Attn: Department of State Desk Officer
Office of Information and Regulatory Affairs
Office of Management and Budget
725 17th Street, N.W.
Washington, DC 20503
Bureau of Consular Affairs, Visa Office
U.S. Department of State
2201 C Street, N.W.
Washington, DC 20520
October 2, 2017
Re: 82 Fed. Reg. 36180, OMB Control No. 1405-0226; Supplemental Questions for Visa Applicants
Dear Sir or Madam:
The undersigned organizations write to express our serious concerns about the Department of State’s proposed policy, published for comment in Public Notice 10065. This policy would make permanent the collection of additional information from immigrant and nonimmigrant visa applicants who have been determined to warrant additional scrutiny in connection with terrorism or other visa ineligibilities, including national security-related ineligibilities.
As with the emergency collection that was put in place in May, the additional requirements impose significant burdens on visa applicants; are apt to chill speech and reveal private information about travelers that is irrelevant to their suitability for entry to the United States; and expose information about their families, friends and business associates in the U.S. Further, the context in which these policies are being developed raises concerns that the populations targeted for additional scrutiny will be identified by their shared religion, nationality, or ideology. Lastly, the data collection will facilitate the bulk mining and analysis of information about travelers and U.S. citizens, amplifying the concerns above, all in exchange for speculative national security benefits in light of the vanishingly small number of foreign-born persons who commit terrorist attacks on U.S. soil.
I.The Proposed Collection Excessively Burdens Visa Applicants for Speculative National Security Benefits
Applicants falling within populations the State Department determines require additional scrutiny (which, as detailed below, will disproportionately impact Muslim populations) will have to provide: fifteen years’ worth of travel, address, and employment history; five years’ worth of social media platforms and identifiers, email addresses, and phone numbers; names of siblings, children, and former spouses not already provided; prior passport numbers; and details and documentation on any travel to an ISIS-controlled territory. Travel information from applicants must include “details for each trip [and] source[s] of funds” for foreign travel and even potentially domestic travel.
First, the request for fifteen years’ worth of details on travel, address, and employment imposes an excessive – and potentially exclusionary – burden on affected applicants without commensurate benefits for national security. Second, the request for social media data (“platforms and identifiers”) is fatally ambiguous and will have a deleterious impact on the speech and privacy of applicants as well as the Americans with whom they communicate. Finally, social media communications have context-specific meanings that are notoriously difficult to interpret, and are more apt to raise false positives than to identify real security threats.
a.Request for Fifteen Years of Travel, Address and Employment History is Overly Burdensome
First, the additional disclosures are overly onerous, given that visa applicants under the current system are already required to provide a significant amount of documentation and information. For example, gathering fifteen years’ worth of travel history in addition to what is already required – even assuming it were available and recorded – could require weeks’ worth of time and substantial resources, involve tracking down accommodation and transportation providers, and finding credible people to corroborate trip details. The State Department’s estimate that the “Average Time Per Response” will be 60 minutes per applicant, resulting in a “Total Estimated Burden Time” of 65,000 hours, seems an implausible guess.
Perhaps more significantly, it is unclear how collecting extensive personal and travel histories would be helpful for national security purposes, particularly since many current terrorist threats like ISIS did not even emerge until 2013. Indeed, the questions for even a short visit to the U.S. require more personal information than the standard forms required to get a Top Secret security clearance. In any event, one consequence of this policy is clear: the heavy burdens discussed above will mean less people coming to the U.S., whether because they find visa application requirements prohibitive or too invasive, or fear making application errors that could give rise to false suspicions of fraud.
b.Request for Social Media Platforms and Identifiers is Ambiguous and Broad
The request for social media information in this information collection request (ICR) is also problematic. As an initial matter, the description of the data requested – namely, “[s]ocial media platforms and identifiers, also known as handles, used during the last five years” – is insufficient to provide guidance on the scope of required disclosure. The term “social media platforms” is not defined; while popular social media services such as Twitter, Facebook, and Instagram may be the most obvious targets, some definitions of social media include blogging and similar online activities. It is not clear whether applicants are meant to cast as wide a net as possible in their disclosures, or whether an inadvertent failure to do so may be used as a reason, whether pretextual or not, to deny their entry into the country.
Similarly, the proposed form to be completed by applicants asks for social media platforms and identifiers “for any websites or applications you have used to create or share content (photos, videos, status updates, etc.) as part of a public profile within the last five years.” It appears that travelers who contribute to multiple accounts on a single platform – a personal one and a professional one, for instance – will be required to disclose all such accounts, raising the risk that they will be held accountable for posts on a profile for which they exercise only partial control. The form does not offer a mechanism to explain the applicant’s role in using a particular platform or whether content is created or shared by other users as well.
The proposal does impose an important limitation on consular officers’ authority with respect to social media information – namely, the directive that adjudicating officers are to refrain from requesting applicants’ social media passwords or from subverting other privacy safeguards. Nonetheless, account collection may precede password collection: DHS started by collecting social media handles and identifiers from certain travelers in 2016, for instance, but the agency signaled shortly after President Trump’s inauguration that it might demand users’ passwords as well. It is also unclear how the State Department would ensure that this rule is followed, and what remedy applicants would be afforded for violations.
In any case, this guidance is insufficient to overcome significant problems with the substance of the policy, as described in the next section.
c.Social Media Collection Will Capture Information That is Difficult to Interpret, Chill Expression and Affect Third Parties
The ICR assumes that the investigation of applicant-provided social media information will assist the department in uncovering potential terrorists applying for visas. This seems unlikely. As an initial matter, it is doubtful that an individual who promotes terrorism online will disclose information about the social media profile he is using to do so, or will retain postings that might raise concerns in the eyes of consular officials or software programs analyzing online content.
Moreover, problems of interpretation are guaranteed to plague any review of social media postings. One need only look at the 2012 experience of a British citizen who was turned back at the border because DHS agents misinterpreted his posting on Twitter that he was going to “destroy America” – slang for partying – and “dig up Marilyn Monroe’s grave” – a joke. In a similar vein, government agents and courts have erroneously interpreted tweets repeating American rap lyrics as threatening messages in several court cases, including high-stakes national security matters. Even greater difficulties are inevitable if the language used is not English.
This is to say nothing of the challenges posed by non-verbal communication on social media. On Facebook, for instance, users can react to a posting with a range of emojis. The actual meaning of these emojis is highly contextual. If a Facebook user posts an article about the FBI persuading young, isolated Muslims to make statements in support of ISIS, and another user “loves” the article, is he sending appreciation that the article was posted, signaling support for the FBI’s practices, or sending love to a friend whose family has been affected? Assuming it is even possible to decode the meaning, that could not be done without delving further into the user’s other online statements, interactions, and associations, as well as the postings of those with whom he or she communicates, a laborious, invasive, and error-riddled process. Indeed, such ambiguity is already affecting domestic criminal proceedings with dire consequences, including individuals put behind bars for their Facebook likes.
This concern may be amplified for journalists, particularly those writing on conflict zones. Take the example of a foreign journalist who “favorites” a provocative tweet from an ISIS follower in order to find it again more easily for a piece of writing – will that be taken as support for the poster’s positions? If so, will he or she be called to account for every “heart” and “like”? Political scientists and other scholars who follow or interact with individuals with provocative or even reprehensible views for purposes of research and public education will face similar quandaries. In light of the multitude of possible interpretations of both speech and non-verbal communication, consular officers will be in a position to exercise enormous, unchecked discretion when it comes to assessing foreign residents’ suitability to enter the country, potentially quizzing them about the meaning and significance of a range of expression.
As a result of both the information request and the ambiguity pervading interactions on social media, online speech – particularly of the political or religious variety – will inevitably be chilled. Visa applicants will surely sanitize their own postings and internet presence to ensure that nothing online would provide cause for further scrutiny or suspicion by a rushed consular officer. Even if these travelers do not have First Amendment rights before they arrive in the United States, a system that potentially penalizes people for statements they make online due to misinterpretation is profoundly incompatible with core American constitutional values. It is also incongruent with the International Covenant on Civil and Political Rights, which guarantees “the right to freedom of expression,” including the “freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.”
Moreover, the notice’s statement that this collection of information will not be used to deny visas on the basis of religion or political views, while commendable, is insufficient. The point of the disclosure requirement, presumably, is for consular officers to view and assess the content of applicants’ postings. It is hard to imagine that the religious and political views reflected in those postings will not be taken into account in practice, even if officers are on paper prohibited from doing so.
We note the same point with respect to the direction to “[c]onsular staff…to take particular care to avoid collection of third-party information.” Such collection and analysis will be inevitable if the purpose of gathering social media data is in part to ascertain whether an applicant’s associations are relevant to her eligibility for a U.S. visa – for example, to determine whether she has sufficient links to her country of origin to overcome the statutory presumption that temporary visa applicants intend to immigrate to the U.S., or whether her social media associations have been flagged in government databases as potential national security threats. As such, reviews of travelers’ social media profiles will also likely reveal personal information not contained within any given account, including peoples’ connections to friends, relatives, and business associates in the U.S., potentially subjecting Americans to invasive scrutiny of their personal lives. This scrutiny may undermine the right to communicate anonymously, too, a right that is protected by the First Amendment and was called a necessary condition of free expression by the U.N. Special Rapporteur on Freedom of Expression. Requiring visa applicants to disclose their online identities may thus enmesh American citizens’ communications and sweep in large quantities of constitutionally protected speech.
Lastly, the government can point to no evidence that social media screening works and is worth expanding. While no public audits have yet been released for State Department social media collections, the DHS Office of Inspector General recently audited the Department of Homeland Security’s existing social media pilot programs and found that insufficient metrics were in place to measure the programs’ effectiveness, concluding that existing pilots had provided little value in guiding the rollout of a department-wide social media screening program.
II.The Proposed Collection Will Primarily Burden Applicants on the Basis of National Origin
The burdens detailed above would be substantial regardless of the faith or ethnicity of a visa applicant. While the State Department has stated that applicants flagged for additional scrutiny will be chosen “based on individual circumstances and the information they provide,” it is evident that these vetting procedures will be applied on the basis of national origin and will mainly be felt by Muslims. The proclamation issued by the president on September 24, 2017, explicitly provides for additional vetting of nationals of Iraq, Iran, and Somalia. In addition, the Department of State describes the anticipated respondents as “[i]mmigrant and nonimmigrant visa applicants who have been determined to warrant additional scrutiny in connection with terrorism or other national security-related visa ineligibilities.” It estimates that 65,000 respondents, or 0.5% of U.S. visa applicants worldwide, will be affected.26 This number closely tracks the roughly 68,000 nonimmigrant visas issued to nationals of the six travel ban countries and Iraq – which was included in Executive Order 13769, the first travel ban executive order – in fiscal year 2016, suggesting that the criteria triggering additional scrutiny may include national origin or religion. Finally, the State Department’s first attempt at implementing these requirements – which were halted due to ongoing litigation – required additional scrutiny specifically of nationals of the initial Muslim ban countries. So “populations warranting increased scrutiny” could refer to people from Muslim countries or some subset thereof.
The history of the vetting procedures also suggests the intent to target Muslims. Shortly after becoming the official Republican presidential nominee, Donald Trump rolled out a new plan: “extreme vetting” for Muslims entering the United States. He proposed that the United States admit only those “who share our values and respect our people.”  One campaign official explained that people who have “attitudes about women or attitudes about Christians or gays that would be considered oppressive” would be barred. Department of Homeland Security officials have indicated that visa applicants could be queried about honor killings, the role of women in society, and legitimate military targets. It is difficult to see the connection between a visitor’s view of the role of women in society and terrorism, but the connection between such questions and criticisms of the rights of women in Muslim societies is plain.
Such an approach is unlikely to make us safer. There is no evidence that an applicant’s national origin or religion reflects a propensity for terrorism. In fact, writing in opposition to Executive Order 13780, more than 40 national security experts from across the political spectrum argued that vetting should be responsive to “specific, credible threats based on individualized information,” not stereotypes of religions or countries. They also warned that banning nationals from Muslim countries would damage the “strategic and national security interests of the United States,” corrode relationships with allies and “[reinforce] the propaganda of ISIS.” Indeed, pro-ISIS social media accounts have used the Muslim ban to vindicate the claim that the U.S. is at war with Islam and stoke anti-American sentiments. An analysis by the Trump administration’s Department of Homeland Security found that citizenship was an unreliable indicator of terrorism threat, an unsurprising finding in light of U.N. estimates that in 2015 about 244 million people were living outside of the countries in which they were born. As has been detailed in previous Brennan Center reports, decades of counterterrorism research has not been able to identify traits that could be used to identify people who have a propensity for terrorism.
The Department of State’s notice does state that “[t]he collection of social media platforms and identifiers will not be used to deny visas based on applicants’ race, religion, ethnicity, national origin, political views, gender or sexual orientation.” However, given the context in which this ICR arises, and because it is part of the broader “extreme vetting” framework that appears aimed at Muslims, that assurance seems less than credible.
III.Information Collection may Facilitate Bulk Data Mining and Algorithmic Analysis Efforts that Amplify Privacy and Discrimination Concerns
While the ICR says that “[t]he additional information collected will facilitate consular officer efforts to apply more rigorous evaluation of these applicants for visa eligibilities,” it does not say what those efforts will consist of or how the State Department will use or store the data it obtains. Will it be able to analyze such large amounts of data? If so, through what means, and based on what criteria? Presumably this information about visa applicants from around the world will be recorded in government databases; for what purposes will these databases be used? Exploiting this data for bulk mining or algorithmic analysis would further amplify many of the privacy and discrimination-oriented concerns highlighted above.
The sensitive applicant information collected would likely be shared with the Department of Homeland Security, which may use the information as an input into new technological tools it wants developed as part of an “Extreme Vetting Initiative.” For this initiative, the Department of Homeland Security reportedly intends to “establish an overarching vetting [system] that automates, centralizes and streamlines the current manual vetting process,” driven by the mandates in President Trump’s immigration Executive Orders, including Executive Order 13780. Vetting would be dynamic: this computerized system would attempt to “continuous[ly] vet” visitors within the country using information including “media, blogs, public hearings, conferences, academic websites, social media websites…radio, television, press, geospatial sources, [and] internet sites.” It would further be targeted at “evaluat[ing] an applicant’s probability of becoming a positively contributing member of society as well as their ability to contribute to national interests.” Naturally, the program would seek to predict whether those entering the U.S. intended to commit a crime or terrorist attack once they arrived here.
Setting aside that these standards – especially those measuring the likelihood that an applicant will “positively contribute” to society or to the national interest – are impossible to administer, computer analyses are only as good as their inputs. Recent efforts to employ predictive algorithms throughout the criminal justice system have been shown to reflect enduring biases, including those based on race and income, since they rely on historic crime data that integrates those biases.
In the realm of immigration, use of such algorithms may have the effect of facilitating religious or ideological vetting. Indeed, there are already Homeland Security programs that attempt to draw inferences about social media data to develop traveler risk profiles on the basis of “tone analysis,” a process that is likely to incorporate decontextualized judgments about entire communities or religions, raising questions about both its ostensible neutrality and its effectiveness. In light of these concerns, collecting social media and other data for the purpose of vetting foreign travelers in order to subject it to algorithmic analysis seems highly unlikely to contribute measurably to domestic safety and security.
IV.There is No Evidence that Foreign Visitors Pose a Significant Threat to the U.S.
Lastly, empirical evidence shows that the risk of an attack on U.S. soil perpetrated by a foreign person who has been improperly vetted is infinitesimal. This is not surprising: the U.S. has one of the world’s most thorough visa vetting systems, built to identify national security threats. The government has had trouble showing otherwise. According a federal court of appeals: “There is no finding that present vetting standards are inadequate, and no finding that absent the improved vetting procedures there likely will be harm to our national interests.”
Indeed, over the past ten years, Americans have been more than ten times as likely to drown in a bathtub or die in a lightning strike than to die in a terrorist attack perpetrated by a foreign born terrorist on U.S. soil. According to a Cato Institute study, only five foreign-born terrorists have successfully carried out deadly attacks on U.S. soil since September 11, 2001, when the U.S. immigration security infrastructure was overhauled. Four were U.S. permanent residents or citizens who perpetrated terror attacks years after entering the country; indeed, three entered the United States as children. Entry screening would have been unlikely to catch them years before they decided to commit violence. Only Tashfeen Malik – who, along with her husband Syed Rizwan Farook, killed 14 people and injured 22 others in San Bernardino – entered the U.S. near in time to when she perpetrated an attack. But even discounting the proximity between a terrorist’s entry and his or her attack, and counting the September 11 hijackers (who came to the U.S. on temporary visas), Cato’s analysis of cases from 1975 through 2015 shows that 7.38 million such visas were issued for every one issued to a foreign-born terrorist, amounting to a near-zero (0.0000136) percent of visas. In short, the State Department’s expanded collection is a solution in search of a problem.
For the above reasons, we urge the Department of State to abandon this proposed information collection initiative. Please do not hesitate to let us know if we can provide any further information regarding our concerns. We may be reached at firstname.lastname@example.org (Faiza Patel: 646-292-8325), email@example.com (Rachel Levinson-Waldman: 202-249-7193), or firstname.lastname@example.org (Harsha Panduranga: 646-292-8719).
Advocacy for Principled Action in Government
American Library Association
Americans United for Separation of Church and State
Arkansas United Community Coalition
Asian Americans Advancing Justice
Brennan Center for Justice at NYU School of Law
Council on American-Islamic Relations (CAIR)
Center for Democracy & Technology
Center for Media Justice
Center for Security, Race, and Rights
Committee to Protect Journalists
Data & Society
Defending Rights & Dissent
Electronic Frontier Foundation
Government Information Watch
Human Rights Watch
Immigrant Law Center of Minnesota
Iranian American Bar Association
Japanese American Citizens League
Legal Aid Justice Center
Marhaba Service LLC
Mi Familia Vota
Muslim Community Network
Muslim Justice League
Muslim Public Affairs Council
National Asian Pacific American Women's Forum (NAPAWF)
National Center for Transgender Equality
National Hispanic Media Coalition
National Immigrant Justice Center
National Immigration Law Center
National Korean American Service & Education Consortium (NAKASEC)
New America's Open Technology Institute
New York Immigration Coalition
Poligon Education Fund
Resilient Communities, New America
Services, Immigrant Rights, and Education Network (SIREN)
Southern Poverty Law Center
The Constitution Project
United Church of Christ, OC Inc.
Yemen Peace Project
 We note that aspects of this notice and proposed policy may be amended or superseded in part by the president’s proclamation of September 24, 2017, putting in place new vetting processes and expanding the affected countries. Proclamation No. 9645, 82 Fed. Reg. 45,161 (Sept. 24, 2017). Nevertheless, we submit our comments in response to the current published notice from the State Department, in light of the approaching deadline.
 While the updated Form DS-5535 requires details only regarding travel outside the applicant’s country of residence (see Supplemental Questions for Visa Applicants: DS-5535 Form, Office of Information and Regulatory Affairs, Office of Management and Budget, available at https://www.reginfo.gov/public/do/PRAViewIC?ref_nbr=201705-1405-001&icID=226719), the August 3 ICR states that details about domestic travel may be required as well where the consular officer determines that the applicant was in an area while it was under the control of a terrorist organization (see 82 Fed. Reg. 36,180, 36,181 (posted Aug. 3, 2017)).
 Applicants must already plan far in advance and coordinate with various people to obtain materials in support of their visa applications. For example, nonimmigrant applicants must overcome the legal presumption that they intend to permanently stay in the U.S. In order to do that, a visa applicant must marshal extensive evidence to prove that she has every incentive to return to her home country. These include: proof of property ownership; proof of employment or pension; financial records; family documents; and/or proof of travel plans. See “US Visitor Visa – Visitor Documents,” Immihelp, accessed September 27, 2017, http://www.immihelp.com/visitor-visa/visitor-documents.html. Immigrant visa applicants must provide even more information, including medical exam results and various civil documents. See “The Immigrant Visa Process,” Department of State – Bureau of Consular Affairs, accessed September 27, 2017, https://travel.state.gov/content/travel/en/us-visas/immigrate.html.
 82 Fed. Reg. 36,180, 36,181 (posted Aug. 3, 2017).
 "Syria Iraq: The Islamic State militant group," BBC News, August 2, 2014, accessed September 21, 2017, http://www.bbc.com/news/world-middle-east-24179084.
 U.S. Office of Personnel Management, “Questionnaire For National Security Positions,” Standard Form 86 OMB No. 3206 0005, revised December 2010, accessed September 6, 2017, https://www.opm.gov/forms/pdf_fill/sf86-non508.pdf
See, e.g., American Anthropological Association, et. al, Comment Submission Regarding Notice of Information Collection under OMB Review: Supplemental Questions for Visa Applicants (DS-5535), for Department of State Office of Information and Regulatory Affairs and Visa Office, Bureau of Consular Affairs, May 18, 2017, http://www.nafsa.org/_/file/_/amresource/DS5535Comment051817.pdf;
Carol Morello, "U.S. embassies start new vetting of visa applicants," The Washington Post, June 01, 2017, , accessed September 27, 2017, https://www.washingtonpost.com/world/national-security/us-embassies-start-new-vetting-of-visa-applicants/2017/06/01/6b08c55a-46ec-11e7-bcde-624ad94170ab_story.html?utm_term=.f1a7d3c2c112.
 “Social Media Overview,” Tufts University Relations – Communications and Marketing, accessed September 27, 2017, http://communications.tufts.edu/marketing-and-branding/social-media-overview/ (Includes blogs and LinkedIn Groups as social media platforms.). Webster’s Dictionary has a very broad definition of social media: “forms of electronic communication (such as websites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos).” Merriam-Webster OnLine, s.v. “social media,” accessed September 27, 2017, https://www.merriam-webster.com/dictionary/social%20media.
 Supplemental Questions for Visa Applicants: DS-5535 Form, Office of Information and Regulatory Affairs, Office of Management and Budget, available at https://www.reginfo.gov/public/do/PRAViewIC?ref_nbr=201705-1405-001&icID=226719 (emphasis added).
 Tony Romm, "U.S. government begins asking foreign travelers about social media," POLITICO, December 22, 2016, accessed September 28, 2017, http://www.politico.com/story/2016/12/foreign-travelers-social-media-232930.
 Laura Meckler, “Trump Administration Considers Far-Reaching Steps for ‘Extreme Vetting’,” Wall Street Journal, April 4, 2017, https://www.wsj.com/articles/trump-administration-considers-far-reaching...
 See J. David Goodman, “Travelers Say They Were Denied Entry to U.S. for Twitter Jokes,” The Lede (blog), New York Times, January 30, 2012, 1:03 PM, https://thelede.blogs.nytimes.com/2012/01/30/travelers-say-they-were-denied-entry-to-u-s-for- twitter-jokes/?mtrref=undefined.
 See, e.g., Natasha Lennard, “The Way Dzhokhar Tsarnaev’s Tweets Are Being Used in the Boston Bombing Trial Is Very Dangerous,” Fusion, March 12, 2015, http://fusion.net/story/102297/the-use-of-dzhokhar-tsarnaevs-tweets-in-the-bostonbombing-trial-is-very-dangerous/; Bill Chappell, “Supreme Court Tosses Out Man’s Conviction for Making Threat on Facebook,” National Public Radio, June 1, 2015, http://www.npr.org/sections/thetwo- way/2015/06/01/411213431/supreme-court-tosses-outman-s-conviction-for-making-threats-on-facebook.
 See, e.g., Eric Lichtblau. “F.B.I. Steps Up Use of Stings in ISIS Cases,” New York Times, June 7, 2016, http://www.nytimes.com/2016/06/08/us/fbi-isis-terrorism-stings.html; Murtaza Hussain, “Confidential Informant Played Key Role in FBI Foiling Its Own Terror Plot,” Intercept, February 25, 2015, https://theintercept.com/2015/02/25/isismaterial-support-plot-involved-confidential-informant/.
 See, e.g., Ben Popper, “How the NYPD Is Using Social Media to Put Harlem Teens Behind Bars,” Verge, December 10, 2014, http://www.theverge.com/2014/12/10/7341077/nypd-harlem-crews-social-media-rikers-prison.
 G.A. Res. 2200A (XXI), International Covenant on Civil and Political Rights (Dec. 16, 1966), http://www.ohchr.org/EN/ProfessionalInterest/Pages/CCPR.aspx.
 Immigration and Nationality Corrections Act of 1994, Pub.L. 103-416, 108 Stat 4305, Title II, § 214 (b) (1994) (amendments to the Immigration and Nationality Act codified as 8 U.S.C. § 1184 (b)).
 The notice says that consular officers will collect data to “resolve an applicant’s identity or to vet for terrorism, national security-related, or other visa ineligibilities.” (emphasis added) This means that the information need not be used solely for national security vetting; Immigration and Nationality Act of June 27, 1952, Pub. L. No. 82-414, 66 Stat. 163 (1952) (codified as amended in scattered sections of 8 U.S.C.) The INA says that an applicant “shall be presumed to be an immigrant until he establishes to the satisfaction of the consular officer, at the time of application for a visa, and the immigration officers, at the time of application for admission, that he is entitled to a nonimmigrant status.” Immigration and Nationality Corrections Act of 1994, Pub.L. 103-416, 108 Stat 4305, Title II, § 214 (b) (1994) (amendments to the Immigration and Nationality Act codified as 8 U.S.C. § 1184 (b)), https://www.gpo.gov/fdsys/pkg/USCODE-2011-title8/pdf/USCODE-2011-title8-chap12-subchapII-partII-sec1184.pdf.
 “Anonymity,” Electronic Frontier Foundation, accessed September 27, 2017, https://www.eff.org/issues/anonymity; Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, Rep., Human Rights Council, at 1, U.N. Doc. A/HRC/29/32, May. 22, 2015, available at
 See generally John Roth, Inspector General, DHS’ Pilots for Social Media Screening Need Increased Rigor to Ensure Scalability and Long-term Success (Redacted), U.S. Department of Homeland Security, 2017, https://www.oig.dhs.gov/sites/default/files/assets/2017/OIG-17-40-Feb17.pdf.
 Proclamation No. 9645, “Enhancing Vetting Capabilities and Processes for Detecting Attempted Entry into the United States by Terrorists or Other Public-Safety Threats,” September 24, 2017, https://s3.amazonaws.com/public-inspection.federalregister.gov/2017-2089... (an unpublished Presidential Document by the Executive Office of the President).
 82 Fed. Reg. 36,180 (posted Aug. 3, 2017).
 Department of State, “Table XVIII Nonimmigrant Visas Issued by Nationality (Including Border Crossing Cards) Fiscal Year 2007-2016,” Report of the Visa Office 2016, https://travel.state.gov/content/dam/visas/Statistics/AnnualReports/FY20... (68,856).
 Department of State, 9SBU) Implementing Immediate Heightened Screening and Vetting of Visa Applications, by Rex Tillerson, 17 STATE 24324, ¶ 9-14, http://live.reuters.com/Event/Live_US_Politics/791246151.
 Jeremy Diamond, “Trump Proposes Values Test for Would-be Immigrants in Fiery ISIS Speech,” CNN, August 15, 2016, http://www.cnn.com/2016/08/14/politics/donald-trump-isis-fight/.
 Laura Meckler, “Trump Administration Considers Far Reaching Steps for ‘Extreme Vetting’,” Wall Street Journal, April 4, 2017, https://www.wsj.com/articles/trumpadministration-considers-far-reaching-steps-for-extremevetting-1491303602.
 Meckler, “Trump Administration Considers Far Reaching Steps for ‘Extreme Vetting.’”
 Faiza Patel, “Reflections on the Prejudice in the Draft Exec Order’s Vetting of ‘Prejudice’,” Just Security (blog), January 27, 2017, https://www.justsecurity.org/36898/reflections-prejudice-draftexec-orders-vetting-prejudice/; Faiza Patel and Erica Posey, “Beware Trump’s Phony ‘Terror’ List,” Daily Beast, March 22, 2017, http://www.thedailybeast.com/articles/2017/03/22/ beware-trump-s-phony-terror-list.html.
 Brief of Former Nat’l Sec. Officials as Amicus Curiae in Support of Plaintiff-Appellees at 13, 28, Hawaii v. Trump, 859 F.3d 741 (2017) (no. 16-1540) (Docket No. 108), cert granted by Trump v. Int’l Refugee Assistance Project, 137 S. Ct, 2080 (2017) (available at http://cdn.ca9.uscourts.gov/datastore/general/2017/04/20/17-15589%20Form...).
 “Letter from Foreign Policy Experts on Travel Ban,” New York Times, March 11, 2017, https://www.nytimes.com/interactive/2017/03/11/us/politics/document-letter-foreign-policy-trump.html?mtrref=www.nytimes.com.
 Joby Warrick, “Jihadist groups hail Trump’s travel ban as a victory,” Washington Post, January 29, 2017, https://www.washingtonpost.com/world/national-security/jihadist-groups-hail-trumps-travel-ban-as-a-victory/2017/01/29/50908986-e66d-11e6-b82f-687d6e6a3e7c_story.html?utm_term=.b834ad9dbe23.
 Department of Homeland Security, “Citizenship Likely an Unreliable Indicator of Terrorist Threat to the United States,” Draft Report Obtained by Associated Press, February 24, 2017, https://assets.documentcloud.org/documents/3474730/DHS-intelligence-document-on-President-Donald.pdf.
 International Migration Report 2015 [highlights], United Nations, 2016, 1, http://www.un.org/en/development/desa/population/migration/publications/....
 See, e.g. Faiza Patel and Meghan Koushik, Countering Violent Extremism, Brennan Center for Justice, 2017, 10-11, https://www.brennancenter.org/sites/default/files/publications/Brennan%20Center%20CVE%20Report.pdf.
 See, e.g. State Department, 60-Day Notice of Proposed Information Collection: Supplemental Questions for Visa Applicants, 82 FR 36180, 36181 (Aug. 3, 2017)
https://www.federalregister.gov/documents/2017/08/03/2017-16343/60-day-notice-of-proposed-information-collection-supplemental-questions-for-visa-applicants (“Consular posts worldwide regularly engage with U.S. law enforcement and partners in the U.S. intelligence community to identify characteristics of applicant populations warranting increased scrutiny”); Department of Homeland Security, Presolicitation Notice, ICE-HSI- Data Analysis Service Amendment: Solicitation Number: HSCEMD-17-R-00010 (June 12, 2017),
https://www.fbo.gov/index?s=opportunity&mode=form&id=3abbda0ebcab146118a... (background document, section 3.2: “[T]he contractor shall…have the ability to ingest and screen against large volumes of visa electronic applications efficiently and at high speed in regard worldwide social media and open source holdings and domains relevant to person centric derogatory and threat information assessment information, adjudication recommendation to the Department of State and notification to other government equites when warranted.”). The “Industry Day” materials prepared by ICE-HIS for this Presolicitation Notice were obtained and released by The Intercept in August 2017. Sam Biddle and Spencer Woodman, “These Are the Technology Firms Lining Up to Build Trump’s ‘Extreme Vetting’ Program,” Intercept, August 7, 2017, https://theintercept.com/2017/08/07/these-are-the-technology-firms-linin....
 Ibid. at Attachment 2: Background, 5.
 Department of Homeland Security, Presolicitation Notice, ICE-HSI- Data Analysis Service Amendment: Solicitation Number: HSCEMD-17-R-00010 (June 12, 2017),
https://www.fbo.gov/index?s=opportunity&mode=form&id=3abbda0ebcab146118a6f6a0ec44c2b4&tab=core&_cview=1 (Statement of Objectives, 1).
 See, e.g., Aaron Shapiro, “Reform predictive policing,” Nature, January 25, 2017, http://www.nature.com/news/reform-predictive-policing-1.21338; Logan Koepke, “Predictive Policing Isn’t About the Future,” Slate, November 21, 2016, http://www.slate.com/articles/technology/future_tense/2016/11/predictive_policing_is_too_dependent_on_historical_data.html; William Isaac and Andi Dixon, “Column: Why big data analysis of police activity is inherently biased,” PBS NewsHour, May 10, 2017, http://www.pbs.org/newshour/rundown/column-big-data-analysis-police-activity-inherently-biased/.
 See, e.g. Laura Hudson, “Technology is Biased Too. How Do We Fix It?” FiveThirtyEight, July 20, 2017, https://fivethirtyeight.com/features/technology-is-biased-too-how-do-we-fix-it/ (“The focus on accuracy implies that the algorithm is searching for a true pattern, but we don’t really know if the algorithm is in fact finding a pattern that’s true of the population at large or just something it sees in its data,” Suresh Venkatasubramanian) (“In some cases, the most accurate prediction may not be the most socially desirable one, even if the data is unbiased, which is a huge assumption — and it’s often not.”).
 Aaron Cantu and George Joseph, “Trump’s Border Security May Search Your Social Media by ‘Tone,’” Nation, August 23, 2017, https://www.thenation.com/article/trumps-border-security-may-search-your-social-media-by-tone/.
 Hawaii v. Trump, 859 F.3d 741, 771 (9th Cir. 2017), cert. granted sub nom Trump v. Int’l Refugee Assistance Project, 137 S. Ct. 2080 (2017).
 Emmanuelle Saliba, “You’re More Likely to Die Choking Than Be Killed by Foreign Terrorists, Data Show,” NBC News, February 1, 2017, https://www.nbcnews.com/news/us-news/you-re-more-likely-die-choking-be-killed-foreign-terrorists-n715141. Other striking comparative risk statistics: toddlers with guns killed more people than foreign terrorists in 2015. Gary Younge, “Trump fears terrorists, but more Americans are shot dead by toddlers,” Guardian, February 8, 2017, https://www.theguardian.com/commentisfree/2017/feb/08/trump-muslim-terrorists-gun-violence-america-deaths; Christopher Ingraham, “People are getting shot by toddlers on a weekly basis this year,” Washington Post, October 14, 2015, https://www.washingtonpost.com/news/wonk/wp/2015/10/14/people-are-getting-shot-by-toddlers-on-a-weekly-basis-this-year/?utm_term=.ea27df29d3d1; Kim LaCapria, “Toddlers Killed More Americans than Terrorists in 2015,” Snopes, accessed September 15, 2017, http://www.snopes.com/toddlers-killed-americans-terrorists/. Since September 11, 2001, an average American has been as likely to be crushed by a television or furniture as a terrorist attack. Micah Zenko, “America Is a Safe Place,” Council on Foreign Relations (blog), February 24, 2012, https://www.cfr.org/blog/america-safe-place.
 Alex Nowrasteh, Terrorism and Immigration: A Risk Analysis, Cato Institute, 2016, No. 798, 13, https://object.cato.org/sites/cato.org/files/pubs/pdf/pa798_2.pdf.
 One possible exception is Mohamad Hadayet, who opened fire at Los Angeles International Airport in 2002. For more details see, Eddy Ramirez, “Panel Probes LAX Gunman,” Los Angeles Times, October 10, 2002, http://articles.latimes.com/2002/oct/10/local/me-lax10 (Immigration officials reportedly “doubted Hadayet was a peaceful man when he requested political asylum in 1992.”).
 Tashfeen Malik entered the U.S. on July 27, 2014. She and Syed Rizwan Farook perpetrated the San Bernardino attacks on December 2, 2015 – just under a year and a half after Ms. Malik entered the U.S. Brian Ross et al., “Welcome to America: New Photo Shows San Bernardino Terror Couple Entering US,” ABC News, December 7, 2015, http://abcnews.go.com/US/america-photo-shows-terror-couple-entering-us/story?id=35615829.
 Nowrasteh, Terrorism and Immigration: A Risk Analysis, Cato Institute, 2016, No. 798, 8, https://object.cato.org/sites/cato.org/files/pubs/pdf/pa798_2.pdf.