Temple U. Professor Misty Blessley shares her insights with us today.
In Chapter 11 of your Heizer/Render/Munson textbook, cargo theft is identified among many risk categories. Given tracking and tracing technologies along the supply chain, how is cargo theft possible? Because thieves can outsmart digital logistics technologies.
Victims Guy Fieri and Sammy Hagar recently had two semitrailers carrying roughly 24,000 bottles of their Santo tequila vanish en route to a warehouse in Pennsylvania. Valued at over $1,000,000, only 11,000 bottles were recovered. It was not a smash-and-grab hijacking. To manipulate the logistics process, the thieves orchestrated a high-tech ruse by creating false shipping companies, spoofing GPS signals, and sending phony mechanical breakdowns. The drivers were diverted to a fake warehouse, but believed they were following valid instructions.
In such schemes, criminals exploit fragmented and non-transparent logistics networks—double brokering loads, creating illegitimate carrier identities, and manipulating tracking data. Cargo theft incidents involving fraud are on the rise, with the food and beverage sector being a frequent target. Here are two examples:
Yogurt/Plant-based Milk Heist: A load of refrigerated yogurt and plant-based milk was stolen in a double-broker fraud. Criminals used a stolen motor carrier number and a fake email to win the job, then rerouted the load and held the broker’s reputation hostage, threatening losses unless paid off.
Energy Drink Heist: A shipment of energy drinks was stolen after criminals used email spoofing and fake carrier identities in which the fraudsters created a near-perfect replica of a trusted company. They listed themselves on online load boards, won the contract, and successfully arranged pickup of the shipment. The load was rerouted more than 1,000 miles off course following false delivery instructions.
Supply chain managers must treat theft risk as integral to their supply chain risk model. Here are three suggestions:
1. Vet every carrier who will touch your product, including subcontractors and brokers.
2. Use redundant tracking systems.
3. Protect high-value shipments by using escorts and incorporating real-time verification checkpoints.
Reducing this category of risk is increasingly essential in a world where clever cyber-enabled criminals can hijack not with force, but with deception.
Classroom discussion questions:
1. The 11,000 recovered bottles were eventually distributed for sale after being deemed in good condition. Do you agree/disagree with this decision? Why?
2. Of the risk categories identified in the textbook, which risk reduction tactics are also beneficial in reducing cargo theft? How is cargo theft different from the other risk categories?