Many U.S. embassies lack additional layer of visa security

The expansion of a seven-year-old federal program designed to tighten the visa application process at U.S. embassies is moving too slowly, said a Republican lawmaker in a Jan. 11 letter to Secretary of State Hillary Clinton.

Sen. Charles Grassley, R-Iowa, blamed "objections and roadblocks from the State Department" for the delay in creating visa security units at high-risk overseas posts. The 2002 Homeland Security Act directed the department to assign Immigration and Customs Enforcement personnel to embassies worldwide to work with and provide law enforcement support to State's consular officers who process visa applications. There are visa security units in 14 of the more than 220 State posts overseas, including the Philippines, Pakistan and the United Arab Emirates.

Umar Farouk Abdulmutallab, the Nigerian who tried to blow up a Northwest airplane headed for Detroit on Dec. 25, 2009, received a U.S. visa in London and retained it even after his father warned officials in Nigeria about the threat his son allegedly posed. There are no visa security units in the London or Nigerian embassies.

One of the visa security program's stated goals is to identify not yet known threats to national security, or threats that do not appear in any government database or watch list.

While the law directs the Homeland Security Department to assign visa security personnel to high-risk posts, the decision to create such positions ultimately resides with the ambassador in that embassy. Many embassies overseas operate on tight budgets and a federal mandate requires officials to rein in personnel and administrative costs. Ambassadors must consider whether additional staff is necessary to perform the job, the availability of office space and personnel safety.

"It is extremely troubling that an ambassador can inhibit the ability of DHS in carrying out its mission," Grassley wrote in his letter.

A July 2008 Homeland Security inspector general report found that while some State officials approved of establishing security units in their posts, "other resisted." The report also said that to do their jobs effectively, ICE agents working with consular officers on visa security must be hands-on to conduct face-to-face interviews with applicants and assess the local threat. Consular staff interviewed by the IG praised the work performed by their DHS colleagues. "Many said they were initially concerned that agents would be looking over the shoulders of consular officers and checking their work," the report noted. "However, they said they were pleasantly surprised to discover this was not the case and that agents bring additional resources to post to support existing consular operations."

Grassley has inquired about the implementation of visa security units repeatedly since the law was passed.

A State Department spokesman said on Monday that he had seen reports on the issue, but could not comment specifically on Grassley's Jan. 11 letter.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.