Browse Definitions :
Definition

electrical pollution (dirty electricity)

Contributor(s): Stan Gibilisco

Electrical pollution is electromagnetic-field (or EM-field) energy emanating from electrical wiring. In most places, the majority of this energy exists at 60 Hz (hertz), resulting from the AC (alternating current) that constantly flows in the utility wiring outdoors, indoors, and inside common appliances.

Not all of the energy in utility electricity occurs at the standard AC frequency of 60 Hz (50 Hz in some locations). Emissions also take place at various other frequencies. These emissions, sometimes called dirty electricity, result from the use of appliances that generate irregular waveforms and transmit the resulting currents into the utility wiring. Vacuum cleaners, hair dryers, fluorescent lamps, and some consumer electronic devices produce this type of energy.

In recent years, controversy has arisen concerning alleged adverse health effects from electrical pollution. Some scientists believe that electrical pollution has been a major cause of human ailments ever since the very first use of AC utility electricity (around the year 1900). Others deny that any conclusive evidence exists for adverse health effects in humans.

Various software can produce a spectral display of electrical pollution on just about any computer. The EM energy appears and fluctuates in frequency as you turn on, for example, a big vacuum cleaner.

Here's a screenshot of a spectral display of dirty electricity using a program called HamScope:

 

Watch a video that explains how to test your home for dirty electricity:

This was last updated in June 2012

Continue Reading About electrical pollution (dirty electricity)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close