DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

From DNA of Family, a Tool to Make Arrests

Posted on April 21, 2008October 24, 2024 by Dissent

The Washington Post continues in its focus on DNA and the legal system. Following up on yesterday’s story, Ellen Nakashima reports:

He was a church-going father of two, and for more than 30 years Dennis Rader eluded police in the Wichita area, killing 10 people and signing taunting letters with a self-styled monogram: BTK, for Bind Torture Kill. In the end, it was a DNA sample that tied BTK to his crimes. Not his own DNA. But his daughter’s.

Investigators obtained a court order without the daughter’s knowledge for a Pap smear specimen she had given five years earlier at a university medical clinic in Kansas. A DNA profile of the specimen almost perfectly matched the DNA evidence taken from several BTK crime scenes, leading detectives to conclude she was the child of the killer. That allowed police to secure an arrest warrant in February 2005 and end BTK’s murderous career.

The BTK case was an early use of an emerging tool in law enforcement: analyzing the DNA of a suspect’s relatives. In the BTK example, police had a suspect and were looking to tie him to the crime. But now, states are moving to conduct familial searches of criminal databases, looking for close-to-perfect matches with DNA from crime scenes. A partial match with a convicted criminal could implicate a brother or daughter or father of the convict. Such searches, advocates say, constitute a powerful law enforcement tool that, experts say, could increase by 40 percent the number of suspects identified through DNA.

As things stand in some states, lab analysts who discover a potential suspect in this way may not be permitted to share that information with investigators. Such a policy, said William Fitzpatrick, a New York state district attorney, “is insanity. It’s disgraceful. If I’ve got something of scientific value that I can’t share because of imaginary privacy concerns, it’s crazy. That’s how we solve crimes.”

But the technique is arousing fierce objections from privacy advocates, who maintain that it turns family members into genetic informants without their knowledge or consent. They complain that it takes material collected for one purpose and uses it for another. And with the nation’s DNA database disproportionately comprised of minority offenders, they say, it amounts to placing a class of Americans under greater scrutiny merely because their relatives have committed crimes.

“If practiced routinely, we would be subjecting hundreds of thousands of innocent people who happen to be relatives of individuals in the FBI database to lifelong genetic surveillance,” said Tania Simoncelli, science adviser to the American Civil Liberties Union.

Nonetheless, California, which maintains the world’s third-largest criminal DNA database with more than 1 million samples, will soon become the first state to adopt a protocol to allow for familial searches. Last week, Colorado performed a test run of familial search software on its criminal database. In Massachusetts, officials say they plan to develop a policy to allow familial searches.

Read the full story in the Washington Post

Comment:

Is this yet more erosion of both the Fourth Amendment and our medical privacy? Once again, we hear arguments that the ends justify the means. Some day, people will realize that they don’t agree with all of the ends, but by then, it may be too late — the databases and permissions to use them will have been long-established. And people will look at each other and ask, “How did you let it get this far?”

Category: Health Data

Post navigation

← UK: Court sent me people's secret files
Contractor or vendor woes (commentary) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach
  • Oklahoma Expands its Security Breach Notification Law
  • Ransomware group Gunra claims to have exfiltrated 450 million patient records from American Hospital Dubai.
  • North Shore University Sleep Disorders Center employee charged with secretly recording patients in restrooms
  • When ransomware listings create confusion as to who the victim was
  • Rajkot civic body’s GIS website hit by cyber attack, over 400 GB data feared stolen
  • Taiwan’s BitoPro hit by NT$345 million cryptocurrency hack
  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Florida ban on kids using social media likely unconstitutional, judge rules
  • State Data Minimization Laws Spark Compliance Uncertainty
  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.