“Keeping quiet about medical wrongdoing”

Friday, May 31, 2013-Fear and Loathing in Bioethics
http://loathingbioethics.blogspot.com/2013/05/keeping-quiet-about-medical-wrongdoing.html

“Once a case of wrongdoing is put in the hands of bureaucrats whose job description is to protect the finances and reputation of the institution, it should be no surprise that they do their jobs. Yet their success depends on the silence of many others.”

http://www.hhs.gov/ohrp/policy/engage08.html

For the purpose of concealment in HSR
I wonder if the confedrates in resarch often include “friends and family”:

“For purposes of this document, an institution’s employees or agents refers to individuals who: (1) act on behalf of the institution; (2) exercise institutional authority or responsibility; or (3) perform institutionally designated activities. “Employees and agents” can include staff, students, contractors, and volunteers, among others, regardless of whether the individual is receiving compensation.”

“If you see something,say something”:
https://www.change.org/petitions/governor-mark-dayton-of-minnesota-investigate-psychiatric-research-misconduct-at-the-university-of-minnesota-2
http://www.alltrials.net/

dung beatles in need of purging:
https://notessimple.wordpress.com/over-the-cliff-we-go/

showtrial:
https://notessimple.wordpress.com/the-japanese-take-on-neuroethics/

Zersetzung,confederates and the creation of uncivil society-a dire warning from the past:
https://en.wikipedia.org/wiki/Stasi#Zersetzung

Compair zersetzung and intervention:

““Intervention includes both physical procedures by which data are gathered (for example, venipuncture) and manipulations of the subject or the subject’s environment that are performed for research purposes. Interaction includes communication or interpersonal contact between investigator and subject. Private information includes information about behavior that occurs in a context in which an individual can reasonably expect that no observation or recording is taking place, and information which has been provided for specific purposes by an individual and which the individual can reasonably expect will not be made public (for example, a medical record). Private information must be individually identifiable (i.e., the identity of the subject is or may readily be ascertained by the investigator or associated with the information) in order for obtaining the information to constitute research involving human subjects.”

“Tactics employed under Zersetzung generally involved the disruption of the victim’s private or family life. This often included breaking into homes and messing with the contents – moving furniture, altering the timing of an alarm, removing pictures from walls or replacing one variety of tea with another. Other practices included smear campaigns, denunciation, provocation, psychological warfare, psychological subversion, wiretapping, bugging, mysterious phone calls or unnecessary deliveries, even including sending a vibrator to a target’s wife. Usually victims had no idea the Stasi were responsible. Many thought they were losing their minds, and mental breakdowns and suicide could result.

One great advantage of the harassment perpetrated under Zersetzung was that its subtle nature meant that it was able to be denied. That was important given that the GDR was trying to improve its international standing during the 1970s and 80s.

Zersetzung techniques have since been adopted by other security agencies, particularly the Russian Federal Security Service (FSB).[28]”
https://en.wikipedia.org/wiki/Stasi#Zersetzung

Advertisements
This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s