GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

National Security content

DHS Report on Reducing the Risks at the Intersection of Artificial Intelligence and Chemical, Biological, Radiological, and Nuclear Threats

DHS Report on Reducing the Risks at the...

As Artificial Intelligence (AI) integrates into more areas of human activity, its potential benefits and risks have been subject to increased public and government scrutiny, highlighting the need for stronger…

Learn More
Guidance for Using Standards when Selecting and Purchasing Responder Equipment

Guidance for Using Standards when Selecting and...

Through its System Assessment and Validation for Emergency Responders program, the National Urban Security Technology Laboratory publishes information for responders about protective and operational equipment. This document provides guidance related…

Learn More
Non-State Actors Playing Greater Roles in Governance and International Affairs

Non-State Actors Playing Greater Roles in...

Since the end of the Cold War, non-state actors (NSAs) have had an increasing and more consequential role in global dynamics, a trend that is likely to continue even as…

Learn More
June 2024 Weapon Systems Annual Assessment

June 2024 Weapon Systems Annual Assessment

To deliver more timely and effective solutions to the warfighter, the Department of Defense (DOD) revamped its department-wide acquisition policies in 2020. These policy changes responded to long-standing concerns that…

Learn More
Swatting Prevention and Response Guidance for Election Workers and Law Enforcement

Swatting Prevention and Response Guidance for...

Swatting is a term used to describe criminal activity by an individual or group who knowingly provides false information to law enforcement suggesting that a serious threat exists at a…

Learn More
ChemLock: Drone Activity

ChemLock: Drone Activity

Owners and operators across all industries are encountering increased drone activity over and around their facilities and assets. Careless or malicious drone operations present a unique threat to chemical facilities…

Learn More
Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society

Mitigating Cyber Threats with Limited Resources:...

This joint guide, developed as part of Cybersecurity and Infrastructure Security Agency’s High-Risk Community Protection initiative and National Cyber Security Centre-UK’s Defending Democracy campaign, provides mitigation measures for civil society…

Learn More
Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity

Defending OT Operations Against Ongoing Pro-Russia...

In early 2024, the authoring organizations observed pro-Russia hacktivists targeting vulnerable industrial control systems in North America and Europe. Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation…

Learn More
DoD Microelectronics: Field Programmable Gate Array Best Practices – Threat Catalog

DoD Microelectronics: Field Programmable Gate...

The National Security Agency Cybersecurity technical report categorizes hardware assurance threats that apply to field programmable gate arrays as described in the Joint Federated Assurance Center FPGA Level of Assurance…

Learn More
Data Confidentiality: Identifying and Protecting Assets Against Data Breaches

Data Confidentiality: Identifying and Protecting...

An organization must protect its information from unauthorized access and disclosure. Data breaches, large and small, can have far-reaching operational, financial, and reputational impacts on an organization. In the event…

Learn More
Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems

Deploying AI Systems Securely: Best Practices for...

Deploying artificial intelligence (AI) systems securely requires careful setup and configuration that depends on the complexity of the AI system, the resources required (e.g., funding, technical expertise), and the infrastructure…

Learn More
FY2024 National Security Supplemental Funding: Defense Appropriations

FY2024 National Security Supplemental Funding:...

On October 20, 2023, the Biden Administration submitted to Congress a request for FY2024 emergency supplemental appropriations to address “key national security priorities.” President Biden characterized the request as a…

Learn More
Defense Industrial Base Cybersecurity Strategy 2024

Defense Industrial Base Cybersecurity Strategy 2024

The Department of Defense's (DoD) Defense Industrial Base (DIB) Cybersecurity Strategy serves as the Department’s strategic plan to enhance the cybersecurity and cyber resiliency of the DIB through an overarching…

Learn More
NATO Enlargement to Sweden and Finland

NATO Enlargement to Sweden and Finland

Sweden joined NATO on March 7, 2024, enlarging the alliance to 32 members. Amid heightened security concerns about Russia after its February 2022 invasion of Ukraine, both Finland and Sweden…

Learn More
Defense Primer: Geography, Strategy, and U.S. Force Design

Defense Primer: Geography, Strategy, and U.S....

Most of the world’s people, resources, and economic activity are located not in the Western Hemisphere, but in the other hemisphere, particularly Eurasia. In response to this basic feature of…

Learn More