HealthEquity’s Negligence Leaks 4.3 Million Customers’ Private Information

A breach of 4.3 million individuals’ personal and medical data is mind boggling. This is the central and most damning allegation in a lawsuit filed on August 6, 2024, against HealthEquity, Inc., a Health Savings Account (HSA) administrator based in Draper, Utah. Attackers exploited deficiencies in HealthEquity’s security systems as early as March 2024, ultimately compromising confidential information that included names, addresses, Social Security numbers, phone numbers, details of dependents, and even payment card data for many account-holders. By the time HealthEquity completed its forensic investigation on June 10, 2024, an enormous trove of private information—PII (personally identifiable information) and PHI (protected health information)—had allegedly fallen into unauthorized hands.

The legal complaint contends that HealthEquity not only failed to protect this data but also delayed informing victims of the breach. This alleged delay prevented millions from immediately safeguarding their identities and finances. People who entrusted HealthEquity with the administration of their healthcare and financial well-being—essentially the means to pay medical bills and manage one’s physical and fiscal health—were blindsided upon learning that a malicious incursion had potentially laid bare their most sensitive private details.

Why do data breaches of this scope happen so frequently in today’s world of late stage capitalism? Corporations operating in deregulated or lightly enforced environments have minimal external pressure to maintain top-tier security. For HealthEquity, the lawsuit highlights a critical question: Did the company’s alleged focus on profit-maximization cause it to neglect robust cybersecurity measures? The plaintiffs claim that HealthEquity was fully aware of the importance—and vulnerability—of such sensitive data but proceeded with insufficient protections, effectively exposing millions to identity theft, financial fraud, and harm to personal privacy.

This piece delves into the complaint’s allegations and places them within a broader debate about corporate accountability, corporate social responsibility, and the everyday realities of corporate ethics under modern capitalism. We will walk through how the lawsuit depicts HealthEquity’s alleged misconduct and connect those events to systemic patterns of corporate greed and corporate corruption. The investigative narrative unfolds in eight sections, from the initial revelation of the data breach (and its shocking scope) to the systemic failures that arguably enable repeated corporate wrongdoing. We will explore the alleged “playbook” of obfuscation and delayed response, the economic fallout for ordinary people, the role of regulators, and the sometimes feeble attempts at damage control.


2. Corporate Intent Exposed

In the lawsuit, Jennifer Keane v. HealthEquity, Inc., the plaintiff contends that HealthEquity’s “mission to ‘save and improve lives by empowering healthcare consumers’” rang hollow once 4.3 million individuals’ personal data was exposed. The complaint describes an intrusion discovered by HealthEquity’s internal systems around March 25, 2024—referred to as a “system anomaly.” A thorough forensic investigation, the lawsuit alleges, did not even conclude until June 10, 2024. By then, unauthorized actors had already sifted through countless files containing deeply private data.

The magnitude of this breach indicates a larger problem: HealthEquity’s alleged disregard for or underestimation of cybersecurity obligations. The complaint states that the data stolen may have included names, addresses, phone numbers, Social Security numbers, employee IDs, and even the personal details of dependents. This expansive set of information holds high value on the black market, particularly Social Security numbers and health-related information, which identity thieves can monetize in myriad ways—from illegal medical billing to fraudulent accounts and insurance claims.

What suggests corporate intent is that HealthEquity apparently knew—or should have known—how high-stakes this data was. HealthEquity collects fees from millions of customers precisely because it offers a service to manage sensitive financial and medical transactions. Yet, despite that role, the complaint alleges that HealthEquity “failed to adequately protect” that very data. The suit points to the time lag between the initial discovery of the data anomaly (March 25, 2024) and HealthEquity’s final admissions. While HealthEquity reported this infiltration to the Maine Attorney General’s Office on June 26, 2024, many impacted individuals still did not receive formal notification for weeks, or so the complaint maintains.

In an era of repeated cybersecurity incidents, large corporations have no excuse for lacking robust defenses. Failure to adopt the recommended layers of encryption, intrusion detection, and employee training can be seen as a byproduct of corporate greed—the alleged saving of resources at the expense of consumer protection. The plaintiffs posit that the company’s attention was apparently directed more toward its core business expansions than the administrative overhead needed to fortify cybersecurity.

The lawsuit also highlights the emotional and physical harm such data exposure can cause. Consumers trust that an HSA administrator will not only handle their money but also safeguard their personal health data. It is not just a credit card number at stake; it’s entire medical histories—potentially detailing preexisting conditions, mental health treatments, or other data that can be exploited for targeted scams or used in identity theft. In the bigger picture, this places the alleged wrongdoing squarely within critiques of corporations’ dangers to public health. If the data can be used to wrongfully obtain medical services, victims face billing nightmares and possible misdiagnoses when incorrect information seeps into their medical files.

Hence the suspicion of “corporate intent,” or at least corporate negligence so severe that it verges on recklessness. While HealthEquity has not publicly admitted any wrongdoing, the complaint’s narrative links the data vulnerability to a combination of carelessness, delayed reaction, and inadequate system monitoring—pointing to an underlying organizational culture that might have deprioritized cybersecurity. Even if it wasn’t malicious, the complaint insinuates that HealthEquity’s quest for growth and profit overshadowed its obligations to safeguard the very data it was entrusted to protect.


3. The Corporate Playbook / How They Got Away with It

In the realm of modern corporate scandals, there’s a familiar pattern—often referred to as the “corporate playbook”—that emerges in data breach cases. The plaintiff’s complaint against HealthEquity provides a classic example:

  1. Gathering Personal Information Under a Veil of Trust
    HealthEquity, as an HSA provider, collects extensive personal and financial data from customers under the premise of helping them manage medical expenses. Employees and individuals are often required to share Social Security numbers, addresses, and other personal data to open these accounts. At the outset, customers have little choice but to trust that HealthEquity’s data protection meets industry standards.
  2. Underinvestment in Security
    HealthEquity did not devote adequate resources to encryption, real-time intrusion detection, or regular system audits. Though the company’s website touts a commitment to privacy and security, the complaint presents this as a largely performative posture rather than a robust, tested system of defense. This underinvestment is a hallmark of cost-cutting strategies under neoliberal capitalism: devoting minimal funds toward intangible goals like cybersecurity, in favor of profitability or other shareholder-friendly expenditures.
  3. Delayed Discovery and Disclosure
    The complaint states that HealthEquity first noticed the breach on March 25, 2024, but only publicly acknowledged it on June 26, 2024, when it notified Maine’s Attorney General. Meanwhile, the final stage of its own internal forensics ended June 10. Such timelines are not unusual. Corporations often cite the need to complete an “internal investigation” before providing specifics. Yet, from the consumer perspective, those are crucial weeks or months in which unauthorized hackers can exploit the data, while victims are left unaware and thus less able to take protective measures such as freezing credit reports or monitoring unusual health insurance claims.
  4. Opaque Public Statements
    Although HealthEquity’s direct communications are not quoted in detail in the complaint, the suit does reference that many victims only learned of the breach through official attorney general notifications or from the media, long after the infiltration was detected. This echoes other data breach cases where official corporate statements minimize the scope, blame “sophisticated hackers,” and avoid explicit admissions of fault.
  5. Legal Maneuvers to Avoid Full Liability
    Often, as the complaint suggests, corporations rely on disclaimers or attempt to deflect accountability by saying they offered 12 months of free credit monitoring—once it’s far too late to prevent the initial wave of identity theft. Plaintiffs see this response as grossly inadequate, because identity thieves may wait years to exploit stolen personal information. Social Security numbers, in particular, do not expire.

In “how they got away with it,” the complaint asserts that HealthEquity might have effectively assumed it could manage the breach’s aftermath with PR statements and small-scale restitution. Indeed, from a purely financial standpoint, some companies treat potential data breach settlements as a cost of doing business, rather than a plea to invest in rigorous cybersecurity. This underscores the cynicism critics such as myself attribute to corporate greed: corporations weigh the potential liability from lawsuits or regulatory fines against the recurring investment in top-tier security. If the latter seems more expensive, or less urgent, corners may be cut.

Historically, major data breaches follow a predictable aftermath: swift class-action filings, potential settlement negotiations, a few headlines in the business press, and then the matter fades. For the victims, however, the damage can linger for decades, with identity theft, compromised tax returns, or invasive use of personal health data. Thus, from the perspective of the plaintiffs, HealthEquity’s alleged “playbook” effectively allowed them to downplay the risk, while reaping profits from a business model that depends heavily on collecting intimate consumer data.


4. The Corporate Profit Equation

One cannot assess a major data breach and the alleged resulting harms without asking how these events fit into the broader corporate profit equation. An HSA administrator like HealthEquity operates in a financial services sphere intricately tied to healthcare. This is an industry with potentially high profit margins, especially if the company can cut corners on administrative overhead. Cybersecurity is typically viewed as an overhead expense—necessary but not directly revenue-generating.

Under neoliberal capitalism, short-term profit-maximization frequently influences corporate spending. The lawsuit strongly suggests that HealthEquity, even while boasting billions in managed HSA assets, neglected to invest proportionately in cybersecurity. The complaint presents a scenario in which the cost of robust encryption, real-time threat monitoring, and frequent third-party security audits may have been deemed burdensome. Instead, the complaint posits that HealthEquity assumed it could function effectively with minimal risk of a crippling breach—until reality struck.

For consumers, this approach can have dire consequences:

  • Immediate Financial Loss: The stolen data can lead to fraudulent tax returns, unauthorized credit lines, or bank account takeovers. Victims may lose money directly or devote hours in phone calls and legal processes to dispute fraudulent transactions.
  • Medical Identity Theft: Because PHI was allegedly leaked, criminals can file claims under a stolen identity or access medical services, all of which might cause victims to be saddled with medical bills or compromised medical records.
  • Erosion of Trust: A health savings account is meant to be a safe store of pre-tax funds designated for medical expenses. If the account’s safety is compromised, or if the administration is allegedly negligent, the entire premise of facilitating healthcare finances is undermined.

Why do we call it a “corporate profit equation”? Because from a purely financial viewpoint, cybersecurity can appear discretionary. Often, a firm’s leadership might weigh the potential exposure of a lawsuit (and probable settlement size) against the annual cost of maintaining best-in-class data security. In industries where regulatory capture or lax enforcement is perceived, the math may tilt toward saving money. The system essentially incentivizes the externalization of costs. Consumers and employees bear the brunt of identity theft and personal losses, while the company might pay a fraction of its revenue in legal fees or settlements.

Such an equation fosters wealth disparity: top executives might enjoy bonuses and high compensation tied to cost containment, while rank-and-file employees or, here, millions of unsuspecting customers, face the risk of personal data exploitation. The complaint underscores that HealthEquity’s customers provided their sensitive information with the assumption that basic privacy would be maintained. Yet if HealthEquity truly put cost-saving over robust data protections, it underscores a tension within corporate social responsibility: how to reconcile the duty to protect consumers with the relentless drive for profit.

In the immediate aftermath of a data breach, the corporation might face stock dips or reputational hits, but these shocks are often temporary. Over time, if no catastrophic legal penalty ensues—and if regulators apply only mild pressure—corporations can resume business as usual. This cycle may have informed HealthEquity’s approach, essentially underestimating the ramifications of a breach or trusting that standard PR and legal responses would suffice. If true, it exposes a structural issue: the interplay of corporate greed and minimal regulatory oversight stands to repeatedly endanger consumers’ financial and medical security.


5. System Failure / Why Regulators Did Nothing

At first glance, it would seem that after repeated large-scale data breaches in recent years, the regulatory apparatus—at both state and federal levels—would be well-oiled and proactive. Yet in the HealthEquity case, as with many other data leaks, the lawsuit contends that there was a pronounced delay before individuals knew their data had been compromised. The lawsuit also does not reference any immediate or forceful interventions by government entities to curtail damage. How does this happen?

  1. Patchwork of Laws
    Data privacy legislation in the United States remains fragmented. A handful of states have robust consumer protection statutes requiring timely notice, and it was indeed the Maine Attorney General’s office that eventually publicized HealthEquity’s breach notification. But no single, comprehensive federal data breach notification law exists. The Federal Trade Commission (FTC) can step in under Section 5 of the FTC Act if a company engages in “unfair or deceptive practices,” but the FTC typically responds after the fact.
  2. Reliance on Self-Reporting
    Many data breach laws rely on corporations to self-report security incidents. HealthEquity “discovered” a “system anomaly” on March 25, 2024. Yet the final public acknowledgement only came in late June. During that interval, it appears the standard rationale was that HealthEquity needed time for an internal forensic investigation. Meanwhile, the complaint posits that countless individuals were left in the dark, as potential identity thieves had free rein.
  3. Regulatory Capture and Resource Constraints
    Large, financially influential companies can exert direct or indirect influence on the crafting and enforcement of regulations—regulatory capture. Even where regulators intend to be vigilant, they may lack resources to handle a data breach of this scale. The complaint underscores that 4.3 million individuals in multiple states were affected, meaning multiple state attorney generals would have overlapping jurisdiction. Each office is inundated with data breach notifications from corporations operating across the nation, straining these agencies’ ability to act swiftly and decisively.
  4. Focus on Notification Instead of Prevention
    The complaint references federal and state requirements for timely breach notifications, but says little about any direct enforcement that ensures companies adopt preventive measures. Essentially, data security laws often hinge on corporate self-policing. If a company’s “in-house” legal or compliance department decides that recommended security upgrades are optional or too expensive, regulators rarely find out until after a breach occurs.
  5. Legal Gaps and Grace Periods
    Even in states with strong consumer protection laws, there may be ambiguous grace periods between discovering a breach and disclosing it. Companies often exploit these windows to manage internal communications and spin the event. The complaint indicates that HealthEquity followed the standard approach: investigating quietly, finalizing the breach scope, and only then submitting official notifications—months after the initial compromise.

This pattern fosters the kind of “system failure” alleged in the lawsuit. Individuals might assume that storing personal health data with a regulated HSA administrator ensures top-notch security. The reality can be quite different if enforcement is inconsistent and if the legal framework prioritizes corporate autonomy under neoliberal capitalism. Many corporations have more lobbying power than the general public, giving them the capacity to shape minimal regulation or ensure that enforcement remains sporadic.

For the 4.3 million who might now face years of heightened identity theft risk, it is cold comfort to see that their personal fiasco is part of a recognized, recurring phenomenon. Only if the lawsuit leads to significant court findings or a stiff regulatory penalty might the system consider adopting stronger baseline standards. Yet those changes often come too late for those whose private information is already sold, shared, or exploited. The complaint warns that identity thieves may wait months or years to strike, meaning the harm might still be forthcoming for many victims.

Ultimately, this dynamic—companies controlling the timeline of breach disclosure with minimal pushback—embodies the very definition of system failure. The lawsuit’s claims stand as a testament to why many consumer advocates continue to call for more stringent oversight, not merely after a breach has occurred, but at the front end, forcing corporations to implement bulletproof data protocols when they initially gather sensitive information from the public.


6. This Pattern of Predation Is a Feature, Not a Bug

In repeated data breach cases, we can see a recurring narrative: a major entity suffers a hack; it later discloses the breach months after the damage is done; and consumers are left to contend with potential fraud, identity theft, or personal humiliation.

Why a feature? Because the logic of the marketplace, under many forms of capitalism, can reward cost-saving over thorough risk management. Some specifics:

  1. Externalizing Cybersecurity Costs
    A robust security posture is expensive. It requires continuous software updates, audits by specialized firms, staff training, response drills, and more. Companies might prefer to channel funds into expansions, marketing, or new product lines that grow revenue more visibly. Meanwhile, the cost of a data breach—victimized customers dealing with identity theft—falls largely on individuals, not on the corporate bottom line, at least not in a direct, day-to-day sense.
  2. Minimal Short-Term Financial Consequences
    Some corporations have concluded that even if a data breach occurs, the resulting class action lawsuit settlements or regulatory fines might be manageable and overshadowed by the broader profitability. The lawsuit highlights that the 4.3 million people harmed by HealthEquity’s alleged negligence stand to spend hours, months, or years securing their identities, while HealthEquity’s major financial impetus might remain relatively unscathed if the settlement is a fraction of its annual revenue.
  3. Systemic Normalization
    In the last decade, from massive retail data breaches to healthcare fiascos, the public has grown somewhat desensitized. Each new breach draws headlines, but systemic reforms remain slow. The cost in brand damage has proven ephemeral for many corporations; the news cycle moves on. Consequently, corporate boards might see data breaches as normal business hazards—unfortunate but not existentially threatening—leading to complacency.
  4. Predatory Practices as Standard
    “Predation” here refers to reaping profits while imposing hidden risks on unsuspecting people. Under an unbridled market logic the impetus to protect customers is overshadowed by the impetus to cut corners and maximize returns. With regulatory frameworks that do not forcibly ensure robust safeguards, or that allow voluntary compliance, the system effectively greenlights substandard data defenses.

In the HealthEquity lawsuit, the plaintiffs frame the data breach in precisely these terms—not as an isolated mishap but as a symptom of a larger phenomenon: corporate cost-minimization that disregards the fundamental rights and welfare of those served. The complaint underscores that customers had no bargaining power to demand safer systems; they had to trust HealthEquity’s assurances. By painting the picture of 4.3 million individuals’ personal and financial details slipping out of secure channels, the lawsuit signals that such “predation” is inevitable absent structural changes.

To the extent that data is now the “new currency” in a digitized world, the stakes could not be higher. If corporations treat data security as an afterthought or a dispensable overhead item, the pattern of large-scale consumer harm is bound to repeat. This cyclical pattern goes hand in hand with corporate corruption, or at least negligence, fueled by a system that prioritizes profits over thorough safety measures. The complaint aims to dismantle the notion that the breach is a random anomaly, offering a window into how repeated, destructive data breaches are “features” of an environment that does not heavily penalize them.


7. The PR Playbook of Damage Control

When a corporation experiences a data breach, the next stage often involves a well-worn routine of public relations crisis management. The lawsuit against HealthEquity does not provide a verbatim timeline of all corporate statements, but the broader context of data breaches reveals typical patterns that ring true here:

  1. Minimization of Impact
    Corporations frequently open with statements claiming that “no evidence of actual identity theft” has been found yet, or that the breach “affected only a small portion” of data. Meanwhile, the real scope might remain uncertain. In the HealthEquity matter, the complaint states that 4.3 million people were actually affected, an astonishingly large cohort. The tension between initial statements of “We have it under control” and the subsequent admission of a multi-million-person breach is not unusual.
  2. Emphasis on Complexity of the Hack
    Many companies label hackers “sophisticated” or “highly targeted,” implying that no data security system could have been 100% foolproof. While the complaint does not quote HealthEquity directly using these phrases, the plaintiffs suggest that the infiltration may have been enabled by substandard security measures—an entirely different story than a zero-day exploit performed by advanced foreign state actors.
  3. Delay and Drip-Feeding Information
    Often, the PR strategy is to release limited details early on, citing ongoing investigations, then provide incremental updates if public or regulatory pressure mounts. The complaint indicates that HealthEquity discovered anomalies in late March but only officially acknowledged the scope of the hack in late June. From the vantage point of consumers, these delays hamper timely protective measures (e.g., credit freezes, password changes). For the company, the measured release of information can manage reputational damage more effectively.
  4. Offering Free Credit Monitoring
    A go-to approach post-breach is for the company to offer a year or two of free credit monitoring or identity protection. This is a perfunctory gesture and hardly sufficient. Identity thieves may exploit Social Security numbers many years after a breach. Moreover, medical identity theft can occur months or even years later. The lawsuit hammers home the notion that such quick fixes rarely compensate for the emotional distress or the future insecurity victims face.
  5. Highlighting Ongoing Improvements
    Once cornered by public pressure, companies typically vow to invest in enhanced security. Yet unless forced by legal or regulatory settlement, they may not reveal the budget or specifics. In the short run, these statements serve to reassure stakeholders while the fundamental question remains: Why wasn’t robust security in place earlier?

The complaint underscores that for victims, corporate PR gestures are cold comfort. Individuals can endure endless frustration when setting up new bank accounts, disputing unauthorized charges, or clearing fraudulent medical claims. Meanwhile, the corporation’s stated commitment to corporate social responsibility can ring hollow. The cycle of “admit minimal wrongdoing, pay for credit monitoring, move on” has become so entrenched that some cynics see it as part of the cost-benefit analysis.

What emerges from these repeated patterns is a sense of corporate accountability that is largely self-styled and primarily oriented toward external appearances. If a brand recovers quickly in the media, the impetus to enact deep security reforms might evaporate once public attention shifts elsewhere. In that regard, the complaint’s accusations aim to break through the typical damage control narrative, painting a more urgent picture of how 4.3 million individuals face a real, ongoing threat of identity theft and deception. By filing suit, the plaintiffs effectively demand more than a PR pledge—seeking a formal judicial or regulatory resolution that acknowledges the breach’s seriousness and compels actual, long-term remedies.


8. Corporate Power vs. Public Interest

The final question the lawsuit stirs is whether the power of large corporations like HealthEquity effectively eclipses the public interest. Even though HealthEquity is hardly a household name on par with global tech titans, it wields considerable influence in the specialized domain of health savings account administration. Millions rely on HSAs to reduce medical costs, an integral pillar of personal healthcare finance in the United States. Indeed, the lawsuit underscores how deeply enmeshed HealthEquity is in people’s day-to-day lives: it handles the money used to pay for surgeries, prescriptions, and doctors’ visits.

Yet the same corporate structures that gather and centralize these vast data sets can do so without sufficiently robust accountability. Corporate corruption need not always appear as bribes or explicit conspiracies; in a system shaped by neoliberal capitalism, it can manifest simply as cost-saving measures that ignore the fragility of personal data. Victims, scattered across multiple states, each lose only a modicum of direct monetary value at first—an unauthorized credit card charge here, a stolen identity there—while the overall collective harm may be enormous.

Wealth disparity can intensify the impact. Many households with HSAs are middle-class or lower-income families striving to reduce healthcare costs. They lack the resources to engage in prolonged disputes with banks, credit agencies, or identity thieves. Meanwhile, corporations can hire legal teams and public relations experts to mitigate blame. The complaint highlights how plaintiffs have spent hours dealing with credit monitoring and anxiety, an ongoing emotional burden that rarely factors into standard damage calculations.

This conflict—corporate power vs. public interest—plays out in the legal system. The class action suit is one of the few remedies that enables millions of individuals to stand on somewhat equal footing with a well-capitalized defendant. But even class action litigation can become protracted. Settlements might be negotiated behind closed doors, and settlement amounts may barely compensate for the intangible disruptions victims experience.

At a deeper level, the case underscores the role of corporate ethics in safeguarding public health. The data stolen in this breach was not just about finances; it was intimately tied to medical records and health coverage. A person’s medical journey might become compromised if identity thieves use stolen data to undergo treatments in someone else’s name. If billing confusion arises, victims can face withheld health services due to incorrect insurance records. The potential consequences go well beyond financial inconvenience.

Proponents of stronger regulation say that corporate power must be checked by mandatory minimum security standards, routine audits, and meaningful penalties that truly deter data mishandling. Opponents argue that the free market can self-regulate, and that consumer class actions suffice as a deterrent. The HealthEquity case, however, typifies how reactive that approach can be. By the time the lawsuit comes, harm is already done.


📢 Explore Corporate Misconduct by Category

🚨 Every day, corporations engage in harmful practices that affect workers, consumers, and the environment. Browse key topics:

💡 Explore Corporate Misconduct by Category

Corporations harm people every day — from wage theft to pollution. Learn more by exploring key areas of injustice.

NOTE:

This website is facing massive amounts of headwind trying to procure the lawsuits relating to corporate misconduct. We are being pimp-slapped by a quadruple whammy:

  1. The Trump regime's reversal of the laws & regulations meant to protect us is making it so victims are no longer filing lawsuits for shit which was previously illegal.
  2. Donald Trump's defunding of regulatory agencies led to the frequency of enforcement actions severely decreasing. What's more, the quality of the enforcement actions has also plummeted.
  3. The GOP's insistence on cutting the healthcare funding for millions of Americans in order to give their billionaire donors additional tax cuts has recently shut the government down. This government shut down has also impacted the aforementioned defunded agencies capabilities to crack down on evil-doers. Donald Trump has since threatened to make these agency shutdowns permanent on account of them being "democrat agencies".
  4. My access to the LexisNexis legal research platform got revoked. This isn't related to Trump or anything, but it still hurt as I'm being forced to scrounge around public sources to find legal documents now. Sadge.

All four of these factors are severely limiting my ability to access stories of corporate misconduct.

Due to this, I have temporarily decreased the amount of articles published everyday from 5 down to 3, and I will also be publishing articles from previous years as I was fortunate enough to download a butt load of EPA documents back in 2022 and 2023 to make YouTube videos with.... This also means that you'll be seeing many more environmental violation stories going forward :3

Thank you for your attention to this matter,

Aleeia (owner and publisher of www.evilcorporations.com)

Also, can we talk about how ICE has a $170 billion annual budget, while the EPA-- which protects the air we breathe and water we drink-- barely clocks $4 billion? Just something to think about....

Evil Corporations
Evil Corporations

Articles written by me are actually written by many different people! We include writers from the legal field, tech, and people who study political theory. Especially people who study political theory.... that makes up about 90% of the guest writers here. If you also want to contribute to this website, then head on over to the Evil Corporations contact page and send over your interest!

Articles: 727