SURVEILLANT ASSEMBLAGES AND BORDER GOVERNANCE IN THE GLOBAL SOUTH: A CRITICAL STUDY OF BRICS SECURITY PRACTICES
Resumo
Objective: This article undertakes a critical analysis of border governance and surveillance practices within BRICS nations (Brazil, Russia, India, China, and South Africa), employing the conceptual framework of surveillance assemblages. The primary aim is to examine how emerging technologies—such as biometrics, artificial intelligence, predictive analytics, and unmanned aerial systems—are reshaping the exercise of sovereign power, fostering transnational security cooperation, and recalibrating the balance between protective measures and fundamental rights in the Global South.
Methodology: This investigation adopts a qualitative and theoretical approach, grounded in critical surveillance studies (notably the works of Haggerty & Ericson, Lyon, Zuboff, among others). It consists of an interdisciplinary critical analysis that integrates theories of biopolitics, surveillance capitalism, and governmentality with empirical data concerning BRICS security practices and cooperation frameworks. The study also highlights the legal ambiguities and “normative silences” that facilitate the experimentation with surveillance regimes beyond established international standards.
Results: The study demonstrates that BRICS countries have been reinforcing their borders through the deployment of advanced technologies, integrating biometric surveillance systems, interoperable databases, drones, and artificial intelligence. These developments constitute complex surveillance assemblages that transform individuals into “data doubles,” enabling selective and predictive control over mobility. Such practices expose significant power asymmetries within the bloc, with China and Russia playing dominant roles in technological provision and management. Although framed within a discourse of security and development, these measures pose substantial risks to privacy, civil liberties, and due process—particularly in multicultural and border regions. Moreover, while cooperation among BRICS members is relevant in addressing transnational crimes such as terrorism, trafficking, and piracy, it remains fraught with geopolitical tensions, socioeconomic disparities, and challenges in legal harmonization.
Conclusions: The article concludes that border governance within the BRICS, while marked by technological innovation and advances in cooperation, tends to reproduce logics of hierarchy, authoritarianism, and inequality characteristic of the Global South. While enhancing security, these practices simultaneously undermine fundamental rights and reinforce patterns of social and political exclusion. The author advocates for deeper critical reflection on the ethical, legal, and political implications of such practices, emphasizing that the consolidation of a BRICS surveillance model may represent a distinct paradigm from that of the Global North—yet one that is equally problematic.
Palavras-chave
Texto completo:
PDF (English)Referências
ABBOTT, K. W., KEOHANE, R. O., MORAVCSIK, A., et al. (2000). The concept of legalization. International Organization, 54(3), 401–419. Retrieved from: https://doi.org/10.1162/002081800551271
AMOORE, L. (2006). Biometric borders: Governing mobilities in the war on terror. Surveillance & Society, 5(2), 123–138. Retrieved from: https://doi.org/10.1016/j.polgeo.2006.02.001
ANDREJEVIC, M. (2007). iSpy: Surveillance and power in the interactive era. University Press of Kansas. Retrieved from: https://kansaspress.ku.edu/
ARORA, P. (2019). The next billion users: Digital life beyond the West. Harvard University Press.
BANERJEE, S. (2017). BRICS Summits and outlook on terrorism. Indian Council of World Affairs. Retrieved from: https://www.icwa.in/show_content.php?lang=1&level=3&ls_id=1743&lid=1501
BASU, P. (2021). Maritime India: The quest for a steadfast identity (ORF Occasional Paper No. 339). Observer Research Foundation. Retrieved from: https://www.orfonline.org/research/maritime-india-the-quest-for-a-steadfast-identity
BIGO, D. (2002). Security and immigration: Toward a critique of the governmentality of unease. Alternatives, 27(1), 63–92. Retrieved from: https://migrantsproject.eu/wp-content/uploads/2020/08/Bigo_Security-and-Immigration.pdf
BRECKENRIDGE, K. (2014). Biometric state: The global politics of identification and surveillance in South Africa, 1850 to the present. Cambridge University Press.
BRICS. (2023). Johannesburg Declaration. Ministry of Foreign Affairs of the People's Republic of China. Retrieved from: https://www.fmprc.gov.cn/eng./zy/gb/202405/t20240531_11367367.html
CHATSZIS, P., & STAVROU, E. (2022). Cyber-threat landscape of border control infrastructures. International Journal of Critical Infrastructure Protection, 36, 100503. Retrieved from: https://doi.org/10.1016/j.ijcip.2021.100503
CHINA DAILY. (2022, September). BRICS nations call for more cooperation on disaster management. The State Council, The People’s Republic of China. Retrieved from: https://english.www.gov.cn/statecouncil/ministries/202209/26/content_WS6330e698c6d0a757729e0827.html
CHOUNG, H., DAVID, P., & LING, T.W. (2024). Acceptance of AI-powered facial recognition technology in surveillance scenarios: Role of trust, security, and privacy perceptions. Technology in Society, 79, 102721. Retrieved from: https://doi.org/10.1016/j.techsoc.2024.102721
CONVENTION ON BIOLOGICAL DIVERSITY. (2022). Text of the Convention. Retrieved from: https://www.cbd.int/convention/text
DE GENOVA, N. (2013). Spectacles of migrant ‘illegality’: The scene of exclusion, the obscene of inclusion. Ethnic and Racial Studies, 36(7), 1180–1198. Retrieved from: https://doi.org/10.1080/01419870.2013.783710
DE SCHUTTER, O. (2012). International human rights law: Cases, materials, commentary. Cambridge University Press. Retrieved from: https://www.cambridge.org/core/books/international-human-rights-law/8275EE329C2E6C88CD1577293470A78A
DEIBERT, R., PALFREY, J., ROHOZINSKI, R., et al. (Eds.). (2008). Access denied: The practice and policy of global internet filtering. MIT Press. Retrieved from: https://library.oapen.org/bitstream/handle/20.500.12657/26091/1003995.pdf
DELEUZE, G. (1992). Postscript on the societies of control. October, 5, 3–7. Retrieved from: https://www.jstor.org/stable/778828
DEVONSHIRELLIS, C., & BONESH, F. R. (2023). Intra-BRICS trade and analysis 2023. Silk Road Briefing. Retrieved from: https://www.silkroadbriefing.com/news/2023/08/21/intra-brics-trade-and-analysis-2023/
DONNELLY, J. (2013). Universal human rights in theory and practice. Cornell University Press.
FEDERAL GOVERNMENT OF BRAZIL. (2015). National strategy for border security. Brasília: Ministry of Justice. Retrieved from: https://portalantigo.ipea.gov.br/agencia/images/stories/PDFs/livros/livros/151104_brics_long_term_strategy.pdf
FOUCAULT, M. (2003). Society must be defended (M. Bertani, A. Fontana, F. Ewald, & D. Macey, Eds.). Allen Lane.
GKOUGKOUDIS, G., PISSANIDIS, D., & DEMERTZIS, K. (2022). Intelligence-led policing and the new technologies adopted by the Hellenic Police. Digital, 2, 143–163. Retrieved from: https://doi.org/10.3390/digital2020009
GSCHREY, R. (2011). Borderlines: Surveillance, identification and artistic explorations along European borders. Surveillance & Society, 9(1/2). Retrieved from: https://doi.org/10.24908/ss.v9i1/2.4146
GUILFOYLE, D. (2011). Piracy and armed robbery at sea: The legal framework for counter-piracy operations in Somalia and the Gulf of Aden. International Criminal Law Review, 11(5), 910–914. Retrieved from: https://brill.com/view/journals/icla/11/5/article-p910_6.xml
HAGGERTY, K. D., & ERICSON, R. V. (2003). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622. Retrieved from: https://doi.org/10.1080/00071310020015280
INTERNATIONAL COMMITTEE OF THE RED CROSS. (2005). Human rights and refugee law – Three pillars. Retrieved from: https://www.icrc.org/en/doc/resources/documents/statement/6t7g86.htm
KANIA, E. B. (2020). AI weapons in China’s military innovation. Brookings Institution. Retrieved from: https://www.brookings.edu/wp-content/uploads/2020/04/FP_20200427_ai_weapons_kania_v2.pdf
KLIMBURG, A. (2017). The darkening web: The war for cyberspace. Penguin Press. Retrieved from: https://www.penguinrandomhouse.com/books/318518/the-darkening-web-by-alexander-klimburg/
KSHETRI, N. (2015). Cybercrime and cybersecurity issues in the BRICS economies. Journal of Global Information Technology Management, 18(4), 245–249. Retrieved from: https://doi.org/10.1080/1097198X.2015.1108093
KUNDNANI, A. (2014). The Muslims are coming! Islamophobia, extremism, and the domestic war on terror. Verso Books.
LEE, H.-Y. (2014). Trade facilitation and global supply chains: The role of FTA trade facilitation rules in promoting global supply chains. Journal of International Logistics and Trade, 12(1), 3–21. Retrieved from: https://doi.org/10.24006/jilt.2014.12.1.3
LYON, D. (2003). Surveillance after September 11. Queen’s University, Ontario.
MARKEY, D. (2023). The persistent threat of nuclear crises among China, India, and Pakistan. USIP. Retrieved from: https://www.usip.org/publications/2023/02/persistent-threat-nuclear-crises-among-china-india-and-pakistan
MLAMBO, V. H., ADETIBA, T. C., & THUSI, X. (2022). Using technology to address cross-border crime and illegal migration: The case of South Africa. Border and Regional Studies, 10(3), 205–225. Retrieved from: https://doi.org/10.25167/brs4830
MONAHAN, T. (2006). Surveillance and security: Technological politics and power in everyday life. Routledge.
MONAHAN, T., & WOOD, D. M. (2018). Surveillance studies: A reader. Oxford University Press.
MURUGESAN, R. (2021, April). Predictive policing in India: Deterring crime or discriminating minorities? LSE Blog. Retrieved from: https://blogs.lse.ac.uk/humanrights/2021/04/16/predictive-policing-in-india-deterring-crime-or-discriminating-minorities/
PANT, H. V. (2023). From BRICS to BRICS Plus: Old partners and new stakeholders (Special Report No. 214). Observer Research Foundation. Retrieved from: https://www.orfonline.org/research/from-brics-to-brics-plus-old-partners-and-new-stakeholders
PLESSIS, C. du, MIRIDZHANIAN, A., & ACHARYA, B. (2023, August). BRICS welcomes new members in push to reshuffle world order. Reuters. Retrieved from: https://www.reuters.com/world/brics-poised-invite-new-members-join-bloc-sources-2023-08-24/
PTI. (2022, June 16). BRICS NSAs discuss new threats, challenges to national security. Times of India. Retrieved from: https://timesofindia.indiatimes.com/world/europe/brics-nsas-discuss-new-threats-challenges-to-national-security/articleshow/92244935.cms
RABASA, A., BORAZ, S., CHALK, P., et al. (2007). Ungoverned territories: Understanding and reducing terrorism risks. RAND Corporation. Retrieved from: https://www.rand.org/pubs/monographs/MG561.html
RODRIGUES, J. N., MEDINA, J. C., & CABETE, D. C. R. (2024). Artificial intelligence in the face of the normative silence of international law: A look at the European Union and MERCOSUR. Brazilian Journal of International Law, 21(3), 305–318. Retrieved from: https://www.publicacoes.uniceub.br/rdi/article/view/9361
ROGOVSKY, N., & COOKE, F. L. (2021). Towards a human-centred agenda: Human resource management in the BRICS countries in the face of global challenges. International Labour Organization. Retrieved from: https://www.ilo.org/sites/default/files/wcmsp5/groups/public/@dgreports/@inst/documents/publication/wcms_830693.pdf
SHAH, S. (2023). How is drone based surveillance strengthening national and border security. Times of India. Retrieved from: https://timesofindia.indiatimes.com/blogs/voices/how-is-drone-based-surveillance-strengthening-national-and-border-security/
SHAMEEM, C., & JAYAPRASAD, K. (2020). The evolution of BRICS in international political economy. American Review of Political Economy, 15(1). Retrieved from: https://doi.org/10.38024/arpe.sj.6.28.20
SINGH, R. (2024). The curious case of tweeting an Aadhaar number: Trust/mistrust in security practices of public data infrastructures. Journal of Cultural Economy, 17(3). Retrieved from: https://doi.org/10.1080/17530350.2023.2229360
TELLIS, A. J., & MIRSKI, S. (2013). Crux of Asia, China, India and the emerging global order. Carnegie Endowment for International Peace. Retrieved from: https://carnegie-production-assets.s3.amazonaws.com/static/files/crux_of_asia.pdf
TILL, G. (2009). Seapower: A guide for the twenty-first century (2nd ed.). Routledge.
TYLER, H. (2022, February 2). The increasing use of artificial intelligence in border zones prompts privacy questions. Migration Policy Institute. Retrieved from: https://www.migrationpolicy.org/article/artificial-intelligence-border-zones-privacy
UN SECURITY COUNCIL COUNTER-TERRORISM COMMITTEE. (2023). Countering terrorist narratives and preventing the use of the internet for terrorism purposes. United Nations. Retrieved from: https://www.un.org/securitycouncil/ctc/es/node/612
UN. (2023a). Countering terrorist narratives and preventing the use of internet for terrorism purposes. UN Security Council Counter-Terrorism Committee. Retrieved from: https://www.un.org/securitycouncil/ctc/
UN. (2023b). International laws protecting civilians in armed conflict not being upheld, Secretary-General warns Security Council, urging deadly cycle be broken. Retrieved from: https://press.un.org/en/2023/sc15292.doc.htm
UNHCR. (n.d.). The 1951 Refugee Convention. Retrieved from: https://www.unhcr.org/in/about-unhcr/overview/1951-refugee-convention
UNITED NATIONS OFFICE ON DRUGS AND CRIME (UNODC). (2012). Border guards – Critical stakeholders in combating human trafficking. Retrieved from: https://www.unodc.org/southasia/en/frontpage/2012/june/border-guards---critical-stakeholders-in-combating-human-trafficking.html
UNODC. (2009). Manual on international cooperation in criminal matters related to terrorism. Retrieved from: https://www.unodc.org/documents/terrorism/Publications/Manual_Int_Coop_Criminal_Matters/English.pdf
UTOIKAMANU, F. (2018, December 21). Closing the technology gap in least developed countries. United Nations. Retrieved from: https://www.un.org/en/chronicle/article/closing-technology-gap-least-developed-countries
WALSH, J. P. (2010). From border control to border care: The political and ethical potential of surveillance. Surveillance & Society, 8(2), 113–130. Retrieved from: https://doi.org/10.24908/ss.v8i2.3481
WALTERS, W. (2008). Bordering the sea: Shipping industries and the policing of stowaways. Borderlands, 7(3). Retrieved from: https://go.gale.com/ps/i.do?p=AONE&u=anon~25064030&id=GALE%7CA197364352&v=2.1&it=r&sid=googleScholar&asid=5235513b
WORLD BANK. (2019). Trading across borders. Subnational Studies – Measuring Business Regulations. Retrieved from: https://subnational.doingbusiness.org/en/data/exploretopics/trading-across-borders/why-matters
WORLD CUSTOMS ORGANIZATION (WCO). (2022). The role of advanced technologies in cross-border trade: A customs perspective. World Customs Organization & World Trade Organization (WTO). Retrieved from: https://www.wcoomd.org/en/topics/facilitation/instrument-and-tools/tools/wco-wto-paper.aspx
ZUBOFF, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.
DOI: http://dx.doi.org/10.21902/Revrima.v4i50.8105
Apontamentos
- Não há apontamentos.
Revista Relações Internacionais do Mundo Atual e-ISSN: 2316-2880
Rua Chile, 1678, Rebouças, Curitiba/PR (Brasil). CEP 80.220-181

