The Enron Mark to Market Accounting Scheme

Budgeting and Planning: Why Is It So Important?

What was the Enron mark to market accounting method that lead to the company’s downfall? Why did they use these schemes? The Enron mark to market accounting method may not have been illegal, but were certainly unethical. Enron mark to market accounting mislead investors and allowed Enron to continue operating on a budget that didn’t exist. Find out what Enron accounting practices contributed to Enron’s collapse.

The 4th Amendment: Justifying Mass Surveillance

The 4th Amendment: Justifying Mass Surveillance

What is the 4th Amendment of the US Constitution? What is the relationship between the NSA and the 4th Amendment? How is the Constitutional language interpreted to apply to mass surveillance? The 4th Amendment of the Constitution protects you from the government searching or taking your stuff without permission. Data and digital information is less clearly protected and Fourth Amendment surveillance rules are still evolving. Read more about the NSA and the 4th Amendment, including how the intelligence agency interprets Fourth Amendment surveillance protections.

STELLAR WIND: Snowden, Surveillance & Secrets

STELLAR WIND: Snowden, Surveillance & Secrets

What is Operation STELLAR WIND? How did Edward Snowden discover STELLAR WIND? What were the implications of this program? STELLAR WIND is a program that was used to carry out mass surveillance, otherwise known as “bulk collection” of information. Used by the NSA, STELLAR WIND was conducting surveillance without a warrant. Learn more about the NSA, STELLAR WIND, and Snowden’s discovery of mass surveillance.

The Snowden Effect: How Did the Leak Change Cybersecurity?

The Snowden Effect: How Did the Leak Change Cybersecurity?

What is the Snowden effect? What were the consequences of whistleblowing? How did cybersecurity change because of the Snowden effect? The Snowden effect is the impact of Snowden’s leak on cybersecurity and society. Because of the leak by Snowden, consequences included more discussion, litigation, and legislation. Read more about the Snowden effect on cybersecurity and the work that remains to be done.

Edward Snowden: Stolen NSA Files Prove His Story

Edward Snowden: Stolen NSA Files Prove His Story

How did Snowden get access to NSA documents? Were the Snowden files that were leaked stolen? What technology was used to access and organize the information? For Snowden, files were critical to bring to journalists when he blew the whistle. For Edward Snowden, documents separated his story from any internet conspiracy theorist. Read more about Edward Snowden, files taken from the NSA, and the lengths Ed went to in order to not get caught.

Edward Snowden’s Book: How He Became a Whistleblower

Edward Snowden’s Book: How He Became a Whistleblower

What is discussed in the Snowden book? Does the Edward Snowden memoir explain why Edward Snowden chose to blow the whistle? Are there any major revelations in the Edward Snowden memoir? Permanent Record is the Edward Snowden book that is a memoir of his life and career. The Snowden book also provides insight into why he decided to leak and how he went about getting the files. Read more about Permanent Record, Edward Snowden, and the perspective he offers.