GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

Biometric Technologies and Global Security

Biometric technologies use unique biological or behavioral attributes—such as DNA, fingerprints, cardiac signatures, voice or gait patterns, and facial or ocular measurements— to authenticate an individual’s identity. Although biometric technologies…

Learn More

Catch Me If You Scan: Constitutionality of...

In the digital age, courts have been tasked with determining how longstanding constitutional protections for criminal suspects and defendants apply to new forms of technology like smartphones that are portable,…

Learn More

Report on the Joint Enterprise Defense...

This report presents the results of the DoD Office of Inspector General (OIG) review of the DoD Joint Enterprise Defense Infrastructure (JEDI) Cloud procurement process and our investigation into allegations…

Learn More

Data Governance Guide for Public Sector CIOs

Public sector CIOs are not only under pressure to maintain budgets and empower staff across agencies with appropriate technology. They must also operate in a world where data of various…

Learn More

Harnessing a Network of Laboratories to Meet...

ONL embraces its centralized role with all laboratories that provide developmental assistance for products and solutions to support the homeland security community and keep our country safe. ONL is arranged…

Learn More

TSA Lacks Outcomeoriented Performance Measures and...

The Transportation Security Administration’s (TSA) January 2020 TSA Efforts to Diversify Security Technology (strategy) addresses the requirements of the 2018 TSA Modernization Act (the Act) and outlines 12 strategic initiatives…

Learn More

Building a Modern Military: The Force Meets...

Security politics will be different in the future, but the goal of security policy hasn’t changed and is clearly outlined in this report: to identify the most effective and efficient…

Learn More

Privacy Without Monopoly: Data Protection and...

The problems of corporate concentration and privacy on the Internet are inextricably linked. A new regime of interoperability can revitalize competition in the space, encourage innovation, and give users more…

Learn More

ICE Guidance Needs Improvement to Deter Illegal...

The WSE program’s compliance, civil enforcement, and outreach activities are not as effective as they could be in supporting ICE’s immigration enforcement strategy. ICE officials did not consistently enforce the…

Learn More

Progress and Challenges in Modernizing DHS’ IT...

The DHS Chief Information Officer (CIO), and most component CIOs, conducted strategic planning activities to help prioritize legacy IT systems or infrastructure for modernization to better accomplish mission goals. The…

Learn More

Implementing Advanced Electronic Data: Challenges...

To help stem the flow of opioids shipped to the United States through the mail, Congress passed the Synthetics Trafficking and Overdose Prevention (STOP) Act of 2018. The law requires…

Learn More

USMC Reduces Speeding, Saves Lives, and Increases...

The United States Marine Corp (USMC) holds safety and efficiency among its highest values. That’s why the USMC’s Southwest Region Fleet Transportation (SWRFT) Non-Tactical Vehicles Department at Camp Pendleton chose…

Learn More

Mitigating the Effects of Network Breaches

What to do before your network is compromised. Breaches are inevitable. The numbers don’t lie – whether internal or external, breaches are inevitable. Supply chain attacks, insider threats, ransomware, malware,…

Learn More

Protecting Students and Staff from Active Shooters

Case Study: Providing protection from active shooter assault at the European Simulation and Validation Center, in Ede, The Netherlands. By using our award winning Asset Based Risk Analysis Tool, we…

Learn More

Threats to U.S. Networks: Oversight of Chinese...

Information and telecommunications technologies bring the world closer together, allowing individuals and businesses nearly everywhere in the world to communicate with each other. The expansion of global telecommunications networks, in…

Learn More