In: Economics
Please write 2 paragraphs about: Do retribution and intensive security measures stop terrorism?
Terrorists can escape protection by targeting soft targets, such as hard-to defend public places. It can be viewed that attackers have shifted towards softer targets as an indirect sign that the security is working. But it may also represent the increasing willingness of the terrorists to kill in quantity, which can most easily be achieved in crowded public places. Not all terrorist suspects are concerned about getting caught in the act, or just escaping. Also the organizational failures of the terrorists trigger fear which is the aim of terrorism.
Security is criticized by many but illusion is an important component of defense. The goal is to warn would-be attackers that they are going to fail. We prefer to focus on the prevention and identification. The most significant effect of defense, according to the proof, is deterrence. There are very few cases where terrorists on board airliners are found attempting to smuggle weapons or bombs. If deterrence works, it means fewer attempts but it's hard to count events that don't happen.
Terrorist acts are actions committed with the purpose of causing terror. Terrorist motive is a situation that heightens the penalty. And the penalty for a terrorist-intentioned crime would be higher than just the simple crime. This refers not only to individuals who are carrying out attacks, but also to those who are preparing an attack. Planning an attack or completing a training program for terrorists, for example, are both criminal offences.
Most states have improved security at airports and other transit
locations, for example by gathering passenger biometric data (such
as eye scans and fingerprints), photos, passport information and
the like.
States have long granted monitoring powers to their national
intelligence agencies, including wiretapping and the use of
tracking devices. In recent years, some States have expanded these
powers of surveillance substantially. Both of those activities
include collecting a person's knowledge. Consequently, they
restrict the privacy of these individuals and also pose concerns
about how to protect the data