International Sociology http://iss.sagepub.com
The New Digital Borders of Europe: EU Databases and the Surveillance of
Irregular Migrants
Dennis Broeders
International Sociology 2007; 22; 71
DOI: 10.1177/0268580907070126
The online version of this article can be found at:
http://iss.sagepub.com/cgi/content/abstract/22/1/71
Published by:
http://www.sagepublications.com
On behalf of:
International Sociological Association
Additional services and information for International Sociology can be found at:
Email Alerts: http://iss.sagepub.com/cgi/alerts
Subscriptions: http://iss.sagepub.com/subscriptions
Reprints: http://www.sagepub.com/journalsReprints.nav
Permissions: http://www.sagepub.com/journalsPermissions.nav
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
The New Digital Borders of Europe
EU Databases and the Surveillance
of Irregular Migrants
Dennis Broeders
Erasmus University of Rotterdam
Dutch Scientific Council for Government Policy
abstract: This article analyses the development of three EU migration databases
and their significance for the internal control of irregular migrants. Because bor-
ders and immigration policy alone cannot stop irregular migration, many govern-
ments turn to internal migration control on settled irregular migrants. Surveillance
of this group is aimed at their exclusion from key societal institutions, discourag-
ing their stay and ultimately, the deportation of apprehended irregular migrants.
These are policies in which identification of irregular migrants is crucial. In this
age, registration and identification mean computerized and networked data-
bases. The member states of the EU are currently developing a network of data-
bases in the field of (irregular) immigration. The Schengen Information System
(II), the Eurodac database and the Visa Information System are vast databases,
often including biometric data, aimed at controlling migration flows and identi-
fying and sorting legal and irregular migrants. These systems are able to ‘re-identify’
parts of the population of irregular migrants on the basis of digital traces of their
migration history. It is argued that the digital infrastructure that is now growing
past its infancy is developing into a formidable tool for the surveillance of irreg-
ular migrants in Europe.
keywords: databases ✦ European Union ✦ irregular migration ✦ social sorting ✦
surveillance
Introduction
Irregular migrants pose a tough problem for policy-makers. Political and
popular aversion against the presence of irregular migrants has been
mounting in most West European societies for decades, yet their presence
remains. In European Union policy documents, figures of an annual
inflow of 400,000–500,000 and an EU ‘stock’ of around 3 million irregular
International Sociology ✦ January 2007 ✦ Vol. 22(1): 71–92
©International Sociological Association
SAGE (London, Thousand Oaks, CA and New Delhi)
DOI: 10.1177/0268580907070126
71
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
migrants are often noted, but exact numbers are unknown. Only estimates
of various kinds and sources are available (Jandl, 2004), making the per-
ceived magnitude of their ‘threat’ to the social order to a large extent a mat-
ter of political opinion. Irregular migrants have almost become a ‘public
enemy’ and policy attention for this category of immigrants has, espe-
cially since the 1990s, increased manifold. The fact that the liberal states of
the West have (seemingly) been largely unsuccessful in stopping
unwanted immigration has spurred a public and academic debate on the
question whether or not states have ‘lost control’ on immigration (see, for
example, Cornelius et al., 2004, Freeman, 1998; Guiraudon, 2001; Joppke,
1999; Lahav and Guiraudon, 2000; Sassen, 1996; Soysal, 1994). Politically,
immigration control has reached the top of the agenda and the public
unease in Western Europe fuels the resolve of politicians to dedicate more
resources to the agencies involved. As a result, much has been invested in
the various manifestations of the borders of the EU and its member states.
The image of a Fortress Europe emerged to describe the development of
policies aimed at keeping out (bogus) asylum seekers, irregular migrants
and ‘unwanted’ immigrants in general. The external borders of the EU
(including sea- and airports) have been transformed into formidable
boundaries. Borders have been strengthened with guards, watchtowers,
concrete and fences. They have also been equipped with state-of-the-art
technology, such as infrared scanning devices, motion detectors and video
surveillance. Moreover, visa requirements have been stepped up, and the
visas themselves have been modernized and are increasingly difficult to
forge. And yet, despite funding and political backing for the ‘fight against
illegal immigration’ and the strengthening of borders and border control,
the presence of irregular migrants remains a fact of life for most EU coun-
tries. The gradual realization that borders alone cannot halt irregular
migration has led to a widening of the scope of immigration policy. Border
control is ‘moving away from the border and outside the state’ (Lahav and
Guiraudon, 2000), or is becoming ‘remote control’ (Zolberg, 2002) or is
moving ‘upwards, downwards and outwards’ (Guiraudon, 2001).
Within these many transformations of the European border, this article
focuses on two developments. The first is the development of internal
migration control, i.e. the control on those irregular migrants that scaled
the walls of Fortress Europe or gained entry through legal loopholes and
have settled in one of its member states. The second is the development by
the EU of large-scale electronic surveillance systems, such as the Schengen
Information System (SIS), Eurodac and Visa Information System (VIS),
which can be used for border control as well as internal migration control.
The use of these systems for purposes of internal migration control is pri-
marily at stake here. Active surveillance and exclusion of irregular
migrants by the state depends heavily on information and knowledge
72
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
production. Control depends on information to make society, in the words
of James Scott (1998), ‘legible’ so that the state can act and implement
policy. In the current information age, where filing cabinets are rapidly
replaced with searchable databases and technology simplifies intercon-
nectivity and (remote) accessibility, computerization and technological
innovations are playing the lead role. The use of the SIS, Eurodac and the
VIS for (internal) migration policy is, however, still in its infancy and some
of the systems analysed in this article are not even in operation (SIS II and
VIS). The central question is therefore how this emerging trend of elec-
tronic surveillance is developing and what its significance for the inter-
nal control of irregular migrants will be. Up until now EU policies have
focused on borders and border control. But because of the persistent pres-
ence of irregular migrants, continued attention is shifting from the borders
to the societies of the EU. The electronic databases that are being con-
structed are set to become important tools of surveillance on a European
scale and develop into the new digital borders of Europe.
Irregular Migrants: Candidates for Surveillance?
Irregular migration comes in many shapes and sizes. Many of those we
call irregular migrants started their journey perfectly legal, for example
travelling on a tourist visa, and became ‘illegal’ or ‘irregular’ when they
stayed on after its validity expired. Most typologies of ‘irregular’ migra-
tion are therefore set up around three main criteria. There is legal and ille-
gal entry, legal and illegal residence and legal and illegal employment. These
criteria can combine in many ways and produce many forms and
‘degrees’ of irregularity (see, for example, Tapinos, 2000: 18; van der Leun,
2003: 19). As legal entry does not preclude the possibility of later ‘irregu-
larization’, border policy alone cannot be the sole policy response to ‘irreg-
ular migration’. In recent years, policies to counter irregular immigration
have increasingly turned inwards. Border controls remain important but
in light of their ‘structural flaws’ have to be supplemented with policies of
discouragement of those unwanted aliens that have passed the border.
This shift towards internal migration control comprises a wide array of
policy measures such as employer sanctions, exclusion from public serv-
ices and surveillance by the police (Cornelius et al., 2004; van der Leun,
2003). The focus on internal migration control draws attention to two
interrelated challenges for the state (Torpey, 2000: 33).
The first dimension, territorial access, chiefly raises questions about the
capacity of states to identify citizens, distinguish them from non-citizens
and regulate their movement in keeping with policy objectives. The sec-
ond dimension, establishment, concerns the extent to which states may be
73
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
able to exclude non-citizens from opportunities for work, social services or
simply unperturbed existence once they have already entered the territory.
Engbersen (2001: 242) suggests that Fortress Europe may be turning into
a panopticon Europe in which governments shield their public institu-
tions and labour markets by means of advanced identification and control
systems. The metaphor of the panopticon comes from the work of
Foucault (1977), who in turn borrowed the term from Bentham’s design
for a prison in which individual prisoners could be seen at all times by a
centrally located guard who was invisible to them. The panopticon has
become a central metaphor in the literature on surveillance, which is of
course a much broader development than the internal control over irreg-
ular migrants that is the focus of this article. In Foucault’s writing, there is
an intimate connection between power and knowledge. According to his
theory, the panoptic power of vision and constant surveillance are meant
to go beyond mere control of the inmates. The final aim is to discipline the
individual under surveillance. The idea is that the prisoners under the
‘perpetual eye’ will experience a process of discipline in which they lose
the opportunity, capacity and will to deviate. ‘The hope is, as Foucault put
it, that they “internalize the gaze” so that the operation of power becomes
cheaper, easier and more effective’ (Gilliom, 2001: 130). The panopticon
Europe that is being built to control irregular immigration, however, dif-
fers from the prison and correction system that inspired its name. First, the
panopticon Europe, unlike most of the surveillance systems the state has
created, is not primarily aimed at citizens or even subjects of the state. The
system of immigration databases under construction is meant to gain
knowledge on the actions and movements of non-citizens. Moreover, they
are not watched with the ultimate aim of structuring and moulding their
behaviour in line with socially accepted standards (as defined by the
state). The aim is not to get them in line, but to get them out. Second, the
element of correction, of the ‘internalization of the gaze’, is not a central
element of the panopticon that the member states of the EU are construct-
ing. Engbersen (2001), borrowing from Bauman’s (1998) analysis of mod-
ern American prisons, claims that the aim is not correction, but exclusion.
‘Panopticon Europe is not a “factory of correction”. Its aim is not disci-
plining and correcting undesirable migrants. Panopticon Europe is
designed as a factory of exclusion and of people habituated to their status of
the excluded’ (Engbersen, 2001: 242). In other words, the state gathers infor-
mation on the doings and whereabouts of irregular migrants with the
explicit aim to exclude them from both its territorial and membership asso-
ciations. When the state tries to control the institutions and networks irreg-
ular migrants use and need for their daily lives, it becomes a more classical
‘panoptic’ effort. This is a strategy of exclusion through the delegitimization
74
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
and criminalization of all those who may be employing, housing or aiding
irregular migrants. Seen from this perspective, the panopticon does con-
tain some elements of correction and discipline as it aims to discipline the
social networks and institutional surroundings of irregular migrants. The
focus on exclusion can be explained by the fact that irregular migrants are
perceived to be a threat to the (social) order. Rose (2000) states that gov-
ernmental policies aimed at exclusion seek to manage anti-citizens and to
neutralize the dangers they pose. He sums up a succession of figures that
have haunted political minds since the 18th century because they ‘seem to
condense in their person, their name, their image, all that is disorder, dan-
ger, threat to civility: the vagrant, the pauper, the degenerate, the unem-
ployable, the residuum, the social problem group’ (Rose, 2000: 330). In
modern times, the image of the irregular migrant can be added to this list.
Irregular migrants did not always have such a bad image in Western
Europe. Only when the oil crisis and deindustrialization summoned in the
economic recession did (irregular) immigration pass from being a ‘solution’
to becoming a ‘problem’ (Sciortino, 2000; see also Bigo, 2004; Engbersen,
1999). Against this background, irregular migrants gradually transformed
from ‘adventurers’ into ‘vagabonds’. This sociopolitical shift in policy is
however not entirely matched in socioeconomic reality. Irregular migrants
were and are drawn to Europe because of the labour market, though con-
ditions and possibilities vary from member state to member state. In most
countries of the EU, irregular migrants constitute a ‘flexible’ and cheap
source of labour to perform the so-called 3d (dirty, demeaning and dan-
gerous) jobs in certain sectors of the labour market. Governments are often
well aware of illegal employment in agriculture, horticulture and con-
struction, but do not always implement policies to counter these practices.
This holds true especially for the US, where Cornelius (2005) has shown
the huge gap between the rhetoric and funding of the patrolling of the
US–Mexican border and the virtual non-existence of internal controls on
the labour market (i.e. control on employers), but also for the southern
member states of the EU. Castles (2004: 223) even claims that the resulting
paradox is in fact the real, yet undeclared, object of state policy. In his
view, irregularization can be seen as ‘an attempt to create a transnational
working class, stratified not only by skill and ethnicity, but also by legal
status’.
Nonetheless, irregular migrants are still a direct challenge to the state’s
declared notions on legal mobility and territoriality in a globalized world.
Torpey (1998) described the idea of the state monopolization of the legit-
imate ‘means of movement’. In this process, the state expropriated the
freedom to move from the private individual and made it dependent on
state approval and authorization. This monopolization was to a large
extent executed through the introduction of the passport. The passport
75
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
connected an individual with a formal and documented identity that can
only be issued by the state. This document became the prerequisite for
moving across borders. The effective execution of this monopoliza-
tion required identification, documentation and the creation of elaborate
bureaucracies and technologies. Surveillance and (international) mobility
thus became closely entwined. As Boyne (2000: 287) puts it: ‘The prime
function of surveillance in the contemporary era is border control. We do
not care who is out there or what they are doing. We want to see only
those who are entitled to enter.’ Yet, this short quote outlines the prob-
lematic coherence between irregular migration, surveillance and exclu-
sion in a nutshell. The fact that you only want to see those who are
entitled to enter means that you have to care who is out there and what
they are doing. Once irregular migrants have crossed the border it takes
information and knowledge on who they are and what they are doing to
be able to effectively exclude and extradite them again. The practical
organization of exclusion is a labour- and information-intensive process.
Torpey has argued that the modern state’s capacity to penetrate more
deeply and effectively depends on its ability to embrace those societies.
As states grow larger and more administratively adept, they can only
penetrate society effectively if they embrace society first. ‘Individuals
who remain beyond the embrace of the state necessarily represent a limit
on its penetration’ (Torpey, 1998: 244). Irregular migrants are of course
both likely – they are after all ‘irregular’ because they do not fit into any
legal administrative category – and eager to stay beyond the embrace of
the state. Internal migration control is aimed at embracing them and the
institutions and circles in which they move in order to exclude them.
Exclusion means separating the ‘ins’ from the ‘outs’, the ‘deserving’
from the ‘undeserving’. Registration and documentation have been the
prime tools to do this. It is not a coincidence that irregular migrants are
often referred to as ‘undocumented aliens’ or ‘sans-papiers’. In the com-
puter age, surveillance and registration are loosening their historical
bonds with pen and paper. Computerization and digitalization are mak-
ing their mark on surveillance. Gilliom (2001: 129) points out that ‘the
turn to the computerization of surveillance and administration represents
a revolutionary shift in administrative power of the state system’. Filing
cabinets and card indexes have been, or are being, transformed into
searchable digital databanks. Information and communication technol-
ogy has made it possible to link various databases and to create networks
between them. Communication technology has ‘liberated’ registrations
and administrations from fixed places and locations through remote
accessibility. This interconnectivity and accessibility of information
makes cross-referencing potentially a matter of seconds. From a purely
technological perspective, the limit may indeed be approaching the sky.
76
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
The immigration databases discussed in this article are just one example
of the broader transformation of borders, control and surveillance. The
‘potent’ combination of technological advances and the fear of terrorism
have facilitated many new surveillance programmes, uncovered existing
ones and made new connections possible. A prime example is the ‘Total
Information Awareness’ initiative of the US Pentagon that connects a mul-
titude of, hitherto unconnected, electronic sources of personal data to
detect suspicious patterns of behaviour (see Lyon, 2003: 92–4). Whether or
not governments connect and combine different bodies of information
will increasingly become a matter of legal constraints, as the technologi-
cal constraints are losing their relevance quickly. However, the main effect
of technology will be a matter of changing methods rather than goals and
intentions. Surveillance will always be used for ‘social sorting’, for the
classification of populations as a precursor to differential treatment (Lyon,
2004: 142). Surveillance technology originating in EU cooperation will be
no different.
Growing Past Infancy:
A Network of European Databases
Since the Treaty of Amsterdam, which entered into force in 1999, political
attention for irregular migration became more structural and gradually
took on a grim tone: policy on irregular migration became the ‘fight
against illegal immigration’. This was in part a ‘heritage’ of the Schengen
cooperation. The Schengen agreement was originally negotiated outside
the normal EU institutions. The agreement aimed at giving real meaning
to the long-standing European goal of free movement by abolishing the
internal borders among the signatory states. However, it was the later
Schengen Convention – that was basically an inventory of ‘flanking
measures’ – that associated ‘Schengen’ with securitization and the image
of Fortress Europe. The convention is the starting point for a wide range
of instruments for the registration and surveillance of large population
groups in the countries concerned (Mathiesen, 2001). The Schengen agree-
ments – including the Schengen Information System (SIS), its ‘database-
flagship’ – were integrated into the EU through the Treaty of Amsterdam.
Measures taken in the post-Amsterdam period include strengthening of
borders and carrier sanctions, the adoption of a regulation for determin-
ing the member state that is responsible for an asylum application (known
as the Dublin II regulation, as it replaced the original Dublin Convention).
Dublin II is linked with the Eurodac central database that contains the fin-
gerprints of all asylum claimants over the age of 14. A database that has
gradually taken on the secondary aim of preventing irregular migra-
tion (Cholewinski, 2004). Visa policy was stepped up for those countries
77
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
considered to be the major sources of irregular migration. In order to create
an effective common visa policy, the member states are working on a Visa
Information System (VIS), a database aimed at registration of issued and
refused visas, copies of travel documents and biometric identifiers.
Furthermore, initiatives were taken to promote cooperation among mem-
ber states in matters of expulsion policy, and ‘illegal immigration’ became
part and parcel of EU development aid through the recording of readmis-
sion clauses in, for example, the Contonou Agreement between the EU
and the ACP countries. The fight against illegal immigration also targeted
the traffickers and smugglers who facilitate illegal migration to the EU
(Cholewinski, 2004; Mitsilegas et al., 2003; Samers, 2004). At the top of the
political agenda now is the comprehensive plan to combat illegal immi-
gration and trafficking in human beings, which was adopted in 2002. The
ambition of a comprehensive plan for all aspects of illegal immigration
indicates that EU policy is ‘moving away from the border’. Indeed, bor-
der management, though vital and politically visible, is just one of the
main issues on the list. The notion that erecting gates alone lacks effec-
tiveness if migrants who pass the hurdle of border controls – legally
or illegally – are able to live an unimpeded life in illegal residence, has
sunk in at the EU. This is most clearly expressed in the European
Commission’s Return Action Plan of 2002, which was to ensure that ‘the
message gets across that immigration must take place within a clear legal
procedural framework and that illegal entry and residence will not lead
to the desired stable form of residence’ (quoted in Samers, 2004: 41). In
other words, the new comprehensive approach is moving away from the
geographical border, both outwards (development aid, control through
consulates, etc.) and inwards (data exchange, labour market policy and
expulsion policy). The internal migration control, data collection and sur-
veillance will be equipped by EU data systems, such as the SIS, Eurodac
and the VIS.
If anything, the network of databases that the EU is constructing is a fast
moving target. Technology and fear of terrorism have been the wind beneath
the wings of policies aiming at a more ‘secure Europe’. The war against
terror provided the lever to lift technology over political and legal borders
that were previously regarded as solid and lasting. When it comes to the
European databases, security is primarily weighed against civil liberties such
as privacy as an expression of personal freedom. In his research on electronic
surveillance in social welfare, Gilliom (2001) suggests that the dichotomy
privacy–surveillance is not the only, and perhaps not even the most impor-
tant, perspective on these matters. Surveillance should also be seen as an
expression of political domination that is tied to a specific time: ‘Surveillance
programs are . . . expressions of particular historical and cultural arrays of
power – program goals, criteria and data sources all express social, political
78
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
and technological conditions of the times’ (Gilliom, 2001: 128). The emerging
architecture of European databases may prove an interesting case when
viewed through a lens of (state) power and historical context.
Schengen Information System (SIS), SIRENE and SIS II
‘Schengen’ operates two comprehensive registration and surveillance
systems. The first is the Schengen Information System (SIS), a data-based
registration and surveillance system. The SIS is in operation, but is also
under renegotiation and redevelopment in light of its operability in an
enlarged EU of 25. The need to design a SIS II also prompted member
states to place new ‘wish lists’ on the table. The other system, SIRENE,
which stands for Supplément d’Information Requis a l’Entrée Nationale,
is twinned with the SIS as an auxiliary or supplementary system.
The SIS is made up of a central database (called C-SIS) that is physically
housed in a heavily guarded bunker in Strasbourg and of national SIS-
bases (called N-SIS) in all of the Schengen states. Its purpose is to main-
tain ‘public order and security, including State security, and to apply the
provisions of this convention relating to the movement of persons, in
the territories of the contracting parties, using information transmitted by
the system’ (Article 93 of the Schengen Convention, quoted in Mathiesen,
2001: 7). This broadly defined purpose provides the legal base for a large
data system that stores information on persons and objects. There are five
categories of persons on whom information may be entered into the SIS.
In light of internal surveillance on irregular migrants the entries under
Article 96, ‘persons to be refused entry to the Schengen area as unwanted
aliens’, are the most important. Of the objects than can be entered into the
SIS the most important category is that of lost and stolen ‘identity
papers’, which already in 1998 constituted the largest number of entries.
Information on persons that may be stored in the SIS consists of a rather
basic and limited set of information: first and last name, known aliases,
first letter of the second name, date and place of birth, distinctive physi-
cal features, sex and nationality, whether persons are considered to be
armed and/or dangerous, reason for the report and action to be taken.
Data are entered according to national standards and the national author-
ities are responsible for their accuracy. Not all authorities have overall
access to the system; immigration authorities for example only have
access to the data on irregular migrants. The system is a so-called hit/no
hit system: a person is fed into the computer and produces a ‘hit’ if he or
she is listed in the database. Even in the case of a hit, not all information is
readily accessible. Rather, the computer ‘replies’ with a command, such as
‘apprehend this person’ or ‘stop this vehicle’ (de Hert, 2004: 40). According
to the German Interior Ministry, there were in 2005 more than 30,000
terminals in the Schengen area on which the SIS can be accessed.
79
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
All in all, the SIS is a rather basic system, with a limited range of
options for the user. Which is exactly why SIRENE was added. The SIS
was not designed for detailed data exchange and in practice it serves as
an index to the associated SIRENE system, which facilitates the exchange
of complementary information, including fingerprints and photographs.
Although SIRENE is often described as the operational core of Schengen,
there is no reference to the system in the Schengen Convention (Justice,
2000: 19). The factual data are stored on the SIS but the SIRENE sys-
tem makes it possible to exchange ‘softer’ data such as criminal intelli-
gence information. In order to make this a ‘convenient’ arrangement, the
national SIS and the SIRENE bureaus are in most countries entrusted to
the same organization, usually a central police department responsible
for international cooperation. It is obligatory to notify the state that made
an entry when the SIS produces a hit. After all, this state is responsible for
its accuracy and is able to double-check. When it comes to irregular
migrants, however, the rules are less strict. Hits are only reported in
exceptional cases and the standard procedure is to refuse entry (at the
border) or to arrest, interrogate and turn over to the authorities responsi-
ble for expulsion when the person in question is detected inside the coun-
try (Justice, 2000: 22).
Though the SIS is an instrument intended to maintain ‘order and secu-
rity’, its main preoccupation seems to be with illegal immigration (Guild,
2001). In 1999, the overwhelming majority of the entries on persons were
on ‘unwanted aliens to be refused entry to the Schengen countries’ (Justice,
2000: 8). The figures on the SIS since 1999 (see Table 1) suggest that this still
holds true. The total number of entries is increasing at a steady pace: the
SIS now holds about 12 million entries. Yearly averages for the entries on
persons hover around 800,000 entries, and as can be seen from Table 1, the
entries on irregular migrants (under Art. 96) take up the lion’s share of these.
The hits on irregular migrants are relatively low and recently even
dropping. As a rule of thumb one might say that the hits represent about
Table 1 Selected Entries and ‘Hits’ in the SIS, 1999–2004
1999 2000 2001 2002 2003 2004
Entries 8,687,950 9,697,252 9,856,732 10,541,120 12,274,875 11,746,847
Entries on 795,044 855,765 788,927 832,312 874,032 883,511
persons
Entries on 703,688 764,747 701,414 732,764 775,868 785,631
Art. 96
Hits on 5925 5469 6790 6156 5942 4873
Art. 96
Source: Bundesministerium des Innern (2002, 2003, 2004, 2005).
80
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
1 percent of the entries on irregular migrants. Annually, about 6000 irregular
migrants produce a ‘hit’ in the SIS, which means that they will be refused
entry or a visa or, when they are inside a member state, there may be an
information exchange (through SIRENE) to make expulsion possible.
Whether or not this actually happens cannot be determined on the basis
of these data, and it is unlikely that the authorities keep records of such a
nature, or when they do, make them available to the public.
The SIS proved to be a popular instrument. Even the UK, which never
acceded to Schengen and negotiated an opt-out for its acquis when it was
incorporated into the EU at Amsterdam, does participate in the SIS through
a selective opt-in. The rapid growth of the Schengen group, even out-
side the EU through association agreements with Norway, Iceland and
Switzerland, and the prospect of further enlargement of the EU, led to the
decision to develop a second generation of the system as early as December
1996. This so-called SIS II should accommodate the new members and facil-
itate new, additional functions (de Hert, 2004). The member states aim to
have SIS II operational at the end of 2006. The Justice and Home Affairs
Council in its conclusions of 6 June 2003 made it very clear that SIS II would
have to be a ‘flexible tool that will be able to adapt to changed circum-
stances’ (CEU, 2003: 18). The prospect of a new generation of the system has
prompted member states to put forward all kinds of suggestions to increase
the possibilities and the use of the system. The Joint Supervisory Authority
of Schengen (2004: 14) signalled two major trends in its last yearly report. It
noted repeated moves to add new categories of information, such as bio-
metric data, and a second trend to allow other (new) organizations, such as
Europol, access to the data held in the SIS. Many of these proposals amount
to a departure from the hit/no hit character of the SIS, making it more of an
‘investigative’ system. Suggestions to link SIS II with other European
systems are an even bigger step further in the architecture of the European
network of databases. Some documents even consider the possibility to
integrate all systems into one European Information System (Brouwer,
2004: 5). All in all, there is ample evidence of what is called ‘function creep’.
Systems originally intended to perform narrowly specified functions are
expanded to react to new (political) circumstances, thereby sidestepping or
pushing the limits of legal frameworks meant to protect issues of privacy
and data protection. The exact functions of SIS II are still not entirely clear.
A list of general indications for the new functionalities of SIS II can found
in the Justice and Home Affairs Council conclusions of June 2003 (CEU,
2003). Moreover, in June 2004 the Council adopted ‘conclusions on the SIS
II functions’, but the text on these functions is nowhere to be found: there is
only a statement that they have been adopted (CEU, 2004a). The inclusion
of biometric information and increased access to the system, however, still
seems to be firmly on the agenda.
81
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
In December 2003, the Commission published a communication on the
development of SIS II and on the possible synergies with the VIS, which
is also in development (CEC, 2003). The basic architecture of the SIS – a
central database and national bureaus – will be kept for SIS II and will
also serve as the model (or mirror) for the VIS. The uncertainties about
the functionalities of SIS II were dealt with in a ‘flexible manner’: pend-
ing the decision by the Council ‘SIS II must be designed and prepared for
biometric identification to be implemented easily at a later stage, once the
legal basis, allowing for the activation of such potential functionalities,
has been defined’ (CEC, 2003: 16). One might say that technology is lead-
ing the way and politics will merely have to follow. The new system does
not come cheap. The Commission estimates that SIS II will cost about €28
million to develop and then about €5 to 6 million annually to run the cen-
tral part of the system. The costs of the national infrastructure and SIS
interfaces will be borne by the member states.
Eurodac
A second important European database is the Eurodac system, which is
linked to the Dublin II regulation, and its predecessor, the Dublin
Convention. The objective of the Dublin Convention was to curtail the
possibilities for ‘asylum shopping’ – i.e. individuals entering into the asy-
lum procedure in more than one country successively – and to determine
which state is responsible for an asylum claim. In order to do this the
member states had to devise a system that could determine whether or
not an asylum claimant had already lodged a claim in another member
state. To this end they decided to create a community-wide system for the
comparison of fingerprints of asylum claimants named Eurodac (an
acronym that stands for European Dactylographic system). The develop-
ment of the system was a long and politically rocky ride. The decision to
set up the system may have been taken in 1991, but it would take until
January 2003 for the system to become operational. By then, the scope of
Eurodac was significantly widened. Originally, it was meant to contain
just the prints of asylum seekers but in 1998 Germany pushed for the
inclusion of irregular migrants (Aus, 2003: 12). Irregular migrants were
already following in the footsteps of asylum seekers as the ‘most prob-
lematic’ group of immigrants. In 1997, the Schengen Executive Committee
had concluded ‘that it could be necessary to take the fingerprints of every
irregular migrant whose identity could not be established without doubt,
and to store this information for the exchange with other member states’
(quoted in Brouwer, 2002: 235). As the SIS could not accommodate the
registration of fingerprints, the member states had to look elsewhere.
Mathiesen (2001: 18) asserts that the ‘history of the issue of fingerprinting
82
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
“illegal immigrants” shows how Schengen and Eurodac concerns are
intertwined’.
Eurodac became operational in January 2003 and started with an empty
database. Since this date the database has been ‘filled’ with three cate-
gories of fingerprints. Category 1 are the prints of all individuals of
14 years and older who apply for asylum in one of the member states.
These are the prints that are necessary to detect cases of ‘asylum shopping’
in light of the original goal of the Dublin Convention. Category 2 contains
the fingerprints of irregular migrants apprehended in connection with the
irregular crossing of an external border and who could not be turned back.
Category 3 contains the fingerprints of aliens found illegally present in
one of the member states. These last prints are checked against category
1 and 2 but are not stored. It is this category especially that indicates the
development of internal control on irregular migrants by means of EU
surveillance systems such as Eurodac. The transmission of this category of
data is optional for the member states (CEC, 2004a). Like the SIS, Eurodac
is a hit/no hit system and the database contains only limited information.
The data that are taken up in the central database are: the member state of
origin, place and date of application for asylum, finger print data, sex, ref-
erence number used by the member state of origin, date on which the fin-
ger prints are taken and date on which the data are transmitted to the
central unit (Brouwer, 2002: 237). Eurodac is a relatively cheap system; the
community budget allowed € 8.5 million for 2000 and then about € 1 mil-
lion annually for the years until 2003, a total of € 11.6 million. At the end
of this period the Commission had managed to spend much less (€ 7.5
million) than foreseen. There are now two evaluations of Eurodac avail-
able that provide insight into the growing use and ‘effectiveness’ of the
database (see Table 2).
The Eurodac database fills up rather quickly in its first years of opera-
tion. Most of the entries are related to asylum claimants and most of the
hits are ‘detections’ of double (or even multiple) asylum claims filed by
one individual (its main function for the Dublin system). More sig-
nificantly, the number of entries and ‘hits’ on irregular migrants appre-
hended inside a member state (category 3) are steadily rising as well. The
Commission considers the entries in category 2 to be too low when com-
pared to expectations and calls upon the member states to ‘carry out their
legal obligations’. However, some authors (Aus, 2003; Brouwer, 2002)
have argued that fingerprinting individuals who are apprehended while
crossing the border illegally is hardly the logical ‘thing to do’ from a
national perspective. ‘As this fingerprinting can only have as result that
the person concerned, who is later found in another Member State, will
be sent back to the former Member State; one can reasonably doubt if the
authorities of the first state will be very willing to execute the Eurodac
83
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
Table 2 Entries and 'Hits' in Eurodac (2003 and 2004)
Jan 2003–Jan 2004 2004
Category Entries ‘Hits’ Entries ‘Hits’
a
Asylum claimants (cat. 1) 246,902 19,247 232,205 40,759a
Aliens crossings the 7,857 673b 16,183 2,846b
external border
irregularly (cat. 2)
Aliens found illegally 16,814 1181c 39,550 7674c
present in a member
state (cat. 3)
Source: CEC (2004a, 2005).
a
Fingerprints of an asylum seeker sent in by a member state were matched against the
stored fingerprints of an existing asylum applicant (cat. 1 against cat. 1).
b
Fingerprints of an asylum seeker sent in by a member state were matched against the stored
fingerprints of an alien who illegally crossed the external border (cat. 1 against cat. 2).
c
Fingerprints sent in of an alien found illegally present within a member state are matched
against the stored fingerprints of an existing asylum applicant (cat. 3 against cat. 1).
Regulation’ (Brouwer, 2002: 244). Despite this logic, the Eurodac system is
already gaining importance for the European ‘fight against illegal immi-
gration’. The number of hits for irregular migrants found inside member
states went from 1181 in 2003 to 7674 in 2004. Moreover, at present
Eurodac only contains asylum data from 2003 onwards, which means
that only irregular migrants who have a recent asylum history will pro-
duce a hit in the system. Many of the irregular migrants currently pres-
ent in the member states will have an older asylum history – if they have
an asylum history at all – and would not show up in a Eurodac search. As
the database grows and holds information over a longer period of time,
the number of hits is likely to grow. The value of the system for the mem-
ber states lies in its contribution to expulsion policy. One of the big
bottlenecks in expulsion policy in most countries is the lack of information
on the identity and country of origin of irregular migrants, without which
expulsion is practically impossible. Irregular migrants who cannot be
identified are ‘constitutionally rather invulnerable to expulsion’ (van der
Leun, 2003: 108). A ‘hit’ in the Eurodac system can provide a link to
a dossier on an asylum application made in another country that will
contain information and perhaps documentation on the identity and the
country of origin of an irregular migrant that is silent about his or her
identity. In other words, it could re-identify him or her. Just as the SIS and
SIRENE systems are used to exchange supplementary information to
help make expulsion possible, Eurodac could function in a similar way.
84
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
Visa Information System
From the perspective of ‘the fight against illegal immigration’, the Visa
Information System (VIS) is the next logical step in the emergent network of
databases. In general, irregular migrants have three possible ‘migration histo-
ries’. They either crossed the border illegally (with or without help), they were
asylum seekers and stayed after the claim was rejected, or they came on a
legal visa and stayed after its validity expired. The network of databases
develops accordingly. Irregular immigration itself defies registration, but
irregular migrants found in member states can be registered in the SIS. Those
who enter through asylum procedures will be registered in Eurodac and
those who enter on a legal visa will, in the future, be registered by the VIS.
Control over identity has taken a central place in much EU discussion on (ille-
gal) immigration, terrorism and the (perceived) ‘links’ between them.
According to Guild (2003), this emphasis on identity control has elevated
visas to the prime, and in the eyes of the member states, most trustworthy
method of identification of third country nationals: ‘Documents issued by
non-Member States are no longer definitive for determining identity. . . . The
Union takes over the task of identifying all persons who seek to come to the
Union and determines where they belong’ (Guild, 2003: 344). Under the head-
ing of ‘measures to combat illegal immigration’, the European Council con-
clusions of Seville (June 2002) called for ‘the introduction, as soon as possible,
of a common identification system for visa data’ (CEU, 2002: 8). This new sys-
tem became the Visa Information System that is currently being developed. In
December 2004, the Commission presented a proposal for a regulation on the
VIS to the Council and the European Parliament. This proposal defined a
broad aim for the VIS:
The VIS shall improve the administration of the common visa policy, the con-
sular cooperation and the consultation between central consular authorities in
order to prevent threats to internal security and ‘visa shopping’, to facilitate
the fight against fraud and checks at external border checkpoints and within the ter-
ritory of the Member States, to assist in the identification and return of illegal immi-
grants and to facilitate the application of the Dublin II regulation. (CEC, 2004b:
3, emphasis added)
The central importance of the system is for immigration policy, but for
the purpose of internal surveillance on irregular migrants the VIS can serve
as an instrument to detect and identify them on the territory of member
states. It will make it possible to identify those irregular migrants who
travelled into the EU legally at any border, and then ‘overstayed’. Once
identified, the system can facilitate the provision of travel documents for
undocumented illegal residents, on the basis of the exchange of information
through the VIS (Samers, 2004). In this way, the VIS will also function as a
85
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
system of re-identification for illegal aliens who travelled legally into the
EU, but try to hide their identity when apprehended.
The VIS is a very ambitious project and requires a technically powerful
system. On the basis of its feasibility study on the VIS, the Commission
aimed for a system with a capacity to connect at least 27 member states,
12,000 VIS users and 3500 consular posts worldwide. This was based on the
estimation that the member states would handle 20 million visa requests
annually (CEC, 2003: 26). The technical set-up of the system is an exact mir-
ror of SIS II. Just like the SIS, the new visa system will have a central data-
base (C-VIS), an interface at the national level (N-VIS) and local access
points (terminals) for the police, immigration authorities and consular
posts. The magic words in the development of SIS II and the VIS are ‘inter-
operability’ and ‘synergy’. The systems are ‘sharing’ in the development
costs and more importantly they will ‘share a common technological plat-
form’ so that the systems are compatible, interoperable and able to cross-
reference, couple and maybe even exchange information. The databases
themselves will remain separate (containers) but at the functional level SIS
users can (will? must?) have their entries and queries checked against the
VIS database and vice versa. The central systems of the VIS and the SIS will
however be direct neighbours in a physical and geographical sense, as they
are to be ‘hosted in the same location’, which means they will both be
housed in the SIS bunker in Strasbourg. The political wish for increased
interoperability also includes the Eurodac system, as was clearly set out in
the so-called ‘Hague Programme’, which is the new agenda for the next
five years for EU policies on Justice and Home Affairs. Article 1.7.2 of this
new agenda calls for maximization of the ‘effectiveness and interoperabil-
ity of EU information systems in tackling illegal immigration’ and specifi-
cally names Eurodac alongside SIS II and the VIS (CEU, 2005). As with SIS
II, the European Council has already proposed to grant ‘internal security
authorities’ access to the system. This new example of ‘function creep’
caused the European Data Protection Supervisor (EDPS, 2006: 2) to remind
the member states that the VIS was developed in ‘view of the European
visa policy, not as a law enforcement tool’.
As with Eurodac, the member states agreed that the VIS should start
with an empty database. As with SIS II, there is less agreement on the data
that should be stored in the VIS. The disagreements have technical, finan-
cial and political grounds. Data that will be entered into the VIS for certain
are the so-called alphanumeric data on the applicant (the current applica-
tion form); data on visas requested, issued, refused, annulled, revoked or
extended; photographs; fingerprint data; and links to other applications.
The alphanumeric information also includes the details of the person or
company that issued an invitation or is liable for the cost of living during
the stay (CEC, 2004b: 14–15). This means that the family members and
86
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
companies that ‘vouch for’ the visa recipient – and who may be held
accountable should he or she overstay the visa – are also registered. For
these groups, the registration by a panopticon Europe may well have a
direct disciplining effect. The inclusion of fingerprints in the VIS is not
problem-free. The use of biometrics on such an unprecedented scale will
bring the system, according to the Commission’s feasibility study, into a
new and largely unknown dimension, both technically and financially
(CEC, 2003: 26). Even without the inclusion of fingerprints, the VIS will not
be cheap. In the best scenario (optimal synergy with SIS II), the VIS will
cost € 15 million to develop and about € 10.6 million annually to operate.
If biometrics and supporting documents are included, the figures rise dra-
matically. The development investment will then amount to almost € 157
million and the annual operating costs will rise to € 35 million (CEC, 2003:
29–30). Technical and legal difficulties (member states’ rules concerning the
storage of fingerprints) have made it necessary to implement the system in
two phases. The aim is to have the basic functions up and running by
December 2006 and the biometric function one year later (CEC, 2004b). The
high costs do not discourage the member states, who reaffirmed their
resolve to have the system – including biometrics – operational as soon as
possible in the ‘Hague Programme’.
Conclusions: The New Digital Borders of Europe?
EU policy on illegal immigration is turning inwards and is being equipped
with a number of computerized information systems for internal surveil-
lance. The analysis of the SIS, Eurodac and the VIS shows that these sys-
tems (will) operate on an unprecedented scale. A scale that is likely to grow
even further through technical advancements and the political wish to
increase the ‘interoperability’ of the systems created. Steps towards linking
the various databases are now being taken and have not met with substan-
tial resistance. It is also likely that the mere existence of the data stored in
these systems will tempt politicians and bureaucrats to use them for goals
other than for which they have been constructed. This so-called ‘function
creep’ or ‘surveillance creep’ is not an imaginary fear. After all, Eurodac’s
goals were ‘broadened’ along the way to include irregular migrants, and
the fight against terrorism has opened the door to the SIS for new organi-
zations that were originally kept out for a reason. In the first days after the
terrorist attacks in the US, the Commission proposed that ‘Europol,
Eurodac and the SIS can also substantially assist in the identification of ter-
rorist suspects’, at that time the Eurodac system was not even operational
(Aus, 2003: 32). More recently, the VIS was also added to that list.
If the internal part of ‘the fight against illegal immigration’ is understood
as a matter of detection, identification and exclusion, then the network of
87
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
databases is an impressive tool indeed. The amount of data stored on potential
irregular migrants is enormous and is set to grow at great speed as the
Eurodac database fills up and the VIS and SIS II become operational. In par-
ticular, the information stored in the Eurodac and VIS databases – biometric
identifiers coupled with information on a documented identity consisting of
application papers, etc. – may become important instruments of detection
and identification. Torpey’s notion that the state first has to embrace society
if it aims to penetrate and control it effectively has most certainly been
adhered to. If anything it is a massive effort to embrace. These European
databases seek to embrace as many immigrants from ‘suspect’ legal cate-
gories (asylum) and ‘suspect’ countries of origin (visa) as possible, in order to
control the percentage of immigrants who cross the line into irregularity at a
later stage. These systems can be used to re-identify irregular migrants who
try to conceal their identity in order to avoid expulsion. In this way, the ‘iden-
tity routes’ of asylum and visa may get cut off, which might in turn provoke
the side effect of an increasing dependence of irregular migrants on smug-
gling and trafficking organizations.
It is harder to tell whether the network of databases actually constitutes
a net that works. This would mean that there is more ‘exclusion’ than
before. In an age in which rights, or in this case lack of rights, are coupled
to identities through registration, a network of databases aimed at regis-
tering (potential) irregular migrants is bound to make life inside the
member states of the EU harder. The VIS will also register companies and
family members, which may have a disciplining on their willingness to
act as guarantor. Here then, the panopticon Europe may be disciplining
indeed. Much will depend on the day-to-day use of these systems in the
affairs of police, immigration officers and other authorities that have
access to them. Are the already limited points of access to work, welfare
and other institutions for irregular migrants being curtailed further on
account of these information systems? Does, or will, the number of expul-
sions of irregular migrants rise because the information in the systems
can re-identify and redocument undocumented aliens? These are unan-
swerable questions on the basis of the available information. Moreover,
all systems are at the beginning of their (new) lifespan: the VIS and SIS II
are not operational yet and Eurodac has only just entered its third year of
operations. It is too early to determine what the impact of the new digi-
tal borders of Europe is or may become. But if Michael Mann’s claim
(quoted in Torpey, 2000: 37) that the ‘unusual strength of modern states is
infrastructural’ is true, then the EU is currently laying the foundations for
an impressive digital infrastructure aimed at identification and exclusion.
This emerging network of databases also stretches the limits of the
panoptic metaphor. On the one hand, they are vastly expanding the
88
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
state’s gaze on previously hidden parts of its ‘population’. The production
of knowledge on identities and migration histories increases the state’s
leverage on irregular migrants. Furthermore, from the perspective of
irregular migrants the panopticon Europe can indeed be considered a
‘factory of exclusion’, as it ultimately aims to facilitate expulsion. Some
even consider exclusion and marginalization of irregular migrants to be
an (unspoken) policy goal that results in a docile and readily exploitable
workforce (see Castles, 2004). However, the panopticon metaphor begins
to disintegrate somewhat when we look at the mobility and fluidity of its
modern ‘inmates’. The power derived from panoptic surveillance in the
modern age has become extraterritorial and is no longer fixed to a place
(see Bauman, 2000). The panoptic focus on territory has shifted to a focus
on population, and in the case of surveillance on (irregular) migrants, it
has shifted to an internationally mobile population. New technologies of
computerization and the construction of digital databases have further
favoured the strategy of tracing the movement of people over the old
strategy of using discipline to attach them to a territory (Bigo and Guild,
2005: 3). This new surveillance of motilities also mobilizes and digitalizes
the border itself, as can be seen from the emerging network of EU immi-
gration databases. When SIS II, Eurodac and the VIS are all completed
and fully operational, the EU will have a new digital border that will sur-
vey the immigrant population, rather than the territorial border (see Bigo
and Guild, 2005; Deleuze, 2002).
Acknowledgements
The author would like to thank Godfried Engbersen, Willem Schinkel,
Monika Sie Dhian Ho and four anonymous reviewers for their helpful
comments on earlier versions of this article.
References
Aus, J. (2003) ‘Supranational Governance in an “Area of Freedom, Security and
Justice”: Eurodac and the Politics of Biometric Control’, DEI Working Paper No.
72, Sussex European Institute; at: www.sussex.ac.uk/sei/documents/wp 72.pdf
Bauman, Z. (1998) Globalization: The Human Consequences. Cambridge: Polity
Press.
Bauman, Z. (2000) Liquid Modernity. Cambridge: Polity Press
Bigo, D. (2004) ‘Criminalisation of “Migrants”: The Side Effect of the Will to Control
the Frontiers and the Sovereign Illusion’, in B. Bogusz, R. Cholewisnki, A. Cygan
and E. Szyszczak (eds) Irregular Migration and Human Rights: Theoretical,
European and International Perspectives, pp. 90–127. Leiden and Boston, MA:
Martinus Nijhoff.
89
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
Bigo, D. and Guild, E. (2005) ‘Policing in the Name of Freedom’, in D. Bigo and
E. Guild (eds) Controlling Frontiers: Free Movement into and within Europe, pp. 1–13.
Aldershot: Ashgate.
Boyne, R. (2000) ‘Post-Panopticism’, Economy and Society 29(2): 285–307.
Brouwer, E. (2002) ‘Eurodac: Its Limitations and Temptations’, European Journal of
Migration and Law 4: 231–47.
Brouwer, E. (2004) ‘Persoonsregistraties als grensbewaking: Europese
ontwikkelingen inzake het gebruik van informatiesystemen en de toepassing
van biometrie’, Privacy & Informatie februari: 4–11.
Bundesminsterium des Innern (2002) Schengen Erfahrungsbericht 2001. Berlin:
Bundesministerium des Innern.
Bundesminsterium des Innern (2003) Schengen Erfahrungsbericht 2002. Berlin:
Bundesministerium des Innern.
Bundesminsterium des Innern (2004) Schengen Erfahrungsbericht 2003. Berlin:
Bundesministerium des Innern.
Bundesminsterium des Innern (2005) Schengen Erfahrungsbericht 2004. Berlin:
Bundesministerium des Innern.
Castles, S. (2004) ‘Why Migration Policies Fail’, Ethnic & Racial Studies 27(2):
205–27.
CEC (Commission of the European Communities) (2003) Communication from
the Commission to the Council and the European Parliament. Development of the
Schengen Information System II and Possible Synergies with a Future Visa Informa-
tion System (VIS). COM (2003) 771 final, Brussels, 11 December.
CEC (Commission of the European Communities) (2004a) First Annual Report to
the Council and the European Parliament on the Activities of the EURODAC Central
Unit. Commission staff working paper. SEC (2004) 557, Brussels, 5 May.
CEC (Commission of the European Communities) (2004b) Proposal for a Regulation
of the European Parliament and of the Council Concerning the Visa Information System
(VIS) and the Exchange of Data between Member States on Short-Stay Visas. COM
(2004) 835 final, Brussels, 28 December.
CEC (Commission of the European Communities) (2005) Second Annual Report to
the Council and the European Parliament on the Activities of the EURODAC Central
Unit. Commission staff working paper. SEC (2005) 839, Brussels, 20 June.
CEU (Council of the European Union) (2002) Presidency Conclusions, Seville
European Council, 21–22 June (SN 200/02).
CEU (Council of the European Union) (2003) 2514th Council Meeting Justice and
Home Affairs, Luxembourg, 5–6 June. 9845/03 (Presse 150).
CEU (Council of the European Union) (2004a) 2590th Council Meeting General
Affairs and External Relations, Luxembourg, 14 June. 10189/04 (Presse 195).
CEU (Council of the European Union) (2005) ‘The Hague Programme:
Strengthening Freedom, Security and Justice in the European Union’, Official
Journal of the European Union C53/1, 3 March.
Cholewinski, R. (2004) ‘EU Policy on Irregular Migration: Human Rights Lost’, in
B. Bogusz, R. Cholewinski, A. Cygan and E. Szyszczak (eds) Irregular Migration
and Human Rights: Theoretical, European and International Perspectives, pp. 159–92.
Leiden and Boston, MA: Martinus Nijhoff.
90
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
Broeders The New Digital Borders of Europe
Cornelius, W. (2005) ‘Controlling “Unwanted” Immigration: Lessons from the
United States, 1993–2004’, Journal of Ethnic and Migration Studies 31(4): 775–94.
Cornelius, W., Tsuda, T., Martin, P. and Hollifield, J., eds (2004) Controlling
Immigration: A Global Perspective, 2nd edn. Stanford, CA: Stanford University
Press.
De Hert, P. (2004) ‘Trends in de Europese politiële en justitiële informatie
samenwerking’, Panopticon jrg. 25, januari/februari.
Deleuze, G. (2002) ‘Postscript on Control Societies’, in T. Levin, U. Frohne and
P. Weibel (eds) CTRL [SPACE]: Rhetorics of Surveillance from Bentham to Big
Brother, pp. 317–21. Cambridge, MA: MIT Press.
EDPS (2006) ‘Opinion of the European Data Protection Supervisor’, Brussels,
20 January.
Engbersen, G. (1999) ‘The Undocumented Outsider Class: Illegal Immigrants in
Rotterdam’, in E. Eichenhofer (ed.) Migration und Illegalität. IMIS-Schriften band
7, pp. 213–31. Osnabrück: Universitätsverlag Rasch.
Engbersen, G. (2001) ‘The Unanticipated Consequences of Panopticon Europe.
Residence Strategies of Illegal Immigrants’, in V. Guiraudon and C. Joppke
(eds) Controlling a New Migration World, pp. 222–46. London: Routledge.
Foucault, M. (1977) Discipline and Punish: The Birth of the Prison. London: Peregrine
Books.
Freeman, G. (1998) ‘The Decline of Sovereignty? Politics and Immigration
Restrictions in Liberal States’, in C. Joppke (ed.) Challenging the Nation State:
Immigration and Citizenship in Western Europe and the United States, pp. 86–108.
Oxford: Oxford University Press.
Gilliom, J. (2001) Overseers of the Poor: Surveillance, Resistance, and the Limits of
Privacy. Chicago, IL: University of Chicago Press.
Guild, E. (2001) ‘Moving the Borders of Europe’, inaugural lecture, University of
Nijmegen.
Guild, E. (2003) ‘International Terrorism and EU Immigration, Asylum and
Borders Policy: The Unexpected Victims of 11 September 2001’, European
Foreign Affairs Review 8: 331–46.
Guiraudon, V. (2001) ‘De-Nationalizing Control: Analysing State Responses to
Restraints on Migration Control’, in V. Guiraudon and C. Joppke (eds) Control-
ling a New Migration World, pp. 29–64. London: Routledge.
Jandl, M. (2004) ‘The Estimation of Illegal Immigration in Europe’, Studi
Emigrazione/Migration Studies XLI(153): 141–55.
Joint Supervisory Authority of Schengen (2004) Activities of the Joint Supervisory
Authority. Sixth report January 2002/December 2003; at: www.schengen-jsa.data
protection.org
Joppke, C. (1999) Immigration and the Nation-State: The United States, Germany and
Great Britain. Oxford: Oxford University Press.
Justice (2000) The Schengen Information System: A Human Rights Audit. London:
Justice.
Lahav, G. and Guiraudon, V. (2000) ‘Comparative Perspectives on Border Control:
Away from the Border and Outside the State’, in P. Andreas and T. Snyder
91
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.
International Sociology Vol. 22 No. 1
(eds) The Wall around the West: State Borders and Immigration Controls in North
America and Europe, pp. 55–77 Lanham, MD: Rowman and Littlefield.
Lyon, D. (2003) Surveillance after September 11. Cambridge: Polity Press.
Lyon, D. (2004) ‘Globalizing Surveillance: Comparative and Sociological
Perspectives’, International Sociology 19(2): 135–49.
Mathiesen, T. (2001) ‘On Globalization of Control: Towards an Integrated
Surveillance System in Europe’, in Social Change and Crime in the Scandinavian
and Baltic Region, Rapport från NSFKS 43. forskarseminarium, Riga; at:
www.nsfk.org/downloads/seminarreports/researchsem_no43.pdf
Mitsilegas, V., Monar, J. and Rees, W. (2003) The European Union and Internal
Security: Guardian of the People? Basingstoke: Palgrave.
Peers, S. (2000) EU Justice and Home Affairs Law. Harlow: Longman.
Rose, N. (2000) ‘Government and Control’, British Journal of Criminology 40(2): 321–39.
Samers, M. (2004) ‘An Emerging Geopolitics of “Illegal” Immigration in the
European Union’, European Journal of Migration and Law 6(1): 27–45.
Sassen, S. (1996) Losing Control? New York: Columbia University Press.
Sciortino, G. (2000) ‘Towards a Political Sociology of Entry Policies: Conceptual
Problems and Theoretical Proposals’, Journal of Ethnic and Migration Studies
26(2): 213–28.
Scott, J. (1998) Seeing Like a State: How Certain Schemes to Improve The Human
Condition Have Failed. New Haven, CT: Yale University Press.
Soysal, Y. (1994) Limits of Citizenship: Migrants and Postnational Membership in
Europe. Chicago, IL: Chicago University Press.
Tapinos, G. (2000) ‘Irregular Migration: Economic and Political Issues’, in OECD
Combating the Illegal Employment of Foreign Workers, pp. 13–43. Paris: OECD.
Torpey, J. (1998) ‘Coming and Going: On the State Monopolization of the Legiti-
mate Means of Movement’, Sociological Theory 16(3): 239–59.
Torpey, J. (2000) ‘States and the Regulation of Migration in the Twentieth-Century
North Atlantic World’, in P. Andreas and T. Snyder (eds) The Wall around the
West: State Borders and Immigration Controls in North America and Europe,
pp. 31–54. Lanham, MD: Rowman and Littlefield.
Van der Leun, J. (2003) Looking for Loopholes: Processes of Incorporation of Illegal
Immigrants in the Netherlands. Amsterdam: Amsterdam University Press.
Zolberg, A. (2002) ‘Guarding the Gates’; at: www.newschool.edu/icmec/
guardingthegates.html
Biographical Note: Dennis Broeders is a researcher at the Department of
Sociology at the Erasmus University of Rotterdam, where he is working on his
PhD, and a research fellow at the Scientific Council for Government Policy in
the Hague.
Address: Erasmus University of Rotterdam, Department of Sociology, PO Box
1738, 3000 DR Rotterdam, The Netherlands. [email: broeders@fsw.eur.nl] or
Scientific Council for Government Policy, PO Box 20004, 2500 EA, The Hague,
The Netherlands. [email: broeders@wrr.nl]
92
Downloaded from http://iss.sagepub.com at Erasmus Univ Rotterdam on January 31, 2007
© 2007 International Sociological Association. All rights reserved. Not for commercial use or unauthorized distribution.