In this article learn about:
The various ways supply chain thefts occur
Who's impacted and why it matters
How to detect, prevent, and respond to supply chain theft
___________________________________________________________________________________
A dangerous threat quietly lurks beneath the foundation of the American supply chain: cargo theft. Defined as the unlawful taking or diversion of goods or freight throughout the supply chain, this highly complex, technologically advanced criminal enterprise is a dangerous and escalating threat that impacts suppliers, retailers, carriers, and 3PLs.
Accelerating from a minor nuisance to a sophisticated and organized crime syndicate in the 2020s, cargo theft causes major financial loss in the billions and disrupts global supply chains. With a record surge of occurrences and a $455 million price tag, supply chain theft can occur during transit, in warehouses, at retail, or during transfer.
Nearly every industry has been affected, but the primary targets occur in high-demand items such as food and beverages, household goods, and electronics. With this criminal enterprise increasing in frequency, sophistication, and financial impact, suppliers who want to protect their assets should be aware of where it happens, and how to prevent it.
Where Theft Happens in the Supply Chain
To ease understanding, we’ve outlined where and how supply chain theft occurs. From straight cargo theft to digital data breaches, criminals are utilizing a variety of methods to benefit monetarily.
Transportation & Logistics
Strategic Cargo Theft
Cargo theft occurs on trucks, ports, and the rail system, with train cargo theft up 40% in 2024, according to the Association of American Railroads. Thieves engage in straight burglary, where they might break into a location to steal cargo, especially unattended loads in truck stops, drop lots, and rail yards. Some companies have also reported major losses from pilferage, where small amounts of goods are taken from larger shipments over time. Both types of theft are common, with the average value of each theft rising to $202,000 in 2025. While the majority of strategic theft occurs through deception, these physical methods are a part of the supply chain theft landscape.
Fictitious Pickups and Driver Identify Fraud
Sometimes, criminals steal freight by obtaining inside information about a scheduled pickup. This can be gathered by paying for the data, planting members as warehouse staff, or hacking the data directly. The criminals then arrive at the warehouse in advance of the client to fraudulently take control of the inventory. Thieves have been discovered driving vehicles with imitated logos or branded clothing, resulting in warehouse staff unwittingly releasing the cargo before the real carrier arrives. This type of theft has surged in recent years, from an average of 66 incidents between 2012 and 2022, to 576 fictitious pickup events in 2023.
Hijackings and GPS Jamming
Another way criminals physically steal goods is with hijacking and GPS jamming. Hijacking occurs by physically taking control of a shipment, and most typically affects ground transportation. Criminals will threaten drivers with weapons and either take control of the truck or physically transfer the goods to their vehicle.
To prevent stolen goods being tracked, supply chain thieves might use a GPS jammer. This small device sounds out radio signals on the same frequency of a GPS device, which blocks all GPS technology’s ability to determine its location. Logistics and transportation carriers are then unable to locate their own shipments, allowing stolen cargo to be moved quite literally under the radar.
Warehouses and Distribution Centers
Internal Theft
Unfortunately, sources indicate that internal involvement can be a major factor in cargo theft, especially when strategic theft is involved. The fictitious pickups mentioned above often involve inside information about timing, and can involve employee impersonation. This suggests that people with access to warehouse operations could be complicit or taken advantage of to aid in these thefts.
Improper Driver and Vehicle Identification
Theft can occur more easily in warehouses with lax check-in/check-out procedures. Supply chain thieves can be more easily identified if the legitimacy of the driver, carrier, and truck numbers are regularly monitored, detailed, and compared against contracts. This allows staff to ensure the legitimacy of the individuals involved.
Exploiting Vulnerable Areas
Supply chain thieves most often take advantage of loading and docking areas with negligent surveillance and security protocols. Bad lighting, shadowed corners, improper camera angles, and lack of camera equipment aid and abet supply chain thieves regularly. These vulnerabilities allow straight theft and strategic theft to thrive.
Retail Theft
Shoplifting and Shrinkage
At the retail level, supply chain theft can occur via shoplifting and tracked via shrinkage. Shoplifting is defined as the act of stealing merchandise from a retail store during business hours, generally by taking items without payment. Shrinkage, an accounting term for retail stores, accounts for payment discrepancies between what owners should have from selling vs. how much was actually made. It can also be defined as a loss of inventory that is attributable to employee theft, shoplifting, or cashier errors.
Organized Retail Theft (ORT)
Also called Organized Retail Crime, this type of theft happens when groups work together to steal large amounts of merchandise and resell it for money, often on Facebook Marketplace, eBay, and with convincingly real online storefronts. Posing real risks to store and customer safety, the inventory can be stolen quickly and destructively. In a recent example of organized retail crime, thieves utilized flash mobs to enter stores and suddenly steal merchandise all at the same time. ORT can also occur with more deceptive practices like stolen credit cards, switched barcodes, and stolen or altered gift cards.
ORT hurts everyone by raising prices, reducing tax revenue, causing store closures, creating unsafe shopping environments, and even risking people’s health if stolen food or medicine isn’t stored or labeled properly.
Return Fraud
Another common example of theft at the retail level of the supply chain is return fraud. This occurs when customers, real or feigned, abuse a return or refund process for financial gain. We’ve detailed some of the most common examples below:
Receipt Fraud: stealing or faking receipts to return merchandise. Thieves will purchase goods at a low price at one store, and then return it to another with a higher price to profit off the difference.
Switch Fraud: Also called switch fraud, a thief purchases a working item and returns a damaged or defective item that was owned before. They essentially get a new item for free.
Non-delivery Fraud: A practice engaged in by nearly a third of the population, this involves lying to an online retailer that an order did not arrive, resulting in a replacement item being sent.
Digital Theft & Data Breaches
As mentioned above, the sophistication level of supply chain theft increased exponentially over the last several years. The follow methods exploit advanced knowledge, relying on fraud and deception to trick legitimate shoppers, brokers, and carriers. Cybercrime is one major way that thieves have increased the amount of goods stolen and money made. Supply chain thieves are hacking into digital systems, spoofing information, and using fraudulent digital documents to take control of inventory, often before anyone is the wiser.
Double Brokering Scams
Identified as one of the most prevalent problems in the supply chain, double brokering scams cause an estimated $500 to $700 million in loss each year. Double brokering scams occur when a fraudulent carrier contracts a load of freight under a specific motor carrier number. They then illegally re-broker it to another party, often an unsuspecting but legitimate carrier, without the original shipper or broker’s knowledge. The load is picked up and delivered, but the fraudulent company collects the payment and disappears, leaving the legitimate carrier unpaid. Customers often have to pay twice for the same shipment or enter into costly legal battles.
Identity Theft and Business Impersonation
A growing tactic in strategic cargo theft, criminals use the identities of legitimate carriers, including USDOT numbers and Motor Carrier (MC) numbers, to secure loads under false pretenses. The thieves create professional-looking websites with fraudulent business documentation and similarities to the real thing, making the scam very difficult to detect. Criminals can purchase MCs in bulk, and utilize similar business email addresses to communicate with customers and obtain sensitive information.
How to Track and Identify Theft
At this point, it might be easy to become overwhelmed at the sheer amount of ways criminals can engage in supply chain theft. However, there are a range of methods to combat cargo theft that help legitimate businesses enhance visibility and protect their profits. Here are some key ways to do so.
Data and Technology Tools
Geofencing for Trucks: Uses Global Positioning Systems (GPS), Radio Frequency Identification (RFID), or cellular data to define virtual boundaries. For example, if a delivery vehicle crosses a preset line outside of business hours, an automatic alert can be sent out. This can ensure safety and control over delivery routes, storage areas, and more.
Real Time Inventory Management: With such a high cost to the consumer and industry, AI-powered monitoring systems are changing the game. Inventory Management Systems like Cin7 and Fishbowl cut inventory shrinkage, use AI alerts to deduct suspicious behavior, and monitor theft patterns to predict and prevent supply chain theft. Many of these systems also support integrated security systems. Businesses using these tools see up to a 30% drop in theft incidents and save $15,000 annually.
Barcode and Inventory Scanners: With so much of supply chain theft occurring in small consumer packaged goods and so many items in stock, we recommend digital assistance to keep up with large amounts of data. Internet of Things devices (IoT device) are pieces of hardware (sensors, gadgets, or machines) that are programmed to transmit data, and can be embedded into mobile devices, environmental sensors, medical devices, and more. These inventory management sensors can also monitor environmental conditions, including shock, light, humidity, and temperature, notifying the correct staff members when unexpected changes occur.
Related Reading: The Future is 2D Barcodes
Pattern Recognition
Another powerful way to combat supply chain theft is through pattern recognition. This is a powerful tool without technology, though some of the systems mentioned above can aid in speeding up the process.
Theft patterns can be found in irregular shipping routes, such as routes outside normal carrier boundaries or pathways. Trends can be spotted in missing or damaged items, or those items disappearing from specific locations or at certain times. Discrepancies can be found between the Advanced Shipping Notice and the Bill of Lading/Proof of Delivery, most commonly identifying supply chain theft when there are discrepancies in amounts or square footage.
Internal Audits & Surveillance
A final way to track and identify cargo thieves is through surveillance. Regular security camera reviews can be of use, as well as scheduled and surprise audits of employees, supply chain partners, and drivers. Assessing efficacy and accuracy regularly can reduce the risk in working with partners that engage in criminal practices. Additionally, employee behavior monitoring and positive workplace cultures can help identify potential fake employees.
How Each Stakeholder Can Prevent Theft
For Suppliers
Suppliers can prevent theft by carefully vetting all transportation partners. Check their references, credentials, and all available reviews. Make sure online information is consistent across all channels to detect fraudulent profiles, as professional-looking websites and email addresses have fooled many people.
Make sure that you have clear labeling protocols and secure packaging to ensure product and inventory security. This consistency will also allow staff to notice if anything is amiss. Some companies may want to use tamper-evident seals to further assist in resale prevention.
Another prevention strategy is to train warehouse staff on all theft red flags. Make sure employees know what methods are used to fool well-meaning warehouse staff, and the protocols in place to prevent it. Proper documentation, surveillance, and identity verification are all key.
For Retailers
Retailers can prevent supply chain theft in a few different ways. One of the most important is to utilize item-level tracking as a opposed to case-level or pallet-level tracking. Additionally, back rooms and warehouse areas should be secured and inaccessible without credentials. Retailers can keep an eye on POS data to look for fraud patterns. Noticing any repeating missing items or pallets is helpful for prevention. All retailers should work with law enforcement or Organized Retail Crime task forces when supply chain theft is suspected.
For Transportation & 3PLs
With most supply chain theft occurring in this sector of the industry, it is imperative that transportation and 3PLs counter the risk with prevention strategies. Background checks should be conducted for warehouse workers, drivers, and anyone accessing shipping information. Training staff to recognize suspicious activity is important, as real employees can be taken advantage of, and planted employees can cause major damage.
It’s important to ensure all parking areas are secure. Transportation companies should also consider installation of truck security systems, trailer locks, and camera surveillance systems. Transportaion companies and 3PLs can also invest in software that allows them to monitor route deviations in real time.
Related Reading: How to Select a Freight Carrier
Shared Responsibilities
Suppliers, retailers, and logistics/transportation companies all have shared responsibilities to ensure that supply chain theft is as prevented as possible. All contacts should have strong language around liability and claims, and should be diligent about the repercussions of missing, stolen, or lost inventory.
Clear chain-of-custody documentation should also be in place. This is a documented account of the people or entities that handle a product. Companies operating legitimately will not surprise someone with unexpected location changes or inventory moves. Regular communication should be prioritized, as it facilitates information sharing and enables a rapid response to threats.
How To Deal With Supply Chain Theft
Despite all our best efforts at prevention, theft can still happen. Here’s what to do if it happens to you.
Immediate Response
As soon as possible, file a police report in the county your business operates in. Depending on the situation and type of theft, you may be asked to file a report in the state where the theft occurred. Lock down all impacted systems or facilities, digital and physical. This is key to prevent further theft in the future. Inform all affected supply chain partners, so that miscommunication doesn’t aid in more theft.
Investigation
Next, you should conduct an internal audit of affected areas. Pull all surveillance material, route logs, and access logs as well as any shipping documents. Interview staff and drivers to uncover as much information as possible to prepare for the claims and recovery process.
There are two industry associations who can assist with education, recovery, and resource connection. Transported Asset Protection Association (TAPA) is a global organization made up of manufacturers, logistics providers, freight carriers, and law enforcement agencies. They focus on preventing cargo theft and improving supply chain security. CargoNet is a cargo theft prevention and recovery network in North America. You can report supply chain theft to them and be connected with the appropriate branch of law enforcement.
Claims and Recovery
Businesses that suffer from supply chain theft should contact their insurance providers and legal representatives to file a claim. Some states, like California, have specialized task forces to assist with this matter. Some insurance providers have special investigation groups who can help recover stolen goods.
If the employee theft was internal in nature, it should be noted that restitution is used by many in the supply chain industry to pay back the lost profits. We recommend that standard operating procedures (SOPs) are updated, and any employee missteps corrected to prevent future occurrences.
Building a Theft-Resilient Supply Chain
The increasing severity of supply chain theft and fraud has led to increased costs in every sector. As thieves only grow bolder and more organized, it’s more important than ever to share the responsibility of better practices across the supply chain. Making proactive investments in people, process, and technology makes a difference. Getting your goods or profits back is possible, but a long, stressful, and complicated process. Prevention is cheaper.
Invest In Security with More Insights
SupplyPike’s software helps customers gain visibility into shipping data that has helped uncover theft and missing inventory. Get secure with more insight, and schedule a call today.