skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: El asilo en disputa: estrategias violentas de sujeción durante el gobierno de Donald Trump
This paper identifies the Trump administration’s violent practices toward Central American and Mexican asylum-seeking families as a defensive response to the legal framework that grants them this protection tool in their relationship with the State. Through in-depth interviews and participant observation with migrant families in Tijuana during 2017-2020, it is concluded that the various measures implemented sought to limit asylum as a right and to configure an illegal subject based on suspicion, criminalization, and trauma. In this way, it was sought to reverse the character of legality that protects asylum seekers and rebuild a dominant vertical relationship of racialized subjection. The analysis seeks to contribute to migration studies by understanding the tension between the legality of asylum and the Trump administration’s actions to disrupt this framework.  more » « less
Award ID(s):
1951772
PAR ID:
10470190
Author(s) / Creator(s):
;
Publisher / Repository:
Frontera Norte
Date Published:
Journal Name:
Frontera norte
Volume:
34
Issue:
14
ISSN:
0187-7372
Page Range / eLocation ID:
1 to 21
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. VALDEZ, MÓNICA; NARVÁEZ, JUAN (Ed.)
    This chapter develops the argument that the “zero tolerance” immigration policy, also known as “family separation” policy, implemented by President Trump in 2018, has functioned as a border and borderization regime, and that this has made management and the punishment of children and adolescents a mechanism for disincentivizing, controlling and punishing migrant populations. It is proposed that, when analyzing the rationales and technologies that this immigration policy applied to children and adolescents, what we discover is a “borderization regime” based on the criminalization of migration, the racialization of children’s bodies and the use of the concept of “innocence ” as a justification for the reinsertion of national borders and the values of a right-wing and supremacist political regime. This chapter seeks to establish a dialogue with studies on immigration detention, deprivation of liberty and immigration policy as State violence. 
    more » « less
  2. null (Ed.)
    The Trump administration sought to erode confidence in the international system, which it regarded as an affront to national sovereignty. The COVID-19 pandemic, by raising collective awareness of the need for global cooperation, may help to restore that confidence and encourage renewed commitment to multilateralism. Public opinion polls show that people around the world have greater confidence in global institutions like the World Health Organization than in national leaders like Donald Trump or Xi Jinping. The United States will continue to be an indispensable partner after Trump, but the international order will rest on a stronger footing if Washington is no longer expected to be the prime mover and contributes instead as one among equals. 
    more » « less
  3. Hockenberry, Matthew; Posner, MirIam (Ed.)
    "This article tells the early story of El Centro de Tecnología de Semiconductores (CTS) as a site of innovation. It argues that, along with economic and scientific development goals, CTS furthered political and geopolitical change agendas for IBM and Mexico. These included reorganizing labor around global supply chains and maintaining specific power dynamics between the Global North and South. Throughout the nineties, CTS was key in Mexico’s innovation project. It operated as a laboratory for business models built directly on computing supply chains and was an example of successful industry-academia alliances. However, not everyone in the cluster benefited from Mexico’s search for innovation. The country’s innovation policies involved the adoption of “outsourcing”—a flexible labor regime that remade labor in the cluster by weakening workers’ rights. In so doing, the article also explores the logistical dimension of the prototype and innovation." 
    more » « less
  4. Between 2018 and 2020, dramatic changes in US-Mexico policy transformed experiences of asylum on the border. Quotas on applications at ports of entry (known as metering), the “Remain in Mexico” policy, and the deployment of the pandemic era “lockdown” through Title 42, each severely limited asylum opportunities. In response, a host of informal waiting lists emerged, developed and were utilized by a binational network of non-governmental and government agencies, shelters, cartels, and individuals. In this article we use a feminist geographic lens to examine the intimate geopolitics of esperar created by these lists. Via in-depth oral histories with Mexican asylum-seekers, shelter staff, legal advocates, and the wider border bureaucracy, we examine their formation, everyday management, the slow violences and immediate threats they posed, and their work as an informal technology of state control. Our analysis demonstrates how the lists operated as informal tactics of diversion and delay, producing a false sense of certainty while using indefinite waiting times as soft and surreptitious mechanisms to block displaced people’s legal claims for asylum. This imposed distinctly gendered burdens on women and youth. However, we also identify how the lists, where appropriated by migrants themselves, became tools to resist the hierarchies of the US nation-state and its territorial impositions. Our work extends established political geographic analyses of migration by attending to the interscalar, quotidian, and embodied realities of border practice – manifest amidst today’s lockdown by the slow violences of waiting. 
    more » « less
  5. Reusable symbolic evaluators are a key building block of solver-aided verification and synthesis tools. A reusable evaluator reduces the semantics of all paths in a program to logical constraints, and a client tool uses these constraints to formulate a satisfiability query that is discharged with SAT or SMT solvers. The correctness of the evaluator is critical to the soundness of the tool and the domain properties it aims to guarantee. Yet so far, the trust in these evaluators has been based on an ad-hoc foundation of testing and manual reasoning. This paper presents the first formal framework for reasoning about the behavior of reusable symbolic evaluators. We develop a new symbolic semantics for these evaluators that incorporates state merging. Symbolic evaluators use state merging to avoid path explosion and generate compact encodings. To accommodate a wide range of implementations, our semantics is parameterized by a symbolic factory, which abstracts away the details of merging and creation of symbolic values. The semantics targets a rich language that extends Core Scheme with assumptions and assertions, and thus supports branching, loops, and (first-class) procedures. The semantics is designed to support reusability, by guaranteeing two key properties: legality of the generated symbolic states, and the reducibility of symbolic evaluation to concrete evaluation. Legality makes it simpler for client tools to formulate queries, and reducibility enables testing of client tools on concrete inputs. We use the Lean theorem prover to mechanize our symbolic semantics, prove that it is sound and complete with respect to the concrete semantics, and prove that it guarantees legality and reducibility. To demonstrate the generality of our semantics, we develop Leanette, a reference evaluator written in Lean, and Rosette 4, an optimized evaluator written in Racket. We prove Leanette correct with respect to the semantics, and validate Rosette 4 against Leanette via solver-aided differential testing. To demonstrate the practicality of our approach, we port 16 published verification and synthesis tools from Rosette 3 to Rosette 4. Rosette 3 is an existing reusable evaluator that implements the classic merging semantics, adopted from bounded model checking. Rosette 4 replaces the semantic core of Rosette 3 but keeps its optimized symbolic factory. Our results show that Rosette 4 matches the performance of Rosette 3 across a wide range of benchmarks, while providing a cleaner interface that simplifies the implementation of client tools. 
    more » « less