Cargo Fraud Prevention

Fictitious Pickup vs. Double Brokering: How to Detect and Prevent Both

Two distinct freight fraud patterns. Two different defenses. Most operators conflate them — and end up defending poorly against both. Here's the operator's guide for 2026.

By FSG Operating Team··9 min read

Quick Answer

Fictitious pickup and double brokering are two distinct freight fraud patterns that are frequently confused. A fictitious pickup occurs when an imposter physically takes possession of freight at the shipper's dock using stolen or fabricated carrier credentials. Double brokering occurs when a legitimate-seeming broker accepts a load and then re-brokers it to an unsuspecting carrier — often disappearing with payment while the cargo vanishes downstream. Both patterns surged in 2025, contributing to the nearly $725 million in U.S. cargo theft losses reported by Verisk CargoNet, up 27 percent year over year. The defense for each is different: fictitious pickup requires identity verification at the dock, while double brokering requires broker vetting, payment controls, and load tracking through the broker chain.

TL;DR

  • Fictitious pickup: imposter takes physical possession of freight using stolen carrier credentials. Defense = identity verification at the dock.
  • Double brokering: legitimate-seeming broker accepts your freight then re-brokers it to an unaware carrier. Defense = broker vetting + payment controls + load tracking.
  • Both have surged in 2025. CargoNet reported nearly $725M in total cargo theft losses, up 27% YoY.
  • FBI/IC3 has issued multiple alerts on cyber-enabled strategic cargo theft tied to both patterns.
  • Carriers, brokers, and shippers each defend against these patterns differently — your role determines your control points.
  • A documented carrier vetting + dispatch verification SOP eliminates roughly 80% of fictitious pickup risk before any freight moves.

Across mid-market fleet engagements over the past 24 months, the same conversation keeps happening: an operator describes a recent cargo loss, calls it "a fictitious pickup," and we discover it was actually a double-brokering incident — or vice versa. The two patterns are different, and they require different controls. Confusing them is one of the reasons the same operator gets hit twice.

This article distinguishes the two, walks through the realistic 2026 prevention controls for each, and shows how to build a single defense program that addresses both at the operating level.

Definitions and how the two patterns differ

Fictitious pickup (physical fraud)

An imposter physically takes possession of freight at the shipper's dock by impersonating a legitimate carrier. The fraud uses stolen MC numbers, fabricated DOT credentials, real-looking emails to your dispatch team, and increasingly sophisticated identity documents to pass shipper verification. The freight is gone before anyone realizes the legitimate carrier wasn't the one that picked it up.

Double brokering (contractual fraud)

A broker — or someone posing as one — accepts a load assignment from a shipper or another broker, then re-brokers that same load to an unsuspecting carrier without authorization. The fraud broker typically intercepts the carrier's payment, disappears, and leaves both the shipper and the carrier dealing with the loss. In the most sophisticated variant, the load is then stolen by the fraud network using the unsuspecting carrier's legitimate paperwork as operational cover.

The key difference

Fictitious pickup is a physical-world fraud. Someone shows up at a dock, presents fake credentials, and drives off with freight. Double brokering is a contractual fraud. Someone in the brokerage chain accepts an assignment they shouldn't have and re-brokers it deceptively.

These can be combined — a sophisticated fraud network may use double brokering to place freight in the hands of an unsuspecting carrier whose load is then stolen via a fictitious-pickup operation downstream — but the prevention controls for each are different.

Why both have surged in 2025–2026

Three structural shifts have made both patterns more attractive to organized crime:

  1. The dispatcher attack surface has grown. Most carrier and broker dispatch operations now run on portals, APIs, and integrations that did not exist five years ago. Each integration is a potential phishing or credential-theft vector. The FBI/IC3 has issued multiple alerts on cyber-enabled strategic cargo theft tied to these vectors.
  2. The recovery rate has not improved. Cargo recovered after theft remains low — frequently under 25 percent for high-value loads. The risk-reward calculation favors the fraud operator, especially in jurisdictions where prosecution of cargo crimes is deprioritized.
  3. The defense has not kept pace. Most carrier and shipper SOPs were written before strategic cargo theft was a category. The default identity verification at most docks is "did the driver show up roughly when expected with the right paperwork." That is not enough in 2026.

Verisk CargoNet's 2025 analysis put total U.S. cargo theft losses at nearly $725 million — up 27 percent year over year. Strategic cargo theft, including both fictitious pickup and double brokering, was the fastest-growing category.

How to prevent fictitious pickup

Five controls form the operating defense:

  1. Driver and credential verification at the gate. Photo ID + DOT credential verification + plate verification before the trailer is even backed up. Train your dock team on what real CDL credentials look like in your operating states.
  2. Carrier identity confirmation through verified channels. Before releasing freight, the shipper or broker calls the carrier's official phone number — pulled from FMCSA SAFER, not from the paperwork the driver presents — to confirm the assignment.
  3. Rolling pickup confirmation codes. The carrier provides a unique pickup confirmation number directly to the shipper through a verified channel. The driver must present this number at pickup.
  4. Video coverage of every pickup. Driver, tractor, trailer plate. Recorded, timestamped, retained for at least 90 days. This is your evidence base if something goes wrong.
  5. Seal verification before departure. The seal applied at loading must be verified before the trailer leaves the dock. Discrepancies are immediate red flags.

These five controls together eliminate roughly 80 percent of fictitious pickup risk before any freight moves. They cost roughly nothing to implement — they're SOP and training work, not technology purchases. The reason most operators don't implement them is not cost. It's that nobody owns the entire workflow.

How to prevent double brokering

Five controls form the operating defense:

  1. Broker vetting against multiple databases. FMCSA broker authority, complaint history, surety bond status, days in business, and any industry blacklists. New brokers should require multi-source verification before first load.
  2. Re-brokering disclosure required in writing. Broker contracts should explicitly require disclosure of any intent to re-broker, with penalties for unauthorized re-brokering written in.
  3. Payment controls. Where possible, pay the hauling carrier directly. Where that's not possible, require the broker to provide proof of carrier payment before broker payment is issued. Many fraud networks rely on the float between when the broker is paid and when the carrier expects to be paid.
  4. Load tracking through every party. GPS-verified telematics from pickup to delivery, with the data accessible to all legitimate parties in the chain — not just the broker.
  5. Exception monitoring. Any anomaly in pickup time, route, or delivery against the dispatched plan triggers an automated review workflow. Pattern detection across loads catches systematic fraud.

Your role in the chain determines your control points

Your rolePrimary fictitious pickup controlPrimary double brokering control
ShipperDriver and credential verification at dock; rolling pickup codesBroker vetting; direct carrier payment where possible
CarrierVerify dispatcher emails are legitimate; verify pickup assignment through carrier channelsVet brokers before accepting loads; require written re-broker disclosure
BrokerProvide rolling codes to shipper; verify carrier identityDon't accept assignments you don't intend to own; vet downstream carriers
3PL / ForwarderEnd-to-end visibility; identity verification at every handoffContract enforcement; payment-flow control across multi-party chains

Insurance, liability, and contract exposure

Many operators assume their cargo policy covers fictitious pickup and double-brokering losses. That assumption is increasingly wrong.

Carriers have been updating cargo policy language with specific exclusions or conditional coverage for "theft by fraud," "mysterious disappearance," and fraud-induced loss of possession. Some policies now require specific identity verification protocols at pickup as a condition of coverage — meaning if the protocol wasn't followed, the loss isn't covered.

Review your cargo policy language with your broker before assuming a fraud loss is fully covered. If your underwriter offers a premium reduction for documented adherence to specific verification protocols, the math typically favors implementing the protocols.

Who owns this defense at your company?

Defense against fictitious pickup and double brokering is multi-functional — not a single role.

  • Operations owns dispatch verification SOPs and gate controls
  • Risk / Insurance owns contract language, broker vetting standards, carrier insurance verification
  • Security owns training, video coverage, incident response
  • IT / IS owns email security, dispatcher portal access controls, credential protection

The most effective programs designate a single coordinator — often the COO, VP Operations, or fractional security leader — to ensure all four functions are operating in concert. Without that coordinator, the controls exist in silos and the fraud finds the seams.

Next step

If you want to know which of the controls above are missing or weak in your specific operation, Fleet Security Group offers a free Fleet Vulnerability Assessment — $25,000 value — that maps your fictitious pickup and double-brokering exposure against the 2026 Fortune 500 reference architecture. Five business days from form submission to written report. Use the form below to request yours.

See also: What does a cargo theft incident actually cost? and How insurance underwriters evaluate fleet security programs.

Frequently Asked Questions

Common questions about this topic

What is a fictitious pickup in trucking?+

A fictitious pickup is a freight fraud pattern where an imposter physically takes possession of cargo at a shipper's dock by impersonating a legitimate carrier. The imposter typically uses stolen MC numbers, fabricated DOT credentials, real-looking emails to dispatch teams, and increasingly sophisticated identity documents to pass shipper verification. By the time the legitimate carrier arrives or the shipper realizes something is wrong, the freight is already gone — usually broken down at a chop shop or repackaged in a different state for resale.

What is double brokering?+

Double brokering is a freight fraud pattern where a broker accepts a load assignment from a shipper or another broker, then re-brokers that same load to an unsuspecting carrier — often without authorization to do so. The fraud broker typically intercepts the carrier's payment, disappears, and leaves the carrier and shipper to deal with the loss. In the most damaging variant, the load itself is then stolen by the fraud network using the carrier's legitimate paperwork as cover. The FBI's Internet Crime Complaint Center (IC3) has issued multiple advisories on this pattern.

How is fictitious pickup different from double brokering?+

Fictitious pickup is a physical-world fraud: someone shows up at a dock, presents fake credentials, and drives off with freight. Double brokering is a contractual fraud: someone in the brokerage chain accepts an assignment they're not authorized to handle and re-brokers it deceptively. The two patterns are sometimes combined — a sophisticated fraud network may use double brokering to put freight in the hands of an unsuspecting carrier whose load is then stolen by a fictitious-pickup operation downstream — but the controls required to defend against each are different. Identity verification at the dock prevents fictitious pickup. Broker vetting and payment controls prevent double brokering.

How can I prevent fictitious pickup of my freight?+

Fictitious pickup prevention rests on five controls: (1) require photo ID and DOT credential verification of the driver at the gate, with the shipper or broker calling the carrier's official phone number — not the number on the paperwork — to confirm the assignment; (2) implement a rolling code or pickup confirmation number that the carrier provides directly to the shipper through a verified channel; (3) record video of every pickup including the driver, tractor, and trailer plate; (4) require seal verification before the trailer leaves the dock; (5) train dock workers on the most common fraud patterns so they know what to look for.

How can I prevent double brokering?+

Double brokering prevention rests on five controls: (1) vet every broker against established databases (FMCSA, broker authority, complaint history, surety bond status); (2) require brokers to disclose any rebrokering in writing as part of contract terms; (3) implement payment controls that pay the actual hauling carrier directly when possible, or require proof of carrier payment before issuing broker payment; (4) track loads through every party in the chain using GPS-verified telematics; (5) maintain an exception monitoring workflow that flags any anomaly in pickup time, route, or delivery against the dispatched plan.

What is strategic cargo theft?+

Strategic cargo theft is the umbrella term for non-opportunistic, planned cargo theft operations that use intelligence gathering, identity fraud, technology, and organized teams to target specific high-value loads. Both fictitious pickup and double brokering frequently feed into strategic cargo theft operations. The FBI and IC3 have reported significant growth in cyber-enabled strategic cargo theft involving phishing of dispatch staff, credential theft from carrier portals, and sophisticated impersonation of legitimate carriers. Verisk CargoNet's 2025 data showed strategic cargo theft as the fastest-growing category of total cargo loss.

Are insurance carriers paying out fictitious pickup claims?+

Insurance carriers are increasingly scrutinizing fictitious pickup and double-brokering claims and may dispute coverage based on policy language around 'theft by fraud,' 'mysterious disappearance,' or specific exclusions for fraud-induced loss of possession. Some carriers have updated cargo policies to require specific identity verification protocols at pickup as a condition of coverage. Operators should review their cargo policy language with their broker before assuming a fictitious pickup or double-brokering loss is fully covered.

Who is the right person at my company to own this defense?+

Defense against fictitious pickup and double brokering is a multi-functional responsibility — not a single role. Operations owns dispatch verification SOPs and gate controls. Risk and insurance ownership covers contract language, broker vetting standards, and carrier insurance verification. Security ownership covers training, video coverage, and incident response. IT/IS ownership covers email security, dispatcher portal access controls, and credential protection. The most effective programs designate a single coordinator — often the COO, VP Operations, or fractional security leader — to ensure all four functions are operating in concert rather than in silos.

Apply It

Want this analyzed against your fleet?

Get our free Fleet Vulnerability Assessment ($25,000 value). 5 business days to a written report you keep — even if you never hire us.

Free · No Obligation

$25,000 value

Get Your Fleet Vulnerability Assessment

Answer 7 questions. Get a written report in 5 business days.

We'll never share your information. You can request deletion any time.