Young Journalists Club | Latest news of Iran and world

News ID: 44673
Asia » Asia
Publish Date: 19:29 - 28 December 2019
TEHRAN, Dec 28_Wikileaks has leaked new documents regarding the probe by the Organization for the Prohibition of Chemical Weapons (OPCW) into an alleged chemical attack in Syria, showing that a senior OPCW official ordered the removal of a "dissenting" report.

OPCW official ordered removal of report disproving Syria chemical attack claims: WikileaksTEHRAN, Young Journalists Club(YJC)-One of the published documents shows Sebastien Braha, chief of cabinet at the OPCW, ordered in an email that “all traces” of a report from Ian Henderson, a then-OPCW inspector in Syria’s Douma, be erased from the body's registries.

“Please get this document out of DRA [Documents Registry Archive]... And please remove all traces, if any, of its delivery/storage/whatever in DRA,” the email read.

The findings of Henderson claimed that two cylinders, found in the alleged chemical attack site and thought to have probably contained chemicals, were likely manually placed in the area rather than dropped from a plane or helicopter.

Only terrorists controlling the area had land access to the area at the time.

Wikileaks claims the email was leaked from an exchange between senior OPCW officials and the body’s fact finding mission deployed to the Syrian city to investigate claims of an alleged chemical attack in the area April last year.

Another OPCW email exchange released by the whistleblower website on Friday showed that the body had ordered its eight inspectors in Douma - except one, a paramedic - be excluded from discussions on the probe in July 2018.

A third leaked document detailed discussions between the OPCW and four toxicologists with expertise in chemical weapons.

The experts claimed that “no correlation” had been found between symptoms observed among the alleged chemical attack victims and chemicals possibly used in such an attack, according to the leaked document.

Tags
Your Comment
Name:
Email:
* Comment:
* captcha: