Verified Document

Criminal Justice Management Issues Term Paper

¶ … Policy Analysis: Interior Enforcement of the Employment of Immigrants Criminal Justice

History of the Problem and Need for Change

Problem Scope.

In 2004, three U.S. companies were issued penalty notices by the U.S. Department of Homeland Security (DHS) for knowingly employing unauthorized workers (Porter, 2006). At the time, demographers estimated that six to seven million illegal immigrants were employed in the America -- that number is approximately equivalent to 5% of the U.S. workforce (Porter, 2006). In 2007, DHS reported that 275,000 non-citizen immigrants were caused to leave the U.S. By DHS action (Lee, 2009). In 2009, the unauthorized immigrant population was believed to stand at approximately 12 million (Lee, 2009). In April 2009, the Secretary of the Department of Homeland Security, Janet Napolitano, instructed United States Immigration and Customs Enforcement (ICE) to intensify targeted investigation of employers who knowingly hire unauthorized workers. During 2010, ICE broke its record for criminal prosecutions related to the unlawful hiring of immigrants for purposes of employment. In 2009, 114 business owners, employers, managers and/or supervisors were charged with breaking the law, and in 2008, the number was 136 -- but in 2010, this number rose to 180. Overall, the ICE had a greater presence at sites of employment in 2010, as it completed more than 2,200 I-9 audits, and this was up from about 1,400 in 2009.

Potential Causes of the Problem & Previous Interventions

Policy Slippage.

Employers are fundamental drivers of immigration policy, and they tend to be quite unhappy with the provisions for fines and penalties against employers who hire unauthorized workers that are the lynchpin of current immigration law. A pivotal problem with the policies enacted to date is that policymakers have tended to underestimate and misunderstand the business impact of enacted and proposed state and federal legislation.

While scholars have offered rich and textured analyses of the ever-expanding grounds for removing immigrants, surprisingly little attention has been paid to immigration screeners - the persons and institutions that assist the DHS in identifying candidates for removal. [An] under-theorized site of immigration screening and one particularly problematic set of immigration screeners: the workplace and our nation's employers. (Lee, 2009)

This procedural analysis works within the established theoretical framework to identify and propose a potential solution for addressing the non-compliance issues of many American employers who continue to hire, and facilitate the hiring of, unauthorized workers.

No-Match Letters. On July 10, 2009, Janet Napolitano announced plans for the DHS to rescind the 2007 Social Security No-Match Rule. The No-Match Rule makes provision for letters to be sent to employers when W-2 forms have been submitted that do not match the records held by the Social Security Administration (SSA). The intent of the regulation is to provide clarification to employers about their obligations. Beginning in 1994, the SSA sent no-match letters to employers exhibiting patterns of non-compliance with the Immigration Reform and Control Act of 1986 (IRCA). IRCA prohibits employers from "knowingly" employing aliens who are not authorized to work in the U.S. Employers questioned whether receipt of a no-match letter was actually "constructive knowledge" that an employee was unauthorized to work in the U.S. This policy void permitted employers to take little or no action following receipt of the letters.

E-Verify System. A new system has been instituted by DHS to monitor and enforce workplace practices related to unauthorized workers. A "more modern an effective E-Verify system" (Carafano, 2009), has been implemented that facilitates the process of instantly checking the work eligibility status of job applicants. E-Verify uses a secure online system to triangulate the data from DHS databases, I-9 forms submitted by employers for planned hiring, and SSA databases (Carafano, 2009). Employers are not charged for use of the service, however, they are responsible for providing infrastructure and personnel to use the system. (Carafano, 2009). On the heels of the implementation DHS announced "the Administration's support for a regulation that will award federal contracts only to employers who use E-Verify to check employee work authorization" (Carafano, 2009). Use of E-Verify is required by the federal government for all employers performing work under federal contracts, but voluntary for employers who are government contractors in only 10 states, and in three states, all employers are required to use the system.

Westat, a consulting firm hired to evaluate the performance of the E-Verify system, reported that 96% of the time, the system provided accurate answers (Edwards, 2010). According to the Westat assessment, employers did not perceive the system as burdensome, and out of the 104 employers surveyed, 94 reported...

A fundamental problem with the E-Verify system has been that identify theft permits about half of illegal immigrants -- which is 54%, according to Westat -- from being properly screened by the system (Edwards, 2010). According to Westat, "Many unauthorized workers obtain employment by committing identity fraud that cannot be detected by E-Verify" (Radnofsky & Jordan, 2010). United States Citizens and Immigration Services (USCIS) has attempted to address the problem of fraud by including in the E-Verify system photos of workers on green cards and immigrant work authorization documentation (Edwards, 2010). Barring some truly sophisticated forgery, use of photos helps prevent immigrant workers from using the names, dates of birth, and immigration work numbers that don't belong to them. In addition to the photo screening tool, DHS planned to add additional databases and "a monitoring and compliance branch to detect identity fraud" (Radnofsky & Jordan, 2010).
Identify Relevant Stakeholders & Conduct Systems Analysis

Workers and employers. The monitoring and compliance branch is being implemented none too soon, as expert say that selling identities stolen from U.S. citizens to prospective workers who are unauthorized to work in the U.S., according to U.S. Attorney Edward J. Tarver, is "a rapidly growing problem across our country" (Jordan, 2011). On April 13, 2011, three restaurant managers employed by McDonald's Corporation in Savannah, Georgia, were charged with selling to identification documents belonging to U.S. citizens to unauthorized workers. According to federal authorities, the arrest points to "the risks employers are increasingly taking to mask the hiring of illegal immigrants" (Jordan, 2011). ICE special agent-in-charge, Brock Nicholson, said that as the federal government's "ability to investigate becomes better, [business enterprises wanting to hire unauthorized workers are developing "more sophisticated methods" to beat the E-Verify system. Many employers look the other way when identity theft is suspected. The Savannah case and similar incidents "could be indicative of a new trend" signaling increased incidents of identity fraud (Jordan, 2011).

The terrorist attacks of 9/11 brought about a policy change with regard to the enforcement of immigration regulations in the workplace. The federal government, appropriately focused on preventing other attacks, limited workplace immigration enforcement to what is considered to be "critical infrastructure" (Porter, 2006). Places with particular vulnerability to terrorism, such as airports and nuclear power plants, came under additional scrutiny, and enforcement in other venues was effectively diluted. In peaceful times and prosperous times, too, enforcement appeared to diminish. "Even in the late 1990s when the economy was booming and labor markets were tight, the INS virtually stopped looking for illegal immigrants in the workplace" (Porter, 2009). This trend has reversed in the last several years in concert with the economic fluctuations that tend to put the spotlight on immigrant workers, authorized and unauthorized alike. The number of I-9 audits has risen considerably, criminal prosecution of employers has increased noticeably, and the use of fraudulent identification has become blatant.

Identify Barriers to Change & Supports for Change

Gordon H. Hanson, a University of California at San Diego economist, argues that the ineffective approach to addressing the problems of unauthorized workers in the U.S. is the result of competing interests. Critical to the inability of the U.S. To create effective solutions for the problem, Hanson suggests, is that "Employers feel very strongly about maintaining access to immigrant workers, and exert political pressure to prevent enforcement from being effective. While there are lots of groups concerned about immigration on the other side [of the argument], it's not like their livelihood depends on this" (Porter, 2011). The fines for violations related to hiring unauthorized workers can be very low -- as little as $275 per worker -- and fines are often negotiated downward by businesses. An incident in 1998, arguably before the 9/11 terrorists attacks, found a Senator and four members of the House of Representatives officially chastising the INS after they raided onion field during harvest time. The essence of the sharp criticism aimed at INS was that the agency was hurting Georgia farmers by their action. Clearly, there is a solid bloc of stakeholders that do not want the federal government to interfere with what they see as economically essential and culturally acceptable hiring practices.

On the flip side, the FBI discovered in April of 2011 that false Social Security cards had been sold to illegal immigrants by a 29-year veteran SSA worker for between $2,500 and $5,000 a piece. False Social Security cards are plumb; identification stolen from the wallets and purses of U.S. citizens are likely to be considerably cheaper.…

Sources used in this document:
References

AgJOBS: The Agricultural Job Opportunities, Benefits, and Securities Act, Farmworker Justice. [Web] Retrieved http://www.fwjustice.org/what-is-agjobs

Carafano, J.J. (2009, July 10). Homeland Security Department guts workplace enforcement, WebMemo, The Heritage Foundation. Retrieved Edwards, J. (2010). E-Verify: setting the record straight, NumbersUSA. Retrieved http;//www.numbersusa.com/content

Jordan, M. (2011, April 14). Fast food managers accused of selling stolen IDs, The Wall Street Journal. Retrieved http://online.wsj.com/article/SB10001424052748704547804576261354204299950.html?mod=WSJ_hpp_sections_news

Lee, S. (2009, March). Private immigration screening in the workplace. Stanford Law Review, 61, 1103. Retrieved https://litigation-essentials.lexisnexis.com / webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=61+Stan.+L.+Rev.+1103&srctype=smi&srcid=3B15&key=5b7596686892955e74f8e75688c51ed8
Porter, E. (2006, March 5). The search for illegal immigrants stops at the workplace, The New York Times. Retrieved Radnofsky, L. And Jordan, M. (2010, February 25). Illegal workers slip by system: Homeland Security program seen failing to catch half of unauthorized hires, The Wall Street Journal. Retrieved http://online.wsj.com/article/SB10001424052748703510204575085922830174374.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Criminal Justice Policy Issue
Words: 1218 Length: 3 Document Type: Essay

Criminal Justice Policy Issue One of the increasing major concerns in the field of criminal justice is the rising fear of crime in public by juvenile violence, also known as 'youth violence'. This paper would discuss a selected journal article that is based on this issue and would highlight its key findings, issues, recommendations and the summary based on the discussion of the chosen issue. The article chosen on the selected issue

Criminal Justice Management Reading Articles
Words: 943 Length: 3 Document Type: Essay

Furthermore, several of the partnerships that COPS agencies were able to produce within their disparate communities were little more than simple name recognition, and were not able to produce a significantly impactful relationship between those agencies and the surrounding communities. This lack of a true cooperative partnership also accounts for why the research conducted for the COPS program did not truly have as successful an impact as it probably

Criminal Justice Management Intelligence Led
Words: 580 Length: 2 Document Type: Essay

In fact, the study showed that most citizens in Kansas City couldn't even tell when the frequency of police patrols were increased or decreased. The conclusions were clear to me that the increase in police patrols did not significantly deter crime. Yet, still, we continue to practice such increased police presence strategies. Personally, I believe this is more to help ease citizens and tax payers' minds. With the police forces

Criminal Justice Management
Words: 1991 Length: 6 Document Type: Article Review

Criminal Justice Management Mapping Crime Hotspots to Deter Crime Reducing crime is a constant concern of law enforcement and community leaders. Police strategies for reducing crime rely heavily on deterrence, in the form of police patrols (reviewed by Koper, 1995, p. 649-650). Research has shown that a police presence reminds offenders and potential offenders of the certainty of punishment, which is a more effective deterrent than the promised severity of a punishment.

Criminal Justice Management Policing Matrix
Words: 1341 Length: 3 Document Type: Essay

Rather, research findings should be available in a more condense manner, with options for greater detail provided for later review. Annual or semiannual journals could be disseminated that contain the latest research findings. This would make the process of reading and keeping up-to-date with research findings easier to do in the actual field and can be logged for use later in the creation of more specific strategies. Lum presents her

Criminal Justice Management and Administration
Words: 2074 Length: 8 Document Type: Research Paper

Criminal Justice Management and Administration The objective of this work in writing is to describe the historical and theoretical development of organizational management and to list and summarize the most common positions, functions and positions in various Criminal Justice Organizations. The work of Stojkovic, Kalinich, and Klofas (2008) reports that criminal justice administration Management "has come a long way since the President's Commission in 1967 called for a closer look at the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now