The borders , they are a-changin ' ! The emergence of socio-digital borders in the EU

Relying on big data, modern surveillance becomes increasingly influential in determining societal power relations. Lyon argues that modern surveillance always categorises people entailing social effects, what he conceptualises as social sorting. This paper assesses if patterns of social sorting can be found in the EU surveillance systems for migration Schengen Information System (SIS), Visa Information System (VIS) and EUROpean DACtylographic comparison system (EURODAC), which are planned to be merged in order to ensure maximum efficiency in surveillance. To do so, the paper analyses relevant documents referring to SIS, VIS and EURODAC. These systems have assumed the traditional border function of deciding on societal inclusion and exclusion. I argue that, to some extent, socio-digital borders are drawn along the categories established through social sorting. The paper exemplifies how social sorting relying on big data may be a disempowering surveillance practice.


INTRODUCTION
When the European Union (EU) abolished internal border controls within the Schengen area in the 1990s, political leaders saw a need to preempt the loss of control over non-EU citizens.To meet this need, the transnational migration1 surveillance systems Schengen Information System (SIS), Visa Information System (VIS) and EURODAC have been charged with collecting data concerning third-country nationals entering the EU.Lyon (2003) assesses that transnational surveillance systems increasingly show patterns of social sorting, that is obtaining data to classify people into risk categories such as citizens, migrants or potential criminals.This may lead to establishing or strengthening social differences among the classified individuals.Starting out from Lyon's assumption that every form of modern surveillance entails social sorting, this paper assesses in how far and with what consequences EU databases use such classification.While Lyon (2003) focuses on Northern American surveillance, this paper seeks to complement his research focusing on EU surveillance systems.
I claim that SIS, VIS and EURODAC exhibit social sorting and affect the political power of the classified groups both positively and negatively.This changes the notion of borders since the power to divide into societal in-and outsiders is shifted from territorial towards socio-digital borders.To some extent, borders are redrawn along the social categories reinforcing already existing power relations.As the title suggests, the borders in Europe are changing through big data surveillance.This paper thus shows how social sorting relying on big data may represent a disempowering form of surveillance.
I firstly show how modern surveillance, big data, social sorting and power are linked.
Subsequently, I explain the design of SIS, VIS and EURODAC and analyse the systems according to the criteria of social sorting identified in section 2. The paper finishes with a discussion of socio-digital borders and power effects of big data surveillance.

SOCIAL SORTING: SURVEILLANCE THAT (DIS)EMPOWERS
Large-scale generic surveillance has recently become criticised for suspicion without prior evidence (Weidemann, 2014).To explain social problems that surveillance may entail, I define the features of modern surveillance relying on big data.Jenkins (2012) identifies three characteristics of modern surveillance: surveillance serves specific purposes.It is one-directional, with the watcher observing a subject who is not empowered to observe the watcher in turn.Finally, surveillance is increasingly impersonal and remote.While traditionally aimed at specific persons, modern surveillance tends towards generic data storage (pp. 162-163).Bendrath ( 2014) adds the element of information sharing which is increasingly important since it enables data to become mobile (p.21).Following 9/11,2 Lyon (2014) perceives a change in surveillance practices.It is particularly the use of big data that has changed surveillance from Foucauldian discipline to a control tool (p.2).Big data intensifies trends of modern surveillance and is used to precede events rather than to assess them in retrospect (2003, p. 14).Lyon defines big data as "the capacity to search, aggregate and cross-reference large data sets" (2014, p. 2).Hence, this paper looks at modern surveillance as relying on big data being automated, remote, entailing data sharing and being used to prevent threats.
The most important feature of post-9/11 surveillance to Lyon is the emergence of social sorting.
Social sorting systems obtain personal data to classify people according to specific criteria.To Lyon, modern surveillance always entails classification of people into risk categories.Data The borders, they are a-changin'!The emergence of socio-digital borders in the EU created through digital surveillance needs to be processed, analysed and stored efficiently to be suitable for decision-making.People's data and, thus, people themselves, are put into social categories according to predefined criteria which Lyon perceives as a means of creating and reinforcing long-term social differences (Lyon, 2003).For instance, people put into "undesirable" categories may experience slower travel (2007b, p. 453).Likewise, social sorting affects power relations between governmental institutions and surveilled and among the surveilled themselves.Lyon defines power as having and using the means to control and influence populations (2007b).The exercise of such political power is increasingly organised through sophisticated, integrated surveillance strategies.
Although data categorisation is not a recent phenomenon, social sorting systems are new in the sense that big data practices enable routine and systematic searches of data doubles3 (Lyon, 2007b, p. 451).Their emergence can be partly explained by an increase in perceived threats and politicians' wish for more effective population control, that is migration monitoring (2003, p.20).However, social classification of human life is nothing extraordinary.State institutions depend on social differentiation, for example to determine who may vote.Social life depends on categorisation to make sense of personal relations.However, social sorting systems rationalise this process.
Lyon's description of social sorting systems can be structured into three overarching indicators: large-scale databases, social classification and resulting social effects.Table 1 summarises these characteristics.Firstly, social sorting gains strength when security arrangements are internationally harmonised and databases are integrated.The international dimension enables a broad scope of surveillance and increases its efficiency.To signal maximum security, policymakers increasingly design interoperable databases (Lyon, 2007a, pp. 162-165).
Social sorting relies on computer codes assigned to each category and the individual's data double (Lyon, 2003, p. 23).Codes represent the determining factor in surveillance systems that results in differences in people's opportunities as they allow or deny access to areas and experiences (p.13).By assigning a code to each data double, surveillance becomes remote and impersonal.
Classification occurs with the rationale of risk management, the translation of data into risk categories.The target groups usually are firstly mobile citizens and travellers, secondly, asylum seekers and migrants and, thirdly, criminals (Lyon, 2007a, p. 163).Among the most suspicious categories are presumed terrorists and irregular migrants.This distinction and hierarchy of risk categories reflects Foucault's concept of descending individualisation.Groups at the lower end of social hierarchy are surveilled more than the ones at the upper end (Foucault, 1977).
The classical example of tools of social sorting systems are electronic ID cards.Being markers of membership, they assign a nationality to each data double, classify eligible members and exclude non-citizens (Lyon, 2004).What is new about these systems is the reliance on modern technologies.In particular biometrics has made surveillance more concrete and reliable and has fostered its rationalisation and impact (Ball et al., 2012;Marx, 2002).
Secondly, the systems classify for further judgement.They determine who should be the target of special treatment or suspicion (Lyon, 2004).Social sorting systems put the collected data into risk categories.Risk profiles are assigned according to race, gender, ethnic, national or religious criteria (Salter, 2006, p. 179).Such categorisation relies on massive data processing to identify patterns for intelligent filters.Big data practices enable these pattern-seeking processes (Lyon, 2014, p. 3).
The borders, they are a-changin'!The emergence of socio-digital borders in the EU Finally, categorisation has social effects on classified people as the categories allow for discriminatory treatment.They decide on exclusion or inclusion and thereby create or sustain long-term social differences.In this sense, surveillance may have empowering and disempowering effects.The power of big data lies in the use of information to influence populations, order privileges, and predict and control events.Big data surveillance empowers the governmental entity managing the tools while disempowering people put in undesirable categories (p.44).For them, social sorting impacts the quality of social existence negatively (Benam, 2011, p. 191).Taking the example of border surveillance systems, being put in the category of a legitimate traveller or of an illegitimate migrant affects one's mobility.Such systems thus have a considerable impact on social existence and raise concerns about human rights such as freedom of movement or freedom from suspicion (Lyon, 2007a, pp. 162-163).
Social sorting exemplifies how the supposedly neutral concept of big data surveillance can have social and ethical implications.

EU TRANSNATIONAL SURVEILLANCE SYSTEMS: SIS, VIS AND EURODAC
In recent years, the EU has assigned increasing importance to transnational databases in become by far the largest EU database (Brouwer, 2008, p. 14).Since its launch, most data in SIS concerns third-country nationals being refused entry to Schengen.
Being designed similarly, the Visa Information System (VIS) complements SIS.VIS, introduced in 2008, has a central database that shares its headquarters with SIS and relies on national counterparts.It registers all persons entering Schengen with a visa and aims at facilitating the identification of persons having stayed irregularly after their visa's expiration (Brouwer, 2008, p. 85).
The EUROpean DACtylographic comparison system (EURODAC) was introduced in 2003 to support the implementation of the Dublin Convention on asylum.This convention determined that the responsibility for an asylum claim lies with the member state having received the respective application.To detect and prevent simultaneous application for asylum in several member states, EURODAC collects fingerprints of applicants (Brouwer, 2008, p. 77).Once correspondence with a stored dataset has been found, applicants may be returned to the member state where the first asylum claim was issued.
Since the three systems are closely connected, they exemplify a trend towards interoperability between transnational surveillance systems in the EU (eu-LISA, 2014;Brouwer, 2008).It is particularly their interoperability and thus size of dataset, searchability and use of modern technologies that reflect their big data practices.

METHODOLOGY
To answer the question in how far EU surveillance systems exhibit features of social sorting, I conducted a qualitative content analysis of essential documents and regulations of SIS, VIS and EURODAC.Since SIS II, VIS and EURODAC were introduced between 2000 and 2013, this timeframe is taken as reference.I apply the features of social sorting summarised in Table 1 to the cases.To assess the effect of social sorting systems on borders and power relations, I hold a conceptual discussion.

The databases
Social sorting often occurs with the harmonisation of international security arrangements.SIS, VIS and EURODAC are part of the creation of an area of freedom, security and justice and, thus, serve both migration control and security policy (Walters, 2002, p. 568).The analysis finds strong reference to security-related topics.SIS aims at contributing to "a high level of security" The criterion of interoperability can also be confirmed for all databases.SIS is designed to be fully connected to VIS by 2020 (European Commission, 2016).Already now, a valid ground for a visa refusal in VIS is an alert in SIS (EP & Council, 2008, Art.12.2(f)).Finally, EURODAC's regulations recommend the consultation of VIS prior to reviewing EURODAC itself (2013, Art. 20(1)).The systems' interoperability enlarges the available dataset for searches which highlight the importance of big data for their functionality.
A further criterion of social sorting systems is the reliance on computer codes.All three systems are based on alphanumerical codes assigned to each file.This enables greater precision in the search for identities (Council, 2007, Art. 22(b); EP & Council, 2008, Art. 5.1(a);Council, 2000, Art. 11.1).This ability of cross-referencing data doubles is achieved through the use of big data and increases the systems' efficiency.
To determine whether the databases represent risk management systems as stated by Lyon, I examine their purpose.Systems of risk management assign worth and risk to collected data, which in turn enables judgement.The cases fulfil this criterion.SIS uses collected data including names, physical characteristics not subject to change or sex, primarily to issue alerts "for the purpose of refusing entry or stay" (EP & Council, 2006, p. 5;Michael & Michael, 2008).VIS shall assist in the identification of expired visas and support decisions on renewal, refusal or shortening of visas and enable decision-making on visa policy (2008, Art. 2).Similarly, EP and Council call EURODAC a "valuable tool" for managing offences related to both security and migration (2013, p. 3).EURODAC bases decision-making on collected fingerprints that are made available to security agencies upon request.To serve the purpose of risk management, big data grants the databases the "power to predict"6 events (Richards & King, 2014, p. 397).
Finally, the use of biometric data can be identified in all systems.In particular, they make use of fingerprints and biometric photos (EP & Council, 2006, p. 5;2008, p. 61;2013, p. 2).
In conclusion, with respect to technological aspects, SIS, VIS and EURODAC display distinct characteristics of social sorting.

Classification
With respect to risk categories, the databases distinguish between citizens and non-citizens.SIS issues alerts on third-country nationals even if they enjoy free movement within the Schengen area (EP & Council, 2006, Art. 3(d)).Once EU citizenship is acquired, all data on the concerned individual is deleted, which implies that citizens are not considered a risk (Art.30).VIS distinguishes between tourists and visa holders.It is a spelled-out purpose of VIS to protect travellers (European Commission, 2015).Hence, every case not classified as a tourist or another desirable category is considered a risk category.EURODAC establishes three categories according to differing attributes of "aliens".Being concerned with asylum applications, the system distinguishes between "applicants for international protection", persons "apprehended in connection with the irregular crossing of an external border" and people "found illegally staying" in the EU (EP & Council, 2013, Chapters II-IV).Thus, different degrees of risk are assigned to regular applicants and irregular migrants.
The criteria for these categories are spelled out less clearly and remain implicit in the legal documents.While for SIS, the SIRENE manual spells out some criteria (European Commission, 2006), VIS' and EURODAC's criteria remain unspecified.In general, the systems file individuals only above the age of 14.Furthermore, they do not keep record of citizens.VIS differentiates between visa types that are decisive in determining the data categories (2008, Art. 4).
EURODAC puts more emphasis on the manner an individual has entered the Schengen area.It The borders, they are a-changin'!The emergence of socio-digital borders in the EU differentiates between irregular and regular travel and between asylum applicants, regular aliens and stateless persons (2013, p. 3).7 Finally, each of the examined systems defines attributes of identification of the individuals.For SIS, these are general characteristics such as sex, origin-related data and place of birth, biometric data or a comment on whether the person is armed or violent (EP & Council, 2006, Art. 20).Similarly, VIS stores data on the individual's origin, occupation and residence, in addition to biometric and travel-related information (2008, Art.9).EURODAC stores information on sex, state of origin, the reference number and biometric data gained through fingerprints (2013, Art.14).
In conclusion, although the categories' characteristics are not formulated precisely, the systems display strong characteristics of classification.

Social effects of classification
Assessing the impact of classification exceeds the informational value of this analysis, since, not surprisingly, the documents do not mention possible social implications.Yet, they still allow for some statements about these effects with secondary literature confirming the assumption of a long-term social impact.
The categories enable discriminatory treatment along the lines of the data groups.Decisions concerning the group may have serious social implications.SIS categorises to refuse entry or stay within the Schengen area (EP & Council, 2006, p. 5).This implies that the categories have an effect on populations' mobility.With SIS and EURODAC being also used as security instruments, the European Police Office Europol and its international counterpart Interpol can be granted access to the systems.Hence, registered persons are at greater risk of being affected by law enforcement and suspicion (2013, Art. 21;Brouwer, 2008, p. 514).Moreover, a hit in EURODAC may result in the deportation of the concerned person to another member state (p. 3).VIS equally indicates possible social implications since the risk category affects the applicants' prospects of being granted a visa.In addition, VIS information is linked to the profiles of the travel groups or family members of every data double (2008, Art. 8).If an alert is issued on one member of this 'network', other members are automatically controlled too.Thus, an alert affects more than the concerned file.This practice infringes European fundamental rights since it results in surveillance of third parties who did not, for themselves, cause a reason for being surveilled.
It can be assumed that such discriminatory treatment with respect to mobility or freedom from suspicion results in long-term social differences.The systems provide for repetitive control of data doubles since in particular VIS is not only concerned with the decision on visas but also on the expiration of acquired ones (Broeders, 2007, p. 73).SIS and EURODAC keep data on individuals for ten years and VIS for five years from the date of registration onwards.Hence, the systems exert influence for a considerable time.
Although social effects of social sorting can be both positive and negative, the most serious ethical problems arise from negative discrimination of who Bigo (2014) labels "data-banned" populations (p.219).Being collectively put in undesirable risk categories, they bear the consequences of slow or even no permission to travel (Pötzsch, 2015, p. 109).This is particularly troublesome when considering the systems' tendency to produce "mistaken identities", people that have been falsely assigned a category (Lyon, 2007b, p. 462;Benam, 2011, p. 203).González Fuster and Gutwirth (2012) even go so far as to consider social sorting as the implicit stigmatisation of people on the move (p.184).Furthermore, such categorical suspicion controlling border movements(Aas, 2011).The Amsterdam Treaty of 1999 established an area of freedom, security and justice with the surveillance systems SIS, VIS and EURODAC constituting central elements (p.332).The development of these databases is linked to the aspirations of building a Europe without internal border controls as policymakers sought to compensate for loss of control towards third-country nationals(Brouwer, 2008, p. 2).SIS, VIS and EURODAC shall therefore combine the policy objectives of migration and border control.The terrorist attacks in Madrid and London in 2004 and 2005 have triggered an increased link of migration and security in the EU.Since then, emphasis on border controls in the field of migration policy has been reinforced (p.31).The EU agency for large-scale IT systems eu-LISA operates the databases and connects them closely to one another(European Commission, 2015).The Schengen Information System (SIS), operational since 1995, is a data-based registration and surveillance system made up of national databases that feed information into the central one inStrasbourg (Broeders, 2007, pp.79-80).A second-generation system, called SIS II, was introduced in 2006 to create a technically feasible system for an enlarged EU.SIS II4 has March 2016 | Volume 5 | Issue 1 within the EU (Council of the EU [Council], 2007, Art.1.2).Furthermore, harmonisation of provisions relating to migration, asylum and security is one major objective of SIS (European Parliament & Council of the EU [EP & Council], 2006, Art.24.5; p. 5).Similarly, VIS is devised to enhance security within the Schengen area.Although being a migration policy instrument, "VIS data will substantially contribute to the prevention, detection or investigation of terrorist offences" (EP & Council, 2008, Art.3.1).EURODAC shows an interesting development in this respect.The regulation of 2000 refers to asylum while the revised regulation of 2013 puts stronger emphasis on international crime (EP & Council, 2013, p. 2).5The borders, they are a-changin'!The emergence of socio-digital borders in the EU Internet Policy Review | http://policyreview.info 6 March 2016 | Volume 5 | Issue 1