State, Justice haggle over criteria to deny visas

The Justice and State departments can't agree on how much evidence is needed to deny visas to foreign applicants, making it easier for terrorists to enter the country's borders, according to Sen. Charles Grassley, R-Iowa.

Grassley sent letters last week to Secretary of State Colin Powell and Attorney General John Ashcroft urging them to "get on the same page" and break the stalemate over the criteria for issuing visas.

"This stalemate is a potentially serious danger for our country because it could make it easier to allow terrorists to enter our borders," Grassley wrote in the Oct. 31 letter. "In addition, this rift can pose serious problems for the Immigration and Naturalization Service's border work."

Before citizens of most countries can enter the United States, either temporarily or on a permanent basis, they must first apply for a visa at an American embassy or consulate. There, officers of the State Department's Bureau of Consular Affairs review applications and interview visa candidates, deciding whether to let people into the country. The INS, which is part of the Justice Department, enforces the terms of visas and is responsible for tracking down people who overstay temporary visas. INS inspectors also have the power to turn foreigners away at the border.

The Justice Department would like consular officers to deny visas to applicants whose names come up in government databases listing suspected terrorists. But State Department officials have said that a name match alone is not enough proof to deny a visa for security reasons.

An October General Accounting Office report brought the departments' divergent opinions to Grassley's attention.

The report (GAO-03-132NI) praised the State Department for installing the technology necessary to make sure its "lookout" list of possible terrorists is updated routinely. But GAO also cited the disagreement that arose between the two departments over whether an applicant's name appearing on the lookout list or the Foreign Terrorist Tracking database is a valid reason for rejecting a visa application.

As of Aug. 1, 567 visa applicant names matched information in the Foreign Terrorist Tracking database.

Under Title 8, Chapter 12, Section 1182 of the U.S. Code, consular officers can deny visas to applicants if they have "reasonable grounds" to believe those applicants are likely to engage in terrorist activity upon entering the United States.

Justice Department officials told GAO that they believe a name match provides "reasonable grounds" for suspicion, while the State Department pointed out that an applicant could happen to have the same name as a suspected terrorist in the terrorist database, but not be the same person. In this type of case, consular officers need evidence to prove that the visa applicant is, in fact, the suspected terrorist if they want to deny the person entry to the country, the State Department says.

The Justice Department agreed that "it will often be impossible to know for sure if a visa applicant is the same person contained in the relevant databases," but told GAO that even so, "the department thinks it appropriate to proceed cautiously and deny a visa on the theory that the name check match does provide a reasonable ground to believe that the applicant presents a threat to national security."

Grassley urged the departments to agree on a policy as soon as possible. "With this dual system, we have the left hand not knowing what the right hand is doing-and it is national security that suffers," he wrote.

Grassley sent a copy of his letter to Tom Ridge, director of the Office of Homeland Security, requesting Ridge's input and his help to settle the "conflict."

A spokesman for the State Department's Bureau of Consular Affairs said that his department plans to respond to Grassley's letter, but commented that "conflict" is probably too strong a word to describe what is going on. "It is just a matter of constant discussion between the departments so that when we give Congress a report that explains the reasons for a visa denial, we have enough evidence," he said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.