Boris Johnson’s list of lords is a disgrace | Simon Jenkins | The Guardian

The way members of our second chamber are chosen casts a pall of corruption over WestminsterBoris Johnson’s latest nominations to the House of Lords are shameless. This is no reflection on the individuals concerned, merely on the decrepit state of the constitution that selects them, and on the man who is its current custodian.It reminds us of a theory constantly denied, but often posed: that membership of the British parliament can effectively be purchased. No British minister should ever have the gall to accuse foreign countries of corruption as long as this stain hovers over Westminster’s democracy. Continue reading…

The way members of our second chamber are chosen casts a pall of corruption over Westminster

Boris Johnson’s latest nominations to the House of Lords are shameless. This is no reflection on the individuals concerned, merely on the decrepit state of the constitution that selects them, and on the man who is its current custodian.

It reminds us of a theory constantly denied, but often posed: that membership of the British parliament can effectively be purchased. No British minister should ever have the gall to accuse foreign countries of corruption as long as this stain hovers over Westminster’s democracy.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more