Ensuring access to law enforcement tools and products is a cornerstone of the partnership between the Department of Homeland Security and this nation's state, local, tribal, territorial, and campus (SLTTC) law enforcement.
The service, sacrifice, and commitment of law enforcement to the safety and resilience of communities, especially in the face of new and evolving threats, represents the very best of our great nation. The Department of Homeland Security is extraordinarily proud to support and collaborate with law enforcement to help keep communities safe.
DHS is committed to ensuring every law enforcement agency - regardless of size, funding, or resources - has the tools and support necessary to carry out the work that is essential to maintaining our security. This searchable Law Enforcement Resource library highlights many of the Department's resources that are available to you, including training, grant funding opportunities, task forces, research and development, and field support, among others.
Filter search results and use keywords in the search bar below to identify which resources are most helpful to you.
To learn more about the resources, opportunities for collaboration, and support the Department can offer law enforcement, please contact the DHS Office for State and Local Law Enforcement at OSLLE@hq.dhs.gov. Thank you for your continued collaboration, and for your service to our nation.
All the information on this website is government-owned or sponsored.
Select a category below to explore resources.
-
Protect Critical Infrastructure and Public Gatherings
The reckless and criminal use of Unmanned Aircraft Systems (UAS) pose significant risk to critical infrastructure security and public safety. This overview covers actions that you can take to mitigate these risks.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical Infrastructure, Resilience, Terrorism and National Security ThreatsResource Type:Educational ResourcesTopic:Critical Infrastructure, Emerging Technology, Physical Security, Secure Public Gatherings, Strengthen National Resilience, Targeted Violence and Terrorism PreventionLast Updated: -
Secure Your Drone: Privacy and Data Protection Guidance
Secure Your Drone: Privacy and Data Protection Guidance is a Cybersecurity and Infrastructure Security Agency (CISA) resource that provides guidance for drone users to protect their data and privacy before, during, and after flying their drone.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical Infrastructure, ResilienceResource Type:Educational ResourcesTopic:Cybersecurity, Emerging TechnologyLast Updated: -
Be Air Aware™
CISA’s Be Air Aware™ program helps increase awareness of cyber and physical risks posed by unmanned aircraft systems (UAS or drones). The Be Air Aware™ materials on this page provide essential, ready-to-use information about UAS threats and steps to effectively manage risk to critical infrastructure and public gatherings.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical Infrastructure, Resilience, Terrorism and National Security ThreatsResource Type:Educational Resources, Operational Support, Programs or ServicesTopic:Critical Infrastructure, Cybersecurity, Emerging Technology, Physical Security, Secure Public Gatherings, Strengthen National Resilience, Targeted Violence and Terrorism PreventionLast Updated: -
#StopRansomware Guide
Ransomware is a form of malware designed to encrypt files on a device, rendering them and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful and have also exfiltrated victim data and pressured victims to pay by threatening to release the stolen data. The application of both tactics is known as “double extortion.” In some cases, malicious actors may exfiltrate data and threaten to release it as their sole form of extortion without employing ransomware. This guide is an update to the Joint Cybersecurity and Infrastructure Security Agency (CISA) and Multi-State Information Sharing & Analysis Center (MS-ISAC) Ransomware Guide released in September 2020 (see "What’s New") and was developed through the Joint Ransomware Task Force. It includes ransomware and data extortion prevention best practices and a corresponding response checklist.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical InfrastructureResource Type:Educational ResourcesTopic:Combat Cyber Crime, Critical Infrastructure, CybersecurityLast Updated: -
Cyber Hygiene Services
Cyber threats are not just possibilities but harsh realities, making proactive and comprehensive Cybersecurity imperative for all critical infrastructure. Adversaries use known vulnerabilities and weaknesses to compromise the security of critical infrastructure and other organizations. CISA offers free Cybersecurity services to help organizations reduce their exposure to threats by taking a proactive approach to monitoring and mitigating attack vectors.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical InfrastructureResource Type:Educational ResourcesTopic:Critical Infrastructure, CybersecurityLast Updated: -
Free CISA Cybersecurity Services & Tools
In addition to offering a range of no-cost CISA-provided Cybersecurity services, CISA has compiled a list of free services and tools provided by private and public sector organizations across the cyber community.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical InfrastructureResource Type:Assessments, Educational ResourcesTopic:Critical Infrastructure, CybersecurityLast Updated: -
CISA Cyber Essentials Starter Kit
CISA’s Cyber Essentials is a guide for leaders of small businesses as well as leaders of small and local government agencies to develop an actionable understanding of where to start implementing organizational Cybersecurity practices.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical InfrastructureResource Type:Educational ResourcesTopic:Critical Infrastructure, CybersecurityLast Updated: -
Multi-State Information Sharing and Analysis Center
The Multi-State Information Sharing and Analysis Center (MS-ISAC) is a CISA-supported collaboration with the Center for Internet Security designed to serve as the central Cybersecurity resource for the nation's State, Local, Territorial, Tribal (SLTT) governments. The MS-ISAC is a membership-based collaborative that is open to SLTT entities of all types, including SLTT government agencies, law enforcement, educational institutions, public utilities and transportation authorities, to name a few.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical InfrastructureResource Type:Educational Resources, Operational SupportTopic:Combat Cyber Crime, Critical Infrastructure, Cybersecurity, Emerging TechnologyLast Updated: -
Emergency Services Sector Active Shooter Workshop
The Cybersecurity and Infrastructure Security Agency (CISA) within the U.S. Department of Homeland Security hosts a one-day Active Shooter Workshop to enhance awareness of and response to an active shooter event.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical Infrastructure, Terrorism and National Security ThreatsResource Type:Training or ExercisesTopic:Active Shooter Preparedness, Critical Infrastructure, Emergency Communications, Physical Security, Targeted Violence and Terrorism PreventionLast Updated: -
Emergency Services Sector Landscape
Multiple factors may affect the critical infrastructure security and resilience posture of the Emergency Services Sector (ESS). These factors, which influence the current operating environment and associated decision-making processes, stem from environmental, technological, human, and physical causes. This document provides a sector-specific characterization of relevant factors and decision-making drivers influencing the current operating environment and security and resilience posture of the ESS. Government and sector partners may use this document to help identify and address factors that could have adverse effects on the security or resilience of facilities, personnel, and operations.
Audience:Campus Law Enforcement, State and Local Law Enforcement, Territorial Law Enforcement, Tribal Law EnforcementMission Area:Cyberspace and Critical Infrastructure, ResilienceResource Type:Educational Resources, Research and DevelopmentTopic:Critical Infrastructure, Strengthen National ResilienceLast Updated: