1 As it will become clearer in what follows, in the context of this chapter we distinguish between ‘points’ and ‘nodes’. We conceive of the first as folded devices tasked with an inputting task; the latter as unfolded actors which translate different sources into each other.

2 Here, ‘our’ includes also Ermioni Frezouli, in her capacity as temporary collaborator of the Processing Citizenship Project. Ms. Frezouli however decided not to participate in this chapter as co-author.

3 As a matter of fact, Hotspots ought not to be deployed exclusively in frontline countries. While they eventually were only implemented in Greece and Italy, originally the European Agenda foresaw their potential deployment in any Member State that required them (European Commission 2015b).

4 The shift from geographical to topological remoteness has mostly gone unnoticed by literature on ‘fortress Europe’ and borders. However, it is crucial to study the relationship between data infrastructures and institutional orders.

5 In Greek, Χαρτογράφηση Κυκλοφορίας Αλλοδαπών.

6 The Eurodac (i.e., European Dactyloscopy) system was first introduced in 2003 to support the application of the Schengen Treaty and Dublin Convention. It stores the digital fingerprints of every person claiming asylum in one of the European Member States. By doing so, it intends to univocally identify asylum seekers, so they cannot apply in more than one Member State. Eurodac was developed by European authorities and is now run by the European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA).

7 It should be noted, however, that in some cases non-frontline Member States receive such data through international organizations. That non-governmental and non-European organizations act as intermediaries of European relations is indeed an important topic of analysis, and is addressed in forthcoming work by Pelizza, Loschi and Lausberg.

8 In the STS field, we are well aware of the topological meaning of equivalence as translation, that is, making to things that are different occupy the same position (see e.g. Latour 2005).

9 Following our observation on field and analysis of the procurement call, similar considerations could be made for hardware.

10 The ANSI/NIST standard can be considered the dominant standard worldwide for exchange of biometric and forensic information. The American National Standards Institute/National Institute of Standards and Technology – Information Technology Laboratory (ANSI/NIST-ITL) defines the content, format and units of measurement for the exchange of biometric and forensic information utilized to identify and authenticate individuals. The first version of the standard for the interchange of fingerprint, facial and biometric information was published in 1986 by the then called ‘United States National Bureau of Standards’. Its goal was to support electronic fingerprint submissions from US state and local authorities to the FBI (Wing 2013). The standard is now used by law enforcement, homeland security, military and other authorities in 71 countries in all continents.


Agar, J. (2003). The Government Machine: A Revolutionary History of the Computer. Cambridge, MA: The MIT Press.

Amicelle, A., Aradau, C., and Jeandesboz, J. (2015). Questioning Security Devices: Performativity, Resistance, Politics. Security Dialogue 46(4): 293–306. <>.

Aradau, C. (2010). Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 41(5): 491–514. <>.

Balch, A., and Geddes, A. (2011). The Development of the EU Migration and Asylum Regime. In H. Dijstelbloem and A. Meijer (Eds), Migration and the New Technological Borders of Europe. Migration, Minorities and Citizenship. London: Palgrave Macmillan UK, pp. 22–39. <>.

Bekkers, V. (2007). The Governance of Back-Office Integration. Public Management Review 9(3): 377–400. <>.

Bowker, G. C., and Leigh Star, S. (1999). Sorting Things Out: Classification and Its Consequences. Cambridge, MA: The MIT Press.

Dargie, W., and Poellabauer, C. (2010). Fundamentals of Wireless Sensor Networks: Theory and Practice. John Wiley & Sons.

De Goede, M., Simon, S., and Hoijtink, M. (2014). Performing Preemption. Security Dialogue 45(5): 411–422. <>.

Dijstelbloem, H., and Pelizza, A. (2019). The State Is the Secret: For a Relational Approach to the Study of Border and Mobility Control in Europe. In de Goede, M., Bosma, E., and Pallister-Wilkins, P. (Eds), Secrecy and Methods in Security Research: A Guide to Qualitative Fieldwork. London: Routledge, pp. 48–62.

Elson, J., and Estrin, D. (2004). Sensor Networks: A Bridge to the Physical World. In C. S. Raghavendra, Krishna M. Sivalingam, and Taieb Znati (Eds), Wireless Sensor Networks. Boston, MA: Springer US, pp. 3–20. <>.

Estrin, D., Govindan, R., Heidemann, J., and Kumar, S. (1999). Next Century Challenges: Scalable Coordination in Sensor Networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking – MobiCom 1999, pp. 263–70. Seattle, WA: ACM Press. <>.

Estrin, D., Girod, L., Pottie, G. and Srivastava, M. (2001). Instrumenting the World with Wireless Sensor Networks. In 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), pp. 2033–36. Salt Lake City, UT: IEEE. <>.

European Commission (2015a). The Hotspot Approach to Managing Exceptional Migratory Flows. <>.

—— (2015b). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. A European Agenda on Migration. Brussels. <>.

—— (2015c). Refugee Crisis: European Commission Takes Decisive Action – Questions and Answers. <>.

Gabrys, J. (2016). Program Earth: Environmental Sensing Technology and the Making of a Computational Planet. University of Minnesota Press.

—— (2019). Sensors and Sensing Practices: Reworking Experience across Entities, Environments, and Technologies. Science, Technology, & Human Values 44(5): 723–36. <>.

Gibbons, P. B. (2018). Data Storage and Indexing in Sensor Networks. In Liu, L. and Tamer Özsu, M. (Eds), Encyclopedia of Database Systems. New York: Springer New York, pp. 850–53. <>.

Hacking, I. (1983). Representing and Intervening: Introductory Topics in the Philosophy of Natural Science. Cambridge: Cambridge University Press.

Hellenic Republic Ministry of Citizens Protection. (2011). Διακήρυξη Ανοικτού Διαγωνισμού Για Το Έργο «Ηλεκτρονικες Υπηρεσιες Ταυτοποιησης Και Αναγνωρισης Πολιτων (E-Ταπ)» (Open Call for the Project ‘Electronic Identification and Identification Services (E-Tap)’).

Kloppenburg, S., and van der Ploeg, I. (2018). Securing Identities: Biometric Technologies and the Enactment of Human Bodily Differences. Science as Culture 0 (0): 1–20. <>.

Laplante, P. A. (2007). What Every Engineer Should Know about Software Engineering. CRC Press. <>.

Latour, B. (1987). Science in Action: How to Follow Scientists and Engineers Through Society. Harvard University Press.

—— (2005). Reassembling the Social: An Introduction to Actor-Network Theory. Oxford: Oxford University Press.

Leander, A. (2013). Technological Agency in the Co-Constitution of Legal Expertise and the US Drone Program. Leiden Journal of International Law 26(4): 811–31. <>.

Manning, P. K. (1996). Information Technology in the Police Context: The ‘Sailor’ Phone. Information Systems Research 7(1): 52–62. <>.

Pelizza, A. (2016.) Developing the Vectorial Glance: Infrastructural Inversion for the New Agenda on Governmental Information Systems. Science, Technology and Human Values 41(2): 298–321. <>.

—— (2019). Processing Alterity, Enacting Europe: Migrant Registration and Identification as Co-Construction of Individuals and Polities. Science, Technology and Human Values 45 (2): 262–288. <>.

Pollock, N., and Williams, R. (2009). Software and Organisations: The Biography of the Enterprise-Wide System or How SAP Conquered the World. Routledge Studies in Technology, Work and Organisations 5. London; New York: Routledge.

Salter, M. B. (2008). When the Exception Becomes the Rule: Borders, Sovereignty, and Citizenship. Citizenship Studies 12(4): 365–80. <>.

Suchman, L., Follis, K., and Weber, J. (2017). Tracking and Targeting: Sociotechnologies of (In)Security. Science, Technology, & Human Values 42(6): 983–1002. <>.

Taylor, R. N. (2019). Software Architecture and Design. In S. Cha, R. N. Taylor, and K. Kang (Eds), Handbook of Software Engineering. Cham: Springer International Publishing, pp. 93–122. <>.

Tilly, C. (1990). Coercion, Capital, and European States, AD 9901992. Oxford: Basil Blackwell.

Vogel, K. M., Balmer, B., Weiss Evans, S., et al. (2017). Knowledge and Security. In U. Felt, R. Fouché, C. A. Miller, and L. Smith-Doerr (Eds), The Handbook of Science and Technology Studies. Cambridge, MA: The MIT Press, pp. 973–1001.

Wing, B. J. (2012). The ANSI/NIST-ITL Standard Update for 2011 (Data Format for the Interchange of Fingerprint, Facial and Other Biometric Information). International Journal of Biometrics 5(1): 20–29. <>.

Witjes, N., and Olbrich, P. (2017). A Fragile Transparency: Satellite Imagery Analysis, Non-State Actors, and Visual Representations of Security. Science and Public Policy 44(4): 524–34. <>.

Yick, J., Mukherjee, B., and Ghosal, D. (2008). Wireless Sensor Network Survey. Computer Networks 52(12): 2292–2330. <>.

Allopurinol 10 0mg uses Where to buy synthroid in Thunder Bay Thunder Bay verapamil shipping Nevada shipping casodex Windsor xifaxan 200mg shipping Buy alphagan online from Michigan Where to buy cardura in Colorado online Can symbicort and advair be taken together Side effects of prograf Where to buy xyzal 5mg in Lincoln online