Sign up for blog updates
Where Do Stolen Goods Go? A Look Inside the Modern Cargo Theft Supply Chain
Cargo theft is often imagined as a stolen truck, a forced stop or a trailer that never arrives. In reality, most cargo theft now unfolds quietly, inside ordinary logistics workflows and often without immediate signs that anything is wrong.
The shift in cargo theft strategy from physical force to identity compromise and exploitation of routine processes has been underway for years. Fraudulent motor carrier profiles, impersonated brokers and compromised load board access now play a central role. Technology allows criminals to manage theft operations remotely — sometimes from other states or countries — while local intermediaries handle pickup and movement.
The scale of the problem reflects how effective this model has become. Annual U.S. cargo theft losses are estimated between $15 billion and $35 billion¹, and the estimated average value of an individual theft is more than $200,000².

What’s getting stolen and why?
The goods most frequently targeted today are chosen because they can be moved quickly, resold with minimal friction and absorbed into existing distribution channels of big box chains and online purchasing platforms without drawing attention. Items with embedded tracking or serialized components are avoided in favor of products that can be resold without repackaging or digital traceability.
Household goods surged during the pandemic because they were in demand and could be resold immediately without modification. In periods of economic pressure, food and beverage items become more attractive, particularly products that can be distributed locally and consumed quickly. In 2024 and 2025, metals tied to infrastructure and construction, especially copper, saw a sharp increase in theft as resale values climbed³.
For fleets, this creates a moving risk profile. Cargo that appears low risk based on historical trends can quickly become a target as market conditions change. Thieves don’t decide to steal a load based on how it was shipped; they decide based on its resale potential. That means exposure is not limited to high-value or traditionally “sensitive” loads.
However, predictability is still exposure. Repeated routes, consistent pickup locations, familiar facilities and routine documentation make it easier for criminals to insert themselves into workflows. Geography compounds the issue. Freight-dense states such as Florida, Illinois, California and Texas, and major distribution corridors consistently experience higher theft activity. Understanding what is being targeted and why is essential to anticipating where theft risk will surface next.
Once a load is intercepted, where does it go?
Once cargo is stolen—whether from trucks, warehouses, or shipping containers—it is typically moved rapidly into local resale channels, both online and in physical marketplaces. These channels commonly include pawn shops, flea markets, and various e-commerce or reseller platforms.
High-demand items such as electronics, pharmaceuticals, and designer apparel are frequently targeted because they can be resold and liquidated rapidly. Many online resale platforms operate with limited regulatory oversight, allowing organized theft groups to access broad consumer markets while minimizing their own exposure. As a result, stolen goods can often be distributed efficiently before law enforcement or affected parties can respond.
For fleets, this shift means risk is no longer driven solely by physical security, but by internal controls and information flows as well. Theft decisions are now informed by how easily a product can be relabeled, redistributed or absorbed back into legitimate commerce. Preventing it, therefore, requires understanding how theft decisions are made, and which commodities are most vulnerable as market conditions change.
Who are the criminals?
Criminals commonly target trucking company dispatchers through phishing emails, exploiting their role in load assignment and broker communication. Others impersonate carriers or brokers by contacting shippers from email addresses that closely mirror real company domains, creating the appearance of authorized access to accept and move a load. In some cases, thieves intentionally route multiple loads to the same warehouse. Someone then appears with paperwork claiming the freight was misdelivered, prompting the facility to release the cargo.
Law enforcement intelligence indicates that cargo theft is increasingly orchestrated by sophisticated criminal networks. These organizations target high‑value shipments and operate complex, self‑contained supply chains that often span multiple states or extend internationally. Stolen goods are frequently laundered through layers of intermediaries and subsequently fenced via seemingly legitimate freight‑forwarding firms or distribution channels.
How to reduce strategic cargo theft
Preventing modern cargo theft requires a shift in mindset as much as technology. Because these thefts exploit routine processes, effective prevention focuses on discipline, consistency and viability across operations.
Follow these best practices:
· Assume demand will change. Don’t base risk assessments on last year’s theft trends. Cargo theft is largely driven by supply and demand, and criminal networks move fast –targeting goods with the highest resale and least friction. Stay ahead by tracking what’s valuable now through conversations with your broker and shipper networks and by monitoring your internal data. In addition, tune in to national news and industry sources like CargoNet, which allows you to subscribe to real-time cargo theft alerts.
· Formalize and enforce procedures. Protect MC and DOT numbers, broker credentials and load board access. Limit who can view and modify shipment details and establish verification steps when documentation or routing changes occur. Clear procedures matter only if they are consistently followed and periodically audited. Insider risk must be addressed as part of theft prevention.
· Train beyond the cab. Drivers are not the only targets. Dispatchers, administrators and operations staff control information that enables theft. Train teams to recognize subtle email changes, phishing attempts, unexpected urgency and requests that bypass standard processes.
· Strengthen cyber fundamentals. Cargo theft and cybersecurity are increasingly inseparable. Multi-factor authentication, regular password changes, and updated access controls reduce the likelihood that a single compromised credential will result in theft. Basic cyber hygiene remains one of the most effective controls for fleets.
· Layer in real-time visibility. GPS-enabled trailers, cargo-level tracking and monitoring for trailer swaps or unauthorized detours can improve detection and recovery. Early visibility allows fleets to act faster, notify authorities sooner and limit downstream losses. While no single tool prevents theft entirely, layered visibility improves outcomes when incidents occur.
ASK A LOSS CONTROL REPRESENTATIVE
Have a question on how to mitigate risk? Email losscontroldirect@iatinsurance.com for a chance to see your question answered in a future blog.
[1] U.S. Immigration and Customs Enforcement “Operation Boiling Point: Our Response to Organized Theft Groups Profiting From Organized Retail Crime,” Updated August 25, 2025.
[2] National Insurance Crime Bureau “NICB Warns of Increased Cargo Theft in 2025,” June 25, 2025.
[3] Air Cargo Week “Cargo Theft Skyrockets in the Americas,” September 10, 2025.