The IRE Resource Center is a major research library containing more than 27,000 investigative stories.
Most of our stories are not available for download but can be easily ordered by contacting the Resource Center directly at 573-882-3364 or email@example.com where a researcher can help you pinpoint what you need.
Search results for "big tech" ...
Congress and federal regulators do very little to police Amazon, Facebook and other big technology platforms that dominate the global economy and modern life. The companies say it's not their responsibility to protect consumers from online hazards, due to carve-outs in federal law for digital platforms. The Wall Street Journal investigated the many ways tech companies are passing on that responsibility—and the potential risks—to unwitting consumers. The Journal's reporting stopped Facebook from collecting sensitive personal data including users' menstrual cycles and heart rates; alerted parents to the lack of vetting for prospective nannies with police records including child abuse, sexual assault and murder; and forced Amazon to remove thousands of federally banned and unsafe products including toys with dangerous levels of lead.
Cybercrime, Inc.; Meth addicts' other habit: Online theft; Cyber safecrackers break into online accounts with ease; This little fob could foil a cyber bank robber; Net crooks con Americans into web of crime; Unprotected PCs can be hijacked in minutes; The rise of zombie computers -- Are hackers using your PC to spew spam and steal?; Tech industry has no unified defense systemThese USA Today reporters set out to delineate the underlying economic drivers of cyber crime. On Sept. 8, 2004, Achohido and Swartz were the first to comprehensively describe how cyber crooks systematically took control of millions of home computers, turning them into zombies to carry out various fraud schemes. An accompanying cover story took big tech suppliers to task for placing an unfair burden on consumers for keeping the Internet safe. A November 30 story reported the results of a honey pot test -- designed and overseen by the reporters -- showing how simply connecting a new PC to the Internet triggers nonstop break-in attempts by intruders. They also outlined what readers can and should do to protect themselves. These findings were only the beginning of their investigation.