U.N. Releases Report on Syrian Chemical Weapons Attack, But Doesn’t Assign Blame

U.N Secretary General Ban Ki-Moon and Ake Sellstrom, the head of the chemical weapons team assigned to Syria

Paulo Filgueiras/AP

AA Font size + Print

U.N Secretary General Ban Ki-Moon and Ake Sellstrom, the head of the chemical weapons team assigned to Syria

U.N. Secretary General Ban Ki-Moon calls the attack a "war crime" but doesn't name the perpetrators. By Philip Bump

The United Nations’ report on the alleged August 21 chemical weapons attack in a suburb of Damacus suggests that it was not just alleged. Calling the attack a “war crime,” Secretary General Ban Ki-Moon noted that evidence of the use of sarin gas was “overwhelming and indisputable.” By whom, however, isn’t specified.

Ban presented the report to the United Nations Security Council in a private meeting on Monday morning, but made his remarks available to the public. The report itself, also available online, walks through the evidence collected and analyzed by the UN team that was already in the country researching another alleged use of outlawed weapons when the August 21 attack occurred.

Ban:

The Mission has concluded that chemical weapons were used on a relatively large scale in the Ghouta area of Damascus in the context of the ongoing conflict in Syria. The attack resulted in numerous casualties, particularly among civilians. …

Survivors reported that following an attack with shelling, they quickly experienced a range of symptoms, including shortness of breath, disorientation, eye irritation, blurred vision, nausea, vomiting and general weakness. Many eventually lost consciousness. First responders described seeing a large number of individuals lying on the ground, many of them dead or unconscious.

The report itself includes 30 data points, walking through weather conditions, medical evidence, and photographic details of the surface-to-surface rockets that carried the weapons. While the team was limited “due to the security situation” (in Ban’s words), its point is direct. The 30th data point simply reads, “This result leaves us with the deepest concern.”

Read more at The Atlantic Wire

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.