Reprinted with permission from ProPublica.
The Department of Immigration & Customs Enforcement is taking new steps in its plans for monitoring the social media accounts of applicants and holders of U.S. visas. At a tech industry conference last Thursday in Arlington, Virginia, ICE officials explained to software providers what they are seeking: algorithms that would assess potential threats posed by visa holders in the United States and conduct ongoing social media surveillance of those deemed high risk.
The comments provide the first clear blueprint for ICEâs proposed augmentation of its visa-vetting program. The initial announcement of the plans this summer, viewed as part of President Donald Trumpâs calls for the âextreme vettingâ of visitors from Muslim countries, stoked a public outcry from immigrants and civil liberties advocates. They argued that such a plan would discriminate against Muslim visitors and potentially place a huge number of individuals under watch.
ICE officials subsequently changed the programâs name to âVisa Lifecycle Vetting.â But, according to the ICE presentation, the goal of the initiative â enhanced monitoring of visa holders using social media â remains the same.
Speaking to a room of information-technology contractors, hosted by theÂ Government Technology & Services Coalition, Louis Rodi, deputy assistant director of ICE Homeland Security Investigationsâ National Security Program, said the agency needs a tool equipped with ârisk-based matricesâ to predict dangers posed by visa holders, with the social media of those considered a threat under continuous surveillance throughout their stay in the U.S.
âWe have millions and millions and millions of people coming every year, and subsequently departing, so we have to be smart about it,â said Rodi to a room of representatives from companies like Microsoft, Accenture, Deloitte and Motorola Solutions. âAnd Iâm sure there are tools out there that can help.â
For this targeted group of visa holders, ICEâs online monitoring of public social media posts would be large-scale and non-stop. âEverything weâre dealing with is in bulk, so we need batch-vetting capabilities for any of the processes that we have,â said Rodi. Alysa Erichs, ICE Homeland Security Investigationsâ acting deputy association director for information management, told attendees that ICE hopes to get automated notifications about any visa holdersâ social media activity that could âping us as a potential alert.â
ICE spokeswoman Carissa Cutrell stressed to ProPublica that the Department of Homeland Security has not actually begun building any such program. âThe request for information on this initiative was simply that â an opportunity to gather information from industry professionals and other government agencies on current technological capabilities to determine the best way forward,â Cutrell wrote in an email. The program would require clearance from numerous DHS units, including the Privacy Office and the Principal Legal Advisor, before it could be implemented, according to a federal official who spoke on the condition of anonymity.
In his speech, Rodi referred to meetings ICE has had with companies but did not mention any frontrunners. The major tech companies present at the conference, including Microsoft, Accenture and Deloitte, either declined to comment or didnât respond to ProPublicaâs request to comment about their level of interest in providing technology for the vetting program. Microsoft hasÂ opposedÂ Trumpâs immigration policies, and several Microsoft researchers haveÂ publicly calledÂ for ICE to stop spying on visitorsâ social media.
ICE is already monitoring some social media at eight Homeland Security Investigation posts internationally, Rodi said, and the plan is to expand to more sites. In response to a question posed by ProPublica from the audience, he stated that the department was open to other social media monitoring techniques, such asÂ link analysisÂ (which helps authorities map out applicantsâ online connections), so long as they solely rely on public posts.
The ICE officials emphasized the Trump administrationâs strict stance. âThis administration is big on immigration enforcement, so weâre not going to look the other way like we have in the past when we have overstays,â said Rodi. âMaybe itâs an administrative violation â itâs still a crime. These people need to pay. They canât get away with it.â
Some analysts argue that gathering social media data is necessary. ICE already has a tool that searches for connections to terrorists, according to Claude Arnold, a former ICE Homeland Security Investigations special agent, now with the security firm Frontier Solutions. But, he said, potential terrorist threats often come from countries, such as Iraq or Syria, that provide little intelligence to U.S. authorities. As a result, in Arnoldâs view, social media information is all the more important.
Privacy advocates take a darker view. âICE is building a dangerously broad tool that could be used to justify excluding, or deporting, almost anyone,â said Alvaro Bedoya, executive director of Georgetown Lawâs Center on Privacy & Technology. âThey are talking about this as a targeted tool, but the numbers tell a different story.â
Bedoya noted that the program outline originally anticipated that the monitoring would identify 10,000 high-risk visa holders a year. That suggests the pool of people under social media surveillance would be many orders of magnitude larger. (ICE officials did not address this point at the conference.)
Last week, a coalition of academics and technologistsÂ warnedÂ in a public letter that ICEâs interest in using big data algorithms to assess risk is misguided, given how rare it is for foreign visitors to be involved in terrorist attacks in the U.S. That means thereâs little historical data to mine in hopes of using it to design a new algorithm. The letter cited a Cato Institute analysis that found that the likelihood of an American dying in a terrorist attack on U.S. soil in any given year was 1 in 3.6 million in the period between 1975 and 2015.
Cathy OâNeil, one of the signatories to that letter and author of âWeapons of Math Destruction,âÂ toldÂ this reporter in August that any algorithm a company proposes would come built-in with some very human calculations. âAt the end of the day, someone has to choose a ratio,â she said. âHow many innocent false positives are you going to keep out of the country for each false negative?â
Thus far, social media monitoring of visa applicants has not identified any potential threats that wouldnât have turned up in existing government databases, Rodi acknowledged. âWe havenât found anything that would preclude someone from getting a visa through social media alone,â he said. âBut, you never know, the day may come when social media will actually find someone that wasnât in the government systems we check.â
That argument doesnât placate those who believe ICEâs vetting is already exhaustive. Social media surveillance would be difficult to carry out without collecting collateral data on thousands of American citizens in the process, said Rachel Levinson-Waldman, senior counsel to the Brennan Centerâs Liberty and National Security Program.
âGenerally, with surveillance technologies, they are adopted for national security purposes overseas, but are then brought stateside pretty quickly,â she said, citing practices first honed overseas, such asÂ intercepting cellphone calls. âSo once thereâs some kind of dragnet surveillance tool or information collection tool in place for one purpose, slippage can happen, and it will expand and expand.â
Header image:Â U.S. Immigration and Customs Enforcement agents at an ICE center in Camarillo, California, in 2015(John Moore/Getty Images)