photo by maritime-executive.com of a Chinese national arrested at the 29 Palms Marine Corps base in March for unauthorized access. The individual was in the U.S. illegally (U.S. Border Patrol)
The U.S. Navy has been facing a significant increase in the number of foreign nationals attempting unauthorized access to its bases, raising serious concerns about national security. These incidents, occurring about two to three times a week, primarily involve individuals from adversarial nations like China and Russia. The rise in such attempts has prompted heightened vigilance and strengthened security protocols across military installations.
The Nature of the Threat
According to U.S. Fleet Forces Commander Admiral Daryl Caudle, these intrusions often involve foreign nationals posing as tourists or students, claiming to be enthusiasts interested in military ships. However, many of these individuals have been identified as engaging in suspicious activities that suggest espionage motives. For instance, some have been caught attempting to access bases illegally, conducting unauthorized drone flights, and even scuba diving near sensitive areas such as Cape Canaveral and missile launch sites in New Mexico​ (Maritime Executive)​​ (the deep dive)​.
In some instances, individuals have managed to enter the bases despite lacking proper authorization. For example, in March, an illegal Chinese immigrant was arrested at the 29 Palms Marine Corps Base after bypassing security checkpoints. Such breaches are not isolated incidents but part of a broader pattern of espionage attempts linked to Chinese nationals, who have been frequently arrested for accessing or spying on naval installations​ (Maritime Executive)​​ (Pakistan Defence Forum)​.
Response and Countermeasures
The U.S. Navy has been responding to these threats by involving the Naval Criminal Investigative Service (NCIS) to investigate and collect biometrics from the suspects. Enhanced training for military personnel on how to handle intruders and emerging threats, including drone swarms, has also been implemented. Colonel Philip Laing from Camp Pendleton highlighted a recent training activity that focused on adapting to a "living, breathing adversary," emphasizing the importance of readiness for such intrusions​ (Association of Defense Communities)​.
Despite these efforts, differentiating between casual intruders and those with malicious intent remains challenging. The widespread availability of commercial drones has further complicated the situation, as it is difficult to discern whether drone flights are innocent hobbies or covert surveillance operations by nation-states​ (Maritime Executive)​​ (Association of Defense Communities)​.
Broader Implications
The surge in unauthorized access attempts reflects broader geopolitical tensions and highlights vulnerabilities in the U.S. military's security infrastructure. The increase in Chinese nationals crossing the southern border and subsequently attempting to access military sites underscores potential exploitation of immigration pathways for intelligence gathering purposes​ (the deep dive)​.
High-profile cases, such as the arrests of Petty Officer Wenheng Zhao and Jinchao Wei on espionage charges, have underscored the gravity of the threat and the need for robust counterintelligence measures​ (the deep dive)​. These incidents have sparked calls for increased vigilance and a reevaluation of security measures at U.S. military installations to prevent espionage and protect national security.
Conclusion
The frequent attempts by foreign nationals to infiltrate U.S. Navy bases underscore a persistent and evolving security threat. While the Navy has taken significant steps to counter these intrusions, the complexity and frequency of the attempts necessitate continuous adaptation and enhancement of security protocols. The ongoing vigilance and proactive measures are crucial in safeguarding sensitive military information and maintaining national security.
Training Resources:
For individuals looking for a hands on training that includes all of the above topics, Covert Access Team (covertaccessteam.com) provides training courses focused on physical penetration testing, lockpicking, bypassing techniques, social engineering and other essential skills.
Covert Access Training - 5 day hands on course designed to train individuals and groups to become Covert Entry Specialists
Physical Audit Training - 2 day course on how to setup and run a physical security audit
Elicitation Toolbox Course - 2 day course of that primarily focuses on elicitation and social engineering as critical aspects of Black Teaming
Counter Elicitation - 2 day course on how to recognize and prevent elicitation attempts, and safegaurd your secrets.
Cyber Bootcamp for Black Teams - 2 day course designed explicitly for physical penetration testers who need vital cyber skills to add to their toolbox.
Private Instruction - Focused learning & training based on your needs .