City Research Online

Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda

Sodhi, M. S. ORCID: 0000-0002-2031-4387, Roscoe, S., Ellram, L. M. , Tang, C., Sarkis, J., Handfield, R., Roehrich, J. & Schleper, M. (2025). Infiltration, Interdiction, and Other Covert Supply Chain Operations: A Research Agenda. International Journal of Operations and Production Management, 45(13), pp. 233-252. doi: 10.1108/ijopm-02-2025-0115

Abstract

Purpose: The masterminds behind covert supply chain operations aim to hide their activities from government agencies and society at large, often for illegal gains or to intentionally cause harm. This conceptual article outlines a research agenda for future studies by framing covert supply chain activities and the countermeasures used to disrupt them.

Design/methodology/approach: Secondary data was collected from various news sources (observation) and analyzed to understand the nature of covert supply chain operations and efforts to identify and disrupt them (conceptualization).
Findings: To date, covert supply chain operations and counter-operations categories have been scarcely scrutinized in the supply chain literature, and our framework presents many fruitful avenues for further research.

Practical implications: Policymakers may aim to enhance the visibility of covert supply chains to achieve strategic objectives. Our framework enables logistics providers, network orchestrators, and shippers to identify vulnerabilities and detect covert infiltration by hostile actors within customer supply networks.

Originality/value: The mainstream supply chain literature has viewed supply chains of illegal goods and disruptive counter-operations as piecemeal. This conceptual article addresses the topic holistically to create a framework for guiding future research.

Publication Type: Article
Additional Information: Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors.
Publisher Keywords: Smuggling, Trafficking, supply chains, disruption, infiltration, interdiction, counter-operations, illegitimate supply chains, research agenda, security, counterfeiting
Subjects: H Social Sciences > HD Industries. Land use. Labor > HD28 Management. Industrial Management
Departments: Bayes Business School
Bayes Business School > Faculty of Management
SWORD Depositor:
[thumbnail of ijopm-02-2025-0115en.pdf]
Preview
Text - Published Version
Available under License Creative Commons Attribution.

Download (781kB) | Preview
[thumbnail of Accepted Manuscript-30 July 2025.pdf]
Preview
Text - Accepted Version
Download (777kB) | Preview

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login