GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Security Awareness content

Kids and Teens: Online Addiction is a Thing

Kids and Teens: Online Addiction is a Thing

Online addiction is more than just extra screen time—it can seriously affect teens’ sleep, mental health, and real-world relationships. This guide outlines how constant exposure to social media and gaming…

Learn More
HOW2SPOT Online Predators

HOW2SPOT Online Predators

Online predators often appear friendly and trustworthy, making it difficult for kids and teens to recognize unsafe behavior. This resource helps young people identify red flags—like requests for personal information,…

Learn More
Primary Screening for Passengers

Primary Screening for Passengers

As air travel rebounds to pre-pandemic levels, the TSA is under increasing pressure to screen more passengers for a wider range of threats—quickly and accurately. DHS’s Science and Technology Directorate…

Learn More
Privacy Impact Assessment for the CBP Link

Privacy Impact Assessment for the CBP Link

CBPLink is a cloud-based system used by U.S. Customs and Border Protection to streamline internal communication, case management, and operational collaboration across divisions. This Privacy Impact Assessment ensures that CBPLink’s…

Learn More
Choosing the Right Security Companies in Los Angeles

Choosing the Right Security Companies in Los...

Direct Guard Services stands out among top security companies in Los Angeles, offering professional, reliable protection tailored to your needs. From armed and unarmed guards to mobile patrols, fire watch,…

Learn More
Promising Prevention Practice: Behavioral Threat Assessment and Management

Promising Prevention Practice: Behavioral Threat...

Behavioral Threat Assessment and Management (BTAM) is a structured, community-based strategy for identifying and addressing early warning signs of potential violence. Led by the DHS Center for Prevention Programs and…

Learn More
Dams Sector: Personnel Screening Guide for Owners and Operators

Dams Sector: Personnel Screening Guide for Owners...

The Dams Sector Personnel Screening Guide by CISA provides owners and operators of dams, levees, and related infrastructure with strategies to mitigate insider threats through effective pre-employment screening. It outlines…

Learn More
Roadmap to Innovation in the Dams Sector

Roadmap to Innovation in the Dams Sector

As aging infrastructure and new threats challenge the Dams Sector, innovation is critical to building long-term resilience. This roadmap outlines key research and development priorities—ranging from advanced materials and remote…

Learn More
Safe Money: Online & Digital Scams

Safe Money: Online & Digital Scams

Online and digital scams continue to evolve, using phishing emails, fake websites, and fraudulent shopping schemes to target unsuspecting users. These scams often lure victims with too-good-to-be-true offers, urgent security…

Learn More
Safe Money: Imposter Scams

Safe Money: Imposter Scams

Imposter scams are on the rise, with fraudsters posing as trusted figures—like government officials, relatives, or tech support—to steal personal information or money. Common tactics include urgent demands for payment…

Learn More
Unmasking the Fentanyl Trade in Illicit Online Marketplaces

Unmasking the Fentanyl Trade in Illicit Online...

The fentanyl crisis continues to escalate, driven by a complex web of illicit networks operating across borders and platforms. This whitepaper sheds light on how open-source intelligence (OSINT) tools are…

Learn More
Federal Protective Service: Actions Needed to Address Critical Guard Oversight and Information System Problems

Federal Protective Service: Actions Needed to...

The Federal Protective Service (FPS) oversees security at thousands of federal buildings, but major issues in guard oversight and technology hinder its effectiveness. FPS contract guards failed to detect prohibited…

Learn More
Incident Response Plan (IRP) Basics

Incident Response Plan (IRP) Basics

A well-prepared Incident Response Plan (IRP) is crucial for mitigating cyber threats and minimizing damage. By clearly defining roles, communication protocols, and response strategies, organizations can act swiftly in the…

Learn More
DOD Satellite Communications: Reporting on Progress Needed to Provide Insight on New Approach

DOD Satellite Communications: Reporting on...

The Department of Defense (DOD) is shifting its approach to satellite communications (SATCOM) to create a more resilient and integrated system. Traditionally, DOD relied on high-cost satellites that operated independently,…

Learn More
Annual Report on Recording of Health Assessment Data in Military Health Records Pursuant to 10 U.S.C.1073b

Annual Report on Recording of Health Assessment...

Ensuring the health readiness of deployed military personnel is critical to mission success and overall force well-being. The latest Department of Defense report highlights improvements in compliance with health assessments,…

Learn More