For other versions of this document, see http://wikileaks.org/wiki/CRS-RL34007 ------------------------------------------------------------------------------ Order Code RL34007 Immigration Fraud: Policies, Investigations, and Issues Updated April 3, 2008 Ruth Ellen Wasem Specialist in Immigration Policy Domestic Social Policy Division Immigration Fraud: Policies, Investigations, and Issues Summary Immigration fraud is reportedly widespread, though reliable estimates of its pervasiveness are not available. Given that an estimated12 million aliens are residing in the United States without legal authorization, it is reasonable to presume that many of these unauthorized aliens are committing document fraud. The extent to which unauthorized aliens enter with fraudulently obtained documents or acquire bogus documents after entry is not known. Immigration fraud is generally grouped into two types -- immigration-related "document fraud" and immigration "benefit fraud" ("benefit fraud"involves misrepresentation of a material fact to qualify for a specific immigration status or benefit). Some view immigration fraud as a continuum of events or overlapping crimes because people may commit document fraud en route to benefit fraud. The types of fraud investigations range in circumstances and scope. Many fraud investigations focus on facilitators (i.e., individuals who sell, distribute, or manufacture counterfeit or altered documents) and on organizations that broker large- scale illegal schemes such as sham marriage rings or bogus job offers. Investigations of immigration benefit applications are another major activity. Fraud investigations declined overall from FY1992 through FY2003. The cuts in fraud investigations from FY1992 through FY2003 appear to have been generally across the board in terms of types of investigations pursued. CRS data analysis indicates that workyears spent investigating facilitators of counterfeit or altered documents, organizations that broker large-scale illegal schemes, and persons suspected of immigration benefit fraud had all decreased during that period. Successful prosecutions of fraud cases likewise declined from 494 convictions in FY1992 to 250 convictions in FY2003. Most recently, however, the DHS Office of Immigration Statistics (OIS) reports that indictments for immigration fraud rose from 709 in FY2004 to 1,032 in FY2006 and that convictions rose from 533 in FY2004 to 1,073 in FY2006. OIS also reports that 75,532 aliens were removed for immigration fraud, making up 36% of all formal removals in FY2005. Complementary to investigating fraud has been the effort to improve the security of immigration documents. Initially, the emphasis was on issuing documents that were tamper-resistant and difficult to counterfeit to impede document fraud and unauthorized employment. Since the terrorist attacks of September 11, 2001 the policy priorities have centered on document integrity and personal identification with a sharp focus on intercepting terrorist travel and other security risks. The integrity of immigration documents and the capacity to curb immigration fraud are among the central themes that underlie the bigger issue of comprehensive immigration reform legislation. Topics such as adequacy of resources, coordination among agencies and the impact of technologies on personal privacy illustrate the complexity of this debate. This report will be updated as policies change or events warrant. Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Issue Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Definition of Immigration Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Investigating Immigration Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Historical Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Recent Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Removals for Immigration Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Improving Document Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Laser Visas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Biometric Visas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Legal Residency "Green Cards" . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Employment Eligibility Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Activities Aimed at Immigration Fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 ICE Immigration Investigations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 ICE Forensic Document Laboratory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 USCIS Fraud Detection and Admissibility . . . . . . . . . . . . . . . . . . . . . . . . . 13 DOS Visa and Passport Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Selected Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Inter-agency Coordination and Performance . . . . . . . . . . . . . . . . . . . . . . . . 14 Priority of Fraud Investigations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 New Technologies and Privacy Concerns . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Competing Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Privacy Concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Radio Frequency Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 List of Figures Figure 1. Overlapping Types of Immigration Fraud . . . . . . . . . . . . . . . . . . . . . . . 3 Figure 2. Comparison of Special Agent Workyears and Completed Cases for Selected Years . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Figure 3. Fraud Investigation Trends as Actual Workyears and as Percent of Interior Enforcement Hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Figure 4. ICE Immigration Identity and Document Fraud Cases, FY2004-FY2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Figure 5. Formal Removal of Aliens Who Attempted Entry without Proper Documents or through Fraud or Misrepresentation . . . . . . . . . . . . . . 9 Immigration Fraud: Policies, Investigations, and Issues Introduction Issue Context All persons seeking admission to the United States must demonstrate to a U.S. Department of Homeland Security (DHS) Customs and Border Protection (CBP) inspector that they are a foreign national with a valid visa or passport or that they are a U.S. citizen. The United States does not require its citizens to have legal documents that verify their citizenship and identity (i.e., national identification cards).1 The Immigration and Nationality Act (INA) furthermore requires employers -- when hiring citizens and foreign nationals alike -- to verify employment eligibility and establish identity through specified documents presented by the employee. Immigration fraud is reportedly widespread, though reliable estimates of its pervasiveness are not available. Many experts say that document fraud increased following the enactment of the Immigration Reform and Control Act of 1986, which first required employers to inspect the documents of prospective employees.2 Large- scale black market enterprises of counterfeit immigration documents and "breeder" documents grew up to supply unauthorized alien workers with necessary papers. Given that an estimated 12 million foreign nationals are residing in the United States without legal authorization, it is reasonable to presume that many of these unauthorized aliens are committing document fraud.3 The extent to which unauthorized aliens enter with fraudulently obtained documents or acquire bogus documents after entry is not known. Among aliens coming temporarily to the United States, however, committing fraud to obtain a nonimmigrant visa has been an 1 Some assert that the United States has de facto identification cards in the form of social security cards and driver's licenses or state identification cards; however, none of these documents establishes citizenship. The U.S. passport is one of the few documents that certifies that the individual is a U.S. citizen; indeed, for most U.S. citizens it is the only document they possess that verifies both their citizenship and identity. For a fuller discussion of national identification issues, see CRS Report RS21137, National Identification Cards: Legal Issues, by Alison M. Smith. 2 For an explanation of employer responsibilities, see CRS Report RL33973, Unauthorized Employment in the United States: Issues and Options, by Andorra Bruno. 3 CRS Report RL33874, Unauthorized Aliens Residing in the United States: Estimates Since 1986, by Ruth Ellen Wasem. CRS-2 ongoing problem.4 It is also possible that many of the people who broker in immigration documents are legal residents or citizens of the United States. Definition of Immigration Fraud5 Immigration fraud is generally grouped into two types -- immigration-related document fraud and immigration benefit/qualification fraud. ! Immigration-related document fraud includes the counterfeiting, sale, and/or use of identity documents or "breeder documents" (i.e., documents used to confirm identity, such as birth certificates or Social Security cards),6 as well as alien registration documents and stamps, employment authorizations, passports, visas, or any documents used to circumvent immigration laws.7 ! Benefit/qualification fraud encompasses the willful misrepresentation of a material fact to qualify for a status or benefit under immigration law in the absence of lawful eligibility for that benefit.8 Examples of benefit fraud include entering into a sham marriage in order to claim to be the spouse of a U.S. citizen; omitting a disqualifying criminal conviction from a petition to become an LPR; or falsely claiming to have been living in the United States continuously for the requisite time required for naturalization. 4 For a range of discussions, see U.S. House of Representatives, Committee on the Judiciary Subcommittee on Immigration and Claims, Hearing on Visa Fraud and Immigration Benefits Application Fraud, May 20, 1997; and Subcommittee on Immigration, Border Security, and Claims, Hearing on John Allen Muhammad, Document Fraud, and the Western Hemisphere Passport Exception, May 13, 2003. 5 For legal analysis pertaining to immigration document fraud as well as further explanation of what constitutes document fraud, see CRS Report RL32657, Immigration-Related Document Fraud: Overview of Civil, Criminal, and Immigration Consequences, by Michael John Garcia (hereafter CRS Report RL32657, Immigration-Related Document Fraud). 6 For a sample of discussions on the impact of breeder documents on immigration fraud, see U.S. House of Representatives, Committee on the Judiciary Subcommittee on Immigration and Claims, Hearing on Counterfeiting And Misuse Of the Social Security Card and State and Local Documents, July 22, 1999; U.S. National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report, Executive Summary, July 2004; U.S. General Accounting Office, Report GAO-03-920, Social Security Numbers: Improved SSN Verification and Exchange of States' Driver Records Would Enhance Identity Verifications, September 2003; New York Law Journal, "Immigration Reform: Balancing Workers and Enforcement," by Stanley Mailman and Stephen Yale-Loehr, August 2005; and, Center for Immigration Studies, America's Identity Crisis: Document Fraud is Pervasive and Pernicious, by Marti Dinerstein, April 2002. 7 §270.1 of 8 C.F.R. 8 §274C of INA allows for civil penalties for persons who commit fraud to meet an INA requirement or acquire an immigration benefit. Additionally, a civil penalty under §274C is a separate ground for inadmissibility and deportation. CRS-3 Some view immigration fraud as a continuum of events because people may commit document fraud en route to benefit/qualification fraud.9 It is also presented as two overlapping concentric circles, as in Figure 1, because there is considerable overlap in the crimes. Figure 1. Overlapping Types of Immigration Fraud nt me B en Docu ef Fra it d Fra u ud The INA addresses immigration fraud in several ways. First, the law makes "misrepresentation" (e.g., obtaining a visa by falsely representing a material fact or entering the United States by falsely claiming U.S. citizenship) a ground for inadmissibility.10 Secondly, the INA has civil enforcement provisions, distinct from removal or inadmissibility proceedings, for individuals and entities proven to have engaged in immigration document fraud.11 Immigration fraud for purposes other than admission or an immigration benefit may nonetheless trigger other violations of immigration law, such a crimes of moral turpitude.12 In addition to the INA, §1546 of Title 18 of the U.S. Criminal Code makes it a criminal offense for a person to knowingly produce, use, or facilitate the production 9 U.S. House of Representatives, Committee on the Judiciary Subcommittee on Immigration and Claims, Hearing on Visa Fraud and Immigration Benefits Application Fraud, May 20, 1997. 10 §212(c) of INA. 11 §274C of INA. 12 CRS Report RL32657, Immigration-Related Document Fraud. CRS-4 or use of fraudulent immigration documents such as visas, border crossing cards, and other documents covered by immigration-related statute or regulation.13 The U.S. Criminal Code furthermore criminalizes immigration fraud pertaining to the knowing falsification of naturalization, citizenship, or alien registry.14 More generally, the U.S. Criminal Code criminalizes the knowing commission of fraud in connection with a wide range of identification documents.15 Fraud-based activity may also be penalized under criminal statutes that generally bar fraudulent activity against the United States.16 Investigating Immigration Fraud The types of fraud investigations range in circumstances and scope. Many investigations focus on facilitators (i.e., individuals who sell, distribute, or manufacture counterfeit or altered documents), and on organized crime syndicates that broker large-scale illegal schemes such as sham marriage rings or bogus job offers. Investigations of immigration benefit applications are another major activity. Historical Trends For many years, the Immigration and Naturalization Service (INS) collected data measuring its workload in a system, known as the Performance Analysis System (PAS). The PAS compiled data on agent work hours for each of the major INS enforcement activities.17 In this report, the hours are aggregated into workyears.18 As immigration enforcement strategies changed and resources shifted over time, it has become evident that investigations of immigration fraud have declined as a priority (Figure 2).19 In FY1986, for example, the productive workyears devoted to fraud investigation reportedly equaled the time of 256 special agents, and 11,316 fraud cases were completed. Ten years later (FY1995), there were the equivalent of 181 special agent workyears, and 6,455 cases were completed.20 When the INS issued its "Interior Enforcement Strategy" in 1999, minimizing immigration benefit 13 §1546 of 18 U.S.C. 14 §1015 of 18 U.S.C. 15 §1028 of 18 U.S.C. 16 §1001 -§1002 of 18 USC; CRS Report RL32657, Immigration-Related Document Fraud. 17 An analysis of resources spent on the full range of immigration enforcement activities is available in CRS Report RL33351, Immigration Enforcement Within the United States, coordinated by Alison Siskin. (Hereafter, CRS Report RL33351, Immigration Enforcement Within the United States.) 18 For this analysis, 2,080 hours equal one workyear. 19 CRS Report RL33351, Immigration Enforcement Within the United States. 20 U.S. House of Representatives, Committee on the Judiciary Subcommittee on Immigration and Claims, Hearing on Visa Fraud and Immigration Benefits Application Fraud, testimony of Paul Virtue, May 20, 1997. CRS-5 fraud and other document abuse was listed as the fourth among the five top priorities.21 Figure 2. Comparison of Special Agent Workyears and Completed Cases for Selected Years Thousands of Cases Total Workyears 12 300 Workyears Completed Cases 10 250 8 200 6 150 4 100 2 50 0 0 1986 1995 2003 Source: CRS analysis of DHS Office of Immigration Statistics PAS data. Evaluations of the government's efforts to combat immigration benefit fraud and document abuse have generally been critical.22 In 2003, the U.S. Government Accountability Office (GAO) noted that "INS did not believe it had sufficient staff 21 The five priorities (in rank order) were as follows: identify and remove incarcerated criminal aliens from the United States and minimize recidivism; deter, dismantle and diminish smuggling or trafficking of aliens; respond to community reports and complaints about illegal immigration and build partnerships to solve local problems; minimize immigration benefit fraud and other document abuse; and, block and remove employers' access to undocumented workers. U.S. Department of Justice Immigration and Naturalization Service, Fact Sheet on Interior Enforcement, February 2, 1999. 22 U.S. Department of Justice Office of the Inspector General, Inspections Division, Immigration and Naturalization Service Document Fraud Records Corrections, Report Number I-96-09 September 1996; U.S. Senate Committee on the Judiciary Subcommittee on Technology, Terrorism, and Government Information, Statement of Glenn A. Fine, October 12, 2001; U.S. Government Accountability Office, GAO-02-830T, Identity Fraud: Prevalence and Links to Alien Illegal Activities, June 25, 2002; U.S. Government Accountability Office, GAO-03-660T, Homeland Security: Challenges to Implementing the Immigration Interior Enforcement Strategy, April 10, 2003; U.S. Government Accountability Office, GAO-05-66, Immigration Enforcement: DHS Has Incorporated Immigration Enforcement Objectives and Is Addressing Future Planning Requirements, October 8, 2004. CRS-6 to reach its program goals." GAO also reported that benefit fraud investigations were hampered by a lack of integrated information systems. "The operations units at the four INS service centers that investigate benefit fraud operate different information systems that did not interface with each other or with the units that investigate benefit fraud at INS district offices.... Thus, INS was not in the best position to review numerous applications and detect patterns, trends, and potential schemes for benefit fraud."23 As Figure 3 further illustrates, fraud investigations declined overall from FY1992 through FY2003 in terms of actual workyears. FY2003 was the last year these data were available.24 Although there was an upturn, most likely due to the 1999 Interior Enforcement Strategy previously mentioned, the trends over the decade were downward. As a percent of interior enforcement workyears, fraud investigations dropped from 14.1% in FY1992 to 7.0% in FY2003. Actual workyears fell from 264 to 175 over the same period. Figure 3. Fraud Investigation Trends as Actual Workyears and as Percent of Interior Enforcement Hours Percent 300 Percent Work Years 14 250 12 200 10 8 150 6 100 4 50 2 0 0 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 Source: CRS analysis of DHS Office of Immigration Statistics PAS data. The cuts in fraud investigations from FY1992 through FY2003 appear to have been generally across the board in terms of types of investigations pursued. CRS data analysis indicates that workyears spent investigating facilitators of counterfeit or altered documents, organizations that broker large-scale illegal schemes and 23 U.S. Government Accountability Office, GAO-03-660T, Homeland Security: Challenges to Implementing the Immigration Interior Enforcement Strategy, April 10, 2003. 24 The last year the Performance Analysis System (PAS) data were reported was FY2003. CRS-7 persons suspected of immigration benefit fraud have all decreased over this time period.25 Successful prosecutions of fraud cases likewise declined from 494 convictions in FY1992 to 250 convictions in FY2003. These data tracked the performance of the former INS, which the Homeland Security Act of 2002 (P.L. 107-296) abolished. Recent Activities As it established the Department of Homeland Security (DHS) in 2003, the Administration stated that Immigration and Customs Enforcement (ICE) would comprise the interior enforcement functions of the former INS, including the detention and removal program, the intelligence program, and the investigations program, along with the former U.S. Customs Service interior enforcement activities.26 While it was clear that ICE assumed responsibility for investigating immigration-related document fraud, it was less apparent whether ICE or another newly-created DHS bureau -- the U.S. Citizenship and Immigration Services (USCIS) -- had lead responsibility for investigating immigration benefit/qualification fraud. In 2006, ICE issued a press release that reported a marked increase in investigations and convictions in FY2004 and FY2005. "Criminal indictments in these cases have increased from 767 to 875, while arrests have risen from 1,300 to 1,391 and convictions have increased from 559 to 992."27 Subsequently, the DHS Office of Immigration Statistics (OIS) published different data, reporting that indictments rose from 709 in FY2004 to 1,065 in FY2005 and that convictions rose from 533 in FY2004 to 1,135 in FY2005. The most recent data published by OIS indicate that FY2006 paralleled FY2005, with 1,272 arrests, 1,032 indictments, and 1,073 convictions for identity and document fraud (Figure 4).28 25 See CRS Report RL33351, Immigration Enforcement Within the United States. 26 CRS Report RL33319, Toward More Effective Immigration Policies: Selected Organizational Issues, by Ruth Ellen Wasem. 27 DHS Immigration and Customs Enforcement, News Release, "Joint task forces created in 10 cities to combat document and benefit fraud," April 5, 2006. 28 U.S. Department of Homeland Security, Office of Immigration Statistics, FY2005 Statistical Yearbook of Immigration, 2006, and FY2006 Statistical Yearbook of Immigration, 2007. CRS-8 Figure 4. ICE Immigration Identity and Document Fraud Cases, FY2004-FY2006 1600 arrests indictments convictions 1400 1200 1000 800 600 400 200 0 FY2004 FY2005 FY2006 Source:CRS analysis of ICE data from Tables 37 and 39 of the Statistical Yearbook of Immigration, DHS Office of Immigration Statistics, 2004, 2005 and 2006. Because the FY2004 and FY2005 ICE document fraud data are derived from the Treasury Enforcement Control System (TECS) that was developed and used by the former U.S. Customs Service, it is not known how comparable these measures are to those based upon the FY1992-FY2003 PAS data. It is also not clear whether these document fraud indictments are unduplicated counts; that is, whether one case, for example, may be counted as immigration fraud as well as alien smuggling and human trafficking if the case was initiated as part of a human trafficking investigation and all three elements of the law are included in the arrest charges. In terms of cases prosecuted, the 2005 Syracuse University analysis of Department of Justice data reveal that immigration document fraud formed the basis for about 5% of the 37,765 immigration cases that DHS referred for prosecution in FY2004.29 This reported 5% referral rate is similar to the percentages depicted above in Figures 2 and 3 for the percentage of interior enforcement workyears allocated to fraud investigations (7.0%) and the percentage of successful immigration fraud prosecutions (4.1%). 29 Transactional Records Access Clearinghouse (TRAC), Report on DHS Criminal Immigration Enforcement, Syracuse University, August 24, 2005; available on-line at [http://trac.syr.edu/tracins/latest/131/], accessed April 30, 2007. CRS-9 Removals for Immigration Fraud As noted earlier, immigration fraud is a basis for inadmissibility and removal. Foreign nationals who are suspected of presenting fraudulent documents during inspection by a CBP officer at a port of entry are immediately put into removal proceedings, known as expedited removal.30 The INA defines an alien who lacks proper documentation or has committed fraud or willful misrepresentation of facts to gain admission into the United States as inadmissable, and the alien may be removed from the United States without any further hearings or review, unless the alien indicates either an intention to apply for asylum31 or a fear of persecution. Figure 5. Formal Removal of Aliens Who Attempted Entry without Proper Documents or through Fraud or Misrepresentation Thousands of Fraud Removals Percent of All Removals 100 100 Fraud removals & Percent of all removals 80 80 60 60 & & & & 40 40 & & & & & 20 20 0 0 1997 1998 1999 2000 2001 2002 2003 2004 2005 Source: CRS analysis of data published in the DHS Office of Immigration Statistics, FY2005 Yearbook of Immigration Statistics, (2006). As Figure 5 depicts, alien removals for attempted entry without proper documents or through fraud or misrepresentation has ebbed and flowed over the past decade. FY1997 was the first year the expedited removal policy was in place and 30 Aliens lacking proper documents who have been present in the United States for less than two years may become subject to expedited removal. Currently the policy is in place at the border and near the southern border in specific areas. CRS Report RL33109, Immigration Policy on Expedited Removal of Aliens, by Alison Siskin and Ruth Ellen Wasem. 31 The INA provides immigration protections to aliens who have a well-founded fear of persecution, most notably in the form of asylum status. CRS Report RL32621, U.S. Immigration Policy on Asylum Seekers, by Ruth Ellen Wasem. CRS-10 included in the formal removal data. In FY1999, removals due to immigration fraud peaked at 91,891 removals and comprised 51% of all alien removals. Removals for immigration fraud fell to 41,392 (27%) in FY2002, a level almost as low as 35,738 (31%) in FY1997, which was the first year after expedited removal was enacted. In FY2005 (the most recent year OIS has published data), OIS reported 75,532 aliens were removed for immigration fraud, making up 36% of all formal removals.32 Improving Document Security Complementary to investigating fraud has been the effort to improve the security of immigration documents.33 Initially, the emphasis was on issuing documents that were tamper-resistant and difficult to counterfeit to impede document fraud and unauthorized employment. Since the terrorist attacks of September 11, 2001 the policy priorities have centered on document integrity and personal identification with a sharp focus on intercepting terrorist travel and other security risks. For well over a decade, there has been a consensus that immigration documents also should include biometric identifiers, but determining what type of biometric identifier has posed a variety of technical issues.34 Congress imposed a statutory requirement for the biometric border crossing card known as laser visas in 1996 and added requirements for biometric visas in 2001 and 2002.35 The report of the National Commission on Terrorist Attacks Upon the United States (also known as 32 For a more complete discussion of alien removal, see CRS Report RL33351, Immigration Enforcement Within the United States. 33 In a related area of document integrity, Congress addressed national standards for drivers' licenses and personal identification cards in The REAL ID Act of 2005 (P.L. 109-13). The act contains a number of provisions relating to improved security for drivers' licenses and personal identification cards, as well as instructions for states that do not comply with its provisions. CRS Report RL34430, The REAL ID Act of 2005: Legal, Regulatory, and Implementation Issues, by Todd B. Tatelman. 34 For a discussion of these issues see CRS Report RS21916, Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues, by Daniel Morgan and William Krouse, February 7, 2005; and U.S. General Accounting Office, Technology Assessment: Using Biometrics for Border Security, GAO-03-174, January 2002. 35 The scientific and technical issues surrounding biometric identifiers are beyond the scope of this report. However, §403 of the USA PATRIOT ACT (P.L. 107-56) requires the development of a technology standard that can be used to verify the identity of persons seeking a visa to enter the United States. It further requires the technology standard that is developed to be a "cross-agency, cross-platform electronic system" that is fully integrated with law enforcement and intelligence information relevant to confirming the identity of persons applying for a visa to enter the U.S. or seeking entry into the country. Similar provisions include §202 of the Enhanced Border Security and Visa Reform Act (P.L. 107- 173). For the latest discussion of National Institute of Standards and Technology (NIST) role in biometric identification, go to [http://www.itl.nist.gov/div893/biometrics/index.html], accessed March 5, 2007. CRS-11 the 9/11 Commission) made several recommendations that underscore the urgency of implementing provisions pertaining to biometric visas and the entry-exit system.36 Laser Visas The "laser visa," which includes a photograph and both index fingers as biometric identifiers, is issued to citizens of Mexico to gain short-term entry (up to six months) for business or tourism into the United States. The Mexican laser visa has traditionally been called a border crossing card (BCC). It may be used for multiple entries and is good for at least 10 years. Mexican citizens can get a laser visa from the Department of State's Consular Affairs if they are otherwise admissible as B-1 (business) or B-2 (tourism) nonimmigrants, and the laser visa issued is a combined BCC/B-1/B-2 nonimmigrant visa. Current rules limit the BCC holder to visits of up to 30 days within the border zone of 25 miles along the border in Texas, New Mexico, and California and visits up to 30 days within a border zone of 75 miles in Arizona.37 Biometric Visas For the past several years, the Department of State (DOS) Bureau of Consular Affairs has been issuing machine-readable visas. Consular officers use the Consular Consolidated Database (CCD) to electronically store data on visa applicants, with some records dating back to the mid-1990s.38 Since February 2001, the CCD has stored the photographs of all visa applicants in electronic form, and more recently the CCD has begun storing fingerprints of the right and left index fingers. Since October 2004, all visas issued by the United States use biometric identifiers (e.g., finger scans) in addition to the photograph that has been collected for some time.39 Legal Residency "Green Cards" The permanent resident card, commonly called a "green card" because it had been printed on green stock, is a plastic document similar to a credit card. Since April 1998, the card has incorporated security features, including digital images, 36 In 1996, Congress required the development of an automated entry and exit data system that would track the arrival and departure of every alien. This system evolved into what is now known as the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT). For a complete discussion of the entry-exit system (US-VISIT) and its biometric requirements and features, see CRS Report RL32234, U.S. Visitor and Immigrant Status Indicator Technology Program (US-VISIT), by Lisa M. Seghetti and Stephen Viņa. 37 8 CFR §235.1(f). In certain instances specified in the regulation, the BCC entry is limited to 72 hours. 38 According to the Department of State Office of Legislative Affairs, consular officers have stored photographs of nonimmigrant visa applicants in an electronic database for over ten years. These data are now in CCD. 39 §414 of the USA Patriot Act (PL. 107-56) and §303 of the Enhanced Border Security and Visa Reform Act (P.L. 107-173) require that visas and other travel documents contain a biometric identifier and are tamper-resistant. CRS-12 holograms, micro-printing, and an optical memory stripe. It has digital photograph and fingerprint images which are an integral part of the card and, therefore, more tamper-resistant. It features a hologram depicting the Statue of Liberty, the letters "USA" in large print, an outline of the United States and a government seal. On the reverse side of the permanent resident card, there is an optical memory stripe -- similar to CD-ROM disk technology -- with an engraved version of the information contained on the front of the card, including the cardholder's photograph, name, signature, date of birth and alien registration number. This laser-etched information cannot be erased or altered. In addition, this same information, along with the cardholder's fingerprint, are digitally encoded in the stripe and can only be read by a specially designed scanner. According to the USCIS, approximately 14.6 million biometric "green cards" were issued FY1998-FY2006. Employment Eligibility Documents Aliens who are temporarily in the United States and eligible to work file a request for an employment authorization document (EAD). Other aliens who are authorized to work freely in the United States without restrictions also apply to USCIS for EAD. Examples of aliens who need EADs are refugees, asylum applicants and asylees with cases pending, aliens who are covered under Temporary Protected Status (TPS), aliens for whom an immigration judge or the Attorney General has granted relief from removal, and specified nonimmigrants.40 The EAD has incorporated security features, including digital images, holograms, and micro-printing, since 1998. More than 8.3 million biometric EADs were issued FY1998-FY2006, according to the USCIS.41 Activities Aimed at Immigration Fraud Almost all of the federal agencies that have a role in administering immigration law are also tasked with stymieing immigration fraud. The Department of States' Bureau of Consular Affairs as well as the USCIS have a critical responsibility to check the backgrounds and confirm the identities of persons seeking visas, immigration services or adjudication of benefits. Inspectors with DHS' Customs and Border Protection (CBP) examine and verify the documents of U.S. citizens and foreign nationals who seek admission to the United States at ports of entry, and border patrol agents play a critical enforcement role along the border and between ports of entry. The lead agency for investigating immigration fraud is Immigration 40 LPRs and nonimmigrants with restricted permission to work, such as an H-1B temporary specialty worker who may only work for an H-1B approved employer or L-1 intracompany transfers who may only work for the multinational corporation that employed them abroad, do not need EADs because work authorization is directly linked to their immigration status. 41 For more complete analyses of alien employment laws, policies, and issues, see CRS Report RL33973, Unauthorized Employment in the United States: Issues and Options, by Andorra Bruno; and CRS Report RS22180, Unauthorized Employment of Aliens: Basics of Employer Sanctions, by Alison Smith. CRS-13 and Customs Enforcement (ICE).42 While detecting immigration fraud is an important duty across these federal agencies, the activities described below are expressedly aimed at immigration fraud. ICE Immigration Investigations The ICE immigration enforcement activities include investigating aliens who violate the INA and other related laws. These activities primarily focus on the range of immigration-related probes that are national security priorities. Additionally, the main categories of non-terrorism immigration-related crimes they investigate are suspected criminal acts -- notably suspected fraudulent activities (i.e., possessing or manufacturing fraudulent immigration documents) and suspected smuggling and trafficking of aliens. ICE set up the Identity and Benefit Fraud Unit when DHS was formed in 2003. ICE investigators are law enforcement agents.43 ICE Forensic Document Laboratory The Forensic Document Laboratory (FDL) was placed in ICE after the INS was abolished. The FDL provides a variety of intelligence support and document analysis to all CBP, ICE and USCIS programs, as well as to other U.S. government agencies involved in the enforcement of immigration laws. The FDL provides forensic examination of documents for handwriting, stamp and seal impressions, ink analysis and other attributes as well as analyzing the biometric data. It also provides evidentiary support and expert testimony in court cases. USCIS Fraud Detection and Admissibility Adjudication of immigration and naturalization petitions is not a routine matter of processing paperwork. USCIS must confirm not only that the aliens are eligible for the particular immigration status they are seeking, but also whether they should be rejected because of other requirements of the law. USCIS established the Office of Fraud Detection and National Security in 2003 to work with the appropriate law enforcement entities to handle national security and criminal "hits" on aliens and to identify systemic fraud in the application process. In January 2005, immigration officers from Fraud Detection and National Security were deployed in the USCIS field offices. USCIS refers 100% of suspected benefit fraud cases to ICE in the form of "requests for investigations" and suspends the adjudication of the benefit while the case is with ICE. USCIS allows ICE up to 60 days to decide if a criminal investigation is warranted. If ICE does not pursue a criminal investigation, USCIS initiates an administrative review process to determine if the benefit should be denied and the alien placed in removal proceedings. 42 CRS Report RL33319, Toward More Effective Immigration Policies: Selected Organizational Issues, by Ruth Ellen Wasem. 43 CRS Report RL33351, Immigration Enforcement Within the United States. CRS-14 DOS Visa and Passport Security In response to the 9/11 Commission recommendation that the United States combine terrorist travel intelligence, operations, and law enforcement in a strategy to intercept terrorists, find terrorist travel facilitators, and constrain terrorist mobility, the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458) established a Visa and Passport Security Program. The role of this Department of State program is to target and disrupt individuals and organizations at home and in foreign countries that are involved in the production, distribution, or use of fraudulent visas, passports, and other documents used to gain entry to the United States.44 Selected Issues In many ways, immigration fraud is not an isolated issue; rather, it is inextricably linked to various issues that have led most observers to conclude that the U.S. immigration system is broken. As noted above, many of the estimated 12 million unauthorized aliens in the United States likely have some form of immigration document that is either expired or counterfeit. The integrity of the documents issued for immigration purposes and the capacity to curb immigration fraud are among the central themes that underlie the bigger issue of comprehensive immigration reform legislation. The selected issues discussed below illustrate the complexity of this debate. Inter-agency Coordination and Performance There are documented problems between USCIS and ICE in the area of fraud and national security investigations. Although many presumed that ICE would perform the fraud detection and investigation duties formerly handled by the INS, a complete transition did not occur. In 2004, GAO reported, "The difficulty between USCIS and ICE investigations regarding benefit fraud is not new.... As a result, some USCIS field officials told us that ICE would not pursue single cases of benefit fraud. ICE field officials who spoke on this issue cited a lack of investigative resources as to why they could not respond in the manner USCIS wanted."45 USCIS established the Office of Fraud Detection and National Security to address the immigration fraud activities that the ICE Identity and Benefit Fraud Unit was not performing. A March 2006 GAO report continued to find coordination and communication problems between USCIS and ICE, but noted that the two agencies in February 2006 signed a memorandum of agreement to establish information sharing mechanisms.46 44 CRS Report RL31512, Visa Issuances: Policy, Issues, and Legislation, by Ruth Ellen Wasem. 45 U.S. Government Accountability Office, Management Challenges Remain in Transforming Immigration Programs, GAO-05-81, October 2004. 46 U.S. Government Accountability Office, Immigration Benefits: Additional Controls and a Sanctions Strategy Could Enhance DHS's Ability to Control Benefit Fraud, GAO-06-259, (continued...) CRS-15 USCIS reportedly has problems of its own. The DHS Inspector General found problems in the background checks of applicants for which USCIS is now responsible. Among other findings, the IG report concluded that USCIS' security checks are overly reliant on the integrity of names and documents that applicants submit and that "USCIS has not developed a measurable, risk-based plan to define how USCIS will improve the scope of security checks." It further stated that "USCIS' management controls are not comprehensive enough to provide assurance that background checks are correctly completed."47 Most recently, GAO expanded on the concerns the DHS Inspector General expressed in its report on USCIS.48 The extent to which USCIS should have an enforcement arm to investigate benefit fraud and other adjudications-related violations has become a policy issue. Although Title IV of the Homeland Security Act of 2002 (P.L. 107-296) tasked ICE with immigration enforcement responsibilities, some maintain ICE's efforts are not sufficient. Pursuing single cases of benefit fraud is not a priority, yet it is possible that some of these single cases may be linked together in larger fraud schemes that are overlooked without a coordinated "big picture" approach. This linkage has been characterized as critically important in the context of discerning terrorist travel.49 Priority of Fraud Investigations The observable decline in investigator work years allocated to document and benefit fraud has led some to question the federal government's commitment to the enforcement of immigration laws. Among those who would reform immigration law and policy, the question arises as to whether current law is adequate but the dedication of resources is not. This debate grows in importance when weighing the role bogus documents and benefit fraud play in facilitating other violations of law.50 Some argue that it is critical to investigate the black market in counterfeit documents and benefit fraud because it is especially important to international terrorists, organized crime syndicates, and alien smuggling rings -- all of whom rely on fraudulent documents to minimize detection. They point out that document and 46 (...continued) March 2006, p. 33. 47 U.S. Department of Homeland Security, Office of Inspector General, A Review of U.S. Citizenship and Immigration Services' Alien Security Checks, OIG 06-06, November 2005, p. 2. 48 U.S. Government Accountability Office, Immigration Benefits: Additional Controls and a Sanctions Strategy Could Enhance DHS's Ability to Control Benefit Fraud, GAO-06-259, March 2006, p. 5. 49 U.S. National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report, Executive Summary, July 2004; and, Monograph on 9/11 and Terrorist Travel, August, 2004. 50 For a fuller analysis of this debate on the priorities of interior enforcement, see CRS Report RL33351, Immigration Enforcement Within the United States. CRS-16 benefit fraud are criminal violations of immigration law and criminal law, and -- as a result -- merit rigorous enforcement and prosecution.51 Others argue that limited enforcement resources should not be spent going after unauthorized aliens who present false documents so they can work. They assert that the preponderance of counterfeit documents is used to obtain employment in the United States. These critics agree that ICE should prioritize the investigation of international terrorists, organized crime syndicates, and alien smuggling rings rather than shifting more resources to investigating what they consider to be the lesser threat of immigration fraud, presumably that is solely to obtain employment.52 New Technologies and Privacy Concerns Many observers look to emerging technologies to enhance document integrity and stymie immigration fraud. The basic concept is that a card with personal identifiers embedded in it would be less vulnerable to counterfeiting, identity theft, and immigration fraud. A current issue is the integration of the competing biometric -- and in some instances radio frequency identification (RFI) -- technologies and databases.53 Competing Technologies. The difficulties thus far in determining what biometric identifiers are most appropriate are exacerbated by the competing technologies used by the existing databases and systems. The various key agencies (e.g., CBP, USCIS, and DOS) have already heavily invested in technologies that are not necessarily compatible with each other. This issue most clearly manifests in the scarcity of card readers at ports of entry that are able to read the biometric information in "green cards," laser visas, and biometric visas. Privacy Concerns. A 2007 report of the National Institute of Standards and Technology (NIST) explains that privacy considerations exist when the technology uses, collects, stores, or discloses personal information.54 According to NIST, for the purposes of current privacy regulation, the most important distinction about the information being addressed is whether personal information is personally 51 U.S. House of Representatives, Committee on the Judiciary Subcommittee on Immigration and Claims, Hearing on Visa Fraud and Immigration Benefits Application Fraud, May 20, 1997; Subcommittee on Immigration, Border Security, and Claims, Hearing on John Allen Muhammad, Document Fraud, and the Western Hemisphere Passport Exception, May 13, 2003; and Subcommittee on Immigration, Border Security, and Claims, Interior Immigration Enforcement Resources, March 10, 2005. 52 For an example, see Julia Preston, "Illegal Worker, Troubled Citizen and Stolen Name," New York Times, March 22, 2007. 53 U.S. Congress, Senate Committee on the Judiciary Subcommittee on Technology, Terrorism and Government Information, Border Technology: Keeping Terrorists Out of the United States -- 2003, hearing, March 12, 2003. 54 U.S. Department of Commerce, National Institute of Standards and Technology, Guidelines for Securing Radio Frequency Identification (RFID) Systems, Special Publication 800-98, April 2007. CRS-17 identifiable information.55 The GAO noted several privacy issues in its 2005 report: "notifying individuals of the existence or use of the technology; tracking an individual's movements; profiling an individual's habits, tastes or predilections; and allowing for secondary uses of information.""Without effective security controls, data on the tag can be read by any compliant reader;" GAO further stated, "data transmitted through the air can be intercepted and read by unauthorized devices; and data stored in the databases can be accessed by unauthorized users."56 Radio Frequency Identification. Approved applicants in the "trusted traveler" program with Canada (known as NEXUS) are issued a card, for example, that includes photo-identification and the contactless integrated circuit device commonly known as RFI technology. Although RFI technology has been used for many years in pass card security systems, proposals to incorporate it in immigration documents are quite controversial.57 While cards with RFI technology may also include biometric identifiers, they are typically used for cargo or transportation (e.g., E-Z Pass commuter traffic lanes are one common application of RFI technology.) Proponents point out that -- unlike magnetic strips or bar codes -- not all RFIs require manual scanning. It is reportedly possible to read hundreds of RFIs in a few seconds. Proponents further maintain RFIs may be read under visually and environmentally challenging conditions in which barcodes or other optical technologies are ineffective. Security and privacy concerns, some proponents assert, are being exaggerated.58 In addition to the concerns that NIST and GAO identified, opponents of RFI technology warn that powerful RFID readers created by criminals or foreign agents who are violating FCC regulations could monitor the movement and activities of people carrying cards with these technologies embedded in them. Other have 55 Ibid. "Personally identifiable information (PII) is information that can be used to uniquely identify, locate, or contact an individual. Examples of data elements that typically are considered PII include, but are not limited to, an individual's full name, social security number, passport number, financial account or credit card numbers, and biometric data such as fingerprints." 56 U.S. Government Accountability Office, Information Security: Radio Frequency Identification Technology in the Federal Government, GAO-05-551, May, 2005, p. 18-19. 57 In October 2006, the Secretary of State published a proposed rule to issue a card format for the passport that would be used for international land and sea travel between the United States, Canada, Mexico, the Caribbean, and Bermuda. As proposed, this passport card would show the bearer's origin, identity, and nationality and would be subject to existing passport statutes. The passport card would use a full facial image printed on the card as the biometric identifier. As proposed, each passport card would utilize radio frequency identification (RFI) technology to store and transmit a unique reference number. This proposal intends to implement §7209 of the Intelligence Reform and Terrorism Prevention Act of 2004 (P.L. 108-458), known as the Western Hemisphere Travel Initiative. 58 James A. Lewis, Much Smoke, No Fire: The RFID Debate, Center for Strategic and International Studies, November 2006. CRS-18 expressed concerns that police or government agencies may use such technologies to track individuals in violation of their civil liberties and right to privacy.59 59 John Schwartz, "Researchers See Privacy Pitfalls in No-Swipe Credit Cards," New York Times, October 23, 2006; Jason Miller, "State to DHS: Take a pass on using long-range RFID," Government Computer News, May 22, 2006. ------------------------------------------------------------------------------ For other versions of this document, see http://wikileaks.org/wiki/CRS-RL34007