Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Securing the Supply Chain - Prevent Cargo Theft

By Bill Anderson
May 1, 2007

A global supply chain drives today’s economy. Goods are moved around the world 24/7 – packed and transported by air, rail, sea or truck. As the supply chain grows more complex, so does the ability to secure it. One of the biggest challenges affecting businesses today is cargo theft, and the resulting potential disruption of the supply chain.

How large is this problem? It is difficult to quantify because cargo theft is not always categorized in the same manner and often goes unreported. According to experts, the estimates range from $10 to $30 billion a year. However, this figure does not capture the indirect costs associated with theft such as lost sales, production downtime and missed deliveries. In addition to the financial losses, certain industries such as alcohol, tobacco and pharmaceuticals face the risk of their products being sold to minors or being counterfeited.

What’s in it for cargo thieves?

The value of the cargo is what any cargo thief is out to acquire. However, there is another element affecting the dynamics of cargo theft: relative lack of downside risk. Cargo moves anonymously across the nation’s roads and highways, through jurisdictions with varying resources and abilities or willingness to prosecute if apprehended. Cargo thieves know that law enforcement and prosecutors are less likely to give cargo theft a high priority when the cargo’s owners, transporters and thieves are from another jurisdiction. If there is an apprehension and prosecution, the sentences are often less than other types of crimes such as drug trafficking. Because of the relative ease of hijacking and the lenient punishments of prosecutions, cargo theft continues to grow year after year. High-tech, high-value products, specifically consumer electronics, are in high demand.

How does it happen?

The criminal element responsible for cargo theft is more sophisticated than ever. A well-executed cargo theft is pre-planned and highly coordinated. The stolen goods are often moved quickly to a warehouse, off-loaded, repackaged, re-manifested and placed on another vehicle, often before the theft is discovered or reported to law enforcement. This “illegitimate supply chain” is managed by organized crime operations that know what they are targeting and have the ability to move, trans-load and distribute stolen goods within hours. Today’s virtual economy often works against legitimate businesses by facilitating the distribution of stolen goods through online marketers and auction sites.

In addition to preventing theft, making investments in security to address these issues, from hard costs associated with technology and systems, to investments in training and resources, will ultimately improve supply chain efficiency, customer satisfaction and bottom line results.

SIDEBAR: What Will Prevent Cargo Theft?

Advances in technology, such as GPS tracking, have improved a fleet manager’s ability to monitor vehicles. Onboard telematics technology significantly improves the vehicle recovery process and may deter a less sophisticated criminal.

While there have been many success stories with onboard tracking systems, GPS and other common tracking technologies are frequently defeated as criminals adapt to a hardening of the transportation network. Technology alone is not the magic bullet against cargo theft.

An effective security program must be well planned and combine technology with strong security procedures and fundamental security practices. These practices include:

1. Being Alert

Be aware of possible surveillance being conducted on your facility’s operation. Watch for parked vehicles outside of the facility or within view of the facility gates and entrances. Take note of individuals with cameras (still or video) or taking notes outside of the facility. Do not allow unauthorized personnel inside the facility, on the grounds or around the perimeter. Vehicles (usually mini-vans or SUVs), especially those with two or more occupants that appear to be following drivers, should also be a concern. It is not uncommon for cargo theft teams to follow their target for hundreds of miles, waiting for an opportunity to hijack the vehicle and cargo.

2. Responding

Immediately report all suspicious activity and/or theft to management and law enforcement officials. Criminals can move stolen goods quickly; immediate reporting of theft to law enforcement is critical. Respond to every alarm. Frequent “false alarms,” including attempted entries or break-ins into the facility, may be a sign that suspicious individuals are testing the facility security system and law enforcement response times.

3. Managing Information

Do not share information regarding cargo or operations with anyone except those involved in the operation. Limit load information within the facility to parties who have a need to know the information. Maintain inventory control; unusual changes in inventory levels may help to alert when something is awry.

4. Knowing Your Supply Chain

Know the carrier and driver that are scheduled to pick-up cargo and verify their identity before a load is released. Monitor delivery schedules and routes, treat suspiciously any overdue shipments or out of route journeys. Review the security of the supply chain partners and know where cargo will stop along its route. Find out if cargo will go directly to the delivery point or be consolidated with other cargo or sit temporarily in another yard.

5. Executing Basic Safety Practices

Keep trucks locked and parked in an organized manner on a well-lit facility lot. Ensure that alarm systems are functioning properly and are monitored by a central station that has updated contact information. Ensure the central station is capable of detecting telephone line interruptions, which can be done with a DVAC line or cellular backup. Communicate to driver teams that one person must remain with the vehicle at all times. Review security at the site regularly, and quickly address maintenance and repair items. There are more drivers than security or law enforcement. So get the drivers involved in the business and the need to protect assets.

6. Screening Perspective Employees

Often cargo theft is perpetrated with inside help. Rigorous pre-employment screening will help weed out those most likely to steal merchandise from a warehouse, loading dock or truck. After screening, make drivers effective with good security training.

7. Training Employees

Communicate security awareness information and location-specific security rules to employees and carriers. Provide security training covering basic topics such as the employee’s role in the security system, how to report security incidents and how to recognize internal conspiracies and suspicious activities. Participate in the Highway Watch program to train drivers to look for suspicious and possibly terrorism- related activities.

8. Being Involved

There are several organizations that can help combat cargo theft.
  • International Cargo Security Council http://www.cargosecurity.com/ncsc/ the Local Cargo Security Council
  • American Society for Industrial Security www.asisonline.org
  • Customs-Trade Partnership Against Terrorism (C-TPAT) http://www.customs.gov/xp/cgov/import/commercial_enforcement/ctpat/
  • Technology Asset Protection Association (TAPA) www.tapaonline.org
  • Cargo Theft Task Forces http://www.cargosecurity.com/ncsc/images/Cargo_Security_Councils.pdf

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

William H. Anderson is director, global security for Ryder System Inc., a Fortune 500 global transportation and supply chain management solutions company. Anderson is responsible for directing Ryder’s global security function and leading Ryder’s international safety, health and security team. He has been a speaker at the National Safety Council’s Annual Congress and the NAEM’s Annual Environmental, Health and Safety Management Forum. He is a member of Ryder’s Crisis Management Team and Corporate Compliance Steering Committee, as well as the American Industrial Hygiene Association, American Board of Industrial Hygiene and American Society of Safety Engineers. Contact him at Banderso@Ryder.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Strengthening Global Supply Chain Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!