defending your company from cyber-based threats. Having
this type of protection in place for virtual threats is just as
critical as the physical protection needed around a yard or
for a load in transit.
Q Over the past five years, how have these tactics evolved? What has changed about the way they are executed?
AStrategic theft methods have changed over the years. There was a time when we primarily saw two tactics—
identity theft and fictitious pickups—but in recent years,
we have seen more than a dozen different methods used.
These types of cargo theft involve the use of fraud and
deceptive information intended to trick shippers, brokers,
and carriers into giving the load to the bad guys instead of
the legitimate carrier. Organized cargo groups now use strategic methods such as double-brokering scams and “ghost
trucks,” and they will even trick legitimate trucking companies into picking up
the loads for them. Additionally, thieves
will combine two or three methods to
further complicate things. Victims may
not be able to tell how they’ve actually
been hit.
It is important to thoroughly vet all
carriers and brokers through the Federal
Motor Carrier Safety Administration
(FMCSA), Internet search engines,
third-party vetting companies, and
industry associations. Work closely with
shippers to confirm driver identification
at the point of pickup, and don’t hesitate
to contact your customers and business
partners if there is any question or concern. Often, the
additional scrutiny will deter thieves from pursuing the
load in question.
Q Freight brokers and third-party logistics service provid- ers (3PLs) play key roles in procuring truck capacity for
their shipper customers. Do you find these intermediaries
are up to speed on anti-theft strategies and tactics?
A It depends on whom you are talking about. Some larger brokers have dedicated teams with very detailed vetting
procedures and security teams that can respond if they have
a theft. Others may not have the same awareness or necessary procedures in place or dedicated resources needed to
respond because they haven’t yet experienced a theft.
QIt’s been said that freight posted on spot market loadboards becomes a target as soon as it is visible.
Loadboards are getting more traffic today as spot market
demand remains very strong. What are the security holes in
loadboard freight and how can they be fixed?
ALoadboards are as much a victim as the shippers and carriers in this situation. They are being taken advan-
tage of while trying to provide a valuable resource and
service, and there’s only so much that can be done to stop
it. Some boards restrict membership, but even that can be
worked around, and when bad guys do get through, it’s
simple for them to profile a load to target.
In this situation, it’s important for users to exercise caution when coordinating through these boards. There are
some steps they can take to help keep a shipment safe: First,
establish strong pickup security policies and procedures.
For example, require the driver to have a specific and secure
pickup number to gain access to the load. Second, ensure
everyone involved in the haul is who they say they are. This
also goes for the freight broker assigned to choose the carrier. Third, check if your insurer offers the
right coverages for these perils and has
the resources to prevent theft issues and
recover goods if the worst happens.
QYou said at a recent conference that hieves will “go to the well until the
well goes dry.” Does that mean they will
leverage the same scenario until they are
stopped? How do shippers and carriers
combat this?
AThieves know what they’re doing. If they know they can target a specific
company with good cargo and insufficient preventive measures, they’ll do so
until someone stops them. But they’re
also smart enough to move on when law enforcement or the
targeted company starts cracking down. We’ve seen several
shifts over the years where law enforcement will be on the
lookout for one type of theft, and in response, thieves will
shift their tactics to evade detection. Similarly, we’ve seen
thieves make sudden geographic shifts when they realize
they’ve attracted too much attention in one area. For example, we’ve seen California-based crews move to Arizona,
Utah, or Washington to evade detection. This creates a
Whack-a-Mole effect.
QHow much theft can be deterred just with common sense, such as fully vetting a carrier before providing
pickup information? Or is that easier said than done?
ACargo theft doesn’t take only one form, and neither should theft prevention. I can’t stress enough the
importance of taking a layered approach to protecting
loads. Remember, processes and procedures are free, and
they are often the best methods to prevent theft.