Chapter 2 Mapping the theoretical landscape: Unraveling the complexity of matching identity data in transnational security infrastructures

This chapter presents a mapping of theoretical concepts based on literature from four broadly defined areas of research, which will be referred to as (1) “the internationalization of identification,” (2) “the commercialization of identification,” (3) “the securitization of identification,” and (4) “the infrastructuring of identification.” By exploring how identification operates in international, commercial, securitized, and infrastructural contexts, we can develop an understanding of the challenges, implications, and potential consequences associated with data matching practices and technologies. This mapping exercise thus lays the groundwork for generating hypotheses and formulating research questions that relate to the role of matching identity data in transnational commercialized security infrastructures.

The theoretical mapping approach provides an overview of core theories and concepts that provide a framework for the research. While this mapping provides a compass to navigate the subsequent chapters, each empirical chapter will delve into supplementary literature to address the specific research questions pertaining to that chapter’s focus. Nonetheless, the theories and concepts introduced in this chapter will play an integral role throughout the dissertation, albeit in varying degrees of explicitness. They provide a theoretical underpinning and serve as a thread that connects the various strands of inquiry throughout the study.

To begin, let us clarify what the theoretical mapping in this chapter covers and how it works alongside the methodological framework from Chapter 3. First, theoretical mapping is used in this dissertation to integrate theories and concepts from multiple research fields and topics more or less directly pertinent to identification and identity data matching. Second, theoretical mapping plays a role in identifying gaps in the existing literature and formulating the research questions, as it allows for raising doubts, questions, and hypotheses informed by literature. Chapter 3 then adds to this theoretical mapping by introducing the methodological framework, a written and visual representation of the specific research, hypotheses, and methods of data collection and analysis that will be used to answer the research questions. Now, let us delve into the first aspect of identification, which is the increasing internationalization, referring to identification practices that extend beyond the confines of the nation-state.

2.1 Internationalization of identification

Identifying people on the move is frequently described as a Janus-faced and multi-sited state-led phenomenon entwined with obligations, rights, and coercive measures that can even occur far from traditional border encounters (e.g., About, Brown, and Lonergan 2013a; Caplan and Torpey 2001). The accompanying development of registration and identification systems, such as the creation of civil registers or passports, has, indeed, typically been linked to the state-making of modern nation-states (Breckenridge and Szreter 2012; Caplan and Torpey 2001; Torpey 2018). Because identification consequently enables states to track people’s movements and label some as irregular, registration and identification systems and procedures have been argued to facilitate and limit people’s freedom of movement across international borders (Broeders and Dijstelbloem 2016; Squire 2010; Torpey 2018).

A term often referred to for the state’s capacity to identify its citizens is the notion of “legibility” by Scott (1998). Scott noted how the interaction of premodern states and their population (e.g., for purposes of taxation) went hand in hand with projects of standardization and legibility as attempts to identify its people unambiguously. So, in one example, Scott noted the standardization of diverse cultural naming practices serving specific local purposes in distinct and fixed surnames as “a first and crucial step toward making individual citizens officially legible” (p. 71). Thus, Scott argued that state initiatives like rationalizing surnames enabled states to develop the modern statecraft apparatus, which includes taxpayer lists, conscription lists, censuses, and property deeds, by allowing states to identify the vast majority of their inhabitants unambiguously. Civil registries, identity cards, passports, DNA profiles, and other biometric databases have supplanted fixed surnames. Still, they all serve the same purpose: to make people legible for interactions with states.

Research on the history of identification generally focuses on these state practices of identifying people. For example, Torpey (2018), author of the book “The invention of the passport” originally published in 2000, uses Max Weber’s aphorism on the legitimacy of the state’s use of violence to argue that identification practices gave nation-states a “monopoly of the legitimate means of movement” (p. 2) at the expense of non-state actors like churches and private organizations. Torpey argued that states needed to issue identification documents to maintain the separation between nationals and foreigners and regulate their mobility.

Extending the scope of the discussion beyond the borders of the nation-state, similar registration and identification techniques have been shown to help colonial authorities gain and maintain power, albeit to varying degrees of success (Breckenridge and Szreter 2012). From this perspective, the categories of registration and identification systems institutionalized the relationships between the empire’s center and periphery. However, as About, Brown, and Lonergan (2013b) points out, registration and identification systems in such imperial and colonial contexts should not be viewed solely as instruments of coercion. What is interesting for our discussion here is how the historical analyses in those edited volumes from Breckenridge and Szreter (2012) and About, Brown, and Lonergan (2013a) show how identification technologies were brought into a colonial setting, adapted to local conditions, and eventually circulated back and forth between the global power centers.

An illustration of such international exchanges of identification technology is provided by Sengoopta (2004), who described how significant advancements in fingerprinting resulted from interactions between colonizers and colonized in the British Empire in India. Interestingly, Sengoopta compares the history of fingerprinting to the spread of curry dishes in English cuisine: “Developed in India but not indigenous, British but not evolved in Britain itself … incorporated into British tradition and then gradually re-transmitted to the world at large, blur[ring] the simplistic distinction we often make between home and Empire” (p. 6, quoted in Cole 2005). While an overview of the history of forensic fingerprinting is beyond the scope of this chapter,5 the main takeaway is that fingerprinting as an identification method has a complicated history, starting with scientists on the European continent, moving through British India’s colonial provinces, and finally returning to Victorian England’s Scotland Yard. Therefore, the circulation of identification theories, techniques, and practices reveals the international aspects of identification technology, which can be better understood when considering perspectives beyond the conventional nation-state-based approach.

The international nature of identification technologies is especially visible in international policing. International police work goes beyond state practices because of the need to “identify, recog­nize, and track suspects or offenders across an expanding national and eventually international terrain,” as the editors of a volume titled “Documenting individual identity: the development of state practices in the modern world” (Caplan and Torpey 2001, 9) write. The essays in the book discuss nineteenth-century transnational innovations in identification, such as Bertillon’s anthropometric identification system, which became widely used in France and other countries, and the Vucetich fingerprint identification system, which spread from Argentina to other Latin American countries. Based on such examples, the editors note in the book’s introduction how policing has been “the source of repeated efforts to rationalize and standardize practices of identification and the systems for the storage and retrieval of the expanding documentation that this generated” (p. 9). International policing, with its emphasis on identifying and tracking suspects across borders, has contributed to the rationalization and standardization of identification practices and technologies.

However, despite the increasing prevalence of identification systems that link identity data from various national and international databases, not much research has been conducted on the operational deployment and utilization of such systems. This scarce research stands in contrast to the amount of real-world examples where such systems have been implemented. Some literature briefly touches upon this point and provides a few examples. For instance, such interconnected database systems are essential for identity verification in the context of Schengen visa applications (e.g., Glouftsios 2019) and for detecting potential threats by linking identities across national and international policing and watch listing systems (e.g., Goede and Sullivan 2016; Zureik and Salter 2005). However, these volumes do not dedicate much attention to other sources of data crucial to the internationalization of identification: the development of international standards for identification (Leese 2018; Torpey 2018). Further investigation and analysis are thus necessary to understand the operational implementation and implications of the methods, techniques, and tools used to link identity data across databases.

Many chapters in About, Brown, and Lonergan (2013a) still prioritize state-led standardization projects despite its focus on transnational identification. This is surprising because current efforts to rationalize and standardize identification systems rely heavily on the work of organizations like the European Commission, the United Nations, Interpol, the International Civil Aviation Organization (ICAO), and the International Organization for Standardization (ISO). For example, the ICAO publishes guidelines for machine-readable passports and visas (ISO/IEC 2008) to ensure “global interoperability.” The American National Standards Institute/National Institute of Standards and Technology Identification Technology Laboratory (ANSI/NIST-ITL) is an example of a government agency that publishes de facto standards for exchanging biometric information such as fingerprints and facial images. In short, rather than a fully coherent system for making people on the move legible, there is more likely a fragmented landscape of systems and data models — and where state vision often needs “fixing” (Leese 2022) to identify people across international systems.

In this fragmented landscape of systems and data models, data matching emerges as a technological fix to address identification challenges. For example, when individuals move across international borders, their identity data may exist in disparate databases and formats maintained by different authorities and organizations. Data matching technologies can be employed to link these fragmented datasets, enabling a more comprehensive picture of an individual’s identity across multiple systems. However, when we connect the internationalization of identification with data matching, it raises several hypotheses, questions, and doubts. How does the use of data matching techniques and technologies facilitate the international exchange of identity data? Are there challenges in harmonizing data matching processes and standards across different authorities and organizations? Does the internationalization of identification require the development of new data matching approaches to account for cultural, linguistic, and contextual variations in identity data? How does the increasing reliance on data matching shape identification outcomes in transnational security contexts? These questions emphasize the central goal of the dissertation, which is to investigate how data matching technology shapes the meaning of data, practices, and organizations in a global context.

This section has discussed the internationalization of identification, which refers to research into identification practices that extend beyond the boundaries of the nation-state. The need to identify people across borders has brought attention to the importance of identification technology and the efforts to standardize it. The internationalization of identification thus raises research questions regarding the types of knowledge and assumptions about people-on-the-move inscribed in data models of national and transnational security infrastructures. As we will see, it is necessary to develop methods to investigate the interconnections between diverse organizations’ and authorities’ data models. Furthermore, the diversity of these data models raises the question of how organizations that collect information about people-on-the-move search and match for identity data in their systems and how data are matched and linked across different agencies and organizations. The next section will examine how identification technologies travel across various authorities, states, and organizations and the involvement of different actors, including commercial entities, in their development.

2.2 Commercialization of identification

About, Brown, and Lonergan (2013a) thus also highlight the need for new research into the “increasing takeover of individual identification by corporate bodies for economic purposes” (p. 2). A transnational viewpoint can concomitantly shift the focus away from the nation-state and onto the various non-governmental actors involved in identification. Indeed, as noted by Higgs (2013) in one of the essays in the volume, “the contemporary state’s use of identification technologies, including biometrics, is often dependent upon products created by commercial vendors, who have helped to drive their adoption” (p. 165). Overall, it is interesting to see a growing body of literature acknowledge the importance of non-state and commercial actors in identification processes and technologies (see also Pelizza 2021). This is a topic that has, nevertheless, been explored in a disjointed fashion.

Even though “identification technology is increasingly a commercial product, rather than a creation of the state,” as Higgs (2013) put it succinctly (p. 165), social and historical research has not followed suit by giving equal weight to these commercial actors in identification. Higgs observes that historians tend to place more emphasis on state identification developments than on, for example, commercial enterprises, where access to historical records is more restricted. Higgs’ essay is able to paint a broad picture of the commercial aspect of identification by looking at technological advancements made by private companies in Britain at the beginning of the 18th century. His examples include banks’ use of credit and debit cards to identify customers, supermarkets’ use of loyalty cards to create consumer profiles, and credit reference agencies’ determination of a person’s creditworthiness. Perhaps unsurprisingly, he concludes his article with the well-documented fact that an increasing number of commercial IT companies actively promote biometric identity systems ((see, for example, Amoore 2006; Olwig et al. 2019; Trauttmansdorff 2022; Zureik and Hindle 2004).

The work of Higgs and other authors shows a gradual shift away from state authorities creating and implementing identification technology to the state purchasing systems created by commercial organizations. In the EU context, for example, the political economy of identity management has indeed been shown to consist of only a small network of companies that design, implement, and maintain identity management systems (Lemberg-Pedersen, Rübner Hansen, and Halpern 2020; Valdivia et al. 2022). These small networks have various risks that complicate the relations between standardizing and rationalizing identification as the “involved companies become indispensable, and are granted roles as unrivaled experts in the systems of border control they themselves have designed.” (Lemberg-Pedersen, Rübner Hansen, and Halpern 2020, 71). Pelizza (2021) provides another example of how technology facilitating identification encounters in Greece forges transnational associations with the EU Commission, corporate contractors, and the US security regime through the production of hardware that adheres to US biometric standards, while also leading to vendor lock-in due to the use of proprietary algorithms to create biometric templates. While the significance of commercial identification systems is clear, little is known about the processes involved in their procurement, development, implementation, and deployment, and their longer-term implications for data sovereignty.

Beyond that, little is known about the consequences of such international and commercial identification technology on the processes used by states to identify people on the move. A compelling element of Higgs (2013)’s line of reasoning is how he shows not only the impact that commercial innovations have had on the widespread uptake of digital identification technology. Notably, he argues that the uptake and replication of these identification technologies and practices shape how states identify their populace. Therefore, this interdependence highlights the need for research on the evolution and diffusion of identification expertise and technology within and between various public and private institutions.

Linking the commercialization of identification to data matching technology further raises a range of hypotheses, questions, and doubts. Firstly, how does the commercialization of identification impact the development and implementation of data matching technologies used in identification systems? Specifically, how do commercial entities acquire and develop their data matching knowledge and expertise? One possible hypothesis is that commercial data matching systems may play a role in standardizing data matching and identification among different organizations by their underlying mechanisms. Yet, what are the effects of deploying these systems on the standardization of identification processes? Moreover, what are the potential risks and challenges associated with the involvement of commercial entities in the design, development, and operation of data matching in identification systems? Could the re-use of data matching technologies by certain vendors or entities become a concern, leading to potential restrictions on competition and innovation in the field? Furthermore, how do companies determine which data matching functionalities to prioritize based on customer needs and industry trends? Further research is needed to explore such relationships between data matching and the commercialization of identification, providing deeper insights into their dynamics, implications, and potential consequences on data matching and identification practices.

In summary, investigating the commercialization of identification provides insights into the proliferation of commercially and internationally available identification systems, which introduces new challenges and complexities. This commercialization is characterized by a shift from state-driven development and implementation of identification technology to state adoption of systems developed by commercial organizations. By delving into the expanded role of commercial actors, we can uncover the creation of transnational associations and the potential for vendor lock-in, shedding light on the intricate relationships and power dynamics that underlie the commercialization of identification. Moreover, the commercialization of identification raises considerations regarding the development, implementation, and use of data matching technologies. It prompts us to question how knowledge and technology for matching identity data circulate and travel across organizations. Understanding this circulation would provide insights into the implications of the commercialization of identification. And yet identification is not only commercialized, but is entangled with established security regimes. The following section thus delves into the securitization of identification to explore how security concerns may both influence and be influenced by the design and utilization of identification systems.

2.3 Securitization of identification

The identification of people at the border has become increasingly linked by public and private actors to issues of terrorism and international security, as noted in the preceding chapter’s examples from the ongoing EU interoperability project. According to (Critical) Security Studies (CSS) scholars, such construction of identification as a security concern supplants traditional understandings of security and should not be taken for granted. Although security has long been associated with state protection (national security), recent scholarship in CSS has examined the phenomenon’s growing influence in new contexts, such as migration, health, and food. As a result, scholars have called into question “the precise definition of what it means to be secure, the causes of insecurity, and who or what the concept of security should apply to” (Peoples and Vaughan-Williams 2021, 2). In this way, CSS has reformulated the security issue with what is commonly referred to as “broadening” and “deepening” the security-related areas, problems, and actors (Burgess 2010; Peoples and Vaughan-Williams 2021).

On the one hand, security can be characterized as having been “broadened” from its traditional emphasis on more militaristic dimensions to include other areas and threats, such as migration and border security, or health (as, for example, the Covid-19 pandemic has shown). On the other hand, what is to be secured (also known as the referent object of security) can be characterized as having been “deepened” to include other actors such as human individuals, cultural/identity groups, multinational corporations, institutions, or even ecosystems. Scholars in this field, for example, argue that the securitization of migration in Europe has resulted in policies that criminalize and stigmatize migrants while ignoring the root causes of displacement (e.g., Huysmans 2000). Similarly, we can see how identification has come to be securitized by looking at the techniques and procedures used for identification.

A crucial question for security scholars is how a specific societal phenomenon, like human migration, health, or the environment, is framed as a threat or security concern. The existence of security threats that need to be dealt with by security authorities and experts may be taken for granted in “traditional” or “essentialist” understandings of security.6 What if, however, the appearance of security threats operates in reverse? How do societies label specific issues as security threats, and what societal and political consequences does this have? This alternative view is generally how constructivist theories of security share a concern for security as a meaning-making (intersubjective) process in which the interaction and communication between actors construct meanings of the world and shape actors’ identities and power relations (Balzacq 2009; Peoples and Vaughan-Williams 2021). This view becomes particularly relevant in the context of identification and data matching, where the determination of what constitutes a security threat and the practices surrounding it can have significant implications. How are specific issues related to identification and data matching labeled as security threats, and what societal and political consequences do they have?

Constructivist approaches to security can provide insights into the securitization of identification and data matching, by investigating the framing of identification and data matching as security concerns as a social and discursive process, shaped by the interactions and communication between actors.7 For instance, “securitization theory” strongly emphasizes how language, discourse, and power all play a part in how security is constructed and the value of critical analysis in challenging the prevailing security narratives and fostering new perspectives on security (Balzacq 2005; Buzan, Wæver, and Wilde 1998; McDonald 2008; Taureck 2006). It is important to note that the theory arose out of a concern with the “intellectual and political dangers in simply tacking the word security onto an ever wider range of issues” (Buzan, Wæver, and Wilde 1998, 1, emphasis in original). The core ideas of securitization theory can be attributed to scholars such as Buzan, Wæver, and others (Buzan, Wæver, and Wilde 1998; Wæver, Buzan, and Carlton 1993) who argue that speech acts that treat certain issues as security threats can lead to the expansion of security concerns into other “sectors.” This process involves framing certain issues or problems as security threats and elevating them to the status of urgent matters requiring extraordinary action.8

Securitization theory thus clarifies the implications of simply adding “security” to identification. When identification undergoes securitization, it is presented as a pressing threat, justifying the use of extraordinary measures to address associated security concerns. Chapter 1 provided some examples of how securitization of identification may be seen in the context of the European Union’s interoperability framework. In those quotations from policy documents, EU authorities framed the risks of unlinked data as threats to the internal security of the EU as these “unknown unknowns” or “blind spots” are presented as risks that can be exploited by individuals seeking to evade authorities. The construction of identification as a critical security concern supports what could be considered exceptional measures to address these risks through the EU’s interoperability framework. For example, the integration of multiple databases and information systems, including those related to visas, asylum, and criminal records that were previously unconnected. Of course, such securitization can also fail if it receives little political or societal backing, as it may be seen as unjustified or out of proportion to the actual security threat.

Securitization theory has been criticized for its focus on the role of the state and its security apparatus in the construction of security issues (Aradau 2004; Bertrand 2018; McDonald 2008; Peoples and Vaughan-Williams 2021). Such a viewpoint emphasizes those who can speak, excluding those who have historically and structurally been marginalized. This results in a narrow understanding of security that fails to consider the complexity and diversity of security methods and devices. Therefore, besides the rhetorical structuring of security issues and the performativity of security speech, scholars set about to understand how security is enacted through security devices and in the everyday practices of security professionals (Balzacq et al. 2010; Côté-Boucher, Infantino, and Salter 2014; Davidshofer, Jeandesboz, and Ragazzi 2017). Hence, it is essential to examine the technologies, procedures, and protocols used to implement security measures, as well as how these measures are experienced and contested by those subjected to them. Scholars have provided a more comprehensive understanding of how security is enacted and experienced in practice by focusing on the material and embodied dimensions of security (Amicelle, Aradau, and Jeandesboz 2015).

A helpful example of a focus on such security practices is given by Bigo (2014), who observed at least three different meanings actors attributed to border control: “solid,” something to be defended and connected to sovereignty; “liquid,” referring to how borders can be controlled through filtering and identifying populations; and “cloudy,” only discernible through the use of digital databases and analytics. In all three of Bigo’s examples, the actors’ practices and uses of security technology affected the meanings they gave to border control. On the one hand, the practices and technologies can contribute to the securitization of borders and mobility. On the other hand, the technologies created and used are shaped by the meanings attached to borders and border control. By studying the methods and tools used for identification and data matching, we can thus gain insights into the securitization of migration and border control.

Understanding the construction and enactment of security through identification and data matching technologies can be enhanced by examining it through the lens of materialist security studies (e.g., Aradau 2012; Aradau and Huysmans 2014; Bellanova and Goede 2022; Hoijtink and Leese 2019; Walters 2014). Materialist security studies seek to account for the development and use of devices in security practices and the agency of these devices. According to Pelizza (2021), one compelling feature of materialist security studies is their potential for blurring boundaries between states, private organizations, and commercial entities. Devices like surveillance cameras or biometric scanners are often developed and deployed by various actors, including governments, private security firms, and technology companies. As a result, examining security devices can disentangle different actors’ roles and interests in shaping security practices.

Devices are not just passive tools in security practices; they also have performativity and can actualize security (e.g., Amicelle, Aradau, and Jeandesboz 2015; Bellanova and Glouftsios 2022; Davidshofer, Jeandesboz, and Ragazzi 2017). For instance, watch list matching systems used in border security are an example of how identification and data matching technologies shape security practices. Such matching systems effectively process extensive datasets to generate matches and identify potential security threats at borders and airports (see, for example, Glouftsios and Leese 2023). Additionally, biometric authentication systems utilized exemplify devices’ performativity in security practices by producing and enacting security classification (e.g., Kloppenburg and van der Ploeg 2020). A materialist perspective on security studies provides a framework for understanding the role of devices in shaping security practices. Focusing on the materiality of security helps illuminate the relationships between actors, devices, and security outcomes.

Similarly, the literature on Science, Technology, and Society (STS) has extensively explored identification in security settings, such as in the context of identifying possible threats in warfare through the lens of sociotechnologies (Follis 2017; Suchman, Follis, and Weber 2017). For instance, consider data matching technologies utilized in security operations to identify potential threats by cross-referencing information from various databases. These algorithmic systems and technological tools play a pivotal role in shaping our understanding of what constitutes a threat and who is considered a legitimate target (Suchman, Follis, and Weber 2017; Suchman 2020). However, scholars like Lucy Suchman have investigated how such sociotechnologies can lead to unintended consequences, creating insecurity for individuals who are wrongly identified or targeted. As such, this perspective urges us to carefully consider the potential risks and wide-ranging implications that arise from data matching and other technological means to identify legitimate targets in security contexts.

The connection between the securitization of identification and data matching thus raises several hypotheses, questions, and doubts that require exploration. Firstly, does the securitization of identification through data matching knowledge target specific groups of people, potentially exacerbating existing inequalities and biases? Secondly, as data matching technology becomes securitized, does the embedded matching knowledge travel between organizations, carrying logic and practices of security with it? Thirdly, do industry trends towards security influence the development and implementation of data matching technology in specific ways? Lastly, how does securitization of data matching technology shape the definition and identification of security threats, and what implication does this have for a broader understanding of security? Further research is necessary to understand these dynamics and the potential consequences for data matching, identification practices, and the broader security landscape.

This section has explored the ways in which critical security studies have highlighted the conversion of societal concerns into security issues and the possible consequences of these transformations. Considering the insights from this literature, it becomes crucial to question the justification for categorizing identification as a security issue and the widespread use of data matching techniques. Earlier theories in this field were often limited by a state-centric perspective and a focus on the discourse and speech acts of dominant actors, such as states and security professionals. Recent scholarship has emphasized the materiality and performativity of security practices and devices, as well as their potential to create insecurity for certain groups. This thesis seeks to investigate how security infrastructures shape and are shaped by the specific practices and devices utilized in matching and linking identity data. By examining these processes, we can better understand how identification practices can become securitized and the potential implications for individuals and society. In the following section, we will explore the construction, organization, and interconnection of identification systems, which ultimately create infrastructures that influence data matching and identification procedures.

2.4 Infrastructuring of identification

Literature on infrastructure has long demonstrated how data infrastructures reflect and shape the values, interests, and power relations of the actors involved in their design and operation, which consequently shape practices (e.g., Bowker and Star 1999; Edwards et al. 2009; Hanseth, Monteiro, and Hatling 1996; Kitchin and Lauriault 2018). This has relevance in border security and migration control, where identifying and tracking individuals across different systems and databases has become a crucial component of state surveillance and control. For example, Glouftsios (2021) demonstrated how the often-invisible maintenance of large-scale information systems for border security in the EU has an essential role in sustaining the governance of international mobility. Likewise, Pelizza and Van Rossem (2023), through the notion of “scripts of alterity,” make the point that data infrastructures shape power relations with people and among states. The systems and data infrastructure for identifying people have thus rightly been a frequent concern of studies on border security and migration control (see, for example, Dijstelbloem 2021; Glouftsios 2021; Pollozek and Passoth 2019). This perspective suggests that data matching is crucial for connecting various data sources for a broader data infrastructure, especially in linking biometric databases, watch lists, and migration and border management systems. Connecting various organizations, authorities, and their data into more comprehensive data infrastructures permits a more extensive identification and classification of individuals.

Yet defining what constitutes infrastructure often poses a significant challenge due to its multifaceted and dynamic nature (e.g., Edwards et al. 2007; Larkin 2013; Karasti et al. 2016; Monteiro et al. 2013; Star and Ruhleder 1996). Star and Ruhleder (1996), emphasize infrastructure dimensions such as embeddedness, transparency, reach/scope, learned as part of membership, links with conventions of practice, the embodiment of standards, built on an installed base, and becoming visible on breakdown. Recognizing these complexities helps understand how data matching is intertwined with the infrastructuring of identification, shaping the practices and norms of individuals like border guards and security personnel. The embeddedness of data matching technology within infrastructures may also contribute to transparency and seamless integration of multiple identity databases to enable exchange and interoperability of identity data. Applying Star and Ruhleder (1996)’s dimensions to identification infrastructure would highlight the gradual integration of systems within work practices, evolving over time while adhering to established standards. Such infrastructure operates imperceptibly, remaining invisible until significant events occur.

Similarly, Larkin (2013) captures the ontology of infrastructure as both “things and also the relation between things.” His and other relational perspectives emphasize that infrastructure extends beyond its tangible components and encompasses the interdependencies and connections that facilitate its functionality. It underscores the significance of comprehending infrastructure as a network of relationships and dependencies, where material elements intertwine with social and organizational factors. In the context of identification and data matching, this means that infrastructure goes beyond mere databases and systems; it includes the web of relationships that enable effective data exchange and matching processes. Moreover, what may be considered infrastructure for one person or organization might not hold the same significance for others (Star 1999). For identification and data matching, different actors may engage with infrastructures based on their unique needs, interests, and positions within the broader sociopolitical landscape. For instance, an immigration agency may prioritize a centralized and secure database infrastructure for accurate identity verification and efficient visa processing, while a law enforcement body may emphasize data matching technologies for cross-referencing identities across multiple databases.

In the context of data matching and identification in infrastructures, it is necessary to consider the impact of the rise of Big Data and its implications for the generation, circulation, and utilization of data (Borgman 2015; Dalton and Thatcher 2014; Kitchin 2014). These developments have sparked interest in new fields like Critical Data Studies (CDS), which seek to uncover the underlying power structures inherent in data practices (Flyverbom and Murray 2018; Iliadis and Russo 2016; Kitchin and Lauriault 2018). While previous research on infrastructures and social order has taken a relational approach, scholars associated with CDS employ critical frameworks to highlight the power dynamics at play in data processes (Iliadis and Russo 2016, 2). Furthermore, they emphasize that data are never raw but shaped by choices and constraints (see also, Gitelman 2013). For example, consider a data matching process used for security purposes. Various datasets, such as passport records, visa applications, and biometric information, are combined to verify identities at border crossings. While the process may seem neutral, the choices made during data matching, like the weight given to data points in the matching algorithms, can have significant implications for individuals. CDS, therefore, prompts us to address such questions about the impact of datafication on power relations and the potential risks of data matching in shaping identification outcomes.

The definitions and characteristics discussed bring attention to the dynamic nature of infrastructures as they undergo evolution and adaptation in response to technological advancements, policy changes, and organizational shifts. This raises the question whether infrastructure can be purposefully designed and built. For instance, Edwards et al. (2007) emphasizes that infrastructure does not arise from intentional design but grows in phases. This perspective aligns with Hughes (1983b)’s account of the historical growth of the electrical supply network, where expansion often resulted from addressing critical problems within existing systems. Moreover, as we explore the role of infrastructures in identification systems, it becomes crucial to understand how knowledge and technology for matching identity data circulate and travel across organizations. Edwards et al. emphasize the pivotal phase of constructing gateways in infrastructure development. During this phase, multiple systems compete without a clear winner, and gateways facilitate interoperability, enabling more unified, integrated systems. By exploring how identity data matching technologies traverse organizational boundaries, we can gain insights into the mechanisms contributing to information exchange and interoperability across various organizations.

The connection between the infrastructuring of identification and data matching raises hypotheses, questions, and doubts that warrant further investigation. Firstly, the role of data matching software in facilitating integration and interoperability within identification infrastructures gives rise to hypotheses regarding its impact on the growth and expansion of such infrastructures. For example, do data matching technologies act as crucial components that link diverse databases and systems into broader infrastructures? Accordingly, questions worth considering relate to the implications of data matching for standardization efforts within identification infrastructures. How does data matching interact with existing systems, protocols, regulations, and standards? Does the deployment of data matching software promote or hinder standardization across different identification systems? Additionally, investigating the relationship between infrastructuring and data matching gives rise to hypotheses regarding the often less visible work and technologies involved in matching identity data. How does the embeddedness of data matching technology within infrastructures influence the visibility of identification processes? How do the practices and technologies of data matching contribute to the construction and maintenance of identification infrastructures, and what implications do these have for the overall functioning of identification systems? Exploring these questions and hypotheses can deepen our understanding of the relationships between infrastructuring and data matching in the context of identification systems.

2.5 Research questions

2.5.1 Main research question

This chapter provided a more precise definition of the research problem and raised doubts, questions, and hypotheses related to data matching in four research areas, (1) the internationalization of identification, (2) the commercialization of identification, (3) the securitization of identification, and (4) the infrastructuring of identification. By analyzing the relevant literature within these areas, we have gained a deeper understanding of the interplay between identification, data matching, and transnational security infrastructures. In addition, the literature review has allowed us to identify key themes within each research area, including the growing use of internationally developed and commercially available identification systems and the increasing securitization of identification processes. These themes have helped to clarify the broader context of identity data matching in the context of transnational commercial security infrastructures.

Through our examination of the internationalization and commercialization of identification, we have identified a gap in research regarding the ways in which the spread of commercially and internationally available identification technologies influences identification processes. Similarly, in our exploration of the securitization of identification, we have identified a gap in research regarding how security concerns shape and are shaped by the design and use of identification systems. This securitization can be seen in the growing emphasis on biometric identification in border control and the linking of identity data to identify security threats. Additionally, our examination of the infrastructuring of identification has highlighted a gap in research regarding the implications of identifying people across data infrastructures. It is within this context that the significance of data matching emerges as a pivotal process in identification and data management that enables the linkage and correlation of identity data across diverse data sets.

The use of data matching technology for identifying individuals across various databases and international borders can raise many questions and uncertainties. When it comes to the internationalization of identification, it brings up concerns about the heterogeneous data models of different authorities, how disjointed identity data can be linked across borders, and how cultural and contextual variations of identity data are considered. The commercialization of identification through data matching systems also raises concerns about the involvement of commercial entities, the risks of developing proprietary identification knowledge, and the standardization of identification solutions due to software reuse. The securitization of identification through data matching technology raises concerns about transferring security knowledge between organizations, industry trends in technology development, and defining security threats. Additionally, the infrastructuring of identification and data matching raises questions about the role of data matching in standardization efforts, the invisibility of data matching work in identification processes, and infrastructural growth.

Despite its widespread use, further research must explore the dynamics and implications of data matching, particularly in the context of emerging technologies, transnational infrastructures, and evolving security concerns. This dissertation aims to contribute to a deeper understanding of the role and influence of data matching technology on the interpretation of data, operational practices, and organizational structures.

Based on the gaps identified in the literature review, we can now formulate the following main research question:

Main research question
How are practices and technologies for matching identity data in migration management and border control shaping and shaped by transnational commercialized security infrastructures?

The question focuses on how data matching shapes the meaning of data, practices, and organizations in the domains of migration management and border control. Furthermore, the question highlights the interconnectedness of identity data matching practices and technologies with transnational security infrastructures, underscoring the importance of comprehending the wider social, economic, and political implications of identity matching.

2.5.2 Sub-research question

A range of sub-research questions that delve deeper into the relationship between identification systems and transnational security infrastructures can help to answer our main research question. To this end, the research is structured around three sub-questions that investigate the types of knowledge embedded within data models used by national and transnational security infrastructures (RQ1), the processes and technologies for searching and matching identity data across different organizations (RQ2), and the circulation of knowledge and technology related to matching identity data across organizations (RQ3). In addition, the following sub-questions will address several hypotheses and inquiries regarding the connection between data matching and the internationalization, commercialization, securitization, and infrastructuring of identification that were previously discussed. The three research questions are as follows:

RQ1
Which types of knowledge and assumptions about people-on-the-move are inscribed in data models of national and transnational security infrastructures? What implications does this have for how organizations can search and match identity data?
RQ2
How do organizations that collect information about people-on-the-move search and match for identity data in their systems? How is data about people-on-the-move matched and linked across different agencies and organizations?
RQ3
How do knowledge and technology for matching identity data circulate and travel across organizations?

The first research question (RQ1) seeks to uncover the types of knowledge embedded within data models used by different organizations and authorities — what Pelizza and Van Rossem (2023) have called “scripts of alterity.” Hence, this research question draws inspiration from the technical process of schema matching used in data matching, to focus on data models’ design, and the assumptions about people-on-the-move that can be inferred from designs. Uncovering differences can be useful to bring to light division of work in an international setting and throw light on how infrastructures shape identities. For instance, identifying records that refer to the same person could be challenging without knowledge of the underlying data models of the data sets being matched because the same person may be represented differently across data sets. By focusing on design, we can compare these assumptions to uncover differences in the division of work in an international setting and shed light on how infrastructures shape identities, thereby illuminating the internationalization of identification through the connections between the information about people-on-the-move gathered by various organizations.

The research for RQ1 contributes to infrastructure studies and the use of digital methods in analyzing data models in population management information systems. Methodologically, there is potential for innovation in rendering visible the data infrastructures for population management through an examination of the semantic data models. By analyzing “thin” data models, researchers can discern discrepancies and omissions between systems, laying the groundwork for critical analyses that illuminate the underlying power structures and biases embedded within these infrastructures. Additionally, examining data models presents an opportunity for experimental forms of participation and deliberation on alternative ways to represent data about populations.

The second research question (RQ2) focuses specifically on the ways in which organizations search for and match identity data related to people-on-the-move. This research will explore the processes and technologies used to link and match data across different agencies and organizations, and examine how identity data are collected, stored, and analyzed. By analyzing how data are matched and linked across different organizations, this research can help us better understand the challenges and opportunities associated with managing data related to people-on-the-move. Furthermore, this question can shed light on how emerging and commercially deployed international identification technology shapes state practices. We can gain insight into the invisible aspects of data matching work within infrastructures, and better understand how these technologies shape and maintain identification systems.

In this way, RQ2 contributes to the current literature on identification by shifting the focus from the initial registration phase to the continuous retrieval and matching of identity data across diverse contexts. The question suggests considering the design and functionality of data matching tools, which play a pivotal role in reducing errors and streamlining iterative identification processes. In addition, the research contributes to a deeper understanding of the practical challenges faced by organizations and institutions in achieving data accuracy and efficiency during real-world identification procedures.

Finally, the third research question (RQ3) explores how knowledge and technology related to matching identity data circulate and travel across organizations. This research will examine the networks of actors and organizations involved in developing and disseminating technologies used for matching identity data and explore how knowledge about such technologies is shared and disseminated among different actors and organizations. Answering this question can aid in our understanding of the broader social and political contexts in which identification technology is developed and used to have long-lasting effects in numerous locations. Through this question, we can investigate how data matching technologies developed in one context can be adopted and adapted in different international settings, possibly affecting identification practices across borders. This research will also spotlight the role of commercial actors in acquiring and disseminating data matching knowledge, which could lead to the concentration of power and expertise in the hands of vendors or organizations. Additionally, exploring the circulation of knowledge and technology related to data matching aims to highlight the influence of securitization on identification practices, such as industry trends in security and how they affect software development.

By investigating the dynamic processes of identification technologies, the research on RQ3 enhances our theoretical understanding of identification systems and infrastructures, shifting away from viewing them as static systems. This approach broadens the range of actors traditionally examined in identification studies to include non-state and commercial entities. The involvement of these additional actors in developing data matching technology is expected to reveal connections between the internationalization, commercialization, securitization, and infrastructuring of identification. Focusing on the sociotechnical aspect of identification systems highlights the role of adaptable and functional identification infrastructures in serving diverse communities and ensuring that the systems remain responsive to their evolving needs.

References

About, Ilsen, James Brown, and Gayle Lonergan, eds. 2013a. Identification and Registration Practices in Transnational Perspective. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

About, Ilsen, James Brown, and Gayle Lonergan, eds. 2013b. “Introduction.” In Identification and Registration Practices in Transnational Perspective, 1–13. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

Adler, Emanuel. 1997. “Seizing the Middle Ground: Constructivism in World Politics.” European Journal of International Relations 3 (3): 319–63. https://doi.org/10.1177/1354066197003003003.

Amicelle, Anthony, Claudia Aradau, and Julien Jeandesboz. 2015. “Questioning Security Devices: Performativity, Resistance, Politics.” Security Dialogue 46 (4): 293–306. https://doi.org/10.1177/0967010615586964.

Amoore, Louise. 2006. “Biometric Borders: Governing Mobilities in the War on Terror.” Political Geography 25 (3): 336–51. https://doi.org/10.1016/j.polgeo.2006.02.001.

Aradau, Claudia. 2012. “Infrastructure.” In Research Methods in Critical Security Studies: An Introduction, edited by Mark B. Salter and Can E. Mutlu, 181–85. London & New York: Routledge.

Aradau, Claudia. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7 (4): 388–413. https://doi.org/10.1057/palgrave.jird.1800030.

Aradau, Claudia, and Jef Huysmans. 2014. “Critical Methods in International Relations: The Politics of Techniques, Devices and Acts.” European Journal of International Relations 20 (3): 596–619. https://doi.org/10.1177/1354066112474479.

Balzacq, Thierry. 2009. “Constructivism and Securitization Studies.” In The Routledge Handbook of Security Studies, edited by Myriam Dunn Cavelty and Victor Mauer, 56–72. London: Routledge. https://doi.org/10.4324/9780203866764.

Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 171–201. https://doi.org/10.1177/1354066105052960.

Balzacq, Thierry, Tugba Basaran, Didier Bigo, Emmanuel-Pierre Guittet, and Christian Olson. 2010. “Security Practices.” In Oxford Research Encyclopedia of International Studies. Oxford: Wiley Blackwell.

Bellanova, Rocco, and Georgios Glouftsios. 2022. “Controlling the Schengen Information System (SIS II): The Infrastructural Politics of Fragility and Maintenance.” Geopolitics 27 (1): 160–84. https://doi.org/10.1080/14650045.2020.1830765.

Bellanova, Rocco, and Marieke de Goede. 2022. “The Algorithmic Regulation of Security: An Infrastructural Perspective.” Regulation & Governance 16 (1): 102–18. https://doi.org/10.1111/rego.12338.

Bertrand, Sarah. 2018. “Can the Subaltern Securitize? Postcolonial Perspectives on Securitization Theory and Its Critics.” European Journal of International Security 3 (3): 281–99. https://doi.org/10.1017/eis.2018.3.

Bigo, Didier. 2014. “The (in)Securitization Practices of the Three Universes of EU Border Control: Military/Navy – Border Guards/Police – Database Analysts.” Security Dialogue 45 (3): 209–25. https://doi.org/10.1177/0967010614530459.

Borgman, Christine L. 2015. Big Data, Little Data, No Data: Scholarship in the Networked World. Cambridge, Mass.; London, Eng.: The MIT Press.

Bowker, Geoffrey C., and Susan Leigh Star. 1999. Sorting Things Out: Classification and Its Consequences. Inside Technology. Cambridge, Mass.: The MIT press.

Breckenridge, Keith, and Simon Szreter, eds. 2012. Registration and Recognition: Documenting the Person in World History. Oxford: Oxford University Press for the British Academy.

Broeders, Dennis, and Huub Dijstelbloem. 2016. “The Datafication of Mobility and Migration Management: The Mediating State and Its Consequences.” In Digitizing Identities: Doing Identity in a Networked World, edited by Irma van der Ploeg and Jason Pridmore, 242–60. London: Routledge.

Burgess, J. Peter, ed. 2010. The Routledge Handbook of New Security Studies. Routledge Handbooks. London; New York: Routledge.

Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder, Colorado: Lynne Rienner Pub.

Caplan, Jane, and John Torpey, eds. 2001. Documenting Individual Identity: The Development of State Practices in the Modern World. Princeton, N.J.; Oxford: Princeton University Press.

Cole, Simon A. 2001. Suspect Identities: A History of Fingerprinting and Criminal Identification. Cambridge, Mass.; London, Eng.: Harvard University Press.

Cole, Simon A. 2005. “Review of Imprint of the Raj: How Fingerprinting Was Born in Colonial India.” Technology and Culture 46 (1): 252–53. https://doi.org/10.1353/tech.2005.0010.

Côté-Boucher, Karine, Federica Infantino, and Mark B. Salter. 2014. “Border Security as Practice: An Agenda for Research.” Security Dialogue 45 (3): 195–208. https://doi.org/10.1177/0967010614533243.

Dalton, Craig, and Jim Thatcher. 2014. “What Does a Critical Data Studies Look Like, and Why Do We Care? Seven Points for a Critical Approach to ‘Big Data’.” Society and Space, May. http://web.archive.org/web/20230827144723/https://www.societyandspace.org/articles/what-does-a-critical-data-studies-look-like-and-why-do-we-care.

Davidshofer, Stephan, Julien Jeandesboz, and Francesco Ragazzi. 2017. “Technology and Security Practices: Situating the Technological Imperative.” In International Political Sociology: Transversal Lines, edited by Tugba Basaran, Didier Bigo, Emmanuel-Pierre Guittet, and R. B. J. Walker. Routledge Studies in International Political Sociology. London & New York: Routledge.

Dijstelbloem, Huub. 2021. Borders as Infrastructure: The Technopolitics of Border Control. Infrastructures. Cambridge, Mass.; London, Eng.: The MIT Press. https://doi.org/10.7551/mitpress/11926.001.0001.

Edwards, Paul N., Geoffrey C. Bowker, Steven J. Jackson, and Robin Williams. 2009. “Introduction: An Agenda for Infrastructure Studies.” Journal of the Association for Information Systems 10 (5): 364–74. https://doi.org/10.17705/1jais.00200.

Edwards, Paul N., Steven J. Jackson, Geoffrey C. Bowker, and Cory Philip Knobel. 2007. “Understanding Infrastructure: Dynamics, Tensions, and Design.” Working Paper Final report of the workshop, "History and Theory of Infrastructure: Lessons for New Scientific Cyberinfrastructures". http://deepblue.lib.umich.edu/handle/2027.42/49353.

Flyverbom, Mikkel, and John Murray. 2018. “Datastructuring—Organizing and Curating Digital Traces into Action.” Big Data & Society 5 (2): 1–12. https://doi.org/10.1177/2053951718799114.

Follis, Karolina S. 2017. “Vision and Transterritory: The Borders of Europe.” Science, Technology, & Human Values 42 (6): 1003–30. https://doi.org/10.1177/0162243917715106.

Gitelman, Lisa, ed. 2013. “Raw Data” Is an Oxymoron. Infrastructures. Cambridge, Mass.: The MIT press.

Glouftsios, Georgios. 2021. “Governing Border Security Infrastructures: Maintaining Large-Scale Information Systems.” Security Dialogue 52 (5): 452–70. https://doi.org/10.1177/0967010620957230.

Glouftsios, Georgios. 2019. “Designing Digital Borders: The Visa Information System (VIS).” In Technology and Agency in International Relations, edited by Marijn Hoijtink and Matthias Leese, 164–87. London; New York: Routledge.

Glouftsios, Georgios, and Matthias Leese. 2023. “Epistemic Fusion: Passenger Information Units and the Making of International Security.” Review of International Studies 49 (1): 125–42. https://doi.org/10.1017/S0260210522000365.

Goede, Marieke de, and Gavin Sullivan. 2016. “The Politics of Security Lists.” Environment and Planning D: Society and Space 34 (1): 67–88. https://doi.org/10.1177/0263775815599309.

Hanseth, Ole, Eric Monteiro, and Morten Hatling. 1996. “Developing Information Infrastructure: The Tension Between Standardization and Flexibility.” Science, Technology, & Human Values 21 (4): 407–26. https://doi.org/10.1177/016224399602100402.

Higgs, Edward. 2013. “Consuming Identity and Consuming the State in Britain Since C.1750.” In Identification and Registration Practices in Transnational Perspective, edited by Ilsen About, James Brown, and Gayle Lonergan, 164–82. St Antony’s Series. London: Palgrave Macmillan. https://doi.org/10.1057/9781137367310.

Hoijtink, Marijn, and Matthias Leese, eds. 2019. Technology and Agency in International Relations. London; New York: Routledge.

Hughes, Thomas Parke. 1983b. Networks of Power: Electrification in Western Society, 1880-1930. Baltimore: The Johns Hopkins University Press.

Huysmans, Jef. 2000. “The European Union and the Securitization of Migration.” JCMS: Journal of Common Market Studies 38 (5): 751–77. https://doi.org/10.1111/1468-5965.00263.

Huysmans, Jef. 1998. “Security! What Do You Mean?: From Concept to Thick Signifier.” European Journal of International Relations 4 (2): 226–55. https://doi.org/10.1177/1354066198004002004.

Iliadis, Andrew, and Federica Russo. 2016. “Critical Data Studies: An Introduction.” Big Data & Society 3 (2): 1–7. https://doi.org/10.1177/2053951716674238.

ISO/IEC. 2008. “Identification Cards — Machine Readable Travel Documents — Part 1: Machine Readable Passport.”

Karasti, Helena, Florence Millerand, Christine M. Hine, and Geoffrey C. Bowker. 2016. “Knowledge Infrastructures: Part I.” Science & Technology Studies 29 (1): 2–12. https://doi.org/10.23987/sts.55406.

Kitchin, Rob. 2014. The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences. London: SAGE Publications Ltd. https://doi.org/10.4135/9781473909472.

Kitchin, Rob, and Tracey P. Lauriault. 2018. “Towards Critical Data Studies: Charting and Unpacking Data Assemblages and Their Work.” In Thinking Big Data in Geography: New Regimes, New Research, edited by Jim Thatcher, Josef Eckert, and Andrew Shears, 3–20. Lincoln; London: University of Nebraska Press. https://doi.org/10.2307/j.ctt21h4z6m.

Kloppenburg, Sanneke, and Irma van der Ploeg. 2020. “Securing Identities: Biometric Technologies and the Enactment of Human Bodily Differences.” Science as Culture 29 (1): 57–76. https://doi.org/10.1080/09505431.2018.1519534.

Larkin, Brian. 2013. “The Politics and Poetics of Infrastructure.” Annual Review of Anthropology 42 (1): 327–43. https://doi.org/10.1146/annurev-anthro-092412-155522.

Leese, Matthias. 2022. “Fixing State Vision: Interoperability, Biometrics, and Identity Management in the EU.” Geopolitics 27 (1): 113–33. https://doi.org/10.1080/14650045.2020.1830764.

Leese, Matthias. 2018. “Standardizing Security: The Business Case Politics of Borders.” Mobilities 13 (2): 261–75. https://doi.org/10.1080/17450101.2017.1403777.

Lemberg-Pedersen, Martin, Johanne Rübner Hansen, and Oliver Joel Halpern. 2020. “The Political Economy of Entry Governance.” Advancing Alternative Migration (ADMIGOV) Deliverable 1.3. Copenhagen: Aalborg University. http://web.archive.org/web/20230705132811/https://admigov.eu/upload/Deliverable_D13_Lemberg-Pedersen_The_Political_Economy_of_Entry_Governance.pdf.

McDonald, Matt. 2008. “Securitization and the Construction of Security.” European Journal of International Relations 14 (4): 563–87. https://doi.org/10.1177/1354066108097553.

Monteiro, Eric, Neil Pollock, Ole Hanseth, and Robin Williams. 2013. “From Artefacts to Infrastructures.” Computer Supported Cooperative Work (CSCW) 22 (4): 575–607. https://doi.org/10.1007/s10606-012-9167-1.

Olwig, Karen Fog, Kristina Grünenberg, Perle Møhl, and Anja Simonsen. 2019. The Biometric Border World: Technologies, Bodies and Identities on the Move. London: Routledge. https://doi.org/10.4324/9780367808464.

Pelizza, Annalisa. 2021. “Identification as Translation: The Art of Choosing the Right Spokespersons at the Securitized Border.” Social Studies of Science 51 (4): 487–511. https://doi.org/10.1177/0306312720983932.

Pelizza, Annalisa, and Wouter Van Rossem. 2023. “Scripts of Alterity: Mapping Assumptions and Limitations of the Border Security Apparatus Through Classification Schemas.” Science, Technology, & Human Values 0 (0): 1–33. https://doi.org/10.1177/01622439231195955.

Peoples, Columba, and Nick Vaughan-Williams. 2021. Critical Security Studies: An Introduction. Third. Abingdon, Oxon; New York, NY: Routledge, Taylor & Francis Group.

Pollozek, Silvan, and Jan Hendrik Passoth. 2019. “Infrastructuring European Migration and Border Control: The Logistics of Registration and Identification at Moria Hotspot.” Environment and Planning D: Society and Space 37 (4): 606–24. https://doi.org/10.1177/0263775819835819.

Scott, James C. 1998. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven; London: Yale University Press.

Sengoopta, Chandak. 2004. Imprint of the Raj: How Fingerprinting Was Born in Colonial India. London: Pan.

Squire, Vicki, ed. 2010. The Contested Politics of Mobility: Borderzones and Irregularity. London: Routledge. https://doi.org/10.4324/9780203839829.

Star, Susan Leigh. 1999. “The Ethnography of Infrastructure.” American Behavioral Scientist 43 (3): 377–91. https://doi.org/10.1177/00027649921955326.

Star, Susan Leigh, and Karen Ruhleder. 1996. “Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces.” Information Systems Research 7 (1): 111–34. https://doi.org/10.1287/isre.7.1.111.

Suchman, Lucy. 2020. “Algorithmic Warfare and the Reinvention of Accuracy.” Critical Studies on Security 8 (2): 175–87. https://doi.org/10.1080/21624887.2020.1760587.

Suchman, Lucy, Karolina Follis, and Jutta Weber. 2017. “Tracking and Targeting: Sociotechnologies of (in)Security.” Science, Technology, & Human Values 42 (6): 983–1002. https://doi.org/10.1177/0162243917731524.

Taureck, Rita. 2006. “Securitization Theory and Securitization Studies.” Journal of International Relations and Development 9 (1): 53–61. https://doi.org/10.1057/palgrave.jird.1800072.

Torpey, John C. 2018. The Invention of the Passport: Surveillance, Citizenship and the State. Second. Cambridge Studies in Law and Society. New York, NY; Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/9781108664271.

Trauttmansdorff, Paul. 2022. “The Fabrication of a Necessary Policy Fiction: The Interoperability ‘Solution’ for Biometric Borders.” Critical Policy Studies, November. https://doi.org/10.1080/19460171.2022.2147851.

Valdivia, Ana, Claudia Aradau, Tobias Blanke, and Sarah Perret. 2022. “Neither Opaque nor Transparent: A Transdisciplinary Methodology to Investigate Datafication at the EU Borders.” Big Data & Society 9 (2): 1–17. https://doi.org/10.1177/20539517221124586.

Wæver, Ole, Barry Buzan, and David Carlton, eds. 1993. Identity, Migration and the New Security Agenda in Europe. New York: St. Martin’s Press.

Walt, Stephen M. 2017. “Realism and Security.” Oxford Research Encyclopedia of International Studies, December. https://doi.org/10.1093/acrefore/9780190846626.013.286.

Walters, William. 2014. “Drone Strikes, Dingpolitik and Beyond: Furthering the Debate on Materiality and Security.” Security Dialogue 45 (2): 101–18. https://doi.org/10.1177/0967010613519162.

Wendt, Alexander. n.d. “Anarchy Is What States Make of It: The Social Construction of Power Politics.” International Organization 46 (2): 391–425. Accessed April 1, 2023. https://doi.org/10.1017/S0020818300027764.

Zureik, Elia, and Karen Hindle. 2004. “Governance, Security and Technology: The Case of Biometrics.” Studies in Political Economy 73 (1): 113–37. https://doi.org/10.1080/19187033.2004.11675154.

Zureik, Elia, and Mark B. Salter, eds. 2005. Global Surveillance and Policing: Borders, Security, Identity. Devon: Willan Publishing.


  1. For a comprehensive overview of the history of fingerprinting in law enforcement, see Cole (2001).↩︎

  2. “Traditional” or “state-centric” accounts of security, on the other hand, see international relations as occurring only between sovereign nation-states, with states seeking security in a global environment with no universal rules (Peoples and Vaughan-Williams 2021; Walt 2017). According to this theory, states’ inherent competition with one another would compel them to defend their sovereignty against external threats, in this case, the economic and identity threats posed by migrants.↩︎

  3. In the fields of security and international relations, some of the earliest sources for the constructivist approach are Adler (1997), Buzan, Wæver, and Wilde (1998), Huysmans (1998), and Wendt (n.d.).↩︎

  4. Furthermore, securitization theory enables one to think about the inverse process: how issues might be de-securitized and reintroduced into regular politics.↩︎