2019
DOI: 10.4324/9780367808464
|View full text |Cite
|
Sign up to set email alerts
|

The Biometric Border World

Abstract: This chapter analyses technologies of border control that operate through recognition. The technologies are used in various border settings, but are united by a shared technotemporal quality, namely that they identify persons and objects by comparing them to already registered IDs and already known threats. The chapter will first describe the principles and visual skills involved in running the Automated Border Control system in Copenhagen Airport, comparing them with face-to-face ('manual') border control and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 7 publications
0
8
0
1
Order By: Relevance
“…In the context of the 9/11 attack, biometric technologies were widely claimed as measures that could have prevented the event through the automated face recognition of the attackers and the subsequent possibility to stop them (Gates, 2011;Lyon, 2008). Since then, biometric technologies have been promoted by vendors and the security industry as objective and fool-proof tools that can accurately pre-empt possible threats from terrorism, on the basis of identification of ill-intentioned individuals (Olwig et al, 2020;Scheel, 2019). This led the United States to sign the PATRIOT Act in 2001, which enabled massive investments in both national and global surveillance infrastructures, including biometrics (Masco, 2017).…”
Section: "Then September 11th Happened!"mentioning
confidence: 99%
See 3 more Smart Citations
“…In the context of the 9/11 attack, biometric technologies were widely claimed as measures that could have prevented the event through the automated face recognition of the attackers and the subsequent possibility to stop them (Gates, 2011;Lyon, 2008). Since then, biometric technologies have been promoted by vendors and the security industry as objective and fool-proof tools that can accurately pre-empt possible threats from terrorism, on the basis of identification of ill-intentioned individuals (Olwig et al, 2020;Scheel, 2019). This led the United States to sign the PATRIOT Act in 2001, which enabled massive investments in both national and global surveillance infrastructures, including biometrics (Masco, 2017).…”
Section: "Then September 11th Happened!"mentioning
confidence: 99%
“…Nonetheless, and in spite of the biometric technologies and the restrictions they implied, four years later Fuuad is living legally in another EU country and working for a major international company. Furthermore, although Fuuad's situation was difficult after his biometric registration in the Italian hot spot, he was still able to use the position as a migrant abroad to negotiate his visibility and social identity in Somaliland (Simonsen, 2020).…”
Section: Negotiating Identitymentioning
confidence: 99%
See 2 more Smart Citations
“…It is famously stated that ‘[t]echnology is neither good, nor bad; nor is it neutral’ (Kranzberg, 1986, p. 545). Building on this aphorism, some have highlighted the algorithmic bias, contending that technological tools systematically reflect human bias and subjectivity (Olwig et al, 2020, p. 161). Yet, others have argued that the technology is neutral (Gelb and Clark, 2013, p. 17).…”
Section: Emerging Trends and Implicationsmentioning
confidence: 99%