IT Mag

Vol. 10, No. 6

Fleet Management News & Business Info | Commercial Carrier Journal

Issue link: https://read.dmtmag.com/i/741858

Contents of this Issue

Navigation

Page 4 of 39

C argo the has been around for centuries, from robbers attacking merchants on trading roads to pirates seizing ships at sea to bandits on horseback robbing stagecoaches. e last stage robbery in the Old West happened on Dec. 5, 1916. e driver of a small two-horse mail wagon was ambushed as he was riding to the town of Jarbidge, NV. e driver was killed and $4,000 was stolen, however, three suspects were arrested shortly aerward. e stolen $4,000 was never recovered and is said to be buried somewhere in Jarbidge Canyon. Unfortunately, crimes of this nature have evolved along with cargo transportation methods. Trucks have replaced horse-drawn carriages, and today's bandits are organized into international crime syndicates. ey are a technologically intelligent and sophisticated type of bandit. Cargo the has grown to become the costliest crime in America. e average loss value per cargo the incident has jumped to over $300,000. We are talking about a high reward crime, occurring nearly three times a day in America, which creates financial losses across our nation amounting to a whopping $35 billion annually. Drivers will park their trucks at the truck stop and go inside to clean up or get something to eat and they come out and their trailers and tractors are gone. A career criminal who has the skill to hot-wire a truck and drive off in 30 seconds just stole it. Most cargo thes occur without any physical violence toward individuals, so criminal penalties tend to be light. Understanding the way cargo thieves plan and accomplish their attacks can help shippers protect themselves against such crimes. Here are some common strategies criminals use to attack truck shipments. • Cargo thieves target goods they can easily broker through a "fence." • ey set up surveillance positions outside the manufacturing/distribution facilities to monitor shipping operations and gather information. • Depending on which modus operandi the thieves use, they will then wait for the moment of opportunity to strike. If the M.O. is to steal the truck, the thieves may have already secured a warehouse to temporarily store the freight, as well as taken possession of a stolen truck to attach to the stolen trailer. ey may even have acquired another trailer to offload the cargo. • Another approach is to wait until the driver has le the truck and trailer unattended. ieves are knowledgeable and trained in gaining access to the truck and manipulating the ignition system. ey then drive off with the stolen equipment. • If a trailer is not connected to a truck, the thieves hook up their recently acquired stolen tractor to the loaded trailer and move it to a secured location. Or they may break into the trailer and offload the cargo into an empty trailer, further hindering the ability of law enforcement to locate and recover the stolen goods. • More sophisticated criminals may steal the truck and/or trailer and dump it on the side of the road or in an industrial area. ey can then observe from a safe distance to test whether a tracking system is embedded in the truck and/or trailer, and to see if law enforcement is monitoring the stolen equipment. If they believe nobody has followed the truck and/or trailer, the thieves will then move it to a secured warehouse location and begin breaking the product down for resale on the black market. Preparing stolen goods for resale may entail changing the packaging, re-labeling the boxes, and even creating falsified bills of lading or customs paperwork to facilitate moving the stolen cargo out of the country. Companies can take a number of actions to improve facility and vehicle security, from implementing security devices and technologies to creating common-sense security practices. Truckstop.com now has available a load tracking tool to enable the shipper or broker to know where the load is at all times. However, you do not have to go with a high tech tool to reduce the opportunity for a the. You can go low-tech by applying a variety of locks to secure the vehicle and cargo, such as king pin locks that prevent the tractor and trailer from being separated, air brake valve locks that prevent brake release, and glad hand locks that lock the trailer's air line. Seals also limit intrusion and create an alert that doors have been tampered with. Be alert for signs that your facility is under surveillance and because criminals can move stolen goods quickly, immediately report all suspicious activity to law enforcement officials. e consequences of a stolen load are far greater for a broker, shipper, carrier, and manufacturer than most other types of fraud in our industry. e financial consequences are generally nothing short of devastating and can result in total business failure. PAT DICKARD KNOWS LEARN MORE. MAKE MORE. BUSINESS DEVELOPMENT WEBINAR SERIES REGISTER FOR OUR FREE WEBINARS TRUCKSTOP.COM/ EVENTS Cargo Theft BY PAT DICKARD, CORPORATE TRAINER, TRUCKSTOP.COM Vo l . 1 0 , N o . 6 TRUCKSTOP.COM 5

Articles in this issue

Links on this page

Archives of this issue

view archives of IT Mag - Vol. 10, No. 6