CE-Enforcement-Actions-For-Businesses-Schools-Houses-of-Worship

Guidelines for Handling ICE Enforcement Actions: For Businesses, Schools, & Houses of Worship

Frank Costa, President of NEXGEN Protection Services on ICE Enforcement Actions:

ICE raids have not been corroborated by officials. Most ICE Enforcement operations appear to have taken place in public areas, particularly locations where immigrants are known to gather, such as outside restaurants and large hardware stores where day laborers are often hired.

President Donald Trump promised a significant increase in the number of migrants detained and deported, and on the day of his inauguration, he signed several executive orders to address the issue.  The Acting Department of Homeland Security Secretary issued a directive rescinding a previous order that made sensitive areas—such as schools, churches, and hospitals—off-limits for most immigration enforcement actions.

Guidelines for Businesses Facing an ICE Enforcement Action:

  1. Record the officers’ names and badge numbers.
  2. If there is no warrant, allow agents to enter public areas of the premises. If they attempt to search nonpublic areas, inform them that you object to the search but do not physically restrain them.
  3. If the officers have a warrant, ensure it is signed by a judge and take note of any restrictions listed, such as specific places to be searched. Even with a signed warrant, a representative from the company should state that the company does not consent to the search. A company representative should follow the officers to ensure they remain within the boundaries of the warrant and document any actions that might exceed those bounds.
  4. Businesses should not assist employees who attempt to hide from officers, nor should they lie to officers or attempt to destroy or hide documents or equipment.
  5. Unlock any locked areas that are covered by the warrant if requested by the officers.
  6. Do not interfere if officers speak with employees, and do not instruct employees to avoid cooperating. However, you may inform employees that they are not required to answer officers’ questions.

The full guidance also notes that ICE may audit the business’s I-9 documentation and provides additional instructions on how to respond to such notifications.

Source:
Briscoe, S. (January 28, 2025). Companies, Schools, Houses of Worship, and Hospitals Get Advice for Handling ICE Enforcement Actions. Security Managment Magazine.

 

Law-Enforcement

New Framework for Law Enforcement to Make Ethical Decisions

Frank Costa, President of NEXGEN Protection Services on Law Enforcement:

Europol released a new framework designed to help law enforcement make ethical decisions regarding the incorporation of new technologies into their work.

The framework is part of the report Assessing Technologies in Law Enforcement: A Method for Ethical Decision-Making, which provides a structured approach for evaluating new technology while ensuring the preservation of public trust and the protection of fundamental rights.

The goal of the framework is to ensure that the adoption and use of new technologies align with core values such as transparency, fairness, privacy, and accountability. By implementing this structured ethical framework, Europol aims to enhance public confidence in law enforcement’s use of technology, ensuring that innovation in policing aligns with societal values and legal safeguards.

The framework outlines steps to support law enforcement in making ethically sound decisions when using innovative technology. It encourages law enforcement agencies to ask the following four questions to assess the ethical appropriateness of technology:

  1. Consistency: Is the use of the technology always appropriate under similar conditions?
  2. Dignity: Does the technology usage demonstrate that law enforcement agencies are acting in the best interest of the people, rather than using their authority solely for other objectives?
  3. Public Acceptance: Would the use of this technology be acceptable to the public if it were made generally known?
  4. Accountability: Are the necessary competencies and resources in place to take responsibility for the use of the technology?

If the answer to any of these questions is “no,” Europol recommends rejecting or modifying the use of the technology in that specific case. If the answers are affirmative, Europol suggests law enforcement agencies evaluate the potential short-term and long-term consequences of using the technology. This step helps weigh the potential impacts on all parties involved and assess any biases that might arise.

Source:
Gates, M. (February 21, 2025). Europol Publishes Framework on Ethical Use of New Technology in Law Enforcement. Security Management Magazine.

 

Terrorist-Organizations

The Trump Administration Designates Several Cartels as Terrorist Organizations

Frank Costa, President of NEXGEN Protection Services on Terrorist Organizations:

The Trump administration designated eight Latin American cartels as terrorist organizations on Thursday, a designation typically reserved for groups with political goals achieved through violence.

The U.S. Department of State filed the notice of the designation in The Federal Register on February 20. The action targets the following cartels:

  • Cartel del Golfo (CDG), also known as the Gulf Cartel and the Osiel Cárdenas-Guillén Organization
  • Cartel del Noreste (CDN), also known as the Northeast Cartel and Los Zetas
  • Cartel de Jalisco Nueva Generación (CJNG), also known as the Jalisco New Generation Cartel
  • Cartel de Sinaloa, also known as the Sinaloa Cartel, the Mexican Federation, and the Guadalajara Cartel
  • Carteles Unidos, also known as United Cartels, Tepalcatepec Cartel, Cartel de Tepalcatepec, the Grandfather Cartel, Cartel del Abuelo, and Cartel de Los Reyes
  • La Nueva Familia Michoacana (LNFM)
  • Mara Salvatrucha (MS-13)
  • Tren de Aragua (Aragua Train)

The eight cartels’ members are described as “foreign persons who have committed or attempted to commit, pose a significant risk of committing, or have participated in training to commit acts of terrorism that threaten the security of U.S. nationals or the national security, foreign policy, or economy of the United States,” according to the State Department filing.

Source:
Gates, M. (February 20, 2025). United States Designates 8 Cartels as Terrorist Organizations. Security Management Magazine.



Fraud-Schemes-Continue-to-Rise

Fraud Schemes Continue to Rise

Frank Costa, President of NEXGEN Protections Services on Fraud Schemes:

Fraud remains a persistent problem that organizations continue to struggle with, including the U.S. Federal Trade Commission (FTC), one of the federal agencies tasked with addressing fraud schemes.

Below are some of the top fraud scams that affected individuals and organizations in 2024 and are likely to continue being a problem in 2025.

  1. Investment Scams
    This scam tactic has been around for ages. Fraudsters often present themselves with seemingly lucrative business opportunities that promise regular returns—if you invest immediately.
  2. Business Email Compromise (BEC)
    BEC schemes have been around since email was first introduced and typically occur in one of two ways, according to Schlereth.
    Fraudsters either spoof a legitimate email address or domain name, often adding an extra letter so the sender appears authentic at a quick glance. Alternatively, they may use social engineering to obtain an employee’s credentials and then log into the victim’s work email. CFOs and CEOs are particularly lucrative targets.
  3. Check Fraud
    What’s old is new again. Check fraud surged last year, especially after individuals posted videos on social media showing themselves writing bad checks, depositing them at ATMs, withdrawing cash before the check bounced, and sharing their behavior.
    “Fraudulently altered checks can cause significant losses to financial institutions and disrupt bank operations,” the report states. “Due to the nationwide surge in check fraud targeting U.S. mail, the Financial Crimes Enforcement Network (FinCEN) issued an alert urging financial institutions to be vigilant in identifying and reporting such activity.”
  4. Impersonation Fraud
    In this scam, criminals claim victims are suspects in financial crimes and threaten arrest or violence unless they pay the criminals. Additionally, fraudsters are impersonating customer service and tech support providers, often targeting individuals over 60 by phone. They claim that the victim’s computer has been compromised and needs immediate repair.

Source:
Gates, M. (February 1, 2025). Trend Alert: 4 Fraud Schemes to Watch in 2025. Security Management Magazine.

 

Security Protection

Executive Security Protection: Risks, Extremist Influencers, Shifting Tactics

Frank Costa, President of NEXGEN Protection Services on Security Protection:

Concerns about executive safety remain high. Not only was UnitedHealthcare CEO Brian Thompson tragically killed in December 2024, but there have also been multiple other incidents involving threats against business executives. Additionally, social media influencers and other sources have incited calls for similar attacks.

High-level executives without an executive security protection (EP) team are increasingly vulnerable to becoming targets.

The heightened emotional climate surrounding politics and public figures has made executive protection more challenging—and more essential. Politically motivated threats were notably higher in 2024. More than 50 members of Congress were victims of swatting attacks, and 700 members had faced threats the previous month. (Many threats were not publicly reported, so they are not included in TorchStone’s official threat count.)

Tactics are also evolving. Threat incidents are now categorized as verbal or written threats, harassment, stalking, physical attacks, and other crimes, which may include financially motivated offenses such as robberies, home invasions, and property crimes.

Source:
Gates, M. (February 5, 2025). EP Trends: Residential Risks, Extremist Influencers, Shifting Tactics. Security Management Magazine.



Fraud-Detection-with-Video-Surveillance-Analytics.

Ways to Boost Fraud Detection with Video Surveillance & Analytics

Frank Costa, President of NEXGEN Protections Services on Fraud Detection:

Fraud costs the financial sector billions of dollars each year. It’s a persistent challenge for banks globally, made more complex by increasingly sophisticated fraud tactics and methods.

To stay ahead of fraud, financial institutions must leverage every available tool to protect their customers and assets. One such tool is video surveillance and analytics. By integrating video technology with fraud detection systems, banks can gain real-time insights, spot patterns, and take a proactive approach to security. This not only helps detect fraud but also prevents it from escalating.

  1. Real-Time Fraud Alerts
    Fraud detection systems generate a massive amount of data, but not every alert indicates a genuine threat. Video surveillance adds a critical visual layer, helping differentiate between legitimate fraud and false alarms.
  2. License Plate Recognition
    Drive-up ATMs and tellers face unique security challenges, especially in suburban and rural areas. License Plate Recognition (LPR) technology, integrated with video systems, offers a powerful way to identify vehicles linked to fraudulent activities. This information can be used to flag repeat offenders or known fraudsters.
  3. Behavioral Analytics
    ATM skimming is one of the most persistent threats to banks. Video surveillance equipped with behavioral analytics can identify suspicious patterns, such as individuals loitering near ATMs without conducting transactions or using multiple cards in quick succession.
  4. Integrated Surveillance
    ATM jackpotting—where criminals manipulate ATMs to dispense large amounts of cash—is a growing global issue. Combining video surveillance with physical sensors offers an effective defense. Cameras can detect unusual activity, like tampering, suspicious vehicles parked near ATMs, or vehicles with no license plates, and trigger real-time alerts.
  5. Loitering Detection
    Ensuring customer safety, especially at ATMs after hours, is a top priority for banks. Video surveillance with loitering detection analytics can identify individuals lingering near ATMs for extended periods, enabling timely intervention.
  6. Video Storage with Hybrid Solutions
    Storing surveillance footage for extended periods can be expensive. Hybrid storage solutions, which combine on-premises and cloud-based video storage, offer a practical alternative. Banks can securely store critical footage without the need for large-scale on-site infrastructure.
  7. Camera-to-Cloud Solutions for Remote Monitoring
    In some areas, installing on-site recorders can be impractical due to space or connectivity issues. Camera-to-cloud solutions address this by streaming video directly to the cloud. This eliminates the need for on-site hardware while maintaining full surveillance capabilities.
  8. Disaster Preparedness for Video Data
    Natural disasters pose a significant challenge to video surveillance systems. To mitigate this risk, banks should ensure that critical footage is preserved, even when on-site systems are compromised. Centralized evidence archiving allows banks to offload important video data to secure locations before a disaster strikes.

Transforming Fraud Prevention with Video Analytics

Video surveillance and analytics are revolutionizing fraud prevention, equipping banks with powerful tools to detect threats in real-time, enhance customer safety, and streamline security operations. From preventing ATM skimming and jackpotting to addressing loitering and improving evidence management, integrating video technology with existing systems strengthens banks’ ability to combat financial crime.

Source:
Corral, J. (February 5, 2025). 8 Ways to Boost Fraud Detection with Video Surveillance and Analytics. Security Management Magazine.



Lighting Standards

Lighting Standards for Parking Facilities

Frank Costa, President of NEXGEN Protection Services:

While there have been several advancements in technology that can improve a facility’s physical security, simple and cost-efficient lighting upgrades can make a significant impact. Effective lighting in parking facilities can deter trespassers, reveal tripping hazards, and make properties feel safer.

For any owner or operator of a parking area, it’s important to understand the relevant lighting requirements. Although building codes can vary across jurisdictions and regions, at least two organizations have provided standards that all parking facilities can meet to help increase safety and security for users and staff as a baseline.

Parking structures. These areas are difficult to light since there are few vertical elements to reflect light or provide contrast to moving objects. In some municipalities, building codes require a bright white horizontal stripe on walls, at waist height, to improve contrast. The lack of ceiling clearance restricts the height of luminaires and requires the fixtures to spread the light horizontally. This is excellent for lighting vertical surfaces; however, if video cameras are used, the luminaire design should be selected to reduce glare at the camera lens. A horizontal illuminance level of 5 footcandles with a uniformity ratio of 4:1 provides an adequate level of security.

Open parking.  The height of luminaires is less restricted in open than in covered parking unless local codes and light trespass become factors. The higher light sources tend to provide horizontal illumination. Energy conservative, high-pressure sodium lighting has high efficiency, high lumens per watt, and is cost-effective for open parking. Recommended light levels range from a minimum of 0.2 footcandles in low-activity general parking and pedestrian areas to 2 footcandles in high-activity vehicle areas. Cash collection and vehicular access control areas should be maintained at a minimum of 5 footcandles.

 

Source:
Mosqueda, S. (January 13, 2025). Lighting Standards for Parking Facilities. Security Management Magazine.



Build a Security Mindset Up & Down the Organization

Build a Security Mindset Up & Down the Organization

Frank Costa, President, Nexgen Protection Services

For security to be truly effective, everyone at your organization must be both informed and invested in safeguarding against external threats. Infusing a security mindset throughout the organization requires consistent prioritization and active engagement at all levels.

Security is constantly evolving, and staying ahead of emerging threats demands continuous knowledge-sharing and collaboration. Exceptional security processes arise from working together, learning from peers, and uplifting one another. Without this approach, organizations risk stagnation and vulnerability to new digital threats.

Given that security needs constantly change in response to unpredictable events and evolving threats, vigilance is essential. By maintaining strong partnerships with departments across the organization and encouraging innovative thinking, security professionals can help ensure business resilience and productivity.

 

Source:
Armer, M. (2020, Jun 24). 4 Ways to Always Be Improving Security. enterprisersproject.com.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


The Critical Need for Secure Communications in Modern Law Enforcement

The Critical Need for Secure Communications in Modern Law Enforcement

Frank Costa, President, Nexgen Protection Services

As cyber threats continue to evolve and multi-agency operations become more common, the need for secure communications in law enforcement has never been more critical. Recent events, such as coordinated responses to threats against public figures, have underscored the challenges of maintaining secure, effective communication across multiple agencies while safeguarding sensitive information.

Law enforcement agencies face unique challenges when it comes to securing their communications. 

Unlike private sector organizations, they cannot afford to go offline during a security breach. They must ensure continuous operations while managing sensitive data about ongoing investigations, coordinating responses to emergencies, and sharing critical intelligence across jurisdictions. The stakes are especially high when multiple agencies must collaborate quickly, as demonstrated in recent high-profile security operations.

To stay ahead of these challenges, law enforcement agencies must implement robust, secure communication platforms that meet their operational needs while protecting sensitive information and preserving public trust.

Source:
Halstead, J. (2025, Jan 03). The Critical Need for Secure Communications in Modern Law Enforcement. https://avice.org/

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Security Protection: Conflict, Confusion & Chaos

Security Protection: Conflict, Confusion & Chaos

Frank Costa, President, Nexgen Protection Services

By 2025, emerging “rogue actors” will operate with increasing impunity as countries fragment—geographically, ethnically, and ideologically. Established political parties, both left and right, are in systemic decline, steadily losing primary vote shares to insurgent candidates and parties across the political spectrum.

For security professionals, the message is clear: the landscape is becoming more complex. However, with the right tools and strategies, it’s still possible to manage risks and seize opportunities. Technology will play a crucial role in identifying incidents, delivering personalized risk information, and supporting the fieldwork, local knowledge, and analysis provided by risk professionals.

The most resilient organizations in this fragmenting world will combine advanced technology with “human-in-the-loop” strategies, enabling better decision-making in an increasingly unpredictable environment.

Source:
(2025, Jan 06). An Era of Conflict: Navigating a ‘Fragmenting World’ in 2025. Security & Business Resilience.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats