Share

cover art for Welcome to Invisible Borders

Invisible Borders: the Tech and Violence of Fortress Europe

Welcome to Invisible Borders

Season 1, Ep. 1

In this premiere episode of Invisible Borders, we take a step back to explore the bigger picture: how Europe’s borders and surveillance technologies work together to maintain systems of power.


We focus on the Balkan Route to reveal how, funded by the EU, migration is increasingly framed as a security issue and transformed into a market for tech companies. Along the way, we unpack concepts like techno-solutionism, postcolonial legacies of surveillance, and the political economies driving the border surveillance industry.


Sound Design: Brian Mcnamara Sound

Graphic Design: Marlene Janke and Dan Schoolar


For the full list of episodes, transcripts and additional resources, visit https://invisible-borders.jimdosite.com/

More episodes

View all episodes

  • 2. Hostile Politics

    43:44||Season 1, Ep. 2
    In this episode we will look at the current policies governing border surveillance and what risks and protections they bear. We will discuss how the policies have changed over time and how they have enabled the expansion of border surveillance by EU member states, candidate countries, and EU agencies. What policies are currently on the table? And what kind of regulation exists that can protect the fundamental rights of people directly affected?
  • 3. Surveillance for Detection (Part 1)

    47:34||Season 1, Ep. 3
    Part 1 of surveillance for detection - how are technologies used along physical border lines?Using the territories of Bulgaria & Serbia as case studies, we look at the interwoven roles of surveillance technologies and European border management practices at both the EU’s external border and non-EU borders of ‘third countries’. In this episode we try to answer the question of how and which technologies get to borders? How much is being spent? And who is spending the money?By analysing patterns of externalising border management, alongside how technologies are being used and tested on vulnerable populations - we see how this fits into a wider imperial understanding of European border management practices.
  • 4. Surveillance for Detection (Part 2)

    37:34||Season 1, Ep. 4
    Part 2 of surveillance for detection - how are technologies used along physical border lines?In this episode we begin by looking at the role of the IOM as a stakeholder in tech assisted border violence, understanding their complicity & hypocrisy, and ask; what is the legacy of EU horizon projects in the Balkans?We identify some of the companies who are profiting from the militarisation of borders, how a border industrial complex has developed in Europe, and how this intersects with facilitators of the ongoing genocide in Gaza.By looking at the practicalities of border management practices on the ground alongside the landscapes of borders themselves - we try to understand both what deterrence looks like as a crucial factor within border management, and the role of surveillance technologies within this.
  • 5. Surveillance for Control

    26:43||Season 1, Ep. 5
    Surveillance isn’t just about monitoring and controlling movement—it also continues once people on the move reach EU countries. What systems are in place? How do they impact the lives of those affected? And what is the broader logic behind this extensive surveillance network?In this episode, we explore these questions through research conducted in Greece. Following the story of the fictional character Rami, we trace his journey from Samos to mainland Greece, revealing how surveillance shapes life in reception and detention facilities.
  • 6. Surveillance for Identification

    43:04||Season 1, Ep. 6
    In this episode, we look at the opaque use of biometric surveillance technologies in North Macedonia and Serbia, two key countries along the so-called Balkan Route. States are increasingly using biometric data, such as fingerprints and iris scans, to identify and categorise people on the move under the guise of enhancing security. However, these practices raise serious concerns about potential human rights violations and the surveillance of vulnerable populations.