Feeds

Tinfoil hats proven useless by eleven-year mobe radiation study

Your phone won't fry your brain, say MTHR boffins

High performance access to file storage

A long-term longitudinal study in the UK has concluded that mobile phones are safe, with the publication of a report finding “no evidence of biological or adverse health effects” from using mobiles.

The second MTHR (Mobile Telecommunications and Health Report) study is a follow-up to a prior report published in 2007. The report, officially dated 2012, was released by MTHR on February 11 – providing some hint at the amount of analysis the group has put into the study.

It's an 11-year program that along the way claims around 60 peer-reviewed journal papers.

As well as testing the impact of phones on the human body, the report also looked at base station emissions, and “found no evidence that exposure to base station emissions during pregnancy affects the risk of developing cancer in early childhood, and no evidence that use of mobile phones leads to an increased risk of leukaemia.”

The report also finds that TETRA public safety radio systems are safe. The report tested whether modulated signals are somehow more dangerous than unmodulated carrier wave frequencies, and drew another blank.

In a press release, Professor David Coggon, Chairman of MTHR, said “When the MTHR programme was first set up, there were many scientific uncertainties about possible health risks from mobile phones and related technology.

“This independent programme is now complete, and despite exhaustive research, we have found no evidence of risks to health from the radio waves produced by mobile phones or their base stations. Thanks to the research conducted within the programme, we can now be much more confident about the safety of modern telecommunications systems.”

Coggon notes that a longitudinal study, COSMOS, is going to track a large population of mobile phone users in the long term.

MTHR also says its experiments “used a wide range of tissue types” as well as a variety of endpoints, and compared handset use to hands-free use. “No effects were found in any of the experiments,” the study says. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.