can genetic databases and privacy co-exist?

31
Lindsey Vickers Professor Dryer Privacy in a Digital Age May 2 2014 Can Genetic Databases and Privacy Co-exist? Relatively recent advances in science and technology have challenged our ability to protect personal information. In just over 50 years, scientists have been able to decode the recipe for life, DNA, as well as the methods and tests that decipher individual genetic information. The use of DNA evidence is a powerful scientific development that has allowed for advancements in forensics, medicine, and in determining ancestry. The combination of cataloguing and comparing DNA information presents one of the latest and most complex challenges in protecting personal privacy and information. This paper gives a brief history of the forensic use of DNA and discusses some of the privacy concerns related to expanding DNA databases. I. History of the Forensic Use of DNA 1

Upload: medialawguy

Post on 05-May-2017

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Can Genetic Databases and privacy Co-Exist?

Lindsey Vickers

Professor Dryer

Privacy in a Digital Age

May 2 2014

Can Genetic Databases and Privacy Co-exist?

Relatively recent advances in science and technology have challenged our ability to

protect personal information. In just over 50 years, scientists have been able to decode the recipe

for life, DNA, as well as the methods and tests that decipher individual genetic information. The

use of DNA evidence is a powerful scientific development that has allowed for advancements in

forensics, medicine, and in determining ancestry. The combination of cataloguing and comparing

DNA information presents one of the latest and most complex challenges in protecting personal

privacy and information. This paper gives a brief history of the forensic use of DNA and

discusses some of the privacy concerns related to expanding DNA databases.

I. History of the Forensic Use of DNA

In 1953, James Watson and Francis Crick, graduate students at Cambridge University,

discovered the structure of deoxyribonucleic acid, or DNA, the molecule responsible for our

physical and behavioral traits (Cambridge MRC Laboratory). It took scientists another 50 years

to completely sequence the human genome, ordering three billion As, Ts, Cs, and Gs (DNA-

nucleotides) to finally decode the DNA alphabet (National Human Genome Research Institute

“Extramural Research”). The human genome is comprised of 23 chromosomes and an estimated

25,000 genes (National Human Genome Research Institute “Abnormalities”). Human cells have

a total of 46 chromosomes, but a complete genome consists of one set, or 23 chromosomes, since

the second set is complementary (National Human Genome Research Institute “Project

1

Page 2: Can Genetic Databases and privacy Co-Exist?

Completion”). Sequencing the genome involved deciphering the order of DNA nucleotides for

one set of 23 chromosomes, with samples taken from six different individuals. In 2003 the

genome sequence was finally published and made available to scientists around the world via the

Internet, creating hundreds of new possibilities for the fields of science, forensics, and medicine.

Having the entire sequence is akin to “having all the pages of a manual needed to make the

human body” (National Human Genome Research Institute “Project Completion”).

DNA databases are used to catalogue, store, and compare individual genetic information.

Many of these databases hold genetic data for thousands, and sometimes tens of thousands, of

individuals. It is worth noting that evaluating segments of the DNA sequence and storing this

information in DNA databases pre-dates sequencing the human genome. Forensic scientists

created the first DNA fingerprint in 1984, but the human genome sequence was not published

until 2003 (Encyclopaedia Britannica; National Human Genome Research Institute “Project

Completion”). The insight provided by the human genome sequence expanded options for DNA

use in forensics and opened the door to new medical and commercial applications. Early DNA

databases only stored the profiles of convicted sex offenders. Today, in some states, databases

have expanded to include profiles from convicted felons as well as from arrestees (Hibbert). As

the equipment and resources needed for DNA analysis have become more readily available and

affordable, the range of information that can be garnered from the DNA molecule has also

grown.

In a 1987 criminal investigation DNA evidence was used for the first time (Crenson). The

evidence allowed officials to link a series of rapes to Tommie Lee Andrews (Crenson). Andrews’

case was only a precursor to the forensic technologies to come, including the use of DNA

databases. Initially, DNA profiling and options for creating a database to catalogue genetic

2

Page 3: Can Genetic Databases and privacy Co-Exist?

information were limited due to variable methods of analysis and inconsistencies in cataloguing

and comparing genetic data. Distinguishing individuals from one another was another difficulty

in the early days of DNA analysis, as the human DNA sequence differs by less than 2% (Ritter).

In response to these challenges, the Combined DNA Index System, or CODIS, was created and

piloted by the Federal Bureau of Investigation (FBI) in 1990 (Marpuri). The CODIS mapped the

location of 13 loci that are unlikely to be exactly the same for any two individuals (Norrgard).

These loci, or specific chromosome locations, which are also referred to as DNA markers, are

critical to creating DNA profiles (otherwise known as a DNA fingerprints) and can reveal DNA

sequence differences and/or similarities with a high degree of certainty (Federal Bureau of

Investigation Laboratory Services). During the pilot period, the CODIS software was only used

in “12 state and local forensic laboratories” (Adams). Initially the system allowed officials to

gather DNA from convicted offenders in order to form profiles, which were then stored in a

database and used to solve crimes where there were no suspects (Adams). A few years later, in

1994, the DNA Identification Act was passed. This act gives the FBI the authority needed to

utilize the CODIS to establish and index DNA records from those convicted of certain crimes,

and to analyze and catalogue DNA samples from unsolved crime scenes and/or unidentified

persons (U.S. DOJ Office of the Inspector General).

DNA evidence was used in the years following Andrews’ case, but the national database

did not become well known until the controversial conviction of the “Grim Sleeper.” The Los

Angeles Weekly nicknamed the murderer after his first killing spree ceased, only to resume a

number of years later (McCarthy). The Grim Sleeper traumatized residents of Los Angeles,

California for over two decades (Steinhauer). From 1985 to 1988, six women were shot and

killed with the same 0.25 caliber semiautomatic pistol (McCarthy). The first few murders

3

Page 4: Can Genetic Databases and privacy Co-Exist?

appeared unrelated, but eventually officials began identifying a pattern that connected the crimes.

For a period of 14 years, from 1988-2002, the killings stopped until three new murders occurred,

in 2002, and 2003, and then another 2007 (McCarthy). Given the lack of leads and dead ends in

the investigation, it appeared the Grim Sleeper would never be found. This may have been the

case if not for DNA evidence and testing.

Officials were unable to identify and arrest the Grim Sleeper until a familial search of the

DNA database detected similarities between an arrestee’s DNA and samples taken from the

scenes of the Grim Sleeper murders. At the time, California law enforcement officials were only

permitted to take DNA from individuals with felony convictions (Simon). In 2010, a novel

source of data would provide the lead that ultimately solved the case. When a relative of Lonnie

David Franklin Jr., the man who was ultimately identified as the Grim Sleeper, was convicted for

unlawful possession of a weapon his DNA was sampled and entered into California’s database of

unsolved crimes. Computer analysis flagged this sample as similar to DNA evidence gathered

from the Grim Sleeper murders. These similarities indicated a high likelihood that the arrestee

and serial killer were related. It was the smoking gun that would eventually lead investigators to

Franklin Jr. (Simon). However, before any arrest could occur, police investigators needed to

acquire a DNA sample directly from Franklin Jr. His DNA was collected by an undercover

police officer that posed as a busboy in order to gather a sample of saliva from the napkins and a

cup that Franklin had discarded while dining at a restaurant in his neighborhood (Dave). The

sample was analyzed and compared to the DNA taken from the crime scenes. The DNA profiles

revealed a definitive match (Dave). Lonnie David Franklin Jr. was subsequently arrested and

taken into custody. After the arrest, Franklin’s public defender argued that this method of DNA

collection was a violation of rights guaranteed by the Fourth Amendment, which prohibits

4

Page 5: Can Genetic Databases and privacy Co-Exist?

unreasonable searches and seizures of U.S. citizens. The defender claimed Franklin had a

reasonable expectation that his used napkins and cup would not be treated differently than any

other individual dining in a restaurant (Dave). However, when the case went to court, it was

ruled that the DNA had been lawfully obtained (Dave).

Today, every state in the U.S. has a DNA database of genetic information from those

convicted of serious crimes, and some states take DNA samples from those arrested for any

felony; the DNA is obtained by collecting cells through a cheek swab (Ross). The samples can

then be checked against the national DNA database of information from unsolved crimes (CBS

News). Those opposed to genetic databases argue that forensic DNA testing threatens the

presumption of innocence, and conflicts with the principle that you are “innocent until proven

guilty.” DNA analysis and the use of DNA databases in forensics is only one of many perceived

threats from cataloguing DNA information. Despite flying under the radar, DNA databases are

among the greatest threats to the privacy of people living in the 21st century.

II. Privacy Concerns Related to DNA Databases

Some maintain that DNA fingerprinting is akin to traditional fingerprinting methods (The

Tech Museum of Innovation). Every individual has unique differences in their genetic code and

in the patterns that define their digital fingerprints. Both of these unique personal characteristics

can be used as identification tools in forensic investigations, but any similarities between the two

end there. As new technologies are developed, we will be able to learn increasingly more about

an individual from a single DNA sample (Ross). Even now, DNA reveals much more than a

simple fingerprint. Unlike normal fingerprints, DNA can provide information on a number of

genetic diseases, as well as personality, and physical traits (Silverman). DNA “is inherited in a

far more consistent way [than fingerprints]. It shows who’s related to whom—something a

5

Page 6: Can Genetic Databases and privacy Co-Exist?

standard fingerprint could never reveal” (Ross). Although DNA technologies have become more

common, broad usage has been limited by cost and efficiency. Recent research efforts have

dramatically helped to lessen the impact of these limitations, and in the future it is likely we will

be able to “generate more detailed profiles more quickly” (Ross).

In the context of forensic sciences, DNA’s potential to reveal specific details about an

individual’s physical appearance is extremely important. DNA can provide information about a

person’s biological sex, hair and eye color, height, nose shape, whether a person has dimples,

and even if they are prone to obesity (Randerson; Silverman). Scientists from Pennsylvania State

University recently published an article that discusses the development of a computer program

capable of creating a digital mugshot from DNA samples taken from a crime scene. If this

system proves effective, it will be a far departure from flawed eyewitness recall and artist

renderings (Claes et. al; Reardon). The potential to generate DNA mugshots is only one

demonstration of just how much can be learned from our DNA. Privacy concerns associated with

genetic data do not end there. The sections below explore some additional privacy issues

associated with amassing large DNA databases.

A. Function Creep

One concern that arises with nearly all technological advances, especially those

concerning privacy, is function creep, or the creation of a technology with one purpose in mind

and its unforeseen expansion into other areas. This certainly applies to DNA databases as the

applications for their contents could easily expand beyond their intended uses. In a press release

from the late 90’s, the American Civil Liberties Union, or ACLU, claimed “We are already

beginning to see function creep in DNA databases… We have gone from collecting DNA from

convicted sex offenders to… creating banks of all violent offenders, of all persons convicted of a

6

Page 7: Can Genetic Databases and privacy Co-Exist?

crime, of juvenile offenders in 29 states, and now to proposals to DNA test all arrestees”

(American Civil Liberties Union). This press release did not reveal all of the implications and

legal issues that emerged following the publication of the human genome sequence, which

provided scientists with an even better understanding of the DNA molecule.

In an effort to narrow suspect pools, new DNA testing techniques have emerged. In

Britain, this has led to the use of DNA characteristics that can supposedly narrow a suspect’s

racial origins (Cho and Sankar). These new methods can align a suspect’s race with as few as

one or two ethnic groups (Cho and Sankar). Given that this is among the latest efforts to further

exploit DNA samples by deriving more specific information about a subject, the accuracy of

these tests is relatively unknown (Fullwiley). Although this technique originated in England, it

has also been used in the United States. In 2003, a Louisiana killer was identified shortly after a

tissue analysis “determined the killer was probably black” (Wade). Could DNA open new doors

for racial profiling and discrimination by allowing law enforcement officials to differentiate a

suspect by race?

B. Access and Use Concerns and the Possibility of Discrimination

As with all types of databases, there are concerns regarding unauthorized access and use

of information obtained from DNA. In 2008, President Bush signed the Genetic Information

Nondiscrimination Act, or GINA, into law (Marpuri; National Human Genome Research

Institute “Genetic Information Nondiscrimination”). This legislation was an important

preliminary action towards limiting the unethical use of genetic data by employers, insurance

companies, and medical providers. The GINA also provides protection for Americans who

volunteer as research subjects in studies involving genetic testing by “prohibiting discrimination

in the workplace and by health insurance providers” (National Human Genome Research

7

Page 8: Can Genetic Databases and privacy Co-Exist?

Institute “Genetic Information Nondiscrimination”). However, the scope of protection outlined

under the GINA falls short of considering all types of insurance plans and employers, leaving

some Americans vulnerable to genetic discrimination. “GINA’s provisions prohibiting

discrimination in health coverage based on genetic information do not extend to life insurance,

disability insurance or long-term care insurance” (U.S. Department of Health and Human

Services Office for Human Research Protections).

Aside from the insurance protection loopholes, the GINA does not apply to businesses

with fewer than 15 employees (Genetic Alliance). Additionally, it does not extend to some

veterans and members of the military, and health benefits provided for federal employees by the

Federal Employees Health Benefits Plan (Genetic Alliance). According to the National Human

Genome Institute, the act states that health insurance providers cannot “use genetic information

to make eligibility, coverage, underwriting or premium setting decisions” (National Human

Genome Research Institute “Genetic Information Nondiscrimination”). The GINA also

“prohibits requesting, requiring, or purchasing genetic information about an individual employee

or family member,” which ensures that DNA obtained directly or indirectly from an American

citizen cannot be used to profile and potentially discriminate on the basis of genetically inherited

traits (U.S. Equal Employment Opportunity Commission).

The GINA is an important first step in addressing this issue, but it is not foolproof, and it

has not prevented the “leakage of genomic data in a few cases” (Marpuri). On the surface, the

GINA seems to address what could be considered our most sacred and detailed personal

information, our DNA, from many of the obvious privacy issues. Novel, and more recent, uses of

DNA information have emerged in the form of personal genetic testing services (PGTSs). For-

profit companies provide a new challenge in what could be viewed as a race to protect our

8

Page 9: Can Genetic Databases and privacy Co-Exist?

genetic privacy. Preventing security breaches and limiting access to genetic information has

become more difficult with PGTSs. This is especially true in circumstances where DNA data is

stored by commercial entities and shared with consumers through private online accounts. Given

the now innumerable examples of hacking personal accounts for information and our increasing

reliance on computers and remote data storage methods, like those used by some PGTSs, it is

impossible to guarantee genetic data will remain secure and private. While legislation like the

GINA aims to protect individuals, the increased risk of security breaches combined with high

quantities of digitally archived and Internet accessible personal genetic information will make it

harder to prevent genetic discrimination. In addition to the voluntary offering of DNA samples to

PGTSs by consumers, insurance providers and employers are not the only groups that have an

interest in gathering genetic data from the public. Medical researchers and pharmaceutical

companies, as well as other third parties may want access to their clients’ genetic information for

marketing purposes and/or a better understanding of their cliental (American Cancer Society).

In some cases, unauthorized access to data is not directly linked to misuse. There is

always the potential for officials and managers of PGTSs or other entities managing genetic data

to access the information and violate the donor’s/customer’s privacy without the intent to

discriminate. In a hospital setting, there are checks and balances to ensure that healthcare

providers, who may be curious or know a patient personally, cannot casually review medical

files. History demands that we remain sensitive to the consequences of DNA profiling. It is not

unreasonable to foresee a future where DNA information could divide societies on the basis of

genetic fitness. Religion, physical appearance and other differences have resulted in now

unimaginable atrocities against humanity. DNA provides the most telling information, which in

the wrong hands could fuel divisive societal changes and result in harm based on genetic

9

Page 10: Can Genetic Databases and privacy Co-Exist?

superiority. Given the amount of information that can be gleaned from a DNA sample, it is

imperative that state and federal governments advance legislation to anticipate and address this

possibility.

C. Non-Consensual Genetic Testing

Preventing third party access to personal genetic information will become challenging as

more commercial genetic testing companies appear in the marketplace. Web-based companies

such as 23andMe, Genedx, and Navigenics, have made personal genetic testing affordable and

available to anyone, regardless of where they live. These companies provide customers with

information about their ancestry and disease risk, among other things. With little governmental

regulation and predominantly self-imposed and self-enforced policies, corruption, and potentially

insufficient security standards means DNA information could be viewed by third parties without

donor/customer consent (Su). It is now possible to obtain a sample of someone’s DNA without

their knowledge or permission, and then send it to a commercial testing company. This practice

is commonly referred to as surreptitious testing (Hill). Some state governments have sought to

control “surreptitious commercial [DNA] testing” but, as of 2012, only half of U.S. states have

made this practice illegal (Brown). Companies like Nanopore Technologies are developing small

portable devices that analyze different molecules, including DNA (Nanopore). Affordability and

easy access will make DNA analysis more widely available in the future. Given that people leave

a DNA trail practically everywhere they go, this type of technology and a lack of regulation pose

major threats to privacy.

10

Page 11: Can Genetic Databases and privacy Co-Exist?

D. Security Concerns with Private DNA Databases

The website advertising services for 23andMe appears innocuous, and promises

consumers, “23andMe respects your privacy. 23andMe does not sell, lease, or rent your

individual-level Personal Information without your explicit consent.” However, the company’s

official privacy statement reveals potential problems with their data storage and possible release

of customer information. On the topic, the company states,

“We may disclose to third parties, and/or use in our services, ‘Aggregated Genetic

and Self-Reported Information’, which is Genetic and Self-Reported Information

that has been stripped of registration information and combined with data from a

number of other users sufficient to minimize the possibility of exposing

individual-level information while still providing scientific evidence.” (23andMe)

There are several issues with this statement. The vague wording allows the company to easily

change the interpretation or definition of their terms. Additionally, “Sufficient to minimize the

possibility of exposing individual-level evidence” is, in no way, a promise of taking all possible

precautions to ensure the privacy and protection of their customers.

Others have raised concerns regarding the company’s purpose for collecting genetic

information. Various sources believe that 23andMe’s real goal is to build a massive database of

genetic information, which can then be associated with what each consumer reports about their

personal health. “A large enough database of people who were sharing not only genetic

information but information about their health and bodies offered… a tool that could be used to

find new genetic connections, for detecting drug side effects, maybe even for finding new

diagnostics or cures” (Herper). Some appreciate this action, and one journalist even claims that,

“on very many big issues, the company is right” (Herper). Of course, there are also opponents of

11

Page 12: Can Genetic Databases and privacy Co-Exist?

this unconfirmed ulterior motive, “the agency [FDA] has no clue about the real dangers they

[23andMe] pose. The Personal Genome Service isn’t primarily intended to be a medical device.

It is a mechanism meant to be a front end for a massive information-gathering operation against

an unwitting public” (Seife).

With respect to both the governmentally managed CODIS database as well as smaller

databases managed by consumer genetic testing companies, there are legitimate concerns

regarding data security and the potential for breaches. 23andMe provides customers with a

personal online account, which is where a client’s self-reported medical information and test

results are stored. Hackers and viruses alike could target these sites and glean the information

from private emails, or personal data stored on the accounts. Two personal genetic testing

companies that rely on this type of system for accounting and communicating with customers are

23andMe and Navigenics. Recently, a flaw in OpenSSL was discovered, the most commonly

used open-source encryption system. OpenSSL is used to keep emails and other data only

intended for one recipient secure (Russell). The heartbleed bug disguises itself as a “heartbeat,”

or a small packet of data that is sent from one computer to another to ensure that both computers

are actually present (Russell). To prove both computers are operational, the one that received the

heartbeat sends back a small packet of data it has stored in its memory (Russell). This bug

“allows attackers to eavesdrop on communications, steal data directly from the services and users

and to impersonate services and users,” and it is thought that half a million websites have been

affected (Wakefield). A bug like this could easily allow hackers to target sites like 23andMe, and

threatens to expose private medical data and genetic information obtained from consumers who

use these services.

12

Page 13: Can Genetic Databases and privacy Co-Exist?

Some argue that even if these databases were breached, it would be difficult, if not

impossible, for hackers to use genetic information to identify the anonymous individual who

provided it. Yet, it only took one M.I.T. undergraduate and a professor to prove that this is a

potential and real threat, and that some DNA samples can be traced back to the anonymous or

unidentified individual who contributed them. Using data available to the public from the 1,000

Genomes Project website, the professor and student selected 32 males to study and extracted the

genetic marker information from their DNA sequences (Ferguson). Afterwards, they used the

extraction, as well as the meta-data supplied with each sample, to search two publicly accessible

genealogy websites (Ferguson). These websites linked the data to surnames, although this may

seem insignificant,

“the results show that a curious party equipped with open-access information can

not only tie a three-billion-digit-long genome directly to an individual, but also

can use bits and pieces of that same DNA to identify distant relatives, male or

female, of the original genetic donor…. This is the first time that anyone has

connected an anonymous DNA sequence to its donor without donor DNA as a

reference” (Ferguson).

III. Conclusion

There are numerous nuances and questions surrounding the use of DNA databases and

whether we will be able to protect genetic privacy in the future. The widespread collection of

genetic data could easily allow the government and other entities to come too close to our

personal lives, and peer into the information encoded in our genes. This could pave the way for

an entirely new variety of discrimination based solely on inheritance. Although it is indisputable

that DNA evidence is more accurate than eyewitness testimonies; it is difficult to know exactly

13

Page 14: Can Genetic Databases and privacy Co-Exist?

where to draw the line when it comes to the extent of analysis and long-term storage of DNA

profile information. These questions are only further complicated by options to obtain DNA

indirectly, by using methods like familial searches.

New ideas and technologies, like DNA databases, are often greeted with skepticism.

Despite this, in many cases these technologies gradually become accepted and widely used. One

of the best, and oldest examples of this phenomenon is writing. Initially Socrates was extremely

skeptical about writing, and stated:

“And in this instance you who are the father of letters, from a paternal love of

your own children have been led to attribute to them a quality which they cannot

have; for this discovery of yours will create forgetfulness in the learners’ souls,

because they will not use their memories; they will trust to the external written

characters and not remember of themselves.” (Konnikova)

Thousands of years later, writing has become commonplace and unavoidable; it is impossible to

imagine a modern world without writing. Socrates made the assumption that it would negatively

impact the people of his era, making them forgetful, but it is obvious that this was not actually

the case and that writing was an innovation critical to advancing society. Writing is not a new

“technology” by today’s standards, but in the time of Socrates, it was revolutionary.

More recently, people have questioned the impact of the internet, use of websites like

Facebook and MySpace, and criticized impersonal modes of communication, like texting and

instant-messaging. Texting has been in use for over 20 years, but people continue to question

whether or not it will negatively influence society (Moore). One of the largest questions

surrounding the use of texting is whether it has, or will, change how people communicate in

person (Tardanico). It is evident that computer technologies, and informal web-based

14

Page 15: Can Genetic Databases and privacy Co-Exist?

communication platforms are not going anywhere soon. Most millennials can hardly imagine life

without a cell phone, and they would rather give up their car or TV set instead (Maynard).

Undoubtedly, social scientists are gathering data on how computers have altered human

interactions and communications. Whether or not these new technologies are harmful will be a

matter of perspective and time. Perhaps in the future, DNA databases will be accepted, widely

used, and important to society. As with writing and texting, new innovations require an

adjustment period. Possibly there will come a day when people shake their heads and chuckle at

the skepticism that surrounded DNA databases, but this acceptance may be part of a future where

privacy has been completely redefined, or more frighteningly, no longer exists.

15

Page 16: Can Genetic Databases and privacy Co-Exist?

Works Cited

Adams, Dwight E. United States Federal Bureau of Investigation. Laboratory Division., May 14, 2002. http://www.fbi.gov/news/testimony/the-fbis-codis-program. (Last Visited Apr. 14, 2014)

American Cancer Society. Oct. 18, 2013. “Genetic Testing for Cancer: What You Need to Know.” http://www.cancer.org/acs/groups/cid/documents/webcontent/002548-pdf.pdf. (Last Visited Apr. 30, 2014)

American Civil Liberties Union, ACLU. Mar. 01, 1999. “ACLU Warns of Privacy Abuses in Government Plan to Expand DNA Databases.” https://www.aclu.org/technology-and-liberty/aclu-warns-privacy-abuses-government-plan-expand-dna-databases. (Last Visited Apr. 12, 2014)

Arkowitz, Hal, and Scott O. Lilienfeld. "Why Science Tells Us Not to Rely on Eyewitness Accounts." Scientific American., Jan. 08, 2009. http://www.scientificamerican.com/article/do-the-eyes-have-it/. (Last Visited Apr. 13, 2014)

Encyclopaedia Britannica. “DNA Fingerprinting.” Encyclopaedia Britannica Online Academic Edition. http://www.britannica.com/EBchecked/topic/167155/DNA-fingerprinting. (Last Visited May 1, 2014)

Brown, Elizabeth N. "How Private Is Your Genetic Code? Less So Than You May Think." AARP Blog. AARP, Nov. 10 2012. http://blog.aarp.org/2012/10/11/how-private-is-your-genetic-code-less-so-than-you-may-think/. (Last Visited Apr. 13, 2014)

Cambridge MRC Laboratory of Molecular Biology, "DNA: 50 Years of the Double Helix." 2003. http://www2.mrc-lmb.cam.ac.uk/dna2003/. (Last Visited Apr. 13, 2014)

CBS. Supreme Courts Says Police Can Take DNA Swabs after Arrest. CBS News., June 03, 2013. http://www.cbsnews.com/news/supreme-court-says-police-can-take-dna-swabs-after-arrest/. (Last Visited Apr. 13, 2014)

Cho, Mildred K., and Pamela Sankar. "Forensic Genetics and Ethical, Legal and Social Implications beyond the Clinic." Nature Genetics (2004): Nature Genetics. Nature Publishing Group, Oct. 26, 2004. http://www.nature.com/ng/journal/v36/n11s/full/ng1594.html. (Last Visited Apr. 12, 2014)

Crenson, Matt. "Serial Rapist's Conviction Was First to Involve DNA." Los Angeles Times. Los Angeles Times, Mar. 02 1997. http://articles.latimes.com/1997-03-02/local/me-33996_1_serial-rapist. (Last Visited Mar. 28, 2014)

Claes, Peter, Denise Liberton, Katleen Daniels, Kerri Mathes Rosana, Ellen Quillen et al. "Modeling 3D Facial Shape from DNA." PLOS Genetics., Mar. 20, 2014. http://www.plosgenetics.org/article/info%253Adoi%252F10.1371%252Fjournal.pgen.1004224. (Last Visited Apr. 21, 2014)

Dave, Paresh. "DNA Evidence in Grim Sleeper Case Was Taken Legally, Judge Rules." Los Angeles Times., Jan. 07, 2014. http://www.latimes.com/local/la-me-grim-sleeper-20140108,0,493058.story#axzz2xVbWSkVD. (Last Visited Mar. 28, 2014)

Federal Bureau of Investigation Laboratory Division. “Frequently Asked Questions (FAQs) on the CODIS Program and the National DNA Index System.” http://www.fbi.gov/about-us/lab/biometric-analysis/codis/codis-and-ndis-fact-sheet. (Last Visited Apr. 30, 2014)

16

Page 17: Can Genetic Databases and privacy Co-Exist?

Ferguson, William. "A Hacked Database Prompts Debate about Genetic Privacy." Scientific American Global RSS., 05 Feb. 2013. http://www.scientificamerican.com/article/a-hacked-database-prompts/. (Last Visited Apr. 12, 2014)

Fullwiley, Duana. Can DNA "Witness" Race?: Forensic Uses of an Imperfect Ancestry Testing Technology. 2008. Genewatch 21(3-4): 12-14. http://dash.harvard.edu/bitstream/handle/1/3008240/Fullwiley_DNAWitnessRace.pdf?sequence=1. (Last Visited Apr 21, 2014)

Genetic Alliance. “Gina & You.” May 2010. http://www.dnapolicy.org/resources/GINAInformationSheet052710.pdf (Last Visited May 1, 2014)

Herper, Matthew. "23andStupid: Is 23andMe Self-Destructing?" Forbes., Nov. 25, 2013. http://www.forbes.com/sites/matthewherper/2013/11/25/23andstupid-is-23andme-self-destructing/. (Last Visited Apr. 12, 2014)

Hibbert, Michelle. "State and Federal DNA Database Laws Examined." The Case for Innocence. Frontline, 1999. http://www.pbs.org/wgbh/pages/frontline/shows/case/revolution/databases.html. (Last Visited Apr. 30, 2014)

Hill, Kashmir. "Genome Hackers." Forbes. Dec. 30 2010. Web. http://www.forbes.com/forbes/2011/0117/features-dna-databases-gene-scans-genome-hackers.html. (Last Visited May 1, 2014)

Konnikova, Maria. "On Writing, Memory, and Forgetting: Socrates and Hemingway Take on Zeigarnik." Scientific American. Macmillan Publishers, Apr. 30, 2012. Web. http://blogs.scientificamerican.com/literally-psyched/2012/04/30/on-writing-memory-and-forgetting-socrates-and-hemingway-take-on-zeigarnik/. (Last Visited Apr. 26, 2014)

Marpuri, Ian L. United States National Institutes of Health. Office of the Director. Researchers Explore Genomic Data Privacy Risk. National Human Genome Research Institute, Apr. 08, 2013. http://www.genome.gov/27553487. (Last Visited Apr. 18, 2014)

Maynard, Micheline. "Millennials in 2014: Take My Car, Not My Phone." Forbes Magazine., Jan. 08, 2014. (Last Visited Apr. 30, 2014)

McCarthy, Terry. "The Case of the Grim Sleeper." Time Dec. 05, 2011: 38-45. Academic Search Premier. http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=67514448&site=ehost-live. (Last Visited Mar. 17, 2014)

Mears, Bill. "Supreme Court: DNA Swab after Arrest Is Legitimate Search." CNN Justice. CNN, June 04, 2013. http://www.cnn.com/2013/06/03/justice/supreme-court-dna-tests/. (Last Visited Mar. 28, 2014)

Moore, Karl. "Young People, Stop Just Texting Me and Give Me a Call Once in a While PLZ! Part Deux." Forbes Magazine., Dec. 06, 2012. http://www.forbes.com/sites/karlmoore/2012/12/06/young-people-stop-just-texting-me-and-give-me-a-call-once-in-a-while-plz-part-deux/. (Last Visited Apr. 30, 2014)

Nanopore Technologies. 2014. https://www.nanoporetech.com (Last Visited: Apr. 17, 2014)National Human Genome Research Institute. Health and Human Services. The Human Genome

Project Completion: Frequently Asked Questions. National Institutes of Health, Oct. 30, 2010. http://www.genome.gov/11006943. (Last Visited Apr. 19, 2014)

National Human Genome Research Institute. Health and Human Services. An Overview of the Extramural Research Program. National Institutes of Health, Apr. 17, 2013 https://www.genome.gov/12010633. (Last Visited Apr. 30, 2014)

17

Page 18: Can Genetic Databases and privacy Co-Exist?

National Human Genome Research Institute. Health and Human Services. Chromosome Abnormalities. National Institutes of Health, Feb. 12, 2014 http://www.genome.gov/11508982#al-2. (Last Visited Apr. 30 2014)

National Human Genome Research Institute. Health and Human Services. Genetic Information Nondiscrimination Act of 2008. National Institutes of Health, Jan. 27, 2014. http://www.genome.gov/11006943. (Last Visited Apr. 30, 2014)

Norrgard, K. (2008) Forensics, DNA fingerprinting, and CODIS. Nature Education 1(1):35 http://www.nature.com/scitable/topicpage/forensics-dna-fingerprinting-and-codis-736 (Last Visited Apr. 14, 2014)

Randerson, James. "What DNA Can Tell Us." The Observer. The Guardian, Apr. 26, 2008. http://www.theguardian.com/science/2008/apr/27/genetics.cancer. (Last Visited Apr. 26, 2014)

Ritter, Malcolm. "Study: Humans' DNA Not Quite so Similar." USA Today. Associated Press, Sept. 04, 2007. http://usatoday30.usatoday.com/news/health/2007-09-03-dna-differences_N.htm. (Last Visited Apr. 28, 2014)

Reardon, Sara. "Mugshots Built Form DNA Data." Nature News., Nature. Nature Publishing Group. Mar. 20, 2014. http://www.nature.com/news/mugshots-built-from-dna-data-1.14899. (Last Visited Apr. 30, 2014)

Ross, Valerie. "Forget Fingerprints: Law Enforcement DNA Databases Posed to Expand." Nova Next. Nova, Jan. 02, 2014. http://www.pbs.org/wgbh/nova/next/body/dna-databases/. (Last Visited Apr. 30, 2014)

Russell, Kyle. "Here's How To Protect Yourself From The Massive Security Flaw That's Taken Over The Internet” Apr. 08, 2014. http://www.businessinsider.com/heartbleed-bug-explainer-2014-4. (Last Visited Apr. 13, 2014)

Seife, Charles. "23andMe Is Terrifying, but Not for the Reasons the FDA Thinks." Scientific American Technology. Scientific American, Nov. 27, 2013. http://www.scientificamerican.com/article/23andme-is-terrifying-but-not-for-reasons-fda/. (Last Visited Apr. 12, 2014)

Silverman, Jacob. "10 Things Our Genes Can Tell Us." Curiosity. Discovery, http://www.discovery.com/tv-shows/curiosity/topics/10-things-genes-tell-us.htm. (Last Visited Apr. 24, 2014)

Simon, Mallory. "Arrest Made in Los Angeles Grim Sleeper Case." CNN Justice. CNN, July 08, 2010. http://www.cnn.com/2010/CRIME/07/07/grim.sleeper.arrest/ (Last Visited Apr. 01, 2014)

Steinhauer, Jennifer. "‘Grim Sleeper’ Arrest Fans Debate on DNA Use." New York Times., July 08, 2010. http://www.nytimes.com/2010/07/09/us/09sleeper.html?pagewanted=all. (Last Visited Apr. 12, 2014)

Tardanico, Susan. "Is Social Media Sabotaging Real Communication?" Forbes Magazine., Apr. 30, 2012. Web. http://www.forbes.com/sites/susantardanico/2012/04/30/is-social-media-sabotaging-real-communication/. (Last Visited: Apr. 28, 2014)

The Tech Museum of Innovation. Stanford at the Tech Understanding Genetics. “DNA Fingerprinting is Everywhere!” http://genetics.thetech.org/original_news/news16. (Last Visited Apr. 30, 2014)

U.S. Department of Health and Human Services. Office for Human Research Protections. “Guidance on the Genetic Information Nondiscrimination Act: Implications for

18

Page 19: Can Genetic Databases and privacy Co-Exist?

Investigators and Institutional Review Boards.” Mar. 4, 2009. http://www.hhs.gov/ohrp/policy/gina.html. (Last Visited Apr. 30, 2014)

U.S. Department of Justice. Office of the Inspector General, Audit Division. May 2006. “Combined DNA Index System Operational and Laboratory Vulnerabilities.” http://www.justice.gov/oig/reports/FBI/a0632/final.pdf. (Last Visited Apr. 12, 2014)

U.S. Equal Employment Opportunity Commission “Genetic Information Discrimination.” http://www.eeoc.gov/laws/types/genetic.cfm (Last Visited May 1, 2014)

United States Health and Human Services. Office of the Inspector General. May 2006. “Statement on Compliance with Laws and Regulations.” http://www.justice.gov/oig/reports/FBI/a0632/laws.htm. (Last Visited: Apr. 30, 2014)

Wade, Nicholas. "Unusual Use of DNA Aided in Serial Killer Search." The New York Times. June 08, 2003. http://www.nytimes.com/2003/06/03/us/unusual-use-of-dna-aided-in-serial-killer-search.html. (Last Visited Mar. 17, 2014)

Wakefield, Jane. "Heartbleed Bug: What You Need to Know." BBC News Technology. BBC, Apr. 10, 2014. http://www.bbc.com/news/technology-26969629 (Last Visited Apr. 12, 2014)

23andMe. “Privacy Highlights” https://www.23andme.com/about/privacy/ (Last Visited Apr. 18, 2014)

19