From the Ground Up: Opening a New Operational Immigration Center

From the Ground Up: Opening a New Operational Immigration Center 

 

On November 20th, 2014, President Obama issued a series of executive orders intended to expedite the processing of two-year work permits and driver’s licenses for nearly five million undocumented immigrants in the United States with no criminal records. 

While there are disagreements on such executive actions between party lines, it is clear that the tall task of staffing and organizing a center to process the millions of applications that will go through the hands of the U.S. Citizenship and Immigration Services (USCIS) offices is daunting. 

USCIS plans a new ‘operational center’ in Crystal City, Arlington, Virginia. It will house 1,000 full-time and part-time employees to carry out this rigorous and mission-critical process. With the stand-up of a new organization, USCIS will face many operational challenges such as: 
 

  • Interviewing, hiring, vetting, and onboarding new hires who meet security requirements
  • Designing and implementing a new organization, with processes and systems, to track applicants and their records
  • Developing standard operating procedures and risk-based criteria for this unique population of applications
  • Creating a workforce development system that includes training and career development
  • Managing the logistics associated with the new site, equipment, secure access, etc.
  • Managing dependencies with other functions in USCIS and across other agencies

One of the biggest challenges is the tight timeframe to recruit, screen, hire and train the workforce. As with any recruiting effort, it will be critical to focus on the quality of new hires. The best and the brightest minds should be brought on board and the standards or qualifications for candidates should be stringently maintained for both senior leaders and processors at the new center.

The Department of Homeland Security is no stranger to consolidating and establishing new agencies or task forces in rapid transition. This is a big opportunity to use best practices from previous experience to staff the center with the right resources and employees. Managers in charge of carrying out the creation of this center must keep transparency at the heart of the decisions they make. This will build trust quickly in the new operation.

In keeping to the mission, standards must also be set for the review of undocumented immigrant applications to emphasize repeatable standards and detect fraud. New hires must be equipped with repeatable benchmarks to review applications efficiently, process them without error, and detect fraud consistently.

Learn more about how Arc Aspicio supports:
The Immigration Mission

 

Contributors

Ivi Demi |

Ivi Demi is a Senior Associate with a background in development economics, international development and trade, disaster resilience, homeland security, and public policy. He has worked on contracts as an intern, policy assistant, and researcher that have included a political campaign, an insurance research institute, a UN Food and Agriculture Organization field office, and a defense contractor. His work experience and travels have taken him to numerous countries abroad in the developing world, including Gabon, Kenya, and Kosovo. Ivi received his Bachelor of Science in International Agriculture and Rural Development and Master of Public Administration degrees from Cornell University.

Reinventing Strategy

Reinventing Strategy

Since the GPRA Modernization Act in 2010, agencies across the Federal Government have raced to establish new Strategic Plans in response to incoming Presidential Administrations and agency leaders. Developing a new Strategic Plan is incredibly exciting for an agency. Leaders can redefine priorities, frontline managers can improve mission performance, and employees can better engage with the mission. Strategy, however, is so much more than just a Strategic Plan.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Effect Action

Behavioral Science – Using Behavioral Science to Effect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.