The Looming Military Showdown with Russia

U.S. F-15s deployed to Iceland

(CNN)Demonstrating its commitment to a “free” and “secure” Europe, the United States deployed 12 F-15C Eagles and approximately 350 airmen to Iceland and the Netherlands on Friday, the Air Force announced.

U.S. aircraft units from the 131st Fighter Squadron at Barnes Air National Guard Base in Massachusetts and the 194th Fighter Squadron at Fresno Air National Guard Base in California will support NATO air surveillance missions in Iceland and conduct flying training in the Netherlands.
The F-15s are not the only package of American fighters being sent to Europe in an effort to deter further Russian aggression in the region.
In February, the U.S. said it will send six F-15s to Finland as part of Operation Atlantic Resolve, which the United States initiated in 2014 to reassure NATO allies after Russian military intervention in Ukraine. These aircraft are scheduled to deploy next month.
Although it maintains a small coast guard force, Iceland is the only country in NATO that does not have a military.
The F-15s are part of the U.S.’s Theater Security Packages, a rotational force used to augment existing Air Force capabilities in Europe, according to the Air Force.
It is also somewhat of a secret that while Russia was taking over yet another country outside of Crimea and Ukraine, meaning Syria, Russia was in fact testing pilots, electronic warfare and newly developed ordnance obscured with the dropping over older and prohibited cluster unguided munitions.
TurkishWeekly: Russia’s engagement in Syria presents an apposite opportunity for the Russian military to test the effectiveness of its modernization program even though its involvement in the conflict is very limited.
 

Some of the modern Russian munitions with modern precision technology include the Kh-25 laser-guided missile and the KAB-500S Glonass satellite-guided bomb. However, these weapons are used in limited numbers, according to the defense consultancy company IHS. A Russian military expert Mikhail Barabanov said “There have been no casualties, the intensity of action is quite high, and new types of weapons — such as satellite-guided bombs, cluster munitions with smart elements, and cruise missiles — have been tested.” Barabanov believes it is still too early to judge the success of the new equipment.

In 2014, Russia has been flying bombers in Northern Europe to likely test NATO’s defense systems and responsive actions by NATO members.
FreeBeacon: Six Russian aircraft, including two Bear H nuclear bombers, two MiG-31 fighter jets and two IL-78 refueling tankers were intercepted by F-22 fighters on Wednesday west and north of Alaska in air defense identification zones, said Navy Capt. Jeff A. Davis, a spokesman for the U.S. Northern Command and North American Aerospace Defense Command. Two other Bears were intercepted by Canadian jets on Thursday.
Additionally, Russia has introduced and has been testing a new stealth AMUR 1650 attack submarine. In February of 2016, it was announced by a U.S. Navy Vice Admiral that Russia’s activities are at Cold War levels.
Putin is challenging NATO in Europe and the Obama administration is responding with all the guidance being coordinated by General Breedlove. Europe requires hard military assets and is receiving them while the same goes for the Baltic States.
The possible showdown could come at the time the West is most vulnerable, not only for Europe dealing with a migrant and economic crisis but for the United States when a new president and administration takes over. It worked for al Qaeda just a mere few months into the Bush administration.
Russia is anything but bashful having made this declaration less than a week ago.

Russian Officials: Russia Is Ready To Militarily Answer NATO’s Growing Potential In Europe

MEMRI: In recent days, tensions have risen between the U.S. and Russia over the U.S. decision to increase the budgets and activities of NATO forces in Eastern Europe. Russian Defense Minister Sergey Shoigu has stated that Russia is ready to respond to NATO’s growing potential in Europe. On March 25, 2016, he denounced the upgrade of NATO troops in Europe, in particular near Russia’s borders, thus compelling Russia to react. “NATO continues to build up its military potential in Europe, including in close vicinity to the Russian borders. No doubt, this situation cannot but concern us. We are forced to respond to it,” the minister said.[1]

Shoigu added that in 2016, Russia’s Western Military District will be upgraded with over 1,100 pieces of military hardware, including Sukhoi Su-35 advanced fighter jets, Koalitsiya-SV and Msta-SM self-propelled howitzers, and S-400 antiaircraft missile systems. The District has set up a new 1st Tank Army headquartered in the Moscow area. During 2016, Russia will raise its alert levels and conduct 800 operative and combat training drills to boost the military’s response readiness.[2]  More here.

Add in the emerging threats of Iran and North Korea, the West has a trifecta of a military showdown.

Who is APT6?

Darkhotel APT hackers campaign ‘followed’ global CEOs using hotel networks

A state-backed espionage group has spent years targeting senior executives from large global companies using a specialised Advanced Persistent Threat (APT) that can follow and steal data from them as they move around the globe from hotel to hotel, Kaspersky has revealed.

TechWorld: Interestingly, despite some smarts, the sophistication level isn’t always top drawer, which points towards China rather than the US or Russia. The victim list is another hint at that too.

“Overall, victims in our sinkhole logs and KSN data were found across the globe, with the majority in Japan, Taiwan, China, Russia, Korea and Hong Kong,” (in that order) noted Kaspersky Lab’s researchers.

US executives were on the list but far below the prevalence for targeting Japanese CEOs and managers. And the attackers seem to go after almost everyone with the right job title, with sectors hit including electronics, finance, manufacturing, pharma, cosmetics, chemicals, automotive, defence, law, military and even NGOs – the last one has been an obsession for Chinese actors. More here.

FBI Says a Mysterious Hacking Group Has Had Access to US Govt Files for Years

Motherboard: The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as , “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard.

The alert, which is also available online, shows that foreign government hackers are still successfully hacking and stealing data from US government’s servers, their activities going unnoticed for years. This comes months after the US government revealed that a group of hackers, widely believed to be working for the Chinese government, had for more than a year infiltrated the computer systems of the Office of Personnel Management, or OPM. In the process, they stole highly sensitive data about several millions of government workers and even spies.

In the alert, the FBI lists a long series of websites used as command and control servers to launch phishing attacks “in furtherance of computer network exploitation (CNE) activities [read: hacking] in the United States and abroad since at least 2011.”

Domains controlled by the hackers were “suspended” as of late December 2015, according to the alert, but it’s unclear if the hackers have been pushed out or they are still inside the hacked networks.

“Anybody who’s been in that network all this long, they could be anywhere and everywhere.”

“Looks like they were in for years before they were caught, god knows where they are,” Michael Adams, an information security expert who served more than two decades in the US Special Operations Command, and who has reviewed the alert, told Motherboard. “Anybody who’s been in that network all this long, they could be anywhere and everywhere.”

For Adams, this alert shows that the US government still is not in control of what’s going on inside its most sensitive networks. This alert, he said, is an admission of that.

“It’s just flabbergasting,” he told me. “How many times can this keep happening before we finally realized we’re screwed?”

The FBI wouldn’t comment on the alert, only saying that it was just another example of a routine notice to private partners, “provided in order to help systems administrators guard against the actions of persistent cyber criminals.”

This group of “persistent cyber criminals” is especially persistent. The group is none other than the “APT6” hacking group, according to sources within the antivirus and threat intelligence industry. There isn’t much public literature about the group, other than a couple of old reports, but APT6, which stand for Advanced Persistent Threat 6, is a codename given to a group believed to be working for the Chinese government.

“This is one of the earlier APTs, they definitely go back further than 2011 […] more like 2008.”

“This is one of the earlier APTs, they definitely go back further than 2011 or whatever—more like 2008 I believe,” Kurt Baumgartner, a researcher at the Russian security firm Kaspersky Lab, told me. (Baumgartner declined to say whether the group was Chinese or not, but said its targets align with the interest of a state-sponsored attacker.)

Kyrk Storer, a spokesperson with FireEye, confirmed that the domains listed in the alert “were associated with APT6 and one of their malware backdoors,” and that the hackers “targeted the US and UK defense industrial base.”

Another researcher at a different security company, who spoke on condition of anonymity because he wasn’t authorized to speak publicly about the hacker’s activities, said this was the “current campaign of an older group,” and said there “likely” was an FBI investigation ongoing. (Several other security companies declined to comment for this story.)

At this point, it’s unclear whether the FBI’s investigation will lead to any concrete result. But two years after the US government charged five Chinese military members for hacking US companies, it’s clear hackers haven’t given up attacking US targets.

1 Person a Year Ago, Lead to Panama Papers, Ripple Effect

What banks aided in the accounts of the global elites to hide their wealth? Did our own governmental financial gurus know about this? Well yes. Encryption was also used. Ahem….
Ah yeah sure —>>  WSJ: The U.S. Justice Department said Monday it is reviewing documents published by international media outlets to see if the papers constitute evidence of corruption that could be prosecuted in the U.S. Also Monday, French prosecutors opened an investigation into whether French nationals or financial institutions have used Panama to evade taxes.
****
IndiaExpress: Two global companies were under mounting pressure, and threats were flying. For years, the Swiss banking giant UBS and a Panama law firm named Mossack Fonseca embraced each other in a mutually profitable relationship. UBS had customers who wanted offshore shell companies to keep their finances hidden. And Mossack Fonseca, one of the largest creators of offshore companies in the world, was happy to sell them.
Oh, ousted Egyptian president Hosni Mubarak’s son is on the investigation list.
AhramOnline: Mubarak’s eldest son Alaa was revealed to be involved in dealing with Mossack Fonseca through his British Virgin Islands firm Pan World Investments Inc., which is managed by Credit Suisse. Alaa and Gamal were released from prison in January 2015 after serving the maximum pre-trial detention period of 18 months.Their release decision overturned a lower court conviction that saw the pair given four-year jail sentences and a three-year sentence for the elder Mubarak. They were charged with embezzling public funds earmarked for the renovation of presidential palaces and using the money to spruce up private properties. A Cairo court dropped other graft charges against the two sons in late 2014. More here.

OneIndia: New Delhi, April 5:The Panama Papers leak, claimed by many as the “world’s biggest”, has created ripples across the world, upsetting the rich and mighty with accounts in tax havens. But there is confusion about who actually leaked the papers.The leak turned out to be a Monday mayhem for around 214,000 hidden offshore companies after a group of global journalists, International Consortium of Investigative Journalists (ICIJ), got hold of the papers of the practically unknown law firm Mossack Fonseca based in Panama.
So who leaked the ‘Panama Papers’ — a collection of over 2,600 GB of data comprising more than 11 million documents?According to reports, over a year ago, an anonymous source contacted German newspaper Süddeutsche Zeitung (SZ) and submitted encrypted internal documents from Mossack Fonseca, detailing how the firm set up and sold anonymous offshore companies around the world.In the months that followed, the number of documents continued to grow far beyond the original leak.Ultimately, Süddeutsche Zeitung acquired about 2.6 terabytes, or 2,600 GB, of data –making the leak the biggest that journalists had ever worked with.The source, who contacted the German newspaper’s reporter, Bastian Oberway, via encrypted chat wanted neither financial compensation nor anything else in return, apart from a few security measures, the daily said on its website.
After getting their hands on the data, the Süddeutsche Zeitung decided to analyse the data in cooperation with the ICIJ as the consortium had already coordinated the research for past projects that the daily was also involved in.In the past 12 months, around 400 journalists from more than 100 media organisations in over 80 countries have taken part in researching the documents. The team included journalists from the Guardian and the BBC in England, Le Monde in France, La Nación in Argentina and The Indian Express in India.In Germany, Suddeutsche Zeitung journalists cooperated with their colleagues from two public broadcasters, NDR and WDR. Journalists from the Swiss Sonntagszeitung and the Austrian weekly Falter have also worked on the project, as have their colleagues at ORF, Austria’s national public broadcaster.The international team initially met in Washington, Munich, Lillehammer and London to map out the research process.

China would rather its citizens didn’t talk too much about the Panama Papers.

CNN: A coalition of news organizations has seized global attention with a barrage of reports based on a massive document leak from a law firm in Panama. The reports, which CNN hasn’t been able to independently verify, allege top officials and people connected to them around the world hid wealth through secret offshore companies.

China’s online censors are restricting many search results and discussions on social media involving the terms “Panama Papers” and “Panama.” They’re also censoring use of the names of relatives of current and former Chinese leaders — including President Xi Jinping — that are mentioned in the reports.

At a news briefing Tuesday, Chinese Foreign Ministry spokesman Hong Lei declined to comment in response to repeated questions about the reports, which he described as “pulled out of nowhere.”

It’s not against the law to have offshore financial holdings, and the leaked documents don’t necessarily indicate illegal activity. But the personal finances of Chinese leaders and their family members is a hugely sensitive issue for the ruling Communist Party, which is in the midst of a sweeping anti-corruption campaign led by Xi. More here.

 

 

WH/Jack Lew Helping Iran Launder Money

During the Obama summit, did Obama violate government secrets?

WASHINGTON, April 1 (UPI) For the first time in more than a decade, the United States has made public its inventory of nuclear uranium components, President Barack Obama said Friday. Much more here.

                                                         

 

The White House Cedes More, Even As Iran’s Economy Recovers

Mark Dubowitz, Annie Fixler
01 April 2016 – FDD Policy Brief

While U.S. and European diplomats celebrated the conclusion of the Joint Comprehensive Plan of Action last summer, Iran’s Supreme Leader Ali Khamenei and his government saw that deal as not the end of the negotiations but the beginning. This has become increasingly clear in their criticism of sanctions relief and demand for more.

The Obama administration appears ready to comply. Reportsconfirm that the administration is preparing a general license authorizing the use of the U.S. dollar in Iran-related transactions. This is intended to encourage large European and other banks to return to business with Iran and help alleviate its concerns about the legal risks associated with engaging with a country still under U.S. sanctions for money laundering, terrorism and missileproliferation, and human rights abuses.

The license would contradict repeatedadministrationpromises to Congress, and goes beyond any commitments made to Iran under the JCPOA. It also contradicts the evidence: Tehran has already received substantial sanctions relief, a major “stimulus package.”

In 2012 and 2013, Iran’s economy was crashing. It had been hit with an asymmetric shock from sanctions, including those targeting its central bank, oil exports, and access to the SWIFT financial messaging system. The economy shrank by six percent in the 2012-13 fiscal year, and bottomed out the following year, dropping another two percent. Accessible foreign exchange reserves were estimated to be down to only $20 billion.

This changed during the nuclear negotiations. During the 18-month period starting in late 2013, interim sanctions relief and the lack of new shocks enabled Iran to movefrom a severe recession to a modestrecovery. During that time, the Islamic Republic received $11.9 billion through the release of restricted assets, while sanctions on major sectors of its economy were suspended. This facilitated strong imports that supported domestic investment, especially from China. The Obama administration also de-escalated the sanctions pressure by blocking new congressional legislation. Jointly, these forces rescued the Iranian economy and its leaders, including the Revolutionary Guard, from an imminent and severe balance of payments crisis. In the 2014-15 fiscal year, the Iranian economy rebounded and grew at a rate of 3 to 4 percent.

Now, under the JCPOA, Iran has received access to an additional $100 billion in previously frozen foreign assets, significantly boosting its accessible foreign exchange reserves. Sanctions were also lifted on Iran’s crude oil exports and upstream energy investment, and on key sectors of the economy and hundreds of Iranian banks, companies, individuals, and government entities. The additional access of Iranian institutions to global financial payments systems has reduced transaction costs and the need for intermediaries.

In the current fiscal year – with declining oil prices and a tight monetary policy to rein in inflation – Iran’s economy grew only slightly, and may have even experienced a modest contraction. But in the coming fiscal year, its economy is projected to grow at a rate of 3 to 6 percent, according to estimates from the International Monetary Fund, World Bank, and private sector analysts. Assuming that Iran continues to make modest economic reforms to attract investment, the country’s economic growth is projected to stabilize around 4 to 4.5 percent annually over the next five years.

The future success of Iran’s economy depends on privatization, encouraging competition, addressing corruption, recapitalizing banks, and strengthening the rule of law. If Tehran wants to encourage foreign investment and alleviate international banks’ concerns, it also needs to end its support for terrorism, missile development, and destabilizing regional activities, and to reduce the economic power of the Revolutionary Guard Corps and the supreme leader’s business empire. All of these increase the risks of investing in the Islamic Republic, regardless of what deal sweeteners the White House provides.

Meanwhile, there is Russia who did NOT attend the Obama Nuclear Security Summit, but Russia is quite busy.

FreeBeacon: Russia is doubling the number of its strategic nuclear warheads on new missiles by deploying multiple reentry vehicles that have put Moscow over the limit set by the New START arms treaty, according to Pentagon officials.

A recent intelligence assessment of the Russian strategic warhead buildup shows that the increase is the result of the addition of multiple, independently targetable reentry vehicles, or MIRVs, on recently deployed road-mobile SS-27 and submarine-launched SS-N-32 missiles, said officials familiar with reports of the buildup.

“The Russians are doubling their warhead output,” said one official. “They will be exceeding the New START [arms treaty] levels because of MIRVing these new systems.”

The 2010 treaty requires the United States and Russia to reduce deployed warheads to 1,550 warheads by February 2018.

The United States has cut its warhead stockpiles significantly in recent years. Moscow, however, has increased its numbers of deployed warheads and new weapons.

The State Department revealed in January that Russia currently has exceeded the New START warhead limit by 98 warheads, deploying a total number of 1,648 warheads. The U.S. level currently is below the treaty level at 1,538 warheads.

Officials said that in addition to adding warheads to the new missiles, Russian officials have sought to prevent U.S. weapons inspectors from checking warheads as part of the 2010 treaty.

The State Department, however, said it can inspect the new MIRVed missiles.

Disclosure of the doubling of Moscow’s warhead force comes as world leaders gather in Washington this week to discus nuclear security—but without Russian President Vladimir Putin, who skipped the conclave in an apparent snub of the United States.

The Nuclear Security Summit is the latest meeting of world leaders seeking to pursue President Obama’s 2009 declaration of a world without nuclear arms.

Russia, however, is embarked on a major strategic nuclear forces build-up under Putin. Moscow is building new road-mobile, rail-mobile, and silo-based intercontinental-range missiles, along with new submarines equipped with modernized missiles. A new long-range bomber is also being built.

SS-N 30

SS-N 30

“Russia’s modernization program and their nuclear deterrent force is of concern,” Adm. Cecil Haney, commander of the U.S. Strategic Command, which is in charge of nuclear forces, told Congress March 10.

“When you look at what they’ve been modernizing, it didn’t just start,” Haney said. “They’ve been doing this quite frankly for some time with a lot of crescendo of activity over the last decade and a half.”

By contrast, the Pentagon is scrambling to find funds to pay for modernizing aging U.S. nuclear forces after seven years of sharp defense spending cuts under Obama.

Earlier this month, Gen. Joseph Dunford, chairman of the Joint Chiefs of Staff, told Congress that Russia continues to pose the greatest threat to the United States.

“The one that has the greatest capability and poses the greatest threat to the United States is Russia because of its capabilities—its nuclear capability, its cyber capability, and clearly because of some of the things we have seen in its leadership behavior over the last couple of years,” Dunford said.

In addition to a large-scale nuclear buildup, Russia has upgraded its nuclear doctrine and its leaders and officials have issued numerous threats to use nuclear arms against the United States in recent months, compounding fears of a renewed Russian threat.

Blake Narendra, spokesman for the State Department’s arms control, verification, and compliance bureau, said the Russian warhead build-up is the result of normal fluctuations due to modernization prior to the compliance deadline.

“The Treaty has no interim limits,” Narendra told the Free Beacon. “We fully expect Russia to meet the New START treaty central limits in accordance with the stipulated timeline of February 2018. The treaty provides that by that date both sides must have no more than 700 deployed treaty-limited delivery vehicles and 1,550 deployed warheads.”

Both the United States and Russia continue to implement the treaty in “a business-like manner,” he added.

Mark Schneider, a former Pentagon official involved in strategic nuclear forces, however, said he has warned for years that Russia is not reducing its nuclear forces under the treaty.

Since the New START arms accord, Moscow has eliminated small numbers of older SS-25 road-mobile missiles. But the missiles were replaced with new multiple-warhead SS-27s.

SS-27 Mod 2

SS-27 Mod 2

“The Russians have not claimed to have made any reductions for five years,” Schneider said

Additionally, Russian officials deceptively sought to make it appear their nuclear forces have been reduced during a recent nuclear review conference.

“If they could have claimed to have made any reductions under New START counting rules they would have done it there,” Schneider said.

The Obama administration also has been deceptive about the benefits of New START.

“The administration public affairs talking points on New START reductions border on outright lies,” Schneider said.

“The only reductions that have been made since New START entry into force have been by the United States,” he said. “Instead, Russia has moved from below the New START limits to above the New START limits in deployed warheads and deployed delivery vehicles.”

Deployment of new multiple-warhead SS-27s and SS-N-32s are pushing up the Russian warhead numbers. Published Russian reports have stated the missiles will be armed with 10 warheads each.

Former Defense Secretary William Perry said Thursday that New START was “very helpful” in promoting strategic stability but that recent trends in nuclear weapons are “very, very bad.”

“When President Obama made his speech in Prague, I thought we were really set for major progress in this field [disarmament],” Perry said in remarks at the Atlantic Council.

However, Russian “hostility” to the United States ended the progress. “Everything came to a grinding halt and we’re moving in reverse,” Perry said.

Other nuclear powers that are expanding their arsenals include China and Pakistan, Perry said.

Perry urged further engagement with Russia on nuclear weapons. “We do have a common interest in preventing a nuclear catastrophe,” he said.

Perry is advocating that the United States unilaterally eliminate all its land-based missiles and rely instead on nuclear missile submarines and bombers for deterrence.

However, he said his advocacy of the policy “may be pursuing a mission impossible.”

“I highly doubt the Russians would follow suit” by eliminating their land-based missiles, the former secretary said.

Additionally, Moscow is building a new heavy ICBM called Sarmat, code-named SS-X-30 by the Pentagon, that will be equipped with between 10 and 15 warheads per missile. And a new rail-based ICBM is being developed that will also carry multiple warheads.

Another long-range missile, called the SS-X-31, is under development and will carry up to 12 warheads.

Schneider, the former Pentagon official, said senior Russian arms officials have been quoted in press reports discussing Moscow’s withdrawal from the New START arms accord. If that takes place, Russia will have had six and a half years to prepare to violate the treaty limits, at the same time the United States will have reduced its forces to treaty limits.

“Can they comply with New START? Yes. They can download their missile warheads and do a small number to delivery systems reductions,” Schneider said. “Will they? I doubt it. If they don’t start to do something very soon they are likely to pull the plug on the treaty. I don’t see them uploading the way they have, only to download in the next two years.”

The White House said Moscow’s failure to take part in the nuclear summit was a sign of self-isolation based on the West’s sanctions aimed at punishing Russia for the military takeover of Ukraine’s Crimea.

A Russian official said the snub by Putin was directed at Obama.

“This summit is particularly important for the USA and for Obama—this is probably why Moscow has decided to go for this gesture and show its outrage with the West’s policy in this manner,” Alexei Arbatov, director of the Center for International Security at the Russian Academy of Sciences, told the business newspaper Vedomosti.

A Russian Foreign Ministry official, Mikhail Ulyanov, told RIA Novosti that the summit was not needed.

“There is no need for it, to be honest,” he said, adding that nuclear security talks should be the work of nuclear physicists, intelligence services, and engineers.

“The political agenda of the summits has long been exhausted,” Ulyanov said.

 

Cyber Intrusions, National Security Threat to Visa System

Primer: Listing a few demonstrating how vulnerable all segments of government, personal databases and corporations have forced lower standards of national security protections. Now with the threat to the State Department U.S. Visa system, terrorists and spies may exploit software security gaps. Anyone fixing this anywhere?

Cyber attack on Office of Personnel Management

Cyber attack of Obamacare

Cyber attack on hospital systems

Cyber attack on law firms

EXCLUSIVE: Security Gaps Found in Massive Visa Database

ABCNews: Cyber-defense experts found security gaps in a State Department system that could have allowed hackers to doctor visa applications or pilfer sensitive data from the half-billion records on file, according to several sources familiar with the matter –- though defenders of the agency downplayed the threat and said the vulnerabilities would be difficult to exploit.

Briefed to high-level officials across government, the discovery that visa-related records were potentially vulnerable to illicit changes sparked concern because foreign nations are relentlessly looking for ways to plant spies inside the United States, and terrorist groups like ISIS have expressed their desire to exploit the U.S. visa system, sources added.

“We are, and have been, working continuously … to detect and close any possible vulnerability,” State Department spokesman John Kirby said in a statement to ABC News.

After commissioning an internal review of its cyber-defenses several months ago, the State Department learned its Consular Consolidated Database –- the government’s so-called “backbone” for vetting travelers to and from the United States –- was at risk of being compromised, though no breach had been detected, according to sources in the State Department, on Capitol Hill and elsewhere.

As one of the world’s largest biometric databases –- covering almost anyone who has applied for a U.S. passport or visa in the past two decades -– the “CCD” holds such personal information as applicants’ photographs, fingerprints, Social Security or other identification numbers and even children’s schools.

Those records could be a treasure trove for criminals looking to steal victims’ identities or access private accounts. But “more dire” and “grave,” according to several sources, was the prospect of adversaries potentially altering records that help determine whether a visa or passport application is approved.

“Every visa decision we make is a national security decision,” a top State Department official, Michele Thoren Bond, told a recent House panel.

Last year alone, the State Department received -– and denied –- visa applications from more than 2,200 people with a “suspected connection to terrorism,” a senior Homeland Security Investigations official, Lev Kubiak, told lawmakers last month.

One official associated with State Department efforts to address the vulnerabilities said a “coordinated mitigation plan” has already “remediated” the visa-related gaps, and further steps continue with “appropriate [speed] and precision.”

“[We] view this issue in the lowest threat category,” the official said, noting that any online system suffers from vulnerabilities.

But speaking on the condition of anonymity, some government sources with insight into the matter were skeptical that CCD’s security gaps have actually been resolved.

“Vulnerabilities have not all been fixed,” and “there is no defined timeline for closing [them] out,” according to a congressional source informed of the matter.

“I know the vulnerabilities discovered deserve a pretty darn quick [remedy],” but it took senior State Department officials months to start addressing the key issues, warned another concerned government source.

Despite repeated requests for official responses by ABC News, Kirby and others were unwilling to say whether the vulnerabilities have been resolved or offer any further information about where efforts to patch them now stand.

PHOTO: U.S. Customs and Border Protection test new biometric technologies with face and iris cameras at the Otay Mesa border pedestrian crossing in San Diego, Calif. on Dec. 10, 2015.Richard Eaton/Demotix/Corbis
U.S. Customs and Border Protection test new biometric technologies with face and iris cameras at the Otay Mesa border pedestrian crossing in San Diego, Calif. on Dec. 10, 2015.more +

Nevertheless, many State Department officials questioned whether terrorists or other adversaries would have the capabilities to access and successfully exploit CCD data — even if the security gaps were still open.

CCD allows authorized users to submit notes and recommendations directly into applicants’ files. But to alter visa applications or other visa-related information, hackers would have to obtain “the right level of permissions” within the system -– no easy task, according to State Department officials.

There is also continuous oversight of the database and a series of other “fail-safes” built into the process, including rigorous in-person interviews and additional background checks, the officials said.

Kirby, the spokesman, described any recent security-related findings as a product of his department’s “routine monitoring and testing of systems” to “identify and remediate vulnerabilities before they can be exploited.”

PHOTO: The U.S. Department of State non-immigrant visa application website is seen in a screen grab made on March 30, 2016.ceac.state.gov
The U.S. Department of State non-immigrant visa application website is seen in a screen grab made on March 30, 2016.

State Department documents describe CCD as an “unclassified but sensitive system.” Connected to other federal agencies like the FBI, Department of Homeland Security and Defense Department, the database contains more than 290 million passport-related records, 184 million visa records and 25 million records on U.S. citizens overseas.

Without getting into specifics, sources said the vulnerabilities identified several months ago stem from aging “legacy” computer systems that comprise CCD.

“Because of the CCD’s importance to national security, ensuring its data integrity, availability, and confidentiality is vital,” the State Department’s inspector general warned in 2011.

The database’s software and infrastructure will be overhauled in the years ahead, according to the State Department.