Beirut explosion: Lebanon security forces fire tear gas at protesters as anger mounts over blast | The Guardian

State media says several people were injured in protests as country’s ambassador to Jordan resigns over ‘state negligence’Blast timeline: what we know, and what we don’t‘None of them this time’: Lebanese vow not to let leaders off hookLebanese security forces fired tear gas at demonstrators in Beirut, as rage over the country’s leadership grew following a massive explosion that laid waste to large parts of the capital on Tuesday.State media reported late on Thursday that security forces confronted dozens of anti-government protesters in central Beirut Some in the small protest were wounded, the National News Agency, NNA, reported. Continue reading…

State media says several people were injured in protests as country’s ambassador to Jordan resigns over ‘state negligence’

Lebanese security forces fired tear gas at demonstrators in Beirut, as rage over the country’s leadership grew following a massive explosion that laid waste to large parts of the capital on Tuesday.

State media reported late on Thursday that security forces confronted dozens of anti-government protesters in central Beirut Some in the small protest were wounded, the National News Agency, NNA, reported.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more