Open-Source Vetting for National Security: AI-Driven OSINT and Insider Threat Detection

In an era of escalating insider threats and state-sponsored tech espionage, U.S. national security agencies are turning to open-source intelligence (OSINT) and unclassified data to vet individuals and companies for hidden risks. Open-source vetting for national security leverages AI, machine learning, graph databases, and data fusion to connect the dots across public information, enhancing risk assessments and spotting insider threats before they wreak havoc. From cutting-edge AI tools that flag anomalies in a contractor’s background to graph-powered analytics exposing covert networks, these innovations are reshaping how the Department of Defense (DoD) and Intelligence Community (IC) safeguard America’s secrets. This in-depth analysis explores how open-source vetting works in practice—and why recent insider espionage cases in 2024 and 2025 underscore its urgency.
Securing Global Supply Chains in an Era of Heightened Risk

From Houthi attacks in the Red Sea to China’s strategic export controls, global supply chains have been rocked by disruptions in 2024 and 2025. This in-depth analysis examines the key threats—geopolitical, cyber, criminal, and environmental—impacting global logistics and critical industries. Learn how the U.S. and its allies are responding with new policies, partnerships, and innovations to strengthen supply chain resilience.
Unclassified Intelligence Research at FIU: Students Shaping National Security Analysis

At Florida International University, student-led unclassified intelligence research is shaping real-world national security operations. Through open-source dashboards and strategic analysis, students are tracking China’s expanding influence, critical minerals security, illegal maritime activity, and transnational migration patterns in the SOUTHCOM region. These insights, designed for operational use, demonstrate the power of geospatial intelligence in addressing emerging threats. Read how FIU’s Security Research Hub is bridging academia and national security with cutting-edge, shareable intelligence tools.
China’s Telecommunications Infiltration: A Growing Security Risk in Latin America

While concerns over DeepSeek dominate headlines, China’s telecommunications infiltration across Latin America has been expanding for years. Through Huawei, ZTE, and other state-linked firms, Beijing is embedding itself into the region’s digital infrastructure—raising cybersecurity risks, enabling potential surveillance, and increasing strategic dependence on Chinese technology. With Latin America’s digital future at stake, now is the time to push for secure alternatives and safeguard the Western Hemisphere from Beijing’s technological grip.
Colombia’s Post-Conflict Security: Progress and Challenges in Stabilization

Colombia’s post-conflict security is under pressure from rising violence and regional instability. Can military and diplomatic efforts sustain peace?
Data-Driven Intelligence for Combating Drug Cartels

Explore how OSINT, AI, and geospatial analytics are revolutionizing U.S. counter-narcotics efforts. With new policies designating cartels as terrorist organizations and advanced intelligence tools mapping trafficking networks, law enforcement is shifting from reactive to proactive. Learn how data-driven intelligence is reshaping the fight against drug trafficking in 2024-2025.
Recent Drone Incursions Over U.S. Military Bases: A Potential Chinese Connection?

Frequent unauthorized drone activity near U.S. military installations, such as Vandenberg and Wright-Patterson Air Force Bases, raises concerns about espionage and airspace vulnerabilities. The advanced capabilities of these drones and the proximity of Chinese-owned land near critical sites suggest potential links to hybrid warfare strategies, though direct evidence remains inconclusive.
Russian Airspace Violations Pose A Growing Security Risk in Eastern Europe

Recent Russian airspace violations into Latvian, Romanian, and Polish airspace highlight escalating security risks and potential vulnerabilities along NATO’s eastern border. These incidents suggest a broader Russian strategy of testing NATO defenses, raising concerns about accidental escalation and the need for enhanced air defense capabilities.
3GIMBALS’ OMEN Knowledge Graph – GraphRAG for Defense Intelligence

3GIMBALS OMEN knowledge graph enhances AI-driven decision-making by integrating structured data for precise, transparent, and context-aware insights.
From China to Yemen: The Houthis’ Resilient Supply Lines Run Through Oman

Houthi smuggling networks are adapting under pressure, using Oman as a key transit hub for weapons and dual-use tech from China. With escalating threats to global trade and security, disrupting these supply lines is critical to countering Houthi influence in the region.