Cargo Crime - Security and Theft Prevention (PDFDrive)
Cargo Crime - Security and Theft Prevention (PDFDrive)
J. J. Coughlin
Cargo Crime
Security and Theft Prevention
Cargo Crime
Security and Theft Prevention
J.J. Coughlin
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Foreword....................................................................... ix
Preface........................................................................... xi
Acknowledgments.........................................................xv
About the Author........................................................ xvii
v
vi ◾ Contents
ix
x ◾ Foreword
Steven E. Lewis
Lewis & Backhaus, P.C.
Dallas, Texas
Preface
xi
xii ◾ Preface
Introduction
Cargo theft. When you hear or see those words, you may
imagine piracy on the high seas, stagecoach and train rob-
beries in the old west, or some other long-ago image of a
romantic criminal element dramatically represented by the
entertainment media as the good old days. Cargo theft has
been portrayed as acceptable behavior. Robin Hood and his
merry men would inflict brutality on the king’s men in the
process of stealing the kingdom’s goods and gold to share
with the less fortunate. Stories about the likes of Butch Cassidy
and the Sundance Kid and their Hole-in-the-Wall Gang along
with Jesse and Frank James and the Younger Brothers also
entertained us. Who can forget Detective Axel Foley in Beverly
Hills Cop as he rode in the back of a hijacked trailer contain-
ing a load of stolen cigarettes?
Cargo theft has been a part of American history ever since
people started moving products by conveyances—whether horse,
wagon train, or Pony Express. As society and transportation and
logistics methods evolved, cargo criminals and their methods
3
4 ◾ Cargo Crime: Security and Theft Prevention
80
69
70
60 54 53
50
40 33
29 27 27 27
30 24
20 21 19
20 15 15 14 13 11 12 12 12
9 8 9 9 8 7
10 6 6 4
2 1 3 2
0
NJ TX CA GA IL FL OH IN CA NJ TX GA IL FL OH PA IN CA TX NJ FL GA IL IN PA OH CA TX NJ GA IL FL IN
Figure 1.1 The top eight states subject to cargo thefts seldom change;
only their order on the charts changes.
states that do not have that advantage. I believe the data
sources and information sharing will continue to grow to
paint an even better picture of the cargo theft problem, but
we already have a pretty clear idea from the data we ana-
lyzed. When you break the information down further within
the listed states, you find that most theft occurs in highly
populated areas (big cities and metropolitan areas) within
those states as a result of the routing of interstate freeway
networks through major hubs.
In California, most activity occurs in the southern section
in and around Los Angeles. In Texas, the focus is on the
Dallas and Houston metropolitan areas; Chicago is the main
location in Illinois. Tennessee cargo crimes center in Memphis
and Nashville and most Florida activity is around Miami. Most
people in the cargo industry know that the Atlanta area in
Georgia is notorious and cargo theft action freely crosses the
state line between Pennsylvania and New Jersey.
I reviewed a recent California Highway Patrol (CHP) Cargo
Theft Interdiction Program Report (Hawkins 2011). In an
analysis of cargo theft by state, California was cited at the top
of the list, followed by Texas, New Jersey, Florida, Illinois,
and Georgia. This conclusion is in line with the SC-ISAC
Cargo Crime: Definition and Trends ◾ 15
Unspecified 49
Truck Stop 26
Facility 17
4th Qtr
Yard 14
Street 11
Lot 9
Warehouse 4
Unspecified 70
Lot 26
Truck Stop 26
3rd Qtr
Facility 22
Yard 12
Street 10
Warehouse 6
Residence 2
Unspecified 56
Lot 38
Truck Stop 26
2nd Qtr
Facility 19
Yard 18
Street 6
Warehouse 1
Unspecified 37
Lot 36
Facility 21
Truck Stop 18
Street 15
1st Qtr
Carrier Yard 12
Warehouse 3
Residence 2
Yard 2
Unknown 1
Rest Area 1
0 10 20 30 40 50 60 70 80
book will follow through with a theft at any location if the cor-
rect opportunity presents itself. Location rarely concerns orga-
nized groups; the important factor is the point at which the
load is vulnerable and they have an opening to do their work.
This is a key point for industries to understand and thus
step up protection in their own facilities and control circum
stances of when and where drivers stop while carrying high-
value loads. These thefts can and do occur quickly. A victimized
driver who did not apply the locks or immobilization equip-
ment because he was only going to be away from the rig for
a few minutes has no valid excuse. It is important to stress the
Cargo Crime: Definition and Trends ◾ 17
over the past few years, the data showing when thefts occur
remained very consistent, never once showing a dissimilar
result in any of the quarterly analyses conducted.
Among all the figures and data, Figure 1.3 shows the most
consistent trend over the 3-year period and earlier. It clearly
illustrates to the transportation security professional the huge
need for each supply chain operation to fully protect its assets
during weekends, and particularly over 3-day holiday weekends.
Locking down facilities is not the biggest challenge; the
challenges appear during the release of freight for transit,
while it is in transit, and during receipt at arrival. The risks
are not always easy to fix because of variations in consignee
needs, business schedules, and other factors. These vulnerabil-
ities should be major considerations for high-value shipments.
The goal should be to never allow your freight to be dropped
off or left unattended. “Freight at rest is freight at risk” is
Cargo Crime: Definition and Trends ◾ 19
Weekend 65
Fri 30
4th Qtr
Thu 25
Wed 13
Tue 25
Mon 13
Weekend 67
Fri 40
3rd Qtr
Thu 11
Wed 42
Tue 18
Mon 29
Weekend 64
Fri 41
2nd Qtr
Thu 14
Wed 27
Tue 22
Mon 33
Weekend 48
Fri 22
1st Qtr
Thu 16
Wed 19
Tue 24
Mon 19
0 10 20 30 40 50 60 70 80
What’s Stolen
The commodities and specific items most often reported stolen
during 2009 are certainly no strangers to our earlier analysis.
20 ◾ Cargo Crime: Security and Theft Prevention
Food
2.86%
twelve quarters.
No Information
2.41%
Metals
2.26%
Consumer Electronics
2.26%
1st Qtr
Other
1.96%
Bvg
1.96%
H&B
1.96%
Automotive
Furniture
1.36%1.36%
Food
4.67%
No Information
3.92%
H&B
3.16%
Other
3.16%
Metals
3.16%
Bvg
2.86%
2nd Qtr
Bldg Sply
1.81%
Consumer Electronics
1.81%
Food
4.97%
Consumer Electronics
3.77%
Other
3.61%
Bvg
2.86%
No Information
3rd Qtr
2.41%
Bldg Sply
2.11%
Metals
1.96%
H&B
Other
4.37%
Food
3.31%
Bvg
2.56%
1.66%
4th Qtr
1.51%
Automotive
Bldg Sply
1.46%
Computer & Peripherals
1.20%
H&B
1.05%
Bvg
0.15%
Figure1.4 Food leads the list of commodities preferred for theft during three of four quarters and eleven of the last
21 ◾ Cargo Crime: Definition and Trends
22 ◾ Cargo Crime: Security and Theft Prevention
Steel
Steel
Steel
Misc
Meat
Meat
Meat
Meat
Health
Frozen
Beauty
Copper
Copper
Copper
Alcohol
Alcohol
Alcohol
Perfume
Non-Alcohol
Non-Alcohol
Non-Alcohol
Non-Alcohol
Construction
Construction
Construction
Bvg Food H & Metals Bldg Bvg Food H&B Metals Bldg Bvg Food H & Metals Bldg Bvg Food
B Sply Sply B Sply
1st Qtr 2nd Qtr 3rd Qtr 4th Qtr
Cargo Crime: Definition and Trends
◾
Figure 1.5 Cargo thieves desire the same products most people want.
23
24 ◾ Cargo Crime: Security and Theft Prevention
The data covering 2009 through 2011 list the same com-
modities and specific items—frequently very high-value
computer equipment, consumer electronics, and consumable
goods. It seems that stolen items that are sought after and not
expensive can be sold easily and are more difficult for law
enforcement to track via serial numbers or document by other
means. Figure 1.4 and Figure 1.5 show commodities that are
known targets of organized cargo criminals.
Food commodities led the way—with the exception of the
fourth quarter, when they ranked second. There are many
things to learn from the three years of data and the 2011
charts. You can identify certain cycles for specific commodi-
ties. For example, metals cycle based on their market costs.
If the price of copper is up, the theft of copper increases. In
an analysis of targeted and stolen commodities in California,
a California Highway Patrol (CHP) analysis noted, “Food,
electronics, and clothing continue to be the most sought
after stolen products due to the ease of resell and value of
return on the product. In addition, the inability to identify
and recover the products efficiently and effectively once dis-
tributed. As stated earlier, we saw a significant increase in
construction materials (roofing material, lumber, tile, metal,
piping) in the southwest area. Most of the other products
stayed relative to the previous years” (Hawkins 2011).
The California study is almost a mirror image of our find-
ings nationwide as shown in Figure 1.4. The most significant
increase (that seems now to be an anomaly) is the “other” cat-
egory in the SC-ISAC report ranking number one in the fourth
quarter. The “miscellaneous” category in the California report
jumped to third in 2011. This may show a change in targeting
strategies by the cargo criminals.
We need to watch this area for several more quarters to
see whether it is a changing factor. In the past, cargo crimi-
nals did not show a desire to prey upon consolidated loads or
mixed freight because variations limited their control over the
products they were seeking. The increase in thefts of “other”
Cargo Crime: Definition and Trends ◾ 25
Conclusion
After looking at the data for 2009 through 2011 and the
2011 charts from the SC-ISAC, we now have an idea about
three of the five cargo crime tenets. The what, where, and
when have been identified from analysis of the charts. The
what consists of commodities preferred by cargo thieves.
Remember that with organized cargo theft, the what is the
most important factor. Real cargo thieves know the prod-
ucts they are after and target those specific commodities as
part of their method of operation, which we will talk more
about in Chapter 3. No matter what the mode of freight
transportation, the listed commodities represent the first line
of products the thieves will target. The same principle also
applies to internal thieves working in consolidation units.
Their growth from simple pilferage to targeting pallets or
greater quantities will be based on what the involved com-
modity is.
The where issue is detailed in the charts showing states
where most thefts occur. Once again, the actual reporting
may be somewhat skewed by the fact that the areas most fre-
quently cited have cargo task forces or industry security coun-
cils that focus on the cargo crime issue. These entities tend
to promote much more regional participation in information
26 ◾ Cargo Crime: Security and Theft Prevention
Modes of Freight
Transportation
Introduction
Freight is moved by many different means. Each mode of
freight transportation presents different challenges related
to theft and loss. To understand the big picture of theft
within the transportation industry, you must first understand
how freight moves. Companies have many choices, based
on their needs. When looking at the different transportation
modes, a company must determine which one provides the
transit times, service, cost-efficiency, and security its freight
needs. Depending on the commodity to be shipped and
the volume of freight to be moved, a shipper must consider
several factors and choices. Cost is usually the main factor
followed by special considerations needed to make the ship-
per’s customers or buyers happy by meeting service due
dates, preventing loss and damage, and being a responsive
business partner.
27
28 ◾ Cargo Crime: Security and Theft Prevention
Freight Modalities
Most of the information and figures reviewed in Chapter 1
relate to full truckload thefts, but industries use other types of
shipping modalities as described below.
Full truckload (FTL)—As the name indicates, the FTL is
one trailer load of freight belonging to one shipper, for exam-
ple, a 53-foot van loaded with product from a single owner.
FTL shipping is the movement of large amounts of standard-
ized cargo, generally the amount necessary to fill an entire
semitrailer or intermodal container. A truckload carrier is a
trucking company that generally contracts an entire trailer load
to a single customer. The big advantage is that freight shipped
by FTL carriers is rarely handled or involved in a consolidation
while en route. This eliminates internal theft to a degree but
FTL loads are still subject to theft from external non-employee
criminals. This mode is targeted by the commodity carried
and the loaded rig being left unattended. Most driver give-ups
occur with this mode, especially when non-company drivers
are used. We will talk about driver give-ups and truck-stop
crime in the next chapter.
Less than truckload (LTL)—This mode transports rela-
tively small freight that is too big for parcel carriers and too
small to go with a full trailer load. LTL carriers use semitrail-
ers that are typically between 28 and 53 feet long. They fill
the trailers with freight, usually pallet size, from many cus-
tomers to make such transportation economical. This mode
uses a consolidation system to move each customer’s freight
from origin to destination. This consolidation system means
that the freight requires handling several times while in tran-
sit, depending on the shipment route. This system of freight
transportation is very controlled when it comes to the drivers
and the long-haul portion of the operation. The advantages
of this mode are control and the flexibility of the system for a
shipper. The move may take a little more time because of the
consolidation process, but it can service a shipper needing to
Modes of Freight Transportation ◾ 29
Conclusion
Is one mode safer than another? The answer depends on sev-
eral factors. Picking the mode for your commodity is as impor-
tant as picking the carrier. Once you understand how different
groups target commodities, how to choose specific modes for
certain shipments will make more sense. Do you want your
cargo handled fewer times? Do you not want a full truckload
of your product at risk?
In addition to cost realities, you have other issues to con-
sider when making your decision. Once you determine a
mode, you can pick a carrier. You should also base that
choice on how a carrier handles security in its company and
for its shippers. A chosen carrier should have a dedicated
security department with written security and recovery plans
and the ability to execute both. As I noted in Chapter 1,
moving a box, pallet, or truckload from point A to point B
can sometimes be more complex than expected. In the next
chapter, we discuss the groups that target the industry and
the methods they use. The information should allow you to
make educated decisions about modes and the risks attached
to them.
Chapter 3
Perpetrators of
Cargo Crime
Introduction
When I first ventured into the transportation world from the
public law enforcement sector and started learning and apply-
ing transportation security techniques in a real-life scenario
over a multistate area for a multimode company, I saw first-
hand the risks and threats to this business from inside and
out. My region originally consisted of five southwest states
and Mexico. Over time, it grew to involve seven states.
The business units I oversaw included every mode dis-
cussed in Chapter 2 except intermodal rail, ocean, and parcel
shipping. We utilized truck operations to and from rail and
ocean ports but I did not have security responsibilities for
freight while it was actually on rails or on a ship. I quickly
learned what issues were relevant to my area versus what the
regional security managers (RSMs) in the other regions faced.
Most activities in my region, related to our LTL operations
by both our union and nonunion carriers. Within the first
month of my employment, I was introduced to a major inter-
nal theft ring that operated in our union LTL operation in
35
36 ◾ Cargo Crime: Security and Theft Prevention
that could become future targets for other truck thefts or high-
value warehouse burglaries.
After they complete their intelligence gathering at a targeted
location, their plan to take down a vehicle in transit goes into
effect. When a fully loaded tractor trailer leaves a location under
the correct conditions, the thieves will fall in behind the unit,
start the surveillance, and wait for the driver to provide them
with an opportunity. Whether the driver goes 20 miles or 200,
they continue the shadowing until the unit is stopped and left
unattended. When that happens, within a short time, usually in
fewer than 90 seconds, the criminal team will take the entire
rig and escape. They can steal most rigs quickly using master
keys that may be purchased on the Internet or by using ignition
pullers or ignition jumpers, depending on the type of tractor.
Before 2007, theft perpetrators headed directly south to
Florida. They would immediately disable the access control
GPS devices and go to their fencing location to off-load the
stolen goods and dump the equipment nearby. Police then had
about a 16-hour window to have any chance of recovering the
cargo and, in most cases, it was not recovered.
Since then, both law enforcement and the industry have
acted to respond more effectively to this method of operation
and the thieves have also changed their procedures to circum
vent the efforts. Many high-value shippers have started using
covert cargo tracking GPS equipment within shipments. Law
enforcement in Florida has installed license plate readers (LPRs)
at state border inspection sites. These actions have led thieves
to change their methods somewhat. They continue to use the
same methods to target the loads. However, after committing
a theft, they drive the rig to a nearby location such as a truck
stop, rest area, or mall where it does not look out of place,
then leave it there under surveillance to see whether law
enforcement responds. If no response is seen in a few hours,
they replace the tractor with a clean (not stolen) unit and have
been known to paint over logos on trailers.
40 ◾ Cargo Crime: Security and Theft Prevention
the steps they follow for in-transit thefts, we see the same fac-
tors in warehouse burglaries. Once thieves select a target ware-
house, many times from in-transit surveillance activity, they
will conduct the same type of survey on a target warehouse to
become familiar with its operation. They will determine hours
of operation, the physical security at the location, and the arriv-
als and departures of employees, vendors, deliveries, and other
truck traffic. By watching the location, monitoring activities,
and learning what is normal, the perpetrators can devise a plan
to gain entry and be able to stay inside the location for a long
time without being discovered. These suspects are not using
smash-and-grab tactics; they plan to enter the operation, select
the property they want, and make a huge haul. To do this, they
must take control of the building, alarm, and security features.
They must have a plan for removing large amounts of property
and not being detected during the operation.
During their surveillance, the thieves will try to determine
the alarm company and see whether they can gain entry
via use of a code. If a warehouse has a storefront and they
observe employees enter and use an alarm pad, they can
plant a camera outside the storefront window in an attempt to
obtain an employee’s code. I have seen a TOMCATS training
video in which thieves placed cameras in plants and ashtrays
on the front porch of a location in an attempt to obtain the
video of an alarm code. They have been known to observe
the first employee enter a warehouse in the morning and
watch the employee make the alarm pad entry.
Since alarm company information is frequently posted in a
window, the thieves immediately phone the warehouse using
a spoof app showing the alarm company name on the caller
ID. When a warehouse employee answers, the caller explains
that the alarm has been triggered and was not cleared via the
pad. When the employee explains that the code was entered,
the caller asks for the code. If the employee provides it, the
thieves now have a code to clear the alarm.
Perpetrators of Cargo Crime ◾ 45
other industries for much smaller losses but will not prosecute
a truck driver who exchanges thousands of dollars of freight
for drugs or sex. This lack of support from the justice system
is totally wrong. Investigation should be warranted for any ille-
gal activity. A blanket statement of prosecutorial denial for any
incident deemed a driver give-up is totally irresponsible and
allows this type of activity to continue unchecked.
Many opportunistic groups have their own tractor units
and troll the drop yards continuously for unsecured trailers.
Companies and drivers need to be aware of these types of activ-
ities and all drops of trailers must conform to secure guidelines.
One other activity of opportunistic groups is burglarizing
parked rigs. These thefts frequently happen at truck stops or
industrial areas where trucks park and wait to make deliveries.
When the trucks cannot park in secured areas and are forced
to park or wait in areas outside high-value distribution ware-
houses, they may be watched by thieves looking to make a
quick hit on a trailer full of product. Many drivers go to sleep
in their rigs and never know of a breach until the next day.
Many hazards await drivers who do not understand the risks
of a neighborhood, the value of the products they carry, and
the skills of predators looking for an easy mark.
Truck-Stop Crime
Truck stops are little cities and centers of commerce of all
sorts. Truck stops provide stores, restaurants, fuel, truck main-
tenance facilities, showers, rest areas, and Internet load boards.
They have large parking lots with spaces to accommodate
many tractors and trailers. Most truck stops do not claim to
provide secure parking and even forbid leaving drop trail-
ers in their lots. Most long-term truck drivers, usually owner-
operators, feel secure in these surroundings. Each truck stop
has its individual appeal to drivers and they become loyal
to truck stops on the routes they frequent. But each truck
stop has an underbelly of crime and illicit activity.
Most big or inner city truck stops are known to have unau-
thorized drug dealing and prostitution activity within their
confines. These criminal activities can entangle drivers who
participate in drug activity and prostitution and can put the
cargo in their possession at risk. This is a common problem
and can even be exacerbated when law enforcement jurisdic-
tions will not prosecute a driver who gives up his load for
drugs or the entertainment from ladies of the evening. A driver
with a fully loaded unit who engages in this type of activity
puts himself and his freight at risk.
While I was writing this section of the book, I received a
“be on the look out” (BOLO) message about a case reported
in Dallas to an insurance company and to the Dallas police.
The BOLO reproduced below involved a theft of tires from
a driver who allowed a prostitute into his unit, as a result of
which he was robbed of his load.
Perpetrators of Cargo Crime ◾ 53
CARGO THEFT
Stolen cargo: American tires waiting on bill of
lading
Report #60169Z
Conclusion
Figures 1.1 to 1.5 in Chapter 1 provided you information about
the what, where, and when of cargo theft. This chapter pre-
sented information on the various perpetrators of such crimes.
You can now tie a few other points together. When you fur-
ther analyze each theft, you can usually tie the offense to a
certain type of group. Food is almost always the number one
commodity on the targeted list, but is seldom the target of
the South Floridian ethnic crews. Food thefts usually involve
local opportunistic criminals and fraudulent pick-up artists.
Electronics, pharmaceutical, and other high-value merchandise
falls more to the organized South Florida crews.
Although it is not always possible to determine responsibil-
ity because many crimes are never solved, you can make valid
conclusions based on where empty equipment is found and
Perpetrators of Cargo Crime ◾ 59
Industry Responses
Introduction
Most people have no idea that a cargo theft problem exists.
Cargo theft is a property crime that is not reported in the
news media or grocery store tabloids. It is a reality that rides
under the radar of most of society and does not get sufficient
attention from businesses in the supply chain. Most law
enforcement officers have no idea that cargo theft is an issue
unless they are assigned to units that deal with it. A number
of people in law enforcement and industry, when added to
the Southwest Transportation Security Council (SWTSC) BOLO
(be on the look-out) distribution list told me they had no idea
that this type of crime was so prevalent.
Cargo theft is a well-kept secret and bringing the attention
of industry and law enforcement to this type of crime has
been a slow, steady push. Every initiative to carve out a new
way of doing business in this industry, whether security
related or otherwise, always moves at the rate of a baby step.
Bringing the cargo theft reality to the attention of those who
need to know has proceeded at the same pace. The best way
to handle a loss situation is to deal with it and that is what the
transportation industry security management has done.
63
64 ◾ Cargo Crime: Security and Theft Prevention
The Vision
Only seven dedicated law enforcement cargo task forces exist
in the United States and reside in areas where needs for such
task forces exist. There are areas in the country where task
forces are sorely needed but attempts to establish them have
been unsuccessful. It is much more glamorous to chase serial
killers, bank robbers, and other perpetrators of news-making
crime. Preventing and fighting property crime is not romantic
or newsworthy. Cities occasionally institute programs to thwart
auto or home burglaries for a short period but the lack of
excitement surrounding such crimes allows such plans to go
by the wayside quickly.
When I worked for a police department and supervised a
violent crime task force unit and street squad drug enforce-
ment unit, never once did I see or hear about a cargo theft task
force. Even the commercial auto theft investigators never spoke
of enforcement measures focused on cargo. Cargo protection
has never been a priority and only became an afterthought
when the industry formed regional councils and started push-
ing the issue in recent years. The security side of the industry
now realizes that it takes the effort from transportation and
logistics companies and their insurance carriers to bring the
issue into light and make law enforcement, the public, and
other segments of the industry aware of the problem.
When I joined the industry side of the equation in 1997,
several regional industry councils and a fairly active national
group known as the National Cargo Security Council (NCSC)
existed. The Eastern Regional Council was active in New
York and New Jersey and cargo associations existed in north-
ern and southern California. These groups advocated for
the industry in their own ways and under their own bylaws.
The sharing of theft information through company security
managers, although a good model, left a lot to be desired.
Information sharing should have been taken beyond the
industry security management groups and associations. Even
Industry Responses ◾ 65
The FSRs and TSRs it issued make sense, are reasonable, and
serve as realistic guidelines for carriers and service providers.
Security is not always about spending money; it often
simply requires working smarter. TAPA is now accepted into
the mainstream of supply chain security since it moderated its
views and started accepting membership outside the technol-
ogy world. Information about TAPA can be found at http://
www.tapaonline.org/. If you are tasked with building a secu-
rity plan, the TAPA FSRs and TSRs are very good starting
points for devising guidelines and requirements.
Information Sharing
The most important part of networking and group involve-
ment is the sharing of information. Companies that have similar
interests and operations can assist each other in nonpropri-
etary ways by sharing information related to risks and threats
that face the entire industry including manufacturers, shippers,
carriers in all modes, insurers, transportation security vendors,
security service providers, and all entities with interests in
protecting the supply chain. When some or all of these people
gather in the same room, they can all relate experiences or
incidents that will allow others to learn new tactics. Sharing
information is a way of not having to reinvent the wheel,
learning from experts, and hearing about risks and threats that
may arise in the future. It is also a great way to learn about
effective products and efficient resources for all types of secu-
rity problems. Discussions about losses and recoveries, where
they occurred, what was taken, where equipment was recov-
ered, and evidence at the scene paint a very informative picture.
Having knowledge about these incidents allows you and your
company a much better chance of recovery if a theft occurs.
When we first started talking about sharing information on
a much more public scale to raise awareness and analyze the
issues, many industry insiders feared such activity. They were
Industry Responses ◾ 81
afraid that being open about losses would place the industry
in the wrong light or worried that their companies would lose
business or suffer other consequences. This has just not been
the case.
A few holdouts continue to guard their information. They
are only hurting their own companies and hindering better
security and recovery operations. One security director of a
company was adamant about not sharing information when
his company suffered a loss of a cargo of flat screen televisions.
He refused to share the details of the theft or the location
where the recovery took place—in this case, a west Texas city.
About six weeks later, his company was hit again at the same
location. A vendor of the shipping company reached out to the
SWTSC after the shipper had trouble getting an investigative
law enforcement response. A call was made to state police in
the area. The investigator was aware of the previous offense
and knew where the empty trailer was dropped after the
earlier incident. Quite a bit of time had passed. When he went
to the known location, he found the abandoned empty trailer
from the latest offense. Had the victimized company been
involved in information sharing and communication network
and immediately revealed the information, law enforcement
would have had an opportunity to place the recovery location
under surveillance before the unit was abandoned.
Sharing information does not require a company to reveal
names or proprietary information. It simply means a company
can get the necessary information out in the quickest manner
to the most authorized persons to help it recover its property.
Another benefit is entering product information into the archived
systems. If it is found later, it can be returned to the correct
party. All of this makes perfect sense.
A good case in point about sharing information and under-
standing how thieves operate involved a load of stolen baby
formula in Michigan. The company that sustained the loss
was aware of the thieves’ MO and informed the responding
law enforcement. Based on the information provided by the
82 ◾ Cargo Crime: Security and Theft Prevention
Conclusion
In the past five years, two hard-hit groups that made the
most of information sharing and analysis and improved sup-
ply chain security are the tobacco and pharmaceutical ship-
pers. The tobacco industry really was the first to make major
changes, demand accountability, and use technology to improve
the visibility of their shipments from origin to destination.
The industry also began participating in national and regional
groups to build network assets and obtain resources to protect
their products in transit and in warehouses. Tobacco loads
were hit often. A tobacco load is worth millions of dollars and
generates huge amounts of taxes. FTL thefts were common
until the industry took action. All industries must take steps to
thwart crime; if the police must be called, a company’s plans
and procedures have failed. Tobacco companies built security
programs that included driver awareness programs, installation
of covert tracking technology and the use of the carrier evalu-
ation matrix. When we look at best practices later in its book,
you will understand the value of a layered security approach
for theft prevention.
86 ◾ Cargo Crime: Security and Theft Prevention
Law Enforcement
Responses
Introduction
The overall law enforcement response to cargo thefts in most
circumstances has been underwhelming for many reasons.
Obviously, unsatisfactory response is not the case in every
jurisdiction because some task forces actively react to and
investigate such crimes. Some of the problem relates to crime-
reporting issues. Most states do not have specific statutes
covering cargo theft and adjudication can vary depending on
how a crime is reported. If cargo is stolen along with a trac-
tor and trailer, the incident is treated as a commercial vehicle
theft offense and the cargo in the trailer is a supplement to the
vehicle crime. When a tractor and trailer are recovered, cargo
becomes an afterthought. Vehicle detectives are not always
trained to deal with issues beyond the vehicles and may not
understand the cargo losses involved in the equation.
Some departments actually cover cargo crime through their
auto theft units but these are more exceptions than rules.
Therefore, when police crime statistics and records do not
include cargo theft data, the agencies cannot be expected to
87
88 ◾ Cargo Crime: Security and Theft Prevention
form task forces unless they see good reasons. We all under-
stand that reality. For many years, the Dallas Police Department
employed one auto theft detective, David Wallace, who also
had cargo theft responsibility. This is a city of over a million
people that constitutes a problem area for cargo crime. From
an industry standpoint, a single detective was better than
nothing. Over time, the SWTSC was able to lobby the Dallas
department to at least assign cargo, commercial vehicle, and
trailer thefts to the Auto Theft Section so that they were
assigned to one detective. Before that improvement was made,
trailer thefts were assigned to various burglary and theft units
at the precinct level and coordination of enforcement and
investigation efforts was nonexistent.
Detective Wallace soon became acquainted with the
industry by attending SWTSC meetings and training. He
understood the scenarios and criminals and became a very
good source and resource for area cargo theft information.
A task force or assigned detectives can make a huge differ-
ence in crime investigation. When a detective or group of
detectives work certain crimes—drugs, robberies, burglar-
ies, or cargo thefts—they start to understand the crime, the
criminals, and all the other moving parts. Stolen property
must be disposed of so police investigators identify fenc-
ing operations, pawn shops, and online sources that deal
in stolen goods. When suspects are identified or arrested,
specialized investigators conduct interviews and build local,
regional, and even national intelligence. Because cargo theft
information has been compiled, officers have a great deal of
background, resources, and sources to assist them in solving
crimes and recovering stolen property. If an area does not
have a task force or at least one assigned cargo theft detec-
tive, its ability to investigate crimes and recover stolen
property is greatly hampered by the lack of organization
and information.
Information is the big difference between the haves and
the have-nots. Cargo thefts frequently victimize the have-nots.
Law Enforcement Responses ◾ 89
Principles
Status as a non-profit 501(c)6 voluntary organization
Dedication to cargo security and transportation issues
Inclusion of all modes of transportation
100 ◾ Cargo Crime: Security and Theft Prevention
Figure 5.5 Satellite parts that weigh far too much, are not transpar-
ent, and fit several other profiles including dock drop as documented
on the BOL. (Source: Coughlin, J.J. SWTSC’s Interdiction: Company
Operation and Documentation presentation. With permission.)
Figure 5.7 Auto parts shipper and consignee were named. Package
has black shrink-wrap and no transparency.
Figure 5.9 Drugs stuffed inside wire spindles. Weight issues and
lack of transparency are clues. (Source: Coughlin, J.J. SWTSC’s
Interdiction: Company Operation and Documentation presentation.
With permission.)
Figure 5.10 Drugs stuffed inside wire spindles. Weight issues and
lack of transparency are clues. (Source: Coughlin, J.J. SWTSC’s
Interdiction: Company Operation and Documentation presentation.
With permission.)
Handling Contraband
Now that you have a good indication of the profiles of con-
traband shipments, you must consider how you would handle
one when discovered. After teaching frontline dock employ-
ees the indicators of contraband shipments, you will quickly
start identifying suspicious packages. Freight companies have
a right to inspect any package accepted into their shipping
systems. Laws against search and seizure are very strict. This
is very important to understand so that contraband can be
confiscated and taken into police custody without eviden-
tiary problems.
Treatment of a suspicious shipment or package must be
done correctly in case the law enforcement agencies decide to
pursue reverse delivery options and prosecution. Certain rules
Law Enforcement Responses ◾ 113
Figure 5.14 How ice cream machines were tendered to LTL transporter.
Figure 5.18 Drug-sniffing law enforcement dock helper and cargo buster.
to conduct their own investigation to determine if they have
probable cause to obtain a warrant to search the package. Of
course, as part of their establishment of probable cause, they
could use the known drug shipment profiles listed above as
part of the justification.
Many law enforcement responders use drug dogs like the
one pictured in Figure 5.18 to find the probable cause needed
to open a package. After a suspicious package is brought to
the attention of management, it should be moved to a section
of the dock where it can be overseen but does not interfere
with operations. When the police arrive, they will take pos-
session of the shipment until a determination can be made. If
a shipment is contraband, the police will take possession of
the shipment, ask for related documents, and discuss with the
company the strategy and options available.
Often after identifying a contraband shipment, analyzing
shipper, consignee, and locations for pick-up and delivery, you
may be able to identify past shipments that may be related
and identify receivers. If this information is shared with other
carriers, it can yield information on other shipments and drug
conspiracies. If law enforcement officials follow this path, the
118 ◾ Cargo Crime: Security and Theft Prevention
Conclusion
The training developed by members of the SWTSC has been
taught to many law enforcement officers over the years. The
classes are not designed to teach the police how to investigate.
They are designed to inform police about the industry and the
work of the industry councils. After working in law enforce-
ment and in the cargo industry, I realize the important role
industry paperwork plays in law enforcement investigations,
especially in smuggling cases. It is vital to provide industry
overviews to law enforcement officers so that are aware of
the sources and resources available to them. The SWTSC even
sends law enforcement officers to other cargo training schools
and conferences via scholarships and funding. This builds the
public–private partnership in a very solid way. Now that we
have talked about law enforcement training, we can focus on
best practices in the industry.
Chapter 6
Introduction
After looking at the many risks, threats, and obstacles which
can be found in the supply chain, we need to look at the
many ways we can use prevention, technology, and awareness
to build an efficient and effective system for each business unit
to have the best chance to succeed against the known and the
unexpected. The U. S. Government released the first informa-
tion on a national strategy for global supply chain security on
January 23, 2012. In this strategy, the government wrote about
undertaking a number of efforts to strengthen the global sup-
ply chain including legislative requirements (regulation) and
a number of strategic efforts with a specific security focus,
where they footnoted fourteen different laws and acts which
have been passed since 2002. Although I believe it is benefi-
cial to have a strategic government program, this macro vision
of the plans leaves most of us who work in the industry want-
ing more information concerning the operational grassroots
working on the implementation. In looking at the govern-
ment’s “path forward” bullet points, as part of their aligning
federal activities, I would suggest they consider sponsoring
or participating in cargo theft task forces, assisting the set-up
123
124 ◾ Cargo Crime: Security and Theft Prevention
◾◾ Human Resources
−− Training and Orientation
◾◾ Business Partner Requirements/Vendor Management
◾◾ Facility Security
◾◾ Procedural Security
◾◾ In-Transit Security
◾◾ Brokerage (if applicable)
◾◾ IT Security
◾◾ Legal Best Practices
126 ◾ Cargo Crime: Security and Theft Prevention
area and not going back to Florida with each theft. There are
splinter groups like these in New Jersey, Kentucky, Texas, and
other places which are being identified bit by bit from the data
analysis. In this case, the Texas Department of Public Safety
District One investigators were able to obtain over a dozen
indictments for group members and eventually shut down
their Texas splinter operation. The presentation tied together
the local pieces and showed the independence of the crew
from the Florida influence. It is too early to tell, but these
cargo criminals may not like the sentences they receive from
some of these rural county juries. If they are going to splinter
out, they may want to hang in the large, metropolitan coun-
ties where property crime justice is routinely overlooked. This
is a fairly new phenomenon which investigators around the
country may want to start checking. Remember: the location
of the empties is going to be one of the first best indicators of
a splinter group operation.
The next presentation was conducted by two local National
Insurance Crime Bureau agents, Jerry Allen and Stacy
Hohenberger. They laid out the grassroots view of the NICB
cargo theft program. Both agents are sworn officers embedded
in law enforcement units with cargo theft and insurance fraud
as their main responsibilities. They are a major part of the
information sharing and law enforcement intelligence locally.
They provide assistance to law enforcement and work for
NICB member companies. Their presentation laid out an over-
view of the cargo theft problem and the assistance they are
able to give. They also discussed the CargoNet product and
capabilities since NICB is a part of the collaboration with ISO
for CargoNet. No company or entity has made a bigger push
into the cargo theft arena than NICB has in the past several
years. They are in position and very willing to help in cargo
theft investigations and the coordination of law enforcement
and industry efforts.
Following NICB was Shawn Driscoll, director of security
for Swift Transportation. He presented an overview of the
132 ◾ Cargo Crime: Security and Theft Prevention
Personnel Security
Companies of all transportation modes should:
Procedural Security
Companies should have:
In-Transit Security
Companies should:
Drivers should:
ATTENTION DRIVERS!
Individuals will follow you with the intent to steal your
entire truck and trailer if left unattended or unsecured.
Immediately notify local law enforcement authorities
and your dispatch if you believe you are being followed.
Follow your company guidelines for in-transit high
value freight handling.
(1) Always engage any issued anti-theft and immobiliza-
tion devices and remove the keys from your tractor,
including spare keys, when leaving the truck during
breaks or fuel stops. Lock all windows and doors.
(2) Never leave your truck engine running while away
from the truck.
(3) If you’re part of a driver team, one of you must stay
with the load at all times.
(4) If you must stop for a break, park in a manner to
ensure a full view of your load at all times and
inspect seals before leaving and upon return.
(5) Do not discuss the contents of your load with
anyone.
We strongly advise against stopping for any reason if load
cannot be attended, secured or kept in sight at all times!
If your load is stolen, immediately notify law enforce-
ment, your dispatch and __________________ at
__________________ 24 hours a day.
Source: J. Coughlin, Driver Warning Sheet 2001.
and worked closely with the carrier security teams. Large com-
pany carriers were hired, as they had better systems and secu-
rity groups to respond to the threats and risks. At this time the
embedded cargo security AGPS was not really available in the
market but the need for full visibility of shipments from origin
to destinations was shown to be sorely needed.
Most carriers had fleet management systems based on GPS.
These systems focused on operations and maximizing equip-
ment usage but did not protect the cargo at all. In matter of
fact, the organized criminals were known to immediately
disable the fleet management GPS systems upon the theft
of the vehicle. The only record you would have from these
systems was a last ping identifying when and where the
theft occurred.
As mobile communications, technology and web-based solu-
tions came on the scene in the supply chain, companies started
providing the AGPS tracking to offer a truly integrated solution
for in-transit protection. The solution included the use of embed-
ded cargo AGPS devices. The program included the use of the
covert tracking, along with monitoring, controlling the shipment’s
carrier, and providing recovery, investigation and prevention.
Covert tracking stepped up the security game against the
South Florida crew method of operation. This covert applica-
tion did not allow the criminals to disconnect the tracking
device and would not allow them the time to search for the
device and locate it prior to the police being able to respond.
It has made them change their method of operations but has
not stopped their activity. The monitoring, using virtual geo-
fencing available on the mapping and tracking interfaces,
allow the shippers to have vision of their shipment from origin
to destination. It allows them to monitor the carrier and con-
trol the shipment movement. The system can alert to many
circumstances, including exit and entry of geo-fence locations
and routes, stationary and moving after stationary, and proto-
cols can be set by the shipper with requirements put in place
for their designated carrier. The monitoring is conducted to
Prevention and Awareness ◾ 159
Most companies have figured out that they need to remove the
human factor from the equation as much as possible. The use
of web-based monitoring and mobile communication is the
impending wave of future products as most security providers
are looking for better ways to protect or immobilize the truck
and trailer without having to depend on the driver.
Covert AGPS systems and mobile communication locking
or controlling devices which can be monitored or applied
remotely is where the security for the in-transit piece of the
transportation industry is heading, especially for high value
shipments. In the not too distant future, insurers are going to
require this type of technology in return for affordable high
value cargo shipment liability insurance coverage.
Old fashioned hardware locks still provide a certain aspect
of security and continue to have their place in the industry but
it is time to step up the transportation security game. During
the theft of a chassis and container reported to the SWTSC
recently, the complainant had a video camera at the gate of
the involved yard. The camera caught the image of the crimi-
nals entering the yard in their tractor and removing a chas-
sis and container, all within two minutes. The complainant
stated that the chassis had been secured in the yard with a
king pin lock. So it took the thieves less than two minutes to
enter the yard, break off the king pin lock, hook the chassis
and drive away. This freight was never recovered. Within five
minutes, the thieves returned and took a second unit, also in
less than two minutes. The broken king pin locks were found
on the ground.
Had these same units been tracked and geo-fenced, when
they left the location they would have alerted their owners or
monitors and the units could have been tracked to a location
where the police could have responded. Going with the new
technology is the future and the industry is slowly trending
in that direction. The Internet and technology have changed
everything and transportation security is no different, even
though it is transforming at a very leisurely pace.
Prevention and Awareness ◾ 161
Figure 6.1 This sign, whether power is engaged or not, acts as a good
deterrent by providing perimeter control to prevent illegal entry.
164 ◾ Cargo Crime: Security and Theft Prevention
I used this solution and know many others who have also
used it. It is the real deal with positive results. In one location
where I had it installed, I was able to do away with one 24/7
guard, which allowed me to pay for the fence and have budget
money left over. Very reasonable solution with great results!!
Cargo Insurance
Cargo insurance coverage does not come standard with your
commercial trucking insurance policy, and the purchase of
a full coverage vehicle policy does not cover your freight if
it is damaged or stolen. Cargo insurance is a separate policy,
which covers the freight you are hauling if lost, damaged, or
stolen. Considering that many loads that are worth thousands
of dollars, you can understand why this coverage is so impor-
tant and required by many contracts to protect their property
Prevention and Awareness ◾ 165
Conclusion
I have given a technology/solution for in-transit security, ware-
houses and facilities. There are many others I could offer but
these are my number one recommendations in those areas. I
168 ◾ Cargo Crime: Security and Theft Prevention
also have been working on a solution for identity theft and fic-
titious pick-up gangs. My system will vet a carrier to eliminate
the identity theft angles involved with this crime. Further, the
program will vet a carrier to a brokerage company’s guidelines
and then provide compliance and audit processes to maintain
the vetting status to the requirements.
The current problem is age old: companies are reluctant
to change the ways they operate. As long as they continue
down their current path, they will continue to be victimized.
They must slow the carrier selection process and initiate real
checks and balances to avoid being targeted for fraud. They
do not have to do it for every carrier, but they must do it for
any carrier they plan to use for high value or the known high
risk commodity loads discussed in this book. The vetting must
include a close inspection of all of the required DOT docu-
ments, insurance coverage and exclusions, a site inspection,
and references.
Recently, the SC-ISAC had eight loads reported stolen by
fictitious pick-up. This crime is increasing daily and will not
stop until companies take the correct steps. I collaborated with
a company called C-Net Technologies and we put together two
programs for transportation. One was a carrier management
system for brokerage to vet carriers for their high value clients
as mentioned above. The other is a transportation specific
background screening program for hiring drivers. Both pro-
grams were designed as solutions for known problems in the
industry. The SWTSC isn’t a social alliance; it provides law
enforcement training and the BOLO/Alert program and strives
to find solutions for problems, resources, and providers which
can assist our membership and the industry. I keep informa-
tion on all types of different services and products relative
to our transportation scope of work, and I continually make
referrals to industry members. There are many service provid-
ers and products that I can recommend based on their service
and effectiveness.
Prevention and Awareness ◾ 169
Moving Forward
Introduction
I would hope from all the information which has been pre-
sented thus far, it is apparent to the industry and its members
that we must do all we can to protect ourselves. It is incumbent
upon the industry and its members to take the necessary steps
to protect one’s own operation. By taking the security steps
necessary to protect one’s company and operation from theft,
we are also preventing interference and disturbance from other
possible harm including terrorist acts. Taking the initiative to
take the necessary steps to protecting our own companies will
make our operations more efficient and less susceptive to busi-
ness continuity issues and disruptions.
171
172 ◾ Cargo Crime: Security and Theft Prevention
The above is a good first step for getting this in the Texas
Penal Code and closing existing loop holes for cargo thieves.
This effort needs to be taken up by every state in the United
States where one does not exist. Why is it needed? Very simple.
Moving Forward ◾ 177
I looked in the index of the Texas Penal Code and the word
Cargo is not even listed. No reference to that word appears
anywhere in the code. Read the current penal code for theft,
from the 2010 Texas Penal Code below. Nothing is mentioned
about cargo in this statute and thus leaves much to be desired
when enforcing the law related to cargo theft and the district
attorneys in some jurisdictions not wanting to prosecute driver
involved type offenses.
§ 31.03. THEFT.
(a) A person commits an offense if he unlawfully
appropriates property with intent to deprive the
owner of property.
(b) Appropriation of property is unlawful if:
(1) it is without the owner’s effective consent;
(2) the property is stolen and the actor appro-
priates the property knowing it was stolen
by another; or
(3) property in the custody of any law enforce-
ment agency was explicitly represented by
any law enforcement agent to the actor as
being stolen and the actor appropriates the
property believing it was stolen by another.
(c) For purposes of Subsection (b):
(1) evidence that the actor has previously par-
ticipated in recent transactions other than,
but similar to, that which the prosecution is
based is admissible for the purpose of show-
ing knowledge or intent and the issues of
knowledge or intent are raised by the actor’s
plea of not guilty;
(2) the testimony of an accomplice shall be cor-
roborated by proof that tends to connect the
178 ◾ Cargo Crime: Security and Theft Prevention
They also have time to focus on the persons arrested for the
offenses, interview them while they are in custody, and build
an investigative “hook book” of suspects, fences, and asso
ciates. This collected intelligence leads to further information
about involved parties and accomplices along with informa-
tion about where the stolen property is being sold or deliv-
ered, which, in turn, leads to the development of informants
and all types of related investigative information.
Once this investigative process is in place, the Task Force
Officers (TFOs) have many more options when a theft occurs
than just working the case without the background and infor-
mation that true investigative techniques bring forth. It is
really no different than a long-term narcotics or organized
crime investigation with the goal of identifying the players and
locating the big fish or the buyers so that those persons can
be charged and put out of business. This will not happen if
you do not have a focused investigative effort. Blind luck is
good for investigators but working hard, building information
and intelligence will get you much further when dealing with
organized criminal groups. That is why we need cargo theft
task forces in several major areas so that those types of inves-
tigative inroads can be created. These task forces could also
start networking and communicating and sharing informa-
tion which would lead to tying together other associates and
related crimes and criminal activities.
Remember earlier when we discussed high value ware-
house burglaries, the DNA of one of the suspects of several
warehouse burglaries around the country has been matched to
DNA found in a pharmaceutical burglary in Enfield, Connecticut.
These were not local criminal acts; these involve the organized,
traveling, professional criminal elements. Single, one-time
investigations will seldom connect the dots, matching informa-
tion from these types of activities which occur in very distant
and distinct jurisdictions.
Moving Forward ◾ 187
origin terminal, the local police would respond and take pos-
session of the shipment leading to no follow-up or controlled
delivery being completed. It is much worse on the border
now. It makes much more sense now to investigate a package
identified as suspicious, at the first break point, thus remov-
ing the local anxiety and border difficulty. This also allows for
law enforcement at the break bulk to be notified as to exact
time of the suspicious shipment’s arrival so that law enforce-
ment can be present to meet the shipment at the time when it
arrives for consolidation at the Freight Assembly Center.
By getting a pre-alert concerning its arrival, the TFOs have
time to research the shipper, shipment, and consignee. They can
have the paperwork ready for a search warrant and have a
canine and dog handler present to immediately scan the ship-
ment. If it is contraband, the TFOs would be able to make a
determination as to how it would be handled from that point
on. If it is not contraband, it could be quickly released and
moved on through the consolidation process. This makes a lot
of sense. See significant parts of the proposal below. I believe
this type of program would reap huge benefits for both the
industry and law enforcement. This type of enforcement
program would act to enhance finding shipments involving
contrabands other than narcotics as well.
Bordernet
We are proposing the development of a network of terminal
managers (TM)/freight employees in LTL freight companies in
Laredo and McAllen/Brownsville, and other border areas that
can identify shipments with suspicious characteristics. The
initial profile that we would use would make this easy for the
freight companies and would consist of characteristics that
have been the most common on previous seizures and are
the easiest to track. The characteristics we would like to tar-
get are: 1) Dock drop off at the border terminal, and 2) cash,
Moving Forward ◾ 191
Epilogue
209
210 ◾ Cargo Crime: Security and Theft Prevention
215
216 ◾ Appendix
COLL: Collect.
Collect shipment: Shipment paid for upon delivery to
consignee.
Combination: Truck or tractor coupled to one or more
trailers.
Commodity: Cargo articles, goods, or merchandise.
Commodity rate: Special rate for specific goods.
Commodity tariff: Tariff of commodity rates.
Common carrier: Transportation company that offers service
to the general public.
Concealed damage: Damage not apparent and subsequently
not noted on delivery receipt.
Concealed loss: Loss that is not apparent and subsequently
not noted on delivery receipt.
Connecting carrier: Carrier that originates or completes
shipment but does not handle entire shipment.
CONS: Consignee.
Consequential damages: Special damages related to addi-
tional cost of loss or damages based on loss of profit or
advertising promises.
Consign: Send goods.
Consignee: Receiver of goods.
Consignor: Shipper.
Constant surveillance service: System by which a ship-
ment is signed for and confirmed at each point of
consolidation.
Contingent cargo insurance: Coverage that takes over a
claim if primary cargo liability policy fails to provide
coverage or is not adequate to cover the entire loss. A
contingent cargo liability policy pays any remaining
losses subject to conditions of the policy.
Contract carrier: Company that engages in for-hire trans-
portation of property under contracts with one or more
shippers.
Contract rate: Rate agreed upon by shipper and carrier.
220 ◾ Appendix
PU: Pick-up.
Pull the pin: Release fifth wheel lock.
Pup: Twenty-eight foot trailer designed for multiple uses or to
make city pick-ups and deliveries.
Pyramid: Palletized freight stacked in pyramid pattern.
Radiofrequency motion detection: Use of radiofrequency
generating and receiving equipment to detect the pres-
ence of an intruder.
Rag top: Open-top trailer that may have tarpaulin cover.
Rail trailers: Trailer usually provided by railroad for load-
ing on flat railcar.
Rate: Charge per hundred weight for transporting freight.
Reconsignment: Change in routing or destination for in-
transit freight.
Recooper: Repair damaged cartons or containers.
Recovery plan: Documented collection of procedures and
information maintained in readiness for use after a
cargo theft incident.
Reefer: Refrigerated trailer.
Release value: Value specified by a shipper to establish car-
rier’s minimum liability.
Residential delivery: Delivery to private residence; involves
accessorial charge.
Restitution: Returning stolen money or property; may be
done voluntarily or ordered by a court as part of a sen-
tence or as a condition of probation.
Revenue PRO: PRO number or bill used to capture revenue.
Reverse sting: Law enforcement strategy in which under-
cover police pose as criminals and arrest persons who
plan or engage in illegal activity.
RF: Radiofrequency.
RFID: Radiofrequency identification.
Root cause analysis: Technique used to identify circum-
stances that initiate an undesired activity or state.
Rug pole: Forklift attachment.
Appendix ◾ 233
Straight truck: Truck with power unit and van body in one
piece.
Stretch wrap: Shrink wrap.
Strip: Unload, count, and check a trailer.
Subpoena: Written order issued by a judicial officer requir-
ing a specified person to appear as a witness in a case
and/or produce written records to the court.
Supply chain: Set of linked resources and processes that
begins with the acquisition of raw material and extends
through the delivery of products or services to end
users across the modes of transport; may include
suppliers, vendors, manufacturing facilities, logistics
providers, internal distribution centers, distributors,
wholesalers, and other entities involved with movement
of products to end users.
Surcharge: Additional charge, most commonly for fuel.
Surveillance: Covert observation of a location, activity, or
person.
Suspect: Person considered by a criminal justice agency to
have committed a criminal offense before he or she is
arrested or charged.
SWTSC: Southwest Transportation Security Council.
SYN: Synthetic.
TAMCATS: Tennessee–Arkansas–Mississippi Cargo Auto Theft
Task Force.
Tandem: Semitrailer, truck, or tractor with two rear axles to
allow for carrying of larger payloads.
Tare weight: Weight of container and packing material;
weight of truck exclusive of contents.
Tariff: Published list of transportation rates, charges, and rules.
Tarpaulin or tarp: Cover for open-top rig.
TCON: List of all PRO numbers in loaded trailer; trailer
contents.
Team drivers: Two or more drivers who ride together and
drive the same truck in shifts, essentially allowing the
236 ◾ Appendix
239
240 ◾ Bibliography
Topics include:
• The various modes of freight transportation and the differences in
cargo crime activity in each mode
• Methods of operation used by organized crime syndicates and
narcotic smugglers
• The effective use of public and private information-sharing
partnerships to thwart criminal activities
• Known profiles consistent in over 90 percent of contraband shipments
K14902
ISBN: 978-1-4665-1245-0
90000
www.crcpress.com
9 781466 512450
w w w.crcpress.com