Hong Kong’s Apple Daily vows to fight on after arrest of Jimmy Lai | The Guardian

Readers queued for hours to get a copy of the pro-democracy tabloid, as US secretary of state says China has ‘eviscerated Hong Kong’s freedoms’Hong Kong’s Apple Daily tabloid has responded with defiance to the arrest of owner Jimmy Lai under a new national security law imposed by Beijing, promising to “fight on” in a front-page headline above an image of Lai being detained..Readers queued from the early hours to get a copy of the pro-democracy paper a day after police raided its offices and took Lai into detention, the highest-profile arrest so far under the national security law. Continue reading…

Readers queued for hours to get a copy of the pro-democracy tabloid, as US secretary of state says China has ‘eviscerated Hong Kong’s freedoms’

Hong Kong’s Apple Daily tabloid has responded with defiance to the arrest of owner Jimmy Lai under a new national security law imposed by Beijing, promising to “fight on” in a front-page headline above an image of Lai being detained..

Readers queued from the early hours to get a copy of the pro-democracy paper a day after police raided its offices and took Lai into detention, the highest-profile arrest so far under the national security law.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more