SlideShare a Scribd company logo
1 of 3
****REPLY TO EACH POST 100 WORDS MIN EACH**** 1. This
****REPLY TO EACH POST 100 WORDS MIN EACH****1. This week I’m going to be
addressing the suicide attack on the USS Cole by bombers affiliated with al Qaeda. To
answer the first part of the question posed, the attack was most certainly terrorism and for
a number of reasons that are related to the use of an IED against a warship.First, because of
the involvement of senior al Qaeda operatives in the plotting and facilitation phases of the
attack we can draw the conclusion that the terror organization committed this attack to
further their political goals in forcing the US to withdraw from the Middle East, a long
standing goal of the organization back in the last 90s and early 00s. The operatives that did
not die in the resulting bombing were quickly apprehended and confessed to working with
al Qaeda plotters associated with Osama bin Laden, an opponent of the US at the time and
one behind a number of plots including the eventual 9/11 attacks.The resulting
investigation by the US and Yemeni law enforcement revealed much of this information in a
timely and effective manner, despite several roadblocks to the investigation. The resulting
retaliation that President Clinton promised never materialized however and that didn’t sit
well with many in his administration. Additionally, the lack of retaliation may have
emboldened existing al Qaeda cells within the country and allowed them to grow in size and
strength to become the organization that would eventually aid in the downfall of the current
Yemeni government.2. This week I chose to respond to question number one; was the Oct.
2000 attack on the Yemen-stationed USS Cole considered terrorism? In short, yes, the
October 12, 2000, attack on the USS Cole was an act of terrorism. This attack was
considered Al Qaeda in Yemen (AQY) first large scale attack and provided a foreshadowing
capability of event to come prior to the New York City September 11th, 2001,
attack. Prior to this attack, AQY, was not a cohesive element and was constructed of
several smaller organizations operating in Yemen. According to CISC, in the early 1990s,
Usama Bin Laden (UBL) funded several elements in Yemen to conduct terrorist activities
however, the Yemeni’s were able to effectively control these entities. In the late 1990s a
group known as the Army of Aden Abyan (AAA), was considered the predecessor of AQY.
Upon AAA’s demise, AQY was formed, and the USS Cole was their initiation
attack. This US and Yemeni response to this attack was handled incorrectly. The US
did not respond in a correct fashion, despite President Clinton stating, “You will not find a
safe harbor” (Isikoff, 2010). According to a 2010 PBS interview, the Yemeni policy for
counterterrorism (CT) operations is handled at the tribal level and is exacerbated by a
Yemeni understanding; success at CT equals less US support. This lack of full force Yemeni
response, and limited US involvement has allowed AQY to develop into AQ in the Arabian
Peninsula (AQAP), which formed in 2009, and is active today. 3. Becoming radicalized
doesn’t happen within a flip of a switch. It is a process that goes through a multitude of
steps and takes time. In the process, taking human life can be part of the process.
Throughout the models, data was thorough analyzed to compliment the evidence. Using all
the ideas that were produced by the resources provided, similarities can be seen. Therefore,
radicalization should really be viewed as a complex process comprised of behavioral,
psychological, economic, social, and political and personal factors that can lead to
extremism. With a combination of Moghaddam’s staircase to terrorism, Sageman’s four
prongs, and Borums pathway have some similarities.The metamorphosis progresses when
an individual is exposed to different internal and external influences that all contribute to
the overall process of radicalization. Individuals have a driven force that may consist of
fantasies, ruminations on revenge and justice or a sense of entitlement, just to mention a
few. Instead of determining a legitimate source of deprivation, individuals, or groups
displace their anger to an external enemy or another group, believing that group is the
source of the deprivation or injustices they are faced with. The group is ascribed negative
stereotypes in order to maximize the difference between the deprives group(s). Violence is
increasingly viewed as a legitimate means of fighting injustices against a targeted group as
an us vs them or good vs evil.I found the Borum’s Pathway to be the most applicable as it is
the most general and to be applied to a much wider variety of radicalization cases. In this
model, individuals perceive their circumstances as undesirable and unfair, targets an
outgroup, and vilifies that outgroup as the root of all perceived problems. This can not only
be easily applied to instances of those who engage in terrorism but can be applied to
general extremist groups that are not influenced by terrorist ideology, such as domestic
extremist groups. 4. The general process that an individual goes through as they become
extremists, is not something that happens overnight. There are different stages that can lead
an individual whom is a law abiding citizen to becoming an extremists. Some factors that
can lead to radicalization are grievances, networks, ideologies, and support structures and
enabling environments. One model that can describe one of these factors is the Borum’s
Pathway. The Borum’s pathway can be used from the factor of ideology. The Borum’s
Pathway has four stages which are as followed: it’s not right- the individual is the one
making a judgement on the issue. It’s not fair, the individual decides to compare the issue to
other issues and determines inequality. It’s your fault, the individual has targeted an
outgroup to be responsible for the issues. Finally. the individual applies the negative
stereotypes and applies them to the entire group. Another model that can describe an
individual gradually becoming an extremists is the “Staircase to Terrorism” by Moghaddam.
This model uses six stages that will describe an individual becoming an extremist begins
with pointing the feeling of deprivation as an initial factor, second stage will be social
mobility and procedural justice, third stage the individual begins to focus on the target,
fourth stage they begin to justify terrorism, fifth stage the individual joins an actual terrorist
group, and finally the last stage the individual will commit the act of terrorism. The model
that I find most useful or applicable would be the Borum’s Pathway. The reason why I chose
the Borum’s Pathway is because when we research why an individual would become a
terrorist or extremist we go through their past. After analyzing an individuals past you can
see the stages form in front of your eyes. For example, an individual is a victim that occurs
by another group, that individual believes it is not right that something happened to them.
The individual then does not receive justice and they determine it’s not fair. Then, the
individual sees a group of people and places blame on that group of people because what
has happened to them. Finally, the individual begins to believe the negative stereotypes of
that group as a whole and becomes violent to the group to receive justice.

More Related Content

More from write31

Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 
Variations in Approaches to Care Choose a specific culture or.docx
Variations in Approaches to Care Choose a specific culture or.docxVariations in Approaches to Care Choose a specific culture or.docx
Variations in Approaches to Care Choose a specific culture or.docxwrite31
 
Using the Maximizing the Learning of All.docx
Using the Maximizing the Learning of All.docxUsing the Maximizing the Learning of All.docx
Using the Maximizing the Learning of All.docxwrite31
 
To Reflect on the Resources related to digital information.docx
To Reflect on the Resources related to digital information.docxTo Reflect on the Resources related to digital information.docx
To Reflect on the Resources related to digital information.docxwrite31
 

More from write31 (20)

Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 
Variations in Approaches to Care Choose a specific culture or.docx
Variations in Approaches to Care Choose a specific culture or.docxVariations in Approaches to Care Choose a specific culture or.docx
Variations in Approaches to Care Choose a specific culture or.docx
 
Using the Maximizing the Learning of All.docx
Using the Maximizing the Learning of All.docxUsing the Maximizing the Learning of All.docx
Using the Maximizing the Learning of All.docx
 
To Reflect on the Resources related to digital information.docx
To Reflect on the Resources related to digital information.docxTo Reflect on the Resources related to digital information.docx
To Reflect on the Resources related to digital information.docx
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

TO EACH POST 100 WORDS MIN This.docx

  • 1. ****REPLY TO EACH POST 100 WORDS MIN EACH**** 1. This ****REPLY TO EACH POST 100 WORDS MIN EACH****1. This week I’m going to be addressing the suicide attack on the USS Cole by bombers affiliated with al Qaeda. To answer the first part of the question posed, the attack was most certainly terrorism and for a number of reasons that are related to the use of an IED against a warship.First, because of the involvement of senior al Qaeda operatives in the plotting and facilitation phases of the attack we can draw the conclusion that the terror organization committed this attack to further their political goals in forcing the US to withdraw from the Middle East, a long standing goal of the organization back in the last 90s and early 00s. The operatives that did not die in the resulting bombing were quickly apprehended and confessed to working with al Qaeda plotters associated with Osama bin Laden, an opponent of the US at the time and one behind a number of plots including the eventual 9/11 attacks.The resulting investigation by the US and Yemeni law enforcement revealed much of this information in a timely and effective manner, despite several roadblocks to the investigation. The resulting retaliation that President Clinton promised never materialized however and that didn’t sit well with many in his administration. Additionally, the lack of retaliation may have emboldened existing al Qaeda cells within the country and allowed them to grow in size and strength to become the organization that would eventually aid in the downfall of the current Yemeni government.2. This week I chose to respond to question number one; was the Oct. 2000 attack on the Yemen-stationed USS Cole considered terrorism? In short, yes, the October 12, 2000, attack on the USS Cole was an act of terrorism. This attack was considered Al Qaeda in Yemen (AQY) first large scale attack and provided a foreshadowing capability of event to come prior to the New York City September 11th, 2001, attack. Prior to this attack, AQY, was not a cohesive element and was constructed of several smaller organizations operating in Yemen. According to CISC, in the early 1990s, Usama Bin Laden (UBL) funded several elements in Yemen to conduct terrorist activities however, the Yemeni’s were able to effectively control these entities. In the late 1990s a group known as the Army of Aden Abyan (AAA), was considered the predecessor of AQY. Upon AAA’s demise, AQY was formed, and the USS Cole was their initiation attack. This US and Yemeni response to this attack was handled incorrectly. The US did not respond in a correct fashion, despite President Clinton stating, “You will not find a safe harbor” (Isikoff, 2010). According to a 2010 PBS interview, the Yemeni policy for counterterrorism (CT) operations is handled at the tribal level and is exacerbated by a Yemeni understanding; success at CT equals less US support. This lack of full force Yemeni
  • 2. response, and limited US involvement has allowed AQY to develop into AQ in the Arabian Peninsula (AQAP), which formed in 2009, and is active today. 3. Becoming radicalized doesn’t happen within a flip of a switch. It is a process that goes through a multitude of steps and takes time. In the process, taking human life can be part of the process. Throughout the models, data was thorough analyzed to compliment the evidence. Using all the ideas that were produced by the resources provided, similarities can be seen. Therefore, radicalization should really be viewed as a complex process comprised of behavioral, psychological, economic, social, and political and personal factors that can lead to extremism. With a combination of Moghaddam’s staircase to terrorism, Sageman’s four prongs, and Borums pathway have some similarities.The metamorphosis progresses when an individual is exposed to different internal and external influences that all contribute to the overall process of radicalization. Individuals have a driven force that may consist of fantasies, ruminations on revenge and justice or a sense of entitlement, just to mention a few. Instead of determining a legitimate source of deprivation, individuals, or groups displace their anger to an external enemy or another group, believing that group is the source of the deprivation or injustices they are faced with. The group is ascribed negative stereotypes in order to maximize the difference between the deprives group(s). Violence is increasingly viewed as a legitimate means of fighting injustices against a targeted group as an us vs them or good vs evil.I found the Borum’s Pathway to be the most applicable as it is the most general and to be applied to a much wider variety of radicalization cases. In this model, individuals perceive their circumstances as undesirable and unfair, targets an outgroup, and vilifies that outgroup as the root of all perceived problems. This can not only be easily applied to instances of those who engage in terrorism but can be applied to general extremist groups that are not influenced by terrorist ideology, such as domestic extremist groups. 4. The general process that an individual goes through as they become extremists, is not something that happens overnight. There are different stages that can lead an individual whom is a law abiding citizen to becoming an extremists. Some factors that can lead to radicalization are grievances, networks, ideologies, and support structures and enabling environments. One model that can describe one of these factors is the Borum’s Pathway. The Borum’s pathway can be used from the factor of ideology. The Borum’s Pathway has four stages which are as followed: it’s not right- the individual is the one making a judgement on the issue. It’s not fair, the individual decides to compare the issue to other issues and determines inequality. It’s your fault, the individual has targeted an outgroup to be responsible for the issues. Finally. the individual applies the negative stereotypes and applies them to the entire group. Another model that can describe an individual gradually becoming an extremists is the “Staircase to Terrorism” by Moghaddam. This model uses six stages that will describe an individual becoming an extremist begins with pointing the feeling of deprivation as an initial factor, second stage will be social mobility and procedural justice, third stage the individual begins to focus on the target, fourth stage they begin to justify terrorism, fifth stage the individual joins an actual terrorist group, and finally the last stage the individual will commit the act of terrorism. The model that I find most useful or applicable would be the Borum’s Pathway. The reason why I chose the Borum’s Pathway is because when we research why an individual would become a
  • 3. terrorist or extremist we go through their past. After analyzing an individuals past you can see the stages form in front of your eyes. For example, an individual is a victim that occurs by another group, that individual believes it is not right that something happened to them. The individual then does not receive justice and they determine it’s not fair. Then, the individual sees a group of people and places blame on that group of people because what has happened to them. Finally, the individual begins to believe the negative stereotypes of that group as a whole and becomes violent to the group to receive justice.