Abstract
Since 2014, millions of refugees and migrants have arrived at the borders of Europe. This article argues that, in making their way to safe spaces, refugees rely not only on a physical but increasingly also digital infrastructure of movement. Social media, mobile devices, and similar digitally networked technologies comprise this infrastructure of “digital passages”—sociotechnical spaces of flows in which refugees, smugglers, governments, and corporations interact with each other and with new technologies. At the same time, a digital infrastructure for movement can just as easily be leveraged for surveillance and control. European border policies, in particular, instantiate digital controls over refugee movement and identity. We review the actors, technologies, and policies of movement and control in the EU context and argue that scholars, policymakers, and the tech community alike should pay heed to the ethics of the use of new technologies in refugee and migration flows.
Navigating the Digital Passage
The world has changed dramatically since 1951, when the United Nation (UN) first set out legal protections for refugees in the Geneva Convention. Terrorism has become a global watchword, governments and economies both have toppled and soared, and the Internet and digital devices are accessible from all over the globe.
In Syria, a series of political protests in 2011 set off a wave of crises that have culminated in a years-long civil war; with casualty rates reported above 200,000 in 2015, more than 4 million refugees have since fled the country (BBC, 2016). These refugees, and the Syrian crisis as a whole, have become the focal point in contemporary debates around the movement, risks, and resettlement of refugees from numerous conflict zones.
The Syrian refugee crisis is often labeled as the largest since World War II (WWII) following which the first international policies and protections for refugees were developed. Refugees today face the same struggles to escape war-torn homes as previously; however, their experience differs in at least one dramatic way: refugees today not only depend on a physical but increasingly also on digital infrastructure to make their way across to safer places. It is the components of this “digital passage,” and the actors that populate it, that we analyze in this article.
Focusing on the context of the highly mediatized arrival of refugees and migrants at the borders of Europe in 2015–2016, we will illustrate how refugees, human traffickers, governments, and the private sector interact in this new digital environment. Refugees are able to rely on digital networks to both communicate with distant family members and locate the resources they need. Yet, those same tools are increasingly also used to exploit their vulnerabilities. For instance, the movement of refugees is facilitated by digital platforms provided by multinational corporations. But the design of those platforms is rarely catered toward the specific needs and risks inherent to the refugee experience. Furthermore, refugees must contend with the fact that similar technologies are used by governments to increase their control over borders, migration, and the access to asylum.
The European Union (EU) and its member states have been at the forefront of this development. At the European level, two regulations are particularly noteworthy in this regard: Eurosur (mandating drone and satellite surveillance of the Mediterranean Sea) and Eurodac (biometric information collection at the border). Eurosur and Eurodac are both reflective of the EU’s increasingly digitalized system of border controls, but the underlying logic of the use of drones and biometrics within that system differs greatly: while Eurosur reinforces external borders through the classification of
Methodologically, we will provide an overview of the use of digital technologies by refugees and human smugglers, on one hand, as well as provide an in-depth analysis of relevant private and public sector initiatives, on the other hand, in order to demonstrate that the digital passage not only facilitates movement but could just as easily be exploited as a tool for surveillance and control. Note that the discussion of refugees and human traffickers will mostly focus on
In sum, in this article, we will examine what we call the new digital passage for movement and explore the inherent tensions that are embedded in the sociotechnical relationships that it enables. We conclude with a discussion of the risks and benefits inherent to the digital passage and urge researchers, policymakers, and the tech community alike to pay heed to the ethical questions surrounding the use of digital technologies in modern migration and refugee flows.
Migration, Globalization, and Modernity
The study of refugees and modern communication technologies lies at the intersection of the fields of migration, globalization, and modernity and draws upon a rich literature ranging from migration and media studies, anthropology and law. As Inda and Rosaldo (2008) point out, we are experiencing an “intensification of global interconnectedness, suggesting a world full of movement and mixture, contact and linkages, and persistent cultural interaction and exchange” (p. 4). This interconnectedness has facilitated the flow not only of information and goods but also of people; migration is, thus, an important part of globalization. At the same time, that information flow has not been even or symmetrical. Indeed, as Fassin (2011) cautions, “whereas the circulation of goods was progressively facilitated through international trade agreements, the transnational circulation of persons became increasingly restricted, at least for the majority of the population of the planet” (p. 214). This is confirmed by Balibar (2004), according to whom Nothing could be more wrong than the idea that globalization would be accompanied by a parallel growth of material, immaterial, and human circulatory flows. Whereas information has become practically “ubiquitous,” and whereas the circulation of goods and currency conversions have [sic] been almost entirely “liberalized,” the movements of men are the object of heavier and heavier limitations. (p. 113)
But regardless of whether it is encouraged or suppressed, “Migration, in its endless motion, surrounds and pervades almost all aspects of contemporary society” (Papastergiadis, 2000, p. 1).
In recent years, migration and media studies have joined forces. Of course, the media have always been a powerful tool for shaping national publics. As Anderson (2006) famously described, print capitalism significantly contributed to the formation of “imagined communities,” which were vital to fostering a sense of national belonging. This sense of belonging has been complicated, however, by a marked increase in transnational flows of both people and information. As Appadurai (1996) points out, “new forms of electronically mediated communication are beginning to create virtual neighborhoods” (p. 195) that are no longer restricted to the geographical confines of the nation-state.
A number of scholars have explored the specific relationship between digital media and the migrant experience. Madianou (2014) argues that “media do not just add a new dimension to the phenomenon of migration—they transform it altogether” (p. 323). In her study of Filipina overseas workers living in the United Kingdom, the promise that communication technologies would help them stay connected with family back home encouraged their decision to migrate in the first place. In reality, however, connectivity was often not enough, and family structures could end up damaged and strained. Hegde (2016), by contrast, demonstrates that digital media can help create and sustain transnational diasporic public spheres. Similarly, Leurs (2015) examines how online technologies are used by migrant and diasporic youth to perform and negotiate identity. Finally, in the Anthology of Migration and Social Transformation (2016), Drüeke provides a useful overview of recent work in which media and migration studies intersect.
As Bauman (2012) suggests, “[m]odernity starts when space and time are separated from living practice and from each other” (p. 8). It is, hence, the seemingly antithetic intertwining of the instantaneous borderless fluidity of digital media and the drudging constricted materiality of the migrant experience that this article intends to explore.
Exploring the Digital Passage: Technologies, Actors, and Relationships
In the context of the Syrian refugee crisis, the attention of journalists, scholars, and humanitarian organizations has increasingly turned toward refugees’ use of digital media and communication technologies. For instance, in August 2015, the
Refugees
When refugees use social media and networked technologies, they both produce and rely on a digital infrastructure of information flows. Castells’ definition of the “space of flows” suggests that it is “the material arrangements that allow for simultaneity of social practices without territorial contiguity” (Castells, 1999, p. 295). Access to this “space of flows” has proved crucial to refugees on their journeys. Not only does it allow refugees to stay in touch with friends and family at home but it also provides them with real-time information as they try to make their way to safer places (e.g., Frouws, Phillips, Hassan, & Twigt, 2016). The “Asylum and Immigration Without Smugglers” Facebook group founded by the Syrian refugee Abu Amar in 2013, for instance, proved to be a particularly valuable resource of information on borders, routes, weather conditions, and safe places to stay (e.g., Schmidle, 2015; Todtmann & Edlbe, 2015). The
At the same time, an analysis of the impact of digital networks on the refugee experience must also consider the material conditions of that which is so often characterized as purely informational. Indeed, accessing crucial information on the Internet depends on an entire infrastructure and economy of Wi-Fi hotspots, shops that sell SIM cards, or the physical offices of wire transfer services.
For example, field observations for this project in Serbia in November 2015 occurred at a time when “irregular” migrants and refugees were allowed to travel across the country and exit for a period of 3 days. Without this grace period, many would have had to resort to unauthorized entry across the border and to obtaining illegal transportation often supplied by human smugglers.
While the majority of asylum seekers sought to move across Serbia to the next border as quickly as possible, some needed to stop in Belgrade in order to access critical resources—medical attention, food, shelter, or information. A park in the center of Belgrade became the de facto meeting place for refugees in need of obtaining these services. In one area of the park, the Red Cross provided free Wi-Fi, while in another area an International non-governmental organization (NGO) received and distributed free clothing.
Refugees discovered this park via word-of-mouth or through the various mobile tools at their disposal. These mobile devices were charged at solar charging stations near an infirmary. Indeed, images of packed mobile phone charging stations for refugees have become a familiar trope in the news media. Yet, an equally visited area was an information booth manned by aid workers with photocopies of bus schedules to the Croatian border tacked to the outside wall. Other refugees needed to stop in the capital in order to find a bank or financial center for electronic money transfers. Finding these places of financial access connectivity are essential in order to fund the various stages of the journey.
Based on these observations we note that refugees’ movement within physical space is intrinsically connected with information needs, flows, and access. Digital technologies allow for refugee movement across space and time, yet also require a material anchoring in the technical infrastructure.
Traffickers
The dual use nature of technology is on display in the refugee context. The same technologies that afford refugees with many benefits today can just as easily be exploited to do them harm. Human smugglers and human traffickers rely on those technologies too; but they use them to profit from those who are desperately seeking a better life. Human trafficking and human smuggling are two distinct socio-legal constructs. Yet, the two blur in relation to the technologies used and the refugees and migrants who are vulnerable to various degrees of exploitation, and thus, both will be discussed in the same context for the purposes of this article. Research in other national contexts has demonstrated that human traffickers use online technologies and mobile phones to exploit more individuals across greater distances in shorter periods of time (Latonero, 2011, 2012). As nationally and internationally defined crimes, human trafficking tends to focus on exploitation, whereas human smuggling focuses on transportation (UN Office of Drugs Crime [UNODC]). Yet, in practice, the distinctions between the two phenomena can blur and the technologies facilitating the crimes are the same.
Previous descriptive research has demonstrated that human smugglers leverage sophisticated social networks and increasingly rely on new technologies to operate more effectively (Mavris, 2002). Reports have recently surfaced that social media are being used to connect smugglers with refugees from the Middle East and North Africa. For example, human smugglers in Libya and Egypt have used Facebook to advertise “trips to Italy” (Kingsley, 2015; Saleh, 2015). According to the Organization for Economic Co-operation and Development (Organisation for Economic Co-operation and Development [OECD], 2015), the arrivals of relatively wealthy Syrians migrants on this smuggling route, mostly transiting through Egypt to Libya, and the greater use of social media to reach out potential clients, have increased expected profits and the business for traffickers on the central Mediterranean route.
A report from Europol and Interpol (2016) on migrant smuggling networks further highlights that “social media is also an important tool widely used by migrants and recruiters alike to diffuse information about routes, services, and prices.”
In addition to social media, mobile phones and messaging services like Viber have served as a primary means for smugglers to organize illicit boats, trucks, and lodging for refugees and migrants seeking such services. These illicit relationships are enabled by digital connectivity. Yet, due to the clandestine and illegal nature of these activities, increased connectivity, somewhat paradoxically, actually entails increased isolation from social structures in this case. For example, in some human-trafficking cases, an individual may have the digital means to communicate with traffickers but is unable to contact the authorities if he or she become victimized for fear of being arrested (Latonero, Wex, & Dank, 2015).
Despite the risks, refugees’ use of mobile tools such as WhatsApp can also serve as a virtual lifeline (Kozlowska, 2015; Specia, 2015). In an interview conducted in November 2015, a Norwegian law enforcement officer working aboard a ship in the Mediterranean explained that smugglers forced refugees and migrants into dangerously unsafe boats, sometimes with the threat of physical violence. Once in the boat, the passengers hope to reach the coverage area where their cell phones can be used to send distress signals before their boats sink. It is a complicated array of phone devices, cell towers, service providers, applications, and national policies that enables scenarios such as these.
Corporations
As mentioned earlier, many of the platforms and devices that refugees and other actors in the digital passage have come to rely upon are provided by private corporations. It probably comes as no surprise that refugees use social media platforms provided by the tech sector, just like everybody else, since they are intended to be used by consumers for myriad aspects of everyday life. Refugees are not everyday consumers, however. They have specific characteristics that make them a vulnerable population. Privacy concerns, for example, can be more sensitive for refugees who may be fleeing political persecution and violence in their home countries. Increased visibility on social media may put their remaining relatives back home at risk or potentially stigmatize them in their host countries.
Yet, a platform like Facebook, whose business model centers around collecting, analyzing, and selling its users’ data, does not differentiate between refugees as a vulnerable group and the population at large. In essence, social media platforms provide much needed services for refugees, while surveilling and tracking them for commercial purposes. Every text message, money transfer, social media login, and Wi-Fi connection generates data on refugees and smugglers alike. Companies like Facebook, Vodafone, and Western Union currently collect and analyze such data for commercial purposes; but this raises the question of whether the private tech sector cannot also leverage the same technologies to benefit refugees more directly.
Yahoo, Google, and others have started to create programs to intentionally intervene in the refugee issue (Al Jazeera, 2015; Datta, 2015). For instance, Google has created apps that purport to provide refugees with helpful information along their journey and in host countries. The company has also donated US$5.3 million in Chromebooks to children in refugee camps. Similarly, Facebook announced that it would provide “free” Wi-Fi in refugee camps in coordination with the UN Refugee Agency. As an indication of the growing interest in private tech sector involvement, in September, President Obama (2016), at the UN General Assembly, announced US$650 million of investments for refugee “solutions” from companies like Airbnb, HP, LinkedIn, Mastercard, Microsoft, TripAdvisor, and Western Union.
It remains to be seen whether a digital infrastructure that remains part of a global, privatized, and commercial space and is primarily geared toward making profit can, at the same time, be repurposed for the protection of fundamental rights. Labels such as “user” and “customer” might not as easily attach to refugees as they do to non-displaced populations. One possible way to incentivize companies to consider the special rights and concerns of refugee users is to appeal to user safety policies. For example, Facebook has previously come under fire for facilitating human (sex) trafficking (Mason, 2012) and responded by partnering with groups like the US-based Center on Missing and Exploited Children to identify child sex abuse images (Facebook, 2016). Facebook has also sought to apply its facial recognition technology to identify possible trafficking victims and offenders (Roberts, 2015). If similar interventions were developed in the refugee context, the benefits and risks for refugees are unclear, particularly when infrastructure for free movement is simultaneously deployed for surveillance and control.
More specifically, the prevalence of refugee use of these platforms casts a new light on the debates over data collection and privacy, particularly when such collection can be used for corporate profits, user surveillance, and identifying bad actors on proprietary networks. A major debate is government access to the online “intelligence” gathered by technology firms. While it may, thus, be right, historically, to claim that states have “monopolized the
Governments
In order to make their way across to safe spaces, refugees have to navigate multiple borders. While borders were initially defined simply as “international boundaries between nation-states” (Alvarez, 1995, p. 449), political geographers and anthropologists are increasingly turning toward the study of borderlands as sites of investigations where not only issues related to nationality but also culture, values, and identity are challenged and renegotiated (Aas, 2011b; Alvarez, 1995; Heymann & Symons, 2012; Van Houtum & van Naerssen, 2002). Furthermore, in the context of migration control, the study of external (national) borders has recently been complemented by a study of internal (cultural) boundaries, and how the policing of the former can lead to the reinforcement of the latter (Fassin, 2011; see also Van Houtum & van Naerssen, 2002). Finally, several scholars have also turned their attention to how the introduction of new technologies, particularly in the digital realm, has led to a proliferation of borders both horizontally—beyond the sovereign territory of nation-states—and vertically—outsourcing migration control to private companies and platforms (Aas, 2006, 2007, 2011a, 2013; Amoore, Marmura, & Salter, 2008; Balibar, 1992; Broeders, 2007; Dijstelbloem, 2009; Dijstelbloem & Broeders, 2015; Epstein, 2008; Gammeltoft-Hansen, 2013; Gammeltoft-Hansen & Sørensen, 2013; Mitsilegas, 2012; Pötzsch, 2015). These questions call for a fundamental reconsideration of the nature of borders and boundaries in the digital age and more specifically how one can
grapple, empirically, with the concept of a “border,” when a border is no longer simply a “wall” around a nation-state territory but rather a distributed network of myriad checkpoints, technologies, and actors, which can be situated inside or outside a given state territory. (Aas, 2011a, p. 296)
The EU is a particularly complicated borderland. While the Schengen Agreement resulted in the abolition of the internal borders of the EU, it simultaneously encouraged the fortification of its external borders. This is because migration is no longer only framed as an economic but, in the aftermath of the 11 September 2001 terrorist attacks, increasingly also as a security concern. Consequently, there is a growing perception that the freedom of movement within the EU can only be protected by restricting movement into the EU (Huysmans, 2006; see also Aas, 2011b; Schwell, 2014). The instability of the Northern African border region following the Arab Spring and the ongoing conflicts in the Middle East further contributed to the sentiment that Europe was surrounded, if not enclosed, by sources of insecurity. This sentiment was aggravated as increasing numbers of migrants, displaced persons, and asylum seekers arrived at the borders of Europe.
In response to increased migratory pressures and perceived security threats, the EU reinforced its border controls, complementing the physical infrastructure of “natural” sea and land, as well as man-made borders such as checkpoints and fences, with a digital infrastructure for surveillance and control. Two EU regulations are particularly noteworthy in this regard: Eurodac (biometric information collection at the border) and Eurosur (drone and satellite surveillance of the Mediterranean Sea). Both regulations form part of an increasingly digitalized EU border surveillance system but the underlying logic of the use of drones and biometrics within that system differs greatly: whereas the former facilities
Eurodac
The Eurodac regulation (Council Regulation [EC] No 2725/2000) was introduced in the European parliament on 11 December 2001. The original purpose of the regulation was to allow for the effective enforcement of the Dublin Convention, which mandates that refugees have to apply for asylum in the first country of arrival in the EU. The establishment of a central European database comprised of the fingerprints of all asylum seekers above the age 14 was deemed necessary toward this end because it allowed each individual EU member state “to check whether an alien found illegally present on its territory has applied for asylum in another Member State” (Council Regulation [EC] No 2725/2000, p. 3) and, thus, to prevent asylum seekers from filing multiple asylum applications (Boehm, 2012, p. 305). But the Eurodac database also includes information about all other immigrants who have been arrested for illegal border crossings in the EU. In June 2013, the mandate of the Eurodac regulation was expanded to also allow European law enforcement agencies such as Europol, the European Police Office, access to the database, based on the argument that “the information contained in Eurodac is necessary for the prevention, detection or investigation of terrorist offenses” (Regulation [EU] No. 603/2013). Finally, in May 2016, the European Commission published a proposal to collect not only fingerprints but also facial recognition data under the Eurodac regulation (European Commission, 2016, pp. 12–13) to lower the minimum age for inclusion in the database from 14 to 6 (European Commission, 2016, p. 6) and to extend the data retention period from 18 months to 5 years (European Commission, 2016, p. 4).
Eurosur
The Eurosur regulation (Regulation [EU] No. 1052/2013) was adopted on 22 October 2013. The goal of the Eurosur regulation is to provide EU member states and Frontex, the EU’s border management agency, with the infrastructure and tools needed to improve their situational awareness and reaction capability at the external borders of the Member States of the Union (“external borders”) for the purpose of detecting, preventing and combating immigration and cross-border crime and contributing to ensuring the protection and saving the lives of migrants.
Toward this end, Eurosur proposes a comprehensive system of surveillance of the maritime and external land borders of the EU, including the establishment of so-called national coordination centers for the exchange of information and the use of sophisticated surveillance tools, such as satellite imagery and drones (Regulation (EU) No. 1052/2013, Article 12(3)c). Importantly, in order to maintain pre-frontier intelligence pictures, the EU not only monitors its own external land and maritime borders but also monitors the borders of neighboring third countries. Consequently, the Eurosur regulation also explicitly encourages information sharing and cooperation with those countries (Regulation [EU] No. 1052/2013, Article 20).
From Massification to Individuation
The Eurodac and Eurosur regulations both form part of the EU’s comprehensive border surveillance system, but the respective purposes of Eurosur and Eurodac within that system greatly differ. The goal of Eurosur is to prevent illegal migration into the EU from happening in the first place, whereas Eurodac is concerned with controlling the movement of migrants and asylum seekers once they have already crossed the border. In order to achieve these goals—both of which rely on digitally networked technologies—each system employs a unique logic of control.
Eurosur’s drone and satellite surveillance allow for a birds-eye view of the Mediterranean Sea. It allows for the detection of the movement of boats, but it does not allow for the identification of individual passengers on those boats. Nor is this necessary from the perspective of external border controls at least, as the concern is less with the
Social Media Surveillance
Governments increasingly seek to exploit the affordances of digital infrastructure for the purposes of migration management and control. The European Commission’s (EC’s) European Migration Network (2016) details how social media is being used to facilitate human smuggling (and trafficking) and argues that monitoring social media sites can aid in prevention and criminal investigations. Proactive monitoring of social media for smuggling prevention involves counter-messaging in online sites, while smuggling investigation involves collecting electronic evidence for possible criminal prosecutions. The EC also states that a number of EU member states engage in direct monitoring of social media sites with the assistance of Europol and Frontex, but with a key distinction.
Frontex primarily focuses on social media monitoring for preventive risk analysis purposes (e.g. performing analyses on irregular migration routes, to inform Member States who can then tailor responses to new phenomena). Europol on the other hand is involved in both the prevention and investigation aspects. (EC, European Migration Network, 2016)
According to a 2017 report by Europol’s European Migrant Smuggling Center, social media accounts of suspected smugglers were “communicated to” Europol over the prior year’s investigations.
For examples involving direct monitoring by EU member states, both the German and Belgium governments proposed measure that would allow “law enforcement authorities to access smartphones and social media accounts of asylum seekers, in order to ‘make safety checks,’ i.e. carrying out identification in the absence of ID documents and searching for security-relevant information” (Bellanova, Jumbert, & Gellert, 2016). The German Ministry of the Interior (BMI) initiated proposals in early 2017, which would allow officials to seize the data on the smartphones and laptops of asylum seekers—without their consent—who do not have proper identification.
Demanding access to social media accounts is not limited to the governments in Europe. In late 2016, during the Obama Administration, the US Customs and Border Protection (CPB) began to request the social media accounts of foreign visitors entering into the country (Romm, 2016). In 2017, the head of the Department of Homeland Security (DHS), under the new Trump Administration, stated that his agency is considering looking into the social media accounts of individuals seeking entry into the country from selected Muslim-majority countries (Naylor, 2017). At the same time, the Council on American–Islamic Relations (CAIR) filed an official complaint with the US CBP and DHS, claiming that the agencies were systematic targeting of Muslim-Americans. According to CAIR (2017), “the complaints reported increased scrutiny of American-Muslim’s social media accounts and contents of their mobile phones along with invasive questions regarding their religious beliefs and political opinions about American Citizens.” These examples further the notion that the digital platforms facilitating movement are simultaneously sites of surveillance that instantiate government border policies of control.
The Ethics of the Digital Passage
As Bedoya (2014) points out, “the survival of our
This critique is of particular importance if refugee populations themselves become aware of the potential negative impact of data-emitting infrastructures. Such knowledge can spark “system avoidance” (Brayne, 2014), where individuals choose unofficial or non-monitored channels and services over those that are official and generate data. And while this can avoid the negative repercussions of unfettered data collection practices by central authorities, such off-the-grid alternatives can also expose refugees to new risks of exploitation and violence, far beyond the reach of law enforcement or relief services. Thus, in examining the realities of the new digital passage, it is important to focus on when data are captured, how data are captured, the purpose for which it is collected, and the (potentially harmful) ends to which it is eventually applied.
Yet, this is not to deny that some forms of government collection of individual data can also be legitimate and even helpful for refugees. According to Lerman (2013, p. 60), “Policymaking increasingly depend[s] on the accuracy of big data and advanced analytics. Exclusion or underrepresentation in government datasets, then, could mean losing out on important government services and public goods.” The effective collection and analysis of data therefore also have the potential to significantly improve the fair allocation of goods and services, and hence, improve the overall wellbeing of a community. As Torpey (2000, p. 11) suggests, the functioning of modern states depends on infrastructural control; states “
Looking Ahead: Beyond Technological Solutionism
In February 2016, European government and border control officials met with representatives from a variety of tech companies to develop “technical solutions” to the refugee crisis. The proposals range from “a smartcard ID system” for the distribution of food and services to “tempt[ing] refugees to download tracking apps on their smartphones by offering helpful information about sea crossings and conditions in different EU countries” (Taylor & Graham-Harrison, 2016). At the same time, a group of well-meaning computer scientists, engineers, and startup representatives from across the world have joined forces to organize a series of “techfugee” conferences with a similar goal (Techfugees, 2016). The difference lies in how these actors define “the solution”: European government and border control officials are incentivized to utilize digital infrastructures to reinforce physical borders and maximize control over refugees; “digital humanitarians,” on the other hand, may seek to develop technologies to facilitate and support the freedom of movement.
There is no easy answer to the question of whether or not the digital passage ultimately benefits or harms vulnerable populations. However, we would urge academics, policymakers, and the tech community alike to grapple with this question
This article has tried to map out the contours of a new digital infrastructure for movement and the ways in which it is navigated by government officials, tech representatives, human traffickers, and the refugees themselves. This focus on refugees exemplifies a broader research approach wherein the dual use nature of technologies can only be understood upon investigating how such technologies play out in specific social contexts—particularly in human rights and humanitarian contexts where vulnerable populations are concerned. As the tools that comprise new digital infrastructures expand in scope and usage in the near future, we should make sure to remain mindful of the ethics of the digital passage, with a particular focus on individual’s fundamental rights to privacy, freedom of movement, asylum, and, above all, human dignity.
Footnotes
Declaration of Conflicting Interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
