Skip to main content

Reclaiming Control over Europe’s Technological Borders

  • Chapter
Migration and the New Technological Borders of Europe

Part of the book series: Migration, Minorities and Citizenship ((MMC))

Abstract

Migration policy and border control in Europe and its member states increasingly take place in a surveillance regime that is focused on control. The surveillance regime consists of the intertwining of migration, integration and security policies on the one hand with a technological apparatus for the control of the movements of people on the other (Haggerty and Ericson 2000; Lyon 2009). Surveillance of citizens, migrants and illegal aliens is not only executed by the state but also by private companies and medical professionals working for the state. Next to that, the surveillance regime is not only regulated externally but travellers internalize security in voluntary behaviour. As a consequence, surveillance is not only exercised by control ‘from above’ (Big Brother) but also ‘from aside’ (Little Sister) and ‘from within’ (Voice Inside).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Aas, K. F. (2009) ‘Surveillance: Citizens and the State’, Surveillance and Society, 6 (3): 317–21.

    Google Scholar 

  • Alterman A. (2003) ‘A Piece of Yourself’: Ethical Issues in Biometric Identification’, Ethics and Information Technology, 5: 139–50.

    Article  Google Scholar 

  • Baldaccini, A. (2008) ‘Counter-Terrorism and the EU Strategy for Border Security: Framing Suspects with Biometric Documents and Databases’, European Journal of Migration and Law, 10: 31–49.

    Article  Google Scholar 

  • Beniger, J.R. (1986) The Control Revolution: Technological and Economic Origins of the Information Society (Cambridge, MA: Harvard University Press).

    Google Scholar 

  • Bigo, D. and A. Tsoukala (2008) Terror, Insecurity and Liberty. Illiberal Practices of Liberal Regimes after 9/11 (New York: Routledge).

    Google Scholar 

  • Bowker, G. and S. Leigh Starr (1999) Sorting Things Out. Classification and its Consequences (Cambridge, MA: MIT Press).

    Google Scholar 

  • Collett, E. (2010) ‘The European Union’s Stockholm Program: Less Ambition on Immigration and Asylum, But More Detailed Plans’, Migration Information Source, www.migrationinformation.org/Feature/display.cfm?ID=768 (16 June 2010).

    Google Scholar 

  • Council of the European Union (2009) The Stockholm Programme — An Open and Secure Europe Serving and Protecting the Citizens. Doc. 17024/09. Brussels, December.

    Google Scholar 

  • Fernandez, L.A. (2009) ‘Is Resistance Futile? Thoughts on Resisting Surveillance’, Surveillance and Society, 6 (3): 198–202.

    Google Scholar 

  • Haggerty, K.D. and R.V. Ericsson (2000) ‘The Surveillant Assemblage’, British Journal of Sociology, 51 (4): 605–22.

    Article  Google Scholar 

  • House of Lords (2009) Surveillance. Citizens and the State (London: The Stationery Office).

    Google Scholar 

  • Klepp, S. (2010) ‘A Contested Asylum System: The European Union between Refugee Protection and Border Control in the Mediterranean Sea’, European Journal of Migration and Law, 12: 1–21.

    Article  Google Scholar 

  • Ludford, S. (2007) ‘The Implications of Using Biometrics in the VIS’, speech delivered 2 October 2007 for the European Biometrics Forum.

    Google Scholar 

  • Lyon, D. (2003) Surveillance after September 11 (Cambridge: Polity Press).

    Google Scholar 

  • Lyon, D. (2009) Identifying Citizens (Cambridge: Polity Press).

    Google Scholar 

  • Marx, G. (2003) ‘A Tack in the Shoe: Neutralizing and Resisting the New Surveillance’, Journal of Social Issues, 59 (2): 369–90.

    Article  Google Scholar 

  • Marx, G. (2009) ‘A Tack in the Shoe and Taking off the Shoe’, Surveillance and Society, 6 (3): 294–306.

    Google Scholar 

  • Monahan, T. (ed.) (2006) Surveillance and Security. Technological Politics and Power in Everyday Life (New York: Routledge).

    Google Scholar 

  • Mumford, L. (1970) The Myth of the Machine. The Pentagon of Power (New York: Harcourt Brace Jonavich).

    Google Scholar 

  • Redpath, J. (2007) ‘Biometrics and International Migration’, Ann Ist Super Sanità, 43 (1): 27–35.

    Google Scholar 

  • Rosanvallon, P. (2008) Counter-Democracy. Politics in an Age of Distrust (Cambridge University Press).

    Google Scholar 

  • Walters, W. (2006) ‘Border/Control’, European Journal of Social Theory, 9 (2): 187–203.

    Article  Google Scholar 

  • Winner, L. (1977) Autonomous Technology. Technics-out-of-Control as a Theme in Political Thought (Cambridge, MA: MIT Press).

    Google Scholar 

  • Winner, L. (1980) ‘Do Artifacts Have Politics?’, Daedalus, 109 (1).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2011 Huub Dijstelbloem, Albert Meijer and Frans Brom

About this chapter

Cite this chapter

Dijstelbloem, H., Meijer, A., Brom, F. (2011). Reclaiming Control over Europe’s Technological Borders. In: Dijstelbloem, H., Meijer, A. (eds) Migration and the New Technological Borders of Europe. Migration, Minorities and Citizenship. Palgrave Macmillan, London. https://doi.org/10.1057/9780230299382_7

Download citation

Publish with us

Policies and ethics