Nexgen investigators handle different assignments for different clients to include Background Checks, Criminal Checks, Witness Locates, and Evidence Retrieval or Judgment Recovery and more.

CE-Enforcement-Actions-For-Businesses-Schools-Houses-of-Worship

Guidelines for Handling ICE Enforcement Actions: For Businesses, Schools, & Houses of Worship

Frank Costa, President of NEXGEN Protection Services on ICE Enforcement Actions:

ICE raids have not been corroborated by officials. Most ICE Enforcement operations appear to have taken place in public areas, particularly locations where immigrants are known to gather, such as outside restaurants and large hardware stores where day laborers are often hired.

President Donald Trump promised a significant increase in the number of migrants detained and deported, and on the day of his inauguration, he signed several executive orders to address the issue.  The Acting Department of Homeland Security Secretary issued a directive rescinding a previous order that made sensitive areas—such as schools, churches, and hospitals—off-limits for most immigration enforcement actions.

Guidelines for Businesses Facing an ICE Enforcement Action:

  1. Record the officers’ names and badge numbers.
  2. If there is no warrant, allow agents to enter public areas of the premises. If they attempt to search nonpublic areas, inform them that you object to the search but do not physically restrain them.
  3. If the officers have a warrant, ensure it is signed by a judge and take note of any restrictions listed, such as specific places to be searched. Even with a signed warrant, a representative from the company should state that the company does not consent to the search. A company representative should follow the officers to ensure they remain within the boundaries of the warrant and document any actions that might exceed those bounds.
  4. Businesses should not assist employees who attempt to hide from officers, nor should they lie to officers or attempt to destroy or hide documents or equipment.
  5. Unlock any locked areas that are covered by the warrant if requested by the officers.
  6. Do not interfere if officers speak with employees, and do not instruct employees to avoid cooperating. However, you may inform employees that they are not required to answer officers’ questions.

The full guidance also notes that ICE may audit the business’s I-9 documentation and provides additional instructions on how to respond to such notifications.

Source:
Briscoe, S. (January 28, 2025). Companies, Schools, Houses of Worship, and Hospitals Get Advice for Handling ICE Enforcement Actions. Security Managment Magazine.

 

Terrorist-Organizations

The Trump Administration Designates Several Cartels as Terrorist Organizations

Frank Costa, President of NEXGEN Protection Services on Terrorist Organizations:

The Trump administration designated eight Latin American cartels as terrorist organizations on Thursday, a designation typically reserved for groups with political goals achieved through violence.

The U.S. Department of State filed the notice of the designation in The Federal Register on February 20. The action targets the following cartels:

  • Cartel del Golfo (CDG), also known as the Gulf Cartel and the Osiel Cárdenas-Guillén Organization
  • Cartel del Noreste (CDN), also known as the Northeast Cartel and Los Zetas
  • Cartel de Jalisco Nueva Generación (CJNG), also known as the Jalisco New Generation Cartel
  • Cartel de Sinaloa, also known as the Sinaloa Cartel, the Mexican Federation, and the Guadalajara Cartel
  • Carteles Unidos, also known as United Cartels, Tepalcatepec Cartel, Cartel de Tepalcatepec, the Grandfather Cartel, Cartel del Abuelo, and Cartel de Los Reyes
  • La Nueva Familia Michoacana (LNFM)
  • Mara Salvatrucha (MS-13)
  • Tren de Aragua (Aragua Train)

The eight cartels’ members are described as “foreign persons who have committed or attempted to commit, pose a significant risk of committing, or have participated in training to commit acts of terrorism that threaten the security of U.S. nationals or the national security, foreign policy, or economy of the United States,” according to the State Department filing.

Source:
Gates, M. (February 20, 2025). United States Designates 8 Cartels as Terrorist Organizations. Security Management Magazine.



Incident Report

Well-Written Incident Reports: An Essential Element of Effective Public-Private Partnerships

Frank Costa, President NEXGEN Protection Services —

Receiving well-written, complete, and timely incident reports from private security partners is a critical aspect of any case. While verbal witness statements can be helpful, they do not provide the level of detail that investigators need to understand the full scope of a case.

In recent years, there has been growing emphasis on the importance of effective partnerships between private security and public law enforcement. As the demands on law enforcement increase alongside recruiting challenges and shrinking budgets, private security will inevitably take on more responsibilities traditionally handled by public agencies.

With law enforcement struggling to meet the rising demand for their services and facing a shortage of new officers, the burden of safety and security falls increasingly on private security personnel. This shift means that private security must excel in all aspects of their role. One core requirement is proficiency in writing comprehensive and factual Case Incident Reports (CIRs).

Furthermore, the ability of private security officers to write clear and effective reports becomes especially crucial when facing legal challenges. In the eyes of the court, if an event isn’t documented, it essentially didn’t happen.

 

Source:
Conley, T. (January 20, 2025). Well-Written Incident Reports Are an Essential Element of Effective Public-Private Partnerships. Security Management Magazine.

Why Does the Public Feel Unsafe and Have No Privacy?

Why Does the Public Feel Unsafe and Have No Rights?

Frank Costa, President, Nexgen Protection Services

People want to feel safe without the discomfort of being constantly monitored, which presents a challenge for security leaders who must continue prioritizing safety while respecting privacy.

Privacy Concerns:

Modern individuals place a high value on privacy and often feel uneasy when security measures appear overly focused on surveillance, such as excessive camera monitoring or intrusive personal checks.

Subtle Security:

Security leaders must focus on methods that provide protection without being overtly noticeable. By doing so, they can create a more comfortable experience for individuals while still ensuring safety.

Creative Solutions:

This can involve the use of technology such as smart sensors that activate only when necessary, discreet security personnel, or designing spaces in a way that naturally promotes safety without feeling oppressive or invasive.

Source:
(2025, Jan 09). Navigating Surveillance: Balancing Security and Privacy. Security Magazine.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


How Security Is Shaping the Cannabis Industry

How Security Is Shaping the Cannabis Industry

Frank Costa, President, Nexgen Protection Services

A surveillance system can help protect your business from theft, particularly employee theft, which is a widespread issue in the cannabis industry. For large outdoor growing operations, having a monitoring system in place provides peace of mind by securing your property from all angles at all times.

Source:
Baxter, K. (2025, January 13). How security is shaping the cannabis industry. Security InfoWatch.

#protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats



Remote Video Monitoring: The Future of Security for Businesses

Remote Video Monitoring: The Future of Security for Businesses

Frank Costa, President, Nexgen Protection Services

The future of security isn’t just on our doorstep — it’s breaking down the front door.
The security industry has experienced unprecedented advancements in technology and public policy, reshaping the way we approach safety and protection. And this rapid pace of change shows no signs of slowing.

Remote video monitoring (RVM) is poised to become a non-negotiable security tool for businesses — and soon, for homes.

2025 is not just about better security; it’s about smarter, proactive protection. RVM will be at the center of this shift.

This innovative approach addresses the limitations of on-site security guards and traditional surveillance systems. By integrating AI into RVM, businesses can mitigate human error, significantly reduce costs, and set new industry standards. Those who harness the power of AI for RVM will be well-positioned to thrive in this new era.

 

SOURCE: 

Selinger, D. 2025 will mark a turning point in physical security tech. Here’s why. Deep Sentinel, 12/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Frank Costa, President, Nexgen Protection Services

The cybersecurity landscape continues to evolve at an unprecedented pace. With the rise of sophisticated attack methods, the integration of new technologies, and increasing connectivity across sectors, businesses are facing more complex cybersecurity threats than ever before. Staying informed and prepared is critical to protecting data, maintaining trust, and ensuring business continuity.

Supply Chain Attacks

As businesses increasingly rely on external vendors and partners, supply chain attacks have become a significant cybersecurity concern. In these attacks, threat actors infiltrate a company’s system by compromising a third-party provider, gaining access to multiple organizations through a single vulnerability.

How to Prepare:

  • Vendor Risk Assessments: Conduct thorough security assessments for all vendors and partners to identify potential vulnerabilities.
  • Contractual Security Requirements: Include cybersecurity clauses in vendor contracts to ensure security standards are upheld.
  • Network Segmentation: Isolate critical systems from external partners to prevent attackers from moving freely within your network.
  • Continuous Monitoring: Use real-time monitoring to track vendor activity and detect any unusual behavior early.

 

SOURCE: 

Top Cybersecurity Threats to Watch in 2025: How Businesses Can Prepare, Boston Institute of Analytics, 11/14/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Breaking Through to Better Communication During De-Escalation

Deescalation & Conflict Resolution: Strategies for a Secure Workplace

Frank Costa, President Nexgen Protection Services – 

Ensuring a secure and harmonious workplace involves effectively managing conflicts and potential violence. This is where the concepts of de-escalation and conflict intervention become essential tools for promoting safety and preventing workplace violence.

Focus is on the identification and management of aggressive behaviors and empowering employees to respond to those behaviors in a way that minimizes the risk of injury—whether psychological, social, or physical—to the person in crisis or the staff.

 

Utilize these three non-content elements to create comfort in a stressful situation – 

Tone of voice. 

If what you say doesn’t match how you say it, trust is lost. Adopting a soft, quiet tone of voice helps quiet people down to ensure they can hear you. 

Proximity. 

During de-escalation, responders tend to come closer to the individual in distress to try and influence them. Give the individual in crisis the space they need to feel safe. Sometimes even miming touching the person on the upper arm can signal support and safety.

Space to vent. 

Although safety must always come first, the best conversations take place with comfort for both parties, and if someone is not comfortable, it is important that we give them some room to get that discomfort out of the way.

SOURCE: 

Meyer, C. Breaking Through to Better Communication During De-Escalation, 11/1/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Diversity & Inclusion In the Workplace – Fostering Understanding and Fairness

Diversity & Inclusion In the Workplace – Fostering Understanding and Fairness

Frank Costa, President Nexgen Protection Services – 

Federal laws prohibit discrimination based on characteristics like race, sex, religion, and disability. Promoting diversity and inclusion in the workplace encourages innovation, improves morale, and helps attract top talent. Training on bias, cultural differences, and inclusivity helps employees understand and respect their coworkers’ diverse backgrounds.

 

To foster diversity and inclusion in the workplace:

  1. Foster supportive dialogues.
    Encourage your employees to be vulnerable and honest. Don’t pretend that it’s all business as usual in the face of major political events. Instead, set up open, empathetic spaces for people to process and come together.

  2. Reaffirm your commitment to your values.
    Many company leaders talk about diversity, equity, and inclusion, but this is a chance to live up to your commitments and make sure your actions match your words. Take a moment to let your employees know that no matter what’s happening outside company walls, within them, your leaders are committed to fostering safe, inclusive environments where all employees feel empowered to be their best selves and do their best work.

  3. Train everyone in inclusion.
    Make sure all of your team members—not just people leaders, but also more junior employees and individual contributors—understand what it means to foster an inclusive environment and are clear on the role they play in doing so. Provide training and resources that give employees the skills to practice inclusivity at work.

 

SOURCE: 

Ruiz, V. B3 Essential Employee Trainings For Your Company Curriculum, 10/7/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Background Checks Can Spot Red Flags On Applications

Background Checks Can Spot Red Flags On Applications

Frank Costa, President Nexgen Protection Services – 

For security integrators and consultants, background checks play an obviously vital role, as many employees are placed in a position of high trust for customers.   

During the hiring process, a company may conduct a background check to ensure that a candidate does not have a criminal background that could create a danger in the workplace or is being truthful about their employment history. 

Background checks verify a wealth of information about prospective candidates:

 

Identity: 

Background checks can help verify a person’s identity. Checking against records like social security numbers and fingerprint databases ensures that a person is actually who they say they are and has no malicious intentions.

 

Credit: 

Depending on who conducts a background check, it may include a detailed or abbreviated credit history report. Credit history is a crucial determinant of whether a lender will approve a loan to someone, while employers can check a prospective employee’s credit history to gauge how responsible they might be.

 

Criminal history: 

Background check providers will compare a person against several criminal databases on a state, national, and international level to ensure any relevant criminal charges in an applicant’s past are brought to light. Knowing this information is especially important for employers, especially for jobs in the security industry.

 

Employment, academic, and licensure verification: 

Background checks can also verify essential qualifications such as employment history, academic credentials, and licenses. Since these qualifications are often legally required for jobs, verifying them with a background check ensures that new hires meet all legal requirements.

 

SOURCE: 

Coats, K. Background Checks for Security Businesses, Security Info Watch Magazine, 11/19/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats