How a Federal Register notice is quietly transforming routine travel into comprehensive digital interrogation
đ§ Related Podcast Episode
Executive Summary
U.S. Customs and Border Protection has proposed the most invasive expansion of border surveillance since 9/11. The December 10, 2025 Federal Register notice (OMB Control Number 1651-0111) would transform the Electronic System for Travel Authorization (ESTA) from a simple visa-waiver application into a comprehensive digital dragnet affecting 14 million annual travelers from 42 countries.
The proposal isnât just about collecting more dataâitâs about constructing a biometric-verified, device-linked surveillance architecture that treats every traveler as a data node in an expanding federal security graph. Your DNA becomes permanent government property. Your social media history becomes pre-travel profiling material. Your family network becomes part of a permanent federal database with zero guaranteed safeguards against abuse, misuse, or breach.
What CBP Is Actually Proposing
Mandatory Data Collection Requirements
Under the proposed changes, ESTA applicants would be required to provide:
Biometric Data:
- Facial images (mandatory selfies)- Fingerprints- Iris scans- DNA samples (listed as âhigh value data elementsâ to be collected âwhen feasibleâ)
Digital History:
- Social media identifiers from the past 5 years (now mandatory, not optional)- Email addresses used in the past 10 years- Telephone numbers from the past 5 years- IP addresses associated with applications
Family Network Mapping:
- Names, birthdates, and places of residence for parents, spouses, siblings, and children- Contact histories for family members- Extended relationship mapping
Technology Requirements:
- Forced migration from web-based ESTA to mobile-only application- Mandatory use of CBP Home mobile app for departure confirmation- Geolocation tracking to verify exit from U.S.- Liveness detection software to prevent photo spoofing
The DNA Collection Framework
While CBP includes the qualifier âwhen feasibleâ for DNA collection, privacy advocates warn this is groundwork for future mandates. The federal government is explicitly stating its intent to collect DNA from travelers before the technology exists to do so conveniently.
Currently, no mobile device can collect DNA samples. But CBPâs proposal creates the regulatory framework to implement mandatory DNA collection the moment portable collection technology becomes available.
The Scale of the Surveillance Expansion
By The Numbers
- 14 million annual ESTA travelers affected- 42 countries in the Visa Waiver Program targeted- 22 minutes estimated time to complete application (per CBP)- 5 years of social media history required- 10 years of email addresses demanded- 2.6 million+ DNA profiles already in CODIS database from immigration enforcement- 70 million+ annual visitors to U.S. potentially subject to expanded surveillance
The Surveillance State Emerges: UK Police Live Facial Recognition Explodes Without Legal Framework
What âHigh Value Data Elementsâ Really Means
The Federal Register notice describes DNA, face images, fingerprints, and iris scans as âhigh value data elementsâ without defining what makes them âvaluableâ or how they will be used beyond initial identity verification.
This vague terminology creates a blank check for future data usage. Once collected, this biometric data enters federal databases where it can be:
- Searched by law enforcement without warrant- Shared across federal agencies- Retained indefinitely- Used for purposes not disclosed at collection- Integrated with other surveillance systems
Understanding Biometric Data Categories: For a comprehensive breakdown of how different biometric data types are collected, stored, and regulated across jurisdictions, see our Biometric Tracker which categorizes facial recognition, voice biometrics, DNA verification, and iris scanning technologies currently deployed worldwide.
The Technical Infrastructure Behind the Surveillance
Mobile-Only Applications: Control Through Design
CBPâs decision to decommission the ESTA website and force all applications through mobile apps isnât about convenienceâitâs about control and data extraction.
Mobile applications provide access to:
- Device identifiers: IMEI, MAC addresses, device fingerprinting- Geolocation data: Continuous tracking capability- Biometric sensors: Camera, microphone access- Application metadata: Usage patterns, installed apps- Network information: WiFi networks, Bluetooth devices
The proposed system would use geolocation services to confirm travelers are outside the U.S. when reporting departure, creating a permanent record of international movements.
Liveness Detection and Facial Verification
The proposal requires âliveness detectionâ software to verify selfies are live photos rather than previously captured images. This technology:
- Requires camera access during sensitive moments- Creates additional biometric data points- Enables real-time verification capabilities- Generates metadata about photo capture circumstances
The facial images are then compared against all facial images CBP already retains for that person, creating a comprehensive biometric identity profile.
UK National Security Act: When Building End-to-End Encryption Makes You a âHostile Actorâ
Privacy and Security Concerns
Zero Data Protection Guarantees
CBPâs proposal contains no specific privacy protections, retention limits, or breach notification requirements for the vast amounts of sensitive data it plans to collect:
Data Retention:
- No specified retention limits- DNA profiles added to CODIS are kept indefinitely- No automatic expungement provisions- No path to request data deletion
Understanding PII Classifications: Biometric data represents one of the most sensitive categories of Personally Identifiable Information (PII) under various U.S. state privacy laws. Our PII Compliance Navigator breaks down how different states classify biometric identifiers and the legal protections that should apply (but are absent from the CBP proposal).
Security Safeguards:
- No encryption standards specified- No breach notification requirements- No independent auditing requirements- No penalties for misuse by officials
Access Controls:
- Broad sharing with âlaw enforcement agenciesâ- Vague âroutine useâ provisions- No warrant requirements for searches- No restrictions on secondary uses
The Data Breach Reality
DHS has a documented history of data breaches affecting sensitive personal information:
Recent Breaches:
- October 2025: FEMA/CBP breach exposed employee and contractor data- 2019: CBP subcontractor breach exposed facial recognition images of travelers- 2019: FEMA mistakenly shared banking and personal information of 2 million+ disaster survivors- 2025: Airlines Reporting Corporation secretly sold passenger data to CBP without consumer knowledge
For ongoing tracking of biometric and sensitive data breaches affecting government systems, see Breached.Company.
Once your DNA, biometric data, and digital history enter federal databases, they become permanent targets for:
- Nation-state adversaries- Criminal organizations- Insider threats- Future policy changes
Unlike passwords, you cannot change your DNA. Unlike email addresses, you cannot abandon your biometric identifiers. A breach of this data creates permanent, irreversible harm.
The DNA Database Expansion
CBPâs proposal builds on an existing DNA collection program that has exploded since 2020:
Current DNA Collection:
- 1.5+ million DNA profiles added to CODIS from immigration enforcement (2020-2024)- 5,000% increase in immigration-related DNA collection since 2020- 2.6+ million profiles now in CODIS detainee index- 133,000+ DNA samples from minors collected- 97% of DNA collected from people under civil (not criminal) authority
CODIS Integration Risks:
- DNA data shared across all federal, state, and local law enforcement- No judicial oversight for immigration DNA collection- Profiles retained indefinitely- Used for purposes far beyond identity verification- Disproportionate impact on communities of color
Senator Ron Wyden warned in a July 2025 letter that the Trump administrationâs DNA collection program âmay undermine the constitutional rights of adults and children in the United Statesâ and represents a âchilling expansionâ that could âresult in the over-policing of immigrant communities.â
Beyond Criminal Profiling: Why GrapheneOS Represents Digital Freedom, Not Criminality
Constitutional and Legal Issues
Fourth Amendment Concerns
Legal experts argue the warrantless collection and indefinite retention of biometric data from travelers violates Fourth Amendment protections against unreasonable searches and seizures.
The Chavarria v. DHS lawsuit, filed days before the Federal Register notice, alleges:
- Warrantless cellphone and laptop searches at borders- Prolonged retention of seized device data- Broad searching of personal information without probable cause
First Amendment Implications
Mandatory social media disclosure creates severe First Amendment concerns:
- Chilling effect on free speech- Government surveillance of political beliefs- Potential for viewpoint discrimination- Pre-travel self-censorship
Travelers face impossible choices:
- Delete years of social media history- Self-censor to avoid denial- Avoid U.S. travel entirely- Accept permanent government surveillance of political views
Privacy Act Violations
The Privacy Act of 1974 requires agencies to maintain records on individuals that are ârelevant and necessaryâ to agency purposes. Critics argue:
- 5 years of social media history is excessive- 10 years of email addresses exceeds necessity- DNA collection from tourists serves no legitimate immigration purpose- Family network mapping creates guilt by association
The Executive Order Connection
CBP frames this expansion as compliance with Executive Order 14161, âProtecting the United States From Foreign Terrorists and Other National Security and Public Safety Threats,â issued in January 2025.
This executive order directed DHS to:
- Implement enhanced vetting standards- Collect additional information from visa applicants- Improve identity verification for foreign arrivals- Shift vetting from point-of-arrival to pre-travel screening
By tying the proposal to counter-terrorism, CBP attempts to bypass normal privacy analysis. However, the connection between collecting DNA from tourists and preventing terrorism remains unexplained.
International Implications and Precedent
GDPR Conflicts
The European Union has raised concerns about U.S. compliance with General Data Protection Regulation (GDPR) requirements. EU officials warn the proposal may:
- Violate data minimization principles- Lack lawful basis for processing- Fail to provide adequate security measures- Conflict with EU citizen data rights
Global Surveillance Escalation
Privacy International warns that many governments follow the U.S. lead on border surveillance:
- European Unionâs Entry/Exit System (EES) requires biometric registration- Russia implemented social media identifier requests after U.S. pilot program- Countries worldwide are watching this proposal as potential model
If the U.S. implements DNA collection for visa-free travelers, other nations will likely follow, creating a global surveillance escalation that affects billions of travelers worldwide.
Similar Systems Already Deployed: Mexicoâs mandatory CĂŠdula Ănica de Identidad Digital (CUID) requires all citizens to submit fingerprints, iris scans, and photographs to a centralized government database. Australiaâs Digital ID Act implements a three-tier biometric identification system. The CBP proposal follows this global pattern of governments demanding biometric submission as a condition of basic services.
Economic Impact on Tourism
Travel industry leaders warn the proposal will significantly damage U.S. tourism:
Current Tourism Challenges:
- Overseas visitation already declining- 14 million ESTA travelers annually at risk- Major international events scheduled in U.S. (2026 FIFA World Cup, 2028 Olympics)
Expected Impacts:
- Extended processing times for ESTA approvals- Increased denial rates from expanded vetting- Travelers choosing alternative destinations- Business travel disruption- Damage to U.S. reputation as welcoming destination
The mandatory 22-minute application (CBPâs own estimate) represents a significant barrier compared to current streamlined process. Many travelers will simply choose destinations with less invasive requirements.
Technical Vulnerabilities and Abuse Vectors
System Architecture Risks
The proposed mobile-only system creates multiple attack vectors:
Application Security:
- Mobile apps are frequent breach targets- No stated security standards for development- Update mechanisms create persistent vulnerability- Users forced to trust government-controlled software
Data Transmission:
- Multiple collection points (device â CBP servers â federal databases)- Each transmission point is potential breach location- No end-to-end encryption requirements specified- Interstate and international data transfer risks
Database Integration:
- Data flows to multiple federal systems- Integration with existing biometric databases- Sharing with âlaw enforcement agenciesâ (undefined scope)- No architectural security requirements
Insider Threat Scenarios
With millions of profiles containing sensitive biometric and personal data:
- Corrupt officials could access data for personal gain- Harassment campaigns targeting specific individuals- Identity theft using complete biometric profiles- Blackmail using social media and family network information
CBP employee data was compromised in the 2025 FEMA/CBP breach, demonstrating that even those managing sensitive systems are not adequately protected.
Integration with Domestic Surveillance: The biometric data collected at borders doesnât stay at borders. ICEâs Mobile Fortify app already allows agents to identify anyone domestically by pointing a smartphone at them, accessing the same CBP databases that will contain ESTA traveler biometrics. Border surveillance infrastructure inevitably becomes domestic surveillance infrastructure.
AI and Algorithmic Bias
The proposal implies use of automated systems for:
- Social media content analysis- Risk assessment algorithms- Facial recognition matching- Behavioral pattern detection
These systems are known to have:
- Higher error rates for people of color- Gender recognition biases- False positive problems- Unexplainable decision-making processes
Travelers may be denied entry based on opaque algorithmic assessments of their social media content, travel patterns, or family connections with no meaningful appeal process.
What This Means for You
If Youâre Planning U.S. Travel
If these changes are implemented, youâll need to:
- Conduct Digital Hygiene:
- Review 5 years of social media posts for potentially problematic content- Document all email addresses used in past 10 years- List all phone numbers from past 5 years- Prepare family member information and contact histories2. Assess Your Risk:
- Political activism or controversial posts may trigger denial- Family connections to certain countries may raise flags- Professional associations or travel history may be scrutinized- Social media content will be permanently associated with your biometric profile3. Consider Alternatives:
- Choose destinations with less invasive requirements- Factor additional processing time into travel plans- Prepare for potential denial and lack of recourse- Evaluate if U.S. travel is worth the permanent surveillance record
If Youâre a U.S. Citizen
Even if youâre not subject to ESTA requirements, this proposal affects you:
Mission Creep Concerns:
- Todayâs foreign visitor requirements become tomorrowâs domestic mandates- Surveillance infrastructure built for borders gets repurposed for internal use- Data collected on foreign visitors includes their U.S. contacts and associates- Your social connections to ESTA travelers create indirect surveillance
The Pattern of Expanding Surveillance: As documented in our analysis of global age verification systems, governments consistently expand surveillance measures beyond their stated purpose. What begins as âprotecting childrenâ or âborder securityâ inevitably becomes comprehensive population monitoring. The UKâs Online Safety Act initially targeted age verification but now requires government IDs or biometric scans for vast categories of content.
Precedent Setting:
- DNA collection normalization for government services- Mandatory social media disclosure as standard practice- Mobile device requirements for government interaction- Biometric identification as default authentication method
The Public Comment Period
CBP is accepting public comments until February 9, 2026. This 60-day period is your opportunity to influence the final rule.
How to Submit Comments
Email: CBP_PRA@cbp.dhs.gov Subject Line: OMB Control Number 1651-0111 Requirements: Comments must be submitted in English
Effective Comment Content
Strong comments should:
- Reference specific privacy concerns with legal basis- Cite constitutional issues (Fourth Amendment search concerns, First Amendment chilling effects)- Provide technical security analysis of proposed system- Document potential for abuse or misuse- Suggest alternative approaches that achieve security without surveillance- Include expert testimony or research citations- Explain personal impact and harm
What Happens After Comments
After the comment period closes:
- CBP reviews public comments2. Office of Management and Budget (OMB) approval required3. Final rule publication (if approved)4. Implementation timeline announced
Public pressure during the comment period can result in:
- Modification of most invasive requirements- Addition of privacy safeguards- Narrowing of data collection scope- Complete withdrawal of proposal
Long-Term Implications
The Surveillance Infrastructure
This proposal isnât just about collecting more dataâitâs about building permanent surveillance infrastructure:
Technical Capabilities:
- Real-time biometric verification systems- Comprehensive social media analysis platforms- Family network mapping and relationship graphs- Device-level tracking and monitoring- Integrated federal biometric databases
Institutional Power:
- Normalized expectations of digital interrogation- Accepted precedent for invasive government data collection- Established legal frameworks for mandatory disclosure- Reduced privacy protections for travelers and citizens
The Ratchet Effect
Surveillance powers rarely contractâthey only expand:
- Today: Visa-free travelers- Tomorrow: All visa applicants- Eventually: Domestic travelers, government services, private sector requirements
Each expansion builds on the infrastructure, legal precedents, and normalized expectations of the previous expansion. Once DNA collection becomes standard for international travelers, the political and technical barriers to expanding it to other contexts fall away.
Technical Recommendations
For Individuals
If you must travel under this system:
Before Application:
- Export and review all social media content from past 5 years- Document all email accounts and phone numbers- Prepare family member information- Screenshot account information for reference- Consider privacy-focused communication platforms for future
During Application:
- Understand that submitted data is permanent- Assume all information will be shared broadly- Recognize no meaningful privacy protections exist- Document the application process- Keep copies of all submitted information
After Travel:
- Assume permanent surveillance of your digital activities- Practice ongoing social media hygiene- Monitor for identity theft using biometric data- Document any unusual incidents at borders
For Organizations
Companies and organizations should:
Risk Assessment:
- Evaluate necessity of U.S. travel for employees- Consider alternative meeting locations- Assess data exposure risks for key personnel- Factor surveillance implications into travel policies
Employee Protection:
- Provide guidance on application requirements- Support employees uncomfortable with disclosure requirements- Offer alternatives to U.S. travel when possible- Document and report any retaliation or discrimination
Advocacy:
- Submit organizational comments to CBP- Engage trade associations for collective response- Support privacy legislation efforts- Publicize privacy concerns to customers and stakeholders
Conclusion: The Choice Before Us
CBPâs proposal represents a fundamental choice about the kind of society we want to be:
Option 1: Accept that international travel requires surrendering your genetic information, social media history, and family network to permanent government databases with no safeguards, no limits, and no recourse.
Option 2: Demand that border security measures respect constitutional rights, incorporate meaningful privacy protections, and maintain proportionality between security goals and individual liberty.
The threat is real. Your DNA will become state property. Your social media becomes pre-travel profiling material. Your family connections become permanent surveillance targets. And there are zero guaranteed safeguards against abuse, misuse, or catastrophic data breaches.
This isnât security theaterâitâs surveillance infrastructure. The difference matters.
Take Action
- Submit a Public Comment by February 9, 2026 to CBP_PRA@cbp.dhs.gov2. Contact Your Representatives and demand congressional oversight3. Support Privacy Organizations challenging overreach through legal action4. Spread Awareness about the scope and implications of this proposal5. Plan Accordingly for either compliance with or alternatives to U.S. travel
The 60-day comment period is not just proceduralâitâs your opportunity to be heard before this becomes permanent reality.
Additional Resources
MyPrivacy.Blog Ecosystem:
- Biometric Privacy Tracker - Track biometric data collection methods across facial recognition, voice biometrics, DNA verification, and iris scanning- PII Compliance Navigator - Understand U.S. state privacy law classifications for sensitive data including biometric identifiers- Global Digital ID Systems Report - Comprehensive analysis of digital identity implementations worldwide- Privacy Ecosystem Guide - Complete guide to specialized privacy protection resources
Official Sources:
- Federal Register Notice: FR Doc. 2025-22461 (December 10, 2025)- Executive Order 14161: âProtecting the United States From Foreign Terrorists and Other National Security and Public Safety Threatsâ- Georgetown Law Report: âRaiding the Genome: How the United States Government Is Abusing Its Immigration Powers to Amass DNA for Future Policingâ- Privacy International: Analysis of border surveillance expansion- ACLU: Constitutional challenges to warrantless border searches- Electronic Frontier Foundation: Biometric surveillance concerns
Citations and Technical References
All claims in this article are based on:
- Official Federal Register notices and CBP documentation- Court filings including Chavarria v. DHS- Congressional testimony and oversight letters- Privacy impact assessments from DHS- Academic research on biometric surveillance- Investigative journalism from 404 Media and other outlets- Privacy organization reports and legal analysis
This article reflects analysis current as of December 2025. Check official sources for the most recent developments.