New Genoa bridge reopens, two years after deadly collapse – video report | The Guardian

Two years after part of Genoa’s Morandi motorway bridge collapsed, killing 43 people, a new structure was opened in its place on Monday. The new Genoa San Giorgio bridge, designed by local architect Renzo Piano, was inaugurated in a ceremony which included a flyover and was attended by the president, Sergio Mattarella, and the prime minister, Giuseppe Conte, who called the new structure the result of “Italian genius”. The celebrations have been criticised by victims’ families who declined to attend but had a private meeting with Mattarella beforehandGenoa bridge collapse: relatives criticise inauguration ‘celebration’ Continue reading…

Two years after part of Genoa’s Morandi motorway bridge collapsed, killing 43 people, a new structure was opened in its place on Monday. The new Genoa San Giorgio bridge, designed by local architect Renzo Piano, was inaugurated in a ceremony which included a flyover and was attended by the president, Sergio Mattarella, and the prime minister, Giuseppe Conte, who called the new structure the result of “Italian genius”. The celebrations have been criticised by victims’ families who declined to attend but had a private meeting with Mattarella beforehand

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more