≡ Menu

‘Extreme Vetting’ Would Require Visitors To US To Share Contacts, Passwords

According to the Wall Street Journal, the Trump administration is considering whether or not to deploy “extreme vetting” practices at airports around the world, which could force tourists from Britain and other countries visiting the U.S. to reveal their mobile phone contacts, social media passwords and financial data. “Travelers who want to enter the U.S. could also face questioning over their ideology, as Washington moves away from a default position of allowing people in to a more skeptical approach to visitors,” reports The Guardian. From the report: Trump made the “extreme vetting” of foreign nationals to combat terrorism a major theme of his presidential election campaign. But his executive order imposing a travel ban on several Muslim-majority countries has twice been blocked in court. Media reports suggest it has already hurt the tourism industry. The changes might include visitors from the 38 countries — the UK, France, Australia and Japan among them — that participate in the visa waiver program, which requires adherence to strict U.S. standards in data sharing, passport control and other factors, one senior official told the Journal. This could require people to hand over their phones so officials can study their stored contacts and possibly other information. The aim is to “figure out who you are communicating with,” a senior Department of Homeland Security official was quoted as saying. “What you can get on the average person’s phone can be invaluable.” A second change would ask applicants for their social media handles and passwords, so that officials could see information posted privately in addition to public posts, the Journal said. The Journal report said the DHS official working on the review said questions under consideration included whether visa applicants believe in so-called honor killings, how they view the treatment of women in society, whether they value the “sanctity of human life” and who they view as a legitimate target in a military operation.

Read more of this story at Slashdot.

{ 0 comments… add one }

Leave a Comment

Home | About | Contact | Disclaimer | Terms | Privacy

Copyright © 2017 by Tom Connelly | All Rights Reserved