• Quand l’archéologie des « mauvaises herbes » bouscule l’Histoire (et le futur) de l’agriculture - Geo.fr
    https://www.geo.fr/environnement/archeobiologie-quand-banales-mauvaises-herbes-adventices-bousculent-histoire-agr

    Des scientifiques des universités britanniques de Sheffield et d’Oxford ont constitué le catalogue le plus exhaustif des adventices – communément appelées « mauvaises herbes ». D’après leur analyse, l’Histoire de l’agriculture est loin d’être celle d’une simple transition d’un modèle extensif vers un schéma intensif.

    Alors que les agriculteurs se mobilisent en Europe pour défendre le droit à un revenu décent, une nouvelle base de données unique en son genre nous invite à replacer les pratiques agricoles dans leur contexte géographique et historique – avec ceci de particulier (et de surprenant) que ses contributeurs n’ont pas retracé le parcours des variétés cultivées… mais celui des « adventices ».

    Au-delà de leur réputation de « mauvaises herbes », ces plantes qui s’immiscent spontanément dans et autour des champs s’avèrent en effet des indices précieux, éclairant à la fois le passé agricole de l’humanité – et peut-être également son avenir face au changement climatique.

    Agriculture intensive ou extensive ?

    Le domaine fascinant de l’archéobotanique, ou l’étude des relations entre les sociétés humaines et le monde végétal par l’analyse des restes végétaux trouvés en contexte archéologique, vise notamment à décrire l’économie végétale des sociétés anciennes et à reconstituer les pratiques agricoles (université de Genève).

    En identifiant les adventices présentes, les spécialistes de cette discipline pourront désormais se référer à un catalogue précis afin de connaître les caractéristiques écologiques de ces plantes, et en déduire si l’agriculture était plutôt extensive ou au contraire intensive – un terme qui fait référence non pas à l’usage de pesticides modernes mais au fait d’optimiser la productivité, avant même l’essor de la chimie.

    Développé par des scientifiques des universités britanniques de Sheffield et d’Oxford à l’issue de trois décennies de recherche, le catalogue des adventices (gratuit et en accès libre) recense quelque 928 espèces végétales en Eurasie et en Afrique du nord, présentes dans les champs de céréales et de légumineuses cultivés sans engrais de synthèse et sans herbicides.

    « Dans les environnements agricoles modernes, où les cultures sont minutieusement gérées et où tout ce qui n’est pas désiré est éliminé, il peut être difficile de suivre les changements à long terme des environnements et des espèces végétales. En étudiant les populations historiques d’adventices au lieu des cultures, les données offrent aux chercheurs un moyen unique de voir ce qui a été perdu et gagné au fil du temps », explique dans un communiqué le Pr John Hodgson, qui a contribué aux recherches.

    Fertilisation, arrosage et désherbage à l’âge du bronze

    « Nous avons tendance à penser que l’agriculture a commencé de manière non intensive et qu’elle s’est progressivement intensifiée au fil du temps. Cependant, nous avons trouvé des sites du Néolithique [entre 6 000 et 2 200 ans avant notre ère] et de l’âge du bronze [-2 200 ans à -800 ans] qui remettent en cause cette croyance », détaille la Pr Glynis Jones, de l’université de Sheffield (communiqué).

    L’archéologue explique qu’à ces périodes, de petites parcelles de terre étaient cultivées de manière intensive, avec des pratiques telles que la « fertilisation, l’arrosage et le désherbage de cultures comme le blé ou l’orge ». Autrement dit, « des endroits où l’effort humain était important pour la culture des plantes ».

    « Nous avons également constaté que les sites de l’âge du fer [-800 ans à -450 ans] et de la période romaine qui s’étendaient sur des zones plus vastes étaient cultivés de manière moins intensive, ce qui signifie que les cultures pouvaient être plus nombreuses, mais qu’elles n’étaient pas exploitées de manière aussi intensive qu’auparavant puisqu’elles couvraient des zones plus vastes », compare-t-elle.

    Reste désormais à élargir ce catalogue des adventices à d’autres régions du monde – afin que les spécialistes des peuples d’Amérique, d’Afrique sub-saharienne, d’Asie et d’ailleurs puissent disposer eux aussi d’un nouvel outil puissant pour comprendre les liens tissés par ces populations avec la terre nourricière…

  • Conference on innovative technologies for strengthening the Schengen area

    On 28 March 2023, the European Commission (DG HOME), Frontex and Europol will jointly hold a conference on innovative technologies for strengthening the Schengen area.


    The conference will provide a platform for dialogue between policy decision-makers, senior technology project managers, and strategic industry leaders, essential actors who contribute to making the Schengen area more secure and resilient. The conference will include discussions on the current situation and needs in Member States, selected innovative technology solutions that could strengthen Schengen as well as selected technology use cases relevant for police cooperation within Schengen.

    The conference target participants are ‘chief technology officers’ and lead managers from each Member State’s law enforcement and border guard authorities responsible for border management, security of border regions and internal security related activities, senior policy-makers and EU agencies. With regards to the presentation of innovative technological solutions, a dedicated call for industry participation will be published soon.

    https://www.europol.europa.eu/publications-events/events/conference-innovative-technologies-for-strengthening-schengen-area

    Le rapport est téléchargeable ici:
    Report from the conference on innovative technologies for strengthening the Schengen area

    In March 2023, the European Commission (DG HOME), Frontex and Europol jointly hosted a conference on innovative technologies for strengthening the Schengen area. The event brought together policy makers, senior technology project managers, and strategic industry leaders, essential actors who contribute to making the Schengen area more secure and resilient. The conference included discussions on the current situation and needs in Member States, selected innovative technology solutions that could strengthen Schengen as well as selected technology use cases relevant for police cooperation within Schengen.

    https://frontex.europa.eu/innovation/announcements/report-from-the-conference-on-innovative-technologies-for-strengtheni
    Lien pour télécharger le pdf:
    https://frontex.europa.eu/assets/EUresearchprojects/2023/Conference_on_innovative_technologies_for_Schengen_-_Report.pdf

    #technologie #frontières #Frontex #Europol #conférence #Schengen #UE #EU #commission_européenne #droits #droits_fondamentaux #biométrie #complexe_militaro-industriel #frontières_intérieures #contrôles_frontaliers #interopérabilité #acceptabilité #libre-circulation #Advanced_Passenger_Information (#API) #One-stop-shop_solutions #données #EU_Innovation_Hub_for_Internal_Security #Personal_Identification_system (#PerIS) #migrations #asile #réfugiés #vidéosurveillance #ePolicist_system #IDEMIA #Grant_Detection #OptoPrecision #Airbus_Defense_and_Space #Airbus #border_management #PNR #eu-LISA #European_Innovation_Hub_for_Internal_Security

  • Changer de cible : comment obliger le CAC40 à débrancher Macron, par Dominique G Boullier
    https://blogs.mediapart.fr/dominique-g-boullier/blog/150423/changer-de-cible-comment-obliger-le-cac40-debrancher-macron

    Romaric Godin avait raison d’appeler à une nouvelle #stratégie de la part des syndicats, mais pour cela, il faudrait qu’ils se décentrent de leur propre base et de leur vision du système productif et mesurent les propriétés de l’#adversaire, sinon ils continueront les manifs, les débrayages et jamais aucune grève générale ne verra le jour. Car ce moyen-là est lui-même épuisé. Comme le sont les ressources budgétaires des salariés mais aussi parce que le « tous ensemble » a été rendu impossible par l’émiettement des statuts, des postes, des entreprises, etc. A l’exception de quelques points de passage obligés que sont les raffineries, la gestion des déchets, l’électricité voire les transports. Mais ces blocages finissent par toucher plutôt les plus démunis et les « gens ordinaires », ce qui conduit à dresser le peuple contre le peuple « pris en otage » !

    Reprenons donc le raisonnement en partant d’un exemple d’action déjà menée cette semaine : l’invasion du magasin Louis Vuitton sur les Champs Elysées. C’est dans cette voie qu’il faut s’orienter pour plusieurs raisons (et cela prolonge les propositions de Michel Feher dans AOC parlant des Robin des Bois).

    • 1./ Ce sont elles [les quelques grandes entreprises financiarisées du CAC40] qui ont mis en place Macron après avoir hésité avec Fillon, branche qui s’est avérée pourrie mais qui eût été aussi malfaisante, ne nous faisons pas d’illusion, mais plus politique, ce que ne sait pas faire Macron.

      C’est là sa faille, il méprise la politique et tous les corps intermédiaires et pousse à la disruption de manière sadique (voir mon billet précédent sur ce blog) et c’est la méthode qu’on enseigne aux cost killers des business schools.

      Or tout le CAC40 n’est pas prêt à assumer une telle violence dans les rapports sociaux et reste sur un modèle de politique anesthésiante que la droite classique savait pratiquer en même temps que le bâton, pour produire de la servitude volontaire. Ces failles-là doivent être exploitées.

    • 2./ [la cible primaire : ] les effets de réputation financière sur leurs propres firmes.
      [...]
      premier niveau d’action : purement technique pour paralyser le système financier [...] toute action de sabotage élémentaire comme coupure d’électricité, coupures de réseaux de télécommunications et hackings de divers types pour faire tomber des serveurs est une menace sérieuse. Seuls quelques groupes sociaux clés peuvent mener ces actions et il faut lancer des appels en leur direction et coordonner leurs actions.
      [...]
      deuxième niveau d’action : saboter la réputation de ces firmes du CAC40 et des investisseurs étrangers sur la place de Paris, [...] montrer qu’ils sont devenus les ennemis du peuple et le faire comprendre aux investisseurs dans une propagation (voir mon livre récent sur les propagations) de réputation pourrie qui peut finir en panique boursière.

    • 3./ Les actions qui peuvent engendrer cet effondrement réputationnel sont alors innombrables. L’action chez Vuitton [envahissement du magasin des Champs-Elysées] en est un bon exemple. Pas de violence (car le mouvement joue lui aussi sur sa réputation), du grand spectacle (visibilité maximum à assurer), effet de peur garanti chez les clients mais aussi et surtout pour la firme (peur du discrédit avant tout, aussi à l’international), étiquetage martelé sur les superprofits de LVMH/ Bernard Arnault, désignation d’un ennemi précis facile à reconnaitre (les vampires du CAC40, des fonds spéculatifs et leurs superprofits) et prémisses d’actions de blocages (approvisionnements) et de boycott (par les consommateurs) : image de honte associée aux produits LVMH, analogue à l’effet de disqualification de l’avion - qui commence à fonctionner.

      et les 2 dernières sections du post (plus compactes)

      4./ Ces actions doivent être imprévisibles [...] Nous passons de l’action par le nombre à l’action par le scandale (selon la grille d’Offerlé pour les répertoires d’action des mouvements sociaux).

      5./ Le pilotage de ces actions [...] sa versatilité le rend producteur d’incertitude (source essentielle du pouvoir, rappelons-le) [...] formes d’action décentralisées, collectives que les Gilets Jaunes ont cherché à mettre en place mais cette fois sans avoir à occuper quoi que ce soit dans la durée, c’est même le contraire qu’il faut privilégier (ce ne sont plus des guerres de position mais bien des actions de guérilla qui sont les plus déstabilisatrices).

    • Vous êtes sérieux ? À défaut de pouvoir compter sur le mouvement ouvrier, comptons sur la classe capitaliste elle-même ?

      La grande bourgeoisie, et d’abord les premiers prédateurs en tête du CAC40, ont peut-être créé Macron (ils ont en tous les cas promus ce majordome à la tête de leur État), ils sont surtout ceux qui recourront demain au fascisme et sa violence criminelle débridée si le mouvement ouvrier les menace. L’histoire nous laisse à ce propos aucun doute.

      Pour empêcher de nuire cette classe qui précipite l’humanité dans l’abîme, il ne faut pas seulement envahir leur siège pendant 24 h et nuire à leur réputation (je rêve), ils faudra les exproprier. Liquider par les armes leur pouvoir sur toute la société.

      Donc ignorons ces fantasmes d’opérations auxquelles mêmes les plus adolescents des gauchistes ont renoncé depuis longtemps. — ou, à la rigueur, rions-en un peu. Mais cela ne vaut rien.

    • Etienne Balibar : Un tournant dans le mouvement | 16.04.23

      https://blogs.mediapart.fr/etienne-balibar/blog/160423/un-tournant-dans-le-mouvement
      https://seenthis.net/messages/999396

      C’est un mouvement qui a une signification de classe aveuglante [...] Quelles propositions peut-on formuler pour contribuer à son élargissement en face de la violence du pouvoir ?
      [...]
      D’abord et avant tout il faut restaurer, élargir, garantir légalement et constitutionnellement les libertés individuelles et collectives, la sûreté des citoyens, les droits civiques à commencer par celui d’association et de manifestation.
      [...]
      Ensuite, il faut élargir la base du mouvement de masse, diversifier ses composantes, en tenant compte des modes de lutte qu’invente chaque groupe social, mais en recherchant les formes les plus unitaires, les plus démocratiques elles-mêmes, à la fois librement autogérées et potentiellement majoritaires dans le pays.
      [...]
      Mais pas non plus de complaisance pour le mirage d’une contre-violence inspirée par la « haine des flics », si compréhensible soit-elle subjectivement et affectivement. Une guérilla urbaine ou campagnarde ne fera que donner des prétextes à la violence d’Etat – une violence incomparablement supérieure et qui se déchaîne, comme dit l’autre, « quoi qu’il en coûte » et ne s’embarrasse d’aucun scrupule. La contre-violence est vouée à l’échec et conduit droit dans le piège du pouvoir.

  • Sorvegliare in nome della sicurezza: le Agenzie Ue vogliono carta bianca

    Il nuovo regolamento di #Europol mette a rischio la #privacy di milioni di persone mentre #Frontex, chiamata a controllare le frontiere, punta sull’intelligenza artificiale e la biometria per fermare i migranti. Provando a eludere la legge.

    C’è una lotta interna nel cuore delle istituzioni europee il cui esito toccherà da vicino il destino di milioni di persone. Lo scontro è sul nuovo regolamento di Europol, l’Agenzia europea di contrasto al crimine, entrato in vigore a fine giugno 2022 con la “benedizione” del Consiglio europeo ma che il Garante per la protezione dei dati (Gepd) definisce un “colpo allo Stato di diritto”. “La principale controversia riguarda la possibilità per l’Agenzia di aggirare le proprie regole quando ha ‘bisogno’ di trattare categorie di dati al di fuori di quelli che può raccogliere -spiega Chloé Berthélémy, policy advisor dell’European digital rights (Edri), un’organizzazione che difende i diritti digitali nel continente-. Uno scandalo pari a quanto rivelato, quasi un decennio fa, da Edward Snowden sulle agenzie statunitensi che dimostra una tendenza generale, a livello europeo, verso un modello di sorveglianza indiscriminata”.

    Con l’obiettivo di porre un freno a questa tendenza, il 22 settembre di quest’anno il presidente del Gepd, Wojciech Wiewiórowski, ha comunicato di aver intentato un’azione legale di fronte alla Corte di giustizia dell’Unione europea per contestare la legittimità dei nuovi poteri attribuiti a Europol. Un momento chiave di questa vicenda è il gennaio 2022 quando l’ufficio del Gepd scopre che proprio l’Agenzia aveva conservato illegalmente un vasto archivio di dati sensibili di oltre 250mila persone, tra cui presunti terroristi o autori di reati, ma soprattutto di persone che erano entrate in contatto con loro. Secondo quanto ricostruito dal Guardian esisteva un’area di memoria (cache) detenuta dall’Agenzia contenente “almeno quattro petabyte, equivalenti a tre milioni di cd-rom” con dati raccolti nei sei anni precedenti dalle singole autorità di polizia nazionali. Il Garante ordina così di cancellare, entro un anno, tutti i dati più “vecchi” di sei mesi ma con un “colpo di mano” questa previsione viene spazzata via proprio con l’entrata in vigore del nuovo regolamento. “In particolare, due disposizioni della riforma rendono retroattivamente legali attività illegali svolte dall’Agenzia in passato -continua Berthélémy-. Ma se Europol può essere semplicemente esentata dai legislatori ogni volta che viene colta in flagrante, il sistema di controlli ed equilibri è intrinsecamente compromesso”.

    L’azione legale del Gepd ha però un ulteriore obiettivo. In gioco c’è infatti anche il “modello” che l’Europa adotterà in merito alla protezione dei dati: da un lato quello americano, basato sulla sorveglianza pressoché senza limiti, dall’altro il diritto alla protezione dei dati che può essere limitato solo per legge e con misure proporzionate, compatibili con una società democratica. Ma proprio su questo aspetto le istituzioni europee vacillano. “Il nuovo regolamento esplicita l’obiettivo generale della comunità delle forze dell’ordine: quello di poter utilizzare metodi di ‘polizia predittiva’ che hanno come finalità l’identificazione di individui che potranno potenzialmente essere coinvolti nella commissione di reati”, sottolinea ancora la ricercatrice. Significa, in altri termini, l’analisi di grandi quantità di dati predeterminati (come sesso e nazionalità) mediante algoritmi e tecniche basate sull’intelligenza artificiale che permetterebbero, secondo i promotori del modello, di stabilire preventivamente la pericolosità sociale di un individuo.

    “Questo approccio di polizia predittiva si sviluppa negli Stati Uniti a seguito degli attentati del 2001 -spiega Emilio De Capitani, già segretario della Commissione libertà civili (Libe) del Parlamento europeo dal 1998 al 2011 che da tempo si occupa dei temi legati alla raccolta dei dati-. Parallelamente, in quegli anni, inizia la pressione da parte della Commissione europea per sviluppare strumenti di raccolta dati e costruzione di database”.

    “Il nuovo regolamento esplicita l’obiettivo generale della comunità delle forze dell’ordine: quello di poter utilizzare metodi di ‘polizia predittiva’” – Chloé Berthélémy

    Fra i primi testi legislativi europei che si fondano sulla raccolta pressoché indiscriminata di informazioni c’è la Direttiva 681 del 2016 sulla raccolta dei dati dei passeggeri aerei (Pnr) come strumento “predittivo” per prevenire i reati di terrorismo e altri reati definiti come gravi. “Quando ognuno di noi prende un aereo alimenta due archivi: l’Advanced passenger information (Api), che raccoglie i dati risultanti dai documenti ufficiali come la carta di identità o il passaporto permettendo così di costruire la lista dei passeggeri imbarcati, e un secondo database in cui vengono versate anche tutte le informazioni raccolte dalla compagnia aerea per il contratto di trasporto (carta di credito, e-mail, esigenze alimentari, tipologia dei cibi, annotazioni relative a esigenze personali, etc.) -spiega De Capitani-. Su questi dati legati al contratto di trasporto viene fatto un controllo indiretto di sicurezza filtrando le informazioni in relazione a indicatori che potrebbero essere indizi di pericolosità e che permetterebbero di ‘sventare’ attacchi terroristici, possibili dirottamenti ma anche reati minori come la frode o la stessa violazione delle regole in materia di migrazione. Questo perché il testo della Direttiva ha formulazioni a dir poco ambigue e permette una raccolta spropositata di informazioni”. Tanto da costringere la Corte di giustizia dell’Ue, con una sentenza del giugno 2022 a reinterpretare in modo particolarmente restrittivo il testo legislativo specificando che “l’utilizzo di tali dati è permesso esclusivamente per lo stretto necessario”.

    L’esempio della raccolta dati legata ai Pnr è esemplificativo di un meccanismo che sempre di più caratterizza l’operato delle Agenzie europee: raccogliere un elevato numero di dati per finalità genericamente collegate alla sicurezza e con scarse informazioni sulla reale utilità di queste misure indiscriminatamente intrusive. “Alle nostre richieste parlamentari in cui chiedevamo quanti terroristi o criminali fossero stati intercettati grazie a questo sistema, che raccoglie miliardi di dati personali, la risposta è sempre stata evasiva -continua De Capitani-. È come aggiungere paglia mentre si cerca un ago. Il cittadino ci rimette due volte: non ha maggior sicurezza ma perde in termini di rispetto dei suoi diritti. E a perderci sono soprattutto le categorie meno protette, e gli stessi stranieri che vengono o transitano sul territorio europeo”.

    “Il cittadino ci rimette due volte: non ha maggior sicurezza ma perde in termini di rispetto dei suoi diritti. Soprattutto le categorie meno protette” – Emilio De Capitani

    I migranti in particolare diventano sempre più il “banco di prova” delle misure distopiche di sorveglianza messe in atto dalle istituzioni europee europee attraverso anche altri sistemi che si appoggiano anch’essi sempre più su algoritmi intesi a individuare comportamenti e caratteristiche “pericolose”. E in questo quadro Frontex, l’Agenzia che sorveglia le frontiere esterne europee gioca un ruolo di primo piano. Nel giugno 2022 ancora il Garante europeo ha emesso nei suoi confronti due pareri di vigilanza che sottolineano la presenza di regole “non sufficientemente chiare” sul trattamento dei dati personali dei soggetti interessati dalla sua attività e soprattutto “norme interne che sembrano ampliare il ruolo e la portata dell’Agenzia come autorità di contrasto”.

    Il Garante si riferisce a quelle categorie speciali come “i dati sanitari delle persone, i dati che rivelano l’origine razziale o etnica, i dati genetici” che vengono raccolti in seguito all’identificazione di persone potenzialmente coinvolte in reati transfrontalieri. Ma quel tipo di attività di contrasto non rientra nel mandato di Frontex come guardia di frontiera ma ricade eventualmente nelle competenze di un corpo di polizia i cui possibili abusi sarebbero comunque impugnabili davanti a un giudice nazionale o europeo. Quindi, conclude il Garante, il trattamento di questi dati dovrebbe essere protetto con “specifiche garanzie per evitare pratiche discriminatorie”.

    Ma secondo Chris Jones, direttore esecutivo del gruppo di ricerca indipendente Statewatch, il problema è a monte. Sono le stesse istituzioni europee a incaricare queste due agenzie di svolgere attività di sorveglianza. “Frontex ed Europol hanno sempre più poteri e maggior peso nella definizione delle priorità per lo sviluppo di nuove tecnologie di sicurezza e sorveglianza”, spiega. Un peso che ha portato, per esempio, a finanziare all’interno del piano strategico Horizon Europe 2020, che delinea il programma dell’Ue per la ricerca e l’innovazione dal 2021 al 2024, il progetto “Secure societies”. Grazie a un portafoglio di quasi 1,7 miliardi di euro è stata commissionata, tra gli altri, la ricerca “ITFlows” che ha come obiettivo quello di prevedere, attraverso l’utilizzo di strumenti di intelligenza artificiale, i flussi migratori. Il sistema predittivo, simile a quello descritto da Berthélémy, è basato su un modello per il quale, con una serie di informazioni storiche raccolte su un certo fenomeno, sarebbe possibile anticipare sugli eventi futuri.

    “Se i dati sono cattivi, la decisione sarà cattiva. Se la raccolta dei dati è viziata dal pregiudizio e dal razzismo, lo sarà anche il risultato finale” – Chris Jones

    “Se le mie previsioni mi dicono che arriveranno molte persone in un determinato confine, concentrerò maggiormente la mia sorveglianza su quella frontiera e potrò più facilmente respingerli”, osserva Yasha Maccanico, ricercatore di Statewatch. Sempre nell’ambito di “Secure societies” il progetto “iBorderCtrl” riguarda invece famigerati “rilevatori di bugie” pseudoscientifici che dedurrebbe lo stato emotivo, le intenzioni o lo stato mentale di una persona in base ai suoi dati biometrici. L’obiettivo è utilizzare questi strumenti per valutare la credibilità dei racconti dei richiedenti asilo nelle procedure di valutazione delle loro richieste di protezione. E in questo quadro sono fondamentali i dati su cui si basano queste predizioni: “Se i dati sono cattivi, la decisione sarà cattiva -continua Jones-. Se la raccolta dei dati è viziata dal pregiudizio e dal razzismo, lo sarà anche il risultato finale”. Per questi motivi AccessNow, che si occupa di tutela dei diritti umani nella sfera digitale, ha scritto una lettera (firmata anche da Edri e Statewatch) a fine settembre 2022 ai membri del consorzio ITFlows per chiedere di terminare lo sviluppo di questi sistemi.

    Anche sul tema dei migranti il legislatore europeo tenta di creare, come per Europol, una scappatoia per attuare politiche di per sé illegali. Nell’aprile 2021 la Commissione europea ha proposto un testo per regolamentare l’utilizzo dell’intelligenza artificiale e degli strumenti basati su di essa (sistemi di videosorveglianza, identificazione biometrica e così via) escludendo però l’applicazione delle tutele previste nei confronti dei cittadini che provengono da Paesi terzi. “Rispetto ai sistemi di intelligenza artificiale quello che conta è il contesto e il fine con cui vengono utilizzati. Individuare la presenza di un essere umano al buio può essere positivo ma se questo sistema è applicato a un confine per ‘respingere’ la persona diventa uno strumento che favorisce la lesione di un diritto fondamentale -spiega Caterina Rodelli analista politica di AccessNow-. Si punta a creare due regimi differenti in cui i diritti dei cittadini di Paesi terzi non sono tutelati come quelli degli europei: non per motivi ‘tecnici’ ma politici”. Gli effetti di scarse tutele per gli uni, i migranti, ricadono però su tutti. “Per un motivo molto semplice. L’Ue, a differenza degli Usa, prevede espressamente il diritto alla tutela della vita privata nelle sue Carte fondamentali -conclude De Capitani-. Protezione che nasce dalle più o meno recenti dittature che hanno vissuto gli Stati membri: l’assunto è che chi è o si ‘sente’ controllato non è libero. Basta questo per capire perché sottende l’adozione di politiche ‘predittive’ e la riforma di Europol o lo strapotere di Frontex, stiano diventando un problema di tutti perché rischiano di violare la Carta dei diritti fondamentali”.

    https://altreconomia.it/sorvegliare-in-nome-della-sicurezza-le-agenzie-ue-vogliono-carta-bianca
    #surveillance #biométrie #AI #intelligence_artificielle #migrations #réfugiés #Etat_de_droit #données #protection_des_données #règlement #identification #police_prédictive #algorythme #base_de_données #Advanced_passenger_information (#Api) #avion #transport_aérien #Secure_societies #ITFlows #iBorderCtrl #asile #

    • New Europol rules massively expand police powers and reduce rights protections

      The new rules governing Europol, which came into force at the end of June, massively expand the tasks and powers of the EU’s policing agency whilst reducing external scrutiny of its data processing operations and rights protections for individuals, says a report published today by Statewatch.

      Given Europol’s role as a ‘hub’ for information processing and exchange between EU member states and other entities, the new rules thus increase the powers of all police forces and other agencies that cooperate with Europol, argues the report, Empowering the police, removing protections (https://www.statewatch.org/publications/reports-and-books/empowering-the-police-removing-protections-the-new-europol-regulation).

      New tasks granted to Europol include supporting the EU’s network of police “special intervention units” and managing a cooperation platform for coordinating joint police operations, known as EMPACT. However, it is the rules governing the processing and exchange of data that have seen the most significant changes.

      Europol is now allowed to process vast quantities of data transferred to it by member states on people who may be entirely innocent and have no link whatsoever to any criminal activity, a move that legalises a previously-illegal activity for which Europol was admonished by the European Data Protection Supervisor.

      The agency can now process “investigative data” which, as long it relates to “a specific criminal investigation”, could cover anyone, anywhere, and has been granted the power to conduct “research and innovation” projects. These will be geared towards the use of big data, machine learning and ‘artificial intelligence’ techniques, for which it can process sensitive data such as genetic data or ethnic background.

      Europol can now also use data received from non-EU states to enter “information alerts” in the Schengen Information System database and provide “third-country sourced biometric data” to national police forces, increasing the likelihood of data obtained in violation of human rights being ‘laundered’ in European policing and raising the possibility of third states using Europol as a conduit to harass political opponents and dissidents.

      The new rules substantially loosen restrictions on international data transfers, allowing the agency’s management board to authorise transfers of personal data to third states and international organisations without a legal agreement in place – whilst priority states for international cooperation include dictatorships and authoritarian states such as Algeria, Egypt, Turkey and Morocco.

      At the same time, independent external oversight of the agency’s data processing has been substantially reduced. The threshold for referring new data processing activities to the European Data Protection Supervisor (EDPS) for external scrutiny has been raised, and if Europol decides that new data processing operations “are particularly urgent and necessary to prevent and combat an immediate threat,” it can simply consult the EDPS and then start processing data without waiting for a response.

      The agency is now required to employ a Fundamental Rights Officer (FRO), but the role clearly lacks independence: the FRO will be appointed by the Management Board “upon a proposal of the Executive Director,” and “shall report directly to the Executive Director”.

      Chris Jones, Director of Statewatch, said:

      “The proposals to increase Europol’s powers were published six months after the Black Lives Matter movement erupted across the world, calling for new ways to ensure public safety that looked beyond the failed, traditional model of policing.

      With the new rules agreed in June, the EU has decided to reinforce that model, encouraging Europol and the member states to hoover up vast quantities of data, develop ‘artificial intelligence’ technologies to examine it, and increase cooperation with states with appalling human rights records.”

      Yasha Maccanico, a Researcher at Statewatch, said:

      “Europol has landed itself in hot water with the European Data Protection Supervisor three times in the last year for breaking data protection rules – yet the EU’s legislators have decided to reduce the EDPS’ supervisory powers. Independent, critical scrutiny and oversight of the EU’s policing agency has never been more needed.”

      The report (https://www.statewatch.org/publications/reports-and-books/empowering-the-police-removing-protections-the-new-europol-regulation) has been published alongside an interactive ’map’ of EU agencies and ’interoperable’ policing and migration databases (https://www.statewatch.org/eu-agencies-and-interoperable-databases), designed to aid understanding and further research on the data architecture in the EU’s area of freedom, security and justice.

      https://www.statewatch.org/news/2022/november/new-europol-rules-massively-expand-police-powers-and-reduce-rights-prote
      #interopérabilité #carte #visualisation

    • EU agencies and interoperable databases

      This map provides a visual representation of, and information on, the data architecture in the European Union’s “area of freedom, security and justice”. It shows the EU’s large-scale databases, networked information systems (those that are part of the ’Prüm’ network), EU agencies, national authorities and international organisations (namely Interpol) that have a role in that architecture. It is intended to facilitate understanding and further investigation into that architecture and the agencies and activities associated with it.

      https://www.statewatch.org/eu-agencies-and-interoperable-databases
      #réseau #prüm_II

  • U.S. to end purchase of COVID-19 vaccines as industry pivots to commercial market
    https://finance.yahoo.com/news/us-to-end-purchase-of-covid-19-vaccines-as-industry-pivots-to-commerc

    Vaccine makers have been working on a transition to a commercial market in the U.S. by next year, as White House COVID-19 Response Team coordinator Dr. Ashish Jha said Tuesday the U.S. government will stop buying treatments, tests and vaccines by this fall.

    #advienne_que_pourra #vaccins

  • At a time we have the tools & knowledge to prevent infection with SARS-CoV-2 - most of the Western world has given up – Dr. Deepti Gurdasani sur Twitter @dgurdasani1

    Thread by dgurdasani1 on Thread Reader App – Thread Reader App
    https://threadreaderapp.com/thread/1551459091754762240.html
    (intégralité du fil)
    https://twitter.com/dgurdasani1/status/1551459091754762240

    At a time we have the tools & knowledge to prevent infection with SARS-CoV-2 - most of the Western world has given up, the result being death rates in some countries in the vaccine era are higher than any point in the pandemic, simply because they’ve let it spread unmitigated.

    It looks like so many countries (including now Australia) bought into the ’living with it’ ideology, without actually putting in the measures needed to protect public health. The impact will be devastating- not just in terms of death, but also long-term disability.

    Even in countries like the UK, where vaccine uptake in vulnerable populations has been high, so death rates have dropped, long COVID is affecting 2 million people - with numbers having increased substantially in the vaccine era- because of unprecedented levels of transmission.

    Before the anti-vaxxers jump on this- it’s not because of vaccination- it’s despite vaccination - because these countries have used their over-reliance on vaccinations to tolerate much higher levels of infection, rather than use a vaccine plus multilayered approach to reduce it

    Most people don’t realise this- but current infection rates in England are 140 times higher than the rates at the same time in July 2020. At those rates, a vaccine only strategy isn’t going to be enough. By any stretch of the imagination

  • « Le #burn-out est le signal d’un dysfonctionnement collectif »

    Un burn-out n’est pas le signe d’une défaillance individuelle ! Mais celui d’un collectif en panne, soumis à des facteurs de #stress, des #risques_professionnels, qui ont fait tomber l’un de ses membres, estime Adrien Chignard, psychologue du travail, fondateur de Sens et Cohérence. Des #dysfonctionnements à travailler en équipe, pendant l’arrêt de la personne en burn-out. L’enjeu ? Protéger l’équipe, le travail et permettre à celui qui s’est effondré de revenir.

    Une idée reçue entoure bien souvent le burn-out : il s’agirait du fait d’un individu, peut-être plus faible ou plus fragile que les autres, qui tomberait…

    Adrien Chignard : On regarde celui qui tombe à cause du bruit de la chute. Le burn-out est quelque chose de beaucoup plus large. Il faut changer de raisonnement, de représentation de ce qu’est l’#épuisement_professionnel : si la personne est tombée, c’est parce que le plancher est en mauvais état, pas parce qu’elle marchait mal. Qu’il y ait des #souffrances individuelles n’occulte pas l’insécurité du collectif de travail. Lorsqu’une personne sombre en situation de travail et qu’elle fait un burn-out, ça veut dire qu’elle a été durablement exposée à des facteurs de stress professionnels. Donc tous ses collègues, toute son équipe, ont aussi été durablement exposés. Certes tous ne sont pas tombés car il y a des différences interindividuelles qui font que, lorsqu’en plus de problèmes professionnels, on est en train de divorcer, que son enfant est malade, qu’on a un huissier qui nous court après, forcément les situations de stress sont accrues. Mais le burn-out est le signal d’un dysfonctionnement collectif, pas d’une caractéristique défaillante de l’individu.

    Quel risque à se focaliser ainsi sur la personne qui est tombée ?

    Adrien Chignard : On oublie alors de protéger tout le collectif de travail derrière, de créer un climat de #sécurité_psychologique. L’enjeu est bien sûr de soigner, traiter, prendre en considération celui qui est tombé, mais surtout de protéger les autres de l’#effondrement. Cela va avoir plusieurs vertus. D’abord, #déculpabiliser la personne en burn-out. Très souvent, les gens en burn-out se sentent excessivement coupables de ne pas être à la hauteur, de ne pas réussir le défi, de laisser tomber leur équipe. Il y a une vision très honteuse du burn-out. Le fait de protéger tout le collectif de travail permet à celui ou celle qui est arrêté.e d’entendre qu’on réfléchit aux facteurs, aux conditions de travail qui l’ont fait tomber. A ce qui a précipité cette chute. Pour la personne, ce ne sont plus ses qualités intrinsèques – tu es fort ou pas – que l’on va questionner, c’est la dimension environnementale de son travail et ça, c’est central dans le burn-out. On tombe car on est confronté à un environnement particulier. Or nos collègues font partie du même environnement donc il faut les protèger. On va passer d’un regard collectif sur celui qu’il faut réparer à un regard préventif.
    Quel effet cette démarche va-t-elle avoir sur le reste de l’équipe ?

    Adrien Chignard : Ils vont se sentir rassurés. En psychologie, il y a ce qu’on appelle un impact émotionnel par personnes interposées. J’ai vu mon collègue partir en burn-out, je ne suis pas une pierre, cela me fait quelque chose, j’ai peur pour lui, je suis triste, et j’ai peur pour moi : si lui sombre, suis-je le prochain ? Le fait de permettre aux collègues rescapés, survivants, de s’exprimer - il ne s’agit pas uniquement de payer un coach ou un psy à la personne en arrêt de travail -, permet de mettre en mots les facteurs de risque les plus explicatifs et les situations de tensions au travail. Travailler dessus pendant que le collègue est en arrêt va permettre de sécuriser les membres de l’équipe, et de protéger le travail. Et cela va permettre tout doucement de préparer le retour post burn-out de celui ou celle qui a craqué. On peut tomber seul mais se relever à plusieurs.
    Le saviez-vous ?

    « Un burn-out fait du bruit : il y a un petit ronron quotidien dans une équipe et à un moment, quelqu’un s’effondre. Le fracas de la chute capte l’attention. Sur cette base, on va se dire que le burn-out est quelque chose d’individuel puisqu’une personne est tombée », analyse Adrien Chignard. En cause : l’heuristique de disponibilité, un biais cognitif, qui nous pousse à formuler des réflexions en fonction d’informations récentes et rapidement accessibles par notre cerveau. Le problème, c’est que celles-ci sont souvent assez limitées et ne permettent pas de comprendre le phénomène plurifactoriel et complexe qu’est le burn-out. « L’heuristique de disponibilité nous permet de simplifier la compréhension d’un monde complexe, comme les stéréotypes, mais ce n’est pas pour cela que c’est vrai. Quand quelqu’un tombe, ce n’est jamais juste une personne qui tombe, il y a tout un système derrière qu’il faut penser, reconstruire et il s’agit de protéger les autres personnes qui seraient en difficulté ».
    Ce qui peut sembler compliqué au sein de l’équipe, notamment pour le manager, c’est qu’on ne sait jamais quand la personne revient. Son absence peut être longue, voire très longue. Comment organiser ces temps de parole ?

    Adrien Chignard : C’est justement là qu’il faut changer le regard. On ne met pas en place un groupe de travail avec une équipe dans le seul but de permettre à celui qui est tombé de revenir. L’objectif, c’est de donner à ce collectif de travail des conditions qui font que plus personne ne tombera. De ne plus être dans une logique de réparation systématique de celles et ceux que le système a cassés. Aujourd’hui, on fait face à une situation de pensée magique qui consiste à dire qu’on peut toujours faire plus avec moins : plus de qualité avec moins d’argent, se réorganiser sans avoir les ressources pour le faire, aller plus vite mais avec un projet qui reste identique… C’est de la pensée magique car la réalisation de la demande relève de l’absurde, de l’injonction contradictoire : fais plus vite, en faisant mieux. Fais mieux, moins cher. Tout ceci à grand renfort d’artifices managériaux que cela soit de la prime, du renforcement narcissique : « t’es le meilleur, on y croit, tu es l’employé du mois »… La pensée magique, c’est le côté « ça va le faire », c’est ne pas se confronter avec lucidité à la réalité. Cela met le salarié dans une situation très difficile, puisqu’elle est impossible en tant que telle. La variable d’ajustement dans l’histoire, celle qui dysfonctionne, devient la sérénité et la vie personnelle des gens. Comment faire rentrer un pied taille 36 dans une chaussure taille 32 ? C’est impossible. C’est pareil quand on demande de faire rentrer une semaine de 60 heures dans une semaine de travail. Comment va-t-on faire ? Ce sont nos temps personnels qui vont devenir la variable d’ajustement de ce système qui dysfonctionne et cela engendre encore plus de burn-out car cela crée une augmentation de la charge de travail et une raréfaction de notre histoire d’amour, de nos voyages, de nos temps de lecture, de repos.
    Comment lutter contre cette pensée magique ?

    Adrien Chignard : Au travail, on peut dire à son manager qu’on ne réussit pas à faire ce qu’il nous demande, ce niveau de qualité avec ce budget-là, par exemple. On peut lui dire : « J’aimerais bien que tu me montres comment c’est possible et alors, je saurai le faire et je n’aurai plus à t’embêter sur le sujet ». Deux choses l’une : soit c’était effectivement possible et vous aurez appris quelque chose, vous serez monté en compétences, vous aurez des ressources en plus et serez moins stressé, et vous aurez renforcé le lien avec votre manager, ce qui protège du burn-out. Soit c’est impossible et votre manager va se confronter lui aussi à l’impossibilité de sa demande et sera bien obligé d’en modifier une partie pour rendre l’équation réaliste. Pour cela, plutôt que de dire ‘c’est pas possible, c’est pas possible’, dites à votre manager : « j’ai besoin d’aide, est-ce que tu peux me montrer comment tu ferais ? ». L’idée est de le mettre lui dans la situation pour que de façon expérientielle, il soit confronté au caractère magique de sa demande.
    Se dire qu’on a peut-être participé à ce dysfonctionnement collectif, à cette pensée magique, et qu’on y participe peut-être tous les jours, consciemment ou inconsciemment, bon gré, mal gré, qu’on soit le manager de la personne tombée en burn-out ou un collègue, suppose une vraie remise en question… Ces temps d’échange peuvent-ils d’ailleurs se faire à l’initiative de tout le monde ?

    Adrien Chignard : Cela peut se déclencher au travers de la demande de tous ceux qui ont été impactés, qui en ont souffert. Révéler ce qu’on ressent en situation de travail n’est pas honteux, les émotions font partie de notre vie et ont toute leur place au travail. D’un point de contractuel de subordination, c’est bien sûr au manager de lancer ce débat-là. Mais aussi d’avoir le courage d’affronter la réalité : c’est qu’il y a eu un problème dans son équipe. Ce n’est pas honteux. Ce qui le serait, ce serait de ne pas pouvoir le regarder en face. Que ce soit les collaborateurs qui le remontent ou le manager qui mette le sujet sur la table, le processus est déjà soignant en tant que tel et il est quasiment aussi important que le résultat. C’est le fait de se poser, de mettre en lumière ce qui dysfonctionne pour ensuite déterminer ensemble les actions à mettre en place qui compte. L’adversité n’est pas toujours fédératrice. Lorsque quelqu’un tombe dans une équipe, la grande crainte de tous est : qui va se récupérer son travail ? S’il est tombé, c’est qu’il était charrette et tout le monde est déjà charrette. Or, un des six facteurs qui précipite le burn-out, c’est le collectif clivé, des relations tendues. C’est la raison pour laquelle c’est avant tout au management de prendre ce signal comme celui d’un collectif en panne qu’il est nécessaire de pouvoir réparer en générant un échange avec les collaborateurs sur les facteurs de stress, les risques psychosociaux. Et le bénéfice collatéral, c’est que cela permet de faire passer deux messages à celui qui reviendra. D’abord, que ce n’est pas sa faute, qu’il y a une responsabilité organisationnelle et pas une faute morale individuelle. C’est déculpabilisant. Et quand il reviendra, il constatera que les conditions de travail ont changé, qu’elles sont plus propices à de la santé. C’est la meilleure façon de revenir : il reprendra le travail en ayant l’impression que son arrêt n’aura pas été vain...
    Les mêmes causes produisant les mêmes conséquences, si rien ne change, la personne risque de repartir en arrêt maladie…

    Adrien Chignard : C’est exactement ça. Lorsqu’une équipe est confrontée à une situation de burn-out, c’est le collectif de travail restant qui permet à la santé et à la sérénité de tout le monde de revenir : à la fois des collègues, et puis de celui qui est parti. C’est pour cela que le regard individualisant sur le burn-out est culpabilisant : une personne tombe, on l’accompagne surtout à l’extérieur de l’entreprise, celui qui part a l’impression qu’il est nul, qu’il doit cacher cette maladie honteuse qu’on ne saurait voir. Et c’est aussi terrorisant pour celles et ceux qui restent : les messages ne sont pas entendus, il y a une forme de cécité, de surdité managériale, comme s’il ne s’était rien passé. On ne remet jamais en question le système et on considère qu’il vaut mieux réparer ceux que le système a cassés plutôt que penser que l’organisation du travail actuelle est à modifier un peu. On oublie que celle-ci n’est qu’un outil au service de la performance. Un organigramme, ça se change !

    https://www.psychologies.com/Travail/Souffrance-au-travail/Burn-out/Interviews/Le-burn-out-est-le-signal-d-un-dysfonctionnement-collectif

    #collectif #individuel #dysfonctionnement_collectif #honte #déculpabilisation #environnement #pensée_magique #absurdité #injonctions_contradictoires #management #primes #pensée_magique #renforcement_narcissique #travail #adversité #responsabilité #organisation_du_travail

    –—

    Mais, notamment à l’Université Grenoble Alpes, on continue d’offrir des cours de sophrologie ou d’efficacité professionnelle :
    https://seenthis.net/messages/817228

  • « Et surtout, n’oubliez pas le .FR ! », la nouvelle technique en publicité TV & Radio pour battre ses concurrents sur les moteurs de recherche.

    Explications par Mickael Vigreux https://www.afnic.fr/observatoire-ressources/papier-expert/et-surtout-noubliez-pas-le-fr-la-nouvelle-technique-pour-battre-ses-concurrent

    “And above all, don’t forget .FR !” - the new technique in TV & radio advertising for beating rivals on search engines.

    Mickael Vigreux explains https://www.afnic.fr/en/observatory-and-resources/expert-papers/and-above-all-dont-forget-fr-the-new-technique-for-beating-rivals-on-search-en

    #Afnic #DotFR #ccTLDs #Marketing #SEO #Communication #Googl #PointFR #référencement #advertising

  • La fabrication de chaussures relocalisée en #France, dans l’#usine « la plus moderne au monde » en #Ardèche

    C’est le retour de la production de chaussures à grande échelle en France, et ça se passe en Ardèche ! L’usine ASF 4.0 du groupe textile #Chamatex a été inaugurée à #Ardoix, « l’usine de chaussures de #sport la plus moderne au monde » selon ses dirigeants.

    Après un an de travaux et 10 millions d’euros d’investissement, l’usine ultramoderne ASF 4.0 - pour ’#Advanced_Shoe_Factory' - a été inaugurée ce jeudi en Ardèche, à Ardoix. Le groupe Chamatex a réussi son pari : relocaliser la fabrication de chaussures de sport en France, et ainsi concurrencer l’Asie.

    Dès la semaine prochaine, des premières #chaussures_de_sport de la marque #Salomon seront produites. Il s’agit des modèles Captiv, qui devraient être commercialisées au plus tard en janvier 2022. Pour le moment, une vingtaine de salariés ont été embauchés. Ils seront une quarantaine à la fin de l’année.

    Deux conditions pour permettre la #relocalisation : automatiser le plus possible la production pour réduire les coûts, et fabriquer en quantité pour amortir les investissements. Là encore, pari tenu annonce le président du groupe Chamatex Gilles Réguillon : « de la découpe en automatique, une ligne d’assemblage en automatique, une ligne de collage en automatique, une ligne de packaging automatique, et le tout géré en industrie 4.0. C’est unique, et c’est ici, en Ardèche ».

    Encore quelques réglages, et avant la fin de l’année, une paire de chaussures sera fabriquée toutes les deux minutes sur le site. Des améliorations techniques permettront de réduire ce temps par deux l’an prochain. Objectif affiché : produire 500 000 paires de chaussures par an, d’ici 2024. Et Gilles Réguillon annonce d’ores et déjà travailler sur l’extension de son usine, afin d’ajouter de nouvelles lignes de production, les « commandes étant remplies pour les trois prochaines années » a-t-il indiqué ce jeudi. Trois marques ont d’ores et déjà signé avec l’usine pour fabriquer certains de leurs modèles : Salomon, Babolat et Millet.

    Les partenaires sont nombreux, les dirigeants évoquent une « hybridation des talents ». #ASF_4.0 est co-fondée par Bertrand Barre, président du Groupe Zebra, et Gilles Réguillon, président du #Groupe_Chamatex, qui a misé sur son matériau textile unique #Matryx comme principal composant de sa chaussure ; la marque Salomon a amené son savoir-faire et le process industriel ; la partie machinerie a été menée par Siemens.

    https://www.francebleu.fr/infos/economie-social/la-fabrication-de-chaussures-relocalisee-en-france-dans-l-usine-la-plus-m

    #chaussures #made_in_France

  • « L’Agisme genrée »
    Le mouvement #advancedstyle célèbre l’élégance des femmes âgées et leur apporte un sentiment de puissance
    https://theconversation.com/le-mouvement-advancedstyle-celebre-lelegance-des-femmes-agees-et-le

    Âgisme genré dans la mode

    Le marché de la mode, qui est bourré de règles discriminatoires sur ce qu’on doit porter et surtout ce qu’on ne doit pas porter lorsqu’on est une femme de 50 ans et plus, rend l’engagement durable difficile. Ces règles demandent notamment de ne plus montrer son corps en évitant les vêtements moulants, courts ou décolletés, d’adopter une garde-robe et un maquillage sobres et de proscrire les styles ultramodernes et avant-gardistes.

    Nous avons constaté que, en réaction à cette réalité, les consommatrices devenues influenceuses se lancent dans un « militantisme de la mode » en ligne, exigeant des créateurs qu’ils créent du prêt-à-porter adapté à leur corps en transformation.

    Dans le domaine du marketing d’influence, ce militantisme consiste également à choisir les marques que l’on souhaite promouvoir et avec lesquelles on veut collaborer, et celles qu’on préfère éviter. Les influenceuses refusent généralement d’être « la vieille de service » d’une campagne publicitaire.

    Âgisme genré dans l’industrie de la beauté

    La majorité des influenceuses du style avancé rejettent également l’industrie de la beauté anti-âge qui transforme le vieillissement en maladie. Cette industrie, qui se chiffre en milliards de dollars, entretient le faux espoir qu’on peut trouver la jeunesse éternelle dans un pot.
    Helen Mirren dans un costume sombre avec des boutons dorés et des bottes à talons aiguilles
    L’actrice Helen Mirren pose pour les photographes lors du 70efestival international du film de Berlin, en février 2020. (AP Photo/Markus Schreiber)

    Nous avons constaté que ces femmes choisissent de rendre les cheveux grisonnants naturels, les rides et les cicatrices à la mode grâce à leurs publications Instagram. Cela fait des lustres que les marques de cosmétiques disent aux femmes d’un certain âge que les cheveux grisonnants sont un problème honteux qu’elles doivent cacher, alors que pour les hommes du même âge, on voit là une sorte de sex-appeal mature. La chevelure grise devient ainsi un élément caractéristique de la résistance de ces influenceuses qui est au cœur de leur militantisme.

    C’est pas tellement que le sujet de ce compte instagram m’intéresse, mais je trouve que l’expression « agisme genré » comme utilisé dans cet article est remarquable pour sa capacité à invisibilise les femmes et c’est assez fort de le faire alors que c’est le sujet de l’article.
    #misogynie #genre #invisibilisation #femmes #sexisme #langage

    • Trigger Warnings | Centre for Teaching Excellence

      A trigger warning is a statement made prior to sharing potentially disturbing content. That content might include graphic references to topics such as #sexual_abuse, #self-harm, #violence, #eating_disorders, and so on, and can take the form of an #image, #video_clip, #audio_clip, or piece of #text. In an #academic_context, the #instructor delivers these messages in order to allow students to prepare emotionally for the content or to decide to forgo interacting with the content.

      Proponents of trigger warnings contend that certain course content can impact the #wellbeing and #academic_performance of students who have experienced corresponding #traumas in their own lives. Such students might not yet be ready to confront a personal #trauma in an academic context. They choose to #avoid it now so that they can deal with it more effectively at a later date – perhaps after they have set up necessary #resources, #supports, or #counselling. Other students might indeed be ready to #confront a personal trauma in an academic context but will benefit from a #forewarning of certain topics so that they can brace themselves prior to (for example) participating in a #classroom discussion about it. Considered from this perspective, trigger warnings give students increased #autonomy over their learning, and are an affirmation that the instructor #cares about their wellbeing.

      However, not everyone agrees that trigger warnings are #necessary or #helpful. For example, some fear that trigger warnings unnecessarily #insulate students from the often harsh #realities of the world with which academics need to engage. Others are concerned that trigger warnings establish a precedent of making instructors or universities legally #responsible for protecting students from #emotional_trauma. Still others argue that it is impossible to anticipate all the topics that might be potentially triggering for students.

      Trigger warnings do not mean that students can exempt themselves from completing parts of the coursework. Ideally, a student who is genuinely concerned about being #re-traumatized by forthcoming course content would privately inform the instructor of this concern. The instructor would then accommodate the student by proposing #alternative_content or an alternative learning activity, as with an accommodation necessitated by a learning disability or physical disability.

      The decision to preface potentially disturbing content with a trigger warning is ultimately up to the instructor. An instructor who does so might want to include in the course syllabus a preliminary statement (also known as a “#content_note”), such as the following:

      Our classroom provides an open space for the critical and civil exchange of ideas. Some readings and other content in this course will include topics that some students may find offensive and/or traumatizing. I’ll aim to #forewarn students about potentially disturbing content and I ask all students to help to create an #atmosphere of #mutual_respect and #sensitivity.

      Prior to introducing a potentially disturbing topic in class, an instructor might articulate a #verbal_trigger_warning such as the following:

      Next class our discussion will probably touch on the sexual assault that is depicted in the second last chapter of The White Hotel. This content is disturbing, so I encourage you to prepare yourself emotionally beforehand. If you believe that you will find the discussion to be traumatizing, you may choose to not participate in the discussion or to leave the classroom. You will still, however, be responsible for material that you miss, so if you leave the room for a significant time, please arrange to get notes from another student or see me individually.

      A version of the foregoing trigger warning might also preface written materials:

      The following reading includes a discussion of the harsh treatment experienced by First Nations children in residential schools in the 1950s. This content is disturbing, so I encourage everyone to prepare themselves emotionally before proceeding. If you believe that the reading will be traumatizing for you, then you may choose to forgo it. You will still, however, be responsible for material that you miss, so please arrange to get notes from another student or see me individually.

      Trigger warnings, of course, are not the only answer to disturbing content. Instructional #strategies such as the following can also help students approach challenging material:

      – Give your students as much #advance_notice as possible about potentially disturbing content. A day’s notice might not be enough for a student to prepare emotionally, but two weeks might be.

      – Try to “scaffold” a disturbing topic to students. For example, when beginning a history unit on the Holocaust, don’t start with graphic photographs from Auschwitz. Instead, begin by explaining the historical context, then verbally describe the conditions within the concentration camps, and then introduce the photographic record as needed. Whenever possible, allow students to progress through upsetting material at their own pace.

      – Allow students to interact with disturbing material outside of class. A student might feel more vulnerable watching a documentary about sexual assault while in a classroom than in the security of his or her #home.

      – Provide captions when using video materials: some content is easier to watch while reading captions than while listening to the audio.

      – When necessary, provide written descriptions of graphic images as a substitute for the actual visual content.

      – When disturbing content is under discussion, check in with your students from time to time: #ask them how they are doing, whether they need a #break, and so on. Let them know that you are aware that the material in question is emotionally challenging.

      – Advise students to be #sensitive to their classmates’ #vulnerabilities when they are preparing class presentations.

      – Help your students understand the difference between emotional trauma and #intellectual_discomfort: the former is harmful, as is triggering it in the wrong context (such as in a classroom rather than in therapy); the latter is fundamental to a university education – it means our ideas are being challenged as we struggle to resolve cognitive dissonance.

      https://uwaterloo.ca/centre-for-teaching-excellence/trigger

    • Why Trigger Warnings Don’t Work

      Because trauma #survivors’ #memories are so specific, increasingly used “trigger warnings” are largely #ineffective.

      Fair warning labels at the beginning of movie and book reviews alert the reader that continuing may reveal critical plot points that spoil the story. The acronym NSFW alerts those reading emails or social media posts that the material is not suitable for work. The Motion Picture Association of America provides film ratings to advise about content so that moviegoers can make informed entertainment choices for themselves and their children.

      Enter stage right: Trigger warning.

      A trigger warning, most often found on #social_media and internet sites, alerts the reader that potentially upsetting information may follow. The words trigger warning are often followed by a subtitle such as *Trigger warning: This may be triggering to those who have struggled with _________. Fill in the blank. #Domestic_abuse. #Rape. #Body_image. #Needles. #Pregnancy.

      Trigger warnings have become prevalent online since about 2012. Victim advocate Gayle Crabtree reports that they were in use as early as 1996 in chat rooms she moderated. “We used the words ‘trigger warning,’ ‘#tw,’ ‘#TW,’ and ‘trigger’ early on. …This meant the survivor could see the warning and then decide if she or he wanted to scroll down for the message or not.” Eventually, trigger warnings spread to social media sites including #Tumblr, #Twitter, and #Facebook.

      The term seems to have originated from the use of the word “trigger” to indicate something that cues a #physiological_response, the way pollen may trigger an allergy attack. A trigger in a firearm is a lever that activates the sequence of firing a gun, so it is not surprising that the word was commandeered by those working in the field of #psychology to indicate objects and sensations that cause neurological firing in the brain, which in turn cause #feelings and #thoughts to occur.

      Spoiler alerts allow us to enjoy the movie or book as it unfolds without being influenced by knowledge about what comes next. The NSFW label helps employees comply with workplace policies that prohibit viewing sexually explicit or profane material. Motion picture ratings enable viewers to select movies they are most likely to find entertaining. Trigger warnings, on the other hand, are “designed to prevent people who have an extremely strong and damaging emotional response… to certain subjects from encountering them unaware.”

      Say what?

      Say hogwash!

      Discussions about trigger warnings have made headlines in the New Yorker, the Los Angeles Times, the Guardian, the New Republic, and various other online and print publications. Erin Dean writes that a trigger “is not something that offends one, troubles one, or angers one; it is something that causes an extreme involuntary reaction in which the individual re-experiences past trauma.”

      For those individuals, it is probably true that coming across material that reminds them of a traumatic event is going to be disturbing. Dean’s definition refers to involuntary fear and stress responses common in individuals with Post Traumatic Stress Disorder characterized by intrusive memories, thoughts, or dreams; intense distress at cues that remind the individual of the event; and reactivity to situations, people, or objects that symbolize the event. PTSD can result from personal victimization, accidents, incarceration, natural disasters, or any unexpected injury or threat of injury or death. Research suggests that it results from a combination of genetic predisposition, fear conditioning, and neural and physiological responses that incorporate the body systems and immunological responses. Current theories suggest that PTSD represents “the failure to recover from the normal effects of trauma.” In other words, anyone would be adversely affected by trauma, but natural mechanisms for healing take place in the majority of individuals. The prevalence of PTSD ranges from 1.9 percent in Europe to 3.5 percent in the United States.

      The notion that trigger warnings should be generalized to all social media sites, online journals, and discussion boards is erroneous.

      Some discussions have asserted that because between one in four and one in five women have been sexually abused, trigger warnings are necessary to protect vast numbers of victims from being re-traumatized. However, research shows that the majority of trauma-exposed persons do not develop PTSD. This does not mean they aren’t affected by trauma, but that they do not develop clinically significant symptoms, distress, or impairment in daily functioning. The notion that trigger warnings should be generalized to all social media sites, online journals, and discussion boards is erroneous. Now some students are pushing for trigger warnings on college class syllabi and reading lists.

      But what?

      Balderdash!

      But wait, before people get all riled up, I’d like to say that yes, I have experienced trauma in my life.

      I wore a skirt the first time George hit me. I know this because I remember scrunching my skirt around my waist and balancing in heels while I squatted over a hole in the concrete floor to take a piss. We were in Tijuana. The stench of excrement made my stomach queasy with too much tequila. I wanted to retch.

      We returned to our hotel room. I slid out of my blouse and skirt. He stripped to nothing and lay on the double bed. He was drinking Rompope from the bottle, a kind of Mexican eggnog: strong, sweet, and marketed for its excellent spunk. It’s a thick yellow rum concoction with eggs, sugar, and almond side notes. George wanted to have sex. We bickered and argued as drunks sometimes do. I said something — I know this because I always said something — and he hit me. He grabbed me by the hair and hit me again. “We’re going dancing,” he said.

      “I don’t feel like dancing — “

      “Fine. Stay.”

      The world was tilting at an angle I didn’t recognize. The mathematician Matt Tweed writes that atoms are made up of almost completely empty space. To grasp the vast nothingness, he asks the reader to imagine a cat twirling a bumblebee on the end of a half-mile long string. That’s how much emptiness there is between the nucleus and the electron. There was more space than that between George and me. I remember thinking: I am in a foreign country. I don’t speak Spanish. I have no money. We went dancing.

      Labeling a topic or theme is useless because of the way our brains work. The labels that we give trauma (assault, sexual abuse, rape) are not the primary source of triggers. Memories are, and not just memories, but very specific, insidious, and personally individualized details lodged in our brain at the time of the trauma encoded as memory. Details can include faces, places, sounds, smells, tastes, voices, body positions, time of day, or any other sensate qualities that were present during a traumatic incident.

      If I see a particular shade of yellow or smell a sickly sweet rum drink, I’m reminded of my head being yanked by someone who held a handful of my hair in his fist. A forest green Plymouth Duster (the car we drove) will too. The word assault does not. The words domestic violence don’t either. The specificity of details seared in my mind invokes memory.

      Last year a driver slammed into the back of my car on the freeway. The word tailgate is not a trigger. Nor is the word accident. The flash of another car suddenly encroaching in my rearview mirror is. In my mid-20s, I drove my younger sister (sobbing, wrapped in a bed sheet) to the hospital where two male officers explained they were going to pluck her pubic hair for a rape kit. When I see tweezers in a hospital, I flash back to that awful moment. For my sister, other things may be triggers: the moonlight shining on the edge of a knife. The shadow of a person back lit in a doorway. An Hispanic man’s accent. If we were going to insist on trigger warnings that work, they would need to look something like this:

      Trigger warning: Rompope.

      Trigger warning: a woman wrapped in a bed sheet.

      Trigger warning: the blade of a knife.

      The variability of human #perception and traumatic recall makes it impossible to provide the necessary specificity for trigger warnings to be effective. The nature of specificity is, in part, one reason that treatment for traumatic memories involves safely re-engaging with the images that populate the survivor’s memory of the event. According to Dr. Mark Beuger, an addiction psychiatrist at Deerfield Behavioral Health of Warren (PA), the goal of PTSD treatment is “to allow for processing of the traumatic experience without becoming so emotional that processing is impossible.” By creating a coherent narrative of the past event through telling and retelling the story to a clinician, survivors confront their fears and gain mastery over their thoughts and feelings.

      If a survivor has had adequate clinical support, they could engage online with thoughts or ideas that previously had been avoided.

      According to the National Center for Health, “#Avoidance is a maladaptive #control_strategy… resulting in maintenance of perceived current threat. In line with this, trauma-focused treatments stress the role of avoidance in the maintenance of PTSD. Prolonged exposure to safe but anxiety-provoking trauma-related stimuli is considered a treatment of choice for PTSD.” Avoidance involves distancing oneself from cues, reminders, or situations that remind one of the event that can result in increased #social_withdrawal. Trigger warnings increase social withdrawal, which contributes to feelings of #isolation. If a survivor who suffers from PTSD has had adequate clinical support, they could engage online with thoughts or ideas that previously had been avoided. The individual is in charge of each word he or she reads. At any time, one may close a book or click a screen shut on the computer. What is safer than that? Conversely, trigger warnings perpetuate avoidance. Because the intrusive memories and thoughts are internal, trigger warnings suggest, “Wait! Don’t go here. I need to protect you from yourself.”

      The argument that trigger warnings help to protect those who have suffered trauma is false. Most people who have experienced trauma do not require preemptive protection. Some may argue that it would be kind to avoid causing others distress with upsetting language and images. But is it? Doesn’t it sometimes take facing the horrific images encountered in trauma to effect change in ourselves and in the world?

      A few weeks ago, I came across a video about Boko Haram’s treatment of a kidnapped schoolgirl. The girl was blindfolded. A man was digging a hole in dry soil. It quickly became evident, as he ushered the girl into the hole, that this would not end well. I felt anxious as several men began shoveling soil in around her while she spoke to them in a language I could not understand. I considered clicking away as my unease and horror grew. But I also felt compelled to know what happened to this girl. In the 11-minute video, she is buried up to her neck.

      All the while, she speaks to her captors, who eventually move out of the frame of the scene. Rocks begin pelting the girl’s head. One after the other strikes her as I stared, horrified, until finally, her head lay motionless at an angle that could only imply death. That video (now confirmed to be a stoning in Somalia rather than by Boko Haram) forever changed my level of concern about young girls kidnapped in other countries.

      We are changed by what we #witness. Had the video contained a trigger warning about gruesome death, I would not have watched it. Weeks later, I would have been spared the rush of feelings I felt when a friend posted a photo of her daughter playfully buried by her brothers in the sand. I would have been spared knowing such horrors occur. But would the world be a better place for my not knowing? Knowledge helps us prioritize our responsibilities in the world. Don’t we want engaged, knowledgeable citizens striving for a better world?

      Recently, the idea of trigger warnings has leapt the gulch between social media and academic settings. #Universities are dabbling with #policies that encourage professors to provide trigger warnings for their classes because of #complaints filed by students. Isn’t the syllabus warning enough? Can’t individual students be responsible for researching the class content and reading #materials before they enroll? One of the benefits of broad exposure to literature and art in education is Theory of Mind, the idea that human beings have the capacity to recognize and understand that other people have thoughts and desires that are different from one’s own. Do we want #higher_education to comprise solely literature and ideas that feel safe to everyone? Could we even agree on what that would be?

      Art occurs at the intersection of experience and danger. It can be risky, subversive, and offensive. Literature encompasses ideas both repugnant and redemptive. News about very difficult subjects is worth sharing. As writers, don’t we want our readers to have the space to respond authentically to the story? As human beings, don’t we want others to understand that we can empathize without sharing the same points of view?

      Trigger warnings fail to warn us of the very things that might cause us to remember our trauma. They insulate. They cause isolation. A trigger warning says, “Be careful. This might be too much for you.” It says, “I don’t trust you can handle it.” As a reader, that’s not a message I want to encounter. As a writer, that is not the message I want to convey.

      Trigger warnings?

      Poppycock.

      http://www.stirjournal.com/2014/09/15/trigger-what-why-trigger-warnings-dont-work

    • Essay on why a professor is adding a trigger warning to his #syllabus

      Trigger warnings in the classroom have been the subject of tremendous #debate in recent weeks, but it’s striking how little the discussion has contemplated what actual trigger warnings in actual classrooms might plausibly look like.

      The debate began with demands for trigger warnings by student governments with no power to compel them and suggestions by #administrators (made and retracted) that #faculty consider them. From there the ball was picked up mostly by observers outside higher ed who presented various #arguments for and against, and by professors who repudiated the whole idea.

      What we haven’t heard much of so far are the voices of professors who are sympathetic to the idea of such warnings talking about what they might look like and how they might operate.

      As it turns out, I’m one of those professors, and I think that discussion is long overdue. I teach history at Hostos Community College of the City University of New York, and starting this summer I’m going to be including a trigger warning in my syllabus.

      I’d like to say a few things about why.

      An Alternative Point of View

      To start off, I think it’s important to be clear about what trigger warnings are, and what purpose they’re intended to serve. Such warnings are often framed — and not just by critics — as a “you may not want to read this” notice, one that’s directed specifically at survivors of trauma. But their actual #purpose is considerably broader.

      Part of the confusion arises from the word “trigger” itself. Originating in the psychological literature, the #term can be misleading in a #non-clinical context, and indeed many people who favor such warnings prefer to call them “#content_warnings” for that reason. It’s not just trauma survivors who may be distracted or derailed by shocking or troubling material, after all. It’s any of us, and a significant part of the distraction comes not from the material itself but from the context in which it’s presented.

      In the original cut of the 1933 version of the film “King Kong,” there was a scene (depicting an attack by a giant spider) that was so graphic that the director removed it before release. He took it out, it’s said, not because of concerns about excessive violence, but because the intensity of the scene ruined the movie — once you saw the sailors get eaten by the spider, the rest of the film passed by you in a haze.

      A similar concern provides a big part of the impetus for content warnings. These warnings prepare the reader for what’s coming, so their #attention isn’t hijacked when it arrives. Even a pleasant surprise can be #distracting, and if the surprise is unpleasant the distraction will be that much more severe.

      I write quite a bit online, and I hardly ever use content warnings myself. I respect the impulse to provide them, but in my experience a well-written title and lead paragraph can usually do the job more effectively and less obtrusively.

      A classroom environment is different, though, for a few reasons. First, it’s a shared space — for the 75 minutes of the class session and the 15 weeks of the semester, we’re pretty much all #stuck with one another, and that fact imposes #interpersonal_obligations on us that don’t exist between writer and reader. Second, it’s an interactive space — it’s a #conversation, not a monologue, and I have a #responsibility to encourage that conversation as best I can. Finally, it’s an unpredictable space — a lot of my students have never previously encountered some of the material we cover in my classes, or haven’t encountered it in the way it’s taught at the college level, and don’t have any clear sense of what to expect.

      For all these reasons, I’ve concluded that it would be sound #pedagogy for me to give my students notice about some of the #challenging_material we’ll be covering in class — material relating to racial and sexual oppression, for instance, and to ethnic and religious conflict — as well as some information about their rights and responsibilities in responding to it. Starting with the summer semester, as a result, I’ll be discussing these issues during the first class meeting and including a notice about them in the syllabus.

      My current draft of that notice reads as follows:

      Course Content Note

      At times this semester we will be discussing historical events that may be disturbing, even traumatizing, to some students. If you ever feel the need to step outside during one of these discussions, either for a short time or for the rest of the class session, you may always do so without academic penalty. (You will, however, be responsible for any material you miss. If you do leave the room for a significant time, please make arrangements to get notes from another student or see me individually.)

      If you ever wish to discuss your personal reactions to this material, either with the class or with me afterwards, I welcome such discussion as an appropriate part of our coursework.

      That’s it. That’s my content warning. That’s all it is.

      I should say as well that nothing in these two paragraphs represents a change in my teaching practice. I have always assumed that if a student steps out of the classroom they’ve got a good reason, and I don’t keep tabs on them when they do. If a student is made uncomfortable by something that happens in class, I’m always glad when they come talk to me about it — I’ve found we usually both learn something from such exchanges. And of course students are still responsible for mastering all the course material, just as they’ve always been.

      So why the note, if everything in it reflects the rules of my classroom as they’ve always existed? Because, again, it’s my job as a professor to facilitate class discussion.

      A few years ago one of my students came to talk to me after class, distraught. She was a student teacher in a New York City junior high school, working with a social studies teacher. The teacher was white, and almost all of his students were, like my student, black. That week, she said, one of the classes had arrived at the point in the semester given over to the discussion of slavery, and at the start of the class the teacher had gotten up, buried his nose in his notes, and started into the lecture without any introduction. The students were visibly upset by what they were hearing, but the teacher just kept going until the end of the period, at which point he finished the lecture, put down his papers, and sent them on to math class.

      My student was appalled. She liked these kids, and she could see that they were hurting. They were angry, they were confused, and they had been given nothing to do with their #emotions. She asked me for advice, and I had very little to offer, but I left our meeting thinking that it would have been better for the teacher to have skipped that material entirely than to have taught it the way he did.

      History is often ugly. History is often troubling. History is often heartbreaking. As a professor, I have an #obligation to my students to raise those difficult subjects, but I also have an obligation to raise them in a way that provokes a productive reckoning with the material.

      And that reckoning can only take place if my students know that I understand that this material is not merely academic, that they are coming to it as whole people with a wide range of experiences, and that the journey we’re going on #together may at times be #painful.

      It’s not coddling them to acknowledge that. In fact, it’s just the opposite.

      https://www.insidehighered.com/views/2014/05/29/essay-why-professor-adding-trigger-warning-his-syllabus

  • #IOM using #Facebook #advertisment to reach potential #return_migrants

    Mail received by a friend with Pakistani citizenship:

    “I am adding a screenshot of advertising on Facebook by German government which suggest me to ’ If I would like to return my home country and don’t know how then I can contact there’ Advertising is in Urdu which means they already know who they are showing this advertisement. This is interesting that they use my personal data and target me as a refugee I guess. [...]
    Screenshot is attached and the link where the advertisement leads is below.”

    https://www.online-antragsmodul.de/OAM/MIRA/Default.aspx

    #Germany #migration #return_migration #explusion #social_media #social_networks #data_privacy

    ping @cdb_77 @rhoumour @deka

    • Répondre à un appel à contribution

      Du 9 au 12 juin 2010 s’est déroulé un atelier d’écriture, organisé par quatre doctorants (de l’EHESS et de Institut d’Urbanisme de Paris). L’un des temps de travail était consacré aux réponses à des appels à contribution : nous vous proposons ici un rapide survol des questions évoquées à cette occasion.

      Qu’est-ce qu’une réponse à un appel à contributions ?

      Une proposition de contribution est un texte assez court (une demi-page ou une page maximum) dans lequel on décrit un projet d’article, que l’on propose à la revue qui a fait paraître un appel à contribution. C’est donc un texte qui parle d’un texte à venir, qui n’existe pas encore… !

      NB : si notre proposition est acceptée, cela ne signifie pas pour autant que l’article qui suivra sera nécessairement accepté. S’il ne répond pas aux attentes du comité de rédaction, il pourra être rejeté même si, au vu de la réponse à l’appel à contribution, le comité de rédaction avait intégré notre proposition au sommaire prévisionnel…
      Quelques conseils pour rédiger une réponse à un appel à contribution :

      Ne pas oublier l’objectif de ce texte : faire en sorte que notre proposition soit acceptée ! Il faut « vendre » notre proposition, montrer pourquoi elle est importante dans le cadre du sujet que la revue se propose de traiter. C’est le seul objectif de ce texte, et par conséquent certains éléments n’y ont pas leur place (des détails, des nuances, des formulations trop précautionneuses, des justifications du sujet de recherche et de ses contours…).

      Les appels à contributions indiquent souvent un certain nombre d’axes précis. Il est bon de s’inscrire d’emblée dans un axe et de le mentionner explicitement (on facilite le travail du comité scientifique qui, pour faire son choix, va classer les différentes propositions selon les axes, qui correspondent souvent aux différentes parties du sommaire du numéro).

      « L’objectif de cet article est de… » – c’est un excellent début !

      Mettre en scène un étonnement. Soigner la mise en intrigue de la question que l’on entend soulever avec notre article (sans exagération littéraire). Le lecteur nous suit si on l’amène à réfléchir, si on l’invite à dépasser les évidences et à avancer avec nous – pas si on lui expose des faits sans qu’il ait à se questionner…

      Ne pas en rester au stade du projet : Même si notre texte parle d’un article que nous n’avons bien sûr pas encore écrit et qui impliquera peut-être des recherches que nous n’avons pas encore faites, il faut montrer que nous avons plus qu’un projet : évoquer notre terrain, donner des résultats, des éléments de conclusion.

      Quelques questions à se poser pour vérifier la clarté du texte

      Bien souvent, « le nez dans le guidon », on oublie de formuler les choses essentielles : l’objet de notre recherche est loin d’être aussi clair qu’on le pense, et l’objectif de l’article proposé reste totalement flou…

      Est-on capable, à la lecture, de formuler LA question que pose notre texte ? Si ce n’est pas le cas, il y a forcément un problème ! Est-ce que, nous-même, nous savons quelle question nous entendons traiter ?

      On peut aussi essayer de faire entrer la proposition dans les cases suivantes : contexte, méthode, résultats, discussion. Elles constituent les étapes d’un article « canonique » dans le milieu de la recherche biomédicale. C’est parfois une bonne façon de « tester » un article de sciences sociales et de vérifier sa rigueur…

      Toujours se faire relire avant d’envoyer une proposition…

      L’exercice de la relecture sans concessions n’est pas évident, ni pour celui qui relit, ni pour celui qui est relu ! Bien souvent, les zones d’obscurité du texte qui sont identifiées par le relecteur sont liées à un manque de clarté de la problématique, à un problème méthodologique, à un manque de données que l’on a tenté de dissimuler, à un problème de sources que l’on ne se sent pas autorisé à citer… Il faut alors accepter de se demander pourquoi on est mal à l’aise sur ce point, pourquoi on ne peut pas dépasser ce problème – assumer sa position, l’état de ses connaissances. Bien souvent, il vaut mieux nommer le problème que l’on rencontre (c’est aussi l’occasion d’en prendre clairement conscience et de le circonscrire !) plutôt que d’essayer de le dissimuler… Et gardons à l’esprit l’objectif principal d’une proposition de contribution : donner envie aux lecteurs (à la revue) d’en savoir plus !

      Marie Glon, doctorante à l’EHESS

      https://act.hypotheses.org/644

    • Comment écrire un bon article pour une revue scientifique ?

      Ça y est, votre proposition de communication est acceptée et vous allez pouvoir écrire un article ! C’est une étape importante de votre parcours : vous devez prendre l’habitude de diffuser vos résultats ( et vous trouverez ici une vidéo sur l’étape précédente : comment trouver une revue pour publier notre article ?).

      Alors, comment allez-vous vous y prendre maintenant ? Le premier réflexe est souvent de rechercher quelle forme doit avoir l’article ; de quelles rubriques il doit être constitué, car bien sûr, vous ne voulez pas être pris en défaut.

      Mais attention, la qualité de votre article ne tiendra pas qu’au respect des « normes » de rédaction mais plus encore à la pertinence des résultats que vous exposez et au plaisir que l’on prendra à vous lire. Comment parvenir à écrire un article utile pour les autres et passionnant ?

      Quel format adopter ?

      Si vous avez fait un petit tour sur le net avant d’arriver ici, vous avez peut-être constaté que l’on conseille habituellement de respecter un certain plan avec des parties bien définies dans un article scientifique (ici un exemple détaillé).

      Il est habituel d’affirmer qu’un article doit contenir :

      – Une introduction qui énonce la problématique, qui explique en quoi elle est intéressante / novatrice, et qui annonce le plan de l’article.
      – Une partie de contexte théorique (ou état de l’art) où vous vous situez par rapport aux principaux courants d’analyse concernant la question précise que vous traitez. Vous résumez ici les derniers avancements des connaissances dans votre domaine et vous indiquez sur quels concepts vous vous basez, vous. Et le tout en quelques paragraphes seulement, eh oui !
      – La méthodologie : c’est une partie où vous expliquez quelles sont vos données et comment vous vous y prenez pour les recueillir.
      – Les résultats que vous avez obtenus
      – La discussion de ces résultats au regard des concepts mobilisés : finalement, qu’avez-vous à dire de nouveau sur le phénomène étudié ?

      Cependant, cette liste n’est pas une recette de cuisine : elle n’est ni obligatoire ni exhaustive.

      Pas exhaustive, en effet, car certaines revues sont encore plus précises concernant l’architecture de leurs articles et réclament d’autres points encore (« considérations éthiques », « objectifs » etc.).

      Et pas obligatoire car d’autres comités de publication, au contraire, n’obligent pas leurs contributeurs à suivre un tel canevas. C’est particulièrement le cas dans certaines disciplines avec une tradition plus « littéraire », où les revues publient des articles avec des plans qui déroulent un argument de façon thématique et où l’exposé de la méthode et du contexte sont réduits, généralement renvoyés en intro. J’ai moi-même rédigé des articles de cette façon « plus libre », la discussion thématique prenant le pas sur le reste (et c’était en socio/anthropo).

      Alors comment vous y retrouver et éviter les faux pas ?

      Eh bien vous devez aller vérifier par vous-même ce que l’on attend de vous ! Une revue a accepté votre contribution ? Allez chercher des numéros antérieurs de cette revue et faites votre enquête. Regardez plusieurs articles. Comment sont-ils construits ? Tous pareils ? Alors faites de même. Ou sont-ils tous différents ? Vous aurez alors la liberté de laisser plus de place à la discussion des résultats, par exemple.

      Choisir le bon sujet pour votre article

      Un article fait entre 10 et 15 pages, la plupart du temps ; cela vous laisse peu d’espace pour développer une argumentation logique, tout en présentant les données sur lesquelles elle s’appuie. Écrire un bon article, c’est donc d’abord trouver un sujet qui a la bonne dimension. Comment faire ?

      Tout d’abord, vous ne devez pas concevoir l’article comme un extrait de votre thèse (sauf exceptions, dans le cas de thèses par articles, comme cela peut parfois se faire en économie par exemple). Il est difficile d’extraire un petit morceau d’une argumentation longue ; cela peut produire une impression d’inachevé, le sentiment qu’on n’a pas tous les éléments pour tirer une conclusion.

      L’article ne peut pas être non plus un résumé de votre thèse entière ou d’une grande partie. Si vous tentez de raconter toute votre thèse, vous la survolerez et tomberez dans les généralités.

      Vous choisirez donc un thème précis , présent dans votre thèse (de façon centrale ou périphérique) et qui colle à l’appel à contributions s’il y a lieu. En effet, souvent, la revue qui a lancé l’appel à contributions impose des thèmes ; cela peut parfois vous décentrer un peu de votre thèse, vous amener à adopter un autre point de vue, mais c’est justement cela qui est enrichissant.

      Mais attention ! Si votre thème est trop précis, s’il porte sur un détail, vous tomberez dans l’anecdote, on ne verra guère ce que vous pouvez démontrer à partir de ça.

      Bref, trouver le bon focus est un casse-tête… C’est l’exercice qui consiste à poser une question de recherche (une problématique) qui peut vous sortir de l’embarras.

      La problématique

      La problématique sert à deux choses : à donner un caractère logique et unifié à votre argumentation et à borner le sujet. Une problématique a la forme d’une question. C’est à cette question que vous allez tenter de répondre pendant tout l’article, jusqu’à la conclusion finale, sans vous éparpiller : ce qui ne sert pas à répondre à la question est donc mis de côté. En effet, vous ne pouvez pas montrer « toute votre science » dans votre article (vous ne pouvez pas être exhaustif), par contre vous pouvez montrer votre capacité à argumenter précisément.

      Votre question doit :

      – Se référer explicitement à votre terrain/corpus, car votre démonstration s’appuiera sur vos données (sinon, ce ne sont que des généralités).
      – Pouvoir être élucidée de façon convaincante et documentée en peu de pages.
      – Contribuer, même modestement, à susciter un débat (dans lequel vous prendrez position clairement). S’il n’y a pas de débat, c’est que vous êtes trop descriptif. Une astuce : lisez d’autres articles sur le sujet, et demandez-vous comment vous positionner par rapport à eux (qu’auriez-vous à leur répondre ?) cela vous aidera à être moins descriptif et plus dans l’analyse.

      Attention au lecteur !

      Rendez la lecture facile et agréable à votre lecteur : c’est aussi cela qui fait la qualité d’un article, qui, ne l’oublions pas, est un outil de communication et de diffusion.

      Employez un vocabulaire adéquat

      Qu’y a-t-il de plus frustrant que de lire un article qui serait susceptible de vous intéresser, mais dont vous ne comprenez pas un mot sur trois ? Évitez de faire vivre ça à votre lecteur. Commencez par vous renseigner sur le type de lecteur auquel est destinée la revue en question. En effet, si c’est une revue assez généraliste, ou transdisciplinaire, vous n’emploierez pas le même vocabulaire que si c’est une revue très pointue de votre discipline.

      Derrière cela se cache la question : que connaît déjà le lecteur, qu’est-ce qu’il ignore (on entend ici le lecteur au sens large, pas seulement le comité de publication) ? Un lectorat restreint et expert pourra accepter que vous fassiez l’économie de l’explication des termes de base de votre discipline, bien sûr. Mais pour un lectorat plus large (ce qui est souvent le cas), vous devrez expliquer les grands termes nécessaires à la compréhension de votre article dès l’introduction ; même des termes qui vous paraissent simples à vous devront être définis. Ensuite, et dans tous les cas de figure, si un terme technique apparaît au long de l’article, expliquez-le. Soyez pédagogue.

      Ménagez une progression logique

      Votre article doit être fluide, avoir un certain sens du récit pour maintenir l’attention du lecteur. Le respect de ces quelques principes peut vous y aider :

      – Introduisez un seul élément nouveau à la fois ; n’expliquez pas un concept à l’aide d’un autre concept pour la compréhension duquel on doit maîtriser un troisième concept… choisissez une notion, expliquez la , décrivez les phénomènes qui lui sont attachés avant de passer à « autre chose » : et cette autre chose doit venir renforcer la compréhension de qui a été dit auparavant.
      – Notre cerveau est fait pour comprendre ce qui s’inscrit dans une temporalité (d’abord il y a ceci, et ensuite vient cela, puis cela finit comme ça) ; ne l’oubliez pas au moment de rédiger, car cela introduira une forme de narration. Vous pouvez décrire des phénomènes selon leur déroulement dans le temps, mais vous pouvez aussi décrire des raisonnements dans leur développement progressif : on peut penser telle chose, cependant, on observe ensuite qu’il se passe telle autre chose, et c’est cela qui nous amène à la conclusion X ou Y.
      – Énoncez les problèmes de façon claire, le lecteur doit avancer en terrain connu : par exemple, posez une question à la fin d’un paragraphe ; on sait ensuite que dans les prochains paragraphes, on se consacrera à répondre à cette question. Écrivez vos hypothèses, et comment vous allez les vérifier. Votre lecteur doit pouvoir vous suivre pas à pas. Il se perdra s’il a l’impression de ne pas savoir où vous allez. Et n’oubliez pas de mettre de nombreux exemples !

      Soignez la forme

      – Aérez votre texte en introduisant un nouveau paragraphe à chaque étape du raisonnement (évitez donc les looongs paragraphes qui durent deux pages et sont vraiment décourageants).
      – Synthétisez régulièrement votre propos, à la fin de chaque section et sous-section notamment.
      – Employez des mots qui réveillent l’attention du lecteur et qui vous amènent à faire un petit point d’étape : en résumé, en conclusion, en bref…
      – Attirez l’attention du lecteur sur les points importants du raisonnement (cela vous aidera vous-même à les identifier !) en employant parfois des tournures comme : de façon significative, plus important encore, néanmoins, particulièrement…

      Dans le Guide Pratique de Rédaction Scientifique, de Jean-Luc Lebrun , vous trouverez de nombreux trucs et de grands principes pour écrire un texte scientifique de qualité et agréable à lire.

      Soyez prévoyant, car écrire un article prend beaucoup de temps et d’énergie !

      Comment cela s’est-il passé pour vous ? Avez-vous déjà écrit des articles, était-ce facile ou difficile, gratifiant ou laborieux ? Vous pouvez témoigner en commentaire !

      http://reussirsathese.com/comment-ecrire-un-bon-article-pour-une-revue-scientifique

    • ‘We failed to reach Europe – now our families disown us’

      Most of the West African migrants who fail to reach Europe eventually return to their own countries, but it can be a bitter homecoming. In Sierra Leone, returnees are often rejected by relatives and friends. They’re seen as failures, and many stole from their families to pay for their journey.

      Some readers will find this story disturbing

      Fatmata breaks into sobs when she remembers the six months she spent in slavery as the “wife” of a Tuareg nomad who seized her in the Sahara desert.

      “They call him Ahmed. He was so huge and so wicked,” she says. “He said, ’You are a slave, you are black. You people are from hell.’ He told me when somebody has a slave, you can do whatever you want to do. Not only him. Sometimes he would tell his friend, ’You can have a taste of anything inside my house.’ They tortured me every day.”

      That was only the beginning of the horrors Fatmata, aged 28, from Freetown, Sierra Leone, experienced as she tried to cross West Africa to the Mediterranean. She eventually escaped from Ahmed, but was recaptured by traffickers who held her in their own private jail in Algeria.

      After she and other migrants broke out, Fatmata, deeply traumatised, decided to abandon her dreams of a new life in Europe - and go back to where she started. She applied to an intergovernmental agency, the International Organisation for Migration (IOM), which pays the fares for migrants who want to return home.

      Last December, she arrived back in Freetown, by bus from Mali - after nearly two years away. But there were no emotional reunions, no welcomes, no embraces. Nearly a year later, Fatmata hasn’t even seen her mother - or the daughter, now eight, she left behind.

      “I was so happy to come back,” she says. “But I wish I had not.”

      When she got back, she called her brother. But his reaction terrified her. “He told me, ’You should not even have come home. You should just die where you went, because you didn’t bring anything back home.’”

      After that, she says, “I didn’t have the heart to go and see my mother.”

      Fatmata
      Image caption Fatmata thought she’d be able to pay back the money she stole

      But her family didn’t reject her just because she was a failure. It was also because of how she funded her journey.

      She stole 25 million leones - about US $2,600 at today’s exchange rate, but then worth a lot more - from her aunt. It was money her aunt had given her to buy clothes, that could then be resold as part of her trading business. Her aunt regularly trusted her in that way.

      “I was only thinking how to get the money and go,” Fatmata says, though she adds that she’s not a selfish person. “If I had succeeded in going to Europe, I decided that I would triple the money, I would take good care of my aunt and my mum.”

      But Fatmata’s aunt’s business never recovered from the loss of the money. And - to make things even worse - the theft has caused a rift between the aunt and her sister, Fatmata’s mother, whom she falsely accuses of being in on Fatmata’s plan.

      “I’m in pain, serious pain!” her mother says, when I visit her. “The day I set eyes on Fatmata, she will end up in the police station - and I will die.”

      It’s a story that’s repeated in the families of many of the 3,000 or so Sierra Leoneans who have returned in the last two years after failing to reach Europe.

      At one time, relatives often raised the money to send someone, but there’s less willingness to do that now that stories of imprisonment and death along the route have multiplied. Now, many would-be migrants keep their plans secret, and take whatever money they can, sometimes even selling the title deeds to the family land.

      Jamilatu
      Image caption Jamilatu stole money which had been lent to her mother

      At the headquarters of the Advocacy Network Against Irregular Migration, a voluntary group that helps returned migrants rebuild their lives, all the returnees I meet have stolen from their families.

      Jamilatu, aged 21, who escaped with Fatmata from the traffickers’ prison in Algeria, took a plastic bag of cash worth $3,500 from her mother’s room when she was out of the house. The money didn’t even belong to her mother. It had all been lent to her by neighbours, as part of a microcredit scheme.

      After Jamilatu left, the furious creditors besieged her mother’s house, threatening to kill her if she didn’t return the money. She was forced to flee Freetown for Bo, three hours away in the south of the country, leaving her three other children behind with their father.

      “My mum doesn’t want to talk to me, because of the money,” Jamilatu says. “So since I came back, I haven’t seen her. And I want to see my mum - it’s over two years now that I’m not seeing her.”

      Jamilatu and her mother
      Image caption Jamilatu has been estranged from her mother for more than two years

      I visit her mother, Maryatu, at her new home in Bo, and after a long conversation she says she would like to see Jamilatu again, despite the suffering she’s caused.

      But when they meet, soon afterwards, it’s a short, awkward and almost silent reunion. They embrace stiffly. Then Jamilatu kneels in front of her, asking for forgiveness. Neither looks the other in the eye.

      Afterwards, Jamilatu goes straight back to Freetown.

      “I am the happiest woman on Earth today because I have seen my mum,” she says. But she doesn’t look happy. Her mother has told her they can’t live under the same roof again until Jamilatu has raised the money to repay the creditors.

      It’s hard to see how that will be possible. Jamilatu, like Fatmata, has no job. They both depend on support from Advocacy Network Against Irregular Migration. The group was founded by Sheku Bangura, himself a returned migrant, who lobbies the Sierra Leonean government to do more for returnees - currently there’s very little official support - and tries to give practical help himself. He finds accommodation for those who are homeless, intervenes with the police if returnees get into trouble, and organises basic psychological counselling.

      Sheku Bangura
      Image caption Sheku Bangura has personal experience of the challenges faced by returnees

      “I have had a lot of migrants who have mental problems,” he says. “These young people, they are on the streets, they don’t have place to sleep. It’s not really easy for them.”

      One of those helping out at the Advocacy Network is 31-year-old Alimamy, who set out across the Sahara three years ago, after stealing and selling an expensive water-packaging machine belonging to his uncle.

      One of his two travelling companions died of starvation in the desert. The second drowned trying to cross the Mediterranean in a dinghy. Alimamy ended up in a Libyan detention camp. He was only rescued in November 2017 when the IOM began organising flights from Tripoli to West Africa for those who wanted to go home.

      Emaciated and exhausted, he accepted the offer of a ticket, but he was terrified of the reception he would get. “I was thinking I should not come back to Sierra Leone, because I know my uncle has a very high temper,” he says.

      Alimamy
      Image caption Alimamy’s attempt to reach Europe ended in a Libyan migration detention centre

      Since returning, Alimamy has lived with friends. His elder brother, Sheik Umar, a former professional footballer, says: “We are hearing he is in Freetown, he is suffering. And yet he hasn’t got the guts to face any of us in the family.”

      Sheik Umar says he used to be close to his brother, but if he sees him now, he will ensure he is “arrested, prosecuted and convicted”.

      “If he dies in prison, I will not have any regrets, I am sure no family members will have regret, because of the shame he has put on all of us.”

      He says the water-packaging business Alimamy had been entrusted to run by his uncle could have generated enough money to support the whole family.

      “But he misused that opportunity and all of us are in this mess now… Wherever I go now, people taunt me. Our mother is sick, she has moved to a village. That (business) was the beginning of our hopes. But Alimamy has shattered all of that.”

      Alimamy himself is angry and frustrated. “I have come back home, no impact, just like I’m zero,” he says. “The place where I am living, it’s like a hell for me. The way people look at me, I don’t feel happy. They’re looking at me like I’m not human.”

      Sheik Umar
      Image caption Sheik Umar says his family has suffered as a result of Alimamy’s actions

      The IOM offers migrants who return voluntarily to their home countries in Africa “re-integration allowances” worth up to 1,500 euros (£1,270). The money comes from a 347m-euro fund financed mainly by the European Union. But the allowances aren’t paid in cash. If they were, most people would just use them to repay their relatives. So the IOM pays for goods or services that applicants can prove they need to set up a specific business.

      Alimamy got an allowance to buy a motorcycle to rent out to other drivers to use as a taxi. But after just four months, one of the drivers went off with it and never came back. Alimamy himself had become a victim of theft.

      As for Fatmata and Jamilatu, they never received an allowance because they returned from Mali at a time when some other Sierra Leoneans were abusing the system by catching a bus to Mali, pretending they’d returned from across the Sahara, and claiming the allowance. So everyone returning from Mali lost out, including Fatmata and Jamilatu.

      Awareness raising event organised by the Advocacy Network

      Now, all three returnees take part in “awareness-raising” events organised by the Advocacy Network. They go out on the streets with placards and loudspeakers to warn other young people of the dangers of illegal migration, and urge them to stay in “sweet Sierra Leone”.

      But for them, home is no longer sweet. All three are consumed by feelings of worthlessness.

      Fatmata says: “I have nothing to offer, I have nothing to show. I can’t even go and see my daughter, I only see the pictures, because I have nothing to give her when I get there, so I can’t.”

      Alimamy says the “stigmatisation” he suffers is forcing him to do the opposite of what he says on the streets. He wants to make another attempt to reach Europe.

      “Staying here is like a hell for me,” he says. I remind him of the horrors he experienced on his first attempt, being enslaved, imprisoned, and seeing friends die.

      “Well,” he says, “I have been through that, and I’m sure I could cope.”

      https://www.bbc.com/news/stories-50391297

      #return_migration #Sierra_Leone #Advocacy_Network_Against_Irregular_Migration #Sheku_Bangura #awareness-raising [sic] #stigmatisation #mental_health #trauma #IOM #re-integration_allowances

  • The business of building walls

    Thirty years after the fall of the Berlin Wall, Europe is once again known for its border walls. This time Europe is divided not so much by ideology as by perceived fear of refugees and migrants, some of the world’s most vulnerable people.

    Who killed the dream of a more open Europe? What gave rise to this new era of walls? There are clearly many reasons – the increasing displacement of people by conflict, repression and impoverishment, the rise of security politics in the wake of 9/11, the economic and social insecurity felt across Europe after the 2008 financial crisis – to name a few. But one group has by far the most to gain from the rise of new walls – the businesses that build them. Their influence in shaping a world of walls needs much deeper examination.

    This report explores the business of building walls, which has both fuelled and benefited from a massive expansion of public spending on border security by the European Union (EU) and its member states. Some of the corporate beneficiaries are also global players, tapping into a global market for border security estimated to be worth approximately €17.5 billion in 2018, with annual growth of at least 8% expected in coming years.

    https://www.youtube.com/watch?v=CAuv1QyP8l0&feature=emb_logo

    It is important to look both beyond and behind Europe’s walls and fencing, because the real barriers to contemporary migration are not so much the fencing, but the vast array of technology that underpins it, from the radar systems to the drones to the surveillance cameras to the biometric fingerprinting systems. Similarly, some of Europe’s most dangerous walls are not even physical or on land. The ships, aircrafts and drones used to patrol the Mediterranean have created a maritime wall and a graveyard for the thousands of migrants and refugees who have no legal passage to safety or to exercise their right to seek asylum.

    This renders meaningless the European Commission’s publicized statements that it does not fund walls and fences. Commission spokesperson Alexander Winterstein, for example, rejecting Hungary’s request to reimburse half the costs of the fences built on its borders with Croatia and Serbia, said: ‘We do support border management measures at external borders. These can be surveillance measures. They can be border control equipment...But fences, we do not finance’. In other words, the Commission is willing to pay for anything that fortifies a border as long as it is not seen to be building the walls themselves.

    This report is a sequel to Building Walls – Fear and securitization in the European Union, co-published in 2018 with Centre Delàs and Stop Wapenhandel, which first measured and identified the walls that criss-cross Europe. This new report focuses on the businesses that have profited from three different kinds of wall in Europe:

    The construction companies contracted to build the land walls built by EU member states and the Schengen Area together with the security and technology companies that provide the necessary accompanying technology, equipment and services;

    The shipping and arms companies that provide the ships, aircraft, helicopters, drones that underpin Europe’s maritime walls seeking to control migratory flows in the Mediterranean, including Frontex operations, Operation Sophia and Italian operation Mare Nostrum;
    And the IT and security companies contracted to develop, run, expand and maintain EU’s systems that monitor the movement of people – such as SIS II (Schengen Information System) and EES (Entry/Exit Scheme) – which underpin Europe’s virtual walls.

    Booming budgets

    The flow of money from taxpayers to wall-builders has been highly lucrative and constantly growing. The report finds that companies have reaped the profits from at least €900 million spent by EU countries on land walls and fences since the end of the Cold War. The partial data (in scope and years) means actual costs will be at least €1 billion. In addition, companies that provide technology and services that accompany walls have also benefited from some of the steady stream of funding from the EU – in particular the External Borders Fund (€1.7 billion, 2007-2013) and the Internal Security Fund – Borders Fund (€2.76 billion, 2014-2020).

    EU spending on maritime walls has totalled at least €676.4 million between 2006 to 2017 (including €534 million spent by Frontex, €28.4 million spent by the EU on Operation Sophia and €114 million spent by Italy on Operation Mare Nostrum) and would be much more if you include all the operations by Mediterranean country coastguards. Total spending on Europe’s virtual wall equalled at least €999.4m between 2000 and 2019. (All these estimates are partial ones because walls are funded by many different funding mechanisms and due to lack of data transparency).

    This boom in border budgets is set to grow. Under its budget for the next EU budget cycle (2021–2027) the European Commission has earmarked €8.02 billion to its Integrated Border Management Fund (2021-2027), €11.27bn to Frontex (of which €2.2 billion will be used for acquiring, maintaining and operating air, sea and land assets) and at least €1.9 billion total spending (2000-2027) on its identity databases and Eurosur (the European Border Surveillance System).
    The big arm industry players

    Three giant European military and security companies in particular play a critical role in Europe’s many types of borders. These are Thales, Leonardo and Airbus.

    Thales is a French arms and security company, with a significant presence in the Netherlands, that produces radar and sensor systems, used by many ships in border security. Thales systems, were used, for example, by Dutch and Portuguese ships deployed in Frontex operations. Thales also produces maritime surveillance systems for drones and is working on developing border surveillance infrastructure for Eurosur, researching how to track and control refugees before they reach Europe by using smartphone apps, as well as exploring the use of High Altitude Pseudo Satellites (HAPS) for border security, for the European Space Agency and Frontex. Thales currently provides the security system for the highly militarised port in Calais. Its acquisition in 2019 of Gemalto, a large (biometric) identity security company, makes it a significant player in the development and maintenance of EU’s virtual walls. It has participated in 27 EU research projects on border security.
    Italian arms company Leonardo (formerly Finmeccanica or Leonardo-Finmeccanica) is a leading supplier of helicopters for border security, used by Italy in the Mare Nostrum, Hera and Sophia operations. It has also been one of the main providers of UAVs (or drones) for Europe’s borders, awarded a €67.1 million contract in 2017 by the European Maritime Safety Agency (EMSA) to supply them for EU coast-guard agencies. Leonardo was also a member of a consortium, awarded €142.1 million in 2019 to implement and maintain EU’s virtual walls, namely its EES. It jointly owns Telespazio with Thales, involved in EU satellite observation projects (REACT and Copernicus) used for border surveillance. Leonardo has participated in 24 EU research projects on border security and control, including the development of Eurosur.
    Pan-European arms giant Airbus is a key supplier of helicopters used in patrolling maritime and some land borders, deployed by Belgium, France, Germany, Greece, Italy, Lithuania and Spain, including in maritime Operations Sophia, Poseidon and Triton. Airbus and its subsidiaries have participated in at least 13 EU-funded border security research projects including OCEAN2020, PERSEUS and LOBOS.
    The significant role of these arms companies is not surprising. As Border Wars (2016), showed these companies through their membership of the lobby groups – European Organisation for Security (EOS) and the AeroSpace and Defence Industries Association of Europe (ASD) – have played a significant role in influencing the direction of EU border policy. Perversely, these firms are also among the top four biggest European arms dealers to the Middle East and North Africa, thus contributing to the conflicts that cause forced migration.

    Indra has been another significant corporate player in border control in Spain and the Mediterranean. It won a series of contracts to fortify Ceuta and Melilla (Spanish enclaves in northern Morocco). Indra also developed the SIVE border control system (with radar, sensors and vision systems), which is in place on most of Spain’s borders, as well as in Portugal and Romania. In July 2018 it won a €10 million contract to manage SIVE at several locations for two years. Indra is very active in lobbying the EU and is a major beneficiary of EU research funding, coordinating the PERSEUS project to further develop Eurosur and the Seahorse Network, a network between police forces in Mediterranean countries (both in Europe and Africa) to stop migration.

    Israeli arms firms are also notable winners of EU border contracts. In 2018, Frontex selected the Heron drone from Israel Aerospace Industries for pilot-testing surveillance flights in the Mediterranean. In 2015, Israeli firm Elbit sold six of its Hermes UAVs to the Switzerland’s Border Guard, in a controversial €230 million deal. It has since signed a UAV contract with the European Maritime Safety Agency (EMSA), as a subcontractor for the Portuguese company CEIIA (2018), as well as contracts to supply technology for three patrol vessels for the Hellenic Coast Guard (2019).
    Land wall contractors

    Most of the walls and fences that have been rapidly erected across Europe have been built by national construction companies, but one European company has dominated the field: European Security Fencing, a Spanish producer of razor wire, in particular a coiled wire known as concertinas. It is most known for the razor wire on the fences around Ceuta and Melilla. It also delivered the razor wire for the fence on the border between Hungary and Serbia, and its concertinas were installed on the borders between Bulgaria and Turkey and Austria and Slovenia, as well as at Calais, and for a few days on the border between Hungary and Slovenia before being removed. Given its long-term market monopoly, its concertinas are very likely used at other borders in Europe.

    Other contractors providing both walls and associated technology include DAT-CON (Croatia, Cyprus, Macedonia, Moldova, Slovenia and Ukraine), Geo Alpinbau (Austria/Slovenia), Indra, Dragados, Ferrovial, Proyectos Y Tecnología Sallén and Eulen (Spain/Morocco), Patstroy Bourgas, Infra Expert, Patengineeringstroy, Geostroy Engineering, Metallic-Ivan Mihaylov and Indra (Bulgaria/Turkey), Nordecon and Defendec (Estonia/Russia), DAK Acélszerkezeti Kft and SIA Ceļu būvniecības sabiedrība IGATE (Latvia/Russia), Gintrėja (Lithuania/Russia), Minis and Legi-SGS(Slovenia/Croatia), Groupe CW, Jackson’s Fencing, Sorhea, Vinci/Eurovia and Zaun Ltd (France/UK).

    In many cases, the actual costs of the walls and associated technologies exceed original estimates. There have also been many allegations and legal charges of corruption, in some cases because projects were given to corporate friends of government officials. In Slovenia, for example, accusations of corruption concerning the border wall contract have led to a continuing three-year legal battle for access to documents that has reached the Supreme Court. Despite this, the EU’s External Borders Fund has been a critical financial supporter of technological infrastructure and services in many of the member states’ border operations. In Macedonia, for example, the EU has provided €9 million for patrol vehicles, night-vision cameras, heartbeat detectors and technical support for border guards to help it manage its southern border.
    Maritime wall profiteers

    The data about which ships, helicopters and aircraft are used in Europe’s maritime operations is not transparent and therefore it is difficult to get a full picture. Our research shows, however, that the key corporations involved include the European arms giants Airbus and Leonardo, as well as large shipbuilding companies including Dutch Damen and Italian Fincantieri.

    Damen’s patrol vessels have been used for border operations by Albania, Belgium, Bulgaria, Portugal, the Netherlands, Romania, Sweden and the UK as well as in key Frontex operations (Poseidon, Triton and Themis), Operation Sophia and in supporting NATO’s role in Operation Poseidon. Outside Europe, Libya, Morocco, Tunisia and Turkey use Damen vessels for border security, often in cooperation with the EU or its member states. Turkey’s €20 million purchase of six Damen vessels for its coast guard in 2006, for example, was financed through the EU Instrument contributing to Stability and Peace (IcSP), intended for peace-building and conflict prevention.

    The sale of Damen vessels to Libya unveils the potential troubling human costs of this corporate trade. In 2012, Damen supplied four patrol vessels to the Libyan Coast Guard, sold as civil equipment in order to avoid a Dutch arms export license. Researchers have since found out, however, that the ships were not only sold with mounting points for weapons, but were then armed and used to stop refugee boats. Several incidents involving these ships have been reported, including one where some 20 or 30 refugees drowned. Damen has refused to comment, saying it had agreed with the Libyan government not to disclose information about the ships.

    In addition to Damen, many national shipbuilders play a significant role in maritime operations as they were invariably prioritised by the countries contributing to each Frontex or other Mediterranean operation. Hence, all the ships Italy contributed to Operation Sophia were built by Fincantieri, while all Spanish ships come from Navantia and its predecessors. Similarly, France purchases from DCN/DCNS, now Naval Group, and all German ships were built by several German shipyards (Flensburger Schiffbau-Gesellschaft, HDW, Lürssen Gruppe). Other companies in Frontex operations have included Greek company, Motomarine Shipyards, which produced the Panther 57 Fast Patrol Boats used by the Hellenic Coast Guard, Hellenic Shipyards and Israel Shipyards.

    Austrian company Schiebel is a significant player in maritime aerial surveillance through its supply of S-100 drones. In November 2018, EMSA selected the company for a €24 million maritime surveillance contract for a range of operations including border security. Since 2017, Schiebel has also won contracts from Croatia, Denmark, Iceland, Italy, Portugal and Spain. The company has a controversial record, with its drones sold to a number of countries experiencing armed conflict or governed by repressive regimes such as Libya, Myanmar, the UAE and Yemen.

    Finland and the Netherlands deployed Dornier aircraft to Operation Hermes and Operation Poseidon respectively, and to Operation Triton. Dornier is now part of the US subsidiary of the Israeli arms company Elbit Systems. CAE Aviation (Luxembourg), DEA Aviation (UK) and EASP Air (Netherlands) have all received contracts for aircraft surveillance work for Frontex. Airbus, French Dassault Aviation, Leonardo and US Lockheed Martin were the most important suppliers of aircraft used in Operation Sophia.

    The EU and its member states defend their maritime operations by publicising their role in rescuing refugees at sea, but this is not their primary goal, as Frontex director Fabrice Leggeri made clear in April 2015, saying that Frontex has no mandate for ‘proactive search-and-rescue action[s]’ and that saving lives should not be a priority. The thwarting and criminalisation of NGO rescue operations in the Mediterranean and the frequent reports of violence and illegal refoulement of refugees, also demonstrates why these maritime operations should be considered more like walls than humanitarian missions.
    Virtual walls

    The major EU contracts for the virtual walls have largely gone to two companies, sometimes as leaders of a consortium. Sopra Steria is the main contractor for the development and maintenance of the Visa Information System (VIS), Schengen Information System (SIS II) and European Dactyloscopy (Eurodac), while GMV has secured a string of contracts for Eurosur. The systems they build help control, monitor and surveil people’s movements across Europe and increasingly beyond.

    Sopra Steria is a French technology consultancy firm that has to date won EU contracts worth a total value of over €150 million. For some of these large contracts Sopra Steria joined consortiums with HP Belgium, Bull and 3M Belgium. Despite considerable business, Sopra Steria has faced considerable criticism for its poor record on delivering projects on time and on budget. Its launch of SIS II was constantly delayed, forcing the Commission to extend contracts and increase budgets. Similarly, Sopra Steria was involved in another consortium, the Trusted Borders consortium, contracted to deliver the UK e-Borders programme, which was eventually terminated in 2010 after constant delays and failure to deliver. Yet it continues to win contracts, in part because it has secured a near-monopoly of knowledge and access to EU officials. The central role that Sopra Steria plays in developing these EU biometric systems has also had a spin-off effect in securing other national contracts, including with Belgium, Bulgaria, Czech Republic, Finland, France, Germany, Romania and Slovenia GMV, a Spanish technology company, has received a succession of large contracts for Eurosur, ever since its testing phase in 2010, worth at least €25 million. It also provides technology to the Spanish Guardia Civil, such as control centres for its Integrated System of External Vigilance (SIVE) border security system as well as software development services to Frontex. It has participated in at least ten EU-funded research projects on border security.

    Most of the large contracts for the virtual walls that did not go to consortia including Sopra Steria were awarded by eu-LISA (European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice) to consortia comprising computer and technology companies including Accenture, Atos Belgium and Morpho (later renamed Idema).
    Lobbying

    As research in our Border Wars series has consistently shown, through effective lobbying, the military and security industry has been very influential in shaping the discourse of EU security and military policies. The industry has succeeded in positioning itself as the experts on border security, pushing the underlying narrative that migration is first and foremost a security threat, to be combatted by security and military means. With this premise, it creates a continuous demand for the ever-expanding catalogue of equipment and services the industry supplies for border security and control.

    Many of the companies listed here, particularly the large arms companies, are involved in the European Organisation for Security (EOS), the most important lobby group on border security. Many of the IT security firms that build EU’s virtual walls are members of the European Biometrics Association (EAB). EOS has an ‘Integrated Border Security Working Group’ to ‘facilitate the development and uptake of better technology solutions for border security both at border checkpoints, and along maritime and land borders’. The working group is chaired by Giorgio Gulienetti of the Italian arms company Leonardo, with Isto Mattila (Laurea University of Applied Science) and Peter Smallridge of Gemalto, a digital security company recently acquired by Thales.

    Company lobbyists and representatives of these lobby organisations regularly meet with EU institutions, including the European Commission, are part of official advisory committees, publish influential proposals, organise meetings between industry, policy-makers and executives and also meet at the plethora of military and security fairs, conferences and seminars. Airbus, Leonardo and Thales together with EOS held 226 registered lobbying meetings with the European Commission between 2014 and 2019. In these meetings representatives of the industry position themselves as the experts on border security, presenting their goods and services as the solution for ‘security threats’ caused by immigration. In 2017, the same group of companies and EOS spent up to €2.65 million on lobbying.

    A similar close relationship can be seen on virtual walls, with the Joint Research Centre of the European Commission arguing openly for public policy to foster the ‘emergence of a vibrant European biometrics industry’.
    A deadly trade and a choice

    The conclusion of this survey of the business of building walls is clear. A Europe full of walls has proved to be very good for the bottom line of a wide range of corporations including arms, security, IT, shipping and construction companies. The EU’s planned budgets for border security for the next decade show it is also a business that will continue to boom.

    This is also a deadly business. The heavy militarisation of Europe’s borders on land and at sea has led refugees and migrants to follow far more hazardous routes and has trapped others in desperate conditions in neighbouring countries like Libya. Many deaths are not recorded, but those that are tracked in the Mediterranean show that the proportion of those who drown trying to reach Europe continues to increase each year.

    This is not an inevitable state of affairs. It is both the result of policy decisions made by the EU and its member states, and corporate decisions to profit from these policies. In a rare principled stand, German razor wire manufacturer Mutanox in 2015 stated it would not sell its product to the Hungarian government arguing: ‘Razor wire is designed to prevent criminal acts, like a burglary. Fleeing children and adults are not criminals’. It is time for other European politicians and business leaders to recognise the same truth: that building walls against the world’s most vulnerable people violates human rights and is an immoral act that history will judge harshly. Thirty years after the fall of the Berlin Wall, it is time for Europe to bring down its new walls.

    https://www.tni.org/en/businessbuildingwalls

    #business #murs #barrières_frontalières #militarisation_des_frontières #visualisation #Europe #UE #EU #complexe_militaro-industriel #Airbus #Leonardo #Thales #Indra #Israel_Aerospace_Industries #Elbit #European_Security_Fencing #DAT-CON #Geo_Alpinbau #Dragados #Ferrovial, #Proyectos_Y_Tecnología_Sallén #Eulen #Patstroy_Bourgas #Infra_Expert #Patengineeringstroy #Geostroy_Engineering #Metallic-Ivan_Mihaylov #Nordecon #Defendec #DAK_Acélszerkezeti_Kft #SIA_Ceļu_būvniecības_sabiedrība_IGATE #Gintrėja #Minis #Legi-SGS #Groupe_CW #Jackson’s_Fencing #Sorhea #Vinci #Eurovia #Zaun_Ltd #Damen #Fincantieri #Frontex #Damen #Turquie #Instrument_contributing_to_Stability_and_Peace (#IcSP) #Libye #exernalisation #Operation_Sophia #Navantia #Naval_Group #Flensburger_Schiffbau-Gesellschaft #HDW #Lürssen_Gruppe #Motomarine_Shipyards #Panther_57 #Hellenic_Shipyards #Israel_Shipyards #Schiebel #Dornier #Operation_Hermes #CAE_Aviation #DEA_Aviation #EASP_Air #French_Dassault_Aviation #US_Lockheed_Martin #murs_virtuels #Sopra_Steria #Visa_Information_System (#VIS) #données #Schengen_Information_System (#SIS_II) #European_Dactyloscopy (#Eurodac) #GMV #Eurosur #HP_Belgium #Bull #3M_Belgium #Trusted_Borders_consortium #économie #biométrie #Integrated_System_of_External_Vigilance (#SIVE) #eu-LISA #Accenture #Atos_Belgium #Morpho #Idema #lobby #European_Organisation_for_Security (#EOS) #European_Biometrics_Association (#EAB) #Integrated_Border_Security_Working_Group #Giorgio_Gulienetti #Isto_Mattila #Peter_Smallridge #Gemalto #murs_terrestres #murs_maritimes #coût #chiffres #statistiques #Joint_Research_Centre_of_the_European_Commission #Mutanox #High-Altitude_Pseudo-Satellites (#HAPS)

    Pour télécharger le #rapport :


    https://www.tni.org/files/publication-downloads/business_of_building_walls_-_full_report.pdf

    déjà signalé par @odilon ici :
    https://seenthis.net/messages/809783
    Je le remets ici avec des mots clé de plus

    ping @daphne @marty @isskein @karine4

    • La costruzione di muri: un business

      Trent’anni dopo la caduta del Muro di Berlino, l’Europa fa parlare di sé ancora una volta per i suoi muri di frontiera. Questa volta non è tanto l’ideologia che la divide, quanto la paura di rifugiati e migranti, alcune tra le persone più vulnerabili al mondo.

      Riassunto del rapporto «The Business of Building Walls» [1]:

      Chi ha ucciso il sogno di un’Europa più aperta? Cosa ha dato inizio a questa nuova era dei muri?
      Ci sono evidentemente molte ragioni: il crescente spostamento di persone a causa di conflitti, repressione e impoverimento, l’ascesa di politiche securitarie sulla scia dell’11 settembre, l’insicurezza economica e sociale percepita in Europa dopo la crisi finanziaria del 2008, solo per nominarne alcune. Tuttavia, c’è un gruppo che ha di gran lunga da guadagnare da questo innalzamento di nuovi muri: le imprese che li costruiscono. La loro influenza nel dare forma ad un mondo di muri necessita di un esame più profondo.

      Questo rapporto esplora il business della costruzione di muri, che è stato alimentato e ha beneficiato di un aumento considerevole della spesa pubblica dedicata alla sicurezza delle frontiere dall’Unione Europea (EU) e dai suoi Stati membri. Alcune imprese beneficiarie sono delle multinazionali che approfittano di un mercato globale per la sicurezza delle frontiere che si stima valere approssimativamente 17,5 miliardi di euro nel 2018, con una crescita annuale prevista almeno dell’8% nei prossimi anni.

      È importante guardare sia oltre che dietro i muri e le barriere d’Europa, perché i reali ostacoli alla migrazione contemporanea non sono tanto le recinzioni, quanto la vasta gamma di tecnologie che vi è alla base, dai sistemi radar ai droni, dalle telecamere di sorveglianza ai sistemi biometrici di rilevamento delle impronte digitali. Allo stesso modo, alcuni tra i più pericolosi muri d’Europa non sono nemmeno fisici o sulla terraferma. Le navi, gli aerei e i droni usati per pattugliare il Mediterraneo hanno creato un muro marittimo e un cimitero per i migliaia di migranti e di rifugiati che non hanno un passaggio legale verso la salvezza o per esercitare il loro diritto di asilo.

      Tutto ciò rende insignificanti le dichiarazioni della Commissione Europea secondo le quali essa non finanzierebbe i muri e le recinzioni. Il portavoce della Commissione, Alexander Winterstein, per esempio, nel rifiutare la richiesta dell’Ungheria di rimborsare la metà dei costi delle recinzioni costruite sul suo confine con la Croazia e la Serbia, ha affermato: “Noi sosteniamo le misure di gestione delle frontiere presso i confini esterni. Queste possono consistere in misure di sorveglianza o in equipaggiamento di controllo delle frontiere... . Ma le recinzioni, quelle non le finanziamo”. In altre parole, la Commissione è disposta a pagare per qualunque cosa che fortifichi un confine fintanto che ciò non sia visto come propriamente costruire dei muri.

      Questo rapporto è il seguito di “Building Walls - Fear and securitizazion in the Euopean Union”, co-pubblicato nel 2018 con Centre Delàs e Stop Wapenhandel, che per primi hanno misurato e identificato i muri che attraversano l’Europa.

      Questo nuovo rapporto si focalizza sulle imprese che hanno tratto profitto dai tre differenti tipi di muro in Europa:
      – Le imprese di costruzione ingaggiate per costruire i muri fisici costruiti dagli Stati membri UE e dall’Area Schengen in collaborazione con le imprese esperte in sicurezza e tecnologia che provvedono le tecnologie, l’equipaggiamento e i servizi associati;
      – le imprese di trasporto marittimo e di armamenti che forniscono le navi, gli aerei, gli elicotteri e i droni che costituiscono i muri marittimi dell’Europa per tentare di controllare i flussi migratori nel Mediterraneo, in particolare le operazioni di Frontex, l’operazione Sophia e l’operazione italiana Mare Nostrum;
      – e le imprese specializzate in informatica e in sicurezza incaricate di sviluppare, eseguire, estendere e mantenere i sistemi dell’UE che controllano i movimento delle persone, quali SIS II (Schengen Information System) e EES (Entry/Exii Scheme), che costituiscono i muri virtuali dell’Europa.
      Dei budget fiorenti

      Il flusso di denaro dai contribuenti ai costruttori di muri è stato estremamente lucrativo e non cessa di aumentare. Il report rivela che dalla fine della guerra fredda, le imprese hanno raccolto i profitti di almeno 900 milioni di euro di spese dei paesi dell’UE per i muri fisici e per le recinzioni. Con i dati parziali (sia nella portata e che negli anni), i costi reali raggiungerebbero almeno 1 miliardo di euro. Inoltre, le imprese che forniscono la tecnologia e i servizi che accompagnano i muri hanno ugualmente beneficiato di un flusso costante di finanziamenti da parte dell’UE, in particolare i Fondi per le frontiere esterne (1,7 miliardi di euro, 2007-2013) e i Fondi per la sicurezza interna - Fondi per le Frontiere (2,76 miliardi di euro, 2014-2020).

      Le spese dell’UE per i muri marittimi hanno raggiunto almeno 676,4 milioni di euro tra il 2006 e il 2017 (di cui 534 milioni sono stati spesi da Frontex, 28 milioni dall’UE nell’operazione Sophia e 114 milioni dall’Italia nell’operazione Mare Nostrum) e sarebbero molto superiori se si includessero tutte le operazioni delle guardie costiera nazionali nel Mediterraneo.

      Questa esplosione dei budget per le frontiere ha le condizioni per proseguire. Nel quadro del suo budget per il prossimo ciclo di bilancio dell’Unione Europea (2021-2027), la Commissione europea ha attribuito 8,02 miliardi di euro al suo fondo di gestione integrata delle frontiere (2021-2027), 11,27 miliardi a Frontex (dei quali 2,2 miliardi saranno utilizzati per l’acquisizione, il mantenimento e l’utilizzo di mezzi aerei, marittimi e terrestri) e almeno 1,9 miliardi di euro di spese totali (2000-2027) alle sue banche dati di identificazione e a Eurosur (il sistemo europeo di sorveglianza delle frontiere).
      I principali attori del settore degli armamenti

      Tre giganti europei del settore della difesa e della sicurezza giocano un ruolo cruciale nei differenti tipi di frontiere d’Europa: Thales, Leonardo e Airbus.

      – Thales è un’impresa francese specializzata negli armamenti e nella sicurezza, con una presenza significativa nei Paesi Bassi, che produce sistemi radar e sensori utilizzati da numerose navi della sicurezza frontaliera. I sistemi Thales, per esempio, sono stati utilizzati dalle navi olandesi e portoghesi impiegate nelle operazioni di Frontex.
      Thales produce ugualmente sistemi di sorveglianza marittima per droni e lavora attualmente per sviluppare una infrastruttura di sorveglianza delle frontiere per Eurosus, che permetta di seguire e controllare i rifugiati prima che raggiungano l’Europa con l’aiuto di applicazioni per Smartphone, e studia ugualmente l’utilizzo di “High Altitude Pseudo-Satellites - HAPS” per la sicurezza delle frontiere, per l’Agenzia spaziale europea e Frontex. Thales fornisce attualmente il sistema di sicurezza del porto altamente militarizzato di Calais.
      Con l’acquisto nel 2019 di Gemalto, multinazionale specializzata nella sicurezza e identità (biometrica), Thales diventa un attore importante nello sviluppo e nel mantenimento dei muri virtuali dell’UE. L’impresa ha partecipato a 27 progetti di ricerca dell’UE sulla sicurezza delle frontiere.

      – La società di armamenti italiana Leonardo (originariamente Finmeccanica o Leonardo-Finmeccanica) è uno dei principali fornitori di elicotteri per la sicurezza delle frontiere, utilizzati dalle operazioni Mare Nostrum, Hera e Sophia in Italia. Ha ugualmente fatto parte dei principali fornitori di UAV (o droni), ottenendo un contratto di 67,1 milioni di euro nel 2017 con l’EMSA (Agenzia europea per la sicurezza marittima) per fornire le agenzie di guardia costiera dell’UE.
      Leonardo faceva ugualmente parte di un consorzio che si è visto attribuire un contratto di 142,1 milioni di euro nel 2019 per attuare e assicurare il mantenimento dei muri virtuali dell’UE, ossia il Sistema di entrata/uscita (EES). La società detiene, con Thales, Telespazio, che partecipa ai progetti di osservazione dai satelliti dell’UE (React e Copernicus) utilizzati per controllare le frontiere. Leonardo ha partecipato a 24 progetti di ricerca dell’UE sulla sicurezza e il controllo delle frontiere, tra cui lo sviluppo di Eurosur.

      – Il gigante degli armamenti pan-europei Airbus è un importante fornitore di elicotteri utilizzati nella sorveglianza delle frontiere marittime e di alcune frontiere terrestri, impiegati da Belgio, Francia, Germania, Grecia, Italia, Lituania e Spagna, in particolare nelle operazioni marittime Sophia, Poseidon e Triton. Airbus e le sue filiali hanno partecipato almeno a 13 progetti di ricerca sulla sicurezza delle frontiere finanziati dall’UE, tra cui OCEAN2020, PERSEUS e LOBOS.

      Il ruolo chiave di queste società di armamenti in realtà non è sorprendente. Come è stato dimostrato da “Border Wars” (2016), queste imprese, in quanto appartenenti a lobby come EOS (Organizzazione europea per la sicurezza) e ASD (Associazione delle industrie aerospaziali e della difesa in Europa), hanno ampiamente contribuito a influenzare l’orientamento della politica delle frontiere dell’UE. Paradossalmente, questi stessi marchi fanno ugualmente parte dei quattro più grandi venditori europei di armi al Medio Oriente e all’Africa del Nord, contribuendo così ad alimentare i conflitti all’origine di queste migrazioni forzate.

      Allo stesso modo Indra gioca un ruolo non indifferente nel controllo delle frontiere in Spagna e nel Mediterraneo. L’impresa ha ottenuto una serie di contratti per fortificare Ceuta e Melilla (enclavi spagnole nel Nord del Marocco). Indra ha ugualmente sviluppato il sistema di controllo delle frontiere SIVE (con sistemi radar, di sensori e visivi) che è installato nella maggior parte delle frontiere della Spagna, così come in Portogallo e in Romania. Nel luglio 2018, Indra ha ottenuto un contratto di 10 milioni di euro per assicurare la gestione di SIVE su più siti per due anni. L’impresa è molto attiva nel fare lobby presso l’UE. È ugualmente una dei grandi beneficiari dei finanziamenti per la ricerca dell’UE, che assicurano il coordinamento del progetto PERSEUS per lo sviluppo di Eurosur e il Seahorse Network, la rete di scambio di informazioni tra le forze di polizia dei paesi mediterranei (in Europa e in Africa) per fermare le migrazioni.

      Le società di armamenti israeliane hanno anch’esse ottenuto numerosi contratti nel quadro della sicurezza delle frontiere in UE. Nel 2018, Frontex ha selezionato il drone Heron delle Israel Aerospace Industries per i voli di sorveglianza degli esperimenti pilota nel Mediterraneo. Nel 2015, la società israeliana Elbit Systems ha venduto sei dei suoi droni Hermes al Corpo di guardie di frontiera svizzero, nel quadro di un contratto controverso di 230 milioni di euro. Ha anche firmato in seguito un contratto per droni con l’EMSA (Agenzia europea per la sicurezza marittima), in quanto subappaltatore della società portoghese CEIIA (2018), così come dei contratti per equipaggiare tre navi di pattugliamento per la Hellenic Coast Guard (2019).
      Gli appaltatori dei muri fisici

      La maggioranza di muri e recinzioni che sono stati rapidamente eretti attraverso l’Europa, sono stati costruiti da società di BTP nazionali/società nazionali di costruzioni, ma un’impresa europea ha dominato nel mercato: la European Security Fencing, un produttore spagnolo di filo spinato, in particolare di un filo a spirale chiamato “concertina”. È famosa per aver fornito i fili spinati delle recinzioni che circondano Ceuta e Melilla. L’impresa ha ugualmente dotato di fili spinati le frontiere tra l’Ungheria e la Serbia, e i suoi fili spinati “concertina” sono stati installati alle frontiere tra Bulgaria e Turchia e tra l’Austria e la Slovenia, così come a Calais e, per qualche giorno, alla frontiera tra Ungheria e Slovenia, prima di essere ritirati. Dato che essi detengono il monopolio sul mercato da un po’ di tempo a questa parte, è probabile che i fili spinati “concertina” siano stati utilizzati presso altre frontiere in Europa.

      Tra le altre imprese che hanno fornito i muri e le tecnologie ad essi associate, si trova DAT-CON (Croazia, Cipro, Macedonia, Moldavia, Slovenia e Ucraina), Geo Alpinbau (Austria/Slovenia), Indra, Dragados, Ferrovial, Proyectos Y Tecnología Sallén e Eulen (Spagna/Marocco), Patstroy Bourgas, Infra Expert, Patengineeringstroy, Geostroy Engineering, Metallic-Ivan Mihaylov et Indra (Bulgaria/Turchia), Nordecon e Defendec (Estonia/Russia), DAK Acélszerkezeti Kft e SIA Ceļu būvniecības sabiedrība IGATE (Lettonia/Russia), Gintrėja (Lituania/Russi), Minis e Legi-SGS (Slovenia/Croazia), Groupe CW, Jackson’s Fencing, Sorhea, Vinci/Eurovia e Zaun Ltd (Francia/Regno Unito).

      I costi reali dei muri e delle tecnologie associate superano spesso le stime originali. Numerose accuse e denunce per corruzione sono state allo stesso modo formulate, in certi casi perché i progetti erano stati attribuiti a delle imprese che appartenevano ad amici di alti funzionari. In Slovenia, per esempio, accuse di corruzione riguardanti un contratto per la costruzione di muri alle frontiere hanno portato a tre anni di battaglie legali per avere accesso ai documenti; la questione è passata poi alla Corte suprema.

      Malgrado tutto ciò, il Fondo europeo per le frontiere esterne ha sostenuto finanziariamente le infrastrutture e i servizi tecnologici di numerose operazioni alle frontiere degli Stati membri. In Macedonia, per esempio, l’UE ha versato 9 milioni di euro per finanziare dei veicoli di pattugliamento, delle telecamere a visione notturna, dei rivelatori di battito cardiaco e sostegno tecnico alle guardie di frontiera nell’aiuto della gestione della sua frontiera meridionale.
      Gli speculatori dei muri marittimi

      I dati che permettono di determinare quali imbarcazioni, elicotteri e aerei sono utilizzati nelle operazioni marittime in Europa mancano di trasparenza. È dunque difficile recuperare tutte le informazioni. Le nostre ricerche mostrano comunque che tra le principali società implicate figurano i giganti europei degli armamenti Airbus e Leonardo, così come grandi imprese di costruzione navale come l’olandese Damen e l’italiana Fincantieri.

      Le imbarcazioni di pattugliamento di Damen sono servite per delle operazioni frontaliere portate avanti da Albania, Belgio, Bulgaria, Portogallo, Paesi Bassi, Romania, Svezia e Regno Unito, così come per le vaste operazioni di Frontex (Poseidon, Triton e Themis), per l’operazione Sophia e hanno ugualmente sostento la NATO nell’operazione Poseidon.

      Al di fuori dell’Europa, la Libia, il Marocco, la Tunisia e la Turchia utilizzano delle imbarcazioni Damen per la sicurezza delle frontiere, spesso in collaborazione con l’UE o i suoi Stati membri. Per esempio, le sei navi Damen che la Turchia ha comprato per la sua guardia costiera nel 2006, per un totale di 20 milioni di euro, sono state finanziate attraverso lo strumento europeo che contribuirebbe alla stabilità e alla pace (IcSP), destinato a mantenere la pace e a prevenire i conflitti.

      La vendita di imbarcazioni Damen alla Libia mette in evidenza l’inquietante costo umano di questo commercio. Nel 2012, Damen ha fornito quattro imbarcazioni di pattugliamento alla guardia costiera libica, che sono state vendute come equipaggiamento civile col fine di evitare la licenza di esportazione di armi nei Paesi Bassi. I ricercatori hanno poi scoperto che non solo le imbarcazioni erano state vendute con dei punti di fissaggio per le armi, ma che erano state in seguito armate ed utilizzate per fermare le imbarcazioni di rifugiati. Numerosi incidenti che hanno implicato queste imbarcazioni sono stati segnalati, tra i quali l’annegamento di 20 o 30 rifugiati. Damen si è rifiutata di commentare, dichiarando di aver convenuto col governo libico di non divulgare alcuna informazione riguardante le imbarcazioni.

      Numerosi costruttori navali nazionali, oltre a Damen, giocano un ruolo determinante nelle operizioni marittime poiché sono sistematicamente scelti con priorità dai paesi partecipanti a ogni operazione di Frontex o ad altre operazioni nel Mediterraneo. Tutte le imbarcazioni fornite dall’Italia all’operazione Sophia sono state costruite da Fincantieri e tutte quelle spagnole sono fornite da Navantia e dai suoi predecessori. Allo stesso modo, la Francia si rifornisce da DCN/DCNS, ormai Naval Group, e tutte le imbarcazioni tedesche sono state costruite da diversi cantieri navali tedeschi (Flensburger Schiffbau-Gesellschaft, HDW, Lürssen Gruppe). Altre imprese hanno partecipato alle operazioni di Frontex, tra cui la società greca Motomarine Shipyards, che ha prodotto i pattugliatori rapidi Panther 57 utilizzati dalla guardia costiera greca, così come la Hellenic Shipyards e la Israel Shipyards.

      La società austriaca Schiebel, che fornisce i droni S-100, gioca un ruolo importante nella sorveglianza aerea delle attività marittime. Nel novembre 2018, è stata selezionata dall’EMSA per un contratto di sorveglianza marittima di 24 milioni di euro riguardante differenti operazioni che includevano la sicurezza delle frontiere. Dal 2017, Schiebel ha ugualmente ottenuto dei contratti con la Croazia, la Danimarca, l’Islanda, l’Italia, il Portogallo e la Spagna. L’impresa ha un passato controverso: ha venduto dei droni a numerosi paesi in conflitto armato o governati da regimi repressivi come la Libia, il Myanmar, gli Emirati Arabi Uniti e lo Yemen.

      La Finlandia e i Paesi Bassi hanno impiegato degli aerei Dornier rispettivamente nel quadro delle operazioni Hermès, Poseidon e Triton. Dornier appartiene ormai alla filiale americana della società di armamenti israeliana Elbit Systems.
      CAE Aviation (Lussemburgo), DEA Aviation (Regno Unito) e EASP Air (Paesi Bassi) hanno tutte ottenuto dei contratti di sorveglianza aerea per Frontex.
      Airbus, Dassault Aviation, Leonardo e l’americana Lockheed Martin hanno fornito il più grande numero di aerei utilizzati per l’operazione Sophia.

      L’UE e i suoi Stati membri difendono le loro operazioni marittime pubblicizzando il loro ruolo nel salvataggio dei rifugiati in mare. Ma non è questo il loro obiettivo principale, come sottolinea il direttore di Frontex Fabrice Leggeri nell’aprile 2015, dichiarando che “le azioni volontarie di ricerca e salvataggio” non fanno parte del mandato affidato a Frontex, e che salvare delle vite non dovrebbe essere una priorità. La criminalizzazione delle operazioni di salvataggio da parte delle ONG, gli ostacoli che esse incontrano, così come la violenza e i respingimenti illegali dei rifugiati, spesso denunciati, illustrano bene il fatto che queste operazioni marittime sono volte soprattutto a costituire muri piuttosto che missioni umanitarie.
      I muri virtuali

      I principali contratti dell’UE legati ai muri virtuali sono stati affidati a due imprese, a volte in quanto leader di un consorzio.
      Sopra Steria è il partner principale per lo sviluppo e il mantenimento del Sistema d’informazione dei visti (SIV), del Sistema di informazione Schengen (SIS II) e di Eurodac (European Dactyloscopy) e GMV ha firmato una serie di contratti per Eurosur. I sistemi che essi concepiscono permettono di controllare e di sorvegliare i movimenti delle persone attraverso l’Europa e, sempre più spesso, al di là delle sue frontiere.

      Sopra Steria è un’impresa francese di servizi per consultazioni in tecnologia che ha, ad oggi, ottenuto dei contratti con l’UE per un valore totale di più di 150 milioni di euro. Nel quadro di alcuni di questi grossi contratti, Sopra Steria ha formato dei consorzi con HP Belgio, Bull e 3M Belgio.

      Malgrado l’ampiezza di questi mercati, Sopra Steria ha ricevuto importanti critiche per la sua mancanza di rigore nel rispetto delle tempistiche e dei budget. Il lancio di SIS II è stato costantemente ritardato, costringendo la Commissione a prolungare i contratti e ad aumentare i budget. Sopra Steria aveva ugualmente fatto parte di un altro consorzio, Trusted Borders, impegnato nello sviluppo del programma e-Borders nel Regno Unito. Quest’ultimo è terminato nel 2010 dopo un accumulo di ritardi e di mancate consegne. Tuttavia, la società ha continuato a ottenere contratti, a causa del suo quasi monopolio di conoscenze e di relazioni con i rappresentanti dell’UE. Il ruolo centrale di Sopra Steria nello sviluppo dei sistemi biometrici dell’UE ha ugualmente portato alla firma di altri contratti nazionali con, tra gli altri, il Belgio, la Bulgaria, la Repubblica ceca, la Finlandia, la Francia, la Germania, la Romania e la Slovenia.

      GMV, un’impresa tecnologica spagnola, ha concluso una serie di grossi contratti per Eurosur, dopo la sua fase sperimentale nel 2010, per almeno 25 milioni di euro. Essa rifornisce ugualmente di tecnologie la Guardia Civil spagnola, tecnologie quali, ad esempio, i centri di controllo del suo Sistema integrato di sorveglianza esterna (SIVE), sistema di sicurezza delle frontiere, così come rifornisce di servizi di sviluppo logistico Frontex. L’impresa ha partecipato ad almeno dieci progetti di ricerca finanziati dall’UE sulla sicurezza delle frontiere.

      La maggior parte dei grossi contratti riguardanti i muri virtuali che non sono stati conclusi con consorzi di cui facesse parte Sopra Steria, sono stati attribuiti da eu-LISA (l’Agenzia europea per la gestione operazionale dei sistemi di informazione su vasta scale in seno allo spazio di libertà, di sicurezza e di giustizia) a dei consorzi di imprese specializzate nell’informazione e nelle nuove tecnologie, tra questi: Accenture, Atos Belgium e Morpho (rinominato Idemia).
      Lobby

      Come testimonia il nostro report “Border Wars”, il settore della difesa e della sicurezza, grazie ad una lobbying efficace, ha un’influenza considerabile nell’elaborazione delle politiche di difesa e di sicurezza dell’UE. Le imprese di questo settore industriale sono riuscite a posizionarsi come esperti della sicurezza delle frontiere, portando avanti il loro discorso secondo il quale la migrazione è prima di tutto una minaccia per la sicurezza che deve essere combattuta tramite mezzi militari e securitari. Questo crea così una domanda continua del catalogo sempre più fornito di equipaggiamenti e servizi che esse forniscono per la sicurezza e il controllo delle frontiere.

      Un numero alto di imprese che abbiamo nominato, in particolare le grandi società di armamenti, fanno parte dell’EOS (Organizzazione europea per la sicurezza), il più importante gruppo di pressione sulla sicurezza delle frontiere.

      Molte imprese informatiche che hanno concepito i muri virtuali dell’UE sono membri dell’EAB (Associazione Europea per la Biometria). L’EOS ha un “Gruppo di lavoro sulla sicurezza integrata delle frontiere” per “permettere lo sviluppo e l’adozione delle migliori soluzioni tecnologiche per la sicurezza delle frontiere sia ai checkpoint che lungo le frontiere marittime e terrestri”.
      Il gruppo di lavoro è presieduto da Giorgio Gulienetti, della società di armi italiana Leonardo, Isto Mattila (diplomato all’università di scienze applicate) e Peter Smallridge di Gemalto, multinazionale specializzata nella sicurezza numerica, recentemente acquisita da Thales.

      I lobbisti di imprese e i rappresentanti di questi gruppi di pressione incontrano regolarmente le istituzioni dell’UE, tra cui la Commissione europea, nel quadro di comitati di consiglio ufficiali, pubblicano proposte influenti, organizzano incontri tra il settore industriale, i policy-makers e i dirigenti e si ritrovano allo stesso modo in tutti i saloni, le conferenze e i seminari sulla difesa e la sicurezza.

      Airbus, Leonardo e Thales e l’EOS hanno anche assistito a 226 riunioni ufficiali di lobby con la Commissione europea tra il 2014 e il 2019. In queste riunioni, i rappresentanti del settore si presentano come esperti della sicurezza delle frontiere, e propongono i loro prodotti e servizi come soluzione alle “minacce alla sicurezza” costituite dall’immigrazione. Nel 2017, queste stesse imprese e l’EOS hanno speso fino a 2,56 milioni di euro in lobbying.

      Si constata una relazione simile per quanto riguarda i muri virtuali: il Centro comune della ricerca della Commissione europea domanda apertamente che le politiche pubbliche favoriscano “l’emergenza di una industria biometrica europea dinamica”.
      Un business mortale, una scelta

      La conclusione di questa inchiesta sul business dell’innalzamento di muri è chiara: la presenza di un’Europa piena di muri si rivela molto fruttuosa per una larga fetta di imprese del settore degli armamenti, della difesa, dell’informatica, del trasporto marittimo e delle imprese di costruzioni. I budget che l’UE ha pianificato per la sicurezza delle frontiere nei prossimi dieci anni mostrano che si tratta di un commercio che continua a prosperare.

      Si tratta altresì di un commercio mortale. A causa della vasta militarizzazione delle frontiere dell’Europa sulla terraferma e in mare, i rifugiati e i migranti intraprendono dei percorsi molto più pericolosi e alcuni si trovano anche intrappolati in terribili condizioni in paesi limitrofi come la Libia. Non vengono registrate tutte le morti, ma quelle che sono registrate nel Mediterraneo mostrano che il numero di migranti che annegano provando a raggiungere l’Europa continua ad aumentare ogni anno.

      Questo stato di cose non è inevitabile. È il risultato sia di decisioni politiche prese dall’UE e dai suoi Stati membri, sia dalle decisioni delle imprese di trarre profitto da queste politiche. Sono rare le imprese che prendono posizione, come il produttore tedesco di filo spinato Mutinox che ha dichiarato nel 2015 che non avrebbe venduto i suoi prodotti al governo ungherese per il seguente motivo: “I fili spinati sono concepiti per impedire atti criminali, come il furto. Dei rifugiati, bambini e adulti, non sono dei criminali”.

      È tempo che altri politici e capi d’impresa riconoscano questa stessa verità: erigere muri contro le popolazioni più vulnerabili viola i diritti umani e costituisce un atto immorale che sarà evidentemente condannato dalla storia.

      Trent’anni dopo la caduta del muro di Berlino, è tempo che l’Europa abbatta i suoi nuovi muri.

      https://www.meltingpot.org/La-costruzione-di-muri-un-business.html

    • How the arms industry drives Fortress Europe’s expansion

      In recent years, rising calls for deterrence have intensified the physical violence migrants face at the EU border. The externalization of the border through deals with sending and transit countries signals the expansion of this securitization process. Financial gains by international arms firms in this militarization trend form an obstacle for policy change.

      In March, April, and May of this year, multiple European countries deployed military forces to their national borders. This was done to assist with controls and patrols in the wake of border closures and other movement restrictions due to the Covid-19 crisis. Poland deployed 1,460 soldiers to the border to support the Border Guard and police as part of a larger military operation in reaction to Covid-19. And the Portuguese police used military drones as a complement to their land border checks. According to overviews from NATO, the Czech Republic, Greece, Latvia, Lithuania, the Netherlands (military police), Slovakia, and Slovenia all stationed armed forces at their national borders.

      While some of these deployments have been or will be rolled back as the Corona crisis dies down, they are not exceptional developments. Rather, using armed forces for border security and control has been a common occurrence at EU external borders since the so-called refugee crisis of 2015. They are part of the continuing militarisation of European border and migration policies, which is known to put refugees at risk but is increasingly being expanded to third party countries. Successful lobbying from the military and security industry has been an important driver for these policies, from which large European arms companies have benefited.

      The militarization of borders happens when EU member states send armies to border regions, as they did in Operation Sophia off the Libyan coast. This was the first outright EU military mission to stop migration. But border militarization also includes the use of military equipment for migration control, such as helicopters and patrol vessels, as well as the the EU-wide surveillance system Eurosur, which connects surveillance data from all individual member states. Furthermore, EU countries now have over 1,000 kilometers of walls and fences on their borders. These are rigged with surveillance, monitoring, and detection technologies, and accompanied by an increasing use of drones and other autonomous systems. The EU also funds a constant stream of Research & Technology (R&T) projects to develop new technologies and services to monitor and manage migration.

      This process has been going on for decades. The Schengen Agreement of 1985, and the subsequent creation of the Schengen Area, which coupled the opening of the internal EU borders with robust control at the external borders, can be seen as a starting point for these developments. After 2011, when the so-called ‘Arab Spring’ led to fears of mass migration to Europe, and especially since the ‘refugee crisis’ of 2015, the EU accelerated the boosting and militarising of border security, enormously. Since then, stopping migration has been at the top of the EU agenda.

      An increasingly important part of the process of border militarization isn’t happening at the European borders, but far beyond them. The EU and its member states are incentivizing third party countries to help stop migrants long before they reach Europe. This externalising of borders has taken many forms, from expanding the goals of EUCAP missions in Mali and Niger to include the prevention of irregular migration, to funding and training the Libyan Coast Guard to return refugees back to torture and starvation in the infamous detention centers in Libya. It also includes the donation of border security equipment, for example from Germany to Tunisia, and funding for purchases, such as Turkey’s acquisition of coast guard vessels to strengthen its operational capacities.

      Next to the direct consequences of European border externalisation efforts, these policies cause and worsen problems in the third party countries concerned: diverting development funds and priorities, ruining migration-based economies, and strengthening authoritarian regimes such as those in Chad, Belarus, Eritrea, and Sudan by providing funding, training and equipment to their military and security forces. Precisely these state organs are most responsible for repression and abuses of human rights. All this feeds drivers of migration, including violence, repression, and unemployment. As such, it is almost a guarantee for more refugees in the future.

      EU border security agency Frontex has also extended its operations into non-EU-countries. Ongoing negotiations and conclusions of agreements with Balkan countries resulted in the first operation in Albania having started in May 2019. And this is only a small part of Frontex’ expanding role in recent years. In response to the ‘refugee crisis’ of 2015, the European Commission launched a series of proposals that saw large increases in the powers of the agency, including giving member states binding advice to boost their border security, and giving Frontex the right to intervene in member states’ affairs (even without their consent) by decision of the Commission or Council.

      These proposals also included the creation of a 10,000 person strong standing corps of border guards and a budget to buy or lease its own equipment. Concretely, Frontex started with a budget of €6 million in 2005, which grew to €143 million in 2015. This was then quickly increased again from €239 million in 2016 to €460 million in 2020. The enormous expansion of EU border security and control has been accompanied by rapidly increasing budgets in general. In recent years, billions of euros have been spent on fortifying borders, setting up biometric databases, increasing surveillance capacities, and paying non-EU-countries to play their parts in this expansion process.

      Negotiations about the next seven-year-budget for the EU, the Multiannual Financial Framework 2021-2027, are still ongoing. In the European Commission’s latest proposal, which is clearly positioned as a response to the Covid-19 pandemic, the fund for strengthening member states’ border security, the Integrated Border Management Fund, has been allotted €12.5 billion. Its predecessors, the External Borders Fund (2007-2013) and the Internal Security Fund – Borders (2014-2020), had much smaller budgets: €1.76 billion and €2.70 billion, respectively. For Frontex, €7.5 billion is reserved, with €2.2 billion earmarked for purchasing or leasing equipment such as helicopters, drones, and patrol vessels. These huge budget increases are exemplary of the priority the EU attaches to stopping migration.

      The narrative underlying these policies and budget growths is the perception of migration as a threat; a security problem. As researcher, Ainhoa Ruiz (Centre Delàs) writes, “the securitisation process also includes militarisation,” because “the prevailing paradigm for providing security is based on military principles: the use of force and coercion, more weapons equating to more security, and the achievement of security by eliminating threats.”

      This narrative hasn’t come out of the blue. It is pushed by right wing politicians and often followed by centrist and leftist parties afraid of losing voters. Importantly, it is also promoted by an extensive and successful industrial lobby. According to Martin Lemberg-Pedersen (Assistant Professor in Global Refugee Studies, Aalborg University), arms companies “establish themselves as experts on border security, and use this position to frame immigration to Europe as leading to evermore security threats in need of evermore advanced [security] products.” The narrative of migration as a security problem thus sets the stage for militaries, and the security companies behind the commercial arms lobby, to offer their goods and services as the solution. The range of militarization policies mentioned so far reflects the broad adoption of this narrative.

      The lobby organizations of large European military and security companies regularly interact with the European Commission and EU border agencies. They have meetings, organise roundtables, and see each other at military and security fairs and conferences. Industry representatives also take part in official advisory groups, are invited to present new arms and technologies, and write policy proposals. These proposals can sometimes be so influential that they are adopted as policy, almost unamended.

      This happened, for instance, when the the Commission decided to open up the Instrument contributing to Security and Peace, a fund meant for peace-building and conflict prevention. The fund’s terms were expanded to cover provision of third party countries with non-lethal security equipment, for example, for border security purposes. The new policy document for this turned out to be a step-by-step reproduction of an earlier proposal from lobby organisation, Aerospace and Defence Industries Association of Europe (ASD). Yet, perhaps the most far-reaching success of this kind is the expansion of Frontex, itself, into a European Border Guard. Years before it actually happened, the industry had already been pushing for this outcome.

      The same companies that are at the forefront of the border security and control lobby are, not surprisingly, also the big winners of EU and member states’ contracts in these areas. These include three of the largest European (and global) arms companies, namely, Airbus (Paneuropean), Leonardo (Italy) and Thales (France). These companies are active in many aspects of the border security and control market. Airbus’ and Leonardo’s main product in this field are helicopters, with EU funds paying for many purchases by EU and third countries. Thales provides radar, for example, for border patrol vessels, and is heavily involved in biometric and digital identification, especially after having acquired market leader, Gemalto, last year.

      These three companies are the main beneficiaries of the European anti-migration obsession. At the same time, these very three companies also contribute to new migration streams to Europe’s shores through their trade in arms. They are responsible for significant parts of Europe’s arms exports to countries at war, and they provide the arms used by parties in internal armed conflicts, by human rights violators, and by repressive regimes. These are the forces fueling the reasons for which people are forced to flee in the first place.

      Many other military and security companies also earn up to hundreds of millions of euros from large border security and control projects oriented around logistics and transport. Dutch shipbuilder Damen provided not only many southern European countries with border patrol vessels, but also controversially sold those to Libya and Turkey, among others. Its ships have also been used in Frontex operations, in Operation Sophia, and on the Channel between Calais and Dover.

      The Spanish company, European Security Fencing, provided razor wire for the fences around the Spanish enclaves, Ceuta and Melilla, in Morocco, as well as the fence at Calais and the fences on the borders of Austria, Bulgaria, and Hungary. Frontex, the European Maritime Safety Agency (EMSA), and Greece leased border surveillance drones from Elbit and Israel Aerospace Industries (IAI). These are Israeli military companies that routinely promote their products as ‘combat-proven’ or ‘battlefield tested’ against Palestinians.

      Civipol, a French public-private company owned by the state, and several large arms producers (including Thales, Airbus, and Safran), run a string of EU-/member state-funded border security projects in third party countries. This includes setting up fingerprint databases of the whole populations of Mali and Senegal, which facilitates identification and deportation of their nationals from Europe. These are just a few examples of the companies that benefit from the billions of euros that the EU and its member states spend on a broad range of purchases and projects in their bid to stop migration.

      The numbers of forcibly displaced people in the world grew to a staggering 79.5 million by the end of last year. Instead of helping to eliminate the root causes of migration, EU border and migration policies, as well as its arms exports to the rest of the world, are bound to lead to more refugees in the future. The consequences of these policies have already been devastating. As experts in the field of migration have repeatedly warned, the militarisation of borders primarily pushes migrants to take alternative migration routes that are often more dangerous and involve the risks of relying on criminal smuggling networks. The Mediterranean Sea has become a sad witness of this, turning into a graveyard for a growing percentage of refugees trying to cross it.

      The EU approach to border security doesn’t stand on its own. Many other countries, in particular Western ones and those with authoritarian leaders, follow the same narrative and policies. Governments all over the world, but particularly those in the US, Australia, and Europe, continue to spend billions of euros on border security and control equipment and services. And they plan to increase budgets even more in the coming years. For military and security companies, this is good news; the global border security market is expected to grow by over 7% annually for the next five years to a total of $65 billion in 2025. It looks like they will belong to the very few winners of increasingly restrictive policies targeting vulnerable people on the run.

      https://crisismag.net/2020/06/27/how-the-arms-industry-drives-fortress-europes-expansion
      #industrie_militaire #covid-19 #coronavirus #frontières_extérieures #Operation_Sophia #Eurosur #surveillance #drones #technologie #EUCAP #externalisation #Albanie #budget #Integrated_Border_Management_Fund #menace #lobby_industriel #Instrument_contributing_to_Security_and_Peace #conflits #paix #prévention_de_conflits #Aerospace_and_Defence_Industries_Association_of_Europe (#ASD) #Airbus #Leonardo #Thales #hélicoptères #radar #biométrie #identification_digitale #Gemalto #commerce_d'armes #armement #Damen #European_Security_Fencing #barbelé #European_Maritime_Safety_Agency (#EMSA) #Elbit #Israel_Aerospace_Industries (#IAI) #Civipol #Safran #base_de_données

      –—

      Pour @etraces :

      Civipol, a French public-private company owned by the state, and several large arms producers (including Thales, Airbus, and Safran), run a string of EU-/member state-funded border security projects in third party countries. This includes setting up fingerprint databases of the whole populations of Mali and Senegal, which facilitates identification and deportation of their nationals from Europe

    • GUARDING THE FORTRESS. The role of Frontex in the militarisation and securitisation of migration flows in the European Union

      The report focuses on 19 Frontex operations run by the European Border and Coast Guard Agency (hereafter Frontex) to explore how the agency is militarising borders and criminalising migrants, undermining fundamental rights to freedom of movement and the right to asylum.

      This report is set in a wider context in which more than 70.8 million people worldwide have been forcibly displaced, according to the 2018 figures from the United Nations High Commissioner for Refugees (UNHCR) (UNHCR, 2019). Some of these have reached the borders of the European Union (EU), seeking protection and asylum, but instead have encountered policy responses that mostly aim to halt and intercept migration flows, against the background of securitisation policies in which the governments of EU Member States see migration as a threat. One of the responses to address migration flows is the European Border and Coast Guard Agency (hereafter Frontex), established in 2004 as the EU body in charge of guarding what many have called ‘Fortress Europe’, and whose practices have helped to consolidate the criminalisation of migrants and the securitisation of their movements.

      The report focuses on analysing the tools deployed by Fortress Europe, in this case through Frontex, to prevent the freedom of movement and the right to asylum, from its creation in 2004 to the present day.

      The sources used to write this report were from the EU and Frontex, based on its budgets and annual reports. The analysis focused on the Frontex regulations, the language used and its meaning, as well as the budgetary trends, identifying the most significant items – namely, the joint operations and migrant-return operations.

      A table was compiled of all the joint operations mentioned in the annual reports since the Agency was established in 2005 up to 2018 (see annexes). The joint operations were found on government websites but were not mentioned in the Frontex annual reports. Of these operations, we analysed those of the longest duration, or that have showed recent signs of becoming long-term operations. The joint operations are analysed in terms of their objectives, area of action, the mandates of the personnel deployed, and their most noteworthy characteristics.

      Basically, the research sought to answer the following questions: What policies are being implemented in border areas and in what context? How does Frontex act in response to migration movements? A second objective was to analyse how Frontex securitises the movement of refugees and other migrants, with the aim of contributing to the analysis of the process of border militarisation and the security policies applied to non-EU migrants by the EU and its Member States.

      https://www.tni.org/en/guarding-the-fortress

      Pour télécharger le rapport_
      https://www.tni.org/files/publication-downloads/informe40_eng_ok.pdf

      #rapport #TNI #Transnational_institute

    • #Frontex aircraft : Below the radar against international law

      For three years, Frontex has been chartering small aircraft for the surveillance of the EU’s external borders. First Italy was thus supported, then Croatia followed. Frontex keeps the planes details secret, and the companies also switch off the transponders for position display during operations.

      The European Commission does not want to make public which private surveillance planes Frontex uses in the Mediterranean. In the non-public answer to a parliamentary question, the EU border agency writes that the information on the aircraft is „commercially confidential“ as it contains „personal data and sensitive operational information“.

      Frontex offers EU member states the option of monitoring their external borders using aircraft. For this „Frontex Aerial Surveillance Service“ (FASS), Frontex charters twin-engined airplanes from European companies. Italy first made use of the service in 2017, followed a year later by Croatia. In 2018, Frontex carried out at least 1,800 flight hours under the FASS, no figures are yet available for 2019.

      Air service to be supplemented with #drones

      The FASS flights are carried out under the umbrella of „Multipurpose Aerial Surveillance“, which includes satellite surveillance as well as drones. Before the end of this year, the border agency plans to station large drones in the Mediterranean for up to four years. The situation pictures of the European Union’s „pre-frontier area“ are fed into the surveillance system EUROSUR, whose headquarter is located at Frontex in Warsaw. The national EUROSUR contact points, for example in Spain, Portugal and Italy, also receive this information.

      In addition to private charter planes, Frontex also uses aircraft and helicopters provided by EU Member States, in the central Mediterranean via the „Themis“ mission. The EU Commission also keeps the call signs of the state aircraft operating there secret. They would be considered „sensitive operational information“ and could not be disclosed to MEPs.

      Previously, the FOIA platform „Frag den Staat“ („Ask the State“) had also tried to find out details about the sea and air capacities of the member states in „Themis“. Frontex refused to provide any information on this matter. „Frag den Staat“ lost a case against Frontex before the European Court of Justice and is now to pay 23,700 Euros to the agency for legal fees.

      Real-time tracking with FlightAware

      The confidentiality of Frontex comes as a surprise, because companies that monitor the Mediterranean for the agency are known through a tender. Frontex has signed framework contracts with the Spanish arms group Indra as well as the charter companies CAE Aviation (Canada), Diamond-Executive Aviation (Great Britain) and EASP Air (Netherlands). Frontex is spending up to 14.5 million euros each on the contracts.

      Finally, online service providers such as FlightAware can also be used to draw conclusions about which private and state airplanes are flying for Frontex in the Mediterranean. For real-time positioning, the providers use data from ADS-B transponders, which all larger aircraft must have installed. A worldwide community of non-commercial trackers receives this geodata and feeds it into the Internet. In this way, for example, Italian journalist Sergio Scandura documents practically all movements of Frontex aerial assets in the central Mediterranean.

      Among the aircraft tracked this way are the twin-engined „DA-42“, „DA-62“ and „Beech 350“ of Diamond-Executive Aviation, which patrol the Mediterranean Sea on behalf of Frontex as „Osprey1“, „Osprey3“ and „Tasty“, in former times also „Osprey2“ and „Eagle1“. They are all operated by Diamond-Executive Aviation and take off and land at airports in Malta and Sicily.

      „Push-backs“ become „pull-backs“

      In accordance with the Geneva Convention on Refugees, the EU Border Agency may not return people to states where they are at risk of torture or other serious human rights violations. Libya is not a safe haven; this assessment has been reiterated on several occasions by the United Nations Commissioner for Refugees, among others.

      Because these „push-backs“ are prohibited, Frontex has since 2017 been helping with so-called „pull-backs“ by bringing refugees back to Libya by the Libyan coast guard rather than by EU units. With the „Multipurpose Aerial Surveillance“, Frontex is de facto conducting air reconnaissance for Libya. By November 2019, the EU border agency had notified Libyan authorities about refugee boats on the high seas in at least 42 cases.

      Many international law experts consider this practice illegal. Since Libya would not be able to track down the refugees without the help of Frontex, the agency must take responsibility for the refoulements. The lawyers Omer Shatz and Juan Branco therefore want to sue responsibles of the European Union before the International Criminal Court in The Hague.

      Frontex watches refugees drown

      This is probably the reason why Frontex disguises the exact location of its air surveillance. Private maritime rescue organisations have repeatedly pointed out that Frontex aircrafts occasionally switch off their transponders so that they cannot be tracked via ADS-B. In the answer now available, this is confirmed by the EU Commission. According to this, the visibility of the aircraft would disclose „sensitive operational information“ and, in combination with other kinds of information, „undermine“ the operational objectives.

      The German Ministry of the Interior had already made similar comments on the Federal Police’s assets in Frontex missions, according to which „general tracking“ of their routes in real time would „endanger the success of the mission“.

      However, Frontex claims it did not issue instructions to online service providers to block the real-time position display of its planes, as journalist Scandura described. Nonetheless, the existing concealment of the operations only allows the conclusion that Frontex does not want to be controlled when the deployed aircraft watch refugees drown and Italy and Malta, as neighbouring EU member states, do not provide any assistance.

      https://digit.site36.net/2020/06/11/frontex-aircraft-blind-flight-against-international-law
      #avions #Italie #Croatie #confidentialité #transparence #Frontex_Aerial_Surveillance_Service (#FASS) #Multipurpose_Aerial_Surveillance #satellites #Méditerranée #Thermis #information_sensible #Indra #CAE_Aviation #Diamond-Executive_Aviation #EASP_Air #FlightAware #ADS-B #DA-42 #DA-62 #Beech_350 #Osprey1 #Osprey3 #Tasty #Osprey2 #Eagle1 #Malte #Sicile #pull-back #push-back #refoulement #Sergio_Scandura

    • Walls Must Fall: Ending the deadly politics of border militarisation - webinar recording
      This webinar explored the trajectory and globalization of border militarization and anti-migrant racism across the world, the history, ideologies and actors that have shaped it, the pillars and policies that underpin the border industrial complex, the resistance of migrants, refugees and activists, and the shifting dynamics within this pandemic.

      - #Harsha_Walia, author of Undoing Border Imperialism (2013)
      - #Jille_Belisario, Transnational Migrant Platform-Europe (TMP-E)
      - #Todd_Miller, author of Empire of Borders (2020), Storming the Wall (2019) and TNI’s report More than A Wall (2019)
      - #Kavita_Krishnan, All India Progressive Women’s Association (AIPWA).
      https://www.tni.org/en/article/walls-must-fall
      https://www.youtube.com/watch?v=T8B-cJ2bTi8&feature=emb_logo

      #conférence #webinar

    • Le business meurtrier des frontières

      Le 21ème siècle sera-t-il celui des barrières ? Probable, au rythme où les frontières nationales se renforcent. Dans un livre riche et documenté, publié aux éditions Syllepse, le géographe Stéphane Rosière dresse un indispensable état des lieux.

      Une nuit du mois de juin, dans un centre de rétention de l’île de Rhodes, la police grecque vient chercher une vingtaine de migrant·e·s, dont deux bébés. Après un trajet en bus, elle abandonne le groupe dans un canot de sauvetage sans moteur, au milieu des eaux territoriales turques. En août, le New York Times publie une enquête révélant que cette pratique, avec la combinaison de l’arrivée aux affaires du premier ministre conservateur Kyriakos Mitsotakis et de la diffusion de la pandémie de Covid-19, est devenue courante depuis mars.

      Illégales au regard du droit international, ces expulsions illustrent surtout le durcissement constant de la politique migratoire de l’Europe depuis 20 ans. Elles témoignent aussi d’un processus mondial de « pixellisation » des frontières : celles-ci ne se réduisent pas à des lignes mais à un ensemble de points plus ou moins en amont ou en aval (ports, aéroports, eaux territoriales…), où opèrent les polices frontalières.
      La fin de la fin des frontières

      Plus largement, le récent ouvrage de Stéphane Rosière, Frontières de fer, le cloisonnement du monde, permet de prendre la mesure d’un processus en cours de « rebordering » à travers le monde. À la fois synthèse des recherches récentes sur les frontières et résultats des travaux de l’auteur sur la résurgence de barrières frontalières, le livre est une lecture incontournable sur l’évolution contemporaine des frontières nationales.

      D’autant qu’il n’y a pas si longtemps, la mondialisation semblait promettre l’affaissement des frontières, dans la foulée de la disparition de l’Union soviétique et, corollairement, de la généralisation de l’économie de marché. La Guerre froide terminée annonçait la « fin de l’histoire » et, avec elle, la disparition des limites territoriales héritées de l’époque moderne. Au point de ringardiser, rappelle Stéphane Rosière, les études sur les frontières au sein de la géographie des années 1990, parallèlement au succès d’une valorisation tous azimuts de la mobilité dans le discours politique dominant comme dans les sciences sociales.

      Trente ans après, le monde se réveille avec 25 000 kilomètres de barrières frontalières – record pour l’Inde, avec plus de 3 000 kilomètres de clôtures pour prévenir l’immigration depuis le Bangladesh. Barbelés, murs de briques, caméras, détecteurs de mouvements, grilles électrifiées, les dispositifs de contrôle frontalier fleurissent en continu sur les cinq continents.
      L’âge des « murs anti-pauvres »

      La contradiction n’est qu’apparente. Les barrières du 21e siècle ne ferment pas les frontières mais les cloisonnent – d’où le titre du livre. C’est-à-dire que l’objectif n’est pas de supprimer les flux mondialisés – de personnes et encore moins de marchandises ni de capitaux – mais de les contrôler. Les « teichopolitiques », terme qui recouvre, pour Stéphane Rosière, les politiques de cloisonnement de l’espace, matérialisent un « ordre mondial asymétrique et coercitif », dans lequel on valorise la mobilité des plus riches tout en assignant les populations pauvres à résidence.

      De fait, on observe que les barrières frontalières redoublent des discontinuités économiques majeures. Derrière l’argument de la sécurité, elles visent à contenir les mouvements migratoires des régions les plus pauvres vers des pays mieux lotis économiquement : du Mexique vers les États-Unis, bien sûr, ou de l’Afrique vers l’Europe, mais aussi de l’Irak vers l’Arabie Saoudite ou du Pakistan vers l’Iran.

      Les dispositifs de contrôle frontalier sont des outils parmi d’autres d’une « implacable hiérarchisation » des individus en fonction de leur nationalité. Comme l’a montré le géographe Matthew Sparke à propos de la politique migratoire nord-américaine, la population mondiale se trouve divisée entre une classe hypermobile de citoyen·ne·s « business-class » et une masse entravée de citoyen·ne·s « low-cost ». C’est le sens du « passport index » publié chaque année par le cabinet Henley : alors qu’un passeport japonais ou allemand donne accès à plus de 150 pays, ce chiffre descend en-dessous de 30 avec un passeport afghan ou syrien.
      Le business des barrières

      Si les frontières revêtent une dimension économique, c’est aussi parce qu’elles sont un marché juteux. À l’heure où les pays européens ferment des lits d’hôpital faute de moyens, on retiendra ce chiffre ahurissant : entre 2005 et 2016, le budget de Frontex, l’agence en charge du contrôle des frontières de l’Union européenne, est passé de 6,3 à 238,7 millions d’euros. À quoi s’ajoutent les budgets colossaux débloqués pour construire et entretenir les barrières – budgets entourés d’opacité et sur lesquels, témoigne l’auteur, il est particulièrement difficile d’enquêter, faute d’obtenir… des fonds publics.

      L’argent public alimente ainsi une « teichoéconomie » dont les principaux bénéficiaires sont des entreprises du BTP et de la sécurité européennes, nord-américaines, israéliennes et, de plus en plus, indiennes ou saoudiennes. Ce complexe sécuritaro-industriel, identifié par Julien Saada, commercialise des dispositifs de surveillance toujours plus sophistiqués et prospère au rythme de l’inflation de barrières entre pays, mais aussi entre quartiers urbains.

      Un business d’autant plus florissant qu’il s’auto-entretient, dès lors que les mêmes entreprises vendent des armes. On sait que les ventes d’armes, alimentant les guerres, stimulent les migrations : un « cercle vertueux » s’enclenche pour les entreprises du secteur, appelées à la rescousse pour contenir des mouvements de population qu’elles participent à encourager.
      « Mourir aux frontières »

      Bénéfices juteux, profits politiques, les barrières font des heureux. Elles tuent aussi et l’ouvrage de Stéphane Rosière se termine sur un décompte macabre. C’est, dit-il, une « guerre migratoire » qui est en cours. Guerre asymétrique, elle oppose la police armée des puissances économiques à des groupes le plus souvent désarmés, venant de périphéries dominées économiquement et dont on entend contrôler la mobilité. Au nom de la souveraineté des États, cette guerre fait plusieurs milliers de victimes par an et la moindre des choses est de « prendre la pleine mesure de la létalité contemporaine aux frontières ».

      Sur le blog :

      – Une synthèse sur les murs frontaliers : http://geographiesenmouvement.blogs.liberation.fr/2019/01/28/lamour-des-murs

      – Le compte rendu d’un autre livre incontournable sur les frontières : http://geographiesenmouvement.blogs.liberation.fr/2019/08/03/frontieres-en-mouvement

      – Une synthèse sur les barricades à l’échelle intraurbaine : http://geographiesenmouvement.blogs.liberation.fr/2020/10/21/gated-communities-le-paradis-entre-quatre-murs

      http://geographiesenmouvement.blogs.liberation.fr/2020/11/05/le-business-meurtrier-des-frontieres

    • How Private Security Firms Profit Off the Refugee Crisis

      The UK has pumped money to corporations turning #Calais into a bleak fortress.

      Tall white fences lined with barbed wire – welcome to Calais. The city in northern France is an obligatory stop for anyone trying to reach the UK across the channel. But some travellers are more welcome than others, and in recent decades, a slew of private security companies have profited millions of pounds off a very expensive – an unattractive – operation to keep migrants from crossing.

      Every year, thousands of passengers and lorries take the ferry at the Port of Calais-Fréthun, a trading route heavily relied upon by the UK for imports. But the entrance to the port looks more like a maximum-security prison than your typical EU border. Even before Brexit, the UK was never part of the Schengen area, which allows EU residents to move freely across 26 countries. For decades, Britain has strictly controlled its southern border in an attempt to stop migrants and asylum seekers from entering.

      As early as 2000, the Port of Calais was surrounded by a 2.8 metre-high fence to prevent people from jumping into lorries waiting at the ferry departure point. In 1999, the Red Cross set up a refugee camp in the nearby town of Sangatte which quickly became overcrowded. The UK pushed for it to be closed in 2002 and then negotiated a treaty with France to regulate migration between the two countries.

      The 2003 Le Toquet Treaty allowed the UK to check travellers on French soil before their arrival, and France to do the same on UK soil. Although the deal looks fair on paper, in practice it unduly burdens French authorities, as there are more unauthorised migrants trying to reach the UK from France than vice versa.

      The treaty effectively moved the UK border onto French territory, but people still need to cross the channel to request asylum. That’s why thousands of refugees from conflict zones like Syria, Eritrea, Afghanistan, Sudan and Somalia have found themselves stranded in Calais, waiting for a chance to cross illegally – often in search of family members who’ve already made it to the UK. Many end up paying people smugglers to hide them in lorries or help them cross by boat.

      These underlying issues came to a head during the Syrian crisis, when refugees began camping out near Calais in 2014. The so-called Calais Jungle became infamous for its squalid conditions, and at its peak, hosted more than 7,000 people. They were all relocated to other centres in France before the camp was bulldozed in 2016. That same year, the UK also decided to build a €2.7 million border wall in Calais to block access to the port from the camp, but the project wasn’t completed until after the camp was cleared, attracting a fair deal of criticism. Between 2015 and 2018, the UK spent over €110 million on border security in France, only to top it up with over €56 million more in 2018.

      But much of this public money actually flows into the accounts of private corporations, hired to build and maintain the high-tech fences and conduct security checks. According to a 2020 report by the NGO Care4Calais, there are more than 40 private security companies working in the city. One of the biggest, Eamus Cork Solutions (ECS), was founded by a former Calais police officer in 2004 and is reported to have benefited at least €30 million from various contracts as of 2016.

      Stéphane Rosière, a geography professor at the University of Reims, wrote his book Iron Borders (only available in French) about the many border walls erected around the world. Rosière calls this the “security-industrial” complex – private firms that have largely replaced the traditional military-industrial sector in Europe since WW2.

      “These companies are getting rich by making security systems adaptable to all types of customers – individuals, companies or states,” he said. According to Rosière, three-quarters of the world’s border security barriers were built in the 21st century.

      Brigitte, a pensioner living close to the former site of the Calais Jungle, has seen her town change drastically over the past two decades. “Everything is cordoned off with wire mesh," she said. "I have the before and after photos, and it’s not a pretty sight. It’s just wire, wire, wire.” For the past 15 years, Brigitte has been opening her garage door for asylum seekers to stop by for a cup of tea and charge their phones and laptops, earning her the nickname "Mama Charge”.

      “For a while, the purpose of these fences and barriers was to stop people from crossing,” said François Guennoc, president of L’Auberge des Migrants, an NGO helping displaced migrants in Calais.

      Migrants have still been desperate enough to try their luck. “They risked a lot to get into the port area, and many of them came back bruised and battered,” Guennoc said. Today, walls and fences are mainly being built to deter people from settling in new camps near Calais after being evicted.

      In the city centre, all public squares have been fenced off. The city’s bridges have been fitted with blue lights and even with randomly-placed bike racks, so people won’t sleep under them.

      “They’ve also been cutting down trees for some time now,” said Brigitte, pointing to a patch near her home that was once woods. Guennoc said the authorities are now placing large rocks in areas where NGOs distribute meals and warm clothes, to prevent displaced people from receiving the donations. “The objective of the measures now is also to make the NGOs’ work more difficult,” he said.

      According to the NGO Refugee Rights Europe, about 1,500 men, women and minors were living in makeshift camps in and around Calais as of April 2020. In July 2020, French police raided a camp of over 500 people, destroying residents’ tents and belongings, in the largest operation since the Calais Jungle was cleared. An investigation by Slate found that smaller camps are cleared almost every day by the French police, even in the middle of winter. NGOs keep providing new tents and basic necessities to displaced residents, but they are frustrated by the waste of resources. The organisations are also concerned about COVID-19 outbreaks in the camps.

      As VICE World News has previously reported, the crackdown is only pushing people to take more desperate measures to get into the UK. Boat crossings reached record-highs in 2020, and four people have died since August 2020 while trying to cross, by land and sea. “When you create an obstacle, people find a way to get around it,” Guennoc said. “If they build a wall all the way along the coast to prevent boat departures, people will go to Normandy – and that has already started.” Crossing the open sea puts migrants at even greater risk.

      Rosière agrees security measures are only further endangering migrants.“All locks eventually open, no matter how complex they may be. It’s just a matter of time.”

      He believes the only parties who stand to profit from the status quo are criminal organisations and private security firms: “At the end of the day, this a messed-up use of public money.”

      https://www.vice.com/en/article/wx8yax/how-private-security-firms-profit-off-the-refugee-crisis

      En français:
      À Calais, la ville s’emmure
      https://www.vice.com/fr/article/wx8yax/a-calais-la-ville-semmure

    • Financing Border Wars. The border industry, its financiers and human rights

      This report seeks to explore and highlight the extent of today’s global border security industry, by focusing on the most important geographical markets—Australia, Europe, USA—listing the human rights violations and risks involved in each sector of the industry, profiling important corporate players and putting a spotlight on the key investors in each company.

      Executive summary

      Migration will be one of the defining human rights issues of the 21st century. The growing pressures to migrate combined with the increasingly militarised state security response will only exacerbate an already desperate situation for refugees and migrants. Refugees already live in a world where human rights are systematically denied. So as the climate crisis deepens and intersects with other economic and political crises, forcing more people from their homes, and as states retreat to ever more authoritarian security-based responses, the situation for upholding and supporting migrants’ rights looks ever bleaker.

      States, most of all those in the richest countries, bear the ultimate responsibility to uphold the human rights of refugees and migrants recognised under International Human Rights Law. Yet corporations are also deeply implicated. It is their finance, their products, their services, their infrastructure that underpins the structures of state migration and border control. In some cases, they are directly involved in human rights violations themselves; in other cases they are indirectly involved as they facilitate the system that systematically denies refugees and migrants their rights. Most of all, through their lobbying, involvement in government ‘expert’ groups, revolving doors with state agencies, it becomes clear that corporations are not just accidental beneficiaries of the militarisation of borders. Rather they actively shape the policies from which they profit and therefore share responsibility for the human rights violations that result.

      This state-corporate fusion is best described as a Border Industrial Complex, drawing on former US President Eisenhower’s warning of the dangers of a Military-Industrial Complex. Indeed it is noticeable that many of the leading border industries today are also military companies, seeking to diversify their security products to a rapidly expanding new market.

      This report seeks to explore and highlight the extent of today’s global border security industry, by focusing on the most important geographical markets—Australia, Europe, USA—listing the human rights violations and risks involved in each sector of the industry, profiling important corporate players and putting a spotlight on the key investors in each company.
      A booming industry

      The border industry is experiencing spectacular growth, seemingly immune to austerity or economic downturns. Market research agencies predict annual growth of the border security market of between 7.2% and 8.6%, reaching a total of $65–68 billion by 2025. The largest expansion is in the global Biometrics and Artificial Intelligence (AI) markets. Markets and Markets forecasts the biometric systems market to double from $33 billion in 2019 to $65.3 billion by 2024—of which biometrics for migration purposes will be a significant sector. It says that the AI market will equal US$190.61 billion by 2025.

      The report investigates five key sectors of the expanding industry: border security (including monitoring, surveillance, walls and fences), biometrics and smart borders, migrant detention, deportation, and audit and consultancy services. From these sectors, it profiles 23 corporations as significant actors: Accenture, Airbus, Booz Allen Hamilton, Classic Air Charter, Cobham, CoreCivic, Deloitte, Elbit, Eurasylum, G4S, GEO Group, IBM, IDEMIA, Leonardo, Lockheed Martin, Mitie, Palantir, PricewaterhouseCoopers, Serco, Sopra Steria, Thales, Thomson Reuters, Unisys.

      – The border security and control field, the technological infrastructure of security and surveillance at the border, is led by US, Australian, European and Israeli firms including Airbus, Elbit, Leonardo, Lockheed Martin, Airbus, Leonardo and Thales— all of which are among the world’s major arms sellers. They benefit not only from border contracts within the EU, US, and Australia but also increasingly from border externalisation programmes funded by these same countries. Jean Pierre Talamoni, head of sales and marketing at Airbus Defence and Space (ADS), said in 2016 that he estimates that two thirds of new military market opportunities over the next 10 years will be in Asia and the Middle East and North Africa (MENA) region. Companies are also trying to muscle in on providing the personnel to staff these walls, including border guards.

      - The Smart Borders sector encompasses the use of a broad range of (newer) technologies, including biometrics (such as fingerprints and iris-scans), AI and phone and social media tracking. The goal is to speed up processes for national citizens and other acceptable travellers and stop or deport unwanted migrants through the use of more sophisticated IT and biometric systems. Key corporations include large IT companies, such as IBM and Unisys, and multinational services company Accenture for whom migration is part of their extensive portfolio, as well as small firms, such as IDEMIA and Palantir Technologies, for whom migration-related work is central. The French public–private company Civipol, co-owned by the state and several large French arms companies, is another key player, selected to set up fingerprint databases of the whole population of Mali and Senegal.

      – Deportation. With the exception of the UK and the US, it is uncommon to privatise deportation. The UK has hired British company Mitie for its whole deportation process, while Classic Air Charter dominates in the US. Almost all major commercial airlines, however, are also involved in deportations. Newsweek reported, for example, that in the US, 93% of the 1,386 ICE deportation flights to Latin American countries on commercial airlines in 2019 were facilitated by United Airlines (677), American Airlines (345) and Delta Airlines (266).

      - Detention. The Global Detention Project lists over 1,350 migrant detention centres worldwide, of which over 400 are located in Europe, almost 200 in the US and nine in Australia. In many EU countries, the state manages detention centres, while in other countries (e.g. Australia, UK, USA) there are completely privatised prisons. Many other countries have a mix of public and private involvement, such as state facilities with private guards. Australia outsourced refugee detention to camps outside its territories. Australian service companies Broadspectrum and Canstruct International managed the detention centres, while the private security companies G4S, Paladin Solutions and Wilson Security were contracted for security services, including providing guards. Migrant detention in third countries is also an increasingly important part of EU migration policy, with the EU funding construction of migrant detention centres in ten non-EU countries.

      - Advisory and audit services are a more hidden part of public policies and practices, but can be influential in shaping new policies. A striking example is Civipol, which in 2003 wrote a study on maritime borders for the European Commission, which adopted its key policy recommendations in October 2003 and in later policy documents despite its derogatory language against refugees. Civipol’s study also laid foundations for later measures on border externalisation, including elements of the migration deal with Turkey and the EU’s Operation Sophia. Since 2003 Civipol has received funding for a large number of migration-related projects, especially in African countries. Between 2015 and 2017, it was the fourth most-funded organisation under the EU Trust Fund. Other prominent corporations in this sector include Eurasylum, as well as major international consultancy firms, particularly Deloitte and PricewaterhouseCoopers, for which migration-related work is part of their expansive portfolio.

      Financing the industry

      The markets for military and border control procurement are characterized by massively capital intensive investments and contracts, which would not be possible without the involvement of financial actors. Using data from marketscreener.com, the report shows that the world’s largest investment companies are also among the major shareholders in the border industry.

      – The Vanguard Group owns shares in 15 of the 17 companies, including over 15% of the shares of CoreCivic and GEO Group that manage private prisons and detention facilities.

      - Other important investors are Blackrock, which is a major shareholder in 11 companies, Capital Research and Management (part of the Capital Group), with shares in arms giants Airbus and Lockheed Martin, and State Street Global Advisors (SsgA), which owns over 15% of Lockheed Martin shares and is also a major shareholder in six other companies.

      - Although these giant asset management firms dominate, two of the profiled companies, Cobham and IDEMIA, are currently owned by the private equity firm Advent International. Advent specialises in buyouts and restructuring, and it seems likely that it will attempt to split up Cobham in the hope of making a profit by selling on the component companies to other owners.

      - In addition, three large European arms companies, Airbus, Thales and Leonardo, active in the border security market, are partly owned by the governments of the countries where they are headquartered.

      In all cases, therefore, the financing depends on our money. In the case of state ownership, through our taxes, and in terms of asset management funds, through the way individual savings, pension funds, insurance companies and university endowments are directly invested in these companies via the giant Asset Management Funds. This financing means that the border industry survives on at least the tacit approved use of the public’s funds which makes it vulnerable to social pressure as the human rights costs of the industry become ever more clear.
      Human rights and the border industry

      Universal human rights apply to every single human being, including refugees and migrants. While the International Bill of Human Rights provides the foundation, including defining universal rights that are important in the context of migration, such as the right to life, liberty and security of person, the right to freedom from torture or cruel or inhumane or degrading treatment or punishment, and freedom from discrimination, there are other instruments such as the United Nations Convention Relating to the Status of Refugees (Refugee Convention or Geneva Convention) of 1951 that are also relevant. There are also regional agreements, including the Organisation of African Unity Convention Governing the Specific Aspects of Refugee Problems in Africa and the European Convention on Human Rights (ECHR) that play a role relevant to the countries that have ratified them.

      Yet despite these important and legally binding human rights agreements, the human rights situation for refugees and migrants has become ever more desperate. States frequently deny their rights under international law, such as the right to seek asylum or non-refoulement principles, or more general rights such as the freedom from torture, cruel or inhumane treatment. There is a gap with regard to effective legal means or grievance mechanisms to counter this or to legally enforce or hold to account states that fail to implement instruments such as the UDHR and the Refugee Convention of 1951. A Permanent Peoples Tribunal in 2019 even concluded that ‘taken together, the immigration and asylum policies and practices of the EU and its Member States constitute a total denial of the fundamental rights of people and migrants, and are veritable crimes against humanity’. A similar conclusion can be made of the US and Australian border and immigration regime.

      The increased militarisation of border security worldwide and state-sanctioned hostility toward migrants has had a deeply detrimental impact on the human rights of refugees and migrants.

      – Increased border security has led to direct violence against refugees, pushbacks with the risk of returning people to unsafe countries and inhumane circumstances (contravening the principle of non-refoulement), and a disturbing rise in avoidable deaths, as countries close off certain migration routes, forcing migrants to look for other, often more dangerous, alternatives and pushing them into the arms of criminal smuggling networks.

      – The increased use of autonomous systems of border security such as drones threaten new dangers related to human rights. There is already evidence that they push migrants to take more dangerous routes, but there is also concern that there is a gradual trend towards weaponized systems that will further threaten migrants’ lives.

      – The rise in deportations has threatened fundamental human rights including the right to family unity, the right to seek asylum, the right to humane treatment in detention, the right to due process, and the rights of children’. There have been many instances of violence in the course of deportations, sometimes resulting in death or permanent harm, against desperate people who try to do everything to prevent being deported. Moreover, deportations often return refugees to unsafe countries, where they face violence, persecution, discrimination and poverty.

      - The widespread detention of migrants also fundamentally undermines their human rights . There have been many reports of violence and neglect by guards and prison authorities, limited access to adequate legal and medical support, a lack of decent food, overcrowding and poor and unhealthy conditions. Privatisation of detention exacerbates these problems, because companies benefit from locking up a growing number of migrants and minimising costs.

      – The building of major migration databases such as EU’s Eurodac and SIS II, VIS gives rise to a range of human rights concerns, including issues of privacy, civil liberties, bias leading to discrimination—worsened by AI processes -, and misuse of collected information. Migrants are already subject to unprecedented levels of surveillance, and are often now treated as guinea pigs where even more intrusive technologies such as facial recognition and social media tracking are tried out without migrants consent.

      The trend towards externalisation of migration policies raises new concerns as it seeks to put the human costs of border militarisation beyond the border and out of public sight. This has led to the EU, US and Australia all cooperating with authoritarian regimes to try and prevent migrants from even getting close to their borders. Moreover as countries donate money, equipment or training to security forces in authoritarian regimes, they end up expanding and strengthening their capacities which leads to a rise in human rights violations more broadly. Nowhere are the human rights consequences of border externalisation policies clearer than in the case of Libya, where the EU and individual member states (in particular Italy and Malta) funding, training and cooperation with security forces and militias have led to violence at the borders, murder, disappearances, rape, enslavement and abuse of migrants in the country and torture in detention centres.

      The 23 corporations profiled in this report have all been involved in or connected to policies and practices that have come under fire because of violations of the human rights of refugees and migrants. As mentioned earlier, sometimes the companies are directly responsible for human rights violations or concerns. In other cases, they are indirectly responsible through their contribution to a border infrastructure that denies human rights and through lobbying to influence policy-making to prioritize militarized responses to migration. 11 of the companies profiled publicly proclaim their commitment to human rights as signatories to the UN Guiding Principles on Business and Human Rights (UNGPs), but as these are weak voluntary codes this has not led to noticeable changes in their business operations related to migration.

      The most prominent examples of direct human rights abuses come from the corporations involved in detention and deportation. Classic Air Charter, Cobham, CoreCivic, Eurasylum, G4S, GEO Group, Mitie and Serco all have faced allegations of violence and abuse by their staff towards migrants. G4S has been one of the companies most often in the spotlight. In 2017, not only were assaults by its staff on migrants at the Brook House immigration removal centre in the UK broadcast by the BBC, but it was also hit with a class suit in Australia by almost 2,000 people who are or were detained at the externalised detention centre on Manus Island, because of physical and psychological injuries as a result of harsh treatment and dangerous conditions. The company eventually settled the case for A$70 million (about $53 million) in the largest-ever human rights class-action settlement. G4S has also faced allegations related to its involvement in deportations.

      The other companies listed all play a pivotal role in the border infrastructure that denies refugees’ human rights. Airbus P-3 Orion surveillance planes of the Australian Air Force, for example, play a part in the highly controversial maritime wall that prevents migrants arriving by boat and leads to their detention in terrible conditions offshore. Lockheed Martin is a leading supplier of border security on the US-Mexico border. Leonardo is one of the main suppliers of drones for Europe’s borders. Thales produces the radar and sensor systems, critical to patrolling the Mediterrean. Elbit Systems provides surveillance technologies to both the EU and US, marketed on their success as technologies used in the separation wall in the Palestinian occupied territories. Accenture, IDEMIA and Sopra Steria manage many border biometric projects. Deloitte has been one of the key consulting companies to the US Immigration and Customs Enforcement (ICE) agency since 2003, while PriceWaterhouseCoopers provides similar consultancy services to Frontex and the Australian border forces. IBM, Palantir and UNISYS provide the IT infrastructure that underpins the border and immigration apparatus.
      Time to divest

      The report concludes by calling for campaigns to divest from the border industry. There is a long history of campaigns and movements that call for divestment from industries that support human rights violations—from the campaigns to divest from Apartheid South Africa to more recent campaigns to divest from the fossil fuel industry. The border industry has become an equally morally toxic asset for any financial institution, given the litany of human rights abuses tied to it and the likelihood they will intensify in years to come.

      There are already examples of existing campaigns targeting particular border industries that have borne fruit. A spotlight on US migrant detention, as part of former President Trump’s anti- immigration policies, contributed to six large US banks (Bank of America, BNP Paribas, Fifth Third Bancorp, JPMorgan Chase, SunTrust, and Wells Fargo) publicly announcing that they would not provide new financing to the private prison industry. The two largest public US pension funds, CalSTRS and CalPERS, also decided to divest from the same two companies. Geo Group acknowledged that these acts of ‘public resistance’ hit the company financially, criticising the banks as ‘clearly bow[ing] down to a small group of activists protesting and conducting targeted social media campaigns’.

      Every company involved or accused of human rights violations either denies them or says that they are atypical exceptions to corporate behavior. This report shows however that a militarised border regime built on exclusion will always be a violent apparatus that perpetuates human rights violations. It is a regime that every day locks up refugees in intolerable conditions, separates families causing untold trauma and heartbreak, and causes a devastating death toll as refugees are forced to take unimaginable dangerous journeys because the alternatives are worse. However well-intentioned, any industry that provides services and products for this border regime will bear responsibility for its human consequences and its human rights violations, and over time will suffer their own serious reputational costs for their involvement in this immoral industry. On the other hand, a widespread exodus of the leading corporations on which the border regime depends could force states to change course, and to embrace a politics that protects and upholds the rights of refugees and migrants. Worldwide, social movements and the public are starting to wake up to the human costs of border militarisation and demanding a fundamental change. It is time now for the border industry and their financiers to make a choice.

      https://www.tni.org/en/financingborderwars

      #TNI #rapport
      #industrie_frontalière #militarisation_des_frontières #biométrie #Intelligence_artificielle #AI #IA

      #Accenture #Airbus #Booz_Allen_Hamilton #Classic_Air_Charter #Cobham #CoreCivic #Deloitte #Elbit #Eurasylum #G4S #GEO_Group #IBM #IDEMIA #Leonardo #Lockheed_Martin #Mitie #Palantir #PricewaterhouseCoopers #Serco #Sopra_Steria #Thales #Thomson_Reuters #Unisys
      #contrôles_frontaliers #surveillance #technologie #Jean-Pierre_Talamoni #Airbus_Defence_and_Space (#ADS) #smart_borders #frontières_intelligentes #iris #empreintes_digitales #réseaux_sociaux #IT #Civipol #Mali #Sénégal #renvois #expulsions #déportations #Mitie #Classic_Air_Charter #compagnies_aériennes #United_Airlines #ICE #American_Airlines #Delta_Airlines #rétention #détention_administrative #privatisation #Broadspectrum #Canstruct_International #Paladin_Solutions #Wilson_Security #Operation_Sophia #EU_Trust_Fund #Trust_Fund #externalisation #Eurasylum #Deloitte #PricewaterhouseCoopers #Vanguard_Group #CoreCivic #Blackrock #investisseurs #investissement #Capital_Research_and_Management #Capital_Group #Lockheed_Martin #State_Street_Global_Advisors (#SsgA) #Cobham #IDEMIA #Advent_International #droits_humains #VIS #SIS_II #P-3_Orion #Accenture #Sopra_Steria #Frontex #Australie

    • Outsourcing oppression. How Europe externalises migrant detention beyond its shores

      This report seeks to address the gap and join the dots between Europe’s outsourcing of migrant detention to third countries and the notorious conditions within the migrant detention centres. In a nutshell, Europe calls the shots on migrant detention beyond its shores but is rarely held to account for the deeply oppressive consequences, including arbitrary detention, torture, forced disappearance, violence, sexual violence, and death.

      Key findings

      – The European Union (EU), and its member states, externalise detention to third countries as part of a strategy to keep migrants out at all costs. This leads to migrants being detained and subjected to gross human rights violations in transit countries in Eastern Europe, the Balkans, West Asia and Africa.

      – Candidate countries wishing to join the EU are obligated to detain migrants and stop them from crossing into the EU as a prerequisite for accession to the Union. Funding is made available through pre-accession agreements specifically for the purpose of detaining migrants.

      – Beyond EU candidate countries, this report identifies 22 countries in Africa, Eastern Europe, the Balkans and West Asia where the EU and its member states fund the construction of detention centres, detention related activities such as trainings, or advocate for detention in other ways such as through aggressively pushing for detention legislation or agreeing to relax visa requirements for nationals of these countries in exchange for increased migrant detention.

      - The main goal of detention externalisation is to pre-empt migrants from reaching the external borders of the EU by turning third countries into border outposts. In many cases this involves the EU and its member states propping up and maintaining authoritarian regimes.

      – Europe is in effect following the ‘Australian model’ that has been highly criticised by UN experts and human rights organisations for the torturous conditions inside detention centres. Nevertheless, Europe continues to advance a system that mirrors Australia’s outsourced model, focusing not on guaranteeing the rights of migrants, but instead on deterring and pushing back would-be asylum seekers at all costs.

      - Human rights are systematically violated in detention centres directly and indirectly funded by the EU and its member states, including cases of torture, arbitrary and prolonged detention, sexual violence, no access to legal recourse, humanitarian assistance, or asylum procedures, the detention of victims of trafficking, and many other serious violations in which Europe is implicated.

      - Particularly horrendous is the case of Libya, which continues to receive financial and political support from Europe despite mounting evidence of brutality, enslavement, torture, forced disappearance and death. The International Organisation for Migration (IOM) and the UN High Commissioner for Refugees (UNHCR), implement EU policies in Libya and, according to aid officials, actively whitewash the consequences of European policies to safeguard substantial EU funding.

      - Not only does the EU deport and push back migrants to unsafe third countries, it actively finances and coercively pushes for their detention in these countries. Often they have no choice but to sign ‘voluntary’ agreements to be returned to their countries of origin as the only means of getting out of torturous detention facilities.

      - The EU implements a carrot and stick approach, in particular in its dealings with Africa, prolonging colonialist dynamics and uneven power structures – in Niger, for example, the EU pushed for legislation on detention, in exchange for development aid funding.

      – The EU envisages a greater role for migrant detention in third countries going forward, as was evidenced in the European Commission’s New Pact on Migration and Asylum.

      - The EU acts on the premise of containment and deterrence, namely, that if migrants seeking to reach Europe are intercepted and detained along that journey, they will be deterred from making the journey in the first place. This approach completely misses the point that people migrate to survive, often fleeing war and other forms of violence. The EU continues to overlook the structural reasons behind why people flee and the EU’s own role in provoking such migration.

      – The border industrial complex profits from the increased securitisation of borders. Far from being passive spectators, the military and security industry is actively involved in shaping EU border policies by positioning themselves as experts on the issue. We can already see a trend of privatising migrant detention, paralleling what is happening in prison systems worldwide.

      https://www.tni.org/en/outsourcingoppression

      pour télécharger le rapport :
      https://www.tni.org/files/publication-downloads/outsourcingoppression-report-tni.pdf

      #externalisation #rétention #détention #détention_arbitraire #violence #disparitions #disparitions_forcées #violence #violence_sexuelle #morts #mort #décès #Afrique #Europe_de_l'Est #Balkans #Asie #modèle_australien #EU #UE #Union_européenne #torture #Libye #droits_humains #droits_fondamentaux #HCR #UNHCR #OIM #IOM #dissuasion #privatisation

    • Fortress Europe: the millions spent on military-grade tech to deter refugees

      We map out the rising number of #high-tech surveillance and deterrent systems facing asylum seekers along EU borders.

      From military-grade drones to sensor systems and experimental technology, the EU and its members have spent hundreds of millions of euros over the past decade on technologies to track down and keep at bay the refugees on its borders.

      Poland’s border with Belarus is becoming the latest frontline for this technology, with the country approving last month a €350m (£300m) wall with advanced cameras and motion sensors.

      The Guardian has mapped out the result of the EU’s investment: a digital wall on the harsh sea, forest and mountain frontiers, and a technological playground for military and tech companies repurposing products for new markets.

      The EU is central to the push towards using technology on its borders, whether it has been bought by the EU’s border force, Frontex, or financed for member states through EU sources, such as its internal security fund or Horizon 2020, a project to drive innovation.

      In 2018, the EU predicted that the European security market would grow to €128bn (£108bn) by 2020. Beneficiaries are arms and tech companies who heavily courted the EU, raising the concerns of campaigners and MEPs.

      “In effect, none of this stops people from crossing; having drones or helicopters doesn’t stop people from crossing, you just see people taking more risky ways,” says Jack Sapoch, formerly with Border Violence Monitoring Network. “This is a history that’s so long, as security increases on one section of the border, movement continues in another section.”

      Petra Molnar, who runs the migration and technology monitor at Refugee Law Lab, says the EU’s reliance on these companies to develop “hare-brained ideas” into tech for use on its borders is inappropriate.

      “They rely on the private sector to create these toys for them. But there’s very little regulation,” she says. “Some sort of tech bro is having a field day with this.”

      “For me, what’s really sad is that it’s almost a done deal that all this money is being spent on camps, enclosures, surveillance, drones.”

      Air Surveillance

      Refugees and migrants trying to enter the EU by land or sea are watched from the air. Border officers use drones and helicopters in the Balkans, while Greece has airships on its border with Turkey. The most expensive tool is the long-endurance Heron drone operating over the Mediterranean.

      Frontex awarded a €100m (£91m) contract last year for the Heron and Hermes drones made by two Israeli arms companies, both of which had been used by the Israeli military in the Gaza Strip. Capable of flying for more than 30 hours and at heights of 10,000 metres (30,000 feet), the drones beam almost real-time feeds back to Frontex’s HQ in Warsaw.

      Missions mostly start from Malta, focusing on the Libyan search and rescue zone – where the Libyan coastguard will perform “pull backs” when informed by EU forces of boats trying to cross the Mediterranean.

      German MEP Özlem Demirel is campaigning against the EU’s use of drones and links to arms companies, which she says has turned migration into a security issue.

      “The arms industries are saying: ‘This is a security problem, so buy my weapons, buy my drones, buy my surveillance system,’” says Demirel.

      “The EU is always talking about values like human rights, [speaking out] against violations but … week-by-week we see more people dying and we have to question if the EU is breaking its values,” she says.

      Sensors and cameras

      EU air assets are accompanied on the ground by sensors and specialised cameras that border authorities throughout Europe use to spot movement and find people in hiding. They include mobile radars and thermal cameras mounted on vehicles, as well as heartbeat detectors and CO2 monitors used to detect signs of people concealed inside vehicles.

      Greece deploys thermal cameras and sensors along its land border with Turkey, monitoring the feeds from operations centres, such as in Nea Vyssa, near the meeting of the Greek, Turkish and Bulgarian borders. Along the same stretch, in June, Greece deployed a vehicle-mounted sound cannon that blasts “deafening” bursts of up to 162 decibels to force people to turn back.

      Poland is hoping to emulate Greece in response to the crisis on its border with Belarus. In October, its parliament approved a €350m wall that will stretch along half the border and reach up to 5.5 metres (18 feet), equipped with motion detectors and thermal cameras.

      Surveillance centres

      In September, Greece opened a refugee camp on the island of Samos that has been described as prison-like. The €38m (£32m) facility for 3,000 asylum seekers has military-grade fencing and #CCTV to track people’s movements. Access is controlled by fingerprint, turnstiles and X-rays. A private security company and 50 uniformed officers monitor the camp. It is the first of five that Greece has planned; two more opened in November.

      https://twitter.com/_PMolnar/status/1465224733771939841

      At the same time, Greece opened a new surveillance centre on Samos, capable of viewing video feeds from the country’s 35 refugee camps from a wall of monitors. Greece says the “smart” software helps to alert camps of emergencies.

      Artificial intelligence

      The EU spent €4.5m (£3.8m) on a three-year trial of artificial intelligence-powered lie detectors in Greece, Hungary and Latvia. A machine scans refugees and migrants’ facial expressions as they answer questions it poses, deciding whether they have lied and passing the information on to a border officer.

      The last trial finished in late 2019 and was hailed as a success by the EU but academics have called it pseudoscience, arguing that the “micro-expressions” the software analyses cannot be reliably used to judge whether someone is lying. The software is the subject of a court case taken by MEP Patrick Breyer to the European court of justice in Luxembourg, arguing that there should be more public scrutiny of such technology. A decision is expected on 15 December.

      https://www.theguardian.com/global-development/2021/dec/06/fortress-europe-the-millions-spent-on-military-grade-tech-to-deter-refu

  • Adversarial Interoperability: Reviving an Elegant Weapon From a More Civilized Age to Slay Today’s Monopolies | Electronic Frontier Foundation
    https://www.eff.org/deeplinks/2019/06/adversarial-interoperability-reviving-elegant-weapon-more-civilized-age-slay

    Voici ce que le mouvement pour le logiciel libre peut apprendre des tactiques des concurrents de Microsoft - si vous ne pouvez pas gagner contre les géants, profitez d’eux.

    Today, Apple is one of the largest, most profitable companies on Earth, but in the early 2000s, the company was fighting for its life. Microsoft’s Windows operating system was ascendant, and Microsoft leveraged its dominance to ensure that every Windows user relied on its Microsoft Office suite (Word, Excel, Powerpoint, etc). Apple users—a small minority of computer users—who wanted to exchange documents with the much larger world of Windows users were dependent on Microsoft’s Office for the Macintosh operating system (which worked inconsistently with Windows Office documents, with unexpected behaviors like corrupting documents so they were no longer readable, or partially/incorrectly displaying parts of exchanged documents). Alternatively, Apple users could ask Windows users to export their Office documents to an “interoperable” file format like Rich Text Format (for text), or Comma-Separated Values (for spreadsheets). These, too, were inconsistent and error-prone, interpreted in different ways by different programs on both Mac and Windows systems.

    Apple could have begged Microsoft to improve its Macintosh offerings, or they could have begged the company to standardize its flagship products at a standards body like OASIS or ISO. But Microsoft had little motive to do such a thing: its Office products were a tremendous competitive advantage, and despite the fact that Apple was too small to be a real threat, Microsoft had a well-deserved reputation for going to enormous lengths to snuff out potential competitors, including both Macintosh computers and computers running the GNU/Linux operating system.

    Apple did not rely on Microsoft’s goodwill and generosity: instead, it relied on reverse-engineering. After its 2002 “Switch” ad campaign—which begged potential Apple customers to ignore the “myths” about how hard it was to integrate Macs into Windows workflows—it intensified work on its iWork productivity suite, which launched in 2005, incorporating a word-processor (Pages), a spreadsheet (Numbers) and a presentation program (Keynote). These were feature-rich applications in their own right, with many innovations that leapfrogged the incumbent Microsoft tools, but this superiority would still not have been sufficient to ensure the adoption of iWork, because the world’s greatest spreadsheets are of no use if everyone you need to work with can’t open them.

    What made iWork a success—and helped re-launch Apple—was the fact that Pages could open and save most Word files; Numbers could open and save most Excel files; and Keynote could open and save most PowerPoint presentations. Apple did not attain this compatibility through Microsoft’s cooperation: it attained it despite Microsoft’s noncooperation. Apple didn’t just make an “interoperable” product that worked with an existing product in the market: they made an adversarially interoperable product whose compatibility was wrested from the incumbent, through diligent reverse-engineering and reimplementation. What’s more, Apple committed to maintaining that interoperability, even though Microsoft continued to update its products in ways that temporarily undermined the ability of Apple customers to exchange documents with Microsoft customers, paying engineers to unbreak everything that Microsoft’s maneuvers broke. Apple’s persistence paid off: over time, Microsoft’s customers became dependent on compatibility with Apple customers, and they would complain if Microsoft changed its Office products in ways that broke their cross-platform workflow.

    Since Pages’ launch, document interoperability has stabilized, with multiple parties entering the market, including Google’s cloud-based Docs offerings, and the free/open alternatives from LibreOffice. The convergence on this standard was not undertaken with the blessing of the dominant player: rather, it came about despite Microsoft’s opposition. Docs are not just interoperable, they’re adversarially interoperable: each has its own file format, but each can read Microsoft’s file format.

    The document wars are just one of many key junctures in which adversarial interoperability made a dominant player vulnerable to new entrants:

    Hayes modems
    Usenet’s alt.* hierarchy
    Supercard’s compatibility with Hypercard
    Search engines’ web-crawlers
    Servers of every kind, which routinely impersonate PCs, printers, and other devices

    Scratch the surface of most Big Tech giants and you’ll find an adversarial interoperability story: Facebook grew by making a tool that let its users stay in touch with MySpace users; Google products from search to Docs and beyond depend on adversarial interoperability layers; Amazon’s cloud is full of virtual machines pretending to be discrete CPUs, impersonating real computers so well that the programs running within them have no idea that they’re trapped in the Matrix.

    Adversarial interoperability converts market dominance from an unassailable asset to a liability. Once Facebook could give new users the ability to stay in touch with MySpace friends, then every message those Facebook users sent back to MySpace—with a footer advertising Facebook’s superiority—became a recruiting tool for more Facebook users. MySpace served Facebook as a reservoir of conveniently organized potential users that could be easily reached with a compelling pitch about why they should switch.

    Today, Facebook is posting 30-54% annual year-on-year revenue growth and boasts 2.3 billion users, many of whom are deeply unhappy with the service, but who are stuck within its confines because their friends are there (and vice-versa).

    A company making billions and growing by double-digits with 2.3 billion unhappy customers should be every investor’s white whale, but instead, Facebook and its associated businesses are known as “the kill zone” in investment circles.

    Facebook’s advantage is in “network effects”: the idea that Facebook increases in value with every user who joins it (because more users increase the likelihood that the person you’re looking for is on Facebook). But adversarial interoperability could allow new market entrants to arrogate those network effects to themselves, by allowing their users to remain in contact with Facebook friends even after they’ve left Facebook.

    This kind of adversarial interoperability goes beyond the sort of thing envisioned by “data portability,” which usually refers to tools that allow users to make a one-off export of all their data, which they can take with them to rival services. Data portability is important, but it is no substitute for the ability to have ongoing access to a service that you’re in the process of migrating away from.

    Big Tech platforms leverage both their users’ behavioral data and the ability to lock their users into “walled gardens” to drive incredible growth and profits. The customers for these systems are treated as though they have entered into a negotiated contract with the companies, trading privacy for service, or vendor lock-in for some kind of subsidy or convenience. And when Big Tech lobbies against privacy regulations and anti-walled-garden measures like Right to Repair legislation, they say that their customers negotiated a deal in which they surrendered their personal information to be plundered and sold, or their freedom to buy service and parts on the open market.

    But it’s obvious that no such negotiation has taken place. Your browser invisibly and silently hemorrhages your personal information as you move about the web; you paid for your phone or printer and should have the right to decide whose ink or apps go into them.

    Adversarial interoperability is the consumer’s bargaining chip in these coercive “negotiations.” More than a quarter of Internet users have installed ad-blockers, making it the biggest consumer revolt in human history. These users are making counteroffers: the platforms say, “We want all of your data in exchange for this service,” and their users say, “How about none?” Now we have a negotiation!

    Or think of the iPhone owners who patronize independent service centers instead of using Apple’s service: Apple’s opening bid is “You only ever get your stuff fixed from us, at a price we set,” and the owners of Apple devices say, “Hard pass.” Now it’s up to Apple to make a counteroffer. We’ll know it’s a fair one if iPhone owners decide to patronize Apple’s service centers.

    This is what a competitive market looks like. In the absence of competitive offerings from rival firms, consumers make counteroffers by other means.

    There is good reason to want to see a reinvigorated approach to competition in America, but it’s important to remember that competition is enabled or constrained not just by mergers and acquisitions. Companies can use a whole package of laws to attain and maintain dominance, to the detriment of the public interest.

    Today, consumers and toolsmiths confront a thicket of laws and rules that stand between them and technological self-determination. To change that, we need to reform the Computer Fraud and Abuse Act, Section 1201 of the Digital Millennium Copyright Act, , patent law, and other rules and laws. Adversarial interoperability is in the history of every tech giant that rules today, and if it was good enough for them in the past, it’s good enough for the companies that will topple them in the future.

    #adversarial_Interoperability #logiciel_libre #disruption