Category Archives: Health impacts

Wuhan Smart Health Initiative in China

In the public interest.

The Smart Health Initiative in China: The Case of Wuhan, Hubei Province

Abstract

To introduce smart health in Wuhan, and provide some references for other cities. As the largest mega-city in central China, Wuhan is investing large amounts of resources to push forward the development of Smart Wuhan and Health Wuhan, and it has unique features. It is one of the centerpieces of China’s New Healthcare Reform, and great hope is put on it to help solve the conflict between limited healthcare resources and the large population of patients. How to plan and design smart health is important. The construction of Wuhan Smart Health includes some aspects as follows, like requirement analysis, the establishment of objectives and blueprint, the architecture design of regional health information platform, evaluation and implementation, problems and solutions, and so on. Wuhan Smart Health has obtained some achievements in health network, information systems, resident’s health records, information standard, and the first phase of municipal health information platform. The focus of this article is the whole construction process of smart health in Wuhan. Although there are some difficulties during this period, some smart health services and management have been reflected. Compared with other cities or countries, Wuhan Smart Health has its own advantages and disadvantages. This study aims to provide a reference for other cities. Because smart health of Wuhan is characteristic in construction mode. Though still in the initial stage, it has great potentials in the future.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 6
Fig. 13
Fig. 14
Fig. 15

References

  1. 1.

    Caine, K., and Hanania, R., Patients want granular privacy control over health information in electronic medical records. Jamia. 20(1):7–15, 2013.

  2. 2.

    Dobalian, A., Claver, M.L., Pevnick, J.M., Stutman, H.R., Tomines, A., and Fu Jr., P., Organizational challenges in developing one of the nationwide health information network trial implementation awardees. J. Med. Syst. 36(2):933–940, 2012.

  3. 3.

    Moghaddasi, H., Asadi, F., Hosseini, A., and Ebnehoseini, Z., E-health: a global approach with extensive semantic variation. J. Med. Syst. 36(5):3173–3176, 2012.

  4. 4.

    Ramanathan, N., Swendeman, D., Comulada, W. S., et al., Identifying preferences for mobile health applications for self-monitoring and self-management: Focus group findings from HIV-positive persons and young mothers. Int. J. Med. Inform. 82(4):e38–e46, 2013.

  5. 5.

    Provost, F., and Fawcett, T., Data science and its relationship to big data and data-driven decision making. Big Data. 1(1):51–59, 2013.

  6. 6.

    Merrell, R.C., and Doarn, C.R., M-health. Telemed J. e-Health. 20(2):99–101, 2014.

  7. 7.

    Toubiana, L., and Cuggia, M., Big data and smart health strategies: findings from the health information systems perspective. Yearb. Med. Inform. 9(1):125–127, 2014.

  8. 8.

    Albino, V., Berardi, U., and Dangelico, R.M., Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1):3–21, 2015.

  9. 9.

    Lombardi, P., Giordano, S., Farouh, H., et al., Modelling the smart city performance. Innovation-Abingdon. 25(2):137–149, 2012.

  10. 10.

    Komninos, N., Pallot, M., and Schaffers, H., Special issue on smart cities and the future internet in Europe. J. Knowl. Econ. 4(2):119–134, 2013.

  11. 11.

    Hao, L., Lei, X., Yan, Z., & ChunLi, Y., The application and Implementation research of Smart City in China. In System Science and Engineering (ICSSE), 2012 International Conference on (pp. 288–292). IEEE, 2012.

  12. 12.

    Hvistendahl, M., China pushes the “internet of things”. Science. 336(6086):1223–1223, 2012.

  13. 13.

    Chen, C.C., The trend towards “smart cities”. Int. J. Autom. Smart Technol. 4(2):63–66, 2014.

  14. 14.

    Zhen, F., Wang, X., Yin, J., et al., An empirical study on Chinese city network pattern based on producer services. Chin. Geogr. Sci. 23(3):274–285, 2013.

  15. 15.

    Chen, X., A sustainability analysis on the Wuhan-Guangzhou high-speed railway in China. Int. J. Sustain. Transp. 9(5):348–363, 2015.

  16. 16.

    Cheng, J., and Masser, I., Urban growth pattern modeling: a case study of Wuhan city. Pr China. Landsc. Urban Plan. 62(4):199–217, 2003.

  17. 17.

    State Council of China. Opinions of the CPC Central Committee and the State Council on deepening the healthcare system reform. March 2009. URL http://www.gov.cn/jrzg/2009-04/06/content_1278721.htm.

  18. 18.

    Gao, X., Xu, J., Sorwar, G., et al., Implementation of E-health record systems and E-medical record systems in China. Int. Technol. Manag. Review. 3(2):127–139, 2013.

  19. 19.

    O’Malley, A.S., Tapping the unmet potential of health information technology. N. Engl. J. Med. 364(12):1090–1091, 2011.

  20. 20.

    Li, B., and Yu, J., Research and application on the smart home based on component technologies and internet of things. Procedia Eng. 15:2087–2092, 2011.

  21. 21.

    Kuperman, G.J., Health-information exchange: why are we doing it, and what are we doing? J. Am. Med. Inform. Assoc.. 18(5):678–682, 2011.

  22. 22.

    Yoo, I., et al., “data mining in healthcare and biomedicine: a survey of the literature.”. J. Med. Syst. 36(4):2431–2448, 2012.

  23. 23.

    Khan, W.A., Khattak, A.M., Hussain, M., et al., An adaptive semantic based mediation system for data interoperability among health information systems. J. Med. Syst. 38(8):1–18, 2014.

  24. 24.

    Saboury, A., Ghaffari-Nasab, N., Barzinpour, F., et al., Applying two efficient hybrid heuristics for hub location problem with fully interconnected backbone and access networks. Comput. Oper. Res. 40(10):2493–2507, 2013.

  25. 25.

    Jedermann, R., Becker, M., Gorg, C., et al., Testing network protocols and signal attenuation in packed food transports. Int. J. Sensor Networks. 9(3–4):170–181, 2011.

  26. 26.

    Zheng, X., and Rodríguez-Monroy, C., The development of intelligent healthcare in China. Telemed. e-Health. 21(5):443–448, 2015.

  27. 27.

    Baig, M.M., and Gholamhosseini, H., Smart health monitoring systems: an overview of design and modeling. J. Med. Syst. 37(2):1–14, 2013.

  28. 28.

    Mandl, K.D., Mandel, J.C., Murphy, S.N., et al., The SMART Platform: early experience enabling substitutable applications for electronic health records. J. Am. Med. Inform. Assoc. 19(4):597–603, 2012.

  29. 29.

    Lymberis, A., Research and development of smart wearable health applications: the challenge ahead. Stud. Health Technol. Inform. 108:155–161, 2004.

  30. 30.

    Park, H.S., Shin, Y., Choi, S.W., et al., An integrative structural health monitoring system for the local/global responses of a large-scale irregular building under construction. Sensors. 13(7):9085–9103, 2013.

  31. 31.

    Solanas, A., Patsakis, C., Conti, M., et al., Smart health: a context-aware health paradigm within smart cities. IEEE Commun. Mag. 52(8):74–81, 2014.

  32. 32.

    Wang, B.R., Park, J.Y., Chung, K., et al., Influential factors of smart health users according to usage experience and intention to use. Wirel. Pers. Commun. 79(4):2671–2683, 2014.

  33. 33.

    Dünnebeil, S., Sunyaev, A., Blohm, I., et al., Determinants of physicians’ technology acceptance for e-health in ambulatory care. Int. J. Med. Inform. 81(11):746–760, 2012.

  34. 34.

    Kourtesis, D., Alvarez-Rodríguez, J.M., and Paraskakis, I., Semantic-based QoS management in cloud systems: current status and future challenges. Futur. Gener. Comput. Syst. 32:307–323, 2014.

Download references

Acknowledgments

MC and MF conceived the study. MF searched and checked the databases according to keywords and terms, extracted retrieval results and assessed their quality. MC and MF made questionnaire, and completed the survey. JS and BZ provided the important materials. MC and MF wrote the draft of the paper. All authors contributed to writing, reviewing or revising the paper and read and approved the final manuscript. MC is the guarantor of this work and had full access to all the data in the study and takes responsibility for its integrity and the accuracy of the data analysis. The authors would like to thank all the anonymous reviewers for their helpful advice.

Author information

Correspondence to Min Chen.

Additional information

This article is part of the Topical Collection on Mobile Systems

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Fan, M., Sun, J., Zhou, B. et al. The Smart Health Initiative in China: The Case of Wuhan, Hubei Province. J Med Syst 40, 62 (2016). https://doi.org/10.1007/s10916-015-0416-y

Download citation

Keywords

  • Smart health
  • Regional health information platform
  • Information system
  • Smart city

Smart Spying, Children, 5G and Health Effects

This is a real issue, particularly in the hands of industry and members of the public. There is a range of information provided below and videos. The one that concerns me is the 8 year old child who a hacker spoke to in her bedroom. What if this person is a paedophile?

The article below provides solutions on how to avoid surveillance and what to be aware of.

In the public interest, definitely.

Is Your Cell Phone Spying On You?

Author: Guest, Last updated: January 30, 2020

Is your cell phone spying on you? Even if it is, does it really matter? You’re no criminal, right? Should you protect yourself in any case? In this guest post, Lois Cadwallader answers all these questions and more and shares 15 ways you can protect yourself from this personal intrusion:

Have you ever had the feeling that “someone is listening?” Well, they are. And it’s more than just your cell phone. Most newer electronic devices are seeded with sensors.

What’s interesting, is the smartphone has probably become the most important personal identifier and locator.
Think about it. What do most people have with them always? Their phones.

How do smartphones provide surveillance? They:

  • Listen
  • Locate
  • Log personal data

They Listen

I recently had my own experience with this. I carry my phone on airplane mode with Bluetooth and WiFi off to safeguard against exposure to electromagnetic radiation. (Find more information on Bluetooth radiation dangers here.)

I had turned my phone back on to check for messages and saw a friend zipping along on a bike path. “Diane Day! Diane Day,” I called out loudly. Well, she was riding so fast that she didn’t hear me. But someone else did.

Within a few hours, I had a personal message from her on Facebook … but it was suspicious. It didn’t sound like her. Sure enough, it was a hacker. Coincidental? Maybe. But the timing is just too close. I can’t help but wonder if my phone picked up her name, associated her with my Facebook friend, and someone went phishing.

I’d be interested in hearing your stories, please share in the comment section below.

It’s not just our smartphones.

Let’s take home managers, or smart speakers. Apple and Google admit that Alexa and Siri spy on you. Employees listen in on conversations, but only to monitor and improve the system, so they say. Industry claims the sampling is very small, and that they have in place strict anti-abuse regulations. [1,2,3]

And even more disturbing, the very systems we use to protect our homes may be the instruments of surveillance and invasive contact. An alarming report just surfaced about a hacker speaking to a young girl through the smart speaker in her bedroom. This video is downright creepy.

They Locate

Even when the GPS is turned off, your location can still be established using cell tower triangulation. Although this is not exactly “pin-pointing” it can get pretty close. This could be used for good or bad, depending on who wants to know your whereabouts. [4]

man holding phone to connect

They Log Personal Data

Your smartphone and other smart devices collect, analyze, and record thousands of interactions every day. It is no secret that this information is available to 3rd party advertisers. But it’s for “your benefit” – It’s like having a “personal shopper” hunt out the best deals for you.

Google says they don’t “sell” your personal information. They just place advertisements in your purview, based on your trends and search history. [5]

And Apple boasts, “What happens on your iPhone stays on your iPhone.” However, a NY Post investigator begs to differ.

He discovered that he was being “tracked,” by 3rd parties and that personal information had been shared, contrary to the published privacy policy. [6]

Are You OK With Massive Data Collection And Retention?

What About Hackers?

In the article, “Smart Homes Might be Getting too Smart. Start Worrying,” the author makes the stunning point that the danger is not just that hackers could know when you are on vacation and hack your smart lock and break into your home. That’s bad enough. But also there is the broader danger that hackers could commandeer hundreds of thousands of smartphones and smart devices to request access to a bank, social media platform, or government agency, thus forcing a DDoS (Distributed Denial of Service) attack. [7]

This is actually what happened in the 2016 Mirai botnet that crashed the web. [8]

Isn’t Being Connected A Good Thing?

In the book, Owned: Property, Privacy and the New Digital Serfdom, by Joshua A. T. Fairfield, 2017, the author discusses what it means that our environment is seeded with more sensors than ever before. [9]

Our dishwashers, smart televisions, internet-enabled home thermostats, smart meters, Fitbits and smartphones constantly gather information about us and our environment.

Objects of the Internet Of Things

Who owns that information? You might be surprised at the answer.

When you purchase a smartphone or any smart device you relinquish ownership of your personal information. Industry owns your personal information. It is buried in hard-to-read, small-font terms-of-service agreements.

5G will only make it worse, as the sensors and transmitters are brought closer and closer, right into our neighborhoods, connecting all of the smart gadgets in the smart homes. This is not just “real time” listening. There is huge data collection, analysis, and retention by government and industry. [10,11]

Why? You guessed it. There is nothing new under the sun.

Money and power, money and power, money and power.

Money, Money, Money

Technology is a trillion dollar business. Industry and government are riding high on the enormous profits. Smartphone ownership is fast becoming a “right” and a “necessity” for life. Ask any person under 50 years old, “What’s the one thing you cannot and will not go without?” The answer is usually, “My phone.”

man riding on money

So, we now have a product with almost 100% dependence for both business and personal use. And the consumer is more than happy to pay for the latest smartphone upgrade.

American companies alone are estimated to have spent over $19 billion in 2018 acquiring and analyzing consumer data, according to the Interactive Advertising Bureau. [12,13]

And Then There’s Power.

person looking at the money at the center of the world

They would need an Infra-structure in place for surveillance and compliance assurance.

  • They would need to control technology in order to control information.
  • They would need to control financial transactions.
  • They would need to control the military.
  • Food, prescriptions, electricity, fuel, etc., all controlled by technology.
  • They would want to keep the population dependent (if not addicted) to the services under their control.

In short, they would need surveillance, surveillance, surveillance.

Where could this possibly be going? Dr. Jeremy Naydler, author and philosopher writes about the disturbing scenario of the global electronic intelligence in, “5G – The Big Picture.” [14]

And check out this edgy film, 5G APOCALYPSE – THE EXTINCTION EVENT. It is a full-length documentary by Sacha Stone exposing the 5G existential threat to humanity. OK, it might be a little hyperbolic. But if even half of this is true, yikes!

The power of artificial intelligence and other advanced technologies will be enormous. Vladimir Putin said, those in possession of artificial intelligence will rule the world. The processing speed and knowledge base of artificial intelligence will be so great, it will seem all-knowing to most. [15]

And President Trump states in the National Security Report, “We will improve America’s digital infrastructure by deploying a secure 5G Internet capability nationwide. These improvements will increase national competitiveness, benefit the environment and improve our quality of life.” [16]

Linked to a global network of cameras and audio devices, made of non-biological materials, artificial intelligence will appear to be omnipresent, omnipotent, and immortal. Those acquainted with biblical prophecy speculate that AI will be the platform for the one-world dictator. [17]

There’s a race for technological domination because that equals power. And surveillance is a necessary part of it.

But I’m Not A Criminal

The thinking goes something like this, “If I’m not engaged in any criminal behaviors, I shouldn’t mind if I’m monitored. Surveillance keeps us all safer from crime and terrorism.”

To be fair, there are some benefits to this “tracking” involving safety, identifying medical emergencies, solving crimes, finding missing persons, etc.

So, why should you care? One word. China.

Spy coming out our phones

China is using smart phones and other smart devices to massively spy on its citizens. They assign a “Social Credit Score” to base reward and punishment. [18,19,20,21]

It could never happen here.” Famous last words.

Silicon Valley is already building a Chinese-style social credit system. [22]
And one could argue that in the US there is already an un-written social credit system solidly in place, just waiting for the right people to implement its rewards and punishments.

It all sounds a little far-fetched; conspiratorial. But still, it should give reason for pause and reflection. How much of our privacy are we willing to relinquish for the sake of convenience? What are we exchanging for ultra-connectivity? And is it worth it?

Is There Anything We Can Do?

Thankfully, yes.

Here are 15 steps you can take to reduce the spy-factor in your life.

1 – Unplug

Unplug, turn off, disconnect as much as possible.

A human pulling a plug connected to a brain

2 – Be Aware Of Your Appliances

Seek out older models of appliances that do not have a WiFi feature or dis-arm the WiFi component of new appliances. This is difficult, but possible with a little bit of research. (Still confused about the dangers of WiFi? Read this article on why WiFi is not safe.)

3 – Keep Airplane Mode On And WiFi And Bluetooth Off

If you are “EMF savvy,” you know that other than completely powering off, the only safe way to carry a cell phone on your body is to:

  • Turn Airplane mode ON
  • Turn Bluetooth and WiFi OFF

This shuts down all electromagnetic energy. And of course, shuts down all transmission and reception. Thus, you are un-connected. So, you must check for messages periodically.

You can still use other features, like calendar and camera. And you can still access downloaded items.

But beware! Some of the newer phones (and tablets) have an automatic re-connect feature. So, you must double check to ensure that Airplane mode is ON and Bluetooth and WiFi remain OFF when your phone or tablet is close to you. These devices “want” to be connected and are programmed to do so. Learn about cell phone radiation protection here.

A “Faraday Bag” is another option for carrying your phone.

4 – Get A Meter

What about the sneaky factor? Since most phones have a sealed battery that can no longer be removed, one cannot really know if it is truly “off.” The only way to be assured that there is no beacon signal emitting from your phone or appliances is to meter.

You can do that yourself quite easily with the right kind of meter.

And as we progress deeper and deeper into the mesh of electronic surveillance, now might be a good time to acquire a meter.

5 – Use A Land-line

Many of my friends no longer have a wired telephone line. We still keep ours. I don’t know how much longer they will even be available. But, I recommend if you have a land-line, keep it. If you do not have one, inquire as to whether or not you can install one.
Important – This should be completely wired with no additional wireless hand set.

You might be Interested in Lloyd’s extensive article on Cordless phone dangers.

6 – Resist The Home Manager / Smart Speakers

They are fun…convenient. They are all the “new rage” in technology. But come on’ – do we reeeeeally need them? And do we really want them listening, locating, logging?
I say, no!

7 – Be Mindful

Smart devices, appliances, electronic key fobs, and even toys are always listening. And sometimes even recording.

8 – Use Technology Against Technology

There are a few products that claim to block techno-spies. I have not checked them out yet. Worth a look.
Use webcam and microphone blockers and anti-malware software. When browsing the internet, go “incognito.”

9 – Check Privacy Options If You Use Social Media

Use social media with caution. Be sure you are aware of and use privacy options. You need to check these periodically, as they do change.

You can take it a step further and have your social media presence scrubbed. While you can delete your Facebook account relatively easily, getting these firms to remove your information is time-consuming, complicated, and sometimes impossible. In fact, the process is so burdensome that you may want to consider paying a service to do it on your behalf.

10 – Hardwire As Much As Possible

Hardwire your computer, mouse, printer, etc.
Wired is more secure than wireless as there is less chance of someone intercepting.

11 – Install Anti-Virus Systems On All Wireless Devices

Although not 100% fail-proof, they do make it difficult for hackers to intrude into your technology devices.

12 – Go To Advanced Security And Privacy Solutions

There are ways to disable the “listening” function of your smartphone and smart devices. There are also ways to delete your recorded information. Takes some research. I have not done this yet. I hear that it is difficult, but doable. My next project.

13 – Simplify

While cutting-edge technology can be exhilarating, there is something attractive about slow and simple living. Spend more time in the wilderness where there are no sensors. There is something restorative about the natural world and a small footprint.

14 – Take A detailed Audit Of Every Possible Source Of Surveillance In Your Home.

For a detailed list of “smart” devices that could possibly be used for surveillance, see:
Cadwallader, Bill, “EXPOSED: The Electronic Sickening of America and How to Protect Yourself—Includes the Dangers of 5G and Smart Devices,” Stop Dirty Electricity, Las Vegas, NV 2018

Bill shares over 30 pages of up-to-date information from his annual visit to the Consumer Electronics Show in Las Vegas. You may be surprised how many things in your environment have turned “smart” and could be used as a surveillance tool, even when turned off.

15 – Some Would Say Completely Eliminate Technology

This is difficult. And I admire the purists. I really do. But to run a business in the modern world, I have to use a pc and smart phone. If you are completely retired and don’t need electronics, it might be doable. You also might be able to move to a rural area. That would be ideal.

We may not be able to avoid surveillance entirely. But we can reduce the spy factor by taking some simple steps. Do what you can do today.

Many thanks to Lois Cadwallader for this guest post.

Lois Cadwallader EMF writer

Author bio: Lois Cadwallader, MA, has been a professional educator all her life. She lives in Las Vegas, Nevada and enjoys volunteering in after-school clubs, hiking and cycling. She is the co-author of Exposed: The Electronic Sickening of America and How to Protect Yourself.

Sources and Bibliography

1. Amazon Admits Employees Listen to Alexa Conversations. www.independent.co.uk/life-style/gadgets-and-tech/news/amazon-alexa-echo-listening-spy-security-a8865056.html
2. Google and Amazon really DO want to spy on you: Patent reveals future versions of their voice assistants will record your conversations to sell you products By Tim Collins, Dec. 15, 2017. www.consumerwatchdog.org/privacy-technology/google-and-amazon-really-do-want-spy-you-patent-reveals-future-versions-their
3. No secrets at home anymore now Amazon’s Alexa is spying on us, Geoffrey A Fowler, May 07 2019 www.stuff.co.nz/business/world/112528222/no-secrets-at-home-anymore-now-amazons-alexa-is-spying-on-us
4. Accurate Location Accurate Location Detection by Minh Tran, DMD transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf
5. Does Google sell your personal data? JERRY HILDENBRAND, Jan 12, 2018 www.androidcentral.com/does-google-sell-your-data
6. It’s the middle of the night. Do you know who your iPhone is talking to? By Geoffrey A. Fowler, Technology Columnist, May 28, 2019 www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking/
7. Smart homes might be getting too smart. Start worrying. Commentary: When better features mean worse ethics, should we change what we buy? By David Priest, October 31, 2019 www.cnet.com/news/smart-homes-might-be-getting-too-smart-start-worrying/
8. The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet by Josh Fruhlinger March 9, 2018 www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html
9. Owned: Property, Privacy and the New Digital Serfdom, by Joshua A. T. Fairfield, 2017 New York, NY: Cambridge University Press, 2017.
10. Who Owns Americans’ Personal Information and What Is It Worth? Robert Shapiro and Siddhartha Aneja, March 8, 2019 assets.futuremajority.org/uploads/report-for-future-majority-on-the-value-of-people-s-personal-data-shapiro-aneja-march-8-2019.pdf
11. When smart devices watch you, what do they do with the data? By Kim Komando USA TODAY, June 20, 2019 www.usatoday.com/story/tech/columnist/2019/06/20/what-do-smart-devices-do-data-they-collect-you/1483051001/
12. U.S. Firms to Spend Nearly $19.2 Billion on Third-Party Audience Data & Data-Use Solutions in 2018, Up 17.5% From 2017 Dec. 05, 2018, IBA (Interactive Advertising Bureau) Retrieved from www.businesswire.com/news/home/20181205005139/en/U.S.-Firms-Spend-19.2-Billion-Third-Party-Audience
13. Tech spending will near $4 trillion this year. Here’s where all the money is going and why by Eric Rosenbaum April 8, 2019 www.cnbc.com/2019/04/08/4-trillion-in-tech-spending-in-2019-heres-where-the-money-is-going.html
14. “5G – The Big Picture.” By Dr. Jeremy Naydler, April, 2019 Retrieved from takebackyourpower.net/5g-the-big-picture/
15. Vladimir Putin Says Whoever Leads in Artificial Intelligence Will Rule the World, By David Meyer, September 4, 2017 fortune.com/2017/09/04/ai-artificial-intelligence-putin-rule-world/
16. Ultra-fast 5G wireless service declared national security priority by White House by Danny Crichton, December 19, 2017 techcrunch.com/2017/12/19/ultra-fast-5g-wireless-service-declared-national-security-priority-by-white-house/
17. Will Artificial Intelligence Create Pathway To The Antichrist? By Britt Gillette, November 19, 2019 www.prophecynewswatch.com/article.cfm?recent_news_id=3610#QUFHUABS0Vj1W5pv.99
18. China has started ranking citizens with a creepy ‘social credit’ system — here’s what you can do wrong, and the embarrassing, demeaning ways they can punish you, by Alexandra Ma Oct 29, 2018 www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4
19. How China Is Using “Social Credit Scores” to Reward and Punish Its Citizens, By Charlie Campbell / Chengdu, 2019 time.com/collection/davos-2019/5502592/china-social-credit-score/
20. Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids? By Bernard Marr, Jan 21, 2019 www.forbes.com/sites/bernardmarr/2019/01/21/chinese-social-credit-score-utopian-big-data-bliss-or-black-mirror-on-steroids/#325c8bc848b8
21. ‘Social credit score’: China set to roll out ‘Orwellian’ mass surveillance tool By Bill Gertz – The Washington Times – December 9, 2019 www.washingtontimes.com/news/2019/dec/9/social-credit-system-china-mass-surveillance-tool-/
22. Uh-oh: Silicon Valley is building a Chinese-style social credit system, By Mike Elgan, August 2019 www.fastcompany.com/90394048/uh-oh-silicon-valley-is-building-a-chinese-style-social-credit-system

5G Adversely Affects Health and Possible Carcinogen

In the public interest.  5G is not safe and requires further testing.

I note statements being made in the media today, that RT (Russian media) is spreading propaganda about 5G.  This is not true, there are others in the global community who concur about the health impacts of 5G.  Experts in Canada indicate there is no evidence the 5G technology is safe.  There is evidence of the health effects and that it is a potential Carcinogen.

So what is the truth about 5G?

The telecom industry have not indicated that these are new technologies that have not been tested.  Refer Tom Wheeler in the next blog.  I will post APaul Fletcher (Communication Minister’s) in Australia’s statement about 5G.

The Wireless Technology Symposium in Toronto, Canada forum on Wireless Technology with a focus on 5G.

https://www.smart-safe.com/blogs/news/doctors-experts-call-for-delaying-deployment-of-5g-due-to-health-risks

Dr. Magda Havas at the Wireless Technology Symposium in Toronto, Canada on May 31, 2019. These are her comments, the video is below article on 5G.

Refer https://magdahavas.com/category/electrosmog-exposure/microwave-radiation-electrosmog-exposure/page/2/

Brief notes from the video (below).

  • Local planning authorities and the public have no say.
  • Advertising about 5G new frequency never tested for long term biological and health affects
  • Used in airport scanners and US military – crowd control.  
  • High intensities cause intense heat and pain
  • Sweat glands act like mini antennae
  • lower frequencies damage to eyes, loss of insect populations (declining), anti-biotic and bacteria, physiological affects on the immune and nervous system
  • microwave levels trillions of times higher then they were 50 years ago
  • radiate 24 hours a day, constant exposure
  • cell phones,tables, wifi, video games, smart meters, smart appliances etc.
  • electromagnetic sensitivity (pollution)
  • Dr Bray’s Environmental Health Clinic as many as 1 million people are sensitive, likely to increase with exposure
  • Major symptoms – insomnia, chronic fatigue, mood disorders, poor short term memory, difficulty concentrating, depression, heart palpatations (interpreted as anxiety).  Symptoms:  skin problems, nose bleeds, elevated blood sugar, extreme cases loss of conscientious, 
  • Microwave frequencies shown in scientific studies contribute to cancer and damage sperm.
  • Scientists and medical doctors across US and UK requesting delayed deployment until testing conducted on long term biological effects of 5G technology.
  • Scientific debate about health effects of microwave over.  Microwave radiation levels exposure adversely affecting human health of that there is no doubt.  
  • Current debate can we afford the health costs that will occur with roll out of 5G
  • Federal government failed to protect us from rising levels of microwaves, downloading financial fallout onto the provinces to pay for health costs.
  • Adopt Precautionary Approach to 5G until we better understand the consequences of this technology.

Dr. Miller (2011 WHO, International Agency for Research on Cancer, classified radio frequency radiation that the blanket name signal (cellphones, wifi, towers) class 2B possible carcinogen  

  • Evidence available state wireless radiation may give you cancer
  • Anthony Miller reviewed evidence
  • National Health Scientist for Canadian Government
  • Medal of Honour for research on cancer
  • (Miller) Associated International Agency for research on cancer recommended the WHO list all radio frequency radiation, radiation that powers cellphones, wifi as possible carcinogen, 2B, list of possible carcinogens includes lead and DDT (2011)
  • Classification based on epidemiology 
  • Human and animal.  Human new analysis – Interphone, updated analysis studies in Sweden.  Sweden first countries to introduce cell phones, demonstrated the longer exposure the greater the risk
  • Learned that we should not allow companies to introduce new chemicals without first being tested for carcinogenicity. Same for radiation.
  • Two studies in last 10 years reported last year 1) national toxicology program in the United States (animal) Ramazzini institute in Italy – prolonged exposure increases the risk to cancer.  Cancer similar to cancer in humans. Radiation increases damage to DNA, then risk of cancer increases substantially.
  • Prevent introduction of 5G

Doctors, Experts Call for Delaying Deployment of 5G Due to Health Risks

Posted on June 27 2019

Doctors, Experts Call for Delaying Deployment of 5G Due to Health Risks

 

TORONTO, Canada—Although 5G, or fifth generation wireless technology, promises faster download speeds and conveniences that most of us have never dreamed of, we’ll also be blanketed with a new type of radiation called “millimeter waves,” according to health experts who warn of the rising risks associated with the rollout of 5G.

At the Wireless Technology Symposium in Toronto on May 31, experts discussed evidence of adverse health effects from 5G technology and answered questions from the audience.

“It’s not been made clear to the public that 5G won’t just be another number and a letter on your cell phone,” said Frank Clegg, former president of Microsoft Canada. “It requires an entirely new infrastructure of thousands of small cellular antennas to be erected throughout the cities where it’s going to be installed.”

What would 5G infrastructure look like? Small cell antennas could be placed as close as every third utility pole.

Dr. Anthony Miller
Dr. Anthony Miller, professor emeritus of the University of Toronto and advisor to the World Health Organization at the Wireless Technology Symposium in Toronto, Canada on May 31, 2019. (Courtesy of Queen’s Park Gallery)

Scientists from 42 countries are warning their governments about the emerging health problems associated with wireless radiation, and Canadian doctors and scientists have added their concerns.

“The most prevalent symptoms include headache, fatigue, decreased ability to concentrate, tinnitus, irritability and insomnia,” said Dr. Riina Bray, an environmental health consultant. “Impacts on the heart and nervous system are also of concern.”

Bray has been working at the Provincial Environmental Health Clinic for 15 years, and she’s seen the number of people suffering adverse effects from electromagnetic exposure rising.

“We predict that the number of people who develop the symptoms I just mentioned will rise in the places where 5G is first installed,” said Bray.

 
CBCLondonMorning@LondonMorning
 
 

NEXT. 5G wireless technology is on the way. But some doctors are warning of its potential health risks. They want the province to act. We’ll talk to one of those doctors, coming up next. Riina Bray is our guest at 6:48. #ldnont More here: https://www.cbc.ca/1.5113309 

 

Professor and researcher Dr. Magda Havas is internationally recognized for her studies on the biological effects of electromagnetic pollution. She said that at high intensities these waves cause intense heat and pain because sweat glands on the surface of our skin act like mini antennas.

“At lower intensities, scientists are predicting damage to eyes, loss of insect populations which are already declining, antibiotic resistance in bacteria, and physiological effects on the nervous system and the immune system,” said Havas.

Dr. Magda Havas on 5G
Dr. Magda Havas at the Wireless Technology Symposium in Toronto, Canada on May 31, 2019. (Courtesy of Queen’s Park Gallery)

Radiation from radio frequencies is classed in the same category of carcinogens as lead.

Dr. Anthony Miller, an advisor to the World Health Organization said there’s now enough evidence that if they were to re-evaluate radiofrequency (RF) radiation, it would be labeled as carcinogenic to humans.

“Governments could not possibly ignore that,” said Miller.

Some say the scientific debate about the health effects of RF radiation is over. But the question remains: Can we afford to take this risk?

Medical doctors are requesting delayed 5G deployment until testing can be conducted on the long-term biological effects of the technology.

 

source: https://www.ntd.com/doctors-call-for-delaying-deployment-of-5g-due-to-health-risks_339335.html?fbclid=IwAR05kjHjaIZOFPBHZarvqiDCQz1pJJl-X4HE5e5wd4l4mipT9THpuBdk1kM