Emergency Hotline: Call 1-844-363-1423 (United We Dream Hotline)
ICE Encounter

Overview

Nonprofit organizations advocating for immigrant communities face complex operational challenges including digital threats, physical security vulnerabilities, and government surveillance. Protecting sensitive community data, ensuring personnel safety, and maintaining advocacy mission integrity requires a rigorous, multifaceted security approach.

Organizations in this sector routinely handle highly sensitive personally identifiable information, coordinate rapid responses to enforcement actions, and engage in policy advocacy that attracts scrutiny from federal agencies. Their threat models more closely resemble those of political dissidents or investigative journalists than traditional charitable enterprises.


Security Resource Guides

Historical Surveillance Context

Understanding historical precedents for government surveillance of advocacy organizations:

  • COINTELPRO operations and Church Committee findings
  • Legal reforms and oversight mechanisms
  • Contemporary surveillance documentation
  • Documented organizational impacts

Security Program Frameworks

Establishing comprehensive organizational security:

  • Holistic Security integrating digital, physical, and psycho-social well-being
  • Risk assessment methodologies (CIA Triad)
  • Security culture development
  • Physical security and trauma-informed design

Information Protection

Protecting sensitive data and legal privileges:

  • Data minimization strategies
  • Advanced digital security practices
  • Attorney-client privilege protections
  • Subpoena response protocols

Personnel Security

Managing access and insider threat risks:

  • Ethical vetting considerations
  • Zero Trust Architecture and least privilege
  • Role-Based Access Control (RBAC)
  • Behavioral indicators and reporting mechanisms

Communication Security

Securing organizational communications:

  • End-to-End Encryption platforms (Signal, ProtonMail)
  • Metadata protection strategies
  • EXIF data scrubbing
  • Secure coalition information sharing

Rapid Response Network Security

Protecting community alert systems and field operations:

  • S.A.L.U.T.E. verification protocol
  • Field responder OPSEC
  • Documentation security and chain of custody
  • Evidence preservation for litigation

Legal & Ethical Considerations

Balancing security with mission accessibility:

  • Nonprofit transparency requirements
  • Community accessibility considerations
  • Trauma-informed security implementation
  • Mission alignment principles

Key Security Principles

The CIA Triad

Principle Definition Key Question
Confidentiality Protection from unauthorized access How severe if hostile actors acquired this data?
Integrity Protection from unauthorized modification How detrimental if information was altered or deleted?
Availability Ensuring timely access for authorized users How disruptive if the organization lost access?

Zero Trust Architecture

The principle of "never trust, always verify" assumes threats exist both inside and outside the network:

  • Continuous authentication for every resource request
  • Least Privilege access (minimum necessary permissions)
  • Network segmentation into security zones
  • Immediate credential revocation upon departure

Threat Landscape Summary

Historical Precedent

Era Primary Targets Key Methods
COINTELPRO (1956-1971) Civil rights, anti-war, labor Infiltration, wiretaps, psychological warfare
Contemporary Immigrant rights, journalists, legal observers Commercial data purchases, social media monitoring, border lookouts

Documented Contemporary Targeting

  • CBP Migrant Caravan operations - Dossiers on 59 individuals including attorneys
  • Operation Road Flare - Facial scanning and license plate recording of activists
  • Commercial data exploitation - Venntel, Babel Street location purchases
  • Social media monitoring - Voyager Labs, ShadowDragon programs

Essential Security Tools

Encrypted Communication

Platform Use Case Key Feature
Signal Text/voice messaging End-to-end encryption, self-destructing messages
ProtonMail Email Zero-access encryption
OnionShare File transfer Tor-routed, anonymous sharing

Metadata Protection

Tool Function
ExifCleaner Strip photo metadata
Dangerzone Sanitize documents
ObscuraCam Mobile metadata removal
VPN/Tor Mask IP addresses

Security Culture Principles

Behavioral Security Model

Effective security culture operates on four dimensions:

  1. Knowledge - Understanding threats and countermeasures
  2. Context - Applying security to specific situations
  3. Motivation - Building commitment to security practices
  4. Behavior - Translating knowledge into consistent action

Training Best Practices

  • Spaced training over single lengthy sessions
  • No-blame reporting to encourage incident disclosure
  • Behavioral nudges for continuous reinforcement
  • Regular surveys to identify resistance points

Data Sources

This section draws on:

  • Church Committee Reports (1975-1976)
  • DHS OIG Reports on CBP lookout lists
  • FOIA Releases (ACLU, Brennan Center, EFF)
  • Electronic Frontier Foundation threat modeling guides
  • Tactical Tech Holistic Security framework
  • Academic Research on advocacy surveillance

Related Resources