8. Border Control and State Sovereignty

2019 ◽  
pp. 156-182
Author(s):  
Luis Martinez

This chapter is the general introduction to The State in North Africa. After the Arab Uprisings. Until the Arab revolts, the process of state consolidation in North Africa was believed to be completed, and territory and border control came under state sovereignty. The governments of North Africa discovered with dismay that they were facing challenges that undermined this long task of territorial unification as well as the cultural and administrative harmonization undertaken in the wake of their independence. The introduction ends by presenting the general outline of the book.


Author(s):  
Marie-Laure Basilien-Gainche

Abstract This paper questions state sovereignty at borders, by referencing the contradictions that a border control approach based upon security concerns creates, and the distortions between societies of norms and situations of exception that the European migration and asylum policies generate. Meanwhile, whilst sovereignty should correspond in a legal theory perspective to authority, its expressions manifested in the European borders consists essentially in domination as bare violence is deployed. By investigating the hiatus between how sovereignty ought to be in theory and how it is observed in practice, it is possible to consider that the very sovereignty is diffracted in the thickness of the frontiers (i). This paper explores the methods states develop directly or indirectly in the borders, inside the border zones, basing the analysis on the notion of heterotopia Michel Foucault forged. Such a conceptual tool is deployed in order to underscore how states construct and exploit frontiers as useful margins and establish them as dissolution zones. Three methods – extraction, classification and obliteration – are highlighted that correspond to the main purposes of border surveillance – control, selection and removal – (ii).


2019 ◽  
pp. 197-228 ◽  
Author(s):  
Bernard Ryan

This chapter is concerned with the various ways in which the migration crisis since the Arab Spring of 2011 has reshaped the reach of the EU border control regime. Within the EU framework, Frontex has acquired a greater role, while Schengen states have new powers to reintroduce internal border controls. In the external sphere, the EU now cooperates with a broader range of third states—Libya and Turkey most prominently—while developing more extensive forms of cooperation with them. The chapter will argue that this pattern—incremental internal changes and hyperactivity in the external sphere—is a product of intergovernmental constraints upon EU policy in a core area of member state sovereignty. The avoidance by EU Member States of legal responsibility for asylum applicants and other migrants is a further reason for the preference for externalization.


2020 ◽  
Vol 2 (2) ◽  
pp. 119-133
Author(s):  
Sania Nizar Putri Ashari ◽  
Wisnu Widayat

The opening of access to national borders in globalization era in the context of global level cooperation has caused many foreign citizens to migrate to other countries. Thus, various threats of crime and criminal acts are a challenge that must be given more attention, because state borders also involve state sovereignty and the security of a country. Likewise with Indonesia which borders many countries, making Indonesia vulnerable to the problem of illegal immigrants entering the territory of the country. Illegal immigrants are a definite threat because they have the potential to commit crimes, drug trafficking, people smuggling, prostitution, and even other crimes.Indonesia has various kinds of institutions that have the authority to guard borders, such as the Police, the Indonesian National Army, Immigration, and the Maritime Security Agency of the Republic of Indonesia, in practice these border control agencies carry out their respective duties and functions, and until 2020 various collaborations have been carried out. between these institutions in carrying out their duties, however, cases of illegal immigrants are still widely found and occur on the Indonesian border, so that the urgency to strengthen the integration between the border supervisors to maximize supervision of the Indonesian border does indeed exist and must be realized immediately.


2016 ◽  
Vol 46 (183) ◽  
pp. 289-305
Author(s):  
Angela Schweizer

The following article is based on my fieldwork in Morocco and represents anthropological data collected amongst undocumented sub-Saharan migrants in Morocco. They want to enter Europe in search for a better life for themselves and to provide financial support for their families. Due to heavy border security control and repression, they find themselves trapped at the gates of Europe, where they are trying to survive by engaging in various economic activities in the informal sector. The article begins with an overview of the European migration politics in Africa and the geopolitical and historical context of Morocco, in light of the externalization of European border control. I will then analyze the various economic sectors, in which sub-Saharan migrations are active, as well as smuggling networks, informal camps and remittances, on which they largely depend due to the exclusion from the national job market.


Author(s):  
Matthew Bagot

One of the central questions in international relations today is how we should conceive of state sovereignty. The notion of sovereignty—’supreme authority within a territory’, as Daniel Philpott defines it—emerged after the Treaty of Westphalia in 1648 as a result of which the late medieval crisis of pluralism was settled. But recent changes in the international order, such as technological advances that have spurred globalization and the emerging norm of the Responsibility to Protect, have cast the notion of sovereignty into an unclear light. The purpose of this paper is to contribute to the current debate regarding sovereignty by exploring two schools of thought on the matter: first, three Catholic scholars from the past century—Luigi Sturzo, Jacques Maritain, and John Courtney Murray, S.J.—taken as representative of Catholic tradition; second, a number of contemporary political theorists of cosmopolitan democracy. The paper argues that there is a confluence between the Catholic thinkers and the cosmopolitan democrats regarding their understanding of state sovereignty and that, taken together, the two schools have much to contribute not only to our current understanding of sovereignty, but also to the future of global governance.


Author(s):  
Felicity Amaya Schaeffer

I argue that we are entering an automated era of border control that I label a border-biosecurity industrial complex. Funded in great part by the Department of Homeland Security (DHS), scientific research and automated surveillance technologies promise the state innovative and supposedly unbiased solutions to the challenge of border control and security. This article spotlights a border surveillance technology called AVATAR (Automated Virtual Agent for Truth Assessment in Real-Time). Analyzing this technology, which was funded by the DHS and developed by faculty at the University of Arizona’s National Center for Border Security and Immigration (BORDERS), allows me to assess how the emphasis on novel technologies to detect terrorists unleashes the search for ubiquitous surveillance devices programmed to detect deviant behavioral and physiological movements. I offer a wider view of this technology-in-the-making by analyzing how university research in aerial defense, the psychology of deception, the life sciences, and computer engineering influences the development of surveillance devices and techniques. I explore how, during a posthuman era, automated technologies detect and racialize “suspect life” under the guise of scientific neutrality and supposedly free from human interference. Suspect life refers to the racial bias preprogrammed into algorithms that compute danger or risk into certain human movements and regions such as border zones. As these technologies turn the body into matter, they present biological life as a more scientifically verifiable truth than human verbal testimony, moving border control from the adjudication of law through the subjective interview to the automated body that speaks a truth more powerful than a complex story can tell.


Author(s):  
Mary Elise Sarotte

This chapter examines the Soviet restoration model and former German Chancellor Helmut Kohl's revivalist model. The Union of Soviet Socialist Republics (USSR) hoped to use its weight as a victor in the Second World War to restore the old quadripartite mechanism of four-power control exactly as it used to be in 1945, before subsequent layers of Cold War modifications created room for German contributions. This restoration model, which called for the reuse of the old Allied Control Commission to dominate all further proceedings in divided Germany, represented a realist vision of politics run by powerful states, each retaining their own sociopolitical order and pursuing their own interests. Meanwhile, Kohl's revivalist model represented the revival, or adaptive reuse, of a confederation of German states. This latter-day “confederationism” blurred the lines of state sovereignty; each of the two twenty-first-century Germanies would maintain its own political and social order, but the two would share a confederative, national roof.


2019 ◽  
Vol 3 ◽  
pp. 1255
Author(s):  
Ahmad Salahuddin Mohd Harithuddin ◽  
Mohd Fazri Sedan ◽  
Syaril Azrad Md Ali ◽  
Shattri Mansor ◽  
Hamid Reza Jifroudi ◽  
...  

Unmanned aerial systems (UAS) has many advantages in the fields of SURVAILLANCE and disaster management compared to space-borne observation, manned missions and in situ methods. The reasons include cost effectiveness, operational safety, and mission efficiency. This has in turn underlined the importance of UAS technology and highlighted a growing need in a more robust and efficient unmanned aerial vehicles to serve specific needs in SURVAILLANCE and disaster management. This paper first gives an overview on the framework for SURVAILLANCE particularly in applications of border control and disaster management and lists several phases of SURVAILLANCE and service descriptions. Based on this overview and SURVAILLANCE phases descriptions, we show the areas and services in which UAS can have significant advantage over traditional methods.


Sign in / Sign up

Export Citation Format

Share Document