Professional Documents
Culture Documents
Police Photo
Police Photo
by
Jonathan M. Finn
of the
Doctor of Philosophy ^
Supervised By
The College
University of Rochester
May 2003
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
UMI Number: 3102272
UMI
UMI Microform 3102272
Copyright 2003 by ProQuest Information and Learning Company.
All rights reserved. This microform edition is protected against
unauthorized copying under Title 17, United States Code.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
Curriculum Vitae
Jonathan Finn was bom in Ottawa, Ontario on July 14, 1972. He attended
McMaster University from 1990 to 1995 and graduated summa cum laude with a
Bachelor o f Arts in Art History in 1995. While at McMaster Jonathan pursued a year
entered the graduate program in Art History at York University in 1995, earning his
Masters o f Arts degree in 1997. He began the Visual and Cultural Studies Program at
photography under the direction of Professor Lisa Cartwright and received the Master
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
Abstract
approaches from visual studies, particularly the history of photography, and from
identity.
at the close of the nineteenth century gave rise to law enforcement practices based on
the collection and use of latent identification data. This transformed the subject of
law enforcement from the individual, physical body to a larger, aggregate social
body. I trace the development of DNA analysis in law enforcement at the close of
the twentieth century to examine the development of power and authority associated
with the control o f inscriptions. I argue that the FBI constructed a dominant position
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
in the field of DNA analysis through the development of control over the visual
current law enforcement and criminal identification practices, the National Crime
Information Center 2000 and the Combined DNA Index System. The theoretical
possibilities associated with the collection and use of latent identification data
announced at the close of the nineteenth century have become a reality in 2003. I
suggest that contemporary law enforcement practices are driven by the collection and
archiving of identification data and argue that this practice functions in the
redefinition of criminality and the body. I argue that the body in the twenty-first
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
V
Table of Contents
Curriculum Vitae ii
Abstract iii
Table o f Contents v
List of Figures vi
Foreword ix
Inscriptions
Criminality
Conclusion 177
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
vi
List of Figures
Apache” (R).
type.”
type.”
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
vii
data.
found fingerprint.
3.5 Fictional crime scene: the print from the plate is lifted 93
found print.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
viil
accompanying narrative.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
Foreword
The writing of this dissertation took form largely according to the numerical order
of the chapters. Wherever possible I have left my discussion and analysis of law
enforcement practices and initiatives in their original tense. Thus, in Chapter Two I
refer to the proposed plan of United States Attorney General John Ashcroft to
fingerprint, and photograph visitors to the United States and in Chapter Four I discuss
this same topic, the National Security Entry-Exit Registration System, as it is now
legal and in full operation. I have refrained from revising the earlier chapters of the
text to reflect the specific time within which this dissertation was written. The events
of September 11, 2001 in which passenger airplanes were hijacked and crashed into
the World Trade Center, the Pentagon and in a field in rural Pennsylvania, and, more
have had significant influence on the subject of this dissertation. Under the rubric of
a “war on terror” law enforcement agencies in the United States have been invested
with significant power and have received substantial funding to improve and
surrounding law enforcement and criminal identification practices that were largely
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
1
CHAPTER ONE
INTRODUCTION
ij s i f i !*
III ! ; I S ! l l i
isi i " ...... .
SI
The images above function as visual substitutes for the human body within
practices of criminal identification. The image on the left is of James Allen, a “hotel
thief and confidence man,” arrested, photographed and included in Thomas Byrnes’
fictional crime scene of 1996. The final image is an autoradiograph depicting DNA
analysis from a rape-murder case and printed in the National Research Council’s
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
2
images also participate in important debates on privacy, surveillance and power. Far
and other discourses in the construction o f identity and its attendant rights and
gender, race, and in moralistic debates of right and wrong. As such, the need to
Continued scientific and technological innovations have greatly altered the ways
in which the criminal body has been represented visually within law enforcement and
criminal identification practices. Over the past two decades a steady flow of
technological tools has become available, enabling new ways of representing the
crim inal body. Infrared and ultra-violet lasers, chemical baths, DNA analysis,
computer databases, and digital imagery have yielded several new visual substitutes
for the criminal. Despite the specific nature of such changes, visual representation
has remained an important means through which the criminal subject is understood
The fictional crime scene was produced during an apprenticeship held with the Metropolitan Toronto
Police's Forensic Identification Services in August, 1996.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
3
and defined. The act of representing, or “making the criminal visible,” is central to
contemporary law enforcement and criminal identification practices and is the focus
police photograph, or mug shot. However, the criminal is also represented in more
disparate and subtle ways, as in the fingerprint, the autoradiograph, and other forms
records presupposes the existence of the criminal body. In contrast to this, by taking
the criminal as a social construct, I aim to locate and examine the production and
body was enmeshed in a socially defined binary of normal and deviant and in
questions of power, surveillance and privacy. Now at the beginning of the twenty-
have advanced the abilities o f individuals and groups, both public and private, to
record and study the human body down to its minutiae, often without its consent or
is taking place within and by a society that is increasingly concerned with such
intrusive practices and that prides itself on its democracy. This tension is nowhere
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
4
more clear than in the recent proposal of United States Attorney General John
Ashcroft. Under the rubric of the “war on terror,” the proposal calls for photographs
and fingerprints to be taken o f all visitors to, and foreign visa holders living in, the
photograph. Proposed uses of the medium in this way reinforce its highly
practices of criminal identification from the nineteenth century to the present day. To
what have disappeared? And, perhaps most importantly, what is at stake in these new
criminal body emerge from continual negotiations between humans, technology and
the social networks through which they interact. The naming, regulating,
classification and identification of the criminal body have roots in the intersections of
scientific and visual practices. Adding to the complexity is the unique status of
photography and the extensive debates about the medium’s subjectivity and
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
5
objectivity. To approach this topic, I combine analyses from the field of visual
studies, particularly art history, and from the field of science and technology studies.
Within the still limited body of academic work that addresses the photographic
representation of the criminal, that of John Tagg and Alan Sekula remains
unparalleled. Tagg’s The Burden o f Representation and Sekula’s “The Body and the
Archive” remain the most important texts on the topic.3 Working from the ideas set
use of photography in medical and police practices, and the federally sanctioned
documentary work of the Farm Security Administration. In all cases, Tagg refutes
the possibility of the universality of the photograph, stressing the historical specificity
of its value and meaning. He writes: "the photograph is not a magical 'emanation' but
3 Allan Sekula, “The Body and the Archive,” October 39 (1986): 3-64; John Tagg, The
Burden o f Representation: Essays on Photographies and Histories (Basingstoke: Macmillan, 1988).
Other articles and books have addressed the topic. See: David Green, “Classified Subjects,” Ten. 8, no.
14 (1984): 30-37; David Green, “On Foucault: Disciplinary Power and Photography,” Camerawork 32
(1985): 6-9; David Green, “Veins of Resemblance: Photography and Eugenics,” The Oxford Art
Journal 7, no. 2 (1985): 3-16; Tom Gunning, “Tracing the Individual Body: Photography, Detectives,
and Early Cinema,” in Cinema and the Invention o f Modern Life, ed. Leo Chamey and Vanessa R.
Schwartz (Berkeley: University of California, 1995), 15-45; Suren Lalvani, Photography, Vision, and
the Production o f Modern Bodies (Albany: State University of New York, 1996); Sandra Phillips,
Mark Haworth-Booth, and Carol Squires, Police Pictures: The Photograph as Evidence (San
Francisco: Chronicle Books, 1997).
4 Michel Foucault, Discipline and Punish: the Birth o f the Prison, trans. Alan Sheridan (New
York: Vintage Books, 1979).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
6
forces, for more or less defined purposes."5 This leads Tagg to refute any single
spaces.
archive.7 Sekula describes the archive as a particularly visual space where the good,
the heroic and the celebrated of society coexist with and are defined alongside the
criminal, the deviant and the poor. Within the developing archival mode of the
statistics grew in conjunction with the new field of criminology and provided a
the Italian criminologist, Cesare Lombroso, criminality could be read directly from
and Sekula leaves space for continuing critical investigation. The myriad of new
5 Tagg, Burden, 3.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
7
representation, the work of Tagg and Sekula does not address the concrete production
draws from the field of science and technology studies, where it focuses on the social
and technology is that of the black box. In Science in Action Bruno Latour uses the
metaphor to trace the construction of "scientific fact and technical artefacts" through
scientific practice.9 For Latour, a central feature of scientific practice is the ability to
black box, or to make given, certain concepts, practices and presuppositions. In this
way, the complex negotiations that take place in the construction of scientific facts
are enclosed by the black box and rendered invisible in the final product. Once
closed, the black box can serve as a site to be used in future scientific practice (so that
any black box can contain within it a series of other black boxes). Because of this
process, and key to the metaphor, Latour emphasizes that analyses of scientific
practice should not take the final product as their object of study. Instead, social
studies of science should begin at the planning stages in an attempt to "be there before
8 There is a wealth of material dealing with the social construction o f scientific facts. Some of
the central texts informing this dissertation include: David Bloor, Knowledge and Social Imagery
(London; Boston: Routledge & K. Paul, 1976); H. M. Collins, Changing Order: Replication and
Induction in Scientific Practice (London; Beverly Hills: Sage Publications, 1985); Thomas S. Kuhn,
The Structure o f Scientific Revolutions, 2nd, enl. ed. (Chicago: University of Chicago Press, 1970);
Bruno Latour, Science in Action: How to Follow Scientists and Engineers Through Society
(Cambridge, Mass.: Harvard University Press, 1987); Bruno Latour and Steve Woolgar, Laboratory
Life: The Construction o f Scientific Facts, 2nd ed. (Princeton: Princeton University Press, 1979).
9 Bruno Latour, Science, 21. The metaphor is used outside science studies as well. I use
Latour's account of it here as I find it the clearest explanation.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
8
the box closes and becomes black."10 In its ultimate manifestation Latour's method
positions the researcher alongside the scientists, documenting every move in the
criminal, work in the social study of science allows us to avoid the traps of this
metaphor. That is, instead of beginning with the final product (the photograph of the
production.11 In doing so here I want to complement the work of Tagg, Sekula and
the production and use of photographs of the criminal body: to "be there before the
of the terms I draw primarily from the work of Bruno Latour and Steve Woolgar. In
Laboratory Life, the authors trace the construction of scientific facts by examining the
11 This could also be said of much work in the history o f photography and is hinted at by
Patrick Maynard in The Engine o f Visualization. Maynard suggests that too often "photographs are
considered a puzzling sort of thing, to be addressed in terms o f their relationship to other things:
notably the relationship o f being a photograph o f other things." Patrick Maynard, The Engine o f
Visualization: Thinking Through Photography (Ithaca, N.Y.: Cornell University Press, 1997), 10.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
9
research conducted by Latour during a 1975-77 study of laboratory work at the Salk
Institute for Biological Studies. In writing the text, Latour and Woolgar begin with
the description of a fictitious character through which their text will take form. “The
knowledge about the activities taking place in the lab; he is an anthropologist, trying
to understand its practices. Latour and Woolgar use this fictional character to set out
the central question of their book. The observer asks: “How is it that the costly
apparatus, animals, chemicals, and activities of the bench space combine to produce a
11
written document, and why are these documents so highly valued by participants?”
Throughout their text, Latour and Woolgar demonstrate the central importance of
pictures, lists, tables, or textual statements, inscriptions are the basic currency of
scientific practice. They are produced in the lab by inscription devices, defined as
“any item of apparatus or particular configuration of such items which can transform
a material substance into a figure or diagram which is directly usable by one of the
members of the office space.”14 Crucially, the labour and procedures involved in the
production of inscriptions are lost in the final representation. Latour and Woolgar
point to two consequences of this action. First, “inscriptions are seen as direct
12 Latour, Laboratory.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
10
indicators o f the substance under study.” 15 Second, the process gives way to a
For Latour and Woolgar, the importance of inscriptions and inscription devices
w ithin the laboratory cannot be overstated. They are central in identifying, defining
and even creating the object of study. They write: “it is not simply that phenomena
representations. 18
•
In his essay, “Drawing Things Together,” Latour again investigates the role of
19 Latour, “Drawing.”
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
11
Scientists start seeing something once they stop looking at nature and
It is Latour's emphasis on images that are made less confusing that is so interesting.
scientific practice. They are the carefully produced, dynamic sites where meaning
features define these objects. They are mobile, immutable, presentable, readable and
combinable with one another. To understand these features it is important to note that
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
12
contexts and locations and it must do so without the loss of essential information.
The inscription must be mobile and the information it contains must be immutable.
immutable mobiles is crucial. Put simply, in the process of establishing scientific fact
the group that produces, employs and controls the best immutable mobiles wins out
over others. To this end, diverse, real-time events are continually reduced and
less confusing.
The notion of inscription and the concept of the immutable mobile are particularly
reason for this is two-fold. First, I argue that the modem conception of the criminal
storing and sharing information. One result of this confluence of activity was an
increased need for visual representation within social, institutional and scientific
individual with the group and for the study of large numbers of bodies and objects.
Second, a defining feature of the modem criminal, developed in the latter half of the
nineteenth century, was his mobility. Law enforcement practices of the time reflected
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
13
had to be mobile and immutable. Inscriptions of the criminal’s body had to move
seamlessly between contexts and locations without the loss or alteration of the
the inscription of the criminal body had to be made into an immutable mobile.
The camera developed in conjunction with this confluence of scientific and social
scientific activity of the nineteenth century. I stress that the supposed objectivity,
cost-effectiveness and near universal acceptance of the photograph assured its central
addition, the mechanical nature of the camera guaranteed the immutability of the
In “The Body and the Archive,” Sekula positions the photograph as a site where
the disparate and diverse activities of the live world are reduced to a standardized
two-dimensional format and made comparable. Like Sekula, I argue that the
Law enforcement agencies use the camera to transform the body, with all its complex
idiosyncrasies, into images that are less confusing. Just as in the endocrinology
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
14
produced and used by law enforcement agencies indicate the criminal body. Within
and DNA are routinely collected and compiled into networks of similar
Importantly, and again drawing from the work of Sekula, I stress that photography
technological, social, economic and cultural practices at work in law enforcement and
also using the image as a point of departure to investigate more abstract and
theoretical issues associated with law enforcement and criminal identification such as
This dissertation is chiefly concerned with three specific facets of modem and
Chapter Two provides the necessary historical and contextual framework for the
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
15
identification in the nineteenth century and survey the existing literature on the
subject. I show that by the close of the nineteenth century the body had been defined
in Cesare Lombroso’s 1876 text, L ’Uomo Delinquente, the new field of criminology
promoted the ability to read normalcy and deviance directly from the body via the
The chapter argues that the camera is an essential component in the construction of
the newly emerging social institutions of the nineteenth century and served as a
fundamental tool in recording the identity of both normal and deviant bodies. I stress
that, as it developed for use within law enforcement and criminal identification
close o f the nineteenth century the photograph as static representation was mobilized
Bertillon.
practices of latent identification within which the camera functioned as a tool of data
collection. During the latter half of the nineteenth century and prior to
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
16
and record the captured criminal’s body. The identity of the body as normal or
deviant often preceded the use of the camera. In contrast to this, the ability to
body gave rise to the collection of latent identification data. Latent data represents an
unknown physical body, its identity to be determined within the confines of the police
identification greatly extended the power and reach of law enforcement in public life.
Division. I use a fictional crime scene produced during this research to show the
agencies, one that included the collection and storage of latent identification data.
inscriptions within criminal identification, Chapter Four addresses the subject of the
analysis in law enforcement from the 1980s through to its formalization in the DNA
to analyze the FBI’s construction of authority over DNA analysis. I argue that by
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
17
controlling the inscription of DNA, the autoradiograph, the FBI has achieved a
The 1993 DNA Identification Act, enacted in 1994, legalized the FBI as the
authority over DNA analysis standards in law enforcement. I stress that this brought
a premature end to the productive, critical debate surrounding the technique and that
analysis. I argue that the DNA Identification Act enabled the FBI to achieve
dominance over DNA analysis in three primary ways: it legalized the Bureau’s
control over the procedures for analysis; it constructed a workable boundary for the
FBI within the larger field of DNA analysis; and it provided the FBI with substantial
Chapter Five returns to the notion of the archive and investigates contemporary
century digital archive exists largely free of these physical constraints. The
Chapter Three, have become a reality in the twenty-first century. Subsequently, law
enforcement agencies routinely collect and store vast sums of identification data for
its potential use. I argue that these practices of data collection betray any clear
rationale and function in the redefinition of crime, criminality and the body.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
18
enforcement: the National Crime Information Center 2000 and the Combined DNA
Index System. In each case I question the rationale governing the collection of
identification data and its storage in these databases and raise concerns regarding its
potential misuse. Specifically, and drawing from the discussions of Chapters Three
and Four, I argue that the data contained in these databases are archived as immutable
mobiles, and that these inscriptions can then be re-deployed according to the
criminality. I argue that the body in the digital archive is defined as a site of potential
criminality.
This dissertation contributes to the limited body of work that addresses the
with a critical analysis o f law enforcement and criminal identification practices that
addition, by combining perspectives from visual studies and from science and
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
19
CHAPTER TWO
NINETEENTH CENTURY
The police mug shot has become an icon in contemporary visual culture. The
pose, framing and formal conventions of the image are features easily recognized
throughout the general public. The mug shot forms the basis of television shows like
America’s Most Wanted and continually surfaces throughout the myriad of police
dramas on television and in film. It has been the subject of an art exhibition at the
San Francisco Museum of Modem Art;1 and it has formed the seat of controversy as
in the picture o f O.J. Simpson used by Time and Newsweek for their covers of June 27
1994.2 Most recently, as outlined by United States Attorney General John Ashcroft,
the mug shot might become the newest technological tool adopted for use in the “war
on terror.”3 In this last example, mug shots would be required of all visitors to the
United States and current foreign visa holders who originate from Middle Eastern
countries. Ashcroft’s announcement raises deep and immediate concerns about racial
profiling, stereotyping and social policy in the contemporary United States. These
1“Police Pictures: the Photograph as Evidence,” San Francisco Museum of Modem Art,
October 17, 1997 - January 20, 1998. Curated by Sandra S. Phillips. Catalogue: Sandra Phillips,
Mark Haworth-Booth, and Carol Squires, “Police Pictures: The Photograph as Evidence,” (San
Francisco: Chronicle Books, 1997).
2 Time and Newsweek used the same police photograph o f Simpson; however, Time
heightened the contrast o f the image making Simpson’s skin appear darker.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
20
same issues have been present since the origin of the mug shot but have only become
clear with the benefit of historical distance. Ashcroft’s proposal highlights the
The mug shot has its roots in photographic portraiture of the mid-to-late nineteenth
century. Here the formal conventions of the image were defined: frontal, head and
shoulders, clear, and, where possible, no facial expression. The goal was the same
despite the nature of the portrait: to capture all the significant details of the sitter’s
face. The face was taken as representative of the individual’s character. Criminals
subjected to the camera were often depicted attempting to twist and turn and change
Contemporaneous with the rise of photographic portraiture and the police mug
shot was the development of the new field of criminology. This work promulgated
direct links between the physical body and criminal propensity and was championed
disciplinary practices. He was the first to apply positivist methods to the study of
4 Cesare Lombroso and William Ferrero, The Female Offender, ed. M.A. W. Douglas
Morrison, The Criminology Series (New York: D. Appleton and Company, 1895); Cesare Lombroso,
Crime: Its Causes and Remedies, trans. Henry P. Horton, M.A., Patterson Smith Reprint Series in
Criminology, Law Enforcement, and Social Problems (Montclair: Patterson Smith, 1968 (c. 1911));
Gina Lombroso-Ferrero, Criminal Man: According to the Classification o f Cesare Lombroso,
Patterson Smith Reprint Series in Criminology, Law Enforcement, and Social Problems (Montclair:
Patterson Smith, 1972 (c. 1911)).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
21
crime, describing the “bom criminal” and linking criminal behaviour to atavism.
Under Lombroso, criminality was something that could be read directly from the
Figure 2.1: “The Inspector’s Model.” From Thomas Byrnes’ 1886, Professional
Criminals o f America.
5 On the development of criminal anthropology both in Europe and in the United States see:
Nicole Hahn Rafter, “Criminal Anthropology in the United States,” Criminology 30, no. 4 (1992): 525-
545. For general discussions on Criminology and the work o f Lombroso see: Israel L. Barak-Glantz
and C. Ronald Huff, ed., The Mad, the Bad, and the Different: Essays in Honor o f Simon Dinitz
(Lexington: Lexington Books, 1981); Piers Beime, ed., The Origins and Growth o f Criminology:
Essays on Intellectual History, 1760-1945 (Aldershot: Dartmouth, 1994); David G. Horn, Social
Bodies: Science, Reproduction, and Italian Modernity, Princeton studies in culture/power/history
(Princeton, N.J.: Princeton University Press, 1994); David G. Horn, “This Norm Which is Not One:
Reading the Female Body in Lombroso's Anthropology,” in Deviant Bodies: Critical Perspectives on
Difference in Science and Popular Culture, ed. Jennifer Terry and Jacqueline Urla, Race, Gender, and
Science (Bloomington: Indiana University Press, 1995), 109-128; C. Ray Jeffery, Criminology: An
Interdisciplinary Approach (Englewood Cliffs: Prentice-Hall, 1990).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
22
This chapter examines the development of the modem criminal subject through the
the criminal body in the nineteenth century. I argue that a central feature of the
during the nineteenth century allowed for the relatively quick and easy documentation
of bodies. This was essential to law enforcement agencies that faced increasing
identification. Instead, by re-investigating the key issues and ideas and by focusing
construction of the modem criminal body. I agree with Simon Cole’s contention that
and “the recidivist”.”6 I stress that, as it developed for use within law enforcement
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
23
Within work addressing modem penal and judicial systems, Michel Foucault’s
Discipline and Punish remains paramount.7 In this work Foucault examines the
growth o f a new disciplinary society in the late eighteenth and nineteenth centuries.
The new system was based in a normalizing discourse that sought to reform, and not
harm, the physical body and, by extension, the soul. This system operated through
the continued production of knowledge of the human body, and the exercise of power
manifestly violent and in which the body of the offender was the direct
subtle means o f correction and training whose target was no longer the
7 Michel Foucault, Discipline and Punish: the Birth o f the Prison, trams. Alan Sheridan (New
York: Vintage Books, 1979).
8 David Green, “On Foucault: Disciplinary Power and Photography,” Camerawork 32 (1985),
7. It is interesting to note that the recent execution o f Timothy McVeigh easily fulfills the criterion of
being “spectacular, ritualistic and manifestly violent.”
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
24
As Green’s remarks show, an essential feature of the new disciplinary society was
the way in which power, in the form of discipline and punishment, was exercised. Its
transformation in punishment, power had to move from the public into the private
domain. As Foucault has shown this was accomplished through the growth o f the
institution. Through the subtle workings of what he has called the carceral network
existed at the level of the everyday and in the form of continued surveillance, an
essential component of which was the camera. As a technology that was easily allied
with the sciences, the camera provided the perfect tool for the documentation,
Working from the ideas set forth in Discipline and Punish, John Tagg and Allan
Sekula have examined the photograph’s role in Foucault’s carceral network.9 Tagg
9 Other sources that parallel and/or summarize the discussion of Tagg and Sekula include:
David Green, “Classified Subjects,” Ten. 8, no. 14 (1984): 30-37; David Green, “On Foucault:
Disciplinary Power and Photography,” Camerawork 32 (1985): 6-9; David Green, “Veins of
Resemblance: Photography and Eugenics,” The Oxford Art Journal 7, no. 2 (1985): 3-16; Tom
Gunning, “Tracing the Individual Body: Photography, Detectives, and Early Cinema,” in Cinema and
the Invention o f Modern Life, ed. Leo Charney and Vanessa R. Schwartz (Berkeley: University of
California, 1995), 15-45; Peter Hamilton and Roger Hargreaves, The Beautiful and the Damned: The
Creation o f Identity in Nineteenth Century Photography (London: Lund Humphries, 2001); Suren
Lalvani, Photography, Vision, and the Production o f Modem Bodies (Albany: State University o f New
York, 1996); Sandra S. Phillips, “Identifying the Criminal,” in Police Pictures: The Photograph as
Evidence, ed. Sandra S. Phillips, Mark Haworth-Booth and Carol Squires (San Francisco: San
Francisco Museum of Modem Art, Chronicle Books, 1997), 11-33. For a discussion of the role of
photography within the asylum and psychiatric hospital see: Sander L. Gilman, Hugh Welch Diamond,
and John Conolly, The Face o f Madness: Hugh W. Diamond and the Origin o f Psychiatric
Photography (New York: Brunner/Mazel, 1976).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
25
Sekula places less emphasis on the photograph itself by highlighting its role within a
statistics, anthropometry and the then emerging fields o f eugenics and criminal
anthropology.
closely that of Sekula than Tagg. The conception of the archive is particularly helpful
function in the construction of identity. Sekula begins "The Body and the Archive"
practice in the nineteenth century. Under this system the photograph was both
that
Every portrait implicitly took its place within a social and moral
public looks: a look up, at one's "betters," and a look down, at one's
“inferiors.”11
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
26
visual means to identify oneself among others in society and, in turn, to be identified
from others.
The double role o f the image points to a key feature in the conception of the
archive. For Sekula, the archive exists as a complicated visual arena in which all
emphasizing this double role of the image Sekula is able to show that in the
social body was also being produced. Within the visual space of the archive deviance
by Johan Kaspar Lavater and work in phrenology by Franz-Joseph Gall at the base of
this paradigm. As he writes, “both [practices] shared the belief that the surface of the
body, and especially the face and head, bore the outwards signs of inner character.”14
Under this paradigm, the portrait, including the mug shot, took on specific
importance: it stood in for the body and character of the individual it represented.
14 Sekula, “The Body,” 11; Johan Caspar Lavater, Essays on Physiognomy, Designed to
Promote the Knowledge and the Love o f Mankind (London: T. Bensley, 1810).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
27
The interest in the external signs of the body was paralleled by an emerging
interest in the field of social statistics and its application to crime. Here, the work of
Adolphe Quetelet is central, as he was the first to study crime and criminality through
Theodore M. Porter puts forth a detailed account of the emergence of this new social
science as it was tied to practices of social policy.15 Porter begins the discussion in
populations and birth and death rates were compiled in support of a society’s self
events became subject to statistical analysis and, by the late nineteenth to early
twentieth centuries, our current conception o f the field had developed. Where
Quetelet had the strongest impact was in the application of this emerging social
government during the 1820s.17 These studies documented criminal activity and
showed that it had little variance from year to year. This meant, among other things,
15 Theodore M. Porter, The Rise o f Statistical Thinking: 1820 -1900 (Princeton: Princeton
University Press, 1986). Porter does not draw on the work of Foucault but it is clear that, through his
account, the development of social statistics could be read in support of Foucault’s major claims
regarding the growth of the institution in society.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
28
that if its causes could be illuminated, crime could be reduced. Quetelet began to
Quetelet’s work was unique in that he came to the subject from astronomy and
regardless of context.18 As Porter shows, Quetelet’s work was rooted in error theory;
he believed in a natural order to the universe in which man, through conscious action,
created deviations. His task in studying deviations from the natural order was “to
“average man.” Using data collected on both the physical and moral characteristics
20 Porter takes up the issue of the difficulty in measuring the moral character o f man on page
53.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
29
universe. Thus, as Sekula describes the metaphor, human difference, both physical
and moral, was perceived in terms of a deviation from a natural average. However,
what is absent in Sekula's account and what must be stressed here is that Quetelet
treated deviation as both positive and negative. Deviation, or change, caused by the
stunt progress and, on the other, deviations that promote it. In the middle rests the
majority of actions (and the citizens who produce them), neither harming nor helping
Through the creation of I ’homme moyen, Quetelet provided a statistical basis for
Quetelet maintained that this abstract being [the average man], defined
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
30
understood as the natural progress of society. In opposition to this, and across the
ocean of average citizens, individuals such as Quetelet worked toward the progression
Quetelet’s work is important to this discussion in four ways. First, his distribution
provided a way to explain human behavior by dividing it into a binary of normal and
deviant. Second, and as a corollary to this, the social scientist using Quetelet’s work
gained a distinct level of authority and control over his subject matter (the social
world).25 Third, because his work was based in mathematics and error theory,
deviance was taken to be both positive and negative. In this way Quetelet defined
allied with other scientific practices including the newly emerging field of criminal
anthropology.26
24 Darwin's Origin o f the Species was published in 1859 and Descent o f Man in 1871.
25 David Horn shows the extent to which Lombroso did the same through his work on female
criminality. See: David G. Horn, “This Norm.”
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
31
the individual with the group and by reducing human behavior to a sequence of
numbers, Quetelet attempted to demonstrate, in the form o f a single, static and two-
societies. Lombroso would combine this work with the theoretical claims of
result was an individual and social body that were interchangeable and that were
In his introduction to the English translation o f Lombroso's Crime: Its Causes and
Remedies, Maurice Parmelee claims that Lombroso "led in the great movement
towards the application of the positive, inductive methods of modem science to the
development of the new science of criminology."27 Prior to Lombroso, and under the
criminology reacted against the then overarching discretionary power of the judge in
cases of criminal justice. Beccaria and the Classical School called for the equal
treatment of all under the law, and suggested that punishments should be matched to
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
32
Where the Classical School emphasized the universal application of the law,
Lombroso, with his contemporaries Enrico Ferri and Raffaele Garofalo, detailed a
system in which punishment was based more on the individual character of the
offender than on the specific crime committed. Lombroso called it a shift in focus
from the study o f crime to the study of the criminal body.28 Under the leadership of
Lombroso, these three formed the Italian School of criminology, also called the
criminal behaviour, this group also promoted the ability to reform certain types of
offenders. Under the Classical School, criminals were incarcerated for a definite and
pre-determined period of time. Under the Modem School, criminals were often given
an indefinite sentence, based on their specific anthropological type and their response
to treatment, or reform.
The central text to emerge from the Italian School was Lombroso's L'Uomo
criminality; defining his notion of the "bom criminal" and arguing that criminal
behaviour was essentially atavistic. Crime was something that certain bodies were
predisposed to, social influence was almost exclusively denied. Leonard Savitz
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
33
behaviouraliy, he was very similar to primitive races and to children, all of whom
This idea met with considerable criticism and, over the next several years,
Lombroso altered his theory to allow for greater social influence in criminal
behavior.31 By the time Crime: Its Causes and Remedies was published (originally
published in Paris in 1899 and translated into English by 1911) Lombroso had
addition to the bom criminal, Lombroso defined the passionate, political, accidental
and occasional criminal, often with several sub-categories to each. Remaining true to
the original positivist goal, punishment, or treatment, was linked to the type of
remarkably similar to Quetelet’s I ’homme moyen. To the left was the bom criminal, a
random and isolated moment, committed a criminal act. The bom criminal was
and animals. The potential for reform increased as one moved further away from this
31 In opposition to the Italian School, Gabriel Tarde and Alexandre Lacassagne formed the
French School of criminal anthropology, attributing primary significance to social causes. Followers
of the French School were among the largest opponents o f Lombroso. The differences between
schools can be found in the criminology sources outlined in footnote 5.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
34
Figure 2.2: Two examples of the visibly deviant body used as illustrations in
Lombroso’s work. “Italian Criminal. A Case of Alcoholism,” (L) and “Anton Otto
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
35
criminal behavior could be traced to, and read from, the body. In Lombroso's theory,
the number of "signs" of criminality (tattoos, cranial and bodily anomalies, and other
distinguishing physical marks) was directly related to the severity of the case (Figure
2.2). In other words, those criminals who displayed several and obvious signs of
were likely to be habitual offenders, and were less amenable to reform. Conversely,
those subjects who displayed few or no signs were increasingly less likely to exhibit
criminal behaviour and had the highest potential for reform. Criminal behaviour was
reduced to a simple, positivist correlation between physical, bodily "signs" and the
propensity to commit crime. Within this scheme the scarred and tattooed body of
Anton Otto Krauser, depicted in Figure 2.2, represented a body more prone to
recidivism and less likely to be reformed than that o f the alcoholic, also depicted in
Figure 2.2.
Rafter has noted that the biologization of crime by Lombroso and his
[They] all considered their work “scientific,” by which they meant that
unlike earlier commentators on crime, who had included God and free
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
36
Toward this goal criminal anthropologists set out measuring and recording data on
anthropologists turned to the criminal body for their data; physical, bodily anomalies
Rafter notes that, “nature had made the investigator’s task relatively simple: To detect
(whether or not they have feelings toward others) he tested their blood pressure using
phonograph would measure speech patterns and Edison’s electric pen could be used
measure the subject’s height and arm length and the form and capacity of the skull.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
37
osmometer; and strength with the dynamometer.35 Using these tools and others
Lombroso filled his texts with representations and inscriptions: tables, charts,
statistics, photographs, and drawings, all attesting to the criminal nature of the body
(Figure 2.3).
Figure 2.3: Tools used by Lombroso for measuring the “signs” o f criminality. The
algometer (L) for measuring “general sensibility and sensitivity to pain,” and the
Criminal Man.
work on the criminal was tied directly to evolutionary and, later, eugenicist practices
which privileged certain types of bodies. The bom criminal had parallels to
“savages”and “lower races” and was clearly bound to racial hierarchies.36 The female
35 A more detailed discussion of these instruments, including illustrations, can be found in the
first chapter of Part Three of Lombroso-Ferrero, Criminal Man.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
38
criminal.38 Throughout his work, Lombroso continually defined the deviant body in
provide a scientific basis for existing theories on society and social structure. Using
the statistical methods of Quetelet and the theories of physiognomy and phrenology,
methodology, Rafter notes that his criteria at first seem “putatively derived from
biology” but that they “are in fact derived from social class and then attributed back
to biology.”39 This is nowhere more clear than in Lombroso’s treatment of the female
criminal.
Delinquente concerned themselves with the study of male criminality. Lombroso also
produced work extensively on the female criminal, culminating in his 1895 La Donna
38 Summarizing his study of female criminality, Lombroso writes: “the true bom criminal
exists among women only in the form o f the prostitute, who already finds in her lamentable calling a
substitute for crime,” Crime, 406. On the pathologization of the female body and, in particular, the
prostitute see: Sander L. Gilman, Difference and Pathology: Stereotypes o f Sexuality, Race, and
Madness (Ithaca: Cornell University Press, 1985).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
39
bodies as the material source for his theoretical endeavors (Figure 2.4). The basis for
this text was a study of twenty-six skulls and five skeletons from prostitutes as well as
case studies of seventy-seven criminals who died at prisons in Turin and in Rome.
The text relies heavily on visual representation and inscription. It is filled with charts,
diagrams, statistics and photographs, amalgamated into case studies detailing the
David Horn has produced a detailed and insightful reading of Lombroso’s work on
female criminality.41 He notes that an early problem facing Lombroso was that
female criminal bodies displayed fewer anomalies than their male counterparts. As
this did not support his existing theory, Lombroso had to reformulate it and account
for the new findings.42 Lombroso accomplished this, Horn suggests, by returning to a
anomalies in female bodies by claiming that diversity among species was an asset
(even in the form o f physical signs of criminal propensity), thus reinforcing the
primacy of the male body. Horn explains, “the relative rarity of signs of degeneration
on the female body, which had seemed potentially a sign of women’s superiority,
could now be linked to a lesser degree of variability, itself a sign of inferiority and
weakness.”43
42 This is not specific to Female Offender. Lombroso’s many texts on male criminality can all
be read as continued re-workings of his original theory on the bom criminal.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
40
Offender. One o f the many plates in the text that served as “data.”
In both Female Offender and Crime: Its Causes and Remedies the female criminal
is continually described in a way that positions her as inferior to her male counterpart.
Females neither match the savagery or anim alistic nature of the male bom criminal
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
41
(with the exceptional case of the prostitute), nor are they capable of the more
intellectual and strategic crimes of the male accidental criminal. In other words,
female criminality falls at the median of the classificatory and reformative curve. By
Lombroso defined the female criminal, and with it the female body, as ineffectual.
Whether studying the male or female body, Lombroso relied on the body itself for
his data. As Rafter has suggested these visual “signs” were often read, or discovered,
in support of existing social hierarchies. The result was a new conception of the
her criminality was readily apparent on the skin. This new, visibly criminal body,
describes as a pivotal case in his work. After being called to perform an autopsy on
the Italian criminal Vilella, Lombroso opens the skull and finds:
the irresistible craving for evil for its own sake, the desire not only to
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
42
extinguish life in the victim, but to mutilate the corpse, tear its flesh,
The development of the modem criminal body, with its visual “signs” of deviance,
experiments in the 1820s by Joseph Nicephore Niepce and Jacques Louis Mande
Daguerre with the camera obscura to the 1888 release of the first Kodak camera,
giving rise to what Tagg has called “the era of throwaway images.”45 The
development of the half-tone process in the 1880s allowed for “economical and
especially news papers.”46 By the closing years of the nineteenth century, nearly
Police departments, penal, medical and other social institutions quickly seized the
individuals. Within this context, and as Tagg, Sekula and other historians of
photography have shown, the camera was co-opted to capture the physical
pathologies o f the body toward evolutionary, eugenicist, and medico-legal goals. The
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
43
camera allowed for the study of large numbers of bodies and provided a text, which
could not resist its interpretation. The intersections of photographic technology and
the new conception o f the criminal culminated in the work o f Francis Galton and his
Galton continually worked on and tested various theories of evolution but is most
famous for his work on eugenics. He defined and introduced this topic in his 1883
Inquiries into Human Faculty.*1 In the introduction to the text he summarizes his
project:
My general object has been to take note of the varied hereditary faculties of
different men, and of the great differences in different families and races, to
learn how far history may have shown the practicability of supplanting
Inefficient human stock by better strains, and to consider whether it might not
Like Lombroso, Galton treated the body as a series of signs to be examined and
interpreted. To this end, he traced heredity through the visible signs of the body. By
47 Francis Galton, Inquiries Into Human Faculty and its Development (London: J.M. Dent and
Sons, 1907).
48 Galton, Inquiries, 1.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
44
findings, and through the eugenic practice of controlled breeding, society could rid
Figure 2.5: Galton composite photographs showing the “criminal type,” c. 1870s.
Figure 2.6 Galton composite photographs showing the “Jewish type,” c. 1870s. From
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
45
(Figures 2.5 & 2.6). Gallon’s first composites were made from photographs he
received from Pentonville and Millbank prisons. Sir Edmund Du Cane, then H.M.
Inspector o f Prisons, asked Galton to examine the photos and see if he could identify
features specific to certain types of criminality.49 Galton divided the photos into three
classes: those convicted of murder and manslaughter, those convicted of felonies and
those convicted of sexual offences.50 Galton then took composite photos of the
exposure was to last ten seconds and ten criminals were to be photographed then each
criminal would receive 1/10* or one second of exposure. Galton defines the rationale
to bring into evidence all the traits in which there is agreement, and to leave
common in all faces that the composite picture when made from many
components is far from being a blur; it has altogether the look of an ideal
composition.51
“good” and “bad” stock. He created composites of Alexander the Great (using coins
depicting him), sisters, brothers, families (across sexes), horses (to show the heredity
51 Galton, Inquiries, 7.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
46
members o f the Royal Engineers, members of the Jewish race, and others. Under
Gabon’s theory of eugenics and its link to inheritance any and all bodies were subject
to composite portraits. In the case of Alexander the Great the composite was created
to show the ultimate height of human kind, this was then contrasted with other
composites to show those groups that might be avoided through controlled breeding.
scientific and social scientific activity that sought to identify and understand the
deviant body through its visual representation. His composites were used by
Lombroso for illustration in the 1895 French and 1896-1897 Italian editions of
Criminal Man.52 They were also used for the cover of the 1890 text, The Criminal,
From its inception, the photograph’s potential for documenting criminals was
53 Havelock Ellis, The Criminal (London: Walter Scott, 1890). Nicole Hahn Rafter identifies
Ellis’ text as a key entry point for Americans to the Italian School of criminal anthropology. She calls
Ellis "far and away the most influential" of the scholars responsible for exposing the work o f the
originators, including Lombroso, to the United States. “Criminal Anthropology,” 530.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
47
departments in New York in 1858, Cleveland in the late 1860s and Chicago in 1870.5:>
1874.56 Early articles discussing the topic appeared in the 1872 and 1875 editions of
Rej lander and W.B. Woodbury respectively.57 By the last decades of the nineteenth
century police departments in major metropolitan areas across the world were
Describing the use of daguerreotypes by the San Francisco Police, Harris Tuttle
writes: “the pictures were mounted in leather books, five to six hundred per book.
Supplementing these photo albums were record books with brief criminal histories
and descriptions of the criminals.”58 The resultant albums, called “rogue’s galleries,”
were collected by major police departments across the world. As crime rates rose, the
galleries grew in size and, as such, presented a central problem for police. Use of the
galleries was dependent on an officer’s ability to memorize the faces, names and
53 Cole, “Manufacturing,” 51; Phillips, “Identifying the Criminal,” 19; Tuttle, “History,” 16.
56 H.S. Cooper, “The Evolution of Canadian Police,” in The Police Function in Canada, ed.
William T. McGrath and Michael P. Mitchell (Toronto: Methuen, 1981), 37-52.
57 O. G. Rej lander, “Hints Concerning the Photographing of Criminals,” The British Journal
Photographic Almanac (1872): 116-117; W. B. Woodbury, “Photographing Criminals,” The British
Journal Photographic Almanac (1875): 128.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
48
information compiled in the books. To exemplify the problem, Berlin’s gallery grew
to such an extent that, by 1877, it was subdivided into ten crime-based groups and
required three attendants. In 1880 the Berlin gallery housed 2135 images and within
One of the most famous of the rogue’s galleries, and one which highlights the
America .60 Byrnes, then Chief Detective of the New York Police, created a text with
204 frontal portraits, or mug shots, of criminals divided six per page. As with other
galleries, the images are interspersed throughout text which describes each offender
including his or her name, alias, biographical and physical description and criminal
history. Figures 2.7 and 2.8 show typical pages of Byrnes’ book. The entry on James
James White, alias Pop White, alias Allen, alias Doctor Long.
Description:
slim. Single. Height, 5 feet 8 1/2 inches. Weight, about 135 pounds.
59 Tuttle, “History,” 8.
60 Thomas Byrnes, Professional Criminals o f America (New York: Cassell and Company,
1886).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
49
Record:
line in America. Over one-third o f his life has been in State prisons
worker. He is an old man now, and most of his early companions are
dead. He worked along the river fronts of New York and Boston for
years, with George, alias “Kid” Affleck (56), and old “Hod” Bacon,
and was arrested time and time again. One of their victims, whom
December 19, 1885, after serving a term for grand larceny. He was
arrested again in New York City the day after for stealing a pair of
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
ja s s s s g a m y . c h a k ls s h a so s, n n n me,
*U *S <SG j l i i CA LtY , A..IAS i?OSTOS> f.M W .C .Y LM iKO C E N T S * . T T " C
94 95 96
Figure 2.7: A page of images depicting male criminals from Byrnes’ Professional
Criminals.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
51
Figure 2.8: A page o f images depicting female criminals from Byrnes’ Professional
Criminals.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
52
In the preface of the text Bymes notes that his mission is to make this rogue’s
of lesser degree are kept in police albums, many offenders are still able
This statement points to Byrnes’ attempt to address the central difficulty of rogue’s
mug shots. However, as these repositories of images grew, their utility became
increasingly problematic. Memorizing the 204 offenders in Byrnes’ gallery, let alone
the 3459 in the Berlin gallery, would be impossible for even the best police officers.
identification. If the public could familiarize themselves with the faces in the gallery,
the work of Alphonse Bertillon.62 After taking a job with the Paris Prefecture of
Police in 1879, Bertillon identified that the central problem plaguing the department’s
identification practices was the vast number of photographs in its collection. More
specifically, the department had accumulated tremendous sums of images but lacked
62 For a thorough account of Bertillon’s work, see: Henry T. F. Rhodes, Alphonse Bertillon,
Father o f Scientific Detection (London: Harrap, 1956).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
53
any real way to utilize them. To alleviate this problem, Bertillon developed his
breadth, arm span, sitting height, left middle finger length, left little finger length, left
foot length, left forearm length, right ear length and cheek width (Figure 2.9). These
measurements were supplemented with the physical description of the body, but
particularly of the features of the face and head. For this task, Bertillon devised a
short-hand language describing the minute details of the body in tremendous detail
(Figure 2.10). The final aspect of Bertillon’s signaletic system was the recording of
one full face and one profile photograph. The resultant identification card, or portrait
parle, was a comprehensive data-sheet, detailing the criminal subject (Figure 2.11).
63 Bertillon’s methods are detailed through several of his own texts, including: Alphonse
Bertillon, La Photographie Judiciaire avec un Appendice sur la Classification et L'identification
Anthropometriques (Paris: Gauthier-Villars, 1890); Identification Anthropometrique: Instructions
Signaletiques - Album (Melun: Imprimerie Administrative, 1893); Alphonse Bertillon's Instructions
for taking descriptions for the identification of criminals, and others by the means of anthropometric
indications (New York: AMS Press, 1975).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
54
Figure 2.9: Measuring the width of the skull for anthropometric data, c. 1900. From
lies, Chrissie, and Russell Roberts, ed. In Visible Light: Photography and
Classification in Art, Science and The Everyday (Oxford: Museum of Modem Art,
1997).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
55
< w * « u k u a w * w tjg a
_ _ y Q - ^ g ntfffuinv-iwaf
J O I C S
ngasagg
- - J - ’...... “■"'^ ■■■■■■n»rt»i;#1ftiin....■im.wiam.iiii
r 4 V 9 W N O a V - s j i.M
•*•■' '— s UkP?S*
m s m m e k e e js e je u t l K t B
>^W
SwflB»'
H E E ggE g BKBEKKK
I E E ®
. _
e p iiiK W S S S is s r i c a s a i E s
Figure 2.10: Bertillon’s “synoptic table o f facial expressions.” From Phillips, Police
Pictures.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited without perm ission.
56
, „, s ....................................
, .............. ^ W .’ - - : » , l X ^ . . . . - « . .. . ~ ........................... ..
aA tt«' $ $M
«*46+*kiwx*>.<$***%*£4iSfi*t
. ^ . sU hI SsLa^A..2&^„4a^4a*l■:«**. p i |p : p # ^ |l | tolplilill
iSiiiBIII
Vj#.,fe~* 3Pt»*A*i*j, SfevA^.*, r^i * gliiMipiiiiiiiiii
>l^sm <■■'■* *^M«w*'...* .................. ......... v—.... - ^
mw Jfflttl sm.il' CCOiHa^Lfl&KWWIJi
measurements (top right), physical description (bottom right) and full face and profile
physical descriptions (using the short-hand language devised by Bertillon), the body
could be translated into a series of words and numbers and could be classified
according to its visual signs. Bertillon identification cards were classified by sub
was further subdivided according to the categories “small,” “medium,” and “large.”
The resulting categories o f cards were divided by eye colour and finally filed
according to ear length.64 Searches of the filing system operated according to the
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
57
was found.
suggests, Bertillon was the first to grasp the fundamental concept of criminal
The portrait parle marked the shift from a visual culture to a literate
accounts of Cole, Sekula, Tagg, and Henry Rhodes and other authors writing on the
topic. What I want to stress here is the particular effect it had on the photograph.
and the potrait parle, the image became an inscription. Rather than merely represent a
body as in Bymes’ rogue’s gallery, the photograph could now participate in a system
of visual and textual representations. Combined with the textual data of the
identification card, the image could be indexed, sorted, accessed and exchanged
within and between law enforcement agencies. The potential of Bertillon’s system
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
58
If a good police commissary in Italy wants to put his hand upon the
years ago. But in a kingdom as large as Italy, with such rapid means
eluding the police by changing their names, or, if arrested, give them a
best.66
Once officially accepted for use by the Paris police in 1883 Bertillon’s signaletic
system was quickly adopted across Europe, Canada and the United States. As has
been addressed in great detail by Simon Cole, and as will be discussed in Chapter
Three, Bertillon’s system was not entirely successful and would eventually be
Nonetheless, it is important to note that Bertillon’s work did have an impact on the
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
59
were part of a confluence of scientific and social scientific activity in the nineteenth
century that produced a new conception of the criminal. The physical body of the
criminal was replaced by its representation and inscription in the form of text, curves,
charts and photographs. Indeed the ability to be represented must be seen as the
defining feature of the modem criminal subject. Individual, physical bodies present
The relative ease and inexpense of photography, combined with its believed
objectivity, enabled the substitution of the photograph for the live body. Law
enforcement agencies throughout the world adopted the camera quickly and amassed
large repositories of mug shots. However, as the resultant rogue’s galleries grew the
knowledge and the construction of a criminal, and with it, a normal body.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
60
CHAPTER THREE
IDENTIFICATION
Edgar Hoover, then the newly appointed director of the Federal Bureau of
Investigation, announced that the Identification Division had passed the million mark
in its collection of fingerprint records.1 During the fiscal year 2001 the same agency
approximately 50,000 fingerprint records a day. Half of these are related to criminal
investigation and half relate to civilian use, such as background checks for
raises distinct concerns regarding the control and use of this information and in the
2 Thomas Carey, Assistant Special Agent in Charge, Washington Field Office, FBI,
“Communication with the Law Enforcement Community,” Congressional Statement, November 13,
2001. Accessed September 2002, available from
http://www.fbi.gov/congress/congress01/careylll301.htm.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
61
September 11,2001. Now, within the United States and under the guise of the “war
overtly discriminatory practices. These include racial profiling and the mandatory
national threat. The collection, interpretation and control of personal information are
fundamental in this effort and its construction of individual and national identities.
This chapter traces the origin of these practices to the development of fingerprinting
increasing populations in urban areas and to increasing crime rates. The impetus
driving Bertillon’s work in Paris was to make a vast photographic archive useful to
police in cases of identification. The resultant reduction of bodies and their histories
into identification cards enabled police to keep track of growing numbers of crimes
and criminals. This is a central point of Allan Sekula’s analysis of the nineteenth-
century visual archive, that the defining feature of criminal identification at the close
of that century was the filing cabinet and not the photograph.4
4 Allan Sekula, “The Body and the Archive,” October 39 (1986): 3-64: 16.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
62
Bertillonage remained in use well into the 1920s; however, by the close of the
nineteenth century the practice was continually being called into question.5 As the
use of Bertillonage increased, two central problems emerged. First, Bertillonage was
The system could not keep pace with the needs of law enforcement which faced
Dr. Henry Faulds and Sir William Herschel introduced fingerprinting as a method
o f identification during the 1870s and 1880s. From its outset, fingerprinting appeared
to avert the problems of Bertillonage. It was faster in both the collection and retrieval
discrepancies in application. Working from this position, most histories dealing with
the ideas behind Bertillonage. The technique is described as a more accurate and
efficient means of classifying and identifying criminals. In this chapter I stress the
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
63
questions regarding the role and ieve! of law enforcement in public life. More
specifically, fingerprinting raised questions about the ethics and ramifications of law
process. The camera is present from the crime scene to the courtroom. It is the
central means through which prints are collected, examined, identified and shared.
holds little value in comparison to its photographic representation which can traverse
physical barriers and can be at work in any number o f locations and contexts
identification.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
64
The rich and diverse history of the fingerprint as a method of identification has
been addressed in significant depth.6 This chapter, therefore, will not provide an
historical, overview of the subject. Instead I want to highlight some of the central
data collection, through the examination and production of evidence and into the
courtroom.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
65
Dr. Henry Faulds and Sir William Hersche!.8 In the late 1870s Faulds, then a
physician at Tsukiji Hospital in Japan, was asked to examine finger impressions left
in ancient Japanese pottery. This project inspired Mm to collect and study the prints
similarities. Faulds outlines Ms work in an 1880 article in Nature'. “On the Skin-
furrows of the Hand.”9 He notes that Ms attempts to trace heredity through the
several other potential uses. CMef among these was the ability to identify criminals.
Faulds writes: “When bloody finger-marks or impressions on clay, glass, &c., exist,
they may lead to the scientific identification o f criminals.”10 He then refers to two
important criminals.” 11
8 Simon Cole also stresses the importance of another individual, Thomas Taylor, who founded
the first division of Microscopy at the U.S. Department of Agriculture. Taylor delivered a lecture in
1877 on the use of fingerprints to identify criminals that became the first published work on the subject
in the West. See Cole, “Manufacturing,” p. 128.
9 Henry Faulds, “On the Skin-Furrows of the Hand,” Nature 22, Oct. 28 (1880): 605.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
66
William Herschel, an employee for the British East India Company, made a
on fingerprints began in the 1850s when he was working in Bengal and used
Like Fauids, Herschel saw the potential for fingerprints to be used in criminal justice
identification needs. Despite their differences or the order in which their work
similarly in that they investigated them as unique identifiers.14 The central concern of
this work was to prove that no two fingerprints could ever be the same.
As described by Fauids and Herschel, the fingerprint was prone to the problems
12 W. I. Herschel, “Skin Furrows of the Hand,” Nature 23, Nov 25 (1880): 76.
14Throughout the literature dealing with fingerprinting there has been continued debate as to
who founded the technique. The most recent example is that of Colin Beavan who pleads that Henry
Fauids should be acknowledged as the central figure in the technique’s history. See: Fingerprints: The
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
67
Fauids and Herschel sought ways to mobilize the fingerprint and transform it into the
basis for a complete system of identification. The work of Francis Gallon and Dr.
Juan Vucetich was of significant importance in this regard. Galton took up Fauids’
work through the prompting of his cousin, Charles Darwin, ultimately seeking
classifying his data. Although unsuccessful in his quest to prove heredity through
fingerprints, Galton did produce essays and a detailed text on the topic in wMch he
described a system to classify prints.15 A year prior to Gabon’s 1892 text Dr. Juan
for classifying fingerprints into a large, workable file. Vucetich’s system was
employed throughout Latin America. Simon Cole calls Vucetich’s “the first
The transformation in fingerprint identification came with the work of Sir Edward
Henry and his assistant, Azizul Haque. Like Herschel, Henry worked under
Origins o f Crime Detection and the Murder Case that Launched Forensic Science (New York:
Hyperion, 2001).
15 Francis Galton, “Personal Identification and Description: I f Nature 38, June 21 (1888):
173-77; Francis Galton “Personal Identification and Description: 2,” Nature 38, June 28 (1888): 201-
02; Francis Galton, Finger Prints (London: Macmillan, 1892).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
68
fingerprints into four basic types: arches, loops, whorls, and composites. These types
print.17 Using these categories, Henry devised a complete classificatory scheme. His
1900 text, Classification and Uses o f Finger Prints, quickly became the central text
on the topic.18 The resultant “Henry system” remains at the foundation of current
fingerprinting practices.
Henry’s system provided a means for identifying, classifying, filing and searching
against which they could potentially identify individuals brought into police custody.
divisions.19 The first division, the primary classification, was based on the
impressions o f the ten fingers of the suspect or criminal. The prints were assigned
numbers based on the presence of specific features, such as loops, whorls and arches.
The specific sequence of numbers representing the ten prints of the hand was
expressed as a fraction and served as the file number for that particular fingerprint
17Most sources agree that the majority of work attributed to Henry as regards classifying
fingerprints was actually produced by Haque.
18Sir E.R. Henry, Classification and Uses o f Finger Prints, 7th [1934] ed. (London: His
Majesty’s Stationary Office, 1900).
19There is a wide array of sources that address the procedures of fingerprint identification.
Three particularly clear sources are, Charles Edward Chapel, Fingerprinting: A Manual of
Identification (New York: Coward McCann, 1941); James Holt, Finger Prints Simplified: A Handbook
o f the Science o f Finger Print Identification (Chicago: Frederick J. Drake and Co., 1920); Frederick
Kuhne, The Finger Print Instructor (New York: Muibj and Company, 1916).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
69
record. The second division, the sub-classification, distinguished prints with the same
primary classification through an analysis of the patterns of the index fingers. The
third division, the second sub-classification, divided prints having the same primary
and sub-classification according to the ridges of the index and middle fingers. The
fourth division, the final classification, used the ridges of the little finger to separate
Once reduced through these four stages, prints were filed in cabinets or in a pigeon
To check a suspect against the fingerprint file, Ms or her prints would be subject to
the same classification process. Once the suspect’s prints were categorized through
the four divisions they would be compared against the records in the corresponding
pigeon hole o f the file. In a 1920 fingerprint manual, James Holt parallels the process
Three years prior to the publication of Henry’s Classification and Uses o f Finger-
Prints, the British Home Office officially accepted fingerprinting over Bertillonage in
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
70
throughout the closing decades of the nineteenth century, fingerprinting was not
officially introduced to North America until the 1904 World’s Fair in St. Louis.
the technique to prominent law enforcement officials from Canada and the United
States. After the close of the Fair, Ferrier remained in St. Louis to teach the
During the closing years o f the nineteenth century and the first decade o f the
provided space on his identification cards for fingerprints. Faced with increasing
crime rates and increasingly mobile criminals, law enforcement practices o f the time
were preoccupied with the need for large-scale information exchange. The situation
Donald Dilworth notes, policing within the United States developed sporadically and
yy
at the local level, and was marked by competition among locales. The same issue
existed in Canada, although to a lesser degree as the country had a significant federal
22Dilworth, Identification, 1.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
71
level police force.23 These were in contrast to the European model, which was
departments through the mail in the form of “wanted” circulars. These circulars
history. The effort was aided, in the early 1890s, by the journal, The Detective, which
in the formation o f the International Chiefs of Police Union in 1893. Comprising law
enforcement officers from across Canada and the United States, the Union was
primary goal of the Association was to establish a centralized resource for housing
and sharing information on criminals. This took form in the National Bureau of
D.C. in 1902. The promise o f a staffed, centralized resource was that it could more
23 For a detailed account of the development of municipal, provincial and federal police in
Canada, see: William Kelly and Nora Kelly, Policing in Canada (Toronto: Macmillan, 1976); William
T. McGrath, and Michael P. Mitchell, ed., The Police Function in Canada (Toronto: Methuen, 1981);
C.K. Talbot, C.H.S. Jayewardene, and TJ. Juliani, ed., Canada's Constables: The Historical
Development of Policing in Canada (Ottawa: Crimcare, 1985).
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
72
At its outset, the National Bureau promoted the use of Bertillonage for
identification, It was hoped that through the use of a common language, Bertillonage,
departments across Canada and the United States could share information on
criminals. However, two central problems quickly surfaced: the time-intensive nature
opening years of the twentieth century, police and law enforcement personnel openly
the years surrounding the turn o f the century attest to the general frustration with the
Bertillon system.27 Even if the National Bureau could facilitate better communication
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
73
took place at the 1914 convention and gave rise to the International Association for
identification procedures.
was concise, compact and readily transferable. The resultant documents served the
needs o f law enforcement, which faced increasing crime rates and increasingly
mobile criminals. This effort was aided by the development of fax technology, first
demonstrated in 1902,29 and the ability to transmit photographs over radio, described
The latest obstacle thus placed in the path o f the wrong-doer is the
long arm of the radio, which not only serves to ensure rapid
30 This process was developed by Eduard Belin of Paris. See: Austin C. Lescarboura,
“Sending Photographs Over Wires,” Scientific American 123, (1920): 474-84.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
74
distance identification.33
Interestingly, it was not just law enforcement officials but also communications
industry representatives who lauded the benefits of the new technique. At the 1925
the American Telephone and Telegraph Company spoke on the benefits of the
telephotograph and the ability to transmit fingerprints over telephone lines.32 The
ability to send fingerprints over radio and telephone positioned fingerprinting within a
large communications system. This increased not only the mobility of the fingerprint
The relative ease with which the fingerprint could be produced and shared assured
housing fingerprint files took form in the establishment of the Canadian Criminal
Identification Bureau in 1911 and the Identification Division of the Federal Bureau o f
information were amalgamated into national archives. During this same period, the
founding court cases.33 By the 1930s fingerprinting served as the basis for a complete
33 Colin Beavan and Simon Cole address the founding cases in Britain and the United States
respectively. See: Beavan, Fingerprints; Simon Cole, “Witnessing Identification: Latent
Fingerprinting Evidence and Expert Knowledge,” Social Studies o f Science 28, no. 5-6 (1998): 687-
712.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
75
established which housed and shared fingerprint records; and the technique had
Simon Cole, Donald Dilworth and others have addressed the transition from
Bertillonage measurements were both derived directly from the criminal body,
fingerprints afforded a more direct representation of the biological body than did
they presented a physical trace of the criminal. Writing an early history of the
technique, George W. Wilton highlights this biologically based authority: “But, while
34The United States, Canada and the United Kingdom employed variations of the Henry
system; Argentina used the Vucetich system and countries throughout Europe employed individual
systems that were largely based on Henry’s and Vucetich’s. Within each classification system prints
were analyzed according to the basic patterns and ridge details outlined by Henry and his
contemporaries, enabling prints to be shared between law enforcement departments.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
76
photographic prints or slides and recorded voices are artificial, the evidence of finger-
maker.”36
objectivity and its relationship to the natural sciences.37 Galison discusses the
physical, medical and biological sciences o f the nineteenth and early twentieth
accepted as the inherent truth of the natural world. Using the scientific atlas as his
35 The tremendous advances in computer and database technologies in the 1960s and 1970s
greatly extended the depth and power of this system, and will be addressed in Chapter Five.
36Wilton, Fingerprints.
j7 Lorraine Daston and Peter Galison, “The Image of Objectivity,” Representations, no. 40
(1992): 81-128; Peter Galison, “Judgment Against Objectivity,” in Picturing Science Producing Art,
ed. Caroline A. Jones and Peter Galison (New York: Routledge, 1998), 327-359.
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
77
mobile. The compact visual space of the fingerprint could be reproduced and
transferred between locations and contexts indefinitely, each time reasserting the
supposed natural presence of the criminal5s body. I now turn to this chapter’s main
Photographing Fingerprints
discussed in Chapter Two. Like other scientific and social scientific practices of the
from the crime scene to the courtroom. This is achieved through its mobilization in
the photograph.
and its photograph are rarely differentiated. As a result, what is routinely referred to
as “the fingerprint” is, more accurately, its photograph. This is nowhere more clear
than in the fingerprint’s use in court. Within the courtroom, “the fingerprint” is
R ep ro d u ced with p erm ission o f th e copyright ow ner. Further reproduction prohibited w ithout perm ission.
78
court cases and other judicial and penal practices, recognition of the photograph’s
role in fingerprinting Is rare. Explicit references to the medium In this sense are
photographing prints from crime scenes. The conscious separation of the fingerprint
and its photographic representation would betray the authority of the technique. The
practices illustrates the level to which this separation has been removed from view.
mobile. However, the camera also rendered what was perceived as the “inherent
derived directly from the physical body. Prints were collected directly from the
fingerprinting enabled the collection and use of a new type of data: that derived
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
79
indirectly from the body, lifted from the crime scene. Using a camera, officers could
The procedure of this new method of identification and its promise were described
In cases of murder, the marks left by the blood stained fingers have
been photographed and compared with the finger prints of the habitual
an individual who would never have been suspected but for the clue
Superintendent Hare’s comment references the mobilization of the camera to link the
direct and indirect presence of the criminal. The criminal’s presence at the crime
scene, via the “blood stained fingers,” is tied to his presence in the bureau’s file by
perhaps best exemplified in a technique proposed by F.H. DePue of the San Francisco
Police Department during the opening years of the twentieth century. While Ms
efforts were ultimately rejected, DePue’s work provides a clear illustration of the
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
80
unique features that photography afforded law enforcement and which were
projected images were dissected into a grid and anthropometric measurements were
taken and compared. DePue’s system was unique in the way he promoted the use of
By the DePue system you can take a flash photo anywhere of your
the secrecy of your office, without your subject having the slightest
and its collaboration with photography. First, the camera enabled the collection of
information on the criminal in a subtle and non-physical way. Second, the resultant
images could be examined and re-examined infinitely and independent of the physical
body. Finally, this entire process could be performed without the suspect’s
knowledge.
from a body that was physical present and often known to be normal or deviant. In
contrast to this, fingerprinting gave rise to the production and accumulation of data on
40Dilworth, Identification, 50. DePue presented his system to the International Association of
Chiefs of Police convention in 1902.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
81
race, gender and class, and the various “signs” of criminality or deviance that served
as the data for prior methods o f identification. Fauids, Herschel and Galton had all
concluded that fingerprints did not reveal themselves as belonging to any specific
type of body. The search for criminality shifted from application (as in the
The results of this shift in identification practices were significant. The camera
transported data from the complexity of the ever-changing live environment to the
controlled setting of the police laboratory. This, in turn, gave way to the increased
Identification was no longer the purview of entire departments (or the general public
as was Thomas Byrnes’ hope) but of a specialized group o f trained and certified
The development of the half-tone process and celluloid roll film gave rise not only
practices within the criminal identification process. Officers in the field were no
longer charged with identifying criminals. Equipped with cameras, their specialized
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
82
task was data collection.42 Within the laboratory, the trained eye of another expert
separated the evidence from the data and identified the criminal body. Prints
collected from crime scenes were done so with the promise of identification, not
explains, the creation, control and deployment of immutable mobiles within any
scientific practice is bound to positions of power and authority. Cole’s work has
India. He shows that fingerprinting was viewed as a way to differentiate among faces
that were perceived as visually homogeneous and that its function was primarily tied
to the recording, tracking and control of colony populations. In addition, Cole shows
that the technique’s adoption into Western police practices was similarly invested
with the tracking and control of bodies. Because fingerprinting was an inexpensive
and efficient method of identification, Cole argues, the technique “offered a way to
bring the poor, the ill, the addicted into the custody of the state under the guise of
421 do not mean to suggest that this resulted in a total shift in criminal justice practices.
Officers in the field still participated in criminal identification; however, within fingerprint
identification their role was as data collectors.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
83
net effect was “to give increasing numbers of people a criminal record which could be
bodies. By casting a wider net, more criminals were caught, and more were subject to
into the police laboratory. Centralized fingerprint archives such as those of the
I do not want to suggest that, from its inception, fingerprints were being collected
randomly in the hopes o f finding criminals. Early uses o f the technique mirrored
prior identification practices: it was used to record the criminal body. However, as it
was allied with the camera, fingerprinting enabled the collection of aggregates of data
representing the criminal, the non-criminal and the potential criminal The camera
mobilized law enforcement and identification practices so that their subject was no
longer the individual body but a larger, aggregate social body, within which any
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
84
specific body was potentially criminal. Rather than elaborate on this process in the
identification. Importantly, cases like that described by Hare would have been
relatively uncommon during that time as fingerprinting operated according to the ten-
print Henry system. The ability to identify a single or an isolated few latent
fingerprints found at a crime scene against a fingerprint file based on the ten-print
system was not impossible but was time-consuming.45 In response to this individual
police departments collected single fingerprint files, organizing the prints according
developed through the late 1910s and the 1920s in Europe and North America and
unchanged during the middle decades of the twentieth century. Law enforcement
agencies continued to collect fingerprint records, filing them according to their own
47 For a detailed discussion of single finger print systems see, Chapel, Fingerprinting, and
Cole, “Manufacturing.”
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
85
fingerprint archives grew their usefulness declined. Filing systems based on Henry’s
electronic code enabled law enforcement agencies to collect, store and search
fingerprints in ways far beyond the limits of the earlier manual systems.
Experiments to record fingerprints electronically began in the late 1960s and early
their specific approaches, each company developed computer programs for reading
Among the first to employ automatic fingerprint identification equipment were the
New York State Identification and Intelligence System in 1968, the Atlanta Police
Department in the early 1970s, the Kansas City Police Department in 1974 and the
Nassau County Police Department in 1975.49 At the federal level, the FBI installed
its first fingerprint scanner and began digitizing its extensive fingerprint collection in
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
86
1972.50 A year later the Royal Canadian Mounted Police installed its automated
system.51 By the late 1970s and early 1980s Rockwell International and NEC had
The original AFIS units developed by Rockwell International and NEC scanned
fingerprint a person brought to the police station and then scan the record into the
system. By the late 1980s and early 1990s paperless and inkless “live scan” systems
were developed. Today numerous companies produce and sell a variety of AFIS
hardware, software, peripheral and accessory products and law enforcement agencies
53 Three central companies providing AFIS equipment and products include: Lockheed
Martin, see http://www.lockheedmartin.com/lmis/level3/fingiden.html; NEC, see
http://www.necsolutions-am.com/idsolutions; and Printrak International (a Motorola Company), see
http://www.printrakintemational.com. An on-line source with extensive lists of AFIS products and
companies is maintained by a member of the U.S. Army crime laboratory. See,
http://onin.com/lp/afis/afis.html, accessed May 24,2003.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
87
ability to scan a fingerprint and record its minutiae, and the ability to search existing
fingerprints according to the recorded information. AFIS creates a binary code for a
fingerprint based on the spatial relationship of the print’s minutiae. The binary code
and digitized image of the print are stored in the program’s database. AFIS searches
based on similar binary codes found in the database. Searches will return the images
of the prints with similar code for a side-by-side comparison against the print in
identification, AFIS functions to replace the manual tasks of filing and searching the
fingerprint archive.
AFIS units archive two distinct types of prints: complete 10-print fingerprint
records collected directly from the physical body and, single, partial or multiple latent
prints found at crime scenes. Searches function across three levels. First, a complete
10-print record can be searched against the database of known offenders. This is
primarily beneficial for establishing identity when the person being printed may
falsify their name. Second, a latent print can be searched against the database of
known offenders. This search would identify individuals present at a crime scene,
otherwise unknown to police. Third, a new 10-print record can be searched against
the latent database. This final search could link the individual who is being printed to
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
88
The development and growth of computer technology from the 1960s through to
the present has revolutionized the fingerprinting capabilities of law enforcement. The
majority of law enforcement agencies in the United States and Canada currently use a
combination of the traditional, ink-based system and the new, paperless and inkless
live-scaa systems. However, I stress that the basic classificatory and searching
manuals from the early 1900s to the present describe a similar process. The camera is
used initially to document the crime scene prior to investigation. Officers enter the
scene, search for fingerprints and dust, illuminate or otherwise prepare prints to be
photographed. Photographic enlargements are made from the collected prints away
from the crime scene. Prints are classified according to the existing system, from the
ten-print Henry system of the early 1900s to more current automated digital systems,
enlargements of the found and known prints are produced. The identifying features
of the prints are marked on their photographs and described in an accompanying text.
54 See note 7.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
89
real in application and procedure but fictional in its goal. The purpose of the fictional
from the collection of crime scene materials through investigation and into its use in
the courtroom.
Officers examine and photograph a crime scene, its contents and its setting.55 Within
the scene, sites that might reveal fingerprints (window sills, doors, glasses etc.) are
way to make the prints visible.56 These prints are then either photographed, lifted (a
copy is taken by applying adhesive tape or another material to the dusted print and
“lifting” it off of a surface), or both depending on the nature of the print. In this
specific case, a dinner plate located at the crime scene is examined and dusted and
fingerprints are found. All prints from the scene that can be lifted or photographed
are taken to the police department where they are scanned into the Automatic
idiosyncratic features of each print, their "ridge characteristics," and searches the
database for similar markings. AFIS presents a series of possible matches, each of
which is compared against the found prints. If a match is not made the print under
55Within the Metropolitan Toronto Police, Scenes of Crime Officers receive general training
on evidence collection, including basic notes on photography. Identification Officers receive more
specialized training, particularly in reference to the collection and photographing of crime scene
materials.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
90
a match is made, the fingerprint and any accompanying information will be collected
by the examining officer. In our case a print from the dinner plate draws a match to a
print in the database and both are prepared for further examination.
features of found (from the crime scene) and known (on file with the police) prints.
The first step is to locate the hand and finger from which the print originated (i.e. the
left or right hand and the middle, index, etc. finger). Next the print's general pattern
is noted (whether it swirls or moves in a given direction). The most significant part
of the process is the Identification of the ridge characteristics, sometimes still referred
to as the “Henry details” or the “Galton details.” The various combinations of these
features, as dots, lakes, bifurcations and ridge endings are unique to each print (Figure
3.1). Using the ridge characteristics as signposts, the examining officer constructs a
the dinner plate within the context of the crime scene (Figure 3.2). The second
photograph locates the fingerprint on the plate (Figure 3,3). The third is a close-up of
the print (Figure 3.4). Once this general continuity is established the print is lifted
56 It is important to note that the collection of fingerprints is only one part of the larger
investigative process. Other forms of potential evidence, such as objects at the scene are also collected
and are photographed.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
91
onto acetate, enabling it to be scanned into APIS and to be used for further
investigation (Figure 3.5). In our fictional scene, AFIS produced a match to a latent
print on file. The matching criminal record is obtained and an examination takes
For the examination the Identification Officer uses the third photograph from the
series, which was the close-up image o f the print. Both the close-up and the latent
print (from the fingerprint chart) are re-photographed and enlarged to 8/12 by 11
(Figures 3.7 and 3.8). These two photographs are then read by the examining officer
and prepared for use in court. The resultant fingerprint chart is accompanied by a
narrative account of how the evidence is to be read (Figure 3.9). This material is
combined with a detailed list of the examining officer’s credentials and presented as
final evidence.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
92
Figure 3.2: The first photograph positions the dinner plate within the context of the
crime scene.
Figure 3.3: The second photograph positions the fingerprint on the dinner plate.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
93
Figure 3.5: The print from the plate is lifted onto a sheet of acetate, enabling it to be
scanned into the APIS database.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
94
L o c k -u p No
s&efurcnsr
wmm
j
I# METROPOLITAN TORONTO
POLICE
i
TO' HI
.A
SAM..NQUE,<JNEF£gl''S§ftg
APS?tT£2gT
iNT . *O
£W
NE
OTRU
ROER
CO
QR
UD
tyE-D.EN
G!C
VA
5SRE
A
U'ASM
OP
NU-TA
<=AW
lN.uT
TiC aT
PE E
SD
.O ,R
FOD
MEA
FO
.TRM
IO
NEDOR
OU05m8ifii-3
«.ESSU,R
G
EI.VED
DO
NA
fT EF!IADATg
rig
FOURSNCERSTAKENTOO£TH6R-JM PR£S$-.ONSM m.TANE£OSSQUATSCQOfGTS
*0%
III!
«4
| V-A
-u« ; <«■
S s ^ r t u r e e» a re a< i-S i^ a n S S o e ta f^ S w w
S ” D f |: y g L ?.e L
i^i^m
"dcSs-dTcT w.'"” ’ ’'"'’’"""IfflftfrKSir-rj
**
'fHaceof Aprov>ra»t~Uauaeniissaneai’.
c(NOK-Nwnalasjross®tSup!t»e««Sf®
Figure 3.6: The criminal record matching the identified print is collected.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
95
Figure 3.7: A negative is made from the found print to be enlarged for final
Figure 3.8: A negative is made of the latent print from the fingerprint record to be
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
96
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
97
paper trail linking the criminal to the crime scene. Throughout the examination the
camera is used exhaustively in order to isolate and make the criminal visible. His
representations used in the fingerprint chart are complicated visual texts that have
been constructed to look uncomplicated. Their clarity and precise appearance are
The fictional scene also shows the inseparability and interchangeability of the
guarantees the “natural inference of presence” of the criminal from the crime scene to
the courtroom. His presence on the dinner plate is tied to his presence in the
their various manifestations these images continually display the presence of the
criminal through the ridge characteristics o f the fingerprint. The variables of time,
location, purpose and context of production are rendered invisible in the fingerprint
fingerprint. This was necessary to trace the production o f evidence and the use of
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
98
photography throughout that process. It is important to note that the final print is one
among a much larger number collected from the crime scene. Each of the
fingerprints collected is archived into the APIS database. The prints not useful to the
fictional scene can be linked to past crimes or can wait for identification in future
cases. Which is to say that an individual present at the fictional crime scene, although
not ultimately identified or arrested in relation to that case, could be linked to the
fictional scene if arrested, and printed at a later date. The prints remain archived as
Conclusion
representation is not to call for the more accurate use of language in law enforcement
and legal and penal practices. Rather, it is to acknowledge the fingerprint’s status as
an identification system that emerged from, and relies upon, the collaboration of
This allows us to examine the intersections of photography and the fingerprint in the
compact, concise format that could be easily produced and interpreted and transferred
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
99
necessary to fulfill these needs. In this sense, fingerprinting merely extended existing
law enforcement practices which sought to keep pace with increasingly mobile
regarding the ethics associated with the collection, control and use of personal
issues.
Simon Cole describes the development and use of fingerprinting within law
power as it worked in concert with existing criminal codes to bring more people “into
the system.” I agree that fingerprinting greatly assisted in this effort; however, I
offer tremendous power to law enforcement as they can be deployed infinitely and
immutably between contexts and locations. Fingerprint files attest to the “natural
time. Suspects can be linked to past crimes through their “natural Inference of
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
100
presence” on file with the police. The collection and use of latent information in this
regard has proved to be an invaluable tool for law enforcement in tracking and
arresting recidivists. However, law enforcement practices based on the use of latent
according to notions of race, class, gender, sexual orientation and other features.
I do not want to suggest that fingerprint data is collected for deliberate and
malicious use; however, as it is collected for potential use fingerprint data threatens to
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
101
including race, class, gender and sexuality as well as moralistic values of right and
wrong predetermine the use and interpretation of this data. At stake are the
construction of individual, group and national identities with their attendant rights and
limitations.
Paul Rabinow uses the phrase “Galton’s Regret” to title an essay in which he
that Gallon regretted the inability to use fingerprints to track and study hereditary
successors, found variability across families, races and nationalities. The fingerprint
offered no information beyond the individual body it represented. Rabinow uses tMs
58Paul Rabinow, “Gabon's Regret: Of Types and Individuals,” in DNA on Trial: Genetic
Identification and Criminal Justice, ed. Paul R. Billings (Plainview: Cold Spring Harbor Laboratory,
1992), 5-18.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
102
CHAPTER FOUR
OF INSCRIPTIONS
physical signs of the body, and DNA identification works at the cellular level.
Proponents of DNA analysis describe it as the most powerful and effective method of
newer molecular techniques permit the study o f human variability at the most basic
level, that of the genetic material itself, DNA.”2 DNA analysis suggests the natural
of being the tactile trace o f a body, DNA is understood to represent the biological
Despite being in only in its second decade of use within law enforcement
practices, DNA analysis has become an essential and powerful tool in criminal
1Rabinow’s essay appears in Paul R. Billings, ed., DNA on Trial: Genetic Identification and
Criminal Justice (Plainview: Cold Springs Harbor Laboratory, 1992), 5-18.
2 The Evaluation o f Forensic DNA Evidence (Washington, D.C.: National Research Council,
1996), 9.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
103
biological material is left and where other forms of evidence are often absent. DNA
analysis has enabled the capture of large numbers of repeat violent and sexual
offenders and has been used to exonerate the falsely convicted. In addition, DNA
military for the future identification of soldiers killed in battle or missing in action, by
policies and by research laboratories for studies in disease, health and heredity. The
potential use and misuse o f genetic information within these contexts has been a
By 1994, only seven years after its initial use for criminal identification in the
United States, DNA analysis within law enforcement was standardized under the
direction o f the FBI. The DNA Identification Act, written in 1993 and enacted in
1994, gave the FBI authority over the technique’s procedures and protocols. This
identification in the United States from its inception in 1987 to the enactment of the
this process. I argue that, by legalizing the FBI as arbiter of how DNA evidence is
produced, the DNA Identification Act gave rise to a position of “dominance” over its
inscriptions.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
104
individuals and groups compete for dominance within their shared field of practice.
Latour suggests that this competition takes place through the production and control
of inscriptions. The group that produces and employs the best inscriptions wins out
over others and establishes dominance in the field. Latour compares the process to an
arms race, noting “once one competitor starts building up harder facts [through the
production and deployment of inscriptions], the others have to do the same or else
explains: “although in principle any interpretation can be opposed to any text and
image, in practice this is far from being the case; the cost o f dissenting increases with
each new collection, each new labeling, each new redrawing.”4 Competitors unable
to challenge the dominant position are forced to accept that position and its
inscriptions.
In this chapter I argue that the FBI has achieved dominance, as described by
Latour, over DNA analysis in law enforcement. I trace the development of this
position through the gradual control of the inscription of DNA, the autoradiograph;
more specifically, through the control and dissemination of procedures for producing
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
105
autoradiographs. I argue that the DNA Identification Act concretized the FBI’s
dominant position in three primary ways. First, It legalized the Bureau to develop,
delimited the FBI’s authority over DNA analysis to those practices specifically
assure the FBI’s position within the highly competitive market of DNA analysis.
Third, the DNA Identification Act provided the FBI with the necessary funding to
implement a National DNA Index, enabling the Bureau to disseminate Its procedures
for DNA analysis throughout local and state law enforcement agencies. This further
strengthened their control over the technique and also gave them access to the genetic
identification data housed in law enforcement agencies throughout the United States.
scientific practice and the power associated with their control However, whereas
mobiles, this chapter examines the more abstract field o f the institutional control of
practice. The chapter addresses the significant and far-reaching effects this dominant
position has on future uses and applications o f DNA within law enforcement
practices.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
106
significantly from tins work, using a variety of sources from scientific, legal,
academic and professional fields. I stress that DNA analysis is largely a visual
process. Within existing work on the technique, material addressing its visual nature
Knorr Cetina discuss the visual act of Interpreting DNA autoradiographs.5 Their
essay presents research conducted in a molecular genetics lab during 1986. During
this research the authors studied the types of “talk” that took place between
participants during the interpretation of autoradiographs. They show' that the image’s
meaning, its transition from data to evidence, is produced through this interactive
5K. Amann and K. Knorr Cetina, “The Fixation o f (Visual) Evidence,” in Representation in
Scientific Practice, ed. Michael Lynch and Steve Woolgar (Cambridge, Mass.: MIT Press, 1990), 85-
122 .
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
107
Sheila Jasanoff also examines a specifically visual aspect of DNA evidence.7 She
analyzes the use of DNA evidence in the O J . Simpson trial to address the
construction of authority over visual evidence. She notes the authority to “see”
within legal contexts, to have one’s views accepted as “expert,” is often determined
through the specific parameters of a case. Thus, in her analysis of the O J. Simpson
trial she emphasizes the role of Judge Ito as the arbiter o f what is and what is not
“seen” by the jury. She argues that in controlling what visual evidence was shown in
the trial, Judge Ito substituted his own vision for that of everyone so that Ms own
Despite their particular emphases, the essays of Amann and Knorr Cetina and
much through the framing o f what is being seen as through the image being
examined. TMs chapter complements the work of Amann and Knorr Cetina and
unique in its specific treatment of the visual. Whereas Amann and Knorr Cetina
dominance over DNA analysis through the control of procedures for constructing
autoradiographs.
7 Sheila Jasanoff, “The Eye of Everyman: Witnessing DNA in the Simpson Trial,” Social
Studies o f Science 28, no. 5-6 (1998): 713-740.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
108
the crime scene) to DNA drawn from the suspect. Analysis begins with the collection
o f DNA from cells, usually from found samples o f blood, semen, bone marrow and
hair. Once extracted the DNA is cut into smaller pieces using restriction enzymes.
The separate pieces are of different lengths and represent specific groupings o f the
building blocks of DNA: adenine, cytosine, thymine, and guanine. From here, the
pieces are subjected to an electrical charge, through the process of gel electrophoresis.
This charge separates the pieces according to size and the speed with which they
move through the gel. After being transferred from the gel to a sheet of nylon
through a process called blotting, a radioactive probe is added. Because the building
blocks o f DNA only pair with their specific complement (adenine with thymine and
cytosine with guanine) the probe binds to its matching fragment and makes the
structure of the DNA known. The segments o f DNA with their bound probes are
rendered visible as the sheet o f nylon is placed against a sheet of photographic paper
and the probes register as dark bands. The final product is called an autoradiograph,
« ©
alternatively an autoradiogram or autorad (Figure 4.1). The parallel lanes of an
autoradiograph represent the sample DNA, the suspect’s DNA and control markers.9
8 There are a tremendous number of descriptions of this process available. Four particularly
clear sources include DNA Technology in Forensic Science (Washington, D.C.: National Research
Council, 1992); The Evaluation o f Forensic DNA Evidence; Thomas Curran, Forensic DNA Analysis:
Technology and Application (Parliamentary Research Branch, Government of Canada, 1997) BP-
443E; Eric Lander, "DNA Fingerprinting: Science, Law, and the Ultimate Identifier," in The Code of
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
109
aw mm&7
*
! m
m m
m
m
m
« k
m z *
* 1*.
mm
mm • •
•
•<*A
%
mm -# -
mm
mm s •
•
m* • •
at* #•
««!» ■m #
#:■
mm # il
Figure 4.1: The DNA autoradiograph. From the National Research Council’s DNA
Codes: Scientific and Social Issues in the Human Genome Project, ed. Daniel 1. KevSes and Leroy
Hood (Cambridge: Harvard University Press, 1992).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
110
It is important to note the distinction between DNA samples and DNA profiles.
The blood, hair, semen or other source from which the DNA is derived is referred to
as the sample. The autoradiograph produced from the sample represents the DNA
profile. DNA profiles are distinguished from DNA samples by the type of
DNA, meaning the fragments used do not cany information regarding an individual’s
contain entire genetic sequences of the individual from which they are drawn. DNA
collection o f DNA generally refer to the collection of samples because of the wealth
o f personal information they contain, and its irrelevance for criminal identification.
This distinction will be taken up more fully in Chapter Five; here it is sufficient to
Once made visible, the DNA profiles from suspect and sample are compared.
Using a computer, the analyst(s) measure the specific displacement o f bands in the
suspect and sample profiles, comparing the measurements against one another. This
interpretation produces one of two results. If the displacement of bands in the sample
DNA and the suspect’s DNA are dissimilar the suspect can be removed from
9 It is important to note that the specific fragments of DNA represented in the autoradiograph
are only a minutia of the entirety of the human genome. The sources referred to in the previous note
discuss the specific fragments of DNA that are used in analysis.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Ill
second procedure takes place. A probability is calculated to show the likelihood that
the matching DNA could have come from someone other than the suspect (but with
similar genetic makeup). Because only a fraction of the world’s population have had
samples and statistics. Sample populations are broken down according to race-based
numerical value is produced, such as “one in one million,” estimating the likelihood
that the sample DNA could have come from someone of the same sample population
other than the suspect. Together, the autoradiograph and the numerical probability
immutable mobile. The mechanical objectivity of the camera captures the “natural
inference o f presence” o f the fingerprint and isolates it in the static image.11 The
m eaning, value and authority of the fingerprint remain unaffected as its photographic
representation moves seamlessly and immutably between contexts and locations. The
way fingerprinting is not. DNA is only known through its material representation, the
10A particularly good discussion of the calculation of probability can be found in The
Evaluation o f Forensic DNA Evidence.
11 The phrase is taken from George Wilton Wilton’s text on fingerprints. See Fingerprints:
History, Law and Romance (London: William Hodge and Company, 1938).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
112
fingerprinting in this regard, it is similar in that the efficacy of the technique as visual
complexity of DNA must be made into a coherent, unified evidentiary statement and
Criticisms and concerns raised about DNA analysis pertain to the two-part process
of analysis. In the first instance, the technique is challenged based on the procedures
with which it was performed. The faulty collection of evidence, its mishandling or
misuse, and personal or laboratory error serve as sites o f contention. In the second
instance criticisms are leveled at the notion of population samples. Because the world
does not exist within strict race-based groups, critics argue, then sample populations
issues, DNA analysis continually raises concerns regarding the collection o f genetic
information. The storage and use of DNA information in databanks poses threats of
i 'y
discrimination against individuals based on their genetic makeup.
During the “DNA wars” o f the late 1980s and early 1990s proponents and
opponents of DNA analysis debated these issues and others related to the efficacy and
place through newspapers, popular and specialized journals, government reports and
in the courtroom. The DNA Identification Act of 1993, enacted in 1994, attempted to
12For in-depth discussions of DNA analysis covering a diverse array of topics, perspectives
and approaches see: Billings, DNA on Trial; Mark A. Rothstein, ed. Genetic Secrets: Protecting
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
113
alleviate these concerns and to black box the technique.. As with earlier methods of
immutability of the evidence. Toward this end, the DNA Identification Act called for
the establishment of a DNA advisory board under the direction of the FBI to develop
and monitor standards for DNA analysis in law enforcement. This chapter turns to an
investigation of the “DNA wars,” from the introduction of DNA analysis into law
enforcement through the drafting of the DNA Identification Act in 1993. I locate the
lack of coherent procedures for analysis as the primary area of concern surrounding
the technique.
The first use of the technique known as “DNA fingerprinting” was by a British
Cellmark Diagnostics and was used primarily for paternity testing in relation to
immigration in the United Kingdom.14 In the United States, during the mid-to-late
Cellmark Diagnostics of Maryland (the U.S. subsidiary of the British company which
Privacy and Confidentiality in the Genetic Era (New Haven: Yale University Press, 1997); “Contested
Identities,” a special issue of Social Studies o f Science, 28 no. 5-6 (1998).
13Jeffreys was the first to coin the term “DNA fingerprinting,” which has since been replaced
in favor of “DNA analysis,” “DNA typing,” or “DNA profiling.” DNA identification is based on the
calculation of probability and therefore does not determine absolute identification as fingerprinting
does. Because of this It was generally agreed that the technique’s affiliation to the standard practice of
fingerprinting was erroneous.
14Michael Lynch and Sheila Jasanoff, “Contested Identities: Science, Law and Forensic
Practice,” Social Studies o f Science 28 no. 5-6 (1998): 675-686; 676.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
114
held the patent), Lifecodes Corporation of New York, Genelex of Washington State,
and Forensic Science Associates of Richland California. In 198S the Federal Bureau
The transition of DNA analysis from the research laboratory to the courtroom was
astonished me how rapidly the scientific community has used the technology, how
rapidly it has been viewed positively by many young lawyers.... I thought the
practical uses were years in the future.”15 The first conviction in the United States
based on DNA evidence was the 1987 case, State v. Andrews.16 The accused, Tommy
Lee Andrews, was convicted o f rape after DNA drawn from Ms blood matched that
During the first few years of its use in cases of criminal identification, DNA
specialized and popular audiences. The use of the term “DNA fingerprinting”
throughout this early period attests to the technique’s successful reputation but also to
DNA analysis identifies a person through the use of probability statistics. The
15Earl libel!, “Whodunit? Quick Check the Genes!,” Parade Magazine, March 31 1991: 12.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
115
erroneous term “DNA fingerprinting” was gradually replaced with “DNA profiling,”
“DNA typing,” or “DNA analysis.”17 Throughout this Chapter I use the term “DNA
Combined with a general lack of familiarity with the technique, this reputation
prevented DNA analysis from being questioned. But when it did enter into trials,
DNA evidence confounded defense attorneys. In a New York Times article, Peter
Neufeid, a prominent defense lawyer and early critic of DNA evidence, commented
In the first two dozen cases where DNA evidence was introduced, the
opposing attorney did not even challenge the evidence ... they felt
adverse experts were even retained by the counsel. Everyone just sort
17 It is interesting to note that contemporary private testing companies often use the term
“DNA fingerprinting” in advertisements for their services. This is an obvious yet inaccurate appeal to
the authority of fingerprinting.
19Gina Koiata, “Some Scientists Doubt the Value of'Genetic Fingerprint' Evidence,” New
York Times, January 29 1990, Al.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
116
Whereas the Andrews case set a precedent as the first conviction involving DNA
analysis, the 1989 trial of Joseph Castro was the first to seriously question the
February of 1987. Lifecodes Corporation was called in to perform DNA analysis for
the case. During a pre-trial hearing, lawyers Barry Scheck and Peter Neufeld and
population geneticist Eric Lander were among a team of lawyers and scientists that
judge allowed some, but not all, of the DNA evidence to be used. As the New York
Times reported:
the judge held that DNA tests could be used to show that blood found
on the suspect’s wristwatch was not his. But the judge said other DNA
The next case involving DNA analysis which would prove to have lasting
significance was the 1990 murder trial, United States v. Yee.23 In this case,
defendants Steven Wayne Yee, Mark S. Verdi and John Ray Bonds were accused of
murdering David Hartlaub. The case would prove highly influential because of the
way in which the DNA evidence was handled. The judge in the case, James E. Carr,
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
117
gathered thirteen experts on DNA for a six-week hearing. The experts covered a
variety o f dements of DNA testing from procedural details to the use of population
samples in the analysis.24 Carr’s ruling after the six-week hearing was highly
debated. The thirteen experts returned with views that were, in many cases,
diametrically opposed. Despite this, Carr ruled that no unanimity or consensus was
Carr’s ruling in the Ohio case was provocative, as it seemed to contradict the only
existing precedent for scientific evidence in the courtroom. This vague precedent
came from the 1923 trial of James Frye.25 The resultant Frye principle stated that to
have gained general acceptance in the particular field in which it belongs.” Carr’s
ruling in the Ohio trial directly refuted the Frye principle since he did not call for
I stress that the immediate acceptance of DNA analysis as evidence in court can be
unified evidentiary statement. Recall that DNA analysis originally developed within
24 Katherine Bishop, “A Victory for Genetic Fingerprinting,” New York Times, November 16
1990, B6.
26 The Frye principle is not the only method to determine the validity of a scientific technique,
although it was the most widely used during early uses of DNA analysis. The Federal Rules of
Evidence also offer a “helpfulness” model. The 1993 case, Daubert v. Merreil Dow Pharmaceuticals
Inc., offered a model parallel to that of the “helpfulness” model. For a discussion of these see: DNA
Technology in Forensic Science; Jasanoff, "The Eye of Everyman;” Lynch “Contested Identities.”
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
118
research laboratories and for use in paternity testing. Within these practices, DNA
analysis avoids many of the problems that plague its use in. criminal identification. In
non-forensic uses samples are abundant and contamination-free and tests do not rely
match or exclusion based on readily available samples of all parties involved. The
environment.
When DNA analysis made the transition from the laboratory to the courtroom it
entered the latter as a coherent visual statement. Before the method was being used in
criminal trials its language was being created and revised within the controlled setting
of corporate laboratories. By the time it reached criminal trials, the product o f this
identification. Once its cycle o f usage began it had a head-start on oppositional views
which first had to decode the language and then reformulate it to express the opposing
view. Thus, as Peter Neufeld explained, defense attorneys In the early court cases
When DNA evidence was eventually questioned, as in the Castro and Yee trials,
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
119
processes behind its construction. The image was shown to be the product of
complex and diverse scientific practices and its interpretation was bound to the
equally complex subject of population genetics. Once its unity was disrupted,
lawyers and scientists were able to question the autoradiograph based on the elements
of its construction. This is apparent in the pre-trial hearings in Castro and Yee where
experts challenged the procedures used in performing DNA analysis and the use of
identification and its eventual contestation in the Castro and Yee trials points to the
which were performed within the specific confines of criminal justice institutions,
DNA analysis was performed by numerous and different companies and laboratories,
each with its specific procedures of analysis. With independent labs such as Ceilmark
and Lifecodes producing the tests there was no way to assure consistency in the
method. In a 1988 New York Times article, Congressman Don Edwards (D, CA)
testifying all over the place, because the procedures, the protocols, the standards have
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
120
not been established yet,”28 Eric Lander, a central early critic of the technique (and
also a critic of Lifecodes’ analysis during the Castro trial), noted the very serious
nature of DNA analysis. The rapidity o f the introduction of DNA evidence to the
legal system forced the issue of standardization into the foreground. The American
by the FBI to bring together local and FBI forensic laboratories and provided a
DNA analysis. Whereas the American Society o f Crime Laboratory Directors offered
again under the direction o f the FBI, a group of thirty scientists from forensic
laboratories in the United States and Canada formed the Technical Working Group on
28 Harold M. Jr. Schmeck, “DNA Findings Disputed by Scientists,” New York Times,
February 7 1988, 1.
j0 DNA Technology in Forensic Science, 102. General information on the ASCLD, including
its history, can be found at the Society’s website, http://www.ascld.org.
31 Keith Inman and Norah Rodin, An Introduction to Forensic DNA Analysis (New York:
CRC Press, 1997), 139. See also the website of the American Board of Criminalistics at
http://criminalistics.eom/abc/A.php.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
121
DNA Analysis and Methods (TWGDAM).32 This group did not provide accreditation
discuss, monitor and examine various aspects of the technique including standards for
analysis. Finally, in direct response to the growing concern about DNA as evidence,
these groups sought to alleviate the contentious nature o f DNA analysis through the
creation and regulation of standards. Two of these initiatives, both developed by the
Board and the Technical Working Group on DNA Analysis and Methods, remain
The search for standards was also carried out through detailed governmental
reports. The first o f these was the 1990 Office o f Technology Assessment’s Genetic
Witness: Forensic Uses o f DNA Tests.33 The report was a response to the quick
movement o f DNA into the courtroom and to the contentious ruling in the Castro
DNA is tested, how it is used in court, and the potential use and misuse of genetic
information by external parties. Early in the report a portion of highlighted text calls
33 Genetic Witness: Forensic Uses o f DNA Tests (Washington, D.C.: United States Congress,
Office of Technology Assessment, 1990).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
122
testing is the most controversial and unsettled issue. Standards are necessary if high-
quality DNA forensic analysis is to be ensured, and the situation demands immediate
attention.”34 The 1990 report does not offer any specific conclusions on DNA
analysis. Instead it suggests, as in the passage above, that with the accelerated use of
The second major report came in 1992 with the National Research Council’s DNA
Technology in Forensic Science?5 Unlike its 1990 predecessor, this report set out to
DNA Technology in Forensic Science, Victor A. McKusick, noted that the report
issued out o f the increasing concern about the use of DNA evidence in court.
guidelines and safeguards for the most effective and socially beneficial
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
123
Again, as in the 1990 report, the National Research Council’s analysis attempted to
take into consideration the wide array of issues at work in DNA analysis. The report
the development of standards, DNA databases, and the social implications of these
recommendations. But once again the development of standards for DNA analysis
took precedence.
The committee suggested that due to the powerful nature of the technique
quality results.”37 The committee then detailed ways in which such standards could
best be achieved. Among the recommendations was a call for quality assurance and
quality control programs within individual laboratories. It was also suggested that
report also called for the development o f a professional organization to monitor these
activities. And finally, the report recommended that the federal government enact a
committee to oversee these processes and to ensure that the highest standards would
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
124
The search for standards in DNA analysis through the reports, committees and
groups detailed above is similar to law enforcement's search a century earlier for
standards in Bertillonage and fingerprinting. The result sought after in each case was
the same: standardized procedures for the creation of evidence would transform its
been produced according to accepted standards would guarantee its authority and
render the image’s unique and fragmented context of production invisible. The
Bertillonage, fingerprinting and DNA analysis took place through the control o f
inscriptions.
evidence was a central concern behind the drafting o f the DNA Identification Act in
1993.39 Congressman Don Edwards sponsored the DNA Identification Act to provide
Recall that Edwards earlier warned of the dangers in having several independent
companies performing DNA tests. Edwards’s concern was that these private
companies would each perform the technique in an individual way and that this
would result in a lack o f consistency. As sponsor o f the 1993 Act, Edwards promoted
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
125
DNA analysis.
The DNA Identification Act covers five areas: funding to improve availability of
DNA analysis for criminal investigation; quality assurance and proficiency testing;
the development of an index for the exchange of genetic information; external testing
for the FBI laboratory; and the authorization o f funds. The Act includes a statement
The Act authorizes federal funding for State and local governments to
outside the forensic field; and authorizes the FBI to establish a national
does not set standards for the admission o f DNA evidence in court;
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
126
a case-by-case basis.40
From this statement it is clear that the DNA Identification Act was drafted as a
conscious appeal to the concerns and recommendations set out in the 1992 National
the Office of Technology Assessment in its 1990 report. Moreover, in its deferment
to the courts, the document even refers back to the Frye principle. The 1993 Act
The Act did not go uncontested. A chief concern of critics was the control of
standards. Under subsection three o f the Act it is stated: “Not later than 180 days
after the date o f the enactment of this Act, the Director o f the Federal Bureau of
Following this:
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
127
Under these provisions the development, implementation and control of standards for
performing DNA analysis in law enforcement practices would remain under the
Responding to the FBI’s authoritative role, Barry Scheck and Peter Neufeld (from
the Castro trial and later part of the O J. Simpson defense team) argued that the FBI
depends on a certain success rate and therefore allowing this agency to establish DNA
standards would be problematic.43 In their view, the FBI would be able to define
privacy and proficiency criteria and could manipulate these criteria to serve their own
needs.44 John Hicks, then Assistant Director o f the FBI, responded by calling Scheck
and Neufeld’s suggestion ludicrous. “Where you have the technological competence
and mission,” Hicks defended, “that’s where you want to place your confidence.”45
Don Edwards, the sponsor o f the Act, took a similar stand. While Edwards
acknowledged that there were still problems with identification by DNA analysis he
ultimately insisted: “We’ve got to get it started, and the FBI is all set up to move
ahead quickly.”46
^ Scheck and Neufeld have been among the most vocal critics of DNA analysis throughout its
development. In 1992 the two formed the Innocence Project in the Benjamin N. Cardozo School of
Law. The project uses postconviction DNA evidence to prove the innocence of individuals wrongly
imprisoned. It is a non-profit “clinic” meaning that students work on cases under the supervision o f
lawyers. As o f November 27,2002 the program has exonerated one hundred and sixteen individuals.
Information is available from the program’s website, http://www.innocenceproject.org.
44 Naftali Bendavid, “Bill Would Expand Use of DNA Testing,” Legal Times, June 7 1993.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
128
Despite continued debate, the DNA Identification Act of 1993 was adopted into
the Violent Crime Control and Law Enforcement Act on September 1 3 , 1994.47 The
specific DNA Identification Act appears under Title XXI (State and Local Law
enactment, Eric Lander and Brace Budowle proclaimed that “the DNA fingerprinting
wars are over.”48 This triumphant remark appeared in a 1994 issue of Nature. The
technique and Budowle was Director o f the FBI’s DNA typing laboratory, gave
particular and peculiar weight to their statement.49 In this article, Lander and
national committee on DNA analysis had been met with the enactment o f the 1993
Act. For the authors this meant that the debate surrounding DNA analysis had been
Most of all, the public needs to understand that the DNA fingerprinting
the accuracy o f forensic DNA typing results, provided that the testing
laboratory and the specific tests are on par with currently practiced
47 Violent Crime Control and Law Enforcement Act o f 1994 (Washington, D.C.: United
States Senate and House of Representatives, 1994).
48 Eric S. Lander and Bruce Budowle, “DNA Fingerprinting Dispute Laid to Rest,” Nature
371, no. October 27 (1994): 735-738: 735.
49 Saul Halfon provides an interesting and concise account of Erie Lander’s unique position
within the DNA wars. See: “Collecting, Testing and Convincing: Forensic DNA Experts in the
Courts,” Social Studies o f Science 28, no. 5-6 (1998). Michael Lynch and Sheila Jasanoff note that the
article by Lander and Budowle was also criticized as being an attempt to pre-empt attacks on DNA
evidence in the upcoming O.J. Simpson trial. See: “Contested Identities.”
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
129
The “DNA wars” of the late 1980s and early 1990s were essential in developing,
questioning and testing DNA analysis for criminal identification. Lander and
Budowles’ remark that the activity of the “DNA wars” served its “salutary purpose”
belittles the importance of critical debate and discussion in practices as far reaching
as DNA analysis. The various government reports, scientific and popular articles and
legal battles o f this period were essential in providing much needed critical
and freedoms and one that problematized the intersections o f science, law
alleviate the controversy surrounding DNA analysis within this context took place
The formalization of standards for DNA analysis under the DNA Identification
Act did much to allay the concerns, highlighted by Congressman Edwards, regarding
inconsistent analyses. However, standardized procedures did not wholly resolve the
in the journal Nature that “the DNA fingerprinting wars are over,” the following two
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
130
volumes of the journal included articles suggesting the wars were very much still on.
reliability, the calculation of probabilities and the ability of jurors to make logical
probabilities, was the subject of another response to Lander and Budowle appearing
The debate did not end there. Five more responses appeared in the January 12 edition
o f the journal. The concerns associated with the calculation o f probabilities and with
the use of population samples were extensive enough to warrant a second National
standards allowed defense attorneys to map the actual performance of the technique
51 “Correspondence: Forensic DNA Typing Dispute,” Nature 371, December 1 1994: 398-
399.
52 The Evaluation o f Forensic DNA Evidence. Also see: Donald A. Berry, “Statistical Issues
in DNA Identification,” in Billings, DNA on Trial, 91-108.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
131
Although standardization did not wholly resolve the conflict surrounding DNA
analysis, I stress that it had two significant and far-reaching effects. First, I argue that
the enactment of the DNA Identification Act in1994 and the standardization of
procedures under the control of the FBI had the effect of streamlining DNA analysis
immutable and mobile autoradiograph. In a 1992 essay on the potential uses and
The comments of John Hicks and Don Edwards cited earlier in this section illustrate
the extent to which DNA analysis was sped into application. I argue that
standardization sped DNA analysis into application and brought a premature end to
enforcement by the FBI. As Latour notes, dominance over inscriptions “Is not a
given but a slow construction.”55 I stress that while standardization was an essential
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
132
worked in concert with existing FBI initiatives toward this goal. To understand the
that position it is necessary to address these initiatives and their intersections with the
standards for DNA analysis, the DNA Identification Act effectively delineated a
workable boundary for the FBI within the larger field o f DNA analysis and provided
The DNA Identification Act defines its purpose as being concerned with the
promotion of “DNA technology for law enforcement purposes.” I stress that the
boundary within the larger, competitive and profit-driven field o f DNA analysis. In
biotechnology companies derive substantial profits from paternity testing and are
attracted to criminal cases because of the visibility and credibility they provide.56
Cellmark Diagnostics’ (now OrcMd Cellmark) 2002 fees range from $600.00 to
56Arthur Daemmrich, “The Evidence Does Not Speak for Itself: Expert Witnesses and the
Organization ofDNA-Typing Companies,” Social Studies o f Science 28, no. 5-6 (1998): 741-772. For
a discussion from the point of view of biotechnology companies see: P.G. Debenham, “DNA
Fingerprinting; a Biotechnology Business,” in DNA Fingerprinting: Approaches and Applications, ed.
Terry Burke, et a!. (Basel, Switzerland: Birkauser Verlag, 1991), 342-348. Debenham was an
employee for Cellmark Diagnostics at the time of writing.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
133
$1500.00 (USD) per sample for DNA analysis and $2000.00 (USD) plus expenses per
day for expert witness testimony.37 With the substantial remuneration of DNA
analysis, individual and corporate reputations and careers can be shaped through
participation in civil and criminal cases. Private laboratories, therefore, have a vested
interest in both the production and the interpretation of their product. Toward this
end, Daemmrich notes that these corporations control all aspects of the creation and
and jury.58
DNA-typing companies create a monopoly over their specific product. This allows
them to monitor and guarantee every aspect of its production and interpretation. This
is essential in the for-profit business o f DNA analysis because the product, the
autoradiograph, represents not only the results of the analysis but the credibility of the
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
134
During the mid-1980s DNA analysis was the domain of private biotechnology
companies such as Cellmark. These companies competed for dominance over the
technique: the company that produced the test inscriptions and immutable mobiles, in
this case the best autoradiographs, procured higher profits and greater visibility
through participation in high profile cases. Therefore, when the FBI opened its
establishing themselves within civil and criminal cases, and that had developed highly
specialized and controlled procedures for producing their product, the autoradiograph.
The DNA Identification Act was essential in delimiting a specific field of DMA
analysis within which the FBI could effectively compete and, ultimately, control.
standards for DNA analysis in law enforcement it did not prevent private
biotechnology companies from performing the technique. These companies are able
to perform analysis in forensic cases provided they adhere to the FBI’s standards.
Preventing private companies from performing forensic work would have appeared as
an overt attempt to control the technique and would have caused wide-spread concern
among scientific, academic and professional communities. However, I stress that the
resource for the FBI. DNA analysis is a time consuming and expensive process. The
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
135
faster than that of its analysis producing large backlogs of samples. Law enforcement
agencies often rely on biotechnology corporations, which have the most up-to-date
equipment and numerous staff, to analyze these backlogs of DMA samples. Orchid
Cellmark lists law enforcement agencies in South Dakota, Oregon, Wyoming, New
York and Nevada as former “clients” and notes that they are “currently under contract
to perform the STR [short tandem repeat] analysis of thousands of backlogged sexual
assault kits from the New York City Police Department, the Illinois State Police, and
the Phoenix. Police Departments.”59 Similarly, Genelex advertises that they have
“completed DNA profiles under contract on more than 25,000 individuals that are
currently in law enforcement databanks, including the FBI’s National DNA Index
System.”60
also serves to further mobilize the FBI’s standards o f analysis by disseminating them
throughout the private DNA-typing companies. At the very least this dissemination
analysis in law enforcement. However, it also threatens to influence and interact with
other applications, such as paternity testing and medical and genetic research. This
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
136
issue and others associated with the databanking of DNA profiles will be addressed at
important within law enforcement agencies. As was the case with fingerprinting at
the turn of the nineteenth and twentieth centuries, the potential of DNA analysis as a
law enforcement agencies throughout the country.61 I argue that, by legalizing and
funding the establishment o f a federal level DNA database, called the National DNA
Index, the DNA Identification Act disseminated the FBI’s standards of analysis
throughout local and state law enforcement agencies, strengthening their control over
the technique.
The National DNA Index has its roots in the establishment of the Combined DNA
Index System (CODIS). This was a program initiated by the FBI in 1990 to collect,
store and exchange genetic identification data between law enforcement agencies.
from the inception o f DNA identification. Concerns were raised that this information
could be accessed and shared between law enforcement, health, insurance and other
agencies and used to discriminate against individuals. Critics also expressed concern
that a large genetic index developed for use in criminal identification would
eventually expand to other uses, posing threats to personal privacy. I have omitted
61 On the development of DNA databanks in law enforcement see: Jean E. McEwen and
Phillip R. Reilly, “A Review o f State Legislation on DNA Forensic Data Banking,”American Journal
o f Human Genetics 54 (1994): 941-958; Jean E, McEwen, “Forensic DNA Data Banking by State
Crime Laboratories,” American Journal o f Human Genetics 56 (1995): 1487-1492.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
137
the discussion here to focus on the attempts to universalize procedures and because
the issue is addressed in Chapter Five. Nonetheless to fully understand the slow
construction of dominance over DNA analysis and the ramifications of that position it
In order for a program such as the Combined DNA Index System to be effective
its data, DNA profiles, have to be standardized. The notion of different organizations
Laboratory Directors and the Technical Working Group on DNA Analysis and
Methods were essential pretexts for CODIS. The enactment of the DNA
establishing the National DNA Index. Importantly the DNA Identification Act also
provided the FBI with $40,000,000 over five years to implement the National Index
and CODIS. A significant portion of the money was to be used for establishing DNA
analysis facilities and databases at the local and state level. This substantial financial
allotment gave the FBI the leverage necessary to strengthen their position within the
field o f DNA analysis. In contrast to the high fees of private laboratories, the FBI
will perform DNA analysis free o f charge.62 Crucially, in order to access the FBI’s
services, law enforcement agencies must accept FBI standards for DNA analysis.
62 Private companies can perform analyses faster that the FBI, which remains plagued by a
backlog o f DNA evidence to analyze. This has caused some agencies to opt for paying for analysis.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
138
Local and state agencies that agree to this requirement receive CODIS software,
training for the program and continued support from the FBI at no cost. The benefits
include access to the national database and the backing and credibility of the FBI
The implementation of a program such as CODIS and its National Index serves to
disseminate FBI procedures for performing DNA analysis and thus to further
strengthen their position of dominance over the technique. This process was
expedited through the reallocation of funds outlined In the DNA Identification Act.
In the original 1994 Act the $40,000,000 allotted to the FBI was to be distributed
Improvement Act o f 1995,” redistributed the funds into the Increments o f 1 , 15,14,6,
and 4 million dollars.63 The amendment explains that the FBI and the American
because of the significant start-up costs to States in creating DNA testing programs
and databases.” I argue that the redistribution of funds also functioned to expedite
control over DNA analysis. By amassing the support of state and local laboratories
through the implementation of CODIS, the FBI hastened its control over inscriptions.
The redistribution o f funds In 1995 enabled state and local laboratories to implement
63“DNA Identification Grants Improvement Act o f 1995,” (Washington, D.C.: United States
House of Representatives, 1995).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
139
CODIS quickly, further strengthening the FBI’s dominant position and limiting
opposition.
Participation in CODIS by law enforcement agencies also gives the FBI access to
database of genetic information. The aggregates of genetic data are subject to the
described in Chapter Three and suggest distinct possibilities for misuse. Databases of
and sexual orientation. Genetic data could be used to track and identify criminal
behaviour patterns, or to research a biological basis for crime. The potential misuse
forensic DNA analysis practices facilitated through CODIS. DNA databases are
derived from non-forensic Investigation such as that o f the Human Genome Project
Discussing the central role of the FBI in DNA analysis Simon Cole writes, “as it
did with fingerprinting, the FBI is positioning Itself less as the keeper of a national
64Jean E. McEwen, “DNA Data Banks,” in Genetic Secrets: Protecting Privacy and
Confidentiality in the Genetic Era, ed. Mark A. Rothstein (New Haven: Yale University Press, 1997),
231-251:231.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
140
coordinator and facilitator that affords the FBI control over DNA analysis and
heightened power within law enforcement. In conjunction with the National Index,
across the country7. This not only strengthens their position of dominance within
DNA analysis but also gives them access to large and diverse repositories o f genetic
Conclusion
When DNA analysis entered the courtroom for use in criminal identification it did
being questioned by lawyers, judges and juries who were forced to rely on the
genetic fingerprint. It was taken to testify to the absolute identity of the criminal. As
it was developed within the controlled environment of the research laboratory, the
seamlessly and immutably between laboratory and courtroom. Beginning with the
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
141
Castro trial defense attorneys and scientists started to pose questions regarding the
deconstructed and challenged based on two of its constituent features: its specific
probability. What entered the courtroom as an immutable mobile was made mutable.
The DNA wars which were waged through professional and public spaces and
contexts including journals,, government reports, newspaper articles, books, and the
the two central problems facing DNA analysis: its production and the use of
population samples. However, they also pointed to the larger social ramifications of
DNA analysis such as its potential impact on personal privacy and individual rights.
In its attempt to address the contentious issues of the DNA wars, the DNA
cases of criminal identification. This was seen as a positive step in alleviating the
In this chapter I have argued that the FBI gained a position of dominance over
DNA analysis in law enforcement practices and that the DNA Identification Act
concretized this position. The essential precondition for the Bureau’s dominance was
However, standardization alone was not enough to cede control over the technique to
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
142
the FBI. The DNA Identification Act delimited the authority of the FBI over DNA
analysis to Its specific use In law enforcement practices. This enabled the FBI to
differentiate its practices from those of highly funded biotechnology corporations that
were already established in the competitive market of DNA analysis. Further, the
DNA Identification Act legalized the construction of a National DNA Index, and
provided the FBI with $40,000,000 funding to expand their Combined DNA Index
System. This had the effect of disseminating the FBFs procedures for performing
DNA analysis throughout local and state law enforcement laboratories. The
standardization of DNA analysis, the specific delimiting of the FBFs authority over
the technique in law enforcement, and the allotment of funds for the dissemination of
CODIS were the essential components of the FBFs construction of dominance over
the technique.
The potential consequences of the FBFs dominant position within DNA analysis
and programs such as the Combined DNA Index System and the National DNA Index
are far from being mere theoretical concerns. In a 1992 essay, Jeroo S. Kotval, a
member of the New York State legislative commission on Science and Technology
described that state’s confrontation with the FB I.66 During the “DNA wars” New
York State legislature sought to alleviate concerns by requiring that all tests used in
state cases be accredited by the State’s Department of Health, a notion that would
have only strengthened the credibility of the evidence. The FBI opposed this
66Jeroo S. Kotval, “Public Policy for Forensic DNA Analysis: The Model of New York
State,” in Billings, DNA on Trial.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
143
proposition, specifically rejecting the notion that their own tests would have to
notes that in their opposition, the FBI presented the State a clear choice:
If the state were to require the FBI test to be validated and licensed by
state authorities before introduction into New York State cases, the
FBI would refuse both to do the test for New York State and to allow
Kotval’s essay highlights the rhetorical nature of the “choice” facing states as well
as the ramifications of their decision. Success stories of CODIS linking crimes and
severity of cases for which DNA analysis is used (sexual and violent offenses) would
assure significant public pressure for states to participate in the program. When
CODIS began as a pilot project in 1990 there were fourteen participating local and
state laboratories. Currently, over one hundred and thirty laboratories throughout
forty-four states, the FBI, the Army and Puerto Rico participate in the program.68
These laboratories and those of private companies such as Orchid Cellmark and
Geneiex that perform analyses for law enforcement agencies are continually
67Kotval,“PublicPolicy,” 111.
69 Both Orchid Cellmark and Geneiex advertise their accreditation with the FBI’s ASCLD-
LAB and their ability to perform analyses consistent with FBI and Combined DNA Index System
standards.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
144
Rather than just alleviating the problem of procedural inequalities, the continued
of authority, extends their power and reach and severely limits potential opposition.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
145
CHAPTER FIVE
POTENTIAL CRIMINALITY
produced a new mode of law enforcement defined by a new role of the camera. The
ability to Identify criminals and track crimes independent of the physical presence of
depended on the camera’s ability to capture crime scene data. This transformation in
incarcerated criminals this new archive housed latent identification data. Within this
new practice the camera collected aggregates of identification data on known and
law enforcement to collect, store and use latent identification data, this practice is
only now being realized with the advent of digital technologies. The ease of
collecting, storing and sharing images and information made possible through
scanners, computers and digital cameras at the close of the twentieth century has
greatly extended the reach, capabilities and power o f law enforcement. Images of
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
146
faces, fingerprints and DNA are now routinely collected and compiled into vast
The continued development of this digital arcMve gives rise to a space similar to that
described by Allan Sekula in Ms essay, “The Body and the Archive.” 1 Within this
space the scientific, social, technological and visual interact in the production of both
its nineteenth and twentieth century ancestors. My concern is not the larger, more
abstract inclusive archive described by Sekula but the specific territorialized arcMves
of law enforcement agencies in the United States.2 I argue that the limitations posed
by the physicality o f the nineteenth-century arcMve are largely absent in the new
data. The construction and use of the resultant databases are dictated and driven by
This chapter argues that practices of mass data collection and archiving in
agencies to bring increasing numbers of bodies into the archive. Once archived, the
1 Allan Sekula, “The Body and the Archive,” October 39 (1986): 3-64.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
147
faces, fingerprints and DNA of these bodies are identified and re-identified according
to the parameters and needs of the specific investigation. The body in the digital
centuries functioned as spaces for record keeping and for tracking, arresting and
incarcerating recidivists. True to Sekula’s description, it was the filing cabinet and
not the photograph that defined this archival mode. For Sekula the arcMve provided
guaranteed through “the metrical accuracy of the camera:” the camera translated the
disparate events of the live world into a system of comparable, static, two-
dimensional representations.4 Similarly, I argue that the digital arcMve provides for
grounded in the metrical accuracy of the camera the digital archive is grounded in
electronic, binary code. The disparate and diverse representations and inscriptions in
fingerprints and autoradiographs, are reduced to binary code and are made
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
148
records contained identification data in a compact and concise format that was highly
amenable to classification and exchange. Similarly, the latency of the fingerprint and
the mobility of the camera meant that police could collect identification data
independent of the physical presence of the body and independent of its knowledge.
By the opening decades of the twentieth century and equipped with cameras, law
identification data.
Despite this effort, the large fingerprint archives that developed throughout the
records still occupied distinct physical space and, more importantly, required
fingerprints, in practice this would render the arcMve unusable. As the arcMve grew,
increasingly improbable.
The move towards digital technology in law enforcement initiated in the late
1960s and early 1970s offered a solution to the physical limitations of the arcMve.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
149
searches performed by computer processors achieved results and speeds far greater
than anything possible manually. The result was significant Whereas the collection
and archiving of identification data in the nineteenth and twentieth centuries had to
account for the physical limitations associated with the classification, storage and
retrieval o f paper records, the digital archive exists largely free of these previous
constraints.
I do not want to suggest that the digital archive is absent of all labour or without its
own particular constraints. Information databases in law enforcement still require the
constant participation of law enforcement personnel. And the rate at which computer
technologies have developed has made the upgrade o f equipment and programs a
constant concern o f law enforcement agencies. However, I stress that the physical
limitations restricting the collection o f identification data during the nineteenth and
most of the twentieth century are disappearing with the continued development and
use o f digital technologies. This transformation in the capabilities for data collection
highlights a primary feature of the digital archive, and one that clearly distinguishes it
from its predecessors: inclusivity. Michael Smith, a member of the National Institute
inclusive a searchable identification database is, the more useful it is for the excluding
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
150
This is the paradox of the digital archive: whereas the utility of the paper archives
of the nineteenth and twentieth centuries waned in relation to their growth, the utility
of the digital arcMve increases with each addition to the database. A completely
individual rights and freedoms and privacy. These concerns notwithstanding, I stress
that the construction of the digital archive threatens to redefine criminality and the
body. Constant data collection and ubiquitous police surveillance, in the form o f an
criminal. Criminality exists in every record o f the digital archive and in every body
identifiable.
law enforcement to collect and use masses of identification data, the adoption of
digital technologies a century later has made it a reality. The filing cabinet has been
replaced by the computer, making the M l extent o f the archive available to law
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
151
Information. Center 2000 and the Combined D NA Index System. I use these
databases to argue that contemporary law enforcement practices reflect a trend toward
communication between law enforcement agencies in the United States. The program
originally housed data on wanted persons and on stolen vehicles, articles, guns and
license plates. A missing persons database was added in 1975 and an unidentified
persons database was added in 1982.6 Data is entered into the National Crime
standardized data fields and entry codes to promote the uniformity of the information
entered. Data fields include various forms of identifying information: license plate
variables such as height, weight, age and place of birth in the case of people.7 A
indicate the source of the data and to protect against unauthorized access. Entered
6 William D. Haglund, “The National Crime Information Center (NCIC) Missing and
Unidentified Persons System Revisited,” Journal o f Forensic Sciences 38, no. 2 (! 993): 365-378.
7 The Federation o f American Scientists offers a detailed description o f the various data fields
as well as a general overview o f the National Crime Information Center. Accessed May 21,2003,
available from, http://www.fas.org/Irp/agency/doj/fbi/is/ncic.htm.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
152
Agency, or CTA, and forwarded into the centralized database of the FBI, Law
enforcement agencies from local, state and federal levels share and access
Use of the National Crime Information Center is restricted to local, state, federal
and other law enforcement agencies, such as the Royal Canadian Mounted Police.
administered and monitored by the FBI.8 Searches proceed according to the fields
used for data entry. Searches cross-reference all databases so that a search for an
individual’s name will cross-reference the missing and wanted persons files as well as
other relevant databases.9 Potential matches are ranked through a scoring system
based on the number o f data fields matching the search parameters.10 For example,
an officer at a local agency In Florida can search the system using the name, height,
weight and age o f a suspect If the suspect was pulled over in relation to a traffic
violation, data on the vehicle such as its make, model, serial number and license plate
could also be entered. The system returns records matching the search parameters
enabling the officer in Florida to see if the person apprehended is wanted in relation
to other crimes throughout the country or if the vehicle has been reported lost ox
9Paul L. Woodward, “Criminal Justice "Hot" Files,” (Washington, D.C.: U.S. Department of
Justice, Bureau o f Justice Statistics, 1986), 19.
10 William D. Haglund, “The National Crime Information Center (NCIC) Missing and
Unidentified Persons System Revisited,” Journal o f Forensic Sciences 38, no. 2 (1993): 365-378.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
153
stolen. The officer can then use the agency identification code to contact the various
agencies responsible for entering the original data and can access the entirety of
During the 1990s the FBI received $183,000,000 in funding to upgrade and
expand the system. The new program, entitled National Crime Information Center
stolen articles, foreign fugitives, stolen guns, criminal history queries, stolen license
plates, deported felons, missing persons, criminal justice agency identifier, stolen
securities, stolen boats, gang and terrorist members, unidentified persons, U.S. Secret
Service Protective File, stolen vehicles, persons subject to protection orders, wanted
The upgrade o f the National Crime Information Center coincided with a larger
project o f the FBI to reevaluate and restructure their Identification Division. In 1989,
the FBI, in cooperation with the National Crime Information Center Advisory Policy
Identification Division was founded in 1924 to serve as a national site for the storage
establishment of the Division was the need to develop a national fingerprint archive,
11Federal Bureau of Investigation, “National Crime Information Center (NCIC) 2000,” (Press
Release, July 15,1999). Accessed May 21,2003, available from
http://www.fbi.gov/pressrel/pressrel99/ncic2000.htm.
12 Bruce J. Brotman and Rhonda K. Pavel, “Identification: A Move Toward the Future,” Law
Enforcement Bulletin, July (1991).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
154
thereby uniting the disparate fingerprint archives throughout the country. Similarly,
the 1989 study of the Identification Division was in response to the need to create
better storage and exchange of criminal justice information. The adoption of digital
technologies by law enforcement agencies across the United States gave rise to a
The result of the 1989 study was the complete reconfiguration and relocation of
Division in 1992, the new division constructed a new 500,000 square foot complex on
nine hundred and eighty-six acres of land in Clarksburg, West Virginia.13 The
Criminal Justice Information Services Division remains the largest unit of the FBI.
Center 2000, the Division also houses the National Incident-Based Report System and
The central feature o f the National Crime Information Center upgrade was the
collect, store and share digital images and information from a variety of locations. To
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
155
take ftill advantage of the system, participating agencies are encouraged to purchase a
computer, laser printer, document scanner, single finger print scanner and a digital
camera. Agencies are responsible for hardware costs but the FBI provides software
and support free of charge. Using the digital camera, scanner or single fingerprint
scanner officers can enter digital images of faces, fingerprints, signatures and up to
ten other identifying images per record (the program suggests scars, tattoos and other
bodily marks). These images can be entered directly from the field and can be
are exploring hand-held wireless devices such as Palm Pilots to link officers on foot
Searches of the National Crime Information Center 2000 proceed in the same
manner as its predecessor. However, with the advent of digital imaging technologies,
officers are no longer restricted to textual descriptors but can enter and access image
files from a variety o f remote locations. The officer in Florida submitting the
information described above can now submit and receive mugshots, fingerprints and
15Keith J. Cutri, “Laptop Computers: New Technology for Law Enforcement,” Law
Enforcement Bulletin, February / March (1996); Catherine Greenmail, “A Well-Equipped Patrol
Officer: Gun, Flashlight, Computer,” (New York Times, 1999, accessed January 10 2003), available
from http://www.nytimes.com/library/tech/99/01/circuits/articles/21howw.html; Catherine Greenman,
“Computers on Patrol Have Got Your Number,” (New York Times, 1999, accessed January 10 2003);
available from http://www.nytimes.eom/library/tech/99/01 /circuits/artides/2! howw-side.html;
Christine Moran, “Computers Making Job of Police Easier,” (The Intelligencer, accessed January 10
2003); available from http://www.pMllyburbs.eom/intelligenceiTecord/artidel.asp7F_miiiFl427054.
16“Bike Cops Get Info on Palm - Bellevue Police Test 30 New Palm Pilots,” (Eastside
Journal Online, 2000, accessed January 10 2003), available from http://www.easteidejoumal.com.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
156
other identifying images for comparison. Using the single fingerprint scanner, the
officer can scan the print of the individual in question for a search against the records
The National Crime Information Center processed 2,000,000 transactions over the
entirety of Its Inaugural year. By the middle of the 1980s the program processed 400,
000 transactions per day.17 Statistics for the year 2000 show that the updated system
processes 2,500,000 transactions per day.18 On March 15, 2002 the National Crime
Information Center 2000 set a new record with 3,295,587 transactions In a single
day.19 Although only officially launched in 1999 the National Crime Information
Center 2000 now links 80,000 criminal justice agencies throughout the United States,
the U.S. Virgin Islands, Puerto Rico and Canada.20 As an example o f the depth and
size o f this developing archive, the centralized fingerprint database currently houses
18Stephanie L. Hitt, “NCIC 2000,” Law Enforcement Bulletin 69, no. 7 (2000): 12 - 15.
19Federal Bureau of Investigation, “An NCIC Milestone,” (Press Release, March 23,2002).
Accessed March 5 2003, available from http://www.fei.gov/pressrel/pressrel02/acic032302.htm.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
157
’j |
images. Fingerprint searches that took four to six months in the 1980s take one to
Contemporaneous with the update of the National Crime Information Center and
the transformation of the Identification Division the FBI began a pilot program called
the Combined DNA Index System (CODIS). Like the National Crime Information
Center 2000, the purpose of the DNA Index System is to facilitate the exchange of
identification data between law enforcement agencies. The program unites Local
DNA Index Systems (LDIS) and State DNA Index Systems (SDIS) with the National
must meet guidelines for analysis established and monitored by the FBI.
Local agencies collect and forward genetic data through specified state agencies
and into the centralized National Index of the FBI laboratory. The specific
displacement of bands in the DNA profile is measured with the use of a computer and
comparable numeric codes. As with the National Crime Information Center 2000 a
match to the National DNA Index provides additional reference information including
21 Raymond Dussauit, “Cause and Effect,” (Government Technology, April 2000, accessed
January 9 2003), available from
http://www.govtech.net/publications/crimetech/AprOO/CTEfmgerprints.phtml.
22Michael D. Kirkpatrick, “Solving Cold Cases with Digital Fingerprints,” Sheriff'S3, no. 4
(2001): 14-17.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
158
“ [a] laboratory Identifier, sample identifier, the associated DNA profile, and details
Compared to the National Crime Information Center 2000, the Combined DNA
Index System is relatively small in size and limited in its capabilities. This is largely
due to the type o f data being stored and the infancy of DNA analysis. DNA contains
a wealth o f personal information far beyond that of other modes o f Identification, and
therefore presents increased dangers associated with the misuse of data. Because of
this DNA databases are not currently interfaced with other systems, as the Integrated
autoradiograph, is a time and labor intensive process. The initial technique for
(RFLP) analysis, took up to six weeks to produce a DNA profile. By the close of the
1990s a newer, faster method of analysis called Short Tandem Repeat (STR) analysis
had been developed, producing results within forty-eight hours.24 Although possible
in such a short time-frame, in actual practice most analyses take between four and
24Tod Newcombe, “Slow Spiral: State DNA Lag Databases,” {Government Technology, April
2000, accessed January 9 2003), available from
http://www.govtech.net/publications/crimetech/AprOO/CTENDA.phtoiI.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
159
five weeks,25 In a January 15,2003 Press Release, Orchid Cellmark announced Its
new “DNA Express Service” which promised DNA analysis results to law
which DNA samples can be collected, law enforcement agencies remain plagued by
backlogs of unanalyzed samples. Year 2000 estimates suggest there are roughly 1.5
million backlogged samples throughout agencies in the United States and that
In 1990, during the program’s trial phase, there were fourteen laboratories
participating in the Combined DNA Index System. In 1994, the DNA Identification
Act provided the FBI with $40,000,000 to expand its program.2® As discussed in
Chapter Four the majority o f this money was used to develop analysis facilities and
communications capabilities at the state and local level. Currently there are over one
hundred and thirty participating laboratories throughout the United States and Puerto
Rico. The FBI’s National Index houses over 1,200,000 DNA profiles from convicted
offenders and over 40,000 unidentified or latent profiles from crime scenes.
25Orchid Biosciences, “Orchid Cellmark Launches Rapid Forensic DNA Analysis Service,”
(Press Release, January 15, 2003). Accessed May 20,2003, available from
http://www.orchid.com/news/view_pr.asp?ID=280.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
160
with initiatives such as the National Crime Information Center 2000 and the
Combined DNA Index System are justified through rhetoric that describes these
Terminals, laptops and wireless devices such as Palm Pilots connect officers on foot,
bicycle and in patrol cars to each other and to the digital archive.29 Law enforcement
journals and government reports and press releases are filled with success stories in
these technologies. Such success stories are instrumental in securing fending for law
enforcement to continue to develop and implement these technologies and to clear the
stress that digital technologies have also greatly extended the reach and capabilities of
law enforcement agencies to collect and archive masses of identification data. “Live
scan” systems such as that illustrated in Figure 5.1 enable officers to capture and
archive electronic images of an individual’s fingerprints, palm prints and face. When
the suspect is not in custody and therefore the “live scan” system cannot be used,
Fingerprints can be entered directly into the digital archive from the field, or they can
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
161
be “lifted” and brought back to the police station to be scanned and archived using
additional equipment (Figure 5.2). With funding received from the National Institute
scanner.30 This device fits in the palm of the hand and allows the user to produce a
effort have met surprisingly little opposition. Legislation governing the permissible
collection and storage of identification data and the enforcement of that legislation is
The National Crime Information Center 2000 has received minimal critical
fingerprints, and serial numbers of stolen vehicles, boats and guns are accepted as
relatively banal identification data. Which is to say that there is little concern that this
information could be used for anything other than identification. Further, I would
argue that a common belief regarding the collection and storage of data in the
National Crime Information Center 2000 is that it is restricted to known criminals and
j0 Gunjan Sinha, “DNA Detectives,” Popular Science 255, no. 2 (1999): 48-52. More
information on the specific equipment can be found at Nanogen’s web-address, available at
http://www.nanogen.com, Accessed May 26,2003.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
162
Figure 5.1: NEC’s LS21™ Live Scan Workstation. Law enforcement agencies can
capture, archive, search and exchange fingerprints, palm prints and mugshots from
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
163
personnel to scan latent prints for examination and archive and exchange prints within
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
164
Of the limited work addressing the National Crime Information Center, two 1993
studies showed the system to have significant flaws.31 The studies tested the accuracy
of the system and found it to be compromised in two ways: data was entered
incorrectly and entire fields of data were often omitted. The reports concluded the
system was subject to misidentifications which could in tom lead to false arrests.
Indeed, a 1985 New York Times article reported that the National Crime Information
Center was producing an average of 12,000 false database matches per day.32
Not only has data been entered incorrectly and produced false identifications but it
has also been subject to misuse. In 1993 the United States General Accounting
National Crime Information Center.33 The report was a response to a 1991 incident in
which twenty individuals with access to the National Crime Information Center sold
criminal history information obtained from the system to third parties. The report
also found several instances where records had been altered or completely deleted.
The upgrade of the National Crime Information Center during the 1990s attempted
to take account of the problems and potential dangers associated with the system that
were identified through these studies and reports. The upgrade Included extensive
35 Gary L. Bell, “Testing the National Crime Information Center Missing I Unidentified
Persons Computer Comparison Routine,” Journal o f Forensic Sciences 38, no. 1 (1993): 13-22;
William D. Haglund, “The National Crime Information Center (NCIC) Missing and Unidentified
Persons System Revisited,”Journal o f Forensic Sciences 38, no. 2 (1993): 365-378.
32David Burnham, “FBI Says 12,000 Faulty Reports on Suspects are Issued Each Day,” New
York Times, August 25 1985.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
165
data-entry checks, including point-of-entry checks for errors and data validation
procedures to assure the uniformity of information and that all mandatory data fields
agencies now communicate over local Intranets or through Virtual Private Networks,
or VPNs. Continued tests of the National Crime Information Center, such as those of
1993, are needed to address procedural issues associated with the program. More
address the larger social and cultural issues associated with the archiving of personal
identification information.
signatures and other identification data (excluding DNA which will be addressed
presented during my work with the Metropolitan Toronto Police serves to illustrate
the point A crime occurs at a restaurant and officers are called to the scene. All
property within the venue is subject to investigation. Officers lift and or photograph
fingerprints from every drinking glass in the establishment. This results in hundreds
System database and linked to the crime through a reference number. The individual
committing the traffic violation in Florida, years after the fictional example, can be
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
166
illustrates the paradoxical nature of the digital archive. Digital technologies enable
law enforcement agencies to collect and store tremendous sums of identification data.
solely on its potential use. The dangers of this practice are two-fold. First, practices
of mass data collection transform the subject of law enforcement from the individual,
physical body to a larger, abstract social body creating a pervasive, ever-present mode
o f police surveillance. Second, identification data collected and stored in the digital
archive can be continually accessed and reinterpreted according to the changing needs
In contrast to the National Crime Information Center 2000, the Combined DNA
specifically, the construction of the National DNA Index has caused concern from a
variety o f legal, scientific and social perspectives. The concern radiates from the fact
that DNA contains a wealth of personal information far beyond what is necessary for
identification purposes. Work within sociology, cultural studies and the social study
35Three central texts (each is a collection o f essays) addressing the social and cultural issues
associated with DNA identification are: Carl F. Cranor, ed. Are Genes Us? The Social Consequences
o f the New Genetics (New Brunswick: Rutgers University Press, 1994); Ruth Hubbard and Elijah
Wald, Exploding the Gene Myth: How Genetic Information is Produced and Manipulated by
Scientists, Physicians, Employers, Insurance Companies, Educators, and Law Enforcers (Boston:
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
167
example, medical insurance companies and health care providers could set a different
fee schedule for persons exhibiting the BR.CA1 gene, which is linked to breast cancer.
Similarly, employers could access and use genetic information to discriminate against
individuals during the hiring process. In addition to these social and cultural
concerns, work from medicine, law and public policy has addressed the legal and
’y/r
this debate is the protection of privacy, confidentiality and Fourth Amendment rights
The DNA Identification Act addressed these concerns by placing tight restrictions
on the collection, storage and use of genetic information within law enforcement
practices. Proponents of the National DNA Index and the Combined DNA Index
System rightly note that, under the DNA Identification Act, only persons convicted of
certain sexual and violent crimes will have their DNA stored in the National Index.
Proponents also note that the database contains DNA profiles and not samples. As
Beacon Press, 1993); Daniel I. Kevles and Leroy E. Hood, The Code o f Codes: Scientific and Social
Issues in the Human Genome Project (Cambridge, Mass.: Harvard University Press, 1992).
•’s George I. Annas, “Privacy Rules for DNA Databanks: Protecting Coded ’Future Diaries’,”
Journal o f the American Medical Association 270, no. 19 (1993): 2346-2350; George J. Annas,
Leonard H. Glantz, and Patricia A. Roche, “Drafting the Genetic .Privacy Act: Science, Policy, and
Practical Considerations,” Journal o f Law, Medicine and Ethics 23 (1995): 360-366; Andrea De
Gorgey, “The Advent of DNA Databanks: Implications for Information Privacy,” American Journal o f
Law and Medicine 16, no. 3 (1990): 381-398.
37The Fourth Amendment reads: “The right of the people to be secure in their persons,
houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probably cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons and things to be seized.”
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
168
noted in Chapter Four, profiles represent specific non-coding fragments of DNA and
do not offer biological information about an individual. In this sense, it is argued, the
National DNA Index employs appropriate safeguards to protect against the misuse of
However, I stress that while the DNA Identification Act does safeguard practices
surrounding the inclusion o f DNA profiles into the National DNA Index it does not
regulate the collection and storage of DNA at the local and state level. Subsequently,
local and state agencies across the country routinely collect and store genetic data
from an increasingly diverse group o f offenses. Recall that DNA’s use in law
enforcement was developed to aid in the investigation of specific, serial sexual and
violent crimes. Initial laws governing the collection o f DNA restricted it to those
databanking law, restricting the collection o f DNA to adult registered sex offenders.
However, by 1994 its law was among the broadest in the nation. The California law
was expanded to allow the collection o f DNA from various non-sex related crimes
In a 1994 study o f state legislation governing DNA collection and databanking, Jean
j8 Jean E. McEwen and Phillip R. Reilly, “A Review o f State Legislation on DNA Forensic
Data Banking,” American Journal o f Human Genetics 54 (1994): 941-958; 945.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
169
McEwen and Philip R. Reilly found tremendous discrepancy between state laws and a
continued trend in broadening laws to be more inclusive.j9 The authors found that
several states allowed for the collection of genetic material from an incredibly diverse
set of offences. These include “lewd and lascivious conduct,” “indecent exposure,”
near public toilets,” and “possession o f child pornography.” At least one state
allowed for samples to be taken from persons arrested but not convicted.40 A
subsequent study in 2000 by Rebecca Sasser Peterson supports McEwen and Reilly’s
findings 41 Peterson notes that Alabama, New Mexico, Virginia and Wyoming
require DNA samples from anyone convicted of a felony; Louisiana requires samples
from all individuals arrested on sex offenses, whether convicted or not; and Arizona,
Kansas and Oregon require samples from juveniles arrested in relation to sex
crimes.42 This last case is particularly alarming as the data is collected and stored for
law enforcement agencies, nor is it with the misuse of that information by external,
third parties, although these remain very significant issues. Instead, my concern rests
with the practice of data collection. The continued collection o f data in the digital
41 Rebecca Sasser Peterson, “DNA Databases: When Fear Goes Too Far,” American Criminal
Law Review 37 (2000): 1219-1238. See also: D.H. Kaye, “Bioethical Objections to DNA Databases
for Law Enforcement: Questions and Answers,” Selon Hall Law Review 31, no. 4 (2001): 936-948.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
170
archive, based on its potential use in future law enforcement practices constructs the
body as a site of potential criminality, the specific notion of crime being determined
by those controlling the production and use of the archive. In Chapters Three and
body at a specific time and location. Once archived these inscriptions remain
and locations. The individual body’s identity as normal or deviant changes with the
DNA analysis was introduced to law enforcement for the express purpose of
assisting in the investigation o f serial sexual and violent crimes. It was useful in these
cases because traditional forms of evidence such as the eye-witness were absent and
biological materials were often all that remained. Because DNA contains a wealth of
personal information beyond that necessary for the identification process, initial laws
placed tight restrictions on its collection and use. However, these laws quickly
data collection in the National Crime Information Center 2000, this attests to a
and its use. Under expanding laws, DNA is collected at a rate far beyond that which
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
171
it can be analyzed and used. What then are the purpose and rationale behind this data
numbers of bodies into the archive, making it more inclusive. More bodies in the
archive means more database hits, more crimes solved, more success stories and
continued funding. However, I stress that the accumulation of DNA samples and
other identification data in this effort betrays the rationale for using these
use for police. Serial flashers are not apprehended through a DNA database search.
true that the National DNA Index stores only profiles and not samples, local and state
databases routinely store both the profile and the sample from which it was derived.43
Profiles entered into local, state and federal databases are assigned a reference
number based on the agency responsible for entering the data and the specific case.
These reference numbers can be used to access the sample from which the profile was
produced. The potential danger in this practice is that the information will be
accessed and used based on changing definitions of crime and criminality. Genetic
research on behaviour, sexuality, race, gender or any other variable can be used to
establish new criteria for searching and using the information in the digital archive.
43 One o f the most common reasons given for storing samples is that they may need to be used
during a criminal investigation, such as to produce farther autoradiographs or to re-test the DNA in the
face of evidentiary dispute.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
172
suggested a link between a specific gene (the D4 Dopamine receptor gene) and the
behavioral trait of novelty seeking.44 Law enforcement agencies can use this
information to search the archive for individuals having this specific gene. The
individual brought into the archive on a charge of indecent exposure could be re
arrested and incarcerated based on Ms now presumed genetic predisposition for risky
behavior. The search for genetic links for human traits and behavior such as that of
the Dopamine receptor and the search for the “homosexual” gene presupposes a
simplistic cause and effect link between gene and trait.45 Such an approach
erroneously treats the gene as what Evelyn Fox Keller describes as a “master
molecule” and ignores the complex relationships between genes in producing human
Just as the laws governing DNA collection are expanding so too can the laws
governing its use. The DNA Identification Act permits the collection and use of
DNA for “law enforcement purposes.” As Barry Scheck warns, tMs term is
“disturbingly broad,” and could permit the use o f genetic information and exchange
45Two research articles that propose a genetic link for male homosexuality are: Stella Hu et
a!., “Linkage Between Sexual Orientation and Chromosome Xq28 in Males but not in Females,”
Nature Genetics 11, November (1995): 248-256; Dean H. Hamer et ai, “A Linkage Between DNA
Markers on the X Chromosome and Male Sexual Orientation,” Science 261, July 16 (1993): 321-327.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
173
agencies.47 In the same way that research on the D4 Dopamine receptor gene can
lead to a new notion of criminality and yield new parameters for searching the
through the social programs and apparatuses described by Scheck. Children carrying
the gene could be identified as pre-criminal, placing them under constant surveillance
carrying the gene and trying to enter the country could be denied access, and those
Conclusion
To further exemplify the problematic nature o f the digital archive and to conclude
I want to discuss briefly the current effort to collect and use identification data under
the rubric o f a “war on terror.” Within this war United States Attorney General John
fingerprints and faces o f visitors to the United States who originate from countries
and other ports of entry use “live scan” systems such as that depicted in Figure 5.1 to
collect this identification data. The Registration System has already produced “hits”
47 Barry Scheck, “DNA Data Banking: A Cautionary Tale,” American Journal of Human
Genetics 54, no. 6 (1994): 931-933; 932.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
174
Information Center 2O0O,48 Individuals identified through these hits are acted upon
commit criminal acts, in this case defined as terrorist acts, and It carries severe and
threat that is brought into the archive in relation to a petty crime in 1990 can be re
made based solely on the individual’s place of birth. Similarly, a visitor to the United
States brought into the archive in 2003 under the Registration System can be re-
crime and criminality. In each case, the individual’s presence in the digital archive as
an image o f his face, fingerprint or DNA remains immutable but his identity, rights
and freedoms as an innocent citizen, petty thief, terrorist, national threat or otherwise
nature o f the digital archive. Practices of mass data collection such as that of the
Registration System and their cooperation with programs such as the National Crime
Information Center 2000 and the Combined DNA Index System are made possible
through digital technologies. Discourses driven by notions of fear and national threat
mobilize these technologies and legalize practices o f data collection that are overtly
48 Statistics show the System produces an average o f 67 hits a week and, in a preliminary test
between January and May, 2002, led to the apprehension o f 1400 people. See: National Security
Entry-Exit Registration System (United States Department of Justice, 2002, accessed January 13 2003),
available from http://www.usdoj.gov/ag/speeches/2002/natlsecentryexittrackingsys.htm.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
175
discriminatory and that are degrading and humiliating to those subjected to collection,
The significant and far-reaching social ramifications of these practices are ignored in
It is expected that, by the year 2005, Ashcroft’s Registration System will record
the events of September 11,2001 and to a terrorist threat promoted as invisible and
ever-present I question the purpose and rationale for collecting and storing
identification data on such a vast scale. Long after the “war on terror” has come to
completion, the Registration System will continue to collect data for its archive.
What is the purpose of this process of collection? Does the collection o f data fulfill a
clear need o f law enforcement or is it motivated by paranoia and fear? What are the
social, political and cultural consequences of practices o f data collection that are
expansion of the digital archive demand a reinvestigation of the rationale and ethical
issues associated with the collection, storage and use of identification data. Digital
technologies do not merely expand the breadth of the archive and increase the speed
49 Eric Schmitt, “Ashcroft Proposes Rules for Foreign Visitors,” (New York Times, 2002,
accessed June 10 2002), available from http://www.nytimes.com/2002/06/06/politics/06VlSA.html.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
176
the image captured the criminal, representing Ms identity within its frame. Within the
new digital space the image captures the body independent of identity. The body in
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
177
CONCLUSION
coincided with the growth of social institutions that sought ways of recording and
documenting the body. The camera was quickly employed by these institutions,
resulting in the development o f vast photographic archives. John Tagg, Allan Sekula,
David Green, Suren Lalvani and other photographic historians have examined the
specific use of the camera in the documentation of the criminal body.1 I argue that, in
its strict treatment o f the photograph as representation, this work fails to address the
concrete practices involved in the production and use o f photographs within law
representation, the dissertation drew from work in the field of science and technology
studies. I argue that the notion of inscription and the concept of the immutable
mobile, as outlined by Bruno Latour and Steve Woolgar, are particularly effective in
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
178
I stress that the history of criminal identification practices from the nineteenth
century to the present can be read through the history of the production and use of
inscriptions of the body. From the development of modem policing in the nineteenth
century, law enforcement agencies have been dependent on inscriptions to reduce the
From its adoption into law enforcement practices in the mid-nineteenth century,
Bertillonage was time and labour-intensive and the recording o f data on Bertiilon
part because it yielded better inscriptions o f the body. This was essential in law
compact and concise visual format and, as tactile traces of the body, they were
2 These are the five features of Latour’s conception of the immutable mobile. See Bruno
Latour, "Drawing Things Together," in Representation in Scientific Practice, ed. Michael Lynch and
Steve Woolgar (Cambridge, Mass.: MIT Press, 1990), 19-68.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
179
traced to the development of a new conception of the criminal body in the nineteenth
centuries defined the outward surface of the body, specifically the head and face, as
field of criminology expanded on the tenets of this work and defined the body as a
text that offered visual signs of its identity as normal or deviant Championed in the
work of Cesare Lombroso, criminality was defined as something that could be read
directly from the physical body and therefore captured in its visual representation.
tool of representation, I argue that the specific collaboration of photography and the
new practice in law enforcement, defined by a new role of the camera. The mobility,
3 George Wilton Wilton, Fingerprints: History, Law and Romance (London: William Hodge
and Company, 1938).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
180
ubiquity and objectivity of the camera, combined wife the latency of the fingerprint,
enabled law enforcement agencies to collect and archive latent identification data.
TMs, I argue, transformed the subject of law enforcement from fee individual,
criminal body to a larger, aggregate social body within which any specific body was
potentially criminal.
importance o f the control of inscriptions. I argue that the FBI gained significant
power through the gradual development o f control over the inscription of DNA, the
autoradiograph. The DNA Identification Act o f 1993 was central in this effort. The
Act gave the FBI control over the standards for DNA analysis, delimited their
authority over the technique to its use within law enforcement practices, and provided
the funding necessary for the Bureau to develop a National DNA Index.
The theoretical possibilities associated with the collection and use o f latent
identification data announced at the turn of the nineteenth and twentieth centuries are
filing cabinet, has been replaced by the computer. Digital technologies have greatly
independent o f the physical presence and knowledge of the body. Images of faces,
fingerprints and DNA are quickly and easily collected by law enforcement personnel
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
18!
and are archived in the databases of the National Crime Information Center 2000 and
Information Services Division and its relocation to a 500,000 square foot complex
2003, of over twenty government agencies including the United States Coast Guard,
Energy into the unified Department of Homeland Security points to a similar drive to
an effective tool in apprehending offenders, the practices of data collection are cause
the collection of identification data toward a complete and inclusive digital archive.
These practices o f mass data collection reflect a transformation in the role of law
enforcement in society and threaten a redefinition of the body. The body in the
4 The Department of Homeland Security was brought into operation on January 2 4 , 2003. A
complete history of the Department, including its schematic organization is available from
http://www.whitehouse.gov/homeland/index.htmL Accessed May 26,2003.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
182
deviant, and its attendant rights and limitations are determined through the production
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
183
WORKS CITED
Genetic Witness: Forensic Uses o f DNA Tests. Washington, D.C.: United States
Congress, Office of Technology Assessment, 1990.
Violent Crime Control and Law Enforcement Act o f 1994. Washington, D.C.: United
States Senate and House o f Representatives, 1994, P.L. 103-322.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
184
“Bike Cops Get Info on Palm - Bellevue Police Test 30 New Palm Pilots.” Eastside
Journal Online, 2000. Accessed January 10 2003. Available from
http://www.eastsidejoumal.com.
“An NCIC Milestone.” Federal Bureau of Investigation (Press Release March 23,
2002). Accessed March 5 2003. Available from
http://www.fbi.gov/pressrel/pressrel02/ncic032302.htm.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
185
Annas, George I. "Privacy Rules for DNA Databanks: Protecting Coded 'Future
Diaries’." Journal o f the American Medical Association 270, no. 19 (1993):
2346-2350.
Annas, George I., Leonard H. Glantz, and Patricia A. Roche. "Drafting the Genetic
Privacy Act: Science, Policy, and Practical Considerations." Journal o f Law,
Medicine and Ethics 23 (1995): 360-366.
Barak-Glantz, Israel L., and C. Ronald Huff, ed. The Mad, the Bad, and the Different:
Essays in Honor o f Simon Dinitz. Lexington: Lexington Books, 1981.
Beavan, Colin. Fingerprints: The Origins o f Crime Detection and the Murder Case
that Launched Forensic Science. New York: Hyperion, 2001.
Beime, Piers, ed. The Origins and Growth o f Criminology: Essays on Intellectual
History, 1760-1945. Edited by Gerald Mars and David Nelken, International
Library o f Criminology, Criminal Justice and Penology. Aldershot:
Dartmouth, 1994.
Bell, Gary L. "Testing the National Crime Information Center Missing / Unidentified
Persons Computer Comparison Routine." Journal o f Forensic Sciences 38,
no.l (1993): 13-22.
Bendavid, Naftali. "Bill Would Expand Use of DNA Testing." Legal Times, June 7
1993.
Benjamin, J., Lin Li, C. Patterson, B.D. Greenberg, D.L. Murphy, and D.H. Hamer.
"Population and Familial Association Between the D4 Dopamine Receptor
Gene and Measure of Novelty Seeking." Nature Genetics 12 (1996): 81-84.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
186
Billings, Pan! R., ed. DNA on Trial: Genetic Identification and Criminal Justice.
Plainview: Cold Springs Harbor Laboratory, 1992.
Bishop, Katherine. "A Victory for Genetic Fingerprinting." New York Times,
November 16 1990, B6.
Brotman, Brace J., and Rhonda K. Pavel. "Identification: A Move Toward the
Future." Law Enforcement Bulletin, July (1991).
Burke, Terry, Gaudenz Dolf, Alec J. Jeffreys, and Roger Wolff, ed. DNA
Fingerprinting: Approaches and Applications. Basel, Switzerland: Birkauser
Verlag, 1991.
Burnham, David. "FBI Says 12,000 Faulty Reports on Suspects are Issued Each
Day." New York Times, August 25 1985.
Carey, Thomas, Assistant Special Agent in Charge, Washington Field Office, Federal
Bureau of Investigation. “Communication with the Law Enforcement
Community.” Congressional Statement, November 13, 2001. Accessed
September 2002, available from
http:/Avww.fbi.gov/congress/congressO 1/carey 111301.htm.
Chen-ill, Frederick R. The Finger Print System at Scotland Yard. London: Her
Majesty's Stationary Office, 1954.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
187
Cooper, H.S. "The Evolution of Canadian Police." In The Police Function in Canada,
ed. William T. McGrath and Michael P. Mitchell, 37-52. Toronto: Methuen,
1981.
Cranor, Carl F., ed. Are Genes Us? The Social Consequences o f the New Genetics.
New Brunswick: Rutgers University Press, 1994.
Cutri, Keith J. "Laptop Computers: New Technology for Law Enforcement." Law
Enforcement Bulletin, February / March (1996).
Daemmrich, Arthur. "The Evidence Does Not Speak for Itself: Expert Witnesses and
the Organization of DNA-Typing Companies." Social Studies o f Science 28,
no. 5-6 (1998): 741-772.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
188
Diiworth, Donald €., ed. The Blue and the Brass, American Policing: 1390-1910.
Police History Series. Gaithersburg: International Association of Chiefs of
Police, 1976.
Ellis, Havelock. The Criminal. Vol. 7. 22 vols. Contemporary Science Series, ed.
Havelock Ellis. London: Walter Scott, 1890.
Faulds, Henry. "On the Skin-Furrows o f the Hand." Nature 22, Oct. 28 (1880): 605.
Foucault, Michel. Discipline and Punish: the Birth o f the Prison. Trans. Alan
Sheridan New York: Vintage Books, 1979.
Galton, Francis. "Personal Identification and Description: 1." Nature 38, June 21
(1888): 173-77.
________. "Personal Identification and Description: 2." Nature 38, June 28 (1888):
201- 02 .
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
189
________. Inquiries Into Human Faculty and its Development. London: J.M. Dent
and Sons, 1907.
Gilman, Sander L., Hugh Welch Diamond, and John Conolly. The Face o f Madness:
Hugh W Diamond and the Origin o f Psychiatric Photography. New York:
Brunner/Mazel, 1976.
Gorgey, Andrea De. "The Advent of DNA Databanks: Implications for Information
Privacy.” American Journal o f Law and Medicine 16, no. 3 (1990): 381-398.
Greenmail, Catherine. “Computers on Patrol Have Got Your Number.” New York
Times, 1999. Accessed January 10 2003. Available from
http://www.nytimes.eom/IIbrary/tech/99/01 /circuits/articles/
21 howw-side.html.
Gunning, Tom. "Tracing the Individual Body: Photography, Detectives, and Early
Cinema.” In Cinema and the Invention o f Modern Life, ed. Leo Chamey and
Vanessa R. Schwartz, 15-45. Berkeley: University of California, 1995.
Haglund, William D. "The National Crime Information Center (NCIC) Missing and
Unidentified Persons System Revisited." Journal o f Forensic Sciences 38,
no. 2 (1993): 365-378.
Halfon, Saul. "Collecting, Testing and Convincing: Forensic DNA Experts in the
Courts." Social Studies o f Science 28, no. 5-6 (1998).
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
190
Hamer, Dean H., Stella Hu, Victoria L. Magnuson, Nan Hu, and Angela M. L.
Pattatucci. "A Linkage Between DNA Markers on the X Chromosome and
Male Sexual Orientation.'' Science 261, July 16 (1993): 321-327.
Hamilton, Peter, and Roger Hargreaves. The Beautiful and the Damned: The Creation
o f Identity in Nineteenth Century Photography. London: Lund Humphries,
2001.
Henry, Sir E.R. Classification and Uses o f Finger Prints. 7th [1934] ed. London: His
Majesty's Stationary Office, 1900.
Herschel, W. J. "Skin Furrows of the Hand." Nature 23, Nov 25 (1880): 76.
Hitt, Stephanie L. "NCIC 2000." Law Enforcement Bulletin 69, no. 7 (2000): 12 - 15.
Holt, James. Finger Prints Simplified: A Handbook o f the Science o f Finger Print
Identification. Chicago: Frederick I. Drake and Co., 1920.
Horn, David G. "This Norm Which is Not One: Reading the Female Body in
Lombroso's Anthropology." In Deviant Bodies: Critical Perspectives on
Difference in Science and Popular Culture, ed. Jennifer Terry and Jacqueline
Urla, 109-128. Bloomington: Indiana University Press, 1995.
Hu, Stella, Angela M. L. Pattatucci, Chavis Patterson, Lin Li, David W. Fulker,
Stacey S. Cherny, Leonid Kraglyak, and Dean H. Hamer. "Linkage Between
Sexual Orientation and Chromosome Xq28 in Males but not in Females."
Nature Genetics 11, November (1995): 248-256.
Hubbard, Ruth, and Elijah Wald. Exploding the Gene Myth: How Genetic
Information is Produced and Manipulated by Scientists, Physicians,
Employers, Insurance Companies, Educators, and Law Enforcers. Boston:
Beacon Press, 1993.
lies, Chrissie, and Russell Roberts, ed. In Visible Light: Photography and
Classification in Art, Science and The Everyday. Oxford: Museum of Modem
Art, 1997.
Inman, Keith, and Norah Rudln. An Introduction to Forensic DNA Analysis. New
York: CRC Press, 1997.
Jasanoff, Sheila. "The Eye o f Everyman: Witnessing DNA In the Simpson Trial."
Social Studies o f Science 28, no. 5-6 (1998): 713-740.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
191
Jones, Caroline A., and Peter Galison, ed. Picturing Science Producing Art. New
York: Routledge, 1998.
Keller, Evelyn Fox. "Master Molecules." In Are Genes Us? The Social
Consequences o f the New Genetics, ed. Car! F. Cranor, 89-98. New Jersey:
Rutgers University Press, 1994.
Kevles, Daniel J., and Leroy E. Hood. The Code o f Codes: Scientific and Social
Issues in the Human Genome Project. Cambridge, Mass.: Harvard University
Press, 1992.
Kirkpatrick, Michael D. "Solving Cold Cases with Digital Fingerprints." Sheriff 53,
no. 4 (2001): 14-17.
Kolata, Gina. "Some Scientists Doubt the Value of 'Genetic Fingerprint' Evidence."
New York Times, January 29 1990, A l.
Kotval, Jeroo S. "Public Policy for Forensic DNA Analysis: The Model o f New York
State." In DNA on Trial: Genetic Identification and Criminal Justice, ed. Paul
R. Billings, 109-118. Plainview: Cold Spring Harbor Laboratory Press, 1992.
Kuhn, Thomas S. The Structure o f Scientific Revolutions. [2d, eni ed. Chicago]:
University o f Chicago Press, 1970.
Kufane, Frederick. The Finger Print Instructor. New York: Muirn and Company,
1916.
Lander, Eric. "DNA Fingerprinting: Science, Law, and the Ultimate Identifier." In
The Code o f Codes: Scientific and Social Issues in the Human Genome
Project, ed. Daniel J. Kevles and Leroy Hood. Cambridge: Harvard University
Press, 1992.
Lander, Eric S., and Bruce Budowle. "DNA Fingerprinting Dispute Laid to Rest."
Nature 371, October 27 (1994): 735-738.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
192
Latour, Bruno. Science in Action: How to Follow Scientists and Engineers Through
Society. Cambridge, Mass.: Harvard University Press, 1987.
Latour, Bruno, and Steve Wooigar. Laboratory Life: The Construction o f Scientific
Facts. 2nd ed. Princeton: Princeton University Press, 1979.
Lombroso, Cesare. Crime: Its Causes and Remedies. Translated by Henry P. Horton,
M.A. Patterson Smith Reprint Series in Criminology, Law Enforcement, and
Social Problems. Montclair: Patterson Smith, 1968 (c. 1911).
Lombroso, Cesare, and William Ferrero. The Female Offender. The Criminology
Series, ed. M.A. W. Douglas Morrison. New York: D. Appleton and
Company, 1895.
Lynch, Michael, and Sheila Jasanoff. "Contested Identities: Science, Law and
Forensic Practice." Social Studies o f Science 28, no. 5-6 (1998): 675-686.
McEwen, Jean E., and Phillip R. Reilly. "A Review of State Legislation on DNA
Forensic Data Banking." American Journal o f Human Genetics 54 (1994):
941-958.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
193
McGrath, William T., and Michael P. Mitchell, ed. The Police Function in Canada.
Toronto: Methuen, 1981.
Murefa, Randall S., and Brace Budowle. "Are Developments in Forensic Applications
of DNA Technology Consistent with Privacy Protections?" In Genetic
Secrets: Protecting Privacy and Confidentiality in the Genetic Era, ed. Mark
A. Rothstein, 212-230. New Haven: Yale University Press, 1997.
Newcombe, Tod. “Slow Spiral: State DNA Lag Databases.” Government Technology,
April 2000. Accessed January 9 2003. Available from
http://www.govtech.net/pubiications/crimetech/AprOO/CTENDA.phtmi.
Peterson, Rebecca Sasser. "DNA Databases: When Fear Goes Too Far." American
Criminal Law Review 37 (2000): 1219-1238.
Phillips, Sandra, Mark Haworth-Booth, and Carol Squires. Police Pictures: The
Photograph as Evidence. San Francisco: Chronicle Books, 1997.
________. Trust in Numbers: The Pursuit o f Objectivity in Science and Public Life.
Princeton: Princeton University Press, 1995.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
194
Rafter, Nicole Hahn. "Criminal Anthropology in the United States." Criminology 30,
no. 4 (1992): 525-545.
Rothstein, Mark A., ed. Genetic Secrets: Protecting Privacy and Confidentiality in
the Genetic Era. New Haven: Yale University Press, 1997.
Schmeck, Harold M. Ir. "DNA Findings Disputed by Scientists." New York Times,
February 7 1988,1.
Schmitt, Eric. “Ashcroft Proposes Rules for Foreign Visitors.” New York Times,
2002. Accessed June 10 2002.. Available from http://www.n3dimes.com/
20O2/O6/Q6/politics/O6VI5A.fatmi.
Sekula, Allan. "The Body and the Archive." October 39 (1986): 3-64.
Sinha, Gunjan. "DNA Detectives." Popular Science 255, no. 2 (1999): 48-52.
Talbot, C.K., C.H.S. Jayewardene, and T.J. Juliani, ed. Canada’s Constables: The
Historical Development o f Policing in Canada. Ottawa: Crimcare, 1985.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
195
Ubell, Earl. "Whodunit? Quick Check the Genes!" Parade Magazine, March 31
1991.
Wilton, George Wilton. Fingerprints: History, Law and Romance, London: William
Hodge and Company, 1938.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.