Former Labour donors returning to party under Keir Starmer | The Guardian

Several former financial backers report rejoining, with some ‘ready to give again’ in wake of Jeremy Corbyn’s departureFormer Labour donors who had abandoned the party are already considering renewing their support under Keir Starmer’s leadership, it has emerged.Figures who have given the party large sums in the past said they had rejoined Labour, with one major donor saying they were already prepared to give again. Another former supporter said there was “a long road” ahead after allegations of antisemitism in the party, but that they had been impressed with Starmer’s start. Continue reading…

Several former financial backers report rejoining, with some ‘ready to give again’ in wake of Jeremy Corbyn’s departure

Former Labour donors who had abandoned the party are already considering renewing their support under Keir Starmer’s leadership, it has emerged.

Figures who have given the party large sums in the past said they had rejoined Labour, with one major donor saying they were already prepared to give again. Another former supporter said there was “a long road” ahead after allegations of antisemitism in the party, but that they had been impressed with Starmer’s start.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more