‘As the tundra burns, we cannot afford climate silence’: a letter from the Arctic | Victoria Herrmann | The Guardian

I study the Arctic. The decision to withdraw from the Paris climate accord is reprehensible – but we can’t give up hopeWhen you stand facing an exposed edge of permafrost, you can feel it from a distance.It emanates a cold that tugs on every one of your senses. Permanently bound by ice year after year, the frozen soil is packed with carcasses of woolly mammoths and ancient ferns. They’re unable to decompose at such low temperatures, so they stay preserved in perpetuity – until warmer air thaws their remains and releases the cold that they’ve kept cradled for centuries. Continue reading…

I study the Arctic. The decision to withdraw from the Paris climate accord is reprehensible – but we can’t give up hope

When you stand facing an exposed edge of permafrost, you can feel it from a distance.

It emanates a cold that tugs on every one of your senses. Permanently bound by ice year after year, the frozen soil is packed with carcasses of woolly mammoths and ancient ferns. They’re unable to decompose at such low temperatures, so they stay preserved in perpetuity – until warmer air thaws their remains and releases the cold that they’ve kept cradled for centuries.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more