Cyber-threat Landscape of Border Control Infrastructures

Author(s):  
Petros Chatzis ◽  
Eliana Stavrou
Keyword(s):  
Author(s):  
John Robertson ◽  
Ahmad Diab ◽  
Ericsson Marin ◽  
Eric Nunes ◽  
Vivin Paliath ◽  
...  

2016 ◽  
Vol 46 (183) ◽  
pp. 289-305
Author(s):  
Angela Schweizer

The following article is based on my fieldwork in Morocco and represents anthropological data collected amongst undocumented sub-Saharan migrants in Morocco. They want to enter Europe in search for a better life for themselves and to provide financial support for their families. Due to heavy border security control and repression, they find themselves trapped at the gates of Europe, where they are trying to survive by engaging in various economic activities in the informal sector. The article begins with an overview of the European migration politics in Africa and the geopolitical and historical context of Morocco, in light of the externalization of European border control. I will then analyze the various economic sectors, in which sub-Saharan migrations are active, as well as smuggling networks, informal camps and remittances, on which they largely depend due to the exclusion from the national job market.


Author(s):  
Felicity Amaya Schaeffer

I argue that we are entering an automated era of border control that I label a border-biosecurity industrial complex. Funded in great part by the Department of Homeland Security (DHS), scientific research and automated surveillance technologies promise the state innovative and supposedly unbiased solutions to the challenge of border control and security. This article spotlights a border surveillance technology called AVATAR (Automated Virtual Agent for Truth Assessment in Real-Time). Analyzing this technology, which was funded by the DHS and developed by faculty at the University of Arizona’s National Center for Border Security and Immigration (BORDERS), allows me to assess how the emphasis on novel technologies to detect terrorists unleashes the search for ubiquitous surveillance devices programmed to detect deviant behavioral and physiological movements. I offer a wider view of this technology-in-the-making by analyzing how university research in aerial defense, the psychology of deception, the life sciences, and computer engineering influences the development of surveillance devices and techniques. I explore how, during a posthuman era, automated technologies detect and racialize “suspect life” under the guise of scientific neutrality and supposedly free from human interference. Suspect life refers to the racial bias preprogrammed into algorithms that compute danger or risk into certain human movements and regions such as border zones. As these technologies turn the body into matter, they present biological life as a more scientifically verifiable truth than human verbal testimony, moving border control from the adjudication of law through the subjective interview to the automated body that speaks a truth more powerful than a complex story can tell.


2019 ◽  
Vol 3 ◽  
pp. 1255
Author(s):  
Ahmad Salahuddin Mohd Harithuddin ◽  
Mohd Fazri Sedan ◽  
Syaril Azrad Md Ali ◽  
Shattri Mansor ◽  
Hamid Reza Jifroudi ◽  
...  

Unmanned aerial systems (UAS) has many advantages in the fields of SURVAILLANCE and disaster management compared to space-borne observation, manned missions and in situ methods. The reasons include cost effectiveness, operational safety, and mission efficiency. This has in turn underlined the importance of UAS technology and highlighted a growing need in a more robust and efficient unmanned aerial vehicles to serve specific needs in SURVAILLANCE and disaster management. This paper first gives an overview on the framework for SURVAILLANCE particularly in applications of border control and disaster management and lists several phases of SURVAILLANCE and service descriptions. Based on this overview and SURVAILLANCE phases descriptions, we show the areas and services in which UAS can have significant advantage over traditional methods.


2017 ◽  
Author(s):  
Deepak K. Tosh ◽  
Sachin Shetty ◽  
Shamik Sengupta ◽  
Jay P. Kesan ◽  
Charles Kamhoua

Author(s):  
Sanja Milivojević

This chapter looks at the intersection of race, gender, and migration in the Western Balkans. Immobilizing mobile bodies from the Global South has increasingly been the focus of criminological inquiry. Such inquiry, however, has largely excluded the Western Balkans. A difficult place to research, comprising countries of the former Yugoslavia and Albania, the region is the second-largest route for irregular migrants in Europe (Frontex 2016). Indeed, EU expansion and global developments such as wars in Syria, Afghanistan, and Iraq have had a major impact on mobility and migration in the region. The chapter outlines racialized hierarchies in play in contemporary border policing in the region, and how these racialized and gendered practices target racially different Others and women irregular migrants and asylum seekers. Finally, this chapter maps the impact of such practices and calls for a shift in knowledge production in documenting and addressing such discriminatory practices.


Author(s):  
Laura Velasco Ortiz

In concert with more localized analyses of border regions, the Border Studies field has contributed to our understanding of how mobility affects identity. The distinction between cultural and identification boundaries has proved relevant for analyzing the identity processes that arise in border interactions typically marked by ambiguity and contradiction. However, the current migratory context is defined by dehumanizing social and political inequalities. This poses a conceptual challenge to understanding the subjectivities produced by the current policies of border control that dehumanize the immigrant and mobile person. This chapter reflects on the conceptual and empirical relationship between migration, borders, and identity in a current climate characterized by global connections and nation-states’ increasing border control over human mobility. It also analyzes the symbolic dimension of state border control and its consequences for constituting identities.


Author(s):  
Nolan Arnold ◽  
Mohammadreza Ebrahimi ◽  
Ning Zhang ◽  
Ben Lazarine ◽  
Mark Patton ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document