Shipment theft reached an all-time high during 2024, and so far, 2025 looks to be an even worse year.
All shipments are at risk, and criminals seem to have no limits when it comes to the tools and tactics they will use.
Purolator has long prioritized shipment protection, with continual investments in personnel and training, technology-based systems and assets, and accreditation with international standards organizations.
We are pleased to provide a 4-part series, along with a white paper, that delve into the serious issue of cargo theft and offer useful insight about how businesses can protect their valuable shipments.
Each article focuses on a different aspect of shipment security and offers useful information for minimizing risk. Readers can access the white paper for more detailed discussion.
Shipment security is a front-burner issue for all businesses. But working together, there are ways to fight back. Following is part two of our four-part series. If you missed our first installment, you can access it here.
No Time to Waste – A Checklist to Help Your Business Prevent Cargo Theft
Cargo theft cost U.S. businesses almost $455 million during 2024 and has continued at a record-setting pace during 2025. The average theft last year was valued at more than $200,000 with just about every type of shipment at risk.
Shipment theft is big business, and criminals have proven increasingly resourceful – and audacious – in their preferred methods. While “straight” theft, in which shipments are physically stolen from a warehouse or parked trailer, still account for most crimes, incidences of “strategic” theft have increased at an alarming level.
Strategic theft refers to instances in which criminals rely on deceptive schemes to obtain a shipment. Strategic theft generally relies on scams, and criminals’ increasingly adept use of technology-based tactics such as phishing, hacking, malware, identity theft, and fictitious drivers and pickups. Unfortunately, these schemes are often successful, and all businesses are at risk.
Businesses can fight back though! The key is to implement security-focused protocols that touch every part of the supply chain – internal practices as well as those of suppliers and vendors. A few essential best practices should include:
Employee vetting and training
Roughly 20% of cargo theft incidents involve insider participation, which can include everything from warehouse employees or drivers who knowingly assist criminals, to sloppy computer habits that unwittingly allow entry to company IT systems. Businesses can protect itself by adopting good habits that include:
- Screen employees. Thoroughly screen all employees, especially drivers, warehouse employees, and anyone else who will have direct involvement in the shipping process. Verify a potential employee’s credentials, contact each person listed as a reference, and make sure the person is who they claim to be!
- Security protocols. Develop a written policy that outlines expectations for security and safety. This policy, which should be shared with all employees, should clearly outline procedures for accessing company facilities, maintaining confidentiality about shipment contents and schedules, and expectations for use of company resources. Specific training should be provided on a range of topics that includes:
1. IT Safety. Employees should be aware of current cybersecurity practices. This includes instruction about how to avoid falling prey to a phishing email, and how to be aware of online scams. Training should feature password safety reminders, and clear instructions should a security breach occur.
2. Facility security. Warehouse employees should understand how criminals take advantage of security lapses to steal shipments from parking yards and storage areas. Employees should know the process for reporting any suspicious activity, or any lapses in security such as an unsecured door, unlit parking area, or inadequate fencing.
3. Vetting protocols. Employees should understand the importance of confirming the identity and legitimacy of every driver who arrives to pick up a shipment. Trust but verify! This is especially important as incidents of identity theft and “fictitious pickups” have surged in recent years. Every driver should be asked to provide identification, with a phone call placed to the affiliated carrier or logistics company to verify employment.
Upgrade warehouse/distribution center security
Warehouses/distribution centers and parking lots top the list of locations in which most thefts occur. Investments in high-quality tools and preventative measures can help deter theft, and should be a part of any best practices protocol. Examples of effective deterrents include:
- Segmented controls that restrict access to different parts of a storage area.
- Closed circuit TVs, alarms, and locks.
- Technology-based solutions including GPS tracking, sensors, and telematics systems that provide real-time monitoring of shipments.
- Lighting and fencing that encompass the entirety of a warehouse yard or parking area – no dark zones!
- Regular IT system reviews to check for malware and other attempts to infiltrate warehouse systems.
- Regular security updates of all personnel, including background checks on contracted security agents.
Cargo theft is at an all-time high. Learn how to protect your shipments. Download our whitepaper
Understand your vulnerabilities – Identify your supply chain partners
Identify all parties who are either in a position to know about a planned shipment or will have a direct role in its execution. To do this, a business will need to build a detailed chain of custody map. The more detailed the better. Include any and all partners who either come in contact with a shipment or have information about a shipment’s scheduled movements. Drill down as deep as possible. Remember, the initial “brains” behind the infamous 1978 Lufthansa heist, was a low-level airline cargo supervisor.
Once you understand the extent to which suppliers and their employees have information about your shipments, scale back that list where possible. Ensure that only those individuals with a true “need to know” are informed about shipment activity and included on all relevant emails and documents.
Prioritize security when choosing a logistics partner
Few supply chain partners will have as direct a role in ensuring shipment safety as a logistics provider. Ideally, a logistics provider will be an integral part of a business’s supply chain and steeped in information about all shipment activity. A good logistics provider will have your complete trust and confidence.
Unfortunately, though, not every logistics company prioritizes security, which is why a shipper really must spend the time to verify a potential partner’s capabilities. Things to look for include:
- Record of success. A security-focused provider will be proud to share details about its success rate in delivering shipments safely and without incident. An accomplished provider will also have plenty of businesses that are willing to serve as references on its behalf.
- Internal protocols. Review a company’s security procedures with regard to employee hiring/vetting practices, training, and investments in technology-based tools.
- Extensive in-network coverage. Look for a provider that has the internal resources to ensure end-to-end in-network coverage. This avoids having to enlist external carriers and ensures chain of custody and accountability.
- Minimal number of hand-offs and touches. A high percentage of theft and damage occurs when shipments are transferred between facilities and vehicles. Chose a provider with the capacity to manage all supply chain functions including inventory, fulfillment, distribution, transit, and even returns. A single-source solution means fewer hands touching a shipment, and reduced opportunities for something to go awry.
- Visibility and tracking. Make sure a company can provide a high level of shipment visibility, including 24/7 tracking.
- Membership in trusted trade programs. Are your shipments going to cross an international border? Logistics companies engaged in international shipping can demonstrate their commitment to shipment security through membership in the Customs Trade Partnership Against Terrorism (CTPAT) program, managed by U.S. Customs and Border Protection (CBP). The program allows businesses to verify the security of their supply chains – and those of their vendors and suppliers – in exchange for favorable customs-related benefits. A similar program, Partners in Protection (PIP), is available in Canada through the Canada Border Services Agency (CBSA).
Cargo theft reached an all-time high in the early months of 2025, and criminals seem intent on finding increasingly devious methods to hone their craft. Which means businesses need to stay a step ahead and minimize their risk of becoming yet another crime statistic. While you’ll never eliminate the risk entirely, you can minimize exposure by instilling best practices throughout your supply chain.
Want more information? Read our new white paper, “How Safe are your Shipments? Theft, Risk, and the Steps you Can Take to Prioritize Loss Prevention,” . The white paper provides an in-depth discussion about the many ways in which shipments are vulnerable, as criminals have become increasingly sophisticated and brazen. The paper also highlights Purolator’s proven track record in prioritizing security and shipment safety. From investments in best-in-class technology, to internal security experts, thoroughly vetted employees, robust security protocols, and strategic logistics solutions, Purolator prioritizes shipment safety every step of the way. Please click here to read the white paper.