Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-fbnjt Total loading time: 0 Render date: 2024-11-03T01:56:13.864Z Has data issue: false hasContentIssue false

4 - Technology as a regulatory tool: DNA profiling and Marper

from Part I - General introduction

Published online by Cambridge University Press:  05 August 2012

Roger Brownsword
Affiliation:
King's College London
Morag Goodwin
Affiliation:
Universiteit van Tilburg, The Netherlands
Get access

Summary

Introduction

On a particular day in June 2006, The Times featured two stories that are indicative of the way in which regulators might turn to technological tools. The first story, running over two pages, announces a proposed network of new generation synchronised speed cameras; if a car is driven too fast through a restricted speed zone, the cameras will pick this up, the car number plate will be identified, the information is centrally processed and penalty notices issued within minutes of the offence. The second story, taking up a whole page, reports that a 58-year-old architect, having been interviewed but not charged in connection with a complaint about theft, and having had a DNA sample routinely taken, was found to have a DNA match with samples taken from crime scenes where young girls had been indecently assaulted many years earlier. In both cases, these reports are implicit endorsements, indeed a celebration, of the relevant technologies.

There is more to this than mere newspaper talk. A few months later, a report for the (UK) Information Commissioner predicted that, as the technologies of surveillance become increasingly sophisticated, less obtrusive and embedded, citizens will not always be aware that they are being monitored and regulated. Thus:

[The] continuous software-sorting of people and their life chances in cities is organised through myriad electronic and physical ‘passage points’ or ‘choke points’, negotiated through a widening number of code words, pass words, PIN numbers, user names, access controls, electronic cards or biometric scans. Some are highly visible and negotiated willingly (a PIN credit card purchase or an airport passport control). Others are more covert (the sorting of internet or call centre traffic). On still other occasions, the passage point is clear (a CCTV camera on a street or a speed camera on a motorway), but it is impossible to know in practice if one’s face or car number plate has actually been scanned.

More generally, the ‘combination of CCTV, biometrics, databases and tracking technologies can be seen as part of a much broader exploration … of the use of interconnected “smart” systems to track movements and behaviours of millions of people in both time and space’.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ball, KirstieLyon, DavidWood, David MurakamiNorris, CliveRaab, CharlesA Report on the Surveillance SocietyLondon, IC 2006Google Scholar
Brownsword, RogerAutonomic Computing and Transformations of Human AgencyLondonRoutledge 2011Google Scholar
Brownsword, RogerRegulating TechnologiesOxfordHart 2008Google Scholar
Nuffield Council on BioethicsThe Forensic Use of Bioinformation: Ethical IssuesLondon 2007Google Scholar
Brownsword, RogerReinventing Data Protection?DordrechtSpringer 2009Google Scholar
Krimsky, SheldonSimoncelli, TaniaGenetic JusticeNew YorkColumbia University Press 2011Google Scholar
www.hgc.gov.uk 2012
1981
Harris, D. J.O’Boyle, M.Bates, E. P.Buckley, C. M.Harris, O’Boyle & Warbrick: Law of the European Convention on Human RightsOxfordOxford University Press 2009Google Scholar
Brownsword, RogerAfter : Two Readings, Two ResponsesSCRIPTed 6(1) 2009 1CrossRefGoogle Scholar
Hert, Paul deCitizens’ Data and Technology: An Optimistic PerspectiveThe HagueDutch Data Protection Authority 2009Google Scholar
Hindmarsh, RichardPrainsack, BarbaraGenetic SuspectsCambridgeCambridge University Press 2010CrossRef
Rothstein, Mark A.The Expanding Use of DNA in Law Enforcement: What Role for Privacy?Journal of Law, Medicine and Ethics 34 2006 153CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×