The National Guard is a creation of the U.S. Constitution, the U.S. Code, and state statutory authority. Under the U.S. Constitution, Congress is granted the authority to organize, arm, discipline, and call forth the Militia to “be employed in the Service of the United States…”The composition of the militia is more specifically defined in theContinue reading “Briefing Book 2026: National Guard Mobilization”
Category Archives: Veterans, Military, and Security
Briefing Book 2026: Veterans Affairs Claim Sharks
A “claim shark” is the term given to an agent or company that charges veterans to help them file their initial claims for U.S. Department of Veterans Affairs (VA) benefits. The process to file a claim for VA benefits is free, yet claim sharks usually charge upwards of $5,000 for their services despite the existenceContinue reading “Briefing Book 2026: Veterans Affairs Claim Sharks”
Kansas Benefits for Veterans and Military Personnel
The following memorandum provides information on the various statutory benefits available to veterans, military personnel, and military families in Kansas. It is meant to aid veterans and service members, as well as legislators and state agencies, in their understanding of how each benefit is administered and to whom each benefit may be administered. (Note: TheContinue reading “Kansas Benefits for Veterans and Military Personnel”
Grid Security
Protecting the bulk electric system (or “power grid”) from both physical and cyberattacks is known as “grid security.” Risks and Threats In 2023, the U.S. Department of Energy (DOE) reported at least 175 instances of physical attacks or threats against critical grid infrastructure, including incidences of theft and vandalism. In 2024, Check Point Research documentedContinue reading “Grid Security”
Kansas Cybersecurity Update
From 2022 to 2023, ransomware attacks against cities, counties, and state agencies increased by 36 percent. A ransomware attack is a type of malicious software (malware) that encrypts its files on a victim’s computer or network, rendering them inaccessible until a ransom is paid to the attacker. Ransomware typically infiltrates a system through phishing emailsContinue reading “Kansas Cybersecurity Update”

You must be logged in to post a comment.