Affiliation:
1. Northumbria University, UK
Abstract
The embedding of immigration checks into public institutions constitutes an integral part of contemporary bordering regimes. In this article, we situate recent changes to the UK’s internal borderscape in two parts of the public sector: higher education and health care. We argue that, analyzed from institutional perspectives, these changes reflect not only a dispersal and deterritorialization of the UK’s border regime, but also the emergence of specific relations between the government department responsible for this regime – the Home Office – and other parts of the public sector and its institutions. We maintain that these relations have developed into two main forms: the routinization of borderwork within public sector employees’ roles, drawing workers from across public institutions into relations with the Home Office and subordinating the needs of those institutions to the demands of the UK’s internalized border regime; and the establishment of information systems for datafication, to enable reporting and sharing data between public sector institutions and the Home Office, which are exploited for surveillance purposes. Such relations not only vulnerabilize public sector institutions by draining their resources and destabilizing institutional cultures, but also drive ongoing changes in the bureaucratic field of the state.
Funder
FP7 Socio-Economic Sciences and Humanities
Leverhulme Trust
Reference82 articles.
1. Blocked Paths, Uncertain Futures: The Postsecondary Education and Labor Market Prospects of Undocumented Latino Youth
2. Amoore L (2021) Political geography lecture: The deep border. In: RGS-IBG conference, London, UK [and online], 3 September.
3. Anonymous (2021) The Home Office is failing refugees. I’ve seen it from the inside. The Guardian, October 8. Available at: https://www.theguardian.com/commentisfree/2021/oct/08/home-office-refugees-asylum-claims-pressure-staff (accessed 8 October 2021).
4. Aradau C (2019) Politics of technoscience and (in)security. In: Salter MB, et al. (eds) Security Dialogue. Horizon Scan – Commentaries 50(4): 23–24.