DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

From DNA of Family, a Tool to Make Arrests

Posted on April 21, 2008October 24, 2024 by Dissent

The Washington Post continues in its focus on DNA and the legal system. Following up on yesterday’s story, Ellen Nakashima reports:

He was a church-going father of two, and for more than 30 years Dennis Rader eluded police in the Wichita area, killing 10 people and signing taunting letters with a self-styled monogram: BTK, for Bind Torture Kill. In the end, it was a DNA sample that tied BTK to his crimes. Not his own DNA. But his daughter’s.

Investigators obtained a court order without the daughter’s knowledge for a Pap smear specimen she had given five years earlier at a university medical clinic in Kansas. A DNA profile of the specimen almost perfectly matched the DNA evidence taken from several BTK crime scenes, leading detectives to conclude she was the child of the killer. That allowed police to secure an arrest warrant in February 2005 and end BTK’s murderous career.

The BTK case was an early use of an emerging tool in law enforcement: analyzing the DNA of a suspect’s relatives. In the BTK example, police had a suspect and were looking to tie him to the crime. But now, states are moving to conduct familial searches of criminal databases, looking for close-to-perfect matches with DNA from crime scenes. A partial match with a convicted criminal could implicate a brother or daughter or father of the convict. Such searches, advocates say, constitute a powerful law enforcement tool that, experts say, could increase by 40 percent the number of suspects identified through DNA.

As things stand in some states, lab analysts who discover a potential suspect in this way may not be permitted to share that information with investigators. Such a policy, said William Fitzpatrick, a New York state district attorney, “is insanity. It’s disgraceful. If I’ve got something of scientific value that I can’t share because of imaginary privacy concerns, it’s crazy. That’s how we solve crimes.”

But the technique is arousing fierce objections from privacy advocates, who maintain that it turns family members into genetic informants without their knowledge or consent. They complain that it takes material collected for one purpose and uses it for another. And with the nation’s DNA database disproportionately comprised of minority offenders, they say, it amounts to placing a class of Americans under greater scrutiny merely because their relatives have committed crimes.

“If practiced routinely, we would be subjecting hundreds of thousands of innocent people who happen to be relatives of individuals in the FBI database to lifelong genetic surveillance,” said Tania Simoncelli, science adviser to the American Civil Liberties Union.

Nonetheless, California, which maintains the world’s third-largest criminal DNA database with more than 1 million samples, will soon become the first state to adopt a protocol to allow for familial searches. Last week, Colorado performed a test run of familial search software on its criminal database. In Massachusetts, officials say they plan to develop a policy to allow familial searches.

Read the full story in the Washington Post

Comment:

Is this yet more erosion of both the Fourth Amendment and our medical privacy? Once again, we hear arguments that the ends justify the means. Some day, people will realize that they don’t agree with all of the ends, but by then, it may be too late — the databases and permissions to use them will have been long-established. And people will look at each other and ask, “How did you let it get this far?”

Category: Health Data

Post navigation

← UK: Court sent me people's secret files
Contractor or vendor woes (commentary) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024 (2)
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.