GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

National Security content

Swatting Prevention and Response guidance for Election Workers and Law Enforcement

Swatting Prevention and Response guidance for...

Swatting is a term used to describe criminal activity by an individual or group who knowingly provides false information to law enforcement suggesting that a serious threat exists at a…

Learn More
ChemLock: Drone Activity

ChemLock: Drone Activity

Owners and operators across all industries are encountering increased drone activity over and around their facilities and assets. Careless or malicious drone operations present a unique threat to chemical facilities…

Learn More
Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society

Mitigating Cyber Threats with Limited Resources:...

This joint guide, developed as part of Cybersecurity and Infrastructure Security Agency’s High-Risk Community Protection initiative and National Cyber Security Centre-UK’s Defending Democracy campaign, provides mitigation measures for civil society…

Learn More
Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity

Defending OT Operations Against Ongoing Pro-Russia...

In early 2024, the authoring organizations observed pro-Russia hacktivists targeting vulnerable industrial control systems in North America and Europe. Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation…

Learn More
DoD Microelectronics: Field Programmable Gate Array Best Practices – Threat Catalog

DoD Microelectronics: Field Programmable Gate...

The National Security Agency Cybersecurity technical report categorizes hardware assurance threats that apply to field programmable gate arrays as described in the Joint Federated Assurance Center FPGA Level of Assurance…

Learn More
Data Confidentiality: Identifying and Protecting Assets Against Data Breaches

Data Confidentiality: Identifying and Protecting...

An organization must protect its information from unauthorized access and disclosure. Data breaches, large and small, can have far-reaching operational, financial, and reputational impacts on an organization. In the event…

Learn More
Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems

Deploying AI Systems Securely: Best Practices for...

Deploying artificial intelligence (AI) systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure…

Learn More
FY2024 National Security Supplemental Funding: Defense Appropriations

FY2024 National Security Supplemental Funding:...

On October 20, 2023, the Biden Administration submitted to Congress a request for FY2024 emergency supplemental appropriations to address “key national security priorities.” President Biden characterized the request as a…

Learn More
Defense Industrial Base Cybersecurity Strategy 2024

Defense Industrial Base Cybersecurity Strategy 2024

The Department of Defense's (DoD) Defense Industrial Base (DIB) Cybersecurity Strategy serves as the Department’s strategic plan to enhance the cybersecurity and cyber resiliency of the DIB through an overarching…

Learn More
NATO Enlargement to Sweden and Finland

NATO Enlargement to Sweden and Finland

Sweden joined NATO on March 7, 2024, enlarging the alliance to 32 members. Amid heightened security concerns about Russia after its February 2022 invasion of Ukraine, both Finland and Sweden…

Learn More
Defense Primer: Geography, Strategy, and U.S. Force Design

Defense Primer: Geography, Strategy, and U.S....

Most of the world’s people, resources, and economic activity are located not in the Western Hemisphere, but in the other hemisphere, particularly Eurasia. In response to this basic feature of…

Learn More
Annual Threat Assessment of the U.S. Intelligence Community

Annual Threat Assessment of the U.S. Intelligence...

This report reflects the collective insights of the Intelligence Community (IC), which is committed every day to providing the nuanced, independent, and unvarnished intelligence that policymakers, warfighters, and domestic law…

Learn More
Advancing Zero Trust Maturity Throughout the  Network and Environment Pillar

Advancing Zero Trust Maturity Throughout the ...

The network and environment pillar works in concert with the other Zero Trust pillars as part of a holistic Zero Trust security model that assumes adversary breaches occur inside the…

Learn More
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure

PRC State-Sponsored Actors Compromise and Maintain...

As the authoring agencies have previously highlighted, the use of living off the land (LOTL) techniques is a hallmark of Volt Typhoon actors’ malicious cyber activity when targeting critical infrastructure.…

Learn More
Facial Recognition Technology: Federal Law Enforcement Agency Efforts Related to Civil Rights and Training

Facial Recognition Technology: Federal Law...

The Government Accountability Office (GAO) testified about their prior work on federal law enforcement's use of facial recognition technology. In 2023, they reviewed 7 agencies in the Departments of Homeland…

Learn More