Question

In: History

Potential implication of attacks in USA

Discuss the potential costs of attacks (such as 9/11 or the Boston Marathon and even smaller attacks; notwithstanding the human losses) when the attacks are successful in the Homeland 

Solutions

Expert Solution

Attacks like the 9/11 attacks were as effective as a non-weapons-of-mass-destruction strike from the terrorists' perspective: the fall of the World Trade Center resulted in massive casualties and property damage for lightly equipped attackers. Nonetheless, the direct expenses did not significantly affect the US economy. The attack's potential costs are many. For instance, the cost of the 9/11 assault in terms of states, personal securities, and other personal possessions surpasses $2 trillion (Faria & Arce, 2021). Terrorist groups also bear the expense, with al-Qaida spending almost half a million dollars on the assaults on the World Trade Centers. Despite this, the losses and repairs cost the US government $3.3 trillion. In general, the potential cost of assaults in the United States is relatively large, always near to or above $1 trillion in most situations, and is a drag on the country's financial performance and stability.

Following the 9/11 attacks, there was a significant rise in defense spending and increases in some forms of foreign aid, and additional expenditure on newly categorized "homeland security" tasks. The Center for American Progress has established a handy category to group this expenditure. Estimates were presented as a percentage of GDP for fiscal years 2001 through 2004. These figures pointed to an increase in security spending of 1.3 or 1.4 percent of GDP, presumably over time. This is a considerable sum compared to the direct expenses of the 9/11 attacks. In any case, the significant, easily observable economic consequence of terrorism is the cost of defense and homeland security spending. This is also true in nations where the danger of terrorism is far more widespread (Hassapis et al., 2019). Terrorist attacks in Israel do so little direct harm that Eckstein and Tsiddon (2004) do not include them in their estimates. However, the second intifada was linked to an increase in defense spending percentage of GDP, from 9 percent to 12 percent.

                                                                 

                                                                 

 

 


Attacks like 9/11 were as effective as a non-weapons-of-mass-destruction strike from the terrorists' perspective.

Related Solutions

1. Interpreting Client Needs Determine your client’s needs and potential threats and attacks associated with their...
1. Interpreting Client Needs Determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Consider the following regarding how companies protect against external threats based on the scenario information: What is the value of secure communications to the company? Are there any international transactions that the company produces? Are there governmental restrictions about secure communications to consider? What external threats might be present now and in the immediate future? What are the “modernization”...
Examine the topic of mandatory paid parental leave in the USA. What potential economic and health...
Examine the topic of mandatory paid parental leave in the USA. What potential economic and health indicators could be expected if a federal law requiring paid leave were implemented? Provide examples from at least two countries that do provide this benefit, and also address how this leave is financed in other countries (government subsidy? covered by employers? a mix?)
Jessica launches a series of attacks to the website of her competitor, Susie’s Closet. The attacks...
Jessica launches a series of attacks to the website of her competitor, Susie’s Closet. The attacks slowed the website drastically, which lead to a dramatic drop in sales, $2,000 worth of damages in terms of lost work time, site repair cost, and other expenses. Jessica does not intend to profit from the attack and does not realize any financial benefit from the effects. How did Jessica most likely orchestrate this attack? Like Jessica, who is most likely to engage in...
Research buffer overflow attacks and develop a timeline of major attacks. Comment on why the buffer...
Research buffer overflow attacks and develop a timeline of major attacks. Comment on why the buffer overflow vulnerability still exists
"Legal implication of insider trading
"Legal implication of insider trading
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did...
Research on buffer overflow attacks. How do the various types of overflow attacks differ? When did they first start to occur? What can they do and not do? What must a programmer do to prevent a buffer overflow? Answer briefly in your own words.
workers implication on reduced working hours
workers implication on reduced working hours
What are the economic implication of COVID -19?
What are the economic implication of COVID -19?
The implication of resources being mobile domestically is that:
The implication of resources being mobile domestically is that:A) there is often unemployment.B) capital and land are often not suited for use in other industries.C) labor is paid the same wage and capital receives the same rental price in all domestic industries.D) they lose the chance to become guest workers in other nations.
Server-Side Attacks In today’s globally connected cyber community, network and OS level attacks are well defended...
Server-Side Attacks In today’s globally connected cyber community, network and OS level attacks are well defended through the proper deployment of technical security controls such as, firewalls, IDS, Data Loss Prevention, Endpoint and security. However, web servers are accessible from anywhere on the web, making them vulnerable to attack. 1. What is the process called that cleans and scrubs user input in order to prevent it from exploiting security holes by proactively modifying user input. 2. Name the process that...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT