recommended reading

Feds pilot ‘rapid DNA’ to potentially identify casualties, immigrants

dencg/Shutterstock.com

The Pentagon in January will start testing portable DNA analysis equipment intended to identify individuals within an hour, federal research documents show. If successful, government agencies could use the technology to detect border trespassers and enemy combatants, according to the documents.

During the next two years, the University of North Texas will evaluate “rapid DNA” tools for certification before widespread rollout, under terms negotiated with the Defense Biometrics and Forensics Office. The school’s genetics laboratory is the only independent, accredited institution capable of running samples against the FBI’s DNA index, officials stated in a spending disclosure to justify awarding the project without competition.

The testing will involve a prototype funded by the departments of Defense, Justice and Homeland Security called the Accelerated Nuclear DNA Equipment program. The model is a roughly $275,000 desktop-sized device, according to DHS and Pentagon presentations.

“DoD, in partnership with U.S. government interagency partners, has developed technologies that enable automated rapid DNA profiling, while minimizing analytical complexity and user manipulations, for field biometric and forensic applications,” states the Defense justification, which was issued this month. Federal agencies are trying to drive down the price per analysis from $500 to less than $100.

Defense is interested in rapid DNA matching for, among other purposes, quickly identifying casualties and enemies killed in action.

The big push governmentwide is to be able to share DNA profiles across the globe, quickly on a need-to-know basis, Pentagon officials have said.

Civil liberties groups, however, are concerned about mission creep, particularly the inappropriate sharing of foreign nationals’ DNA profiles with DHS for immigration enforcement. A controversial Immigration and Customs Enforcement fingerprinting program called Secure Communities compares the identities of booked offenders in an FBI multi-biometric database with prints in a DHS ID system to determine if suspects are in the country illegally.

2010 DHS presentation stated Homeland Security determined it needs rapid DNA analysis to identify border violators and ICE detainees, but does not mention Secure Communities.

Homeland Security currently is designing a rapid DNA system for a variety of potential uses, including “verification of family relationships, countering human trafficking, family reunification, identification of victims following mass casualties, and checks against DNA samples of known criminals,” according to a September DHS privacy assessment. The review stresses that each of these applications will require significant new regulations or regulatory revisions -- as well as “privacy and civil rights assessments.”

Homeland Security already has developed a rapid DNA machine to confirm, on a voluntary basis, kinship during refugee intake, the September assessment states.

Under the new Defense agreement, which is valued between $5,000 and $20,000, the University of North Texas will evaluate the rapid DNA prototype starting January 2013 and complete testing by Dec. 31, 2014. The university operates the only known non-governmental, accredited laboratory with access to the FBI’s National DNA Index System, which aggregates DNA profiles from federal, local and military agencies, officials stated. The FBI system currently catalogs more than 10 million samples from arrestees, immigrant detainees, unidentified human remains, and relatives of missing persons.  

Bruce Budowle, the principle investigator at the university’s Institute of Applied Genetics, is a 40-year veteran of the FBI and has authored numerous articles on emerging DNA processing techniques. In June, he published an article for the journal Pathobiology about genetic identification of missing people including victims of major disasters and children who may be victims of human trafficking.

(Image via dencg/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.