Homeland Security Article Review

Total Length: 2038 words ( 7 double-spaced pages)

Total Sources: 6

Page 1 of 7

Pat Proctor of Kansas State University was published in the peer-Reviewed Journal of Strategic Security in 2012.

The point of this article is not so much posing a question but presenting a proposal. The proposal is directed at the United States, suggesting in strong terms how the United States (and presumably its allies) could and should engage in "…mass politics" which Proctor calls "war without violence" (Proctor, 2012, 47). The theme of the article is the remarkable transformation that has taken place in Arab countries (called the "Arab Spring") such as Egypt, Tunisia, Syria, Libya and elsewhere in the Middle East.

The hypothesis / thesis and central argument is very clearly stated in this piece. The thesis is that the United States needs a new strategy for persuading the Muslim world "…to reject the salafist jihadism idea" without further exacerbating the tensions that already exist between the West and the Muslim world (Proctor, 48). This thesis is based on the fact that subsequent to September 11, 2001, the United States (under the administration of George W. Bush) launched a "War on Terror" and yet ten years later the "war" has not been won, and in fact albeit the U.S. has killed a number of leaders in the jihadist movement (including bin Laden), American can't kill every radical Islamic militant that wants to bring death to the West.

"The United States has failed to eradicate the threat of salafist jihadism," Proctor explains on page 48. Notwithstanding the West's rhetoric against terrorism, it would be impossible for the U.S. To "…kill its way to victory in this war" because there is "…simply no government to force to capitulate"; e.g., the terrorists are mobile and not affiliated with any state, per se (Proctor, 48).

In defining what the "Salafist Jihadism" is, Proctor actually gives some good examples of why many Muslims are angry at the West, in particular younger men that are perhaps struggling to make a good living and are influenced by the radical, hateful rhetoric of Islamic radicals. On page 49 Proctor explains that the "…great powers of Europe ultimately carved up and colonized the Arab world" in the late 19th century and into the 20th century. During the British domination of Sudan in the late 19th century the word "ista'mar" emerged among Muslims; it meant "to colonize" or "to exploit" (Proctor, 49).

After World War I the West seized and exploited Arab territories (Iran, Iraq, among others) and that bitterness continues today against the West. Many young Muslims have rebelled against their governments (this relates to the Arab Spring) because they see their governments are backed by Western power, military weapons and money. And when the Soviet Union invaded Afghanistan in 1979, the "salafism" continued under bin Laden. What is salafism? Proctor writes (51) that it is an ideology, "…an idea that has mobilized a global movement," a movement the U.S. cannot defeat because "…an idea can only be defeated by another idea," not by weapons, whether they be drone aircraft shooting missiles or automatic rifles carried by soldiers in Afghanistan (Proctor, 51).

Jihadism and the Salafi Jihad

Professor David Cook with Rice University (writing in the peer-reviewed Totalitarian Movements and Political Religions) explains the Jihad as having three categories, based on the original definitions in the Qur'an. There is the jihad of the hand (or the sword), "…which is military in nature," Cook explains (Cook, 2009, p. 178). There is jihad "..of the tongue, which involved the reproof of an unjust ruler or corrupt society"; and the third jihad was jihad "…of the soul, developed mostly by the Sufis"; this jihad involved waging an "internal struggle against one's lower soul" (Cook, 178). In time jihad has become used by militants to describe the targets they wish to kill; jihad can mean "…beheading, kidnapping and the mutilation of bodies" (Cook, 185). So basically extremist Muslims have grabbed a phrase from the Qur'an and turned it into a phrase that identifies enemies to be attacked and killed -- like the U.S. And the UK.

As to Salafi Jihad, Assaf Moghadam explains in a blog on the Harvard University website that it is an "ideology" (Proctor calls it an "idea") (Moghadam, 2008, p. 1). The Salafi Jihad "…identifies the alleged source of the Muslims' conundrum in the persistent attacks and humiliation of Muslims" that took place during the Crusades (Moghadam, p. 1). Moreover, Moghadam explains that Salafi Jihadists "…present a program of action, namely jihad, which is understood in military terms" (p. 2).

Salafi jihadists believe that jihad will "…reverse the tide of history and redeem adherents of Salafi-Jihadist ideology from their misery" and martyrdom is held up high as the "…ultimate way in which jihad can be waged" and hence the justification for the bloody suicide attacks against the West.
Salafi jihadists also "…openly justify the killing of civilians, including Muslims, under a logic of the ends justifying the means" (Moghadam, p. 3).

FOUR: Is what the author (Proctor) has presented worthy narrative and believable? Yes Proctor has hit the nail on the head when it comes to a strategy that would work better for the United States than trying to identify the leaders of militant Islam and try to kill them. For example on pages 51-52 the author points out that the regimes that have been overthrown in the Arab Spring offers an opportunity "…to build national anti-salafist jihadist movements -- with influence -- within the government, the media, and the people of their respective countries."

The U.S. government could help foster these new national movements in the countries where dictators have been thrown out of office. In Egypt, or Tunisia, or Libya, Proctor continues (52), the U.S. could use diplomatic and intelligence to identify and contact the individuals who are leading anti-salafist jihadist movements. And once contacted, the U.S. could use "…a combination of money and preferred access to U.S. representatives and business opportunities" in order to empower these people (Proctor, 52). Actually, the U.S. intelligence community may well already be doing what Proctor suggests albeit that is not known publicly right now.

FIVE: The study is not unique other than it is very recent and it embraces the problem that the U.S. And the West faces vis-a-vis the "war on terror" which is unwinnable. There are myriad scholarly articles available that relate to the West and the angst felt by Muslims due to the history of the repression that Muslim countries have endured because of the West.

SIX: the main points in this article are: a) the U.S. cannot "…kill its way to victory in the war on terrorism"; b) the Arab Spring has shown that Muslim citizens by the millions have risen up against oppressive regimes -- against horrific odds in some cases -- and forced political changes; c) the real enemy that the West defines as "terrorist" is related to salafist jihadism; it is an idea, or an ideology, depending on which author defines it, but it will not be easy to kill because you can't kill an idea with weapons and violence; d) understanding salafist jihadism is the first step to coming to terms with it, and many in the West have no clue what salafist jihadism really represents; and e) there are ways that the West could infiltrate these Arab Spring nations and find anti-salafist jihadism leaders, support them, encourage them and show them that the U.S. basically has good intentions.

SEVEN: Proctor does not reference literature to any great degree. He references the Qur'an and a book ("Signposts along the Road") by Sayyid Qutb, but basically he presents Middle Eastern history and the history of the Islamic radicalism that pertains to the terrorist attacks on the U.S. And other Western nations.

EIGHT: The author in this article does a fine job of presenting the material; it is more narrative-based than based on data but he deftly explains the realities in the Middle East in terms of the total failure of the U.S. To bring an end to the terrorism. There will always be new young militant leaders to rise up when the American drone planes kill existing militants in leadership position. So the point is, win the war without violence; that is, the U.S. should see the opportunity now to become friendly and supportive with the citizens in Egypt, Libya and other nations where the Arab Spring took place; especially the citizens that are opposed to the continuing use of violence, suicide attacks and are interested in an anti-salafist jihad movement.

NINE: There are variables discussed in Proctor's article. For example the salafist jihadism is not a regional problem, rather it is an "…international political problem" specifically because: a) it "…empowers the movement, al-Qaeda, to act as a destructive independent, non-state actor on the international stage"; b) it provokes a "violent response from the West. Salafist Jihadism is a "social problem" because "…it fosters a violent, nihilistic, clandestine subculture that threatens social order both inside and outside the Muslim world" (Proctor,….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Homeland Security and the Distinction Between ISR and IAA

and reconnaissance have capabilities that are aimed at improving the informational and situation awareness to the department of homeland security. The capabilities of ISR have increased in demand since the incident of Hurricane Katrina. The same capabilities of ISR are the ones that are termed Incident Awareness and Assessment (IAA). The Incident Awareness and Assessment (IAA) capabilities have been leveraged to respond to various kinds of threats such as hurricanes, wildfires or even ocean oil spill. The ISR has the capability to provide invaluable situational awareness from various intelligence disciplines. The intelligence can be in the form of signals or imagery to the military commanders. Improved ISR provides… Continue Reading...

Private Security and Homeland Security

Private Security Trends and Movements Private security plays such a significant role in the efforts of the Department of Homeland Security (DHS) that the DHS published in 2010 a Private Sector Resources Catalog that “centralizes access to all DHS resources targeted for the private sector including small and large businesses, academia, trade associations, and other non-governmental organizations” (DHS, 2018). One example of a private security firm within the catalog is TRIPwire Community Gateway (TWCG)—“a web portal designed specifically for the nation’s CIKR owners, operators, and private security personnel.” The TWCG serves as a portal for private security groups to give analysis of threats, reports, and planning phases, helping private… Continue Reading...

Ethics and Technology at Homeland Security

Ethical Considerations for the Use of Technology to Meet Selected Homeland Security Objectives Introduction The Digital Age has transformed the way the world works for better or worse. Technology exists to bring down nations’ infrastructures without ever firing a missile (Ten, Manimaran & Liu, 2010). New technology has been developed that can allow agencies to spy, snoop, monitor, and retrieve conversations had online, through email, on cell phones, or via text messaging. To meet security needs, using this technology has very real and practical advantages. At the same time, there are privacy rules and regulations that have to be considered… Continue Reading...

Strategies to Improve Collaboration and Cooperation Between the Homeland Security Agencies

Strategies to improve collaboration and cooperation between the Homeland Security agencies The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland Security Review) was completed in the year 2010 with an objective of establishing an incorporated strategy for the goals and missions of homeland security (Homeland Security, 2005). Following this, DHS carried out a BUR (Bottom up Review). The objective was… Continue Reading...

Fema Dhs and Emergency Management at Local Levels

role of state agencies is “to supplement local efforts before, during, and after incidents,” (United States Department of Homeland Security, 2008, p. 6). States in many ways play the least visible role in emergency management, often working as liaisons between local governments requesting additional support and the federal government needing more information about the situation. Not all incidents require state or federal intervention and assistance, and city councils should not be concerned about losing control. Compliance with the Incident Command System (ICS) helps to unify disparate organizations involved in emergency response, ensuring interoperability. According to the Department of Homeland Security (2016), emergency response is tiered even though the… Continue Reading...

Port Security Customs and Border Protection

Port Security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated with an objective of preventing illegal drugs, mass destruction weapons and contraband… Continue Reading...

National Security Impact of Immigration Policy

homeland security department incorporated an Immigration and Naturalization Service, thereby institutionalizing migration as an internal security threat. Numerous experts advocate for restrictions in migration policy for defending internal security within the destination country. Therefore, the ideal means to shut out undesirable persons from other countries would be: decreasing the nation’s yearly migrant intake. Immigration and Public Security Akin to migration’s link to terrorism,… Continue Reading...

Critical Infrastructure Security Information Technology

Synopsis Because the majority of critical infrastructure components in the United States are privately owned, compliance with Department of Homeland Security risk assessment methods remains voluntary. Risk assessments of critical infrastructure focus on threat, vulnerability, and consequences, with all types of assessments integral to helping improve resilience and mitigate problems (GAO, 2017). A vulnerability analysis of the nation’s information technology critical infrastructure reveals several points of weakness and security gaps. The Department of Homeland Security (2018) infrastructure survey tool can be used alongside the systems dynamics approach to vulnerability assessment. These tools reveal the inherent strengths of complex, interdependent information technology systems, while also revealing the potential weaknesses in… Continue Reading...

Safety and Spills Prevention

DHS and Plainsville In order to comply with the priorities handed down through Department of Homeland Security (DHS) Grant Programs and state mandates, Plainsville, Colorado, must address the situation of its critical rail line running through its community. The rail line is crucial for industrial use in manufacturing a hazardous material that is not manufactured anywhere else. However, the rail line is two centuries old and in need of repair. To assess the issues and risks at hand, the city has been tasked with bringing a committee of experts together that can share information on a range of issues, including: the integrity of the rail… Continue Reading...

The US Grant Programs for Emergencies

Department of Homeland Security Grants The HSGP (Homeland Security Grant Program) for the fiscal year 2017 contributes significantly to NPS (National Preparedness System) implementation through promoting the creation, delivery and sustenance of key capabilities vital to the achievement of America’s NPG (National Preparedness Goal) geared at improving its security and resilience. The provision of key capabilities necessitates integrated community-wide efforts and not the sole, independent endeavors of a particular governmental level or agency. HSGP’s allowable expenses foster attempts at developing and sustaining key capabilities over the Protection, Prevention, Mitigation, Recovery and Response… Continue Reading...

Counter Terrorism Community Policing and Changes

September 11, local law enforcement like Javier's department became more responsible for participating in and ensuring homeland security. While the role of police in homeland security might seem natural or obvious, diverting the attention and resources of police towards the federal concerns of homeland security can have some detrimental outcomes. One of the most important changes Javier noticed was the breakdown in the community policing model that the department had worked so hard to establish. Focusing more on counterterrorism efforts than on building relationships with community members damages the relationships between police and members of the community in serious ways. Police officers are expected to become… Continue Reading...

National Infrastructure Protection Plan NIPP

NIPP (National Infrastructure Protection Plan) The NIPP was drafted in the year 2006 by the DHS (Department of Homeland Security). The Plan was part of Presidential Directive 7 for Homeland Security and it was developed to boost security, and resilience and to help secure critical infrastructures from security threats. The plan included a thorough risk management guideline and defined the roles and responsibilities of the DHS with regards to CIP (Critical Infrastructure Protection). Included in the guideline were also the roles and responsibilities of the federal government, state governments, local governments, tribal governments, federal agencies, and private actors towards CIP in their jurisdictions. CIP is important for overall… Continue Reading...

Court Process, Judicial Process, and Constitutional Issues

9/11 terror attacks was characterized by enactment of new laws and executive orders that focused on enhancing homeland security. However, these laws and orders have become controversial because they have ceded power to the executive branch and limited people's rights. Some examples of these limitations include restrictions on privacy, limitation of free speech and association rights, and limitation of religious freedom. While these actions were necessary to help prevent another attack, they are inappropriate since they compromise civil rights and checks and balances established in America's democracy. The federal government would have taken less drastic measures through reordering priorities of law enforcement instead of generating fundamental changes… Continue Reading...

Improving Collaboration Between Agencies

became apparent that dealing with these vices is relevant and should not be taken lightly. One year following the assaults, the Homeland Security Act of 2002 initiated the central Department of Homeland Security. This led to a ripple effect in numerous regions which developed individual divisions focused on safe keeping the motherland as well as handling crisis. There was complete overhaul in the already existing divisions in order to meet the novel standards (Bush, 2002). Handling crisis is imperative. Federal regions are mandated to address the shift in weather conditions which have led to adverse regular climatic conditions. The 50 regions as well as the entire nation have to contend with… Continue Reading...

The Importance of Communications As a Critical Infrastructure

Published by the Department of Homeland Security (DHS) in 2003, authored by President George W. Bush, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets is the first document of its kind. After September 11 and the creation of the DHS, swift action was taken to synergize national security efforts and interests. The National Strategy redefines the meaning and definition of critical infrastructure and key assets, offering guidance to individual sectors for risk management, risk mitigation, information sharing, and more (Erbschloe, 2004). Moreover, the National Strategy takes into account the diversity… Continue Reading...

Emergency Response Crisis Management and CERT

for effective emergency management. Homeland Security CERT plays an integral role in the maintenance of homeland security objectives. Homeland security refers to the protection of national borders, the promotion of community resilience to withstand crises including natural disasters and terrorist attacks, and the prevention or response to other crises such as cyberattacks. Because so many emergencies are localized, it is critical that local service providers engage with federal agencies that coordinate responses. The Department of Homeland Security (2018) is the presiding federal agency that can provide resources and information to CERT organizations. Business Continuity… Continue Reading...

The Active Shooter Crisis in America

in widespread use since the 1999 Columbine school massacre (Fox and Levin 8). Criminal justice agencies and the Department of Homeland Security differentiate active shooters from both mass shooters and domestic terrorists, although these all may share methods and tactics in common. An active shooter is defined as “an individual actively engaged in killing or attempting to kill people in a confined and populated area,” but with no apparent pattern or logic in their means of targeting victims (United States Department of Homeland Security 2). Active shooters are “active” because they will continue to kill as long as they have access to victims, which makes quick responses critical to saving… Continue Reading...

Public Administration Government and Interagency Relationships

example of mandatory interagency partnerships is in the realm of homeland security. Prior to the creation of the Department of Homeland Security, interagency partnerships existed but tended to be loose and often ineffective (Hagen, 2006). The Department of Homeland Security created a new model of interagency partnership that enhanced the effectiveness and scope of the homeland security enterprise, taking into account multiple disparate stakeholders (Marcella, 2004). Interagency partnerships also flourish in law enforcement and criminal justice, as with the Organized Crime and Drug Enforcement Task Forces (United States Department of Justice, 2017). Rescue, relief, and emergency management also highlights the… Continue Reading...

What is Critical Infrastructure

It encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and water filtration plants; national monuments and government facilities; telecommunications and transportation systems; chemical facilities” (“CIKR,” 2009, par.1). Although the majority of CIKR is privately owned, according to DHS, the government still has a vital protective role to ensure it works correctly. Cybersecurity Although the Internet was… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Homeland Security" (2012, August 22) Retrieved May 12, 2024, from
https://www.aceyourpaper.com/essays/homeland-security-75262

Latest MLA Format (8th edition)

Copy Reference
"Homeland Security" 22 August 2012. Web.12 May. 2024. <
https://www.aceyourpaper.com/essays/homeland-security-75262>

Latest Chicago Format (16th edition)

Copy Reference
"Homeland Security", 22 August 2012, Accessed.12 May. 2024,
https://www.aceyourpaper.com/essays/homeland-security-75262