Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Overview

Legal aid organizations, bar associations, and immigrant rights coalitions bear ultimate responsibility for building secure, resilient operational infrastructures. If an organization inadvertently refers an immigrant to a compromised practitioner, organizational trust is irrevocably shattered.


Referral Network Architecture

Vetting Requirements

Organizations must institute mandatory, recurring vetting protocols for all internal staff and external legal partners:

Verification Target Method Frequency
Pro bono attorneys State Bar disciplinary database Initial + annual
Staff attorneys Bar standing confirmation Initial + annual
Partner organizations EOIR R&A Roster Initial + quarterly
Accredited representatives Individual accreditation status Initial + quarterly
Contract providers All applicable verifications Initial + semi-annual

State Bar Cross-Reference Protocol

  1. Obtain full legal name and bar number
  2. Search state bar database for current status
  3. Verify:
    • Active license status
    • Good standing confirmation
    • No pending UPL or fraud investigations
    • No malpractice history involving immigrants
  4. Document verification with date and source
  5. Schedule re-verification for next period

EOIR R&A Roster Verification

  1. Search organization name on R&A Roster
  2. Confirm current recognition (not expired)
  3. Verify individual representative accreditation level
  4. Note expiration dates and set reminder
  5. Track partial vs. full accreditation (affects scope of representation)

Tracking Expiration Dates

Item Typical Duration Action Trigger
Organization recognition 6 years (initial) / 3 years (renewal) 90 days before expiration
Individual accreditation Tied to organization 90 days before expiration
Attorney bar membership Annual 30 days after renewal deadline

Intake Protocols

Identifying Scam Victims During Intake

Train intake navigators to identify individuals exhibiting hallmarks of having been scammed:

Indicator Possible Scam Scenario
Blank signed forms Fraudster collected signatures for later use
Forged receipts Fake documentation of non-existent filings
Confusion about legal standing Victim doesn't know what was filed
No copies of documents Fraudster retained all paperwork
Missed hearings Never notified of court dates
Unexpected removal order Application triggered proceedings
Large fees paid, no results Classic notario fraud pattern

Triage Protocol

Intake Assessment
    ↓
Scam indicators present?
    → YES: Route to fraud-recovery specialist
        → Immediate case assessment
        → Evidence preservation guidance
        → Damage mitigation priority
    → NO: Standard intake process
        → Verify no pending cases
        → Confirm no prior filings
        → Standard eligibility screening

High-Volume Event Protocols

During high-volume events (DACA clinics, TPS workshops):

Stage Scam Prevention Action
Pre-event Fraud awareness messaging in promotions
Registration Brief scam history screening questions
Intake Trained navigator assessment
Service Practitioner credential verification available
Post-event Reporting contact information provided

Privacy-Preserving Reporting

Data Sharing Risks

Federal interagency data sharing creates profound friction between consumer protection and immigration enforcement:

Data Sharing Agreement Risk
IRS-ICE MOUs Tax filings accessible for enforcement
SSA-DHS cooperation Social Security data shared
State databases DMV, benefits systems accessible
Court records Immigration status may be discoverable

Consequences of Inadequate Privacy

Without airtight privacy protocols:

  • Immigrants categorically refuse to report fraud
  • Scammers operate with impunity
  • Victims fear consumer protection agencies will trigger deportation
  • Data-sharing cascades undermine trust in all institutions

Privacy-Preserving Design Principles

Principle Implementation
Data minimization Collect only essential information
Purpose limitation Use data only for stated fraud purpose
Silo from enforcement No sharing with immigration enforcement
Explicit authorization Require consent for any sharing
U Visa exception Only share if victim pursues certification

Secure Reporting Infrastructure

Component Protection
Intake forms Immigration status not required
Database access Limited to fraud investigation staff
Data retention Clear policies on retention/destruction
Legal privilege Structure to protect under attorney-client privilege where possible
Subpoena response Pre-planned protocol for government requests

Rapid Response Systems

When Rapid Response Is Needed

Trigger Response Type
New scam pattern emerges Community alert
Deepfake video circulating Debunking campaign
Policy disinformation spreads Accurate information blast
Notario operation identified Victim identification outreach
Fake program advertised Warning dissemination

Communication Channels

Channel Speed Reach Best For
Text/SMS alerts Immediate Subscribed contacts Urgent warnings
WhatsApp broadcasts Immediate Community groups Viral correction
Social media posts Fast Followers + shares Broad awareness
Email lists Moderate Subscribers Detailed information
Partner networks Moderate Coalition members Coordinated response
Ethnic media Variable Community readers/viewers Deep penetration

Rapid Response Protocol

Scam/Disinformation Identified
    ↓
Verification (1-4 hours)
    → Confirm threat is real
    → Document specifics
    → Identify affected communities
    ↓
Message Development (1-4 hours)
    → Draft clear correction/warning
    → Translate to needed languages
    → Create visual versions
    ↓
Distribution (immediate upon approval)
    → Text alerts to subscribers
    → WhatsApp to community liaisons
    → Social media posting
    → Partner network notification
    → Ethnic media pitches
    ↓
Monitoring (ongoing)
    → Track message spread
    → Respond to questions
    → Adjust messaging as needed

Building Rapid Response Capacity

Component How to Build
Contact lists Build SMS/email subscriber base
Community liaisons Identify trusted contacts in target communities
Translation capacity Establish relationships with translators
Social media presence Maintain active, trusted accounts
Media relationships Build contacts at ethnic media outlets
Template library Pre-draft templates for common scenarios

Scam Tracking Databases

Database Components

Field Purpose
Perpetrator information Identify repeat offenders
Scam type Pattern recognition
Target demographic Vulnerable population identification
Geographic area Regional threat awareness
Financial details Loss quantification
Outcome Track enforcement actions

Multi-Organization Sharing

Establish protocols for sharing anonymized threat intelligence:

Information to Share How to Share Safely
Fake phone numbers Anonymous reporting
Predatory notario names Cross-organization alerts
Emerging phishing URLs Shared blocklist
New scam patterns Coalition bulletins
Disinformation content Debunking coordination

RegTech Integration

Consider compliance technology (RegTech) for:

  • Automated credential verification
  • Expiration date tracking
  • Suspicious pattern detection
  • Reporting aggregation
  • Trend analysis

Legal Aid Integration

Case Management Integration

Integration Point Protocol
New client intake Scam screening questions
Case review Check for prior fraudulent filings
Legal strategy Include fraud recovery in case plan
Client education Fraud prevention as standard component
Case closure Verify no pending scam-related issues

Pro Bono Attorney Networks

Network Function Implementation
Recruitment Targeted for fraud recovery expertise
Training Notario fraud, equitable tolling, U Visa
Matching Connect victims with appropriate expertise
Support Mentoring and consultation access
Recognition Acknowledge pro bono contributions

Triage for Urgent Cases

Urgency Level Criteria Response
Emergency Hearing within 30 days, removal order Immediate placement
High Active case, no representation Priority placement
Medium Potential filing deadline Standard placement
Lower Consultation, planning Regular queue

Funding Sources

Source Application
IOLTA grants Legal services funding
Foundation grants Fraud prevention programs
Government victim funds Restitution programs
State AG settlements Consumer protection awards
Bar foundation Pro bono support

Implementation Checklist

Building Organizational Capacity

Referral Network:

  • [ ] Establish credential verification protocol
  • [ ] Create database of verified providers
  • [ ] Set up expiration tracking system
  • [ ] Train staff on verification procedures
  • [ ] Document all vetting activities

Intake Protocols:

  • [ ] Develop scam indicator checklist
  • [ ] Train intake staff on identification
  • [ ] Create triage routing procedures
  • [ ] Establish fraud specialist referral path
  • [ ] Build high-volume event protocols

Privacy Infrastructure:

  • [ ] Audit current data collection practices
  • [ ] Implement data minimization
  • [ ] Create privacy-preserving reporting system
  • [ ] Develop subpoena response protocol
  • [ ] Train staff on privacy requirements

Rapid Response:

  • [ ] Build communication channel infrastructure
  • [ ] Identify community liaisons
  • [ ] Establish translation capacity
  • [ ] Create template library
  • [ ] Build media relationships

Tracking & Coordination:

  • [ ] Design scam tracking database
  • [ ] Establish coalition sharing protocols
  • [ ] Set up pattern monitoring
  • [ ] Create regular threat briefings
  • [ ] Integrate with legal aid case management

Related Resources