Iran Upholds Prison Term of Its Former Nuclear Negotiator

An appeals court has upheld a five-year prison sentence handed down to a former member of the Iranian nuclear negotiation team found guilty of espionage.

In August 2016, Gholam-Hossein Mohseni-Ejei, Iran’s Judiciary spokesman, confirmed that the unidentified negotiator had been arrested, but was released on bail within days. The individual, according to Mohseni-Ejei, was a “spy who had infiltrated the nuclear team.”

The arrest was first announced earlier that month by Tehran’s prosecutor general, who said the suspect held dual nationality.

After conducting thorough research, the case was remitted to Branch 15 of the Islamic Revolution Court, where the jail term was issued following a number of hearings. The convict, however, appealed the verdict by the court of first instance.

Tasnim News Agency reported on Wednesday that the appellate court had endorsed the conviction.

“The sentence is now final,” the agency reported, citing an informed source.

Negotiators from Iran and the P5+1 group of countries — the US, the UK, France, Russia, and China plus Germany – paved the way for the signing of a landmark nuclear deal in July 2015.

The deal, viewed as a historic win for global diplomacy, was signed despite an intense lobbying campaign by the regime of Israel.

Four Iranian nuclear scientists were assassinated between 2010 and 2012. Iran has incriminated the International Atomic Energy Agency, the UN’s nuclear watchdog, for leaking information about the four scientists to the Israeli regime which it holds responsible for the assassinations.

Iran Upholds Prison Term of Its Former Nuclear Negotiator

In 2010, Iran’s nuclear facility in Natanz was targeted by a malware dubbed Stuxnet. The malicious computer worm was meant to cause substantial damage to Iran’s nuclear program, but the cyber-attack failed as it was averted in time by Iranian experts.

Tel Aviv and Washington have been accused of orchestrating the attack.

› Subscribe

LEAVE A REPLY

Please enter your comment!
Please enter your name here

The reCAPTCHA verification period has expired. Please reload the page.

More Articles