WikiLeaks cables describe H-1B fraud attempts
Cables released by WikiLeaks add color and detail to long-held USCIS concerns about fraud in H1-B visa program
Computerworld - WASHINGTON -- The cables being released by WikiLeaks are shedding some light on fraud in the H-1B visa application process in countries that don't get much attention for it -- Mexico, Libya and Iceland.
The reports so far are a collection of anecdotes explaining attempts to dupe U.S. officials into granting visas to people not eligible for them. That collection may grow as more cables are released.
The cables offer insight into the types of issues that embassy officials in such countries can encounter when processing work visas.
A cable sent from the U.S. embassy in Mexico City, written two years ago this month, said that Mexico presents "persistent fraud problems" for the H-1B and L-1 visa programs as applicants "overstate experience, education, or future job responsibilities in efforts to bolster their applications."
The embassy also reported that "individuals may also set up shell companies as a means to live in the U.S."
The fraud attempts in Mexico are mostly by people looking for a way to immigrate to the U.S., according to the cable.
The most common false documents presented during interviews or in petition packages submitted to U.S. Citizenship and Immigration Services (USCIS) officials are false pay receipts, the embassy wrote.
This cable, and others, shed a little detail on a 2008 USCIS report that found evidence of forged documents and shell companies that gave fake addresses and locations.
That report found one in five visas are affected by either fraud or have "technical violations."
For several months, WikiLeaks has been slowly releasing State Department cables that may ultimately number as many as 251,000. Less than 7,000 cables have been released so far.
In September 2009, the U.S. Embassy in Tripoli, Libya, reported that "an H-1B applicant presented documents that were clearly fake and stated that he paid a large sum for them on-line. He believed this to be the process to obtain a work visa in the United States."
In Iceland, the embassy in Reykjavik reported that immigration attorneys were attempting to fly in H-1B and L-1 applicants "from other parts of the world for the sole purpose of having them apply for visas in Iceland in the expectation of fast and easy issuance."
In the cable, the embassy said it was discouraging attorneys from doing that.
At about the time the USCIS released its report on fraud in 2008, the agency began stepping up enforcement of the visa program. That effort continues today.
The enforcement efforts often come in the form of what's called requests for evidence (RFE), which could, for example, involve a request for the floor plans of an office building to verify whether a company that an applicant listed as an employer is real or not.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov, or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
- GOP presses ahead on H-1B, green cards with vague, muddy statement
- 5 reasons why your IT job search is getting harder
- Professors warn that grads could face competition from H-1B workers
- Infosys ran 'unlawful' visa scheme, U.S. alleges in settlement
- U.S. set to disclose Infosys visa case resolution
- Infosys prepares U.S. settlement over visa use, as it faces new class action suit
- House Democrats push ahead on immigration, H-1B
- Utility cuts IT workforce, hires Indian outsourcers
- IBM settles with U.S. over alleged discrimination in job ads
- H-1B workers in line for Obamacare work
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts