Transport Fraud Advisory

Your carrier was vetted.
Your load disappeared anyway.

The onboarding check passed. The driver who showed up at the gate was not the one who was approved. Cargo theft is up 60% because every verification stack stops before the pickup.

Advisory available now 40+ years combined inside the operations
Load Lifecycle  /  Typical Fraud Path Live Pattern
Carrier Onboarding
MC verified · Insurance on file · References clean
PASS
Load Dispatched
BOL issued · Rate agreed · GPS confirmed
PASS
⚠ The Pickup Gap
ALERT
No verification. No timestamp. No proof of who physically walked up to the gate and took possession of the load.
!
Load Gone. Claim Denied.
Signed BOL is not proof of identity
The Industry in 2024

Every major vetting check got tighter. Every major fraud metric went up.

$725M
Direct cargo theft losses, US and Canada, 2024.
CargoNet / Annual
60%
Year over year increase in cargo theft losses. The onboarding checks are not the gap.
BSI / Supply Chain Risk
1,500%
Rise in organized freight theft since 2021.
TIA / 2024
Why Verification Fails

The vetting passed. The account was already compromised.

Over the last six months we mapped the exact gaps in how the industry's largest platforms handle pickup verification. The pattern is consistent.

The attack does not happen at onboarding. It happens after the carrier account is already approved.

Vector 01

Phishing and credential theft

One employee at a carrier clicks a link. The attacker owns the login, the load details, the confirmation thread, and the dispatch window. Every check you ran on that carrier account is now the cover story for the fraud. The MC number is real. The driver is not.

Vector 02

Insider access at smaller carriers

Smaller carriers run dispatch on shared credentials and outdated systems. An inside contact or compromised employee can redirect a load without touching your systems at all. Your TMS shows everything as normal. The dispatch was simply rerouted.

Vector 03

The unguarded pickup moment

Carrier vetting covers who is approved to move freight. It does not cover who physically shows up. There is a window between dispatch confirmation and physical possession that no vetting system, no TMS alert, and no carrier approval can see.

The Gap

This is where loads disappear.

Between dispatch confirmation and physical possession, there is a window where nobody in the chain is verifying who walked up to the gate. Every incident we documented was executed inside that window.

Dispatch Confirmed
All systems green.
BOL signed. TMS logged. GPS shows the authorized truck en route. Every check passes.
FRAUD
The Gap
The fraud happens here.
Credentials already emailed. Anyone with the right paperwork at the gate can take the load. No identity check.
STOLEN
Load Gone
Claim filed. Denied.
The real carrier arrives to an empty lot. The adjuster asks who took possession. The answer does not exist.
Field Reports

Patterns we have documented. From real operations.

These are composite descriptions of incidents our founders directly investigated or observed. Names withheld. Patterns intact.

Fictitious Pickup Pattern 01

A company arrived with the right MC number, the right carrier name on the truck, and a load confirmation that checked out. The vehicle was released. Two days later the real authorized carrier arrived. The load was already gone. The shipper had no idea anything had happened until the real driver showed up empty handed.

Source · Redacted investigation file

Double Brokering

The broker confirmed the carrier. The carrier confirmed the driver. A different company showed up to pick up the load, one the shipper had never approved. Three loads disappeared before the pattern became visible in the TMS.

Identity Hijack

A dormant carrier with a legitimate MC number was acquired and reactivated. It passed every vetting check because it was a real company. Loads were won, picked up, and gone before it landed on any watchlist.

The Simultaneous Pickup

Dispatch confirmed at 2:14 pm. GPS showed the authorized truck en route. Meanwhile, a different company was already loading the vehicles. By the time the real carrier arrived, the load was gone.

The Insurance Gap

Claim filed. Adjuster asked for documentation of who took possession. Signed BOL and onboarding report were produced. Neither proved identity. The claim was denied.

The Correct Procedure Failure

Every SOP was followed. Every checkbox was checked. The load was gone anyway. The gap was not in the procedure. The gap was in the assumption that the procedure was enough.

We already know where to look.

If any of those described your operation, request an audit. One conversation, no pitch. We have already done the work.

Request an audit  →
Who It's For

We audit the specific exposure of your role.

The fraud pattern hits every party in the chain differently. Here is what the audit surfaces for each operator type.

Dealers & Auctions

Your lot is your liability.

A fraudulent release from your lot can exceed $200,000 in damages and end with a denied insurance claim. We audit your release process, map the exact moment an unauthorized party could take possession, and build the remediation plan.

What you get: Release-process risk map
Carriers

Your identity is the thing being stolen.

Your MC number, your name, and your reputation are the cover story for somebody else's fraud. We identify where your dispatch and credentials flow leave you exposed to impersonation.

Protect reputation & record
Brokers & Shippers

Your network is the attack surface.

Where double brokering and account compromise actually enter your operation. What your vetting cannot structurally see.

Insurers & Underwriters

Claims fail at documentation.

A signed BOL does not prove identity. We structure the coverage requirements so documentation exists before the claim is filed.

Platforms

You are the infrastructure being exploited.

Central Dispatch, Super Dispatch, and identity-based platforms. We show you exactly which flows are being gamed.

The Investigators

The people who have been inside the operations being targeted.

10yrs
The Broker Chair
Automotive brokerage · Carriers · Dealerships · OEMs · Dispatch
A decade inside automotive brokerage working directly with carriers, dealerships, OEMs, and dispatch. Lived every phase of the load lifecycle from posting to claim. Watched the fraud patterns evolve. Watched the same controls miss them.
40+ Years Combined
30yrs
The Field
Carrier networks · High-value freight · Europe and North America
Three decades managing carrier networks and high-value freight across Europe and North America. The methods change. The gaps they exploit do not.
Track 01 · Post Incident

You just lost a load.

The crisis is handled. The gap that allowed it is still open. Your customer is asking questions. Your insurer is reviewing the file. The specific failure point is still there.

We diagnose the exact failure point and show you how to close it before it happens again.
Track 02 · Proactive

You want to close the gap before it costs you.

A shipper, dealer, or underwriter is asking about your fraud controls. Or you have watched what is happening in the industry and decided not to wait for your own incident.

We map your exposure profile and show you exactly which gaps sit open right now.
1
Intro Call
10 minutes. Mutual fit check. High level only, no operational specifics shared yet.
2
Mutual NDA
Signed before anything sensitive is shared. Protects your operation and our methodology.
3
Full Intake
30 to 60 minutes. You describe your operation. We ask the questions your current process does not.
4
Assessment
We take a close look at how your operation runs and where the exposures actually sit.
5
Verbal Debrief
We walk your team through every gap we found, what it is costing, and what to close first.
Advisory is available now.
Six months of mapped gaps. Ready to walk you through them.
Schedule the intake call  →
What Comes Next

The advisory maps the gap. The instrument closes it.

Our founders spent their careers inside the operations these schemes target. After mapping the exact gaps across the industry's largest platforms, they built a patent-pending technology to close them. That instrument is CertifiedLoads. It is in development now.

Advisory available now  ·  Product coming soon
Verify
Confirm the right operator is at the right moment. No assumptions.
Record
A verifiable trail that exists before a dispute, not reconstructed after.
Contain
Protection that holds even when an account has been compromised.
Learn about CertifiedLoads →
app.certifiedloads.com / status
Load Status
Active pickup in progress
Secured
🛡
Carrier Match
Identity cross-checked
Verified
📋
Activity Trail
Every step captured as it happens
Recorded
🚨
Exposure Alert
Triggers before losses occur
Standing By
Request an Audit

The fraudsters already have their next carrier ready.

They have done the research. They know which loads are worth taking. The question is whether you find the gap before they walk through it.

30 to 60 minutes
No pitch. Just answers.
One business day response

We got it.

Response within one business day.

No spam. No pitch decks. One business day.