Immigration Enforcement: Small Solutions Have a Big Impact

Immigration Enforcement: Small Solutions Have a Big Impact

A small group of 15 auditors at Immigration and Customs Enforcement (ICE) may soon have a substantial impact on worksite compliance. ICE recently announced the creation of a new unit to help combat the employment of illegal aliens. The Employment Compliance Inspection Center complements the Obama administration’s strategy of investigating employer violations of illegal hiring by analyzing I-9 and tax data of large companies suspected of violations to help ICE field offices pinpoint cases to pursue. ICE has announced plans to audit the records of approximately 1,000 businesses in the coming months. This program will complement the operational employment verification programs (e.g., U.S. Citizenship and Immigration Services (USCIS) E-Verify) and investigative compliance programs across the Department.

This approach is, in part, a response to criticism that local field offices did not have the manpower or tools to investigate larger companies and that ICE has predominantly brought recent cases against smaller businesses. It further supplements the primarily voluntary employment verification programs (e.g., E-Verify, ICE IMAGE) by giving the Department of Homeland Security (DHS) the data to support stricter compliance actions against businesses who fail to meet established standards.

As with any new enforcement and compliance tool, there is backlash from the private sector. They are already raising complaints that these investigations are invasive and unfairly take advantage of businesses who believe they are in compliance, but still have illegal workers on their books. Subsequent corrective action could result in immediate termination of portions of the employer’s workforce and/or the leveeing of fines, both having a negative impact on the company’s production and financial viability. Furthermore, some have expressed concerns that given the current Federal budget crisis, this is not the right time or place to expend limited resources (e.g., estimates say the team will cost $1M in the first year).

ICE should continue to use all available tools at its disposal to combat illegal hiring. Using inspection and monitoring tools to drive companies to engage with compliance programs enhances DHS’s ability to enforce the immigration laws already on the books. The benefits of this and similar programs not only outweigh the negatives, but also provide value in other areas:

  • Increases the leveeing and collection of fines associated with these violations. In 2010, employers paid nearly $7M, a seven-fold increase in fines from the year before. With the additional audits, collections could reach $25M in the next year. These funds would not only pay for the unit itself, but also support other mission areas. Examples of this model exist within DoJ and Health and Human Services.  Their compliance task forces successfully collect millions of dollars each year, which offset any costs of operating the units
  • Provides additional resources to enable DHS to expand it’s monitoring beyond the primarily voluntary employment verification programs
  • Identifies better data analysis techniques and applications that could support other mission needs. For example, E-Verify’s Monitoring & Compliance Branch could leverage lessons from ICE to automate its processes to more proactively pick up on new trends and behaviors
Immigration

Contributors

* Arc Aspicio |

Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. Focused on innovation, Arc Aspicio provides services in strategy, design, human capital, operations, analytics and visualization, technology and information sharing. The company is known for a strong, collaborative culture that values gratitude, provides leadership opportunities, and explores the future. Our teams take a human-centered approach to working with clients and are flexible and responsive within dynamic Government client environments where missions evolve and new priorities arise sometimes even daily. We thrive on these situations and promote continuous improvement and new ideas. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Lynn Ann Casey / Chief Executive Officer info@arcaspicio.com 703.465.2060

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.

Top Qualities of Design Thinking Leaders

Top Qualities of Design Thinking Leaders

Design Thinking is on the rise in the business world. Design Thinking leaders focus on creating the best product for their clients and working with the experiences and insight of fellow coworkers. Some of the key characteristics of Design Thinking leaders present themselves in individuals who are open and subject themselves to vulnerability with clients and coworkers. These qualities help leaders to connect and build relationships with others. They also create an open flow of communication that allows for others to better share their knowledge to align with and understand the company's mission.

Think, Key, Speak: Purposeful Communications

Think, Key, Speak: Purposeful Communications

I spent the early years of my career in the United States Navy as a Naval Flight Officer on the E-2C Hawkeye, the Navy’s aircraft carrier-based Airborne Early Warning and Command and Control platform. The various missions of the aircraft demand that aircrew monitor up to ten radio frequencies, and actively speak on three or four of those, at any given moment in flight.