One of the other documents that were shared with committee members has, I think, eight steps that outline the kind of security screening we go through [Technical difficulty—Editor] from a visa application point of view. In the case of asylum applicants, they get 100% comprehensive security screening, and that is done by both CBSA and CSIS. I'll talk a bit about what CBSA does.
When we do a comprehensive security screening, we're trying to understand who the person is, their travel history and where they're coming from. We don't look at every file exactly the same way. We have experts based on geography, which mirrors what our colleagues in other agencies do, and they have a good understanding of where somebody is coming from, what we need to look for and where to look for it. We do open source searches on the net. We also run names against aliases and run any other identifying information we may have against our own internal intelligence and enforcement databases. Based on what we find there, we may go further and seek information from domestic security partners and, if need be, international security partners. In some instances, that's a fairly rapid process. In other instances, we need to do a request for information, which takes some more time, but we do take the time to do it.
We do a very thorough review. We're always looking to either negate concerns that might be identified or confirm them. If we reach the “reasonable grounds to believe” threshold, we'll provide a recommendation to our colleagues at IRCC—sorry, this is asylum, so it would go to the Immigration and Refugee Board for a decision. Our colleagues at CSIS will do a similar process.