SURVEILLANT ASSEMBLAGES AND BORDER GOVERNANCE IN THE GLOBAL SOUTH: A CRITICAL STUDY OF BRICS SECURITY PRACTICES

JOSÉ NORONHA RODRIGUES, SUMANTA BHATTACHARYA, DORA CRISTINA RIBEIRO CABETE

Abstract


Objective: This article undertakes a critical analysis of border governance and surveillance practices within BRICS nations (Brazil, Russia, India, China, and South Africa), employing the conceptual framework of surveillance assemblages. The primary aim is to examine how emerging technologies—such as biometrics, artificial intelligence, predictive analytics, and unmanned aerial systems—are reshaping the exercise of sovereign power, fostering transnational security cooperation, and recalibrating the balance between protective measures and fundamental rights in the Global South.

Methodology: This investigation adopts a qualitative and theoretical approach, grounded in critical surveillance studies (notably the works of Haggerty & Ericson, Lyon, Zuboff, among others). It consists of an interdisciplinary critical analysis that integrates theories of biopolitics, surveillance capitalism, and governmentality with empirical data concerning BRICS security practices and cooperation frameworks. The study also highlights the legal ambiguities and “normative silences” that facilitate the experimentation with surveillance regimes beyond established international standards.

Results: The study demonstrates that BRICS countries have been reinforcing their borders through the deployment of advanced technologies, integrating biometric surveillance systems, interoperable databases, drones, and artificial intelligence. These developments constitute complex surveillance assemblages that transform individuals into “data doubles,” enabling selective and predictive control over mobility. Such practices expose significant power asymmetries within the bloc, with China and Russia playing dominant roles in technological provision and management. Although framed within a discourse of security and development, these measures pose substantial risks to privacy, civil liberties, and due process—particularly in multicultural and border regions. Moreover, while cooperation among BRICS members is relevant in addressing transnational crimes such as terrorism, trafficking, and piracy, it remains fraught with geopolitical tensions, socioeconomic disparities, and challenges in legal harmonization.

Conclusions: The article concludes that border governance within the BRICS, while marked by technological innovation and advances in cooperation, tends to reproduce logics of hierarchy, authoritarianism, and inequality characteristic of the Global South. While enhancing security, these practices simultaneously undermine fundamental rights and reinforce patterns of social and political exclusion. The author advocates for deeper critical reflection on the ethical, legal, and political implications of such practices, emphasizing that the consolidation of a BRICS surveillance model may represent a distinct paradigm from that of the Global North—yet one that is equally problematic.


Keywords


Surveillance assemblage; BRICS; border governance; Global South; securitization; biopolitics.

Full Text:

PDF

References


ABBOTT, K. W., KEOHANE, R. O., MORAVCSIK, A., et al. (2000). The concept of legalization. International Organization, 54(3), 401–419. Retrieved from: https://doi.org/10.1162/002081800551271

AMOORE, L. (2006). Biometric borders: Governing mobilities in the war on terror. Surveillance & Society, 5(2), 123–138. Retrieved from: https://doi.org/10.1016/j.polgeo.2006.02.001

ANDREJEVIC, M. (2007). iSpy: Surveillance and power in the interactive era. University Press of Kansas. Retrieved from: https://kansaspress.ku.edu/

ARORA, P. (2019). The next billion users: Digital life beyond the West. Harvard University Press.

BANERJEE, S. (2017). BRICS Summits and outlook on terrorism. Indian Council of World Affairs. Retrieved from: https://www.icwa.in/show_content.php?lang=1&level=3&ls_id=1743&lid=1501

BASU, P. (2021). Maritime India: The quest for a steadfast identity (ORF Occasional Paper No. 339). Observer Research Foundation. Retrieved from: https://www.orfonline.org/research/maritime-india-the-quest-for-a-steadfast-identity

BIGO, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives, 27(1), 63–92. Retrieved from: https://migrantsproject.eu/wp-content/uploads/2020/08/Bigo_Security-and-Immigration.pdf

BRECKENRIDGE, K. (2014). Biometric state: The global politics of identification and surveillance in South Africa, 1850 to the present. Cambridge University Press.

BRICS. (2023). Johannesburg Declaration. Ministry of Foreign Affairs of the People's Republic of China. Retrieved from: https://www.fmprc.gov.cn/eng./zy/gb/202405/t20240531_11367367.html

CHATSZIS, P., & STAVROU, E. (2022). Cyber-threat landscape of border control infrastructures. International Journal of Critical Infrastructure Protection, 36, 100503. Retrieved from: https://doi.org/10.1016/j.ijcip.2021.100503

CHINA DAILY. (2022, September). BRICS nations call for more cooperation on disaster management. The State Council, The People’s Republic of China. Retrieved from: https://english.www.gov.cn/statecouncil/ministries/202209/26/content_WS6330e698c6d0a757729e0827.html

CHOUNG, H., DAVID, P., & LING, T.W. (2024). Acceptance of AI-powered facial recognition technology in surveillance scenarios: Role of trust, security, and privacy perceptions. Technology in Society, 79, 102721. Retrieved from: https://doi.org/10.1016/j.techsoc.2024.102721

CONVENTION ON BIOLOGICAL DIVERSITY. (2022). Text of the Convention. Retrieved from: https://www.cbd.int/convention/text

DE GENOVA, N. (2013). Spectacles of migrant ‘illegality’: The scene of exclusion, the obscene of inclusion. Ethnic and Racial Studies, 36(7), 1180–1198. Retrieved from: https://doi.org/10.1080/01419870.2013.783710

DE SCHUTTER, O. (2012). International human rights law: Cases, materials, commentary. Cambridge University Press. Retrieved from: https://www.cambridge.org/core/books/international-human-rights-law/8275EE329C2E6C88CD1577293470A78A

DEIBERT, R., PALFREY, J., ROHOZINSKI, R., et al. (Eds.). (2008). Access denied: The practice and policy of global internet filtering. MIT Press. Retrieved from: https://library.oapen.org/bitstream/handle/20.500.12657/26091/1003995.pdf

DELEUZE, G. (1992). Postscript on the societies of control. October, 5, 3–7. Retrieved from: https://www.jstor.org/stable/778828

DEVONSHIRELLIS, C., & BONESH, F. R. (2023). Intra-BRICS trade and analysis 2023. Silk Road Briefing. Retrieved from: https://www.silkroadbriefing.com/news/2023/08/21/intra-brics-trade-and-analysis-2023/

DONNELLY, J. (2013). Universal human rights in theory and practice. Cornell University Press.

FEDERAL GOVERNMENT OF BRAZIL. (2015). National strategy for border security. Brasília: Ministry of Justice. Retrieved from: https://portalantigo.ipea.gov.br/agencia/images/stories/PDFs/livros/livros/151104_brics_long_term_strategy.pdf

FOUCAULT, M. (2003). Society must be defended (M. Bertani, A. Fontana, F. Ewald, & D. Macey, Eds.). Allen Lane.

GKOUGKOUDIS, G., PISSANIDIS, D., & DEMERTZIS, K. (2022). Intelligence-led policing and the new technologies adopted by the Hellenic Police. Digital, 2, 143–163. Retrieved from: https://doi.org/10.3390/digital2020009

GSCHREY, R. (2011). Borderlines: Surveillance, identification and artistic explorations along European borders. Surveillance & Society, 9(1/2). Retrieved from: https://doi.org/10.24908/ss.v9i1/2.4146

GUILFOYLE, D. (2011). Piracy and armed robbery at sea: The legal framework for counter-piracy operations in Somalia and the Gulf of Aden. International Criminal Law Review, 11(5), 910–914. Retrieved from: https://brill.com/view/journals/icla/11/5/article-p910_6.xml

HAGGERTY, K. D., & ERICSON, R. V. (2003). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622. Retrieved from: https://doi.org/10.1080/00071310020015280

INTERNATIONAL COMMITTEE OF THE RED CROSS. (2005). Human rights and refugee law – Three pillars. Retrieved from: https://www.icrc.org/en/doc/resources/documents/statement/6t7g86.htm

KANIA, E. B. (2020). AI weapons in China’s military innovation. Brookings Institution. Retrieved from: https://www.brookings.edu/wp-content/uploads/2020/04/FP_20200427_ai_weapons_kania_v2.pdf

KLIMBURG, A. (2017). The darkening web: The war for cyberspace. Penguin Press. Retrieved from: https://www.penguinrandomhouse.com/books/318518/the-darkening-web-by-alexander-klimburg/

KSHETRI, N. (2015). Cybercrime and cybersecurity issues in the BRICS economies. Journal of Global Information Technology Management, 18(4), 245–249. Retrieved from: https://doi.org/10.1080/1097198X.2015.1108093

KUNDNANI, A. (2014). The Muslims are coming! Islamophobia, extremism, and the domestic war on terror. Verso Books.

LEE, H.-Y. (2014). Trade facilitation and global supply chains: The role of FTA trade facilitation rules in promoting global supply chains. Journal of International Logistics and Trade, 12(1), 3–21. Retrieved from: https://doi.org/10.24006/jilt.2014.12.1.3

LYON, D. (2003). Surveillance after September 11. Queen’s University, Ontario.

MARKEY, D. (2023). The persistent threat of nuclear crises among China, India, and Pakistan. USIP. Retrieved from: https://www.usip.org/publications/2023/02/persistent-threat-nuclear-crises-among-china-india-and-pakistan

MLAMBO, V. H., ADETIBA, T. C., & THUSI, X. (2022). Using technology to address cross-border crime and illegal migration: The case of South Africa. Border and Regional Studies, 10(3), 205–225. Retrieved from: https://doi.org/10.25167/brs4830

MONAHAN, T. (2006). Surveillance and security: Technological politics and power in everyday life. Routledge.

MONAHAN, T., & WOOD, D. M. (2018). Surveillance studies: A reader. Oxford University Press.

MURUGESAN, R. (2021, April). Predictive policing in India: Deterring crime or discriminating minorities? LSE Blog. Retrieved from: https://blogs.lse.ac.uk/humanrights/2021/04/16/predictive-policing-in-india-deterring-crime-or-discriminating-minorities/

PANT, H. V. (2023). From BRICS to BRICS Plus: Old partners and new stakeholders (Special Report No. 214). Observer Research Foundation. Retrieved from: https://www.orfonline.org/research/from-brics-to-brics-plus-old-partners-and-new-stakeholders

PLESSIS, C. du, MIRIDZHANIAN, A., & ACHARYA, B. (2023, August). BRICS welcomes new members in push to reshuffle world order. Reuters. Retrieved from: https://www.reuters.com/world/brics-poised-invite-new-members-join-bloc-sources-2023-08-24/

PTI. (2022, June 16). BRICS NSAs discuss new threats, challenges to national security. Times of India. Retrieved from: https://timesofindia.indiatimes.com/world/europe/brics-nsas-discuss-new-threats-challenges-to-national-security/articleshow/92244935.cms

RABASA, A., BORAZ, S., CHALK, P., et al. (2007). Ungoverned territories: Understanding and reducing terrorism risks. RAND Corporation. Retrieved from: https://www.rand.org/pubs/monographs/MG561.html

RODRIGUES, J. N., MEDINA, J. C., & CABETE, D. C. R. (2024). Artificial intelligence in the face of the normative silence of international law: A look at the European Union and MERCOSUR. Brazilian Journal of International Law, 21(3), 305–318. Retrieved from: https://www.publicacoes.uniceub.br/rdi/article/view/9361

ROGOVSKY, N., & COOKE, F. L. (2021). Towards a human-centred agenda: Human resource management in the BRICS countries in the face of global challenges. International Labour Organization. Retrieved from: https://www.ilo.org/sites/default/files/wcmsp5/groups/public/@dgreports/@inst/documents/publication/wcms_830693.pdf

SHAH, S. (2023). How is drone based surveillance strengthening national and border security. Times of India. Retrieved from: https://timesofindia.indiatimes.com/blogs/voices/how-is-drone-based-surveillance-strengthening-national-and-border-security/

SHAMEEM, C., & JAYAPRASAD, K. (2020). The evolution of BRICS in international political economy. American Review of Political Economy, 15(1). Retrieved from: https://doi.org/10.38024/arpe.sj.6.28.20

SINGH, R. (2024). The curious case of tweeting an Aadhaar number: Trust/mistrust in security practices of public data infrastructures. Journal of Cultural Economy, 17(3). Retrieved from: https://doi.org/10.1080/17530350.2023.2229360

TELLIS, A. J., & MIRSKI, S. (2013). Crux of Asia, China, India and the emerging global order. Carnegie Endowment for International Peace. Retrieved from: https://carnegie-production-assets.s3.amazonaws.com/static/files/crux_of_asia.pdf

TILL, G. (2009). Seapower: A guide for the twenty-first century (2nd ed.). Routledge.

TYLER, H. (2022, February 2). The increasing use of artificial intelligence in border zones prompts privacy questions. Migration Policy Institute. Retrieved from: https://www.migrationpolicy.org/article/artificial-intelligence-border-zones-privacy

UN SECURITY COUNCIL COUNTER-TERRORISM COMMITTEE. (2023). Countering terrorist narratives and preventing the use of the internet for terrorism purposes. United Nations. Retrieved from: https://www.un.org/securitycouncil/ctc/es/node/612

UN. (2023a). Countering terrorist narratives and preventing the use of internet for terrorism purposes. UN Security Council Counter-Terrorism Committee. Retrieved from: https://www.un.org/securitycouncil/ctc/

UN. (2023b). International laws protecting civilians in armed conflict not being upheld, Secretary-General warns Security Council, urging deadly cycle be broken. Retrieved from: https://press.un.org/en/2023/sc15292.doc.htm

UNHCR. (n.d.). The 1951 Refugee Convention. Retrieved from: https://www.unhcr.org/in/about-unhcr/overview/1951-refugee-convention

UNITED NATIONS OFFICE ON DRUGS AND CRIME (UNODC). (2012). Border guards – Critical stakeholders in combating human trafficking. Retrieved from: https://www.unodc.org/southasia/en/frontpage/2012/june/border-guards---critical-stakeholders-in-combating-human-trafficking.html

UNODC. (2009). Manual on international cooperation in criminal matters related to terrorism. Retrieved from: https://www.unodc.org/documents/terrorism/Publications/Manual_Int_Coop_Criminal_Matters/English.pdf

UTOIKAMANU, F. (2018, December 21). Closing the technology gap in least developed countries. United Nations. Retrieved from: https://www.un.org/en/chronicle/article/closing-technology-gap-least-developed-countries

WALSH, J. P. (2010). From border control to border care: The political and ethical potential of surveillance. Surveillance & Society, 8(2), 113–130. Retrieved from: https://doi.org/10.24908/ss.v8i2.3481

WALTERS, W. (2008). Bordering the sea: Shipping industries and the policing of stowaways. Borderlands, 7(3). Retrieved from: https://go.gale.com/ps/i.do?p=AONE&u=anon~25064030&id=GALE%7CA197364352&v=2.1&it=r&sid=googleScholar&asid=5235513b

WORLD BANK. (2019). Trading across borders. Subnational Studies – Measuring Business Regulations. Retrieved from: https://subnational.doingbusiness.org/en/data/exploretopics/trading-across-borders/why-matters

WORLD CUSTOMS ORGANIZATION (WCO). (2022). The role of advanced technologies in cross-border trade: A customs perspective. World Customs Organization & World Trade Organization (WTO). Retrieved from: https://www.wcoomd.org/en/topics/facilitation/instrument-and-tools/tools/wco-wto-paper.aspx

ZUBOFF, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.




DOI: http://dx.doi.org/10.21902/Revrima.v4i50.8105

Refbacks

  • There are currently no refbacks.




Brazilian Journal of Law and International Relations e-ISSN: 2316-2880

Rua Chile, 1678, Rebouças, Curitiba/PR (Brazil). CEP 80.220-181