‘Everyone tested positive’: Covid devastates agriculture workers in California’s heartland | The Guardian

The virus is surging in the Central Valley, where hundreds of thousands labor in the food industry. Workers say companies did little to prevent the spreadAcross California’s Central Valley, hundreds of thousands of workers wash the vegetables, debone the meat, sort the nuts and package the produce that finds its way into kitchens throughout the United States.When the coronavirus hit, their work was ruled essential, so they kept working in the often cramped facilities that fuel a state industry that exports $21bn in agricultural products each year. Continue reading…

The virus is surging in the Central Valley, where hundreds of thousands labor in the food industry. Workers say companies did little to prevent the spread

Across California’s Central Valley, hundreds of thousands of workers wash the vegetables, debone the meat, sort the nuts and package the produce that finds its way into kitchens throughout the United States.

When the coronavirus hit, their work was ruled essential, so they kept working in the often cramped facilities that fuel a state industry that exports $21bn in agricultural products each year.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more