GOODQUESTION
quality, light exposure. The decoys show warehouse storage, not highway transit. The cargo’s journey doesn’t match the truck’s route. The FBI is their final stop. –Scott Case Founder and Chief Storyteller, Position : Global GONE IN 60 MILLISECONDS An elite crew of executives pulls o impossible cargo thefts across land and sea, vanishing like a ghost— no delays, no fingerprints. But once optimized with AI, the supply chain network tracks the culprits, anticipates their next moves, and sends real-time signal updates, exposing their complex operation and stopping the heists. –Ann Marie Jonkman VP, Global Industry Strategies, Blue Yonder THE BROKER’S MARGIN A fed-up dispatcher steals a $2M pharmaceutical load, exploiting every supply chain gap he has complained about the past decade. Fake MC#, CDL, and carrier packet. The works. He gets busted because he just could not resist leaving a 1-star Google review for the victim company. “Terrible freight security. An inside job would be super easy.” –Justin Todoro VP, Brokerage, Kenco METAL BEAST: OVER THE ROAD A desperate struggle to rescue a cargo of MacGuns critical to saving the planet ensues. Our hero races against time to get the truck, cargo, and hapless hostage back before the world ends. The MacGun has a unique property that allows for surreptitious tracking, leading to a trap where the vehicle is captured and the victim rescued just in time. –Joe Adamski Managing Director, Consulting, ProcureAbility THE REDUNDANCY GAMBIT A crew intercepts high-value shipments by hacking into a single carrier’s system, but a multi-carrier orchestration platform automatically reroutes the stolen packages through
THE DRINKS ARE ON THEM.
A wisecracking trucker and misfit crew swipe limited-edition glow-in-the-dark tequila, livestreaming their clout-chasing escape. A relentless sheriff is on their tail while fan meetups and stunt gags snowball. Their bumbling hype- man geotags the hideout for a brand deal. Cops crash the party instead, turning neon toasts into silver cuffs. WRITTEN BY Ann Stawski DIRECTOR OF Marketing & Communications, Odyssey Logistics backup carriers. The goods arrive at their destinations, while the thieves are caught red-handed with empty decoy boxes—their operation exposed by the resilience layer they didn’t know existed. –Kathleen Krum Director of Sales, ePost Global PHANTOM LOAD I would pitch a futuristic thriller where hackers change the details on a bill of lading to reroute a shipment, and get caught by telemetry data.
web of double brokering and fake documents, a once-washed-up broker follows cold trails and truck- stop whispers to a single hot lead, then flips the script using the thieves’ own playbook. –Travis West VP – Strategic Client Engagement, Evans Transportation ANOMALY A nefarious crew exploits access to a company’s shipping accounts to steal merchandise undetected—that is, until unusual data patterns trigger automated business-rule alerts at company HQ. Data anomalies like wrong origins, unnecessary expedited services, and unexpected vendor drop-ships act as digital fingerprints exposing the scheme and leading investigators to the thieves. –Quinn Nelson Sr. Program Manager, Reveel
–Nick Rakovsky CEO, DataDocks
SYSTEM LOSS A cargo heist film where theft isn’t loud—it’s procedural. Using fake identities and spoofed MC numbers, a crew steals high-value freight without a trace. Tension peaks when the delivery is missed, calls go unanswered, and reality sets in too late. It’s a quiet fraud story about trust, where thieves are caught only when flipping the goods, and the system absorbs the loss. –Gary Horton Chief Operating O cer, ACI Transport 2 CLICKS TO KAPUT This thriller plunges into the shadow world of freight theft, where crimes are committed from desks and keyboards. Hired to crack a
Answer upcoming Good Questions at: www.inboundlogistics.com/ good-question
February 2026 • Inbound Logistics 7
Powered by FlippingBook