2018
DOI: 10.1080/09662839.2018.1481396
|View full text |Cite
|
Sign up to set email alerts
|

Constructing the EU’s high-tech borders: FRONTEX and dual-use drones for border management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
27
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 36 publications
1
27
0
2
Order By: Relevance
“…The securitisation of migration not only conceives of people on the move as a source of 'risk' for European labour markets, national or cultural identities, crime in society, welfare resources, state sovereignty, or national security which must be contained, managed, or kept at a distance, but entails the proliferation and deployment of a vast array of technologies; policies; risk assessments; and specialised agencies, industries, and roles to mitigate these presumed threats. These include the collection and retention of biometric data (Scheel, 2013(Scheel, , 2019Sparke, 2006); detention and deportation; border externalisation (Casas-Cortes, Cobarrubias, and Pickles, 2015;Zaiotti and Martin, 2016); surveillance technologies on land and at sea to detect illicit border crossing (Csernatoni, 2018); detection equipment like x-ray scanners, CO 2 measuring devices, and heart-beat sensors; and the construction of more traditional border fortifications like walls and fences. Calais, unto which the UK's border has been 'exported' (Vaughan-Williams, 2009, is a prioritised space for securitisation, and often a proving ground for novel security strategies and technologies, a number of which have been detailed by Bescherer (2017).…”
Section: Entanglements Of Border and Environmental Securitymentioning
confidence: 99%
“…The securitisation of migration not only conceives of people on the move as a source of 'risk' for European labour markets, national or cultural identities, crime in society, welfare resources, state sovereignty, or national security which must be contained, managed, or kept at a distance, but entails the proliferation and deployment of a vast array of technologies; policies; risk assessments; and specialised agencies, industries, and roles to mitigate these presumed threats. These include the collection and retention of biometric data (Scheel, 2013(Scheel, , 2019Sparke, 2006); detention and deportation; border externalisation (Casas-Cortes, Cobarrubias, and Pickles, 2015;Zaiotti and Martin, 2016); surveillance technologies on land and at sea to detect illicit border crossing (Csernatoni, 2018); detection equipment like x-ray scanners, CO 2 measuring devices, and heart-beat sensors; and the construction of more traditional border fortifications like walls and fences. Calais, unto which the UK's border has been 'exported' (Vaughan-Williams, 2009, is a prioritised space for securitisation, and often a proving ground for novel security strategies and technologies, a number of which have been detailed by Bescherer (2017).…”
Section: Entanglements Of Border and Environmental Securitymentioning
confidence: 99%
“…Vulnerabilities such as challenges of representation in, or recognition through, technological design and practice are hidden behind regimes of complexity. This tendency is ubiquitous in modern practices of algorithmic warfare (Wilcox, 2017), biometric and border technologies (Csernatoni, 2018; Kloppenburg and van der Ploeg, 2020) as well as in the medical and life sciences (Mehta et al, 2019).…”
Section: The Performative Power Of Technological Vision(s)mentioning
confidence: 99%
“…Some see concerning resemblances with the arms races and the weaponisation of science and technology that took place during the cold war (Fink, 2020; Lodgaard, 2019). One clear parallel is that the alignment of strategic and security interests with the promises of high-tech and civil–military projects (Csernatoni, 2018) reduces transparency about the intentions of national investment into these ‘disruptive’ technologies (Edwards, 2019).…”
Section: The Performative Power Of Technological Vision(s)mentioning
confidence: 99%
“…As currently understood in the EU, integrated border management (IBM) is a system that goes well beyond mere border checks and monitoring of the crossing of external borders. It includes activities such as prevention of cross-border crime, referral of persons in need of international protection, search ISSN and rescue operations for persons in distress at sea, risk analysis for security, cooperation with third countries and the return of third-country nationals who are subject of return decisions 1 .…”
Section: Introductionmentioning
confidence: 99%