The onboarding check passed. The driver who showed up at the gate was not the one who was approved. Cargo theft is up 60% because every verification stack stops before the pickup.
Over the last six months we mapped the exact gaps in how the industry's largest platforms handle pickup verification. The pattern is consistent.
The attack does not happen at onboarding. It happens after the carrier account is already approved.
One employee at a carrier clicks a link. The attacker owns the login, the load details, the confirmation thread, and the dispatch window. Every check you ran on that carrier account is now the cover story for the fraud. The MC number is real. The driver is not.
Smaller carriers run dispatch on shared credentials and outdated systems. An inside contact or compromised employee can redirect a load without touching your systems at all. Your TMS shows everything as normal. The dispatch was simply rerouted.
Carrier vetting covers who is approved to move freight. It does not cover who physically shows up. There is a window between dispatch confirmation and physical possession that no vetting system, no TMS alert, and no carrier approval can see.
Between dispatch confirmation and physical possession, there is a window where nobody in the chain is verifying who walked up to the gate. Every incident we documented was executed inside that window.
A company arrived with the right MC number, the right carrier name on the truck, and a load confirmation that checked out. The vehicle was released. Two days later the real authorized carrier arrived. The load was already gone. The shipper had no idea anything had happened until the real driver showed up empty handed.
The broker confirmed the carrier. The carrier confirmed the driver. A different company showed up to pick up the load, one the shipper had never approved. Three loads disappeared before the pattern became visible in the TMS.
A dormant carrier with a legitimate MC number was acquired and reactivated. It passed every vetting check because it was a real company. Loads were won, picked up, and gone before it landed on any watchlist.
Dispatch confirmed at 2:14 pm. GPS showed the authorized truck en route. Meanwhile, a different company was already loading the vehicles. By the time the real carrier arrived, the load was gone.
Claim filed. Adjuster asked for documentation of who took possession. Signed BOL and onboarding report were produced. Neither proved identity. The claim was denied.
Every SOP was followed. Every checkbox was checked. The load was gone anyway. The gap was not in the procedure. The gap was in the assumption that the procedure was enough.
If any of those described your operation, request an audit. One conversation, no pitch. We have already done the work.
Request an audit →The fraud pattern hits every party in the chain differently. Here is what the audit surfaces for each operator type.
A fraudulent release from your lot can exceed $200,000 in damages and end with a denied insurance claim. We audit your release process, map the exact moment an unauthorized party could take possession, and build the remediation plan.
What you get: Release-process risk mapYour MC number, your name, and your reputation are the cover story for somebody else's fraud. We identify where your dispatch and credentials flow leave you exposed to impersonation.
Protect reputation & recordWhere double brokering and account compromise actually enter your operation. What your vetting cannot structurally see.
A signed BOL does not prove identity. We structure the coverage requirements so documentation exists before the claim is filed.
Central Dispatch, Super Dispatch, and identity-based platforms. We show you exactly which flows are being gamed.
The crisis is handled. The gap that allowed it is still open. Your customer is asking questions. Your insurer is reviewing the file. The specific failure point is still there.
A shipper, dealer, or underwriter is asking about your fraud controls. Or you have watched what is happening in the industry and decided not to wait for your own incident.
Our founders spent their careers inside the operations these schemes target. After mapping the exact gaps across the industry's largest platforms, they built a patent-pending technology to close them. That instrument is CertifiedLoads. It is in development now.
They have done the research. They know which loads are worth taking. The question is whether you find the gap before they walk through it.
Response within one business day.