• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

Detecting Criminal Disruption of Supply Chains Study

Summary

Deliberate disruption of a licit supply chain remains a threat to our global economy and national security. This project models both supply chains and criminal organizations to simulate multiple attack scenarios for the purposes of identifying supply chain vulnerabilities, discovering likely attack scenarios and the necessary criminal organization capabilities, and developing mitigations as well as indicators and warnings.

 

Problem addressed

The project is meant to prove the concept that observable data, when combined with prior knowledge of a licit supply chain and a criminal organization, may be used to detect the planned, current, or past disruption of the supply chain by a criminal organization. The goal is to use simulation to identify possible ways that criminal organizations might be able to disrupt or damage important supply chains, such as those for a drug manufacturer, to examine approaches to provide warnings, and to identify possible ways to prevent, mitigate, or repair this disruption.  We proposed (a) understanding and modeling specific licit supply chains, (b) understanding and modeling specific criminal organization operations and capabilities, and (c) combining parts (a) and (b) to identify potential data sources of value and associated indicators and warnings.

 

Approach

We apply a combination of agent-based discrete event simulation and stochastic optimization to model supply chains, their interactions, and ways that criminal organizations might attempt to attack them.  Our approach models possible attack points, develops indicators that can alert authorities and supply chain operators about pending, active, or past attacks, and offers what-if analysis to consider ways to mitigate vulnerabilities and reduce attack impacts. The project uses both subject matter expertise and automated distributed optimization techniques to develop and calibrate the models.

 

Results

The development of a drug and vaccine supply chain has been completed, and several disruption scenarios and required capabilities of criminal organizations have been identified. The supply chain and disruptions have been implemented and integrated in a simulation environment, the effect of the disruptions have been measured, and early warning signals and mitigation strategies are being studied and developed. Automated model calibration strategies, via distributed stochastic optimization methods, are being integrated with the simulation framework to analyze worst-case disruption scenarios and related optimal mitigation strategies.

 

Anticipated Impact for DHS

Since this project began there has been a dramatic increase in attention paid to supply chains, their impact on the global economy, and their exposure to disruption.  The results of the project will advance research into how DHS can build models of supply chains, pose what-if questions regarding optimal ways to disrupt them given specific amounts and kinds of resources and know-how, examine how to make supply chains more robust against attacks, to identify and mitigate attacks before and while they occur, and to repair damage after the fact.

 

Research Products:

Publications:

Mitigation of Optimized Pharmaceutical Supply Chain Disruptions by Criminal Agents

Topics:

  • Networks

Research Areas:

  • Criminal investigative processes
  • Illicit supply and value chains

Investigators

  • Carlotta Domeniconi, Ph.D.
  • Sean Luke
  • Fred Roberts
  • Andrew Crooks
  • Jim Jones

Related Publications:

  • Mitigation of Optimized Pharmaceutical Supply Chain Disruptions by Criminal Agents

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube