Tropical Storm Isaias tears up US east coast sparking tornadoes and floods | The Guardian

One dead in North Carolina as coronavirus complicates responseWashington DC, Philadelphia and New York braced for high windsTropical Storm Isaias spawned tornadoes and dumped rain during an inland march up the US east coast on Tuesday that has states on alert all the way up to Massachusetts after making landfall as a category 1 hurricane near Ocean Isle Beach, North Carolina, overnight, killing at least one.East coast metropolises including the Washington area, Philadelphia and New York were watching out for potentially dangerous winds and rain as the storm moved briskly. Continue reading…

  • One dead in North Carolina as coronavirus complicates response
  • Washington DC, Philadelphia and New York braced for high winds

Tropical Storm Isaias spawned tornadoes and dumped rain during an inland march up the US east coast on Tuesday that has states on alert all the way up to Massachusetts after making landfall as a category 1 hurricane near Ocean Isle Beach, North Carolina, overnight, killing at least one.

East coast metropolises including the Washington area, Philadelphia and New York were watching out for potentially dangerous winds and rain as the storm moved briskly.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more