Freight Thieves
With the transportation industry evolving, the threat of unlawful activity is also evolving. Nowadays, thieves use multiple methods to obtain cargo of electronics, consumable, household, or any valuable goods and sell them on black market.? It is important for companies to acknowledge and protect themselves against these individuals.
Scott Cornell, Travelers Transportation Segment Lead says, “There are some things about cargo theft that haven’t changed much over the years and there are many things that have changed significantly including new methods, targeted commodities, and the use of technology to commit cargo theft,” and added there is 600% increase in suspicious activities aiming to obtain cargos in 2023.
There are couple methods that thieves use:
1.????? Straight Cargo Theft
First one is straight cargo theft. Happens quickly and physically. At truck stops, parking lots, anywhere that cargo is left unattended by drivers. Thieves would observe and use the moment of the driver is not around or not pay attention. Trailers with low security are the likely target.
What to do?
-????????? The drivers should not leave the cargo or the trailer unattended.
-????????? Companies should provide the trucks with higher security locks on trailers.
2.????? Strategic Cargo Theft
This method uses indirect methods to deceive shippers, brokers, and carriers for them to deliver the goods to their location rather than the original designated location. The methods the thieves use can vary from digital attacks to physical robberies. Usually, they would look for loads that cannot be intervened fast times like afternoon or Friday evenings in hopes that time with the deadlines, drivers and dispatchers will not be able to respond to these attacks fast enough and prevent. They can even steal a logistic company’s identity and generate false load posts.
What to do?
-????????? Thieves can introduce themselves as anyone. In order to be careful, parties should go through other parties’ information thoroughly on Federal Motor Carrier Safety Administration (FMSCA), contact an industry associate or search the parties on the internet.
-Parties should be working closely with the logistic supplier and having information on the identification of drivers for pick-up. Such as their truck information details, which type of trailer or truck being used and pick-up numbers.
- Any party should be contacting the other parties at any point that slightly feels concerning or confusing.
领英推荐
3.????? Technological Theft
Law enforcement made aware of a device that thieves are using called sniffers. This device being attached in or on trailers and works as a jammer. Without GPS connection, helpless truck drivers are left alone and cannot reach law enforcement. Later, thieves would approach the trailer and steal the goods.
4.????? Cyber Theft
This method aims to capture information through phishing emails that contain Trojan malware. The malware can infect the company’s database systems and let thieves access sensitive information. Pick-up, delivery, freight, and truck information can be captured.
What to do?
-????????? Companies should observe and examine their websites and social media regarding the information they make available to the public.
-????????? For both parties their IT department or third-party cyber security company should work close with the companies’ systems and test and solve possible breaches.
5.????? Pilferage Theft
With this method, thieves enter the trailer in one of the stops the truck driver makes, steal the goods, and leave in one of the stops. The truck driver would not recognize the goods being missing until they reached their destination – until it’s too late. Since it is unknown where the thieves got in and left, law enforcers would have a hard time tracking them determining who they are, where they entered the trailer, where they left.
What to do?
-????????? Drivers should do a complete walk around inspection at every stop they make.
-????????? Companies can use high-security locks and pad locks.
These are only a couple of common methods that thieves are using. There are more and more elaborate ways to obtain your freight unlawfully. It is important to be careful and increase the security precautions in case of being targeted. Every party has the responsibility to make sure all the parties are verified and trustworthy partners. At any time, any suspicion should be reported to all the parties involved. In need, law enforcement should be notified.
--
11 个月When regulations fail improvising prevails