GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Find Government Content

Browse over one thousand government and military-related white papers, eBooks, case studies, infographics and data sheets.

Search by topic, agency, keyword, and more to find government-related content that explores the challenges, trends and solutions available to government organizations. Or, simply start browsing the latest content below.

Your free membership allows you to save your favorite content as well as save your searches to keep you notified when new, relevant content is posted.

Search Filter
Clear filters

Featured Content

Biometric Technologies and Global Security

Biometric technologies use unique biological or behavioral attributes—such as DNA, fingerprints, cardiac signatures, voice or gait patterns, and facial or ocular measurements— to authenticate an individual’s identity. Although biometric technologies…

Learn More

Catch Me If You Scan: Constitutionality of...

In the digital age, courts have been tasked with determining how longstanding constitutional protections for criminal suspects and defendants apply to new forms of technology like smartphones that are portable,…

Learn More

Climate Change Risk Mitigation by U.S. Foreign...

Many in Congress have a keen interest in climate change, and determining how best to address that issue is a source of continuing discussion. Gaining increased attention in such discussions…

Learn More

Cyberspace Solarium Commission

For over 20 years, nation-states and non-state actors have used cyberspace to subvert American power, America security, and the American way of life. Despite numerous criminal indictments, economic sanctions, and…

Learn More

Safety Impact of Speed and Red Light Cameras

Traffic safety, defined as the rate of traffic-related deaths and injuries per mile driven, has greatly improved in the United States over the past several decades. Yet, motor vehicle crashes…

Learn More

The Cyberspace Solarium Commission: Illuminating...

In August 2018, Congress authorized the Cyberspace Solarium Commission (Commission), a blue-ribbon panel tasked with examining and developing a strategic approach to defending the United States in cyberspace and protecting…

Learn More

Telecommunications: Agencies Should Fully...

As of October 2019, the 19 selected agencies were in different stages of transitioning from their soon-to-be-expiring telecommunications contracts to the new Enterprise Infrastructure Solutions (EIS) program. All of these…

Learn More

Report on the Joint Enterprise Defense...

This report presents the results of the DoD Office of Inspector General (OIG) review of the DoD Joint Enterprise Defense Infrastructure (JEDI) Cloud procurement process and our investigation into allegations…

Learn More

Navy Next-Generation Logistics Ship (NGLS) Program

The Navy’s Next-Generation Logistics Ship (NGLS) program envisages procuring a new class of medium-sized at-sea resupply ships for the Navy. The Navy’s proposed FY2021 budget requested $30.0 million in research…

Learn More

Defense Acquisitions: DOD’s Cybersecurity Maturity...

Cybersecurity threats represented by cyberattacks and data theft have had a significant impact on the Department of Defense (DOD) and the defense industrial base (DIB). These threats have become a…

Learn More

Strategy on Reducing Regulatory and Administrative...

HHS is required to articulate a plan of action to reduce regulatory and administrative burden relating to the use of health IT and EHRs. Specifically, the Cures Act directs HHS…

Learn More

Cybersecurity Maturity Model Certification (CMMC)

The theft of intellectual property and sensitive information from all industrial sectors due to malicious cyber activity threatens economic security and national security. The Council of Economic Advisors estimates that…

Learn More

Digital Contact Tracing Technology: Overview and...

“Contact tracing” is a public health measure used to control disease spread. Trained public health workers assist patients with an infectious disease recall their close contacts within a given timeframe,…

Learn More

A Framework for Assessing Email Security Risk

This paper is intended to be used as a tool for information security professionals to assess risks associated with email infrastructure. Email vulnerabilities can harm organizations in two key ways:…

Learn More

Higher Education Research, Cybersecurity, and CMMC...

EDUCAUSE is a higher education technology association and the largest community of IT leaders and professionals committed to advancing higher education. Technology, IT roles and responsibilities, and higher education are…

Learn More