Skip to main content

Biometrics, Borders and the Ideal Suspect

  • Chapter
Borders, mobility and technologies of control

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Adey, P., 2004, Secured and sorted mobilities: examples from the airport, Surveillance and Society, 1(4): 500-519.

    Google Scholar 

  • Agamben, G., 2005, State of Exception, University of Chicago Press, Chicago.

    Google Scholar 

  • Agamben, G., 2004, No to bio-political tattooing, Le Monde (10 January 2004); http://www. ratical.org/ratville/CAH/totalControl.html.

  • Agamben, G., 1998, Homo Sacer: Sovereign Power and Bare Life, Stanford University Press, Stanford, CA.

    Google Scholar 

  • American Civil Liberties Union, 2004a, The Surveillance-Industrial Complex: How the American Government is Conscripting Businesses and Individuals in the Construction of a Surveillance Society, New York; http://www.aclu.org.

  • American Civil Liberties Union, 2004b, Sanctioned Bias: Racial Profiling since 9/11, New York; http://www.aclu.org.

  • American Civil Liberties Union, 2004c, Naked Data: How the U.S. Ignored International Concerns and Pushed for Radio Chips in Passports Without Security, New York; http://www.aclu.org.

  • Andreas, P., 2000, Border Games: Policing the U.S.-Mexico Divide, Cornell University Press, Ithaca.

    Google Scholar 

  • Australian Customs Service, 2004, Overview of SmartGate Trial, Canberra.

    Google Scholar 

  • Bajkowski, J., 2005, Budget 2005—winners and losers, Computerworld (11 May 2005); http://www.computerworld.com.au/index.php?id=918866272&eid=-255.

  • Bauman, Z., 2000, Social issues of law and order, British Journal of Criminology, 40(2): 205-221.

    Article  Google Scholar 

  • Beckett, K., 1997, Making Crime Pay: Law and Order in Contemporary American Politics, Oxford University Press, Oxford.

    Google Scholar 

  • Bigo, D., 2002a, Security and immigration: toward a critique of the governmentality of unease, Alternatives, 27: 63-92.

    Google Scholar 

  • Bigo, D., 2002b, To reassure and protect after September 11th, Social Science Research Council Essays; http://www.ssrc.org/sept11/essays/bigo.htm.

  • Biometrics Institute, 2005; http://www.biometricsinstitute.org.

  • Brake, M. and Hale, C., 1992, Public Order and Private Lives: The Politics of Law and Order, Routledge, London.

    Google Scholar 

  • Bray, R., 2003, Eye to eye with airport security, Financial Times (1 April 2003) p. 14. Button, J., 2005, On the cards, The Age (23 July 2005) p. 3.

    Google Scholar 

  • Cohen, S., 2002, Folk devils and moral panics: the creation of the mods and the rockers, 3rd ed, Routledge, London.

    Google Scholar 

  • Coleman, R. and Sim, J., 2000, You’ll never walk alone: CCTV surveillance, order and neoliberal rule in Liverpool city centre, British Journal of Sociology, 51(4): 623-639.

    Article  Google Scholar 

  • Clarke, R., 2003, SmartGate: a face recognition trial at Sydney Airport, http://www.anu.edu. au/people/Roger.Clarke/DV/SmartGate.html.

  • Davies, S., 1992, Big Brother: Australia’s growing web of surveillance, Simon & Schuster, Sydney.

    Google Scholar 

  • Davis, M., 2001, The flames of New York, New Left Review, 12: 34-50.

    Google Scholar 

  • Department of Immigration and Multicultural and Indigenous Affairs, 2004, Biometric Initiatives, Fact Sheet 84 (30 September 2004); http://www.immi.gov.au/facts/84bio metric.htm.

  • Devetak, R., 1995, Incomplete states: theories and practices of statecraft, in: Boundaries in Question, J. Macmillan and A. Linklater, eds., Pinter Publishers, London, pp. 19-39.

    Google Scholar 

  • Devetak, R., 2001, Postmodernism, in: Theories of International Relations, S. Burchill, R. Devetak, A. Linklater, M. Paterson, C. Reus-Smit and J. Tait, eds., Palgrave, New York, pp. 181-208.

    Google Scholar 

  • Downer, A., 2003, Australia Leads the Way on Passport Biometrics, Media Release, FA 60 (4 June 2003); http://www.foreignminister.gov.au/releases/2003/fa060_03.html.

  • Downes, D. and Morgan, R., 2002, The skeletons in the cupboard: the politics of law and order in the new millennium, in: The Oxford Handbook of Criminology, M. Maguire, R. Morgan & R. Reiner, eds., 3rd ed, Oxford University Press, Oxford, pp. 286-321.

    Google Scholar 

  • Doty, R., 1996, Sovereignty and the nation: constructing the boundaries of national identity, in: State Sovereignty as Social Construct, T. Biersteker and C. Weber, eds., Cambridge University Press, Cambridge, pp. 121-147.

    Google Scholar 

  • Europa, 2003, ‘Eurodac’ system; http://europa.eu.int/scadplus/printversion/en/lvb/133081.htm

  • Faist, T., 2002, Extension du domaine de la lutte: international migration and security before and after September 11, 2001, International Migration Review, 36(1): 7-14.

    Article  Google Scholar 

  • Feeley, M. and Simon, J., 1994, Actuarial justice: the emerging new criminal law in: The Futures of Criminology, D. Nelken, ed., Sage, London, pp. 173-201.

    Google Scholar 

  • Garland, D., 1990, Punishment in Modern Society, University of Chicago Press, Chicago.

    Google Scholar 

  • Garland, D., 2001, The Culture of Control: Crime and Social Order in Contemporary Society, Oxford University Press, Oxford.

    Google Scholar 

  • General Accounting Office [US], 2002, Aviation Security: Registered Traveler Program Policy and Implementation Issues: Report to the Honorable Kay Bailey Hutchison, U.S. Senate, GAO-03-253, Washington, DC.

    Google Scholar 

  • General Accounting Office [US], 2003, Border Security: Challenges in Implementing Border Technology: Statement of Nancy Kingsbury, Managing Director Applied Research and Methods, GAO-03-546T, Washington, DC.

    Google Scholar 

  • Giroux, H., 2002, Global capitalism and the return of the garrison state: rethinking hope in the age of insecurity, Arena Journal, 19: 141-160.

    Google Scholar 

  • Graham, S. and Wood, D., 2003, Digitizing surveillance: categorization, space, inequality, Critical Social Policy, 23(2): 227-248.

    Article  Google Scholar 

  • Higgs, E., 2001, The rise of the information state: the development of central state surveillance of the citizen in England, 1500-2000, Journal of Historical Sociology, 14(2): 175-97.

    Article  Google Scholar 

  • Home Office [UK], 2002, Secure Borders, Safe Haven: Integration and Diversity in Modern Britain, London.

    Google Scholar 

  • Home Office [UK], 2003, Biometric technology to tackle immigration abuse, Press Release, 228/2003 (27 August 2003).

    Google Scholar 

  • Home Office [UK], 2004, Increased use of biometrics to tackle asylum abuse, Press Release, 024/2004 (21 January 2004).

    Google Scholar 

  • Huysmans, J., 2000, The European Union and the securitization of migration, Journal of Common Market Studies, 38(5): 751-77.

    Article  Google Scholar 

  • International Campaign Against Mass Surveillance, 2005, The Emergence of a Global Infrastructure for Mass Registration and Surveillance.

    Google Scholar 

  • Jayasuriya, K., 2002, 9/11 and the new ‘anti-politics’ of ‘Security’, Social Science Research Council Essays; http://www.ssrc.org/sept11/essays/jayasuriya.htm.

  • Jones, R., 2001, Digital rule: punishment, control and technology, Punishment and Society, 2(1): 5-22.

    Article  Google Scholar 

  • Krasner, S., 1999, Sovereignty: Organized Hypocrisy, Princeton University Press, Princeton, NJ.

    Google Scholar 

  • Lettice, J., 2004, UK plays asylum card to expand visa biometric scheme (21 January 2004); http://www.theregister.co.uk/2004/01/21/uk_plays_asylum_card/.

  • Lianos, M. and Douglas, M., 2000, Dangerization and the end of deviance: the institutional environment, British Journal of Criminology, 40(2): 261-278.

    Google Scholar 

  • Loader, I., 1999, Consumer culture and the commodification of policing and security, Sociology, 33(2): 373-392.

    Google Scholar 

  • Lodge, J., 2004, EU homeland security: citizens or suspects?, Journal of European Integration, 26(3): 253-279.

    Article  Google Scholar 

  • Lynn, M., 2005, Security industry offers safe bet, Investment Week (22 August 2005).

    Google Scholar 

  • Lyon, D., 2003, Surveillance after September 11, Polity Press, London.

    Google Scholar 

  • Lyon, D., 2004, Identity cards: social sorting by database, Internet Issue Brief No. 3, Oxford Internet Institute, University of Oxford.

    Google Scholar 

  • McCahill, M., 2002, The Surveillance Web: The Rise of Visual Surveillance in an English City, Willan, Cullompton.

    Google Scholar 

  • McCulloch, J., 2004a, National (in) security politics in Australia: fear and the federal election, Alternative Law Journal, 29(2): 87-91.

    Google Scholar 

  • McCulloch, J., 2004b, Blue armies, khaki police and the cavalry on the new American frontier, Critical Criminology, 12: 309-326.

    Article  Google Scholar 

  • McMillan, R., 2002, The myth of airport biometrics, Wired News (9 August 2002); http://www.wired.com/news/conflict/0,2100,54418,00.html.

  • Marr, D., and Wilkinson, M., 2003, Dark Victory, Federation Press, Sydney.

    Google Scholar 

  • Menghrajani, V., Orantia, J., Pittlik, A. and Wolfsohn, A., 2002, Facing the Future: A Study on Biometrics, Unpublished paper, UTS Community Law and Legal Research Centre, Sudney.

    Google Scholar 

  • Muller, B., 2004, (Dis) qualified bodies: securitization, citizenship and ‘identity management’, Citizenship Studies, 8(3): 279-294.

    Article  Google Scholar 

  • Norris, C., Moran, J. and Armstrong, G., 1998, Algorithmic surveillance: the future of automated visual surveillance, in: Surveillance, Closed Circuit Television and Social Control, C. Norris, J. Moran and G. Armstrong, eds., Ashgate, Aldershot, pp. 255-287.

    Google Scholar 

  • Norris, C. and Armstrong, G., 1999, The Maximum Surveillance Society: The Rise of CCTV, Berg, Oxford.

    Google Scholar 

  • O’Neil, P., 2005, Complexity and counterterrorism: thinking about biometrics, Studies in Conflict & Terrorism, 28: 547-566.

    Article  Google Scholar 

  • Pickering, S., 2001, Common sense and original deviancy: news discourses and asylum seekers in Australia, Journal of Refugee Studies, 14(1): 169-186.

    Article  Google Scholar 

  • Pickering, S., 2005, Refugees and State Crime, Federation Press, Sydney.

    Google Scholar 

  • Policy Laundering Project, 2005, Introduction: the problem of policy laundering; http://www.policylaundering.org/PolicyLaunderingIntro.html.

  • Privacy International, 1996, Identity cards: frequently asked questions; http//www. privacyinternational.org.

  • Privacy International, 2004, Mistaken Identity: Exploring the Relationship Between National Identity Cards and the Prevention of Terrorism, Interim Report, April, London; http://www.privacyinternational.org.

  • Riley, J., 2004, National ID cards urged in terror war, Australian (15 October 2004) p. 4.

    Google Scholar 

  • Salter, M., 2004, Passports, mobility, and security: how smart can the border be?, International Studies Perspectives, 5: 71-91.

    Article  Google Scholar 

  • Scheeres, J., 2002, Airport face scanner failed, Wired News (16 May 2002); http://www. wired.com/news/privacy/0,1848,52563,00.html.

  • Simon, J., 1997, Governing through crime, in: The Crime Conundrum: Essays on Criminal Justice, L. Friedman and G. Fisher, eds, Westview Press, Boulder, CO.

    Google Scholar 

  • Stalder, F. and Lyon, D., 2003, Electronic identity cards and social classification, in: Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, D. Lyon, ed., Routledge, London.

    Google Scholar 

  • Thomas, R., 2005, Biometrics, international migrants and human rights, Global Migration Perspectives, No. 17, Global Commission on International Migration (GCIM), Geneva: http://www.gcim.org/gmp.

  • Thobani, S., 2003, Exception as rule: profile of exclusion, Signs: Journal of Women Culture and Society, 29(2): 597-600.

    Article  Google Scholar 

  • Torpey, J., 2000, The Invention of the Passport: Surveillance, Citizenship and the State, Cambridge University Press, Cambridge.

    Google Scholar 

  • van der Ploeg, I., 1999a, The illegal body: ‘Eurodac’ and the politics of biometric identification, Ethics and Information Technology, 1: 295-302.

    Article  Google Scholar 

  • van der Ploeg, I., 1999b, Written on the body: biometrics and identity, Computers and Society, 29(1): 37-44.

    Google Scholar 

  • van der Ploeg, I., 2003, Biometrics and privacy: a note on politics of theorizing technology, Information, Communication and Society, 6(1): 85-104.

    Google Scholar 

  • Webber, F., 1996, Crimes of Arrival: Immigrants and Asylum-Seekers in the New Europe, Statewatch, London.

    Google Scholar 

  • Weber, L., 2002, The detention of asylum seekers: 20 reasons why criminologists should care, Current Issues in Criminal Justice, 14(1): 9-30.

    Google Scholar 

  • Weber, L. and Bowling, B., 2004, ‘Policing migration: a framework for investigating the regulation of global mobility, Policing and Society, 14(3): 195-212.

    Article  Google Scholar 

  • Wheeler, J., 2005, An Independent Review of Airport Security and Policing for the Government of Australia, Commonwealth of Australia, Canberra.

    Google Scholar 

  • Woodward, J., Orlans, N. and Higgins, P., 2003, Biometrics: Identity Assurance in the Information Age, McGraw Hill, Berkeley, CA.

    Google Scholar 

  • Zuriek, E. and Hindle, K., 2004, Governance, security and technology: the case of biometrics, Studies in Political Economy, 73: 113-137.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer

About this chapter

Cite this chapter

Wilson, D. (2006). Biometrics, Borders and the Ideal Suspect. In: Pickering, S., Weber, L. (eds) Borders, mobility and technologies of control. Springer, Dordrecht. https://doi.org/10.1007/1-4020-4899-8_5

Download citation

Publish with us

Policies and ethics