James Murdoch has left News Corp, but not much will change at the company’s Australian outlets | Denis Muller | The Guardian

Aside from climate change, James’s public record shows him to share most of his father’s and brother’s worldviewIt seems unlikely that James Murdoch’s departure from the News Corporation board will make any difference to the outlook and style of the company’s Australian newspapers or its Sky News pay TV channel.James has been on the outer at the top of the Murdoch organisation since its UK subsidiary, News International, was disgraced in 2011 over the hacking of people’s phones. James was executive chairman of News International at the time. Continue reading…

Aside from climate change, James’s public record shows him to share most of his father’s and brother’s worldview

It seems unlikely that James Murdoch’s departure from the News Corporation board will make any difference to the outlook and style of the company’s Australian newspapers or its Sky News pay TV channel.

James has been on the outer at the top of the Murdoch organisation since its UK subsidiary, News International, was disgraced in 2011 over the hacking of people’s phones. James was executive chairman of News International at the time.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more