Thursday, September 26, 2019

Advantages of Probation and Prison system Assignment - 2

Advantages of Probation and Prison system - Assignment Example It is traced back in Boston in the 1700s when the prisoners were taken home by John Augustus as an alternative to the issue of incarceration. Later on, Massachusetts authorized Boston to hire a probation officer. By the end of the ninetieth century, probation was widely practiced all over the world. Parole refers to the temporary or permanent release of a certain prisoner before completion of their prison sentences once they promise to be of good behavior. There are various differences between parole and probation. First of all, probation is that form of a criminal sentence without having to serve time. The offender remains in the setting of a community instead of serving time in prison. On the other hand, parole is an early supervised release from jail. An individual serves jail time for a while and before their jail time is over, they are released either permanently or temporary if they promise to be of good behavior. It allows a high level of flexibility in the handling of various criminal offenders. It permits the judges to make decisions about the ability of an individual to function in a society. It is also a system where an individual is given a second chance to change and allows individuals to redeem themselves. It still represents an incursion that the state undertakes on individuals. The system has also been criticized by too many people on it thus being seen as detrimental to societies and individuals. It also criticized to give prisoners freedom when they should be in jail. Parolee might repeat the offenses he was incarcerated for. The inability of the parolee to survive due to lack of employment or a home. It also requires frequently involvement by the criminal justice for a period of time. One case that impacted on probation and parole was a case of Gagnon V. Scarpelli in 1973. He was serving a probation sentence for armed robbery in the state of Wisconsin.  

Wednesday, September 25, 2019

Design ethics of pratice Essay Example | Topics and Well Written Essays - 1750 words

Design ethics of pratice - Essay Example This paper highlights the competing values that have played out the contemporary companies that advertise their products. In 1996, Calvin Klein also known as CK made remarkably advertisements in the televisions, and magazine, the advert was in promotion of their jeans products. The advert drew criticism from all quarter of the world given the kind of pictures that were used in the adverts, the company used picture of some young people that were posed in a provocative manner- the young people were actually nude. They made this pictures be aired in televisions attracting huge uproar of complains and castigation. Notwithstanding, CK has had a fair share of controversies surrounding their advertisement criteria, in 1980's they aired ads that saw a 15-year-old actress Brooke Shields saying, ‘Nothing comes between me and my Calvin’ (Berry 2000, p. 41). The advert becomes controversial in the sense that it is mostly concentrated around the actress private parts; this has raised eyebrows and attracted condemnation from the public. The focus of the advert on the specific parts of the actress body was perceived unethical and resulted into complains that were given then. The company staged a series of ads in 1996 that was aimed at promoting the CK jeans wear by engaging models who posed in suggestive ways. The ads began in early July and ran in several magazines that were read by those considered to be under aged. For instance, during the period of advertisement in the magazines, young girls aged 12 years got access to the pictures that were considered unethical. Many publishers, in this relation claimed that the adverts that were used by CK then bordered pornography and should not have been aired to the public. Figure A shows one of the images taken from the ad of 1996 Figure A As can be seen in the pictures, the ad exhibited a photographer shooting a young male and a female models in what appeared to be a wood-panelled basement. The shooting was coupled wit h a creepy, predator voice of the young lady asking the man who is half dressed some suggestive questions. The lady asked â€Å"Do you think you can rip off that shirt on your body?† the young man then responded and obliged to the young lady’s question by removing the shirt. She continued and commented â€Å"That's a nice body, do you work out?† at this time, the camera used in the shoot out was concentrating in the young lady’s private parts. Parent groups and children welfare organizations raised questions about the age of the participants in the campaign, many of whom looked to be under 18.  These organizations felt that the children were being coerced to appear in the shoot out under the pretence that they will be normal shooting but the whole issue changes to the nude shooting that is used for CK adverts. According to the organizations, adverts should be moderated even if they have to be suggestive about sex, the one that was used by CK went overbo ard since the shoot out was done in an environment that depicted pornography. The belief that the advert bordered on pornography is also accentuated by the fact that one can hear the photographer instructing the actress on how to look like a pornographic actress.   This public complain was taken to the department of justice and investigations were warranted to look into the possibility of the advert having violated child phonographic

Tuesday, September 24, 2019

Bell Chemicals Desicion Coursework Example | Topics and Well Written Essays - 1500 words

Bell Chemicals Desicion - Coursework Example The solution is to chart out a decision that works best for the company's reputation and growth. Here the approach should be to take the sum total of the senior management group's (SMG) knowledge and intuition and work around it for the best results. My decision is to go for the Chemex machine. The characteristic of this decision can be termed as a rational approach to decision making. I have tried optimising in order to reach to this decision. In the words of Rue and Byars, "One rational approach, called optimizing, involves following six steps: (1) recognize the need for a decision; (2) establish, rank, and weigh the criteria; (3) gather available information and data; (4) identify possible alternatives; (5) evaluate each alternative with respect to each criteria; and (6) select the best alternative." (1992, p.73) This approach can be linked to the normative decision-making model, on which I have based the explanation of my decision or in other words the main body of my report. The company accountant has revealed that the company had recently financed nearly all its recent capital investments from its own retained profits for products and capital investments in other parts of the firm. ... Mr. Bell himself is not interested in much of outside funding. Capital required to install a new Chemex machine is much lower than the AFU unit. Internal funding will be a major issue for the firm in this financial year, as the company has exhausted accrued profits for expansion and developments in other parts of the firm. This will affect the funding of regular operations of the firm throughout the year. Operating cost of AFU unit is more than double of Chemex. The company is not in a position to cover additional cost of 18000 as operating cost against advantages, which are hardly visible or relevant to the firm at this market stage. Through the facts and assumptions given by the marketing manager - an experienced old timer of the Bell Chemicals, following information on current & expected market can be derived: Table 1: Bell Chemicals Ltd: Comparison of Current & Expected Market Curent Market Expected Market Annual Market Requirement 200000 Kg 250000 Kg Firm's Production Requirement 90000 Kg 100000 Kg There is no indication of any upsurge in market demand. With new competitors in the market, retaining present market share should be the aim. Research activities of the chief chemist in modifying the Preserve so that it can be used in wider range of food products has not given any fruitful result uptil now. Hence increase in demand of production is not predicted. Thus increase in production capacity by installing a new Chemex machine will be sufficient to cover the market growth for next two years. Production and selling cost estimate of 320 per Kg for AFU unit is advantageous as compared to 350 for Chemex machine. The AFU unit can reduce production and selling cost by 2700000 a year at current production rate (30 on 90000 Kg produced) but this

Monday, September 23, 2019

Film analysis with historical references - The Motorcycle Diaries Research Paper

Film analysis with historical references - The Motorcycle Diaries - Research Paper Example The challenge of revolution as presented by the author is then associated with both the need to revolutionize understanding from personal knowledge and combining this with creating a cooperative revolution so the economic suppression in South America would diminish. The main objective with the book is one which is first based on the relaxed attitude of Guevara and the associations which he has with working in a leper society while celebrating his birthday. Guevara begins the movie with making each individual believe that there is a desire to party, pick up women and to enjoy the travels through South America while seeing the best sites. This initial attitude is one which leads the trip through most of the movie and which creates a specific response. The changing point which is noted by Guevara is when he moves into the leper society and begins to work with the divisions that are in the community. The different divisions cause him to move outside of the initial mentality and into one which is more radical in nature because of the understanding of the situation and the way in which he can now see and realize the importance of the conditions within the region (Salles, dir, 1). This is important to note because it is also a reflection of what needs to happen with the overall revolution in which each individual becomes aware of the conditions and commits to creating cooperation and community with all of South America. There are several instances where the narrator shows the change and the radical beliefs that are noted after he is able to look at and experience the journey through South America and into the leper society. The realization which is experienced by the character is one which is reflected personally first, specifically with the division in character from the beginning of the story and to the change into radical beliefs about uniting the world into a pan – America and creating a stronger set of beliefs and cooperation with those that are in the reg ion. The realization is based on the understanding that there are no divisions between those in various regions, only which has been divided by imperialism and the circumstances of the region. â€Å" ‘What do we leave behind when we cross each frontier? Each moment seems split in two; melancholy for what was left behind and the excitement of entering a new land† (Guevara, 28). This quote is one which shows that the division which occurs is also personal and which leads to the radical thoughts that there shouldn’t be divisions with the individual as well as with the society. The belief that Guevara has about division, both with the reflection of the individual character and through the continents is one which is confirmed by the works of the author. The concept is one which is based on his own travels, specifically in which he realizes that there is great advancement of those in society that are in South America and which is cut off from society. This is followed by his own beliefs and understandings while traveling that were based on finding the differences in the culture, how they were altered because of political beliefs and how this separatism was one which only created illusions that are created because of the lack of knowing and

Sunday, September 22, 2019

Movie in 1980-1989 Essay Example | Topics and Well Written Essays - 750 words - 1

Movie in 1980-1989 - Essay Example Krishna, a 10 year old kid lives in a remote rural area in India. Fed up of the bossing by his brother he sets his bike on fire and bears the wrath of his mother. She takes him to a circus and leaves him there asking him to earn Rs. 500 to repay for bike repair or not to come home. Krishna finds employment by doing petty jobs for the circus owner in hope of earning the amount and returning home. One fine day the owner orders him to get local liquor from a far away shop. Its take tremendous time and energy for Krishna to find it buy it and get back to the circus site, by the time the circus had left. With only some change in pocket and no courage to return to his mother, he sets out for the biggest city of India – Bombay. On his arrival he meets some local goons and is robbed off his money in light of his powerlessness and innocence. He follows the goons with courage and eventually befriends them. They lead him to the biggest brothel of Bombay at Falkland Road near Grant Road Railway Station. One of the goon and a drug addict, ‘Chillum’ who is also one of the main characters in the movie helps krisna to get a job with a tea stall owner. Days become week, weeks turn into months and years in hope of returning home. Not a day passes when Krishna asks his boss if he has Rs. 500 in his account by now but is always turned away. Change comes in his monotonous laborious life when a new prostitute, a virgin, ‘Sola Saal’ is brought to the brothel. He is so infatuated with the 16 year old girl that he sets the brothel room to fire in order to elope with her but in vain. He loses his job and does odd jobs with Chillum to survive. Meanwhile his friend Chillum is deteriorating in health and moneywise and he keeps on helping him time and again. Life is again monotonous until one night when he and his goon friends plan to rob an old Parsi man. While his life is being shown, a parallel story runs of another prostitute who has married with

Saturday, September 21, 2019

Hurricane Katrina Essay Example for Free

Hurricane Katrina Essay Mike Mulally 10-11-19 In 2005 Hurricane Katrina swept through the city of New Orleans and destroyed the lives of thousands. Katrina was one of the largest hurricanes and natural disasters in the history of the United States (Wikipedia, 2009). While most of the casualties’ occurred during the actual storm, still a many took place days after, and were do to the fact that the local, state, and national government were slow to respond. This slow response was due to the nature of federalism. I believe Americans got a glimpse at how federalism and bureaucracy have flaws. These imperfections will be discussed in the pages below. The PBS documentary â€Å"The Storm,† depicts the destruction Hurricane Katrina caused, as well as what went wrong with the evacuation and rescue of New Orleans residents. Local, state, and national government officials were interviewed, such as New Orleans Mayor Ray Nagin, New Orleans governor Kathleen Blanco, and FEMA Director Michael Brown. Each official gave his or her version of why events happened the way they did. Some of the their accounts contradicted each other. I believe everyone was just looking out for him or herself, trying to save face. This seems to be a common problem in American politics. I will next explore how federalisms can be a inconvenience in a situation such as a natural disaster. Federalism by definition â€Å"is a system in which governmental powers are divided between a central government and smaller units, like states†(Greenberg Page, 2009, Ch. 3). The officials at all levels of the government were somehow confused during Katrina on who exactly was in charge. Was it New Orleans Mayor Ray Nagin, FEMA Director Michael Brown, was it President Bush? † (Marcela, 2005). There was also a lack of communication between the different levels of government, which, as was talked about in class, is an obvious downside or barrier to federalism (Oxendine, 2009). In a situation like a natural disaster, communication is key. If one cannot communicate with another, how is anything supposed to be accomplished? Having several le vels of government involved just makes everything in a disaster situation more complicated. I believe the U. S. needs a more centralized form of a disaster agency. If a natural disaster is to happen there ought to be one plan of action carried out by one agency. Having this central organization would have alleviated much of the confusion and frustration that we witnessed with Katrina. According to Director Brown, after Hurricane Katrina, New Orleans’ local government did not communicate very well with FEMA officials. Brown says he was never told what sorts of manpower or supplies were needed (Marcela 2009). However Louisiana National Guard Adjutant General Bennett Landreneau stated in his interview that he specifically sent requests to FEMA for what help was required. A few days after he was interviewed he sent in the documentation that proves he did indeed ask specific needs from FEMA (Marcela 2009). FEMA Director Brown lied on television. So often politicians lie about issues, why can’t they ever own up to their mistakes and just tell the truth. I believe the American public deserves to know the truth on issues, especially when dealing with something like Hurricane Katrina. In a natural disaster it is at first the state that has control. If the state becomes overwhelmed and can no longer control the situation, the state then needs to clearly articulate what services they are in need of, and that is when FEMA will then intervene. Several days after the storm, Director Brown apparently believed the state of Louisiana had the situation under control (Marcela, 2005). While the Mayor and Governor thought FEMA was going to step in and help. There was a period of time where nobody knew who was in command. Consequently there was a period of time where the many of the people of New Orleans had no food, water or shelter, and that is when many lives were lost. It bewilders one to think that this sort of miscommunication and misunderstanding could happen to a country like the United States. One would assume that our country would have one of the best disaster protocols in the world, considering our global supremacy. I will now touch on another part of U. S. government that I consider to have flaws, and that is bureaucracy. A bureaucracy as defined by Greenberg Page (2009) is â€Å" A large, complex organization characterized by a hierarchical set of offices, each with a specific task, controlled through a clear chain of command, and where appointment and advancement of personnel is based on merit† (Ch. 13). Individuals are appointed not elected and therein lies a problem. Anyone that the president chooses can be in a position of power. Many believe Michael Brown was absolutely not qualified for the position of FEMA Director (Greenberg Page, 2009, Ch. 13). After all he had no formal training in disaster relief or anything of that sort in his resume. Positions like FEMA director should have to have some sort of qualifications. One cannot just be put into that situation like Director Brown was. I believe that positions such as director should be an elected one. When someone who is not qualified is put in charge of one of biggest natural disasters in U. S. history, nothing good can come from it. And indeed that is exactly what happened, total chaos and confusion took place due to Director Michael Brown’s incompetence. After the attacks of 9/11 President Bush reorganized FEMA into a Bureaucracy. FEMA was downgraded and became a sub department of homeland security. Many believe this reorganization really hurt FEMA. Personnel, IT systems and other resources were dramatically reduced due to President Bush’s budget cutting agenda. The President also cut project impact, a program started by FEMA to help communities become disaster resistant, due to tax cuts (Marcella 2009). In addition 80 million dollars was taken from FEMA and distributed to other sectors in homeland security. This is just another problem of FEMA becoming a part of the U. S. bureaucracy. How would anyone expect an organization to do their job when they have had significant funds and resources cut? Clearly part of FEMA’s inadequacies can be linked to President Bush’s choice to make tax cuts and cut parts of their program. Again, the reorganization of FEMA was really detrimental. Hopefully in the future leaders will make more conscientious choices about which agencies should be cut back. Most would believe a disaster relief program such as FEMA should have some of the most funding and personnel available. Apparently former President Bush thought otherwise. Although President Bush does deserves a little bit of a break considering â€Å"the sheer size and complexity of the executive branch. There is so much going on, in so many agencies, involving the activity of tens of thousands of people, that simply keeping abreast of it all is no easy task† (Greenberg Page, 2009, Ch. 13). He is in charge of so much in the U. S. there is no way he could keep an eye on everything. So while the President may have indirectly affected FEMA by inducing budget cuts, he cannot be held directly responsible for the government’s lack of involvement in Katrina at the national level. The president relies on his appointees to do their jobs, which Director Brown did not fulfill. However, President Bush choose Michael Brown, so maybe Bush is in fact responsible for FEMA’s inadequacies. Obviously having a large federal bureaucracy is an inconvenience to say the least. I believe Hurricane Katrina has taught our country a few lessons. First of all that while having a federal bureaucracy has its pluses, it also brings with it it’s many flaws, and the main one being communication. Our government should be striving for interoperability. The ability for several groups at all levels of the government to communicate what resources are needed during a natural disaster will prove to be the single most important tool during a relief operation. I hope that in the future, Presidents will choose more wisely when filling high-level positions such as FEMA Director, and not just appoint those who helped with their campaign. I also hope more cities around the country have better evacuation plans than those of New Orleans. I hope National Guard buildings are better equipped with resources and manpower in the future, especially along costal areas that are known to have hurricanes.

Friday, September 20, 2019

UK Identity Cards and Civil Liberties

UK Identity Cards and Civil Liberties â€Å"The introduction of identity cards in the UK infringes upon our human rights and civil liberties whilst actually doing very little to counter crime and terrorism† Discuss Contents Abstract Introduction Chapter One – Surveillance as a means of crime prevention counter terrorism 1.1 Is surveillance needed for crime prevention? 1.2 Is surveillance needed for counter terrorism? Chapter Two – Increased surveillance – the viability of data retention 2.1 Data retention and identity cards 2.2 Is data retention a positive thing? 2.3 The scope of data retention laws Chapter Three – Has the introduction of the identity cards scheme served to breach individual human rights and civil liberties regarding privacy in the same way as other forms of surveillance? 3.1 The right to personal privacy 3.2 Are human rights and civil liberties effectively recognised domestically? 3.3 How far is the right to personal privacy recognised in law? 3.4 How does the ICA 2006 fit into understanding human rights and civil liberties? Conclusion Bibliography The aim of this study is to consider whether the introduction of identity cards in the UK would indeed infringe upon our human rights and civil liberties, whilst also looking to determine whether it would actually be an effective way of combating crime and terrorism. Therefore, this paper will look to consider the enactment of the Identity Cards Act (‘ICA’) 2006 and the problems that are likely to arise from the introduction of the proposed scheme. Then, it will also be necessary to consider the background to the enactment of the ICA 2006 by putting this development into context with a consideration of Closed Circuit Television (‘CCTV’) and the development of data retention surveillance techniques used to gather information about people with the aim to prevent crime and counter terrorism. However, this paper will also look to recognise the legal reasoning used to justify this kind of surveillance and information gathering that, although contrary to the recognition of the human rights and civil liberties of individuals, is considered necessary to guard the interest of society as a whole against the threat of terrorism and serious crime. But, at the same time, this paper will also recognise this kind of surveillance may actually be doing very little to counter terrorism and serious crime and is not only breaching people’s recognised human rights and civil liberties, but also criminalizing the population and breaking the law in the process. Then, finally, in summation it will be necessary to look to conclude with a balanced and logical overview of this discussion effectively derived from an understanding of the issues covered to present a reasoned view regarding this issue. At the end of 2006, legislation was passed domestically in this country in relation to the introduction of identity cards throughout the UK in the form of the ICA 2006 as a means of crime prevention and counter terrorism. But, interestingly, in spite of its apparently noble intentions, the ICA 2006 is seen by many as only ‘enabling legislation’ that merely provides the legal framework around which the scheme of identity cards is to be developed and it does not purport to provide details of every aspect of the schemes overall operation[1]. This is because the Act itself proposed the use of biometric identity cards[2] to establish and maintain a database of information called the National Identity Register (‘NIR’) on all individuals currently residing within the UK in support of ongoing efforts to help prevent terrorism or serious crimes from occurring[3] by allowing for an easy means to ascertain and prove an individual’s identity[4]. Therefore, the en actment of this legislation meant both private and personal companies could access this register to confirm an individual’s identity or simply check the accuracy of their information. However, this policy is not without its problems. This is because whilst sections 19 and 23 of the ICA 2006 only permit access to records without consent if it is in the interests of national security or for purposes connected with the prevention or detection of crime, the legislation allows for information to be added without the individuals’ knowledge with the aim of eventually having fifty pieces of an individual’s personal information on their card that would then be stored on the aforementioned database with the NIR[5]. But despite the fact many critics argue the NIR will allow the government to monitor and record almost every aspect of a person’s life, almost all of the information listed in Schedule 1 of the ICA 2006 as being required that includes signature, photograph from a passport, name and address (both current and previous), date of birth and national insurance number for this purpose is already in the government’s possession and everyone has the right to see what information is held about them. Nevertheless, there is a fear that ‘hackers’ are bound to attempt to gain access to the NIR database in the same way as in the US, in April 2005, when it was reported Reed Elsevier may have accidentally released the personal information of 310,000 US citizens during 59 separate criminal incidents[6]. It is perhaps little wonder then that the scheme to be developed under the ICA 2006 has led to a great deal of criticism from various organisations. Economists, in particular, have argued that such a scheme would be excessively expensive for what they believe to be somewhat limited results in view of the fact that whilst government estimates have put the cost of the scheme’s introduction alone at around  £6 billion pounds[7], a group of analysts at the London School of Economics consider the figure to be closer to  £18 billion that must ultimately come out of the public’s pocket through taxation[8]. Therefore, whilst the use of identity cards brought about by the enactment of the ICA 2006 could be considered the latest advancement of surveillance technology with the legitimate aim of preventing crime and counter terrorism, question marks remain over whether this kind of policy is an acceptable tool in view of the need to recognise individual human rights and civil liberties[9]. But this is not the first time that the legitimacy of surveillance has been called into question, despite its aims to prevent crime and counter terrorism, so it is necessary to look to consider whether the use of this kind of surveillance technology has achieved anything in this regard. â€Å"Every man should know that his conversations, his correspondence, and his personal life, are indeed private.† Lyndon B Johnson 1908-1973 – President of the United States of America In spite of Lyndon B. Johnson’s view ostensibly in support of Mill[10], the use of surveillance techniques has become increasingly widespread with the passing of time because technology in this area has advanced at such a pace that even the public at large is becoming ever more aware that surveillance no longer simply refers to the work of spies in Ian Fleming novels. The word itself in French literally means ‘watching over’[11] and, in this context, refers to all forms of observation or monitoring of another for public or private purposes. Now, however, most people are aware such techniques are used by law enforcement agencies, business and even private individual so as to gain useful information in relation to the activities of suspected criminals and terrorists where a threat is perceived leading to an eventual arrest where it is warranted[12]. In particular they are usually most commonly aware of the use of CCTV cameras on buildings and in shops. But the use o f identity cards is just another means of surveillance as its production and use will effectively act like a form of tracking whereby the authorities and private and public organisations will gain yet another insight into the private lives of individuals by creating a verifiable ‘document trail’ that the authorities can follow. 1.1 Is surveillance needed for crime prevention? The UK leads the world in the concentration of public surveillance devices to people[13]. This is because, about ten years ago, the UK government used  £150 million each year to develop a Closed-Circuit Television (‘CCTV’) network around the country[14] so that the industry grew exponentially throughout the 1990’s so, by 2003, at least two and a half million cameras could be found in this country[15] that continues to increase at around 20% per year[16]. The ‘net effect’ is substantial. It is widely believed everyone in London is caught on camera at least three hundred times each day[17] and very often these cameras do not just watch and record us, but also use facial recognition software to scan subjects against a criminal database[18]. Although statistical evidence is somewhat limited in relation to the effectiveness of surveillance technology in view of the fact there is usually much more to crime prevention and counter terrorism[19], the authorities downplay this negative element and emphasise the positive where a security issue of national significance is resolved. Such a view is effectively illustrated by the fact whilst the police review of CCTV tapes played a significant role in identifying a suspected terrorist handler involved in the bombing of King’s Cross in July 2005[20], there remains a prevailing view that, if anything, crime levels have stayed the same or even increased despite the widespread installation of CCTV cameras. National statistics have shown that, whilst around three quarters of the Home Office Crime Prevention budget has generally spent on CCTV, a comprehensive review has revealed the overall reduction in crime was only around 5% by 2002[21] and has continued to make small incremental reductions nationally ever since[22]. But as a stark mark of the success of CCTV in preventing crime, a parallel systematic review found that street lighting saw a reduction in crime of 20%, whilst CCTV cameras usefulness is then further marked against because it is understood that only around 3% of all street robberies in London are solved using CCTV footage[23]. Interestingly, however, in Portsmouth the City Council released crime statistics for the first three months of 2008 that showed that of 1384 recorded incidents this led to 346 arrests that were recorded by the network of 172 CCTV cameras in Portsmouth and marked this out as mark of their usefulness as crime solving tool[24], whilst, in Newham, police claimed an 11% drop in assaults, a 49% drop in burglary, and a 44% drop in criminal damage[25] where cameras were installed[26]. However, as well as possibly being merely an aberration in our understanding of the overall usefulness of CCTV cameras and surveillance technology as a whole, the source of the statistics is a branch of government. Therefore, unfortunately, this may mean the results have been embellished to present CCTV as being a good use of public money and, even where this is not the case, the police may have made the same number of arrests anyway so that it is somewhat surprising that the cameras have such support to enforc e the law[27]. 1.2 Is surveillance needed for counter terrorism? However, since the tragic events of 9/11 in the US, such action is also justified because it is arguable this led to the establishment of a renewed approach to surveillance in the interests of national and international security across the world. Therefore, 9/11 effectively served to reveal terrorist groups had organised themselves ‘transnationally’ making it harder to trace them using traditional surveillance techniques[28]. As a result, whereas in the past, terrorist groups could be readily categorised by reference to territory, this is no longer the case because, organised on a global scale, these loosely affiliated ‘cells’ can operate simultaneously in various States. This is because they are not unified by a single vertical command but horizontally[29] by using modern communication and transportation technology, whilst the integration of financial markets also facilitates their mobility and range of targets without claiming a particular territory as â €˜home’[30]. On this basis, globally, countries realised they had a shared interest in enhancing international co-operation to fight terrorism because of the fear groups may be in possession of non-conventional weapons such as biological, chemical and nuclear[31]. Therefore, the international community must work together because such a threat cannot be vanquished by single States alone[32], as the UN recognises certain States being unable or unwilling to prevent or stop the traffic of such weapons means â€Å"the ability of non-State actors to traffic in nuclear material and technology is aided by ineffective State control of borders and transit through weak States†[33]. Clearly, the international community must hold together to find effective solutions because, although 9/11 undoubtedly showed the world that even the leading democracy was not safe from terrorist attacks. Whereas in the past a series of diplomatic, economic and financial measures nationally to fight terrorist structures[34], to multiply the effect of such measures, States agreed to co-operate internationally by using treaty law with around a dozen multilateral conventions on anti- and counter-terrorism[35]. Therefore, in theory, no terrorist activity would go unpunished[36]. But the UN has struggled since its inception to formulate an effective response. On the one hand, it has provided a solid international legal framework for combating terrorism via the adoption of terrorism-related treaties by the General Assembly and UN agencies. But, on the other hand, the UN has been unable to reach agreement on a definition of terrorism that outlaws all indiscriminate attacks against civilians and circumvents the need to recognise the human rights and civil liberties of the public at large, so more than twenty different parts of the UN system deal with terrorism in one form or another[37]. However, in Europe it was not until the 2004 train bombings in Madrid that the EU looked to take significant action to counter terrorism and prevent serious crime. This is because those investigating the attacks in Madrid discovered telecommunications played a significant role in planning of the attacks because they were co-ordinated by mobile phone and via the Internet. Unfortunately, however, at the time of the attacks the Spanish authorities had only limited access to help to telecommunications networks in order to further their investigations when more traditional methods of surveillance associated with the aforementioned use of CCTV were somewhat lacking[38]. This is because with the advancement of technology in this area, traditional surveillance has been made somewhat redundant by the use of Internet so that, in order to be able to effectively prevent serious crime and counter terrorism in the modern age, there is a need to utilise data retention technology. Chapter Two – Increased surveillance – the viability of data retention 2.1 Data retention and identity cards On this basis, the original justification for the ICA 2006 identity cards scheme was the supposed need to combat the serious problems of illegal working and identity fraud. This is because the government estimated identity fraud amounted to a  £1.3 billion annual loss to the UK economy[39], and the government’s first consultation paper in this area specifically eschewed many of the claims for identity cards that some other advocates suggest they would bring – such as combating terrorism, benefit fraud and crime more generally[40]. However, the draft legislation clearly presented the identity card as a device with which to combat terrorism, whilst the 2003 government’s white paper[41] emphasised the use of identity cards as an effective tool. According to Privacy International, government ministers in the UK have argued in broadcast interviews that, although the 2001 New York and 2004 Madrid[42] atrocities had been committed by people with valid US documents and Spanish identity cards respectively, many other terrorists use false identities and they also claimed the quality of the database underpinning the British scheme would be much higher than the Spanish. 2.2 Is data retention a positive thing? Nevertheless, aside from the more secure nature of the identity cards scheme proposed in the UK under the ICA 2006, this kind of data retention has previously proved to be a very positive thing that has served to enhance the lives of those living within our society. As most people are aware, such technology is already being used in the form of services that text details of the closest restaurant based on a mobile phone location when your hungry, or help to pick an exit at the next roundabout when you are lost can be very useful. But any retention of collected data is also very negative because the advantages of technology come at a price, since one person’s ‘enhanced information’ can invade another’s privacy[43]. This is because an individual’s right privacy is becoming increasingly susceptible to the advancement of technology with the introduction of ‘wiretaps’, biometrics, and video surveillance cameras all each having the potential to erode privacy[44] in the same way as identification cards, whilst digital interactive television technology may even soon tell advertisers exactly which programs people view in their homes[45]. Therefore, such advancements are clearly both beneficial and frightening[46]. This is because it is commonly understood that no modern technology derived from the development of telecommunications poses a greater threat to privacy than the Internet[47] by allowing researchers to collect data much more cheaply and efficiently[48] because what once took a great many days hard labour can now be accomplished with a keystroke[49]. But it is also important to appreciate that the remit of the Data Retention Directive[50] effectively allows EU Member States to synchronise their laws so all telephony companies and ISP companies within each and every EU Member State are obliged to retain details on all electronic communications for up to two years for the purpose of investigating, detecting and prosecuting serious crimes[51]. 2.3 The scope of data retention laws The main categories of data ‘generated and processed’ to be retained under the Data Retention Directive regarding communications are the retention of data to (a) trace and identify its source (e.g. caller); b) identify its destination (e.g. number dialled); (c) identify its date, time and duration; (d) identify its type (i.e. network or service used); (e) identify equipment (i.e. means); (f) identify that equipments location; and (g) regarding unsuccessful calls[52]. But this is somewhat controversial because ‘unsuccessful calls’ occur where a telephone call has successfully connected, but has not been answered[53]. However, whilst no data regarding the content of the communications is to be retained[54], EU Member States should also ensure data’s security is respected as a reflection of equivalent provisions for the protection of personal data in the Data Protection Directive[55]. This is because, through measures to protect data against accidental or unlawful destruction, accidental loss or alteration, or unauthorised or unlawful storage, processing, access or disclosure[56] of data is accessible by authorised personnel[57]. As part of this process, EU Member States must also have measures in place to ensure any criminal access to or transfer of data retained under the Data Retention Directive is punishable by effective penalties[58]. Therefore, the Data Retention Directive provides only data retained should be provided to the ‘competent national authorities in ‘specific cases’[59], but fails to recognise which authorities are likely to be competent and the reasons why such data may be accessed. This effectively means this could lead to uneven access to data across the EU because there is no definition of ‘specifically authorised personnel’ or ‘law enforcement authorities’, but Article 9 recognises each Member State must designate one or more public authorities to be responsible for monitoring the application of the Directive regarding security of stored data. Therefore, in the UK, the Home Office has looked to publish a set of draft Regulations in the form of the Data Retention (EC Directive) Regulations (‘Regulations’)[60] to effectively implement the Data Retention Directive’s nature and scope[61]. But the Regulations only looked to address the retention of certain call data by telephony companies because EU Member States can delay the Data Retention Directive’s implementation regarding traffic data for an additional 18 months until March of 2009[62]. Nevertheless, even before they have been implemented, the UK Regulations also nothing to allay the fears raised by human rights’ advocates regarding the EU’s Data Retention Directive because the Regulations remain as unspecific and unrestrictive as the Directive. However, domestically, the authorities have â€Å"a great deal of experience with the retention of traditional communications data† because they â€Å"have been working with the ind ustry to ensure the retention of this data since 2003, when Parliament first approved the code of practice for the voluntary retention of communications data under Part 11 of the Anti-Terrorism, Crime and Security Act 2001†[63]. Nevertheless, whilst the retention of data was voluntary under the Anti-Terrorism, Crime and Security Act (‘ATCSA’) 2001, because it was made in response to the terrorist attacks of 9/11, its voluntary code has served as the foundation for establishing a practical framework for the enforced retention of communications data so the draft regulations provide the next step towards a mandatory framework[64]. Such a view was supported by the fact that the EU set a high global standard in data privacy protection when it forged its Data Protection Directive[65], which became effective in October 1998[66], and created such a rigorous legislative approach to privacy[67]. But the ATCSA 2001 was then amended so that the purpose of such retention became â€Å"(a) for the purpose of safeguarding national security; or (b) for the purposes of prevention or detection of crime or the prosecution of offenders which may relate directly or indirectly to national security†[68] so the a ccess would then be just for limited purposes. Therefore, it is important to recognise that the UK’s Regulations have established provisions to continue with the policy of reimbursing public communications providers their expenditure from adjusting their business practices to comply with the Government’s requirements for the retention of communications data. But the interception of communications and the obtaining and disclosure of data relating to them is currently regulated by the Regulation of Investigatory Powers Act (‘RIPA’) 2000 because section 21 recognises communications data does not include the contents of the communications, but that, in the interests of national security, they may still obtain it. Consequently, the Data Retention Directive will effectively serve to augment RIPA 2000 that does not currently require the specific retention of data in advance, but the police are able to serve ‘section 22’ (‘S22’) telecommunication companies within the industry for acces s to the data that they retain. Accordingly, whilst the RIPA 2000 will only permit the interception of communications in the UK by defined bodies in specified circumstances to protect individuals’ privacy, the longer the data retention period, the greater the period of access that will provided to the authorities in the interests of security[69]. Nevertheless, ostensibly, it is to be appreciated that the RIPA 2000 is designed â€Å"to ensure that the relevant investigatory powers are used in accordance with human rights†, since it extends the legal regulation of interceptions to cover private networks that are â€Å"attached, directly or indirectly to a public telecommunications system†, and includes â€Å"anything comprising speech, music, sounds, visual images or data of any description†. Therefore, a criminal offence is not committed in the UK if the controller of a private network intercepts a communication in the course of its transmission, but section 1(3) provides that intercepti ons â€Å"without lawful authority† are still actionable under the remit provided for by the HRA 1998 that is discussed below[70]. On the basis of this understanding of data retention laws discussed in the previous chapter, it is also important to look to consider whether the scheme for identity cards proposed under the ICA 2006 based on personal data retention as a means of identification will serve to violate the recognition of individual human rights and civil liberties. This is because whilst it would clearly be hard to argue using surveillance technology to gain solid evidence for the purposes of preventing serious crime and encouraging counter terrorism is a bad thing, there is an all too prevalent need within the current climate for the striking of a balance between maintaining national security and unnecessarily invading an individual’s privacy. In spite of their legitimate aims, the introduction of identity cards in the UK could be considered to be just the latest step in the government’s efforts to encourage crime prevention and counter terrorism at the expense of the individual rights and freedoms. This is because, in the same way as other advancements in surveillance technology, identity cards are also not without their problems. There is a prevailing feeling the use of identity cards across the nation will serve to breach individual human rights and civil liberties in the same way as many other forms of surveillance. In particular, it has been argued the use of identity cards will serve to breach individual rights to privacy because of the nature of the personal data that will be stored and retained within them and on the NIR database[71]. Therefore, although there is little doubt the use of such technology for information gathering is very advantageous to help the government, the police, and even everyday people, question marks have arisen in relation to just how far surveillance technology should be used to monitor the public. Consequently, there is an argument those who use surveillance for the purposes of information gathering should take on certain responsibilities they must then uphold in view of the implementation of the ECHR into the UK via the HRA 1998. But in some ways technological advances have arguably hindered the recognition of human rights and civil liberties as much as they have helped crime prevention and counter terrorism by allowing the authorities an unprecedented look into people’s lives. 3.1 The right to personal privacy The right to personal privacy is an important right, however, it is all too easily taken for granted because, like freedom, no one really appreciates its value until it is threatened, as in this case with the enactment of the ICA[72], so that in the wake of technological advancement privacy has all too easily become an afterthought in social advancement[73]. This is a significant failing. The right to privacy should not merely be limited to the idea an individual may live their personal life how they choose. It is also meant to include the right to establish and develop relationships with other people for the development and fulfilment of one’s own personality[74], whilst sexual relations are the most intimate aspect of the right to a private life[75]. However, the right to a private life also covers an individual’s physical and moral integrity[76], encompassing protection against compulsory physical interventions and treatments[77]. Moreover, in spite of the