Saif al-Islam Gaddafi, son of former leader, killed in Libya | Muammar Gaddafi News

0

Saif al-Islam Gaddafi had been considered the number two leader in Libya before the 2011 death of his father, Muammar Gaddafi.

Saif al-Islam Gaddafi, the son of the longtime former Libyan leader Muammar Gaddafi, has been killed in Libya.

Ahmed Khalifa, an Al Jazeera Arabic correspondent in the North African country, said on Tuesday that Gaddafi is believed to have been shot and killed in the western Libyan city of Zintan, where he was based for the past decade.

Recommended Stories

list of 3 itemsend of list

The 53-year-old’s killing was confirmed by his political adviser, Abdullah Othman, but the exact circumstances of his death remain unclear.

Khaled al-Mishri, the former head of the Tripoli-based High State Council, an internationally recognised government body, called for an “urgent and transparent investigation” into the killing in a social media post on Tuesday.

Gaddafi never had an official position in Libya, but was considered to be his father’s number two from 2000 until 2011, when Muammar Gaddafi was killed by Libyan opposition forces that ended his decades-long rule.

Gaddafi was captured and imprisoned in Zintan in 2011 after attempting to flee the North African country following the opposition’s takeover of Tripoli.

He was released in 2017 as part of a general pardon.

Prominent role

A Western-educated and well-spoken man, Gaddafi presented a progressive face to the oppressive Libyan regime run by his father – and he played a leading role in a drive to repair Libya’s relations with the West, beginning in the early 2000s.

He received a PhD from the London School of Economics (LSE) in 2008, with his dissertation looking into the role of civil society in reforming global governance.

Gaddafi remained prominent throughout the violence that gripped the country in the wake of the Arab Spring.

Speaking to the Reuters news agency at the time of the popular uprising in Libya in 2011, he said: “We fight here in Libya, we die here in Libya.”

He warned that rivers of blood would flow and the government would fight to the last man and woman and bullet.

“All of Libya will be destroyed. We will need 40 years to reach an agreement on how to run the country, because today, everyone will want to be president, or emir, and everybody will want to run the country,” he said.

FILE PHOTO: Saif al-Islam Gaddafi, son of late Libyan leader Muammar Gaddafi, attends a hearing behind bars in a courtroom in Zintan May 25, 2014. REUTERS/Stringer/File Photo
Gaddafi had been considered Libya’s second most powerful person before his father’s 2011 death [File: Stringer/Reuters]

Gaddafi faced numerous allegations of torture and extreme violence against opponents of his father’s rule, and by February 2011, he was on a United Nations sanctions list and was banned from travelling.

He was also wanted by the International Criminal Court (ICC) for alleged crimes against humanity committed in Libya in 2011.

Following long negotiations with the ICC, Libyan officials were granted authority to try Gaddafi for alleged war crimes. In 2015, a Tripoli court sentenced him to death in absentia.

After his release from detention in 2017, he spent years underground in Zintan to avoid assassination.

From 2016, he was allowed to contact people inside and outside Libya, said Mustafa Fetouri, a Libyan analyst with contacts in Gaddafi’s inner circle.



Source link

Man sentenced after trying to break into Anya Taylor-Joy’s bedroom during burglary | Trump News

0

A man has been sentenced for breaking into a house where actor Anya Taylor-Joy was staying and using a crowbar to try to get into her bedroom.

Kirk Holdrick, 43, and another man smashed their way into the London mansion in balaclavas in the early hours of 12 February 2023.

They were confronted by Taylor-Joy‘s husband, Malcolm MacRae, who had gone to investigate the sound of breaking glass.

Anya Taylor-Joy with Malcolm McRae in April 2022. Pic: Reuters
Image: Anya Taylor-Joy with Malcolm McRae in April 2022. Pic: Reuters

He ran back to the bedroom and barricaded himself and his wife in – armed only with a lamp – as the raiders tried to prise open the door.

CCTV captured Holdrick and his accomplice climbing a wall to the home and becoming “startled” as they triggered a security light.

Wood Green Crown Court heard they fled after MacRae claimed to have a gun.

Prosecutors believe they may have been specifically targeting the Hollywood star.

Taylor-Joy – known for productions such as The Queen’s Gambit, Peaky Blinders and the Dune films – was still barricaded inside with her husband when police arrived.

Nine days later, Holdrick broke into another house in the famous millionaires’ enclave of Sandbanks and tied up a woman and her daughter at gunpoint.

Kirk Holdrick was also jailed for life in 2005 for armed robbery. Pic: Metropolitan Police/PA
Image: Kirk Holdrick was also jailed for life in 2005 for armed robbery. Pic: Metropolitan Police/PA

Holdrick and accomplice Ashley Fulton dressed as police to gain entry.

They dragged the daughter by her hair and threatened to burn her with an iron and shoot her dead if they weren’t given the code to the safe.

They failed but made off with about £200,000 worth of watches, jewellery and cash.

In November, Holdrick was jailed for 12 years after admitting the Sandbanks raid and received a further three-year term this week for the burglary involving Taylor-Joy and her husband.

He initially denied the London burglary and claimed DNA found at the scene was there because he had been to a party at the property.

However, he pleaded guilty in December last year.

Holdrick, who once dated a cast member from The Only Way Is Essex, was also jailed for life in 2005 for an armed robbery on a security van and has convictions dating back to his teens.



Source link

Grizzlies trade Jaren Jackson Jr to Jazz in blockbuster NBA deal

0

NEWYou can now listen to Fox News articles!

The Memphis Grizzlies have traded away one of their cornerstone pieces in a blockbuster move before the Feb. 5 trade deadline.

Jaren Jackson Jr., who the Grizzlies took fourth overall in the 2018 NBA Draft, headlined a trade package to the Utah Jazz that also included John Konchar, Jock Landale and Vince Williams Jr., ESPN reported.

The Jazz are sending back Walter Clayton Jr., Kyle Anderson, Taylor Hendricks, Georges Niang and three future first-round picks.

CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM

Jaren Jackson Jr. shot

Memphis Grizzlies power forward Jaren Jackson Jr. (8) shoots a three-point shot in the second quarter against the Charlotte Hornets at FedExForum on Jan. 28, 2026.  (Matthew Smith/Imagn Images)

Utah is making a major change with this move, adding Jackson to a team that includes Lauri Markkanen, Keyonte George and Walker Kessler, among others.

Meanwhile, the Grizzlies are showcasing their wish to rebuild, as they are stocked with first-round picks and have a good, young core to build around as well.

NBA HANDS 76ERS’ PAUL GEORGE 25-GAME SUSPENSION FOR DRUG POLICY VIOLATION

The Grizzlies have a whopping 13 first-round picks over the next seven seasons, which is tied with the Brooklyn Nets and Oklahoma City Thunder.

Memphis also made NBA history, creating the largest-ever trade exception worth $28.8 million with this deal. It’s the type of refresh the 19-29 Grizzlies need.

Jaren Jackson Jr. goes up for a shot

Memphis Grizzlies forward Jaren Jackson Jr. (8) runs with the ball during an NBA basketball game between Orlando Magic and Memphis Grizzlies in Berlin, Germany, Thursday, Jan. 15, 2026. (AP Photo/Ebrahim Noroozi)

The Jazz have fared worse this season, owning a brutal 15-35 record after losing their sixth straight game on Sunday night.

Jackson was one of the best players in the NBA Draft coming out of Michigan State in 2018, and the Grizzlies added the 6-foot-10 forward/center to be versatile for their team long-term.

He’s done exactly that, earning two All-Star nods while averaging 18.5 points, 5.6 rebounds, 1.5 assists and 1.9 blocks per game over 452 career games in Memphis.

Jackson is one of the best defenders in the NBA, winning Defensive Player of the Year during the 2022-23 NBA season, while finishing second-team All-Defense last season.

Jaren Jackson Jr. dribbles

Jaren Jackson Jr. of the Memphis Grizzlies reacts in the first half against the Houston Rockets at Toyota Center on Jan. 26, 2026 in Houston, Texas.  (Tim Warner/Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

Jackson is today’s modern big man, having the ability to shoot from the perimeter as well as near the rim. He has averaged 35.9% from three-point territory and 47.5% from the field this season, while pouring in an average 19.2 points per night.

Follow Fox News Digital’s sports coverage on X and subscribe to the Fox News Sports Huddle newsletter.



Source link

Ivanti’s EPMM is under active attack, thanks to two critical zero-days

0

Attackers are again focusing on a familiar target in the network edge space, actively exploiting two critical zero-day vulnerabilities in Ivanti software that allows administrators to set mobile device and application controls. 

The vulnerabilities — CVE-2026-1281 and CVE-2026-1340 — each carry a CVSS rating of 9.8 and allow unauthenticated users to execute code remotely in Ivanti Endpoint Manager Mobile (EPMM). Ivanti did not say when the earliest known date of exploitation occurred but warned that a “very limited number of customers” were attacked before it disclosed and addressed the defects Thursday.

Ivanti’s post-attack warning marks a frequent occurrence for its customers, involving yet again highly destructive defects in its code that attackers exploited before the vendor caught or fixed the errors. 

The Cybersecurity and Infrastructure Security Agency has flagged 31 Ivanti defects on its known exploited vulnerabilities catalog since late 2021. At least 19 defects across Ivanti products have been exploited in the past two years. 

The agency added CVE-2026-1281 to the catalog Thursday, but not CVE-2026-1340. Both defects have been exploited, but they have not been chained together for exploitation, a company spokesperson said.

The latest code-injection vulnerabilities demonstrate attackers are focusing on EPMM in particular of late. Ivanti disclosed a separate pair of vulnerabilities in the same product in May 2025. 

Ivanti declined to say how many customers have been impacted by the recent zero-day attacks, but researchers warn a recurring pattern is emerging with mass exploitation observed shortly after public disclosure and the release of exploit code.

“This started as tightly scoped zero-day exploitation,” Ryan Dewhurst, head of proactive threat intelligence at watchTowr, told CyberScoop. “It has since devolved into global mass exploitation by a wide mix of opportunistic actors. That arc is depressingly predictable.”

Shadowserver said it observed a spike in CVE-2026-1281 exploitation attempts from at least 13 source IPs by Saturday. More than 1,400 instances of Ivanti EPMM are still exposed to the internet, according to Shadowserver scans, but it’s unknown how many of those are vulnerable or already compromised. 

“It’s important to remember that exposure does not equal exploitation,” Dewhurst said. “But any organization exposing vulnerable instances to the internet must consider them compromised, tear down infrastructure and instigate incident response processes.”

Ivanti advised all on-premises EPMM customers to apply patches, but warned that the script is temporary and will be overridden when customers upgrade software to a new version. The software packages that address the defects “takes only seconds to apply, does not cause downtime and significantly increases adoption and protection rates for customers,” a company spokesperson said. 

Ivanti said it will release a permanent fix for the vulnerability in a future update, but did not say when customers should anticipate that release.

The new Ivanti zero-days share many similarities to previous EPMM vulnerabilities, said Ryan Emmons, staff security researcher at Rapid7. “The line between attacker input and trusted code is blurred, resulting in the ability to execute malicious payloads.”

Remotely exploitable vulnerabilities in network edge devices are an appealing and effective attack vector for hackers looking to break into targeted networks. Multiple threat groups last year, including some linked to China, exploited another zero-day defect in Ivanti EPMM — CVE-2025-4428 — and a string of vulnerabilities in other Ivanti products.

“State-sponsored adversaries have generally made strong use of remotely exploitable vulnerabilities in Ivanti kit, which isn’t surprising,” said Caitlin Condon, vice president of security research at VulnCheck.

The latest actively exploited defects affecting Ivanti products reflect a continuation of a years-long battle between the vendor and threat groups that poses a consistent risk for customers. 

Some security researchers are more inclined to pin the blame for this sustained security problem on Ivanti itself, yet there is broad agreement these vulnerabilities were not easy for the company to discover prior to exploitation. 

Emmons described the defects as nuanced with an odd path to code injection. “With these vulnerable code patterns now known, the vendor’s security teams can more effectively hunt for these sorts of bugs in the future,” he added.

Dewhurst concurred the vulnerabilities were not easy to spot, but said that does not excuse the outcome. “Defensive engineering needs to assume attackers will find the non-obvious paths eventually, because they always do,” he said. 

Ivanti’s spokesperson said these types of vulnerabilities are difficult to find, and insisted the company’s security and engineering teams acted quickly to address the defects once they were identified.

Matt Kapko

Written by Matt Kapko

Matt Kapko is a reporter at CyberScoop. His beat includes cybercrime, ransomware, software defects and vulnerability (mis)management. The lifelong Californian started his journalism career in 2001 with previous stops at Cybersecurity Dive, CIO, SDxCentral and RCR Wireless News. Matt has a degree in journalism and history from Humboldt State University.



Source link

Saif al-Islam Gaddafi, son of Libyan former leader, killed

0

Saif al-Islam Gaddafi, son of former Libyan leader Muammar Gaddafi, has been killed in Libya, Al Jazeera Arabic reports.

Source link

Elon Musk’s xAI chatbot Grok faces ICO probe after allegedly creating sexual imagery of children | UK News

0

The UK’s information watchdog will investigate reports that Elon Musk’s AI chatbot, Grok, has been used to generate sexual imagery of children.

Grok was developed by Musk’s xAI in 2023, designed to be a “truth-seeking” assistant with a witty, rebellious personality.

Integrated into X, formerly Twitter, it uses real-time data from the platform to generate text, images and code.

But complaints have mounted that Grok was being used to generate sexual photos of real women and children, and now the Information Commissioner’s Office (ICO) is investigating.

Grok: ‘The creators don’t know how it works – or how to keep it under control’

The announcement comes on the same day the X offices in Paris were raided by French prosecutors examining similar allegations.

In a statement on its website, the ICO confirmed it had opened a formal probe into two X companies concerning their processing of personal data in relation to Grok, and the AI’s potential to produce harmful sexualised image and video content.

“We have taken this step following reports that Grok has been used to generate non‑consensual sexual imagery of individuals, including children,” the statement said.

“The reported creation and circulation of such content raises serious concerns under UK data protection law and presents a risk of significant potential harm to the public.”

File pic: Reuters
Image: File pic: Reuters

William Malcolm of the ICO said the investigation would probe whether X Internet Unlimited Company and xAI had complied with data protection laws, and provided sufficient safeguards.

He said: “The reports about Grok raise deeply troubling questions about how people’s personal data has been used to generate intimate or sexualised images without their knowledge or consent, and whether the necessary safeguards were put in place to prevent this.

“Losing control of personal data in this way can cause immediate and significant harm. This is particularly the case where children are involved.

“Our role is to address the data protection concerns at the centre of this, while recognising that other organisations also have important responsibilities.”

Ofcom also investigating

Another regulatory watchdog, Ofcom, also opened a formal investigation into X last month under the UK’s Online Safety Act, to determine whether the firm was complying with its duties to protect people from illegal content.

The European Commission launched a probe into Grok last month too, looking at whether it disseminates illegal content, such as manipulated sexualised images, in the EU.

The EU is one of a number of authorities around the world to have raised concerns about Grok, with government officials in Germany, Sweden, India, Japan, Malaysia, California, Indonesia and Philippines among those that have spoken out.

Mr Malcolm said the ICO was working closely with Ofcom and “international regulators”.

File pic: iStock
Image: File pic: iStock

Grok has restricted image editing but yet to say where

In a separate statement, regulator Ofcom said – while it was probing X – it was not investigating xAI, which provides the standalone Grok chatbot app.

Ofcom also said its investigation into X was still gathering evidence and warned the probe could take months.

On why it was not investigating xAI, the statement said: “When we opened our investigation into X, we said we were assessing whether we should also investigate xAI, as the provider of the standalone Grok service.

“We continue to demand answers from xAI about the risks it poses. We are examining whether to launch an investigation into its compliance with the rules.”

Ofcom is investigating the chatbot, and Sir Keir Starmer has insisted X must act to comply with UK laws ‘immediately’.

Ofcom said that because of the way the Online Safety Act relates to chatbots, it was currently unable to investigate the creation of illegal images by the standalone Grok itself.

xAI said on 14 January it had restricted image editing for Grok AI users and blocked users, based on their location, from generating images of people in revealing clothing in “jurisdictions where it’s illegal”. It is yet to identify the countries where those restrictions apply.

xAI earlier said it had limited the use of Grok’s image generation and editing features to paying subscribers only.



Source link

Cancer releases protein that fights Alzheimer’s disease, research revelas

0

NEWYou can now listen to Fox News articles!

Puzzling cancer and Alzheimer’s link explored in new study: ‘SHORT QUOTE’

A new study may help clarify a long-observed link between cancer history and reduced Alzheimer’s risk.

The research, published in the journal Cell, used mouse models to explore how the biological changes associated with cancer may affect the progression of the most common dementia type.

The findings suggest that certain cancers release a protein called cystatin-C that can travel through the bloodstream and enter the brain, an area that many Alzheimer’s treatments have difficulty reaching.

ALZHEIMER’S RISK TIED TO HOW THE BODY HANDLES SUGAR AFTER EATING, STUDY FINDS

Cystatin-C binds to harmful amyloid protein clumps linked to Alzheimer’s and activates a protein called TREM2, which acts like an on-switch for the brain’s immune cells. 

When activated, those cells begin clearing away existing amyloid plaques, a process that was associated with reduced plaque buildup and improved cognitive function, the study found.

Elderly woman sitting by a window at home, looking outside with a thoughtful expression.

New research suggests that cancer-related biological changes may help explain why a history of cancer is linked to lower Alzheimer’s risk. (iStock)

Dr. Bob Arnot, a Vermont-based internal medicine physician, told Fox News Digital that the findings help clarify a pattern doctors have observed for years.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“Scientists have long observed a puzzling statistical pattern known as ‘inverse comorbidity’ — people with a history of cancer are less likely to develop Alzheimer’s disease, and people with Alzheimer’s are less likely to develop cancer,” said Arnot, who was not involved in the study.

Doctors analyzing brain MRI scans on computer monitors in a hospital radiology control room.

Cystatin-C sticks to harmful amyloid clumps and turns on brain immune cells, helping them clear plaques and improve brain function. (iStock)

The findings suggest that biological signals tied to certain cancers may slow or reverse key features of Alzheimer’s disease.

CLICK HERE FOR MORE LIFESTYLE STORIES

Arnot said the research is notable because it identifies a specific biological pathway that could be targeted for future Alzheimer’s treatments.

“This approach targets existing amyloid plaquesnot just early prevention. That distinction could be critical for patients who already have established disease,” he said.

Nerve pain drug gabapentin linked to increased dementia, cognitive impairment risks

The results suggest that cancer-related biological signals may help slow or even reverse some core aspects of Alzheimer’s disease. (iStock)

Arnot cautioned that the findings do not mean cancer itself is protective.

“This study does not suggest that cancer is protective, desirable or a viable therapy,” he said. “Instead, it reveals that biological programs activated during cancer can inadvertently engage protective immune mechanisms in the brain.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The research suggests that future treatments could focus not just on slowing Alzheimer’s, but also on clearing harmful buildup in the brain, Arnot added.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The results were based on experiments in animal models, and further research is needed to determine whether the same effects occur in humans, the researchers noted.



Source link

Wave of Citrix NetScaler scans use thousands of residential proxies

0

Wave of Citrix NetScaler scans use thousands of residential proxies

A coordinated reconnaissance campaign targeting Citrix NetScaler infrastructure over the past week used tens of thousands of residential proxies to discover login panels.

The activity was observed between January 28 and February 2, and it also focused on enumerating versions of the product, indicating an organized discovery effort.

Threat monitoring platform GreyNoise traced the source of the scanning traffic to more than 63,000 distinct IPs that launched 111,834 sessions. According to the researchers, 79% of the traffic was aimed at Citrix Gateway honeypots.

Wiz

Roughly 64% of the traffic came from residential proxies, with IPs spread across the globe, appearing as legitimate consumer ISP addresses and bypassing reputation-based filtering. The remaining 36% came from a single Azure IP address.

The activity strongly indicates pre-exploitation infrastructure mapping, rather than random internet scanning, GreyNoise says.

“The specific targeting of the EPA [Endpoint Analysis] setup file path suggests interest in version-specific exploit development or vulnerability validation against known Citrix ADC weaknesses.”

Observed activity
Observed reconnaissance activity
Source: GreyNoise

The two indicators of malicious intent are obvious, with the most active one generating 109,942 sessions from 63,189 unique IPs and targeting the  authentication interface at ‘/logon/LogonPoint/index.html’ to identify exposed Citrix login panels at scale.

The second indicator, observed on February 1st, was a six-hour sprint with 10 IPs launching 1,892 sessions focused on the URL path ‘/epa/scripts/win/nsepa_setup.exe’ to enumerate Citrix versions via EPA artifacts.

GreyNoise notes that the attacker employed a user agent for Chrome 50, released in early 2016. Targeting the EPA setup file may indicate an “interest in version-specific exploit development or vulnerability validation against known Citrix ADC weaknesses.”

“The rapid onset and completion suggest a targeted scanning sprint that may have been triggered by discovery of vulnerable EPA configurations or intelligence about deployment windows,” GreyNoise says.

The most recent critical-severity flaws impacting Citrix products are CVE-2025-5777, aka ‘CitrixBleed 2,’ and CVE-2025-5775, a remote code execution vulnerability that was exploited as a zero-day.

GreyNoise lists several detection opportunities for this latest activity, including:

  • Monitoring for the blackbox-exporter user agent originating from non-authorized sources
  • Alerting on external access to /epa/scripts/win/nsepa_setup.exe
  • Flagging rapid enumeration of /logon/LogonPoint/ paths
  • Watching for HEAD requests against Citrix Gateway endpoints
  • Tracking outdated browser fingerprints, specifically Chrome 50 (circa 2016)

Additionally, the researchers recommend that system administrators review the necessity of internet-facing Citrix Gateways, restrict access to the /epa/scripts/ directory, disable version disclosure in HTTP responses, and monitor for anomalous access from residential ISPs in unexpected regions.

GreyNoise has also shared the IP addresses used to launch the scanning activity.

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.



Source link

Sudan’s military breaks through years-long RSF blockade in Kadugli | Sudan war

0

NewsFeed

Sudanese military officials say they’ve broken through a siege by the Rapid Support Forces (RSF) paramilitary group of the South Kordofan capital of Kadugli. It’s the military’s second major advance in the Kordofan region in less than a week.



Source link

US aircraft carrier scrambles fighter jet to down ‘aggressive’ Iranian drone as tensions rise ahead of talks | US News

0

A US fighter jet has shot down an Iranian drone that was flying “aggressively” towards an aircraft carrier, the US military has said.

The incident in the Arabian Sea comes as Washington prepares for talks with Tehran later this week.

The Shahed-139 drone had approached the USS Abraham Lincoln with “unclear intent” before it was downed by an F-35C fighter launched from the vessel, US military spokesperson Captain Tim Hawkins said in a statement on Tuesday.

Iran threatens US with ‘regional war’

Capt Hawkins said the aircraft “continued to fly towards the ship, part of a “large armada” deployed in the region, despite de-escalatory measures taken by US forces operating in international waters”.

No US personnel were harmed, and no equipment was damaged, in the incident, about 500 miles (800km) from Iran’s southern coast, he said.

Reports in Iran appeared to dispute the US version of events, as ​media sources, including ​the semi-official Fars ‍news agency, said an ‌Iranian drone completed ​a “surveillance mission ⁠in international waters”.

‘Big powerful ships’ are heading in Iran’s direction

Hours later, Iranian forces, including a drone, harassed a US-flagged and crewed merchant vessel that was sailing in the Strait of Hormuz.

Two boats carrying Iran’s Islamic Revolutionary Guard Corps forces, and a Mohajer drone, approached the Stena Imperative “at high speeds, and threatened to board and seize the tanker”, Mr Hawkins said.

The destroyer USS McFaul responded, escorting the Stena Imperative “with defensive air support from the US Air Force”, the statement said, adding that the merchant vessel was now sailing safely.

What US forces are gathering in the Middle East?

White House ​Press ​Secretary Karoline ‍Leavitt, who confirmed the US had shot down the drone on Fox News, said talks with Tehran scheduled for later this week in Turkey, will still go ahead.

Tensions are high between the long-time enemies as US President Donald Trump tries to get Iran to make a deal over its nuclear programme.

On Monday, he told reporters that his administration had “talks going on with Iran. We’ll see how it all works out”.

He wouldn’t say what, if any, threshold he had for military action against the country, which Iran’s supreme leader, Ayatollah Ali Khamenei has said would lead to a regional war.

The drone shooting came hours after Masoud Pezeshkian, Iran’s president, said that he told the country’s foreign minister to “pursue fair and equitable negotiations” with the US, one of the first clear signs from Tehran that it wants to try to negotiate with Washington.

Read more:
Doctors’ disturbing accounts of crackdown
Iran heads for make or break this week

Iran’s government spent weeks putting down protests that began in late December against growing economic instability before broadening into a challenge to the Islamic Republic.

Anywhere between 33,000 and 50,000 people died in the violence, according to estimates from human rights organisations and doctors.

Tehran has admitted that 3,117 people have been killed, the majority of them being security forces and civilians, rather than protesters.

Mr Trump promised in early January to “rescue” Iranians from their government’s bloody crackdown.



Source link