Spain speculates over whereabouts of scandal-hit ex-king Juan Carlos | The Guardian

Palace refuses to reveal former monarch’s location one day after he announced exile The whereabouts of Spain’s scandal-hit former king remained shrouded in mystery on Tuesday, one day after it was announced that Juan Carlos would be leaving the country in a bid to protect the crown from mounting scrutiny over his financial dealings. On Monday, Spain’s royal house published a letter sent by Juan Carlos to his son, King Felipe VI, saying he would “move, at this time, outside of Spain” amid the “public repercussions that certain past events in my private life are generating”. Continue reading…

Palace refuses to reveal former monarch’s location one day after he announced exile

The whereabouts of Spain’s scandal-hit former king remained shrouded in mystery on Tuesday, one day after it was announced that Juan Carlos would be leaving the country in a bid to protect the crown from mounting scrutiny over his financial dealings.

On Monday, Spain’s royal house published a letter sent by Juan Carlos to his son, King Felipe VI, saying he would “move, at this time, outside of Spain” amid the “public repercussions that certain past events in my private life are generating”.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more