Iran’s stockpile of enriched uranium has grown to more than 18 times the limit laid down in 2015 nuclear deal, the UN nuclear watchdog said on Monday.
The International Atomic Energy Agency said it “estimated that, as of May 15, Iran's total enriched stockpile was 3,809.3 kilograms”.
The limit in the 2015 Joint Comprehensive Plan of Action deal was set at 300kg of a specific compound — the equivalent of 202.8kg of uranium.
Iran is continuing its enrichment of uranium to levels higher than the 3.67 per cent limit in the defunct deal, the IAEA said in its latest report on Iran's nuclear programme.
Enrichment levels of around 90 per cent are required for use in a nuclear weapon.
The stockpile of uranium enriched up to 20 per cent is now estimated to be 238.4kg, up 56.3kg since the last report in March, while the amount enriched to 60 per cent stands at 43.1kg, an increase of 9.9kg.
Iran insists its nuclear programme is for civilian purposes.
This latest report comes as talks to revive the 2015 nuclear deal between Iran and world powers remain deadlocked, after stalling in March.
Talks to restore the 2015 JCPOA, which the US abandoned four years ago under former president Trump, have taken place intermittently in Vienna.
Last year, Iran engaged in indirect talks with the US as a route to cancelling US sanctions that have gutted revenue and dramatically worsened economic hardships for ordinary people, stirring discontent.
One sticking point has been Iran's insistence on Washington removing the Islamic Revolutionary Guard Corps, Tehran's elite security force, from the US Foreign Terrorist Organisation list.
The US said in early May it was preparing equally for both a return to compliance with Iran on a nuclear deal and a situation with no agreement being reached.
“Because a mutual return to compliance with the JCPOA is very much an uncertain proposition, we are now preparing equally for either scenario,” State Department spokesman Ned Price said.
Specs
Engine: Duel electric motors
Power: 659hp
Torque: 1075Nm
On sale: Available for pre-order now
Price: On request
UAE currency: the story behind the money in your pockets
Story%20behind%20the%20UAE%20flag
%3Cp%3EThe%20UAE%20flag%20was%20first%20unveiled%20on%20December%202%2C%201971%2C%20the%20day%20the%20UAE%20was%20formed.%C2%A0%3C%2Fp%3E%0A%3Cp%3EIt%20was%20designed%20by%20Abdullah%20Mohammed%20Al%20Maainah%2C%2019%2C%20an%20Emirati%20from%20Abu%20Dhabi.%C2%A0%3C%2Fp%3E%0A%3Cp%3EMr%20Al%20Maainah%20said%20in%20an%20interview%20with%20%3Cem%3EThe%20National%3C%2Fem%3E%20in%202011%20he%20chose%20the%20colours%20for%20local%20reasons.%C2%A0%3C%2Fp%3E%0A%3Cp%3EThe%20black%20represents%20the%20oil%20riches%20that%20transformed%20the%20UAE%2C%20green%20stands%20for%20fertility%20and%20the%20red%20and%20white%20colours%20were%20drawn%20from%20those%20found%20in%20existing%20emirate%20flags.%3C%2Fp%3E%0A
UAE currency: the story behind the money in your pockets
The 12 Syrian entities delisted by UK
Ministry of Interior
Ministry of Defence
General Intelligence Directorate
Air Force Intelligence Agency
Political Security Directorate
Syrian National Security Bureau
Military Intelligence Directorate
Army Supply Bureau
General Organisation of Radio and TV
Al Watan newspaper
Cham Press TV
Sama TV
COMPANY PROFILE
Name: Kumulus Water
Started: 2021
Founders: Iheb Triki and Mohamed Ali Abid
Based: Tunisia
Sector: Water technology
Number of staff: 22
Investment raised: $4 million
Know your cyber adversaries
Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.
Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.
Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.
Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.
Phishing: Aims to secure personal information, such as passwords and credit card numbers.
Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.
Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.
Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.
Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.
Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.
Zero-day exploit: Exploits a vulnerability in software before a fix is found.