Strategy for Industry | Risk Analysis Brief
Operational Risk Manufacturing & Asset Operations ISIC 3030

Counterfeit Infiltration

Manufacturing & Asset Operations — Risk Analysis & Response Guide

Reference case: Manufacture of air and spacecraft and related machinery ISIC 3030

3 Risk Indicators
3 Response Steps
1 Cascade Risks
Potential Business Impact

Catastrophic Liability & Brand Erasure. Mandatory global recalls and loss of 'Approved Supplier' status. In 2026, the cost of 'Forensic De-contamination'—identifying every unit containing the suspect part—often exceeds the firm's insurance coverage, leading to insolvency. Triggers ESG_SOC_008 (Public Safety Failure) which often leads to criminal investigations.

This brief provides a diagnostic framework and response guide for the Counterfeit Infiltration risk scenario in the Manufacturing & Asset Operations domain. Use the risk indicators below to assess whether your organisation may be exposed.

The following example illustrates how this risk scenario can emerge in practice. This is one of many industries where these conditions may apply — not a diagnosis of your specific situation.

In Jan 2026, a major turbine manufacturer (SC07) discovers that a Tier-3 supplier used forged paper logs to pass off industrial-grade titanium as aerospace-grade. Because the firm relied on analog audits (DT05), it cannot pinpoint which 2,000 engines have the defective part. The FAA mandates an immediate grounding of the entire fleet, resulting in a $4.2B liability.

This scenario activates when all of the following GTIAS attribute thresholds are met simultaneously. Use this as a self-assessment checklist:

SC07 4 / 5
DT05 4 / 5
RP11 4 / 5

Scores drawn from the GTIAS 81-attribute scorecard. Click any attribute code to view its definition and scale.

Immediate and tactical steps to address or mitigate exposure to this scenario:

  1. 1 Adopt 'Digital Product Passports' (DPP) with blockchain-backed immutability
  2. 2 utilize 'Physically Unclonable Functions' (PUF) or DNA-based molecular markers for physical verification
  3. 3 implement automated AI-spectral analysis at receiving docks.

For the full strategic playbook behind these actions, see Risk Rule OPS_MFG_003 →

If this scenario is left unaddressed, it can trigger the following secondary risk rules. Organisations should monitor these as early-warning indicators:

Vetted specialists in consulting, technology, software relevant to this risk scenario:

What conditions trigger the "Counterfeit Infiltration" scenario?
This scenario triggers when SC07 ≥ 4 and data intensity (DT05 ≥ 4) and RP11 ≥ 4 reach elevated levels simultaneously. These attributes reflect Mandatory global recalls and loss of 'Approved Supplier' status. that, in combination, creates a materially higher probability of the outcome described above.
How does "Counterfeit Infiltration" disrupt day-to-day operations?
Catastrophic Liability & Brand Erasure. Operational disruptions of this type typically propagate through the supply chain within days, but the structural cause — SC07 ≥ 4 and data intensity (DT05 ≥ 4) and RP11 ≥ 4 — may have been building for months. Early detection through regular attribute monitoring is critical.
Which parts of the value chain bear the most risk from "Counterfeit Infiltration"?
The risk concentrates wherever SC07 ≥ 4 and data intensity (DT05 ≥ 4) and RP11 ≥ 4 intersects with fixed commitments — contracts, staffing levels, or capital-intensive processes. Catastrophic Liability & Brand Erasure.
What distinguishes companies that manage "Counterfeit Infiltration" effectively?
Effective responses address the root attributes rather than the symptoms. Adopt 'Digital Product Passports' (DPP) with blockchain-backed immutability. utilize 'Physically Unclonable Functions' (PUF) or DNA-based molecular markers for physical verification. Companies that monitor SC07 ≥ 4 and data intensity (DT05 ≥ 4) and RP11 ≥ 4 as leading indicators — rather than reacting to lagging financial results — consistently achieve better outcomes.
What other risks does "Counterfeit Infiltration" trigger or amplify?
Left unaddressed, this scenario can cascade into related risk patterns: Toxic Product Recall. These downstream risks share underlying attribute conditions with "Counterfeit Infiltration", which is why organisations that mitigate the primary trigger typically see simultaneous improvement across the cascade chain.