Did the Taliban Get the U.S. To Revoke an Afghan Interpreter’s Visa?

Courtesy of Matt Zeller

AA Font size + Print

After years of working as an interpreter for the U.S. military in Afghanistan, Janis Shenwary was set to bring his family to the United States. Now his visa is on hold. By Stephanie Gaskell

U.S. Army veteran Matt Zeller was finally looking forward to seeing his former Afghan interpreter after cutting through years of bureaucratic red tape to get him a visa to bring his wife and kids to the United States, where they would be safe from continual Taliban death threats.

But Zeller just got word that the visa for his interpreter, Janis Shenwary, just got revoked. And Zeller and Shenwary think a phone call from the Taliban is to blame.  

“Somebody called in an anonymous tip on him. The Taliban read the U.S. news. They look for people who got their visas,” Zeller told Defense One. He said whoever took the call about Shenwary’s plans to travel to the United States “issued a red flag and by law, the State Department has to revoke [his visa].”

Shenwary spent years trying to secure a visa under the State Department’s Special Immigrant Visas program, getting letters of recommendation from every U.S. military unit he served with. The problem, Zeller said, was that Shenwary was so good at his job, no unit wanted to let him go.

“Word got out among our replacements that Janis was one of the best interpreters on the base. Our replacement unit’s leadership determined they needed Janis to succeed at their mission. As a result, they held off writing their letters until the end of their tour. And as they were replaced by yet another unit, the process repeated itself,” Zeller wrote in a recent piece for Defense One. But with Shenwary on a Taliban kill list since at least 2006, for working with U.S. forces, he knew he had to get his family out of Afghanistan. After being told he had secured visas for his wife and two kids, Shenwary quit his job, sold his house and most of his belongs, preparing to board a flight to the U.S.

“Now he has nothing,” Zeller said. “He’s not eating. He’s gone into hiding. He’s terrified.”

Despite years of background checks by the U.S. government, Zeller and Shenwary believe that someone from the Taliban filed a report with National Counterterrorism Center and had the visa flagged for review. “If they were doing their job properly, they would have checked the credibility of the informant,” Zeller said. “They just see the one little thing that comes across their desk and their job is to stop everything.”

Zeller is urging U.S. officials to reinstate Shenwary’s visas, before the Taliban finds him.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.