As a broker, there’s no doubt you’ve developed a keen eye and methodical vetting process for fighting fraud. But risk tolerance lives on a spectrum, and you should have ultimate control over which carriers you’re willing to hire. In addition to key fraud indicators, today’s fraud protection requires tools that deliver insights.
However, freight fraud continuously evolves to exploit vulnerabilities. Bad actors are getting smarter, faster, and sneakier at targeting and infiltrating systems. As bad actors continue to shapeshift—to the extent of showing up as multiple profiles on a single day in hopes of finding vulnerabilities to expose—it’s critical to understand their tactics, recognize common data patterns and employ comprehensive fraud in an effort to stop them in their tracks.
Beware of the monsters targeting freight businesses
Chameleons, bandits, anglers, and zombies—oh my! When it comes to combating fraud effectively, know your enemies! The following “monsters”—risky carrier profiles—demonstrate risky behavior. Recognizing data patterns common among bad actors, or “risk indicators,” goes a long way toward helping to keep fraud at bay and these monsters out of your freight business.
The chameleon
Chameleon carriers are companies that have been shut down for running an unsafe operation only to reappear under a new name and DOT number. The chameleon hides in plain sight to evade regulatory oversight, sidestep sanctions due to safety violations, or escape financial liability. Chameleons deliberately attempt to dodge fines, fees, and penalties.
Chameleons put you at risk for double-brokering and pose severe safety and performance issues.
Carrier profiles accompanied by indicators of fraudulent or risky behavior might include reused contact information or VINs. Watch for these risk indicators, plus make a habit of reviewing community watchdog reports that might alert you of these bad actors as part of the fraud mitigation process.
The bandit
The bandit steals the identity, credentials, or contact information of a legitimate carrier to pose as that person and either commit double-brokering or cargo theft, which has soared by 49% in the first half of 2024 alone.
Bandit profiles might include recent or suspicious contact changes, an unforeseen IP address or VPN use, or an unexpected or suspicious truck showing up to pick up a load. CargoNet estimates that a total of $154.6 million worth of goods was stolen in the first quarter of 2024. So, if you think it can’t happen to you, think again!
Thoroughly vet every carrier before hiring them, pay particular attention to recent contact changes, and verify the identity of who’s behind the wheel. Incorporate identity verification and multi-factor authentication as “must haves” in fighting fraud. Multi-factor authentication provides yet another layer of protection in your arsenal of fraud-fighting weaponry.
Notify the shipper if you suspect illicit activity. In fraud mitigation, communication and vetting are key!
The angler
The angler uses phishing tactics—deceptive emails or social engineering—to trick users into revealing business credentials or other private information to commit double-brokering, cargo theft, or identity theft.
Be aware of red flags and know how to identify suspicious emails. Be wary of emails that seem out of place, irrelevant, unexpected, or unsolicited. And while scammers are very good at making the “sent from” look like a legitimate source, these deceptive emails most often come from unknown senders.
Profiles include pricing a load significantly below the market rate, asking either no questions or too many questions, or other abnormal behavior that gives pause, like an email message that offers something unexpected or unusual, asks for personal information, or seems inappropriately demanding.
Don’t get hooked! Help stop the angler in their tracks by having a thorough understanding of current fair market rates and scrutinizing “weird” or unusual emails. A common phishing tactic is using a domain that looks very similar to the legitimate domain.
The zombie
A zombie appears in the freight industry when a legitimate company sells all its information, including MC and email domain, to this monster. The zombie aggressively attacks, looking to commit double-brokering or cargo theft and put the business in serious jeopardy. Some are selling their MC numbers to nefarious buyers who intentionally keep the once-legitimate contact information associated with it, victimizing carriers by perpetrating cargo theft, load payment theft, and other scams and schemes.
A recent flurry of onboarding activity, large gaps in authority or insurance, or an inactive business filing are all data patterns often associated with these bad actors.
Be on the lookout for any anomalies that show up in the vetting process, and double-check any data or behavior that seems “off.” A good habit to add to the vetting process is to check your secretary of state business registry. The Secretary of State’s office processes filings, maintains records, and provides information to the public relating to business entities and other business filings.
Look to the latest technology designed to combat fraud
As technology evolves, so do the fraudsters’ intent on infiltrating your system to wreak havoc. The more you know about these ugly monsters, who come in all shapes and sizes, the better armed you are against them and the risks they pose.
Use technology to fight back! Manual vetting processes take time and resources, plus they’re prone to human error. And while gut feeling should never be ignored and you should always err on the side of “better safe than sorry,” gut feeling is not enough to protect against these insidious monsters, who are often highly organized and sophisticated. Arm your team with an arsenal of technology tools that give the flexibility to leverage your expertise and make more informed decisions.