GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

National Security content

Defense Industrial Base Cybersecurity Strategy 2024

Defense Industrial Base Cybersecurity Strategy 2024

The Department of Defense's (DoD) Defense Industrial Base (DIB) Cybersecurity Strategy serves as the Department’s strategic plan to enhance the cybersecurity and cyber resiliency of the DIB through an overarching…

Learn More
NATO Enlargement to Sweden and Finland

NATO Enlargement to Sweden and Finland

Sweden joined NATO on March 7, 2024, enlarging the alliance to 32 members. Amid heightened security concerns about Russia after its February 2022 invasion of Ukraine, both Finland and Sweden…

Learn More
Defense Primer: Geography, Strategy, and U.S. Force Design

Defense Primer: Geography, Strategy, and U.S....

Most of the world’s people, resources, and economic activity are located not in the Western Hemisphere, but in the other hemisphere, particularly Eurasia. In response to this basic feature of…

Learn More
Annual Threat Assessment of the U.S. Intelligence Community

Annual Threat Assessment of the U.S. Intelligence...

This report reflects the collective insights of the Intelligence Community (IC), which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law…

Learn More
Advancing Zero Trust Maturity Throughout the  Network and Environment Pillar

Advancing Zero Trust Maturity Throughout the ...

The network and environment pillar works in concert with the other Zero Trust pillars as part of a holistic Zero Trust security model that assumes adversary breaches occur inside the…

Learn More
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

PRC State-Sponsored Actors Compromise and Maintain...

As the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…

Learn More
Facial Recognition Technology: Federal Law Enforcement Agency Efforts Related to Civil Rights and Training

Facial Recognition Technology: Federal Law...

The Government Accountability Office (GAO) testified about their prior work on federal law enforcement's use of facial recognition technology. In 2023, they reviewed 7 agencies in the Departments of Homeland…

Learn More
Report to the Congressional Defense Committees on National Defense Authorization Act (NDAA)

Report to the Congressional Defense Committees on...

A team from Carnegie Mellon University’s Software Engineering Institute conducted an in dependent study to satisfy the requirements of the Fiscal Year 2022 National Defense Authorization Act Section 835, Independent…

Learn More
2023 Homeland Defense Policy Guidance

2023 Homeland Defense Policy Guidance

The 2022 National Defense Strategy states that the top priority of the Department of Defense (DoD) is to defend the homeland, paced to the growing multi-domain threat posed by the…

Learn More
Emerging Military Technologies: Background and Issues for Congress

Emerging Military Technologies: Background and...

Members of Congress and Pentagon officials are increasingly focused on developing emerging military technologies to enhance U.S. national security and keep pace with U.S. competitors. The U.S. military has long…

Learn More
Wicked Deterrence Challenge: The Changing Strategic Landscape

Wicked Deterrence Challenge: The Changing...

The National Security Strategy of the United States laid out that the Nation is entering a decisive decade—not only for itself but also for the world. The current era of…

Learn More
Microgrids for the 21st Century: The Case for a Defense Energy Architecture

Microgrids for the 21st Century: The Case for a...

The Department of Defense needs a new approach to electrical grid infrastructure to maintain security and access to operational energy. Recent natural disasters and cyberattacks have exposed the vulnerability of…

Learn More
Artificial Intelligence: Fully Implementing Key Practices Could Help DHS Ensure Responsible Use for Cybersecurity

Artificial Intelligence: Fully Implementing Key...

To promote transparency and inform the public about how artificial intelligence (AI) is being used, federal agencies are required by Executive Order No. 13960 to maintain an inventory of AI…

Learn More
Department of Homeland Security: Additional Actions Needed to Improve Oversight of Joint Task Forces

Department of Homeland Security: Additional...

The Department of Homeland Security’s (DHS) Joint Task Force-East coordinates activities across DHS components and U.S. government and international partners in the U.S. southern maritime environment. In fiscal year 2023,…

Learn More
Cyber Diplomacy: State’s Efforts Aim to Support U.S. Interests and Elevate Priorities

Cyber Diplomacy: State’s Efforts Aim to Support...

The James M. Inhofe National Defense Authorization Act for Fiscal Year 2023 includes a provision for the Government Accountability Office to review U.S. diplomatic efforts to advance interests in cyberspace…

Learn More