{"id":81480,"date":"2018-05-22T14:27:10","date_gmt":"2018-05-22T18:27:10","guid":{"rendered":"https:\/\/cdt.org\/?post_type=blog&#038;p=81480"},"modified":"2018-05-22T14:27:10","modified_gmt":"2018-05-22T18:27:10","slug":"ice-cant-automate-immigration-vetting","status":"publish","type":"insight","link":"https:\/\/cdt.org\/insights\/ice-cant-automate-immigration-vetting\/","title":{"rendered":"ICE Finds Out It Can\u2019t Automate Immigration Vetting. Now What?"},"content":{"rendered":"<p>Last summer, U.S. Immigration and Customs Enforcement (ICE) <a href=\"http:\/\/www.brennancenter.org\/sites\/default\/files\/Extreme%20Vetting%20Inititate%20-%20Statement%20of%20Objectives.pdf\" target=\"_blank\" rel=\"noopener\">announced<\/a> that it was looking for machine-learning tools to continuously monitor U.S. visitors\u2019 and immigrants\u2019 social media posts and predict who should be allowed into the U.S. and who should be deported. Since then, <a href=\"https:\/\/cdt.org\/insight\/weighing-in-on-the-dhs-visa-lifecycle-vetting-initiative\/\" target=\"_blank\" rel=\"noopener\">CDT has worked<\/a> alongside other advocates\u2014including the Brennan Center for Justice, Georgetown Law\u2019s Center on Privacy &amp; Technology, <a href=\"https:\/\/twitter.com\/alvarombedoya\/status\/997188559110070272\" target=\"_blank\" rel=\"noopener\">and many, many others<\/a>\u2014to stop this <a href=\"https:\/\/cdt.org\/blog\/automated-extreme-vetting-wont-work-and-will-be-discriminatory\/\" target=\"_blank\" rel=\"noopener\">dangerous and discriminatory program<\/a> from going forward. After some searching, <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2018\/05\/17\/ice-just-abandoned-its-dream-of-extreme-vetting-software-that-could-predict-whether-a-foreign-visitor-would-become-a-terrorist\/\" target=\"_blank\" rel=\"noopener\">ICE has discovered<\/a> what advocates have been saying all along: <a href=\"https:\/\/cdt.org\/insight\/mixed-messages-the-limits-of-automated-social-media-content-analysis\/\" target=\"_blank\" rel=\"noopener\">No software exists<\/a> that can make these predictions. Software that would be used to make such predictions would violate civil and human rights, chill speech, and introduce arbitrary and discriminatory criteria into the immigration vetting process. For now, ICE appears to be backing off of its pursuit of this technology and will instead <a href=\"https:\/\/www.brennancenter.org\/sites\/default\/files\/ICE%20Homan%20letter%20to%20Rice%20-%2004.25.18.pdf\" target=\"_blank\" rel=\"noopener\">hire analysts<\/a> to expand vetting using \u201ccurrent technological capabilities.\u201d<\/p>\n<p>A lot of questions remain about ICE\u2019s new \u201cVisa Lifecycle Vetting\u201d initiative. For example, ICE previously said that it wanted tools to predict visa applicants\u2019 \u201c<a href=\"http:\/\/www.brennancenter.org\/sites\/default\/files\/Extreme%20Vetting%20Inititate%20-%20Statement%20of%20Objectives.pdf\" target=\"_blank\" rel=\"noopener\">probability of becoming a positively contributing member of society as well as their ability to contribute to the national interests<\/a>.\u201d It\u2019s unclear whether ICE analysts will evaluate applicants based on these vague, highly subjective standards, which are not derived from immigration laws (the language comes from the Trump Administration\u2019s <a href=\"https:\/\/www.whitehouse.gov\/presidential-actions\/executive-order-protecting-nation-foreign-terrorist-entry-united-states\/\" target=\"_blank\" rel=\"noopener\">January 27th executive order<\/a> known as the original \u201cMuslim ban\u201d). Such an amorphous standard could leave too much discretion for analysts to rely on arbitrary or discriminatory criteria, such as whether a visa applicant has criticized government policies or how much money she makes.<\/p>\n<p>ICE\u2019s former plan also involved a quota system, requiring automatic generation of <a href=\"https:\/\/www.brennancenter.org\/sites\/default\/files\/Background.pdf\" target=\"_blank\" rel=\"noopener\">at least 10,000 leads per year<\/a> for deportation and visa denial. According to reporting by the Washington Post\u2019s Drew Harwell and Nick Miroff, ICE analysts won\u2019t be held to a strict quota system, but ICE <a href=\"https:\/\/twitter.com\/drewharwell\/status\/997183933266657282\" target=\"_blank\" rel=\"noopener\">reportedly still has a goal<\/a> of continuously monitoring 10,000 people per year deemed \u201crisky.\u201d Again, it\u2019s unclear what standards or criteria determine who is risky, or how ICE came up with that number. These types of quotas or \u201cgoals\u201d can create perverse incentives for agents to over-flag people for exclusion from the U.S.<\/p>\n<p>ICE also has not clarified how these analysts will monitor or evaluate social media and other online information (such as blog posts and academic websites). Will people\u2019s social media posts be used as evidence that they are a security risk? Depending on how these determinations are made, social media surveillance may lead to more false positives rather than improving ICE investigations. Social media information is often untrustworthy (e.g. sarcasm, parody accounts, fake biographical information) and difficult to verify.<\/p>\n<p>ICE says it is only looking at \u201cpublicly available information,\u201d but will the agency have special access to social media platforms beyond what the average user would have? <a href=\"http:\/\/www.brennancenter.org\/sites\/default\/files\/Q%26A%20Industry%20Day%20-%20July%2018%2C%202017.pdf\" target=\"_blank\" rel=\"noopener\">In July 2017 conversations with industry<\/a>, ICE indicated that it was looking for \u201cworkaround[s]\u201d to circumvent technical limitations on accessing information from social media platforms and other websites (this likely refers to \u201cscraping\u201d information despite websites\u2019 API restrictions on doing so).<\/p>\n<p>We have a lot more questions about the government\u2019s plans to continuously monitor U.S. visitors and immigrants, and we will continue to push the administration to answer these questions. We also have no guarantee that ICE\u2014or any other agency\u2014won\u2019t use unreliable and discriminatory machine-learning tools to do automated vetting in the future.<\/p>\n<p>Even if ICE backs off of its dangerous procurement plan, announcing such an ill-conceived plan in the first place is a dangerous threat to human rights and public trust in government. ICE has attempted to couch its industry day and accompanying documents as exploratory, and not necessarily reflective of the agency\u2019s policy. But when an agency publicly announces its intent to solicit dangerous and discriminatory-by-design technologies, it incentivizes industry to develop these tools. Vendors could then attempt to sell these tools to other agencies\u2014perhaps state and local governments\u2014if ICE doesn\u2019t want them. Regardless of whether ICE moves forward with this initiative, the threat to immigrant communities remains.<\/p>\n<p>Accountability measures should stop these types of irresponsible procurement practices from happening. But <a href=\"https:\/\/www.reuters.com\/article\/us-ibm-immigration\/ibm-urged-to-avoid-working-on-extreme-vetting-of-u-s-immigrants-idUSKBN1DG1VT\" target=\"_blank\" rel=\"noopener\">the onus is also on industry<\/a> to push back when agencies pursue technologies and systems that don\u2019t work and threaten civil and human rights. Potential vendors and other influential companies are best positioned to correct technical oversights and refuse to let their systems be used for discriminatory enforcement of laws, privacy violations, and speech chilling activities.<\/p>\n","protected":false},"featured_media":79417,"template":"","content_type":[7251],"area-of-focus":[834,806,78,799],"class_list":["post-81480","insight","type-insight","status-publish","has-post-thumbnail","hentry","content_type-blog","area-of-focus-ai-policy-governance","area-of-focus-government-surveillance","area-of-focus-privacy-data","area-of-focus-us-surveillance"],"acf":[],"_links":{"self":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/81480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/types\/insight"}],"version-history":[{"count":0,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/insight\/81480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media\/79417"}],"wp:attachment":[{"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/media?parent=81480"}],"wp:term":[{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/content_type?post=81480"},{"taxonomy":"area-of-focus","embeddable":true,"href":"https:\/\/cdt.org\/wp-json\/wp\/v2\/area-of-focus?post=81480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}