Feeds

Mobile phones cause ADHD in rodents

Keep that handset away from pregnant mice

High performance access to file storage

Last year mobile phone radiation was elevated by the WHO to a “possible” cause of cancer (in line with other carcinogens like pickled vegetables and coffee), frightening easily panicked punters everywhere... Now there's some more cheery news – it also induces hyperactivity in unborn rodents.

The Yale study published in Nature’s Scientific Reports (here) found that “mice exposed in-utero were hyperactive and had impaired memory.

However, it took quite a hit of radiation to produce the result: the researchers “positioned a call phone on an ‘uninterrupted active call’ above a cage containing pregnant mice, throughout their seventeen days of gestation”.

The study found that testing the brains of the exposed mice showed “reduced transmissions in the prefrontal cortex … which is responsible for executive functions by screening distractions and maintaining attention in goal-oriented behaviours”.

In short, the researchers claim, the results of the mobile phone exposure caused the mice to show signs similar to humans with ADHD.

Senior author Dr Hugh Taylor says the study provides “the first experimental evidence that foetal exposure to radiofrequency radiation from cellular telephones does in fact affect adult behaviour”.

While the study says the mice were exposed to “800 – 1900 MHz frequency radiation”, it’s less clear on whether it means the entire spectrum was used, or merely that part of the spectrum the phone was using in the active call: “muted and silenced 800-1900 MHz cellular telephones with a SAR [specific absorption rate, the standard used to measure radiation exposure – El Reg] of 1.6 W/kg”, the study states.

The researchers used light-dark tests to assess anxiety and hyperactivity, and also tested mouse memory using an environmental exploration test. The paper states that researchers assessing mouse behaviour were blind to their exposure to phone radiation.

While calling for further testing on “human or non-human primate” subjects, Taylor believes that it’s prudent to limit mobile phone exposure to fetuses during pregnancy. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.