Chapter 4 Undoredo the violent wall: border-crossing practices and multi-territoriality
Restricted access

Solis analyses the different ways of crossing the border and its effects on bordering processes between Mexico and the United States. She considers the Trump area as strengthening previous restrictive border polices within a network territory characterized by circularity, virtuality, instability and conflict operating under a global context, which is not about the end of the states but the dispute over hegemonic power, where the Nation-State becomes a strategic actor with new functions. Globalization entails then the “disassembly” of the nation states in territory, authority and rights, always within a capitalist logic that privileges capital. The chapter´s main idea is that contemporary multi-territoriality is recreated by different populations in this context, generating a heterogeneous and complex landscape that allows the border to be thought of as a mobile and flexible device, which is built on territorial violence but also by resistance and by confluence. There are many types of border crossing practices and experiences along the US-Mexico border, especially among residents in the region, which illustrate the complex nature of a border as both a point of contact and exchange as well as barrier and exclusion. Further, these varied practices and experiences lead to a wide range of subjective understandings and views of the border among the diverse types of crossers and residents. This heterogeneity of border crossing practices and subjectivities is very important to consider and is a good counter to both the common political view of the border as a security problem and crossers as threats as well as to the typical economic view of the border as zone of international trade and commercial exchange. Much of the public and many policy makers outside the region fail to keep in mind this vast volume of many different types of crossers and crossings (the overwhelming majority of which are legal), but instead sees them as some sort of threat through a lens of illegality.

You are not authenticated to view the full text of this chapter or article.

Access options

Get access to the full article by using one of the access options below.

Other access options

Redeem Token

Institutional Login

Log in with Open Athens, Shibboleth, or your institutional credentials

Login via Institutional Access

Personal login

Log in with your Elgar Online account

Login with you Elgar account