Atlanta knew its IT systems were insecure for months

A CBS46 investigation found that the City of Atlanta was warned months before the recent cyber attack in an internal audit that their IT systems contained a “large number of severe and critical vulnerabilities.” “In the 41-page audit, the city was told last summer their IT department was on life support, and there was basically…

Read more »

Millions of people post comments on federal regulations. Many are fake.

A Wall Street Journal investigation found thousands of fraudulent comments on the dockets of several federal agencies. Some appear to use stolen identities. After surveying nearly 1 million email addresses —predominantly those associated with comments on an FCC proposal on net neutrality – the Journal found nearly 7,800 people who said that fake comments were…

Read more »

Police say encryption technology makes it difficult for law enforcement to complete investigations

An investigation by Scripps News Washington Bureau and the Toronto Star explores how American and Canadian law enforcement are being locked out of digital information due to encryption on phones. Companies like Apple and Google have built encryption into their products, making it impossible for anyone to get in without a password, even with a…

Read more »

Election problems pile high in Ohio

A joint investigation by Politico and The Center for Public Integrity explored the legal and technical problems that could complicate the 2016 election. Ohio is a state crucial to both parties’ electoral math, but it also exemplifies the worst trends in American elections. All but four of Ohio’s 88 counties use voting machines purchased in 2006…

Read more »

Police secretly track cellphones to solve routine crimes

In one case after another, USA TODAY found police in Baltimore and other cities used the phone tracker, commonly known as a stingray, to locate the perpetrators of routine street crimes and frequently concealed that fact from the suspects, their lawyers and even judges. In the process, they quietly transformed a form of surveillance billed as…

Read more »

Security camera feeds at schools, jails easily accessible to the public

Hundreds of thousands of security camera feeds could be open to anyone with an Internet browser, according to a Scripps national investigation. Scripps found schools, jails and stores all with easily accessible video feeds. A security researcher interviewed as part of the investigation reported that three out of four cameras he studied were not secure.…

Read more »

Data breach mystery leads from Arizona counterterrorism site to China

Lizhong Fang, a Chinese national and computer programmer, had access to a variety of sensitive information during his short time at the Arizona Counter Terrorism Information Center in Phoenix. His work on facial recognition software allowed him to view the Arizona driver’s license database as well as law enforcement records. Fang disappeared in 2007, and…

Read more »

Extra Extra Monday: Accident reports, deportations and school finances

Jail Crunch | Organized Crime and Corruption Reporting Project OCCRP reporters filed freedom of information requests to prison authorities across Eastern Europe. The interactive visualization is a compilation of the data received from each prison authority, organized to demonstrate similarities and differences between prison demographics and crime categories across the region. OCCRP journalists conducted dozens of…

Read more »

US secretly built ‘Cuban Twitter’ to stir unrest

The Associated Press reports that the U.S. Agency for International Development was behind the creation of a “Cuban Twitter,” a social network designed to undermine the communist government and push Cubans toward dissent. The project – called ZunZuneo – drew tens of thousands of subscribers in the more than two years in operated. American contractors…

Read more »