Skip to main content

Part of the book series: The International Library of Ethics, Law and Technology ((ELTE,volume 17))

  • 450 Accesses

Abstract

The deployment of advanced ICTs and biometry in mass-surveillance and border control is part of the securitization agenda that emerged in the early 2000s. This agenda has been particularly instrumental in cultivating migration anxieties and framing the problem of threat as an imperative to identify those who are dangerous to public safety. As well founded as that may be, it masks the pivotal role ICTs have in the supervision and administration of industries and markets. ICTs, including biometrics, are essential to supervise all four freedoms of movement in European market integration, i.e., of goods, services, capital and persons. They are essential to the EU-US trade and investment relationship which is increasingly underpinned by cross-border data flows, and the most significant such relationship globally. Drawing on mobilities research, this chapter explores how the mobilities of materials, commodities, markets and labour are simultaneously constrained and facilitated in transnational development, including the obligation in Europe to protect the fifth freedom of movement, that of data. While a recent European regulation aims to better protect personal data in these flows, the narratives of threat and emergency call for immediate action, whereby any data that can be intercepted can also be gathered for investigative purposes on the basis of exceptional circumstance. The securitization agenda finds its practical utility in the hands of executive powers who are largely avoiding the legislature and the judiciary. There is no evidence that authorities catch terrorists and criminals because of advanced ICTs and biometry in border control and data intercept. The practical utility lies in the ability to target and investigate any individual and a whole range of political opposition and activism which has very little if anything to do with threat and emergency. Publics have no meaningful defence apart from self-censorship. They have no meaningful way of objecting to exceptional circumstances in which illiberal practices are legitimized, and neither does the legislature and the judiciary unless the checks on executive powers are adequately reined in.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Schengen agreement designates a border-less geographical area within Europe with border controls for travelers crossing the Schengen frontier borders but, ideally, not the internal borders.

  2. 2.

    US President Obama speaking to both houses of Parliament in the United Kingdom, 25 May 2011.

  3. 3.

    Crossing patrolled borders between Norway and Denmark soon after the conflict with the Islamic State began, also illustrates some of the complications faced within Schengen when EEA citizens get involved in conflicts.

  4. 4.

    The title of the GDPR also states that it is a regulation “on the protection of natural persons with regard to the processing of personal data and on the free movement of such data” (http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN).

  5. 5.

    It can be argued that data clustering by types anonymizes data, i.e., the data controller is not interested any one person’s official identity, only that such and such a person is of such and such a type. This is debatable however, since the goal is typically to be able to intercept types of persons via email, web browsing, phone messaging or old fashioned mail, all of which is ultimately traceable back to actual individuals.

  6. 6.

    See https://www.informationsystems.foi.se/main.php/ADABTS_Final_Demo.pdf?fileitem=7340169

  7. 7.

    See http://en.wikipedia.org/wiki/Future_Attribute_Screening_Technology

  8. 8.

    Article 19 of the Universal Declaration of Human Rights (The United Nations 1948) states that everyone has the right to freedom of opinion and expression. However, widespread self-censorship is a well-known phenomenon, notably in recent US history during the McCarthy era and in recent European history east of the Iron Curtain.

  9. 9.

    An issue repeatedly foregrounded during the ICTethics expert workshop on “Human Security in the context of Ambient Intelligence”, Nov 2010, Leeds, UK (http://neicts.lancs.ac.uk/workshops.htm#workshop3).

  10. 10.

    As this is written, the GDPR has just entered into force after years of preparations and thousands of amendments, of which many were intended to better safeguard business models, economic and innovation competitiveness. Provisions will apply in all EU member states from 25 May 2018.

  11. 11.

    Debates that really shake the core assumptions on which the economy rests, first-world leadership, innovation, security, etc., are held in small ways, involving whistleblowers, critics and disillusioned members of established institutions who find voice on minor media outlets, typically referred to as left wing or ‘too’ radical to be on par with mainstream communication, e.g., Democracynow! (http://democracynow.org), Counterpunch.(http://www.counterpunch.org/) and New Statesman (http://www.newstatesman.com/).

  12. 12.

    There are many attempts over the past decade to back-track on executive powers, e.g., in summer 2015, a disquiet in the UK parliament over the lack of transparency regarding the reach of executive powers, including the GCHQ, without the checks and balances of a three-tiered government. The US Patriot Acts have also been revisited, the US surveillance law, the legality of the Guantánamo Bay detention camp, and much more.

  13. 13.

    In the aftermath of the Snowden revelations, the big industry players in ICTs are publishing on this, e.g., IBM on regulatory affairs and Microsoft on public policy agendas, and there has been a gradual shift in recent years toward seeing privacy sensitivity as a resource for profitable innovation, e.g., in selling to prospective customers privacy-by-design and protection-by-design products and services.

  14. 14.

    Arrangements like that between government agencies and private enterprise are indicated in the Snowden revelations. Yahoo, Google, Facebook, YouTube and Skype were implicated in the PRISM programme (NSA) and the UK GCHQ accessing data on persons through that programme, thereby circumventing legal procedures.

  15. 15.

    See also interview with Glenn Greenwald and Laura Poitras (9 June 2013), in which Snowden elaborates one of his key arguments that publics need to be consulted and somehow involved in decisions on the extent to which personal data handling is publicly acceptable, in particular, in light of the self-censoring going on. Available at http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video (visited Aug 2016).

  16. 16.

    It is of some curiosity that US citizens have a constitutional right to armed defence of their person and property but no such right to defence of their informational person and property.

References

  • Adey, Peter. 2010. Mobility. London: Routledge.

    Google Scholar 

  • Agamben, G. 2005. State of exception. Chicago: University of Chicago Press.

    Book  Google Scholar 

  • Amoore, Louise. 2006. Biometric borders: Governing mobilities in the war on terror. Political Geography 25(3): 336–351.

    Article  Google Scholar 

  • Apap, Joanna, and Sergio Carrera. 2003. Maintaining security within borders: Towards a permanent state of emergency in the EU? CEPS Policy Briefs 41, October 2003. [Policy Paper].

    Google Scholar 

  • Bauer, Thomas, and Klaus F. Zimmermann. 1999. Assessment of possible migration pressure and its labour market impact following EU enlargement to central and Eastern Europe – A Study for the Department for Education and Employment, United Kingdom. IZA Research Report No. 3. http://www.iza.org/en/webcontent/publications/reports/report_pdfs/report_pdfs/iza_report_03.pdf. Accessed Aug 2016.

  • Beck, Ulrich. 2005. Power in the global age: A new global political economy. London: Polity.

    Google Scholar 

  • Beck, Ulrich. 2008. Mobility and the cosmopolitan perspective. In Tracing mobilities: Towards a cosmopolitan perspective, ed. Weert Canzler, Vincent Kaufmann, and Sven Kesselring, 25–36. London: Ashgate.

    Google Scholar 

  • Bigo, Didier. 2007. Mobility controls and new technologies. In Are you who you say you are? The EU and biometric borders, ed. Lodge Juliet, 9–14. Nijmegen: Wolf Legal Publishers (WLP).

    Google Scholar 

  • Carothers, Thomas. 2003. Promoting democracy and fighting terror. Foreign Affairs, January/February. http://www.foreignaffairs.com/articles/58621/thomas-carothers/promoting-democracy-and-fighting-terror. Accessed Aug 2016.

  • Castells, Manuel. 2010. The rise of the network society: The information age, economy, society and culture, volume 1 (2nd edition with a new preface). Wiley-Blackwell.

    Google Scholar 

  • Cooper, Anthony, and Chris Rumford. 2013. Monumentalising the border: Bordering through connectivity. Mobilities 8(1): 107–124.

    Article  Google Scholar 

  • Council of the European Communities. 2000. The Schengen acquis. Official Journal L 239, 22.9.2000. http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L:2000:239:FULL&from=EN. Accessed Aug 2016.

  • Cresswell, Timothy. 2006. On the move: Mobility in the modern Western world. Taylor & Francis.

    Google Scholar 

  • Dalacoura, Katerina. 2005. US democracy promotion in the Arab Middle East since 11 September 2001: A critique. International Affairs 81(5): 963–979.

    Article  Google Scholar 

  • European Commission. 2008. Data protection in the European Union – Citizen’s perceptions (Flash Eurobarometer 225), Feb. 2008. http://ec.europa.eu/public_opinion/flash/fl_225_en.pdf. Accessed Aug 2016.

  • EU External Action Service. 2011. Association Agreements. European Community/European Union. http://eeas.europa.eu/association/docs/agreements_en.pdf. Accessed Aug 2016.

  • European Communities. 2007. Charter of fundamental rights of the European Union. Official Journal C 303/01. http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A12012P%2FTXT. Accessed Aug 2016.

  • European Parliament. 2012. Data protection review: Impact on EU innovation and competitiveness (study). Directorate General for Internal Policy. Policy Department A: Economic and Scientific Policy. PE 492.463. http://www.europarl.europa.eu/RegData/etudes/etudes/join/2012/492463/IPOL-ITRE_ET(2012)492463_EN.pdf.

  • European Parliament and the Council of the European Union. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal L 119, 4.5.2015. http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN. Accessed Aug 2016.

  • European Parliament Fact Sheets. 2000. 6.3.2. The European Economic Area (EEA). European Parliament. http://www.europarl.europa.eu/factsheets/6_3_2_en.htm. Accessed Aug 2016.

  • European Union. 2010. Consolidated versions of the Treaty on European Union and the Treaty on the Functioning of the European Union & Charter of Fundamental Rights of the European Union. Official Journal C 83, 30.3.2010. http://eur-lex.europa.eu/JOHtml.do?uri=OJ:C:2010:083:SOM:EN:HTML. Accessed Aug 2016.

  • Gill, Nick, Javier Caletríob, and Victoria Mason. 2011. Introduction: Mobilities and forced migration. Mobilities 6(3): 301–316.

    Article  Google Scholar 

  • Harding, Luke. 2014. Snowden files. London: Guardian Books.

    Google Scholar 

  • Herman, Edward S., and Noam Chomsky. 1988. Manufacturing consent: The political economy of the mass media. New York: Pantheon Books.

    Google Scholar 

  • Hildebrandt, Mireille. 2008. Profiling and the rule of law. Identity in the Information Society 1: 55–70.

    Article  Google Scholar 

  • Hildebrandt, Mireille, and Serge Gutwirth (eds.). 2008. Profiling the European citizen: Cross-disciplinary perspectives. Dordrecht: Springer.

    Google Scholar 

  • Hoback, Cullen (Director). 2013. Terms and conditions may apply. USA: Hyrax Films.

    Google Scholar 

  • Hornung, Gerrit, Monika Desoi, and Matthias Pocs. 2010. Biometric systems in future preventive scenarios – Legal issues and challenges. In Proceedings of the special interest group on biometrics and electronic signatures (BIOSIG 2010) Darmstadt, Germany 9–10 September 2010, ed. A. Brömme, and C. Busch, 83–95. Gesellschaft für Informatik e.V. (GI).

    Google Scholar 

  • Jordan, Bill, and Philip Brown. 2007. Migration and work in the United Kingdom: Mobility and the social order. Mobilities 2(2): 255–276.

    Article  Google Scholar 

  • Kvist, Jon. 2004. Does EU enlargement start a race to the bottom? Strategic interaction among EU member states in social policy. Journal of European Social Policy 14(3): 301–318.

    Article  Google Scholar 

  • Lodge, Juliet. 2006. Communicating (in)security: A failure of public diplomacy. CHALLENGE: Research Paper no.3. Centre for European Policy Studies, Brussels. http://aei.pitt.edu/7403/2/7403.pdf. Accessed Aug 2016.

  • Lyon, David (ed.). 2003. Surveillance as social sorting: Privacy, risk, and digital discrimination. London/New York: Routledge.

    Google Scholar 

  • Massey, Douglas, Joaquín Arango, Graeme Hugo, Ali Kouaouci, Adela Pellegrino, and J. Edward Taylor. 1998. Worlds in motion: International migration at the end of the millennium. New York: Oxford University Press.

    Google Scholar 

  • Meltzer, J.P. 2014. The importance of the internet and transatlantic data flows for U.S. and EU trade and investment (working paper 79). The Brookings Institution: Global Economy & Development Program.

    Google Scholar 

  • Obama, Barak H. 2011. President Obama addresses the British Parliament, Westminster Hall, 25.5.2011 London, United Kingdom. http://news.bbc.co.uk/democracylive/hi/house_of_commons/newsid_9495000/9495513.stm . Accessed Aug 2016.

  • Phillips, D., and M. Curry. 2003. Geodemographics and the changing spatiality of the local practice. In Surveillance as social sorting: Privacy, risk, and digital discrimination, ed. D. Lyon, 137–52. London: Routledge.

    Google Scholar 

  • Poitras, Laura (Director). 2014. Citizenfour (documentary). Praxis Films in association with Participant Media and HBO Documentary Films; in co-production with Bertha Foundation, Britdoc Circle, Channel 4, NDR and BR media.

    Google Scholar 

  • Schlanger, Margo, Reviewing Official. 2011. Civil Rights/Civil Liberties Impact Assessment. Future Attribute Screening Technology (FAST) – Interactive and Passive Programs. USA Department of Homeland Security. http://www.dhs.gov/xlibrary/assets/crcl/crcl-assessment-fast.pdf. Accessed Aug 2016.

  • Scuzzarello, Sarah, and Catarina Kinnvall. 2013. Rebordering France and Denmark: Narratives and practices of border-construction in two European countries. Mobilities 8(1): 90–106.

    Article  Google Scholar 

  • Sheller, Mimi, and John Urry. 2006. The new mobilities paradigm. Environment and Planning A 38(2): 207–226.

    Article  Google Scholar 

  • Shove, Elizabeth. 2002. Rushing around: Coordination, mobility and inequality. Draft paper for the Mobile Network meeting, Oct. 2002, Department for Transport, London. http://www.lancaster.ac.uk/staff/shove/choreography/rushingaround.pdf. Accessed Aug 2016.

  • Stephenson, Marcus L. 2006. Travel and the ‘freedom of movement’: Racialised encounters and experiences amongst ethnic minority tourists in the EU. Mobilities 1(2): 285–306.

    Article  Google Scholar 

  • The United Nations. 1948. The Universal declaration of human rights, UN Publications. http://www.un.org/en/universal-declaration-human-rights/index.html. Accessed Aug 2016.

  • Tyler, Imogen. 2006. ‘Welcome to Britain’: The cultural politics of asylum. European Journal of Cultural Studies 9(2): 185–202.

    Article  Google Scholar 

  • Urry, John. 2002. Mobility and proximity. Sociology 36(2): 255–274.

    Article  Google Scholar 

  • Urry, John. 2007. Mobilities. London: Polity Press.

    Google Scholar 

  • Welsh, Ian, and B. Brian Wynne. 2013. Science, scientism and imaginaries of publics in the UK: Passive objects, incipient threats. Science as Culture 22(4): 540–566.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristrún Gunnarsdóttir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Gunnarsdóttir, K. (2016). The Fifth Freedom and the Burden of Executive Power. In: Delgado, A. (eds) Technoscience and Citizenship: Ethics and Governance in the Digital Society. The International Library of Ethics, Law and Technology, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-32414-2_6

Download citation

Publish with us

Policies and ethics