U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Law Enforcement Resource Library

Ensuring access to law enforcement tools and products is a cornerstone of the partnership between the Department of Homeland Security and this nation's state, local, tribal, territorial, and campus (SLTTC) law enforcement.

The service, sacrifice, and commitment of law enforcement to the safety and resilience of communities, especially in the face of new and evolving threats, represents the very best of our great nation. The Department of Homeland Security is extraordinarily proud to support and collaborate with law enforcement to help keep communities safe.

DHS is committed to ensuring every law enforcement agency - regardless of size, funding, or resources - has the tools and support necessary to carry out the work that is essential to maintaining our security. This searchable Law Enforcement Resource library highlights many of the Department's resources that are available to you, including training, grant funding opportunities, task forces, research and development, and field support, among others.

Filter search results and use keywords in the search bar below to identify which resources are most helpful to you.

To learn more about the resources, opportunities for collaboration, and support the Department can offer law enforcement, please contact the DHS Office for State and Local Law Enforcement at OSLLE@hq.dhs.gov. Thank you for your continued collaboration, and for your service to our nation.

All the information on this website is government-owned or sponsored.

Select a category below to explore resources.

  • Behavioral Threat Assessment Units: A Guide for State and Local Law Enforcement to Prevent Targeted Violence

    The guide, published by the Secret Service National Threat Assessment Center (NTAC) outlines how state and local law enforcement agencies can develop behavioral threat assessment units in six specific steps. These units are specifically designed to identify, assess, and intervene with individuals identified as posing a risk of violence.

    Audience:
    Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Cyberspace and Critical Infrastructure, Terrorism and National Security Threats
    Resource Type:
    Educational Resources
    Topic:
    Active Shooter Preparedness, School Safety, Secure Public Gatherings, Targeted Violence and Terrorism Prevention
    Last Updated:
  • National Threat Assessment Center

    The National Threat Assessment Center (NTAC) conducts research, training, and consultation on threat assessment and the prevention of targeted violence. The NTAC team is comprised of social science researchers, regional program managers, and specialists who support and empower communities to prevent all forms of targeted violence. Visitors can register for live virtual training events and download NTAC's published research and guidance for law enforcement.

    Audience:
    Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Cyberspace and Critical Infrastructure, Terrorism and National Security Threats
    Resource Type:
    Educational Resources, Training or Exercises
    Topic:
    Active Shooter Preparedness, Protect Designated Individuals, Facilities, and Events, School Safety, Secure Public Gatherings, Targeted Violence and Terrorism Prevention
    Last Updated:
  • Geospatial Information Infrastructure

    The DHS Geospatial Information Infrastructure (GII) is a shared Sensitive But Unclassified (SBU) platform managed by the GMO. The platform enables users across the Homeland Security Enterprise (HSE) – including federal, state, local, tribal, and territorial – to access trusted geospatial data, map services, and geospatial applications.

    Audience:
    Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Border Security, Cyberspace and Critical Infrastructure, Resilience, Terrorism and National Security Threats
    Resource Type:
    Programs or Services
    Topic:
    Active Shooter Preparedness, Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE), Counter TCOs and Other Illicit Actors, Critical Infrastructure, Intel and Information Sharing, Physical Security, Prevent and Disrupt Nation State Threats, Protect Designated Individuals, Facilities, and Events, School Safety, Secure and Manage Air, Land, and Maritime Borders, Secure Public Gatherings, Targeted Violence and Terrorism Prevention, Transportation Security
    Last Updated:
  • National Computer Forensics Institute

    The National Computer Forensics Institute (NCFI) is the nation’s premier law enforcement training facility in cyber and electronic crime forensics. The NCFI seeks to educate state, local, tribal, territorial law enforcement officers, prosecutors, and judges in the continually evolving cyber and electronic crime related threats, and educate, train and equip them with the tools necessary for forensic examinations to combat those crimes.

    Audience:
    Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Cyberspace and Critical Infrastructure
    Resource Type:
    Training or Exercises
    Topic:
    Combat Cyber Crime, Cybersecurity, Emerging Technology
    Last Updated:
  • Preparing for a Cyber Incident

    This guide explains the actions organizations should take to cultivate an understanding of the technological and regulatory limitations, responsibilities, and resources available to them, and how to apply the acquired knowledge to their operations.

    Audience:
    Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Cyberspace and Critical Infrastructure, Resilience
    Resource Type:
    Educational Resources
    Topic:
    Combat Cyber Crime, Critical Infrastructure, Cybersecurity, Emerging Technology, Incident Response, Strengthen National Resilience
    Last Updated:
  • Protective Information eXchange

    The Protective Intelligence eXchange (PIX) is a web-based information sharing tool designed to assist United States law enforcement agencies in assessing the risk that an individual of interest may pose. All users must be members of federal, state, or local law enforcement agencies engaged in protection or protective intelligence pursuant to that agency’s specific authorizing federal or state legislation. Information in PIX is contained in an internet-accessible database that includes the names and selected identifiers of persons subject to a protective intelligence investigation by one or more of the member agencies. This information is used to assist users in providing protective services to public officials.

    Audience:
    State and Local Law Enforcement
    Mission Area:
    Terrorism and National Security Threats
    Resource Type:
    Programs or Services
    Topic:
    Intel and Information Sharing, Protect Designated Individuals, Facilities, and Events, Targeted Violence and Terrorism Prevention
    Last Updated:
  • Operation Stonegarden Grant Program

    The Operation Stonegarden Grant Program provides funding to enhance cooperation and coordination among state, local, tribal, territorial, and federal law enforcement agencies to jointly enhance security along the United States land and water borders.

    Audience:
    State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law Enforcement
    Mission Area:
    Border Security, Terrorism and National Security Threats
    Resource Type:
    Grant Funding Opportunities
    Topic:
    Counter TCOs and Other Illicit Actors, Intel and Information Sharing, Secure and Manage Air, Land, and Maritime Borders
    Last Updated:
Last Updated: 02/19/2025
Was this page helpful?
This page was not helpful because the content