Iran Talks Come Up Empty as Deadline Nears

EU foreign policy chief Catherine Ashton and Iran's foreign minister Javad Zarif wait for the start of closed door negotiations in Vienna, Austria, on July 3, 2014.

Ronald Zak/AP

AA Font size + Print

EU foreign policy chief Catherine Ashton and Iran's foreign minister Javad Zarif wait for the start of closed door negotiations in Vienna, Austria, on July 3, 2014.

After 5 days, negotiators have not swayed Iran over uranium enrichment levels as the July 20 deadline approaches. By Global Security Newswire

Envoys achieved few strides on Iran’s disputed nuclear program ahead of a stopgap deal’s expiration in less than two weeks, the Associated Press reports.

After five days of discussions in Vienna, Iran remains unwilling to accept all of the atomic restrictions demanded by China, France, Germany, Russia, the United Kingdom and the United States, diplomatic insiders said on Monday. Washington and its allies believe Iran’s ostensibly peaceful nuclear efforts are geared toward weapons development, and Tehran has tentatively offered to rein in some of the activities in exchange for an end to economic sanctions.

The sides reportedly remain most significantly divided on an acceptable size for Iran’s uranium-enrichment program under a potential long-term agreement. Iran has sought a robust refinement capacity with the stated aim of producing nuclear power plant fuel, while other governments have pressed for tighter limits on the technology capable of generating nuclear-arms material.

Israel, a regional antagonist of Iran, does not expect diplomats to conclude an agreement before the interim nuclear accord expires this month, Israeli Strategic Affairs Minister Yuval Steinitz said on Friday.

My estimate is that there will not be [a deal by July 20]. I think the Iranians came with a very hard line,” Reuters quoted Steinitz as saying. “The Iranians came without willingness to compromise but with a desire to exploit this stage to soften and improve the opening positions of the other side.”

Experts have warned that renewing the six-month pact now in force may lead to political complications.

Addressing how Israel would react to a long-term agreement it found unacceptable, Steinitz said, “We are keeping all options open.”

We will have to see what the deal is, to what extent it is good, to what extent it is bad, if it meets the minimum demands or not,” he added.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.