Chapter 7 Further Reading: Border Control and Biometric Databases
1. Irma Maave Góngora and Joseph J. Cohn. Biometrics and Border Security: A Survey of the Technology and Practice. Congressional Research Service, 2019.
A comprehensive technical and policy overview of biometric use in U.S. border security, written for a congressional audience and therefore designed to be accessible to non-specialists. The report covers the major systems (IDENT, NGI, ATS), their legal authorities, their technical capabilities, and the oversight mechanisms that govern them. Valuable as a starting point for understanding how the government describes and justifies its own systems. CRS reports are publicly available and regularly updated. Read in conjunction with EFF's investigative reporting on the same systems for a more critical perspective.
2. National Institute of Standards and Technology. Face Recognition Vendor Testing: Demographic Effects. NIST Internal Report 8280, 2019.
The foundational empirical study on demographic accuracy disparities in facial recognition algorithms. The full report provides considerably more detail than Chapter 7's summary — examining 99 algorithms across multiple photographic databases, providing false positive and false negative rates by demographic category, and analyzing the technical factors that contribute to disparities. Essential reading for anyone who wants to understand the empirical basis for claims about facial recognition and race. Available free from NIST's website.
3. Antony Loewenstein. The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso, 2023.
An investigative account of how surveillance technologies — biometric systems, facial recognition, border monitoring tools — developed and tested in the context of Israel's control of Palestinian territories are exported globally. The book examines the political economy of surveillance technology and the role of military and occupation contexts as "laboratories" for surveillance systems that are later deployed in other settings. Directly relevant to Chapter 7's analysis of border surveillance systems and Chapter 8's treatment of camera networks. Provides a global perspective on how surveillance technology is developed, tested, and marketed.Note: This is an advocacy work as well as journalism; readers should evaluate its factual claims against independent sources.
4. Eunice Ezeilo, Nils Muižnieks, and others. Lives on Hold: The Human Cost of Europe's Flawed Asylum System. Amnesty International, 2014–2020 (multiple reports).
Amnesty International has published a series of reports documenting the human impact of the Dublin/Eurodac system on asylum seekers in Europe. These reports provide the ground-level human documentation that academic analyses of the system often lack: specific cases of people trapped between national systems, documentation of detention conditions, accounts of the biometric registration experience, and legal analysis of where the system violates EU and international law. Available on Amnesty's website. Read as primary source documentation of how a biometric governance system functions in practice.
5. Ruha Benjamin. Race After Technology: Abolitionist Tools for the New Jim Code. Polity Press, 2019.
Benjamin's influential analysis examines how race is encoded into technological systems — including biometric and identification systems. The chapter on what Benjamin calls "the New Jim Code" — technologically mediated discrimination that operates through apparently neutral processes — provides essential analytical tools for understanding why NIST's accuracy disparities are not simply technical problems but structural ones. Benjamin's framework applies across multiple chapters of this textbook; Chapter 7's treatment of biometric border surveillance is one of its most direct applications.
6. John Torpey. The Invention of the Passport: Surveillance, Citizenship, and the State. Cambridge University Press, 2000.
The definitive academic history of the modern passport system. Torpey traces the development of documentary identity from the early modern period through the twentieth century, arguing that the passport represents a state monopoly on the legitimate means of movement. His analysis of how states gradually made documentation a condition of movement across borders — and how this shift redistributed power from individuals and local communities to central states — is essential historical context for everything discussed in Chapter 7. Particularly strong on the WWI emergency origin of the modern system.
7. Shira Rubin. "How the EU Uses Biometrics to Control Europe's Migrant Crisis." Wired, 2016.
A detailed journalistic account of how EU biometric systems — particularly Eurodac and SIS II — functioned during the 2015–16 migration crisis. Rubin provides on-the-ground reporting from Greece and Italy on fingerprinting practices, resistance by asylum seekers, and the practical gaps between the designed system and its implementation. A useful bridge between the academic analysis of systems and their lived reality. Available in Wired's online archive.
8. David Murakami Wood. "Before and After Snowden." Surveillance & Society 13, no. 2 (2015): 132–138.
An editorial reflection by the editor of Surveillance & Society on what the Snowden revelations changed for surveillance studies as a field. Wood's piece addresses border surveillance as one of several domains where the revelations shifted what was knowable, what was contested, and what kinds of political responses became possible. Useful for situating Chapter 7's material within the broader evolution of the field and for understanding why the period around 2013–2015 represents an inflection point in public understanding of surveillance architecture.
9. Borders and Law Clinic, University of Texas School of Law. Warrantless and Unchecked: The Border Search Exception in the Digital Age. 2018.
A legal clinic report examining how the border search exception applies to electronic devices — phones, laptops, tablets — under current law and practice. The report documents the scale of electronic device searches at U.S. borders (CBP conducts tens of thousands of electronic device searches annually), analyzes the legal authorities and their limits, and recommends legislative and administrative reforms. Particularly valuable for understanding the practical intersection of digital privacy and border surveillance.
10. Alice Petitt, et al. Trapped in the Eurodac Blind Spot. ECRE (European Council on Refugees and Exiles), 2022.
A research report examining how Eurodac's 2021 regulatory updates — including the lowering of the fingerprinting age to 6 and the extension of retention periods — affect asylum seekers across EU member states. The report documents inconsistent implementation across countries, ongoing problems with data quality, and the implications for children's rights. Essential reading for the Eurodac case study and for anyone interested in how biometric governance systems evolve over time.
11. Electronic Frontier Foundation. "I've Got Nothing to Hide" and Other Misunderstandings of Privacy." Various reports on border surveillance. EFF.org.
The EFF has produced an extensive body of investigative reporting and legal analysis on U.S. border surveillance programs, including IDENT, ATS, electronic device searches, and facial recognition at airports. Their work is based heavily on FOIA litigation — much of what is publicly known about the details of systems like ATS comes from EFF's document requests. Their reports are not neutral advocacy — EFF takes strong civil liberties positions — but the documentary foundations of their analysis are rigorous and valuable. Freely available at eff.org.
12. Didier Bigo and Elspeth Guild, eds. Controlling Frontiers: Free Movement Into and Within Europe. Ashgate, 2005.
An edited academic volume examining the governance of European borders, with particular attention to the relationship between mobility, security, and the construction of "risk" categories in border surveillance. Several chapters are directly relevant to Chapter 7's analysis of EU biometric systems. Bigo's concept of the "ban-opticon" — a surveillance regime that focuses on identifying who should be excluded rather than including and monitoring everyone — provides a useful analytical counterpoint to Foucauldian panopticism. Graduate-level reading but essential for a nuanced theoretical understanding of border surveillance.
Chapter 7 Further Reading | Part 2: State Surveillance | The Architecture of Surveillance