How European Union Refugee Policies and the Visa Waiver Program Endanger the United States



The migrant crisis currently afflicting Europe may seem far away and of little consequence to the U.S. But despite its geographical remoteness, this situation is still fraught with danger for the United States – due to growing concern that terrorist groups have infiltrated the stream of asylum seekers pouring across European borders.1 Once in Europe, terrorists can more easily steal European Union passports from citizens or government offices. These passports are then used to facilitate entry into the United States pursuant to the Visa Waiver Program (VWP).

The 2015 terror attacks in France, and reports that some of the perpetrators were French or Belgian citizens, have also helped draw attention to the potential security risks presented by the VWP. FAIR believes that the VWP represents a critical gap in America’s immigration security framework and should be eliminated. It is a dangerous relic of a pre-9/11 security climate that relies on Cold War presumptions regarding the risks presented by international tourism. Continuation of the program presents a grave and ongoing risk to the national security and public safety of the United States.

The Threat Presented by the Visa Waiver Program

Under the VWP, the nationals of 38 countries can travel to the United States, without a visa, for tourism or for business, for up to 90 days.2 The program is reciprocal; in order to participate, foreign nations must extend the same courtesy to U.S. citizens.3 In FY 2013, there were 20 million VWP visitors to the United States, representing 37% of all overseas visitors.4 Many view the VWP as a valuable tool for supporting the tourism industry and the U.S. economy generally.5 It has also been touted as a boon to national security, in light of the fact that member countries are supposed to share intelligence, traveler information and data on lost and stolen passports.6 Nevertheless, claims that the VWP improves national security are overblown, if not outright irresponsible.

Theoretically, all VWP participants are subject to removal without a hearing if they overstay or otherwise violate the terms of their admission to the U.S.7 However, ICE has a poor record of removing VWP overstays and the program does allow those claiming credible fear of persecution to be referred to an immigration judge.8 Although political persecution is virtually non-existent in Western Europe and Scandinavia, many VWP entrants, particularly those of Middle Eastern background have requested asylum solely as a means to remain in the United States.

Additionally, participants in the VWP are subject only to minimal vetting.9 The majority are admitted to the U.S. without extensive questioning or background checks.10 Therefore, there is a significant danger that individuals who have made their way to Europe, and are affiliated with terrorist groups, will be able to exploit the VWP in order to access the United States without their background being discovered.11

Fraud and Exploitation of the Visa Waiver Program

Most of the European nations covered by the VWP currently have large immigrant populations from countries where terrorist organizations are known to operate.12 In addition, all have accepted large numbers of refugees from Syria and the surrounding region.13 A number of naturalized citizens of VWP nations have already been convicted of participating in terrorist plots: France and Denmark have stripped citizenship from naturalized aliens with terrorism convictions.14 And the problem has become common enough that Germany and the U.K. have passed measures allowing authorities to strip convicted terrorists of citizenship.15

Access to the VWP is a significant advantage for persons who seek to enter the United States in order to engage in terror-oriented activity. In addition to facilitating terrorist entry into the United States, the failure to monitor VWP entrants and remove overstays makes it easier for those with nefarious intentions to disappear into the interior, with little likelihood of being found and removed prior to committing a crime. Accordingly, terrorists who have gained admission to European VWP countries may be motivated to acquire citizenship in order to facilitate travel to the United States. Terrorist groups may also be tempted to recruit individuals of Middle Eastern ancestry, who are European citizens by birth, in order to send them to the United States via the VWP. (The U.K., France, Germany, the Netherlands, Belgium, Sweden, and Denmark – all VWP countries – have large second and third generation immigrant populations from North Africa, South Asia, and the Middle East that have experienced varying degrees of assimilation difficulties.16 Some members of these populations have been attracted to Islamic extremism and recruited into terrorist organizations.17)

In response to concerns over terrorists who were born in Europe, or have become naturalized Europeans, Congress enacted the Visa Waiver Program Improvement and Terrorist Travel Prevention Act of 2015. This act prohibits nationals of VWP countries who have traveled to, or been present in, Iran, Iraq, Syria, Sudan and Yemen, on or after March 1, 2011, from participating in the VWP. But this measure is nothing more than a paper tiger. Even in cases where suspected terrorists attempt to use the VWP under their own identities, they may still be able to conceal travel to, or presence in, the listed countries.

Additionally, terrorists who are citizens of VWP countries are not the only problem. Passport fraud is a booming business throughout Europe and has been for at least the last two decades.18 During the last ten years, thousands of the “blanks” used to produce passports and other official documents have been stolen throughout Western Europe.19 A classified Dutch government report, leaked to the press, estimates that as many as 350,000 blank passports, identity cards, visa stickers and drivers’ licenses have been stolen from European government facilities since 2000.20 This means that terrorists who obtain these blanks can easily forge the documents required to travel to the United States under the VWP.21 In addition, genuine European Union passports that have been properly issued by national passport authorities are regularly stolen throughout Europe.22 Terrorists replace the genuine passport holder’s photo with their own, make minor alterations to the passport data, and then use the passport to travel under the original owner’s identity or a variation thereon.23 The theft of genuine passports and passport blanks are ongoing concerns.24

Fraudulent documents produced on legitimate blanks are notoriously difficult to detect. Similarly, photo-substituted and modified genuine passports are hard to spot when alterations have been made by a skilled forger. Absent some type of flaw in the forgery – e.g. using the wrong printing method for personalization, failing to correctly replicate security features, etc. – such documents appear to be legitimate and often go unnoticed. Detection typically requires significant scrutiny by a trained document examiner with appropriate equipment and careful verification against the issuing country’s passport database.

Defenders of the VWP regularly point out that those desiring to enter the U.S. via the VWP must apply for pre-authorization via the Electronic System for Travel Authorization (ESTA).25 However, as U.S. Customs and Border Protection (CBP) itself points out, “The ESTA application collects biographic information and answers to VWP eligibility questions.”26 In other words, ESTA merely aggregates information provided by travelers themselves. When a terrorist has a passport, and other identity documents specifically designed to match the information submitted through ESTA, CBP won’t detect the forgery through an ESTA check.

And even when VWP applicants arrive at an airport (or seaport, or land port-of-entry) the information contained in their passports is not verified in the way most people would think. When France or Belgium issues a passport to one of its citizens, the biographical data contained in that passport is not entered into any universally accessible international database. No such repository exists.

Instead, the relevant information is coded onto the passport in a machine readable script and/or embedded in a radio frequency identification (RFID) chip. These security features are intended to inhibit fraud by ensuring that accurate information about the passport holder is embedded in the document in a format that can’t be easily altered. Theoretically, in cases of forgery, immigration officials will be able to detect discrepancies between the embedded machine readable and/or RFID data and the standard, printed data.

However, these security features suffer from two fatal flaws. First, there is no way to bind coded or embedded data to a particular passport or chip. Therefore, they do not defend against passport cloning.27 Secondly, in order to facilitate broad use of high-tech passports, the International Civil Aviation Organization (ICAO) has published the code used to label machine readable passports and the algorithms used to encode RFID chips on the open internet.28

Any terrorist with an internet connection and a fundamental understanding of machine readable coding can forge a code string that will display correctly when run through a reader. Similarly, RFID chips are relatively easy to fake. A forger with a personal computer – and about $100 worth of equipment that one can legally purchase online – can produce a convincing RFID tag with relative ease.29 There is virtually no doubt that terrorists who wish to enter the United States unnoticed have already begun making and purchasing nearly undetectable, forged travel documents produced using stolen European passports or passport blanks.30

When VWP applicants seek admission to the United States, CBP runs their passport through the appropriate reader (or manually enters the relevant data) and performs an integrated search that bounces the passport information off of U.S. systems such as the TECS law enforcement database (formerly known as the “Treasury Enforcement Communications System”) and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) system. It will also be run against the FBI’s National Crime Information Computer (NCIC) and a few foreign systems to which the U.S. has been granted access by international agreement, such as Canadian Police Information Centre (CPIC). A search against International Police Organization’s (INTERPOL) Stolen and Lost Travel Documents Database (SLTD) is part of the basic preliminary search.31 However, this query is of limited utility because too few nations are providing data and even fewer are using the SLTD as part of their own immigration vetting processes.32

However, this process is aimed at finding information that is already in U.S. systems and those few foreign databases to which the U.S. has regular access. Unless there is obvious evidence of fraud, or the applicant has had a prior negative interaction with law enforcement in the U.S., Canada, or an INTERPOL country, while using the same identity, potential terrorists traveling on VWP passports are unlikely to be detected.

Even in cases where the forgery is detected by a CBP officer, travelers normally claim fear of persecution if returned to their home country. Because of the lax asylum policies currently in place, those found to have a “credible fear” of persecution (a very low bar to meet) are detained only for a short period. They are then paroled into the United States and released – whereupon they often disappear and fail to show up for any asylum or removal hearings.

This means that anyone with an unaltered passport obtained by fraud, a passport forged on a stolen blank, or a legitimate but skillfully altered passport from a VWP country can, with relative ease, conceal their identity, travel history and background. The problem is compounded by the fact that CBP and ICE rarely find and arrest VWP entrants who have not departed following their 90 day authorized period of admission. Suspect VWP travelers who claim a fear of persecution and then abscond prior to their hearings are even less likely to be tracked, detained and removed. With virtually no threat of being arrested and summarily deported for VWP violations, there is no real deterrent to terrorist exploitation of this program.

The U.S. Must Eliminate the Visa Waiver Program

The VWP is predicated on the presumption that persons who come from a country with a low rate of visa refusals present little risk to the public safety and national security of the United States. In the relatively stable, bi-polar security environment that prevailed during the Cold War, this notion may have made some sense. But the global security climate changed suddenly and permanently on the morning of September 11, 2001 terrorist attacks. And the United States should have immediately eliminated the VWP and subjected the nationals of VWP countries to the same multi-tier screening that all other visitors must undergo.

Unfortunately, the security problems that attached themselves to travel and tourism on 9/11 have only worsened in the intervening 15 years. Islamic extremism has spread throughout the world. Jihadist networks now traverse the globe. And the United States remains the primary target of terrorist groups like ISIS, Al Qaeda, Al Shabab, and Boko Haram.

The major reason the VWP is so attractive to terrorists is because it eliminates a layer of security screening. Less screening means a greater possibility that forged or fraudulent travel documents will not be detected. Direct travel to the United States is often difficult for suspected terrorists because, if traveling from North Africa, South Asia or the Middle East, they are required to apply for a visa and appear for an interview before a Department of State (DOS) Consular Officer. Non-immigrant visas may be denied at the discretion of Department of State Consular Officers whenever they suspect that an applicant wishes to enter the U.S. to engage in crime or terrorist activity.

If screening at U.S. consulates were restored in current VWP countries, the chances of spotting counterfeit documents would be greatly improved. Consular Officers, with local knowledge and foreign language ability, are in a better position to recognize stolen or counterfeit documents. When fraud or forgery are suspected, they are also more easily able to work with overseas law enforcement and security officials than the CBP inspectors who staff ports-of-entry in the U.S. DOS screening at embassies and consulates is our first line of defense, and the VWP removes it.

A new presidential administration is about to take office. It has stated that it intends to close any gaps in our immigration laws that weaken national security. Given the high probability that ISIS and other terrorist groups have infiltrated the refugees streaming into Europe, the VWP ought to be one of the first breaches to be sealed. The VWP cannot be effectively reformed to address the current security environment – particularly the large numbers of refugees streaming into Europe and the emergence of extremist terror networks across the European Union. Accordingly, FAIR recommends that the program be eliminated.


  1. Marc Thiessen, “How ISIS Smuggles Terrorists Among Syrian Refugees,” Newsweek, April 27, 2016, accessed November 22, 2016,
  2. U.S. Department of State, Visa Waiver Program, accessed November 22, 2016,
  3. Immigration and Nationality Act § 217(a)(2)(A) & (B)
  4. Alison Siskin, “Visa Waiver Program,” Congressional Research Service, December 11, 2015, accessed December 16, 2016,
  5. U.S. Travel Association, Visa Waiver Program, accessed December 16, 2016,
  6. David Inserra and Rile Walters, “The Visa Waiver Program: Enhancing Security, Promoting Prosperity,” The Heritage Foundation, September 16, 2014, accessed December 16, 2016,
  7. Immigration and Nationality Act § 217(b)(2)
  8. Another Mini-Amnesty, This Time for Visa Overstayers From Visa Waiver Countries,, December 2, 2013, accessed December 15, 2016, ; 8 C.F.R. § 235.3(b)(10)
  9. Colorado Alliance for Immigration Reform, Visa Waiver Program – An Unguarded Door, accessed November 22, 2016,
  10. Jan Kallberg and Adam Lowther, “Putting America at Risk: The Visa Waiver Program,” The National Interest, March 23, 2016, accessed November 22, 2016,
  11. Josh Siegel, “Terrorism Fears Fuel Debate Over Government Program That Allows U.S. Travel Without a Visa,” The Daily Signal, November 24, 2015, accessed November 22, 2016,
  12. Ian Drury, “The Number of Muslims in Europe Reaches 44M: Serious Concerns Raised About the Challenges of Integration Following Attacks on Paris” The Guardian, November 2015, accessed November 22, 2016, ; The Guardian Data Blog, Muslim Populations by Country: How Big Will Each Muslim Population Be by 2030, January 28, 2011, accessed November 22, 2016,
  13. BBC, Migrant Crisis: Migration to Europe Explained in Seven Charts, Mach 4, 2016, accessed November 22, 2016,
  14. France24, French Court Upholds Decision to Strip Jihadist of Citizenship, January 23, 2015, accessed November 22, 2016, ; Cynthia Kroet, “Convicted Terrorist to Be Stripped of Danish Citizenship, Court Rules,“ Politico, June 8, 2016, accessed December 1, 2016,
  15. Justin Huggler, “Dual Nationals Who Fight for Terror Groups to Be Stripped of German Citizenship,” The Telegraph, August 11, 2016, accessed December 1, 2016, ; Katrin Bennhold, “Britain Expands Power to Strip Citizenship From Terrorism Suspects,” The New York Times, May 14, 2014, accessed December 1, 2016,
  16. Robert S. Leiken, “Europe’s Angry Muslims,” Foreign Affairs, July/August 2005, accessed
  17. Heather Long, “Who’s Joining ISIS? It Might Surprise You….” CNN, December 15, 2015, accessed December 19, 2016,
  18. Craig Pyes, Sebastian Rotella and David Zucchino, “Fraudulent Passports Key Weapon for Terrorists,” L.A. Times, December 16, 2001, accessed December 1, 2016, ; Oriana Zill, “Crossing Borders: How Terrorists Use Fake Passports, Visas, and Other Identity Documents,” PBS Frontline Online, accessed December 1, 2016, ; Philip Shishkin, “Investigators Find Forging Passports Is a Thriving Business for Terrorists,” The Wall Street Journal, October 8, 2001, accessed December 1, 2016,
  19. Alexandra Topping, “Thousands of Blank Passports Stolen in Raid Could Be Used in Fraud or Terrorism, The Guardian, July 29, 2008, accessed December 1, 2016,
  20. Joep Dohmen, “341, 956 Blank EU Documents in Criminal Hands,”, August 2, 2010, accessed December 1, 2016,,956_blank_EU_travel_documents_in_criminal_hands
  21. Thomas Pierre, “Huge Black Market in Stolen Passports,” ABC News, April 26, 2016, accessed December 1, 2016,
  22. Giuliana Paravicini, “EU’s Passport Fraud ‘Epidemic,’” Politico, January 28, 2016, accessed December 1, 2016,
  23. See U.K. Home Office, “Recognizing Fraudulent Identity Documents (An Overview): Basic Forgery Awareness,” 2014, accessed December 15, 2016,
  24. The University of Texas at Austin Center for Identity, The Link Between Identity Theft and Terrorism, accessed December 16, 2016,
  25. U.S. Customs and Border Protection, Electronic System for Travel Authorization Application Page, accessed December 5, 2016,
  26. U.S. Customs and Border Protection, Electronic System for Travel Authorization Overview Page, accessed December 5, 2016,
  27. Ari Juels, David Molnar and David Wagner, “Security and Privacy Issues in E-Passports,” Cryptology E-Print Archive, accessed December 16, 2016,
  28. International Civil Aviation Organization, Document 9303 – Machine Readable Travel Documents, Edition 7.1, 2014, accessed December 5, 2016,
  29. John Timmer, “Faking Passport RFID Chips for $120,” ARS Technica, August 7, 2008, accessed December 5, 2016,
  30. U.S. House of Representatives - Homeland Security Committee, Syrian Refugee Flows: Security Risks and Counterterrorism Challenges, November 2015, accessed December 19, 2016,
  31. INTERPOL, Border Management: Stolen and Lost Travel Documents Database, accessed December 5, 2016,
  32. Craig Smith, “Few Nations Check to See if Passports Are Stolen, Interpol Says,” New York Times, August 23, 2004, accessed December 20, 2016, ; Paisley Dodds, “Interpol Chief Says Countries Not Using Databases,” Deseret News, January 19, 2012, accessed December 20, 2016, ; Jeff Nesbitt, “A No-Fly List No One Bothers to Check,” U.S. News and World Report, March 10, 2014, accessed December 20, 2016,