WikiLeaks cables describe H-1B fraud attempts
Cables released by WikiLeaks add color and detail to long-held USCIS concerns about fraud in H1-B visa program
Computerworld - WASHINGTON -- The cables being released by WikiLeaks are shedding some light on fraud in the H-1B visa application process in countries that don't get much attention for it -- Mexico, Libya and Iceland.
The reports so far are a collection of anecdotes explaining attempts to dupe U.S. officials into granting visas to people not eligible for them. That collection may grow as more cables are released.
The cables offer insight into the types of issues that embassy officials in such countries can encounter when processing work visas.
A cable sent from the U.S. embassy in Mexico City, written two years ago this month, said that Mexico presents "persistent fraud problems" for the H-1B and L-1 visa programs as applicants "overstate experience, education, or future job responsibilities in efforts to bolster their applications."
The embassy also reported that "individuals may also set up shell companies as a means to live in the U.S."
The fraud attempts in Mexico are mostly by people looking for a way to immigrate to the U.S., according to the cable.
The most common false documents presented during interviews or in petition packages submitted to U.S. Citizenship and Immigration Services (USCIS) officials are false pay receipts, the embassy wrote.
This cable, and others, shed a little detail on a 2008 USCIS report that found evidence of forged documents and shell companies that gave fake addresses and locations.
That report found one in five visas are affected by either fraud or have "technical violations."
For several months, WikiLeaks has been slowly releasing State Department cables that may ultimately number as many as 251,000. Less than 7,000 cables have been released so far.
In September 2009, the U.S. Embassy in Tripoli, Libya, reported that "an H-1B applicant presented documents that were clearly fake and stated that he paid a large sum for them on-line. He believed this to be the process to obtain a work visa in the United States."
In Iceland, the embassy in Reykjavik reported that immigration attorneys were attempting to fly in H-1B and L-1 applicants "from other parts of the world for the sole purpose of having them apply for visas in Iceland in the expectation of fast and easy issuance."
In the cable, the embassy said it was discouraging attorneys from doing that.
At about the time the USCIS released its report on fraud in 2008, the agency began stepping up enforcement of the visa program. That effort continues today.
The enforcement efforts often come in the form of what's called requests for evidence (RFE), which could, for example, involve a request for the floor plans of an office building to verify whether a company that an applicant listed as an employer is real or not.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov, or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
- H-1B loophole may help California utility offshore IT jobs
- H-1B applications surge to 172,500, twice the cap
- U.S. hits H-1B cap with 'high number' of petitions
- Durbin warns Republicans standalone H-1B hike plan will fail
- Offshore firms took 50% of H-1B visas in 2013
- H-1B visas produce net IT job boost, trade group says
- Gates sees software replacing people; Greenspan calls for more H-1Bs
- Use of H-1B alternative skyrockets
- GOP presses ahead on H-1B, green cards with vague, muddy statement
- 5 reasons why your IT job search is getting harder
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts