Durham police demonstrate DNA will stuff you

Possession of non-illegal substance will still arse up your prospects


Durham police last week put the final nail in the coffin of the Home Office mantra "nothing to hide, nothing to fear", with a clear announcement that DNA and fingerprinting could harm an individual’s career prospects – even if they are otherwise totally innocent.

The warning came in a press release relating to mephedrone, which began by establishing that the substance remains legal to possess – until the government determines otherwise – but illegal to sell for medicinal purposes.

The release observes that "its chemical formula is one molecule different to ecstasy and as such dealers are claiming is not a controlled substance." This would in fact make mephedrone a different chemical substance from ecstacy – in much the same way that carbon monoxide is not the same as carbon dioxide - and therefore clearly not a controlled substance, irrespective of claims made by dealers.

However, it is in police remarks relating to the consequence of possessing mephedrone that the greatest concerns are to be found. Barnard Castle-based Inspector Kevin Tuck is reported as saying: "In Durham police have taken a stance and anyone found with it will be arrested on suspicion of possession of a banned substance."

He adds: "They will be taken to a police cell, their DNA and fingerprints taken and that arrest, depending upon enquiries, could have serious implications for example on future job applications" (our italics).

We asked Durham police for clarification of what possible serious implications there could be for an individual found in possession of a legal substance who had their fingerprints or DNA taken. It was speculated that perhaps some employers would ask prospective job candidates about details not merely of convictions, but of all contact with police – and therefore having DNA taken could adversely affect job prospects for that reason.

However, we have had no official response to our inquiry and remain as baffled as the Home Office, who are still sticking to their line that DNA testing in and of itself can have no consequence for an individual.

A Home Office spokesman said: "Employment checks are not linked to the DNA database and employers cannot check if a potential employee is on the DNA database.

"As we announced last month in our proposals for DNA retention, the police would be required to remove DNA profiles from the database after six years if the person was not subsequently convicted.

"Under the exceptional case procedure, an individual can apply to their police force to have their DNA removed. This will be decided by the chief constable, and the criteria for that application are for the first time set out in statute in our proposals."

Therefore, the official line continues to be that DNA testing is an innocuous process and, as ever, "if you have nothing to hide, you have nothing to fear".

Whether the police should have any role at all to play in the regulation of a legal substance is an interesting question: defendants of the police role (pdf) in this would point to the fact that as well as upholding law and order, local police forces are tasked with "keeping the Queen’s peace", as well as "protecting, helping and reassuring the community".

Pending explanation from Durham, however, it would seem to be the case that the belief exists amongst some middle-ranking officers that a DNA test does have consequences; or, if it does not, that there is sufficient uncertainty amongst the general public for the threat of a test to have some weight in enforcing a "stance" taken against a currently legal substance. ®

Similar topics


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021