scholarly journals Attacks on genetic privacy via uploads to genealogical databases

2019 ◽  
Author(s):  
Michael D. Edge ◽  
Graham Coop

AbstractDirect-to-consumer (DTC) genetics services are increasingly popular for genetic genealogy, with tens of millions of customers as of 2019. Several DTC genealogy services allow users to upload their own genetic datasets in order to search for genetic relatives. A user and a target person in the database are identified as genetic relatives if the user’s uploaded genome shares one or more sufficiently long segments in common with that of the target person—that is, if the two genomes share one or more long regions identical by state (IBS). IBS matches reveal some information about the genotypes of the target person, particularly if the chromosomal locations of IBS matches are shared with the uploader. Here, we describe several methods by which an adversary who wants to learn the genotypes of people in the database can do so by uploading multiple datasets. Depending on the methods used for IBS matching and the information about IBS segments returned to the user, substantial information about users’ genotypes can be revealed with a few hundred uploaded datasets. For example, using a method we call IBS tiling, we estimate that an adversary who uploads approximately 900 publicly available genomes could recover at least one allele at SNP sites across up to 82% of the genome of a median person of European ancestries. In databases that detect IBS segments using unphased genotypes, approximately 100 uploads of falsified datasets can reveal enough genetic information to allow accurate genome-wide imputation of every person in the database. Different DTC services use different methods for identifying and reporting IBS segments, leading to differences in vulnerability to the attacks we describe. We provide a proof-of-concept demonstration that the GEDmatch database in particular uses unphased genotypes to detect IBS and is vulnerable to genotypes being revealed by artificial datasets. We suggest simple-to-implement suggestions that will prevent the exploits we describe and discuss our results in light of recent trends in genetic privacy, including the recent use of uploads to DTC genetic genealogy services by law enforcement.

eLife ◽  
2020 ◽  
Vol 9 ◽  
Author(s):  
Michael D Edge ◽  
Graham Coop

Direct-to-consumer (DTC) genetics services are increasingly popular, with tens of millions of customers. Several DTC genealogy services allow users to upload genetic data to search for relatives, identified as people with genomes that share identical by state (IBS) regions. Here, we describe methods by which an adversary can learn database genotypes by uploading multiple datasets. For example, an adversary who uploads approximately 900 genomes could recover at least one allele at SNP sites across up to 82% of the genome of a median person of European ancestries. In databases that detect IBS segments using unphased genotypes, approximately 100 falsified uploads can reveal enough genetic information to allow genome-wide genetic imputation. We provide a proof-of-concept demonstration in the GEDmatch database, and we suggest countermeasures that will prevent the exploits we describe.


2020 ◽  
Vol 17 (2) ◽  
pp. 141-153 ◽  
Author(s):  
Sevasti Skeva ◽  
Maarten HD Larmuseau ◽  
Mahsa Shabani

The rapidly evolving popularity of direct-to-consumer genetic genealogy companies has made it possible to retrieve genomic information for unintended reasons by third parties, including the emerging use for law enforcement purposes. The question remains whether users of direct-to-consumer genetic genealogy companies and genealogical databases are aware that their genetic and/or genealogical data could be used as means to solving forensic cases. Our review of 22 companies’ and databases’ policies showed that only four companies have provided additional information on how law enforcement agencies should request permission to use their services for law enforcement purposes. Moreover, two databases have adopted a different approach by providing a special service for law enforcement. Although all companies and databases included in the study provide at least some provisions about police access, there is an ongoing debate over the ethics of these practices, and how to balance users’ privacy with law enforcement requests.


2021 ◽  
pp. 1037969X2110072
Author(s):  
Rhanee Rego ◽  
John Anderson

Investigative Genetic Genealogy (IGG) has opened up new frontiers in the search for the perpetrators of serious crimes. The pool of data held by consumer DNA databases has enabled law enforcement agencies to undertake database matching to find biological relatives of an unknown perpetrator. This relatively new forensic practice is not, however, without concerns when benchmarked against established norms of investigative practice and criminal procedure. The critical questions emerge: how should IGG be used and in what circumstances? In this article, we contend that the current laws in Australia are not capable of regulating IGG appropriately and legislative reform is required.


2000 ◽  
Vol 28 (3) ◽  
pp. 245-257 ◽  
Author(s):  
Mark A. Hall ◽  
Stephen S. Rich

Since 1991, over half the states have enacted laws that restrict or prohibit insurers’ use of genetic information in pricing, issuing, or structuring health insurance. Wisconsin was the first state to do so, in 1991, followed by Ohio in 1993, California and Colorado in 1994, and then several more states a year in each of the next five years. Similar legislation has been pending in Congress for several years. Also, a 1996 federal law known as the Health Insurance Portability and Accountability Act (HIPAA) prohibits group health insurers from applying “preexisting condition” exclusions to genetic conditions that are indicated solely by genetic tests and not by any actual symptoms.


2021 ◽  
Author(s):  
C Qureshi ◽  
Tane Moleta ◽  
Marc Aurel Schnabel

In its ambitions, the paper aims to propose a proof of concept for a Virtual, Augmented and Mixed (VAM) environment that digitally overlays a multifaith space in order to optimize their use, essentially transforming itself to the spiritual needs of the user. In order to do so, a mixed reality experience was developed by investigating and interpreting both the tangible and intangible rituals of prayer. By incorporating an immersive experience, the project promotes the idea of a multifaith space that moves beyond the notion of an “empty white room (Crompton, 2013, p.487)”. To develop an immersive experience that caters to people of all religions or no religion is beyond the scope of this project. Hence, by creating a VAM environment for users of the Muslim faith the project may be able to support design ideologies for others, furthering research in this field.


JURNAL BELO ◽  
2020 ◽  
Vol 5 (2) ◽  
pp. 74-85
Author(s):  
Jennifer Ingelyne Nussy

ABSTRACT Recognition and protection of a guarantee of human dignity to earn a respectable place in the eyes of the law and government. Related to the interests of law enforcement, the Corruption Eradication Commission (KPK) for the purpose of wiretapping evidence in court, while will protecting the privacyrights of suspects. Legal protections for the accused to be seen as matter of law adopted. Therefore, the protection of the privacy rights of a person to be seen in the investigation process. For the Commission to conduct wiretaps should see privacy rights as stipulated in the law and the government should establish a special set of rules that intercepts, thus providing the possibility for law enforcement has the authority to do so does not conflict with human rights.


2018 ◽  
Author(s):  
Nadia Banteka

ICCTs have been established on a belying enforcement paradox between their significant mandate and their inherent lack of enforcement powers due to absence of systemic law enforcement. This article is premised on the idea that ICCTs fail to procure substantial results due to their delusive persistence in rejecting the factoring of politics in their operation. Thus, I suggest a perspective for arrest warrant enforcement that not only recognizes the relevance of politics but also capitalizes on it. Accordingly, I argue that by fully comprehending its enforcement tools and making use of its political role, the ICC may increase its rates in the apprehension of suspects, and therefore secure higher levels of judicial enforcement. Based on different compliance theories, I argue that the Office of The Prosecutor of the ICC (OTP) can improve compliance with ICC arrest warrants by making use of third states and non-state actors. In Part I, I address the way states and international actors may assist the OTP towards unwilling to arrest states through inducements, reputational sanctions, and support for enforcement agencies. I propose that external pressure in the form of positive inducements (membership, development aid) or negative inducements (travel bans, asset freezes) as well as condemnation and reputational damage towards non-compliant states, are likely to increase compliance with arrest warrants. In Part II, I examine a strategy for the OTP towards states that are willing to arrest but are unable to do so. In these cases, the OTP would benefit from improving its institutional capacity to identify and use overlapping interests with activist states in the field of human rights and international justice through the establishment of a diplomatic arm within its Jurisdiction, Complementarity and Cooperation Division (JCCD). I unpack the question of what this engagement may look like by examining such a potential relationship between the US and the ICC. Finally, in Part III, I focus on the instances, where civil society has the ability to influence third states or situation states to assist in the execution of arrest warrants. I argue that the OTP ought to include more actively different actors within the global civil society, such as NGOs, transnational networks, and individuals, during its bargaining efforts.


2018 ◽  
Vol 17 (5) ◽  
pp. 1654-1686 ◽  
Author(s):  
Francesc Dilmé ◽  
Daniel F Garrett
Keyword(s):  

Abstract Successes of law enforcement in apprehending offenders are often publicized events. Such events have been found to result in temporary reductions in offending, or “residual deterrence”. We provide a theory of residual deterrence that accounts for the incentives of both enforcement officials and potential offenders. We do so by introducing to a standard inspection framework costs that must be incurred to commence enforcement. Such costs in practice include hiring specialized staff, undertaking targeted research and coordinating personnel. We illustrate how our model can be used to address a number of policy questions regarding the optimal design of enforcement authorities.


1999 ◽  
Vol 24 (04) ◽  
pp. 777-806 ◽  
Author(s):  
Risa L. Goluboff

During World War II, young African Americans from southern cities left their homes for what appeared to be patriotic job opportunities harvesting sugar cane in Florida. When returning workers described peonage and slavery instead, parents worried about their children's safety. After attempting to contact their children directly, the parents appealed to the federal government. Their decision to mobilize the federal government and the strategies they used to do so reveal important aspects of wartime African American protest that historians have previously overlooked. This article focuses on families instead of atomized individuals, revealing the importance of families, neighborhoods, and communities to the emergence of rights consciousness. It also complicates the historiographical dichotomy between rights consciousness and patronage relationships. Patrons served as liaisons with law enforcement agencies and provided links to a law-centered rights consciousness. For many historians, until protest exits the realm of patronage ties, it is not really protest, and once interactions with government themselves become bureaucratized they cease to be protest any longer. The efforts of the peons' families challenge both ends of this narrow category of protest; they both used patronage relations to lodge their protests and also forged rights consciousness within the legal process itself.


Sign in / Sign up

Export Citation Format

Share Document