Policy Analysis-The future of violence

In this book, many topics are addressed by the authors. A detailed policy analysis of three of the major topics that are covered in the book is carried out with the aim of showing how they relate to the overarching goal of the future of violence. The topics that are analyzed in this paper are based on the themes that are brought out throughout the different chapters of the book and at the same time their relationship to the primary objective (future of violence) is also addressed. Wittes and Blum (2015) are legal scholars who have the knowledge and skillset to expound and explore the revolutionary new technologies that are in place and the effect they have and will have on the safety of the world. Their book has the objective of exploring political as well as security threats that are contained in the new revolutionary technologies. Examples of technologies that are given are 3-D printers as well as drones. One of the highlights of the book is when the authors explain the different ways through which governments can adapt to the new forms of threats that are presented by these technologies. Regions such as the Middle East are affected by drone warfare (an example of the new form of technology) to digital spying that is being incorporated by the National Security Agency (Wittes & Blum, 2015). All the same, the book manages to show that there are different forms of threats as well as cutting-edge technologies that are enhancing the capabilities of many governments (particularly the United States government). Policy analysis of the following topics (modern threats, revolutionary new technologies, as well as security solutions to the threats) helps in enhancing understanding of the book and its overarching theme on the future of violence.
Modern Threats
Modern threats are highlighted by the book as one of its topics. The book addresses the different forms of security threats that come about with the adoption of revolutionary new technologies. There are different types of technologies that are being used in the development and advancement of cybertechnology and biotechnology. Robotics is field that has greatly benefitted from the new forms of technology. Wittes and Blum are quick to mention that there has been the threat of personalization of threats. In other terms, it was difficult in the past for people to come across potentially dangerous technologies such as drones and computer networks. Therefore, the threat is that such technologies are easily accessible as they are easy to develop and create. The effect has been that the numbers of drone attacks that are not sanctioned by the national governments are increasing. The number of people that are using these technologies for their selfish benefits has greatly increased, and as a result, the level of insecurity has gone up (Wittes & Blum, 2015). Looking at this particular form of threat, the authors make a lot of sense as they address many of the challenges that are facing the modern relating to insecurity. While it was difficult to come across threats that jeopardized the well-being of masses, this has changed as now anyone can be threatening to the public. Hence, personalization of threats that have been made easier with these revolutionary new technologies is a critical area. Looking at this particular issue from a policy level, it is fair to note that the book has the goal of creating awareness over the increased prevalence of threats that have been personalized by technology. Therefore, the relationship between this goal and the overarching objective of the book is that manages to show that the future of violence will evolve from mass organizations that are well-organized to individuals who have access to dangerous tools enabled by technology. Computer networks, for instance, can affect masses and massive public infrastructure and should not be easily accessed. Biological agents are also given as another form of threat. These different aspects of threats open one to the reality that society has become very vulnerable. On that note, policy analysis of such a threat (personalization of revolutionary new technologies) creates emphasis that this issue to be addressed. Wittes and Blum are right to recommend that the governing agencies of these technologies, as well as the government, have a great task ahead. In other terms, it will not be easier to manage access to these technologies considering that their manufacture has become less costly and less technical (Wittes & Blum, 2015). Many people now contain the skillset and the means through which they can develop and access them. All the same, the book effectively addresses this unique topic although there is the disadvantage of the authors failing to give research-based alternatives to addressing the challenges that arise. Wittes and Blum, through this topic, create awareness but fail to offer evidence-based and practical solutions to addressing the future of violence through the topic. Alternatives for the topic are policies that are enacted in the form of laws which will not only prevent access but make it illegal to possess types of technologies that can easily expose the public to harm. Apart from enacting such policies into laws, implementation and enforcement should follow. In doing so, there are likely to be considerable outcomes in reducing access to revolutionary and new technologies that threaten the lives of individuals.
National governments are harnessing cutting-edge technologies that they are using to develop security features which are at risk of being misused by the same administrations. In the case of the United States (for example), the authors explain that there has been the using of advanced technicalities in cybertechnology to allow digital spying. The usefulness of this example is that it shows how easy the government can decide to misuse its powers to achieve its selfish goals without following the law (Wittes & Blum, 2015). The topic that is covered by this issue is the government misusing the technologies and the related security features and capabilities. While the U.S government might have the best intentions by engaging in activities such as digital spying, there is a need for the law to be upheld in that people’s privacy needs to be respected. On that note, policy analysis of this particular topic (threat by the government) brings into light the fact that there has been a high prevalence by national governments to adopt undertakings that enable them to misuse the technologies that are presented by revolutionary new technologies. On that note, a nation that can be able to follow its rules and abide by the doctrines of the constitution needs to follow an example that is set by the government. Alternatives that are presented by the book include encouraging the administration to abide by what is dictated by law. Under cybertechnology, its advancement has made it possible to use technologies and means that are unlawful that clear all the evidence that can pin the government or rather the particular entity of the government that is responsible for the crime. Looking at this issue from a wide perspective and a policy level, the book plays a helpful role in showcasing how threats to a nation have revolutionized (Wittes & Blum, 2015). One of the drawbacks of the topic is that the authors fail to offer many examples of many other nations that are misusing the privileges brought by the said technologies. There should be more examples other than the U.S so that the context can be relatable to a wider audience. The book continues to explain that while in the past most of the threats were external; the era has changed as now governments are proving to be a threat to its very citizens. Effectiveness in addressing this topic is met in that alternatives are offered such as ensuring that agencies that oversee the actions of security organs within the government are empowered to ensure that the well-being of people is not jeopardized. The lesson from this type of threat is that as much as the revolutionary technologies need to be adopted by the institutions administering the country, these institutions need to be under constant and routine scrutiny (Wittes & Blum, 2015). The role that the oversight and scrutiny committees and institutions will play is that they will prevent the misuse of the technologies in addition to ensuring that there is proper development of objectives that are aligned to the law. The relationship between this topic to the primary theme (future of violence) is that a glimpse into the future of threats is offered and the role of the government in enhancing these threats is also showcased. If necessary measures are taken, the book argues, there will be objectivity in addition to the reduced likelihood of a nation misusing the technologies it has developed for enhanced security purposes.
Revolutionary New Technologies
Revolutionary new technologies is another topic that has been addressed in the book. A high number of security components such as drones and 3-D printers are examined in the book by the authors. In this section of the report, different types of these technologies are analyzed to enhance understanding and the dynamics of their operations. However, it is fair to note that these revolutionary new technologies are distributed among the following facets, i.e. cybertechnology, biotechnology, and robotics. Analysis of these components differently helps enhance understanding. On that note, it is fair to note that dividing these technologies into three different components gives readers an advantage in understanding the individual areas that technology is impacting. Therefore, it not only becomes easier to divide the technologies it also helps in addressing them separately from a holistic point of view. To begin with biotechnology, the book gives the example of gene-splicing equipment that can be used to create the smallpox virus. The dangers that are associated with the smallpox virus is widely known yet the ease with which the gene-splicing equipment is accessible is surprising. There needs to be more that needs to be done to ensure that such biological equipment and information is not easy to access. In the book, Wittes and Blum explain that the gene-splicing equipment is available online. Therefore, it presents the reality that anyone that has malicious intentions can be able to access the procedure and create the virus easily. Thus, it is possible to manipulate the virus once it has been created (Wittes & Blum, 2015). All the same, the government as well as professional agencies that relay such information are the ones that need to be held responsible for such actions. It should be more difficult to access such information. In the case that the information is easy to access, the equipment that is required in the creation of viruses should be made very difficult to access and only possible when one has been granted the necessary clearance and permission by the professional agencies and the government. The relevance that this example plays is that Wittes and Blum manage to show that information sharing has been enhanced by technological advancement. However, layers should be placed for information that is regarded as sensitive if only to protect the public from the dangers which are presented by such data. Another dynamic that is addressed by the book is the area relating to DNA synthesis (Wittes & Blum, 2015). The goal that the study manages to meet is that it showcases there is ease of access to aspects that need to be restricted. While information cannot be barred in the modern age, there needs to be regulation of access to these forms of data. Thus, biological data that can be easily manipulated to achieve selfish goals that pose a threat to the public need to be restricted by the government. Policy analysis entails highlighting the areas of weaknesses in terms of policies that are being employed for public safety. On that note, Wittes and Blum do a very good job in showing that ease of access to data that can be used for advanced biotechnology technologies that are harmful to others need to be restricted and managed.
Robotics is another field within the security sector that is also experiencing advancement, and the effect is that there have been many technologies that have been developed. Drones, for example, have been highlighted by the authors as one of the modern age developments that have come about due to the adoption of technology in robotics. Drones, for example, are being widely developed in the United States (Wittes & Blum, 2015). The book notes that most of the advancements in robotic remains predominantly in the U.S as they have most of the skillset and the capability to regulate the commercial consumption of these robots. In the case of drones, they are designed for military purposes as well as for commercial use in which private citizens can use them for their purposes as long they are regulated by the government. The relevance of giving the example of the United States is that the book manages to show that there need to be measured in place to regulate the activities by the robotics industry. In the case of the United States, there have been cases where the drones have been customized to serve other purposes other than in military cases. Therefore, as much as the drones were primarily invented to serve security functions, they have been allowed for use by the public and in so doing are serving other purposes. All in all, governments need to have extensive and very detailed in place to ensure that drones that are being used by the nation are properly managed (Wittes & Blum, 2015). The book notes that there are many cases of drones being misused which have brought out about a high prevalence in crime. Therefore, an indication of poor policies in the handling of drones and other forms of robotics brings about adverse effects. Therefore, by highlighting on the advancements being undertaken in robotics, the authors manage to create emphasis on the need for governments to control the technologies being incorporated for enhanced development in infrastructure in military actions. Robots are also being used in military arsenals, and a total of six nations are identified as the ones that are spear-heading the adoption processes. On that note, it is fair to note that the new military arsenals are seeking to be more clinical in the attacks that they launch. The drones offer a way through which these attacks can be more accurate. Using the example of Lebanon and Iran, the book notes that the two nations have been involved in a series of attacks. The air attacks have been facilitated by drones that they are controlled from the ground. Thus, the usefulness of the book paying attention to the policy dynamics of the examples that are provided is that there shortcomings as well as benefits with robotics being incorporated in the military arsenals (Wittes & Blum, 2015). A country such as the United States has benefitted, and I benefit related to the ability of the nation to manage its activities properly. Hence, policies that are developed for robotics being used as agents of attack should be properly implemented in addition to being adequately controlled. All in all, robotics has a massive implication on the outcome of military activities, and there is a need to take care to ensure that these activities are not poorly managed.
There is also cybertechnology that forms a part of the security field that is being enhanced by technological trends. Networked computers, for instance, are an example of new revolutionary technology. This particular area pays attention to the networked computer infrastructure that is bringing about a connection between the most systems that serve the public. As a result, surveillance activities have intensified across the globe due to the advance knowledge that has increased computer connections. However, there has also been an increase in the number of cyber-attacks that have been launched as well as cyber-exploitations. Policy analysis relating to cybertechnology should entail looking at the role that the public can play when it comes to enhancing their well-being. It is not entirely up to the government to ensure that they safeguard the public. At times, it is up to the public to look after one another. Thus, dynamics that relate to the ability to prevent cyber-attacks should be considered by the public. As much as computers are connected, there is no need for the cyber-exploitations to increase as they jeopardize the safety of the data and information that has been held by her people. On the same note, the concept of cybersecurity has come about due to the drive-by security agencies to safeguard the networked computers that have become very common (Wittes & Blum, 2015). The relevance of the book is showcased by highlighting the concept of cyber-attacks. It serves to show that the security threats that are being faced have evolved and thus the need for the policies that safeguard people to evolve. Failure to take up new motives that are informed by the current attacks will only serve to expose people to many more such attacks which serve to make their details be exposed to the risk of unauthorized access. Infrastructures are also being operated with the aid of networked computers making components such as trains and bridges to function more effectively (Wittes & Blum, 2015). It serves to indicate that cyber-attacks are bound to have more adverse effects. All in all, a highlight on networked computers serves to show that technology has opened us to a new era of threats that have far-reaching effects thus the need for proper measures to address the challenges that arise.
Security Solutions to Threats
In addition to highlighting the different forms of threats that the new revolutionary technologies have brought about, Wittes and Blum (2015) also showcase the solutions that can be taken to address these challenges. Most of these solutions apply to the individual technologies and the unique threats that they pose. For example, the book explains that the security approaches that are being undertaken need to be reconsidered in addition to the formulation of new security strategies. At the heart of the solutions that are being presented, the book advocates for the adoption of regulatory controls. The risk that has come about due to the possibility of abuse of the new revolutionary technologies can be controlled with regulatory controls. In other terms, the government has agencies that deal with the development and advancement of the selected technologies such as networked computers and drones. However, the actions of these agencies need to be regulated to ensure that they do not bring about insecurity due to abuse of the technologies (Wittes & Blum, 2015). The regulatory controls can be imposed by oversight committees that ensure that all operations are lawful and there is objectivity (Wittes & Blum, 2015). Analyzing this recommendation from a policy perspective, it is effective and efficient in that it brings about transparency how revolutionary technologies are being used by security agencies. Furthermore, the alternative advocates for measures that are inclined towards the well-being of the public. All the same, regulatory controls are a viable option that is based on a culture of trust and objectivity.
On the same note, the book also offers the alternative of undertaking domestic and international surveillance. With technology, cybercrimes are being across border lines, and they have implications on the global perspective. However, with international and domestic surveillance, the rate and level of cyber-attacks and cyber-exploitations can be reduced. Thus, Wittes and Blum (2015) manage to showcase of tracking these international criminals who have the skillset and the equipment to initiate attacks on other nations or on infrastructures that global operations rely on. Analyzing the solution from the policy perspective, it is fair to mention that the lack of operation is inhibiting the outcome of the measure (Wittes & Blum, 2015). There is a need to ensure that the level of cooperation is high since it would make it possible for intelligence to be shared on potential impending cyber-attacks and they can be prevented. The apprehension of suspects who are later brought to justice is made possible. On the same note, the policies that govern this recommendation need to consider the dynamics of the law and the intelligence sharing features of the nations that are involved. Wittes and Blum (2015) argue that the current policies that inform the operations of international and domestic surveillance. It would be easier to track suspects and prevent attacks that otherwise have devastating effects.
In conclusion, the book focuses on three critical areas of security relating to technology which are cybertechnology, biotechnology, and robotics. Each of these fields offers unique revolutionary technologies that are prevalent in the modern age. However, analysis manages to bring out the different challenges relating to them, the means to mitigate against these risks, as well as the particular technologies. Hence, it should follow that there should be proper policies that are developed and that are implemented that will affect the outcome of security operations. All the same, violence needs not to be the outcome of the new revolutionary technologies as the book seeks to advocate.

References
Wittes, B., & Blum, G. (2015). The Future of Violence: Robots and Germs, Hackers and Drones—Confronting A New Age of Threat. Basic Books.

Published by
Essays
View all posts