Subscribe to First Page and join our fight for human rightsSign Up
Home / Spread of Russian-Style Propaganda Laws (Russian Translation) / Credible Fear Screening and Fraud Safeguards
May 23, 2017

Credible Fear Screening and Fraud Safeguards

The United States has, over decades, established rigorous, interagency procedures to vet and screen asylum seekers. Human Rights First has detailed the asylum system’s fraud and security safeguards in a number of statements and fact sheets. This fact sheet outlines the security and anti-fraud measures applicable to asylum seekers who are initially subjected to expedited removal’s credible fear process before they are allowed to file an asylum application for consideration by a U.S. immigration court.  They are subjected to multiple security measures, which include vetting conducted with U.S. Customs and Border Protection (CBP) databases, interviews with asylum officers, screening by U.S. Immigration and Customs Enforcement (ICE) and multiple intelligence agencies, and hearings before immigration judges. Immigration officials also use the FBI, the Department of Defense, the National Counterterrorism Center databases and other databases that include U.S. and international intelligence agency and terrorist watch-list information. No one may be granted asylum until these steps are taken. Moreover, throughout the process immigration agents and adjudicators apply anti-fraud measures to assess the credibility of the applicant.

Download

What is the Credible Fear Process?

When a person subjected to expedited removal (a summary removal process) indicates an intention to apply for asylum or a fear of persecution and/or torture, the immigration officer must refer him or her for a “credible fear interview” by an asylum officer within U.S. Citizenship and Immigration Services (USCIS)[1] The asylum officer determines whether a “significant possibility” exists—“taking into account the credibility of the statements made by the alien in support of the alien's claim and such other facts as are known to the officer”—that the person will be able to demonstrate eligibility for asylum.[2] Asylum seekers are generally held in U.S. immigration detention facilities during this screening process. If the asylum seeker receives a positive result from the credible fear interview, she or he will be referred to regular removal proceedings, a process under section 240 of the Immigration and Nationality Act, and can then present an asylum claim before an immigration judge. When subjected to expedited removal, asylum seekers aren’t allowed to file a request for asylum unless they demonstrate a credible fear.

Over the years, CBP’s use of expedited removal has expanded significantly. Since fiscal year 2009, the number of credible fear assessments referred to USCIS has increased, in the wake of the expanded use of expedited removal amid the refugee crisis in Central America. By fiscal year 2016, there were 94,048 credible fear screenings adjudicated by USCIS, compared to 36,030 in 2013.[3] Other countries in the region have also seen sharp increase in requests for refugee protection, with asylum claims by Salvadorans, Guatemalans, and Hondurans rising by 435 percent in the neighboring countries of Mexico, Panama, Nicaragua, Costa Rica, and Belize.[4]

What Type of Security Vetting is Performed During the Credible Fear Process?

Asylum seekers who enter the asylum process after presenting themselves to CBP at a port-of-entry or after coming into contact with the Border Patrol initially undergo vetting by CBP. This process includes national security, terrorism, and intelligence checks via TECS—an information-sharing platform and database owned by CBP.[5] TECS contains enforcement, inspection, and intelligence records from federal, state, local, and foreign sources, as well as records pertaining to known or suspected terrorists, wanted persons, and persons of interest for law enforcement and counterterrorism purposes. The data in TECS is collected both directly from the person in question, as well as by referencing other systems. For example, TECS maintains a copy of the FBI’s Terrorist Screening Database, and TECS users have access to Nlets (formerly the National Law Enforcement Telecommunications System), which links every federal, state, local law enforcement, justice, and public safety agency for the purpose of sharing information on criminal histories as well as Interpol information.


[1] Immigration and Nationality Act § 235(b)(1)(A)(ii).

[2] Immigration and Nationality Act § 235(b)(1)(B)(v).

[3] U.S. Citizenship and Immigration Services, Credible Fear Workload Report Summary, October 2013; U.S. Citizenship and Immigration Services, Credible Fear Workload Report Summary, November 2016.

[4] U.N. High Commissioner for Refugees, “Children on the Run” (2014).

[5] See, U.S. Department of Homeland Security, Privacy Impact Assessment for the TECS System: CBP Primary and Secondary Processing, Dec. 22, 2010.