Spain’s scandal-hit former king Juan Carlos to go into exile | The Guardian

82-year-old king emeritus says he is moving abroad to help son ‘exercise his responsibilities’ as kingSpain’s former king Juan Carlos is to leave the country and go into exile abroad following a series of damaging allegations about his financial arrangements that have harmed the reputation of the monarchy and embarrassed his son, King Felipe.In March Felipe stripped Juan Carlos of his annual stipend and renounced his own personal inheritance from his father after reports that he was in line to receive millions of euros from a secret offshore fund with ties to Saudi Arabia. Continue reading…

82-year-old king emeritus says he is moving abroad to help son ‘exercise his responsibilities’ as king

Spain’s former king Juan Carlos is to leave the country and go into exile abroad following a series of damaging allegations about his financial arrangements that have harmed the reputation of the monarchy and embarrassed his son, King Felipe.

In March Felipe stripped Juan Carlos of his annual stipend and renounced his own personal inheritance from his father after reports that he was in line to receive millions of euros from a secret offshore fund with ties to Saudi Arabia.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more