scispace - formally typeset
Journal ArticleDOI

The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts

Didier Bigo
- 02 Jun 2014 - 
- Vol. 45, Iss: 3, pp 209-225
TLDR
In this paper, the authors show that practices of control are routinely embedded in a practical sense that informs what controlling borders does and means, which is itself informed by different professional habitus and work routines involving deterrence and the use of force, interrogation and detention, surveillance of populations on the move and profiling of (un)trusted travellers.
Abstract
What practices of (in)securitization involve the notions of border and border control in the European Union? How do these practices operate? How are they assembled? In the resulting assemblage, is the notion of borders – understood as state borders – still relevant for the control of individuals and populations moving across the frontiers of the EU? Drawing on empirical observations and with a specific focus on how border control is translated into different social universes, this article seeks to show that practices of control are routinely embedded in a practical sense that informs what controlling borders does and means. This practical sense is itself informed by different professional habitus and work routines involving deterrence and the use of force, interrogation and detention, surveillance of populations on the move and the profiling of (un)trusted travellers. Its strength varies in relation to its shared dimension by most of the operators, and is adjusted to the materiality of borders as well as ...

read more

Citations
More filters
Journal ArticleDOI

Questioning security devices: Performativity, resistance, politics

TL;DR: A special issue proposing an analytics of devices to examine the configuration and reconfiguration of security practices by attending to the equipment or instrumentation that make these practices possible and temporally stabilize them is introduced.
Journal ArticleDOI

Containment through mobility: migrants’ spatial disobediences and the reshaping of control through the hotspot system

TL;DR: In this paper, the authors focus on the implementation and functioning of the Hotspot System in Greece and in Italy, analysing beyond the fences of detention centres and by looking at the broader logistics of channels, infrastructures and governmental measures deployed for regaining control over migration movements.
Posted Content

Hardwiring the Frontier? The Politics of Security Technology in Europe's 'Fight Against Illegal Migration'

TL;DR: In this article, the authors take a close look at one way in which officials try to overcome such conflicts: through technology, and show how such technologies, rather than "halting migration", have above all acted as catalysts for new social relations among disparate sectors, creating areas for collaboration and competition, compliance and conflict.
Journal ArticleDOI

Hardwiring the frontier? The politics of security technology in Europe’s ‘fight against illegal migration’:

TL;DR: In this article, the authors take a close look at one way in which officials try to overcome such conflicts: through technology, and show how such technologies, rather than "halting migration", have above all acted as catalysts for new social relations among disparate sectors, creating areas for collaboration and competition, compliance and conflict.
References
More filters
Journal ArticleDOI

The surveillant assemblage.

TL;DR: The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems and transforms the purposes of surveillance and the hierarchies of surveillance, as well as the institution of privacy.
Book

Border as Method, or, the Multiplication of Labor

TL;DR: The Proliferation of Borders as mentioned in this paper is a seminal work in the field of political science that explores the role of borders in the formation and evolution of the modern world. But it does not address the problem of border control.
Book

The Politics of Insecurity: Fear, Migration and Asylum in the EU

Jef Huysmans
TL;DR: The book critically engages with theoretical developments in international relations and security studies to develop a fresh conceptual framework for studying security.
Journal ArticleDOI

Biometric borders: Governing mobilities in the war on terror

TL;DR: The concept of the biometric border was proposed in this paper to signal a dual-faced phenomenon in the contemporary war on terror: the turn to scientific technologies and managerial expertise in the politics of border management; and the exercise of biopower such that the bodies of migrants and travellers themselves become sites of multiple encoded boundaries.
Book

Information technology and dataveillance

Roger Clarke
TL;DR: Data surveillance is now supplanting conventional surveillance techniques as discussed by the authors and with this trend come new monitoring methods such as personal data surveillance and mass data surveillance that require more effective safeguards and a formal policy framework.
Trending Questions (1)
What variables can measure securitized nature of border management technologies?

The variables that can measure the securitized nature of border management technologies include biometric identifiers, data surveillance, and predictive software.