To introduce smart health in Wuhan, and provide some references for other cities. As the largest mega-city in central China, Wuhan is investing large amounts of resources to push forward the development of Smart Wuhan and Health Wuhan, and it has unique features. It is one of the centerpieces of China’s New Healthcare Reform, and great hope is put on it to help solve the conflict between limited healthcare resources and the large population of patients. How to plan and design smart health is important. The construction of Wuhan Smart Health includes some aspects as follows, like requirement analysis, the establishment of objectives and blueprint, the architecture design of regional health information platform, evaluation and implementation, problems and solutions, and so on. Wuhan Smart Health has obtained some achievements in health network, information systems, resident’s health records, information standard, and the first phase of municipal health information platform. The focus of this article is the whole construction process of smart health in Wuhan. Although there are some difficulties during this period, some smart health services and management have been reflected. Compared with other cities or countries, Wuhan Smart Health has its own advantages and disadvantages. This study aims to provide a reference for other cities. Because smart health of Wuhan is characteristic in construction mode. Though still in the initial stage, it has great potentials in the future.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for Australia
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Dobalian, A., Claver, M.L., Pevnick, J.M., Stutman, H.R., Tomines, A., and Fu Jr., P., Organizational challenges in developing one of the nationwide health information network trial implementation awardees. J. Med. Syst. 36(2):933–940, 2012.
Ramanathan, N., Swendeman, D., Comulada, W. S., et al., Identifying preferences for mobile health applications for self-monitoring and self-management: Focus group findings from HIV-positive persons and young mothers. Int. J. Med. Inform. 82(4):e38–e46, 2013.
Hao, L., Lei, X., Yan, Z., & ChunLi, Y., The application and Implementation research of Smart City in China. In System Science and Engineering (ICSSE), 2012 International Conference on (pp. 288–292). IEEE, 2012.
Hvistendahl, M., China pushes the “internet of things”. Science. 336(6086):1223–1223, 2012.
Saboury, A., Ghaffari-Nasab, N., Barzinpour, F., et al., Applying two efficient hybrid heuristics for hub location problem with fully interconnected backbone and access networks. Comput. Oper. Res. 40(10):2493–2507, 2013.
Park, H.S., Shin, Y., Choi, S.W., et al., An integrative structural health monitoring system for the local/global responses of a large-scale irregular building under construction. Sensors. 13(7):9085–9103, 2013.
MC and MF conceived the study. MF searched and checked the databases according to keywords and terms, extracted retrieval results and assessed their quality. MC and MF made questionnaire, and completed the survey. JS and BZ provided the important materials. MC and MF wrote the draft of the paper. All authors contributed to writing, reviewing or revising the paper and read and approved the final manuscript. MC is the guarantor of this work and had full access to all the data in the study and takes responsibility for its integrity and the accuracy of the data analysis. The authors would like to thank all the anonymous reviewers for their helpful advice.
School of Medicine and Health Management, Tongji Medical College, Huazhong University of Science and Technology, Wuhan, Hubei, 430030, China
& Min Chen
Department of Planning and Legal System, Health and Family Planning Commission of Wuhan Municipality, Wuhan, Hubei, China
Union Hospital, Tongji Medical College, Huazhong University of Science and Technology, Wuhan, Hubei, China
Professor Shoshana Zuboff speaks about Silicon Valley shadow operation. We won’t get the data. Hi-Tech claim data they take from our lives without our permission, private lives without permission, analyse data, took it, illegitimate profit. Bypassing our awareness. Without consent.
I, Susan Carew, do not consent to any extraction of my data or the residual data in order for companies/government/intelligence to predict my behaviour with the objective of selling to me, controlling me or suppressing my democratic rights. I will not use a iPhone ever as it takes away my rights, distracts me from my life and purpose, and exposes me to radiation which likely causes cancer and health damage. I do not consent to other radiation emitters around me as it impacts my health and safety. Moreover, the rampant consumption is the outcome of data usage mapping our lives and is the very core issue of ecological collapse. I cannot participate in the destruction of my planet or imprisonment of human society as a global citizen. Today is my birthday and it is the gift I give to myself.
Surveillance capitalism is embedded in infrastructure projects to control the population. We are addicted to our iPhones and this is the foundation for a system of control that will not serve people but public/private partnerships to further industry. The previous blog explains the serious health effects of using iPhones emitting radiation.
Whenever you bring up ‘surveillance of phones’ in a conversation often the counter argument will quickly state: “I have nothing to hide” which is a misconception and a form of denial where the person doesn’t want to go there as they depend on their phone. They don’t question their learned dependency.
I was at the railway station today. It is a recent infrastructure project where the station was raised above a road and enlarged with surveillance equipment evident. I saw at least 15 cameras and then the LED lights which can also surveil. I saw the free public phone (recently made free). I found myself standing out of the view of cameras as I didn’t want facial recognition given my privacy. I have had surveillance happen to me when I went to a Senate inquiry in Canberra called the Inquiry into the impact of the exercise of law enforcement and intelligence powers on the freedom of the press. The hearing I went to was intelligence agencies talking about this topic. In addition, a few months earlier walked to Parliament to make homelessness visible. I am also a former community radio person, analyst and advocate for peace education. When I walked through a public square a light came on brightly in a public space as I walked through the space. I was the only person there. I saw police insignia on the camera. I knew it was facial recognition and I was uncomfortable as I feel my democratic right to participate is being targeted. My mother was stopped by the police a short time after, in the car I had driven to the inquiry. So the technology in my view can adversely impact those of us advocating for democracy and a better world.
Shoshana Zuboff indicates we willingly give our personal information believing that information is under our control, which we do not. We provide this personal information is the least important part of the information they collect about us according to Shoshana Zuboff.
Placing our heads in the sand is not an option if you want democratic freedom. If you wish to be a cyborg then just keep burying your head in your iPhone to avoid the reality of your life and courageously facing challenges to awaken and become aware.
key points and notes:
Google earth was a CIA start up;
surveillance capitalism is also offline;
we don’t know the predictive implications;
supermarket chain knew a woman was pregnant before she did;
predict personality, sexual orientation, political orientation – range of things we didn’t intend to reveal;
residual knowledge upload photos – Facebook photos, predictive signals companies can lift from photos;
algorithms facial recognition software;
predicting human behaviour and predictions are sold;
data sold to anyone, could be used for oppression;
facial photos facilitate totalitarian regimes;
processes disguised and operate in stealth;
engineered to be indecipherable to create ignorance in vast group of users;
Facebook massive scale contagion experiments, subliminal cues planted in Facebook pages influence offline real world;
two key findings manipulate subliminal cues to change real world behaviour and emotion, we can exercise this power and methods whilst BYPASSING USER AWARENESS;
Pokemon,go https://www.pokemongo.com/en-au/ – invented by Google. Google the inventor of surveillance capitalism – John Henke;
Invented keyhole which is a CIA Google Earth start up. Pokémon is not a happy game, they brought it to market, the big game on top of little game precisely emulates logic of surveillance capitalism. Sell click through rate pays for clicks on website, click to buy button. Paid for real world equivalent (footfall) to get real bodies into businesses. Buy lure modules;
Use rewards and punishment of game to herd you to the city for those paying for your body to turn up, the real game is to get you to spend, we predict where you will be, it is of value when it works;
You believe you are being served, you will not notice or complain. The shadow operation will remain hidden, you will not ask questions;
Want to know about your walk in the park, what you are doing in car, your home etc;
Net security system has a microphone built into it, voices, conversations, watching t.v., who is visiting, shouting over breakfast – predictive value;
Google’s business to misdirect to engineer ignorance in mechanism undetectable, if confronted deny until habituate;
Don’t have to think;
We give consent, privacy, your device held hostage to you agreeing, we maintain functionality, third parties will do what they do;
Third parties have no responsibility;
Silicon valley surveillance capitalism broke through in 2002;
More money came from surveillance capital;
Google acquired android, made great margin, rich. Make iPhone cheap, get price down, more on the iPhone more, facebook used network drones (growing markets);
Facebook’s intention doesn’t share information on how company works. Facebook Australia told its business customers that it has so much data about 6.6 million young adults and teenagers, predict mood shifts, stressed, fatigue, frightened. We can alert you when they need a CONFIDENCE BOOST, the exact moment when they are likely to need this. Send advert for a sexy black jacket (going on a date). Peak vulnerability.
2018 – Chris Whiley – Cambridge Analytica – analysed 18 million citizens. They wanted to understand their inner demons, how to target their demons, fear, anger, paranoia, trigger emotions manipulate them to click on website, join group, what to read, who to hang out with, who to vote for. Manipulate innocent young people. From commercial to political outcomes. Cambridge Analytica is a parasite on a huge host surveillance capitalism;
Mark Zuckerberg announces future of privacy, fear of litigation, not genuine;
When on facebook there is no right to privacy, no expectation of privacy they think;
VPN – send data via private networks;
Amish example of simplicity. Technology we use, not to control us.
This is a real issue, particularly in the hands of industry and members of the public. There is a range of information provided below and videos. The one that concerns me is the 8 year old child who a hacker spoke to in her bedroom. What if this person is a paedophile?
The article below provides solutions on how to avoid surveillance and what to be aware of.
Is your cell phone spying on you? Even if it is, does it really matter? You’re no criminal, right? Should you protect yourself in any case? In this guest post, Lois Cadwallader answers all these questions and more and shares 15 ways you can protect yourself from this personal intrusion:
Have you ever had the feeling that “someone is listening?” Well, they are. And it’s more than just your cell phone. Most newer electronic devices are seeded with sensors.
What’s interesting, is the smartphone has probably become the most important personal identifier and locator. Think about it. What do most people have with them always? Their phones.
How do smartphones provide surveillance? They:
Log personal data
I recently had my own experience with this. I carry my phone on airplane mode with Bluetooth and WiFi off to safeguard against exposure to electromagnetic radiation. (Find more information on Bluetooth radiation dangers here.)
I had turned my phone back on to check for messages and saw a friend zipping along on a bike path. “Diane Day! Diane Day,” I called out loudly. Well, she was riding so fast that she didn’t hear me. But someone else did.
Within a few hours, I had a personal message from her on Facebook … but it was suspicious. It didn’t sound like her. Sure enough, it was a hacker. Coincidental? Maybe. But the timing is just too close. I can’t help but wonder if my phone picked up her name, associated her with my Facebook friend, and someone went phishing.
I’d be interested in hearing your stories, please share in the comment section below.
It’s not just our smartphones.
Let’s take home managers, or smart speakers. Apple and Google admit that Alexa and Siri spy on you. Employees listen in on conversations, but only to monitor and improve the system, so they say. Industry claims the sampling is very small, and that they have in place strict anti-abuse regulations. [1,2,3]
And even more disturbing, the very systems we use to protect our homes may be the instruments of surveillance and invasive contact. An alarming report just surfaced about a hacker speaking to a young girl through the smart speaker in her bedroom. This video is downright creepy.
Even when the GPS is turned off, your location can still be established using cell tower triangulation. Although this is not exactly “pin-pointing” it can get pretty close. This could be used for good or bad, depending on who wants to know your whereabouts. 
They Log Personal Data
Your smartphone and other smart devices collect, analyze, and record thousands of interactions every day. It is no secret that this information is available to 3rd party advertisers. But it’s for “your benefit” – It’s like having a “personal shopper” hunt out the best deals for you.
Google says they don’t “sell” your personal information. They just place advertisements in your purview, based on your trends and search history. 
And Apple boasts, “What happens on your iPhone stays on your iPhone.” However, a NY Post investigator begs to differ.
Are You OK With Massive Data Collection And Retention?
What About Hackers?
In the article, “Smart Homes Might be Getting too Smart. Start Worrying,” the author makes the stunning point that the danger is not just that hackers could know when you are on vacation and hack your smart lock and break into your home. That’s bad enough. But also there is the broader danger that hackers could commandeer hundreds of thousands of smartphones and smart devices to request access to a bank, social media platform, or government agency, thus forcing a DDoS (Distributed Denial of Service) attack. 
This is actually what happened in the 2016 Mirai botnet that crashed the web. 
Isn’t Being Connected A Good Thing?
In the book, Owned: Property, Privacy and the New Digital Serfdom, by Joshua A. T. Fairfield, 2017, the author discusses what it means that our environment is seeded with more sensors than ever before. 
Our dishwashers, smart televisions, internet-enabled home thermostats, smart meters, Fitbits and smartphones constantly gather information about us and our environment.
Who owns that information? You might be surprised at the answer.
When you purchase a smartphone or any smart device you relinquish ownership of your personal information. Industry owns your personal information. It is buried in hard-to-read, small-font terms-of-service agreements.
5G will only make it worse, as the sensors and transmitters are brought closer and closer, right into our neighborhoods, connecting all of the smart gadgets in the smart homes. This is not just “real time” listening. There is huge data collection, analysis, and retention by government and industry. [10,11]
Why? You guessed it. There is nothing new under the sun.
Money and power, money and power, money and power.
Money, Money, Money
Technology is a trillion dollar business. Industry and government are riding high on the enormous profits. Smartphone ownership is fast becoming a “right” and a “necessity” for life. Ask any person under 50 years old, “What’s the one thing you cannot and will not go without?” The answer is usually, “My phone.”
So, we now have a product with almost 100% dependence for both business and personal use. And the consumer is more than happy to pay for the latest smartphone upgrade.
American companies alone are estimated to have spent over $19 billion in 2018 acquiring and analyzing consumer data, according to the Interactive Advertising Bureau. [12,13]
And Then There’s Power.
They would need an Infra-structure in place for surveillance and compliance assurance.
They would need to control technology in order to control information.
They would need to control financial transactions.
They would need to control the military.
Food, prescriptions, electricity, fuel, etc., all controlled by technology.
They would want to keep the population dependent (if not addicted) to the services under their control.
In short, they would need surveillance, surveillance, surveillance.
Where could this possibly be going? Dr. Jeremy Naydler, author and philosopher writes about the disturbing scenario of the global electronic intelligence in, “5G – The Big Picture.” 
And check out this edgy film, 5G APOCALYPSE – THE EXTINCTION EVENT. It is a full-length documentary by Sacha Stone exposing the 5G existential threat to humanity. OK, it might be a little hyperbolic. But if even half of this is true, yikes!
The power of artificial intelligence and other advanced technologies will be enormous. Vladimir Putin said, those in possession of artificial intelligence will rule the world. The processing speed and knowledge base of artificial intelligence will be so great, it will seem all-knowing to most. 
And President Trump states in the National Security Report, “We will improve America’s digital infrastructure by deploying a secure 5G Internet capability nationwide. These improvements will increase national competitiveness, benefit the environment and improve our quality of life.” 
Linked to a global network of cameras and audio devices, made of non-biological materials, artificial intelligence will appear to be omnipresent, omnipotent, and immortal. Those acquainted with biblical prophecy speculate that AI will be the platform for the one-world dictator. 
There’s a race for technological domination because that equals power. And surveillance is a necessary part of it.
But I’m Not A Criminal
The thinking goes something like this, “If I’m not engaged in any criminal behaviors, I shouldn’t mind if I’m monitored. Surveillance keeps us all safer from crime and terrorism.”
To be fair, there are some benefits to this “tracking” involving safety, identifying medical emergencies, solving crimes, finding missing persons, etc.
So, why should you care? One word. China.
China is using smart phones and other smart devices to massively spy on its citizens. They assign a “Social Credit Score” to base reward and punishment. [18,19,20,21]
“It could never happen here.” Famous last words.
Silicon Valley is already building a Chinese-style social credit system.  And one could argue that in the US there is already an un-written social credit system solidly in place, just waiting for the right people to implement its rewards and punishments.
It all sounds a little far-fetched; conspiratorial. But still, it should give reason for pause and reflection. How much of our privacy are we willing to relinquish for the sake of convenience? What are we exchanging for ultra-connectivity? And is it worth it?
Is There Anything We Can Do?
Here are 15 steps you can take to reduce the spy-factor in your life.
1 – Unplug
Unplug, turn off, disconnect as much as possible.
2 – Be Aware Of Your Appliances
Seek out older models of appliances that do not have a WiFi feature or dis-arm the WiFi component of new appliances. This is difficult, but possible with a little bit of research. (Still confused about the dangers of WiFi? Read this article on why WiFi is not safe.)
3 – Keep Airplane Mode On And WiFi And Bluetooth Off
If you are “EMF savvy,” you know that other than completely powering off, the only safe way to carry a cell phone on your body is to:
Turn Airplane mode ON
Turn Bluetooth and WiFi OFF
This shuts down all electromagnetic energy. And of course, shuts down all transmission and reception. Thus, you are un-connected. So, you must check for messages periodically.
You can still use other features, like calendar and camera. And you can still access downloaded items.
But beware!Some of the newer phones (and tablets) have an automatic re-connect feature. So, you must double check to ensure that Airplane mode is ON and Bluetooth and WiFi remain OFF when your phone or tablet is close to you. These devices “want” to be connected and are programmed to do so. Learn about cell phone radiation protection here.
A “Faraday Bag” is another option for carrying your phone.
4 – Get A Meter
What about the sneaky factor? Since most phones have a sealed battery that can no longer be removed, one cannot really know if it is truly “off.” The only way to be assured that there is no beacon signal emitting from your phone or appliances is to meter.
You can do that yourself quite easily with the right kind of meter.
And as we progress deeper and deeper into the mesh of electronic surveillance, now might be a good time to acquire a meter.
5 – Use A Land-line
Many of my friends no longer have a wired telephone line. We still keep ours. I don’t know how much longer they will even be available. But, I recommend if you have a land-line, keep it. If you do not have one, inquire as to whether or not you can install one. Important – This should be completely wired with no additional wireless hand set.
They are fun…convenient. They are all the “new rage” in technology. But come on’ – do we reeeeeally need them? And do we really want them listening, locating, logging? I say, no!
7 – Be Mindful
Smart devices, appliances, electronic key fobs, and even toys are always listening. And sometimes even recording.
8 – Use Technology Against Technology
There are a few products that claim to block techno-spies. I have not checked them out yet. Worth a look. Use webcam and microphone blockers and anti-malware software. When browsing the internet, go “incognito.”
9 – Check Privacy Options If You Use Social Media
Use social media with caution. Be sure you are aware of and use privacy options. You need to check these periodically, as they do change.
You can take it a step further and have your social media presence scrubbed. While you can delete your Facebook account relatively easily, getting these firms to remove your information is time-consuming, complicated, and sometimes impossible. In fact, the process is so burdensome that you may want to consider paying a service to do it on your behalf.
10 – Hardwire As Much As Possible
Hardwire your computer, mouse, printer, etc. Wired is more secure than wireless as there is less chance of someone intercepting.
11 – Install Anti-Virus Systems On All Wireless Devices
Although not 100% fail-proof, they do make it difficult for hackers to intrude into your technology devices.
12 – Go To Advanced Security And Privacy Solutions
There are ways to disable the “listening” function of your smartphone and smart devices. There are also ways to delete your recorded information. Takes some research. I have not done this yet. I hear that it is difficult, but doable. My next project.
13 – Simplify
While cutting-edge technology can be exhilarating, there is something attractive about slow and simple living. Spend more time in the wilderness where there are no sensors. There is something restorative about the natural world and a small footprint.
14 – Take A detailed Audit Of Every Possible Source Of Surveillance In Your Home.
Bill shares over 30 pages of up-to-date information from his annual visit to the Consumer Electronics Show in Las Vegas. You may be surprised how many things in your environment have turned “smart” and could be used as a surveillance tool, even when turned off.
15 – Some Would Say Completely Eliminate Technology
This is difficult. And I admire the purists. I really do. But to run a business in the modern world, I have to use a pc and smart phone. If you are completely retired and don’t need electronics, it might be doable. You also might be able to move to a rural area. That would be ideal.
We may not be able to avoid surveillance entirely. But we can reduce the spy factor by taking some simple steps. Do what you can do today.
Many thanks to Lois Cadwallader for this guest post.
Author bio: Lois Cadwallader, MA, has been a professional educator all her life. She lives in Las Vegas, Nevada and enjoys volunteering in after-school clubs, hiking and cycling. She is the co-author of Exposed: The Electronic Sickening of America and How to Protect Yourself.
In the public interest. 5G is not safe and requires further testing.
I note statements being made in the media today, that RT (Russian media) is spreading propaganda about 5G. This is not true, there are others in the global community who concur about the health impacts of 5G. Experts in Canada indicate there is no evidence the 5G technology is safe. There is evidence of the health effects and that it is a potential Carcinogen.
So what is the truth about 5G?
The telecom industry have not indicated that these are new technologies that have not been tested. Refer Tom Wheeler in the next blog. I will post APaul Fletcher (Communication Minister’s) in Australia’s statement about 5G.
The Wireless Technology Symposium in Toronto, Canada forum on Wireless Technology with a focus on 5G.
Local planning authorities and the public have no say.
Advertising about 5G new frequency never tested for long term biological and health affects
Used in airport scanners and US military – crowd control.
High intensities cause intense heat and pain
Sweat glands act like mini antennae
lower frequencies damage to eyes, loss of insect populations (declining), anti-biotic and bacteria, physiological affects on the immune and nervous system
microwave levels trillions of times higher then they were 50 years ago
radiate 24 hours a day, constant exposure
cell phones,tables, wifi, video games, smart meters, smart appliances etc.
electromagnetic sensitivity (pollution)
Dr Bray’s Environmental Health Clinic as many as 1 million people are sensitive, likely to increase with exposure
Major symptoms – insomnia, chronic fatigue, mood disorders, poor short term memory, difficulty concentrating, depression, heart palpatations (interpreted as anxiety). Symptoms: skin problems, nose bleeds, elevated blood sugar, extreme cases loss of conscientious,
Microwave frequencies shown in scientific studies contribute to cancer and damage sperm.
Scientists and medical doctors across US and UK requesting delayed deployment until testing conducted on long term biological effects of 5G technology.
Scientific debate about health effects of microwave over. Microwave radiation levels exposure adversely affecting human health of that there is no doubt.
Current debate can we afford the health costs that will occur with roll out of 5G
Federal government failed to protect us from rising levels of microwaves, downloading financial fallout onto the provinces to pay for health costs.
Adopt Precautionary Approach to 5G until we better understand the consequences of this technology.
Dr. Miller (2011 WHO, International Agency for Research on Cancer, classified radio frequency radiation that the blanket name signal (cellphones, wifi, towers) class 2B possible carcinogen
Evidence available state wireless radiation may give you cancer
Anthony Miller reviewed evidence
National Health Scientist for Canadian Government
Medal of Honour for research on cancer
(Miller) Associated International Agency for research on cancer recommended the WHO list all radio frequency radiation, radiation that powers cellphones, wifi as possible carcinogen, 2B, list of possible carcinogens includes lead and DDT (2011)
Classification based on epidemiology
Human and animal. Human new analysis – Interphone, updated analysis studies in Sweden. Sweden first countries to introduce cell phones, demonstrated the longer exposure the greater the risk
Learned that we should not allow companies to introduce new chemicals without first being tested for carcinogenicity. Same for radiation.
Two studies in last 10 years reported last year 1) national toxicology program in the United States (animal) Ramazzini institute in Italy – prolonged exposure increases the risk to cancer. Cancer similar to cancer in humans. Radiation increases damage to DNA, then risk of cancer increases substantially.
Prevent introduction of 5G
Doctors, Experts Call for Delaying Deployment of 5G Due to Health Risks
Posted on June 27 2019
TORONTO, Canada—Although 5G, or fifth generation wireless technology, promises faster download speeds and conveniences that most of us have never dreamed of, we’ll also be blanketed with a new type of radiation called “millimeter waves,” according to health experts who warn of the rising risks associated with the rollout of 5G.
At the Wireless Technology Symposium in Toronto on May 31, experts discussed evidence of adverse health effects from 5G technology and answered questions from the audience.
“It’s not been made clear to the public that 5G won’t just be another number and a letter on your cell phone,” said Frank Clegg, former president of Microsoft Canada. “It requires an entirely new infrastructure of thousands of small cellular antennas to be erected throughout the cities where it’s going to be installed.”
What would 5G infrastructure look like? Small cell antennas could be placed as close as every third utility pole.
Scientists from 42 countries are warning their governments about the emerging health problems associated with wireless radiation, and Canadian doctors and scientists have added their concerns.
“The most prevalent symptoms include headache, fatigue, decreased ability to concentrate, tinnitus, irritability and insomnia,” said Dr. Riina Bray, an environmental health consultant. “Impacts on the heart and nervous system are also of concern.”
Bray has been working at the Provincial Environmental Health Clinic for 15 years, and she’s seen the number of people suffering adverse effects from electromagnetic exposure rising.
“We predict that the number of people who develop the symptoms I just mentioned will rise in the places where 5G is first installed,” said Bray.
NEXT. 5G wireless technology is on the way. But some doctors are warning of its potential health risks. They want the province to act. We’ll talk to one of those doctors, coming up next. Riina Bray is our guest at 6:48. #ldnont More here: https://www.cbc.ca/1.5113309
Professor and researcher Dr. Magda Havas is internationally recognized for her studies on the biological effects of electromagnetic pollution. She said that at high intensities these waves cause intense heat and pain because sweat glands on the surface of our skin act like mini antennas.
“At lower intensities, scientists are predicting damage to eyes, loss of insect populations which are already declining, antibiotic resistance in bacteria, and physiological effects on the nervous system and the immune system,” said Havas.
Radiation from radio frequencies is classed in the same category of carcinogens as lead.
Dr. Anthony Miller, an advisor to the World Health Organization said there’s now enough evidence that if they were to re-evaluate radiofrequency (RF) radiation, it would be labeled as carcinogenic to humans.
“Governments could not possibly ignore that,” said Miller.
Some say the scientific debate about the health effects of RF radiation is over. But the question remains: Can we afford to take this risk?
Medical doctors are requesting delayed 5G deployment until testing can be conducted on the long-term biological effects of the technology.