasting Food, Tasting Freedom: Excursions Into Eating, Culture, and the Past. Beacon Press. pp. 134–. ISBN 978-0-8070-4629-6. Retrieved October 25, 2015.
  638. ^ Diner, Hasia (2001). Hungering for America: Italian, Irish, and Jewish Foodways in the Age of Migration. Cambridge: Harvard University Press. p. 1.
  639. ^ Poe, Tracy N. (February 1999). "The Origins of Soul Food in Black Urban Identity: Chicago, 1915–1947". American Studies International. 37 (1): 5.
  640. ^ Cawthon, Haley (December 31, 2020). "KFC is America's favorite fried chicken, data suggests". The Business Journals. Retrieved May 8, 2021.
  641. ^ Russell, Joan (May 23, 2016). "How Pizza Became America's Favorite Food". Paste. Retrieved May 8, 2021.
  642. ^ Klapthor, James N. (August 23, 2003). "What, When, and Where Americans Eat in 2003". Newswise/Institute of Food Technologists. Retrieved June 19, 2007.
  643. ^ "Our Story: CIA History | Culinary Institute of America". ciachef.edu. Retrieved October 11, 2022.
  644. ^ Averbuch, Bonnie (September 2015). "Attention Food Entrepreneurs: School's Back in Business". Food Tank. Retrieved June 19, 2017.
  645. ^ a b Brownfield, Andy (March 20, 2020). "Cincinnati restaurants ask feds for coronavirus bailout". login.research.cincinnatilibrary.org. Retrieved March 22, 2020.
  646. ^ Ramirez, Elva. "The Restaurant Industry Needs A Coronavirus Bailout. Will They Get It?". Forbes. Retrieved March 22, 2020.
  647. ^ Noguchi, Yuki (March 22, 2020). "Closed All At Once: Restaurant Industry Faces Collapse". NPR. Retrieved March 22, 2020.
  648. ^ "Restaurant industry reeling from coronavirus". MSNBC. Retrieved March 22, 2020.
  649. ^ "Restaurants". Michelin Guide. Retrieved August 30, 2023.
  650. ^ United States Department of Agriculture "Global Wine Report August 2006 Archived April 8, 2008, at the Wayback Machine", pp. 7-9.
  651. ^ Birchell, D.B.; Steel, G. (2013). New Mexico Wine: An Enchanting History. American Palate Series (in Italian). American Palate. ISBN 978-1-60949-643-2. Retrieved November 15, 2019.
  652. ^ New Mexico. Office of Cultural Affairs (1995). Enchanted Lifeways: The History, Museums, Arts & Festivals of New Mexico. New Mexico Magazine. ISBN 978-0-937206-39-3. Retrieved November 15, 2019.
  653. ^ T. Stevenson, The Sotheby's Wine Encyclopedia Fourth Edition, p. 462, Dorling Kindersly, 2005, ISBN 978-0-7566-1324-2.
  654. ^ J. Robinson, ed. The Oxford Companion to Wine, Third Edition, p. 719; Oxford University Press, 2006, ISBN 978-0-19-860990-2.
  655. ^ "The History of the American Diner". pastemagazine.com. September 5, 2016. Retrieved November 30, 2021.
  656. ^ "America's Love Of Drive-thrus". NPR. December 11, 2023. Retrieved May 4, 2024.
  657. ^ "When Was the First Drive-Thru Restaurant Created?". Wisegeek.org. Retrieved January 15, 2015.
  658. ^ Sheldon, Andrew (July 23, 2020). "The History of the Drive-Thru in America". Your AAA Network.
  659. ^ Pavlova, Rada (April 8, 2019). "Globalization of American Fast-Food Chains: the Pinnacle of Effective Management and Adaptability – The Yale Globalist". The Yale Globalist. Retrieved May 4, 2024.
  660. ^ "Sports". Gallup, Incorporated. September 25, 2007. Retrieved April 16, 2023.
  661. ^ "History of the NBA". NBA.com. Retrieved June 8, 2025.
  662. ^ "About MLB". MLB Advanced Media. Retrieved June 8, 2025.
  663. ^ "About MLS Soccer". mlssoccer.com. Retrieved June 8, 2025.
  664. ^ "About the NHL". NHL.com. Retrieved June 8, 2025.
  665. ^ Krasnoff, Lindsay Sarah (December 26, 2017). "How the NBA went global". The Washington Post. ISSN 0190-8286. OCLC 2269358. Archived from the original on December 26, 2017. Retrieved September 14, 2023.
  666. ^ Liss, Howard. Lacrosse (Funk & Wagnalls, 1970), p. 13.
  667. ^ "Global sports market to hit $141 billion in 2012". Reuters. June 18, 2008. Retrieved July 24, 2013.
  668. ^ Krane, David K. (October 30, 2002). "Professional Football Widens Its Lead Over Baseball as Nation's Favorite Sport". Harris Interactive. Archived from the original on July 9, 2010. Retrieved September 14, 2007. MacCambridge, Michael (2004). America's Game: The Epic Story of How Pro Football Captured a Nation. New York: Random House. ISBN 978-0-375-50454-9.
  669. ^ Guliza, Anthony (August 14, 2019). "How the NFL took over America in 100 years". ESPN. Retrieved May 8, 2021.
  670. ^ https://www.sportsbusinessjournal.com/Articles/2025/04/10/sources-nfl-revenue-passes-23-billion-in-latest-fiscal-year/
  671. ^ "As American as Mom, Apple Pie and Football? Football continues to trump baseball as America's Favorite Sport" (PDF). Harris Interactive. January 16, 2014. Archived from the original (PDF) on March 9, 2014. Retrieved July 2, 2014.
  672. ^ Cowen, Tyler; Grier, Kevin (February 9, 2012). "What Would the End of Football Look Like?". Grantland/ESPN. Retrieved February 12, 2012.
  673. ^ "Sports Illustrated: NCAA Reports $1.1 Billion in Revenues". Sports Illustrated. March 7, 2018.
  674. ^ "Passion for College Football Remains Robust". National Football Foundation. March 19, 2013. Archived from the original on April 7, 2014. Retrieved April 1, 2014.
  675. ^ Rosandich 2002, p. 471.
  676. ^ Schaus & Wenn 2007, p. 224.
  677. ^ "Greatest Sporting Nation". greatestsportingnation.com. Archived from the original on January 10, 2025. Retrieved April 11, 2023.
  678. ^ "1,000 times gold – The thousand medals of Team USA – Washington Post". The Washington Post.
  679. ^ Chase, Chris (February 7, 2014). "The 10 most fascinating facts about the all-time Winter Olympics medal standings". USA Today. Archived from the original on November 15, 2021. Retrieved February 28, 2014. Loumena, Dan (February 6, 2014). "With Sochi Olympics approaching, a history of Winter Olympic medals". Los Angeles Times. Retrieved February 28, 2014.
  680. ^ Carlisle, Jeff (April 6, 2020). "MLS Year One, 25 seasons ago: The Wild West of training, travel, hockey shootouts and American soccer". ESPN. Retrieved May 5, 2021.
  681. ^ Gerson, Aria (July 10, 2020). "Impact of 1999 Women's World Cup went far beyond Brandi Chastain's iconic goal". USA Today. Retrieved February 14, 2024.
  682. ^ Wamsley, Laurel (June 16, 2022). "The U.S. cities hosting the 2026 World Cup are announced". NPR. Retrieved April 16, 2023.

Sources

[edit]

</ref>

 This article incorporates text from a free content work. Licensed under CC BY-SA IGO 3.0 (license statement/permission). Text taken from World Food and Agriculture – Statistical Yearbook 2023​, FAO, FAO.

[edit]

Government

[edit]

History

[edit]

Maps

[edit]

 

 

40°N 100°W / 40°N 100°W / 40; -100 (United States of America)