Chart of the week: Travel from Arab countries to the US declines


Fadah Jassem
  • English
  • Arabic

The number of travellers visiting the US from Arab countries has fallen sharply, as tighter border policies under US President Trump threaten tourism and travel ties with the region.

In February, the number of overnight visitors from Arab countries dropped by 9.5 per cent compared to the same month last year, according to figures from the US International Trade Administration. Yemen recorded the steepest fall, with a year-on-year drop of 21 per cent. Kuwait and Lebanon followed closely, each down by 19 per cent, while Syria and Egypt saw declines of 13 per cent, and Saudi Arabia by 11 per cent. Additional preliminary figures from March 2025 reveals that some visitors from other regions have dropped even further such as as -17% drop of European foreign tourists.

Not all regional travel trends followed this pattern. Israeli visitors arriving on visas for overnight stays rose by 25 per cent in February compared to the previous year. Numbers spiked even higher in late 2024, up 71 per cent in November and 45 per cent in December. Many are believed to have travelled amid the continuing Israeli-Hamas war.

Meanwhile, travel from Iran dropped dramatically, down 30 per cent in February, a sharp reversal from December’s 46 per cent surge just before Mr Trump’s inauguration.

A report from Tourism Economics paints a broader picture: inbound travel to the US is now expected to fall by 5.5 per cent this year, revising earlier forecasts of nearly 9 per cent growth. If tariff and trade tensions escalate, international tourism could shrink even more, potentially wiping $18 billion (£13.8bn) off the US economy this year.

Even Canada, the largest source of international visitors to the US, is scaling back. Air Canada has announced it will cut flights to several American holiday destinations, including Las Vegas, starting in March as demand weakens.

War and the virus
Specs

Engine: Duel electric motors
Power: 659hp
Torque: 1075Nm
On sale: Available for pre-order now
Price: On request

UAE currency: the story behind the money in your pockets
Story%20behind%20the%20UAE%20flag
%3Cp%3EThe%20UAE%20flag%20was%20first%20unveiled%20on%20December%202%2C%201971%2C%20the%20day%20the%20UAE%20was%20formed.%C2%A0%3C%2Fp%3E%0A%3Cp%3EIt%20was%20designed%20by%20Abdullah%20Mohammed%20Al%20Maainah%2C%2019%2C%20an%20Emirati%20from%20Abu%20Dhabi.%C2%A0%3C%2Fp%3E%0A%3Cp%3EMr%20Al%20Maainah%20said%20in%20an%20interview%20with%20%3Cem%3EThe%20National%3C%2Fem%3E%20in%202011%20he%20chose%20the%20colours%20for%20local%20reasons.%C2%A0%3C%2Fp%3E%0A%3Cp%3EThe%20black%20represents%20the%20oil%20riches%20that%20transformed%20the%20UAE%2C%20green%20stands%20for%20fertility%20and%20the%20red%20and%20white%20colours%20were%20drawn%20from%20those%20found%20in%20existing%20emirate%20flags.%3C%2Fp%3E%0A
UAE currency: the story behind the money in your pockets
The 12 Syrian entities delisted by UK 

Ministry of Interior
Ministry of Defence
General Intelligence Directorate
Air Force Intelligence Agency
Political Security Directorate
Syrian National Security Bureau
Military Intelligence Directorate
Army Supply Bureau
General Organisation of Radio and TV
Al Watan newspaper
Cham Press TV
Sama TV

COMPANY PROFILE
Name: Kumulus Water
 
Started: 2021
 
Founders: Iheb Triki and Mohamed Ali Abid
 
Based: Tunisia 
 
Sector: Water technology 
 
Number of staff: 22 
 
Investment raised: $4 million 
Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.

Updated: April 18, 2025, 8:52 AM