GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Content

USMC Reduces Speeding, Saves Lives, and Increases...

The United States Marine Corp (USMC) holds safety and efficiency among its highest values. That’s why the USMC’s Southwest Region Fleet Transportation (SWRFT) Non-Tactical Vehicles Department at Camp Pendleton chose…

Learn More

Mitigating the Effects of Network Breaches

What to do before your network is compromised. Breaches are inevitable. The numbers don’t lie – whether internal or external, breaches are inevitable. Supply chain attacks, insider threats, ransomware, malware,…

Learn More

Protecting Students and Staff from Active Shooters

Case Study: Providing protection from active shooter assault at the European Simulation and Validation Center, in Ede, The Netherlands. By using our award winning Asset Based Risk Analysis Tool, we…

Learn More

Threats to U.S. Networks: Oversight of Chinese...

Information and telecommunications technologies bring the world closer together, allowing individuals and businesses nearly everywhere in the world to communicate with each other. The expansion of global telecommunications networks, in…

Learn More

Physical Security for Cold Storage Locations

As America prepares for distribution of coronavirus vaccine, the security and integrity of facilities that will receive, house, and distribute COVID-19 vaccines has come into focus. Supply chain and cold…

Learn More

National Critical Functions Status Update to the...

In the Spring of 2019, the Cybersecurity and Infrastructure Security Agency (CISA), through the National Risk Management Center (NRMC), published a set of 55 National Critical Functions (NCFs) to guide…

Learn More

Mitigating Attacks On Houses of Worship

Acts of targeted violence against houses of worship (HoWs) are a real—and potentially growing—problem in the United States and a top priority for the U.S. Department of Homeland Security (DHS).…

Learn More

Deep Fakes and National Security

“Deep fakes”—a term that first emerged in 2017 to describe realistic photo, audio, video, and other forgeries generated with artificial intelligence (AI) technologies—could present a variety of national security challenges…

Learn More

Protecting Controlled Unclassified Information in...

The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government…

Learn More

Tracing the Source of Chemical Weapons

The forensic chemical attribution process seeks to trace chemical agents used in attacks. Investigators take a sample of the agent from a victim or site, and then analyze its physical…

Learn More

Information on U.S. Privacy Safeguards Relevant to...

In its July 16, 2020 decision in Data Protection Commissioner v. Facebook Ireland and Maximillian Schrems, Case C-311/18 (“Schrems II”), the European Union Court of Justice (“ECJ”) upheld European Commission…

Learn More

Biometric Face Recognition: References for...

Face recognition (also referred to as facial recognition) is one of the most powerful and complex technologies in modern times. Like many forms of intelligent systems, it is a tool…

Learn More

Analysis and Artificial Intelligence in Integrated...

Integrated Campaigning requires the development and execution of US foreign policy across the whole of the US Government (USG). Such coherent policy development and implementation necessitates a common perspective to…

Learn More

Mobility and the Government Challenge

Federal government agencies face unique cybersecurity risks. As a result, they often place tight restrictions on mobile devices in the workplace. Michael Campbell of Privoro says it’s time to loosen…

Learn More

Strict ID Laws Don’t Stop Voters: Evidence from a...

U.S. states increasingly require identification to vote – an ostensive attempt to deter fraud that prompts complaints of selective disenfranchisement. Using a difference-in-differences design on a 1.6-billion observations panel dataset,…

Learn More