
5货运盗窃战术以及如何帮助防止他们



货物盗窃战术正在发展。从食品和饮料到高端电子产品,货物小偷继续针对可以在黑市上轻松销售的商品。机会主义的小偷几乎可以使所有商品公平游戏。了解新兴策略可以帮助企业认识到其脆弱性并防止潜在的货物盗窃。
“There are some things about cargo theft that haven’t changed much over the years and there are many things that have changed significantly including new methods, targeted commodities, and the use of technology to commit cargo theft,” said Scott Cornell, Travelers Transportation Segment Lead, Crime and Theft specialist.
这是观看五种货运盗窃战术,以及有助于防止货物盗窃的一些步骤。
1.直接盗窃
直截了当的盗窃,货物在其坐着的位置被物理偷走了,仍然是一个威胁。货物盗贼正在寻找可以迅速窃取和销售的任何东西。想想卡车停靠站,停车场,路边停车场,丢失地块和其他可以无人看管的货物的区域,尤其是在商店停车场或周末空地。盗贼可能会在冷藏卡车上寻找温度,以表明存在药物负荷,糖果或其他类型的理想货物。几乎没有安全威慑的拖车更容易且可能是目标。
To combat this common form of cargo theft shippers and carriers should take a layered approach to security over the road by using good policies and procedures. Policies such as:
- No unattended, loaded trailers, whenever possible; especially in high cargo theft areas.
- 使用高安全后门锁和空气袖口锁。
- If it is unavoidable to stage/drop a load, consider installing landing gear locks as well.
2. Strategic Cargo Theft
Strategic cargo theft, or theft that uses deceptive means, continues to evolve. This type of cargo theft can involve unconventional methods, including the use of fraud and deceptive information intended to trick shippers, brokers and carriers to give the load to the thieves instead of the legitimate carrier. Trends include identity theft, fictitious pick-ups, double brokering scams and fraudulent carriers as well as hybrid combinations of these methods used together to create even more confusion. Cargo thieves often look for loads being brokered late in the afternoon on Fridays in hopes that time constraints and deadlines will lend to mistakes and less stringent vetting of the carrier. Thieves may even generate false loads and post them to solicit bids in order to obtain the information they need to steal a company’s identity.
To avoid becoming a victim of strategic cargo theft, companies can employ strategies that will help ensure consistent and thorough vetting practices of any carrier or broker they do business with.
- Research contact information and company information thoroughly through FMSCA, Internet search engines, third party vetting companies as well as industry associations.
- 与托运人紧密合作,以确认在接送点上对驾驶员的积极识别,包括驾驶员信息,识别使用的卡车和拖车的信息以及使用安全的拾取号码。
Don’t hesitate to contact your customers and business partners if there is even the slightest question at any point in these processes. Often the additional scrutiny will deter thieves from pursuing the load in question.
3. Technology
Some cargo thieves are using “sniffers,” devices that help detect covert GPS technology, even those embedded within a trailer. Once a device is detected, they then use a GPS jammer to block that technology so it can’t be used to help law enforcement locate stolen goods. Others stage stolen loads in a parking lot immediately after the theft and wait to see if law enforcement will come in search of it.
4.网络
Basic types of cyber-attacks are being used to aid in committing cargo theft. Phishing emails may be sent in an attempt to install Trojan Horse malware that can infect a company's system and grant access to sensitive data. This may allow cargo thieves access to pick up and delivery information, which they can use to print out copies of paperwork to commit fictitious pick-ups.
Implementing strong cyber security can help recognize and prevent many of these attacks. Companies should closely examine their websites and the information they make available to the public. Consider items such as:
- Is contact information for key people important to show or would a common contact be sufficient?
- Are you identifying current customers and/or referencing specific products handled?
康奈尔说:“保护您的在线个人资料与确保运营周围的周围一样重要。”
5. Pilferage
近年来,更好的行业报告已导致对盗窃问题的认可。康奈尔解释说:“近年来,它变得越来越明显,但是盗窃一直是冰山在地面下方的较大部分。”“通常发现甚至有盗窃案,因为驾驶员在沿着路线进行了多次停留之后,驾驶员可能才意识到这一点。结果,如果驾驶员不确定盗窃地点,警察可能不愿提交报告。”
公司应要求驾驶员在每次停车后检查卡车的检查,以检查拖车门和密封件,以识别盗窃的迹象。使用高安全性后门锁甚至高质量的垫子锁可以阻止这种类型的盗窃。
Travelers monitors and tracks cargo thefts around the country through itsSpecial Investigations Group(SIG). Collecting and synthesizing theft data is critical to helping customers identify and avoid theft-prone routes. It is also very useful when assisting local law enforcement in identifying high-risk areas and locating stolen goods.
Taking Steps to Prevent Cargo Theft
Cornell suggests that fleet operators practice a layered approach to cargo security, starting with the development of internal processes and procedures. Then include regular training and awareness events for employees throughout the year.
"Everyone from drivers to warehouse workers should be trained to recognize, prevent and report cargo theft techniques," Cornell said.
以下是分层货物安全程序的功能:
- 公司安全流程和程序,
- Usage of hard security devices, such as locks and seals,
- Leveraging appropriate technology,
- 加强网络安全,以防止获取关键信息。
More Prepare & Prevent

在运输过程中帮助保护您的货物
Taking steps to protect cargo can help prevent business interruptions. Learn about inspecting, securing and receiving cargo.

Where is Your Supply Chain the Most Vulnerable? [Infographic]
将您的结果与参加供应链压力测试的人进行比较,并从弱环节中了解潜在的风险。

全球供应链管理技巧
阅读这些技巧,以帮助管理和减轻海外供应商时的风险。