The IRE Resource Center is a major research library containing more than 27,000 investigative stories.

Most of our stories are not available for download but can be easily ordered by contacting the Resource Center directly at 573-882-3364 or where a researcher can help you pinpoint what you need.

Search results for "computer security" ...

  • Countdown to Zero Day: Stuxnet and the Launch of the First Digital Weapon

    In 2010, computer security researchers discovered a mysterious virus/worm infecting computers in Iran. At first, they believed the malicious code was a simple, routine piece of malware. But as they and other experts around the world dug into the code, they found that it was a virus of unparalleled sophistication and complexity. They had, they soon learned, stumbled upon the world’s first digital weapon. Stuxnet, as it came to be known, was unlike other viruses and worms built before because rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to physically destroy equipment the computers controlled. Stuxnet had been designed and launched to destroy centrifuges used in a uranium-enrichment plant in Iran in order to set back the Islamic Republic's nuclear program and prevent it from producing a nuclear weapon.
  • Computer Security Faults Put Boeing at Risk

    This package reveals Boeing's struggles with Sarbanes-Oxley compliance in its information technology department. For the past three years, Boeing has failed, in both internal and external audits, to prove it can properly protect its computer systems against manipulation, theft and fraud. These concerns were not shared with shareholders.
  • Cybercrime

    This series provides "one of the first in-depth looks at how the online criminal community operates and how law enforcement moles are used to ensnare them, using sometimes questionable methods that allow many crimes to flourish under the watch of law enforcement agents and go unpunished."
  • Bugs on the Border

    The Department of Homeland Security's screening for foreign nationals entering the U.S. was crippled for about five hours due to a computer security failure. However, they claimed that the problem was a result of glitches, not a virus although a Morocco-born computer worm had actually been the cause of the computer failure. It entered the system when government administrators had delayed installing a security patch. “The stories provided a concrete example of the management issues and technical problems surrounding US-VISIT – a lynchpin of the United States’ border protection efforts.”
  • Cybercrime Inc.

    With increased on-line banking and money transactions comes an increase in cyber-crime. This comes from putting more emphasis on user convenience instead of security. Part of the increase in cyber-crime is also due to meth traffickers, adept at operating localized theft rings, joining forces with global cyber-crime rings. Also some groups, such as those in Russia, are making ordinary citizens unknowing mules to carry out reshipment and money laundering schemes. Law enforcement has been spotty due to cross-jurisdictional hurdles.
  • Security Cracks at the White House, Should Ultrak Guard Nuclear Labs?

    Insight reports on problems with a computer security system installed at the White House in 2001. The stories reveal that the system had once been down for a day; had not been tested but the factory before being installed; frequently gives inaccurate information about White House guests. A major finding is that security system lead contractor, Ultrak, Inc., has been taken over by Niklaus Zenger of Switzerland, who has ties to the Russian military.
  • Cyberspace Invaders

    Hackers and computer viruses can trash your computer or use it to attack banks, insurance companies, power plants, and other institutions. Here's how to stop them.
  • U.S. Government Hysteria In Computer Security reports on the U.S. government's "panicked approach" to computer security before and after September 11th, 2001. The articles look at "plagiarism and other shenanigans" in the FBI's National Infrastructure Protection Center, the role of the National Security Council in giving computer virus technology to the Chinese government, an examination of the attempt to limit FOIA in the name of computer security, and an effort to keep the trials of hackers away from public scrutiny.