Raising new privacy concerns, research shows that the DNA signatures of bacteria transferred to objects by human touch can be used for identification.
Scientists at the University of Colorado at Boulder have found that the bacteria trail left behind on objects like computer keyboards and mice can analyzed and used to help identify users of those devices.
"Your body is coated with bacteria inside and out," says CU-Boulder assistant professor Noah Fierer in a video on YouTube. "You're basically a walking microbial habitat. And we found that the diversity of bacteria just on the skin surface is really pretty incredible. You habor hundreds of different bacteria species just on your palm, for example. We've also found that everybody is pretty unique. So of those let's say hundred or so bacteria species, very few are of them are shared between individuals."
What Fierer and his colleagues have demonstrated in a new study is that the distinctive combination of bacteria each of us carries and distributes can be used to help identify what we've touched.
Such work may one day help link individuals to malicious computer use or other crimes.
The study, "Forensic identification using skin bacterial communities," appears in the March 15 Proceedings of the National Academy of Sciences. It describes how the researchers swabbed bacterial DNA from the keys of three personal computers and matched them to the bacteria on the fingertips of the owners of the keyboards. It also details a similar test conducted on computer mice that had not been touched for over 12 hours.
The study indicates that the technique is 70% to 90% accurate and Fierer expects that accuracy will improve as the technique is refined. Until accuracy is extremely high, the technique is most likely to be useful as a way to augment more established forensic techniques, like fingerprinting and DNA identification.
"There's still a lot of work we need to do to assess the validity of the technique and how well we can recover bacteria from surfaces and how well we can match objects to the individual how touched that object," Fierer explains in the video.
In a University of Colorado at Boulder news release, Fierer said that the new technique raises bioethical issues, including privacy. "While there are legal restrictions on the use of DNA and fingerprints, which are 'personally-identifying,' there currently are no restrictions on the use of human-associated bacteria to identify individuals," he said.
Dark Reading Tech Digest, Dec. 19, 2014Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Published: 2014-12-26 ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2062. Reason: This candidate is a reservation duplicate of CVE-2010-2062. Notes: All CVE users should reference CVE-2010-2062 instead of this candidate. All references and descriptions in this candidate have been removed to pre...
Published: 2014-12-26 Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.
Published: 2014-12-26 VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer.
Published: 2014-12-26 The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format...
Published: 2014-12-26 The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.