Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-94fs2 Total loading time: 0 Render date: 2024-11-19T11:49:45.793Z Has data issue: false hasContentIssue false

7 - DNA databases and the forensic imaginary

from Section 2 - National contexts of forensic DNA technologies and key issues

Published online by Cambridge University Press:  05 October 2012

Richard Hindmarsh
Affiliation:
Griffith University, Queensland
Barbara Prainsack
Affiliation:
King's College London
Get access

Summary

INTRODUCTION

Technologies promising to provide reliable knowledge of individual human subjects are the constant companions of efforts to control personal and collective action in all societies. There is an extensive scholarly literature on the ways in which the historically and socially conditioned ‘interiors’ of such subjects, variously formulated as subjectivity, self-identity or ipse, have been constructed and interrogated in recent and contemporary social formations (see especially Foucault (1977, 1979), Martin et al. (1988) and Rose (1985, 1990, 1996, 1999)). Less well studied, at least until recently, have been the related efforts of a range of commercial, industrial and state agencies (especially security and criminal justice agencies) to acquire and use knowledge of the uniquely differentiated and securely fixed individualising characteristics of their employees, customers and citizens. Methods for reliably grasping and securing what passes for ‘individual identity’, ‘individuality’ or ‘idem’ are desiderata for any such agency seeking to attribute or evaluate claims of individual identifiability amongst the population members with which it deals. There is an increasingly large number of institutional actors who seek assurance that each individual with whom they deal can be differentiated from all others, and that there are ways of anchoring the changing biographies of such individuals to some ineradicable and unchanging bodily substrate.

It is widely asserted that a concern with the ‘legibility’ of such individualised identities is a key feature of modern state formations, and also that this concern has become intensified in many societies in the first decade of the twenty-first century, especially those that define themselves as being at risk from uncontrolled migration or from terrorist violence.

Type
Chapter
Information
Genetic Suspects
Global Governance of Forensic DNA Profiling and Databasing
, pp. 131 - 152
Publisher: Cambridge University Press
Print publication year: 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aas, K (2006). The body does not lie; identity, risk and trust in technoculture. Crime Media Culture, 2, 143–158.CrossRefGoogle ScholarPubMed
Amey, P, Hale, C. and Uglow, S. (1996). Proactive Policing. Edinburgh: Scottish Central Research Unit.Google Scholar
,Association of Chief Police Officers (2005). DNA Good Practice Manual. London: Association of Chief Police Officers.Google Scholar
Barton, A. and Evans, R. (1999). Proactive Policing on Merseyside Police. London: The Stationery Office.Google Scholar
Borup, M., Brown, N., Konrad, K. et al. (2006). The sociology of expectations in science and technology. Technology Analysis and Strategic Management, 18, 285–298.CrossRefGoogle Scholar
Caddy, B., Taylor, G. and Linacre, A. (2008). A Review of the Science of Low Template DNA Analysis. London: The Stationery Office.Google Scholar
Caplan, J. and Torpey, J. (2001). Documenting Individual Identity: The Development of State Practices in the Modern World. Princeton, NJ: Princeton University Press.Google Scholar
Cole, S. A. (2001). Suspect Identities: A History of Fingerprinting and Criminal Identification. Cambridge MA: Harvard University Press.Google Scholar
Cole, S. A. (2004). Fingerprint identification and the criminal justice system: historical lessons for the DNA Debate. InDNA and the Criminal Justice System: The Technology of Justice, ed. Lazer, D.. Cambridge, MA: MIT Press, pp. 63–90.Google Scholar
,Council of Europe (1950). Convention for the Protection of Human Rights and Fundamental Freedoms. Strasbourg: Council of Europehttp://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=005&CL=ENG (accessed February 2010).Google Scholar
Dror, I. and Charlton, D. (2006). Why experts make errors. Journal of Forensic Identification, 56, 600–616.Google Scholar
Eco, U. and Sebeok, T. (1983). The Sign of Three: Dupin, Holmes, Peirce. Bloomington IL: Indiana University Press.Google Scholar
Ericson, R. and Haggerty, K. (1997). Policing the Risk Society. Oxford: Oxford University Press.Google Scholar
,Forensic Science Service (2000). Memorandum of Understanding between the Association of Chief Police Officers and the Custodian of the National DNA Database. Birmingham: Forensic Science Service.Google Scholar
Foucault, M. (1977). Discipline and Punish: the Birth of the Prison. London: Allen Lane.Google Scholar
Foucault, M. (1979). The History of Sexuality, Vol. 1: An Introduction. London: Allen Lane.Google Scholar
Foucault, M. (2003). Society Must Be Defended. London: PicadorGoogle Scholar
Foucault, M. (2004). Security, Territory, Population. London: Palgrave Macmillan.Google Scholar
Gerlach, N. (2004). The Genetic Imaginary: DNA in the Canadian Criminal Justice System. Toronto: University of Toronto Press.CrossRefGoogle Scholar
Gill, P., Jeffreys, A. and Werrett, D (1985). Forensic application of DNA ‘fingerprints’. Nature, 318, 577–579.CrossRefGoogle Scholar
Heaton, R. (2000). The prospects for intelligence-led policing: some historical and quantitative considerations. Policing and Society, 9, 337–356.CrossRefGoogle Scholar
,Home Office (2003). Executive Summary of McFarland Review of the Forensic Science Service. London: The Stationery Office.Google Scholar
,Home Office (2009). Keeping the Right People on the DNA Database: Science and Public Protection. London: The Stationery Office.Google Scholar
,House of Commons Home Affairs Committee (1989). Report on 1988–1989 Session. London: HMSO.Google Scholar
,House of Lords Select Committee on Science and Technology (1993). Fifth Report on Forensic Science. London: HMSO.Google Scholar
,House of Lords Select Committee on Science and Technology (1997). The Governance of Public Bodies. London: HMSO.Google Scholar
,House of Lords Select Committee on Science and Technology (2001). Human Genetic Databases: Challenges and Opportunities. London: The Stationery Office.Google Scholar
,House of Lords Select Committee on Science and Technology (2003).Committee Report. London: The Stationery Office, p. 115.Google Scholar
,Human Genetics Commission (2002). Inside Information: Balancing Interests in the Use of Personal Genetic Data. London: The Stationery Office.Google Scholar
Inman, K. and Rudin, N. (2001). Principles and Practice of Criminalistics: The Profession of Forensic Science. London: CRC Press.Google Scholar
Innes, M. (2003). ‘Signal crimes’: Detective work, mass media and constructing collective memory. InCriminal Visions: Media Representations of Crime and Justice, ed. Mason, PCullompton, UK: Willan, pp. 51–69.Google Scholar
Jeffreys, A., Wilson, V. and Thein, S. (1985). Individual-specific ‘fingerprints’ of human DNA. Nature, 316, 76–79.CrossRefGoogle ScholarPubMed
John, T. and Maguire, M. (2003). Rolling out the National Intelligence Model: key challenges. In Essays in Problem-oriented Policing, eds. Bullock, K and Tilley, N.. Cullompton, UK: Willan, pp. 38–68.Google Scholar
Johnson, P. and Williams, R. (2004a). DNA and crime investigation: Scotland and the UK National DNA Database. Scottish Journal of Criminal Justice, 10, 71–84.Google Scholar
Johnson, P. and Williams, R (2004b). Post-conviction DNA testing: the UK's first exoneration case?Science and Justice, 4, 77–82.CrossRefGoogle Scholar
Johnson, P, Martin, P. and Williams, R. (2003). Genetics and forensics: a sociological history of the National DNA Database. Science Studies, 16: 22–37.Google Scholar
Lambourne, G. (1984). The Fingerprint Story. London: Harrap.Google Scholar
Lyon, D. (2001). Surveillance Society: Monitoring Everyday Life. Buckingham, UK: Open University Press.Google Scholar
Lyon, D. (ed.) (2006). Theorizing Surveillance: The Panopticon and Beyond. Cullompton, UK: Willan.
Martin, L., Gutman, H. and Hutton, P. (eds.) (1988). Technologies of the Self. London: Tavistock.
Nickell, J. and Fischer, J. (1999). Crime Science: Methods of Forensic Detection. Lexington KY: University of Kentucky Press.Google Scholar
Ouchi, W. (1980). Markets, bureaucracies and clans. Administrative Science Quarterly, 25, 129–141.CrossRefGoogle Scholar
Rose, N. (1985). The Psychological Complex: Psychology, Politics and Society in England 1869–1939. London: Routledge & Kegan Paul.Google Scholar
Rose, N. (1990). Governing the Soul: The Shaping of the Private Self. London: Routledge & Kegan Paul.Google Scholar
Rose, N. (1996). Inventing Ourselves: Psychology, Power and Personhood. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Rose, N. (1999). Powers of Freedom. Cambridge, UK: Cambridge University Press.CrossRefGoogle Scholar
Sengoopta, C. (2003). Imprint of the Raj: How Fingerprinting Was Born in Colonial India. London: Macmillan.Google Scholar
Spufford, F. and Uglow, J. (eds.) (1996). Cultural Babbage: Technology, Time and Invention. London: Faber.
Taylor, C. (2004). Modern Social Imaginaries. Durham, NC: Duke University Press.Google Scholar
Torpey, J. (1998). Coming and going: on the state monopolization of the legitimate ‘means of movement’. Sociological Theory, 16, 239–259.CrossRefGoogle Scholar
Torpey, J. (2000). The Invention of the Passport: Surveillance, Citizenship and the State. Cambridge, UK: Cambridge University Press.Google Scholar
Touche, Ross (1987). Review of Scientific Support for the Police. London: The Stationery Office.Google Scholar
Valier, C. (1998). True crime stories: scientific methods of criminal investigation, criminology and historiography. British Journal of Criminology, 38, 88–105.CrossRefGoogle Scholar
Valier, C. (2001). Criminal detection and the weight of the past: critical notes on Foucault, subjectivity and preventative control. Theoretical Criminology, 5, 425–443.CrossRefGoogle Scholar
Ploeg, I. (2005). The Machine-readable Body: Essays on Biometrics and the Informatization of the Body. Maastricht: Shaker Publishing.Google Scholar
Williams, R. and Johnson, P. (2004a). Circuits of surveillance. Surveillance and Society, 2, 1–14.Google ScholarPubMed
Williams, R. and Johnson, P. (2004b). ‘Wonderment and dread’: representations of DNA in ethical disputes about forensic DNA databases. New Genetics and Society, 23, 205–222.CrossRefGoogle ScholarPubMed
Williams, R. and Johnson, P. (2005). Inclusiveness, effectiveness and intrusiveness: Issues in the developing uses of DNA profiling in support of criminal investigations. Journal of Law Medicine and Ethics, 33, 545–558.CrossRefGoogle ScholarPubMed
Williams, R., Johnson, P. and Martin, P. (2004). Genetic Information and Crime Investigation. London: Wellcome Trust.Google Scholar
Zureik, E. and Salter, M. (2005). Global Surveillance and Policing. Cullompton, UK: Willan.Google Scholar
S and Marper v. the United Kingdom (2008). A summary of the judgment is available from http://cmiskp.echr.coe.int/tkp197/view.asp?action=html&documentId=843937&portal=hbkm & source=externalbydocnumber& table=F69A27FD8FB86142BF01C1166DEA398649.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×