Biometrics, Borders and the Ideal Suspect

  • Dean Wilson


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Adey, P., 2004, Secured and sorted mobilities: examples from the airport, Surveillance and Society, 1(4): 500-519.Google Scholar
  2. Agamben, G., 2005, State of Exception, University of Chicago Press, Chicago.Google Scholar
  3. Agamben, G., 2004, No to bio-political tattooing, Le Monde (10 January 2004); http://www.
  4. Agamben, G., 1998, Homo Sacer: Sovereign Power and Bare Life, Stanford University Press, Stanford, CA.Google Scholar
  5. American Civil Liberties Union, 2004a, The Surveillance-Industrial Complex: How the American Government is Conscripting Businesses and Individuals in the Construction of a Surveillance Society, New York;
  6. American Civil Liberties Union, 2004b, Sanctioned Bias: Racial Profiling since 9/11, New York;
  7. American Civil Liberties Union, 2004c, Naked Data: How the U.S. Ignored International Concerns and Pushed for Radio Chips in Passports Without Security, New York;
  8. Andreas, P., 2000, Border Games: Policing the U.S.-Mexico Divide, Cornell University Press, Ithaca.Google Scholar
  9. Australian Customs Service, 2004, Overview of SmartGate Trial, Canberra.Google Scholar
  10. Bajkowski, J., 2005, Budget 2005—winners and losers, Computerworld (11 May 2005);
  11. Bauman, Z., 2000, Social issues of law and order, British Journal of Criminology, 40(2): 205-221.CrossRefGoogle Scholar
  12. Beckett, K., 1997, Making Crime Pay: Law and Order in Contemporary American Politics, Oxford University Press, Oxford.Google Scholar
  13. Bigo, D., 2002a, Security and immigration: toward a critique of the governmentality of unease, Alternatives, 27: 63-92.Google Scholar
  14. Bigo, D., 2002b, To reassure and protect after September 11th, Social Science Research Council Essays;
  15. Biometrics Institute, 2005;
  16. Brake, M. and Hale, C., 1992, Public Order and Private Lives: The Politics of Law and Order, Routledge, London.Google Scholar
  17. Bray, R., 2003, Eye to eye with airport security, Financial Times (1 April 2003) p. 14. Button, J., 2005, On the cards, The Age (23 July 2005) p. 3.Google Scholar
  18. Cohen, S., 2002, Folk devils and moral panics: the creation of the mods and the rockers, 3rd ed, Routledge, London.Google Scholar
  19. Coleman, R. and Sim, J., 2000, You’ll never walk alone: CCTV surveillance, order and neoliberal rule in Liverpool city centre, British Journal of Sociology, 51(4): 623-639.CrossRefGoogle Scholar
  20. Clarke, R., 2003, SmartGate: a face recognition trial at Sydney Airport, au/people/Roger.Clarke/DV/SmartGate.html.
  21. Davies, S., 1992, Big Brother: Australia’s growing web of surveillance, Simon & Schuster, Sydney.Google Scholar
  22. Davis, M., 2001, The flames of New York, New Left Review, 12: 34-50.Google Scholar
  23. Department of Immigration and Multicultural and Indigenous Affairs, 2004, Biometric Initiatives, Fact Sheet 84 (30 September 2004); metric.htm.
  24. Devetak, R., 1995, Incomplete states: theories and practices of statecraft, in: Boundaries in Question, J. Macmillan and A. Linklater, eds., Pinter Publishers, London, pp. 19-39.Google Scholar
  25. Devetak, R., 2001, Postmodernism, in: Theories of International Relations, S. Burchill, R. Devetak, A. Linklater, M. Paterson, C. Reus-Smit and J. Tait, eds., Palgrave, New York, pp. 181-208.Google Scholar
  26. Downer, A., 2003, Australia Leads the Way on Passport Biometrics, Media Release, FA 60 (4 June 2003);
  27. Downes, D. and Morgan, R., 2002, The skeletons in the cupboard: the politics of law and order in the new millennium, in: The Oxford Handbook of Criminology, M. Maguire, R. Morgan & R. Reiner, eds., 3rd ed, Oxford University Press, Oxford, pp. 286-321.Google Scholar
  28. Doty, R., 1996, Sovereignty and the nation: constructing the boundaries of national identity, in: State Sovereignty as Social Construct, T. Biersteker and C. Weber, eds., Cambridge University Press, Cambridge, pp. 121-147.Google Scholar
  29. Faist, T., 2002, Extension du domaine de la lutte: international migration and security before and after September 11, 2001, International Migration Review, 36(1): 7-14.CrossRefGoogle Scholar
  30. Feeley, M. and Simon, J., 1994, Actuarial justice: the emerging new criminal law in: The Futures of Criminology, D. Nelken, ed., Sage, London, pp. 173-201.Google Scholar
  31. Garland, D., 1990, Punishment in Modern Society, University of Chicago Press, Chicago.Google Scholar
  32. Garland, D., 2001, The Culture of Control: Crime and Social Order in Contemporary Society, Oxford University Press, Oxford.Google Scholar
  33. General Accounting Office [US], 2002, Aviation Security: Registered Traveler Program Policy and Implementation Issues: Report to the Honorable Kay Bailey Hutchison, U.S. Senate, GAO-03-253, Washington, DC.Google Scholar
  34. General Accounting Office [US], 2003, Border Security: Challenges in Implementing Border Technology: Statement of Nancy Kingsbury, Managing Director Applied Research and Methods, GAO-03-546T, Washington, DC.Google Scholar
  35. Giroux, H., 2002, Global capitalism and the return of the garrison state: rethinking hope in the age of insecurity, Arena Journal, 19: 141-160.Google Scholar
  36. Graham, S. and Wood, D., 2003, Digitizing surveillance: categorization, space, inequality, Critical Social Policy, 23(2): 227-248.CrossRefGoogle Scholar
  37. Higgs, E., 2001, The rise of the information state: the development of central state surveillance of the citizen in England, 1500-2000, Journal of Historical Sociology, 14(2): 175-97.CrossRefGoogle Scholar
  38. Home Office [UK], 2002, Secure Borders, Safe Haven: Integration and Diversity in Modern Britain, London.Google Scholar
  39. Home Office [UK], 2003, Biometric technology to tackle immigration abuse, Press Release, 228/2003 (27 August 2003).Google Scholar
  40. Home Office [UK], 2004, Increased use of biometrics to tackle asylum abuse, Press Release, 024/2004 (21 January 2004).Google Scholar
  41. Huysmans, J., 2000, The European Union and the securitization of migration, Journal of Common Market Studies, 38(5): 751-77.CrossRefGoogle Scholar
  42. International Campaign Against Mass Surveillance, 2005, The Emergence of a Global Infrastructure for Mass Registration and Surveillance.Google Scholar
  43. Jayasuriya, K., 2002, 9/11 and the new ‘anti-politics’ of ‘Security’, Social Science Research Council Essays;
  44. Jones, R., 2001, Digital rule: punishment, control and technology, Punishment and Society, 2(1): 5-22.CrossRefGoogle Scholar
  45. Krasner, S., 1999, Sovereignty: Organized Hypocrisy, Princeton University Press, Princeton, NJ.Google Scholar
  46. Lettice, J., 2004, UK plays asylum card to expand visa biometric scheme (21 January 2004);
  47. Lianos, M. and Douglas, M., 2000, Dangerization and the end of deviance: the institutional environment, British Journal of Criminology, 40(2): 261-278.Google Scholar
  48. Loader, I., 1999, Consumer culture and the commodification of policing and security, Sociology, 33(2): 373-392.Google Scholar
  49. Lodge, J., 2004, EU homeland security: citizens or suspects?, Journal of European Integration, 26(3): 253-279.CrossRefGoogle Scholar
  50. Lynn, M., 2005, Security industry offers safe bet, Investment Week (22 August 2005).Google Scholar
  51. Lyon, D., 2003, Surveillance after September 11, Polity Press, London.Google Scholar
  52. Lyon, D., 2004, Identity cards: social sorting by database, Internet Issue Brief No. 3, Oxford Internet Institute, University of Oxford.Google Scholar
  53. McCahill, M., 2002, The Surveillance Web: The Rise of Visual Surveillance in an English City, Willan, Cullompton.Google Scholar
  54. McCulloch, J., 2004a, National (in) security politics in Australia: fear and the federal election, Alternative Law Journal, 29(2): 87-91.Google Scholar
  55. McCulloch, J., 2004b, Blue armies, khaki police and the cavalry on the new American frontier, Critical Criminology, 12: 309-326.CrossRefGoogle Scholar
  56. McMillan, R., 2002, The myth of airport biometrics, Wired News (9 August 2002);,2100,54418,00.html.
  57. Marr, D., and Wilkinson, M., 2003, Dark Victory, Federation Press, Sydney.Google Scholar
  58. Menghrajani, V., Orantia, J., Pittlik, A. and Wolfsohn, A., 2002, Facing the Future: A Study on Biometrics, Unpublished paper, UTS Community Law and Legal Research Centre, Sudney.Google Scholar
  59. Muller, B., 2004, (Dis) qualified bodies: securitization, citizenship and ‘identity management’, Citizenship Studies, 8(3): 279-294.CrossRefGoogle Scholar
  60. Norris, C., Moran, J. and Armstrong, G., 1998, Algorithmic surveillance: the future of automated visual surveillance, in: Surveillance, Closed Circuit Television and Social Control, C. Norris, J. Moran and G. Armstrong, eds., Ashgate, Aldershot, pp. 255-287.Google Scholar
  61. Norris, C. and Armstrong, G., 1999, The Maximum Surveillance Society: The Rise of CCTV, Berg, Oxford.Google Scholar
  62. O’Neil, P., 2005, Complexity and counterterrorism: thinking about biometrics, Studies in Conflict & Terrorism, 28: 547-566.CrossRefGoogle Scholar
  63. Pickering, S., 2001, Common sense and original deviancy: news discourses and asylum seekers in Australia, Journal of Refugee Studies, 14(1): 169-186.CrossRefGoogle Scholar
  64. Pickering, S., 2005, Refugees and State Crime, Federation Press, Sydney.Google Scholar
  65. Policy Laundering Project, 2005, Introduction: the problem of policy laundering;
  66. Privacy International, 1996, Identity cards: frequently asked questions; http//www.
  67. Privacy International, 2004, Mistaken Identity: Exploring the Relationship Between National Identity Cards and the Prevention of Terrorism, Interim Report, April, London;
  68. Riley, J., 2004, National ID cards urged in terror war, Australian (15 October 2004) p. 4.Google Scholar
  69. Salter, M., 2004, Passports, mobility, and security: how smart can the border be?, International Studies Perspectives, 5: 71-91.CrossRefGoogle Scholar
  70. Scheeres, J., 2002, Airport face scanner failed, Wired News (16 May 2002); http://www.,1848,52563,00.html.
  71. Simon, J., 1997, Governing through crime, in: The Crime Conundrum: Essays on Criminal Justice, L. Friedman and G. Fisher, eds, Westview Press, Boulder, CO.Google Scholar
  72. Stalder, F. and Lyon, D., 2003, Electronic identity cards and social classification, in: Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, D. Lyon, ed., Routledge, London.Google Scholar
  73. Thomas, R., 2005, Biometrics, international migrants and human rights, Global Migration Perspectives, No. 17, Global Commission on International Migration (GCIM), Geneva:
  74. Thobani, S., 2003, Exception as rule: profile of exclusion, Signs: Journal of Women Culture and Society, 29(2): 597-600.CrossRefGoogle Scholar
  75. Torpey, J., 2000, The Invention of the Passport: Surveillance, Citizenship and the State, Cambridge University Press, Cambridge.Google Scholar
  76. van der Ploeg, I., 1999a, The illegal body: ‘Eurodac’ and the politics of biometric identification, Ethics and Information Technology, 1: 295-302.CrossRefGoogle Scholar
  77. van der Ploeg, I., 1999b, Written on the body: biometrics and identity, Computers and Society, 29(1): 37-44.Google Scholar
  78. van der Ploeg, I., 2003, Biometrics and privacy: a note on politics of theorizing technology, Information, Communication and Society, 6(1): 85-104.Google Scholar
  79. Webber, F., 1996, Crimes of Arrival: Immigrants and Asylum-Seekers in the New Europe, Statewatch, London.Google Scholar
  80. Weber, L., 2002, The detention of asylum seekers: 20 reasons why criminologists should care, Current Issues in Criminal Justice, 14(1): 9-30.Google Scholar
  81. Weber, L. and Bowling, B., 2004, ‘Policing migration: a framework for investigating the regulation of global mobility, Policing and Society, 14(3): 195-212.CrossRefGoogle Scholar
  82. Wheeler, J., 2005, An Independent Review of Airport Security and Policing for the Government of Australia, Commonwealth of Australia, Canberra.Google Scholar
  83. Woodward, J., Orlans, N. and Higgins, P., 2003, Biometrics: Identity Assurance in the Information Age, McGraw Hill, Berkeley, CA.Google Scholar
  84. Zuriek, E. and Hindle, K., 2004, Governance, security and technology: the case of biometrics, Studies in Political Economy, 73: 113-137.Google Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  • Dean Wilson
    • 1
  1. 1.Criminal Justice and Criminology in the School of Political and Social InquMonash UniversityMelbourneAustralia

Personalised recommendations