Unseen Flow

1. Airports


1.1. (Smart) Border

We live in a world of borders. English 'Border' is derived from the Proto-Indo-European (PIE) root bherdh- (“to cut” or “divide”), often cited as the ultimate root, reflecting the idea of dividing or marking territory.a 1 In the 21st century, hundreds of new borders have been created around the world in contrast to the celebration of globalization and the increasing demand for global mobility. Modern borders are not just physical walls or fences.a 2 The most powerful borders are ‘imperceptible’ means of control, such as data borders. The data border can also be referred to as a smart border in other words. The goal of the ‘smart’ border is not to manage the border in a humanistic way but to track and block movement in real time with high-tech surveillance systems.a 3 The side effects of this increase the mortality rate of border crossers and exacerbate social inequality. In the United States, there were people who lost their lives trying to avoid the police when the Chinese Exclusion Act (1882) was passed.a 4 It is created by people and intensifies extremism by strengthening exclusive nationalism. Border changes accumulate, and they become apparent when they cross the bifurcation.a 5 After events such as 9/11, COVID-19 immigration restrictions and the Schengen Agreement are a process of reinforcing and coordinating circulation. Anyone can be deported by changing inclusion and exclusion at any time.a 6
ㅤㅤㅤㅤㅤㅤㅤ
To illustrate, deaths across the U.S.-Mexico border have a long history from the late 1800s.a 7 Arizona stretches 175 miles (about 282 km) towards Mexico, and was divided without tribal consent during the Gadsden Purchase (1853).a 8 The Tohono O’odham Nation has become a scapegoat for the border strengthening policies, and after the U.S. officially acquired half of Mexico's territory through the U.S.-Mexico War (1846-48), Indigenous people that traditionally easily crossed the two countries are increasingly controlled in their everyday lives.a 9 Tohono O'odham member Joseph Flores described that the U.S. Border Patrol agents pull people out of their cars and military surveillance enters the homes of those living near the border without warrants.a 10 This is not simply because the United States has a stronger political and economic power than Mexico, but the way the border is managed itself is a structural problem that reflects ongoing historical power pressure relationships that work against certain groups in the context of territorial expansion.a 11
ㅤㅤㅤㅤㅤㅤㅤ
As a similar example is Frontex, an organization with a history of ensuring borderless territory to facilitate the free movement of people.a 12 Since 1999, it has been formed to promote cooperation in strengthening the external border regarding migration, asylum and security, and it evolved into the current European Border and Coast Guard Agency after amendments to regulations in 2016 and 2019.a 13 Frontex is granted immunity from the legal jurisdiction of the partner country where its mission needs to be carried out.a 14 However, the EU’s externalization of border management—what can be described as a responsibility shifting—includes colonial elements. When performing duties in the Western Balkans and Africa, as seen in the colonialist-era immigration methods such as transportation, law manipulation and immigration control policies arise.a 15 Eventually, there is a concern that it will limit the autonomy of regional states and delegate responsibility to the thirds, similar to the past situation solely for the interests of the former imperial powers.a 16 Ultimately, the way in which hegemonic power continue to influence over external regions can be seen as a new form of interference to this day.


1.2. Space/Access

The border of the airport exists in illusion form made out of straight lines and doors. Here, it functions as a special environment in which people must deviate from everyday norms or relationships for a while and follow new rules.a 17 In French anthropologist Marc Augé’s book, An Introduction to Early Modern Anthropology (1995), he contrasts ‘place’ with ‘non-place’ and defines airports as typical ‘non-places’. According to him, it exists as spaces that lack identity.a 18 Airports are testbeds and function as the first places where innovations in security systems, legislative exceptions, and supranational authority are trialed and introduced, representing the early stages of change that will spread to cities, countries, and the world.a 19 While these advanced technologies and strict regulations ensure efficient flow and safety, the airport continuously collects and records specific information to turn users into ‘passengers’ roles. In this process, we are classified as ‘movers’, individual civil rights and protection can be limited by the efficiency of the system. However, not all passengers are treated equally. We are divided into mobility qualifications according to citizenship and socioeconomic status, some pass through simple screening, and others experience more processes.a 20 Due to these differences and standardization of data reading procedures, people of the global LGBTQIA+ communities, stateless,a 21 and undocumented immigrants can be simply identified as binary data, resulting in more marginalization.a 22 This is a prime example of the dynamics of power operating within the space of an airport.a 23

During the COVID-19 pandemic, getting a certification to have the data ‘healthy’ was the only way to cross the border rather than the fact that I was physically healthy. It has accelerated the non-face-to-face digital authentication system.a 24 Automated immigration screening is boosted in each country, data-based real-time tracking systems are being expanded with the aim of contributing to protecting the safety from public health and unverified migration in one’s own country.a 25 The European Union plans to implement the EES system for non-EU travelers from 2025. EES stands for Entry/Exit-system which allows the travelers to shorten their time at border checkpoints and automatically monitor them to cross borders by systematically identifying individuals staying in the Schengen area for long periods. For this reason, people in non-EU must provide biometric data when entering and leaving the Schengen area.a 26



The EES collects, records and stores:


1. Data listed in your travel document(s)(e.g. full name, date of birth, etc.)

2. Date and place of each entry and exit

3. Facial images and fingerprints (called ‘biometric data’)

4. Whether you were refused entry.a 27

ㅤㅤㅤㅤㅤㅤㅤ

We can’t define physical presence and identity as digital identification systems are categorizing us. Biometrics technology is more than just a tool for security, creating systems that reflect ethnicity.a 28 For example, 3D face recognition algorithms capture and calculate facial feature points using mathematical formulas such as Euclidean distance and Geodesic distance.a 29 However, in a way that prioritized white skin and feature in its initial design, this formulas created the problem of not accurately recognizing ethnic minority faces.a 30 Despite higher identification thresholds were required than Caucasian faces to achieve the same false acceptance rate (FAR).a 31 This suggests that exclusions from technological advancements reflect social biases. Currently, for reasons of efficiency and equality, it has been improved to develop into a system containing more ethnic group,a 32 but the bias of the people who make decisions about processing the data still remains.a 33 People are being profiled and defined as different in certain societies.a 34 It can be an intention to maintain a white-centered social system and a homogeneous ethnic society based on a uniform ethnic background.a 35 We continue to be ‘data exiles’ in certain areas for political and technical reasons, without being given enough transparent information about how our data is screened for security reasons.a 36 This justifies and conceals the validity of our right to know.


Hito Steyerl’s works reflect the political and social situation and explore the problem of constraints. How Not to Be Seen: A Fucking Didactic Educational.MOV File (2013) paradoxically shows that in a world where all our private and public data are collected semi-forced, we are intertwined with the data of our society and the spread of visual surveillance.a 37 This eventually suggests that even if people cross physical borders in special free economic/trade zones, such as airports, they are still othered and trapped inside borders in a different way than goods. People have used sophisticated methods to cross borders in various forms. The way people are hidden in goods has tended to increase more noticeably as data surveillance becomes more advanced.a 38 Will attempts to avoid data tracking also become more invisible and secretive?







 De Vaan, Michiel Arnoud Cor. Etymological Dictionary of Latin and the Other Italic Languages. 2008,
 Thomas. Theory of the Border. 2016, https://doi.org/10.1093/acprof:oso/9780190618643.001.0001, 1–3
 “Smart Borders.” Migration and Home Affairs, home-affairs.ec.europa.eu/policies/schengen/smart-borders_en.
 See SMART Borders or a Humane World? The Immigrant Defense Project and The Transnational Institute, Oct 2021, 33.
 Thomas. Theory of the Border. 2016, https://doi.org/10.1093/acprof:oso/9780190618643.001.0001, 3–7
 Ibid.,14–17
 “SMART Borders or a Humane World?” The Immigrant Defense Project's Surveillance, Tech, and Immigration Policing Project, and The Transnational Institute, Oct 2021, 33–35.
 Ibid.
 Ibid.
Ibid.
Ibid.
Tasks & Mission." Frontex, European Border and Coast Guard Agency, https://www.frontex.europa.eu/.
Ibid.
PREVIATELLO, Martina. "Frontex Actions Beyond EU Borders: Status Agreements, Immunities and the Protection of Fundamental Rights." EUI LAW, AEL, Working Paper, no. 2023/06, European Society of International Law (ESIL) Paper, 2023, 7.
The Secretive Prisons That Keep Migrants Out of Europe | the Outlaw Ocean Project. www.theoutlawocean.com/investigations/the-secretive-libyan-prisons-that-keep-migrants-out-of-europe.
Bradley, Gracie Mae, and Luke De Noronha. Against Borders: The Case for Abolition. Verso Books, 2022, 1–14.
Fuller, Gillian. Aviopolis a Book About Airports. London, United Kingdom of Great Britain and Northern Ireland, Black Dog Publishing Limited, 2004, 11–17.
Augé, Marc. “Non-places: Introduction to an Anthropology of Supermodernity.” Capital & Class, vol. 20, no. 3, Oct. 1996, 144–45. https://doi.org/10.1177/030981689606000111.
Fuller, Gillian. Aviopolis a Book About Airports. London, United Kingdom of Great Britain and Northern Ireland, Black Dog Publishing Limited, 2004, 1–17.
“Fuller, Gillian. Aviopolis a Book About Airports. London, United Kingdom of Great Britain and Northern Ireland, Black Dog Publishing Limited, 2004, 11–17.
“Nationality and Statelessness: Handbook for Parliamentarians N° 22.” United Nations High Commissioner for Refugees, July 2014, 18.
“Defining Undocumented.” IMMIGRANTS RISING, immigrantsrising.org/resource/defining-undocumented.
See Table 1 of “PERSPECTIVES ON TSA’S POLICIES TO PREVENT UNLAWFUL PROFILING.” https://www.govinfo.gov/content/pkg/CHRG-116hhrg37870/html/CHRG-116hhrg37870.htm?utm_source.
Goodlet, Kirk. “Unintended Consequences: Digital Identity and Airport Responses to COVID-19.” ACI World Insights, 26 Sept 2024, blog.aci.aero/safety-and-operations/unintended-consequences-digital-identity-and-airport-responses-to-covid-19.
“What Is the EES?” New Requirements to Travel to Europe, travel-europe.europa.eu/ees/what-ees_en.
Ibid.
“Entry-Exit System.” Migration and Home Affairs, home-affairs.ec.europa.eu/policies/schengen-borders-and-visa/smart-borders/entry-exit-system_en.
“Racial Profiling Goes High Tech with Facial Recognition.” IEEE Spectrum, Feb 2025, spectrum.ieee.org/do-you-have-the-right-complexion-for-facial-recognition.
Ahdid, Rachid, et al. “Euclidean and Geodesic Distance Between a Facial Feature Points in Two-dimensional Face Recognition System.” The International Arab Journal of Information Technology, vol. 14, Jan 2017, 15–17. dblp.uni-trier.de/db/journals/iajit/iajit14.html#AhdidSM17.
Cavazos, Jacqueline G., et al. “Accuracy Comparison Across Face Recognition Algorithms: Where Are We on Measuring Race Bias?” IEEE Transactions on Biometrics Behavior and Identity Science, vol. 3, no. 1, Sept 2020, 6–8. https://doi.org/10.1109/tbiom.2020.3027269.
Ibid.
“About.” No Tech for ICE. Accessed July 2024. https://notechforice.com/about/.
Benjamin, Ruha. Race After Technology: Abolitionist Tools for the New Jim Code. Polity, 2019, 13–15, 33–42, 53–55.
Jones, Willie D. “Racial Profiling Goes High Tech With Facial Recognition.” IEEE Spectrum, Feb 2025, spectrum.ieee.org/do-you-have-the-right-complexion-for-facial-recognition.
Benjamin, Ruha. Race After Technology: Abolitionist Tools for the New Jim Code. Polity, 2019, 15–42, 64–65, 91, 106–108, 122–127.
Mac, Ryan, et al. “Clearview AI’s Facial Recognition Tech Is Being Used by the Justice Department, ICE, and the FBI.” BuzzFeed News, Feb. 2020, www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement.
Steyerl, Hito. “How Not to Be Seen.” Rhizome, May 2013, www.rhizome.org/editorial/2013/may/31/hito-steyerl-how-not-to-be-seen/.
“List of Migrant Vehicle Incidents in Europe.” Wikipedia, Nov. 2024, en.wikipedia.org/wiki/List_of_migrant_vehicle_incidents_in_Europe?utm_source.

Sticky Image