US demands social media details from visa applicants

Travellers must submit social handles as well as email addresses and phone numbers

US visa

The US government has introduced policies for visa applicants which require them to hand over all of their social media details for inspection, as well as other personal information, according to a report from the Associated Press.

The change represents a massive increase in the scope of background checks designed to identify potential terrorists trying to gain entry to the US.

Individuals applying for visas will now be required to submit the usernames (but not passwords) for any social media accounts they operate, including volunteering the information for any social media services which are not specifically included on the list.

In addition, applicants will be forced to hand over any email addresses and phone numbers they have used in the past five years.

These extreme requirements were previously only imposed on individuals who were deemed to present an increased risk, such as those who had visited terrorist-controlled regions, but are now being rolled out to a vastly increased number of people.

The policy is set to affect an estimated 15 million visa applicants per year, including those who are travelling for business or educational purposes as well as immigrants. The only exemptions from these requirements are specific types of official and diplomatic visas.

The new policy is part of an executive order - titled 'Protecting The Nation From Foreign Terrorist Entry Into The United States' - issued by President Trump back in 2017, which the State Department announced it would implement last year. However, the policy actually predates Trump - it was first proposed by the Department of Homeland Security in June 2016, prior to his election.

Privacy campaigners have objected to the new rules, with the American Civil Liberties Union questioning whether it is "effective or fair". Security experts have also raised the possibility that foreign intelligence services may be exploring ways to abuse the requirements.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

19 Oct 2020
What is shoulder surfing?
Security

What is shoulder surfing?

19 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020
Microsoft releases two emergency Windows patches
Security

Microsoft releases two emergency Windows patches

19 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
iPhone 12 lineup official with A14 Bionic chip and 5G support
Mobile Phones

iPhone 12 lineup official with A14 Bionic chip and 5G support

13 Oct 2020
Google blocked record-breaking 2.5Tbps DDoS attack in 2017
Security

Google blocked record-breaking 2.5Tbps DDoS attack in 2017

19 Oct 2020