Belarus opposition candidate rejects election result after night of protests | The Guardian

‘I will believe my own eyes,’ says Svetlana Tikhanovskaya after commission says Alexander Lukashenko won landslideShare your reaction on the Belarus election resultThe main opposition candidate in Belarus’s election has rejected the official results that gave President Alexander Lukashenko a landslide victory and her team has vowed to stay in the country to campaign for a change of power.“I will believe my own eyes – the majority was for us,” Svetlana Tikhanovskaya told reporters in the capital, Minsk, on Monday, after widespread reports of vote-tampering in Sunday’s election. Continue reading…

‘I will believe my own eyes,’ says Svetlana Tikhanovskaya after commission says Alexander Lukashenko won landslide

Share your reaction on the Belarus election result

The main opposition candidate in Belarus’s election has rejected the official results that gave President Alexander Lukashenko a landslide victory and her team has vowed to stay in the country to campaign for a change of power.

“I will believe my own eyes – the majority was for us,” Svetlana Tikhanovskaya told reporters in the capital, Minsk, on Monday, after widespread reports of vote-tampering in Sunday’s election.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more