Feature Article: Helping DHS Mitigate Explosive Threats
New Explosives Planning and Research Tool (ExPRT) aggregates decades of research and data into a central, accessible, and actionable repository.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
New Explosives Planning and Research Tool (ExPRT) aggregates decades of research and data into a central, accessible, and actionable repository.
The DHS, I&A, National Threat Evaluation and Reporting (NTER) Program Office partners with LSU NCBRT to provide the Instructor Development Threat Evaluation and Reporting Course (ID-TERC). This page contains the flyer announcing the ID-TERC training for Fiscal Year 2024.
Official memo from the U.S. Department of Homeland Security Secretary, Alejandro Mayorkas, directing a 90-day PRC Threats Sprint across the Department.
NTER provides online training and digital resources helping build partners' capacity to identify and report suspicious or potentially concerning behaviors and prevent violent attacks.
The Department of Homeland Security (DHS), National Threat Evaluation and Reporting (NTER) Program Office has partnered with the Wisconsin Department of Justice and the Wisconsin Department of Public Instruction to release a bystander awareness eLearning module titled, “Foundations of Targeted Violence Prevention".
The goal of this eLearning module is to educate the public on threatening or potentially concerning behaviors and where to report them, providing an opportunity for intervention to prevent targeted violence from occurring. It seeks to assist in preventing targeted violence by empowering community members to recognize threats or potentially concerning behaviors, understand what behaviors may be displayed by a person who is on a pathway to violence, learn where to report information of concern, and understand how the information reported will be used to keep our community safe.
The HIVE algorithmic framework enables new approaches to protecting people and infrastructure in areas where traditional security checkpoints are not feasible. HIVE (Hierarchical Inference for Volumetric Estimation) is a custom deep convolutional neural network architecture that interprets volumetric video generated by a standoff, active-RF imagers. The architecture performs multi-resolution detection, classification, and segmentation of objects in the scene at various scales in order to produce automated threat detections, alerts, and visualization products – all without requiring the person to stop, pose, or remove their belongings.
The Threat Evaluation and Reporting Course (TERC) is a three-day course intended for multi-disciplinary F/SLTT partners and practitioners to include those involved in homeland security, law enforcement, emergency management, education, healthcare, legal, and public safety or security.
The Basic Threat Evaluation and Reporting Course (B-TERC) is a one-day, 8-hour training intended for multi-disciplinary F/SLTT partners to include those involved in homeland security, law enforcement, emergency management education, healthcare, legal, and public safety or security.
The Threat Evaluation and Reporting Overview (TERO) is a three-hour introductory training intended for the public and community members who play a role in identifying threats or observable behaviors that may concern others.
The TERO emphasizes the importance of community involvement and raises awareness about the behavioral approach to violence prevention.
The National Threat Evaluation and Reporting (NTER) Master Trainer Program certifies Federal, State, Local, Tribal, and Territorial partners in the instruction of Behavioral Threat Assessment and Management techniques and best practices.
To obtain certification as a NTER Master Trainer, an individual must successfully complete each step of the Roadmap.
Please Note: These steps do not need to be completed in order.