Feeds

China bites back in transplant trade scandal

Prisoners parts? Says Hu?

Bridging the IT gap between rising business demands and ageing tools

A growing firestorm surrounds China's reported selling of organs harvested from prisoners it puts to death. Today China fired back at the widely reported statement by The British Transplantation Society criticising it for taking organs from its many executed prisoners without permission.

Speaking at a news conference Chinese Foreign Ministry spokesman Qin Gang sniped: "I want to remind this organization not to forget that a few years ago this kind of thing happened in Britain." Qin did not detail what he meant by this.

The British Transplantation Society (BTS) chose the visit of Chinese president Hu to the US to issue a strong statement on the secretive trade.

They said organs are bought and sold in a racket that involves transplant centres, patients, the authorities and the judiciary responsible for the prisoners. Adding the doctors' voices to that of human rights groups, BTS Ethics Chairman Stephen Wigmore said: “BTS condemns unreservedly any activity that transgresses an individual's human rights or involves the coercion of an individual to become an organ donor.”

Chinese officials deny the allegations of coercion. They say organs from executed prisoners have sometimes been used, but only with prior permission and in a very few cases. In March Qin said: "It is a complete fabrication, a lie or slander to say that China forcibly takes organs from the people given the death penalty for the purpose of transplanting them.”

The BTS reckons an “the accumulating body of evidence” says otherwise.

Bush is being urged to put pressure on Chinese President Hu when they meet today in Washington. A subcommittee of the House International Relations Committee heard evidence about the transplant organ trade Wednesday.

Beijing has promised to outlaw the cash trade in organs from July. It says written consent will now always be required from donors.®

Mobile application security vulnerability report

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.