Inbound Logistics | September 2024

GOODQUESTION Readers Weigh In

What’s the First Thing You Would Do to Combat Cargo Theft?

PUT STRONG DATA- COLLECTING and reporting processes in place. Compile and maintain a clean data set regarding

Vet and Verify Implement a detailed vetting process , then review and update it every 6 months at minimum. Use the service providers and resources that can help with your vetting process. Pay close attention to details: The difference between your shipment making it from point A to point B could be the difference between a lower-case L and an upper case I or a number added that wouldn’t normally be in the email address. –Jessica Renner, CCP Cargo Claims and Risk Manager, Jarrett Board of Directors, Transportation & Logistics Council Carefully vet logistics service providers. The frequency of incidents involving thieves acting upon inside information is alarming. Providers throughout the global supply chain have access to cargo descriptions, values, locations, timing, and security measures, providing a road map of what to steal and when to steal it. Entrust cargo to valued business partners. –Jason Odgers Senior Vice President, World Insurance Services Put a strict carrier vetting process in place that outlines the requirements for working with the carrier. This can include years in service, number of power units, safety ratings, and other minimum criteria necessary to start working with a carrier. –Frank Matarazzo CEO, Fusion Transport

stolen loads, attack vectors (direct physical theft vs. digital fraud vs. social engineering), financial impact, and customer impact to help your team deduce the issue’s root cause and mitigate it effectively. –Jack Gerstner Senior Vice President, Coverage & Operations, Coyote Logistics PULL TOGETHER PEOPLE FROM WITHIN THE INDUSTRY, including the relevant government agencies, to help find a consensus. –Steve Healy CEO, COREX Logistics ENHANCE PHYSICAL SECURITY MEASURES. Some products have higher street values than others, so those require higher security measures such as physical access controls at the yard as well as seals and sensor cameras on products that provide alerts for tampering. –Ann Marie Jonkman Vice President, Industry Strategy, Blue Yonder LEARN ABOUT MODERN THEFT METHODS , commonly targeted goods, and high-theft regions. Next, audit and continuously optimize your cargo theft prevention processes, technology, and insurance to mitigate risk and loss. –Kenneth Hull Vice President, Compliance, Arrive Logistics

ADOPT A RISK-BASED APPROACH. Assess each transit by evaluating the

MOVE HIGHLY TRANSFERABLE COMMODITIES VIA RAIL making sure to load on the bottom of the train. Then there is no way to open the swing doors, preventing theft. When intermodal isn’t an option, careful carrier vetting and putting extra care into highly transferable loads has been our safest option. –John Newton

cargo for illicit demand, the mode of transport, and location. Tailor security for risks like hijacking or concealed theft and design measures—routes, transit times, driver needs, GPS, remote engine locks, and hardened vehicles—while balancing risk and cost. –Peter Hunt VP, Brand Protection, Security and Resiliency, Flex

Senior Vice President, Business Development, TA Services

6 Inbound Logistics • September 2024

Powered by