3GIMBALS

Preventing Unauthorized Access to DoD Installations: Emerging Threats & Solutions

The prevalence of foreign farmland ownership near DoD installations provides an easy opportunity for unauthorized drone access. Sources: AFIDA Annual Report through 31 December 2023 and Defense Installation Spatial Data Infrastructure (DISDI) Program within the Office of the Assistant Secretary of Defense for Energy, Installations, and Environment.

Preventing unauthorized access to DoD installations is no longer just about stopping trespassers—it’s now a critical national security imperative as adversaries like China and Iran increasingly test U.S. defenses. Incidents involving drone incursions, suspicious intrusions disguised as tourism, and coordinated espionage attempts highlight growing vulnerabilities that traditional force protection methods are ill-equipped to handle. In this blog, we delve into the urgent threat landscape, share recent alarming case studies from 2024 and 2025, explore policy responses such as the GATE CRASHERS Act, and advocate for modernized, integrated security approaches that combine artificial intelligence, open-source intelligence, and advanced analytics to decisively counter threats and secure DoD installations against unauthorized access.

Open-Source Vetting for National Security: AI-Driven OSINT and Insider Threat Detection

In an era of escalating insider threats and state-sponsored tech espionage, U.S. national security agencies are turning to open-source intelligence (OSINT) and unclassified data to vet individuals and companies for hidden risks. Open-source vetting for national security leverages AI, machine learning, graph databases, and data fusion to connect the dots across public information, enhancing risk assessments and spotting insider threats before they wreak havoc. From cutting-edge AI tools that flag anomalies in a contractor’s background to graph-powered analytics exposing covert networks, these innovations are reshaping how the Department of Defense (DoD) and Intelligence Community (IC) safeguard America’s secrets. This in-depth analysis explores how open-source vetting works in practice—and why recent insider espionage cases in 2024 and 2025 underscore its urgency.

Securing Global Supply Chains in an Era of Heightened Risk

From Houthi attacks in the Red Sea to China’s strategic export controls, global supply chains have been rocked by disruptions in 2024 and 2025. This in-depth analysis examines the key threats—geopolitical, cyber, criminal, and environmental—impacting global logistics and critical industries. Learn how the U.S. and its allies are responding with new policies, partnerships, and innovations to strengthen supply chain resilience.

Understanding the Sanctions Quartet: How Iran, Russia, China, and North Korea Navigate a Complex Business Environment 

The Sanctions Quartet have developed strategies to reshape global sanctions enforcement, enabling Iran, Russia, China, and North Korea to bypass restrictions through alternative financial systems, shadow trade networks, and cyber-enabled illicit activities. Understanding how this alliance operates is crucial to countering its growing influence and the broader geopolitical risks it presents.

Data-Driven Intelligence for Combating Drug Cartels  

Data-driven intelligence for mapping drug trafficking routes.

Explore how OSINT, AI, and geospatial analytics are revolutionizing U.S. counter-narcotics efforts. With new policies designating cartels as terrorist organizations and advanced intelligence tools mapping trafficking networks, law enforcement is shifting from reactive to proactive. Learn how data-driven intelligence is reshaping the fight against drug trafficking in 2024-2025.

The Strategic Role of Neuquén in China’s Precision Strike Capabilities

China began construction of the space station by January 2014

Concerns about China’s Deep Space Station in Neuquén, Argentina, grew in April 2024 after U.S. warnings of potential military use. Argentine officials, with Chinese Embassy personnel, briefly inspected the site on 18 April 2024, finding no unusual activities and promoting cooperation. However, this visit and a 2019 one did not inspect a nearby calibration tower site, where satellite imagery shows possible equipment. The next day, China announced the PLA Aerospace Force, complicating efforts to link the Neuquén station, operated by the China Satellite Launch and Tracking Control Center, to military activities.

Strategic Alliance: The Flow of Chinese Technology to Russia 

Russia procures Chinese dual-use goods such as integrated circuits, critical for advanced weapon systems

In the face of stringent Western sanctions, Russia’s importation of sensitive, dual-use goods from China surged by more than 40% to over $5.2 billion in 2023. These Chinese components are integral to Russia’s defense industrial base, fueling the production of long-range armaments, unmanned aerial systems (UAS), and electronic warfare (EW) systems. These systems empower Russian forces to launch effective and often indiscriminate attacks on Ukrainian civilian and military targets, while simultaneously bolstering defensive capabilities for Russia’s invasion. 

Integrating GEOINT into Cyber Intelligence Investigations

GEOINT in cyber investigations

At GEOINT 2024, Rob Falcon delivered a lightning talk where he discussed the integration of geospatial intelligence (GEOINT) into cyber intelligence investigations. As the Lead Cyber Analyst at 3GIMBALS, Rob brings a wealth of experience from both military and private sector backgrounds, offering unique insights into the evolving landscape of cyber threats.