DHS Takes Victim-Centered Approach on First Anniversary of Center for Countering Human Trafficking

DHS Takes Victim-Centered Approach on First Anniversary of Center for Countering Human Trafficking

Oct. 20 marks the first anniversary of the creation of the Department of Homeland Security’s (DHS) Center for Countering Human Trafficking (CCHT). CCHT, led by ICE Homeland Security Investigations (HSI), is a DHS-wide effort dedicated to bringing human traffickers to justice, protecting victims of sex trafficking and forced labor, and preventing these terrible crimes from occurring.

In recognition of CCHT and to continue to advance its critical work, Secretary of Homeland Security Alejandro N. Mayorkas directed DHS components to incorporate a victim-centered approach into all policies, programs, and activities governing DHS interactions with victims of crime.

“The victim-centered approach is critical to the work of the DHS Center for Countering Human Trafficking and to the Department’s fight against all crimes involving severe abuse and exploitation,” Mayorkas said.  “Safeguarding, supporting, and respecting victims of human trafficking is not just the right thing to do. It also enables law enforcement to better detect, investigate, and prosecute perpetrators of human trafficking.”

DHS also announced a number of new initiatives across components to combat sex trafficking and forced labor:

  • ICE HSI issued a directive underscoring HSI personnel’s responsibility to identify and assist victims of crime.
  • The CCHT launched a new public website at DHS.Gov/CCHT to bring together all DHS anti-human trafficking resources in one easily accessible place.
  • U.S. Citizenship and Immigration Services (USCIS) released the first ever standalone T-Visa Resource Guide for law enforcement and certifying agencies.  The T-Visa Resource Guide provides information to certifying agencies, including law enforcement, on how to support victims of human trafficking while law enforcement investigates and prosecutes these crimes. USCIS also released updated and comprehensive T-visa policy guidance for agency adjudicators to clarify requirements for T-Visa eligibility.
  • U.S. Customs and Border Protection (CBP) announced that, in addition to the seven Withhold Release Orders (WROs) and two Findings already issued in Fiscal Year 2021 to protect American consumers and businesses from goods made by forced labor, additional enforcement actions are expected in the coming days. As part of its mission to investigate and prevent goods made by forced labor from entering U.S. commerce, CBP has detained 1,469 shipments containing nearly $500 million of goods suspected to be made by forced labor in FY2021 alone.
  • Finally, the DHS Blue Campaign continues to educate the public, law enforcement, non-governmental organizations, and other stakeholders through partnerships, advertisements, and social media about the indicators of human trafficking and how to report it. 
    DHS remains committed to a victim-centered approach in the pursuit of justice for survivors of these heinous crimes.  

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3