POGO Urges DHS to Abandon Problematic Social Media Collection Plan
Bureau of Consular Affairs, Visa Office
U.S. Department of State
2201 C Street, N.W.
Washington, DC 20520
Department of State Desk Officer
Office of Information and Regulatory Affairs
Office of Management and Budget
725 17th Street, N.W.
Washington, DC 20503
May 29, 2018
Re: DS-160 and DS-156, Application for Nonimmigrant Visa, OMB Control No. 1405-0182; DS-260, Electronic Application for Immigrant Visa and Alien Registration, OMB Control No. 1405-185
Dear Sir or Madam:
The undersigned organizations write to urge the Department of State to withdraw the agency’s proposed information collection under Public Notices 10260 and 10261. By notices published March 30, 2018, the Department of State proposed to ask visa applicants to provide social media identifiers, telephone numbers, and email addresses used in the past five years, among other information. Proposals by the federal government to use social media to make adverse visa determinations have been consistently opposed by privacy, civil liberties, civil rights, and other civil society groups. And the government’s own studies have not produced evidence that social media screening programs work.
Additionally, the current proposed revisions will undermine First Amendment rights of speech, expression, and association. The proposal, if implemented, will reveal private information about travelers that is irrelevant to their suitability for entry to the United States, and will expose data about their families, friends and business associates in the U.S. Further, the context in which these policies are being developed – and the methods used to examine what is collected – suggest that they will be implemented in ways that discriminate on the basis of national origin, religion, or ideology. Lastly, the data collection will facilitate the bulk mining and wide-ranging use of information about travelers and U.S. citizens, including for purposes beyond those articulated in the Public Notices, amplifying the concerns above. These drawbacks are in exchange for speculative national security benefits, especially considering the vanishingly small number of vetting failures that have permitted foreign-born persons to commit terrorist attacks on U.S. soil.
I. The Proposed Collection Excessively Burdens Visa Applicants for Speculative National Security Benefits
Social media communications have context-specific meanings that are notoriously difficult to interpret, and are more apt to raise false positives than to identify real security threats. Further, collecting social media data – platforms and identifiers – will have a deleterious impact on the speech and privacy of applicants as well as the Americans with whom they communicate.
a. Social Media Collection Will Capture Information That Is Difficult to Interpret
The Information Collection Request (ICR) assumes that the investigation of applicant-provided social media information will assist the department in uncovering potential terrorists applying for visas. This seems unlikely. As an initial matter, it is doubtful that an individual who promotes terrorism online will disclose information about the social media profile he is using to do so, or will retain postings that might get flagged as problematic.
Moreover, problems of interpretation – which manifest in both manual and computerized review, though the latter method’s deficiencies are further detailed in Section III – are guaranteed to plague any review of social media postings. One need only look at the 2012 experience of a British citizen who was turned back at the border because DHS agents misinterpreted his posting on Twitter that he was going to “destroy America” – slang for partying – and “dig up Marilyn Monroe’s grave” – a joke. In a similar vein, government agents and courts have erroneously interpreted tweets repeating American rap lyrics as threatening messages in several court cases, including high-stakes national security matters. Even greater difficulties are inevitable if the language used is not English.
This is to say nothing of the challenges posed by non-verbal communication on social media. On Facebook, for instance, users can react to a posting with a range of emojis. The actual meaning of these emojis is highly contextual. If a Facebook user posts an article about the FBI persuading young, isolated Muslims to make statements in support of ISIS, and another user “loves” the article, is he sending appreciation that the article was posted, signaling support for the FBI’s practices, or sending love to a friend whose family has been affected? Assuming it is even possible to decode the meaning, that could not be done without delving further into the user’s other online statements, interactions, and associations, as well as the postings of those with whom he or she communicates, a laborious, invasive, and error-riddled process. Indeed, such ambiguity is already affecting domestic criminal proceedings with dire consequences, including individuals put behind bars for their Facebook likes.
This concern may be amplified for journalists, particularly those writing on conflict zones. Take the example of a foreign journalist who “favorites” a provocative tweet from an ISIS follower in order to find it again more easily for a piece of writing – will that be taken as support for the poster’s positions? If so, will he or she be called to account for every “heart” and “like”? Political scientists and other scholars who follow or interact with individuals with provocative or even reprehensible views for purposes of research and public education will face similar quandaries. In light of the multitude of possible interpretations of both speech and non-verbal communication, consular officers will be in a position to exercise enormous, unchecked discretion when it comes to assessing foreign residents’ suitability to enter the country, potentially quizzing them about the meaning and significance of a range of expression.
Indeed, the government can point to no evidence that social media screening works and is worth expanding. While no public audits have yet been released for State Department social media collection, a February 2017 Inspector General audit of DHS’s existing social media pilot programs found that insufficient metrics were in place to measure the programs’ effectiveness, and concluded that existing pilots had provided little value in guiding the rollout of a department-wide social media screening program. Documents evaluating these pilot programs show in further detail how they were expensive and time consuming but provided little useful information.
b. Social Media Collection Will Chill Free Expression and Affect Third Parties, Including Americans
As a result of both the information requests and the ambiguity pervading interactions on social media, online speech – particularly of the political or religious variety – will inevitably be chilled. Visa applicants will surely sanitize their own postings and internet presence to ensure that nothing online would provide cause for further scrutiny or suspicion by a rushed consular officer, or an imprecise algorithm. The same caution will afflict people on American soil, including U.S. citizens and residents, who often correspond with those seeking entry into the United States and are protected by the First Amendment: consider, for example, how an American citizen who wants her brother in Iraq to get a visa so he can visit or emigrate might think twice before sending out tweets criticizing U.S. policy towards that country.
Though the supporting materials direct “[c]onsular staff…to take particular care to avoid collection of third-party information,” such collection and analysis will be inevitable. For instance, if the purpose of gathering social media data is in part to ascertain whether an applicant’s associations are relevant to her eligibility for a U.S. visa, consular staff will – at a minimum – view third-party information to ascertain whether she has sufficient links to her country of origin to overcome the statutory presumption that temporary visa applicants intend to immigrate to the U.S., assess the nature of her relationships to Americans she has listed on her visa application, or determine whether her social media associations are of interest to the U.S. government. As such, reviews of travelers’ social media profiles will also likely reveal personal information not contained within any given account, including peoples’ connections to friends, relatives, and business associates in the U.S., potentially subjecting Americans to invasive scrutiny of their personal lives and constitutionally protected speech.
Even for travelers who might not have First Amendment rights before they arrive in the United States, a system that may penalize people for speech they engage in online and deprive their audience of the ability to hear it, is profoundly incompatible with core American constitutional values. It is also incongruent with the International Covenant on Civil and Political Rights, which the United States has ratified, and which guarantees “the right to freedom of expression,” including the “freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.”
Moreover, the assurances in the notices’ supporting statements that this collection of information will not be used to deny visas on grounds including religion or political views, while commendable, is insufficient. The point of the disclosure requirement is presumably for consular officers to view and assess the content of applicants’ postings, or for a computer program to serve that function in some capacity. It is hard to imagine that the religious and political views reflected in those postings will not in practice play a role in such assessments.
The above concerns are not hypothetical. For instance, in April, civil rights activist Shaun King was detained by U.S. Customs and Border Protection and interrogated about his online presence and involvement with Black Lives Matter. Though King was never accused of posing a security risk and, as an American citizen, was eventually allowed into the country, this case is among those that suggest enforcement authorities are attentive to the political views of those seeking entry to the U.S.  Further, as explained in Section III below, automated vetting technologies will incorporate any biases driving policymaker preferences.
The collection of social media information will also undermine the right to communicate anonymously, a right that is protected by the First Amendment and was called a necessary condition of free expression by the U.N. Special Rapporteur on Freedom of Expression. Among other things, anonymity shields speakers from retribution for their viewpoints, and lets ideas stand on their own. As such, it is critical to free discourse: indeed, anonymity was used by the founding fathers – including Alexander Hamilton and James Madison – to debate the theories underpinning the U.S. Constitution. Though consular officers are instructed to be “mindful that, unlike some other forms of personal information…social media identifiers may afford the user anonymity,” this actually implies that what must be disclosed – “each identifier used” – includes social media handles that an applicant does not wish to associate with her name. No language suggests the contrary or affords the applicant discretion in what to list. Further, as mentioned in the second paragraph of this sub-section, the sum of information collected from applicants will yield more than its parts, and so may also expose the identities of Americans who wish to remain nameless.
In sum, social media facilitates the free exchange of ideas that is a hallmark of an open democratic society. As Justice Anthony Kennedy put it last year in Packingham v. North Carolina: “Social media allows users to gain access to information and communicate with one another on any subject that might come to mind…. [F]or many, [it is] the principal source for knowing current events, … speaking and listening in the modern public square, and otherwise exploring the vast realms of human thought and knowledge.” The State Department should carefully consider this vital role before adopting a policy that, in requiring about 15 million people a year to turn over their handles, could muzzle valuable discourse.
Practical considerations also counsel against this type of broad-ranging collection effort. If American universities are to be beacons of innovation, they need to be able to freely engage with people from across the globe; if America values economic growth, it needs to foster international business partnerships and science and technology learning. Moreover, many people around the world use social media – including Facebook, Twitter, and other platforms the State Department wants disclosed – to support democratic movements and to campaign for political reform. It is credited with empowering the Arab Spring and allowing Egyptians to remove former President Hosni Mubarak from power, played a pivotal role in the 2013 Gezi Park protests in Turkey, and facilitated the 2017 anti-Putin protests in Russia. Mandating the disclosures proposed will concretely damage movements for self-governance and American cultural and economic dynamism, particularly if other countries follow U.S. precedent and impose similar requirements.
II. The Proposed Collection Will Primarily Burden Applicants on the Basis of National Origin, Religion, or Ideology
The burdens detailed above would be substantial regardless of who is targeted. However, the history of the vetting procedures suggests an intent to make national origin and religious-based distinctions among applicants, with a focus on Muslims. Indeed, documents supporting the collection justify it in part based on mandates from Executive Order 13780, second in a sequence of “Muslim ban” executive orders that tie national origin to a terror threat, and which were initially enjoined by federal courts for reflecting religious animus. While the documents supporting the Department of State’s notices state that “[t]he collection of social media platforms and identifiers will not be used to deny visas based on applicants’ race, religion, ethnicity, national origin, political views, gender or sexual orientation,” that assurance rings hollow, in light of the context in which this ICR arises and because it is part of the broader “extreme vetting” framework that appears aimed at Muslims. Moreover, even if visa denials do not rest on impermissible factors, circumstances suggest that certain applicants’ postings may be scrutinized more closely based on their religion or national origin.
Shortly after becoming the official Republican presidential nominee, Donald Trump rolled out a new plan: “extreme vetting” for Muslims entering the United States. He proposed that the United States admit only those “who share our values and respect our people.” One campaign official explained that people who have “attitudes about women or attitudes about Christians or gays that would be considered oppressive” would be barred. Department of Homeland Security officials have indicated that visa applicants could be queried about honor killings, the role of women in society, and legitimate military targets. It is difficult to see the connection between a visitor’s view of the role of women in society and terrorism, but the connection between such questions and criticisms of the rights of women in Muslim societies is plain. As recently as January 2018, the Executive Order from which this collection stems was the basis for a report that mischaracterizes data on honor killings and forced marriages in immigrant communities, and alluded baselessly that natural-born U.S. citizens’ propensity for terrorism is linked to their parents’ country of citizenship. Indeed, the statement supporting the revision of this collection with respect to immigrant visas includes a provision to include in the application form “a link…to an electronic pamphlet that covers the illegality of [female genital mutilation],” a practice that is not especially Islamic but is framed as such by anti-Muslim voices who have considerable influence in this administration.
Such an approach is unlikely to make us safer. There is no evidence that an applicant’s national origin or religion reflects a propensity for terrorism. In fact, writing in opposition to Executive Order 13780, more than 40 national security experts from across the political spectrum argued that vetting should be responsive to “specific, credible threats based on individualized information,” not stereotypes of religions or countries. They also warned that banning nationals from Muslim countries would damage the “strategic and national security interests of the United States,” corrode relationships with allies and “[reinforce] the propaganda of ISIS.” An analysis by the Trump administration’s Department of Homeland Security found that citizenship was an unreliable indicator of terrorism threat, an unsurprising finding in light of U.N. estimates that in 2015 about 244 million people were living outside of the countries in which they were born. Decades of counterterrorism research has not been able to identify traits that could be used to identify people who have a propensity for terrorism.
Policies should be based on proof, not prejudice. And while no proof has been offered that the proposed collections will enhance national security, there is plenty of evidence that prejudice has played a role in this administration’s ratcheting up of visa vetting procedures. That runs contrary to the interests of the American public.
III. Information Collection May Facilitate Bulk Data Mining and Algorithmic Analysis Efforts that Amplify Privacy and Discrimination Concerns
The statements supporting the collection say that the “information obtained from applicants…is considered confidential and is to be used only [purposes related to] the immigration, nationality, and other laws of the United States, except that… it may be made available to a court or provided to a foreign government if the relevant requirements stated in INA…are satisfied” (emphasis added). But given the breadth of those statutory prescriptions, it does not say in concrete enough terms what those efforts will consist of or how the State Department will use, store, or share the data it obtains. Even setting aside the risks inherent in the mass transfer and storage of data, will it be able to analyze such large amounts of data? If so, through what means, and based on what criteria? Presumably this information about visa applicants from around the world will be recorded in government databases; for what specific purposes will these databases be used? Exploiting this data for bulk mining or algorithmic analysis would further amplify many of the privacy and discrimination-oriented concerns highlighted above, especially given that about 15 million people yearly will have to disclose their data to enter the United States.
The sensitive applicant information collected would likely be shared with the Department of Homeland Security, potentially through the National Vetting Center, which is slated to coordinate the government’s vetting functions and consolidate data streams with the goal of identifying “known or suspected threat actors” using “relevant indicators that inform adjudications and determinations related to national security, border security, homeland security, or public safety.” This is a mandate that is vague and sweeps far beyond visa decisions. As such, feeding data into the Center carries the risk of rationalizing discrimination – in light of evidence that such indicators have been linked to immigration status, religion, and national origin – and amplifying the civil liberties concerns so far described. Additionally, as noted above, social media is especially vulnerable to interpretive failures, which would be magnified to the extent secondary analysis of it is relied upon to make decisions. For example, notes taken by a consular officer about a visa applicant’s social media profile – that might be imperfectly translated, include conclusions without disclosure of the source on which they are based, or are not accompanied by contextualizing information from the visa interview – might later be introduced against them in a removal proceeding without an opportunity for verification or cross-examination, with serious consequences for the person affected.
Additionally, Immigration and Customs Enforcement (ICE) has explored using applicant data as an input into technological tools using machine learning to “establish an overarching vetting [system] that automates, centralizes and streamlines the current manual vetting process,” driven by the mandates in President Trump’s immigration Executive Orders, including Executive Order 13780. Though it has for now, due at least to cost and logistical constraints, halted this specific effort, ICE has yet to acknowledge some of the inherent deficiencies with machine-based vetting or confirm that it will not continue to pursue the development of a program of the type reflected in disclosed procurement documents. Further, ICE has not described precisely how this program’s replacement would work, other than saying that it will for now solicit a “labor contract” for manual monitoring of social media – a practice that would still raise the concerns outlined in Section I. As such, and because Homeland Security has been known to test automated social media vetting tools, we describe our objections to machine-based vetting programs below, using ICE’s proposed system as a platform for doing so.
That computerized system – the “Extreme Vetting Initiative,” or “Visa Lifecycle Vetting” – would have attempted to “continuous[ly] vet” visitors within the country using information including “media, blogs, public hearings, conferences, academic websites, social media websites…radio, television, press, geospatial sources, [and] internet sites.” It would have been targeted at “evaluat[ing] an applicant’s probability of becoming a positively contributing member of society as well as their ability to contribute to national interests,” and predicting whether those entering the U.S. intended to commit a crime or terrorist attack once they arrived here.
First, broad standards – like those measuring the likelihood that an applicant will “positively contribute” to society or to the national interest – are impossible to administer, given that computer analyses are only as good as their inputs. Recent efforts to employ predictive algorithms throughout the criminal justice system have been shown to reflect enduring prejudices, including those based on race and income, since they rely on historic crime data that integrates those prejudices. Further, there is precedent from other law enforcement contexts for using social media monitoring software to surveil political movements, such as Black Lives Matter. Second, crimes and terror attacks occur too rarely to afford a computer sufficient data to make accurate predictions about who will commit them. Indeed, a group of over 50 scientists, engineers, mathematicians, and other experts in the field of machine learning wrote to then-Acting Secretary of Homeland Security Elaine Duke voicing these concerns and warning that such a system “would be inaccurate and biased.”
Machine bias can derive from data inputs, but it can also be linguistic. Existing Homeland Security programs that attempt to draw inferences about social media data to develop traveler risk profiles on the basis of “tone analysis” are prone to incorporating decontextualized judgments about entire communities or religions, raising questions about both its ostensible neutrality and its effectiveness. Indeed, one of the primary findings of a November 2017 report was that “[d]ecisions based on automated social media content analysis risk further marginalizing and disproportionately censoring groups that already face discrimination,” citing low accuracy rates for non-English languages and vernaculars associated with minority groups. Members of Congress have taken note: in March 2018, the Congressional Black Caucus wrote to DHS Secretary Kirstjen Nielsen opposing the Extreme Vetting Initiative and highlighting these issues.
In light of these concerns, collecting social media and other data for the purpose of vetting foreign travelers in order to subject it to algorithmic analysis seems highly unlikely to contribute measurably to domestic safety and security – instead, use of unproven vetting technologies may have the effect of facilitating religious, ideological, or cultural screening.
IV. There is No Evidence that Foreign Visitors Pose a Significant Threat to the U.S.
Lastly, empirical evidence shows that the risk of an attack on U.S. soil perpetrated by a foreign person who has been improperly vetted is infinitesimal. This is not surprising: the U.S. has one of the world’s most thorough visa vetting systems, built to identify national security threats. The government has had trouble showing otherwise. According to a federal court of appeals: “There is no finding that present vetting standards are inadequate, and no finding that absent the improved vetting procedures there likely will be harm to our national interests.”
A study examining broadly defined vetting failures found that from 2002 to 2016 the chance of being murdered in a terrorist attack attributable to a vetting failure was 1 in 328 million per year. One of every 379 million visa or status approvals in that time period was for a terrorist, a reduction of almost 85 percent compared to the 15 years preceding September 11, when the U.S. immigration security infrastructure was overhauled. Indeed, over the past ten years, Americans have been more than ten times as likely to drown in a bathtub or die in a lightning strike than to die in a terrorist attack perpetrated by a foreign-born terrorist on U.S. soil. In short, the State Department’s expanded collection is a solution in search of a problem.
For the above reasons, we urge the Department of State to abandon this proposed information collection initiative. Please do not hesitate to let us know if we can provide any further information regarding our concerns. We may be reached at email@example.com (Faiza Patel: 646-292-8325), firstname.lastname@example.org (Rachel Levinson-Waldman: 202-249-7193), email@example.com (Harsha Panduranga: 646-925-8719), or firstname.lastname@example.org (Jeramie Scott: 202.483.1140 x108).
American Friends Service Committee
American Immigration Lawyers Association
American-Arab Anti-Discrimination Committee
Americans United for Separation of Church and State
Arab American Institute
Archivists Roundtable of Metropolitan New York (ART)
Asian Americans Advancing Justice
Asian Americans Advancing Justice - Atlanta
Association of Research Libraries
Brennan Center for Justice at NYU School of Law
Center for Democracy & Technology
Center for Security, Race and Rights
The Center on Privacy and Technology at Georgetown Law
Chhaya Community Development Corporation
Coalition for Humane Immigrant Rights (CHIRLA)
Concerned Archivists Alliance
Council on American-Islamic Relations (CAIR)
Defending Rights & Dissent
Electronic Frontier Foundation
Electronic Privacy Information Center (EPIC)
Government Accountability Project
Government Information Watch
Human Rights First
Human Rights Watch
Immigrant Legal Resource Center
Iranian Alliances Across Borders (IAAB)
Media Freedom Foundation/Project Censored
Montgomery County Civil Rights Coalition
Muslim Justice League
Muslim Public Affairs Council
NAFSA: Association of International Educators
National Asian Pacific American Women's Forum (NAPAWF)
National Hispanic Media Coalition
National Immigrant Justice Center
National Immigration Law Center
National Immigration Project of the NLG
National Network for Arab American Communities
New America's Open Technology Institute
New York Immigration Coalition
Open MIC (Open Media and Information Companies Initiative)
Patient Privacy Rights
Project on Government Oversight (POGO)
Sikh American Legal Defense and Education Fund
United We Dream
Veterans for American Ideals
World Privacy Forum
 See, e.g., Comments of NAFSA: Association of International Educators, Notice of Information Collection under OMB Emergency Review: Supplemental Questions for Visa Applicants¸ May 18, 2017, http://www.nafsa.org/_/file/_/amresource/DS5535Comment051817.pdf; Comments of the ACLU, Supplemental Questions for Visa Applicants, Oct. 2, 2017, https://www.aclu.org/letter/aclu-comment-supplemental-questions-visa-applicants; Comments of Muslim Advocates, Supplemental Questions for Visa Applicants, Dec. 20, 2017, https://www.muslimadvocates.org/files/VisaQuestionComments12_20_17.pdf. We have noted several of the objections contained in these comments in our responses to previous social media collection proposals. See Comments of the Brennan Center, Arrival and Departure Record (Forms I-94 and I-94W) and Electronic System for Travel Authorization, Aug. 22, 2016, http://www.brennancenter.org/analysis/brennan-center-submits-comments-dhs-plan-collect-social-media-information-through-visa; Comments of the Brennan Center, Notice of Information Collection Under OMB Emergency Review: Supplemental Questions for Visa Applicants, May 18, 2017, https://www.brennancenter.org/analysis/brennan-center-urges-state-department-abandon-new-extreme-vetting-initiatives; Comments of the Brennan Center, Supplemental Questions for visa Applicants, Oct. 2, 2017, https://www.brennancenter.org/blog/comments-department-state-urge-government-abandon-supplemental-questions-visa-applicants; Comments of EPIC, Supplemental Questions for Visa Applicants, Dec. 27, 2017, https://epic.org/EPIC-DOS-Visas-SocialMediaID-Dec2017.pdf.
 See, e.g., John Roth, Inspector General, DHS’ Pilots for Social Media Screening Need Increased Rigor to Ensure Scalability and Long-term Success (Redacted), U.S. Department of Homeland Security, 2017, https://www.oig.dhs.gov/sites/default/files/assets/2017/OIG-17-40-Feb17.pdf. One ICE official was quoted saying: “We haven’t found anything that would preclude someone from getting a visa through social media alone. But you never know, the day may come when social media will actually find someone that wasn’t in the government systems we check.” George Joseph, Extreme Digital Vetting of Visitors to the U.S. Moves Forward Under a New Name, ProPublica (Nov. 22, 2017), https://www.propublica.org/article/extreme-digital-vetting-of-visitors-to-the-u-s-moves-forwardunder-a-new-name.
 83 Fed. Reg. 13,806-07 (posted Mar. 30, 2018) (indicating that the information applicants provide, including social media identifying information, “identity resolution and vetting purposes based on statutory visa eligibility standards,” which incorporate terrorism-related grounds).
 See J. David Goodman, “Travelers Say They Were Denied Entry to U.S. for Twitter Jokes,” The Lede (blog), New York Times, January 30, 2012, 1:03 PM, https://thelede.blogs.nytimes.com/2012/01/30/travelers-say-they-were-denied-entry-to-u-s-for- twitter-jokes/?mtrref=undefined.
 See, e.g., Natasha Lennard, “The Way Dzhokhar Tsarnaev’s Tweets Are Being Used in the Boston Bombing Trial Is Very Dangerous,” Fusion, March 12, 2015, http://fusion.net/story/102297/the-use-of-dzhokhar-tsarnaevs-tweets-in-the-bostonbombing-trial-is-very-dangerous/; Bill Chappell, “Supreme Court Tosses Out Man’s Conviction for Making Threat on Facebook,” National Public Radio, June 1, 2015, http://www.npr.org/sections/thetwo- way/2015/06/01/411213431/supreme-court-tosses-outman-s-conviction-for-making-threats-on-facebook.
 See, e.g., Eric Lichtblau. “F.B.I. Steps Up Use of Stings in ISIS Cases,” New York Times, June 7, 2016, http://www.nytimes.com/2016/06/08/us/fbi-isis-terrorism-stings.html; Murtaza Hussain, “Confidential Informant Played Key Role in FBI Foiling Its Own Terror Plot,” Intercept, February 25, 2015, https://theintercept.com/2015/02/25/isismaterial-support-plot-involved-confidential-informant/.
 See, e.g., Ben Popper, “How the NYPD Is Using Social Media to Put Harlem Teens Behind Bars,” Verge, December 10, 2014, http://www.theverge.com/2014/12/10/7341077/nypd-harlem-crews-social-media-rikers-prison.
 See generally John Roth, Inspector General, DHS’ Pilots for Social Media Screening Need Increased Rigor to Ensure Scalability and Long-term Success (Redacted), U.S. Department of Homeland Security, 2017, https://www.oig.dhs.gov/sites/default/files/assets/2017/OIG-17-40-Feb17.pdf.
 See Sternstein, Aliya. "Obama Team Did Some 'Extreme Vetting' of Muslims Before Trump, New Documents Show." The Daily Beast. January 02, 2018. Accessed May 23, 2018. https://www.thedailybeast.com/obama-team-did-some-extreme-vetting-of-muslims-before-trump-new-documents-show.
 First Amendment rights are not exclusive to citizens. See David Cole, Are Foreign Nationals Entitled to the Same Constitutional Rights as Citizens?, 25 T. Jefferson L. Rev. 367-388 (2003) (“foreign nationals are generally entitled to the equal protection of the laws, to political freedoms of speech and association, and to due process requirements of fair procedure where their lives, liberty, or property are at stake.”).
 Faiza Patel and Harsha Panduranga. "DHS’ Constant Vetting Initiative: a Muslim-Ban by Algorithm." JustSecurity, 12 Mar. 2018, https://www.justsecurity.org/53671/dhs-constant-vetting-initiative-muslim-ban-algorithm/.
 U.S. Department of State (2018). SUPPORTING STATEMENT FOR PAPERWORK REDUCTION ACT SUBMISSION: Electronic Application for Immigrant Visa and Alien Registration, OMB Number 1405-0185, DS-260; U.S. Department of State (2018). SUPPORTING STATEMENT FOR PAPERWORK REDUCTION ACT SUBMISSION: Electronic Application for Nonimmigrant Visa, OMB Number 1405-0182, DS-160 and DS-156.
 The Immigration and Nationality Act says that an applicant “shall be presumed to be an immigrant until he establishes to the satisfaction of the consular officer, at the time of application for a visa, and the immigration officers, at the time of application for admission, that he is entitled to a nonimmigrant status.” Immigration and Nationality Corrections Act of 1994, Pub.L. 103-416, 108 Stat 4305, Title II, § 214 (b) (1994) (amendments to the Immigration and Nationality Act codified as 8 U.S.C. § 1184 (b)).
 The Supporting Statements say that consular officers will collect data “for identity resolution and vetting purposes based on statutory visa eligibility standards.” Supporting Statements at 6. Applicants may be ineligible for a visa if, for example, they have been convicted of certain crimes, have engaged in terrorist activity, or have specified medical problems. Immigration and Nationality Act of June 27, 1952, Pub. L. No. 82-414, 66 Stat. 163 (1952) (codified as amended in scattered sections of 8 U.S.C.), https://www.gpo.gov/fdsys/pkg/USCODE-2011-title8/pdf/USCODE-2011-title8-chap12-subchapII-partII-sec1184.pdf. We are also concerned that examination of an applicant’s associations might have the effect of facilitating ideological vetting, as described later in this section.
 The Supporting Statements state: “The collection of social media platforms and identifiers will not be used to deny visas based on applicants’ race, religion, ethnicity, national origin, political views, gender, or sexual orientation.” U.S. Department of State (2018). SUPPORTING STATEMENT FOR PAPERWORK REDUCTION ACT SUBMISSION: Electronic Application for Immigrant Visa and Alien Registration, OMB Number 1405-0185, DS-260; U.S. Department of State (2018), at 4. SUPPORTING STATEMENT FOR PAPERWORK REDUCTION ACT SUBMISSION: Electronic Application for Nonimmigrant Visa, OMB Number 1405-0182, DS-160 and DS-156, at 4.
 Leonard Pitts Jr., “’Controversial guy” gets stopped, hassled at the airport.’” Miami Herald, April 11, 2018, http://www.miamiherald.com/opinion/opn-columns-blogs/leonard-pitts-jr/article208547744.html.
 For other examples, see DeCell, Carrie. "Trump's 'extreme Vetting' Is Muzzling Activists and Shutting Them out.” The Guardian. April 20, 2018. Accessed May 21, 2018. https://www.theguardian.com/commentisfree/2018/apr/20/trump-extreme-vetting-activists-censorship-immigration.
 “Anonymity,” Electronic Frontier Foundation, accessed September 27, 2017, https://www.eff.org/issues/anonymity; Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, Rep., Human Rights Council, at 1, U.N. Doc. A/HRC/29/32, May. 22, 2015, available at http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc.
 “Anonymity,” Electronic Frontier Foundation, accessed May 16, 2018, https://www.eff.org/issues/anonymity; Eric Peterson, “Anonymous Speech is More Important Than Ever. Ted Proves It.” Wired, November 1, 2016, https://www.wired.com/2016/11/anonymous-speech-important-ever-ted-proves/.
 Social Security Numbers, EPIC, https://epic.org/privacy/ssn/.
 Sophie Hutchinson, Social media Plays Major Role In Turkey Protests, BBC, Jun. 4, 2013, http://www.bbc.com/news/world-europe-22772352; David Auerbach, The Bernie Bubble, Slate, Feb. 17, 2016, http://www.slate.com/articles/technology/future_tense/2016/02/the_bernie_sanders_campaign_ owes_a_lot_to_socia l_media.html.
 Amitava Kumar, ‘Revolution 2.0’: How Social Media Toppled A Dictator, NPR, Feb. 8, 2012, http://www.npr.org/2012/02/08/145470844/revolution-2-0-how-social-media-toppled-a-dictator; Ramesh Srinivasan, Taking Power Through Technology in the Arab Spring, Al Jazeera, Oct. 26, 2012, http://www.aljazeera.com/indepth/opinion/2012/09/2012919115344299848.html.
 Steve Dorsey, Turkey’s Social Media And Smartphones Key To ‘Occupy Gezi’ Protests, Huffington Post, Jun. 10, 2013, http://www.huffingtonpost.com/2013/06/09/turkey-social-media-smartphones-occupy-gezi- protests_n_3411542.html; Julia Ioffee, What Russia’s Latest Protests Mean for Putin, The Atlantic, Mar. 27, 2017, https://www.theatlantic.com/international/archive/2017/03/navalny-protests-russia-putin/520878/.
 White, Nathan. "Survey: Should the U.S. Government Collect Social Media Accounts for Visa Applications?" Access Now. May 10, 2018. Accessed May 21, 2018. https://www.accessnow.org/should-us-government-collect-social-media-accounts/. (Mentioning the concept of reciprocity in immigration law.)
 For example, the proclamation issued by the president on September 24, 2017, explicitly provides for additional vetting of nationals of Iraq, Iran, and Somalia, all of which hare predominantly Muslim countries. Proclamation No. 9645, “Enhancing Vetting Capabilities and Processes for Detecting Attempted Entry into the United States by Terrorists or Other Public-Safety Threats,” September 24, 2017, https://www.federalregister.gov/documents/2017/09/27/2017-20899/enhancing-vetting-capabilities-and-processes-for-detecting-attempted-entry-into-the-united-states-by. See also David Bier, “A Dozen Times Trump Equated his Travel Ban with a Muslim Ban,” CATO at Liberty (blog), CATO Institute, August 14, 2017, https://www.cato.org/blog/dozen-times-trump-equated-travel-ban-muslim-ban; Associated Press, “How Donald Trump’s Plan to Ban Muslim’s Has Evolved,” Fortune, June 28, 2016, http://fortune.com/2016/06/28/donald-trump-muslim-ban/; Daniella Diaz, “Trump seizes on terror incident to call for travel ban,” CNN, September 15, 2017, http://www.cnn.com/2017/09/15/politics/donald-trump-london-terroristattack/index.html. Trump has also made it clear that he preferred the original version of the ban reflected in Executive Order 13769 to the less overtly discriminatory version that he issued in March 2017 in response to court decisions. Louis Nelson, “Trump slams Justice Department for 'watered down' travel ban,” Politico, June 5, 2017, http://www.politico.com/story/2017/06/05/trump-travel-ban-justice-department-239131.
 Jeremy Diamond, “Trump Proposes Values Test for Would-be Immigrants in Fiery ISIS Speech,” CNN, August 15, 2016, http://www.cnn.com/2016/08/14/politics/donald-trump-isis-fight/.
 Laura Meckler, “Trump Administration Considers Far Reaching Steps for ‘Extreme Vetting’,” Wall Street Journal, April 4, 2017, https://www.wsj.com/articles/trump-administration-considers-far-reaching-steps-for-extreme-vetting-1491303602.
 Faiza Patel, “Reflections on the Prejudice in the Draft Exec Order’s Vetting of ‘Prejudice’,” Just Security (blog), January 27, 2017, https://www.justsecurity.org/36898/reflections-prejudice-draft-exec-orders-vetting-prejudice/; Faiza Patel and Erica Posey, “Beware Trump’s Phony ‘Terror’ List,” Daily Beast, March 22, 2017, http://www.thedailybeast.com/articles/2017/03/22/ beware-trump-s-phony-terror-list.html.
 See "Brennan Center, Protect Democracy, and Lawfare Request Corrections to DOJ-DHS Section 11 Report on Domestic Terrorism Data." Brennan Center for Justice. February 12, 2018. Accessed May 16, 2018. https://www.brennancenter.org/analysis/brennan-center-protect-democracy-and-lawfare-request-corrections-doj-dhs-section-11-report.
 Patel, Faiza. "Perspective | Why the Trump Administration Is Trying to Make Muslim Immigrants Seem Dangerous." The Washington Post. January 29, 2018. Accessed May 16, 2018. https://www.washingtonpost.com/news/posteverything/wp/2018/01/29/why-the-trump-administration-is-trying-to-make-muslim-immigrants-seem-dangerous/?utm_term=.92dfb1bef0fd.
 Brief of Former Nat’l Sec. Officials as Amicus Curiae in Support of Plaintiff-Appellees at 13, 28, Hawaii v. Trump, 859 F.3d 741 (2017) (no. 16-1540) (Docket No. 108), cert granted by Trump v. Int’l Refugee Assistance Project, 137 S. Ct, 2080 (2017) (available at http://cdn.ca9.uscourts.gov/datastore/general/2017/04/20/17-15589%20Former%20National%20Security%20Officials%20Amicus.pdf).
 “Letter from Foreign Policy Experts on Travel Ban,” New York Times, March 11, 2017, https://www.nytimes.com/interactive/2017/03/11/us/politics/document-letter-foreign-policy-trump.html?mtrref=www.nytimes.com.
 Department of Homeland Security, “Citizenship Likely an Unreliable Indicator of Terrorist Threat to the United States,” Draft Report Obtained by Associated Press, February 24, 2017, https://assets.documentcloud.org/documents/3474730/DHS-intelligence-document-on-President-Donald.pdf.
 International Migration Report 2015 [highlights], United Nations, 2016, 1, http://www.un.org/en/development/desa/population/migration/publications/migrationreport/docs/MigrationReport2015_Highlights.pdf.
 See, e.g. Faiza Patel and Meghan Koushik, Countering Violent Extremism, Brennan Center for Justice, 2017, 10-11, https://www.brennancenter.org/sites/default/files/publications/Brennan%20Center%20CVE%20Report.pdf.
 Immigration and Nationality Act, § 212 (f) (codified as 8 U.S.C. § 1202 (f)) (permits sharing of alien data with foreign “for the purpose of preventing, investigating, or punishing acts that would constitute a crime in the United States…or to deny visas to persons who would be inadmissible to the United States.”)
 For example, 2016, the CCD was found to have glaring security vulnerabilities. Reuters. "Visa Database Found to Be Vulnerable to Hacking: Report." NBCNews.com, April 1, 2016, https://www.nbcnews.com/tech/tech-news/visa-database-found-be-vulnerable-hacking-n549011. International agreements, like the U.S.-E.U. Passenger Name Records Agreement, recognize this possibility – that agreement limits access of passenger records transmitted from the E.U. to the U.S. to authorized officials, for narrow purposes, and with tight data security controls. See United States - European Union. Agreement between the United States of America and the European Union on the Use and Transfer of Passenger Name Records to the United States Department of Homeland Security, available https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:22012A0811(01)&from=EN.
 United States. The White House. Presidential Memorandum on Optimizing the Use of Federal Government Information in Support of the National Vetting Enterprise, available at https://www.whitehouse.gov/presidential-actions/presidential-memorandum-optimizing-use-federal-government-information-support-national-vetting-enterprise/.
 Other areas of law recognize this as a general principle. Most notably, the Federal Rules of Evidence impose conditions upon when out of court statements and materials can be relied upon to establish facts within a proceeding. Those rules do not apply in immigration removal proceedings.
 Department of Homeland Security, Presolicitation Notice. ICE-HSI- Data Analysis Service Amendment: Solicitation Number: HSCEMD-17-R-00010 (June 12, 2017), https://www.fbo.gov/index?s=opportunity&mode=form&id=3abbda0ebcab146118a6f6a0ec44c2b4&tab=core&_cview=1.
 Harwell, Drew, and Nick Miroff. "ICE Just Abandoned Its Dream of ‘Extreme Vetting’ Software That Could Predict Whether a Foreign Visitor Would Become a Terrorist." The Washington Post, May 17, 2018. Accessed May 21, 2018. https://www.washingtonpost.com/news/the-switch/wp/2018/05/17/ice-just-abandoned-its-dream-of-extreme-vetting-software-that-could-predict-whether-a-foreign-visitor-would-become-a-terrorist/?utm_term=.3c5fe8c358e9.
 See, e.g., John Roth, Inspector General, DHS’ Pilots for Social Media Screening Need Increased Rigor to Ensure Scalability and Long-term Success (Redacted), U.S. Department of Homeland Security, 2017, https://www.oig.dhs.gov/sites/default/files/assets/2017/OIG-17-40-Feb17.pdf.
 Ibid. at Attachment 2: Background, 5. Conducting “recurrent” or “continuous” vetting appears to be a point of emphasis in the current immigration enforcement climate, though the concept is not completely unprecedented. This is a departure from the existing vetting paradigm, which focuses on screening at gatekeeping intervals, like during visa issuance or at the border. Department of Homeland Security Secretary Kirstjen Nielsen testified to Congress in January that DHS was “expanding round-the-clock security checks, ensuring that…individuals are continuously vetted,” and draft legislation calling for such checks exists. United States. Department of Homeland Security. Written Testimony of DHS Secretary Kirstjen Nielsen for a Senate Committee on the Judiciary Hearing Titled “Oversight of the United States Department of Homeland Security”. By Kirstjen Nielsen. January 16, 2018. https://www.dhs.gov/news/2018/01/16/written-testimony-dhs-secretary-kirstjen-nielsen-senate-committee-judiciary-hearing; SECURE and SUCCEED Act, S. HR 2579, 115th Cong. (2018).
 See, e.g., Aaron Shapiro, “Reform predictive policing,” Nature, January 25, 2017, http://www.nature.com/news/reform-predictive-policing-1.21338; Logan Koepke, “Predictive Policing Isn’t About the Future,” Slate, November 21, 2016, http://www.slate.com/articles/technology/future_tense/2016/11/predictive_policing_is_too_dependent_on_historical_data.html; William Isaac and Andi Dixon, “Column: Why big data analysis of police activity is inherently biased,” PBS NewsHour, May 10, 2017, http://www.pbs.org/newshour/rundown/column-big-data-analysis-police-activity-inherently-biased/.
 “Letter Inquiring About the Use of Social Media Monitoring Technologies by the Federal Government.” Keith Ellison et. al. to Attorney General Jeff Sessions. May 2, 2017. https://www.documentcloud.org/documents/3696481-House-Democrats-Letter-to-Sessions-re-Social.html.
 Letter Opposing the Extreme Vetting Initiative.” Technology Experts to Acting Department of Homeland Security Elaine C. Duke. November 16, 2017. https://www.brennancenter.org/sites/default/files/Technology%20Experts%20Letter%20to%20DHS%20Opposing%20the%20Extreme%20Vetting%20Initiative%20-%2011.15.17.pdf.
 Aaron Cantu and George Joseph, “Trump’s Border Security May Search Your Social Media by ‘Tone,’” Nation, August 23, 2017, https://www.thenation.com/article/trumps-border-security-may-search-your-social-media-by-tone/.
 Duarte, Natasha, Emma Llanso, and Anna Loup. Mixed Messages? The Limits of Automated Social Media Content Analysis. Report. Center for Democracy & Technology. 2017. See also Ahmed Abbasi, Ammar Hassan & Milan Dhar, Benchmarking Twitter Sentiment Analysis Tools, Proceedings of the 9th Language Resources and Evaluation Conference (2014); Su Lin Blodgett & Brendan O’Connor, Racial Disparity in Natural Language Processing: A Case Study of Social Media African-American English, Proceedings of the 2017 Fairness, Accountability and Transparency in Machine Learning Conference (2017).
 "Letter Expressing Serious Concerns over Immigration and Custom's Enforcement's ‘Extreme Vetting Initiative’” Congressional Black Caucus to Department of Homeland Security Secretary Kirstjen Nielsen. March 8, 2018. https://www.brennancenter.org/analysis/congressional-black-caucus-calls-dhs-suspend-extreme-vetting-initiative.
 See, e.g. Laura Hudson, “Technology is Biased Too. How Do We Fix It?” FiveThirtyEight, July 20, 2017, https://fivethirtyeight.com/features/technology-is-biased-too-how-do-we-fix-it/ (“The focus on accuracy implies that the algorithm is searching for a true pattern, but we don’t really know if the algorithm is in fact finding a pattern that’s true of the population at large or just something it sees in its data,” Suresh Venkatasubramanian) (“In some cases, the most accurate prediction may not be the most socially desirable one, even if the data is unbiased, which is a huge assumption — and it’s often not.”).
 David Bier, Extreme Vetting of Immigrants: Estimating Terrorism Vetting Failures, Cato Institute, 2018, No. 838, https://object.cato.org/sites/cato.org/files/pubs/pdf/pa-838.pdf.
 Emmanuelle Saliba, “You’re More Likely to Die Choking Than Be Killed by Foreign Terrorists, Data Show,” NBC News, February 1, 2017, https://www.nbcnews.com/news/us-news/you-re-more-likely-die-choking-be-killed-foreign-terrorists-n715141. Other striking comparative risk statistics: toddlers with guns killed more people than foreign terrorists in 2015. Gary Younge, “Trump fears terrorists, but more Americans are shot dead by toddlers,” Guardian, February 8, 2017, https://www.theguardian.com/commentisfree/2017/feb/08/trump-muslim-terrorists-gun-violence-america-deaths; Christopher Ingraham, “People are getting shot by toddlers on a weekly basis this year,” Washington Post, October 14, 2015, https://www.washingtonpost.com/news/wonk/wp/2015/10/14/people-are-getting-shot-by-toddlers-on-a-weekly-basis-this-year/?utm_term=.ea27df29d3d1; Kim LaCapria, “Toddlers Killed More Americans than Terrorists in 2015,” Snopes, accessed September 15, 2017, http://www.snopes.com/toddlers-killed-americans-terrorists/. Since September 11, 2001, an average American has been as likely to be crushed by a television or furniture as a terrorist attack. Micah Zenko, “America Is a Safe Place,” Council on Foreign Relations (blog), February 24, 2012, https://www.cfr.org/blog/america-safe-place.