Freight fraud is not a niche problem — it is an industry-wide crisis that costs shippers, brokers, and carriers billions of dollars every year. From double-brokering to outright cargo theft, the schemes have grown more sophisticated as technology makes it easier for bad actors to impersonate legitimate businesses. This guide covers the major fraud types, the red flags, and the concrete steps you can take to protect your freight.
Double-Brokering: The Most Common Fraud
Double-brokering occurs when a carrier or entity posing as a carrier accepts a load from a broker, then re-brokers that load to a different carrier without authorization. Here is how a typical double-brokering scheme works:
- A fraudulent entity registers an MC number and obtains basic operating authority.
- They post their truck availability on load boards or respond to broker postings.
- When awarded a load, they accept the rate confirmation and collect the load information.
- Instead of dispatching their own truck, they post the same load on a different load board at a lower rate.
- A legitimate carrier accepts the re-brokered load and picks up the freight.
- The fraudulent middleman collects payment from the original broker, pockets the margin, and often disappears before paying the actual carrier.
The shipper typically does not know this happened until the actual carrier files a claim or refuses to release freight because they were never paid. The result: disputed invoices, delayed deliveries, potential freight held hostage, and no one clearly liable for damage or loss.
Red Flags for Double-Brokering
- The driver who arrives at pickup works for a different company than the one you booked
- The truck's DOT number does not match the booked carrier's FMCSA record
- The carrier cannot provide their own GPS tracking and instead offers “driver check calls”
- Communication is vague or evasive about which driver or truck is assigned
- The carrier's MC number is very new but they claim to have a large fleet
Cargo Theft
Cargo theft in the United States is a significant and growing problem. Industry sources estimate annual losses in the range of $15 billion to $35 billion, though exact figures are difficult to pin down because many thefts go unreported. The most common methods include:
- Fictitious pickup: A thief impersonates a legitimate carrier, arrives at the shipper's dock with matching paperwork, loads the freight, and disappears. This is the fastest-growing cargo theft method and is closely tied to identity fraud.
- Truck/trailer theft: A parked, loaded trailer is stolen from a truck stop, warehouse lot, or drop yard. This is most common in high-theft corridors and when drivers leave loaded trailers unattended overnight.
- Pilferage: Individual items are stolen from a shipment during transit or at terminals. This is harder to detect but adds up across many shipments.
- Strategic theft: Organized groups target specific high-value commodities (electronics, pharmaceuticals, alcohol, consumer goods) and use insider knowledge about shipment schedules and routes.
Identity Fraud: Stolen MC Numbers
Identity fraud in freight involves bad actors using stolen or cloned MC and DOT numbers from legitimate carriers. They create fake carrier entities that appear real on paper — matching the name, address, and authority number of an established carrier. The legitimate carrier may not even know their identity is being used until claims start appearing.
Verification steps to catch identity fraud:
- Call the carrier at the phone number listed on their FMCSA record (not the number provided in an email or load board posting)
- Verify the carrier's physical address exists and matches their filings
- Cross-reference the MC number, DOT number, and legal entity name — all three should match
- If the carrier was found on a load board, verify their account is established (check join date, reviews, and transaction history)
Technology-Driven Fraud
Fraud is evolving alongside technology. Recent schemes include:
- AI-generated documents: Fraudsters use AI tools to create convincing certificates of insurance, rate confirmations, and even carrier profiles.
- Email spoofing: Emails sent from addresses that closely resemble legitimate brokers or carriers, sometimes differing by just one character.
- Phishing for load information: Bad actors contact shippers posing as carriers or brokers to obtain shipment details (pickup times, dock locations, commodity info) which they use to execute fictitious pickups.
Prevention Strategies
Protecting your freight requires layers of verification, not a single check. Implement as many of these practices as possible:
- Verify carrier identity through FMCSA records before every new booking
- Require real-time GPS tracking on all loads (not just driver check calls)
- Confirm the driver's identity and truck/DOT information at the dock before loading
- Use a carrier onboarding process that includes direct phone verification at the FMCSA-listed number
- Limit who has access to shipment details (pickup times, dock locations, commodity descriptions)
- Establish a consistent process for verifying rate confirmations and payment instructions (especially if banking details change)
- Work with a freight broker who maintains rigorous carrier vetting standards
What to Do If You Are Defrauded
If you suspect fraud has occurred:
- Document everything immediately — emails, rate confirmations, BOLs, driver contact info, photos of the truck
- File a report with local law enforcement and obtain a police report number
- Report the incident to the FMCSA (for carrier authority fraud)
- Report cargo theft to CargoNet (a national theft reporting database used by law enforcement and insurers)
- Notify your cargo insurance provider promptly
- If money was wired, contact your bank immediately to attempt to recall the transfer
How We Protect Our Shippers
Fraud prevention is a core part of our carrier vetting process. We verify every carrier's authority, insurance, safety record, and identity before they are approved to haul freight in our network. We require real-time GPS tracking on all loads and monitor for anomalies. If you are concerned about freight security, talk to our team about how we approach protection on your specific lanes.