scholarly journals Сhallenging Questions of Development and Application of DNA Banks for the Purposes of Criminology and Related Disciplines

2019 ◽  
pp. 49-59
Author(s):  
M. V. Sprindzuk ◽  
L. P. Titov ◽  
A. P. Konchits

Review article presents essential information on DNA databases, forensic genomics for human identification and suspect characteristics. Author reports the essential information on the topic of forensic DNA databases and data processing. DNA databases are important tools for the improvement of performance of the security organizations and services with a final goal of national security enhancement.

Author(s):  
Matthew M. Aid

This article discusses the National Security Agency under the Obama Administration. Upon his inauguration on January 20, 2009, Obama inherited from the Bush administration an intelligence community embroiled in political controversies. Of the sixteen agencies of the intelligence community, the National Security Agency (NSA) faced the greatest scrutiny from the new Obama administration and the Congress. NSA was the largest and the most powerful member of the U.S. intelligence community. Since its formation in 1952, NSA has managed and directed all U.S. government signals intelligence (SIGINT) collection. It is the collector and processor of communications intelligence (COMINT) and the primary processor of foreign instrumentation signals intelligence (FISINT). And since 1958, NSA has been the coordinator of the U.S. government's national electronics intelligence (ELINT) program. It has also the task of overseeing the security of the U.S. government's communications and data processing systems, and since the 1980s, NSA has managed the U.S. government's national operation security (OPSEC) program. In this article, the focus is on the challenges faced by the NSA during the Bush administration; the role played by the NSA during the wars in Afghanistan and Iraq; and the challenges faced by the Obama administration in confronting a series of thorny legal and policy issues relating to NSA's eavesdropping program.


2008 ◽  
Vol 2 (2) ◽  
pp. 138-149 ◽  
Author(s):  
Joaquín-Jose Gamero ◽  
José-Luis Romero ◽  
Juan-Luis Peralta ◽  
Francisco Corte- Real ◽  
Margarita Guillén ◽  
...  
Keyword(s):  

2021 ◽  
pp. 186-219
Author(s):  
Jennifer Hochschild

Chapter 8 uses the GKAP surveys, expert surveys, and interviews to examine views about governance of genomics technologies. Experts collectively offer long lists of appropriate and inappropriate governing bodies; they show little convergence. Interview subjects also offer diverse views on genomics governance, but mostly agree that government actors and medical professionals are not suited to it. The public generally endorses forensic DNA databases and their governance, has mixed views on medical research involving genetics, and is cautious about gene editing, especially germline. Americans express little confidence in any potential governing actor, but they trust families and doctors somewhat more than community forums, clergy, or public officials. There is little partisan division, some racial division, and mostly division by quadrants of the basic framework.


2018 ◽  
Vol 1 (102) ◽  
pp. 305
Author(s):  
Rosario Serra Cristóbal

Resumen:La gestión coordinada de las fronteras y el funcionamiento eficaz de los sistemas de tratamiento de datos de circulación de personas pueden servir como mecanismo de alerta temprana frente al riesgo de ataques terroristas. Puede fortalecer la capacidad colectiva de los Estados para detectar, prevenir y combatir el terrorismo al facilitar el intercambio oportuno de información, permitiendo así adoptar de forma responsable decisiones cruciales.Este trabajo analiza los concretos instrumentos de gestión de datos en fronteras que pueden ser útiles en la lucha antiterrorista, porque el primer paso en inteligencia reside en la obtención de información, que luego será analizada y tratada para convertir esa información en conocimiento. Como tendremos oportunidad de comprobar, muchas de las bases de datos en fronteras se crearon para controlar la entrada de inmigrantes en las fronteras europeas, pero la información que ofrecen dichos sistemas puede servir también para luchar contra ese reto que nos amenaza, el del terrorismo yihadista. No obstante, este trabajo subraya que se trata de fenómenos distintos.Es cierto que la nueva oleada de ataques yihadistas ha coincidido, en el mismo espacio temporal, con la mayor crisis migratoria a la que se ha tenido que enfrentar Europa debido a crisis humanitarias y posteriormente a la guerra de Siria u otros conflictos. Pero, no son lo mismo. El terrorismo yihadista y la inmigración poco o nada tienen que ver, por mucho que se hayan querido vincular o se hayan pretendido justificar determinadas políticas contra la inmigración como algo necesario para luchar contra el terrorismo yihadista, con el fácil argumento de que frenando la inmigración se evita la entrada de potenciales terroristas en Europa.El trabajo advierte del riesgo de que la lucha contra el terrorismo sea utilizada para reforzar los controles de personas en las fronteras con el verdadero objetivo de frenar los flujos migratorios. Al tiempo, subraya la necesidad de que en dichos controles se sigan directrices y prácticas claras y se respeten plenamente las obligaciones que los Estados tienen de conformidad con el Derecho internacional, tal como ha recordado el Tribunal Europeo de Derechos Humanos y el Tribunal de Justicia de la Unión Europea. De hecho, no son pocos los casos en los que estos Tribunales han subrayado la relevancia indubitada de principios como la reserva de ley, la necesidad o la proporcionalidad como sustrato de la licitud de muchas medidas que incluyen el tratamiento de datos personales.Summary:1. Jihadist terrorism as a cross-border phenomenon. 2. The benefit of data exchange on crossing-borders in the Schengen area. 3. New guidelines on data processing and the safeguard of national security. 4. The register of passengers (The Personal Name Record or PNR). 5. When the data cross the external borders. The exchange of data with third countries. 5.1. The failed PNR Agreement with Canada and the EU Court of Justice’s standards regarding the transfer of passengers’ data. 5.2. The exchange of data with the United States. The EU-US Umbrella Agreement and the Privacy Shield. 6. The use of profiles and blacklists of alleged terrorists in cross-bording. 7. ConclusionsAbstract:EU Coordinated border management and effective functioning of data processing systems related to the movement of persons may serve as an early warning mechanism against the risk of terrorist attacks. It can strengthen the collective capacity of States to detect, prevent and combat terrorism by facilitating the timely exchange of information, thereby enabling crucial decisions to be adopted in a responsible manner.This paper analyzes the concrete border data management tools that can be useful in the fight against terrorism. The first step in intelligence lies in obtaining information, which will then be analyzed and treated to turn that information into useful knowledge. As we will have an opportunity to verify, numerous border databases were created to control the entry of immigrants into European borders, but the information offered by these systems can also serve to fight against this challenge that threatens us, that of jihadist terrorism.Nevertheless, we emphasize that terrorism and immigration are different phenomena. The truth is that the new wave of Jihadist attacks took place along the largest migratory crisis that Europe faced due to different humanitarian crises and to the war in Syria and other conflicts. But they represent different realities. Jihadist terrorism and immigration have little or nothing in common. In spite of this, many wish to link both with a view to justify certain anti-immigration policies as necessary actions for coping with Jihadist terrorism. This has been done based on a simple narrative: holding back immigration prevents the entry of potential terrorists in Europe.This paper shows that the risk that the fight against terrorism will be used as a basis to reinforce people controls at the borders, while the true objective of these measures is to curb migratory flows. At the same time, it underlines the need for clear guidelines and practices to be followed when implementing such controls. It also vindicates the need for States to observe their obligations laid down by international law, as recalled by the European Court of Human Rights and the EU Court of the Justice. In fact, in many cases, these jurisdictions highlighted the undoubted relevance of the statutory reserve principle, the principle of necessity or the principle of proportionality, as legal basis for the adoption of measures that include personal data processing.


PLoS Medicine ◽  
2011 ◽  
Vol 8 (10) ◽  
pp. e1001100 ◽  
Author(s):  
Peter A. Chow-White ◽  
Troy Duster

Sign in / Sign up

Export Citation Format

Share Document