Transport Fraud Advisory

Your carrier is vetted.
Your load isn't.

Carrier vetting shouldn't stop at onboarding.
It never did for the people who steal your loads.

$725M
Cargo theft losses in 2024
CargoNet Annual Report, 2024
60%
Increase in cargo theft losses, year over year
BSI Supply Chain Risk, 2024
1,500%
Increase in organized freight theft since 2021
TIA, 2024
Composite incident patterns

Patterns we've seen.
Documented from real incidents.

These are composite descriptions of incidents our founders have directly investigated or observed. Not statistics. Operational reality.

Fictitious Pickup
A company showed up with the right MC number, the right carrier name on the truck, and a load confirmation that checked out. The load was released. Two days later, the actual authorized carrier arrived to pick up. The vehicle was already gone. The shipper had no idea anything was wrong until the real carrier showed up empty-handed.
Double Brokering
The broker confirmed the carrier. The carrier confirmed the driver. A random company was dispatched the shipper had never approved. Three loads vanished before the pattern was visible in the TMS.
Identity Hijack
A dormant carrier company with a real MC number, real history, and a real DOT was acquired and reactivated. It passed every vetting check because it was a legitimate company. Loads were won, picked up, and gone before the company ever appeared on a watchlist. By then the people behind it had moved on to the next one.
The 90-Minute Window
Dispatch confirmed at 2:14pm. GPS showed the authorized truck en route. Meanwhile, a different company was already at the pickup location loading the vehicles. By the time the real carrier arrived, the load was gone. The GPS had shown everything as normal the entire time.
Insurance Gap
The claim was filed. The adjuster asked for documentation of the load. The shipper had a signed BOL and a carrier onboarding report. Neither proved who took the load. The claim was denied.
The Correct Procedure Failure
Every SOP was followed. Every checkbox was checked. The load disappeared anyway. When we reviewed the operation, the gap wasn't in the procedure. It was in the assumption that the procedure was enough.

If you recognized your operation in any of those, we already know where to look.

Tell us what happened  →
Why vetting the carrier is not enough

Most major shippers have at least three of these open right now.

1
The Identity Gap
Carrier approval is a snapshot. Fraud is ongoing. The company that passed vetting last quarter is not necessarily the company that shows up today.
2
The Unverified Handoff
Your TMS says dispatched. Your GPS says en route. Between those two data points, there is a window every scheme we've seen has exploited.
3
The Insider View
They don't need access to your systems. A compromised carrier account and outdated dispatch operations give fraudsters everything they need to execute.
4
The Payment Shortcut
Carrier payment details change at the worst possible moments. By the time the real carrier asks where their money is, it's already gone.
5
The Shell Carrier
A purchased MC number wins the load through proper channels. A different company picks it up. The broker approved the first. Nobody ever saw the second.
6
The Documentation Gap
A signed BOL confirms the load existed. A carrier onboarding report confirms the company was approved. Neither one tells an adjuster who actually took possession of the freight.

After one conversation, we show you exactly which of these sit open in your operation.

Find your open doors  →
Who we are

Built by people who've been inside the operations being targeted.

"We've been in the room when a shipper realized their load was gone. The carrier was vetted. The paperwork was signed. None of it mattered."

TFA Founders  ·  Combined 40 years in automotive brokerage & logistics operations

That's why Transport Fraud Advisory exists. Not as a research project, but as a direct response to schemes we watched happen. Between us, we've been the broker, the dispatcher, the driver, and the person on the phone with the shipper explaining how their load disappeared. We built the assessment framework because we knew exactly where to look.

Automotive Brokerage
10 Years in the Broker Chair
Carrier vetting · Load dispatch · Automotive freight operations
A decade dispatching automotive loads and vetting carriers. Watching fictitious pickups, double brokering, and carrier identity fraud hit operations that were doing everything right. That firsthand experience is the foundation of the fraud assessment framework we built.
North American Logistics
30 Years in Freight Operations
Carrier networks · High-value freight · North American operations
Three decades managing carrier networks and high-value freight across North America. The methods change. The gaps they exploit don't.
Who we work with

People call us for one of two reasons.
Both of them are urgent.

Track 1: Post-Incident
You just lost a load.
The crisis is handled. But the gap that allowed it is still open. You know it. Your customer is asking questions. Your insurer is reviewing the file. The specific failure point is still there.
We diagnose the exact failure point, document what happened, and show you how to close it before it happens again.
Track 2: Proactive
You want to close the gap before it costs you.
A shipper, dealer, or underwriter is asking about your fraud prevention controls. Or you've seen what's happening in the industry and you don't want to wait for your own incident to find out where you're exposed.
We map your exposure profile and show you exactly which gaps sit open in your operation right now.

If neither of these is you today, it will be. Schedule a call before you need one.

Schedule a 30-60 minute call  →
How we work

No mystery. Here's exactly
what happens when you call.

Independent. No platform commissions. No reseller agreements. We are paid to find the truth, not to sell a subscription.

1
30–60 Minute Call
You describe your operation. We ask the questions your current process doesn't. No pitch. Just diagnosis.
2
Mutual NDA
We sign a mutual NDA before going deeper. Standard practice for this kind of work.
3
Assessment
We take a close look at how your operation runs and where the exposures sit.
4
Verbal Debrief
We walk your team through every gap we found, what it's costing you, and exactly what to close first.
What comes next

The advisory found the gaps.
So we built the technology to close them.

Our founders spent their careers inside the operations these schemes target. After watching fraud patterns emerge and escalate over the past several years, they built the technology to close the gap. CertifiedLoads is patent-pending. We don't discuss the specifics publicly. That conversation happens through CertifiedLoads directly.

Learn about CertifiedLoads  →

The fraudsters already have their
next carrier ready.

They've done the research. They know which loads are worth taking. The question is whether you find the gap before they walk through it. 30-60 minutes. No pitch. Just answers.

We respond within one business day. No spam. No pitch decks.