The Rising Tide of Freight Theft: A $400,000 Lobster Heist & Protecting Your Supply Chain
The recent theft of a $400,000 lobster shipment destined for Costco wholesale stores isn’t an isolated incident. It’s a stark illustration of a growing problem: sophisticated freight theft targeting high-value goods in transit. This incident, impacting deliveries to Illinois and Minnesota, highlights vulnerabilities in the supply chain and the increasing ingenuity of criminal operations. But what’s driving this surge, and what can businesses do to protect themselves?
Understanding the Modern Freight Theft Landscape
This wasn’t a smash-and-grab.According to Dylan Rexing, President and CEO of Rexing Companies – the freight carrier involved – the theft involved a driver impersonating a legitimate carrier, utilizing spoofed emails and burner phones. This tactic, known as “carrier impersonation,” is becoming increasingly prevalent.
Recent data from the CargoNet, a leading freight security firm, reveals a concerning trend. In 2023, cargo theft increased by 11% compared to 2022, with a total estimated value of stolen goods exceeding $45 million. https://cargonet.com/cargo-theft-reports/ High-value commodities like food & beverage (including seafood), building & industrial materials, and electronics are consistently targeted.
This isn’t just about financial loss. Supply chain disruption caused by these thefts ripples through the entire system, ultimately impacting consumers through increased costs.
The Tactics Thieves Are Using - And How to Counter Them
The sophistication of these operations is alarming. Thieves aren’t simply hijacking trucks; they’re meticulously planning and executing schemes that exploit weaknesses in communication and verification processes.
Here’s a breakdown of common tactics and actionable steps you can take:
* Carrier Impersonation: As seen in the lobster theft, criminals create fake trucking companies, obtain legitimate Motor Carrier (MC) numbers, and use this facts to pose as legitimate carriers.
* Action: Verify carrier credentials before dispatching freight. Use the Federal Motor Carrier Safety Management (FMCSA) SAFER website (https://safer.fmcsa.dot.gov/) to confirm MC numbers, safety ratings, and insurance information.
* Strategic Targeting: Thieves often target loads based on publicly available information,like shipping manifests or online tracking data.
* Action: limit the amount of information shared publicly about your shipments. Utilize secure tracking systems and consider “silent” tracking options.
* Exploiting Transfer Points: Loads are particularly vulnerable during transfers between carriers or at unsecured parking locations.
* action: Minimize transfer points whenever possible. If transfers are necessary, ensure they occur at secure facilities with robust security protocols.
* Use of Technology: Criminals are leveraging technology – spoofed emails, burner phones, and even GPS jammers – to facilitate their operations.
* Action: Implement multi-factor authentication for all communication channels. Train employees to recognize and report suspicious emails or phone calls.
Beyond Prevention: Responding to Freight Theft
Prevention is paramount, but having a plan in place after a theft is crucial. A swift and coordinated response can minimize losses and aid in recovery.
Here’s a step-by-step guide:
- Immediate Reporting: Contact local law enforcement instantly. File a report with the FBI’s National Cargo Theft Reporting Center (https://www.fbi.gov/investigations/cargo-theft).
- Notify Your Insurance Provider: Your cargo insurance policy will outline the necessary steps for filing a claim.
- document Everything: Gather all relevant documentation, including bills of lading, shipping manifests, and communication records.
- Cooperate with Investigations: Provide full cooperation to law enforcement and insurance investigators.
- Review Security Protocols: Analyze the incident to identify vulnerabilities







![Edit PDFs Easily: Lifetime Access for $40 | [Year] Edit PDFs Easily: Lifetime Access for $40 | [Year]](https://i0.wp.com/www.pcworld.com/wp-content/uploads/2025/12/PDF-Agile.jpg?resize=150%2C100&ssl=1)
