Technologies of Suspicion and the Ethics of Obligation in Political Asylum

Technologies of Suspicion and the Ethics of Obligation in Political Asylum

Technologies of Suspicion and the Ethics of Obligation in Political Asylum Edited by Bridget M. Haas and Amy Shuman Technologies of Suspicion and the Ethics of Obligation in Political Asylum SERIES IN HUMAN SECURITY Series editors: Geoffrey Dabelko, Brandon Kendhammer, and Nukhet Sandal The Series in Human Security is published in association with Ohio University’s War and Peace Studies and African Studies programs at the Center for International Studies and the Environmental Studies Program at the Voinovich School of Leadership and Public Affairs. Technologies of Suspicion and the Ethics of Obligation in Political Asylum, edited by Bridget M. Haas and Amy Shuman Technologies of Suspicion and the Ethics of Obligation in Political Asylum Edited by BRIDGET M. HAAS AND AMY SHUMAN OHIO UNIVERSITY PRESS I ATHENS Ohio University Press, Athens, Ohio 45701 ohioswallow.com © 2019 by Ohio University Press All rights reserved To obtain permission to quote, reprint, or otherwise reproduce or distribute material from Ohio University Press publications, please contact our rights and permissions department at (740) 593-1154 or (740) 593-4536 (fax). Printed in the United States of America Ohio University Press books are printed on acid-free paper ƒ ™ 29 28 27 26 25 24 23 22 21 20 19 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data Names: Haas, Bridget M., editor. | Shuman, Amy, date, editor. Title: Technologies of suspicion and the ethics of obligation in political asylum / edited by Bridget M. Haas and Amy Shuman. Description: Athens, Ohio : Ohio University Press, 2019. | Series: Series in human security | Includes bibliographical references and index. Identifiers: LCCN 2018056335| ISBN 9780821423783 (hardback : alk. paper) | ISBN 9780821446676 (pdf) Subjects: LCSH: Political refugees--Government policy--Case studies. | Political refugees--Legal status, laws, etc.--Case studies. | Asylum, Right of--Case studies. | National security--Technological innovations--Case studies. | Immigration enforcement--Technological innovations--Case studies. | BISAC: POLITICAL SCIENCE / Political Freedom & Security / Human Rights. | SOCIAL SCIENCE / Anthropology / General. Classification: LCC JV6346 .T43 2019 | DDC 323.6/31--dc23 LC record available at https://lccn.loc.gov/2018056335 Contents Acknowledgments vii Introduction Negotiating Suspicion, Obligation, and Security in Contemporary Political Asylum Regimes Bridget M. Haas and Amy Shuman 1 PART I: ASYLUM AND PROTECTION AS CONTESTED CATEGORIES Chapter 1 Troubling the Ethics of Durable Solutions in the Age of Suspicion Iraq War Refugees and the Politics of Obligation Nadia El-Shaarawi 29 Chapter 2 Geographies of Aspiration and the Politics of Suspicion in the Context of Border Control Charles Watters 47 Chapter 3 A “Politics of Protection” Aimed at Mayan Immigrants in the United States John B. Haviland 61 PART II: TECHNOLOGIES OF SUSPICION Chapter 4 Asylum Officers, Suspicion, and the Ambivalent Enactment of Technologies of Truth Bridget M. Haas 105 Chapter 5 Country of Origin Information, Technologies of Suspicion, and the Erasure of the Supernatural in African Refugee Claims Benjamin N. Lawrance 129 v vi Contents Chapter 6 The Digitalization of the Asylum Process (and the Digitizing of Evidence) Marco Jacquemet 153 PART III: ENACTING AND NAVIGATING SUSPICION Chapter 7 Mixed Migration and the Humanitarian Encounter Sub-Saharan Asylum Seekers in Israel Ilil Benjamin 177 Chapter 8 Transgendered Asylum and Gendered Fears in US Asylum Law and Politics Sara L. McKinnon 206 Chapter 9 “And Suddenly I Became A Lesbian!” Performing Lesbian Identity in the Political Asylum Process Rachel A. Lewis 225 Chapter 10 Political Asylum Narratives and the Construction of Suspicious Subjects Amy Shuman and Carol Bohmer 245 Conclusion Amy Shuman and Bridget M. Haas 265 Contributors 275 Index 279 Acknowledgments The idea for this volume started to take shape when we, the editors of this volume, organized a panel, “Asylum and Politics of Suspicion,” for the 2014 American Anthropological Association (AAA) conference in Washington, DC. Several of the contributors to this volume presented papers at the panel or served as discussants. Thanks to Heath Cabot for chairing that panel and for her insights and important contributions to that discussion. Following the AAA panel, we received funding from the Wenner-Gren Foundation and the Mershon Center for International Security Studies at the Ohio State University (OSU) to hold a day-and-a-half workshop on Asylum and the Politics of Suspicion in March 2015 at OSU. We thank the Wenner-Gren Foundation and Richard Herrmann, director of the Mershon Center, for their generous support, without which the workshop would not have been possible. We would like to also thank Nick Spitulski, program coordinator at OSU, for his outstanding job handling the logistics of the workshop, arrang- ing transportation, lodging, and meals for the group. The OSU workshop brought together participants of the earlier AAA panel as well as additional scholars doing important work on political asylum. The papers presented at that workshop were revised and crafted into the essays you see in this volume. We would like to thank the contributors who participated in the origi- nal workshop and contributed their essays to this volume. The depth and breadth of intellectual work represented in these pages is impressive, and we are very fortunate to be able to include their work together in this book. We would like to thank the editors and staff at Ohio University Press / Swallow Press, including the editors of the Series in Human Security: Geoffrey Dabelko, Brandon Kendhammer, and Nukhet Sandal; and man- aging editor Nancy Basmajian. Thank you to copyeditor Don McKeon for his excellent work. We would particularly like to thank Rick Huard at Ohio University Press, who has guided this project toward completion. The edi- tors and authors of the volume would like to thank two anonymous review- ers, whose thoughtful and valuable feedback strengthened the individual chapters and the book as a whole. vii Introduction Negotiating Suspicion, Obligation, and Security in Contemporary Political Asylum Regimes BRIDGET M. HAAS AND AMY SHUMAN Asylum seekers are increasingly the focus of global debates surrounding humanitarian obligations on the one hand and concerns sur- rounding security and border control on the other. Asylum seekers are at turns portrayed as innocent victims in need of humanitarian protection and as “queue jumpers” or threats to the body of the host nation. Recent coverage of the European migration crisis illustrates these competing representations of asylum seekers. On September 2, 2015, newspapers across the globe carried the sober- ing image of the lifeless body of Alan Kurdi, a three-year-old Syrian boy who had washed up on a beach in Turkey. He, along with his mother and two siblings, had died fleeing their homeland in search of safety in the European Union (EU). This incident served to reframe the narrative of the migrant crisis that had started earlier that year and had reached immense proportions by this time. The view of migrants, and Syrian ones in particular, began to shift from suspicious Other or potential terrorist to humanitarian victim. 1 2 Bridget M. Haas and Amy Shuman If coverage of Kurdi’s death represented a shift in the narrative of the mi- grant crisis, it was short-lived. On November 13, 2015, a series of coordinated terrorist attacks in Paris transfixed the world. It was soon revealed that one of the terrorists held a fake Syrian passport and had entered France through the migrant trail that flowed from the Middle East, passing through Greece, Macedonia, and Serbia and into Western Europe. The global response to the Paris terrorist attacks was swift: borders closed and the processing of refugees was slowed or temporarily ceased at EU countries’ borders. The shifting public narratives and policy responses concerning the EU migrant crisis represent a new iteration of tensions between humani- tarian ethics and security concerns that are generated by international mi- gration. This tension between humanitarian obligations and the security of the state have been evident since the inception of international refugee policy, though events such as the 2001 terrorist attacks on the World Trade Center and the November 13, 2015, attacks in Paris bring these tensions to the fore, as they are acutely experienced and debated. Indeed, in a post-9/11 landscape (and now reinvigorated after 11/13), volatile debates have taken place pitting humanitarian ethics against notions of security and border control.1 To be sure, at the time of completing this introductory chapter, US president Donald Trump issued an executive order barring refugees and immigrants from seven predominantly Muslim countries from entering the United States. The travel ban, quickly dubbed a “Muslim ban” by media and opponents of the measure, was soon met with widespread protests and legal challenges across the country. Months later, in October 2017, Trump laid out a new immigration strategy that focused on overhauling the US asylum system, including narrowing the standards required to gain asylum and im- posing penalties on asylum seekers who file claims deemed to be “fraudulent.” The strong divisiveness of the debate surrounding these measures speaks to the enduring and entrenched nature of the tensions between humanitarian obligations and concerns over national security. The “paradoxical preoccupation with globalization and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    295 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us