Skip to main content

The Politics of Digital Borders

  • Chapter
  • First Online:
Border Politics

Abstract

Information and communication technologies (ICTs) and large-scale digital databases play a crucial role in the European management of borders and mobility governance. Since the 1990 Schengen Agreement three large-scale IT systems and a number of information sharing mechanisms have emerged. This chapter scrutinizes the relationship between digital technology and border politics by following the idiom of co-production, which focuses on the interconnectedness between techno-political developments and the (re-)construction of social orders. It examines how digital systems are deployed and enacted in the processes of identification, data collection and categorization. The analysis is based on various documents issued by the main official authorities and actors, from official communications and regulation by the European Commission and Council to the information brochures and technical reports of the eu-Lisa agency. The chapter will first present the main developments of ICTs and digital systems in European border management, and then point to the ways in which digital technologies are deployed for the governance of cross-border mobility. In particular, it highlights the de-territorialization effects of digital border governance and the important role of the human body in identification and categorization processes. Finally, it argues that digital borders are co-produced by the interaction and interplay of human actors and technological systems at the various border sites.

This chapter is based on research and insights for my dissertation that completed a master of science degree in political sociology at the London School of Economics and Political Science (2015). I would like to thank my supervisor Michael McQuarrie.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Kuster and Tsianos’ research report (2012: 16) on Eurodac serves as a striking example. For example, one of their interviewees, a German IT specialist, stated he could neither explain nor understand the inordinate use of Eurodac category 2, ‘illegal border crossers’, by the Greek authorities, which would amount to a much higher figure of entries than using category 3, ‘illegal residents’.

  2. 2.

    See for example Hayes and Vermeulen (2012: 31).

  3. 3.

    ‘Remote control’ is defined as the requirement of ‘obtaining permission to enter before embarking on the journey’ (Zolberg 2006: 223).

  4. 4.

    Certainly, Andrew Barry’s term ‘technological zone’ can help to grasp the (non-territorial) character of these arrangements for governance. It is defined as a set of diverse regulations, socio-technical arrangements and processes, technical infrastructures that render objects or flows governable (Barry 2001: 37ff.).

  5. 5.

    See the Stockholm Programme: ‘[A]ccess to the Union’s territory has to be made more effective and efficient. At the same time, the Union and its Member States have to guarantee security for their citizens’ (CEU 2010: C115/5).

  6. 6.

    Consequently, an ‘Entry-Exit-System’ would also be connected with other databases like the VIS (CEC 2008: 69).

  7. 7.

    Future Smart Border systems in the Schengen zone suggest that data from more than 250 million third country nationals could be stored (eu-Lisa 2015c: 29).

  8. 8.

    Didier Bigo similarly explains the visions of IT and database experts on how borders should not represent ‘lines’, but function by being ‘gaseous [and] constructed via a multitude of points’ (2014: 217).

  9. 9.

    For example, the position of a European Data Protection Supervisor, who is concerned with subject’s privacy and the use of personal information, was established.

  10. 10.

    See for example Van der Ploeg and Sprenkels (2011: 74–87). With regard to Eurodac and the Dublin Convention, see Kuster and Tsianos’s report (2012).

  11. 11.

    The VIS will have a processing power of up to 450,000 transaction per hour; in the SIS database 4000 entries are created, updated or deleted per hour (eu-Lisa 2014b).

References

  • Amoore, L. (2006). Biometric borders: Governing mobilities in the war on terror. Political Geography, 25, 336–351.

    Article  Google Scholar 

  • Balch, A., & Geddes, A. (2011). The development of the EU migration and asylum regime. In H. Dijstelbloem & A. Meijer (Eds.), Migration and the new technological borders of Europe (pp. 22–39). Hampshire, England: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Balzacq, T. (2008). The policy tools of securitization: Information exchange, EU foreign and interior policies. JCMS, 46(1), 75–100.

    Google Scholar 

  • Barry, A. (2001). Political machines. Governing a technological society. London: Athone Press.

    Google Scholar 

  • Bigo, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives, 27, 63–92.

    Article  Google Scholar 

  • Bigo, D. (2011). Freedom and speed in enlarged borderzones. In V. Squire (Ed.), The contested politics of mobility. Borderzones and irregularity (pp. 51–73). London: Routledge.

    Google Scholar 

  • Bigo, D. (2014). The (in)securitization practices of the three universes of EU Border control: Military/navy—Border guards/police—Database analysts. Security Dialogue, 45(3), 209–225.

    Article  Google Scholar 

  • Broeders, D. (2007). The new digital borders of Europe. EU databases and the surveillance of irregular migrants. International Sociology, 22(1), 71–92.

    Article  Google Scholar 

  • Broeders, D., & Hampshire, J. (2013). Dreaming of seamless borders: ICTs and the pre-emptive governance of mobility in Europe. Journal of Ethnic and Migration Studies, 39(8), 1201–1218.

    Article  Google Scholar 

  • Brouwer, E. (2008). Digital borders and real rights. Effective remedies for third-country nationals in the Schengen information system. Leiden: Martinus Nijhoff.

    Book  Google Scholar 

  • CEC (Commission of the European Communities). (2001). Communication from the Commission to the Council and the European Parliament. Development of the Schengen Information System II (COM (2001) 720 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2005). Communication from the Commission to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs (COM(2005) 597 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2008). Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the Regions. Preparing the next steps in border management in the European Union. (COM(2008) 69 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2009). Communication from the Commission to the European Parliament and the Council. An area of freedom, security and justice serving the citizen (COM(2009) 262 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2011a). The global approach to migration and mobility (COM(2011) 743 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2011b). Communication on migration (COM(2011) 248 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEC. (2014). Security in 2020: Meeting the challenge. Luxembourg: Publications Office of the European Union. Retrieved from http://ec.europa.eu/dgs/home-affairs/financing/fundings/research-for-security/docs/security_research_brochure_2014_en.pdf

    Google Scholar 

  • CEC. (2015). A European agenda on migration (COM(2015) 240 final). Brussels: Commission of the European Communities.

    Google Scholar 

  • CEU (Council of the European Union). (2000). Council Regulation (EC) No 2725/2000 of 11 December 2000 concerning the establishment of ‘Eurodac’ for the comparison of fingerprints for the effective application of the Dublin Convention. Official Journal of the European Union, L361.

    Google Scholar 

  • CEU. (2008). Council Decision 2008/633/JHA of 23 June 2008 concerning access for consultation of the Visa Information System (VIS) by designate authorities of Member States and by Europol for the purposes of the prevention, detection and investigation of terrorist offences and of other serious criminal offences. Official Journal of the European Union, L218.

    Google Scholar 

  • CEU. (2010). The Stockholm Programme—An open and secure serving and protecting citizens. Official Journal of the European Union, C115.

    Google Scholar 

  • Chapman, G. (2009). Shaping technology for the ‘good life’: The technological imperative versus the social imperative. In D. G. Johnson & J. M. Wetmore (Eds.), Technology and society. Building our sociotechnical future (pp. 445–459). Cambridge: MIT Press.

    Google Scholar 

  • Dijstelbloem, H., & Broeders, D. (2015). Border surveillance, mobility management and the shaping of non-publics in Europe. European Journal of Social Theory, 18(1), 21–38.

    Article  Google Scholar 

  • Dijstelbloem, H., Meijer, A., & Bester, M. (2011). The migration machine. In H. Dijstelbloem & A. Meijer (Eds.), Migration and the new technological borders of Europe (pp. 1–21). Hampshire: Palgrave Macmillan.

    Chapter  Google Scholar 

  • EPEC (European Policy Evaluation Consortium). (2004). Study for the extended impact assessment of the visa information system. Final report. Brussels: European Policy Evaluation Consortium.

    Google Scholar 

  • EU. (2006). Regulation (EC) No 1987/2006 of the European Parliament and of the Council of 20 December 2006 on the establishment, operation and use of the second generation Schengen Information System (SIS II). Official Journal of the European Union, L381.

    Google Scholar 

  • EU. (2008). Regulation (EC) No 767/2008 of the European Parliament and of the Council of 9 July 2008 concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas (VIS Regulation). Official Journal of the European Union, L218.

    Google Scholar 

  • eu-Lisa. (2014a). EU-LISA in action. IT in the service of a more open and secure Europe. Luxembourg: Publication Office of the European Union.

    Google Scholar 

  • eu-Lisa. (2014b). SIS II—2013 statistics. European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice. Retrieved from http://www.eulisa.europa.eu/Publications/p_reports/Pages/default.aspx

  • eu-Lisa. (2014c). eu-LISA annual activity report 2013. Luxembourg: Publications Office of the European Union.

    Google Scholar 

  • eu-Lisa. (2014d, October 1). 1st eu-LISA international conference. Smart borders: A faster and safer way to Europe. Tallinn: Conference Report. Retrieved from http://www.eulisa.europa.eu/Publications/p_reports/Pages/default.aspx

  • eu-Lisa. (2014e). Report on the technical functioning of VIS, including the security thereof, pursuant to Article 50(3) of the VIS Regulation. European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice. Retrieved from http://www.eulisa.europa.eu/Publications/Reports/eulisa_Report%20VIS%20en.pdf

  • eu-Lisa. (2015a). Annual Report on the 2014 activities of the Central System of Eurodac pursuant to Article 24(1) of Regulation (EC) No 2725/2000. European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice. Retrieved from http://eulisa.europa.eu/Publications/Pages/default.aspx

  • eu-Lisa. (2015b). Testing the borders of the future. Smart borders pilot: The results in brief. European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice.

    Google Scholar 

  • eu-Lisa. (2015c). Biometrics in large-scale IT. Recent trends, current performance capabilities, recommendations for the near future. European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice.

    Google Scholar 

  • Frontex. (2013). Border control in the information age. Frontex, Feature Stories. Retrieved from http://frontex.europa.eu/feature-stories/border-control-in-the-information-age-udh57L. Accessed 15 January 2015.

  • Goldstein, J., Angeletti, R., Holzbach, M., Konrad, D., & Snijder, M. (2008). Final report. Large-scale biometrics deployment in Europe. Identifying challenges and threats. JRC Scientific and Technical Reports. Seville: Office for Official Publications of the European Communities.

    Google Scholar 

  • Guild, E., Carrera, S., & Geyer, F. (2008) The commission’s new border package: Does it take us one step closer to a ‘cyber-fortress Europe’? CEPS Policy Brief, No.145.

    Google Scholar 

  • Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.

    Article  Google Scholar 

  • Harbers, H. (Ed.). (2005). Inside the politics of technology. Agency and normativity in the co-production of technology and society. Amsterdam: Amsterdam University Press.

    Google Scholar 

  • Hayes, M., & Vermeulen, M. (2012). Borderline. EU Border Surveillance Initiatives. An assessment of the costs and its impact on fundamental rights. Berlin: Heinrich-Böll-Stiftung.

    Google Scholar 

  • Heimeshoff, L., Hess, S., Kron, S., Schwenken, H., & Trzeciak, M. (Eds.). (2014). Grenzregime II: Migration—Kontrolle—Wissen. Transnationale Perspektiven. Berlin: Assoziation A.

    Google Scholar 

  • Jasanoff, S. (Ed.). (2004). States of knowledge. The co-production of science and social order. London: Routledge.

    Google Scholar 

  • Johnson, C., Jones, R., Paasi, A., Amoore, L., Mountz, A., Salter, M., et al. (2011). Interventions on rethinking the ‘border’ in border studies. Political Geography, 30, 61–69.

    Article  Google Scholar 

  • Kasparek, B., & Tsianos, V. S. (2014). Whatever works! Kontinuität und Krise des Schengener systems. In L. Heimeshoff, S. Hess, S. Kron, H. Schwenken, & M. Trzeciak (Eds.), Grenzregime II: Migration—Kontrolle—Wissen. Transnationale Perspektiven (pp. 41–57). Berlin: Assoziation A.

    Google Scholar 

  • Kuster, B., & Tsianos, V. (2012). Thematic report ‘border crossings’ (WP 4). MIG@NET transnational digital networks, migration and gender, Deliverable No. 6. Retrieved from http://www.mignetproject.eu/wp-content/uploads/2012/10/MIGNET_Deliverable_6_Thematic_report_Border_crossings.pdf

  • Kuster, B., & Tsianos, V. (2013). How to liquefy a moving body: Eurodac und die Digitalisierung der Europäischen Grenze. In Arbeitsgruppe Informatik in Bildung und Gesellschaft (Ed.), Biometrische Identitäten und ihre Rolle in den Diskursen um Sicherheit und Grenzen (pp. 19–36). Berlin: Humbold-Universität.

    Google Scholar 

  • Latour, B. (1986). Visualisation and cognition: Drawing things together. In H. Kuklick (Ed.), Knowledge and society. Studies in the sociology of culture past and present (Vol. 6, pp. 1–40). Greenwich, CT: JAI Press.

    Google Scholar 

  • Latour, B. (1989). Science in action. How to follow scientists and engineers through society. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Marin, L. (2011). Is Europe turning into a ‘technological fortress’? Innovation and technology for the management of EU’s external borders: Reflections on FRONTEX and EUROSUR. In M. A. Heldewegg & E. Kica (Eds.), Regulating technological innovation: A multidisciplinary approach (pp. 131–151). Hampshire, England: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Mezzadra, S., & Neilson, B. (2013). Border as method. Or, the multiplication of labor. London: Duke University Press.

    Book  Google Scholar 

  • MHA (Migration and Home Affairs). (2013). ‘Smart borders’: Enhancing mobility and security. European Commission, Migration and Home Affairs Funds 2014-20. Retrieved from http://ec.europa.eu/dgs/home-affairs/what-is-new/news/news/2013/20130228_01_en.htm

  • MHA. (2015). Investing in an open and secure Europe. Two funds for the 2014-20 period [online Infographic]. European Commission, Migration and Home Affairs Funds 2014-20. Retrieved from http://ec.europa.eu/dgs/home-affairs/e-library/multimedia/infographics/index_en.htm#080126248ec451b7/c_

  • Moulier-Boutang, Y. (1998). De l’esclavage au salariat: économie historique du salariat bride. Paris: Presses Universitaires de France.

    Google Scholar 

  • Paasi, A. (2007). Boundaries as social processes: Territoriality in the world of flows. Geopolitics, 3(1), 69–88.

    Article  Google Scholar 

  • Pallitto, R., & Heyman, J. (2008). Theorizing cross-border mobility: Surveillance, security and identity. Surveillance & Society, 5(3), 315–333.

    Google Scholar 

  • Papadopoulos, D., Stephenson, N., & Tsianos, V. (2008). Escape routes. Control and subversion in the twenty-first century. Ann Arbor, MI: Pluto Press.

    Google Scholar 

  • Rumford, C. (2006). Introduction. Theorizing borders. European Journal of Social Theory, 9(2), 155–169.

    Article  Google Scholar 

  • Salter, M. B., & Mutlu, C. E. (2013). Asymmetric borders: The Canada-Czech Republic ‘visa war’ and the question of rights. In D. Bigo, S. Carrera, & E. Guild (Eds.), Foreigners, refugees or minorities? Rethinking people in the context of border controls and visas (pp. 113–130). Farnham, England: Ashgate.

    Google Scholar 

  • Scheel, S. (2013). Autonomy of migration despite its securitisation? Facing the terms and conditions of biometric rebordering. Millennium: Journal of International Studies, 41(3), 575–600.

    Article  Google Scholar 

  • Torpey, J. (2000). The invention of the passport: Surveillance, citizenship and the state. Cambridge: Cambridge University Press.

    Google Scholar 

  • Van der Ploeg, I. (1999). The illegal body: ‘Eurodac’ and the politics of biometric identification. Ethics and Information Technology, 1, 295–302.

    Article  Google Scholar 

  • Van der Ploeg, I., & Sprenkels, I. (2011). Migration and the machine-readable body: Identification and biometrics. In H. Dijstelbloem & A. Meijer (Eds.), Migration and the new technological borders of Europe (pp. 68–104). Hampshire, England: Palgrave Macmillan.

    Chapter  Google Scholar 

  • Van Munster, R. (2009). Securitizing immigration. The politics of risk in the EU. London: Palgrave Macmillan.

    Book  Google Scholar 

  • Walters, W. (2006). Rethinking borders beyond the state. Comparative European Politics, 4, 141–159.

    Article  Google Scholar 

  • Zolberg, A. R. (2006). Managing a world on the move. Population & Development Review, 32, 222–253.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paul Trauttmansdorff .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Trauttmansdorff, P. (2017). The Politics of Digital Borders. In: Günay, C., Witjes, N. (eds) Border Politics. Springer, Cham. https://doi.org/10.1007/978-3-319-46855-6_7

Download citation

Publish with us

Policies and ethics