Robert Jenrick says concerns over planning overhaul are ‘nonsense’ | The Guardian

Housing secretary dismisses warnings that shake-up would create a ‘generation of slums’Warnings that proposals for the biggest shake-up of planning in decades would pave the way for “the next generation of slums” have been described by the housing secretary, Robert Jenrick, as “nonsense”.The long-awaited planning white paper – envisaging land across England being divided into three categories: for growth, renewal or protection – was published on Thursday and has already provoked controversy, with concerns expressed that democratic oversight would be diluted and affordable housing cut back. Continue reading…

Housing secretary dismisses warnings that shake-up would create a ‘generation of slums’

Warnings that proposals for the biggest shake-up of planning in decades would pave the way for “the next generation of slums” have been described by the housing secretary, Robert Jenrick, as “nonsense”.

The long-awaited planning white paper – envisaging land across England being divided into three categories: for growth, renewal or protection – was published on Thursday and has already provoked controversy, with concerns expressed that democratic oversight would be diluted and affordable housing cut back.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more