It's a Two Way Street: Homeland Security and State Work Together On Immigration

It's a Two Way Street: Homeland Security and State Work Together On Immigration

It's a Two Way Street: Homeland Security and State Work Together On Immigration

 

Facilitating legitimate travel, managing immigration benefits, and securing our borders from threats depends on extensive cooperation between the Department of State (DoS) and the Department of Homeland Security (DHS). This collaboration requires constant communication and information sharing.

The Bureau of Consular Affairs and the Bureau of Education and Cultural Affairs at DoS work with U.S. Citizenship and Immigration Services (USCIS), Customs and Border Protection (CBP), and Immigration and Customs Enforcement (ICE) at DHS. A single non-immigrant or immigrant traveler interacts with some or possibly all of these DoS and DHS offices!

Applying for an employment-based non-immigrant visa (H, L, O, P, Q, and R) exemplifies the routine interactions that take place between DoS and DHS. These are just a few of the interactions:

  • An employer submits a petition to USCIS. Once approved, employees at the Bureau of Consular Affairs review uploaded petition information
  • A non-immigrant alien with an approved petition completes an online application, pays a fee, and in most cases attends an interview at an Embassy or Consulate abroad. In some cases, countries allow for an interview waiver
  • DHS ICE Visa Security Program (VSP) conduct security reviews of visa applications to determine if an individual poses a security threat to the United States. VSP investigates applicants who may be ineligible for a visa, coordinates with other law enforcement entities, and provides information and a recommendation to the Department of State regarding individuals who have been approved but not issued a visa
  • Visa-eligible applicants receive a visa, printed in their passport by DoS employees, allowing them to travel to the port-of-entry (POE) in the United States
  • The alien arrives at a POE in the United States, where CBP officers review visa information to determine whether the alien can be admitted into the United States
  • If admitted, an alien might interact with ICE Enforcement and Removal Operations if he/she acts unlawfully while in the U.S 


DoS and DHS face information sharing challenges. For example, ICE VSP uses law enforcement and local information regarding a visa applicant to help the Department of State in determining an alien’s eligibility for a visa. DoS has visa issuance information, accessed and used by CBP officials at the port-of-entry. CBP uses real-time information from DoS to detect and prevent unlawful aliens from entering the United States. This data must be available to CBP. The process works both ways. DoS employees regularly use entry and exit data provided by CBP in the Non-Immigrant Information System (NIIS) to determine an alien’s visa eligibility.

Promoting interagency discussions regarding the difficulties each agency faces in accessing each other’s information and providing suggestions on how to better share visa-related information is the best way to constantly and consistently share information. Increased communication strengthens the partnership between DoS and DHS and maintains an effective and efficient visa process.

Learn more about how Arc Aspicio supports:
The Immigration Mission
The Border Management Mission

 

Blog CBP Border Security ICE Immigration

Contributors

Samantha Uditsky |

Samantha Uditsky is a Senior Associate at Arc Aspicio with public and private sector experience and interest in immigration, education, and international relations. At Arc Aspicio, Samantha specializes in business process improvement and quality improvement as well as supports company strategic initiatives. Samantha received her Bachelor of Arts in Political Science and Secondary Education from American University and her Master’s in Public Policy from George Mason University. Samantha is passionate about supporting the homeland security mission.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Affect Action

Behavioral Science – Using Behavioral Science to Affect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.