Untold stories of Jewish resistance revealed in London Holocaust exhibitionCaroline Davieson August 2, 2020 at 1:22 pm

Diaries and manuscripts turn spotlight on little-known acts of endurance and braveryFrom quiet acts of bravery, to overt acts of rebellion, Jewish resistance to the Holocaust took many forms, yet research shows they remain largely unacknowledged in traditional UK teachings about the genocide.A new exhibition, drawing on thousands of previously unseen documents and manuscripts, is placing some of the little-known personal stories of heroism, active armed resistance, and rescue networks in the extermination camps and ghettos at the forefront. Continue reading…

Diaries and manuscripts turn spotlight on little-known acts of endurance and bravery

From quiet acts of bravery, to overt acts of rebellion, Jewish resistance to the Holocaust took many forms, yet research shows they remain largely unacknowledged in traditional UK teachings about the genocide.

A new exhibition, drawing on thousands of previously unseen documents and manuscripts, is placing some of the little-known personal stories of heroism, active armed resistance, and rescue networks in the extermination camps and ghettos at the forefront.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more