Prove Dominic Cummings did not make second Durham trip, No 10 urged | The Guardian

Exclusive: Two of four people who say they saw PM’s aide in north-east complain to police watchdogCoronavirus – latest updatesSee all our coronavirus coverageDowning Street has been urged to provide proof that Dominic Cummings did not make a second trip to Durham during lockdown amid claims that police failed to properly investigate alleged sightings of the prime minister’s chief aide.Two of four people who claim to have seen Cummings on what would have been a second visit to the north-east of England have complained to the police watchdog, accusing the Durham force of not fully probing their claims. Continue reading…

Exclusive: Two of four people who say they saw PM’s aide in north-east complain to police watchdog

Downing Street has been urged to provide proof that Dominic Cummings did not make a second trip to Durham during lockdown amid claims that police failed to properly investigate alleged sightings of the prime minister’s chief aide.

Two of four people who claim to have seen Cummings on what would have been a second visit to the north-east of England have complained to the police watchdog, accusing the Durham force of not fully probing their claims.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more