DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

From DNA of Family, a Tool to Make Arrests

Posted on April 21, 2008October 24, 2024 by Dissent

The Washington Post continues in its focus on DNA and the legal system. Following up on yesterday’s story, Ellen Nakashima reports:

He was a church-going father of two, and for more than 30 years Dennis Rader eluded police in the Wichita area, killing 10 people and signing taunting letters with a self-styled monogram: BTK, for Bind Torture Kill. In the end, it was a DNA sample that tied BTK to his crimes. Not his own DNA. But his daughter’s.

Investigators obtained a court order without the daughter’s knowledge for a Pap smear specimen she had given five years earlier at a university medical clinic in Kansas. A DNA profile of the specimen almost perfectly matched the DNA evidence taken from several BTK crime scenes, leading detectives to conclude she was the child of the killer. That allowed police to secure an arrest warrant in February 2005 and end BTK’s murderous career.

The BTK case was an early use of an emerging tool in law enforcement: analyzing the DNA of a suspect’s relatives. In the BTK example, police had a suspect and were looking to tie him to the crime. But now, states are moving to conduct familial searches of criminal databases, looking for close-to-perfect matches with DNA from crime scenes. A partial match with a convicted criminal could implicate a brother or daughter or father of the convict. Such searches, advocates say, constitute a powerful law enforcement tool that, experts say, could increase by 40 percent the number of suspects identified through DNA.

As things stand in some states, lab analysts who discover a potential suspect in this way may not be permitted to share that information with investigators. Such a policy, said William Fitzpatrick, a New York state district attorney, “is insanity. It’s disgraceful. If I’ve got something of scientific value that I can’t share because of imaginary privacy concerns, it’s crazy. That’s how we solve crimes.”

But the technique is arousing fierce objections from privacy advocates, who maintain that it turns family members into genetic informants without their knowledge or consent. They complain that it takes material collected for one purpose and uses it for another. And with the nation’s DNA database disproportionately comprised of minority offenders, they say, it amounts to placing a class of Americans under greater scrutiny merely because their relatives have committed crimes.

“If practiced routinely, we would be subjecting hundreds of thousands of innocent people who happen to be relatives of individuals in the FBI database to lifelong genetic surveillance,” said Tania Simoncelli, science adviser to the American Civil Liberties Union.

Nonetheless, California, which maintains the world’s third-largest criminal DNA database with more than 1 million samples, will soon become the first state to adopt a protocol to allow for familial searches. Last week, Colorado performed a test run of familial search software on its criminal database. In Massachusetts, officials say they plan to develop a policy to allow familial searches.

Read the full story in the Washington Post

Comment:

Is this yet more erosion of both the Fourth Amendment and our medical privacy? Once again, we hear arguments that the ends justify the means. Some day, people will realize that they don’t agree with all of the ends, but by then, it may be too late — the databases and permissions to use them will have been long-established. And people will look at each other and ask, “How did you let it get this far?”

Category: Health Data

Post navigation

← UK: Court sent me people's secret files
Contractor or vendor woes (commentary) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch (1)
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.