• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

Detecting Criminal Disruption of Supply Chains

Jun 15, 2022

  • News

Criminal organizations have previously disrupted and manipulated legitimate supply chains for financial gain and other reasons, and they will continue to do so. Such disruption and manipulation may take the form of blocking one or more elements of a supply chain to demand ransom, cause damage to the target, create delay or uncertainty, or motivate a redirection to alternative suppliers, or they may take the form of injecting counterfeit material into the supply chain and/or removing genuine materials. During a time of global crisis, the effects of supply chain disruptions or manipulations are magnified as already fragile systems and populations are under stress. Additionally, in the current environment, multiple supply chains will prove critical to ending the COVID-19 pandemic via the distribution and uptake of vaccines and treatments.

The project team is developing methods and tools to detect active, pending, or past criminal manipulation or disruption of a supply chain, with specific emphasis on supply chain vulnerabilities during disasters. The team is modeling both supply chains and criminal operations, and merging those models to simulate attacks and establish likely disruption or manipulation scenarios, associated indicators, and mitigation recommendations.

The resulting analysis for specific supply chains identifies likely attack points, develops indicators which can serve to alert authorities and supply chain operators about a pending, active, or past attack, and provides recommendations to mitigate the identified vulnerabilities and reduce attack impacts. The team is delivering analysis of three different supply chains, as well as a methodology and tools so that DHS and others can model and study other supply chains and criminal organizations, and anticipate and thwart attacks before they happen.

Research Team PI: Carlotta Domeniconi (GMU/CINA) and Fred Roberts (Rutgers/CCICADA)

Research Areas:

  • Criminal network analysis
  • Illicit supply and value chains

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube