DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

From DNA of Family, a Tool to Make Arrests

Posted on April 21, 2008October 24, 2024 by Dissent

The Washington Post continues in its focus on DNA and the legal system. Following up on yesterday’s story, Ellen Nakashima reports:

He was a church-going father of two, and for more than 30 years Dennis Rader eluded police in the Wichita area, killing 10 people and signing taunting letters with a self-styled monogram: BTK, for Bind Torture Kill. In the end, it was a DNA sample that tied BTK to his crimes. Not his own DNA. But his daughter’s.

Investigators obtained a court order without the daughter’s knowledge for a Pap smear specimen she had given five years earlier at a university medical clinic in Kansas. A DNA profile of the specimen almost perfectly matched the DNA evidence taken from several BTK crime scenes, leading detectives to conclude she was the child of the killer. That allowed police to secure an arrest warrant in February 2005 and end BTK’s murderous career.

The BTK case was an early use of an emerging tool in law enforcement: analyzing the DNA of a suspect’s relatives. In the BTK example, police had a suspect and were looking to tie him to the crime. But now, states are moving to conduct familial searches of criminal databases, looking for close-to-perfect matches with DNA from crime scenes. A partial match with a convicted criminal could implicate a brother or daughter or father of the convict. Such searches, advocates say, constitute a powerful law enforcement tool that, experts say, could increase by 40 percent the number of suspects identified through DNA.

As things stand in some states, lab analysts who discover a potential suspect in this way may not be permitted to share that information with investigators. Such a policy, said William Fitzpatrick, a New York state district attorney, “is insanity. It’s disgraceful. If I’ve got something of scientific value that I can’t share because of imaginary privacy concerns, it’s crazy. That’s how we solve crimes.”

But the technique is arousing fierce objections from privacy advocates, who maintain that it turns family members into genetic informants without their knowledge or consent. They complain that it takes material collected for one purpose and uses it for another. And with the nation’s DNA database disproportionately comprised of minority offenders, they say, it amounts to placing a class of Americans under greater scrutiny merely because their relatives have committed crimes.

“If practiced routinely, we would be subjecting hundreds of thousands of innocent people who happen to be relatives of individuals in the FBI database to lifelong genetic surveillance,” said Tania Simoncelli, science adviser to the American Civil Liberties Union.

Nonetheless, California, which maintains the world’s third-largest criminal DNA database with more than 1 million samples, will soon become the first state to adopt a protocol to allow for familial searches. Last week, Colorado performed a test run of familial search software on its criminal database. In Massachusetts, officials say they plan to develop a policy to allow familial searches.

Read the full story in the Washington Post

Comment:

Is this yet more erosion of both the Fourth Amendment and our medical privacy? Once again, we hear arguments that the ends justify the means. Some day, people will realize that they don’t agree with all of the ends, but by then, it may be too late — the databases and permissions to use them will have been long-established. And people will look at each other and ask, “How did you let it get this far?”

No related posts.

Category: Health Data

Post navigation

← UK: Court sent me people's secret files
Contractor or vendor woes (commentary) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.